Re: cost of dual-stack vs cost of v6-only [Re: IPv6 on SOHO routers?]

2008-03-13 Thread David W. Hankins
On Thu, Mar 13, 2008 at 03:26:48PM +0200, Pekka Savola wrote:
 On Wed, 12 Mar 2008, Leo Bicknell wrote:
 ISP's are very good at one thing, driving out unnecessary cost.
 Running dual stack increases cost.  While I'm not sure about the 5
 year part, I'm sure ISP's will move to disable IPv4 support as soon
 as the market will let them as a cost saving measure.  Runing for
 decades dual stacked does not make a lot of economic sense for
 all involved.
 
 So, can you elaborate why you think the cost of running dual stack is 
 higher than the cost of spending timemoney on beind on the bleeding 
 edge to do v6-only yet supporting v4 for your existing and future 
 customers still wedded to the older IP protocol?

I don't know why Leo thinks so, but even I can observe the extra
recurring support cost of having to work through two stacks with every
customer that dials in as being far greater than any technology
costs in either single-stack scenario.  The 'recurring' part is the
real killer.

-- 
Ash bugud-gul durbatuluk agh burzum-ishi krimpatul.
Why settle for the lesser evil?  https://secure.isc.org/store/t-shirt/
-- 
David W. HankinsIf you don't do it right the first time,
Software Engineeryou'll just have to do it again.
Internet Systems Consortium, Inc.   -- Jack T. Hankins


pgpolPyLiJUnU.pgp
Description: PGP signature


Re: An Internet IPv6 Transition Plan

2007-07-25 Thread David W. Hankins
On Tue, Jul 24, 2007 at 10:01:44AM -0400, Chad Oleary wrote:
 DHCPv6 doesn't even hand out addresses.

I wasn't going to say anything because Alain already said something.

But we've gotten this question from at least two other sources in the
last two days who read this and wanted to ask us what that was about.

What were they thinking?  It does seem pretty weird.

So hopefully it will help people who don't have a geek to ask if I
were to explain what's going on here:


There are 'stateless' and 'stateful' ways to implement DHCPv6.  You
don't get address assignment unless you do 'stateful' DHCPv6 (and then
it's complicated by wether you mean 'normal' addresses, 'temporary'
addresses which change every renew, or 'prefix delegation').

But DHCPv6 does give out addresses.

The easy way to think of DHCPv6 stateful vs stateless is to realize
we have the same relationship in DHCPv4 - you can get an address like
people normally do with DHCPv4, or you can use a DHCPINFORM if you
already have one...so you can get configuration values like
nameservers and such without allocating an address.  That's all
stateless DHCPv6 is.

What Alain said is that until 12-18 months prior to today, there have
not been very many sources of stateful DHCPv6 implementations.  There
are several implementations out now, many appearing enabled by default
on production software you probably already have in your networks.

-- 
Ash bugud-gul durbatuluk agh burzum-ishi krimpatul.
Why settle for the lesser evil?  https://secure.isc.org/store/t-shirt/
-- 
David W. HankinsIf you don't do it right the first time,
Software Engineeryou'll just have to do it again.
Internet Systems Consortium, Inc.   -- Jack T. Hankins


pgpjg14h4FrXY.pgp
Description: PGP signature


Re: DNS Hijacking by Cox

2007-07-23 Thread David W. Hankins
On Mon, Jul 23, 2007 at 12:44:07PM -0400, Sean Donelan wrote:
 
 On Mon, 23 Jul 2007, Joe Greco wrote:
 I can't help but notice you totally avoided responding to what I wrote;
 I would have to take this to mean that you know that it is fundamentally
 unreasonable to expect users to set up their own recursers to work around
 ISP recurser brokenness (which is essentially what this is).
 
 Its more resonable to expect users to know how to remove bots and fix 
 their compromised computers?

Is it more reasonable to expect bots to implement recursive
nameservers?

-- 
Ash bugud-gul durbatuluk agh burzum-ishi krimpatul.
-- 
David W. HankinsIf you don't do it right the first time,
Software Engineeryou'll just have to do it again.
Internet Systems Consortium, Inc.   -- Jack T. Hankins


pgpS0pbhOOJP8.pgp
Description: PGP signature


Operators: the IETF's Dark Gods

2007-05-31 Thread David W. Hankins
On Wed, May 30, 2007 at 05:34:44PM -0700, Randy Bush wrote:
 about to run out of ip space.  a half-assed design was released.  the
 press stopped screaming.  victory was declared, everyone went home.

Actually, they didn't go home.  Victory, they think, is never having
to go home (but IETF Dallas is another story).

I'm sorry this story is a bit long, the way I tell it, but hopefully
it is entertaining (or at least easy to delete and ignore).

At my first IETF, I attended a 'Scotch BoF'.  It was singularly the
most disturbing experience I've ever had at an IETF.  Not merely
because I don't drink, nor merely because of the antics of Internet
professionals at a level of intoxication reminiscent of college
dormatories.

Every drink of scotch requires a toast, and every toast must be
suffixed with ...and the Universal Deployment of IPv6.  This phrase
is uttered not jovially...not with celebratory thrust one usually
attributes to, well, a toast...but rather with a low, monotonic,
metronomic chant, in a chorus.

You could hear it from outside the room, four doors down the hall.

It is very much reminiscent of the congregation answers lines in
church proceedings.  Upon entry, I spent a few moments looking around
for the Dark Altar these chants were directed to, as I expected to
find chicken entrails, and black candles burning low.  Perhaps a
statue of a goat, or an incense burner, something to mark the
demonic power they're hoping has the will and fortitude to see
IPv6 universally deployed if only their chants will appease it.

Actually I suppose you could say there was incense, but it was the
dank, hot and humid incense of far too many people crowded in a hotel
room with open flasks of single-malt.  You could smell it down the
hall, as near as the elevators.

The point is I came to a realization:  They were praying, and the
altar they were praying to is an entity absent all too often in IETF
proceedings in numbers sufficient to exert a presence...so it's
fitting that there was no icon to represent it in their church.

Operators.

They're praying to the Big Operator in the Sky to deliver them to the
promised land, an IPv6 network upon which their applications will
multiply and flourish, and their products can be sold.


Truly, I was a pilgrim in an unholy land.


 and, as usual, ops and engineering get to clean up the disaster.

Except that this time, there are masses of people who now prostrate
themselves before the Dark Altar of Operators, intoning mystic
rituals of their own invention in hopes to appease you.  Like the
world's children who write to Santa Claus every year, these people
have a list of toys they would like the Internet's operators to place
in their stockings, and they're rapidly becoming more and more
prepared to be good children to get them.

It's progress, I think, that this places a substantially fairer
share of power in the hands of those who can do something with
it.  For, after all, Santa Claus can always choose to give coal.

But one might hope that at some point, they will give up praying
for their answers, and will seek them instead.


Obligatory operational content:  Stock up on coal.  If someone
asks if you're a God, say Yes.

-- 
David W. HankinsIf you don't do it right the first time,
Software Engineeryou'll just have to do it again.
Internet Systems Consortium, Inc.   -- Jack T. Hankins


pgp9wZ4PvnUgg.pgp
Description: PGP signature


Re: NANOG 40 agenda posted

2007-05-30 Thread David W. Hankins
On Tue, May 29, 2007 at 02:06:54PM +0200, Iljitsch van Beijnum wrote:
 DHCPv6 can't provide a  
 default gateway, you need stateless autoconfig for that even if you  
 use DHCPv6 for address assignment.

I think you mean router advertisement, not stateless autoconfig.

You don't need the M bit clear in order to use the router.

On this topic, DHCPv6 also can't deliver a subnet prefix to clients.
These are only delivered by router advertisements containing prefix
options (not all router advertisements will contain prefix options,
or may not include a prefix covering the allocated address), and
without them, DHCPv6 implementations are justified in assuming the
allocated address is a /128.

Logically, they can't talk to one another without an advertising
router present.

So...I think how these two protocols comingle could use some work.

In truth, I think we should just ditch rtadv/rtsol and add routers
and subnet-mask options to DHCPv6.  That's a shorter path with more
finality than the pandora's box of adding options to rtadv.

 And there is the extra info, but DNS resolvers may be availalbe in  
 stateless autoconfig in the future as well.

Again, you mean in rtadv.  Is it just me, or does it seem unusual
for network infrastructure to advertise host configuration
parameters?

Maybe I'm getting old, but the idea of managing this configuration
information in my routers sounds like a real chore compared to the
old DHCP relayed central server model.

 This is probably the way we want to do IPv6 address provisioning for  
 end-users in the future, but that requires that home gateways that  
 implement IPv6 routing functionality come with the DHCPv6 prefix  
 delegation client capability and have this configured by default so  
 it all works out of the box.

There's also a bit of a hinky issue in routing the delegated prefix
to the client.  Obviously, you don't trust route advertisements
from the client - you're not going to run OSPF or BGP with all your
broadband customers.

How to do this in a way we can all just plug and play hasn't quite
been decided yet.


Would there be interest on a DHCPv6 related presentation at NANOG?

-- 
David W. HankinsIf you don't do it right the first time,
Software Engineeryou'll just have to do it again.
Internet Systems Consortium, Inc.   -- Jack T. Hankins


pgp2HnT7yB8R7.pgp
Description: PGP signature


Re: DHCPv6, was: Re: IPv6 Finally gets off the ground

2007-04-18 Thread David W. Hankins
On Tue, Apr 17, 2007 at 08:20:08PM -0400, Leo Bicknell wrote:
 It's not that users are stupid, necessarily.

That was a bad choice of words on my part.  I was aiming at describing
the perception we often have, as we sit in our back rooms and hear
the varied reports from our support departments of the frustrations
our users confront.

We're in complete agreement, I just didn't voice it properly.

-- 
David W. HankinsIf you don't do it right the first time,
Software Engineer   you'll just have to do it again.
Internet Systems Consortium, Inc.   -- Jack T. Hankins


pgpyJTavctwaz.pgp
Description: PGP signature


Re: DHCPv6, was: Re: IPv6 Finally gets off the ground

2007-04-16 Thread David W. Hankins
On Mon, Apr 16, 2007 at 01:59:36PM +1200, Perry Lorier wrote:
 When you can plug your computer in, and automatically (with no
 clicking) get an IPv6 address, 
 
 Router Advertisements let you automatically configure as many IPv6 
 addresses as you feel like.

Remember that in XP, which Iljitsch recently cited to support his
claim of years of operating system support, you must click IPv6
into your configuration.  It probably wants your XP install disc,
or something like that.

In my point of view, this does not cut the mustard for such words.


Let's be clear:

There has been router and operating system support for years is
a statement which predicates that the World has no technical excuse
for not running IPv6 globally edge-to-edge already.

I think such a statement is fundamentally flawed.


 This could be a fairly simple defacto standard if network operators 
 start using it.  This is an obvious weak link in the chain at this point 
 tho.

Does this represent years of router and operating system support?

My answer is no.

 once you have DNS you can use the WPAD proxy auto discovery thingamabob.

...if you also had your domain suffix (unless you are suggesting
that there have been WPAD records at the root for years?).

RTADV won't help you here (tho they keep talking about putting
domain-search and nameservers in it), and neither will DHCPv6
as it turns out (it carries a domain-search list, but not your
domain suffix which is more what WPAD should really want).

This is not years of operating system support.

What has had years of operating system support, is the
unfortunate practice of acquiring option code 252 in DHCPv4.

 and solve your dynamic dns problems (as IPv4 set top boxes do today), 
 
 Updating your forward/reverse dns via DNS Update messages isn't that 
 uncommon today.

On Enterprise networks using GSS-TSIG, sure.

On ISP networks, I think the only time end-hosts try to update
their reverse DNS directly is when they're participating in a
rather unfortunate, and unintentional, distributed DoS against
the root servers.

Which, oddly enough, you mention next.

Actual reverse dns updates for end hosts (and not their NAT
gateways) is relatively uncommon, owing to the fact that such
end hosts generally are on RFC1918 addresses.

 http://www.caida.org/publications/presentations/ietf0112/dns.damage.html
 
 where hosts are trying to update the root zone with their new names.

I'm confused by what you're trying to argue.  Are you suggesting
that AS112 represents years of operating system support for
IPv6?

 So you can get from A to D without requiring DHCPv6.

...I hope you see that this is only so long as you require some
clicking instead.

This is all well and good for those of us who have sufficient
growth (or equivalent feminine metaphor) on our chins, which we
enjoy stroking thoughtfully while determining what all these
correct configurations are.

But I don't think it works for bearded geeks is setting the
bar high enough when we use lofty words like supported by
routers and operating systems for years.

-- 
David W. HankinsIf you don't do it right the first time,
Software Engineer   you'll just have to do it again.
Internet Systems Consortium, Inc.   -- Jack T. Hankins


pgpbIxFk401KC.pgp
Description: PGP signature


Re: DHCPv6, was: Re: IPv6 Finally gets off the ground

2007-04-16 Thread David W. Hankins
On Sun, Apr 15, 2007 at 12:38:42PM +0200, Iljitsch van Beijnum wrote:
 Sure, but that's because with IPv4, there are only three flavors:
 
 - manual configuration
 - PPP
 - DHCP

Although nobody uses them:

- BOOTP
- RARP

The distinction of DHCP, BOOTP, and RARP is important I think, and
it would be good to remember the reasons for that progression, the
lessons we learned on the way.

If the progression from SLIP or HDLC to PPP also represents
a progression in your view as it does in mine, then it is
also important to remember.

Both of these two progression trees represent the cumulative
formulation of knowledge:  Users are stupid.  Automatic is not
just best, it's the only way.


 The DHCPv6 servers and clients that I tested two years ago didn't  
 even support address assignment to hosts.

That sounds about right.  The interesting events here have been
this year or last.


 What DHCP and PPP did do, was to remove all of that, and make ISP
 integration of customer premise something that could just happen
 without any handholding or bearded geekery.
 
 Fortunately, the IETF got things right the sixth time around (?) by  
 adding the stateless autoconfig to IPv6, so these additional  
 mechanisms aren't necessary.

Forgive me for saying (I do not mean it rudely), that I think this
one sentence measures best precisely how far you've missed my point
by.


It is not enough to observe that the end host has been given an
IP address, a prefix is imagined as part of that, and a default
gateway.  RARP and ICMP router discovery taught us this.

It is still not enough to, after several years of thinking this
was enough, throw in domain-search and nameserver configuration
state.  BOOTP taught us this.


The main point, is that if you leave all other host configuration
details up to, well, the host itself, then in practice what you're
really doing is leaving it up to the user.  Ultimately, it is
mandatory that the end-user make a choice in this model, if not
about everything, then about some things.

This is intolerable in an ISP environment.

Compare it to the current IPv4 network, and you see that no
choice is mandatory.  You just plug in and go.  You might,
optionally, over-ride any DHCP or PPP delivered knob, but
it is easy to simply return the client to get everything
dynamically and Just Work (tm).


 And exactly how often do people type in the address of their own  
 system...?

I'm thinking more of the 'gamer' demographic, wherein other
people type in your IP address.


 A problem with the DNS and IPv6 is that unlike IPv4, you can't pre- 
 populate the DNS so that each host has a valid DNS name as soon as it  
 receives an address. Manual configuration is problematic for more  
 than the obvious reasons: host may use temporary IPv6 addresses with  
 random lower bits to avoid exposing their MAC address. The only  
 reasonable way to solve this is with dynamic DNS updates.

That's an excellent summary.  Neither has RTADV supported dyanmic
dns updates for years, nor is it likely to in the future.  If it
does, I would be surprised if it manages to work properly.


 This would
 be bad except that customers will usually have their own prefix in
 IPv6 so this should be solvable security-wise.

It may not even involve DDNS, but rather be entirely internalized
on the customer's home gateway.


I think from everything I have just heard from you, that we could
both agree:

There have been IPv6 implementations for years.

There has not been IPv6 support until very recently, this year
or last depending on how you count.

-- 
David W. HankinsIf you don't do it right the first time,
Software Engineer   you'll just have to do it again.
Internet Systems Consortium, Inc.   -- Jack T. Hankins


pgpNNMQqjMy9K.pgp
Description: PGP signature


Re: DHCPv6, was: Re: IPv6 Finally gets off the ground

2007-04-13 Thread David W. Hankins
On Thu, Apr 12, 2007 at 11:11:54AM +0200, Iljitsch van Beijnum wrote:
 I have a Cisco 2500 with software from 1999 and a Windows XP box with  
 software from 2001, both supporting IPv6, sitting here... I didn't  
 get my first Mac until 2002, but that one supported IPv6 at that  
 point, too.

It would be foolish to suggest that software implementing IPv6 has
not existed for many years.

It would also be foolish to use support IPv6 as a blanket
statement, when the features have not truly been usable by more
than bearded geeks.

 There is a provisioning problem with IPv6, yes.

Note that the word 'provisioning' is more than just 'addressing'.

A given ISP may or may not directly communicate with end hosts
using any form of DHCP, but the current broadband ISP models which
are de rigeur would not be salient without DHCPv4 on the end hosts,
even if that is only between the set top box and customer.

So it might not be their job, but it's still an important facet
of the architecture.  One could say that although a DHCP department
doesn't exist within ISP's, there would have been a need for a
staffed department in its absence.


I remember the era when we used to deliver install floppies to our
prospective customers.  And I can tell you they weren't a very good
idea.

Web pages full of instructions, flyers with simple to follow steps,
none of them really worked very well either.  Even if our iconic
mascots trying to make the instructions friendlier were awfully cute.

What DHCP and PPP did do, was to remove all of that, and make ISP
integration of customer premise something that could just happen
without any handholding or bearded geekery.


When you can plug your computer in, and automatically (with no
clicking) get an IPv6 address, have something tell you where your
DNS assist servers, configure web proxies, and solve your dynamic
dns problems (as IPv4 set top boxes do today), then I would allow
you the use of the words 'supports IPv6' rather than 'implements
IPv6'.

On the subject of DNS, I think you are going to find that, since
IPv6 addresses do not pass the 'phone test', IPv6 customers will
have a new emphasis on having their names in DNS.  But these are
forward looking statements, and it's equally possible that people
will be moved instead to use presence networks.

-- 
David W. HankinsIf you don't do it right the first time,
Software Engineer   you'll just have to do it again.
Internet Systems Consortium, Inc.   -- Jack T. Hankins


pgp3AhMWtSXvG.pgp
Description: PGP signature


Re: Thoughts on increasing MTUs on the internet

2007-04-12 Thread David W. Hankins
Hopefully I'll be forgiven for geeking out over DHCP on nanog-l twice
in the same week.

On Thu, Apr 12, 2007 at 11:20:18AM +0200, Iljitsch van Beijnum wrote:
 1. It's no longer necessary to limit the subnet MTU to that of the  
 least capable system

I dunno for that.

 2. It's no longer necessary to manage 1500 byte+ MTUs manually

But for this, there has been (for a long time now) a DHCPv4 option
to give a client its MTU for the interface being configured (#26,
RFC2132).

The thing is, not very many (if any) clients actually request it.
Possibly because of problem #1 (if you change your MTU, and no one
else does, you're hosed).

So, if you solve for the first problem in isolation, you can
easily just use DHCP to solve the second with virtually no work
and probably only (heh) client software updates.


I could also note that your first problem plagues DHCP software
today...it's further complicated...let's just say it sucks, and
bad.

If one were to solve that problem for DHCP speakers, you could
probably put a siphon somewhere in the process.

But it's an even harder problem to solve.

-- 
David W. HankinsIf you don't do it right the first time,
Software Engineer   you'll just have to do it again.
Internet Systems Consortium, Inc.   -- Jack T. Hankins


pgpdEnSRZ3khA.pgp
Description: PGP signature


Re: Thoughts on increasing MTUs on the internet

2007-04-12 Thread David W. Hankins
On Thu, Apr 12, 2007 at 05:58:07PM -0400, Daniel Senie wrote:
  2. It's no longer necessary to manage 1500 byte+ MTUs manually
 
 But for this, there has been (for a long time now) a DHCPv4 option
 to give a client its MTU for the interface being configured (#26,
 RFC2132).
 
 Trying to do this via DHCP is, IMO, doomed to failure. The systems 
 most likely to be in need of larger MTUs are likely servers, and 
 probably not on DHCP-assigned addresses.

If you're bothering to statically configure a system with a fixed
address (such as with a server), why can you not also statically
configure it with an MTU?

-- 
David W. HankinsIf you don't do it right the first time,
Software Engineer   you'll just have to do it again.
Internet Systems Consortium, Inc.   -- Jack T. Hankins


pgpBuU12jypmU.pgp
Description: PGP signature


Re: Thoughts on increasing MTUs on the internet

2007-04-12 Thread David W. Hankins
On Thu, Apr 12, 2007 at 06:18:56PM -0400, Daniel Senie wrote:
 Neither addresses interoperability on a multi-access medium where a 
 new station could be introduced, and can result in the same MTU/MRU 
 mismatch problems that were seen on token ring and FDDI.

Solving Ilijitsch's #1 is a separate problem, and you can solve
them in isolation.  If you chose to do so, #2 is already solved
for all hosts where dynamic configuration is desirable.

-- 
David W. HankinsIf you don't do it right the first time,
Software Engineer   you'll just have to do it again.
Internet Systems Consortium, Inc.   -- Jack T. Hankins


pgpGBzCWda9Fn.pgp
Description: PGP signature


Re: IPv6 Finally gets off the ground

2007-04-10 Thread David W. Hankins
On Tue, Apr 10, 2007 at 03:54:39PM +0200, Stephane Bortzmeyer wrote:
 IPv6 has had operating system and router support for years.

I'd have to object with such a blanket statement.

I don't think you can say you support IPv6 (from an ISP's point of
view) without DHCPv6, since I don't think anyone at a large ISP
sized scale is going to leave address assignment up to RTADV.

I'm aware that Vista added support for DHCPv6, and I have heard
naught else (aside from the unixes).

So, it's my opinion that IPv6 may only recently have started
enjoying the level of operating system support required for
actual ISP-scale use by one major vendor...and I don't know how
commonly deployed Vista is yet.

-- 
David W. HankinsIf you don't do it right the first time,
Software Engineer   you'll just have to do it again.
Internet Systems Consortium, Inc.   -- Jack T. Hankins


pgpkju5wVgq6x.pgp
Description: PGP signature


Re: death of the net predicted by deloitte -- film at 11

2007-02-11 Thread David W. Hankins

On Sun, Feb 11, 2007 at 11:14:49AM -0700, brett watson wrote:
 Verisign, the American firm which provides the backbone for much of  
 the net, including domain names .com and .net,...

IP over domain name registration?

-- 
David W. HankinsIf you don't do it right the first time,
Software Engineer   you'll just have to do it again.
Internet Systems Consortium, Inc.   -- Jack T. Hankins


Re: that 4byte ASN you were considering...

2006-10-10 Thread David W. Hankins
On Tue, Oct 10, 2006 at 01:59:22AM -0500, Randy Bush wrote:
 somehow we seem to have survived similar issues in IP quad
 representation.

Or domain names.


I'm concerned by the kind of discussion I'm seeing here.

RFC's are not law, and if your router vendor adopts this informational
document in such a way that it breaks your scripts then that's an issue
to take up with your router vendor(s).

I don't see why there's any reason it can't be made so (excuse me for
using what little Cisco configuration language I can remember):

o 'conf t' accepts:
router bgp 255.255.255.254
neighbor 10.0.0.1 remote-as 255.255.255.255

o 'wr mem/term' writes out:
router bgp 4294967294 # 255.255.255.254
  neighbor 10.0.0.1 remote-as 4294967295 # 255.255.255.255

  or even:
# BGP 255.255.255.254
router bgp 4294967294
  # EZ-ASN: 255.255.255.255
  neighbor 10.0.0.1 remote-as 4294967295

One or both of which probably won't break anyone's scripts.

The point is that this is a configuration language versioning issue,
which isn't something I think of the IETF having either a lot of
interest or ability to define.


As Shields has indicated, email the IETF mailing lists if you
must.

I'm in favor of people sending mail to lists to which I do not
subscribe.

But it's just /weird/ to ask the IETF to have this kind of
role...one it has never had to my memory, and seeks constantly
not to fulfill.

-- 
ISC Training!  October 16-20, 2006, in the San Francisco Bay Area,
covering topics from DNS to DDNS  DHCP.  Email [EMAIL PROTECTED]
-- 
David W. HankinsIf you don't do it right the first time,
Software Engineer   you'll just have to do it again.
Internet Systems Consortium, Inc.   -- Jack T. Hankins


pgpBgptt6Z5i1.pgp
Description: PGP signature


Re: that 4byte ASN you were considering...

2006-10-10 Thread David W. Hankins
On Tue, Oct 10, 2006 at 02:53:53PM -0500, Joe Abley wrote:
 On 10-Oct-2006, at 12:01, David W. Hankins wrote:
 But it's just /weird/ to ask the IETF to have this kind of
 role...one it has never had to my memory, and seeks constantly
 not to fulfill.
 
 It's not so weird when you realise that the notation adopted has an  
 impact on other IETF work (RPSL is the obvious example that springs  
 to mind).

I think you misunderstand me...

It's not weird that this document exists.

It is weird, to me, that people who have concerns about their
router's configuration syntax expect to be able to take this up
with the IETF, rather than their router manufacturer.

-- 
ISC Training!  October 16-20, 2006, in the San Francisco Bay Area,
covering topics from DNS to DDNS  DHCP.  Email [EMAIL PROTECTED]
-- 
David W. HankinsIf you don't do it right the first time,
Software Engineer   you'll just have to do it again.
Internet Systems Consortium, Inc.   -- Jack T. Hankins


pgpeITfRTo47o.pgp
Description: PGP signature


Re: that 4byte ASN you were considering...

2006-10-10 Thread David W. Hankins
On Tue, Oct 10, 2006 at 09:23:54PM +, Michael Shields wrote:
 Personally, I care less about which notation we choose to express
 four-byte ASNs than that *everyone choose one notation*.  Choosing a

Totally, and I would be surprised if that were not the eventual
outcome.  In the absence of any other format, the dotted quad will
probably bubble up into user interfaces eventually.

I think everyone else is wrong that there is going to be some sort
of heinous y2k doomsday scenario here in regards to breaking their
current-day scripts or operational practices, or if there were that
this is an issue to take up with the IETF rather than the vendors
making said changes.

 As to whether this is within the scope of the IETF, note that they are
 already going far, far beyond this in the Netconf WG, which is defining
 a complete router configuration protocol.

Netconf absolutely, and zeroconf too.  These are machine languages,
they aren't user interfaces.  So this is just a level of indirection.

If someone were suggesting a change to the netconf wire format
that is not reverse compatible, that's obviously something that
should be brought up at the IETF!

But a change to the config file or web/scripting interface or
whatever that you use to trigger Netconf into action?

Totally not their bag.

-- 
ISC Training!  October 16-20, 2006, in the San Francisco Bay Area,
covering topics from DNS to DDNS  DHCP.  Email [EMAIL PROTECTED]
-- 
David W. HankinsIf you don't do it right the first time,
Software Engineer   you'll just have to do it again.
Internet Systems Consortium, Inc.   -- Jack T. Hankins


pgpSNKKJe8Itg.pgp
Description: PGP signature


Re: Best practices inquiry: tracking SSH host keys

2006-06-29 Thread David W. Hankins
On Wed, Jun 28, 2006 at 06:07:33PM -0700, Allen Parker wrote:
 Why not, on a regular basis, use ssh-keyscan and diff or something
 similar, to scan your range of hosts that DO have ssh on them (maybe
 nmap subnet scans for port 22?) to retrieve the host keys, compare
 them to last time the scan was run, see if anything changed, cross
 reference that with work orders by ip or any other identifiable
 information present, and let the tools do the work for you. Cron is
 your friend. Using rsync, scp, nfs or something similar it wouldn't be
 very difficult to upkeep an automated way of updating such a list once
 per day across your entire organization.

_wow_.

That's a massive why not just paragraph.  I can only imagine how
long a paragraph you'd write for finding and removing ex-employee's
public keys from all your systems.


So, here's my why not just:

Why not just use Kerberos?

-- 
David W. HankinsIf you don't do it right the first time,
Software Engineer   you'll just have to do it again.
Internet Systems Consortium, Inc.   -- Jack T. Hankins


pgp4b9fjyYjsf.pgp
Description: PGP signature


Re: insane over-regulation - what not to do

2006-06-21 Thread David W. Hankins
On Wed, Jun 21, 2006 at 10:36:04AM -0700, Randy Bush wrote:
 the whole thing as a piece.  it looks to be a, likely well-meaning,
 attempt by a gang of bureaucrats and a fancy consultant to put the
 universe in a glass jar and preserve it.  from end user, to net
 operations, to infrastructure, to administration, to law.

There is one thing in here which has great amusement appeal to me:

g. ensure compliance with accepted International technical
   standards in the provision and development of electronic
   communications and transactions;

The protocol police!

It sounds like they're going to create an Industry Forum (GHANOG?),
which may produce a voluntary industry code.

About like our housing code in the US.


That's going to be fun to watch.

-- 
David W. HankinsIf you don't do it right the first time,
Software Engineer   you'll just have to do it again.
Internet Systems Consortium, Inc.   -- Jack T. Hankins


pgpeSQViOyltm.pgp
Description: PGP signature


Silicon-germanium routers?

2006-06-20 Thread David W. Hankins
IBM and Georgia Institute of Technology are experimenting with silicon-
germanium, it is said here:

http://tinyurl.com/g26bu

I find this interesting having just attended NANOG 37 where some
manufacturers of network devices told us in a panel that network
heat problems weren't going away unless there's a 'next big thing'
in manufacturing process.

Is this it?


Corrolary: If our routers are made of silicon-germanium, would the
CLI only operate in Deutsch?

-- 
David W. HankinsIf you don't do it right the first time,
Software Engineer   you'll just have to do it again.
Internet Systems Consortium, Inc.   -- Jack T. Hankins


pgpriRxS3Y9In.pgp
Description: PGP signature


Re: Silicon-germanium routers?

2006-06-20 Thread David W. Hankins
On Tue, Jun 20, 2006 at 12:59:54PM -0700, Tony Li wrote:
 Sure doesn't sound like it.  In fact, it sound like they're pushing to a
 high frequency regardless of the power and thermal consequences.

I thought their 500 Ghz number was just for rediculous press teasing,
like the people who use lHe to push AMD chips to ~10 Ghz.

The 350 Ghz 'at room temperature' insinuation is the most interesting
to me.

 It also sounds like it's a single transistor.  It takes a few of them to
 make a router.  ;-)

I haven't seen any evidence to support or contradict this, so I'll
take your word for it...

A single-transistor test on a single chip would be both ludicrous
and incomparable.

 I also suspsect that the community is not ready to transition to
 liquid-cooled systems.

I rather assumed 'at room temperature' implied a standard heat sink
and fan.


Perhaps there's not enough information in that article to draw a
conclusion from.

-- 
David W. HankinsIf you don't do it right the first time,
Software Engineer   you'll just have to do it again.
Internet Systems Consortium, Inc.   -- Jack T. Hankins


pgptLk0mecD4k.pgp
Description: PGP signature


Re: wrt joao damas' DLV talk on wednesday

2006-06-13 Thread David W. Hankins
On Tue, Jun 13, 2006 at 01:18:06AM -0700, Randy Bush wrote:
 actually, i think it most important that a proposed dlv service
 make very clear its security policy and process in vetting the
 correctness of the data it serves, i.e. the trust anchors for
 dependent zones.

Oh, you're asking specifically for more detail than is on our
web page, then ('Registering your zone key in the DLV tree').


You mentioned that this would have relevance to future practices
should the root be signed, and I can't for the life of me see how.

I think this is an artificial problem that arises only for ISC since
we're out of the delegation loop (except where we can authenticate
registries and receive trust anchors from them).

Do you imagine that, if IANA/ICANN/USDOT/someone were told to
implement a policy to sign the root, that they would have trouble
identifying the owners of the TLD's reliably?

If so, wouldn't this problem already exist today in the information
already present in the root zone?


 once one can have confidence in the correctness of the data
 served, one might then become inclined to worry about the
 reliability of the service :-).

-- 
David W. HankinsIf you don't do it right the first time,
Software Engineer   you'll just have to do it again.
Internet Systems Consortium, Inc.   -- Jack T. Hankins


pgp9Ou6ZZGlFt.pgp
Description: PGP signature


Re: wrt joao damas' DLV talk on wednesday

2006-06-13 Thread David W. Hankins
On Tue, Jun 13, 2006 at 10:27:49AM -0700, Randy Bush wrote:
 if other non-delegators run dlv services, they will have the same
 issues.

Absolutely.

 and if you are a delegator, why play dlv as you can
 directly sign?

I think Paul answered this question (it's because of the way
DNSSEC-bis proves non-existence).


I basically can't answer your other questions.  I don't know the
answers to most of them and don't want to guess at the others.

And as for IANA applicability, I guess I'll have to give up and
defer to you and DRC.  It still sounds wonky to me that you would
operate the root's authentication chain out-of-band like a DLV
registry when in-band seems so much more useful and reliable.

But clearly I don't know enough about the root's (scary) problems.


 when charles mussisi flies
 from kampala to redwood city,

I think our staff in Europe are closer to Kampala than 950 Charter,
and I assume at least one of them would be authorized, and I assume
that there are some events somewhere that both Mr. Mussisi and some
authorized member of our staff are likely to both attend.

But if you would like to imagine for a moment that we actually require
people to meet us in a faraday cage embedded 30 feet under the Arctic
ice in an undisclosed location - just take a metal detector with you
and knock on the ice when you think you've found us - then which of
Paul's list of 5 other options would you prefer?  Or is there a 6th?

How soon can you start?

That's an important open question in this dialogue.

-- 
David W. HankinsIf you don't do it right the first time,
Software Engineer   you'll just have to do it again.
Internet Systems Consortium, Inc.   -- Jack T. Hankins


pgpPZ8bhnevTH.pgp
Description: PGP signature


Re: wrt joao damas' DLV talk on wednesday

2006-06-12 Thread David W. Hankins
On Mon, Jun 12, 2006 at 09:41:03PM +, Paul Vixie wrote:
 since joao is probably still sleeping-off the time shift from san jose to
 madrid, i'll chime in here.  the last plan i saw was the same as the last
 draft i heard about for what any other important zone would do with a
 key that has to be hard coded in a lot of places: allocate more than one
 KSK and an infinite lifetime.  use this KSK offline (only), to generate
 ZSK's with short lifetimes that are in turn used online to sign the zone.

At NANOG 37, possibly after you had left the room, Randy actually
asked if we were writing a document describing ISC's operational
guidelines and policies for the dlv zone.  All those things DRC recently
said no one has told him to do yet.  It's in that context I think that
he asks these questions now.

I got the idea Randy was looking for info like appears in the BCP
that describes root server operations requirements, except as applies
to our DLV zone (and probably not an IETF document).

So, how many boxes have the private keys?  What barriers lock them away?
How many people have access to the raw keys?  How many authoritative
servers give out dlv.isc.org and where do they sit in the network and
on the globe?  Do you pre-publish or double-sign (or triple-sign (or
quintuple-sign (or ...)))?

I have no idea if such a thing exists or plans to exist, or what might
appear inside it.


 | 1. figure out why the root zone isn't signed and fix whatever it is.
 | 2. design your own version of DLV (as sam weiler has done, long before
 | 3. rubber-stamp ISC's DLV design, adopt our BSD-licensed source code
 | 4. go to IETF and say i think something DLV should be a standard but
   5. forget about DNSSEC until all these problems are solved by others.

Even if I choose not to do any of those 5 things and adopt ISC's DLV
registry, I probably would want some basis to compare ISC's DLV
registry with Acme's DLV registry.

Having a basis to compare ourselves with...an imagined ideal of
ourselves...is a bit of an intellectual excercise, but it does set
the bar for future work in similar operations, such as signing TLDs
and the root zone (wether it is IANA who is asked to do it or not).

And it helps people decide if they want to throw in or wait it out
for someone with stronger practices (or deploy a DLV with stronger
practices).


I personally think Randy's request (or my imagined version of same)
would be good reading, if someone could be found who had both the
time and knowledge to write it, and if doing so wouldn't be construed
as giving away the keys to the castle.

-- 
David W. HankinsIf you don't do it right the first time,
Software Engineer   you'll just have to do it again.
Internet Systems Consortium, Inc.   -- Jack T. Hankins


pgpTTO0IQk1fQ.pgp
Description: PGP signature


Re: Is your ISP Influenza-ready?

2006-04-19 Thread David W. Hankins
On Wed, Apr 19, 2006 at 11:57:01AM +0100, [EMAIL PROTECTED] wrote:
 That recirculated air is likely to be shared with the 
 rest of the buildings inhabitants, not just the engineers.

I'd say it's 50/50 from the buildings I've worked in.

The Commonwealth Building in Portland Oregon actually put the air
handler in the wiring closet.

  http://www.emporis.com/en/wm/bu/?id=122627

I know this because when it would start up at 0600, it would brown
out the electrical power.  Our equipment was on a UPS that detected
this and bridged the gap - but customer equipment on another floor
wasn't.  I was standing next to it, fancy borrowed ethernet protocol
analyzer attached to the customer line...at 0600 when they described
the problem would manifest, when the air handler startup noises
succeeded in scaring the living daylights out of me.  It didn't help
that the UPS was beeping at the same time and the protocol analyzer
was registering a flood of collisions and generally spitting out red
text and flashy lights.

As I remember the ducting, it ran from plenum, to air handler, back
to our plenum (there was no false roof in the wiring closet, it was
just sort of open where the neighboring office walls ended).

It would be good to know for certain.  And the point is kind of
moot if your company is large enough that they've centralized your
engineering groups into a single building (as has also been the
case at some places I've worked).

We had things much worse than that in the Commonwealth building
however...

 On the other hand, engineers tend to have already 
 perfected the art of working remotely. Continuity planning
 people are likely to notice that skilled technical people
 are essential to smooth operations and will kick them out
 of the office before anyone gets sick.

If I ever had one of those watching over me, he never said You
fool!  You look like you have flu symptoms!  Go home!  I have on
rare occaision had the converse said due to some impending
deadline...

I suspect by the time it's an epidemic it's probably too late.

-- 
David W. HankinsIf you don't do it right the first time,
Software Engineer   you'll just have to do it again.
Internet Systems Consortium, Inc.   -- Jack T. Hankins


pgp7asnTmB7p9.pgp
Description: PGP signature


Re: Is your ISP Influenza-ready?

2006-04-18 Thread David W. Hankins
On Mon, Apr 17, 2006 at 02:05:41PM -0400, Jared Mauch wrote:
   Back to the original question, how well could you cope for such
 an event?  It's always challenging to think about what would happen
 as sometimes it includes the unexpected.

All the guidance suggests you're going to lose as much as 40% of your
workforce.

Well, what intrigues me, is: which 40?  I don't think the virus is going
to select sales, marketing, and Tech support in that order (unless it's
an STD epidemic, har har).  Were that the case we might actually look
forward to such outbreaks.

On the other hand, at *every* substantially sized network I've worked
at, the Network Engineering types that might reasonably do something
useful in such an emergency situation are generally:

1) A close-knit group, going to lunches together and cohabitating
   cubicles so as to avoid exposure to aforementioned sales, marketing,
   and tech support or customer service.  Indeed, at a few places I
   worked, they even spent most every weekend together.  For all
   the rest of the world decrying geeks as socially inept, they are
   highly efficient at social assimilation of their own kind.

2) Given a 'low desirability' office space.  No windows, usually poor
   air circulation.  It is often called The Back Room or similar, or
   is located in a space you wouldn't expect to find humans.  This isn't
   (usually) anyone being mean: engineers seem to like dark corners,
   something about making it easier to read monitors, and locations that
   provide fewer interruptions due to unlikelyhood of foot traffic.

3) Better at taking care of their networks than themselves.  Or at least,
   more willing to - too frequent is the case I see an engineer, hacking,
   coughing, and wheezing at his monitor, plucking away at the keyboard
   deep into the night.

So there you have it.  They're likely to come to work even though they're
sick (presuming they don't know it's a lethal virus), where they work and
spend all their face-to-face time in close quarters with recirculated air
with the rest of the company's engineers.

It's like someone intentionally optimized this function specifically to
be the most pessimal.

So I think it's actually highly probable that a meatspace-viral vector
would take out the entire engineering staff at most service providers
I've worked at if only one of them caught the bug.  I have to imagine
this is representative of other work environments.  We all seem to share
the same collective experience in this sense, at least the folks I've
talked to.

And that loss would be way under 40% of the total company's staff, a
mere blip really.


So, which 40% can you afford to lose?  How likely is it that the 60%
that's left behind will be able to do the job?  Will they need step-by-
step instructions so that even an untrained monkey can muddle through?

-- 
David W. HankinsIf you don't do it right the first time,
Software Engineer   you'll just have to do it again.
Internet Systems Consortium, Inc.   -- Jack T. Hankins


pgpjTcTpih4qo.pgp
Description: PGP signature


Re: Is your ISP Influenza-ready?

2006-04-18 Thread David W. Hankins

On Tue, Apr 18, 2006 at 12:43:11PM -0700, Crist Clark wrote:
 Barry Shein wrote:
 So if you're really expecting something as macro as 40% of the
 population dropping dead I think one has to think much bigger and much
 more in the realm of unexpected consequences.
 
 Uhh... I think, I _hope_ that we are talking about 40% of your
 workforce NOT SHOWING UP TO THE OFFICE for days or weeks, not
 dropping dead, not even necessarily getting sick.

A slightly different aggregate: 40% of your workforce being unable to
work.

Some portion of that might be death, grieving, being sick, helping
family or friends that are sick, fighting off zombies, or searching
aimlessly for human brains to consume.

That is to say that some of the remaining 60 may be working from home.

-- 
David W. HankinsIf you don't do it right the first time,
Software Engineer   you'll just have to do it again.
Internet Systems Consortium, Inc.   -- Jack T. Hankins


Re: AW: Odd policy question.

2006-01-17 Thread David W. Hankins
On Sat, Jan 14, 2006 at 05:31:12PM -0500, Jeffrey I. Schiller wrote:
 If registrars regularly checked for lame delegations (or checked on
 demand). Then a way to attack a domain would be to forge DNS responses
 to cause the registrar to remove the domain because it is lame. So
 DNSSEC would be needed to be sure...

Something more than merely DNS-SEC.

DNS-SEC is about proving zone contents (object security).  To prove
lame delegation you'd need a means to identify the nameserver (channel
security) that's supplying the response.

The difference between this zone contains (or doesn't) an RR versus
this DNS packet is from the server named George.

You could prove inconsistent delegation - that the parent and child
differ.  But this is not necessarily lame.

-- 
David W. HankinsIf you don't do it right the first time,
Software Engineer   you'll just have to do it again.
Internet Systems Consortium, Inc.   -- Jack T. Hankins


pgpZ8oY8W0ESG.pgp
Description: PGP signature


Re: AW: Odd policy question.

2006-01-13 Thread David W. Hankins
On Fri, Jan 13, 2006 at 10:09:51AM -1000, Randy Bush wrote:
  it is a best practice to separate authoritative and recursive servers.
 
 why?

I'm not sure anyone can answer that question.  I certainly can't.
Not completely, anyway.  There are too many variables and motivations.

Some remember to say Read RFC2010 section 2.12.

But since that's a document intended specifically for root server
operation, it's not as helpful to those of us that don't operate
roots.

This is about like saying, Because Vixie wrote it.

 e.g. a small isp has a hundred auth zones (secondaried far
 away and off-net, of course) and runs cache.  why should
 they separate auth from cache?

Well, RFC2010 section 2.12 hints at cache pollution attacks, and that's
been discussed already.  Note that I can't seem to find the same claim
in RFC2870, which obsoletes 2010 (and the direction against recursive
service is still there).


But in my own personal experience, I can still say without a doubt that
combining authoritative and iterative services is a bad idea.

Spammers resolve a lot of DNS names.  Usually in very short order.  As
short as they can possibly manage, actually.  The bulk of the addresses
they have on their lists aren't even registered domain names.

Resolving some of these bogus domain names uses substantially more CPU
than you might think (spread out over several queries).

The result, at a previous place of employ that did not segregate
these services, was that our nameservers literally choked to death
every time our colocated customers hit us with a spam run.

The process' CPU utilization goes to 100%, queries start getting
retransmitted, and pretty soon our authoriative queries start getting
universally dropped because they're the vast minority of traffic in the
system (or the answer comes back so late the client has forgotten it
asked the question - has already timed out).

So if someone on our network was using our recursive nameservers to
resolve targets to spam, people couldn't resolve our names.

Even though our servers were geographically diverse, they were all
recursive - the miscreant clients would spam them all in harmony.

I guess you could say it made it easy to find and shut these miscreants
down.

But I'd much rather 'spammer detection' be based on something that does
not also take my own network down.


Now, certainly, designing a network around being impervious to our
clients: the spammers is not a strong motivation for everyone.  But it
doesn't take a spammer to see the same series of events unfold.  It can
just as easily be...say...a lame script in a server...handling error
conditions badly by immediately retransmitting the request (we got this
too - it flooded our servers with requests for a name within their own
domain without any pause inbetween...we kept having to call this customer
to reboot his NT box, putting their address space in and out of our
ACL's...a significant operational expense, and outages that affected the
majority of our customers...for a small colocation customer (not a
lot of cash)).

So I think this is pretty valid advice for pretty much anyone.  It's
just a bad idea to expose your authoritative servers to the same
problems an iterative resolver is prone to.

-- 
David W. HankinsIf you don't do it right the first time,
Software Engineer   you'll just have to do it again.
Internet Systems Consortium, Inc.   -- Jack T. Hankins


pgpZg7P96gDuV.pgp
Description: PGP signature


Re: AW: Odd policy question.

2006-01-13 Thread David W. Hankins
On Fri, Jan 13, 2006 at 12:07:11PM -1000, Randy Bush wrote:
 and thereby hiding the fact that someone has either lame delegated
 or i have forgotten to remove an auth zone, both cases i want to
 catch.  not a win here.

Responding with stale data is, arguably, more damaging than failing
to respond at all.

So much so that the SOA expiry field serves to protect us from this
threat.

So, even though Randy is wrong for wanting to catch misconfigurations
by producing incorrect data, I also don't see where Joe is coming from.

If I hosted my domain with someone whose server was answering recursive
queries, I would probably use a lower value for expiry than I normally
would otherwise.

-- 
David W. HankinsIf you don't do it right the first time,
Software Engineer   you'll just have to do it again.
Internet Systems Consortium, Inc.   -- Jack T. Hankins


pgpQkf1foE4Mp.pgp
Description: PGP signature


Re: AW: Odd policy question.

2006-01-13 Thread David W. Hankins
On Fri, Jan 13, 2006 at 12:57:22PM -1000, Randy Bush wrote:
 at root, i am a naggumite.  erik nagum was good at describing
 why broken things should not be patched over.  it's better to
 amplify breakage if that's what it takes to get it fixed asap.

In this case, the 'break' is only damaging if it is in the query
path.  If it is not, it ultimately reaches the expiry timer and
becomes a non-issue for all involved.

Perpetual entropy leading to heat death is not acheived.

So, serving a zone that has a very large expiry on a recursive
nameserver is, in effect, putting your hand on the burner.

Remember I'm on both sides of this fence;

Either use a low expiry on zones hosted by recursive nameservers,
or use any (probably large) expiry on authoritative-only servers.

 an analogous gripe i have is do-gooder software, which also
 applies to configuration and other policies.  if do-gooderism
 'successfully' compensates for an error, no one notices.  when
 it makes a mistake, everyone screams to the heavens and throws
 mud.  e.g. remember when ejk put in an interceptor cache to
 give his customers seriously better performance?

Then I guess you won't be a fan of:

http://www.ietf.org/internet-drafts/draft-andrews-full-service-resolvers-01.txt

 pain is nature's way of telling us to take our hand off of the
 stove.

Above is an example of a software engineer (Mr. Andrews) choosing to
experience a kind of pain now (the ietf standards process), for others
to experience a kind of pain later (those who use rfc1918 space adopting
software implementing this), and for the as112 operators to experience
less pain until gradually it is retired.

Pain in this universe is absolute and eternal.  All you can do is
choose for whom it is fair to experience how much of it.

Something like the Cyclops in Krull.  Choose to get left behind in
the field to die peacefully, or get crushed in the stone doors saving
your friends.

The mechanics of the result is unimportant.  The choice is.

-- 
David W. HankinsIf you don't do it right the first time,
Software Engineer   you'll just have to do it again.
Internet Systems Consortium, Inc.   -- Jack T. Hankins


pgppIJt2I0YiJ.pgp
Description: PGP signature


Re: Gothcas of changing the IP Address of an Authoritative DNS Server

2005-12-14 Thread David W. Hankins
On Wed, Dec 14, 2005 at 10:29:52AM -0500, Joe Abley wrote:
 There are registries that store A records for nameservers that aren't  
 subordinate to the zones they publish. While it'd be probably  

And for those that don't...some administrators (your predecessor
hostmaster?  the admin of zones you slave?) work around the problems
of lack of cross-zone glue by giving one nameserver's single IP address
multiple names, and therefore glue in multiple registries.

So it's still wise to look either way.

 problems; however, see paranoia, above.

It's not paranoia.  They really are out to get you.

-- 
David W. HankinsIf you don't do it right the first time,
Software Engineer   you'll just have to do it again.
Internet Systems Consortium, Inc.   -- Jack T. Hankins


pgptcSzecEfwz.pgp
Description: PGP signature


North American Shipping Clerks Group

2005-10-01 Thread David W. Hankins

I would like to thank Eric for agreeing so violently with me:

We have now established that no pretense is required for a conviction.


I suggest we move the remainder of this discussion, What is the law and
how can you avoid being prosecuted for funneling 'munitions' to Iraq?,
to the North American Shipping Clerks Group mailing lists.

If such a group exists.

-- 
David W. HankinsIf you don't do it right the first time,
Operations Engineer you'll just have to do it again.
Internet Systems Consortium, Inc.   -- Jack T. Hankins


Re: .iq [ was: Re: Paul Vixie serving ORSN ]

2005-09-30 Thread David W. Hankins
On Fri, Sep 30, 2005 at 08:38:43AM -0400, Eric Brunner-Williams at a VSAT 
somewhere wrote:
 It all comes down to pretending a PC is a supercomputer,

An ordinary PC, by today's standards average, is defined by US law as
a supercomputer, legally a munition (weapon of war).  Wether you
yourself believe the object defined by the pouplar term supercomputer
is required to habitate a substantially larger space, or substantially
larger number of computrons is irrelevant.

There is no pretense here, just that I suspect you misunderstand that
the term 'supercomputer' is being used as a legal term, not the common
term you use in casual language.

 pretending that
 ordinary Syrians, let alone nuclear weapons proliferating Syrians, didn't,
 in this period, routinely drive from Damascus to Beruit,

That you might be able to buy a cannister of napalm from the grocery
store in [Insert random location], doesn't mean the US has to hold all
exports of napalm into that location as immune from export controls.

Again, there is no pretense here, and there is no need for it.

-- 
David W. HankinsIf you don't do it right the first time,
Software Engineer   you'll just have to do it again.
Internet Systems Consortium, Inc.   -- Jack T. Hankins


pgp0C38nwHSi5.pgp
Description: PGP signature