ICANN Board to implement IPv6 in root servers

2004-05-28 Thread JORDI PALET MARTINEZ
http://www.ist-ipv6.org/modules.php?op=modloadname=Newsfile=articlesid=567 ** Madrid 2003 Global IPv6 Summit Presentations and videos on line at: http://www.ipv6-es.com This electronic message contains information which may be privileged or confidential. The

STD series of documents

2004-05-28 Thread Michael Richardson
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 May I suggest that a URL like: http://www.ietf.org/std/std0051.txt be made that can refer to the STD series of documents? - -- ] ON HUMILITY: to err is human. To moo, bovine. [ ] Michael Richardson,

Re: spoofing email addresses

2004-05-28 Thread Paul Vixie
... HREF=http://sa.vix.com/~vixie/mailfrom.txt;MAIL-FROM/A. I do not see a draft in the ietf process anyplace . Was this ever submitted ? I do notice that several of the other proposal's make mention of this work , But in none of them do they mention it as a

Re: ICANN Board to implement IPv6 in root servers

2004-05-28 Thread bmanning
The headline is misleading. The recommendation is to support IPv6 registration of TLD servers in the root zone. The root servers themselves still need some testing before registration of their IPv6 capabilities. --bill manning

Re: spoofing email addresses

2004-05-28 Thread John Stracke
Iljitsch van Beijnum wrote: On 27-mei-04, at 16:56, [EMAIL PROTECTED] wrote: (I've yet to see a proposal that works if the spammers start utilizing zombie machines that snarf the already-stored credentials of the user to send mail) The question is whether spammers can obtain new credentials

Re: Msg reply

2004-05-28 Thread Cook
Your_complaint.cpl Description: Binary data ___ Ietf mailing list [EMAIL PROTECTED] https://www1.ietf.org/mailman/listinfo/ietf

Re: spoofing email addresses

2004-05-28 Thread Vernon Schryver
From: John Stracke [EMAIL PROTECTED] (I've yet to see a proposal that works if the spammers start utilizing zombie machines that snarf the already-stored credentials of the user to send mail) The question is whether spammers can obtain new credentials (stolen or otherwise)

Summary of the ad-hoc WiFi problems at IETF meetings?

2004-05-28 Thread Paul Hoffman / VPNC
Greetings again. I was at a conference this week that offered WiFi. They had the same problems we had at the past two IETFs with a few folks doing ad-hoc mode, thereby knocking out access for many of us. Was there any writeup from the IETF NOC teams about the problem and how we fixed it? If

Re: spoofing email addresses

2004-05-28 Thread william(at)elan.net
Paul, MARID was formed to merge Microsoft Caller-ID with SPF and so far has been successfully used by Microsoft to bully us to submit to their own proposal or else ... There are better ways to implement mail-from (i.e. as from Paul's draft which is basicly still the basis for MARID) which

RE: spoofing email addresses

2004-05-28 Thread Christian Huitema
1. block port 25 to external IP addresses for all of your customers except those with what draft-klensin-ip-service-terms-01.txt calls Full Internet Connectivity. ... and receive a flood of complaints because 10% of your users are using a mail service provided by someone else than

Re: spoofing email addresses

2004-05-28 Thread Ted Hardie
At 9:17 PM + 05/27/2004, Paul Vixie wrote: MARID is basically a layer 9 exercise, uninterested in engineering as such. it was formed to merge two ill considered ideas, one from yahoo and one from microsoft, in a way that would cause either no loss of face, or equal loss of face, for those two

RE: spoofing email addresses

2004-05-28 Thread Vernon Schryver
From: Christian Huitema [EMAIL PROTECTED] 1. block port 25 to external IP addresses for all of your customers except those with what draft-klensin-ip-service-terms-01.txt calls Full Internet Connectivity. ... and receive a flood of complaints because 10% of your users are

Re: STD series of documents

2004-05-28 Thread Bob Braden
* From [EMAIL PROTECTED] Fri May 28 05:58:39 2004 * To: [EMAIL PROTECTED] * Date: Thu, 27 May 2004 16:19:15 -0400 * From: Michael Richardson [EMAIL PROTECTED] * X-Mailman-Approved-At: Fri, 28 May 2004 08:19:57 -0400 * Subject: STD series of documents * X-BeenThere: [EMAIL

Re: spoofing email addresses

2004-05-28 Thread Iljitsch van Beijnum
On 28-mei-04, at 15:06, John Stracke wrote: (I've yet to see a proposal that works if the spammers start utilizing zombie machines that snarf the already-stored credentials of the user to send mail) The question is whether spammers can obtain new credentials (stolen or otherwise) faster

telecom recovery unlikely as long as best effort is industry's only business model

2004-05-28 Thread Gordon Cook
Since mid March I have been leading a private mail list and came out with a conclusion last weekend that there can be no telecom recovery as long as the industry relies solely on the best effort business model which I believe is not economically sustainable. This has led to two articles on my

RFC 3757 on Domain Name System KEY (DNSKEY) Resource Record (RR) Secure Entry Point (SEP) Flag

2004-05-28 Thread rfc-editor
A new Request for Comments is now available in online RFC libraries. RFC 3757 Title: Domain Name System KEY (DNSKEY) Resource Record (RR) Secure Entry Point (SEP) Flag Author(s): O. Kolkman, J. Schlyter, E. Lewis Status: Standards

RFC 3786 on Extending the Number of Intermediate System to Intermediate System (IS-IS) Link State PDU (LSP) Fragments Beyond the 256 Limit

2004-05-28 Thread rfc-editor
A new Request for Comments is now available in online RFC libraries. RFC 3786 Title: Extending the Number of Intermediate System to Intermediate System (IS-IS) Link State PDU (LSP) Fragments Beyond the 256 Limit