Re: TLS vs. IPsec (Was: Re: experiments in the ietf week)

2008-03-26 Thread Eric Rescorla
At Wed, 26 Mar 2008 07:32:41 -0700,
Eric Rescorla wrote:
> 
> At Wed, 26 Mar 2008 15:01:21 +0100,
> Iljitsch van Beijnum wrote:
> > 
> > On 26 mrt 2008, at 14:36, Eric Rescorla wrote:
> > 
> > > - Modern cryptographic implementations are extremely fast. For
> > >  comparison the MacBook Air I'm typing this on will do order 10^6
> > >  HMAC-MD5s/second on 64-byte packets.  So, to consume all my
> > >  resources would require order 10^8 bits per second, which is a
> > >  pretty serious packet-based DoS ittack on many contexts.
> > 
> > This is a bogus argument. Implementations are always inferior to  
> > optimistic performance claims 
> 
> What do you mean "optimistic performance claims"? I ran
> "openssl speed". That's actually a pretty good reflection
> of what the performance of SSL implementation will be.

That said, there is a dependency on cipher suite. So, RC4-MD5
is not too much slower than HMAC-MD5 alone. By contrast, 
AES-SHA1 is maybe 4x slower. OTOH, I only was counting the 
size of the TLS records themselves, so when you add the TCP
and UDP headers, the bit rate is probably twice as high.

-Ekr
___
IETF mailing list
IETF@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: TLS vs. IPsec (Was: Re: experiments in the ietf week)

2008-03-26 Thread Eric Rescorla
At Wed, 26 Mar 2008 15:01:21 +0100,
Iljitsch van Beijnum wrote:
> 
> On 26 mrt 2008, at 14:36, Eric Rescorla wrote:
> 
> > - Modern cryptographic implementations are extremely fast. For
> >  comparison the MacBook Air I'm typing this on will do order 10^6
> >  HMAC-MD5s/second on 64-byte packets.  So, to consume all my
> >  resources would require order 10^8 bits per second, which is a
> >  pretty serious packet-based DoS ittack on many contexts.
> 
> This is a bogus argument. Implementations are always inferior to  
> optimistic performance claims 

What do you mean "optimistic performance claims"? I ran
"openssl speed". That's actually a pretty good reflection
of what the performance of SSL implementation will be.


> and although maybe your laptop CAN do  
> that that doesn't mean you WANT it to spend its cycles and battery  
> power on that. (Or maybe you do, but I certainly don't.)

No, I don't, but once again you're totally missing the point:
the amount of bandwidth you'd need to perform a computational
DoS attack on the symmetric part of the system is so high
that it's basically a bandwidth-based DoS in itself.

> > - Even mounting this attack requires knowing both host/port
> >  quartets. With DTLS, as with TLS, the responder/server's
> >  port is typically known whereas the initiator/client's port
> >  is random or pseudorandom. This creates some barrier to
> >  mounting this attack.
> 
> The DTLS design to reuse the port numbers is not unreasonable as long  
> as DoS against CPU resources isn't a concern. But not using random  
> sequence numbers, like TCP has been doing since the dawn of time, is a  
> serious oversight because it costs next to nothing and buys a lot of  
> protection against spoofing attacks.

1. TCP has *not* used random sequence numbers since the dawn of
   time. On the contrary, they have been historically extremely
   predictable, hence RFC 1948 (though of course the techniques
   predate it.) And the reason that it now uses random sequence
   numbers is to block attacks much more severe than the ones
   you're describing here.
2. You're using the term "spoofing" in a way that's misleading.
   DTLS packets injected into the network by an attacker who
   does not have possession of the keying materal are quite
   correctly rejected by the DTLS stack. It's just that they
   are cryptographically verified first without being rejected
   out of hand.
3. As you say, it *is* cheap, but in keeping with our general
   principle of not improving TLS but just making it datagram
   capable, we decided to stick with TLS's 0-based sequence
   numbers.

Not to put too fine a point on it, I think this proposed attack
s basically irrelevant. I have not heard of any situation in
which anyone has mounted DoS attacks on machines by forcing
them to repeatedly perform cryptographic packet verifications
(most likely since it's so lame) and in the unlikely case that
that were to happen, we could always quickly roll out an
extension to randomize the sequence numbers.

> > - A very similar attack is available on IKE (and DTLS, of
> >  course). In order to block DoS attacks, both handshakes
> >  offer the option of doing a "stateless cookie" exchange,
> >  in which the responder gives the initiator a token which
> >  can be used to verify the client's next message (which must
> >  of course contain the token). But the way these tokens are
> >  generates is to have the responder compute a cryptographic
> >  MAC/hash over some input data. So an attacker can force
> >  any random IKE or DTLS stack to do as many digest operations
> >  as it wants.
> 
> That doesn't make sense. For such a cookie to provide additional  
> benefit over the normal HMAC, the value in the next message must be  
> present in that next message in the clear so the number of crypto  
> operations required is equal to the number of valid packets, which  
> isn't under the control of an attacker, rather than the total number  
> of packets (like a HMAC), which can be inflated by an attacker.

You might want to refamiliarize yourself with how these systems
actually work.

Let's take IKE as an example (though the situation is the same in
DTLS). Here's the initial exchange from RFC 4306 S 2.6.:

   Initiator  Responder
   ------
   HDR(A,0), SAi1, KEi, Ni   -->

 <-- HDR(A,0), N(COOKIE)

   HDR(A,0), N(COOKIE), SAi1, KEi, Ni   -->

 <-- HDR(A,B), SAr1, KEr, Nr, [CERTREQ]

So, whenever the responder gets *any* initial packet from
a plausible counterparty (and this is clearly in control of the
attacker), it has to compute a cookie. And how is that done?
Scrolling further down S 2.6, we get some advice.

   A good way to do this is to set the responder cookie to be:

  Cookie =  | Hash(Ni | IPi | SPIi | )


So, precisely as I said, an attacker can force the responder
to compute as many hashes

Re: TLS vs. IPsec (Was: Re: experiments in the ietf week)

2008-03-26 Thread Iljitsch van Beijnum
On 26 mrt 2008, at 14:36, Eric Rescorla wrote:

> - Modern cryptographic implementations are extremely fast. For
>  comparison the MacBook Air I'm typing this on will do order 10^6
>  HMAC-MD5s/second on 64-byte packets.  So, to consume all my
>  resources would require order 10^8 bits per second, which is a
>  pretty serious packet-based DoS ittack on many contexts.

This is a bogus argument. Implementations are always inferior to  
optimistic performance claims and although maybe your laptop CAN do  
that that doesn't mean you WANT it to spend its cycles and battery  
power on that. (Or maybe you do, but I certainly don't.)

> - Even mounting this attack requires knowing both host/port
>  quartets. With DTLS, as with TLS, the responder/server's
>  port is typically known whereas the initiator/client's port
>  is random or pseudorandom. This creates some barrier to
>  mounting this attack.

The DTLS design to reuse the port numbers is not unreasonable as long  
as DoS against CPU resources isn't a concern. But not using random  
sequence numbers, like TCP has been doing since the dawn of time, is a  
serious oversight because it costs next to nothing and buys a lot of  
protection against spoofing attacks.

> - A very similar attack is available on IKE (and DTLS, of
>  course). In order to block DoS attacks, both handshakes
>  offer the option of doing a "stateless cookie" exchange,
>  in which the responder gives the initiator a token which
>  can be used to verify the client's next message (which must
>  of course contain the token). But the way these tokens are
>  generates is to have the responder compute a cryptographic
>  MAC/hash over some input data. So an attacker can force
>  any random IKE or DTLS stack to do as many digest operations
>  as it wants.

That doesn't make sense. For such a cookie to provide additional  
benefit over the normal HMAC, the value in the next message must be  
present in that next message in the clear so the number of crypto  
operations required is equal to the number of valid packets, which  
isn't under the control of an attacker, rather than the total number  
of packets (like a HMAC), which can be inflated by an attacker.

>> The part that I don't like about DTLS is the way it avoids dealing
>> with MTU issues and pretty much tells people to do PMTUD for IPv4 for
>> UDP even though in theory this is extremely hard to get to work and
>> practice it never works.

> You've misunderstood the purpose of DTLS, which is to replicate
> the semantics of UDP to the greatest extent possible, consistent
> with also provided an association-based security system. Accordingly,
> since UDP-based applications have to deal with PMTU, they have to
> do so with DTLS as well.

I wasn't offering a critique of DTLS' purpose, but rather, of its  
operation. Path MTU discovery for IPv4 for UDP can only work if  
applications can adjust their packet sizes arbitrarily, which they  
often can't, or at least not in a reasonable way. Perpetuating this  
broken idea in DTLS was a mistake.
___
IETF mailing list
IETF@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: TLS vs. IPsec (Was: Re: experiments in the ietf week)

2008-03-26 Thread Eric Rescorla
At Wed, 26 Mar 2008 13:25:20 +0100,
Iljitsch van Beijnum wrote:
> 
> On 25 mrt 2008, at 16:10, Dan Wing wrote:
> 
> > ...
> >> And yes, the issues I referred to are DoS and TCP spoofing.
> >> These can only be protected against at the  network level.
> 
> > What are your thoughts on DTLS's DoS and spoofing protection?
> 
> Looks like this is mostly similar to IPsec except that the port  
> numbers rather than SA is used to demultiplex so the anti-DoS  
> protection that the sequence number / anti replay counter provides is  
> less than with IPsec.

You really need to describe the attacks you're concerned about, rather
than handwaving. After reading this a few times, I *think* you're
claiming the following:

An attacker who knows the host-port quartet of a DTLS association
can send send completely bogus but correctly formatted packets to
one side and therefore force them to attempt to decrypt the
record. This amounts to a computational DoS attack. Whereas, by
contrast, mounting this attack on IPsec requires knowing the SPI,
which presumably requires being on path, since it's random.

Do I have this right?

If so this is a pretty feeble attack. 

- Modern cryptographic implementations are extremely fast. For
  comparison the MacBook Air I'm typing this on will do order 10^6
  HMAC-MD5s/second on 64-byte packets.  So, to consume all my
  resources would require order 10^8 bits per second, which is a
  pretty serious packet-based DoS ittack on many contexts.
- Even mounting this attack requires knowing both host/port
  quartets. With DTLS, as with TLS, the responder/server's
  port is typically known whereas the initiator/client's port
  is random or pseudorandom. This creates some barrier to
  mounting this attack.
- A very similar attack is available on IKE (and DTLS, of
  course). In order to block DoS attacks, both handshakes
  offer the option of doing a "stateless cookie" exchange,
  in which the responder gives the initiator a token which 
  can be used to verify the client's next message (which must
  of course contain the token). But the way these tokens are
  generates is to have the responder compute a cryptographic
  MAC/hash over some input data. So an attacker can force
  any random IKE or DTLS stack to do as many digest operations
  as it wants.

> I assume this means in the future we'll be running TCP over DTLS over  
> UDP...
> 
> The part that I don't like about DTLS is the way it avoids dealing  
> with MTU issues and pretty much tells people to do PMTUD for IPv4 for  
> UDP even though in theory this is extremely hard to get to work and  
> practice it never works.

You've misunderstood the purpose of DTLS, which is to replicate
the semantics of UDP to the greatest extent possible, consistent
with also provided an association-based security system. Accordingly,
since UDP-based applications have to deal with PMTU, they have to
do so with DTLS as well.

-Ekr


___
IETF mailing list
IETF@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: TLS vs. IPsec (Was: Re: experiments in the ietf week)

2008-03-26 Thread Iljitsch van Beijnum
On 25 mrt 2008, at 16:10, Dan Wing wrote:

> ...
>> And yes, the issues I referred to are DoS and TCP spoofing.
>> These can only be protected against at the  network level.

> What are your thoughts on DTLS's DoS and spoofing protection?

Looks like this is mostly similar to IPsec except that the port  
numbers rather than SA is used to demultiplex so the anti-DoS  
protection that the sequence number / anti replay counter provides is  
less than with IPsec. Also, a quick read of RFC 4347 doesn't reveal  
any advice regarding the initial value of the sequence number, so  
applications may start at 0 or 1 and make this easy to guess.

I assume this means in the future we'll be running TCP over DTLS over  
UDP...

The part that I don't like about DTLS is the way it avoids dealing  
with MTU issues and pretty much tells people to do PMTUD for IPv4 for  
UDP even though in theory this is extremely hard to get to work and  
practice it never works.

I wonder what kind of security mechanisms we would come up with if we  
got to do all of this again from scratch but with the benefit of  
hindsight. I'm pretty sure it wouldn't be TLS+IPsec+DTLS. And if I  
could go back in time and make sure the person who invented the DF bit  
wouldn't make it to work that day, I wouldn't hesitate to do that.
___
IETF mailing list
IETF@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: experiments in the ietf week

2008-03-25 Thread Eric Rescorla
At Mon, 24 Mar 2008 15:17:56 +0100,
Iljitsch van Beijnum wrote:
> 
> On 19 mrt 2008, at 1:46, Eric Rescorla wrote:
> 
> >> A more interesting experiment would be to do away with SSL for a bit
> >> and use IPsec instead.
> 
> > Why would this be either interesting or desirable?
> 
> SSL is vulnerable to more attacks than IPsec and IPsec is more general  
> than SSL. As such it would be good if we could have IPsec deployment  
> similar to SSL deployment, similar to how it would be good to have  
> IPv6 rather than IPv4 deployment, so a similar experiment could be  
> useful in showing what if any the reasons are we're still stuck with  
> the inferior SSL/TLS technology.

One of the true joys of the IETF is watching people explain why 
their favorite technology is superior to the technology people
have actually chosen to use.

Both IPsec and SSL have applications where they are the appropriate
choice. I don't think there's a lot of point in going into them in
detail. But given that the attacks you're mentioning are frankly
irrelevant in 99.9% of cases (btw, I know what TCP spoofing is, but
it's not relevant for TLS, because the application should be looking
at the cryptographic identity, not the transport layer identity), the
notion that we should tear out most of the application layer security
infrastructure to accomodate your notions of architetural
appropriateness strikes me as extremely dubious.

-Ekr




___
IETF mailing list
IETF@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: TLS vs. IPsec (Was: Re: experiments in the ietf week)

2008-03-25 Thread Ned Freed
> On 24 mrt 2008, at 18:58, Jari Arkko wrote:

> > Now, if we had a proposal that turned IPsec into as easily deployable
> > between random clients and known servers as TLS, I would be interested
> > in a new experiment! But I did not see a proposal for that yet. Maybe
> > time for that draft that Phillip suggested in another thread,
> > Iljitsch?

> I'm afraid that won't work because of scheduling conflicts if I wanted
> to present such a draft to the appropriate SEC area wg...

> A quick s/TLS/IPsec/g isn't realistic, but I would certainly be
> interested in seeing one or more IETF services use some kind of IPsec
> protection in order to see if this is workable in practice. There are
> APIs that allow applications to set this up on a per-application
> basis, unless I'm mistaken.

I believe you're mistaken. There is much work that needs to be done in this
area before it will be possible for applications to use IPsec this way. The
good news is that the BTNS WG is actively working to fill this gap; see

An abstract interface between applications and IPsec 
(draft-ietf-btns-abstract-api-01.txt)
IPsec Channels: Connection Latching (draft-ietf-btns-connection-latching-06)
IPsec Application Programming Interfaces (draft-ietf-btns-c-api-03)

But even if this work is successful it will be many years before the necessary
support is sufficiently widely implemented and deployed to be usable, assuming
that ever happens.

Ned
___
IETF mailing list
IETF@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


RE: TLS vs. IPsec (Was: Re: experiments in the ietf week)

2008-03-25 Thread Dan Wing
Iljitsch van Beijnum wrote:

...
> And yes, the issues I referred to are DoS and TCP spoofing. 
> These can only be protected against at the  network level. 

What are your thoughts on DTLS's DoS and spoofing protection?

-d

___
IETF mailing list
IETF@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


RE: Write an RFC Was: experiments in the ietf week

2008-03-25 Thread Hallam-Baker, Phillip
Yes, a security experiment is not so interesting without an attack.
 
I would like an evil twin access point to be set up with a cert that says 'evil 
twin' and measure how much traffic goes through it. This is frequently done at 
BlackHat albeit not necessarily in a manner that complies with human subjects 
criteria.
 
Its not much of a security experiment if you only measure whether people can 
deploy it.
 



From: Andrew G. Malis [mailto:[EMAIL PROTECTED]
Sent: Tue 25/03/2008 9:05 AM
To: Patrik Fältström
Cc: Hallam-Baker, Phillip; IETF Discussion
Subject: Re: Write an RFC Was: experiments in the ietf week



Phillip does have a point regarding 802.1x authentication, which is
typically used to authenticate the user to the service, and not vice
versa. Conceivably a person could set up an "evil" access point that
advertises the same beacon as the official access points, and has
802.1x enabled to accept the same shared user name and password (which
is also well publicized).

One way that could make this much more secure from the user viewpoint
would be for every attendee to receive an individual 802.1x user name
and password, perhaps printed on the back of their name tag.
Presumably an "evil" access point would not have access to these names
and passwords, so users can be sure that they are attaching to an
official access point. But as this would create much more work for the
NOC and admin staff, I'm not advocating we do that.

Cheers,
Andy

On Mon, Mar 24, 2008 at 10:30 PM, Patrik Fältström <[EMAIL PROTECTED]> wrote:
>
> On 25 mar 2008, at 02.18, Hallam-Baker, Phillip wrote:
>
> > I am willing to have a go at it next time round but only if I have
> > some idea what I am expected to have on my machine and what
> > authentication indicata I am to expect.
> >
> > As it stands there is no way for me to evaluate an authentic or
> > inauthentic experience. I don't know what authentic looks like. I
> > have no trust anchor.
>
> This email message sent to me was enough of a trust anchor to use
> 802.1x. Specifically as "the instructions" are the same as IETF-70 and
> previous meetings.
>
> http://www.ietf.org/mail-archive/web/71attendees/current/msg00154.html
>
> Sure, the mail was not signed, but I also asked a friend at the
> meeting "what he used". And as we both had the same instructions, we
> trusted that. If we wanted to, we could have asked someone actually
> running the network, but we did not feel we had to.
>
>Patrik
>
>
> ___
> IETF mailing list
> IETF@ietf.org
> https://www.ietf.org/mailman/listinfo/ietf
>


___
IETF mailing list
IETF@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: TLS vs. IPsec (Was: Re: experiments in the ietf week)

2008-03-25 Thread Iljitsch van Beijnum
On 24 mrt 2008, at 18:58, Jari Arkko wrote:

> Now, if we had a proposal that turned IPsec into as easily deployable
> between random clients and known servers as TLS, I would be interested
> in a new experiment! But I did not see a proposal for that yet. Maybe
> time for that draft that Phillip suggested in another thread,  
> Iljitsch?

I'm afraid that won't work because of scheduling conflicts if I wanted  
to present such a draft to the appropriate SEC area wg...

A quick s/TLS/IPsec/g isn't realistic, but I would certainly be  
interested in seeing one or more IETF services use some kind of IPsec  
protection in order to see if this is workable in practice. There are  
APIs that allow applications to set this up on a per-application  
basis, unless I'm mistaken.

And yes, the issues I referred to are DoS and TCP spoofing. These can  
only be protected against at the  network level. Encryption can, and  
therefore, probably should, be handled at the transport level. (That  
is not to say that authentication at the network level is entirely  
useless, just that it can protect against more stuff at the network  
level.)
___
IETF mailing list
IETF@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Write an RFC Was: experiments in the ietf week

2008-03-25 Thread Andrew G. Malis
Phillip does have a point regarding 802.1x authentication, which is
typically used to authenticate the user to the service, and not vice
versa. Conceivably a person could set up an "evil" access point that
advertises the same beacon as the official access points, and has
802.1x enabled to accept the same shared user name and password (which
is also well publicized).

One way that could make this much more secure from the user viewpoint
would be for every attendee to receive an individual 802.1x user name
and password, perhaps printed on the back of their name tag.
Presumably an "evil" access point would not have access to these names
and passwords, so users can be sure that they are attaching to an
official access point. But as this would create much more work for the
NOC and admin staff, I'm not advocating we do that.

Cheers,
Andy

On Mon, Mar 24, 2008 at 10:30 PM, Patrik Fältström <[EMAIL PROTECTED]> wrote:
>
> On 25 mar 2008, at 02.18, Hallam-Baker, Phillip wrote:
>
> > I am willing to have a go at it next time round but only if I have
> > some idea what I am expected to have on my machine and what
> > authentication indicata I am to expect.
> >
> > As it stands there is no way for me to evaluate an authentic or
> > inauthentic experience. I don't know what authentic looks like. I
> > have no trust anchor.
>
> This email message sent to me was enough of a trust anchor to use
> 802.1x. Specifically as "the instructions" are the same as IETF-70 and
> previous meetings.
>
> http://www.ietf.org/mail-archive/web/71attendees/current/msg00154.html
>
> Sure, the mail was not signed, but I also asked a friend at the
> meeting "what he used". And as we both had the same instructions, we
> trusted that. If we wanted to, we could have asked someone actually
> running the network, but we did not feel we had to.
>
>Patrik
>
>
> ___
> IETF mailing list
> IETF@ietf.org
> https://www.ietf.org/mailman/listinfo/ietf
>
___
IETF mailing list
IETF@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Usability RE: Write an RFC Was: experiments in the ietf week

2008-03-25 Thread Hallam-Baker, Phillip
What I am trying to get at here is the problem of usability. Security is no use 
to me to stop Internet crime if everyone either turns it off or is unable to 
use it. The layered model is a big problem here because the lower layers 
abstract away the user. There is no user interface, there are no user oriented 
use cases and as a result the protocols fail to deliver the necessary 
information to the upper layers to allow the user to make sure that they are 
safe.


"3. Do Not Verify Server Cert and we won't verify yours :)"

OK, it is a good idea to turn on confidentiality and integrity. But this is not 
something that is really going to help solve the evil twin WiFi attack out in 
the general population. Its a pretty insidious attack as the effects are 
localized and we can't measure the frequency. 

If we are going to do experiments then we should be providing feedback to the 
relevant parties. Pointing out to the IEEE that WiFi security fails basic 
principles of security usability - the user does not have sufficient 
information to distinguish the intended connection from the twin - would be a 
useful purpose.


Of course, going round pointing out this sort of thing to others would make it 
incumbent on us to fix the same problems in our protocols.



-Original Message-
From: Patrik Fältström [mailto:[EMAIL PROTECTED]
Sent: Mon 24/03/2008 10:30 PM
To: Hallam-Baker, Phillip
Cc: Russ Housley; IETF Discussion
Subject: Re: Write an RFC Was: experiments in the ietf week
 

On 25 mar 2008, at 02.18, Hallam-Baker, Phillip wrote:

> I am willing to have a go at it next time round but only if I have  
> some idea what I am expected to have on my machine and what  
> authentication indicata I am to expect.
>
> As it stands there is no way for me to evaluate an authentic or  
> inauthentic experience. I don't know what authentic looks like. I  
> have no trust anchor.

This email message sent to me was enough of a trust anchor to use  
802.1x. Specifically as "the instructions" are the same as IETF-70 and  
previous meetings.

http://www.ietf.org/mail-archive/web/71attendees/current/msg00154.html

Sure, the mail was not signed, but I also asked a friend at the  
meeting "what he used". And as we both had the same instructions, we  
trusted that. If we wanted to, we could have asked someone actually  
running the network, but we did not feel we had to.

Patrik


___
IETF mailing list
IETF@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Write an RFC Was: experiments in the ietf week

2008-03-24 Thread Patrik Fältström

On 25 mar 2008, at 02.18, Hallam-Baker, Phillip wrote:

> I am willing to have a go at it next time round but only if I have  
> some idea what I am expected to have on my machine and what  
> authentication indicata I am to expect.
>
> As it stands there is no way for me to evaluate an authentic or  
> inauthentic experience. I don't know what authentic looks like. I  
> have no trust anchor.

This email message sent to me was enough of a trust anchor to use  
802.1x. Specifically as "the instructions" are the same as IETF-70 and  
previous meetings.

http://www.ietf.org/mail-archive/web/71attendees/current/msg00154.html

Sure, the mail was not signed, but I also asked a friend at the  
meeting "what he used". And as we both had the same instructions, we  
trusted that. If we wanted to, we could have asked someone actually  
running the network, but we did not feel we had to.

Patrik

___
IETF mailing list
IETF@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


RE: Write an RFC Was: experiments in the ietf week

2008-03-24 Thread Hallam-Baker, Phillip
I am willing to have a go at it next time round but only if I have some idea 
what I am expected to have on my machine and what authentication indicata I am 
to expect.

As it stands there is no way for me to evaluate an authentic or inauthentic 
experience. I don't know what authentic looks like. I have no trust anchor.


-Original Message-
From: Russ Housley [mailto:[EMAIL PROTECTED]
Sent: Mon 24/03/2008 3:22 PM
To: Hallam-Baker, Phillip
Cc: IETF Discussion
Subject: Re: Write an RFC Was: experiments in the ietf week
 
Phillip:

Have you tried the SSID at the IETF meetings that is configured to make use of 
802.1x?

Russ

At 01:49 PM 3/24/2008, Hallam-Baker, Phillip wrote:



Secure WiFi Connection

I would like to see some demonstration of the fact that the default 
WiFi configuration on all existing platforms provides zero protection against 
an 'evil twin' WiFi attack. Using WPA protection has little value unless you 
have mutual authentication. The current specs don't allow for that.


___
IETF mailing list
IETF@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


RE: Write an RFC Was: experiments in the ietf week

2008-03-24 Thread Hallam-Baker, Phillip
Well I would submit that there is a major problem there on the security 
usability front.

Don't make me think. My tolerance for network configuration is vastly greater 
than the typical user. 

This has to all just work, just like my Apple Mac did on the home network the 
day I bought it. Not like my Apple Mac this morning which for some 
unaccountable reason no longer sees the machines it acknowledged before and 
gives me precisely zero information to allow me to determine the cause.



From: Jari Arkko [mailto:[EMAIL PROTECTED]

> *Secure WiFi Connection*
>
> I would like to see some demonstration of the fact that the default
> WiFi configuration on all existing platforms provides zero protection
> against an 'evil twin' WiFi attack. Using WPA protection has little
> value unless you have mutual authentication. The current specs don't
> allow for that.
>
Is there something missing from ietf.1x ssid support that we've had for
years? It uses IETF standards, too...

Jari


___
IETF mailing list
IETF@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Write an RFC Was: experiments in the ietf week

2008-03-24 Thread Russ Housley


Phillip:
Have you tried the SSID at the IETF meetings that is configured to make
use of 802.1x?
Russ
At 01:49 PM 3/24/2008, Hallam-Baker, Phillip wrote:
Secure WiFi Connection

I would like to see some demonstration of the fact that the default WiFi
configuration on all existing platforms provides zero protection against
an 'evil twin' WiFi attack. Using WPA protection has little value unless
you have mutual authentication. The current specs don't allow for
that.


___
IETF mailing list
IETF@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Write an RFC Was: experiments in the ietf week

2008-03-24 Thread Jari Arkko
Phillip,

> write an Internet Draft prior to the experiment,
>

+1

> *IPv6 Next Steps*
>
> The Philadelphia IPv6 outage tested one specific aspect of the
> transition - is there an IPv6 network on the other side to connect to
> in due course, is it possible to run a pure IPv6 network?
>
> I think that that is one useful data point to test but not the only
> significant data point. In particular the biggest problem we have is
> the exhaustion of IPv4 space. The most important network test to make
> in my view is whether current generation machines work acceptably on
> an IPv6+NATv4Share connection for typical end user tasks.
>

I agree, and I think that's been the focus of many folks working in this
space. Lets see what we can come up with for Dublin.

> By 'acceptably' I mean ZERO-click administration. No configuration
> tweaks whatsoever. If a product does not run out of the box it has failed.
>
> *Secure WiFi Connection*
>
> I would like to see some demonstration of the fact that the default
> WiFi configuration on all existing platforms provides zero protection
> against an 'evil twin' WiFi attack. Using WPA protection has little
> value unless you have mutual authentication. The current specs don't
> allow for that.
>
Is there something missing from ietf.1x ssid support that we've had for
years? It uses IETF standards, too...

Jari

___
IETF mailing list
IETF@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


TLS vs. IPsec (Was: Re: experiments in the ietf week)

2008-03-24 Thread Jari Arkko
Phillip, Iljitsch,
 
> If you beleive that there is an attack that SSL is vulnerable to you
> should bring it up in TLS.

I think Iljitsch meant that TLS cannot protect against TCP
vulnerabilities, such as spoofed connection resets. This is obviously
well known.

The upside of TLS has of course been that its been extremely easy to
deploy. That's the experiment the planet has been running for the last
decade, and I think the results speak for themselves ;-)

Now, if we had a proposal that turned IPsec into as easily deployable
between random clients and known servers as TLS, I would be interested
in a new experiment! But I did not see a proposal for that yet. Maybe
time for that draft that Phillip suggested in another thread, Iljitsch?

Jari

___
IETF mailing list
IETF@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Write an RFC Was: experiments in the ietf week

2008-03-24 Thread Hallam-Baker, Phillip
Enough, already.

If we are going to have experiments in IETF week then lets do the thing right 
and have a process. In particular -

Proposer MUST write an Internet Draft prior to the experiment stating:

1) Purpose - the information to be obtained
2) Method - what it to be done
3) Resources - what will be required of the organizers
4) Expected outcomes - what it is expected that the experiment will tell us
5) Forcing functions - if the experiment is intended to be a forcing function 
for infrastructure deployment
6) Justification for spending the time and effort

Proposer MUST write up the results of the experiment and submit to the RFC 
editor afterwards

I don't think there is much point in just running the same experiment every 
time. It will become a tradition and the last thing this institution needs is 
more traditions that have outlived their utility cluttering up the process. 

And we should probably have a separate mailing list to discuss such proposals.

IPv6 Next Steps

The Philadelphia IPv6 outage tested one specific aspect of the transition - is 
there an IPv6 network on the other side to connect to in due course, is it 
possible to run a pure IPv6 network?

I think that that is one useful data point to test but not the only significant 
data point. In particular the biggest problem we have is the exhaustion of IPv4 
space. The most important network test to make in my view is whether current 
generation machines work acceptably on an IPv6+NATv4Share connection for 
typical end user tasks.

By 'acceptably' I mean ZERO-click administration. No configuration tweaks 
whatsoever. If a product does not run out of the box it has failed.

Secure WiFi Connection

I would like to see some demonstration of the fact that the default WiFi 
configuration on all existing platforms provides zero protection against an 
'evil twin' WiFi attack. Using WPA protection has little value unless you have 
mutual authentication. The current specs don't allow for that.

 

 

___
IETF mailing list
IETF@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


RE: experiments in the ietf week

2008-03-24 Thread Hallam-Baker, Phillip
These claims are meaningless to me. Transport and network layer security have 
distinct objectives and purposes. They are not replacements or interchangeable 
in any sense.
 
If you beleive that there is an attack that SSL is vulnerable to you should 
bring it up in TLS. 
 
 
In general the higher up you climb in the stack, the better the security you 
can offer. In order to provide application layer security in a correctly 
layered network model you have to apply security at a layer that the 
application talks to, that means either the messaging (S/MIME/PGP/S-HTTP/SHEN) 
or the transport layer (SSL, DNS). SSL provides confidentiality, integrity and 
authentication. If you want useful non-repudiation you need to move up to the 
message layer.
 
The advantage of going lower in the stack is to gain greater generality. IPSec 
allows every communication to be protected with a basic level of security in a 
manner that is transparent to the applications. As such it allows certain 
aspects of confidentiality and integrity to be supported but cannot inform 
application logic.
 
Security today is all about layered security. Ideally an email transaction 
would have at least three layers of security:
 
1) IPSec
 
2) TLS (between SUBMIT client to server, STP server to server, POP3/IMAP server 
to client)
 
3a) DKIM + S/MIME/PGP
   Each message should be DKIM signed as a matter of course
   If the recipient advertises an acceptable encryption key and protocol this 
should be used to encrypt the message
 
3b) DRM attachments
   If a message has attachments (e.g. Word, HTML Archive, etc) these should be 
subject to lifecycle-long data level protection.
 
 
The most critical layer here is layer 3b which is unfortunately the one we do 
not have today. At the moment 2014 is the earliest I can see there being the 
hope of an unencumbered data level security specification. 
 
I do not see any value in 'turning off' upper layer security enhancements as an 
experiment. 
 


From: [EMAIL PROTECTED] on behalf of Iljitsch van Beijnum
Sent: Mon 24/03/2008 10:17 AM
To: Eric Rescorla
Cc: Mark Andrews; Jari Arkko; IETF Discussion; Kurt Erik Lindqvist
Subject: Re: experiments in the ietf week 



On 19 mrt 2008, at 1:46, Eric Rescorla wrote:

>> A more interesting experiment would be to do away with SSL for a bit
>> and use IPsec instead.

> Why would this be either interesting or desirable?

SSL is vulnerable to more attacks than IPsec and IPsec is more general 
than SSL. As such it would be good if we could have IPsec deployment 
similar to SSL deployment, similar to how it would be good to have 
IPv6 rather than IPv4 deployment, so a similar experiment could be 
useful in showing what if any the reasons are we're still stuck with 
the inferior SSL/TLS technology.
___
IETF mailing list
IETF@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


___
IETF mailing list
IETF@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: experiments in the ietf week

2008-03-24 Thread Joe Abley

On 24 Mar 2008, at 11:18 , Marc Manthey wrote:

> hello ipv6  peoples, sorry for crossposting
>
> how can i use ipv6 from my machine ?
>
> using leopard 10.5.2. mail ?
>
> my endpoint is 2001:6f8:1051:0:20d:93ff:fe79:f1e
>
> thought its automatic :-P

I think you just need to make sure that the servers you use for  
inbound and outbound mail are reachable on IPv6 and have  records  
published in the DNS.


Joe

___
IETF mailing list
IETF@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: experiments in the ietf week

2008-03-24 Thread Marc Manthey
>
>> Umm...  At this time, most IETF mailing lists are hosted on
>> mail.ietf.org a.k.a. www.ietf.org, which is IPv6 enabled.
>> (The numbers I have for active WGs are that 90 out of 120 lists
>> are hosted on ietf.org).  I can't really reconcile that with
>> your statement above.  Could you expand on your thoughts in
>> this respect?
>
>
> IETF discussion list (and several others):
>
> Received: from mail.ietf.org (mail.ietf.org  
> [IPv6:2001:1890:1112:1::20])
>
> v6ops list:
>
> Received: from psg.com (psg.com [IPv6:2001:418:1::62])
>
> This is excellent progress since the last time I checked somewhere
> last year, which was the basis for my statement.

hello ipv6  peoples, sorry for crossposting

how can i use ipv6 from my machine ?

using leopard 10.5.2. mail ?

my endpoint is 2001:6f8:1051:0:20d:93ff:fe79:f1e

thought its automatic :-P

thanks

marc

-- 
"Wer also allgemeine Aufklärung verbreitet, verschafft zugleich eben  
dadurch allgemeine wechselseitige Sicherheit, und allgemeine  
Aufklärung und Sicherheit machen Fürsten und Staaten entbehrlich. Oder  
wozu braucht man sie sodann?"

Marc Manthey -  Hildeboldplatz 1a
D - 50672 Köln - Germany
Tel.:0049-221-3558032
Mobil:0049-1577-3329231
jabber :[EMAIL PROTECTED]
blog : http://www.let.de
ipv6 http://www.stattfernsehen.com/matrix
___
IETF mailing list
IETF@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: experiments in the ietf week

2008-03-24 Thread Iljitsch van Beijnum
On 16 mrt 2008, at 21:42, Henrik Levkowetz wrote:

> ... Nearly all IETF mailinglists are still hosted on IPv4-only
>> servers, to name just one issue.

> Umm...  At this time, most IETF mailing lists are hosted on
> mail.ietf.org a.k.a. www.ietf.org, which is IPv6 enabled.
> (The numbers I have for active WGs are that 90 out of 120 lists
> are hosted on ietf.org).  I can't really reconcile that with
> your statement above.  Could you expand on your thoughts in
> this respect?


IETF discussion list (and several others):

Received: from mail.ietf.org (mail.ietf.org [IPv6:2001:1890:1112:1::20])

v6ops list:

Received: from psg.com (psg.com [IPv6:2001:418:1::62])

This is excellent progress since the last time I checked somewhere  
last year, which was the basis for my statement.
___
IETF mailing list
IETF@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: experiments in the ietf week

2008-03-24 Thread Iljitsch van Beijnum
On 19 mrt 2008, at 1:46, Eric Rescorla wrote:

>> A more interesting experiment would be to do away with SSL for a bit
>> and use IPsec instead.

> Why would this be either interesting or desirable?

SSL is vulnerable to more attacks than IPsec and IPsec is more general  
than SSL. As such it would be good if we could have IPsec deployment  
similar to SSL deployment, similar to how it would be good to have  
IPv6 rather than IPv4 deployment, so a similar experiment could be  
useful in showing what if any the reasons are we're still stuck with  
the inferior SSL/TLS technology.
___
IETF mailing list
IETF@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: experiments in the ietf week

2008-03-19 Thread Jari Arkko
Yes, that's excellent. In particular, I like your approach of making
things available for the IETF crowd, delivered by the folks who are also
delivering the standards.

Jari

___
IETF mailing list
IETF@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: experiments in the ietf week

2008-03-19 Thread Hannes Tschofenig
Hi Jari,

we have already started todo the same with other protocols in GEOPRIV. See
http://www.ietf.org/mail-archive/web/geopriv/current/msg05453.html
http://www.ietf.org/mail-archive/web/geopriv/current/msg05468.html
http://www.ietf.org/mail-archive/web/geopriv/current/msg05472.html

Ciao
Hannes

Jari Arkko wrote:
> I really enjoyed the IPv6 experiment, thanks to everyone who was
> involved. Obviously, the experiment and a couple of other recent things
> (like moving to AMS service) made things move forward in a number of
> different places, our own computers, IETF computers, various people's
> own and company sites, etc. Perhaps the most notable achievement here
> was ipv6.google.com. That was really great, thank you Google!
>
> But the experiment was useful also in other ways, not only as an
> operational/deployment action. The two experiments that I attended
> (NANOG and IETF) have changed my and maybe other people's opinions too
> on some of the technical issues. I think it helps us see clearer on what
> are the things that the IETF needs to do in this space. We will see
> follow-ups on this.
>
> We should also implement future IPv6 experiments and network deployments.
>
> But why I'm really sending this e-mail is to suggest that IPv6 might not
> be the only topic for such future efforts. Here's a challenge for the
> RAI folks: What about SIP, as in every plenary participant making SIP
> calls to each other. Doable?
>
> Challenge for our IT folks: Internationalized Internet Drafts, including
> file names. Doable?
>
> ietf.pana in addition to ietf.1x. Doable?
>
> Etc
>
> Jari
>
> ___
> IETF mailing list
> IETF@ietf.org
> https://www.ietf.org/mailman/listinfo/ietf
>   

___
IETF mailing list
IETF@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: experiments in the ietf week

2008-03-19 Thread Jari Arkko
Eric,

> I was referring to Iljitsch's suggestion about SSL and IPsec, not
> the suggestion about DNSSEC.
>   
Yes. FWIW, I don't think that would be interesting. DNSSEC experiments
by itself might be interesting, particularly if they could be combined
with some movement in getting the root signed.

Jari

___
IETF mailing list
IETF@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: experiments in the ietf week

2008-03-19 Thread Eric Rescorla
At Wed, 19 Mar 2008 22:59:52 +1100,
Mark Andrews wrote:
> 
> 
> > At Sun, 16 Mar 2008 19:44:12 +0100,
> > Iljitsch van Beijnum wrote:
> > > 
> > > On 16 mrt 2008, at 2:16, Mark Andrews wrote:
> > > 
> > > > Enable DNSSEC validation on the network's servers.  At a
> > > > minimum make them DNSSEC transparent.
> > > 
> > > 
> > > Is there any software out there for common OSes that does something  
> > > useful with this?
> > > 
> > > A more interesting experiment would be to do away with SSL for a bit  
> > > and use IPsec instead. 
> > 
> > Why would this be either interesting or desirable?
> 
>   DNSSEC transparency is important for machines on the IPv6
>   only net trying to validate answers off IPv4 only servers.
> 
>   Validatation is useful for protecting the resolvers themselves.

I was referring to Iljitsch's suggestion about SSL and IPsec, not
the suggestion about DNSSEC.

-Ekr
___
IETF mailing list
IETF@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: experiments in the ietf week

2008-03-19 Thread Mark Andrews

> At Sun, 16 Mar 2008 19:44:12 +0100,
> Iljitsch van Beijnum wrote:
> > 
> > On 16 mrt 2008, at 2:16, Mark Andrews wrote:
> > 
> > >   Enable DNSSEC validation on the network's servers.  At a
> > >   minimum make them DNSSEC transparent.
> > 
> > 
> > Is there any software out there for common OSes that does something  
> > useful with this?
> > 
> > A more interesting experiment would be to do away with SSL for a bit  
> > and use IPsec instead. 
> 
> Why would this be either interesting or desirable?

DNSSEC transparency is important for machines on the IPv6
only net trying to validate answers off IPv4 only servers.

Validatation is useful for protecting the resolvers themselves.

Mark
 
> -Ekr
> ___
> IETF mailing list
> IETF@ietf.org
> https://www.ietf.org/mailman/listinfo/ietf
-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742 INTERNET: [EMAIL PROTECTED]
___
IETF mailing list
IETF@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: experiments in the ietf week

2008-03-18 Thread Eric Rescorla
At Sun, 16 Mar 2008 19:44:12 +0100,
Iljitsch van Beijnum wrote:
> 
> On 16 mrt 2008, at 2:16, Mark Andrews wrote:
> 
> > Enable DNSSEC validation on the network's servers.  At a
> > minimum make them DNSSEC transparent.
> 
> 
> Is there any software out there for common OSes that does something  
> useful with this?
> 
> A more interesting experiment would be to do away with SSL for a bit  
> and use IPsec instead. 

Why would this be either interesting or desirable?

-Ekr
___
IETF mailing list
IETF@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: experiments in the ietf week

2008-03-16 Thread Mark Andrews

> On 16 mrt 2008, at 2:16, Mark Andrews wrote:
> 
> > Enable DNSSEC validation on the network's servers.  At a
> > minimum make them DNSSEC transparent.
> 
> 
> Is there any software out there for common OSes that does something  
> useful with this?

Yes.  It is also useful in its own right by protecting the
down stream clients.

Note: DNSSEC validation in the recursive resolver is stage 1
of DNSSEC deployment.
 
> A more interesting experiment would be to do away with SSL for a bit  
> and use IPsec instead. But I think we're far from being finished with  
> IPv6. Nearly all IETF mailinglists are still hosted on IPv4-only  
> servers, to name just one issue.
-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742 INTERNET: [EMAIL PROTECTED]
___
IETF mailing list
IETF@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: experiments in the ietf week

2008-03-16 Thread Henrik Levkowetz
Hi Iljitsch,

On 2008-03-16 19:44 Iljitsch van Beijnum said the following:
... Nearly all IETF mailinglists are still hosted on IPv4-only  
> servers, to name just one issue.

Umm...  At this time, most IETF mailing lists are hosted on
mail.ietf.org a.k.a. www.ietf.org, which is IPv6 enabled.  
(The numbers I have for active WGs are that 90 out of 120 lists
are hosted on ietf.org).  I can't really reconcile that with 
your statement above.  Could you expand on your thoughts in
this respect?


Henrik
___
IETF mailing list
IETF@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: experiments in the ietf week

2008-03-16 Thread Iljitsch van Beijnum
On 16 mrt 2008, at 2:16, Mark Andrews wrote:

>   Enable DNSSEC validation on the network's servers.  At a
>   minimum make them DNSSEC transparent.


Is there any software out there for common OSes that does something  
useful with this?

A more interesting experiment would be to do away with SSL for a bit  
and use IPsec instead. But I think we're far from being finished with  
IPv6. Nearly all IETF mailinglists are still hosted on IPv4-only  
servers, to name just one issue.
___
IETF mailing list
IETF@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: experiments in the ietf week

2008-03-15 Thread Mark Andrews

Enable DNSSEC validation on the network's servers.  At a
minimum make them DNSSEC transparent.

Mark

-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742 INTERNET: [EMAIL PROTECTED]
___
IETF mailing list
IETF@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: experiments in the ietf week

2008-03-15 Thread Brian E Carpenter
On 2008-03-16 02:09, Russ Housley wrote:
> Jari:
> 
>  > Challenge for our IT folks: Internationalized Internet Drafts,
>  > including file names. Doable?
> 
> Six or seven years ago we had a big discussion regarding the 
> language(s) to be used in the IETF.  Harald was IETF Chair when this 
> discussion took place, and he declared the consensus to be that the 
> IETF would use on language: English.
> 
> I do think it would be useful to look at representing author names 
> according to the individual's preference. 

And addresses. And there's also the question of useful examples
in drafts discussing I18N issues.

> However, I do not think 
> that non-English file names are consistent with the consensus that was 
> reached.

Agreed; I think there are too many practical problems in that,
that really aren't ours to solve.

draft-hoffman-utf8-rfcs talked about this. An experiment wouldn't be
hard, and doesn't need a plenary...

   Brian
___
IETF mailing list
IETF@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: experiments in the ietf week

2008-03-15 Thread Kurt Erik Lindqvist

On 14 mar 2008, at 13.01, Jari Arkko wrote:
> We should also implement future IPv6 experiments and network  
> deployments.
>
> But why I'm really sending this e-mail is to suggest that IPv6 might  
> not
> be the only topic for such future efforts. Here's a challenge for the
> RAI folks: What about SIP, as in every plenary participant making SIP
> calls to each other. Doable?
>
> Challenge for our IT folks: Internationalized Internet Drafts,  
> including
> file names. Doable?
>
> ietf.pana in addition to ietf.1x. Doable?

I would like to second Jari's statement. To follow up to Joel's  
comment at the technical plenary on the issue of lack of operators - I  
believe that if the designers and vendors of some of the IETF  
standards better understood how they actually worked in real use cases  
and tried to deployment - we might find a lot more deployment issues  
earlier.

I am all for it.

- kurtis -
___
IETF mailing list
IETF@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: experiments in the ietf week

2008-03-15 Thread Russ Housley
Jari:

 > Challenge for our IT folks: Internationalized Internet Drafts,
 > including file names. Doable?

Six or seven years ago we had a big discussion regarding the 
language(s) to be used in the IETF.  Harald was IETF Chair when this 
discussion took place, and he declared the consensus to be that the 
IETF would use on language: English.

I do think it would be useful to look at representing author names 
according to the individual's preference.  However, I do not think 
that non-English file names are consistent with the consensus that was reached.

Russ

___
IETF mailing list
IETF@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: experiments in the ietf week

2008-03-14 Thread Richard Barnes
As some of you might have noticed, some GEOPRIV participants ran a small 
experiment, using the IETF network as a base for location-based 
services.  We had a few folks try it, and learned a lot, but three main 
things:

1. Interworking with the IETF NOC was really pleasant (Thanks, guys!)

2. James Winterbottom's location server worked really well and 
integrated easily with the IETF network.

2. The client software I wrote successfully interworked with the 
location server in test cases, but failed badly in real life

Overall, prototyping these technologies was a really positive experience 
for us, one that I would recommend to other WGs.  We're certainly 
planning on making another effort at it in Dublin!

--Richard



Jari Arkko wrote:
> I really enjoyed the IPv6 experiment, thanks to everyone who was
> involved. Obviously, the experiment and a couple of other recent things
> (like moving to AMS service) made things move forward in a number of
> different places, our own computers, IETF computers, various people's
> own and company sites, etc. Perhaps the most notable achievement here
> was ipv6.google.com. That was really great, thank you Google!
> 
> But the experiment was useful also in other ways, not only as an
> operational/deployment action. The two experiments that I attended
> (NANOG and IETF) have changed my and maybe other people's opinions too
> on some of the technical issues. I think it helps us see clearer on what
> are the things that the IETF needs to do in this space. We will see
> follow-ups on this.
> 
> We should also implement future IPv6 experiments and network deployments.
> 
> But why I'm really sending this e-mail is to suggest that IPv6 might not
> be the only topic for such future efforts. Here's a challenge for the
> RAI folks: What about SIP, as in every plenary participant making SIP
> calls to each other. Doable?
> 
> Challenge for our IT folks: Internationalized Internet Drafts, including
> file names. Doable?
> 
> ietf.pana in addition to ietf.1x. Doable?
> 
> Etc
> 
> Jari
> 
> ___
> IETF mailing list
> IETF@ietf.org
> https://www.ietf.org/mailman/listinfo/ietf
___
IETF mailing list
IETF@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: experiments in the ietf week

2008-03-14 Thread Julian Reschke
Fred Baker wrote:
> On Mar 14, 2008, at 8:01 AM, Jari Arkko wrote:
> 
>> Challenge for our IT folks: Internationalized Internet Drafts,  
>> including file names. Doable?
> 
> It's doable, no doubt. The next question is whether this is actually  
> smart.
> 
> The Finnish character set is something I can deal with, although my  
> keyboard differs from a Finnish one, making typing the name in  
> something I would have to think about. I personally don't speak or  
> read any of the languages that use derivatives of the Han character  
> set, and will find it difficult to read or point you to a draft with  
> a Japanese or Chinese name.
> 
> I'm inclined to wonder what problem you're solving and what problem  
> you're trading that one for. I imagine it is that you would like to  
> be able to use Finnish words in draft monikers or to post internet  
> drafts in Finnish. I would counsel you to be careful what you wish  
> for. If the important thing is global communication among engineers,  
> this might take you in a direction you didn't really intend.

Well,

two wishes that come up frequently are really modest:

- the ability to provide properly spelled contact information

- the ability to use non-ASCII characters in specification text that 
deals with I18N

Of course to make this useful, it would need to be accepted in RFCs as well.

BR, Julian
___
IETF mailing list
IETF@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: experiments in the ietf week

2008-03-14 Thread Fred Baker

On Mar 14, 2008, at 8:01 AM, Jari Arkko wrote:

> Challenge for our IT folks: Internationalized Internet Drafts,  
> including file names. Doable?

It's doable, no doubt. The next question is whether this is actually  
smart.

The Finnish character set is something I can deal with, although my  
keyboard differs from a Finnish one, making typing the name in  
something I would have to think about. I personally don't speak or  
read any of the languages that use derivatives of the Han character  
set, and will find it difficult to read or point you to a draft with  
a Japanese or Chinese name.

I'm inclined to wonder what problem you're solving and what problem  
you're trading that one for. I imagine it is that you would like to  
be able to use Finnish words in draft monikers or to post internet  
drafts in Finnish. I would counsel you to be careful what you wish  
for. If the important thing is global communication among engineers,  
this might take you in a direction you didn't really intend.

___
IETF mailing list
IETF@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


experiments in the ietf week

2008-03-14 Thread Jari Arkko
I really enjoyed the IPv6 experiment, thanks to everyone who was
involved. Obviously, the experiment and a couple of other recent things
(like moving to AMS service) made things move forward in a number of
different places, our own computers, IETF computers, various people's
own and company sites, etc. Perhaps the most notable achievement here
was ipv6.google.com. That was really great, thank you Google!

But the experiment was useful also in other ways, not only as an
operational/deployment action. The two experiments that I attended
(NANOG and IETF) have changed my and maybe other people's opinions too
on some of the technical issues. I think it helps us see clearer on what
are the things that the IETF needs to do in this space. We will see
follow-ups on this.

We should also implement future IPv6 experiments and network deployments.

But why I'm really sending this e-mail is to suggest that IPv6 might not
be the only topic for such future efforts. Here's a challenge for the
RAI folks: What about SIP, as in every plenary participant making SIP
calls to each other. Doable?

Challenge for our IT folks: Internationalized Internet Drafts, including
file names. Doable?

ietf.pana in addition to ietf.1x. Doable?

Etc

Jari

___
IETF mailing list
IETF@ietf.org
https://www.ietf.org/mailman/listinfo/ietf