Re: [homenet] Homenet Naming Architecture

2016-01-20 Thread Douglas Otis
e bridge is still needed to properly support multi-device multi-vendor system configuration, especially in cases where trickle and babel don't meet their expectations. Naming conventions able to span bridges would be able to adapt to any number of strategies that might be used over Hom

Re: [homenet] Homenet Naming Architecture

2016-01-20 Thread Douglas Otis
On 1/19/16 5:05 PM, Suzanne Woolf wrote: > Hi, > > On Jan 18, 2016, at 7:14 PM, Douglas Otis > wrote: > >> RECOMMENDATION 1: The TLDs .corp, .home, and .mail be >> referred to the Internet Engineering Task Force (IETF) >> for potential RFC 1918-like protec

Re: [homenet] Homenet Naming Architecture

2016-01-18 Thread Douglas Otis
ds to be clarified before meaningful headway can be made. Can anyone offer meaningful guidance on this point? Regards, Douglas Otis On 1/5/16 1:12 AM, Ray Bellis wrote: > Dear all, > > You each indicated willingness to work on a document for the Homenet WG > describing all aspects of

Re: [homenet] How many people have installed the homenet code?

2015-10-21 Thread Douglas Otis
soon require a license and expensive custom hardware. After all, ham operators are granted a fairly large latitude in the equipment they manage, most of it fairly programmable in many critical aspects. A 4 watt handheld transmitter costs less than $30 and comes wit

[homenet] draft-ietf-homenet-front-end-naming-delegation-04

2015-09-27 Thread Douglas Otis
y used by draft-ietf-dnssd-push-00 (DNS Push Notifications) leveraging RFC2136 (DNS UPDATE) can be tailored to also offer Service Browsing over TCP rather than with UDP queries against "<_services._dns-sd._udp." to ensure a scheme that plays well with rBridge and WiFi configurat

Re: [homenet] HNCP WGLC

2015-08-26 Thread Douglas Otis
-dns-sd-threats-00 describes considerations not covered in RFC6762, RFC6763 or RFC7368 when aggregate sizes of RRsets are overlooked, especially in such environments. This section, as well as the Security Considerations section, does not ensure local resources are not externally exposed. Reg

Re: [homenet] HNCP security?

2014-09-23 Thread Douglas Otis
seconds, whichever comes first. While some printers might be able to handle direct Internet access, most can't. Many of these devices announce their routable address via mDNS, hence the need for a network overlay. By using a network overlay, Trust on First Use (TOFU) is less essential al

Re: [homenet] HNCP security?

2014-09-19 Thread Douglas Otis
from being deceived; it simply changes what is being unreliably shared. These methods must be bog standard to ensure plumbing works as expected. One such method might attempt to establish an overlay network using the private address space defined for IPv6 and IPv4. Regards, Douglas Otis ___ homenet mailing list homenet@ietf.org https://www.ietf.org/mailman/listinfo/homenet

Re: [homenet] New version draft-mglt-homenet-naming-architecture-dhc-options-02.txt

2014-07-15 Thread Douglas Otis
schemes can be satisfied when ULAs have a common prefix. There are also many home routers already able to combine GUA and ULAs. Add L2TP and it seems we are done. Regards, Douglas Otis ___ homenet mailing list homenet@ietf.org https://www.ietf.org/mailman/listinfo/homenet

Re: [homenet] New version draft-mglt-homenet-naming-architecture-dhc-options-02.txt

2014-07-03 Thread Douglas Otis
ocal by mDNS while also permitting continued operation when ISP up-links are disrupted. For some references see: https://tools.ietf.org/html/draft-otis-dnssd-mdns-xlink Regards, Douglas Otis ___ homenet mailing list homenet@ietf.org https://www.ietf.org/mailman/listinfo/homenet

Re: [homenet] New version draft-mglt-homenet-naming-architecture-dhc-options-02.txt

2014-07-02 Thread Douglas Otis
ternet. Unfortunately, many in the homenet wg consider this to be a problem to be resolved by the device rather than the homenet protocol. Regards, Douglas Otis ___ homenet mailing list homenet@ietf.org https://www.ietf.org/mailman/listinfo/homenet

Re: [homenet] Single or Multiple Routing Protocols in Homenet

2014-05-31 Thread Douglas Otis
ia stick access, etc. These devices were never intended to directly interface with the Internet. These devices MUST NOT be assigned routable IPv4 or IPv6 addresses. Using mDNS proxy into DNS would be setting the stage for major security disasters. Regards, Douglas Otis ___ homenet mailing list homenet@ietf.org https://www.ietf.org/mailman/listinfo/homenet

Re: [homenet] Homenet multicast support

2014-04-28 Thread Douglas Otis
l/draft-otis-dnssd-mdns-xlink-03 As an experiment, a test was made using a new popular brand of an IPv6 enabled printer. Discovery by name resolution and not by address probing for the printer allowed Internet access without any logs created. This is a problem not easily resolved using routable IP addresses. Regards, Douglas Otis ___ homenet mailing list homenet@ietf.org https://www.ietf.org/mailman/listinfo/homenet

Re: [homenet] [dnssd] IETF-89 WG meeting minutes

2014-04-10 Thread Douglas Otis
On Apr 6, 2014, at 9:32 PM, Dave Taht wrote: > On Fri, Apr 4, 2014 at 8:08 AM, Douglas Otis wrote: >> >> On Apr 4, 2014, at 6:10 AM, Don Sturek wrote: >> >> Hi Douglas, >> >> As one who follows the WG and having a keen interest in homenet solutions, &

Re: [homenet] [dnssd] IETF-89 WG meeting minutes

2014-04-04 Thread Douglas Otis
s when it impairs network boundary detection and potentially lists devices having default names indirectly accessible by remote actors. Please consider security implications for deployers as part of this thought process. Even if only published as a BCP, it would be most helpful. Regards,

Re: [homenet] [dnssd] IETF-89 WG meeting minutes

2014-04-04 Thread Douglas Otis
n if it is just in the form of a BCP that would be useful for deployment. Regards, Douglas Otis ___ homenet mailing list homenet@ietf.org https://www.ietf.org/mailman/listinfo/homenet

Re: [homenet] [dnssd] IETF-89 WG meeting minutes

2014-04-03 Thread Douglas Otis
challenge the effectiveness of existing firewall strategies. In an ideal world, all devices should be secure when exposed to the Internet. Our world is not ideal. Please consider the security aspects, and how we might be able to aid deployment (even in the