Re: Last Call: draft-ietf-behave-ftp64-10.txt (An FTP ALG for IPv6-to-IPv4 translation) to Proposed Standard

2011-05-30 Thread Pekka Savola

On Fri, 20 May 2011, The IESG wrote:

The IESG has received a request from the Behavior Engineering for
Hindrance Avoidance WG (behave) to consider the following document:
- 'An FTP ALG for IPv6-to-IPv4 translation'
 draft-ietf-behave-ftp64-10.txt as a Proposed Standard


This is an ops-dir review of draft-ietf-behave-ftp64-10.

I do not find major issues in the document.  This is a somewhat complex
document and I would have hoped that the spec could have been more
straightforward and the result is some 50 MUSTs, SHOULDs and MAYs.
But I suppose FTP legacy cases and implementations etc. make it a
difficult protocol to support in the real life.

substantial comments


The document does not mention or discuss LPRT and LPSV. Is that intentional?
The IANA registry says these are now obsolete, but RFC1639 is still
experimental and no document has (formally) obsoleted these.

S 5:

   Telnet option negotiation attempts by either the client or the
   server, except for those allowed by [RFC1123], MUST be rejected by
   the FTP ALG without relaying those attempts.  This avoids the
   situation where the client and the server negotiate Telnet options
   that are unimplemented by the FTP ALG.

... what does rejected mean exactly?  Does the ALG send back to
the negotiation attempter some error code?  Does it abort the connection?
ignore these options?  strip them out when connecting to the other end?

8. Default port 20 translation


   If the client does not issue an EPSV/PASV or EPRT/PORT command prior
   to initiating a file transfer, it is invoking the default active FTP
   behavior where the server sets up a TCP session towards the client.
   In this situation, the source port number is the default FTP data
   port (port 20) and the destination port is the port the client uses
   as the source port for the control channel session.

.. is it?  I thought the source port used by the server is orthogonal to
whether pasv/port is issued.  AFAIK, multiple FTP server implementations
never use port 20.  But I have not recently tested this myself.

   The ALG MUST enable or disable EPSV to PASV translation as requested.
   If EPRT to PORT translation is supported, ALGS ENABLE64 SHOULD enable
   it and ALGS DISABLE64 SHOULD disable it along with enabling or
   disabling EPSV to PASV translation, respectively.  If EPRT to PORT
   translation is not supported, ALGS ENABLE64 only enables EPSV to PASV
   translation.

.. what does this SHOULD..along with.. mean?  I read it so that it's OK
that for ALGS DISABLE64 EPSV-PASV is disabled but EPRT-PORT is not
disabled?  A different way to read it would be that both EPSV-PASV and
EPRT-PORT are SHOULDs.

editorial:
--

   A survey done in April of 2009 of 25 randomly picked and/or well-
   known FTP sites reachable over IPv4 showed that only 12 of them
   supported EPSV over IPv4.

.. fwiw, Dan Wing redid this test on 18 May 2011, reporting on behave list.
the results didn't differ much (I didn't look at the numbers), but if you
want to update this, now would be the chance.

 If
   such a multi-purpose ALG forbids the use of the AUTH command for
   policy reasons, the side effect of making the ALG stop performing the
   translations described here, as well as other possible interventions
   related to IPv6-to-IPv4 translation, MUST be retained even if the ALG
   responds to the AUTH command with an error and does not propagate the
   command to the server.

.. I had a hard time following what this one sentence includign a MUST
actually requires.  Maybe break down to more easily digestible sentences?

   [Bernstein]
  Bernstein, D., PASV security and PORT security, 2000,
  http://cr.yp.to/ftp/security.html.

.. this reference is not cited in the doc, add or remove?
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: How to pay $47 for a copy of RFC 793

2011-05-09 Thread Pekka Savola

On Mon, 9 May 2011, Steve Crocker wrote:

A simpler and more pragmatic approach is to include a statement in the boilerplate of 
every RFC that says, RFCs are available free of charge online from ...

The copyright rules would prohibit anyone from removing this statement.  If 
someone pays $47 for a copy and then reads this statement, he is unlikely to 
pay $47 again.


I suspect those who are inclined to pay $47 for an RFC are very 
unlikely to read any boilerplate statements on the RFC.


While I could live with this, I fear adding more boilerplate just 
creates more boilerplate and not much else.


--
Pekka Savola You each name yourselves king, yet the
Netcore Oykingdom bleeds.
Systems. Networks. Security. -- George R.R. Martin: A Clash of Kings
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-ietf-v6ops-v6-aaaa-whitelisting-implications-03.txt (IPv6 AAAA DNS Whitelisting Implications) to Informational RFC

2011-04-26 Thread Pekka Savola

On Fri, 15 Apr 2011, The IESG wrote:

The IESG has received a request from the IPv6 Operations WG (v6ops) to
consider the following document:
- 'IPv6  DNS Whitelisting Implications'
 draft-ietf-v6ops-v6--whitelisting-implications-03.txt as an
Informational RFC


This is an ops-dir review of
draft-ietf-v6ops-v6--whitelisting-implications-03.

The document is readable and could be published as-is.  I share some of the
concerns already expressed in the document, but I think the doc strikes a
reasonable balance between the concerns and practical points.

One bigger comment:
---

Section 6 on deployment scenarios seems too black and white: either it is
done ad-hoc or (completely) universally.  The latter is unfeasible.

The document should cover a middle ground which is already discussed in
[NW-Article-DNS-WL], i.e., one or more whitelisting information providers
would be used by multiple content networks.  This has many benefits compared
to completely ad-hoc model, and is feasible compared to universal model.

The universal deployment model proposition has created ripples throughout
the document (one such place is S 7.3.7), and I think the document might
have been clearer if that was taken out completely -- or at least, issues
related to each deployment model would be more clearly separated.

..


8.3.1. Solving Current End User IPv6 Impairments
...
   One challenge with this option is the potential difficulty of
   motivating members of the Internet community to work collectively
   towards this goal, sharing the labor, time, and costs related to such
   an effort.  Of course, since just such a community effort is now
   underway for IPv6, it is possible that this would call for only a
   moderate amount of additional work.

... I would observe that ad-hoc whitelisting is already requiring a lot of
work from each of whitelisting providers.  Would this require more than
that?  If the alternative is to do nothing (no whitelisting, no user
impairment notification) that is clear the winner from the selfish POV. But
if the choice is between whitelisting and alerting, I don't see much
difference between the two.  Both could benefit from joint activities, but
both can also be operated in an ad-hoc fashion.


editorial:
--

7.3.7. Additional Implications If Deployed On An Ad Hoc Basis

   Additional implications, should this be deployed on an ad hoc basis,
   could include scalability problems relating to operational processes,
   monitoring, and ACL updates.

... this could be read to imply that S 7.3.1-6 would be applicable to
universal deployment.  This is not what is meant.  Maybe clarify somewhat
like as follows:

   Previous subsections described implications that apply to both ad-hoc and
   universal deployment models.  Some additional implications are specific
   to ad-hoc deployment models, namely ...

S 7.5

   governmental, and/or cultural conflicts, given the new control point
   which has be established with DNS whitelisting.  For example, in one

s/be/been/

   [IPv6 Brokenness]
  Anderson, T., Measuring and Combating IPv6 Brokenness,
  Reseaux IP Europeens (RIPE) 61st Meeting, November 2011,
  http://ripe61.ripe.net/presentations/162-ripe61.pdf.


s/2011/2010/
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-ietf-mip4-gre-key-extension-04.txt (GRE Key Extension for Mobile IPv4) to Proposed Standard

2011-03-15 Thread Pekka Savola

On Mon, 28 Feb 2011, The IESG wrote:

The IESG has received a request from the Mobility for IPv4 WG (mip4) to
consider the following document:
- 'GRE Key Extension for Mobile IPv4'
 draft-ietf-mip4-gre-key-extension-04.txt as a Proposed Standard


I've done an ops-dir review of draft-ietf-mip4-gre-key-extension-04.
The document defines procedures when using using GRE tunneling between
the mobile node or foreign agent and the home agent.  GRE Key extention is
used as for disambiguation purposes to handle overlapping address space.

The specification appears to be clear enough, though it is actually
specifying more than the document title suggests e.g. by adding MUST
requirements for all foreign agent implementations.

As a general comment, I suppose this is expected to be used in controlled
environments only, because UDP encapsulation is already defined and does not
(AFAIK) have these issues, and GRE is not expected to traverse NATs. As such
this does not seem to be a very long-term solution.

As an operational comment, I know many hardware GRE tunneling
implementations don't support GRE keying in hardware.  Maybe this is not a
concern here.

substantial issues
--

The document title is a bit misleading. This document not only specifies MIP
GRE key extension, but seems to be specifying how Foreign Agent (FA) MUST
act when either the foreign agent or mobile node wants to use GRE tunneling.
This document includes MUST requirements also for Foreign Agents that don't
implement GRE (S 4.1, fourth paragraph), and even if Key extension would
not be used (S 4.1-4.2).  As such, Updates: RFC3344 should be required.
(Or, now Updates: RFC5944)

In essence, this seems to actually be a more specific Encapsulation with
MIP4 specification.

As a result, it would be nice if the scope of the document was laid out
more clearly.

Nits:
-

 - Abstract is a bit verbose and mostly copy-paste from Introduction.
 - in S 4.1, reference [X.S0011-D] does not seem to exist in the references
   section.
 - RFC3344 has been obsoleted by RFC5944

--
Pekka Savola You each name yourselves king, yet the
Netcore Oykingdom bleeds.
Systems. Networks. Security. -- George R.R. Martin: A Clash of Kings
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-ietf-isis-ieee-aq (IS-IS Extensions Supporting IEEE 802.1aq Shortest Path Bridging) to Proposed Standard

2011-01-07 Thread Pekka Savola

On Tue, 4 Jan 2011, The IESG wrote:

- 'IS-IS Extensions Supporting IEEE 802.1aq Shortest Path Bridging '
  draft-ietf-isis-ieee-aq-03.txt as a Proposed Standard

...


The file can be obtained via
http://www.ietf.org/internet-drafts/draft-ietf-isis-ieee-aq-03.txt


This is an ops-dir review of draft-ietf-isis-ieee-aq-03.

The document provides an overview of IEEE 802.1aq (shortest path Ethernet
bridging using IS-IS) and specifically defines IS-IS codepoints for use.
802.1aq is orthogonal with TRILL wg solutions but both solve somewhat
similar issues, i.e. Ethernet network scaling and load balancing
optimizations.

Secure use of 802.1aq will probably require manual configuration of IS-IS
authentication in each device or IS-IS filtering in client ports.
The draft does not discuss interoperability with traditional Ethernet, i.e.,
how will this work in an environment where all the equipment does not
support it.

I find the document close to ready to publish after minor text improvements
and e.g. definiting how a newly allocated IANA codepoint TLV subspace is to
be managed by IANA.

Some more detailed comments below.

substantial
---

17. Security Considerations

   This document adds no additional security risks to IS-IS, nor does
   it provide any additional security for IS-IS.

.. while true, this is probably a bit weak. Given that the document included
a quite detailed description of 802.1aq (not just IS-IS extensions), some
brief summary would have been nice.

Some notes about this:
 - This protocol is apparently intended to be used in a zero-conf
   environment.  IS-IS authentication cannot be used without manual
   configuration. Hence a warning label would likely be useful.  For
   example, I suppose there is nothing to prevent a UNI port from
   participating in IS-IS and 802.1aq.

 - The increase of state due to broadcast/multicast is a new potential
   concern, but really not that much different from the current MAC address
   flooding issues.

 - One particular thing that comes to mind is intentional clash of SPVID
   values described in S 14.1. By claiming the highest Bridge Identifier, a
   bridge could deny all other bridges all service, right?


semi-editorial
--

   FDBFiltering Information Base: {DA/VID}-{next hops}
...
4. 802.1aq Overview

   802.1aq utilizes 802.1Q based Ethernet bridging. The filtering
   database (FDB) is populated as a consequence of the forwarding
   computed from the IS-IS database.

.. is this a typo?  The established spell-out form of FDB is Forwarding
Database (storing MAC-port mappings).  Is overloading it intentional?

4.7. Data Path SPBV Multicast


   C-DA multicast addresses may be advertised from SPBV UNI ports.
   These may be configured or learned through MMRP. The MMRP protocol

... there is no reference or spell-out in abbreviations for MMRP. I
suppose youre referring to Multiple MAC registration protocol defined in
IEEE 802.1ak-2007.

18. IANA Considerations


   Note that the NLPID value 0xC1 [NLPID] used in the IIH PDUs has
   already been assigned by IANA for the purpose of 802.1aq therefore
   no further action is required for this code point.

.. true but I suppose it wouldn't hurt to add a reference to this RFC there,
given that the defining RFC-to-be does not include any other reference other
than 802.1aq.

  The MT-Capability TLV is the only TLV requiring a new sub-registry.
   Type value 144 is requested with a starting sub-tlv value of 1.

.. as you're creating a new registry, I suppose you should also define the
registration policy for it?  Most IS-IS TLV codepoints appear to have
Expert review, so maybe that would be appropriate here as well.

editorial
-

Traditionally [references] are not appropriate in Abstract.

It is a bit strange to see an empty Introduction section :-). Most of
Introduction is provided in Overview (S 4) though.


___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-cheshire-dnsext-dns-sd-07.txt (DNS-Based Service Discovery) to Proposed Standard

2010-12-22 Thread Pekka Savola

On Wed, 22 Dec 2010, Stuart Cheshire wrote:
FWIW, Apple's code on Mac OS X uses TSIG for secure updates. You enter the 
credentials in the Sharing preferences pane. What the user-interface people 
chose to label User and Password are in reality the TSIG key name and the 
TSIG key data. They felt that most users wouldn't know what TSIG meant, and 
it was better to have something familar (but wrong) rather than something 
unfamilar (but correct). Sorry.


BIND allows pretty flexible configurations to control which keys are 
authorized to update what records.


What I'm saying is that having to manually pre-configure the hostname 
in DNS goes against what appears to be one of the main DNS-SD goals, 
i.e., the host can invent the hostname or use it in a zero-conf 
fashion.


I don't think it's possible to integrate DNS-SD with secure DNS 
without losing at least some of the properties DNS-SD was designed to 
address.  So it would be unrealistic to require this from the 
protocol, especially given its background.


What I would have wanted to see is more truth in advertising how in 
practise using security impedes the use of DNS-SD.  Which usage modes 
of DNS-SD can be made to work and at what cost.


--
Pekka Savola You each name yourselves king, yet the
Netcore Oykingdom bleeds.
Systems. Networks. Security. -- George R.R. Martin: A Clash of Kings
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-ietf-tls-rfc4347-bis-04.txt (Datagram Transport Layer Security version 1.2) to Proposed Standard

2010-12-20 Thread Pekka Savola

On Tue, 30 Nov 2010, The IESG wrote:

The IESG has received a request from the Transport Layer Security WG
(tls) to consider the following document:
- 'Datagram Transport Layer Security version 1.2'
 draft-ietf-tls-rfc4347-bis-04.txt as a Proposed Standard


A bit late to the IETF LC, but hopefully these are still useful.

This is an ops-dir review of draft-ietf-tls-rfc4347-bis-04 (DTLS 1.2).

This looks good, but the text seems a bit unclear on IP fragmentation vs
packetization. ICMP notifications passing up to the app is only a 'should'
and this begs the question why.  IANA considerations practicalities could
also be spelled out (not sure how detailed IANA wants these to be).

In more detail:

If I understand correctly *), initial DTLS exchanges will typically use
fragmented UDP packets due certificate sizes etc.  The likelyhood of
getting fragmented IP packets through firewalls and other devices is
significantly lower than getting UDP packets through.  The spec would be
more robust and the protocol likely more applicable in the face of
these 'network effects' if it tried to do packetization itself in such a
manner that IP fragmentation would not be necessary.

*) S 3.2.3 and 4.1.1 appear to be somewhat contradictory on this. See below.

The document does not have a Changes from DTLS 1.0 (RFC4347) section that
is is mandated or at least strongly recommended for update-specs.  The
document does not describe how DTLS 1.2 will interwork with DTLS 1.0 (if it
will). The TLS 1.2 spec (RFC5246, Appendix E.1) does have some that will
apply, but there are likely some DTLS specifics as well.

specific comments
-

3.2.3. Message Size

   TLS and DTLS handshake messages can be quite large (in theory up to
   2^24-1 bytes, in practice many kilobytes).  By contrast, UDP
   datagrams are often limited to 1500 bytes if fragmentation is not
   desired.  In order to compensate for this limitation, each DTLS
   handshake message may be fragmented over several DTLS records.  Each
   DTLS handshake message contains both a fragment offset and a fragment
   length.

4.1.1. Transport Layer Mapping

   Each DTLS record MUST fit within a single datagram.  In order to
   avoid fragmentation, clients of the DTLS record layer SHOULD attempt
   to size records so that they fit within any PMTU estimates obtained
   from the record layer.

... these seem somewhat contradictory.  Maybe I'm missing something.  The
latter seems to be saying that DTLS implementations should try to avoid IP
fragmentation, but the former seems to imply that it's de-facto mode of
operation.

   If there is a transport protocol indication (either via ICMP or via a
   refusal to send the datagram as in DCCP Section 14), then DTLS record
   layer should inform the upper layer protocol of the error.

.. is this too weak?  I've have thought that it would be natural that if
DTSLS record layer gets this notification (which, in the case of ICMP and
omitting information, is not necessarily given), it MUST pass this
information up. Note that the refusal to send could also apply to UDP 
if packet is bigger than PMTU and DF bit is set or IPv6 is used.

What is the alternative if it doesn't?  It would be fine if
the alternative is that the DTLS record layer react to that information
itself, but completely ignoring e.g. ICMP packet too big would lead to
communication failure.

7. IANA Considerations


   This document uses the same identifier space as TLS [TLS12], so no
   new IANA registries are required.  When new identifiers are assigned
   for TLS, authors MUST specify whether they are suitable for DTLS.

... this may be inadequate.  I was unable to find from the registry
(tls-parameters) which of these parameters this applies to.  All of them?
(This was triggered by S 4.1.2.5, so at least new Cipher Suites must
indicate this.)

If I understand what you mean, 1) you should actually be asking IANA to
reformat the registry so that there is an additional column in all the
tables DTLS-OK? or some such, and possibly 2) modifying TLS 1.2 spec IANA
registration guidelines (i.e. what should the IANA requesters know about
when they're making their request), and also possibly 3) asking IANA to ask
future registrants about DTLS-OK feature if the requestor fails to do so on
their own.

editorial
-

... For the completeness, when referring to PMTU discovery, in addition to
RFC1191 one should probably also refer to RFC1981 (the IPv6 version).

   [WHYIPSEC] Bellovin, S., Guidelines for Mandating the Use of IPsec,
  Work in Progress, October 2003.

... this should probably be rfc5406?

   [IKEv2]C. Kaufman (ed), Internet Key Exchange (IKEv2) Protocol,
  RFC 4306, December 2005.

   Kaufman, C., Internet Key Exchange (IKEv2) Protocol, RFC 4306,
  December 2005.

... remove the latter 'reference' (edit glitch?)


___
Ietf mailing list
Ietf@ietf.org

Re: Last Call: draft-cheshire-dnsext-dns-sd-07.txt (DNS-Based Service Discovery) to Proposed Standard

2010-12-16 Thread Pekka Savola

On Tue, 14 Dec 2010, Stuart Cheshire wrote:

On 17 Nov 2010, at 11:32 PM, Pekka Savola wrote:
The entire document is talking about how an app developer should use it. It 
in this context is the domain name system. DNS-SD is not a protocol in 
itself. It's a usage convention for DNS records. The entire document is 
telling server developers what DNS records we recommend they use to describe 
their service, and telling client developers what DNS records we recommend 
they query for to discover those advertised services. It describes what app 
developers should pick for Instance names and Service names. It describes 
what data app developers should put into TXT records. If we took out all the 
text directed at app developers there would be virtually nothing left. They 
are the audience for this document.


In a way, I understand that it could be argued that this is just a 
naming convention (also see the security considerations below).


Practically, however, it could be said to describe at least the 
solution framework.  In practise, it describes the functionality that 
should be implemented in a DNS-SD software library the apps can link 
to, or even some kind of separate sofware package.  While implementing 
everything described here would also be doable in each application (no 
doubt some will do so), that would be waste.


The point is underlined in e.g. how DNS-updates or related DNSSEC 
keying material would be configured, i.e. everything where there's 
more to it than just a naming convention.



17. Security Considerations

   DNSSEC [RFC 2535] should be used where the authenticity of
   information is important. Since DNS-SD is just a naming and usage
   convention for records in the existing DNS system, it has no specific
   additional security requirements over and above those that already
   apply to DNS queries and DNS updates.

.. this is a bit weak. There's more stuff to put in DNS updates. See the
referred sec-dir review from two years ago.  The text is unchanged.


The sec-dir review said I find this inadequate and this document seems to 
need more work. Can you suggest some specific text? DNS-SD is a convention 
for how to name and use DNS records. Every security consideration that 
applies to a client using DNS queries and updates would apply to a client 
following the conventions in this document.


From my POV, the most important thing I'd like to see in Security 
Considerations section is description of that app developer will be 
able do the DNS updates, hopefully in a secure fashion.


Some examples of what I wonder:

 - Is the expectation that you configure the DNS server so that
   certain IP's have complete access to do updates?

 - What does that imply?  Is it possible to limit the update
   capability to some subtree?  What kind of configuration would it
   need if it should be application-specific? (I.e., if one
   application gets out of hand, can it mess up all other apps or even
   the whole DNS domain?)

 - Or do you expect deployment of DNS security (e.g. TSIG, SIG0)? If
   so, how do you configure these in the app and the server within the
   constraints of zero-conf goals?  Do the same DNS subtree
   limitations and caveats apply?

To sum it up, I suspect the zeroconf nature of the goals of this work 
is likely to prevent the use of TSIG/SIG(0) in DNS-updates, or at 
least it requires major manual operations and/or it effectively 
authorizes one application to update every other application's data as 
well.  But in some contexts it could be possible to implement it in a 
different way.



Editorial:
--

 - IANA considerations does not explicitly mention 'DNS-SD profile'
   referred to in S 6 (though you can work out what you mean).


Can you suggest some specific text?


The minimal fix would be to change:

   This document specifies the following IANA allocation policy for
   unique application protocol names:

to:

   This document specifies the following IANA allocation policy for
   unique application protocol names (DNS-SD profiles):

... but it would still leave IANA considerations a big ambiguous.  It 
would be much better if the required checklist on what to report and 
how IANA should record it in its registry was in a tabular format. 
While it's not in tabular format, the bullet list at 
http://www.dns-sd.org/ServiceTypes.html describes this rather well.


--
Pekka Savola You each name yourselves king, yet the
Netcore Oykingdom bleeds.
Systems. Networks. Security. -- George R.R. Martin: A Clash of Kings
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-cheshire-dnsext-dns-sd-07.txt (DNS-Based Service Discovery) to Proposed Standard

2010-11-17 Thread Pekka Savola

On Tue, 26 Oct 2010, The IESG wrote:

The IESG has received a request from an individual submitter to consider
the following document:
- 'DNS-Based Service Discovery'
 draft-cheshire-dnsext-dns-sd-07.txt as a Proposed Standard


This is an ops-dir review of draft-cheshire-dnsext-dns-sd.  Given how widely
the protocol has been implemented, I think standards track is appropriate.
I think you may be able to implement and operate the protocol based on this
specification, but the audience would greatly benefit from putting a bit
more work in the specification.

Operational perspective:


I have mostly heard and seen DNS-SD used in conjunction with mDNS. I do not
know how much it has been used with regular DNS. Issues like DNS updates
that have only received superficial attention in this document will be
present there. I'd be interested in hearing how much this is used with
regular DNS and how information is in practise stored there (manual
insertion vs dynamic updates).

The document includes requirements and recommendations to network operators
using these services (e.g. S 7.2, S 10) but it's difficult to find.

General observations:
-

1) This document was IETF last called, going informational, in November 2008.
Many comments made during that LC I agree with and have not been addressed. 
See e.g. the following and the follow-ups. 
http://www.ietf.org/mail-archive/web/ietf/current/msg53658.html

http://www.ietf.org/mail-archive/web/ietf/current/msg53712.html
http://www.ietf.org/mail-archive/web/secdir/current/msg00213.html

2) I'd like to see a more detailed review from DNS directorate on this one. 
High-level issues have already been discussed on their list.

http://www.ietf.org/mail-archive/web/dns-dir/current/msg00865.html

3) The document includes protocol specification, design rationale,
to some degree product documentation, advice to application developers,
requirements for DNS servers implementors, etc. in such a fashion that it's
very difficult to find out who should do what.  This could be improved with
a document structure that makes these distinct. Details below.

4) As acknowledged by dns-dir discussion, DNS-SD is essentially a new protocol
(or at least a new kind of 'usage profile') that re-uses DNS formats and 
semantics.
It's not obvious how this should be addressed, i.e. is more truth in
advertising needed.  For example, it uses PTR record lookups in the forward
DNS zone, may store DNS labels including '.' in DNS, and uses TXT records to
store binary data.

Given that document suggests DNS-SD may be used with regular DNS servers,
I'd much more confortable if I saw a DNS-dir technical review for conflicts
or technical issues from that perspective.


Some technical details
--

   There is quite a bit of 'design rationale' (or: don't implement it this
   way) stuff in here that could probably be removed or moved to an appendix
   in the interest of tightening the main spec.

   Examples: almost all of S 4.4, second paragraph of S 5, maybe all
   of 6.1 except 1-2 last paragraphs,

   Also, there is quite a bit of text that's not specific to DNS-SD
   protocol, but rather how e.g. an app developer should use it. It's not
   obvious how that should be part of the main spec.  I wonder if these could
   be split off to a be under a single section for clarity (e.g. most of S 8, S 
15).

   The same also applies to operational advice to network operators (e.g. those
   parts of S 7.2 that deal with parentdomain and dividing by floors, etc., 
maybe S 10)

   Some are requests to DNS server implementors (S 13.1).

In S 4.1:

 In cases where the DNS server returns a negative
   response for the name in question, client software MAY choose to
   retry the query using Punycode [RFC 3492] encoding, beginning with
   using Punycode encoding for the top level label, and then issuing
   the query repeatedly, with successively more labels converted to
   Punycode each time, and giving up if it has converted all labels
   to Punycode and the query still fails.

.. would this retry with punycode, expanding each label at a time result
in a typical case in at least 3 additional lookups in the case of missing
services?

.. it appears to me that you should provide a more precise specification
isntead of 'a negative response'.

   Every DNS-SD service MUST
   have a TXT record in addition to its SRV record, with the same name,
   even if the service has no additional data to store and the TXT
   record contains no more than a single zero byte.

... why?  what happens if this is not the case? will the client protocol
break down and fall to pieces?   IMHO, there should be a strong operational
and/or service publication recommendation to publish TXT records, but on
_client_ side, this kind of mandate flies against the robustness principle.

   The Service portion of a Service Instance Name consists of a pair
   of DNS labels, 

Re: Last Call: draft-ietf-roll-rpl-11.txt (RPL: IPv6 Routing Protocol for Low power and Lossy Networks) to Proposed Standard

2010-09-02 Thread Pekka Savola

On Wed, 18 Aug 2010, The IESG wrote:

The IESG has received a request from the Routing Over Low power and Lossy
networks WG (roll) to consider the following document:
- 'RPL: IPv6 Routing Protocol for Low power and Lossy Networks'
 draft-ietf-roll-rpl-11.txt as a Proposed Standard


I've done a solicited but superficial ops-dir review of 
draft-ietf-roll-rpl-11.  Given the document length (139p) I've had to 
skim most of it.  The IETF Last Call expired two days ago, but for 
information I'm still copying the IETF list, even though this review 
is mainly for OM ADs' and secondarily ROLL WG benefit.


A couple of comments:

In general, ROLL problem space seems to be very similar to MANETs, and 
I wonder why a separate protocol needed to be developed here, 
especially given the amount of scientific research and also IETF 
effort put into MANETs.  ROLL WG charter certainly does not mention 
this.


Copying/modifying various IPv6 ND options for this purpose may be 
required but I wonder if this could have been done in a simpler 
fashion, without having to copy the specifications here.  For example, 
using a TLV container option that includes non-TLV options as-is.


The document mentions uniquely identifying a DODAG by the use of an 
IPv6 address.  The document does not mention what addresses are to be 
used for this purpose, how they are assigned, and how these are 
expected to be unique. (Compare to documents on MANET IPv6 address 
assignments.)


In S 11 on Packet Forwarding:

   1.  This specification only covers how a successor is selected from
   the DODAG Version that matches the RPLInstanceID marked in the
   IPv6 header of the packet being forwarded. [...]

... How is RPLInstanceID marked in the IPv6 header of the packet being
forwarded?  Are you modifying IPv6 packet forwarding and processing
algorithms here (must look into the packets)?  That would be a major
change. (You're really referring to the hop-by-hop header processing here.)

In general the document doesn't seem to be sufficiently upfront on the basic
semantics how RPL is going to be used (from non-RPL perspective).  One
could argue Section 3 (some 12 pages) tries to provide
an overview, but from IP perspective, it provides too much detail on e.g.
tree forming and maintenance.  The most important things to bring up clearly
should be for example: (1) are there changes to existing packet formats or
usage (e.g. does every packet include some kind of header, does this affect
MTU usable in the network)?, (2) is support for these required at each node
in the network, (3) are there changes to the basic packet processing in
associated nodes?

Upon closer inspection, some answers to these high-level questions can 
be found in first paragraph of S 3.3.7 and the last paragraph of S 5, 
but I'd really have wanted to see one or two paragraphs in 
Introduction.


...

It is a bit strange to see that S 17 on manageability does not mention 
security management, because one of the key problems there (as argued 
in the draft as well) is how do you manually configure and maintain 
shared keys on all these devices.


___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-ietf-behave-v6v4-xlate-stateful (Stateful NAT64: Network Address and Protocol Translation from IPv6 Clients to IPv4 Servers) to Proposed Standard

2010-06-03 Thread Pekka Savola

On Tue, 1 Jun 2010, The IESG wrote:

- 'Stateful NAT64: Network Address and Protocol Translation from IPv6
  Clients to IPv4 Servers '
  draft-ietf-behave-v6v4-xlate-stateful-11.txt as a Proposed Standard


I've reviewed draft-ietf-behave-v6v4-xlate-stateful-11 for ops-dir.

I believe the document is ready for publication, but there are a couple
of areas where minor clarifications could improve the document.

As a general comment, spec has good detail (esp S 3.5) on how to 
handle TCP, UDP and ICMP query traffic, but I did not find similar 
detail on how ICMP errors sent in response to such traffic would 
affect packet processing, state tables, etc.


It would be great if e.g. TCPM WG reviewed Section 3.5.2, especially its
state table and said it's OK. There could be a number of unthought-of
cornercases.


From OM perspective, the specification appears to be sufficiently operable

and configurable in IPv6-IPv4 translation. IPv4-IPv6 translation requires
manually configured or unspecified bindings. Operationally this is not going
to be sufficiently as the management interface is unspecified and e.g. MIB
module or other configuration methods do not exist and are not in Behave WG
charter.  But this issue should not delay the publication of this document
and rather should be tackled later, if needed.

The default TCP maximum session lifetime is 2 hours (from RFC5382). I
personally believe this is too small for long-lived sessions.

some detailed comments:
---

   This document may contain material from IETF Documents or IETF
   Contributions published or made publicly available before November
   10, 2008. [...]

.. which material is potentially covered by this?  While the non-WG version
was available prior to Nov 10, 2008, the authors should be able to say so.
It would be better if this disclaimer could be removed.  License info is
also an older version (from id-nits checker).

In S 3.4:

   If the incoming packet is an IPv6 packet that contains a protocol
   other than TCP, UDP or ICMPv6 in the last Next Header, then the
   packet SHOULD be discarded and, if the security policy permits, the
   NAT64 SHOULD send an ICMPv6 Destination Unreachable error message
   with Code 3 (Destination Unreachable) to the source address of the
   received packet.  NOTE: This behaviour may be updated by future
   documents that define how other protocols such as SCTP or DCCP are
   processed by NAT64.

.. I suppose this assumes the packet is unicast, as NAT64 is an unicast-only
specification. Nonetheless I'd suggest that somewhere (probably earlier in
the spec) you'd explicitly say about one sentence on multicast; it's
currently not mentioned at all.  E.g. A NAT64 device MUST ignore any
translation or actions when IPv4 or IPv6 destination address is a multicast
or the limited broadcast address (255.255.255.255). (maybe with more
precise definition what to do instead.)

The same applies but more strongly to the following IPv4 paragraph.  More
strongly because IPv4 spec does not allow generating ICMPv4's in response to
multicast packets while in ICMPv6 this is acceptable under certain
conditions.

NB: I see that IPv6 destination address is covered under 2nd paragraph of S
3.5 but a more explicit mention might be worthwhile.

In S 3.5.1:

  *  The STE destination IPv4 transport is set to (Z(Y'),y), y being
 the same port as the STE destination IPv6 transport address and
 Z(Y') being algorithmically generated from the IPv6 destination
 address (i.e.  Y') using the reverse algorithm as specified in
 Section 3.5.4.

.. S 3.5.2 can hardly be said to specify any algorithm, but it certainly
doesn't even mention the reverse algorithm (however trivial it might be).

In S 3.5.2:

  V4 SYN RCV: An IPv4 packet containing a TCP SYN was received by
  the NAT64, implying that a TCP connection is being initiated from
  the IPv4 side.  The NAT64 is now waiting for a matching IPv6
  packet containing the TCP SYN in the opposite direction.
...
   A TCP segment with the SYN flag set that is received through the IPv6
   interface is called a V6 SYN, similarly, V4 SYN, V4 FIN, V6 FIN, V6
   FIN + V4 FIN, V6 RST and V4 RST.

.. this is somewhat confusing because you appear to be using V4 SYN RCV to
mean only SYN flag set (due to being initiated from ...) while V4 SYN
later means SYN [and possibly ACK] flag set. The same applies to V6 of course.
Maybe reword?  Maybe being initiated from.. and this distinction is not
even necessary, because you don't have it on V4 FIN RCV side either? (Though
when creating sessions, the semantics differ slightly depending on the
initiator.)

V4 FIN RCV, V6 FIN RCV and V4 FIN + V6 FIN are listed in the state diagram
without RCV keyword, and this should be corrected.

I'm also a bit hesitant to include 4 min T.O., 2hrs etc. in the diagram as
these seem to be certain _minimum_ values and the implementation would be
free to use some other values as 

Re: Last Call: draft-ietf-dkim-deployment (DomainKeys Identified Mail (DKIM) Development, Deployment and Operations) to Informational RFC

2009-12-16 Thread Pekka Savola

On Mon, 30 Nov 2009, The IESG wrote:

- 'DomainKeys Identified Mail (DKIM) Development, Deployment and
  Operations '
  draft-ietf-dkim-deployment-09.txt as an Informational RFC


Sorry for missing the LC DL by two days.

This is an assigned ops-dir review of draft-ietf-dkim-deployment-09.
The document describes DKIM usage scenarios and gives recommendations.
Quoting from the document:

 This document provides practical tips for:
   those who are developing DKIM software, mailing list managers,
   filtering strategies based on the output from DKIM verification, and
   DNS servers; those who are deploying DKIM software, keys, mailing
   list software, and migrating from DomainKeys; and those who are
   responsible for the on-going operations of an email infrastructure
   that has deployed DKIM.

As such, this is very much an operations geared document.

Unfortunately, I have not looked into DKIM in detail so it's difficult to
say if these practical tips are are OK and answer the questions arising from
ops community deploying and developing DKIM.  I'd be more confident in this
if it was clear this had been thoroughly tested by these people.

Some comments below:

editorial
-

In general, I found the use of UPPERCASE keywords somewhat misleading when
the advice given was to the operators and deployers, not to the developers
of the protocol.

It would be helpful to have an Abbreviations table up front.  There are many
non-spelled out abbreviations in the doc, or ones that are spelled out
later, not at the first instance of abbreviation.

Acknowledgedments is TBD even though we're at -09 version.  Remember that
its authors' responsibility to properly acknowledge all Contributors,
including Indirect Contributors. (BCP78)

Some of the DKIM references listed as Informative seem to be required
reading to fully understand this document and it would be better to put them
under Normative References.

In S A.1.1.1., one of the last two paragraphs appears to be 
incorrectly indented. These seem logically similar paragraphs.


An informative reference in Appendix 1 should be inserted to point to
RFC4870.

substantial
---

S 3.1 Private Key Management: Deployment and Ongoing Operations

.. this document describes many practises wrt private key management, with
uppercase keywords.  I'm not sure if using them is appropriate in this
context.  Some of the suggestions also seem unnecessarily strict or
impractical; e.g. that private key must not be network-accessible.  In
practise these goals may not be worth the tradeoffs.  Even in the field of
DNSSEC, where the compromise of the key is a much bigger problem than here,
the guidelines are more flexible.  See e.g. draft-ietf-dnsop-rfc4641bis-01
(S 3.6) and its predecessor document.

S 3.2:

   Ideally DNSSEC [RFC4034] SHOULD be employed in a configuration that
   provides protection against record insertion attacks and zone
   enumeration.  In the case that NSEC3 [RFC5155] records are employed
   to prevent insertion attack, the OPT-OUT flag MUST be set clear.

.. it is not obvious why OPT-OUT is a MUST NOT.  What are the tradeoffs?
I'm not sure if this document is best placed to mandate DNSSEC signing and
delegation behaviour that appears to be irrelevant from DKIM perspective.

S 5.1 Intended Scope of Use

   DKIM requires that a message with a signature that is found to be
   invalid is to be treated as if the message had not been signed at
   all.
...
   It follows that messages with
   invalid signatures SHOULD be treated no better and no worse than
   those with no signature at all.

.. if DKIM specs require the first sentence, then the last sentence is not
valid; SHOULD should be a MUST.  But I don't like the upper case here
anyway, and I'm not sure if the last sentence is even needed, given that the
first sentence of this section already specified the behaviour.


___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Fix the Friday attendance bug: make the technical plenary the last IETF session, like it was before

2009-11-11 Thread Pekka Savola

On Tue, 10 Nov 2009, Stanislav Shalunov wrote:

But nobody will come to the technical plenary Friday afternoon! --
1. We did come to the technical plenary when it was the last thing on 
Thursday, and it was in the evening.
2. If people won't come to the technical plenary, they won't come to WG 
meetings.  If it's an unsuitable meeting time, we should not put WGs there.


I tend to sympathize with this argument.  I suppose WG meetings are, 
from some POV, more important than a plenary.  So what if out of 1100 
participants we get only 600 at the plenary?  Maybe if the attendance 
drops low enough we could drop the whole plenary.


Even better would be putting the administrative plenary there ;-)

--
Pekka Savola You each name yourselves king, yet the
Netcore Oykingdom bleeds.
Systems. Networks. Security. -- George R.R. Martin: A Clash of Kings
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-ietf-mpls-mpls-and-gmpls-security-framework (Security Framework for MPLS and GMPLS Networks) to Informational RFC

2009-11-10 Thread Pekka Savola

On Tue, 27 Oct 2009, The IESG wrote:

The IESG has received a request from the Multiprotocol Label Switching WG
(mpls) to consider the following document:

- 'Security Framework for MPLS and GMPLS Networks '
  draft-ietf-mpls-mpls-and-gmpls-security-framework-07.txt as an 
Informational RFC


This is an assigned ops-dir review.

The document is somewhat lengthy but easy-to-read description of 
various security threats and mitigation techniques applicable to MPLS 
and GMPLS networks.  A lot of the material is focused on higher-layer 
issues, i.e., VPNs.  I would argue that the document would be more 
focused if security framework for VPNs and for lower-layer stuff like 
MPLS and signaling would be separated.  But I also understand and can 
live with keeping them combined. Specifically, I think there is a lot 
of duplication with RFC 4111 (Security Framework for 
Provider-Provisioned Virtual Private Networks (PPVPNs)) here and it's 
acknowledged in the document.


There are a couple of places where the document appears to be overly 
verbose and veers into tangential issues (e.g. providing description 
of IPsec and IKE algorithms, modes; or 4 pages of router filtering or 
firewalling discussion) and I'd suggest summarizing.  There are a 
couple of minor technical errors or omissions.  IMHO, the document 
should be revised prior to publication.


Some higher-level observations
--

In S 5.2, P-to-P or P-to-PE protection is touched on only very 
briefly, and PWE3 protection is deemed out of scope.  While these are 
declared out of scope or left for future study, it would have been 
useful to have a paragraph or subsection in Security Considerations 
section that underlines these remainder threats.


In S 5.3, there are 4 pages dedicated to explaining how packet 
filtering and firewalling works.  I'd argue most of that is tangential 
to this document and should be removed.  A succint description should 
be possible in 0.5-1 pages. If you add informative reference to 
(expired, dead) I-D draft-ietf-opsec-filter-caps-09, it should cover 
the background.


S 6 appears to discuss only SNMP/syslog type monitoring and detection 
mechanisms but these can only detect few attacks (usually resulting 
from flapping protocol adjacencies, CPU overload scenarios, etc.). 
The rest will fly below the radar.  Other techniques such as 
netflow-based traffic fingerprinting are needed for more detailed 
detection and reporting.


S 7.1.1 describes control plane protection but I believe this document 
should mention uRPF/ACLs towards customers and ACLs at the edges.  It 
does mention destination-address based filtering as one possibility, 
but this has its own set of issues.  If you're able to do 
comprehensive source-address based filtering, you're in a much better 
position to block someone spoofing your own (management or routers') 
IP address.


The key point here is that if you're able to prevent anyone from 
spoofing your infrastructure IP addresses at ingress, you don't need 
(or you get an additional layer of protection) TCP-MD5, iBGP, IGP etc. 
protection.


FWIW, draft-savola-rtgwg-backbone-attacks-03 describes this approach, 
and it may be applicable especially with smaller and reasonably 
well-defined service provider networks.  (Some of the topics described 
in the draft are also touched on in S 7.2; this should also be added 
to S 9.3.1 point 1)


S 8 does not discuss the differences of MPLS domain cross-connection 
in various established models, see e.g. RFC4364 S 10 options a)-c) and 
RFC4761 (L2VPN) section 3.4 options a)-c). One of th key issues not 
discussed here is whether a signalling protocol is run between service 
providers, or whether everything is demultiplexed/multiplexed at the 
border. This also has an impact on some of the security properties of 
the network. It seems as if the document is assuming that a signaling 
protocol is run between the providers; this may or may not be due to 
MPLS-ICI specifications but I don't know.


Some more detailed comments
---

In S 4.3,

Bidirectional Forwarding
   Detection (BFD), however, does have support for carrying an
   authentication object. It also supports Time-To-Live (TTL)
   processing as an anti-replay measure. Implementations conformant
   with this MPLS-ICI should support BFD authentication and must
   support the procedures for TTL processing.

.. I'd observe that the TTL check in BFD is not primarily an 
anti-replay mechanism (the same also in S 8.1.1).  Also it's not clear 
if the MPLS-ICI specification imposes the requirements in the last 
sentence, or whether these are from this document.  (If these are 
originated by this document, this may be an issue because this is 
targeting Informational.)


 The ease of forging TCP/IP packets is the main
   reason network management protocols lacking strong security have not
   been used to configure network elements (e.g., with the 

Re: Last Call: draft-ietf-l3vpn-2547bis-mcast (Multicast in MPLS/BGP IP VPNs) to Proposed Standard

2009-10-21 Thread Pekka Savola
I'll only comment on a couple of followups below. I think I've 
described my POV and I probably won't do further follow-ups.


On Mon, 19 Oct 2009, Eric Rosen wrote:

PekkaAt the minimum, the status (intent) of the spec should be
Pekkaclarified. Even better would be to improve and include the support
Pekkahere.

In general, the procedures specified in the document will enable an IPv4 SP
backbone to support customer use of IPv6 multicast.  You are correct that
section 7.4.2.2 is incomplete in this respect.


Do you intend to correct this?  One could argue that this does not 
fulfill the requirements for PS as it stands.



Pekka 2) RP configuration in SP network.  It's not clear if SP network
Pekkaneeds to know how customer sites have configured their RPs (when
Pekkathe customer provides the RP).  At least traditional PIM
Pekkasignalling would require SP to know this.  But if auto-rp or BSR
Pekkais not used by the customer, how is this information learned and
Pekkamaintained?  Would it require manual configuration?

A PE router does function as a PIM peer of a CE router, and hence needs some
way to get the group-to-RP mappings of the customer.  How this is done is
for the SP and the customer to determine.


Do you intend to spell this out more clearly?  This seems like a major 
configuration and OM issue?  Unfortunately this does not have good 
solutions, and I suppose those ones that do exist do not have rough 
consensus in the community.  As it stands it seems like the spec chose 
to punt an issue that is required to be resolved in order to operate 
the protocol.



From the Security Considerations section:


  an implementation SHOULD provide mechanisms that allow a SP to place
  limitations on the following:

- total number of (C-*,C-G) and/or (C-S,C-G) states per VRF

Since SA AD routes are generated only as a result of creating the
corresponding multicast states, limiting the number of multicast states per
VRF results in limiting the number of Source Active routes.


I may be missing something but it's not clear why you say so.  At 
least in regular PIM-SM, source state can be created without creating 
receiver state.  S 10.1.2.2 seems to imply that AD routes would be 
generated based on the receipt of Register messages, at which point 
there is not yet necessarily any join state.



A more specific discussion can be found in the Security Considerations
section of draft-ietf-l3vpn-mcast-bgp:

 In conjunction with the procedures specified in Section Supporting
  PIM-SM without Inter-Site Shared C-trees an implementation SHOULD
  provide capabilities to impose an upper bound on the number of Source
  Active A-D routes, as well as on how frequently they may be
  originated. This SHOULD be provided on a per PE, per MVPN granularity.


While this is on a different spec, experience with MSDP has shown that 
SHOULD is insufficient; these requirements are a MUST from OM 
perspective.



Pekka 6) PIM-BIDIR usage.  May the SP use PIM-BIDIR internally even if the
Pekkacustomer interface would use PIM-SM?

I'm not sure I understand exactly what you are asking.  The technology for
building the P-tunnels is completely independent of the multicast technology
used by the customer.


Ok, that is what I wanted to hear.  Maybe it was clear enough but I 
wasn't 100% sure.



3.2. P-Multicast Service Interfaces (PMSIs)



 Multicast data packets received by a PE over a PE-CE interface must
 be forwarded to one or more of the other PEs in the same MVPN for
 delivery to one or more other CEs.


Pekka .. is this strictly accurate?  doesn't this depend on where the RP is
Pekka configured to be?  This seems to assume that the RP configuration is
Pekka always provided by the customer, never by SP?  Because if RP is
Pekka provided by the service provider, then the same packets could be
Pekka forwarded back to the CE, without being forwarded at all to other
Pekka PEs.

I'm not sure I see what the RP has to do with it, but it would be more
accurate to say A PE must have the ability to forward multicast data
packets received from a CE to one or more of the other PEs in the same MVPN
for delivery to one or more other CEs.


Agreed.  This underlines the need for ability, not that it actually 
happens.  I was referring to the degenerate case where all MVPN's 
sources and receivers would (at that point in time) happen to be 
behind the same PE.


--
Pekka Savola You each name yourselves king, yet the
Netcore Oykingdom bleeds.
Systems. Networks. Security. -- George R.R. Martin: A Clash of Kings
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-ietf-l3vpn-2547bis-mcast (Multicast in MPLS/BGP IP VPNs) to Proposed Standard

2009-09-09 Thread Pekka Savola

On Tue, 25 Aug 2009, The IESG wrote:

The IESG has received a request from the Layer 3 Virtual Private Networks
WG (l3vpn) to consider the following document:

- 'Multicast in MPLS/BGP IP VPNs '
  draft-ietf-l3vpn-2547bis-mcast-08.txt as a Proposed Standard


This is an assigned ops-dir review.  I'm familiar with multicast, PIM and
routing, but not intimate with L3VPNs, so bear with me.  I only did a
superficial review, not looking very deep into the details of the spec.

As a high-level comment I'd say that this is more of a framework 
document than an actual specification.  The reason is that for almost 
every feature, the spec has 2-4 different mechanisms for achieving it. 
Most of these are usually non-interoperable.  This is less useful than 
a homogenous spec, but I believe the horse has already left the barn 
and now it's up to the vendors to implement everything and the 
operators to decide what they need to use in order to get the results 
needed.


From the operational perspective, there are a lot of options, policy 
and configuration.  This can be good and flexible, but it has the 
drawback that configuration is complex, and the service will often be 
misconfigured, with few if any means to detect misconfigurations. 
Many mechanisms also require the service provider to know the traffic 
patterns of their customers (i.e., which groups should use which 
traffic pattern/multicast routing optimizations).  This is a challenge 
and a lot of work.  In some places of the spec it is also not clear 
whether it's the operator or implementor which must do X (e.g., ensure 
that all the required BGP attributes are included in signalling in 
various scenarios and cases).  Some of the configurables are listed 
below as an example:


 - various signalling mechanisms (BGP, PIM, RSVP-TE, mLDP, ...)
 - various PMSI interfaces used and provided (which groups, MVPNs use which
   technologies), e.g. the policy scenarios described in S 7.
 - correct configuration of various BGP attributes
 - configuration of aggregation tree (sharing P-multicast trees across
   MVPNs) [e.g. S 6.3.2: This will allow a SP to
   deploy aggregation depending on the MVPN membership and traffic
   profiles in its network.]
 - RP addresses of each C-multicast trees, unless automatically learned with
   BSR or auto-rp (note that BCP in this field is to use manual config)
 - whether explicit tracking is enabled (on per-flow basis)
 - PHP configuration for PMSI LSPs must be disabled (S 12.1.3)

Some of bigger issues noted are below:

1) IPv6 support.  The spec apparently aims to support both IPv4 and IPv6
   because it refers to both in a couple of places.  Yet, there is at
   least one explicit place in the spec (S 7.4.2.2) that's not compatible.
   I suspect many of the BGP attributes used, possibly also the MCAST-VPN
   BGP SAFI and others are not IPv6 compatible.  At the minimum, the status
   (intent) of the spec should be clarified. Even better would be to
   improve and include the support here.

2) RP configuration in SP network.  It's not clear if SP network needs to
   know how customer sites have configured their RPs (when the customer
   provides the RP).  At least traditional PIM signalling would require SP
   to know this.  But if auto-rp or BSR is not used by the customer, how is
   this information learned and maintained?  Would it require manual
   configuration?

3) S 3.4.1.2 and 3.4.1.3 describe Lightweight PIM Peering Across a MI-PMSI
   and Unicasting of PIM C-Join/Prune Messages.  These are inadequately
   specified and in conflict with PIM-SM specification.  Given that these
   are already practically out of scope of the specification, these sections
   and text that relates to this should be removed.

4) Explicit tracking in S 5.4.2.  Philosophical. Using BGP such that
   upon the receipt of type-specific new information X it is required to
   perform some, timing-sensitive other action Y seems wrong to me.
   Has this application of BGP been adequately reviewed in IDR WG?

5) Active source BGP messages.  This is a duplication of a similar mechanism
   in MSDP (RFC3618) which has caused much gried in Internet.  Does this
   meant that when a host does 'nmap -sU 224.0.0.0/4' at a VPN site, this
   will result in about 268 million BGP active source updates being sent
   (2^28) in the SP backbone?  This problem is not described in security
   considerations.

6) PIM-BIDIR usage.  May the SP use PIM-BIDIR internally even if the customer
   interface would use PIM-SM?  The assumption when BIDIR is applicable is not
   clear.  Given that using BIDIR-PIM is an all-or-nothing solution, the
   only operationally feasible model would appear to be that that the
   {SM,BIDIR} operational modes used by the customer and SP must be
   independent from each other.  Is this framework compatible with that?

7) Type 0 Route Distinguisher.  The spec mandates using type 0 RD which
   embeds 16-bit AS-number.  Another type exists for 32-bit 

Re: Retention of blue sheets

2009-07-31 Thread Pekka Savola

On Fri, 31 Jul 2009, Brian E Carpenter wrote:

I agree with Alissa that having an explicit privacy policy would be a
good idea, but the fact of participation in an open standards process
certainly cannot be considered a private matter. Exactly the opposite,
in fact.


Indeed, but why do the blue sheets ask for an email address?  I'm not 
interested in receiving any mail (e.g. product advertisements loosely 
related to the IETF protocols) based on my writing my email on the 
blue sheets.  I accept it's good for disambiguation though asking for 
affiliation might achieve the same.  If anyone would be able to get 
the blue sheets, they probably shouldn't get the email addresses. 
Having to write a privacy policy would require ironing out these small 
details which might be a goog thing.


--
Pekka Savola You each name yourselves king, yet the
Netcore Oykingdom bleeds.
Systems. Networks. Security. -- George R.R. Martin: A Clash of Kings
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-dawkins-nomcom-dont-wait (Nominating Committee Process: Earlier Announcement of Open Positions and Solicitation of Volunteers) to BCP

2009-06-07 Thread Pekka Savola

On Fri, 5 Jun 2009, Russ Housley wrote:
...
The IETF Executive Director, who is part of the Secretariat, already has a 
role in NomCom.  The IETF Executive Director provides the requirements for 
the open positions.


Would you be more comfortable if the Executive Director were named as the 
responsible party?


Yes.  I'd be even more comfortable if the text could be inclusive, for 
example that either NomCom chair or IETF exec director could send out 
the announcement, but if shared responsibility seems like a bad idea, 
I can accept that argument.



From 10K view I have another meta-comment:


The change proposal seems to be based on the assumption that the 
delays in ISOC president choosing a new NomCom chair may be recurring. 
Maybe there will be difficulties in finding a chair (e.g. interviewing 
them etc.), because the obvious, simplest fix (no changes needed to 
the process) would be to just select the nomcom chair earlier.


--
Pekka Savola You each name yourselves king, yet the
Netcore Oykingdom bleeds.
Systems. Networks. Security. -- George R.R. Martin: A Clash of Kings
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-dawkins-nomcom-dont-wait (Nominating Committee Process: Earlier Announcement of Open Positions and Solicitation of Volunteers) to BCP

2009-06-04 Thread Pekka Savola

On Wed, 27 May 2009, The IESG wrote:

- 'Nominating Committee Process: Earlier Announcement of Open Positions
  and Solicitation of Volunteers'
  draft-dawkins-nomcom-dont-wait-03.txt as a BCP


I have two issues with this.

 1) This places a new responsibility at the feet of IETF secretariat.
That's a new actor (not even a person but a role) in the process.
This is not good.

Better would be that the process allowed some already responsible
party (be it ISOC president, former NomCom chair, IETF chair, IAB
chair, or all of the above) the _option_ to allow IETF secretariat
to perform this announcement. (More about the option issue
below)

 2) As proposed, the IETF secretariat's role is exclusive.  In the
future no one else would have the authority to publish the
solicitation.  I don't think this is good.  The role should be
optional, if _responsible_ party(ies) chooses to take that path,
or at most inclusive of other parties' authority.

More detailed background on 2) below:

Abstract says:

   This document updates RFC 3777, Section 4, Bullet 13 to allow
   announcement of open positions and solicitation of volunteers to be
   issued before a Nominating and Recall Committee Chair has been named
   by the Internet Society President.

But the new bullet says:

  The IETF Secretariat obtains the list of positions to be reviewed
  and announces it along with a solicitation for names of volunteers
  from the IETF community willing to serve on the nominating
  committee.

  At the NomCom Chair's request, the IETF Secretariat may perform
  other clerical support tasks, as long as the task being performed
  does not require NomCom Chair judgement, in the NomCom Chair's
  opinion, and as long as the community is appropriately notified
  that this request is being made.  This request may come from the
  Incoming NomCom Chair (if one has been selected for this NomCom
  cycle) or the Outgoing NomCom Chair (if the search for an Incoming
  NomCom Chair is still underway).

Allow can be read two ways, one of them conflicts with the actual 
text.


Is the intent that the IETF Secretariat has an authority to obtain the 
list of positions and announce them (but other parties also have this 
authority), OR that it has the ONLY authority.


The narrow reading of the actual text above suggests that in the 
future no one else could do the announcement.


--
Pekka Savola You each name yourselves king, yet the
Netcore Oykingdom bleeds.
Systems. Networks. Security. -- George R.R. Martin: A Clash of Kings
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-ietf-enum-enumservices-guide (IANA Registration of Enumservices: Guide, Template and IANA Considerations) to Proposed Standard

2009-06-03 Thread Pekka Savola

On Tue, 26 May 2009, The IESG wrote:

- 'IANA Registration of Enumservices: Guide, Template and IANA
  Considerations '
  draft-ietf-enum-enumservices-guide-16.txt as a Proposed Standard


This is an ops-dir review.  I'm only superficially familiar with ENUM, 
so take the comments with a grain of salt.  I did not see major issues 
with the document, but the document could be improved by a clarifying 
revision.


Wrt. operational considerations, given that the document deals with 
IANA registrations, I do not see much that should be a cause for 
concern. Registration documents must include a section on DNS 
considerations, which could possibly discuss some operational aspects 
as well (some of this below).  Personally identifiable information has 
already been highlighted in the document.  Management-side of OM does 
not appear to be relevant in this case. The usability and control of 
enum from users' point of view is a possible issue but that goes 
beyond the scope of this document.


Some specific comments below:

substantial
---

5.7. DNS Considerations (MANDATORY)

.. I note that exampe DNS considerations mostly relate to DNS protocol.  I
wonder about DNS operations related considerations.  For example, is the
usage expected to incur a significant (quantifiable?) load on the name
server chain?  Are there recommendations/restrictions/assumptions wrt TTL of
the records (somewhat related to the previous)?

Further I assume that DNS records related to the enum services are static
in such a fashion that they can be protected if needed by DNSSEC signing. 
Is this a correct assumption?  There is no clear prohibition of defining

synthetic or synthethizing DNS records that would be generated on the fly.
(I'm not sure if this would even be interesting to someone...)


semi-editorial
--

   This document specifies a revision of the IANA Registry for
   Enumservices, which was originally described in [RFC3761].  This
   document obsoletes Section 3 of RFC 3761.

.. yet in the header it says Obsoletes: 3761.  What about the rest of 3761?
I'd say it's best that the whole 3761 gets obsoleted in some manner.

   The IETF's ENUM Working Group has encountered an unnecessary amount
   of variation in the format of Enumservice Specifications.  The ENUM
   Working Group's view of what particular information is required
   and/or recommended has also evolved, and capturing these best current
   practices is helpful in both the creation of new Enumservice
   Specifications, as well as the revision or refinement of existing
   Enumservice Specifications.

.. yet the revision of existing Enumservices Specification is only touched
upon in Section 8, which says doing the revision is a MAY.  Is this
sufficient?  (After reading the whole doc, it appears that there is an
effort in progress to revise these, but it is not clear if that process is
exhaustive.)

In Section 9, you describe extension of existing enumservices. 
If an enum service is extended, does the extended version need to comply

with this document (Section 8 could be read to imply that but this is not
100% clear)?

   Types and Subtypes MUST conform to the ABNF specified in
   [I-D.ietf-enum-3761bis].

   The ABNF specified in [I-D.ietf-enum-3761bis] allows the - (dash)
   character for Types and Subtypes .

.. when I search for ABNF in I-D.ietf-enum-3761bis, I come up with one
hit, and it seems to be in an irrelevant spot.  I'm not sure if ABNF is
defined clearly enough in I-D.ietf-enum-3761bis (and that document could be
improved); in addition, given this is not very clear, I'd suggest a more
specific reference in this document (e.g. pointing to specific sections of
3761bis one should conform to).

6.5.3. Outcome 3: Experts Reject the Registration Document

   The expert might reject the Registration, which means the Expert
   Review Process is discontinued.  For appeals, see Section 7.3.

.. I'm not sure in which case the result might be a rejection instead of
changes needed, but should you also point to some other recourse other
than the appeals process?  For example, Go back to step 1 and
reconsider whether a registration is needed. :-)

7.2. Review Guidelines

.. one of the things that could perhaps be explicitly listed here is
verifying that the type name does not conflict with any well-known other
name (e.g. the example given in the document where imap was proposed for
internet mapping service).

11.1.4.2. Published as generic Specification

.. in S 11.1.2 you require IANA to escrow the specification, so I guess it
should be stated in the required IANA steps in the last paragraph of this
section as well.

13.1. Normative References

   [RFC2223]  Postel, J. and J. Reynolds, Instructions to RFC Authors,
  RFC 2223, October 1997.

.. this is a down-ref problem: BCP referring to an informational document.
Is this critical for understanding this document?  If not, it could be moved
to an informative reference.

editorial

Re: several messages

2008-11-15 Thread Pekka Savola

On Fri, 14 Nov 2008, Chris Lewis wrote:

DNSBL system is organized to send NDNs rather than rejecting
messages or because there are relays (including SMTP-handling
firewalls) involved -- things are basically hopeless because the
number of mailing list servers that are able to accept NDN
messages, correlate them with particular addresses on particular
mailing lists, and take action on that basis is, well, small.


I don't agree.  In fact, most ESPs, Yahoo, and many common list
implementations (eg: mailman and I believe LISTSERV) have and use this
capability now.  With ESPs, for list pruning.  At times, I've become
quite familiar with Yahoo's your subscription bounced too often, I've
unsubscribed you, here's how to resubscribe, and here is your missed
messages.  Annoying, but no great harm.  Hasn't caused me to change how
the filters that caused those bounces work.


FWIW, on one mailman mailing-list, I've received the following a 
couple of times; I've not received it on others, which may mean that 
those lists don't enable it, or that the mails on those lists have not 
triggered rejections.  I suspect the former.


Your membership in the mailing list FOO has been disabled due
to excessive bounces The last bounce received from you was dated
24-Jul-2008.  You will not get any more messages from this list until
you re-enable your membership.  You will receive 3 more reminders like
this before your membership in the list is deleted.
... [what follows is the URL to re-enable membership immediately] 

I have found this message incredibly helpful, and I'd like to see a 
wider application of similar behaviour.


--
Pekka Savola You each name yourselves king, yet the
Netcore Oykingdom bleeds.
Systems. Networks. Security. -- George R.R. Martin: A Clash of Kings
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: IPv6 traffic stats - limitations of 6to4

2008-11-13 Thread Pekka Savola

On Thu, 13 Nov 2008, Rémi Després wrote:

 If an implementation implements RFC3484 and the user is not using custom
 address selection policy, all compliant RFC3484 implementations should
 prefer v4 when connecting to native from 6to4 (rule 5 of destination
 address selection AFAIR).


Actually, my above statement is incomplete.  Thanks for your eagle 
eyes :-)


In case the user has a RFC1918 IPv4 address and the destination is 
global v4 address, you'd use 6to4.  In case IPv4 address is global and 
destination is global, or both are RFC1918, you would use IPv4.


As such:

Can we derive from this that Google's IPv6 address is necessarily 
6to4 (most of its US customers using it are 6to4), and that Google 
has therefore a guaranteed path toward other 6to4 hosts?


I believe Google is using native addresses.  The 6to4 hits are 
probably caused by the users with private v4 addresses or users whose 
implementation does not support rfc3484.


Besides, isn't this a strong reason in favor of native IPv6 (albeit like Free 
did it with 6rd on its IPv4 infrastructure) vs 6to4?


Native is in many cases better than 6to4 or Teredo (but in some cases 
6to4 - 6to4 is better than native).  But this is something I 
specifically didn't comment on in my mail.


--
Pekka Savola You each name yourselves king, yet the
Netcore Oykingdom bleeds.
Systems. Networks. Security. -- George R.R. Martin: A Clash of Kings___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: IPv6 traffic stats

2008-11-13 Thread Pekka Savola

On Wed, 12 Nov 2008, Iljitsch van Beijnum wrote:
In my opinion, this is a bug. This is the default policy table from a FreeBSD 
system, which is the RFC 3484 table IIRC:


You should probably bring this up on 6MAN WG list then.


 ip6addrctl

Prefix  Prec Label  Use
: : 1/128   50 00
: :/0  40 1   646064
2002::/16 30 20
: :/96 20 30
: : :0.0.0.0/96 10 40

The last line catches IPv4. It's two steps below the 6to4 prefix. However, 
the fact that the label for the 6to4 prefix doesn't match the ::/0 label 
means that IPv4 will be used.


This happens on FreeBSD and XP, and I assume also on Vista. But not on MacOS, 
because it doesn't implement the policy table. I don't know about Linux. (If 
you want to test, try to connect to 6to4test.runningipv6.net and see what 
happens. Both addresses are unreachable, though.)


I'm not sure whether you're agreeing with me or something else; I 
don't see where you're saying the bug is.  But if we start talking 
about issues in RFC3484, it should happen on 6MAN list.


Your test is inconclusive due to the fact that the A record is a 
private address.  Depending on whether the connecting host has a 
global or private address, the results are different (see my mail to 
Remi for more).


--
Pekka Savola You each name yourselves king, yet the
Netcore Oykingdom bleeds.
Systems. Networks. Security. -- George R.R. Martin: A Clash of Kings
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: SMTP+TLS to MXs, was Re: Comments on Draft IRTF ASRG DNSBL - 07

2008-11-13 Thread Pekka Savola

On Fri, 14 Nov 2008, Mark Andrews wrote:
In message 
[EMAIL PROTECTED], Tony F 
inch writes:
You also need the server to provide a verifiable TLS certificate. 
The vast majority of them are not. This problem is perhaps even 
harder to fix than the lack of DNSSEC.


Just use DNSSEC and CERT records to do that.

...

If self signed, look in the DNS for the CERT.  Accept if
signed and validated by DNSSEC.


How does an application do accept if signed and validated by DNSSEC?

--
Pekka Savola You each name yourselves king, yet the
Netcore Oykingdom bleeds.
Systems. Networks. Security. -- George R.R. Martin: A Clash of Kings
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: SMTP+TLS to MXs, was Re: Comments on Draft IRTF ASRG DNSBL - 07

2008-11-13 Thread Pekka Savola

On Fri, 14 Nov 2008, Mark Andrews wrote:

How does an application do accept if signed and validated by DNSSEC?


You validate the CERT RRset using the techniques in RFC
4033, 4034 and 4035.  If the answer is secure then it was
signed and validated.  You the match offered cert to the CERT
RRs using the information from RFC 4398.

Do you need more detail or is that enough guidance?


I was interested in more detail, specifically, are there application 
interfaces an application could use, or every app need to implement 
validation using 4033-5 techniques (a lot of work, and most would 
probably do it wrong)?


--
Pekka Savola You each name yourselves king, yet the
Netcore Oykingdom bleeds.
Systems. Networks. Security. -- George R.R. Martin: A Clash of Kings
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: IPv6 traffic stats

2008-11-12 Thread Pekka Savola

On Wed, 12 Nov 2008, Harald Alvestrand wrote:

 On Tue, 11 Nov 2008, Harald Alvestrand wrote:
  The correct number from the presentation is 0.238% - only Russia, 
  Ukraine and France have more than 0.5% IPv6.
 
  Presentation available from 
  http://rosie.ripe.net/presentations-detail/Thursday/Plenary%2014:00/index.html. 
 


 Depends on what you're looking for, but if you are interested in the
 amount of users that have any kind of IPv6 connectivity, this undercounts
 severely because address selection rules on recent OSs typically select
 IPv4 if their connectivity is 6to4 or Teredo.


can you identify the OSes that prefer IPv4 when on 6to4, and pointers to 
docs?


If an implementation implements RFC3484 and the user is not using 
custom address selection policy, all compliant RFC3484 implementations 
should prefer v4 when connecting to native from 6to4 (rule 5 of 
destination address selection AFAIR).


FWIW, in Linux this was changed as the default maybe about 2-3 years 
ago.  I suppose may other operating systems, especially recent ones, 
also operate in this manner. For Linux, some info is here: 
http://people.redhat.com/drepper/linux-rfc3484.html


This has been discussed on v6ops and ipv6 lists but unfortunately I 
can't find the threads despite search attempts.


Maybe someone else with better memory could provide better references.

This is why observing ipv6 traffic on a dual-stack hostname will 
mostly just in observing those that use native v6 (with Mikael, this 
was 0.5% of users).  If you're interested in wider picture of IPv6 
penetration, you'll put the content on v6-only hostname (with Mikael, 
this was reachable by 6% of users). If you want to also cover for 
Vista users with Teredo, you'd put the content on a site and refer to 
it using a numeric address instead of a hostname (this would result in 
even a higher percentage).


So, if you're interested in any kind of IPv6 connectivity at all (even 
6to4, teredo, ...), at least in some user communities (p2p users), I'm 
pretty sure IPv6 penetration is already over 10%.  At least 6% is 
already proven by measurements :-)


--
Pekka Savola You each name yourselves king, yet the
Netcore Oykingdom bleeds.
Systems. Networks. Security. -- George R.R. Martin: A Clash of Kings
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: IPv6 traffic stats

2008-11-11 Thread Pekka Savola

On Tue, 11 Nov 2008, Harald Alvestrand wrote:
The correct number from the presentation is 0.238% - only Russia, Ukraine and 
France have more than 0.5% IPv6.


Presentation available from 
http://rosie.ripe.net/presentations-detail/Thursday/Plenary%2014:00/index.html.


Depends on what you're looking for, but if you are interested in the 
amount of users that have any kind of IPv6 connectivity, this 
undercounts severely because address selection rules on recent OSs 
typically select IPv4 if their connectivity is 6to4 or Teredo.


Mikael Abrahamsson made a test on a p2p-related web-site, and the 
result was that 6% of users had IPv6 connectivity:


http://www.ops.ietf.org/lists/v6ops/v6ops.2008/msg01582.html

As shown in later messages, the figure is actually even higher. Teredo 
users running Windows Vista are not included in that 6% because Vista 
doesn't do do  lookups at all if all you have is Teredo 
connectivity.


--
Pekka Savola You each name yourselves king, yet the
Netcore Oykingdom bleeds.
Systems. Networks. Security. -- George R.R. Martin: A Clash of Kings
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-ietf-dhc-dhcpv6-bulk-leasequery (DHCPv6 Bulk Leasequery) to Proposed Standard

2008-10-21 Thread Pekka Savola

On Mon, 20 Oct 2008, The IESG wrote:

The IESG has received a request from the Dynamic Host Configuration WG
(dhc) to consider the following document:

- 'DHCPv6 Bulk Leasequery '
  draft-ietf-dhc-dhcpv6-bulk-leasequery-04.txt as a Proposed Standard

The IESG plans to make a decision in the next few weeks, and solicits
final comments on this action.  Please send substantive comments to the
ietf@ietf.org mailing lists by 2008-11-03. Exceptionally,
comments may be sent to [EMAIL PROTECTED] instead. In either case, please
retain the beginning of the Subject line to allow automated sorting.

The file can be obtained via
http://www.ietf.org/internet-drafts/draft-ietf-dhc-dhcpv6-bulk-leasequery-04.txt


First there was DHC Leasequery (RFC4388), next DHCv6 Leasequery 
(RFC5007), now we have DHCv6 Bulk Leasequery.  And someone seems to be 
proposing DHCPv4 bulk leasequery as well 
(draft-dtv-dhc-dhcpv4-bulk-leasequery).


RFC4388 S4.2 described reasons why SNMP was deemed inappropriate. 
And if you look at the reasoning there, some of these are not even 
valid anymore for bulk leasequeries.  I remain unconvinced.  A far 
better solution would seem to be define a smaller MIB just for 
querying leases so implementing it would be trivial.  Bulk 
leasequeries just underline the fact that SNMP and MIB data models are 
being reinvented inside DHCP.


--
Pekka Savola You each name yourselves king, yet the
Netcore Oykingdom bleeds.
Systems. Networks. Security. -- George R.R. Martin: A Clash of Kings
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: [dhcwg] Last Call: draft-ietf-dhc-dhcpv6-bulk-leasequery (DHCPv6 Bulk Leasequery) to Proposed Standard

2008-10-21 Thread Pekka Savola
I was hoping some folks more intimate with SNMP and IETF management 
frameworks would chime in here, but I'll respond to clarify:


On Tue, 21 Oct 2008, Marcus wrote:

I am not an expert on SNMP, but the only way I could imagine that
working, would be by using queries for MIBs which would look like
this:

get MIB.querytype

As the query type can be a relay id, link-address or remote id, this
would look a bit strange to me. I know and use SNMP mostly for
querying specific, predefined counters or tables, not variable entries
in the MIB tree.


If I understand what you want to achieve, what you want is supported 
and indeed used by lots of MIB modules out there.  This is useful and 
indeed we use it regularly with e.g. BGP and IP forwarding MIBs:


$ snmpwalk -m IP-FORWARD-MIB -v 2c -c foo foo-rtr 
ip.ipForward.ipCidrRouteTable.ipCidrRouteEntry.ipCidrRouteProto.128.214.46
IP-FORWARD-MIB::ipCidrRouteProto.128.214.46.0.255.255.255.0.0.0.0.0.0 = 
INTEGER: netmgmt(3)
IP-FORWARD-MIB::ipCidrRouteProto.128.214.46.254.255.255.255.255.0.0.0.0.0 = 
INTEGER: local(2)

Also all implementations I know, use UDP not TCP for SNMP queries 
and replies. The DHCPv6 Bulk Leasquery proposal looks like a logical 
next step to me.


An open-source SNMP implementation (net-snmp) is at least available. 
SNMP over TCP is defined in RFC3430. The systems under consideration 
already support TCP, just the TCP SNMP server part is missing; this 
should be trivial to implement if there is a need -- the lack of 
implementation efforts seems like an indication that UDP with 
retransmissions is usually good enough.


--
Pekka Savola You each name yourselves king, yet the
Netcore Oykingdom bleeds.
Systems. Networks. Security. -- George R.R. Martin: A Clash of Kings
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: WG Review: Application-Layer Traffic Optimization (alto)

2008-10-13 Thread Pekka Savola

On Mon, 6 Oct 2008, IESG Secretary wrote:

- A requirements document.  This document will list requirements for
the ALTO service, identifying, for example, what kind of information
P2P applications will need for optimizing their choices.

...

I believe this work could be useful and would provide an improvement 
over existing p2p usage and traffic management.


I'd be more comfortable with this effort if a recharter (this is a 
rather lightweight process) was needed after finishing the problem 
statement and the requirements.  It would also encourage that people 
actually put some serious work on those before diving into solutions 
:-)


There are significant design issues that will come up in the protocols 
and I'd expect that it would be helpful if those had already been 
dealt with in the requirements phase.


For example, the current req document has:

   REQ. 4: ALTO Clients MUST be able to find out where to send ALTO
   queries.

.. and the charter lists DHCP option or SRV record as examples.  Both 
of these have issues in certain contexts.  For example, must this 
discovery mechanism work across unmodified NAT boxes?  DHCP option 
doesn't; SRV record in many contexts doesn't either (or otherwise 
you'll end up with the same how to you discover the domain name under 
which you should look? problem).


--
Pekka Savola You each name yourselves king, yet the
Netcore Oykingdom bleeds.
Systems. Networks. Security. -- George R.R. Martin: A Clash of Kings
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


RE: Call for review of proposed IESG Statement on Examples

2008-09-19 Thread Pekka Savola
On Fri, 19 Sep 2008, [EMAIL PROTECTED] wrote:
 BTW, http://www.rfc-editor.org/rfc-editor/instructions2authors.txt
 does not absolutely require including an email address (if you give
 some other contact method, such as postal address or telephone
 number), and there are RFCs that don't include it (e.g RFC 3718
 from 2004; perhaps others exist, too).

There are also cases wheres where contacting the author would require 
somewhat unconventional methods, e.g. RFC 3542...

What disturbs me as a reviewer is when a draft does not include email 
address(es) of authors or where comments should be sent.  I'm having 
difficulty figuring out the usefulness of such a draft.

FWIW, IMHO, any spam argument seems bogus.  Anyone actively 
participating is already leaving such an email address footprint all 
over the net (including elsewhere in the IETF) that a) they already 
need protection mechanisms, and b) obfuscation methods (if used) 
should be reasonable.

-- 
Pekka Savola You each name yourselves king, yet the
Netcore Oykingdom bleeds.
Systems. Networks. Security. -- George R.R. Martin: A Clash of Kings
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Guidelines for authors and reviewers

2008-06-03 Thread Pekka Savola
On Tue, 3 Jun 2008, Ted Hardie wrote:
   Can you describe  the difference between early reviews
 performed by active participants and just participation?   In my
 mind, folks making suggestions and noting issues with a document during
 the working group phase are WG contributors, not reviewers.  How do
 you see this?

If the reviewer is not subscribed to the WG list, and does not intend 
to become subscribed to the list, yet does a review and sends comments 
for a WG draft, then I'd say it's in the former camp.

Personally, I usually do that.  And it's a PITA that most WG mailing 
lists where I try to send mail unsubscribed just throw the mails to a 
black hole or a moderation queue that's never flushed. This is why I 
Cc: the WG chairs on these messages.

-- 
Pekka Savola You each name yourselves king, yet the
Netcore Oykingdom bleeds.
Systems. Networks. Security. -- George R.R. Martin: A Clash of Kings
___
IETF mailing list
IETF@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: RFC 3484 Section 6 Rule 9

2008-06-02 Thread Pekka Savola
On Mon, 2 Jun 2008, Mark Andrews wrote:
   This rule should not exist for IPv4 or IPv6.  Longest match
   does not make a good sorting critera for destination address
   selection.  In fact it has the opposite effect by concentrating
   traffic on particular address rather than spreading load.

   I received a request today asking us to break up DNS RRsets
   as a workaround to the rule.Can we please get a errata
   entry for RFC 3484 stating that this rule needs to be ignored.

I doubt that. Errata seems like a wrong place to revisit WG decisions.

(I take no stance on the issue itself.)

-- 
Pekka Savola You each name yourselves king, yet the
Netcore Oykingdom bleeds.
Systems. Networks. Security. -- George R.R. Martin: A Clash of Kings
___
IETF mailing list
IETF@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-ietf-mpls-number-0-bw-te-lsps (A Link-Type sub-TLV to convey the number of Traffic Engineering Label Switched Paths signalled with zero reserved bandwidth across a link) to Propo

2008-04-18 Thread Pekka Savola
On Fri, 11 Apr 2008, The IESG wrote:
 The IESG has received a request from the Multiprotocol Label Switching WG
 (mpls) to consider the following document:

 - 'A Link-Type sub-TLV to convey the number of Traffic Engineering Label
   Switched Paths signalled with zero reserved bandwidth across a link '
   draft-ietf-mpls-number-0-bw-te-lsps-09.txt as a Proposed Standard

 The IESG plans to make a decision in the next few weeks, and solicits
 final comments on this action.  Please send substantive comments to the
 ietf@ietf.org mailing lists by 2008-04-25. Exceptionally,
 comments may be sent to [EMAIL PROTECTED] instead. In either case, please
 retain the beginning of the Subject line to allow automated sorting.

I've reviewed this document for OPS-DIR.

My general observation is that trying TE bandwidth signalling to IGP 
advertisements seems somewhat dubious.  For example, when a TE 
signalling protocol adjusts reservations on a link, IGP information 
gets outdated and needs to be refreshed, causing churn in the local 
routing system.  But this concept is not introduced by this document 
and as a result I do not see significant operational issues with this 
document.

With regards to the management aspects, the document says:

   Unconstrained TE LSPs that are configured and provisioned through a
management system MAY be omitted from the count that is reported.

Which is interesting because document doesn't specify what would set 
this information in the first place.  My assumption during the reading 
was that the TE signalling protocol would notify the IGP of changes 
using implementation's internal API.  But aren't TE signalling 
protocols usually just applying policies configured at a management 
system, so the message above might also also apply?  How does the IGP 
know how TE LSP was provisioned and if it should be included in the 
calculation or not?

FWIW, I'd expect that the value need not be configured manually or 
adjusted using network management such NETCONF or SNMP write.  The 
value should be readable using SNMP but I don't know if TE signalling 
protocol MIB modules provide this information to network managers.

procedural and editorial issues
---

I'll note that the normative reference (and I believe it needs to stay 
normative) I-D.ietf-ospf-ospfv3-traffic is marked Dead in the I-D 
tracker, having been expired some time ago.  This document is going to 
wait for the publication of I-D.ietf-ospf-ospfv3-traffic and I'd hope 
the latter would get done soon.

This document makes a normative reference to IS-IS TE RFC 3784 which 
is currently informational.  This causes a procedural down-ref 
problem.  RFC 3784 is being revised on standards track and I guess the 
reference could be updated to point to draft-ietf-isis-te-bis which is
currently in Publication Requested - External review.

Reference to RFC2470 (IPv6 over token ring!) should be to RFC2740 :-)
(or upcoming draft-ietf-ospf-ospfv3-update)

-- 
Pekka Savola You each name yourselves king, yet the
Netcore Oykingdom bleeds.
Systems. Networks. Security. -- George R.R. Martin: A Clash of Kings
___
IETF mailing list
IETF@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Proposed IESG Statement Regarding RFC Errata for IETF Sream RFCs

2008-04-17 Thread Pekka Savola
On Wed, 16 Apr 2008, The IESG wrote:
   o  Rejected - The errata is in error, or proposes a change to the RFC
  that is clearly inappropriate to do with an errata.  In the latter
  case, if the change is to be considered for future updates of the
  document, it should be proposed using other channels than errata,
  such as a WG mailing list.

   o  Archived - The errata is not a necessary update to the RFC.
  However, any future update of the document should consider this
  errata, and determine whether it is correct and merits including
  in the update.
...

One of the guidelines says:

   8.  Changes that modify the working of a process, such as changing
   an IANA registration procedure, to something that might be
   different from the intended consensus when the document was
   approved should be Archived.

I do not understand an errata that suggests changing the defined 
process should be Archived.  Shouldn't this be flat out Rejected?

The problem I see with this proposed errata process is that Archived 
tries to fill the gap for the need of an issue tracker for substantial 
change suggestions (today these are sent to a subset of authors, WG 
chairs, and/or WG mailing list if active, but are rarely tracked 
systematically).

I don't think the errata process should be used to track substantial 
change proposals.  That procedure needs to be separate from the errata 
process, and it the best place for it would probably be at @ietf.org.

-- 
Pekka Savola You each name yourselves king, yet the
Netcore Oykingdom bleeds.
Systems. Networks. Security. -- George R.R. Martin: A Clash of Kings
___
IETF mailing list
IETF@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-ietf-mpls-multicast-encaps (MPLS Multicast Encapsulations) to Proposed Standard

2008-04-17 Thread Pekka Savola
On Fri, 11 Apr 2008, The IESG wrote:
 The IESG has received a request from the Multiprotocol Label Switching WG
 (mpls) to consider the following document:

 - 'MPLS Multicast Encapsulations '
   draft-ietf-mpls-multicast-encaps-07.txt as a Proposed Standard

 The IESG plans to make a decision in the next few weeks, and solicits
 final comments on this action.  Please send substantive comments to the
 ietf@ietf.org mailing lists by 2008-04-25. Exceptionally,
 comments may be sent to [EMAIL PROTECTED] instead. In either case, please
 retain the beginning of the Subject line to allow automated sorting.

I did not look into this in detail because I claim no expertise in 
MPLS, but...

I believe this document needs a normative reference to 
draft-ietf-mpls-upstream-label (now in Last Call) because the whole 
concept of upstream labels is introduced in that document and it 
seems vital to understanding and implementing this RFC.

IANA considerations section should describe how IANA should reword the 
unicast codepoint and multicast codepoint assignment fields.  It 
seems clear that these should be renamed to better reflect the reality 
introduced in this document.

The document does not describe the impact (of lack thereof) of 
redefining the usage of existing codepoints and modifying existing 
standards (e.g. the MPLS-in-IP and MPLS-in-GRE encapsulation rules and 
what may or may not happen in a non-compliant decapsulator).

Section 6 gives instructions how to handle unicast and multicast 
destination address.  It does not describe how to handle the v4 255/8 
broadcast address and it's debatable which category would apply if a 
packet was sent to a regular broadcast address such as 192.0.2.255/24. 
Should this be described for completeness or explicitly declared out 
of scope?

editorial comment
-

Abstract is a bit long and has a typo:
s/The former multicast codepoint/The latter multicast codepoint


-- 
Pekka Savola You each name yourselves king, yet the
Netcore Oykingdom bleeds.
Systems. Networks. Security. -- George R.R. Martin: A Clash of Kings
___
IETF mailing list
IETF@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-ietf-rmt-bb-norm-revised (Multicast Negative-Acknowledgment (NACK) Building Blocks) to Proposed Standard

2008-04-14 Thread Pekka Savola
 and securing the feedback return channel; how to 
ensure the reports are valid even if they come from an authenticated 
receiver).

I'd like to see that draft referenced here.  It's not clear to me 
whether it would be reasonable to ask that this document should not go 
forward until sec-discussion goes forward; if that is not reasonable, 
I believe this document's security considerations needs some 
additional work especially wrt the unicast feedback channel; section 
6.1.1 and its subsections already discusses the multicast part in some 
detail (I'm not qualified to evaluate whether that's sufficient), but 
while the first paragraph mentions unicast, it is not obvious whether 
it's fully covered in the text that follows.

-- 
Pekka Savola You each name yourselves king, yet the
Netcore Oykingdom bleeds.
Systems. Networks. Security. -- George R.R. Martin: A Clash of Kings
___
IETF mailing list
IETF@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-ietf-rmt-bb-norm-revised (Multicast Negative-Acknowledgment (NACK) Building Blocks) to Proposed Standard

2008-04-07 Thread Pekka Savola
On Thu, 3 Apr 2008, The IESG wrote:
 The IESG has received a request from the Reliable Multicast Transport WG
 (rmt) to consider the following document:

 - 'Multicast Negative-Acknowledgment (NACK) Building Blocks '
   draft-ietf-rmt-bb-norm-revised-04.txt as a Proposed Standard

 The IESG plans to make a decision in the next few weeks, and solicits
 final comments on this action.  Please send substantive comments to the
 ietf@ietf.org mailing lists by 2008-04-17. Exceptionally,
 comments may be sent to [EMAIL PROTECTED] instead. In either case, please
 retain the beginning of the Subject line to allow automated sorting.

Meta-level comments
---

Looking at the document, my main question is, is this ripe for standards
track?.  Looking at it, my inclination would be to say probably not, at
least in parts *).  As Section 6 says, there have not been substantial changes
since the preceding experimental RFC 3941 was published in 2004.  All the
cited material (research etc.) predates RFC 3941.  So it seems that either
1) there has not been significant experience since the Experimental document
was published, 2) the experiences have been fully aligned with the earlier
document (the document was already good enough), or 3) the lessons learned
have not been reflected in this document revision.

The one thing I'd have been interested in seeing is an applicability
statement of reliable multicast and its different bits and pieces (beyond
what's in Section 3.11) but that seems out of scope of this document.
For example, it is not obvious to me which (if any) RMT mechanisms would be
applicable in a context where I want to distribute video or voice where it
isn't acceptable to buffer the stream too long to accommodate for data
resends; it seems this NACK mechanism is geared towards bulk file transfer
where this is not applicable.

*) the parts I'm mostly concerned with are router assistance and 
security (also touching the protocol/ops aspects when some receivers 
are misconfigured or behind slow links).

Substantial
---

I was expecting to see some discussion of MTU and application framing issues
with multicast.  Specifically, in a big multicast tree with dynamic
membership, it could very well happen that when a new member joins, the
lowest common denominator MTU decreases.  How is this scenario expected to
be handled?   It may be that this issue has already been discussed somewhere
else as it isn't specific to this document.

I doubt router/intermediate system assistance has seen very wide deployment
and I don't think it is very feasible to expect to see that.  As this
document is moving to Standards Track I would very much like to remove any
recommendations for router assistance because I don't see those being
implemented in any significant router implementation.  That means removing
and rewording e.g. sections 2.7, 2.4, 3.10 and some others.

The sender's transmissions SHOULD make good utilization
of the available capacity (which may be limited by the application
and/or by congestion control).

How do you figure out what is the available capacity?  Are you 
referring to the capacity on sender's uplink or the collective 
capacity of the receivers or both?  Do you adapt to the lowest common 
denominator of all receivers (e.g., document previously quoted 
56Kbit/s modems..)?  Does this have security impact? (Similar comment 
would apply to MTU/application framing aspects already mentioned 
above.)

In absence of a group size determination mechanism
a default group size value of 10,000 is RECOMMENDED for reasonable
management of feedback given the scalability of expected NACK-based
reliable multicast usage.

What is the impact of this recommendation?  Is it safer to recommend 
too small or big?  Given that this would likely be close to a world 
record in production multicast group size, I'm not sure if this 
recommendation is reasonable; if it is deemed reasonable, it would be 
nice to have a citation justifying the number.  This is one area where 
figures based on experimentation would have helped. However, if 
recommending too big doesn't cause a problem even when the typical 
default size would be 10, 50 or 100 receivers, then it would be OK.

NACK-based reliable multicast is compatible with IP security (IPsec)
authentication mechanisms [RFC4301] that are RECOMMENDED for
protection against session intrusion and denial of service attacks.

The details how one might apply IPsec to the unicast channel are absent.
I'm not commenting on the multicast delivery part because that is somewhat
covered though details are fuzzy.  Unicast has two major issues that I did
not see clearly addressed:

  1) malicious, misconfigured or under-performing (beyond small capacity
 links etc.) receivers.  Is there even a way to differentiate between
 these classes of receivers?  When these send a lot of NACK feedback,
 progress of the stream is deterred.  How do you 

The purpose of blue sheets [Re: Blue sheet harvest]

2008-04-05 Thread Pekka Savola
Has the purpose and the expectations of the blue sheets been 
established somewhere?

So far I've seen (or sen folks justifying) the following use cases:

1) gauging the number of people in the room (for room size allocations
for the next meeting)
2) identifying later on whether someone sat in the audience (for IPR
purposes, not clear to what benefit exactly)
3) identifying previously-unknown people who spoke up in the mike
and said their name but you weren't sure if you got it right
(for the minutes). (i.e. identifying who made a Contribution in
IPR rules sense)
4) identifying a person like 3) who has never posted on the mailing
list and contacting him/her about the comment (otherwise you
wouldn't know the email address)
5) contacting participants later on about future activities in the
area (e.g. BOF list creation).
6) WG chair giving extra advice that if you mark an X beside your
email address, s/he will subscribe you to the mailing list.

1) does not require email addresses, and possibly not even blue 
sheets.  This seems like the typical reason given by the WG chairs for 
the blue sheets (if you don't sign, we won't get a room next 
time..). I'll observe that 2) appears to be useless because whether 
or not a name exists is no proof one way or the other.  The critical 
thing here is whether someone made a Contribution (in the IPR sense) 
at the meeting.  So, it's likely necessary to be able to identify 
everyone that speaks up in the mike, but whether or not the blue 
sheets is the right tool to do that is debatable.  3) and 4) seem like 
useful goals, but yet again, this seems an issue of identifying the 
person speaking up in the mike, not who sat in the room.  5) only 
seems necessary with BOFs etc that have not been managed properly (a 
mailing list needs to be set up in advance in any case; if persons are 
not signed up on appropriate lists, mass-mailing them (isn't that 
spamming?) doesn't seem to be a very useful excercise).  I don't know 
how useful 6) is in practise; anyone should be clueful enough to sign 
up on the mailing list herself.

Some more below,

On Fri, 4 Apr 2008, Scott O. Bradner wrote:
 and signing the sheet is strictly voluntary to date

 well, there are no guards with guns watching but someone who
 decides to not sign is not being honest about their participation

I've personally used somewhat looser definition.  I don't bother to 
sign those blue sheets that circulate in WG rooms where I just go (for 
the lack of better place) to read my email and get a bit of idea 
what's going on.  I don't intend to say anything on the mike, I have 
no interest in participating in that WG otherwise and I don't think I 
should be counted when it gets decided what room size is appropriate 
for the WG in the next IETF.  How exactly is it wrong not to sign the 
blue sheet in this case?

Another category is after WG meeting X ends, go to the room used by 
WG meeting Y to see what's going on there.  At that point, blue 
sheets have already circulated and it seems too much of a bother to 
sign anything anymore.  In this case, you might even say something in 
the mike; whether your name exists on the blue sheet or not doesn't 
guarantee whether you were present or not, and I don't see it 
practical to change the procedures to be any stricter.

-- 
Pekka Savola You each name yourselves king, yet the
Netcore Oykingdom bleeds.
Systems. Networks. Security. -- George R.R. Martin: A Clash of Kings
___
IETF mailing list
IETF@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-klensin-rfc2821bis

2008-03-29 Thread Pekka Savola
On Wed, 26 Mar 2008, Jim Fenton wrote:
 I keep trying to understand why the SMTP use of  records should be any
 different than its use of A records.  Haven't heard a solid explanation,
 nevermind seen consensus forming around it.

 It seems there are two ways of looking at this:

 (1)  records in the IPv6 world should do exactly same things as A
 records in the IPv4 world, so SMTP should look for an  record in the
 absence of an MX record, just as A records are used in the absence of MX
 records.

 (2) Although some SMTP servers will continue to be found through A
 records for legacy reasons, there is no longer a good reason for any new
 server not to have a published MX record.  SMTP clients (senders) will,
 of course, need to continue to look up A records, but since there is
 currently no significant use of  records for email routing, we
 should not perpetuate this legacy in IPv6 as it is in IPv4.

 These are both reasonable positions, but I'm in camp (2).  The
 additional use of  records for email address resolution would add
 complexity to at least some implementations and test cases, and it
 something that should never be needed:  v6 mail handlers will just
 publish MX records.  There is probably a small DNS efficiency argument
 as well, especially if the MX, A, and  requests are not made together.

I agree with Jim's characterization and IMHO both positions are 
reasonable.

I also prefer (2) because I don't think the original A fallback was 
meant to stay there very long and we just never got around to 
deprecating that feature.  If you ask a random sampling of postmasters 
and DNS domain owners, I doubt many would even remember right off the 
bat that such a fallback exists.  Further, given that the feature in 
and of itself does not provide any additional value, I don't see why 
the practise should be propagated to IPv6.

But if the majority were to favour (1), that would be fine with me as 
well.

Additionally I believe this is not an issue we as the IETF should get 
stuck at for a longer period.  Reaching closure, whichever decision it 
is, in the timescale of a couple of months, is IMHO better than a very 
strong consensus on the approach.

-- 
Pekka Savola You each name yourselves king, yet the
Netcore Oykingdom bleeds.
Systems. Networks. Security. -- George R.R. Martin: A Clash of Kings
___
IETF mailing list
IETF@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-klensin-rfc2821bis

2008-03-29 Thread Pekka Savola
On Sat, 29 Mar 2008, John C Klensin wrote:
 I also prefer (2) because I don't think the original A
 fallback was  meant to stay there very long and we just never
 got around to  deprecating that feature.  If you ask a random
 sampling of postmasters  and DNS domain owners, I doubt many
 would even remember right off the  bat that such a fallback
 exists.

 Based on some small experience with email deployment and
 operations, I believe that you are wrong.  Indeed, if you asked
 a random sampling of those groups --remembering that there are a
 huge number of SMTP servers in the world, only a tiny fraction
 of which are professional operations and with an even smaller
 fraction being large-scale, carefully-managed production ones,
 you might discover that many of them had forgotten that there
 was such a thing as an MX record and how to set it up.

Point taken, but I don't believe this really applies to IPv6 yet.

...
 Certainly, one could go around this loop for months, with people
 repeating themselves in ever-louder ways, but do you really
 think that would move us forward or result in a better or
 clearer consensus?

 IMO, it is time to decide and move on.   Like several others, I
 think it is more important to decide than what the decision is.
 Days would be good.  Maybe a week or so is tolerable.  But
 certainly not months.

I was not precise and you misunderstood.  I was saying timescale of 
months because I didn't want timescale of years. (I've been a bit 
disappointed with IETF's speed of progress lately and the latter seems 
to be the timescale we're working with in any consensus process 
whatsoever.)  Faster is fine with me if the document shepherd, editor 
and the AD manage to read the consensus and decide on the right 
approach in that time.

-- 
Pekka Savola You each name yourselves king, yet the
Netcore Oykingdom bleeds.
Systems. Networks. Security. -- George R.R. Martin: A Clash of Kings
___
IETF mailing list
IETF@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-wu-sava-testbed-experience (SAVA Testbed and Experiences to Date) to Experimental RFC

2008-03-28 Thread Pekka Savola
On Fri, 28 Mar 2008, Jari Arkko wrote:
 This would be very useful addition to the document. Authors?

 But note that the overall experience from the specific approach chosen
 here was that yes, its possible get it to working, but there are
 significant issues both for deployment and for the way the protocol bits
 are arranged. Remember that this was an experiment, not a design ready
 for standardization. MTU problems are in the list that is in Section 5.3.

A lot of issues are brought up in Section 5 (and elsewhere).  For 
issues noted, for each I'd like to ask quostions such as:
  - was this noticed in the testbed?  how?
  - was the issue relevant in that context; if not, why not?
  - if the issue was noticed, how was it worked around?  which
approaches worked (in that restricted context), which did not?
  - if the issue was not worked around, what kind of impact not
doing so had in the testbed and in testing?

I suspect some of the issues listed were addressed in some way (not 
necessarily in a globally applicable way).  For example, wrt MTU 
issues, a statement like MTU increase was not an issue because the 
transit network provided 9000B MTU or Participating hosts were 
manually configured to use 1280B MTU would have been useful.

So, when reading the report, I find it has basically the following 
kinds of content:
  1) some general overview of the problem space
  2) description of new mechanisms developed
  3) description of the testbed where mechanisms were tested
  4) description of issues to be considered in future work

However, 4) seems to be mainly about 1) and 2); it would have been 
possible to write fundamentally the same draft without any significant 
testbed deployment.  In other words, the experiences from the testbed 
and deployment itself are not extensively captured in the report, and 
as a result it is not obvious how useful the testbed was when 
considering follow-up activities in this space.

-- 
Pekka Savola You each name yourselves king, yet the
Netcore Oykingdom bleeds.
Systems. Networks. Security. -- George R.R. Martin: A Clash of Kings
___
IETF mailing list
IETF@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Call for Comments: What Makes For a Successful Protocol?

2008-03-27 Thread Pekka Savola
On Wed, 26 Mar 2008, IAB Chair wrote:
 The document can be found at:
 http://www.ietf.org/internet-drafts/draft-iab-protocol-success-03.txt

The document seems to be in good shape and is useful.

Two comments:

Case study A4 discusses inter-domain multicast vs application 
overlays.  It seems as if the text is focused on inter-domain _ASM_ 
multicast; some of the facts stated do not apply to SSM.  I'm not sure 
what would be the best course here: rephrase the case study to be 
about ASM multicast or generalize slightly.

Case study A7 discusses radius vs tacacs+.  As a historical point, 
tacacs+ 2.1 from 1995 [1] had a very non-explicit boilerplate [2] and 
it's not obvious if there were any real restrictions to using it.  I 
don't remember anymore if there was something more to it but I 
certainly used :-).

In later versions, (4.0.4 from 1998) [3], the license was more 
explicit and pretty much like the old BSD license.

From that perspective, unless I'm missing something, it seems as if 
tacacs+ had open code and was more or less restriction-free.

[1]
http://www.mirrorservice.org/sites/ftp.wiretapped.net/pub/security/authentication/tacacs/tac_plus.2.1.tar.gz

[2]
  * Copyright (c) 1995 by Cisco systems, Inc.
  * All rights reserved.

  * Please NOTE:  None of the TACACS code available here comes with any
  * warranty or support.

[3]
ftp://ftp-eng.cisco.com/pub/tacacs/obsolete/

-- 
Pekka Savola You each name yourselves king, yet the
Netcore Oykingdom bleeds.
Systems. Networks. Security. -- George R.R. Martin: A Clash of Kings
___
IETF mailing list
IETF@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-klensin-rfc2821bis

2008-03-26 Thread Pekka Savola
On Wed, 26 Mar 2008, Markku Savela wrote:
 You seem to be of the opinion that fallback behavior should be extended to
 , and you seem to be the first one to express that opinion. (I myself 
 have
 no opinion on how to resolve this other than believing it has to be resolved 
 -
 the present ambigiuty is unacceptable.)

 As a private person using the A record only way of receiving mail, I
 find it useful.

It might be helpful in this context if you could elaborate a bit why 
you find it useful?

The only reason I can think of is if (web?) UI of DNS hosting company 
would make it burdensome to update both MX and the A record.

As John Klensin wrote on Tue, 25 Mar 2008 23:40:12 -0400 
([EMAIL PROTECTED]), MX can refer to a name so for 
typical usage scenarios I can think of, just updating your A record 
would automatically update MX settings as well.

-- 
Pekka Savola You each name yourselves king, yet the
Netcore Oykingdom bleeds.
Systems. Networks. Security. -- George R.R. Martin: A Clash of Kings
___
IETF mailing list
IETF@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-wu-sava-testbed-experience (SAVA Testbed and Experiences to Date) to Experimental RFC

2008-03-26 Thread Pekka Savola
 at the attachment point of an access
network to its provider network, also called the ingress point.

To:

We use the term intra-AS source address validation to mean the IP
source address validation at the attachment point of an access
network to its provider network, also called the ingress point.
The first intra-AS validation point is where the LAN attaches to its
first router.

2) sibling etc AS-relations are not defined and the usage is not clear

In Section 2.4, there is text wrt Provider, Customer, Peer and Sibling, but
not definition of each.  Especially Sibling may not be intuitively
obvious if you're not familiar with current non-IETF routing table analysis
research.  The text should also spell out that VRGE needs to know the
business relationships of all ASes; in the real world this is an
unacceptable solution.  Does anyone else than VRGE need to use that
AS-relation table mapping?

3) inter-AS automatic rekeying mechanism is not described

The signature needs to be changed frequently, Although the overhead
of maintaining and exchanging signatures between AS pairs is not
O(N^2), but O(N), the traffic and processing overhead increase as the
number of ASes increases.  Therefore an automatic signature changing
method is utilized in this solution.

This automatic rekeying method is one of the most interesting pieces of this
solution; is there a reason why it is not described in this testbed report?

4) Text about CERNET2 misrepresents the testbed network

The prototypes of our solutions for SAVA are implemented and tested
on CNGI-CERNET2.  CNGI-CERNET2 is one of the China Next Generation
Internet (CNGI) backbones.

In the interest of truth in advertising, the document should also mention
CERNET.  CERNET2 is a testbed backbone that is not very widely utilized;
I've been told that CERNET2 is not expected supersede the original CERNET
production network.  Maybe: rephrase add to the end of the last sentence:
 that provide testbed facilities to augment existing production backbones
(e.g. CERNET).

The
CNGI-CERNET2 backbones are IPv6-only networks, not a mixed IPv4/IPv6
infrastructure.  The CNGI-CERNET2 backbones, CNGI-CERNET2 CPNs, and
CNGI-6IX all have globally unique AS numbers.  Thus a multi-AS
testbed environment is provided.

CERNET2 was described at IETF64 in Softwire WG meeting
http://www.ietf.org/proceedings/05nov/slides/softwire-3/sld1.htm.  It is
not an IPv6-only network; in fact, all customer-facing PE-routers are
dual-stack.  The first sentence above is therefore incorrect and should be
removed.

Alternatively, one could remove entire Section 3.1; it does not appear to be
critical to the readability of the draft.

5) the conclusion appears to be overly generous wrt the results of the draft

First, the experiment is a proof that a working system can be built
on the basis of the loosely-coupled domains and multiple-fence
design for source address validation.

Given that none of the new mechanisms tested could be deployed as-is due to
the limitations listed in Section 5, it appears a little bit too generous to
call this a working system.  Maybe instead:

First, the experiment is a proof that a prototype can be built that is
deployable on loosely-coupled domains of test networks in a very limited
scale and multiple-fence design for source address validation.

This also seems too genereous:

The experiment also provided a proof of concept for the switch-based
local subnet validation, network authentication based validation,
filter-based Inter-AS validation, and signature-based Inter-AS
validation mechanisms.

Specifically, all the clients had to be modified (SARC); the switched needed
to be modified (SAVP), and a server needed to be deployed (SAMS).  While one
could say this is a proof of concept, I don't think this is a PoC for
a solution that could be considered deployable.  Maybe add to the end:

However, this solution required changes to clients and switched and
addition of a server, and as a result, the concept may not be more widely
applicable.

6) future work listing should be beffed up

I suggest adding to the Future work list in Section 6 also at least:

  o Deployability considerations, e.g. modifiability of switches, hosts, etc.

-- 
Pekka Savola You each name yourselves king, yet the
Netcore Oykingdom bleeds.
Systems. Networks. Security. -- George R.R. Martin: A Clash of Kings
___
IETF mailing list
IETF@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Meeting Network Requirements ION Published

2008-03-25 Thread Pekka Savola
On Wed, 5 Mar 2008, IETF Administrative Director wrote:
 The IAOC has published the IETF Meeting Network Requirements ION at
 http://www.ietf.org/IESG/content/ions/

 The purpose of the document is to assist IETF meeting Hosts and technical
 teams with the network requirements in support of the week-long IETF
 meetings.

 Editors were Karen O'Donoghue, Jim Martin, Chris Elliott, and Joel
 Jaeggli whose hard won experience with designing and deploying these
 networks will serve others well.

Not sure how relevant this is given the earlier ION statement, but a 
few things I'd like to clarify in this:


- S3 has All locations for network gear, with the exception of 
wireless APs, MUST be secure.

What does secure mean in this context?  My observation is that this 
may the case if secure means physically attached so that no one 
should, without big hassle, be able to steal the device.

If secure means something else, for example, impossible to fiddle 
with cabling, e.g. add your own laptop as a bridge to the uplink port, 
capturing all traffic this does not follow existing practice (I 
observed at IETF71 that there were a number of switches which were 
stealing-secure but not tampering-secure).

- S4 has The network MUST NOT prohibit end-to-end external 
connectivity for asy traffic (no limiting firewalls or NATs).

Does this also disallow (rather typical) filtering of Windows ports 
(at least 137-139, 445)?

-- 
Pekka Savola You each name yourselves king, yet the
Netcore Oykingdom bleeds.
Systems. Networks. Security. -- George R.R. Martin: A Clash of Kings
___
IETF mailing list
IETF@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: WG Review: Timing over IP Connection and Transfer of Clock (tictoc)

2008-02-28 Thread Pekka Savola
On Wed, 27 Feb 2008, The IESG wrote:
 The Timing over IP Connections and Transfer Of Clock (TICTOC) WG is
 concerned with highly accurate time and frequency distribution over
 native IP and MPLS-enabled IP Packet Switched Networks (PSNs). While
 this need arises from a variety of sources (see
 draft-bryant-tictoc-probstat-01.txt), the application areas of focus for
 this WG are:

How much is much?  Please define your target or required value for 
highly accurate time and frequency.  Are you talking about pico, 
nano, micro, or milliseconds?

 (1) Network infrastructures with the need for highly accurate time and
 frequency distribution within well-engineered service provider or
 enterprise campus networks. On-path support with specialized hardware
 may be expected to be available at one or more hops on a given path.
...

My reading of the proposed charter is that this protocol is expected 
to be usable in network which do not provide on-path support 
(specialized hardware).  As a result, the technology should be good 
enough without link-specific aids.  If it isn't, we shouldn't build 
the illusion that it is.

There is a deliverable on link-layer mappings and many techniques are 
expected to be link-type specific.  Instead of going down the path of 
media-specific technologies and adaptations -- which the IETF often 
tries to avoid -- I'd suggest (because the work item list is already 
very long) that at least in the first phase, the link-specific 
technologies are defined out of scope.

 (2) Individual hosts and devices on the public Internet requiring
 functionality or performance not currently available in NTP. On-path
 support may be utilized if available, but is not expected. This
 application brings additional requirements beyond improved accuracy, for
 example, the traceable and authenticated distribution of UTC time,
 including correct handling of leap seconds.

I suggest taking link-type specific items out of scope in the initial 
phase here as well.

 TICTOC will transfer time and frequency over both IP and IP enabled MPLS
 PSNs.  One of the major users of TICTOC technology is the service
 provider community, where MPLS enabled IP networks are common. If
 necessary, TICTOC may take advantage of the path control properties of
 MPLS and the ability to signal modifications to per packet forwarding
 behavior.

If TICTOC is expected to be usable on pure IP PSNs, in the interest of 
avoiding premature optimizations and minimizing extra work in the 
first phase, I strongly advise dropping MPLS-specific considerations 
at this point and leaving it for later study.

On the other hand, if TICTOC doesn't work sufficiently well in pure IP 
networks, who are we kidding by making it kind-of work in an MPLS 
network?

-- 
Pekka Savola You each name yourselves king, yet the
Netcore Oykingdom bleeds.
Systems. Networks. Security. -- George R.R. Martin: A Clash of Kings
___
IETF mailing list
IETF@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-klensin-rfc2821bis (Simple Mail Transfer Protocol) to Draft Standard

2008-02-27 Thread Pekka Savola
On Wed, 27 Feb 2008, The IESG wrote:
 The file can be obtained via
 http://www.ietf.org/internet-drafts/draft-klensin-rfc2821bis-08.txt

 Implementation Report can be accessed at
 http://www.ietf.org/IESG/implementation.html

I don't see the implementation report there.

-- 
Pekka Savola You each name yourselves king, yet the
Netcore Oykingdom bleeds.
Systems. Networks. Security. -- George R.R. Martin: A Clash of Kings
___
IETF mailing list
IETF@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: IETF 71 - no room at the inn at all on Thursday

2008-02-13 Thread Pekka Savola
On Thu, 13 Feb 2008, John L wrote:
 I was wondering why the Doubletree doesn't have the block of rooms
 available that they promised to the IETF.  The reservation agent said she
 saw the room block, but it didn't have rooms Thursday like it did for the
 rest of the week.  Unless there's a vast number of IETFers only staying
 Thursday night, which seems rather unlikely, Hilton didn't provide the
 room block they said they would.  I would have thought their long term
 agreement with the IETF would prevent just this kind of problem.

They did have (AFAIR), at least around 5th Feb or thereabouts when I 
was checking hotel options.  In the end I decided to go to Hampton 
Inn Philadelphia Convention Center which is closer (about 4 blocks or 
so), a bit cheaper, and AFAIR, seemed to offer better facilities for 
the price.

-- 
Pekka Savola You each name yourselves king, yet the
Netcore Oykingdom bleeds.
Systems. Networks. Security. -- George R.R. Martin: A Clash of Kings
___
Ietf mailing list
Ietf@ietf.org
http://www.ietf.org/mailman/listinfo/ietf


Re: IETF 72 -- Dublin == golf!

2008-02-01 Thread Pekka Savola
On Thu, 31 Jan 2008, Dean Willis wrote:
 And no, I don't play golf, which appears to be the entire focus of
 this sort of location.

This could be an opportunity to do something different.  (Though I 
agree that having the IETF on a location 15km from downtown could have 
some challenges.)

Ok, hands up (off-list) everyone who's interested in an IETF golf 
competition or just casual golf :-) ?

-- 
Pekka Savola You each name yourselves king, yet the
Netcore Oykingdom bleeds.
Systems. Networks. Security. -- George R.R. Martin: A Clash of Kings
___
Ietf mailing list
Ietf@ietf.org
http://www.ietf.org/mailman/listinfo/ietf


Re: IT Transition - IPv6 issues

2008-01-31 Thread Pekka Savola
Hi,

I'll create a ticket on this, but nobody will be looking at it at this 
hour in any case..

On Thu, 31 Jan 2008, IETF Administrative Director wrote:
 The good news is that all services, except jabber, are now available
 on both IPv4 and IPv6.  This includes the web, ftp, email, and
 rsync for those who mirror internet-drafts.

IPv6 doesn't seem to work from anywhere I can see -- telnet to port 80 
doesn't give any response.  Sixxs distributed traceroute [1] shows the 
last working hop being 2001:1890:61:9017::2 (in ATT network).

If I'd have to guess, I'd say something close to to the ATT - AMS 
connection is broken.

[1]
http://www.sixxs.net/tools/traceroute/

-- 
Pekka Savola You each name yourselves king, yet the
Netcore Oykingdom bleeds.
Systems. Networks. Security. -- George R.R. Martin: A Clash of Kings
___
Ietf mailing list
Ietf@ietf.org
http://www.ietf.org/mailman/listinfo/ietf


Re: IPv4 Outage Planned for IETF 71 Plenary

2007-12-14 Thread Pekka Savola

On Sat, 15 Dec 2007, Mark Andrews wrote:

To facilitate this experiment, a URL with instructions on how to get IPv6
running on Windows, Mac OS X, Linux, and so on.  Some information will
also be available for a 4-to-6 tunnel.

...

Step one fix the root.


That's going to be a terriby useful exercise when about 99.9% or so 
other authoritative nameservers out there won't support v6.


A better exercise might be setting up a dual-stack DNS resolver which 
you can use from v6-only network or setting up a v4-in-v6 tunnel to 
your laptop from a similar dual-stack network.


--
Pekka Savola You each name yourselves king, yet the
Netcore Oykingdom bleeds.
Systems. Networks. Security. -- George R.R. Martin: A Clash of Kings

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: IETF Hosting Opportunity - March 2009

2007-11-28 Thread Pekka Savola

On Wed, 28 Nov 2007, Lars Eggert wrote:
I might not be fully up-to-date on our sponsoring process, but as I 
understand it, a meeting sponsor pays for a fraction of the direct costs for 
a given meeting. Other organizations charge a sponsor a flat amount that is 
based on costs that are averaged over multiple meetings. Yes, that means that 
sponsors of meetings in cheaper locations subsidize meetings in more 
expensive ones, but it also makes it financially irrelevant to the sponsor 
which exact meeting they support.


By the way, is there another mailing list for us to move this discussion to? 
Does the IAOC have an open list?


You can follow IAOC activity from the minutes at 
http://iaoc.ietf.org/minutes/iaoc_minutes.html


Ooops, the latest minutes posted are from March 1st.

--
Pekka Savola You each name yourselves king, yet the
Netcore Oykingdom bleeds.
Systems. Networks. Security. -- George R.R. Martin: A Clash of Kings

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: terminology proposal: NAT+PT (or NAT64 ?)

2007-11-15 Thread Pekka Savola

On Thu, 15 Nov 2007, Rémi Després wrote:

Keith Moore a écrit :

 IPv4 mapped addresses (those of the form :::{ipv4 address}) should
never appear on the wire.  Embedding an IPv4 address within an IPv6
address might make sense in certain cases, but it doesn't work in general.



If using them on the wire is useful, without any identified problem, why not ?
But if you already know of such problem, I am of course interested.


Incompatibility with source address spoofing prevention mechanisms.

P.S: please consider turning off HTML.

--
Pekka Savola You each name yourselves king, yet the
Netcore Oykingdom bleeds.
Systems. Networks. Security. -- George R.R. Martin: A Clash of Kings___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: Comments on draft-aboba-sg-experiment-02

2007-10-11 Thread Pekka Savola

On Thu, 11 Oct 2007, Lakshminath Dondeti wrote:
Just for the record, if the norm ends up being Idea -- BoF-1 -- BoF-2 
--  SG -- WG, I would be very disappointed and would chalk that up 
under the law of unintended consequences :).  I am hoping that Idea -- SG 
-- WG or Idea -- BoF1 -- SG -- WG in that order become the norm (where 
SG is involved of course), especially when proponents of new work are people 
who may not be regulars at the IETF.


One of the reasons for having a BoF is that the BoF proponents need to 
convince the rest of the IETF that the idea is workable and there's 
sufficient interest to work on the topic.


If there is expectation that no BoF is held between the SG and WG 
phase, how can we guarantee that the IETF as a whole thinks the 
charter and the other deliverables the SG worked on are convincing and 
worth doing?


As for the timeslot scheduling, I'd say SGs should have a precedence 
over IRTF research groups, given that we're talking about IETF 
meetings, not IRTF meetings.


--
Pekka Savola You each name yourselves king, yet the
Netcore Oykingdom bleeds.
Systems. Networks. Security. -- George R.R. Martin: A Clash of Kings

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: [Tsvwg] Re: Last Call: draft-ietf-tsvwg-diffserv-class-aggr (Aggregation of DiffServ Service Classes) to Informational RFC

2007-10-04 Thread Pekka Savola

On Tue, 2 Oct 2007, ken carlberg wrote:

On Oct 2, 2007, at 10:11 AM, Pekka Savola wrote:
It is not clear that consensus in the IETF and deployments is strong enough 
to approve/recommend any specific treatment for standards track DSCP 
values.


could you expand on this observation?


I don't recall when was the last (Diffserv-based) QoS talk at NANOG or 
similar operator-rich meeting.  (Sure, there is the tutorial, but it 
doesn't count.)


Seems like a potential indication that most typical ISPs aren't 
working on or interested in this, this stuff is so trivial, or that 
coordination is not necessary.


--
Pekka Savola You each name yourselves king, yet the
Netcore Oykingdom bleeds.
Systems. Networks. Security. -- George R.R. Martin: A Clash of Kings

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-ietf-tsvwg-diffserv-class-aggr (Aggregation of DiffServ Service Classes) to Informational RFC

2007-10-02 Thread Pekka Savola

On Mon, 1 Oct 2007, The IESG wrote:

The IESG has received a request from the Transport Area Working Group WG
(tsvwg) to consider the following document:

- 'Aggregation of DiffServ Service Classes '
  draft-ietf-tsvwg-diffserv-class-aggr-04.txt as an Informational RFC


DiffServ Pool 1 codepoints require Standards Action [1].  While this 
document doesn't define new ones (because there aren't any), it 
defines how one should configure the treatment for each and every Pool 
1 codepoint in the network.  Therefore in spirit it specifies DSCP 
codepoint behaviour and how those should be used.


As such I believe this document is inappropriate as an Informational 
RFC.


It is not clear that consensus in the IETF and deployments is strong 
enough to approve/recommend any specific treatment for standards track 
DSCP values.


If this work were to proceed, I suggest that first RFC 4594, which 
this document builds on, would attain IETF consensus by following the 
standards process for publication as a BCP.


[1]
http://www.iana.org/assignments/dscp-registry

--
Pekka Savola You each name yourselves king, yet the
Netcore Oykingdom bleeds.
Systems. Networks. Security. -- George R.R. Martin: A Clash of Kings

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


what's up with the management

2007-08-03 Thread Pekka Savola

Just an observation:

It's nice to note that the management appears to be busy with real 
work.  The last IAB minutes are from April 10, IAOC from March 1.


http://www.iab.org/documents/iabmins/index.html
http://iaoc.ietf.org/minutes/iaoc_minutes.html#2007

OK, back to the regularly scheduled rants about DHCP, NAT, and IPv4 
address consumption.


--
Pekka Savola You each name yourselves king, yet the
Netcore Oykingdom bleeds.
Systems. Networks. Security. -- George R.R. Martin: A Clash of Kings

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-ietf-hip-applications (Using the Host Identity Protocol with Legacy Applications) to Experimental RFC

2007-05-30 Thread Pekka Savola

On Mon, 14 May 2007, The IESG wrote:

The IESG has received a request from the Host Identity Protocol WG (hip)
to consider the following document:

- 'Using the Host Identity Protocol with Legacy Applications '
  draft-ietf-hip-applications-01.txt as an Experimental RFC

The IESG plans to make a decision in the next few weeks, and solicits
final comments on this action.  Please send substantive comments to the
ietf@ietf.org mailing lists by 2007-05-28. Exceptionally,
comments may be sent to [EMAIL PROTECTED] instead. In either case, please
retain the beginning of the Subject line to allow automated sorting.


Some slightly late comments below.

My main (meta-) issue with the draft is that it's not clear from how 
the draft is written what is the goal of the draft.  It seems it's 
providing an informative overview of different approaches for HIP 
experiments; it does not aim to provide any normative specification 
for HIP implementations or applications, even to make the experiments 
using different approaches to use more uniform methods.


Is this correct? If yes, maybe this could be made more explicit, e.g., 
by adding 'Overview on' at the start of the title and similar other 
modifications.  On the other hand, if this spec is intended to be used 
somehow by HIP or application implementations, I believe text would 
likely need significant rework; there is very little explicit guidance 
or explicit specification as it is and very little text that would 
help in creating interoperable implementations.


substantial
---

   While the text below concentrates on the use of the sockets connect
   system call, the same argument is also valid for other system calls
   using socket addresses.

== I'm not sure if I will accept this assumption at its face value 
without a reference.  Are you sure all the socket-operating system 
calls are basically equivalent? Has this been studied somewhere 
(Miika/Mika's Master's thesis as one example?) more extensively?  For 
example, what does listen(LSI) or bind(LSI) mean?  Section 3.4 seems 
to discuss this a bit implying that all the socket system calls aren't 
necessarily similar.


   Using DNS to map IP addresses to HIs:

  If the responder has host identifiers registered in the forward
  DNS zone and has a PTR record in the reverse zone, the initiating
  system could perform a reverse+forward lookup to learn the HIT
  associated with the address. [...]

== does this cause a recursion problem with DNS resolver IP addresses?  I.e., 
you try
to look up HIP records by reverse+forward of node X by doing queries to DNS
servers A and B, but end up querying DNS reverse+forward records of A and B
through DNS first.  I think this should work under normal circumstances
but I can see some potential reliability issues; at least if the DNS server
addresses are provisioned with HIP records but they don't support HIP,
you might end up hosing all your DNS lookups if the fallback from trying HIP
to no-HIP isn't reliable.

Is there already sufficient experience of these kind of potential bootstrap
problems?  Is a warning that such a bootstrap mechanism may want to avoid
looking up DNS server addresses warranted?

   DNS with security extensions (DNSSEC) [6], if trusted, may be able to
   provide some additional initial authentication, but at a cost of
   initial resolution latency.

== maybe remove 'additional' as it appears opportunistic HIP has no initial
authentication at all as described in the previous sentence.

It might also be useful to quantify 'some' as I belive it's not 
clearly discussed anywhere though more generic and longer text can 
probably be found in DNSSEC documents; security considerations only 
mentions that 'if DNSSEC zones are considered trustworthy enough'. 
Basically as you describe using DNSSEC with reverse DNS, the 
delegation chain from the reverse IP root should be trusted (typical 
trust anchor issues) but this is not typically an issue; and that the 
DNS zone administrators in charge of the netblock should be trusted to 
put in the right information.


editorial
-

   upgraded.  This informational document discusses implementation and
   API issues relating to using HIP in situations in which the system is

== spell out 'API' (done in Introduction but not here apparently)

Fully deployed, the HIP
   architecture will permit applications to explicitly request the

== feeling optimistic? :-)  Maybe 'would' would be slightly more neutral

  (Section 1.1.6 of [2]) in that the ESP association formed by HIP is

== spell out ESP.

   [3]  Nikander, P., An IPv6 Prefix for Overlay Routable Cryptographic
Hash Identifiers  (ORCHID), draft-laganier-ipv6-khi-07 (work in
progress), February 2007.

== RFC now.

--
Pekka Savola You each name yourselves king, yet the
Netcore Oykingdom bleeds.
Systems. Networks. Security. -- George R.R. Martin: A Clash of Kings

Re: [Tsvwg] Re: Last Call: draft-ietf-tsvwg-cc-alt (Specifying New Congestion Control Algorithms) to BCP

2007-05-30 Thread Pekka Savola

On Tue, 29 May 2007, Mark Allman wrote:

Or do you mean that the proposers should do everything guidelines
(2), (5), (6) and (7) say, but shortcomings in the results of these
guidelines (e.g., proposal being only slightly more troublesome than
TCP) should not block the approval for widespread deployment in the
global Internet.


Yes.  And, in re-reading the text I think it is clear.

I really can't untangle your comments in this area.  If you have
specific suggestions for the text, please send them along.


-03 has:

For other guidelines, i.e., (2), (5), (6), and (7), evidence that
the proposed mechanism has significantly more problems than those of
TCP should be a cause for concern in approval for widespread
deployment in the global Internet.

if the above is what you mean (and a proposer must really go through 
everything you list, e.g., all the difficult environments as well), it 
should be explicit, e.g.:


For other guidelines, i.e., (2), (5), (6), and (7), the author
must perform the suggested evaluations and provide recommended
analysis.  Evidence that
the proposed mechanism has significantly more problems than those of
TCP should be a cause for concern in approval for widespread
deployment in the global Internet.

My problem with existing text is that the referred guidelines use 
wording should do   Is it a must do or may do or something 
in between?  It should be more explicit.  Text proposal above 
interprets the shoulds as musts.



4) The first evaluation criteria also includes We also note that this
guideline does not constrain the fairness offered for non-best-effort
traffic.


I don't understand your point here.  All we are saying is that if---by
some means---we know that some flow is not best effort then it can be
subjected to some other criteria then it need not be constrained by the
guideline.


What I try to say is that I can't figure out how operationally and
practically this could be achieved.  Do you have examples in mind
how how this could apply in some specific scenario?

If not -- and it isn't a practical concern right now -- maybe we
should not overengineer the BCP to address best-effort vs
non-best-effort at all.


We didn't overengineer anything.  We just said that the guideline
doesn't apply to non-BE cases.  I can't understand your point here at
all.  It is a simple statement of document scope.


Let's say I propose an informational RFC on congestion control and say 
that it only applies to non-BE traffic.  I don't have to make any of 
the evaluations or analysis required by this draft.  What's the 
procedure for non-BE congestion control agorithms?  I note that Lars's 
ION does not mention that case.


In case there is no process to define non-BE congestion control 
mechanisms at all (and the response would be sorry, we don't support 
that), I have no problem.


In case there is some process with a lower bar, I'd have a problem, 
because it would be possible to avoid the loops you have jump through 
defined in this document by saying the CC algorithm applies to non-BE 
traffic only, but in practice it would be end up deployed for BE 
traffic as well.


--
Pekka Savola You each name yourselves king, yet the
Netcore Oykingdom bleeds.
Systems. Networks. Security. -- George R.R. Martin: A Clash of Kings

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: [Hipsec] Re: Last Call: draft-ietf-hip-dns (Host Identity Protocol (HIP) Domain Name System (DNS) Extensions) to Experimental RFC

2007-05-29 Thread Pekka Savola

On Tue, 29 May 2007, Pekka Nikander wrote:
I don't have answers to all of your questions/remarks, but I'd take forward a 
few:



1) what if HIP RRs are not queried first?

   In the following we assume that the initiator first queries for HIP
   resource records at the responder FQDN.

== what if it does not?


Remember that this is an experimental spec.  So, taking it the reverse, why 
should id specify what to do if someone has a reason to do it in another way?


I don't see any specific reason to make any MUSTs or even SHOULDs here: I 
don't see here any danger for the Internet nor interoperability.  But maybe I 
just don't understand the dangers you have in your mind.


I have personally no big problems if the spec were to say that 
HIP-after-A-or- were to be left out of scope of this document.


However, what I'm a bit uncomfortable with is that this assumption is 
apparently made in Section 3, Usage Scenarios, which seems to be a 
section with no normative content.  As such I believe such a 
statement/assumption (if made) should be made in a more prominent 
place in the spec.



3) a premature optimization of HIT lookup tags

   Upon return of a HIP RR, a host MUST always calculate the HI-
   derivative HIT to be used in the HIP exchange, as specified in
   Section 3 of the HIP base specification [I-D.ietf-hip-base], while
   the HIT possibly embedded along SHOULD only be used as an
   optimization (e.g. table lookup).

.. and in section 8.2:

   [...] This is why a HIP
   end-node implementation SHOULD NOT authenticate its HIP peers based
   solely on a HIT retrieved from the DNS, but SHOULD rather use HI-
   based authentication.

== this seems like a premature optimization.


Note that these RRs may need to be indexed also by other boxes but the 
end-nodes.  For them, using the HIT as an index and doing a simple memory 
comparison instead of calculating a hash may be a win.  Further note that 
both the sections you quote above discuss only host/end-note behaviour.


This is makes me even more afraid.  If most end-nodes use mechanism A 
but others are expected to maybe use another mechanism B, I foresee 
problems with both mechanisms especially in middleboxes.  It certainly 
won't improve the reliability of the protocol..


If you go forward as it is, I think the spec needs to be more 
explicit on 1) what happens when HIT received from the DNS does not 
match the hash but the hash is checked;


I agree.  FWIW, either ignore the HIT or drop the record.  I think the latter 
would be the right option, but I may be wrong.



2) what are the threats if HIT is used as-is without
hash-checking (as allowed by the spec at the moment) when a) the DNS-HIT
points to something used by another HI, and b) the DNS-HIT doesn't exist.


I don't understand what you are saying here.


Maybe I was trying to be too terse or I'm missing an assumption about 
how HIT vs HI is validated in other parts of HIP infrastructure.


Let's say I publish a HIPRR with HIT=hash(Y) and HI=X. Someone else 
has HI=Y, and I choose HIT above so that HIT=hash(Y), i.e., create an 
intentional conflict.


Given that the spec does not mandate that the implementations check 
that HIT will correspond to the HI, what's going to happen in this 
case?


Will a middlebox overwrite the index at hash(Y) with HI=X? If yes, 
what is the result?  Will it be a DoS on the host that used HI=Y?


That was the scenario 2.a) above and 2.b) is when HITs don't conflict 
(a more trivial case)


--
Pekka Savola You each name yourselves king, yet the
Netcore Oykingdom bleeds.
Systems. Networks. Security. -- George R.R. Martin: A Clash of Kings

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-ietf-hip-dns (Host Identity Protocol (HIP) Domain Name System (DNS) Extensions) to Experimental RFC

2007-05-28 Thread Pekka Savola
 the Rendezvous Servers field.

== I may me misunderstanding this, but doesn't that imply that the
authoritative DNS servers must implement Base16 and Base64 decoding support
so that they can convert from BaseXX to the on-the-wire format?

Is this a new requirement on DNS nameserver implementations, or are DNS
servers already required to do it?   Is this a typical way to represent and
distribute binary data on DNS?

Does this require the authoratative DNS server to know how to parse the zone
representation format, i.e., support for HIP RRs?

My question here would be, how would DNS authoritative servers support HIP RRs
under RFC3597 (Handling of Unknown DNS Resource Record (RR) Types)?



editorial
-

   o  A set of IP address(es) through A [RFC1035] and  [RFC3596] RR
  sets (RRSets [RFC2181]).

== you'll probably want to rephrase this as:

   o  A set of IP address(es) through A [RFC1035] and  [RFC3596]
  resource record sets (RRSets [RFC2181]).

.. or remove (RRsets ..) and just keep the 2181 reference.

   The RDATA for a HIP RR consists of a public key algorithm type, the
   HIT length, a HIT, a public key, and optionally one or more
   rendezvous server(s).

== s/algorithm type/algorithm type and length/

   The complete representation of the HPIHI record is:

== s/HPIHI/HIPHI/ (?) -- the same elsewhere

   The HIP RR contains public keying material in the form of the named
   peer's public key (the HI) and its secure hash (the HIT).  Both of
   these are not sensitive to attacks where an adversary gains knowledge
   of them.

== s/Both of these are not/Neither of these are/ ?

   Hannu Flinck, Olafur Gu[eth]mundsson, Tom Henderson, Peter Koch, Olaf

== Olafur's surname might need ascii-fication..

   Julien Laganier is partly funded by Ambient Networks, a research
   project supported by the European Commission under its Sixth
   Framework Program.  The views and conclusions contained herein are
   those of the authors and should not be interpreted as necessarily
   representing the official policies or endorsements, either expressed
   or implied, of the Ambient Networks project or the European
   Commission.

== is such a long boilerplate really necessary?  I'd hate to start seeing
these on each I-D, for each author for different sponsors, etc.   A shorter,
3 lines maximum, acknowledgement should be sufficient.

--
Pekka Savola You each name yourselves king, yet the
Netcore Oykingdom bleeds.
Systems. Networks. Security. -- George R.R. Martin: A Clash of Kings

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: [Tsvwg] Re: Last Call: draft-ietf-tsvwg-cc-alt (Specifying New Congestion Control Algorithms) to BCP

2007-05-26 Thread Pekka Savola
 be evaluated when
   competing with standard IETF congestion control
   [RFC2581,RFC2960,RFC4340].


OK.


4) The first evaluation criteria also includes We also note that this
guideline does not constrain the fairness offered for non-best-effort
traffic.


I don't understand your point here.  All we are saying is that if---by
some means---we know that some flow is not best effort then it can be
subjected to some other criteria then it need not be constrained by the
guideline.


What I try to say is that I can't figure out how operationally and 
practically this could be achieved.  Do you have examples in mind how 
how this could apply in some specific scenario?


If not -- and it isn't a practical concern right now -- maybe we 
should not overengineer the BCP to address best-effort vs 
non-best-effort at all.


If yes, there are some approaches to this, I'd be interested in 
hearing how they'd work, but more even more than that, I'd require the 
proposers of such a mechanism to provide an evaluation how reliable 
that knowledge of best vs non-best-effort is.


What I'm afraid of is that the specification would say that it's 
applied for traffic with certain DSCP values but typically that alone 
is not IMHO a very reliable indicator of BE vs non-BE because DSCPs 
can be rewritten and used for other purposes than those envisaged by 
the proposer of the mechanism.





5) Normative references is empty, yet this is a BCP document which, among
other things, referred to standard congestion control without
providing a reference (as raised above).  Please move some
informational references over here and/or add applicable references.


I have now put the references to RFCs 2581, 2914, 2960 and 4340 under
normative references.

(And, splitting the references was the dumbest thing we ever did---it
causes no end to the haggling.)


(Well.. Some will argue that the current IESG's policy requires 
such a split.  Some have interpreted that in certain classes of 
Informational documents, a split may not be necessary, but I 
believe Standards Track and BCPs do need it.)



2.  Status

== this title seems too short, and a somewhat longer and a more
descriptive one would be useful.  Actually the section seems to be a
mix and match of different topics and a better organization might help
the document considerably.  E.g., if there was a numbered list or
subsection of different publication paths and descriptions of each
the scope of the document and the intent of this section would likely
be much clearer.


I changed the title to Document Status, but I am not inclined to
re-arrange it further because lots of people have read this now and
nobody has complained.

The major caveat here is that *I* hacked out the changes described
above.  Sally may want to wordsmith or just plain disagree.


OK.  I'd have liked to change it more but I realize it's a bit late in 
the process and the other clarifications made above should help 
already.


--
Pekka Savola You each name yourselves king, yet the
Netcore Oykingdom bleeds.
Systems. Networks. Security. -- George R.R. Martin: A Clash of Kings

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-ietf-tsvwg-cc-alt (Specifying New Congestion Control Algorithms) to BCP

2007-05-23 Thread Pekka Savola
 referred to?  RFC 793 plus RFC
1122?  These are the only two IETF _Standard_ specifications I can think of. 
Or does this include proposed standards as well?  What constitutes IETF

congestion control or standard congestion control (in another place) that
a CC algorithm should be evaluated against?

Please do not cite the TCP roadmap RFC on this.  It's Informational and
not an IETF consensus statement, and as such has no authority to define
what constitutes standard congestion control.

4) The first evaluation criteria also includes We also note that this
guideline does not constrain the fairness offered for non-best-effort
traffic.

How does a TCP congestion control algorithm know whether a particular TCP
session is best-effort or non-best-effort?  You likely have an assumption
here that may need to be spelled out.

However, it is not clear why this distinction is even relevant.  The users
may not be able to control whether their traffic is labeled best-effort or
not (to a higher or lower class), and as a result if the user wants to test
a congestion control mechanism, its classification may change without the
TCP implementation knowing it, and as such causing havoc in the network.

Further, in many implementations, I believe it is not possible to choose
which TCP sessions should use a specific congestion control mechanism (I
think on recent Linux there is a setsockopt option for this though).  As
such even if in theory or in RFC a CC algorithm is only meant to be used for
non-BE traffic, in practise it may end up being used for all traffic on a
host due to implementation limitations.

5) Normative references is empty, yet this is a BCP document which, among
other things, referred to standard congestion control without providing a
reference (as raised above).  Please move some informational references over
here and/or add applicable references.

editorial
-

networks).  Recent research has yielded many alternate congestion
control schemes ([RFC3649], [HTCP], [FAST], [BIC], [CompoundTCP],
[XCP], and many more).  Using these new congestion control

== please remove the references from the abstract per ID-nits.

2.  Status

== this title seems too short, and a somewhat longer and a more descriptive
one would be useful.  Actually the section seems to be a mix and match of
different topics and a better organization might help the document
considerably.  E.g., if there was a numbered list or subsection of different
publication paths and descriptions of each the scope of the document
and the intent of this section would likely be much clearer.


--
Pekka Savola You each name yourselves king, yet the
Netcore Oykingdom bleeds.
Systems. Networks. Security. -- George R.R. Martin: A Clash of Kings

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: Withdrawal of Approval and Second Last Call: draft-housley-tls-authz-extns

2007-04-11 Thread Pekka Savola

On Wed, 11 Apr 2007, Theodore Tso wrote:
...
Unlike some OSS advocates, I don't feel a particular need to to 
require a patent license which is valid for any field of endeavor; 
just the essential claims necessary to implement an IETF standard is 
IMHO sufficient (realistically I doubt many IPR holders would be 
willing grant more than that). [...]


FWIW, many declarations (taking the one shown by Joel as an example), 
permission is granted to technically necessary to implement the IETF 
standard spesification.. and similar has been seen in other 
declarations (possibly in the form, '.. to interoperate with XXX 
standard specification').


Does that allow you to implement everything in the specification if 
'everything' is not 'technically necessary to implement' [for 
interoperability or otherwise]?  MAYs?  SHOULDs?


--
Pekka Savola You each name yourselves king, yet the
Netcore Oykingdom bleeds.
Systems. Networks. Security. -- George R.R. Martin: A Clash of Kings

___
Ietf mailing list
[EMAIL PROTECTED]
https://www1.ietf.org/mailman/listinfo/ietf


Re: [rbridge] Last Call: draft-ietf-trill-routing-reqs (TRILL RoutingRequirements in Support of RBridges) to Informational RFC

2007-03-21 Thread Pekka Savola

On Wed, 21 Mar 2007, Harald Tveit Alvestrand wrote:

--On 20. mars 2007 09:35 -0700 Silvano Gai [EMAIL PROTECTED] wrote:


 5) Introduction - Bridging limitation. The first paragraph refers to
 Ethernet networks used without Spanning Tree. This is irrelevant, since
 Spanning Tree is always deployed in conjunction with Ethernet. The
 correct contrast must be between Ethernet with Spanning Tree and
 Ethernet with TRILL. The claim of a single broadcast/flooding domain is
 incorrect since VLANs have solved this issue many years ago.


always is too strong, since most unmanaged bridges (intended for consumers' 
home networks, but often dangled off the edge of corporate networks as port 
expanders, without asking for permission) don't seem to be supporting 
Spanning Tree. However, these are not going to support TRILL either, so for 
the environments considered here, always is probably true.


FWIW, not sure if it matters, but our offices have a relatively 
small Ethernet network (50+ switches) and we have specifically 
disabled STP.


You can't run STP on host ports, and it's too much of a hassle to 
enable it on inter-switch ports, so it's easier to disable it 
everywhere.


--
Pekka Savola You each name yourselves king, yet the
Netcore Oykingdom bleeds.
Systems. Networks. Security. -- George R.R. Martin: A Clash of Kings

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: Seeking a new IAB Executive Director

2007-03-20 Thread Pekka Savola

On Mon, 19 Mar 2007, JORDI PALET MARTINEZ wrote:

I've a small comment regarding the profile. I'm not thinking in any specific
candidate, but I think this is very relevant for a fair selection.

The first point, keeping and editing the minutes, almost excludes the
non-native English speakers, at least, they will have a much more difficult
job if a non-native candidate is appointed for this.

...

Jordi, what you may be missing that IETF is (for a lack of a better 
word) a meritocracy, not a democracy.  That includes finding the most 
suitable person for the job, so citing issues of unfairness (to those 
that may not fulfill requirements) misses the point.  If taking care 
of the minutes requires some degree of English skills, that's what 
should be required.


--
Pekka Savola You each name yourselves king, yet the
Netcore Oykingdom bleeds.
Systems. Networks. Security. -- George R.R. Martin: A Clash of Kings

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: Document Action: 'Abstract Syntax Notation X (ASN.X)' to Experimental RFC (fwd)

2007-03-18 Thread Pekka Savola

Posted for Dean.

-- Forwarded message --
Date: Sat, 17 Mar 2007 23:50:33 -0400 (EDT)
From: Dean Anderson [EMAIL PROTECTED]
To: Pekka Savola [EMAIL PROTECTED], John C Klensin [EMAIL PROTECTED],
Simon Josefsson [EMAIL PROTECTED],
Brian E Carpenter [EMAIL PROTECTED],
Stephane Bortzmeyer [EMAIL PROTECTED],
Hallam-Baker, Phillip [EMAIL PROTECTED],
Ted Hardie [EMAIL PROTECTED], Tom Yu [EMAIL PROTECTED],
Andy Bierman [EMAIL PROTECTED], Ned Freed [EMAIL PROTECTED],
David Kessens [EMAIL PROTECTED]
Cc: iesg@ietf.org, ietf@ietf.org
Subject: Re: Document Action: 'Abstract Syntax Notation X (ASN.X)' to
Experimental RFC

I would appreciate it is someone would repost this to the IETF list.

First, I want to say that I support an ASN.1 compiler in C++ and am
considering a rewrite of that compiler's translated runtime to ADA to
leverage some of ADA's advantages. While some people think ASN.1 is
obsolete, it is still a very efficient way to describe protocols and
generate their codecs. ASN.1 has attractive security properties, once
the security flaws are removed from the ASN.1 translator, of course.
However, that effort, once performed in the translator, subsequently
benefits and protects all users with no code changes. ASN.1 is
complicated, but robust and usually worth the effort.

XML, by contrast, is quick and dirty and inefficient; the protocol/codec
equivalent of a scripting language. The world needs both scripting
languages and compiled languages, and likewise I see a need for both XML
and ASN.1.

So, I have some mixed feelings about this document. The motivation for
this work is entirely unclear to me. Why is the X.693 XML Encoding Rules
(XER) Specification insufficient for encoding ASN.1 in XML? If XER is
truly deficient, perhaps it should be amended, and so this issue belongs
with the ITU, not the IETF.  But I am unable to divine the deficiency in
XER from reading this document.

But also, if X.693 is insufficient, the next question is why is X.692
Encoding Control Notation insufficient? (well, I suppose its too new)

I suggest that one investigate XER and also X.692 Encoding Control
Notation, rather than specify a new and incompatible alternative.

In reading the document, I think a little too much is made of the issue
of ambiguity in ASN.1 specifications; they are only ambiguous if you
want to translate in a single pass with a LALR(1) parser generator.



But, I looked at Section 6 of the draft for some insight, and found this
claim:

   Note that the notation of ASN.1 is ambiguous where a Type is both
   prefixed [X.680-1] (e.g., tagged) and constrained.  For example, the
   notation [0] INTEGER (0..10) could be interpreted as either a
   tagged ConstrainedType or a constrained TaggedType.  For the purposes
   of the translation into ASN.X, the constraint is assumed to have
   higher precedence than the prefix, so the above notation would be
   taken to be a tagged ConstrainedType.

Looking at my copies of X.680 and X.680 Amendment 1, I find no reason to
see that there is any ambiguity in the quoted example. Also, X.680
Amendment 1 seems to have no relevance to the paragraph, so I'm
wondering if the reference is a mistake.

In fact, X.680 Amendment 2, Section F.6 gives numerous examples of
tagged constrained types of similar form as the example above.

A closer look reveals no ambiguity:

The productions in question are defined in X.680 Section 16.2 and 30.1,
I have abbreviated them:

Type ::= BuiltinType | ReferencedType | ContrainedType


BuiltinType ::= ... |
TaggedType


TaggedType ::= Tag Type

Tag ::= [ Class ClassNumber ]

where Class can be empty, as it is in the quoted example.

Definition 3.8.64 gives a definition for the meaning of tagged types:

A type defined by referencing a single existing type and a tag; the new
type is isomorphic to the existing type but distinct from it.

However, there is no ambiguity since tag and constraint are attributes
of a type, and it doesn't matter which comes first.  ASN.1 compilers
which I am familiar with perform this as follows (Bison/c++)

TaggedType
  : Tag Type
  {
$2-SetTag($1.tagClass, $1.tagNumber,
Module-GetDefaultTagMode());
$$ = $2;
  }



ConstrainedType
  : Type Constraint
  {
$1-AddConstraint($2);
  }
  | TypeWithConstraint
  ;


Bison translates this without conflicts. A longest string of terminals
always results in a ConstrainedType being reduced before a TaggedType is
reduced to Type.  Bison and yacc resolve shift/reduce conflicts as
shift unless otherwise directed by operator precedence rules.

Suppose the parser stack contains:

Tag ([0])
Type (INTEGER)

The next symbol is (

A shift (the default) implies that ConstrainedType will always be
reduced before TaggedType.

However, reducing at this point produces exactly the same result, so I
fail to see how this construct is ambiguous. There must be different
meanings in order to be ambiguous

Already Last-Called downrefs (was: ...)

2007-03-14 Thread Pekka Savola

On Wed, 14 Mar 2007, Brian E Carpenter wrote:

Just to confirm: 2818 has already been downrefed so it can be used in
this way without further formality.

http://www1.tools.ietf.org/group/iesg/trac/wiki/DownrefRegistry


There appear to have been two kinds of Last Calls:
 1) Last Call for document X which also last calls that document's 
downrefs, and
 2) Separate Last Call about downrefs to document Y (rare, see 31 Jan 
2007 example below)


Which one(s) are you referring to?

If 1), there seems to be an assumption that if document X downrefs 
document Y, and that downref is last-called, there is no need to Last 
Call any downref to document Y.


There is no text in the Last Call message to suggests the downref 
should be considered in a 'global' sense (more like 2) above), instead 
of in the context of the referencing document.


I certainly wouldn't go as far as to say that if it's OK for 
draft-dusseault-caldav to use RFC2818 in a normative sense, it would 
automatically make it OK in every other protocol as well.


RFC 3967 says:
=
   Once a specific down reference to a particular document has been
   accepted by the community (e.g., has been mentioned in several Last
   Calls), an Area Director may waive subsequent notices in the Last
   Call of down references to it.  This should only occur when the same
   document (and version) are being referenced and when the AD believes
   that the document's use is an accepted part of the community's
   understanding of the relevant technical area.  For example, the use
   of MD5 [RFC1321] and HMAC [RFC2104] is well known among
   cryptographers.
=

And I'm not sure if those requirements have been fulfilled yet. Am I 
missing something?


FWIW, there appear to be errors in the DownrefRegistry above.  For 
example, draft-ietf-lemonade-compress has not been Last Called this 
year, and when -06 version was in Dec 2006, it had no mention of 
downref.  There is a 'global'-like Last Call on 31 Jan 2007 but it 
seems to be about RFC 1951, not 1531.)


--
Pekka Savola You each name yourselves king, yet the
Netcore Oykingdom bleeds.
Systems. Networks. Security. -- George R.R. Martin: A Clash of Kings

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: Document Action: 'Abstract Syntax Notation X (ASN.X)' to Experimental RFC

2007-03-12 Thread Pekka Savola

On Mon, 12 Mar 2007, The IESG wrote:

A URL of this Internet-Draft is:
http://www.ietf.org/internet-drafts/draft-legg-xed-asd-07.txt

...

Working Group Summary

This document set was not produced by an IETF working group, but by an
individual.  IETF Last Call produced no comments, and solicited reviewers
were basically positive.


This writeup was not updated or comments were not duly processed.  I 
see 14 Last Call comments (retaining the subject line) on 
[EMAIL PROTECTED], as well as 12 comments under the 'Protest: Complexity 
running rampant' thread.


--
Pekka Savola You each name yourselves king, yet the
Netcore Oykingdom bleeds.
Systems. Networks. Security. -- George R.R. Martin: A Clash of Kings

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: [Fwd: Fwd: Re: Last Call: draft-ietf-6lowpan-problem (6LoWPAN: Overview, Assumptions, Problem Statement and Goals) to Informational RFC]

2007-03-07 Thread Pekka Savola

Hi,

On Tue, 6 Mar 2007, Geoff Mulligan wrote:

You question about switches does point to an overloaded term.  In that
particular paragraph the switches we are talking about are electrical
switches, as in light switches, not network switches.  We'll fix the
wording.


I guessed as much, which is what triggered me to wonder about the use 
of the term 'personal' as I don't think an electrical switch is 
typically carried in your PAN :-)



The reason we use the term personal area network is that it is the
industry term used for 802.15.4 networks.  I agree that these devices
are not personal, but it is a nomenclature that we are stuck with by
the IEEE.


If you don't want to drop 'Personal' from the used terminology, I 
would suggest considering adding a sentence or two in Introduction of 
all relevant documents to make it clearer that the IETF has designed a 
generic solution which also applies outside of PANs. The IETF 
specifications as far as I can see are not restricted to 'P' in 'PAN'. 
(If you consider assumptions and possible security tradeoffs this may 
have good and bad consequences.)



We did not address the security of underlying mesh network because we
have not yet defined that layer yet.  We are working with MANET to
define that and the security for the mesh would be addressed in that
document.  It was not germane to the format/adaptation header.

To you question about network management - again this document is about
the format and header encoding only.  Network management and security
will need to be addressed by a future 6lowpan management or 6lowpan ops
document.


I'm not sure whether I agree.  We're talking about a problem statement 
draft.  I'd agree that network management is probably outside the 
scope of draft-ietf-6lowpan-format.  It seemed that the network 
management goals could not be fulfilled without compromising other 
goals (easy or zero configuration), raising a doubt about the 
feasibility of the goals.


Even if NM doesn't need to be addressed in 6lowpan-format, I think 
(operational) security should be. The key questions (IMHO) here are, 
'Are the security mechanisms specified by IEEE and IETF good enough 
that using them is feasible in real life?  Will they get used?' So 
far, the document doesn't give me an assurance that the answer to 
either is 'yes', and hence it leaves me little to use when trying to 
figure out whether the security model of 6lowpan design is adequate, 
and consequently, whether the IP specification is complete or not.


--
Pekka Savola You each name yourselves king, yet the
Netcore Oykingdom bleeds.
Systems. Networks. Security. -- George R.R. Martin: A Clash of Kings

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-ietf-isis-caps (IS-IS Extensions for Advertising Router Information) to Proposed Standard

2007-03-05 Thread Pekka Savola

On Mon, 26 Feb 2007, The IESG wrote:

The IESG has received a request from the IS-IS for IP Internets WG
(isis) to consider the following document:

- 'IS-IS Extensions for Advertising Router Information '
  draft-ietf-isis-caps-07.txt as a Proposed Standard

This document has a normative reference to two informational RFCs,
3567 and 3784.  These are part of a group of informational RFCs that
were published as informational instead of standards-track for
historical reasons, and there is current work in progress to advance
them to standards track.

...

This comment applies to all the three IS-IS documents currently in 
Last Call.


As far as I can see, there is no significant work in progress (as 
visible to an outsider) to move the underlying Informational RFCs 
forward at all: no drafts.  I can see that there was some discussion 
on the list in January but that's it.  Given the usual pace IS-IS WG 
takes in moving documents from draft to RFC (5 years +/- 3 years) this 
move would take years.


AFAICS, there is no harm in the 3 drafts being drafts until their 
dependencies are sorted out.  On the other hand, not publishing them 
as RFCs may motivate the WG to actually work on the standarzation of 
IS-IS base specifications at a reasonable pace.   There is also a 
possibility that a specification would need to be changed when 
standardized so that it might affect one of these 3 specifications.


As such I do not support approving these documents at this time.

--
Pekka Savola You each name yourselves king, yet the
Netcore Oykingdom bleeds.
Systems. Networks. Security. -- George R.R. Martin: A Clash of Kings

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-ietf-6lowpan-problem (6LoWPAN: Overview, Assumptions, Problem Statement and Goals) to Informational RFC

2007-03-04 Thread Pekka Savola

On Thu, 15 Feb 2007, The IESG wrote:

The IESG has received a request from the IPv6 over Low power WPAN WG
(6lowpan) to consider the following document:

- '6LoWPAN: Overview, Assumptions, Problem Statement and Goals '
  draft-ietf-6lowpan-problem-07.txt as an Informational RFC

The IESG plans to make a decision in the next few weeks, and solicits
final comments on this action.  Please send substantive comments to the
ietf@ietf.org mailing lists by 2007-03-01. Exceptionally,
comments may be sent to iesg@ietf.org instead. In either case, please
retain the beginning of the Subject line to allow automated sorting.

The file can be obtained via
http://www.ietf.org/internet-drafts/draft-ietf-6lowpan-problem-07.txt


Sorry for slightly missing the LC deadline.

   6.   Low cost.  These devices are typically associated with sensors,
switches, etc.  This drives some of the other characteristics
such as low processing, low memory, etc.  Numerical values for
low elided on purpose since costs tend to change over time.

== what kind of 'switch' do you have in mind?  How does that 
participate in a _personal_ area network?


As a side note, there appears to be nothing in the requirements that 
relates directly to the 'personal' of personal area network.  For 
example, there are no assumptions about the maximum diameter of the 
network.


Are you really specifying Low-power Wireless Area Networks rather than 
LoWPANs?  Are there any goals, problems or assumptions relating to 
'personal' that one should be aware of?  Or should you just remove 
'personal' from the text(s)?


4.2.  Topologies

== I was a bit disappointed as I saw no mention of securiry wrt 
routing in the mesh topology.  It isn't mentioned in the later part of 
the text as well.  E.g., how do you prevent malicious nodes from 
joining the network and doing e.g., MiTM attacks by posing as routers?


Are you assuming that the link-layer security will keep unauthorized 
nodes away from the LoWPAN network?  If that is the assumption, more 
emphasis might be needed on how to actually configure the link-layer 
keying.  Based on current text it's not clear if configuring keying in 
all the nodes is operationally feasible or even possible.


4.3.  Limited Packet Size

   Applications within LoWPANs are expected to originate small packets.
   Adding all layers for IP connectivity should still allow transmission
   in one frame without incurring excessive fragmentation and
   reassembly.  Furthermore, protocols must be designed or chosen so
   that the individual control/protocol packets fit within a single
   802.15.4 frame.  Along these lines, IPv6's requirement of sub-IP
   reassembly (see Section 5) may pose challenges for low-end LoWPAN
   devices that do not have enough RAM or storage for a 1280-octet
   packet.

== I wonder what the last sentence implies.  Given that the 
-format specification still requires the 1280 byte IP MTU, the RAM 
requirement was probably not blocking here.  Rewording this slightly 
due to how -format ended up being might be useful.


4.4.  Limited configuration and management

   As alluded to above, devices within LoWPANs are expected to be
   deployed in exceedingly large numbers.  Additionally, they are
   expected to have limited display and input capabilities.
   Furthermore, the location of some of these devices may be hard to
   reach.  Accordingly, protocols used in LoWPANs should have minimal
   configuration, preferably work out of the box, be easy to
   bootstrap, and enable the network to self heal given the inherent
   unreliable characteristic of these devices.  Network management
   should have little overhead yet be powerful enough to control dense
   deployment of devices.

== no or very little configuration, yet network management should be 
powerful enough to control a huge number of devices?  How do you 
manage the authorization of network management then, i.e., who is 
allowed to control the devices?


I'm somewhat surprised that you do not mention overcoming (initial) 
configuration tasks (including but not limited to network management) 
as an item under Section 5.


   For network layer security, two models are applicable: end-to-end
   security, e.g. using IPsec transport mode, or security that is
   limited to the wireless portion of the network, e.g. using a security
   gateway and IPsec tunnel mode.

== it might be useful to mention how header compression relates to 
IPsec.  Are there problems if both are applied?  If non-NULL IPsec 
transform is used, can header compression be used at all?


--
Pekka Savola You each name yourselves king, yet the
Netcore Oykingdom bleeds.
Systems. Networks. Security. -- George R.R. Martin: A Clash of Kings

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-ietf-6lowpan-format (Transmission of IPv6 Packets over IEEE 802.15.4 Networks) to Proposed Standard

2007-03-04 Thread Pekka Savola
 follows |
+--+---+

== off-by-two at the bottom of the table..

   datagram_size:  This 11 bit field encodes the size of the entire IP
  payload datagram.

== .. 'in octets' ?  You don't specify the unit..

  Next Header (bits 5 and 6):
 00:  not compressed, full 8 bits are sent
 01:  UDP
 10:  ICMP
 11:  TCP

== s/ICMP/ICMPv6/ -- you probably refer to protocol=58 instead of 
protocol=1 ? (the same later in the section)


15.2.  Informative References

  [I-D.ietf-ipngwg-icmp-v3]
[I-D.ietf-ipv6-node-requirements]

== these have been published in RFCs (but neither is actually used in 
the body of the text, so could be fixed and added or removed 
completely).


--
Pekka Savola You each name yourselves king, yet the
Netcore Oykingdom bleeds.
Systems. Networks. Security. -- George R.R. Martin: A Clash of Kings

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


RE: [PCN] Re: WG Review: Congestion and Pre-Congestion Notification(pcn)

2007-02-20 Thread Pekka Savola

On Mon, 19 Feb 2007, [EMAIL PROTECTED] wrote:

[logical components being:] encoding and transport along forward
path from marker to egress, metering of congestion information at
the egress, and transport of congestion information back to the
controlling ingress.


I'd like to see it explicitly stated that transporting congestion
information in the (metered) IP packets themselves is out of scope.


Forward transport of the basic congestion information has to be in
scope as Fred has pointed out.  Backwards transport needs to be scoped
by application scenario - for example, backwards transport via SIP
is clearly out of scope for the initial PCN work.  OTOH, not specifying
how to actually move any of this information around would turn PCN
into the moral equivalent an IRTF Research Group, which (IMHO) would
be bad - at the end of the day, PCN needs to produce something that
actually works (need running code in addition to rough consensus).


It seems that are assuming the transport needs to happen in the packet 
itself.  While this is a possible approach, I don't see that it needs 
to be the only one.  For example, a mechanism where the mutually 
trusting network components would have another channel to convey this 
information (e.g., using SNMP, IPFIX, or the like) might also apply.


However, to be clear, I have no objection to using the ECN field(s) if 
that does not hinder the current use (or lack thereof) of ECN. What I 
specifically don't want is to define new fields for PCN, especially 
extension headers or IP options.  I should have been clearer with my 
objection.


--
Pekka Savola You each name yourselves king, yet the
Netcore Oykingdom bleeds.
Systems. Networks. Security. -- George R.R. Martin: A Clash of Kings

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: WG Review: Media Server Control (mediactrl)

2007-02-19 Thread Pekka Savola

On Tue, 13 Feb 2007, IESG Secretary wrote:
Given the wide acceptance of the media server, we need a standard 
way to control them.


This, and taking a look at draft-boulton-sip-control-framework-05.txt 
which seems to be relevant here, seems to imply this group is about to 
build a management framework for SIP services.  I'm not sure if such a 
framework has been chartered yet in other WGs, and if not, this would 
be the first time, bearing closer scrutiny how to do it correctly.


How much the manamgement part of OM has been consulted?  What is the 
model of co-operation with the IETF management expertise?



MILESTONES

APR 2007 Requirements Document
JUN 2007 Framework Document
NOV 2007 Conference Control Protocol
MAR 2008 IVR Control Protocol
JUN 2008 Broker Protocol or BCP


These are horribly vague.  Are the dates for WG adoption?  WGLC? 
Shipping off to the IESG?


--
Pekka Savola You each name yourselves king, yet the
Netcore Oykingdom bleeds.
Systems. Networks. Security. -- George R.R. Martin: A Clash of Kings

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: WG Review: Congestion and Pre-Congestion Notification (pcn)

2007-02-19 Thread Pekka Savola

On Tue, 13 Feb 2007, IESG Secretary wrote:
[logical components being:] encoding and transport along forward 
path from marker to egress, metering of congestion information at 
the egress, and transport of congestion information back to the 
controlling ingress.


I'd like to see it explicitly stated that transporting congestion 
information in the (metered) IP packets themselves is out of scope. 
This should exclude designs such as adding IP options en-route, 
defining new extension headers, or modifying the packets in any, 
currently undefined way.  (I say this explicitly because based on a 
very quick look at the mailing list archives I saw discussion relating 
to IP header encoding and it unnerved me.)


Reaction mechanisms at the boundary consist of flow admission and 
flow termination.


In order to do flow admission, you'll first need to recognize a flow. 
How do you recognize at the borders (or in the core) which kind of 
flows should be considered to be treated as PCN?  The mechanisms for 
accomplishing this in an operationally feasible way don't seem to be 
discussed in the charter.


This may be easy if all the traffic you're interested of is using a 
few predetermined (and configured) protocols and port numbers, but I 
suspect that is not the case, and layer 7 packet inspection is not an 
option either..


--
Pekka Savola You each name yourselves king, yet the
Netcore Oykingdom bleeds.
Systems. Networks. Security. -- George R.R. Martin: A Clash of Kings

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: Does our passport need to be valid for 6 months to go to Prague?

2007-02-18 Thread Pekka Savola

On Sun, 18 Feb 2007, Michael StJohns wrote:

At 06:29 PM 2/18/2007, Janet P Gunn wrote:

My guidebook says 6 months.


Feel free to argue with the US State Dept..   :-)


I don't think it's the US State Dept you will need to argue with but 
rather the officials in Prague Airport..


--
Pekka Savola You each name yourselves king, yet the
Netcore Oykingdom bleeds.
Systems. Networks. Security. -- George R.R. Martin: A Clash of Kings

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: draft-ietf-syslog-protocol: Reliable delivery considered harmful.

2007-02-01 Thread Pekka Savola

On Thu, 1 Feb 2007, David W. Hankins wrote:

If you insist on keeping all 50,000 lines of output, there is no
solution to that problem.  If you block, that's a big problem as
it ultimatley totally disables the service attempting to log
information.  If you write to a growing backing store, well you'll
run out of space eventually (even disk is not infinite).
Compression can only get you so far.


As an operator, I would find a reliable syslog useful.

However, I do not see this as a problem.  95% of the problem (from our 
perspective) is solved if no messages are lost _on the wire_ between 
the sender and the recipient of syslog messages.


It's acceptable for the syslog sender to replace overflowing lines of 
syslog (if some messages need to be dropped due to lack of resources) 
with a message about rate-limiting, messages being dropped, or 
whatever -- just the same way as messages might get dropped when 
syslogging to a local media.


As long as a) there is a message about syslogs getting dropped, and b) 
this is infrequent in a well operated system (i.e. the system log 
levels are set so that typically the amount of logging is OK), this 
should be no problem.



May be adequate to the point of suggesting that reliable delivery
might not be desirable.  But on the whole the draft doesn't read
that way, and it doesn't state the truth: reliable delivery of
syslog output is always harmful.  The point of bothering with
reliable syslog delivery, if there is one, is for those very
rare cases where losing the data is more harmful than harming
system services.


IMHO, reliable delivery of syslog output is always harmful is very 
much an over-statement.


It seems your concern is limited to the corner case where the syslog 
sender would already have a full syslog buffer, and the sender would 
get even more syslog to send. While this is a serious problem when it 
occurs, it should be easily solvable: just drop the messages (with a 
suitable note in syslog or in the local log) that exceed the buffer 
size or prune messages from the buffer using some more advanced 
strategy.


As a particular example, we'd be very interested in getting reliable 
syslog from our routers to cover for messages lost due to network 
outages (fixed usually quickly with rerouting). We are talking of 
1-200 messages being lost within a 10 minute period -- a very 
reasonable packet rate in average.  A 1,000 or 10,000 line buffer in 
the router should be very reasonable in recent control processors. 
I'd rather the control processor reserve 0.1% of its memory (or CPU) 
to store and transmit these messages rather than try to use the last 
0.1% when it's already chugging at 99.9%; the last 0.1% would not make 
a meaningful difference anyway for whatever it's using almost all of 
its resources.


--
Pekka Savola You each name yourselves king, yet the
Netcore Oykingdom bleeds.
Systems. Networks. Security. -- George R.R. Martin: A Clash of Kings

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


addressing Last Call comments [Re: Discuss criteria]

2007-01-12 Thread Pekka Savola
Jeff, you wrote a good note.  I'll use this as an opportunity to 
expand on one topic a bit:


On Thu, 11 Jan 2007, Jeffrey Hutzelman wrote:
On Wednesday, January 03, 2007 10:49:33 PM + Dave Crocker 
[EMAIL PROTECTED] wrote:

 C.  PROCEDURAL BREAKAGE
 ---
  * IETF process related to document advancement was not carried out;
  e.g.,  there are unresolved and substantive Last Call comments which the
  document  does not address...


IMHO, this particular situation is more than just procedural breakage. If a 
document reaches this point with outstanding last call comments, then there 
is a more basic failure.  Such a document should not have reached the point 
where a DISCUSS is required to keep it from progressing long enough for the 
comment to be addressed.


Well, it seems rather common that IETF LC comments (especially if not 
copied to ietf@ietf.org list) are not responded.  To reduce delay, it 
also seems common that IESG telechat is scheduled as soon as possible 
after IETF LC closes, and document is usually not taken out of the 
agenda if comments are received during the LC.  Also sometimes the 
document gets approved without there being any record (e.g., on IESG 
ballots) that some comments had been made but there was no response.


Therefore it is not clear to me whether such comment was addressed 
(I'd call this 'processed') but without public record [e.g., editor or 
chair] in essence rejecting the comment (possibly in good faith) or 
not received at all (maybe also in good faith, e.g. if WG mailing list 
discards non-subscriber posts or the moderator is asleep).


Maybe we should be clearer on what the expectation for processing IETF 
LC comments is.  Unless we do, it is not obvious how we could evaluate 
whether the procedure has been carried out properly or not.


--
Pekka Savola You each name yourselves king, yet the
Netcore Oykingdom bleeds.
Systems. Networks. Security. -- George R.R. Martin: A Clash of Kings

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: WG Review: Recharter of Internet Emergency Preparedness (ieprep)

2006-12-01 Thread Pekka Savola

On Fri, 1 Dec 2006, Brian E Carpenter wrote:

2. There's clearly a need, if the work is to be expanded into new
applications areas, for the experts in those applications to be
deeply involved. That is in fact the main argument why the work
should be done in the IETF if it's done at all.  I understand that
this would need a major injection of new blood into the WG. That
won't happen by means of a simple re-charter. It needs an impetus
that would be noticed throughout the IETF.


An alternative to trying to get all the application specialists in a 
RAI WG would be to try to get folks from RAI to other areas. That 
would be similar to what v6ops WG did 3-4 years ago.


--
Pekka Savola You each name yourselves king, yet the
Netcore Oykingdom bleeds.
Systems. Networks. Security. -- George R.R. Martin: A Clash of Kings

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: Last Call: 'DomainKeys Identified Mail (DKIM) Signatures' to Proposed Standard (draft-ietf-dkim-base)

2006-11-22 Thread Pekka Savola

On Mon, 13 Nov 2006, Eric Allman wrote:

Thanks for your good comments, which I will try to answer as best as I can.

Advice from our AD and WG Chairs was that in Last Call the point is not to 
continue Working Group deliberations, but to (a) find minor wording issues, 
and (b) find show stoppers.  In several cases you have made some good 
suggestions, but since they fall in the grey area between trivial and 
critical we are going to have to side-step them for now.  We apologize for 
this, and wish we had gotten them before we went into Last Call, but we are 
also trying to get the document out sooner rather than later, and no project 
ever gets to the point where all parties consider it perfect.


I do not believe this is an appropriate way to handle IETF LC 
comments.  This approach could be understandable for issues which have 
already been discussed at the WG (and no significant new perspective 
is brought up in the IETF LC). A pointer to an issue tracker (if any) 
might help if the issues have already been discussed..


RFC 2119 does not require that conditions indicated by MUST, SHOULD, etc. be 
detectable or enforceable by the receiver.


Unfortunately, it doesn't, but the specifications are still required 
to be of sufficient clarity, see e.g., draft-iesg-discuss-criteria 
section 3.1.  A MUST or SHOULD statement which is not implementable 
may fail that test.


At least right now, I don't see the point in responding to the rest of 
the response.


--
Pekka Savola You each name yourselves king, yet the
Netcore Oykingdom bleeds.
Systems. Networks. Security. -- George R.R. Martin: A Clash of Kings

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Something better than DNS?

2006-11-22 Thread Pekka Savola

On Tue, 21 Nov 2006, Keith Moore wrote:
p.s. rather than adding more and more burdens to DNS, what we really need to 
be doing is figuring out how to replace it with something more robust and 
more flexible.  (Yes, you'd have to arrange that DNS queries and queries to 
the new database would return consistent results; you'd also have to make 
sure that DNSSEC didn't break, but those are both doable.)


DNS is getting very long in the tooth, and is entirely too inflexible and too 
fragile.  The very fact that we're having a discussion about whether it makes 
more sense to add a new RR type or use TXT records with DKIM is a clear 
indicator that something seriously is wrong with DNS. Adding a new RR type 
should not require a single line of DNS server or client library code to be 
recompiled, nor any changes to the configuration of any server not 
advertising such records.


Keith,

I've seen you say this for many years now, but I'll bite now.
Do you have ideas what a more flexible, less fragile, and in 
general a better mechanism would:


 1) be or look like, or

 2) what requirements we should have for building and deploying it?
(if such a thing or a close likeness doesn't exist)

I wonder if there are practical alternatives.  A bit more dialogue on 
what else instead of DNS is a bad idea might help in figuring out 
whether there is anything the IETF could do about it.


--
Pekka Savola You each name yourselves king, yet the
Netcore Oykingdom bleeds.
Systems. Networks. Security. -- George R.R. Martin: A Clash of Kings

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: WG Review: Recharter of Internet Emergency Preparedness (ieprep)

2006-11-15 Thread Pekka Savola
On Wed, 15 Nov 2006, Fred Baker wrote:
 We also specifically addressed their requirements (in tsvwg) operationally:
 
 http://www.ietf.org/rfc/rfc4594.txt
 4594 Configuration Guidelines for DiffServ Service Classes. J.
  Babiarz, K. Chan, F. Baker. August 2006. (Format: TXT=144044 bytes)
  (Status: INFORMATIONAL)
 
 http://tools.ietf.org/html/draft-ietf-tsvwg-diffserv-class-aggr
   Aggregation of DiffServ Service Classes, Kwok Ho Chan, 22-Oct-06
 and
 http://tools.ietf.org/html/draft-baker-tsvwg-admitted-voice-dscp
   An EF DSCP for Capacity-Admitted Traffic, Fred Baker, 6-Oct-06
 
 The last two are in last call and in discussion in tsvwg respectively.

All of these documents are, or are aimed at Informational.  I do not 
see how those could define DSCP codepoints or behaviour -- doing so 
requires Standards Action and certain codepoint pools are reserved for 
local/private use (which specifying them is not).  I wonder how wide 
IETF or operator consensus is behind this work.

-- 
Pekka Savola You each name yourselves king, yet the
Netcore Oykingdom bleeds.
Systems. Networks. Security. -- George R.R. Martin: A Clash of Kings

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: Last Call: 'DomainKeys Identified Mail (DKIM) Signatures' to Proposed Standard (draft-ietf-dkim-base)

2006-11-07 Thread Pekka Savola
 tokens are imported from other RFCs as noted.  Those
   RFCs should be considered definitive.  However, all tokens having
   names beginning with obs- should be excluded from this import, as
   they have been obsoleted and are expected to go away in future
   editions of those RFCs.
..
   The following tokens are imported from [RFC2821]:
   The following definitions are imported from [RFC2822]:
   The following tokens are imported from [RFC2045]:

== but you don't specify below any obs- tokens -- so why mention it here at
all ?
== 2 of the lists use 'tokens', one 'definitions'.  Is this intentional?
(probably a stupid question... :-)

  1.  White space in the input text, including CR and LF, must be
  encoded.  RFC 2045 does not require such encoding, and does
  not permit encoded of CR or LF characters that are part of a
  CRLF line break.

   INFORMATIVE NOTE:  The x= tag is not intended as an anti-
   replay defense.

== this note would be more valuable if it also mentioned what the x= tag
was intended for, not just what it isn't.

== s/encoded/encoding/ or something similar?

   4.  If the query for the public key returns multiple key records, the
   verifier may choose one of the key records or may cycle through
   the key records performing the remainder of these steps on each
   record at the discretion of the implementer.  The order of the
   key records is unspecified.  If the verifier chooses to cycle
   through the key records, then the return with ... wording in
   the remainder of this section means try the next key record, if
   any; if none, return to try another signature in the usual way.

== s/return with/return/ ? -- AFAICS, 'return with' isn't used but 'return'
is.

   [ID-DKIM-THREATS]
  Fenton, J., Analysis of Threats Motivating DomainKeys
  Identified Mail (DKIM), draft-fenton-dkim-threats-02
  (work in progress), April 2006.


== this has been published as an RFC.

   The DomainKeys specification was a primary source from which this
   specification has been derived.  Further information about DomainKeys
   is at
   http://domainkeys.sourceforge.net/license/patentlicense1-1.html.

== this domain no longer even exists, and even if it did, referring to a
file named 'patentlicence1-1.html' should raise some eyebrows considering
the IPR rules that no claims should be referred to in the document itself.

Is this information available somewhere else?   Should it be referred to
using an Informative Reference?

-- 
Pekka Savola You each name yourselves king, yet the
Netcore Oykingdom bleeds.
Systems. Networks. Security. -- George R.R. Martin: A Clash of Kings

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: WG Review: Recharter of Internet Emergency Preparedness (ieprep)

2006-11-06 Thread Pekka Savola
On Sat, 4 Nov 2006, Fred Baker wrote:
 I have to say that my discussions with US DoD and DHS/NCS, and with their
 counterparts in other countries, doesn't suggest that the set of technical
 mechanisms is all specified. If we're looking only at voice, it is maybe so,
 but they're not looking only at voice. Questions abound around the mechanisms
 for sending an email and ensuring that it is delivered in a stated time
 interval on the order of minutes or that an indication of failure is returned
 to the sender, and other things.

Which seems to be an indication that even if this is pursued in the 
IETF, RAI area seems like a wrong place.  The better one would 
probably be OpsMgmt if there is general requirements gathering / 
framework work to be done.

However, it's not obvious whether this is necessarily the right thing 
to do in the IETF or in this manner.  It looks ieprep was chartered 
around IETF 53, and the deliverables were to be complete in 2002.  
Some of that work was completed relatively quick, some has taken a lot 
longer -- being still under evalution.  Initial charter also included 
'recommendations' but it's not clear to me what happened with that.

It's not clear whether going on this way will achieve useful results 
in a useful amount of time.

-- 
Pekka Savola You each name yourselves king, yet the
Netcore Oykingdom bleeds.
Systems. Networks. Security. -- George R.R. Martin: A Clash of Kings

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: WG Review: Recharter of Internet Emergency Preparedness (ieprep)

2006-11-02 Thread Pekka Savola
On Wed, 1 Nov 2006, Sam Hartman wrote:
 I don't believe the new charter of ieprep working group belongs in the
 IETF.  I understand why we chartered it here, and I believe that by
 doing as much work as we have done so far in the IETF, we have done
 something useful.  We've described the broad problem and have helped
 to explain how it fits in the Internet context.  That was an important
 thing for us to do.

I think I'll agree with Sam.  Having looked at the output of the WG, 
it already seems to include a couple of useful framework documents and 
about 4 requirements documents.  This should already provide 
sufficient information how to continue the work.

What isn't clear to me is what's the deployment level of these 
frameworks and various mechanisms.  We seem to have spent at least
~4 years on this.  Overprovisioning and intra-domain TE seems to
have been a popular approach, but apart from that, where has this been 
deployed and how?

Maybe we should let ITU, vendors, and/or deploying organizations to 
apply the existing techniques and frameworks, let this rest for 5 
years and then come back to look if there is something more to be said 
on the subject.

-- 
Pekka Savola You each name yourselves king, yet the
Netcore Oykingdom bleeds.
Systems. Networks. Security. -- George R.R. Martin: A Clash of Kings

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: WG Review: Recharter of Internet Emergency Preparedness (ieprep)

2006-11-02 Thread Pekka Savola
On Thu, 2 Nov 2006, James M. Polk wrote:
 Having looked at the output of the WG,
 it already seems to include a couple of useful framework documents and
 about 4 requirements documents.
 
 the framework RFCs are for within a single public domain.  The other RFCs are
 requirements based.
 
 There is no architecture guidelines docs or peering guidelines or the like.

I guess by 'architecture guidelines' you refer to inter-domain 
guidelines as the framework RFCs already seem to deal at least to some 
extent with a single domain.  If you don't, you may mean something 
that operators would use.  It's not clear if one-size-fits-all 
guidelines could be made, or if this would be right place to try to 
seek it.

Is there already sufficient experience of getting multi-domain work?  
AFAICS, this hasn't generally been considered an easily solvable 
problem at an operational level.

Peering guidelines likely don't belong to the IETF, or has there been 
successful precendent for that kind of work in the past?  (I could say 
some examples, but I don't think those were very succesful, and those 
were from OPS area)

Even if this work was in the scope of IETF, at least these two seem 
more like subjects to be pursued in the OpsMgmt area.

 This should already provide
 sufficient information how to continue the work.
 
 continue the work where? by who? by another SDO?  Why?

Other SDOs if they're willing.  Organizations that actually want to 
deploy this stuff (if those exist in sufficient degree).  Vendors who 
want to push for this stuff.  That is to say -- is there enough 
deployment (and understanding what works and is deployable and what 
isn't) to justify more IETF work on the subject _right now_ ?

 Overprovisioning and intra-domain TE seems to have been a popular approach,
 
 in which IEPREP doc was Overprovisioning and intra-domain TE  discussed?

draft-ietf-ieprep-domain-frame-07.txt, RFC4190, RFC43745 to name a 
few.

 but apart from that, where has this been  deployed and how?
 
 Maybe we should let ITU, vendors, and/or deploying organizations to
 apply the existing techniques
 
 What techniques have been defined?

The framework documents talk a lot about certain kinds of DSCP PHBs, 
mappings between PSTN and VoIP, a particular end-to-end priority 
field, MPLS-like traffic engineering, access-controls to prevent 
DoSing priority treatment, active queue management techniques, drop 
priority techniques, etc. -- this already seems to be a significant 
toolbox.  It is not clear to me to what extent these have been used 
and do the job set out for IEPREP.  And if not, is the lack of use due 
to people solving the problem in other ways (or not at all) rather 
than the lack of mechanisms?

-- 
Pekka Savola You each name yourselves king, yet the
Netcore Oykingdom bleeds.
Systems. Networks. Security. -- George R.R. Martin: A Clash of Kings

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: Last Call: 'Key Change Strategies for TCP-MD5' to Informational RFC (draft-bellovin-keyroll2385)

2006-10-04 Thread Pekka Savola

On Sat, 30 Sep 2006, Iljitsch van Beijnum wrote:

The IESG has received a request from an individual submitter to consider
the following document:



- 'Key Change Strategies for TCP-MD5 '
  draft-bellovin-keyroll2385-03.txt as an Informational RFC

...
The problems start when BOTH sides implement the new mechanism. In that case, 
new keys will remain unused for some time, and then become active at some 
hard-to-determine time in the future. (Neither side knows for sure when the 
other side will switch to the new key.) This means that there will be a 
problem in the case where the new key isn't present on both sides, for 
instance because one side wasn't configured with the new key in a timely 
fashion, despite out-of-band agreement to do so, the keys configured on both 
sides don't match.


Having read the draft, I do have similar concerns with double-ended 
operations.  The draft mentions that the new key should only be used 
when it's at a point where it is reasonably certain that the other 
side would have it installed, too.  This is not very exact language, 
and I wonder how implementations would handle this.  Some other parts 
of the document also include suggestions which may make it harder to 
test the interoperability of various different mixes of 
implementations.


One possibility could be that an implementation once it's configured 
with a new key MUST always immediately send a TCP probe to figure out 
whether the other end supports the configuration key.  This ensures 
that at least one operator is still on-line when a key change occurs.

If not, go to dormant mode, waiting for the other end to probe.

A TCP probe should be something that will be acknowledged without 
extra code if received with a working key, but which does not need to 
be retransmitted with a different key if it fails.  An example of this 
would be an additional KEEPALIVE BGP message (which would be 
application-specific), a TCP SYN to the application port (where you 
terminate the probed connection after it was established) or something 
similar.


I'm also not sure if the time interval to change the key would be 
needed.  The only benefit is failure to change the session to a new 
key within that period would trigger some kind of alert.  But if the 
implementation already reports which keys are used and when, the 
operators could just monitor whether a change took place or not. In 
any case, a working BGP session with the old key is always better than 
a failed BGP session with a new key.


FWIW, we haven't seen the need to ever change TCP-MD5 keys either. 
This feature has likely been requested by networks which fail to 
fulfill the assumptions of [1], i.e., they do not have filtering [or 
GTSM] capabilities at edges and hence the attack vector to send 
TCP-RST to the network's BGP sessions is basically the whole world.


[1] draft-savola-rtgwg-backbone-attacks-02.txt

--
Pekka Savola You each name yourselves king, yet the
Netcore Oykingdom bleeds.
Systems. Networks. Security. -- George R.R. Martin: A Clash of Kings

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: Adjusting the Nomcom process

2006-09-07 Thread Pekka Savola

On Thu, 7 Sep 2006, Stewart Bryant wrote:

The nomcom pool is in my view very much at the low water mark So an
extension to Ralph's idea would be for the Secretatiat to send a direct
mail to all those who are  eligable to say that they are eligable for this
important task and invite them to volunteer by clicking a hyperlink in
the mail. The mail should probably include a note from the Nomcom
chair etc.


I said this in the past, but IMHO the job description of a NOMCOM 
member would need to change if we wanted more people to be involved. 
I think most folks would rather do something else than commit to a 5+ 
hour/wk schedule for a number of months.


--
Pekka Savola You each name yourselves king, yet the
Netcore Oykingdom bleeds.
Systems. Networks. Security. -- George R.R. Martin: A Clash of Kings

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: IESG response and questions to the normative reference experiment (draft-klensin-norm-ref-01.txt)

2006-09-07 Thread Pekka Savola

On Tue, 5 Sep 2006, Sam Hartman wrote:

Pekka == Pekka Savola [EMAIL PROTECTED] writes:

   Pekka On Fri, 1 Sep 2006, Sam Hartman wrote:
Pekka == Pekka Savola [EMAIL PROTECTED] writes:
   Pekka I do not agree with the assessment that there is community
   Pekka consensus to turn this to BCP right out.
 Would you be sufficiently interested in the experiment to
write text if necessary?

   Pekka I assume you refer to guidance on how to indicate the
   Pekka status of a reference when down-ref'ed.  Sure, I could
   Pekka craft some text if that's the way to go and that would

No.  John made it fairly clear that he wasn't really all that
interested in only part one of the experiment.  If he steps down as
editor, would you step up?


If folks agree that this the way to go, I can pick up the pen if 
necessary.


--
Pekka Savola You each name yourselves king, yet the
Netcore Oykingdom bleeds.
Systems. Networks. Security. -- George R.R. Martin: A Clash of Kings

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: IESG response and questions to the normative reference experiment (draft-klensin-norm-ref-01.txt)

2006-09-04 Thread Pekka Savola

On Fri, 1 Sep 2006, Sam Hartman wrote:

Pekka == Pekka Savola [EMAIL PROTECTED] writes:

   Pekka I do not agree with the assessment that there is community
   Pekka consensus to turn this to BCP right out.

Would you be sufficiently interested in the experiment to write text
if necessary?


I assume you refer to guidance on how to indicate the status of a 
reference when down-ref'ed.  Sure, I could craft some text if that's 
the way to go and that would help.


--
Pekka Savola You each name yourselves king, yet the
Netcore Oykingdom bleeds.
Systems. Networks. Security. -- George R.R. Martin: A Clash of Kings

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: IESG response and questions to the normative reference experiment (draft-klensin-norm-ref-01.txt)

2006-09-01 Thread Pekka Savola

On Fri, 1 Sep 2006, Brian Carpenter wrote:

The experiment is composed of two parts.  The first part allows
approved Internet Drafts to reference RFCs at a lower level of
maturity, provided that a note explaining the reference is added.  One
way of looking at this is that it relaxes the requirements for
normative downreferences in RFC 3967.  The IESG believes that there is
sufficient support for this part of the experiment that simply writing
a BCP is a better approach than running an experiment.

...

So, in conclusion, the IESG seeks comments on whether there is
community interest in turning the first part of this experiment into a
BCP.


I do not agree with the assessment that there is community consensus 
to turn this to BCP right out.


While some community members expressed their opinion that downref 
rules should be abolished completely, that was not the subject of 
draft-klensin-norm-ref Last Call. I would personally be opposed to 
creating such a BCP (instead of building experience through experiment 
first).


--
Pekka Savola You each name yourselves king, yet the
Netcore Oykingdom bleeds.
Systems. Networks. Security. -- George R.R. Martin: A Clash of Kings

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


L2VPNs must not be IP(v4)-only

2006-08-16 Thread Pekka Savola

On Wed, 16 Aug 2006, [EMAIL PROTECTED] wrote:

A New Internet-Draft is available from the on-line Internet-Drafts
directories.
This draft is a work item of the Layer 2 Virtual Private Networks Working Group 
of the IETF.

Title   : ARP Mediation for IP Interworking of Layer 2 VPN
Author(s)   : H. Shah, et al.
Filename: draft-ietf-l2vpn-arp-mediation-07.txt
Pages   : 21
Date: 2006-8-16

...

The VPWS service [L2VPN-FRM] provides point-to-point connections
between pairs of Customer Edge (CE) devices.  It does so by
binding two Attachment Circuits (each connecting a CE device
with a Provider Edge, PE, device) to a pseudowire (connecting
the two PEs).  In general, the Attachment Circuits must be of
the same technology (e.g., both Ethernet, both ATM), and the
pseudowire must carry the frames of that technology.  However,
if it is known that the frames' payload consists solely of IP
datagrams, it is possible to provide a point-to-point connection
in which the pseudowire connects Attachment Circuits of
different technologies. This requires the PEs to perform a
function known as ARP Mediation. ARP Mediation refers to the
process of resolving Layer 2 addresses when different resolution
protocols are used on either Attachment Circuit. The methods
described in this document are applicable even when the CEs run
a routing protocol between them, as long as the routing protocol
runs over IP.



The document says,

 10. IPV6 Considerations

 The support for IPV6 is not addressed in this draft and is for
 future study.

This needs to be addressed throughout the document.

The whole point of L2VPNs (IMHO) is that it's agnostic of what 
protocols users run above L2.  Users depend on a transparent L2 
service model and this model breaks that assumption.


--
Pekka Savola You each name yourselves king, yet the
Netcore Oykingdom bleeds.
Systems. Networks. Security. -- George R.R. Martin: A Clash of Kings

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: Comments on draft-carpenter-newtrk-questions-00.txt

2006-07-13 Thread Pekka Savola

On Thu, 13 Jul 2006, Eliot Lear wrote:

By RFC, not by STD (obviously):

Status  1999200020012002200320042005
-
PS  102 119 71  105 103 131 169
DRAFT   6   6   2   4   7   7   3

...
I believe there are two reasons for the huge gap between PS 
and DRAFT:


- it's difficult to get there (interop requirements, picking out
  uncommonly used features, etc)


A part of that might also be caused by normative references problems. 
I don't think we have much data on that as we haven't run an 
experiment (yet).



- nobody wants or needs to do the work (what GM in her right
  mind would want her experts working on something that neither
  generates new features nor fixes product bugs)


Some of this would in fact usually be documenting the product bugs 
that were caused by ambiguous or incorrect specification.  You're 
right that once you've figured out a way to fix a spec problem in YOUR 
implementation, there may be marginal interest in fixing it in the 
spec.  However, I believe doing so will reduce the load on customer 
support (and ultimately also engineering which will need to answer the 
escalated support issues), because many of the support issues are 
actually caused by interoperability between different products or 
vendors.


--
Pekka Savola You each name yourselves king, yet the
Netcore Oykingdom bleeds.
Systems. Networks. Security. -- George R.R. Martin: A Clash of Kings

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: My notes on draft-carpenter-newtrk-questions-00.txt

2006-07-12 Thread Pekka Savola

On Wed, 12 Jul 2006, Spencer Dawkins wrote:

2.  Focus on document relationships

 Today, users of IETF standards have no way to unambiguously identify
 the complete current set of specifications for a given standard.  In
 particular, there is no effective structured document identification
 scheme and no systematic approach to documenting the relationship
 between various parts and versions of a standard.

 This issue is best illustrated by example.

Actually, the IPv4 example in the document is quite good, but looking at 
dependency graphs like http://rtg.ietf.org/~fenner/ietf/deps/viz/ipv6.pdf 
(for IPv6, but that's

also interesting) is an even better illustration. Or
http://rtg.ietf.org/~fenner/ietf/deps/viz/sip.pdf, for SIP.


Is there an expectation that the IETF should define which 
specifications should be implemented to constitute implements IPv6, 
implements SIP, or whatever?


I guess folks have since abandoned the concept of IETF deciding on 
behalf of users and vendors which features are necessary in a given 
scenario or trying to determine what needs to be implemented to 
interoperate with already deployed implementations.


Don't get me wrong, I love documents like 
draft-ietf-tcpm-tcp-roadmap-06.txt.  They just take a long time and 
significant energy to produce.  However, the main purpose (AFAICS) of 
those documents is not to specify which specifications must be 
implemented to interoperate, so many of the arguments of 
newtrk-questions section 2 do no apply.


--
Pekka Savola You each name yourselves king, yet the
Netcore Oykingdom bleeds.
Systems. Networks. Security. -- George R.R. Martin: A Clash of Kings

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: netwrk stuff

2006-07-12 Thread Pekka Savola

On Wed, 12 Jul 2006, Iljitsch van Beijnum wrote:
I can't believe that I just raised my hand after who is willing to work on 
this tomorrow... But here is the abstract, let me know if I should write the 
rest:

...

I'm not sure if Brian was serious about writing, as there are numerous 
proposals already [1], every one of them simplifying the current 
situation.  Having half a dozen _more_ choices probably would not help 
in figuring how to go forward.


[1] hit 'newtrk' in I-D tracker [2]. My personal favourite is 
draft-atkinson-newtrk-twostep-00.txt, which seems to strike a good 
balance between stripping out useless process but keeping at least 
some features (revision based on implementation experience, etc.) 
which at least I have found useful.


[2] there are even more expired ones..

--
Pekka Savola You each name yourselves king, yet the
Netcore Oykingdom bleeds.
Systems. Networks. Security. -- George R.R. Martin: A Clash of Kings

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Bad IPv6 connectivity to commercial networks

2006-07-11 Thread Pekka Savola

On Tue, 11 Jul 2006, Iljitsch van Beijnum wrote:
traceroute6 to www.isc.org (2001:4f8:0:2::d) from 
2001:510:102:100:20a:95ff:fecd:987a, 30 hops max, 12 byte packets

1  2001:510:102:100:206:d6ff:fe0f:b806  2.201 ms  7.626 ms  1.444 ms
2  2001:410:101:13::1  1.846 ms  1.736 ms  3.85 ms
3  2001:410:101:5::1  24.331 ms  24.983 ms  102.792 ms
4  2001:410:101:30::2  239.214 ms  96.351 ms  96.318 ms
5  2001:320:1b00:1::1  210.57 ms  210.528 ms  210.714 ms
6  2001:320:1a05::10  211.26 ms  220.1 ms  210.472 ms
7  2001:320:1a05::20  211.47 ms  254.317 ms  211.431 ms
8  2001:320:1a09::1  214.655 ms  214.478 ms  214.43 ms
9  2001:320:1a07::2  216.013 ms  216.143 ms  215.784 ms



FWIW, I complained about this issue (lack of commercial 
peering/transit, e.g., NTT or GBLX or their customers) to RISQ and 
Canarie (v6 upstreams) on Saturday, but have seen no response or 
improvement.


Routing to Europe or the US through various networks in Japan leaves 
room to improvement..


(Connectivity to academic networks is excellent, though..)

--
Pekka Savola You each name yourselves king, yet the
Netcore Oykingdom bleeds.
Systems. Networks. Security. -- George R.R. Martin: A Clash of Kings

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: IETF IPv6 platform configuration

2006-06-12 Thread Pekka Savola

On Mon, 12 Jun 2006, Kevin Loch wrote:

Sam Hartman wrote:

secIETF == IETF Secretariat [EMAIL PROTECTED] writes:
secIETF *	Only HTTP, SMTP, FTP, and DNS traffic are permitted 
through an IPv6 secIETF Native firewall (pings, traceroutes 
etc. are dropped) 


Please make sure that ICMP messages needed for path MTU discovery are
not filtered.


Is there a compelling reason to filter ICMP at all?


IMHO, this is a valid question.

There also happens to be a document, 
draft-ietf-v6ops-icmpv6-filtering-recs-00.txt that discusses this very 
issue.  It might be interesting to have folks read that and provide 
feedback to v6ops list (v6ops@ops.ietf.org) if they think there's 
something amiss with it.


The document just passed WG LC.

--
Pekka Savola You each name yourselves king, yet the
Netcore Oykingdom bleeds.
Systems. Networks. Security. -- George R.R. Martin: A Clash of Kings

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: Last Call: 'A Process Experiment in Normative Reference Handling' to Experimental RFC (draft-klensin-norm-ref)

2006-06-12 Thread Pekka Savola

On Mon, 12 Jun 2006, John C Klensin wrote:

FWIW, I still think the approach in the draft is a good idea
given that...

(1) We have not been able to get consensus eliminating a
multistep standard process.   For reasons explained elsewhere, I
personally consider that eliminating that process would be a bad
idea, but that is another discussion.   The present reality is
that we don't have that consensus and that blocking incremental
improvements within it is a strange form of see if we can make
things worse so as to build momentum for a more basic change.
I don't believe in that style of doing things.

(2) We have had repeated claims that the downref issue is a
major cause of perceived IETF slowness in getting documents out
and, especially, of getting documents to advanced maturity
level.  I think that validating (or invalidating) those claims
would be helpful as a goal in itself.  If it results in a
significant number of documents being advanced, that would be a
good thing.  If it results in few or no documents being
advanced, then we know that particular argument is not a
significant part of the picture, and that would, itself, be
useful.


FWIW, I also agree with these and that running the experiment is a 
good idea.  I don't think I'd want to eliminate downref rule 
completely, but this would seem to allow explicit acknowledgement 
and/or justification of each downref, which would seem like a good 
enough for an experiment and not that much work.


--
Pekka Savola You each name yourselves king, yet the
Netcore Oykingdom bleeds.
Systems. Networks. Security. -- George R.R. Martin: A Clash of Kings

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


  1   2   3   >