Re: IESG position on NAT traversal and IPv4/IPv6

2010-11-15 Thread Masataka Ohta
Phillip Hallam-Baker wrote: NAT traversal should be something that is supported at a higher level of abstraction than one protocol. And there seem to be moves towards that support. As there are various kinds of NAT, it is a waste of effort to try to have a universal NAT traversing protocol.

Re: IESG position on NAT traversal and IPv4/IPv6

2010-11-15 Thread Jari Arkko
FWIW, I think that we should provide NAT traversal in the protocols that we develop (or as a part of some more general toolbox that the protocols employ). This is important, and some protocols have been hurt by not having such support initially. NAT/FW traversal is also important even with

Re: IESG position on NAT traversal and IPv4/IPv6

2010-11-15 Thread Masataka Ohta
Jari Arkko wrote: NAT/FW traversal is also important even with IPv6, as you may have a firewall even in IPv6 (or be going through a NAT64). FYI, traversable firewall is, by definition, broken. Masataka Ohta

Re: [79all] IETF Badge

2010-11-15 Thread Lou Berger
Xiangsong, I suspect you may have misunderstood me. I'm endorsing the old practice of letting in (to meetings) any who wish *without* payment or badge. Sure they won't be able to go into the terminal room, but that isn't a significant issue. Them eating the snacks could possibly turn into

Re: IESG position on NAT traversal and IPv4/IPv6

2010-11-15 Thread Noel Chiappa
From: Hadriel Kaplan hkap...@acmepacket.com In one of the working group meetings this past week, when the group was discussing a NAT traversal solution for their new protocol, an A-D suggested they not spend much time on NAT traversal. ... I'd like to know if the

Re: IESG position on NAT traversal and IPv4/IPv6

2010-11-15 Thread Hadriel Kaplan
On Nov 15, 2010, at 7:21 AM, David Harrington wrote: I believe I'm the AD you are referring to. Yes but I wasn't trying to pick on anyone - just trying to understand what the official IESG position is. I never said the IESG is discouraging NAT traversal mechanisms for new protocols,

Re: IESG position on NAT traversal and IPv4/IPv6

2010-11-15 Thread Phillip Hallam-Baker
Masataka-san You are incorrect. Firewalls can be used for many purposes. Authenticated traversal is well established in the firewall model. There is a copious amount of prior art. On Mon, Nov 15, 2010 at 7:18 AM, Masataka Ohta mo...@necom830.hpcl.titech.ac.jp wrote: Jari Arkko wrote:

Re: IESG position on NAT traversal and IPv4/IPv6

2010-11-15 Thread Phillip Hallam-Baker
On Mon, Nov 15, 2010 at 11:41 AM, Hadriel Kaplan hkap...@acmepacket.comwrote: Absolutely. And it should work in environments with IPv6 NATs, and in environments with IPv6 firewalls, and in environments with IPv6 consumer gateways which block inbound packets until an outbound packet opens a

Re: [79all] IETF Badge

2010-11-15 Thread Ole Jacobsen
On Mon, 15 Nov 2010, Lou Berger wrote: Xiangsong, I suspect you may have misunderstood me. I'm endorsing the old practice of letting in (to meetings) any who wish *without* payment or badge. Sure they won't be able to go into the terminal room, but that isn't a significant issue.

Re: IESG position on NAT traversal and IPv4/IPv6

2010-11-15 Thread Masataka Ohta
Phillip Hallam-Baker wrote: You are incorrect. Firewalls can be used for many purposes. Authenticated traversal is well established in the firewall model. Given the diversity of firewalls and their operations, it's practically impossible. There is a copious amount of prior art. Remember

Re: [79all] IETF Badge

2010-11-15 Thread Lou Berger
Humm, seeing that's what we just had, I'm not sure where you're coming from. BTW I don't think there was any real surprise in this, and it doesn't diminish from our local hosts' fabulous job. I thank them for their efforts and hospitality. Lou On 11/15/2010 2:44 PM, Ole Jacobsen wrote:

Re: [79all] IETF Badge

2010-11-15 Thread Ole Jacobsen
Lou, I see. So you had to take off your shoes, leave water behind and be frisked and/or scanned at this meeting? I can't say I went to every meeting room, but I did not notice any of that going on. Also, when I say suggesting it's sort of meant to be a forward looking statement not some idea

Re: [79all] IETF Badge

2010-11-15 Thread Lou Berger
Ole, I took your TSA reference as hyperbole referring to strict enforcement of a badge requirement. I apologize if I misunderstood. I don't think anyone would dispute that the level of badge enforcement and security was substantively different than any other IETF, and this is what I was

Re: [79all] IETF Badge

2010-11-15 Thread Andrew Sullivan
On Mon, Nov 15, 2010 at 06:04:02PM -0500, Lou Berger wrote: (I also support less restrictions on the issuing of visas, at least for IETF attendees, but there's not much I/we can do about that either.) Indeed, that is getting worse. For instance, I understand our Russian colleagues are going

Re: IESG position on NAT traversal and IPv4/IPv6

2010-11-15 Thread Martin Rex
Masataka Ohta wrote: Jari Arkko wrote: NAT/FW traversal is also important even with IPv6, as you may have a firewall even in IPv6 (or be going through a NAT64). FYI, traversable firewall is, by definition, broken. The reason why the internet hasn't completely collapsed by now

Re: IESG position on NAT traversal and IPv4/IPv6

2010-11-15 Thread Brian E Carpenter
In any case, there are four facts of life that can't be ignored: 1. We have a BEHAVE WG and it has a charter. 2. We'd better hope that as many protocols as possible can traverse NAT64, which will be with us for many years. 3. An important protocol that needs to traverse NAT44 is called IPv6 (in

Re: IESG position on NAT traversal and IPv4/IPv6

2010-11-15 Thread Masataka Ohta
Martin Rex wrote: FYI, traversable firewall is, by definition, broken. Try to convince folks to completely remove all outside doors, windows, window gates, curtain, blinds, flyscreens from their home to leverage many convenient un-restricted openings to the interior of the house. I'm not

Problem with draft-sheffer-emu-eap-eke

2010-11-15 Thread Bernard Aboba
I just took a look at the EAP EKE document recently approved by the IESG for publication as an Informational RFC: http://tools.ietf.org/html/draft-sheffer-emu-eap-eke-09 The document does not define the following parameters required by RFC 5247: 1. Peer-Id 2. Server-Id 3. Session-Id In

Document Action: 'An EAP Authentication Method Based on the EKE Protocol' to Informational RFC (draft-sheffer-emu-eap-eke-09.txt)

2010-11-15 Thread The IESG
The IESG has approved the following document: - 'An EAP Authentication Method Based on the EKE Protocol' (draft-sheffer-emu-eap-eke-09.txt) as an Informational RFC This document has been reviewed in the IETF but is not the product of an IETF Working Group. The IESG contact person is Russ