IESG appointment to the IETF Trust

2020-03-15 Thread Suresh Krishnan
According to recently approved procedures for populating the IETF Trust 
described in RFC 8714, the IESG is required to appoint one person to the IETF 
Trust for a two-year term to begin in March 2020. After careful consideration, 
the IESG has decided to reappoint Stephan Wenger to this position. 

The IESG would like to congratulate Stephan and thank him for volunteering for 
this task. We would also like to thank all the candidates who accepted 
nominations to this position, and everyone from the community who provided 
feedback to the IESG on these candidates.

On behalf of the IESG,
Suresh Krishnan
Internet Area Director
___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce


Call for feedback: IESG appointment to the IETF Trust

2020-01-22 Thread Suresh Krishnan
The IESG is responsible for appointing one person to the IETF Trust for a 
two-year term to begin in March 2020. A call for nominations was sent out and 
the following candidates have accepted a nomination:

o Stephan Wenger, currently serving as the IESG appointee on a one year term
o Hago Dafalla
o Michael Richardson

(We also had one more candidate, Glenn Deen, who had accepted a nomination but 
has since been selected as the Nomcom appointee for the IETF Trust)

Please send feedback about these three candidates to suresh.krish...@gmail.com. 
This feedback will be held in confidence by the IESG. Please provide the 
feedback by February 6, 2020.

We thank you in advance for your help.  

On behalf of the IESG,
Suresh Krishnan
Internet Area Director
___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce


Reminder: Call for nominations: IESG appointment to the IETF Trust

2019-12-19 Thread Suresh Krishnan
The purpose of the IETF Trust is to acquire, hold, maintain, and license 
certain existing and future intellectual property and other property used in 
connection with the administration of the IETF 
<​https://tools.ietf.org/html/rfc4371 <https://tools.ietf.org/html/rfc4371>>. 
More information about the IETF Trust can be found at 
<​https://trustee.ietf.org/ <https://trustee.ietf.org/>>.

According to recently approved procedures for populating the IETF Trust 
<​https://tools.ietf.org/html/draft-ietf-iasa2-trust-update-03 
<https://tools.ietf.org/html/draft-ietf-iasa2-trust-update-03>>, the IESG is 
required to appoint one person to the IETF Trust for a two-year term to begin 
in March 2020.


DESIRABLE QUALIFICATIONS AND SELECTION CRITERIA

The Trust is mostly a quiet organization, and being a trustee generally 
involves little work beyond quarterly online meetings. Trustees ideally should 
be:

o Familiar with copyright and trademark law. 

o Familiar with the RFC publication process as described in RFC 6635 and 
related documents. 

o Familiar with the Trust's copyright licenses and with RFCs 5377 and 5378. 

o Willing to serve multiple terms as a trustee to provide continuity of 
oversight.


NOMINATIONS AND ELIGIBILITY

The IESG is making a public call for nominations. Self-nominations are 
permitted. All IETF participants, including working group chairs, IETF NomCom 
members, IAB members, IESG members, and candidates for the IETF LLC Board are 
eligible for nomination. Of course, IESG members who accept nomination will 
recuse themselves from selection discussions. Persons who are under 
consideration by the Nomcom in the 2019-2010 cycle for the open IETF Trust 
position are also welcome to apply. Please send nominations to iesg at ietf.org 
<http://ietf.org/>. Please include the following with each nomination:

o Name

o Contact information

o Candidate background and qualifications


SELECTION

The IESG will publish the list of nominated persons prior to making a decision, 
allowing time for the community to provide any relevant comments to the IESG.

The IESG will review the nomination material, any comments provided by the 
community, and make a selection.


CARE OF PERSONAL INFORMATION

The following procedures will be used in managing candidates' personal 
information:

o The list of candidate names will be published at the close of the nominations 
period. A candidate that refuses the nomination will not be included on the 
list.

o Except as noted above, all information provided to the IESG during this 
process will be kept as confidential to the IESG.


TIMEFRAME

The nominations period opened on December 5, 2019 and will close on January 5, 
2020.

The list of candidates will be posted shortly after the close of nominations, 
and the community will then have two weeks to provide comments on the 
candidates to the IESG.

The IESG will consider the community feedback and make its decision. If the 
candidate pool overlaps with the NomCom's IETF Trust candidate pool, the IESG 
will wait to announce a selection until the Nomcom announces its selections for 
the IETF Trust, to avoid a race condition.

On behalf of the IESG,
Suresh Krishnan
Internet Area Director

___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce


Call for nominations: IESG appointment to the IETF Trust

2019-12-05 Thread Suresh Krishnan
The purpose of the IETF Trust is to acquire, hold, maintain, and license 
certain existing and future intellectual property and other property used in 
connection with the administration of the IETF 
<​https://tools.ietf.org/html/rfc4371 <https://tools.ietf.org/html/rfc4371>>. 
More information about the IETF Trust can be found at 
<​https://trustee.ietf.org/ <https://trustee.ietf.org/>>.

According to recently approved procedures for populating the IETF Trust 
<​https://tools.ietf.org/html/draft-ietf-iasa2-trust-update-03 
<https://tools.ietf.org/html/draft-ietf-iasa2-trust-update-03>>, the IESG is 
required to appoint one person to the IETF Trust for a two-year term to begin 
in March 2020.


DESIRABLE QUALIFICATIONS AND SELECTION CRITERIA

The Trust is mostly a quiet organization, and being a trustee generally 
involves little work beyond quarterly online meetings. Trustees ideally should 
be:

o Familiar with copyright and trademark law. 

o Familiar with the RFC publication process as described in RFC 6635 and 
related documents. 

o Familiar with the Trust's copyright licenses and with RFCs 5377 and 5378. 

o Willing to serve multiple terms as a trustee to provide continuity of 
oversight.


NOMINATIONS AND ELIGIBILITY

The IESG is making a public call for nominations. Self-nominations are 
permitted. All IETF participants, including working group chairs, IETF NomCom 
members, IAB members, IESG members, and candidates for the IETF LLC Board are 
eligible for nomination. Of course, IESG members who accept nomination will 
recuse themselves from selection discussions. Persons who are under 
consideration by the Nomcom in the 2019-2010 cycle for the open IETF Trust 
position are also welcome to apply. Please send nominations to iesg at ietf.org 
<http://ietf.org/>. Please include the following with each nomination:

o Name

o Contact information

o Candidate background and qualifications


SELECTION

The IESG will publish the list of nominated persons prior to making a decision, 
allowing time for the community to provide any relevant comments to the IESG.

The IESG will review the nomination material, any comments provided by the 
community, and make a selection.


CARE OF PERSONAL INFORMATION

The following procedures will be used in managing candidates' personal 
information:

o The list of candidate names will be published at the close of the nominations 
period. A candidate that refuses the nomination will not be included on the 
list.

o Except as noted above, all information provided to the IESG during this 
process will be kept as confidential to the IESG.


TIMEFRAME

The nominations period will open on December 5, 2019 and close on January 5, 
2020.

The list of candidates will be posted shortly after the close of nominations, 
and the community will then have two weeks to provide comments on the 
candidates to the IESG.

The IESG will consider the community feedback and make its decision. If the 
candidate pool overlaps with the NomCom's IETF Trust candidate pool, the IESG 
will wait to announce a selection until the Nomcom announces its selections for 
the IETF Trust, to avoid a race condition.

On behalf of the IESG,
Suresh Krishnan
Internet Area Director

___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce


Re: IETF Diversity

2013-06-18 Thread Suresh Krishnan
Hi Phil,

On 06/18/2013 02:08 PM, Phillip Hallam-Baker wrote:
 When I make a statement at the microphone and then have multiple people
 come to thank me afterwards for making that point I don't consider it
 pontificating.
 
 I do however consider your own response to be an example of the type of
 exclusionary behavior that I was talking about. Dismissing those
 concerns as 'pontificating' does not help matters. And you have no idea
 what actions I have taken to attempt to recruit people to get involved. 
 
 The issue was raised in the IETF plenary I would have expected mention
 of a followup mailing list to be made here on the ietf discussion list. 

Apologies. The announcement of the diversity list was sent to the IETF
announcement list and not the discussion list. The diversity list can be
found here as Dave C. mentioned.

https://www.ietf.org/mailman/listinfo/diversity

Thanks
Suresh




Diversity: Call for community input

2013-06-17 Thread Suresh Krishnan
Hi all,

The diversity design team is working on mechanisms to increase
the range of perspectives within the IETF, while maintaining high
standards of quality.

Our goal is to help improve the composition and dynamic of the
IETF, by finding ways to incorporate a wide range of perspectives
within the IETF, and specifically in the IETF management teams.
One way of achieving this is to ensure that participants differ
along many different personal, social, and professional
attributes. The expectation is that the greater range of
perspectives leads to considering issues more deeply and with
more sensitivity.

Community feedback is the most important input that helps us
determine the aspects are currently working well in the IETF in
this regard and those that are not. We cannot properly execute
the task of proposing new mechanisms or modifying existing
mechanisms to further these goals without **your** participation
and feedback.

We would like to help the IETF management make choices that
maximize the IETF's ability to include and encourage all
interested participants, and maximize their contributions to IETF
work.

On that basis, we are seeking input from people based on their
personal experiences about

* actions and activities that have worked well to improve the
  inclusiveness of the IETF process

* actions and activitiets that have not worked well to improve
  the inclusiveness of the IETF process

* actions and activities that have worked *against* inclusiveness
  of the IETF process

If you have experience with other technology based organisations
that have broad consultation practices, we would also like to
hear about examples of actions taken that work well to include
participation from diverse communities

Please provide us your input by sending an email to the diversity
design team at diversity...@ietf.org . You can provide
**anonymous** feedback by contacting either of the design team
leads Suresh Krishnan suresh.krish...@ericsson.com and Kathleen
Moriarty kathleen.moria...@emc.com who will anonymize it for
the rest of the members.

Thanks
Suresh Krishnan  Kathleen Moriarty
for the diversity design team

Design team members
===

Narelle Clark
Dave Crocker
Aaron Yi Ding
Lars Eggert
SM
Monique Morrow
Hugo Salgado
Arturo Servin
Margaret Wasserman
Scott Weeks


Re: Gen-ART review of draft-ietf-intarea-nat-reveal-analysis-05

2013-03-10 Thread Suresh Krishnan
Hi Peter,
  Thanks a lot for your review. I will ask the authors to address your
comments in the next version of the draft.

Regards
Suresh

On 03/09/2013 03:13 AM, Peter Yee wrote:
 I am the assigned Gen-ART reviewer for this draft. For background on
 Gen-ART, please see the FAQ at
 http://wiki.tools.ietf.org/area/gen/trac/wiki/GenArtfaq
 
 Document: draft-ietf-intarea-nat-reveal-analysis-05
 Reviewer: Peter Yee
 Review Date: Mar-08-2013
 IETF LC End Date: Mar-08-2013
 IESG Telechat date: TBD
 
 Summary: This draft is on the right track but has open issues, described in
   the review. [Ready with issues.]
 
 This draft catalogs and analyzes various means of supplying a host
 identifier to a
 
 remote server when Carrier Grade NAT or similar host obscuring technology
 is in use.
 
 General: There were sentences in the draft that I could not parse even in
 the context
 of surrounding text.  That's primarily why I'm marking this draft as
 Ready with
 issues.  These sentences are supplied below.  Mostly, the document has a
 fair number
 of nits.  The general concept is fine.
 
 General: hyphenate uses of address sharing when it used as an adjective.
  For
 example, address-sharing device.
 
 General: expand acronyms on first use except if they are really well known
 in
 our community (e.g., TCP/IP) or where they appear in the abstract.
 Examples of
 acronyms in need of expansion are HIP, XFF, S.
 
 General: You will probably want to resolve Internet Draft references to
 something
 more permanent.
 
 General: The term broken should be replaced with something more specific
 or useful.
 I've made some suggestions below.
 
 Section 1, 2nd paragraph, last sentence: delete an before information.
 
 Section 1, 3rd paragraph: change are to include.
 
 Section 1, 3rd paragraph: change customers unsatisfaction to and
 customers' dissatisfaction.
 
 Section 2, 1st paragraph, 2nd sentence: delete an before extra.
 Change than to
 beyond.
 
 Section 2, 1st paragraph, 3rd sentence: replace this sentence with We
 call this
 information the HOST_ID.
 
 Section 2, 2nd paragraph: add a serial comma after subscriber.  Serial
 comma use in
 the draft was inconsistent.
 
 Section 2, 3rd paragraph, 3rd sentence: I'm not sure why the HOST_ID and
 public IP address would be relatively unique.  Assuming that HOST_IDs
 are unique amongst
 the hosts hidden behind the public IP address and the public IP address is
 unique,
 I would have thought that the combination was globally unique.  My
 confusion may arise
 from the 4th sentence which is incomplete.  Perhaps those two sentences
 could be
 rewritten for clarity.
 
 Section 2, 4th paragraph, 1st sentence: change put to conveyed.
 
 Section 2, 4th paragraph, 2nd sentence: change put to conveyed.
 
 
 Section 3, 2nd paragraph, 1st sentence: considering using
 identifiability instead of
 uniqueness.
 
 Section 3, 2nd paragraph, 2nd sentence: replace which with what.
 
 Section 3,1, 4th paragraph: add a comma after re-write.  Change
 re-write to
 rewrite.
 
 Section 3.1, 5th paragraph: I don't quite follow what's being said here.
 Is the point that the address-sharing function should reveal the same
 HOST_ID for any given host
 regardless of what layer or mechanism that HOST_ID is being conveyed
 across?  How does
 this relate to interference between HOST_IDs?
 
 Section 4.1.1, 1st paragraph, 1st sentence: delete an before
 information.
 
 Section 4.1.1, 1st paragraph, 3rd sentence: insert , there are after
 hence.
 
 Section 4.1.1, 4th paragraph, consider replacing with: Address-sharing
 devices using
 this solution would be required to indicate that out of band, possibly
 using a special
 DNS record.
 
 Section 4.1.2, 3rd paragraph, 2nd sentence: add a comma after scenario.
 Change broken to ill-advised.
 
 Section 4.2.1, 1st paragraph, 2nd sentence: add A  at the beginning of
 the sentence.
 
 Section 4.2.1, 1st paragraph, 4th sentence: rewrite as This IP option
 allows the
conveyance of an IPv4 address, an IPv6 prefix, a GRE key, an IPv6 Flow
 Label, etc.
 
 Section 4.2.1, 2nd paragraph: insert an before IP.
 
 Section 4.2.2, 1st paragraph, 1st sentence: change for to to.
 
 Section 4.2.2, 1st paragraph, 2nd sentence: use of the term filter in
 this sentence
 is not clear.  Do you mean that that routes and middleboxes remove the IP
 options?  Or
 that they remove packets with IP options?  Or that they take other actions
 based on the
 presence of IP options?  Please clarify.
 
 Section 4.2.2, 2nd paragraph: replace As a with In.  Define
 host-hint somewhere.
 Is it meant to be equivalent to HOST_ID?
 
 Section 4.3.1, 3rd sentence: change their to its both places in the
 sentence.
 Insert or before subscriber.
 
 Section 4.3.2, 2nd paragraph, 2nd sentence: insert a before HOST_ID
 
 Section 4.3.2, 2nd paragraph, 3rd sentence: change in host to on the
 host.  Insert
 the before address, and add a comma after function.
 
 Section 4.3.2, 1st bullet item: this is the IETF.  We 

Re: Barely literate minutes

2012-11-30 Thread Suresh Krishnan
On 11/29/2012 05:27 PM, Randy Bush wrote:
 As a document author, I've learned that I need to have a friend take
 good notes for me, because all of the great comments I get at the mike
 are lost otherwise.
 
 this gap makes me crazy, so much is often lost.  but i do not think
 technology or process will close this hole.  too much depends on fairly
 deep understanding of the subject.
 
 I can't take notes while I'm standing up, facilitating discussion.

+1.

 
 i can't take notes while i am trying to understand and think about the
 important semantics of a discussion, period.  but much of this may be a
 personal failing, poor typist, rotting mind, ...

I have this same issue as well. If I need to participate in a few
discussions in the wg I decline to take minutes there as I do not
believe I could do a good job with the minutes.

For the record, as a minute taker, it takes me approximately 2x meeting
time to come up with the minutes (I go back to the audio to fill in
gaps, send individual mails to commenters to better understand their
comments etc.) in addition to *almost completely* missing participation
in the meeting.

Thanks
Suresh



Re: NomCom: Call for Nominations - IAOC Mid-Term Vacancy

2012-11-20 Thread Suresh Krishnan
Hi Eric,

On 11/20/2012 10:20 AM, Eric Gray wrote:
 I think this is a point of confusion, anyway.
 
  
 
 I thought the process was for the previous NomCom to be coopted to
 address any
 
 unexpected mid-term vacancies, rather than to add the burden to the current
 
 NomCom.

The previous Nomcom stayed constituted until the Atlanta meeting. If the
vacancy was announced before Atlanta, the previous Nomcom would have
filled the position. Right now, there is only one constituted Nomcom and
it has to fill the position.

Thanks
Suresh



Re: NomCom: Call for Nominations - IAOC Mid-Term Vacancy

2012-11-20 Thread Suresh Krishnan
Hi Eric,

On 11/20/2012 10:20 AM, Eric Gray wrote:
 I think this is a point of confusion, anyway.
 
  
 
 I thought the process was for the previous NomCom to be coopted to
 address any
 
 unexpected mid-term vacancies, rather than to add the burden to the current
 
 NomCom.

The previous Nomcom stayed constituted until the Atlanta meeting. If the
vacancy was announced before Atlanta, the previous Nomcom would have
filled the position. Right now, there is only one constituted Nomcom and
it has to fill the position.

Thanks
Suresh



Re: Change in I-D announcement format

2012-10-24 Thread Suresh Krishnan

Hi Tom,

On 10/24/2012 09:28 AM, t.p. wrote:

And now there seems to be another unannounced change, in that in
addition to the usual announcement format e-mails, there may also be, or
may not be, the appearance seems random, of


Not so random. I noticed that the New Version Notification mails are 
sent to you if you are


a) A co-author/editor of a newly submitted draft
b) A wg chair for a newly submitted version of a WG document
c) Other situations that do not apply to me :-)

Thanks
Suresh



Subject: New Version Notification -

e-mails.  This may or may not be an improvement, depending on how long
it takes me to work out what is happening and whether or not I then like
my conclusion.  And whether or not what I rely on is still available.

Tom Petch




Re: Last Call: draft-ietf-6man-lineid-05.txt (The Line Identification Destination Option) to Experimental RFC

2012-06-08 Thread Suresh Krishnan
Hi Med,

On 06/06/2012 08:04 AM, mohamed.boucad...@orange.com wrote:
 Dear Suresh, all,
 
 Even if the document includes several warnings about the unreliability of an 
 RS-based mechanism, I suggest to add a pointer to the following document:
 http://tools.ietf.org/html/draft-dec-6man-rs-access-harmful-00. 

Is there something in particular that you think is missing from the
lineid draft? The current warning text in lineid (and the
reclassification to experimental) was arrived at after consultations
with the the 6man chairs and the author of draft-dec.

Thanks
Suresh


Re: NomCom 2011-2012 feedback

2011-11-01 Thread Suresh Krishnan
Hi John,
  Thanks for your comments. Please see my response inline.

On 11-11-01 04:48 PM, John C Klensin wrote:
 
 
 --On Sunday, October 30, 2011 23:01 -0400 Suresh Krishnan
 suresh.krish...@ericsson.com wrote:
 
 I noticed that the term transparency of the process only
 appears in  two of the three questionnaires.  Is there a
 reason for the omission?

 The omission is intentional. The text in question
 (transparency of the process) is about the handling of
 appeals. Since the IAOC is not involved in the handling of
 appeals the text does not appear in the IAOC questionnaire,
 
 But, Suresh, one of the more critical issues faced by the IAOC
 is precisely about transparency of process, even if it is not
 about appeals.  The IESG and IAB have gotten hugely better about
 transparency in recent years -- narrative minutes and much more
 tracking that is available to the community for the former and
 clear opportunities for community review and feedback on
 documents and other important actions for the latter.  I think
 the Nomcom should understand how candidates feel about that sort
 of transparency, but I wouldn't expect anyone to tell you that
 more secrecy would be in order.

I agree with you, but I was not talking about whether transparency of
process would be good for the IAOC or not. I was answering the question
on why the text about handling appeals (that includes the words in
question) only occurs on the IAB and IESG questionnaires. That is why I
requested SM to send this feedback to the nomcom so that the *voting
members* can decide whether this is something they want to consider
during their evaluations. The voting members do want to listen to what
the community considers important and they can only do that if people
provide their feedback. I request you to send a note to the
nomco...@ietf.org list with your views so that all the voting members
can be apprised.

Thanks
Suresh
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: NomCom 2011-2012 feedback

2011-10-31 Thread Suresh Krishnan
Hi SM,

On 11-10-29 11:14 AM, SM wrote:
 Dear 2011-2012 nominating committee members,
 
 You requested feedback from the IETF community for positions on the 
 IESG, IAB and IAOC.  As none of the candidates shared their views 
 about a simple question that was asked on the IETF mailing list, I 
 gather that none of them are reading the mailing list.  I am in two 
 minds about whether to provide feedback or not.  I'll share with you 
 why the decision is not so easy.

If you feel that the position of the nominees on a specific issue is
important to know, please send us a note about the issue and why you
think it is important.

 
 There is this thing called social networks.  They provide an 
 important service as they enable little girls to keep us abreast of 
 their state of well-being.  You can even click on an I Like button 
 to provide input about hotness.  It is easier to determine whether 
 the candidates would make an informed decision if they share their 
 views on an IETF mailing list.
 
 I noticed that the term transparency of the process only appears in 
 two of the three questionnaires.  Is there a reason for the omission?

The omission is intentional. The text in question (transparency of the
process) is about the handling of appeals. Since the IAOC is not
involved in the handling of appeals the text does not appear in the IAOC
questionnaire,

Thanks
Suresh
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: What? This thread is talking about *voting* now?

2011-10-28 Thread Suresh Krishnan
Hi SM,

On 11-10-27 08:09 AM, SM wrote:
 This year's NomCom has members from:
 
 North America  5
   Cisco.com2
   Juniper.net  2
   Avaya.com1
 
 Europe 2
   Nokia.com1
   NLnetlabs.nl 1
 
 Asia   3
   Huawei.com   2
   Chinamobile.com  1

The correct numbers are

North America: 3
Europe: 4
Asia: 3

In the nomcom case, the members with the cisco.com addresses are from
Europe. :-)

Thanks
Suresh
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Nomcom

2011-10-28 Thread Suresh Krishnan
Hi John,
  Just responding to one specific concern (No. 3) you raised. I do
believe that the other 3 (Nos. 1, 2 and 4) require process changes that
cannot take place during the current nomcom cycle.

On 11-10-27 11:25 AM, John C Klensin wrote:
 ...snipped...
 (3) I don't believe it has happened this year, but trends in the
 community predict that, sooner or later, we will have someone
 volunteer for a large number of positions simply because he or
 she (or whomever they work for) wants them in the IETF
 leadership.   Someone ought to be able to write one comment that
 says Goofy wants to be in the leadership to enhance his resume
 and told several of us that at a Bar BOF and should not be
 selected for _any_ position.  If you don't believe me alone,
 check with X, Y, or Z.  In the current model, that would
 require writing a separate review for each position.  Lots of
 make-work; might not happen at all.   But a Nomcom would really
 want that input I think.

You can already do this today. Just enter your feedback about the
nominee into *any* one of the positions and state that it is for all the
positions. The tool does not handle this case, but the humans behind
certainly do.

Thanks
Suresh
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-gundavelli-v6ops-pmipv6-address-reservations-00.txt (Reserved IPv6 Interface Identifier for Proxy Mobile IPv6) to Informational RFC

2011-09-22 Thread Suresh Krishnan
Hi Sri,

On 11-09-21 08:44 PM, Sri Gundavelli wrote:
 Two MAG's in the same broadcast domain can be ruled out, as there is no
 mechanism for the nodes to decide on who should support the attached MN.
 More over, we still have the P2P link assumption and so multiple MAG's in
 the same broadcast domain is not possible. So, we are fine on this aspect.
 Stepping back a bit, IMO, 5453 issue is not applicable for the P2P link and
 given that its a managed mobility domain. So, I wonder, if the concern is
 valid in PMIPv6 context ?

I don't think that the concern is applicable in the PMIPv6 P2P link
context. That is why I was fine with either of the methods for getting
the IID.

Thanks
Suresh
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-gundavelli-v6ops-pmipv6-address-reservations-00.txt (Reserved IPv6 Interface Identifier for Proxy Mobile IPv6) to Informational RFC

2011-09-21 Thread Suresh Krishnan
Hi Jari,

On 11-09-19 02:35 AM, Jari Arkko wrote:
 Following up with a personal comment.
 
 The draft allocates an interface ID and an EUI-64 MAC identifier from the 
 IANA block. These are two separate, unrelated allocations.
 
 The main criticism in RFC 5453 for making additional interface ID allocations 
 is that old implementations do not know about them and may collide when 
 making an allocation. I'm wondering if it would be better to allocate an 
 interface ID that is based on the allocated EUI-64 identifier per RFC 2464? 
 Then we would at least use the same format as other interface IDs and a 
 collision would likely mean inappropriate use of the IANA EUI-64 identifiers. 
 Note that privacy and cryptographic addresses set the u/l bit to zero, 
 whereas EUI-64 interface IDs usually have it at one. Sri's draft is silent on 
 what kind of number should be allocated for the interface ID, perhaps some 
 guidance here would be useful.

This sounds like a great idea. I am not sure that IANA has a reserved
EUI-64 block like you suggested, but they certainly have a ethernet
address block (MAC-48). We can instruct the IANA to assign a MAC address
that maps straight into the IID. e.g.

00-00-5E-00-03-00

and the IID

0200:5eff:fe00:0300

Thanks
Suresh
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-gundavelli-v6ops-pmipv6-address-reservations-00.txt (Reserved IPv6 Interface Identifier for Proxy Mobile IPv6) to Informational RFC

2011-09-21 Thread Suresh Krishnan
Hi Sri,

On 11-09-19 01:29 PM, Sri Gundavelli wrote:
 Hi Jari:
 
 In case of PMIPv6, we need the interface ID allocation for PMIv6
 domain-wide usage. We may not be able tie this to a specific EUI-64
 identifier derived from a MAC identifier of any individual MAG hosting this
 configuration. 
 
 But, if your recommendation is to tie the IPv6 interface identifier to the
 reserved link-layer identifier (the other IANA action), that should be fine.
 But, the reserved block that Suresh has in his spec is not tied to any
 EUI-64 block ? That implies, we need an interface ID allocation from a new
 block ? Or, recommend the node to generate the interface ID based on the
 reserved Mac address and not allocate from the block Suresh created ?

There are two ways by which you can get a stable reserved IID. One by
reserving an IID block using an IANA registry and the other by getting a
stable MAC48 that can be used to create an IID. The only danger with
getting a stable MAC48 is that if you happen to have 2 MAGs in the same
broadcast domain, it will lead to issues.

Thanks
Suresh
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-gundavelli-v6ops-pmipv6-address-reservations-00.txt (Reserved IPv6 Interface Identifier for Proxy Mobile IPv6) to Informational RFC

2011-08-03 Thread Suresh Krishnan

Hi Alex,

On 11-07-29 09:02 AM, Alexandru Petrescu wrote:

I do think that pmipv6 has some issues about how it does mag-mn
interface.  One solution to one issue may be this reserved iid.

Is this updating the stds track rfc5453 reserved iids?


No. It does not. RFC5453 explicitly sets up an IANA registry for setting 
up such IDs. This draft just uses that IANA registry.


Thanks
Suresh
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Nomcom 2011-2012: Second Call for Volunteers

2011-06-24 Thread Suresh Krishnan

This is the Second call for Volunteers for the 2011-12 Nomcom.  We are
just about halfway through the volunteer period so if you are considering
volunteering, please do so very soon.

We have had a very good response to the initial call for volunteers and
I am pleased to report that we have 50 volunteers thus far whose
qualifications have been confirmed by the secretariat. I have notified
each of these volunteers by email.

However, we would like to have many more volunteers. The more volunteers,
the better chance we have of choosing a random yet representative cross
section of the IETF population. You have until 11:59 pm EDT July 10, 2011
to volunteer for Nomcom but it would be much better if you can volunteer
as early as possible.

If you volunteered before 21:00 EDT on June 21 to serve as a voting member
and have not received a confirmation email from me, please re-submit and
bring to my attention right away!

Details about the process for volunteering for the Nomcom and the list
of open positions for which the nominating committee is responsible are
summarized in the initial announcement:

https://datatracker.ietf.org/ann/nomcom/2938/

The 50 volunteers who have thus far been qualified by the secretariat
are:

Alia Atlas , Juniper Networks
Lixia Zhang , UCLA
Wassim Haddad  , Ericsson
Glen Zorn , Network Zen
Richard Barnes , BBN Technologies
Stephen Kent , BBN Technologies
Scott Mansfield , Ericsson
Tina TSOU , FutureWei Technologies
Fernando Gont , UTN/FRH
Karen Seo , BBN Technologies
Jie Dong , Huawei Technologies
Mach Chen , Huawei Technologies Co.
Sheng Jiang , Huawei Technologies Co. Ltd.
Dimitri Papadimitriou , Alcatel-Lucent
Thomas D. Nadeau , CA Technologies
David Meyer , Cisco Systems/University of Oregon
Wesley George , Time Warner Cable
Cullen Jennings , Cisco
Stephen Hanna , Juniper Networks
Stephan Wenger , Bidyo
Keyur Patel , Cisco Systems
Michael Hamilton , BreakingPoint Systems
Behcet Sarikaya , Huawei USA
Mark Townsley , Cisco Systems
Fred Baker , Cisco Systems
Brian Trammell , ETH Zurich
Sam Hartman , Painless Security
Chris Griffiths , Comcast
George Michaelson , APNIC
Jiankang Yao , CNNIC
Sohel Khan , Comcast
Dacheng Zhang , Huawei
Lianshu Zheng , Huawei Technologies
Hui Deng , China Mobile
Gang Chen , China Mobile
Mirja Kuhlewind , University of Stuttgart
John E Drake , Juniper Networks
Matt Lepinski , BBN Technologies
Subir Das , Telcordia Technologies Inc
Yi Zhao , Huawei
John Scudder , Juniper Networks
Christer Holmberg , LM Ericsson
Teemu Savolainen , Nokia
Samita Chakrabarti , Ericsson
Jaap Akkerhuis , NLnet labs
Jason Weil , Time Warner Cable
Randy Bush , Internet Initiative Japan
Christian Schmidt , Nokia Siemens Networks
Sean Shen , CNNIC
Lou Berger , LabN Consulting

The primary activity for this nomcom will begin during IETF-81 in
Quebec City and should be completed by January 2012. The nomcom will
be collecting requirements from the community, as well as talking to
candidates and to community members about candidates. There will be
regularly scheduled conference calls to ensure progress. Thus, being a
nomcom member does require some time commitment.

Please volunteer by sending an email to me before
11:59 pm EDT July 10, 2011 as follows:

To: suresh.krish...@ericsson.com
Subject: Nomcom 2011-12 Volunteer

Please include the following information in the body of the mail:

Full Name:  // As you enter in the IETF Registration Form,
// First/Given name followed by Last/Family Name

Current Primary Affiliation: // typically what goes in the Company
 // field in the IETF Registration Form

Email Address(es): // all email addresses used to Register for the
   // past 5 IETF meetings
   // Please designate a Preferred email address for
   // contact if there is more than one email address

Telephone number:  // With country code (for confirmation if selected)

Please expect an email response from me within 3 business days stating
whether or not you are qualified.  If you do not receive a response in
this timeframe, please re-send your email with the tag RESEND: added
to the subject line.

If you are not yet sure you would like to volunteer, please consider
that Nomcom members play a very important role in shaping the
leadership of the IETF.  Ensuring the leadership of the IETF is fair
and balanced and comprised of those who can lead the IETF in the right
direction is an important responsibility that rests on the IETF
participants at large. Volunteering for the Nomcom is a good way of
contributing in that direction.

I will be publishing a more detailed target timetable, as well as
details of the randomness seeds to be used for the RFC 3797 selection
process within the next few days.

Thank you in advance for your participation.

Suresh Krishnan
Nomcom Chair 2011-2012
Email: nomcom-ch...@ietf.org, suresh.krish...@ericsson.com

___
IETF-Announce

Nomcom 2011-12: Call for Volunteers

2011-06-13 Thread Suresh Krishnan

Hi All,
  The Nomcom process for 2011-2012 has started. Please go through the 
message below and consider volunteering for the Nomcom.


Thanks
Suresh


 Original Message 
Subject: Nomcom 2011-12: Call for Volunteers
Date: Fri, 10 Jun 2011 22:56:06 -0400
From: NomCom Chair nomcom-ch...@ietf.org
To: IETF Announcement list ietf-annou...@ietf.org

The IETF nominating committee process for 2011-12 has begun. The IETF
nominating committee appoints folks to fill the open slots on the
IAOC, the IAB, and the IESG. The 10 nominating committee members are
selected randomly from a pool of volunteers. The more volunteers, the
better the chance we have of choosing a random yet representative
cross section of the IETF population.  The details of the nomcom
process can be found in RFC 3777.

To be eligible, volunteers for the nomcom need to have attended 3 of
the past 5 IETF meetings as of the time this announcement goes out
(i.e. IETF76-IETF80). If you qualify, and are not seeking appointment
to any of the open positions this nomcom will be filling, please
consider volunteering.

The list of people and posts whose terms end with the March 2012 IETF
meeting, and thus the positions for which the nominating committee is
responsible, are as follows:

IAB
===

Bernard Aboba
Hannes Tschofenig
Andrei Robachevsky
Olaf Kolkman
Spencer Dawkins
Ross Callon

IAOC


Marshall Eubanks

IESG


Peter Saint-Andre (Applications)
Jari Arkko (Internet)
Dan Romascanu (Operations  Management)
Gonzalo Camarillo (RAI)
Stewart Bryant (Routing)
Sean Turner (Security)
David Harrington (Transport)


The primary activity for this nomcom will begin during IETF-81 in
Quebec City and should be completed by January 2012. The nomcom will
be collecting requirements from the community, as well as talking to
candidates and to community members about candidates. There will be
regularly scheduled conference calls to ensure progress. Thus, being a
nomcom member does require some time commitment.

Please volunteer by sending an email to me before
11:59 pm EDT July 10, 2011 as follows:

To: suresh.krish...@ericsson.com
Subject: Nomcom 2011-12 Volunteer

Please include the following information in the body of the mail:

Full Name:  // As you enter in the IETF Registration Form,
// First/Given name followed by Last/Family Name

Current Primary Affiliation: // typically what goes in the Company
 // field in the IETF Registration Form

Email Address(es): // all email addresses used to Register for the
   // past 5 IETF meetings
   // Please designate a Preferred email address for
   // contact if there is more than one email address

Telephone number:  // With country code (for confirmation if selected)

Please expect an email response from me within 3 business days stating
whether or not you are qualified.  If you do not receive a response in
this timeframe, please re-send your email with the tag RESEND: added
to the subject line.

If you are not yet sure you would like to volunteer, please consider
that nomcom members play a very important role in shaping the
leadership of the IETF.  Ensuring the leadership of the IETF is fair
and balanced and comprised of those who can lead the IETF in the right
direction is an important responsibility that rests on the IETF
participants at large. Volunteering for the nomcom is a good way of
contributing in that direction.

I will be publishing a more detailed target timetable, as well as
details of the randomness seeds to be used for the RFC 3797 selection
process within the next few days.

Thank you in advance for your participation.

Suresh Krishnan
Nomcom Chair 2011-2012
Email: nomcom-ch...@ietf.org, suresh.krish...@ericsson.com

___
IETF-Announce mailing list
ietf-annou...@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Review of draft-ietf-dna-simple

2010-08-19 Thread Suresh Krishnan

Hi Bernard,

On 10-08-19 06:00 PM, Bernard Aboba wrote:
In that scenario, it makes sense to me. 


However, if the RA advertises the same prefixes would there be a reason to
mark all addresses as inoperable? 


The reason I changed it to do it this way was to simplify RA processing. 
Now, the RA gets processed based on standard RFC4861/RFC4862 processing. 
In the earlier versions of the draft I was comparing the prefixes in the 
RA to those in the SDAT and selectively marking the absent prefixes as 
inoperable. Ralph suggested this simplification and it made perfect 
sense to do so.


Thanks
Suresh
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Gen-ART review of draft-krishnan-v6ops-teredo-update-06

2010-06-01 Thread Suresh Krishnan

Hi Jari,
  Thanks for your comments.

On 10-05-31 06:08 AM, Jari Arkko wrote:

Thanks for your review!

I have added the following RFC Editor notes as fixes:


  Please add Updates: RFC 4380 to the header.

  Please change s/RA/Router Advertisement (RA)/ on
  first occurrence. Similarly for s/RS/Router Solicitation (RS)/


After we agree with David on how to update the Security Considerations, 
I can submit a new revision that includes these fixes as well.


Thanks
Suresh

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: secdir review of draft-ietf-csi-send-cert-03

2010-06-01 Thread Suresh Krishnan

Hi Richard,
  Removing the stuff we agreed upon.

On 10-05-31 08:22 PM, Richard L. Barnes wrote:

Hey Suresh,

Most of these comments look OK to me.  Couple of responses inline.

--Richard


Sec 6 Para 4
The requirement for RFC 3779 extension seems to contradict the use of 
 ETAs as Trust Anchor Material, i.e., the last sentence of the first 
 paragraph in this section.


Good catch. I am not sure how to resolve this. One way would be to 
specify that the ETA EE certificates are exempt from requiring the 
RFC3779 extensions. Do you have any suggestions?


I think the rest of the section is clear enough -- the TA material 
either has to be a self-signed certificate or it has to be an ETA.  So 
maybe you could just delete the phrase and MUST always refer to a 
certificate that includes a RFC 3779 address extension?


Hmm. The ETA certificate itself does not need to have the RFC3779 
extension in it, but the relying party needs to fetch an RTA certificate 
which will contain a RFC3779 extension.




As an aside, do you want to specify that in the first case (the non-ETA 
case), the self-signed TA cert MUST conform to the RPKI profile?


Will do.

Thanks
Suresh
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Gen-ART LC review of draft-ietf-csi-send-cert

2010-05-30 Thread Suresh Krishnan

Hi Roni,
  Thanks a lot for the review. Please find responses inline.

Roni Even wrote:

Comments:

The first two comments are about changes from RFC 3971, if they are 
intentional it may be good to have a section on changes from RFC 3971 
and list these specific changes with backward interoperability issues if 
there are.


   1. In section 4 second paragraph “SEND certificates MUST include  the
  IP Resources extension for IPv6 Address …”  Section 6.3.1 of RFC
  3971 says “Router Authorization Certificates are X.509v3
  certificates, as defined in RFC 3280, and SHOULD contain at least
  one instance of  the X.509 extension for IP addresses, as defined
  in RFC 3779.” So why is it a MUST here.



The csi wg explicitly made a decision to go with basing the SEND 
certificate profile on RPKI certificates [draft-ietf-sidr-res-certs] 
instead of coming up with a fresh profile based on RFC3971. This 
discrepancy is a result of that decision. I am not sure if there are any 
backward compatibility issues since the SEND spec did not specify the 
procedures for validating certificates without a IP resources extension,


 


   2. The same paragraph has “Certified IPv6 address space SHOULD be
  expressed using either addressPrefix or addressesOrRange 
  elements.” . Section 6.3.1 in RFC 3971 says “The X.509 IP address

  extension MUST contain at least one addressesOrRanges element” as
  for  the addressPrefix according to this section “The X.509 IP
  address extension MAY contain additional IPv6 subnet prefixes,
  expressed as either an addressPrefix or an addressRange.”


This is unintentional. I don't think the statement in question adds any 
value and can be safely removed. Is this ok?




   3. In section 7 there are TBA1, TBA2 and TBA3, who will assign values
  for these IDs.


The IDs have been allocated by the pkix wg. I have replaced the TBA 
values with the actual allocated values.




 


Nits:

   1. Section 5  has “an end user could local SEND deployment “ it looks
  like there is a missing word in this sentence


OK. Replaced with an end user could perform local SEND deployment


   2. In section 5 expand ULA.


OK.

Thanks
Suresh
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: secdir review of draft-ietf-csi-send-cert-03

2010-05-30 Thread Suresh Krishnan

Hi Richard,
  Thanks a lot for your extensive review. Please find responses inline.

Richard Barnes wrote:
I have reviewed this document as part of the security directorate's  
ongoing effort to review all IETF documents being processed by the  
IESG.  These comments were written primarily for the benefit of the  
security area directors.  Document editors and WG chairs should treat  
these comments just like any other last call comments.


This document defines a certificate profile for use in the Secure  
Neighbor Discovery protocol for IPv6.  Starting from the RPKI cert  
profile, it adds some refinements for SEND, e.g., EKUs that authorize  
the subject to act in certain roles within SEND (router, proxy, host).


Overall, the document is reasonably well-written, but could benefit  
from more precision in its use of terminology.  There are a few points  
(noted below) where certificate processing rules are unclear.  With  
regard to the security considerations in particular, I would prefer if  
they stated the risks slightly more directly (text is suggested  
below), but in general, the authors address the major security concerns.


Detailed comments follow.

--Richard


Sec 2 Para 1
Suggest changing authority over an to authorization to advertise an.


OK.



Sec 2 Para 2
Suggest rewording to avoid referring to SIDR WG (which is temporary).   
Suggested text: The Resource Public Key Infrastructure (RPKI) is the  
global PKI that attests to allocation of IP address space.  Also,  
instead of SIDR certificate profile, use RPKI certificate profile.


Sounds good.



Sec 2 Para 3, General
I'm confused by the several instances of the phrase address owner in  
the document (the phrase is not used in RFC 3971).  Do you mean host?


Since RFC3971 did not expect hosts to use certificates to defend their 
addresses (hosts traditionally use CGAs), this role was not defined. I 
proposed the following text to explain what the address owner role means


The inclusion of the owner authorization value indicates that the
certificate has been issued for allowing the node to use the
address(es) or prefix(es) that are mentioned using the X.509
extensions for IP addresses and AS identifiers [RFC3779]. For an address
in such certificate the host can assign the address, send/receive
traffic from this address, and can respond to NSes about that address.
For a prefix in such certificate the node can perform all the above
mentioned operations for any address in that prefix. Also, when a prefix
is present in the certificate with the owner authorization value, the
node cannot advertise the prefix in an RA.

This will replace paragraph 6 of section 7. Does this work?



Sec 3 Para End Entity
This definition is incorrect.  Refer to RFC 4949.


Can we use

End Entity - an entity that is not a CA



Sec 4 Para 1
The RPKI profile should be applied in *addition* to the RFC 3971  
profile, right?  Please clarify.


Not really. The csi wg decided to base the new SEND certificate profile 
solely on the RPKI profile.




Sec 4 Para 2
Why can there only be one RFC 3779 extensions?  It doesn't seem like  
there's a risk in including IPv4 space (e.g., for a dual-stack router  
that was vouching for IPv4 space in some other application?), or  
multiple extensions for IPv6 space.


I am not sure where this restriction is specified. Can you clarify?



Sec 5
This section should note that another deployment model (arguably the  
most likely) is a combination of these two, in which most resources  
are certified under the global RPKI, while some (e.g., ULAs) are  
certified under local TAs.


Sounds good. Will add the following text about a hybrid deployment model 
at the end of section 5.


  These two models are not mutually exclusive.  It is entirely possible
   to have a hybrid model that incorporates features from both these
   models.  In one such hybrid deployment model most IP address
   resources (e.g. global unicast addresses) would be certified under
   the global RPKI, while some others (e.g., ULAs) are certified under
   local TAs.



Sec 6 Para 4
The requirement for RFC 3779 extension seems to contradict the use of  
ETAs as Trust Anchor Material, i.e., the last sentence of the first  
paragraph in this section.


Good catch. I am not sure how to resolve this. One way would be to 
specify that the ETA EE certificates are exempt from requiring the 
RFC3779 extensions. Do you have any suggestions?




Sec 7 Para The inclusion of ... et seq.
It would be helpful for the document to specify how prefix matching  
should be done when validating these extensions.  Which of the  
following should the RP use?

-- Exact matching
-- Subset matching (RA within cert)
-- The weird subset/intersection algorithm that RFC 3971 defines
What prefix should the RP be matching against from SEND, per EKU?   
E.g., for id-kp-sendRouter, the RFC 3779 extension in the cert should  
match against any RAs the router emits.  It may be useful to refer to  
the 

Re: [Gen-art] Gen-ART LC review of draft-ietf-csi-send-cert

2010-05-03 Thread Suresh Krishnan

Hi Roni,
  Thanks for the review. Please see responses inline.

On 10-05-02 03:50 AM, Roni Even wrote:
The first two comments are about changes from RFC 3971, if they are 
intentional it may be good to have a section on changes from RFC 3971 
and list these specific changes with backward interoperability issues if 
there are.


   1. In section 4 second paragraph “SEND certificates MUST include  the
  IP Resources extension for IPv6 Address …”  Section 6.3.1 of RFC
  3971 says “Router Authorization Certificates are X.509v3
  certificates, as defined in RFC 3280, and SHOULD contain at least
  one instance of  the X.509 extension for IP addresses, as defined
  in RFC 3779.” So why is it a MUST here.

 


   2. The same paragraph has “Certified IPv6 address space SHOULD be
  expressed using either addressPrefix or addressesOrRange 
  elements.” . Section 6.3.1 in RFC 3971 says “The X.509 IP address

  extension MUST contain at least one addressesOrRanges element” as
  for  the addressPrefix according to this section “The X.509 IP
  address extension MAY contain additional IPv6 subnet prefixes,
  expressed as either an addressPrefix or an addressRange.”


We are basing ourselves on the work done at the sidr working group 
regarding resource certificates. The MUSTs and SHOULDs are derived from 
draft-ietf-sidr-res-certs rather than RFC3971. I will come up with a 
proposal on how to resolve this discrepancy.




   3. In section 7 there are TBA1, TBA2 and TBA3, who will assign values
  for these IDs.


The EKUs are assigned by the pkix working group. I will be adding the 
following text to the IANA considerations section.


The EKUs are registered in an arc delegated by IANA to the PKIX Working 
Group. No further action by IANA is necessary for this document or any 
anticipated updates.




 


Nits:

   1. Section 5  has “an end user could local SEND deployment “ it looks
  like there is a missing word in this sentence
   2. In section 5 expand ULA.


Will fix these.

Thanks
Suresh

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-ietf-csi-send-cert (Certificate profile and certificate management for SEND) to Proposed Standard

2010-05-02 Thread Suresh Krishnan

Hi Sean,
  I will make the changes to the IANA considerations section like you 
suggested. I think it adds clarity about the required assignment.


On 10-05-01 06:56 AM, Sean Turner wrote:

Suresh,
4.c) Was there discussion about support for the anyExtendedKeyUsage 
OID from 4.2.1.12 of RFC 5280?
No. I am not sure it would be useful as the SEND implementations really 
need to know the EKU to work properly. The packet processing is based on 
the value of the EKU.


Hmmm if you're not going to support it, then you might want to 
put some text in about it not being allowed.  5280 allows 
applications to reject certificates that include this extension.


OK. I will add the following text at the end of Section 7

Certificate-using applications MUST reject certificates that do not 
contain one of the three KeyPurposeIds defined above even if they 
include the anyExtendedKeyUsage OID defined in [RFC5280].


Does this work?

Thanks
Suresh

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-ietf-csi-send-cert (Certificate profile and certificate management for SEND) to Proposed Standard

2010-04-30 Thread Suresh Krishnan

Hi Sean,
  Thanks for the comments. Please see responses inline.

On 10-04-30 03:16 PM, Sean Turner wrote:

The IESG wrote:
The IESG has received a request from the Cga  Send maIntenance WG (csi) 
to consider the following document:


- 'Certificate profile and certificate management for SEND '
   draft-ietf-csi-send-cert-03.txt as a Proposed Standard

The IESG plans to make a decision in the next few weeks, and solicits
final comments on this action.  Please send substantive comments to the
ietf@ietf.org mailing lists by 2010-05-14. Exceptionally, 
comments may be sent to i...@ietf.org instead. In either case, please 
retain the beginning of the Subject line to allow automated sorting.


1) I would like to see an ASN.1 module added to the document.  That way 
we can import the EKUs.  Here's what I'm looking for (something similar 
was done in draft-ietf-sip-eku):


-
SENDCertExtns { iso(1) identified-organization(3) dod(6) internet(1)
   security(5) mechanisms(5) pkix(7) id-mod(0)
   id-mod-send-cert-extns(TBD) }

DEFINITIONS IMPLICIT TAGS ::=

BEGIN

-- OID Arc

id-kp  OBJECT IDENTIFIER  ::=
   { iso(1) identified-organization(3) dod(6) internet(1)
 security(5) mechanisms(5) pkix(7) 3 }

-- Extended Key Usage Values

id-kp-sendRouter OBJECT IDENTIFIER ::= { id-kp TBA1 }
id-kp-sendProxy OBJECT IDENTIFIER ::= { id-kp TBA2 }
id-kp-sendOwner OBJECT IDENTIFIER ::= { id-kp TBA3 }

END
-


Sounds good. Will do.



2) You also need to register the OIDs for the EKUs and the ASN.1 module. 
  I assume you're going to try to get them out of the PKIX arc?


Yes. We will use 23,34,  25 as the values for TBA1, TBA2 and TBA3 as 
allocated by Russ and Steve.




3) Technically your IANA considerations is wrong because you need to get 
OIDs. Might I suggest something like:


   This document makes use of object identifiers to identify a Extended
   Key Usages (EKUs) and the ASN.1 module found in Appendix *TBD*.  The
   EKUs and ASN.1 module OID are registered in an arc delegated by IANA
   to the PKIX Working Group.  No further action by IANA is necessary for
   this document or any anticipated updates.


Given 2) is it OK to leave this section as it is?



4) In the last paragraph of Section 7 you describe what the 
certificate-using application might require.


4.a) It says that including the EKU extension is a MAY, but the first 
paragraph says it MUST be present in EE certificates for SEND. 
Assuming the 1st paragraph is correct the 1st MAY needs to be a MUST in 
the last paragraph.


4.b) Assuming the 1st paragraph in is correct and EKU MUST be present 
then shouldn't value also be required?  That is, make the second MAY a 
MUST in the last paragraph.


Ack on both .a and .b. Will make this change.



4.c) Was there discussion about support for the anyExtendedKeyUsage OID 
from 4.2.1.12 of RFC 5280?


No. I am not sure it would be useful as the SEND implementations really 
need to know the EKU to work properly. The packet processing is based on 
the value of the EKU.




4.d) You should look at draft-ietf-sip-eku for what they say about 
processing their EKU.  Those rules are helpful to implementers.


OK.



5) draft-ietf-sidr-res-certs-17 is expired.


We need to normatively reference this draft. So I guess we will get 
stuck in the RFC-Ed Queue waiting for this.


Thanks
Suresh


___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


xml2rfc 1.34 on Ubuntu

2010-02-04 Thread Suresh Krishnan

Hi Folks,
  If you are one of the persons who were frustrated waiting for the 
new 1.34 version of xml2rfc to get into the Ubuntu disribution 
channels, you can pick it up from the debian ftp registry at


http://ftp.debian.org/debian/pool/non-free/x/xml2rfc/xml2rfc_1.34-1_all.deb

Cheers
Suresh
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: xml2rfc 1.34 on Ubuntu

2010-02-04 Thread Suresh Krishnan

Hi Melinda,

On 10-02-04 11:25 AM, Melinda Shore wrote:

Suresh Krishnan wrote:
  If you are one of the persons who were frustrated waiting for the 
new 1.34 version of xml2rfc to get into the Ubuntu disribution 
channels, 


I'm unclear on this - why wouldn't they pick it up from resource.org?


Using the package manager instead of a tarball

* Overwrites the previous version properly
* Provides uninstall support
* Allows automatic install of dependencies (e.g. tcl, sgml etc.)
* Enables automatic updates (if available)

Cheers
Suresh

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Review of draft-ietf-dna-simple-09

2009-10-21 Thread Suresh Krishnan

Hi Bernard,
  Thanks for your comments. Please find responses inline.

On 09-10-20 04:08 PM, Bernard Aboba wrote:

Review of draft-ietf-dna-simple-09

I have reviewed draft-ietf-dna-simple.  Overall, I believe this document 
still

contains significant technical issues that need to be addressed before
it would be suitable for publication as a Proposed Standard.  In particular,
the version of the document sent to IETF last call does not incorporate 
fixes
to issues listed in the WG issue tracker as fixed.  This raises the 
possibility that

changes from WG last call were not properly applied or even that the wrong
version of the document may have been sent to IETF last call.

Given the potential problems, a careful check needs to be made of the 
changes

between -08 and -09 to make sure that resolutions to WG last call and AD
review comments were properly applied.

Technical

Abstract

   This document provides simple procedures for detecting network
   attachment in IPv6 hosts, and procedures for routers to support such
   services.

[BA] My understanding was that the goal of Simple DNA was to avoid
changes to routers.  Given that, what router procedure need to be
specified?


This refers to the optional changes to routers for sending out fast 
unicast RAs in section 2.4.




Section 2.4

2.4. DNA Roles


   Detecting Network Attachment is performed by hosts by sending IPv6
   neighbor discovery and router discovery messages to routers after
   connecting to a network.

   It is desirable that routers adopt procedures which allow for fast
   unicast Router Advertisement (RA) messages.  Routers that follow the
   standard neighbor discovery procedure described in [RFC4861] will
   delay the router advertisement by a random period between 0 and
   MAX_RA_DELAY_TIME (defined to be 500ms) as described in Section 6.2.6
   of [RFC4861].  This delay can be significant and may result in
   service disruption.  Please note that support for fast unicast RAs is
   not necessary since the simple dna procedure can continue to work
   using the NS/NA exchange, which will complete earlier than the RA
   arrives.

   The host detects that the link-layer may have changed, and then
   simultaneously probes the network with Router Solicitations (RSs) and
   Neighbor Solicitations (NSs).  The host uses advertisements to
   determine if the routers it currently has configured are still
   available.

   Additionally, on links with no statelessly configured addresses, the
   host may make use of DHCPv6 procedures to identify an operable
   address.

[BA] This paragraph does not describe the situations in which
RA delays will be significant.  Clarity would be enhanced by
describing this.

The description of the role of DHCPv6 in this section appears to
conflict with the description in Section 4.6.  Section 4.6 discusses
use of Neighbor Discovery probing in parallel with DHCPv6 probing,
implying that RS probing is not used.  This section implies that
DHCPv6 probing is only done after a combination of RS and NS
probing does not result in a statelessly configured address. 


Perhaps the best way to explain the interaction is to think of
simple DNA as independent of DHCPv6.  That is, implementation
of simple DNA does not change the DHCPv6 state machine or timers; 
implementations continue to send the same DHCPv6 packets in the

same situations and with the same timing as they did without
simple DNAv6.  The only new wrinkle is the potential for conflicts
between simple DNA and DHCPv6, in which case the information
obtained via DHCPv6 wins.

This is true regardless of whether an implementation waits for an
RA before deciding whether to use DHCPv6, or whether it sends
DHCPv6 packets regardless of the state of the 'M' and 'O' bits
in the RA. 


My suggested text is as follows:

2.4. DNA Overview

   Detecting Network Attachment is performed by hosts after
   detecting a link-layer up indication.  The host simultaneously
   sends multicast Router Solicitations (RSs) and unicast Neighbor
   Solicitations (NSs) in order to determine whether previously
   encountered routers are present on the link.

   Hosts implementing simple DNA may also send DHCPv6 packets,
   as described in Section 4.6.  Since simple DNA does not
   modify the DHCPv6 protocol or state machine, the operation
   of DHCPv6 is unchanged.

   Routers that follow the standard neighbor discovery procedure
   described in [RFC4861] will delay the router advertisement by a
   random period between 0 and MAX_RA_DELAY_TIME (defined to be 500ms)
   as described in Section 6.2.6 of [RFC4861].  Hosts implementing
   simple DNA can detect the presence of a previously encountered
   router using unicast Neighbor Solicitations.  As a result, where
   the host with a valid configuration is returning to a previously
   encountered link, delays in the sending of a Router Advertisement
   (RA) will not delay configuration as long as NS probing is
   successful.  However in situations 

Suggestion for draft-iab-ipv6-nat-00

2009-03-22 Thread Suresh Krishnan

Hi Dave and Lixia,
 I went through this document and it looks good. It provides a nice 
balanced viewpoint on the issues. One thing I would like to be added 
into the document is a cost-benefit analysis of doing ipv6 NAT for each 
of the problems in section 2. e.g.


Avoid renumbering
Benefit: Don't have to renumber since it is hard...
Cost: Another box to manage, Application complexity, Traversal 
infrastructure, Power consumption...


I am afraid that absent this analysis, we might be optimizing for the 
worst case scenario and end up with a permanent box on the path. 
Renumbering due to provider changes is a fairly rare phenomenon (for 
some definition of rare) and every operator needs to perform this 
analysis for themselves to see if NAT66 or some other solution would end 
up being the better solution for them.


Thanks
Suresh

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Repair of Public Mail List Archives Complete

2009-03-17 Thread Suresh Krishnan

Hi Tom,

On 17/03/09 05:34 AM, Tom.Petch wrote:

Alexa

I noticed the lists were down and would normally have flagged it, as many
another organisation knows.  I did not do so partly because of the usual problem
of where to flag it but more because what is the point?  These are not so much
archives as current affairs.  I can look at what has been posted so far today,
or yesterday or last week.  But when I really need an archive, to see what was
agreed in 2006, I have to get there day by day by painstaking day by tedious day
at a time.  I can see no other more direct way.


Dont be so sad :-). Try the IETF mailing list search engine developed by 
Lars and Jari


http://www.google.com/coop/cse?cx=006728497408158459967%3Aybxjdw-bjjw

Cheers
Suresh
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Guidelines for authors and reviewers

2008-06-03 Thread Suresh Krishnan
Hi Paul,

Paul Hoffman wrote:
 Agree. And this topic (the recipient list of the review) is something 
 I think hard about before I send out any review.
 
 That's good to hear, but I didn't see it reflected in the document; 
 maybe your co-authors had a different slant. Regardless, my preference 
 is to encourage group communication during reviews for anything other 
 than editorial nits and I was told to read this; I did; it was fine 
 reviews. Group communication, in both directions for a review, helps 
 everyone. It also helps prevent a WG hearing that I changed this thing 
 we had all agreed to because I was told to by { a security person | an 
 IAB member | an ex-AD | ... }. Those kinds of changes tend to make a 
 document weaker if they aren't agreed to and possibly modified by the WG 
 who worked on the document.

I will add the following text regarding this in a new section 4.2 before 
the current section 4.2.

***START OF TEXT
4.2 Recipients of the review

The list of recipients of the review is tricky to get right. The main 
idea is to make sure all the relevant people receive the review. The 
recipient list is determined mainly by the following factors

* The timeframe of the review (early vs. late)
* The contents of the review (editorial vs. technical)

Early reviews are usually performed by active participants of a working 
group. The preferred destination for these reviews is the working group 
mailing list since it can be reasonably assumed that the persons 
interested in the document are subscribed to the mailing list. This 
applies for both technical and editorial issues. Alternately editorial 
issues can be resolved using a private mail to the author(s).

Late reviews are usually performed by persons who are not active 
participants of the working group and who usually review the draft from 
a different point of view than the working group. If the contents of the 
review are mainly editorial in nature, the reviews can be sent just to 
the authors, the working group chair(s), the document shepherd(s). If 
the review is of a more technical nature it is considered polite to 
include the working group mailing list and/or the IETF discussion list. 
As it is not reasonable to assume that the reviewer will subscribe to 
the working group mailing list just for discussing this issue, the 
working group chair(s) need to make sure that this review will get past 
any moderation controls imposed on non-subscribers by the working group 
mailing list.
END OF TEXT*

Would this resolve your concern?

Thanks
Suresh

___
IETF mailing list
IETF@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Guidelines for authors and reviewers

2008-06-03 Thread Suresh Krishnan
Hi Ted,

Ted Hardie wrote:
 At 10:55 AM -0700 6/3/08, Suresh Krishnan wrote:
 ***START OF TEXT
 4.2 Recipients of the review

 The list of recipients of the review is tricky to get right. The main
 idea is to make sure all the relevant people receive the review. The
 recipient list is determined mainly by the following factors

 * The timeframe of the review (early vs. late)
 * The contents of the review (editorial vs. technical)

 Early reviews are usually performed by active participants of a working
 group.
 
 
 Suresh,
   Can you describe  the difference between early reviews
 performed by active participants and just participation?   In my
 mind, folks making suggestions and noting issues with a document during
 the working group phase are WG contributors, not reviewers.  How do
 you see this?

I see it just like you :-). The early reviewers are contributors and 
participants. The reason I made the distinction is because reviews are 
only one form of participation in the working group. There are other 
ways to participate in the working group

* Editing documents
* Keeping track of issues
* Contributing text to sections
etc.

Thanks
Suresh
___
IETF mailing list
IETF@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Guidelines for authors and reviewers

2008-05-30 Thread Suresh Krishnan
Hi Frank,
   Thanks for your comments. Please see responses inline.

Frank Ellermann wrote:
 Suresh Krishnan wrote:
 
 We would really appreciate
 [...]
 In the spirit of your draft:  s /one an author/once an author/ ;-)

Will fix :-)

 
 As the draft says, the main thing is to get any reviews at all:
 A negative review means that somebody bothered to read it, and
 to note whatever attracted their attention.  I'm not sure if 
 that needs a separate review netiquette RFC, IMO it should be
 a part of the Tao, or the next Tao if it is not already clear.

Paul Hoffman is working on the TAObis. Maybe he can chime in on this.

 
 Please use the term review team instead of directorate.

OK. Will do.

Thanks
Suresh
___
IETF mailing list
IETF@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Guidelines for authors and reviewers

2008-05-30 Thread Suresh Krishnan
Hi Ted,
   Thanks for your comments. Please see responses inline.

Ted Hardie wrote:
   I looked at it, and, while I laud any efforts to get folks to review
 things effectively, I have to say that I found this to be a pretty drafty 
 draft.
 It does not reference the Tao, 2026, or any of the developed educational 
 materials;
 its only listed reference, in fact, is 2119 and that does not seem to be 
 referenced
 within the text.  That means that this comes across as pretty context free.
 It needs anchoring to the rest of our processes.

I do share your sentiment, but this is not what we set out to do 
originally. We set out to document the review process(es) and provide 
some guidelines to effectively use the received reviews. I think the 
right document to weave the stuff together would be the Tao. But I do 
agree that adding references to the Tao and 2026 make sense. The 
dangling reference to 2119 is an editorial oversight :-).

   One of the things that I believe that anchoring should provide
 is a pretty significant change of perspective.  As this reads now,
 it implies a lot of power in the hands of reviews to elicit (or even require)
 change.   It seems to want document authors to accede to requests for
 tutorial material as a matter of course and to significant technical changes

I am sorry you feel that way. It was not the intent of the document. The 
document just states that a concern raised in the review deserves a 
response (not necessarily a change). One valid response is Mr. 
reviewer, what you raised is not a problem. This was a design decision 
taken by the WG and the discussion thread about this is at 
http://mlarchive.invalid/msgfoo.html;.

 with a modicum of fuss.  That's not the right approach.  The outcome of our
 document development should not be a negotiation between the authors
 and the assigned reviewers.  It should be a conversation in the working group
 among those who will actually develop the implementations, those who
 will deploy it, and those who are affected by the system of which the
 documented technology  is a part. 

Agree. And hence this text in section 3.5

   After the author and reviewer agree that the issues have been fixed,
for working group documents, substantial issues need to be confirmed
on the mailing list.  Once the document has entered IESG processing,
new versions should not be posted unless the document shepherd or AD
explicitly says so.

   Reviews that work to relate a particular document's technology
 to the larger whole of which it is a part (asking: how does this impact
 congestion control in the access network or core, use deployed security 
 systems,
 relate to the identifier mechanisms common to URIs, etc.) are very valuable.
 But many reviews represent questions about decisions that come down to
 design choices that working groups should have the power to make without
 extensive second-guessing.  Folks who want to have a say at the level can and
 should do so with the simple method of joining the working group list and 
 commenting
 as part of the general development.  That's not review (of someone else's 
 work)
 it is participation (in joint work), and it is fundamentally more valuable.

Agree in principle. But a late reviewer usually gets documents from 
multiple wgs and subscribing to the MLs just to raise one issue can get 
to be a tiring endeavor. Last year, I reviewed documents from 20 
different WGs (apart from the ones I am usually involved in). I cannot 
handle mailing list traffic from 20 more mailing lists. If this were 
mandated, I would rather not review the document. I would also like to 
point out that most of the reviews received during IETF Last Call are of 
the nature you describe.

 Without the context of how participation works, your documents description
 of review comes off very badly indeed.  I hope that future versions can 
 correct
 that and place review within a broader, more productive context.

I personally feel that the TAO (4677 and descendants) should be the 
document that sets the various pieces in context, but I am open to 
suggestions on how to go about fitting this document into a broader 
context.

Thanks
Suresh
___
IETF mailing list
IETF@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Guidelines for authors and reviewers

2008-05-30 Thread Suresh Krishnan
Hi Ted,
   Please find responses inline

Ted Hardie wrote:
 At 2:42 PM -0700 5/30/08, Suresh Krishnan wrote:
 I do share your sentiment, but this is not what we set out to do
 originally. We set out to document the review process(es) and provide
 some guidelines to effectively use the received reviews. I think the
 right document to weave the stuff together would be the Tao. But I do
 agree that adding references to the Tao and 2026 make sense. The
 dangling reference to 2119 is an editorial oversight :-).
 
 If the Tao is the right document to do the weaving in, then the right thing
 to do may well be incorporate more discussion of the review
 process in the next version of the Tao.  A stand-alone document which
 says to get this context go read this first might work, but it runs
 the usual risk.  And statements like:
 
 reviews also play an important part in how IETF determines
consensus. 
 
 really need to be related to our process documents.  Personally, I
 don't think that's actually either true or the point.  Many solicited
 reviews  are meant to discover technical show stoppers or areas where
 the impact of technology on other parts of 'net have not been
 taken into account.  Determination of consensus is different,
 and it has a large amount to do with our participation model.
 Changes to the pool of folks from whom consensus is
 solicited should not be done lightly in informational documents.

I think there is some context missing here. This is what we talk about 
in section 4.1.

 
 
   One of the things that I believe that anchoring should provide
 is a pretty significant change of perspective.  As this reads now,
 it implies a lot of power in the hands of reviews to elicit (or even 
 require)
 change.   It seems to want document authors to accede to requests for
 tutorial material as a matter of course and to significant technical changes
 I am sorry you feel that way. It was not the intent of the document. The
 document just states that a concern raised in the review deserves a
 response (not necessarily a change). One valid response is Mr.
 reviewer, what you raised is not a problem. This was a design decision
 taken by the WG and the discussion thread about this is at
 http://mlarchive.invalid/msgfoo.html;.
 
 The tutorial material comment comes from this section:
 
   If the reviewer has not understood some part of the draft, a very
   common response is to explain the topic in email.  However, often
   that explanation should really be in the draft itself, not just in
   emails to the authors, so that future readers will also understand
   the text.

This is from my personal experience. I have been asked by reviewers 
(including IESG members) to add such text in the past. For the sake of 
clarity, I complied. I do not see the downside of this.

 
 The key missing piece here is that the effort to get outside reviewers
 means that they are missing context that those actually using the
 document will likely have.  Asking that it be included as a matter of
 course on the query of a reviewer produces changes that then have to
 be reviewed and agreed to by the working group.  That's a lot of work
 for a lot of people for things which may well be obvious to those
 within the group using a technology. 

If someone reads a document and the normative references, and does not 
understand something, it needs to be fixed. RFCs are not only for people 
who worked on creating the technology.

 
 The document's description of politeness in responses also sets
 timeframes that sound a lot like deadlines:
 
 two or three business days might be a
reasonable amount of time to take for a response.  It is possible
that the authors may be unavailable to respond to a review within
this timeline since they may be sick/on vacation/busy with dayjob
etc.  In this case, the document shepherd (if any) can respond to the
review and follow up with the authors at a later time.
 
 The ability to force an interrupt on busy people (either authors or shepherds)
 is real power, and we need to be careful how we cast that.  A comment on a 
 document
 (and that is what reviews are) does deserve to be considered, but the extent
 to which a response is required and the timeframe for that response is much
 more fluid than this implies.  Bundling all comments received during a
 Last Call, considering them as an author team, then issuing a new draft
 or set of RFC Editor notes (or, honestly, punting them all) may be the most
 effective thing to do.  In that case, the only early response you'll
 get is message received.  If you want that, permit me to suggest
 the handy MDN functionality likely available in your mail client.

I can remove this from the document. This is the amount of time that I 
take on average to respond to a review. But, let's say somebody writes a 
draft for the first time ever in her life. She gets a review from you on 
her draft. She currently has no idea how much

Re: Guidelines for authors and reviewers

2008-05-30 Thread Suresh Krishnan
Hi Paul,
   Thanks for the comments. Please see responses inline.

Paul Hoffman wrote:
 At 5:03 PM -0400 5/30/08, Suresh Krishnan wrote:
 I'm not sure if
   that needs a separate review netiquette RFC, IMO it should be
  a part of the Tao, or the next Tao if it is not already clear.
 Paul Hoffman is working on the TAObis. Maybe he can chime in on this.
 
 ching!
 
 The past few editions of the Tao do indeed talk about taking reviews 
 with an open mind. The Tao doesn't talk much about *giving* reviews, 
 mostly because the intended audience (IETF newcomers) are mostly 
 interested in learning how to be in the normal IETF structures, like 
 WGs.
 
 Having said that, I agree with some of what Ted Hardie said about the 
 tone of the document. It sounds like there are instructions to 
 document authors on how they are supposed to act when they get 
 reviews. That's bordering on a revision to RFC 2026, which I don't 
 think is what you intended. It is polite to and some document 
 authors like to are quite different than are expected to and 
 needs to.

I agree that tone might be a bit strong but this can be easily fixed in 
the document. e.g. Replace

The authors are expected to respond to the reviews within a
  reasonable amount of time.

with

It is considered polite to respond to the reviews within a
  reasonable amount of time.

but it might be more tricky to define reasonable amount of time. Do 
you feel that it is out of the scope of this document to define this? If 
so, we can take it out of the document. But doing so diminishes the 
guiding value of the document.

 
 This document emphasizes reviews going to authors instead of reviews 
 going to WGs or, in the case of individual submissions, reviews going 
 to mailing lists. In the Tao, we emphasize the value of 
 communications to groups so that the group can agree, amplify, show 
 disinterest, or disagree. In the WGs I have co-chaired, the WG got 
 good value out of some of the GenART and SecDir reviews in that it 
 made the whole WG think about the topics brought up. This may be a 
 fundamental difference in view between this document's authors and my 
 preferences, but I think the discussion of where reviewers should be 
 sending their reviews is an important one for the IETF community to 
 have.

Agree. And this topic (the recipient list of the review) is something I 
think hard about before I send out any review.

Thanks
Suresh
___
IETF mailing list
IETF@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Guidelines for authors and reviewers

2008-05-29 Thread Suresh Krishnan
Hi Folks,
   We have written a draft describing some guidelines for authors and 
reviewers of internet drafts. We would really appreciate it if you can 
spend some time to go over it and provide comments and/or suggestions 
for improvement.

Thanks
Suresh, Pasi and Eric

 Original Message 
Subject: I-D Action:draft-krishnan-review-process-00.txt
Date: Wed, 28 May 2008 11:15:01 -0700 (PDT)
From: [EMAIL PROTECTED]
Reply-To: [EMAIL PROTECTED]
To: [EMAIL PROTECTED]

A New Internet-Draft is available from the on-line Internet-Drafts 
directories.

Title   : Guidelines to authors and reviewers regarding the 
IETF review process
Author(s)   : S. Krishnan, et al.
Filename: draft-krishnan-review-process-00.txt
Pages   : 10
Date: 2008-05-28

This document describes the IETF review process and provides
guidelines to draft authors and reviewers on how to effectively
participate in it.

A URL for this Internet-Draft is:
http://www.ietf.org/internet-drafts/draft-krishnan-review-process-00.txt

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/

Below is the data which will enable a MIME compliant mail reader
implementation to automatically retrieve the ASCII version of the
Internet-Draft.

___
IETF mailing list
IETF@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Gen-ART review of draft-ietf-geopriv-radius-lo-19.txt

2008-05-08 Thread Suresh Krishnan
I am the assigned Gen-ART reviewer for
draft-ietf-geopriv-radius-lo-19.txt

For background on Gen-ART, please see the FAQ at
http://www.alvestrand.no/ietf/gen/art/gen-art-FAQ.html.

Please resolve these comments along with any other Last Call comments
you may receive.

Summary: This draft is almost ready to be published but I have a few 
comments.

Minor
=

* Section 3.2

It is not clear to me why the NAS receives and echoes back the 
Basic-Location-Policy-Rules and Extended-Location-Policy-Rules 
Attributes from the Access-Challenge, especially since these are opaque 
to the NAS.

* Section 4.2

- Does not define the values of the Code field. This is explained later 
in Section 4.3. It may be better to move the definition into this Section

- This text does not read very well

 Index (16 bits):

   The 16-bit unsigned integer value allows this attribute
   to provide information relating to the information included
   in the Location-Data Attribute to which it refers (via the Index).

I recommend rephrasing it to something like

 Index (16 bits):

   This is a 16-bit unsigned integer value that is used to identify
   the corresponding Location-Data Attribute(with the same index).


* Section 4.7

The numerical values of the types of location are enclosed in single 
quotes like this. e.g. for CIVIC_LOCATION

A numerical value of this token is '1'.

This is confusing because earlier use of this quoted text (Operator 
namespace ID) '1' refers to the numeric value 0x31. I feel it is better 
to remove the quotes in this section.


* IANA Considerations

- Replace Operations Area Director with Operations Area Directors

- The IANA guidance for section 8.6 is fuzzy. It is not at all clear 
from this section that the next value to allocate is 64,128... (This is 
clear to me from reading section 4.7). Wouldn't it be a better idea to 
redefine this field to be a set of 32 numbered bit flags and assign a 
meaning to each one of them?

Editorial
=

* Replace reference to RFC3041 with one to RFC4941 that obsoletes RFC3041.

*
Cheers
Suresh



___
IETF mailing list
IETF@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Issues with Letter of Invitation for IETF72

2008-04-08 Thread Suresh Krishnan
Hi Folks,
   I requested a letter of Invitation for the Dublin Meeting and I
noticed the following issues.

* I cannot register first and then come back for the letter of
invitation. I get the following error

You will need to register for the IETF meeting prior to requesting a
letter of invitation. Once you have registered for the IETF meeting, you
will be prompted to request the letter of invitiation.

There should be a form here instead that should ask for my registration
number.

* There are two Questions about Nationality and Passport Issuer
Country. The country I pick under Nationality shows up under the
Address. In my case this is not correct. I do not know how these fields
are being used, but the labels need to be clarified.

Thanks
Suresh

___
IETF mailing list
IETF@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Blue Sheet Change Proposal

2008-04-04 Thread Suresh Krishnan
Hadriel Kaplan wrote:
 
 I think he means if the sheet is truly used for proof of presence and IPR 
 awareness then it's not good enough to allow name collisions.  
 But I don't see how blue sheets would hold any strength anyway for that 
 purpose, because 
 1) signing doesn't mean I was there the whole time, and (2) doesn't mean I 
 had stopped reading emails and was paying attention.  

And in addition, somebody could be in the room AND be aware of IPR and 
NOT SIGN the blue sheet. There is nothing saying that people in the room 
have to sign a blue sheet. I, for one, have seen people pass around blue 
sheets without signing.

Cheers
Suresh

___
IETF mailing list
IETF@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


RFCVision (Was Re: Finding information)

2008-01-22 Thread Suresh Krishnan

Hi Willie,
  I came up with a tool (rfcvision) couple of years ago for personal 
use that did something like this. You can check it out at


http://www.sureshk.com/rfcvision

It is not production quality but it should help you. Let me know if you 
have any comments/suggestions.


Cheers
Suresh

Willie Gillespie wrote:

As someone new to the IETF, how should I go about doing the following?

I want to find some information about IMAP and its extensions.  Let's
say I found RFC 1730.  How would I know that it had been obsoleted by
RFC 2060 and then by RFC 3501?  How do I find the extensions?  I don't
necessarily want to search through a list of 5000 entries to find what I
want.

That's where I think a naming scheme like IETF-IMAP would be handy.
Then I could look at a list of IETF-IMAP and see IETF-IMAP-2003 would be
newer than IETF-IMAP-1996.

But that's beside the point.  As of right now, how do I find this
information?  Is there a handy tool on tools.ietf.org that I should use?

Thanks for your help.

Willie

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf



___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Gen-ART review of draft-ietf-mip4-vpn-problem-solution-03.txt

2007-11-27 Thread Suresh Krishnan

I am the assigned Gen-ART reviewer for
draft-ietf-mip4-vpn-problem-solution-03.txt

For background on Gen-ART, please see the FAQ at
http://www.alvestrand.no/ietf/gen/art/gen-art-FAQ.html.

Please resolve these comments along with any other Last Call comments
you may receive.

Summary: This draft is well written and easy to read, but I do have a 
couple of comments I would like addressed.


Meta comments
=

* This is just my personal view but I am not sure if BCP is the right 
intended status for this document. It requires changes to the node 
implementations and requires behavioral changes on some nodes. Perhaps 
needs to be Standards track


* T_MONITOR is a new configuration knob that is added to the MN (that 
possibly requires changes to implementation). This needs to be clearly 
stated prior to use. Also, it would be nice to mention the associated 
signaling traffic reduction vs detection latency reduction compromise, 
so that the admins can make an informed decision as to the value of this.


Minor
=

Section 3.3
===

Bullet  2:  The following text is redundant since it is covered by 
bullet 3.

If a previous registration reply from the x-HA
has been received, the MN SHOULD de-register with the x-HA.

It makes sense to remove this

Section 3.4
===

* It is not clear who this requirement is on?

Therefore, it is required that x-HA and i-HA addresses MUST be different

Can you please clarify who ensures this

Section 3.6
===

* It is not clear what inside means here since it refers to the x-HA
   The registration process can be improved in many ways.  One simple
   way is to make the x-HA detect whether a registration request came
   from inside or outside.  If it came from inside, the x-HA can simply
   drop the registration request.

Editorial
=

* Push the basic topology figure to right after the first paragraph of 
section 2.
The draft does not have an Intended Status. From the ID tracker, I 
figured out that it is BCP, but it is perhaps better to explicitly state 
it in the draft.


Cheers
Suresh






___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Gen-ART review of draft-ietf-sipping-toip-08.txt

2007-11-19 Thread Suresh Krishnan

I am the assigned Gen-ART reviewer for
draft-ietf-sipping-toip-08.txt

For background on Gen-ART, please see the FAQ at
http://www.alvestrand.no/ietf/gen/art/gen-art-FAQ.html.

Please resolve these comments along with any other Last Call comments
you may receive.

Summary: This draft is well written and is almost ready for publication, 
but I have a couple of comments.


* The term modality is used in the document but it has not been defined. 
The meaning I perceive from this document does not match with the normal 
English usage of modality. I think the document uses this word to 
describe the way in which the TOIP device interacts with human. This 
needs to be clearly stated.


* I do not have strong feelings regarding this, but I feel that using 
RFC2119 terminology in this document is inappropriate given that the 
document is aiming to be an Informational RFC.


* Section 5.2.1: I think requirement R5 is redundant given requirement 
R6. Is there any use case that is covered by R5 and not by R6?


* Section 5.2.2: Why is there a requirement for maximum delay per 
character? A character by itself is not useful. I would think setting 
the delay per word makes more sense, since this is the smallest 
comprehensible text unit.


* Section 5.2.4: I am not clear what this requirement means. Can we add 
more specific text to this one.


R31: Users MUST be presented with appropriate session progress
 information at all times.

* Section 5.2.4: I think this requirement has enormous privacy 
implications. This needs to be explicitly stated.


R35: It SHOULD be possible to save the text portion of a conversation.

Cheers
Suresh





___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Gen-ART review of draft-ietf-avt-topologies-06.txt

2007-10-22 Thread Suresh Krishnan

I am the assigned Gen-ART reviewer for
draft-ietf-avt-topologies-06.txt

For background on Gen-ART, please see the FAQ at
http://www.alvestrand.no/ietf/gen/art/gen-art-FAQ.html.

Please resolve these comments along with any other Last Call comments
you may receive.

Summary: This draft is very well written, an enjoyable read and is 
almost ready for publication except for a minor comment.


Minor
=

ASM is a term commonly used in multicast to mean Any Source Multicast 
(as opposed to Source Specific Multicast). The glossary of this draft 
redefines this to be Asynchronous Multicast. Is this just a typo? 
Because from my reading of the draft all instances of this acronym 
actually use it in the context of Any Source Multicast. If it is just a 
typo it can be fixed with just an RFC-Editor note.


Cheers
Suresh



___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Gen-ART review of draft-ietf-sip-answermode-06.txt

2007-10-17 Thread Suresh Krishnan

I am the assigned Gen-ART reviewer for
draft-ietf-sip-answermode-06.txt

For background on Gen-ART, please see the FAQ at
http://www.alvestrand.no/ietf/gen/art/gen-art-FAQ.html.

Please resolve these comments along with any other Last Call comments
you may receive.

Summary: This draft is ready for publication and the issues I raised 
with the previous version (-04) of the draft have been resolved.


Cheers
Suresh

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: IETF solution for pairing cellular hosts

2007-09-25 Thread Suresh Krishnan

Hi Pars,

Pars Mutaf wrote:

Model of operation

1. The querier user types the target user's human name (as if he were
   consulting a phonebook), or a pseudoynm.
2. The pairing request is forwarded to the target phone.


How? How do you locate the target phone? Isn't this the problem we are 
trying to solve?


Cheers
Suresh

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: IPv6 addresses really are scarce after all

2007-08-21 Thread Suresh Krishnan

Hi Phil,

Hallam-Baker, Phillip wrote:

I am pretty sure the EUI-64 requirement has been dropped. If not I can't see 
how the real world security practitioners are going to implement it.


Stateless autoconf does not automatically imply EUI-64. There are other 
stateless autoconf methods that do not use bare EUI-64s. See below.




The EUI-64 address reveals the hardware manufacturer and model of hardware that 
I am using. There are no circumstances in which I am going to allow an attacker 
to obtain that information without putting them to as much effort as I can.


You can use a modified 64 bit identifier for privacy. These identifiers 
run a crypto hash over the EUI-64 and keep changing it periodically. 
Thus you can hide your hardware identity both over time and at a 
specific instance of time.


http://tools.ietf.org/html/draft-ietf-ipv6-privacy-addrs-v2-05
(Soon to be RFC4941)

Other mechanisms such as CGA, HBA (more to come ?) also work with 64 bit 
boundaries even if they are not EUI-64 based.


Cheers
Suresh



___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Gen-ART review of draft-ietf-sip-answermode-04.txt

2007-08-04 Thread Suresh Krishnan

I am the assigned Gen-ART reviewer for
draft-ietf-sip-answermode-04.txt

For background on Gen-ART, please see the FAQ at
http://www.alvestrand.no/ietf/gen/art/gen-art-FAQ.html.

Please resolve these comments along with any other Last Call comments
you may receive.

Summary: This draft is almost ready for publication, but I have a minor 
issue that needs to be resolved.


Minor
=

* Section 4
The following text does not look right. I think the client and server 
roles have been reversed.


The current text looks like this

 Each value of the Answer-Mode or Priv-Answer-Mode header field can
  include an optional parameter, require.  If present, this parameter
  indicates that the UAS would prefer that the UAC reject the request
  if the UAC is unwilling (perhaps due to policy) to answer in the mode
  requested, rather than answering in another mode. 

I think each instance of UAC must be replaced with UAS, and UAS must be 
replaced with UAC.


Cheers
Suresh





___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: Funding (was Re: Charging I-Ds)

2007-08-01 Thread Suresh Krishnan

Hi Itojun,
  How would you write documents which warn against people doing funny 
things? I wrote a draft about the issues with hop-by-hop options in IPv6 
and cautioning against their use. I see that there are still proposals 
coming out which depend on new hbh options? What should I do instead of 
writing a draft?


Cheers
Suresh

Jun-ichiro itojun Hagino wrote:
Charging for IDs will kill innovation. I use IDs to float ideas which 
may or may not bear fruition. I would not work on these if I had to pay. 
  I also work on things at the IETF than my employer does not sponsor. 
These things will get thrown out as well.


I assume i-d to be a proposal for a new protocol, which is
implementable with a reasonable efforts and costs.  i think your
view and my view are opposite.

i'd like to see the following:
- submission of i-d requires an implementation
- to become a RFC requires two independent interoperable implementation

itojun

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf



___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Funding (was Re: Charging I-Ds)

2007-07-31 Thread Suresh Krishnan
Charging for IDs will kill innovation. I use IDs to float ideas which 
may or may not bear fruition. I would not work on these if I had to pay. 
 I also work on things at the IETF than my employer does not sponsor. 
These things will get thrown out as well.


Since we have started slaughtering the sacred cows (free {ids,mailing 
lists, rfcs ...}), I might as well suggest few more.


* Make remote participants share the costs. i.e. charge for live 
audio/video feeds. I believe this is fairer than charging for ids, rfcs 
or mailing lists. People who want to participate, but are unable to 
travel can get these for a lower meeting fee (25% maybe).


* Get some kind of corporate sponsorships for supporting free documents 
(kind of like IEEE get 802)


* Cut back on the food and beverages

I would be unhappy with some of these things, but at least they still 
retain the openness of the IETF and are reasonably fair.


Cheers
Suresh




___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: Annoying auto-reply messages

2007-07-11 Thread Suresh Krishnan

Hi John,

John C Klensin wrote:

(1) I haven't seen you sending out-of-office messages to the
entire list.   I don't like getting them to the author with
individual postings (and it violates the standards too), but
that is both more tolerable and a little more understandable.  


Is there a standard for this? I could not find one. I did write an April 
1st RFC wannabe banning auto-replies to mailing lists, but I did not 
know an RFC existed.



Cheers
Suresh


___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: Nomcom 2007-8: Randomness Sources for review

2007-07-05 Thread Suresh Krishnan

Hi Lakshminath,
  In light of your clarifications, I have no further objections.

Thanks
Suresh

Lakshminath Dondeti wrote:
Following up on this thread, if there are any objections to the 
randomness sources at this time (after taking my clarifications into 
consideration), please do let me know.  I need to finalize this before 
the deadline tomorrow to stick to the timeline.


thanks,
Lakshminath



___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: Nomcom 2007-8: Randomness Sources for review

2007-07-04 Thread Suresh Krishnan

Hi Lakshminath,
  I think these sources are reasonable. I just require some
clarification about the lottery numbers. From your examples, it was not
clear to me how the lottery numbers will be entered as inputs to the
3797 algorithm. The algorithm recommends that the numbers be sorted in
some order.

Your example for Euromillions was

=We input 11 16 17 22 34 5 6

This is not sorted in any order. Do you consider the star numbers to be
different sources? Is the input order specified like this

* normal numbers in ascending order followed by the stars in ascending order

It would be nice to clarify this while announcing the sources.

Cheers
Suresh


**
NOTE:(Original mail sent only to [EMAIL PROTECTED] Responding to 
ietf@ietf.org since the ietf announce list is moderated.)


ORIGINAL MAIL

Folks,


As per the announced timeline 
(https://datatracker.ietf.org/public/show_nomcom_message.cgi?id=1231), 
which is 3777-compliant, the method of random selection was to be 
announced on July 6, 2007. I am presenting it earlier for your review.


In the past few cycles, nomcom chairs have used Wall Street's trading 
volumes as the sources of randomness to RFC 3797 random selection process.


However, I don't currently subscribe to the Wall Street Journal :) and 
besides RFC 3797 suggests that stock prices and/or volumes are a poor 
source of unambiguous data anyway, so I chose the following randomness 
sources; please review them and let me know if there are objections. The 
following dates assume that I can actually publish the list of 
volunteers on July 6th 2007 (as of today that has a high likelihood).


1. EuroMillions  Fri July 13, 2007 Results:


http://www.national-lottery.co.uk/player/p/results/results.do


All 7 numbers (5 numbers from 1 - 50 and 2 Lucky Stars from 1 - 9)
Results available online around 10 PM UK time.


e.g., Fri  Jun, 22 07 results 11 16 17 22 34 05 06
We input 11 16 17 22 34 5 6


2. US National debt (Debt Held by the Public), published by the 
Treasury department as of July 12, 2007 (Published on July 13, 2007)


The system is updated daily with the previous day's data. The update 
typically takes place around 3:00 pm EDT.


That according to



-Will
Web Development Branch
Bureau of the Public Debt


http://www.treasurydirect.gov/NP/BPDLogin?application=np


Last 8 digits, ignore the commas and periods from the Debt Held by the 
Public


e.g., Fri June 22, 2007  4,950,586,161,721.14
We select  16172114


3. US National debt (Intragovernmental Holdings), published by the 
Treasury department as of July 12, 2007 (Published on July 13, 2007)


http://www.treasurydirect.gov/NP/BPDLogin?application=np


Last 8 digits, ignore the commas and periods from the Intragovernmental 
Holdings


e.g., Fri June 22, 20073,852,643,882,285.79
We select  88228579


4. Lottery again, Megamillions


http://www.megamillions.com/winningpicks/last_25.asp


All 6 numbers (including the Mega Ball) from the drawing on July 13,
2007 (at 11:00 pm US Eastern time).


e.g., Fri June 22, 2007 result 11, 14, 21, 24, 31, 23
We input 11 14 21 24 31 23


All the inputs are to RFC 3797 selection algorithm. There is source code 
in that RFC and an example.


regards,
Lakshminath
Nomcom 2007-8 Chair

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-chakrabarti-ipv6-addrselect-api (IPv6 Socket API for Address Selection) to Informational RFC

2007-06-05 Thread Suresh Krishnan

Hi Vidya,

(Cc:ing Julien as well)

Narayanan, Vidya wrote:

All,
I'm passing along a comment from one of our developers.  Sorry, I have
not closely read the draft myself. But, if more clarification is needed,
I'll be happy to get more information.  


In section 13, the draft describes a procedure applications should
follow in case they require to use the address according to the
selection preferences specified (they should not communicate with
'wrong' address and fail). The procedure requires the application to do
a 'connect()' in step 3. The application may not even want to connect
(may be a TCP application) in case it is not getting a non-preferred
address. There should be a procedure described for such applications
too.


From what I understood from the draft, the API is used for specifying 
only preferences and not hard requirements. This text from Section 1 of 
the draft explains the reasoning.


   Specifying hard requirements for address selection
   would be problematic for several reasons.  The major
   one is that in the vast majority of cases the
   application would like to be able to communicate
   even if an address with the 'optimal' attributes is
   not available.

The authors can correct me, but I personally don't see how it is 
possible to check this deterministically without actually using 
connect() or sendto(). For argument's sake let's assume such a solution 
exists and the application verifies that a preferred address exists. 
What is to say this preferred address will not vanish before it is 
actually used (connect or sendto)?


Cheers
Suresh


___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Gen-ART review of draft-ietf-imss-fc-fcs-mib-02.txt

2007-02-19 Thread Suresh Krishnan

I am the assigned Gen-ART reviewer for
draft-ietf-imss-fc-fcs-mib-02.txt

For background on Gen-ART, please see the FAQ at
http://www.alvestrand.no/ietf/gen/art/gen-art-FAQ.html.

Please resolve these comments along with any other Last Call comments
you may receive.

Summary: This draft is basically ready for publication, but has nits
that should be fixed before publication.

Comments:

Minor:
==

* Section 1: Introduction

  I found this sentence strange. Is there any reason to keep it?

   This memo includes boilerplate which uses only one of the following
   terms, but is nevertheless required to mention all of the keywords in
   the following statement:

  The key words MUST, MUST NOT, REQUIRED, SHALL, SHALL
  NOT, SHOULD, SHOULD NOT, RECOMMENDED, MAY, and OPTIONAL
  in this document are to be interpreted as described in BCP 14, RFC
  2119 [RFC2119].

Editorial:
==

* No expiration date for draft on the first and last pages. According to

http://www.ietf.org/ietf/1id-guidelines.txt
===

   A document expiration date should appear on the first and last page
   of the Internet-Draft.  The expiration date is 185 days following the
   submission of the document as an Internet-Draft.  Use of the phrase
   expires in six months or expires in 185 days is not acceptable.

* Intended Status of the document is not specified in the draft. (I 
found it is Proposed Standard using the ID Tracker)


___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: Gen-ART review of draft-ietf-imss-fc-fcs-mib-02.txt

2007-02-19 Thread Suresh Krishnan

Hi Keith,
  Please find comments inline.

Thanks
Suresh


Without this sentence, the boilerplate implies that all of the listed
keywords are present in the document.  Since the boilerplate cannot be
changed, the sentence was included to avoid the erroneous implication.


I do not know of any draft/RFC which uses all of these keywords, but I 
am fine with leaving the sentence in.





Editorial:
==

* No expiration date for draft on the first and last pages. According to

http://www.ietf.org/ietf/1id-guidelines.txt
===

A document expiration date should appear on the first and last page
of the Internet-Draft.  The expiration date is 185 days following the
submission of the document as an Internet-Draft.  Use of the phrase
expires in six months or expires in 185 days is not acceptable.
 
The footer (on every page) contains the expiry date.


I was expecting a date and I found only the month in the footer.



* Intended Status of the document is not specified in the draft. (I 
found it is Proposed Standard using the ID Tracker)
 
The guidelines say:


   The Internet-Draft should neither state nor imply that it has any
   standards status; to do so conflicts with the role of the RFC Editor
   and the IESG.  The title of the document should not imply a status.
   Avoid the use of the terms Standard, Proposed, Draft, Experimental,
   Historic, Required, Recommended, Elective, or Restricted in the title
   of the Internet-Draft.  Indicating what status the document is aimed
   for is OK, but should be done with the words Intended status:
   status.

Since the I-D neither states nor implies that it has any standards status,
I believe it complies.


The restrictions on normative references are different for standards 
track documents as compared to informational documents. That is why the 
Intended Status: in the draft makes it easier to check for possible 
downward references. It is fine to leave it out. That is why it is a nit 
:-).



___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Gen-ART review of draft-ietf-l2tpext-failover-11.txt

2007-01-29 Thread Suresh Krishnan

I am the assigned Gen-ART reviewer for
draft-ietf-l2tpext-failover-11.txt

For background on Gen-ART, please see the FAQ at
http://www.alvestrand.no/ietf/gen/art/gen-art-FAQ.html.

Please resolve these comments along with any other Last Call comments
you may receive.

Summary: This draft is basically ready for publication, but has nits
that should be fixed before publication.

Comments:

Minor:
==

* IANA considerations

The IANA considerations section does not specify the namespace from 
which allocation is requested for the AVPs and the message types.



Editorial:
==

* Section 4.2 Failover Session Response

This sentence has a typo and does not read well

It is not required to respond one FSQ message with just on FSR.

I suggest removing it altogether so that the text will simply read

An endpoint MAY choose to respond to an FSQ message with multiple FSR
 messages



___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Gen-ART review of draft-daigle-unaptr-01.txt

2007-01-23 Thread Suresh Krishnan

I am the assigned Gen-ART reviewer for
draft-daigle-unaptr-01.txt

For background on Gen-ART, please see the FAQ at
http://www.alvestrand.no/ietf/gen/art/gen-art-FAQ.html.

Please resolve these comments along with any other Last Call comments
you may receive.

Summary: This draft is basically ready for publication, but has nits 
that should be fixed before publication.


Comments:

Editorial:
==

* Section 3

One of the lines is more than 72 characters long (The regexp line for 
NAPTR 200 10). Suggest removing some whitespace to make this fit


* Section 5 IANA considerations, paragraph 4

This text needs to be changed since section 4.5 is not below. So 
either remove the word below or move the restrictions in place below 
this paragraph.


There are no further restrictions placed on the tags other than that
 they must conform with the syntax defined below (Section 4.5).

* Section 5 IANA considerations, paragraph 2

I believe the phrase As with S-NAPTR makes more sense than As for 
S-NAPTR but this is a matter of personal preference.




___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Gen-ART review of draft-ietf-radext-filter-06.txt

2006-12-21 Thread Suresh Krishnan

I am the assigned Gen-ART reviewer for
draft-ietf-radext-filter-06.txt

For background on Gen-ART, please see the FAQ at
http://www.alvestrand.no/ietf/gen/art/gen-art-FAQ.html.

Please resolve these comments along with any other Last Call comments
you may receive.

Summary: This draft is basically ready for publication, but has minor 
issues that need to be clarified before publication.


Comments:

Substantial
===

* Section 6

  A legacy NAS not compliant
   with this specification may silently discard the NAS-Filter-Rule
   attribute while permitting the user to access the network.  This can
   lead to users improperly receiving unfiltered access to the network.
   As a result, the NAS-Filter-Rule attribute SHOULD only be sent to a
   NAS that is known to support it.

I do not understand the rationale behind this. In this case, if the 
server sends the NAS-Filter-Rule (that is ignored by the NAS) it is no 
worse off than not sending it at all. In either case the user gets 
unfiltered access to the network. Is this recommendation really necessary?


Minor
=
* Section 2
  Given the absence in [RFC4005] of well-defined precedence rules for
   combining Filter-Id and NAS-Filter-Rule attributes into a single
   rule set, the behavior of NASes receiving both attributes is
   undefined, and therefore a RADIUS server implementation cannot
   assume a consistent behavior

I do not understand why the lack of clarity in the Diameter spec 
precludes this document from coming up with its own precedence rules.

e.g. The document may state

If a Filter-Id attribute is present, a
 NAS implementing this specification MUST silently discard
 NAS-Filter-Rule attributes, if present.

I do not have a strong opinion about this but I feel that the reasoning 
is not obvious.


* Section 3

The following legend is unnecessary since it is not used in any message type

 0-1   Zero or one instance of this attribute MAY be
   present in the packet.

Editorial:
==

* The document contains no form feeds

* Some pages are longer than 58 lines

* Introduction paragraph 2

This sentence does not read well

However, in situations where the server
 operator does not know which filters have been pre-populated, it
 useful to specify filter rules explicitly.

Perhaps add a is/will be/may be... before the word useful.

However, in situations where the server
 operator does not know which filters have been pre-populated, it
 is useful to specify filter rules explicitly.



___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Gen-ART review of draft-ietf-ccamp-gmpls-rsvp-te-call-01.txt

2006-12-06 Thread Suresh Krishnan

I am the assigned Gen-ART reviewer for
draft-ietf-ccamp-gmpls-rsvp-te-call-01.txt.

For background on Gen-ART, please see the FAQ at
http://www.alvestrand.no/ietf/gen/art/gen-art-FAQ.html.

Please resolve these comments along with any other Last Call comments
you may receive.

Summary: This draft is basically ready for publication, but has nits
that should be fixed before publication.

Comments:

Substantial:


* General comment about backward compatibility

I think legacy transit nodes resetting the Call ID to zero on
transmission is a major issue that needs to be addressed more visibly in
the draft.

* Section 6.1

The following sentence needs to be tightened.

The text
Note that a Call MAY NOT be imposed ...

needs to be changed to

Note that a Call MUST NOT be imposed ...

since it is a prohibition to do so.

Semi-substantial:
=
* Section 5.1
  I did not understand what this sentence means. Does it mean the
notify message does not have to follow the path of LSPs or it must not
follow the path of LSPs? Adding some clarifying text on why it is so,
may be a good idea.
The Notify message is a targeted message and does
 not follow the path of LSPs through the network.

* Section 6.5 Call Collision

For the Call ID Contention error case, I do not see why we need to check
the remote source address, instead of always returning an error.

* Section 6.6.5

If a teardown request Notify message is received
 for an unknown Call ID, it is, nevertheless, responded to in the
 affirmative.

Why not return a Call Management/Unknown Call ID error instead?

* IANA considerations
  If there are existing implementations it would be nice to suggest
values for the RSVP objects and error codes to the IANA

Minor:
==

* The following text is repeated in both the abstract and the
introduction. One of them can be removed.

A Call does not provide the actual connectivity for transmitting user
 traffic, but only builds a relationship by which subsequent
 Connections may be made. In GMPLS such Connections are known as Label
 Switched Paths (LSPs).

* Section 4.3.1
  Suggest replacing

In this case the ingress...

with

In the case where the ingress...

since this case has not been defined.


Editorial:
==
There is a reference to RFC2747 in the references section but it is not
referenced anywhere in the draft. I would suggest removing the reference



___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Lost Logitech headset

2006-11-07 Thread Suresh Krishnan
Hi Folks, I lost a silver logitech headset with mic sometime this morning. If anyone found it, I would really appreciate it if you can let me know.ThanksSuresh
___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf