Re: [ietf] DNS spoofing at captive portals

2010-09-27 Thread W.C.A. Wijngaards
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi John, On 09/26/2010 04:34 AM, John R. Levine wrote: But we have real situtations where the opposite is true, quite possibly more often than the other way around. Not really. There turn out to be a significant number of domains, in the

Re: Posting Placement (was Re: Fisking vs Top-Posting)

2010-09-27 Thread Olaf Kolkman
In the context of a long thread about style and readability[*] Joel M. Halpern summarized: I do want to re-iterate two points I have seen that are important. Both are relevant no matter what style of posting you like. 1) People need to read the whole email before composing their

IETF-meta (was: Fisking vs Top-Posting)

2010-09-27 Thread Richard L. Barnes
NEW NON-IETF LIST ANNOUNCEMENT IETF Meta-Discussions This group is dedicated to the discussion of ancillary issues of interest to the IETF community, especially discussions about how IETF discussions and meetings should work. -- IETF meeting locations / travel -- Email composition design

Re: [ietf] DNS spoofing at captive portals

2010-09-27 Thread Phillip Hallam-Baker
The point raised by John Levine is amongst my concerns. And one of the reasons that I have been looking at a different approach to the use of DNSSEC information that does not change the DNS model as radically as the end to end DNSSEC model. The idea of using DNS resolver as a proxy is a good one

Re: [ietf] DNS spoofing at captive portals

2010-09-27 Thread Phillip Hallam-Baker
That is not the right question. The question should be, who chooses for me? My answer to the question does not have to be the same as other people's. Some people will want the full ICANN registry with every scammy malware site and every DNS name registered five minutes ago. Others will prefer to

Re: [ietf] DNS spoofing at captive portals

2010-09-27 Thread bmanning
actually, it was the right questions... and the answers all distill down to your reply. security and trust are in the eyes/validator of the beholder. Sam Weiler borrowed the term local policy - which trumps any middleman. Steve B. suggests VPNs (or their functioal eqivalant) between the

Re: [ietf] DNS spoofing at captive portals

2010-09-27 Thread Phillip Hallam-Baker
I don't see why DNSSEC makes dropping out zones impossible. All DNSSEC does is to enable the end point to know that there is data missing. It does not provide the end zone with any way to find the missing data, nor is there any user interaction that makes any real sense in that situation. But

Re: IETF-meta (was: Fisking vs Top-Posting)

2010-09-27 Thread Dave Cridland
On Mon Sep 27 15:37:56 2010, Richard L. Barnes wrote: This group is dedicated to the discussion of ancillary issues of interest to the IETF community, especially discussions about how IETF discussions and meetings should work. Oh, I thought it was the technical rubbish that was off-topic

Re: [ietf] DNS spoofing at captive portals

2010-09-27 Thread Tony Finch
On Fri, 24 Sep 2010, Phillip Hallam-Baker wrote: DNSSEC is a mechanism for establishing inter-domain trust. It is not an appropriate technology for intra-domain trust. Why not? Tony. -- f.anthony.n.finch d...@dotat.at http://dotat.at/ HUMBER THAMES DOVER WIGHT PORTLAND: NORTH BACKING WEST

Re: [Roll] Last Call: draft-ietf-roll-rpl-11.txt IPR Concern

2010-09-27 Thread Cullen Jennings
I'm not closely involved with ROLL but I am working on devices using the CORE work that would likely make use of and depend on this protocol. I have some concerns about the practically of using ROLL given the IPR. My understanding of the IPR is that one would be required to use certificates

Re: [ietf] DNS spoofing at captive portals

2010-09-27 Thread bill manning
On 27September2010Monday, at 7:48, Tony Finch wrote: On Fri, 24 Sep 2010, Phillip Hallam-Baker wrote: DNSSEC is a mechanism for establishing inter-domain trust. It is not an appropriate technology for intra-domain trust. Why not? Because the atomic unit of DNSSEC is a

IAOC Administrative Procedure Published

2010-09-27 Thread Bob Hinden
The IAOC approved it's updated administrative procedures on 16 September 2010. They can be found at: http://iaoc.ietf.org/docs/IAOC-Administrative-Procedures-9-16-2010.pdf The change from what was discussed on this list was to add a requirement that any reimbursement of expenses to IAOC

US DoD and IPv6

2010-09-27 Thread Noel Chiappa
So, I came across a interesting recent (June 24, 2010) article on the US DoD's news site (http://www.defense.gov/news/), which quote Kris Strance, the chief of internet protocol for the [Dod], as saying: {the DoD} philosophy is one that when a component has a mission need or a business case

Re: US DoD and IPv6

2010-09-27 Thread Marshall Eubanks
On Sep 27, 2010, at 7:31 PM, Noel Chiappa wrote: So, I came across a interesting recent (June 24, 2010) article on the US DoD's news site (http://www.defense.gov/news/), which quote Kris Strance, the chief of internet protocol for the [Dod], as saying: {the DoD} philosophy is one that

Re: US DoD and IPv6

2010-09-27 Thread Brian E Carpenter
On 2010-09-28 13:59, Marshall Eubanks wrote: On Sep 27, 2010, at 7:31 PM, Noel Chiappa wrote: So, I came across a interesting recent (June 24, 2010) article on the US DoD's news site (http://www.defense.gov/news/), which quote Kris Strance, the chief of internet protocol for the [Dod], as

Re: US DoD and IPv6

2010-09-27 Thread Brian E Carpenter
Phill, On 2010-09-28 16:25, Phillip Hallam-Baker wrote: The US DoD is running out of IPv4 space? Where did I say that? I very much doubt it. Maybe, maybe not... how would we know? Problem with the idea that resource depletion will drive adoption of IPv6 is that it ignores the fact

Re: US DoD and IPv6

2010-09-27 Thread Ole Jacobsen
GOSIP http://tools.ietf.org/html/rfc1039 Ole J. Jacobsen Editor and Publisher, The Internet Protocol Journal Cisco Systems Tel: +1 408-527-8972 Mobile: +1 415-370-4628 E-mail: o...@cisco.com URL: http://www.cisco.com/ipj ___ Ietf mailing

Media Type Registration Reviews - Standards Tree/No Internet Draft

2010-09-27 Thread IESG Secretary
The IESG has approved a request to register image/ktx MIME media types in the standards tree. This media type is a product of the Khronos Group (www.khronos.org). The IESG contact persons are Alexey Melnikov and Peter Saint-Andre. The registration template can be found at this location:

Document Action: 'Overview and Framework for Internationalized Email' to Informational RFC

2010-09-27 Thread The IESG
The IESG has approved the following document: - 'Overview and Framework for Internationalized Email' draft-ietf-eai-frmwrk-4952bis-10.txt as an Informational RFC This document is the product of the Email Address Internationalization Working Group. The IESG contact persons are Alexey Melnikov

Document Action: 'An Architecture for Network Management using NETCONF and YANG' to Informational RFC

2010-09-27 Thread The IESG
The IESG has approved the following document: - 'An Architecture for Network Management using NETCONF and YANG ' draft-ietf-netmod-arch-10.txt as an Informational RFC This document is the product of the NETCONF Data Modeling Language Working Group. The IESG contact persons are Dan

IAOC Administrative Procedure Published

2010-09-27 Thread The IAOC
The IAOC approved it's updated administrative procedures on 16 September 2010. They can be found at: http://iaoc.ietf.org/docs/IAOC-Administrative-Procedures-9-16-2010.pdf The change from what was discussed on the IETF list was to add a requirement that any reimbursement of expenses to IAOC

Document Action: 'PKCS #5 Password Based Key Derivation Function 2 (PBKDF2) Test Vectors' to Informational RFC

2010-09-27 Thread The IESG
The IESG has approved the following document: - 'PKCS #5 Password Based Key Derivation Function 2 (PBKDF2) Test Vectors ' draft-josefsson-pbkdf2-test-vectors-06.txt as an Informational RFC This document has been reviewed in the IETF but is not the product of an IETF Working Group. The IESG

[no subject]

2010-09-27 Thread The IESG
rfc-...@rfc-editor.org Subject: Re: Experimental RFC to be: draft-dzis-nwg-nttdm-04.txt The IESG has no problem with the publication of 'The Network Trouble Ticket Data Model' draft-dzis-nwg-nttdm-04.txt as an Experimental RFC. The IESG would also like the RFC-Editor to review the comments in

Re: Experimental RFC to be: draft-dzis-nwg-nttdm-04.txt

2010-09-27 Thread The IESG
The IESG has no problem with the publication of 'The Network Trouble Ticket Data Model' draft-dzis-nwg-nttdm-04.txt as an Experimental RFC. The IESG would also like the RFC-Editor to review the comments in the datatracker