Re: IETF IPv6 platform configuration

2006-07-06 Thread Bill Fenner
My recent experiences with ftp.ietf.org: EPSV doesn't work - it gives a port which it then isn't listening on (or, more likely since we get no response at all, a firewall blocks connections to): ftp ls --- EPSV 229 Entering Extended Passive Mode (|||42065|) ftp: connect for data channel:

RE: IETF IPv6 platform configuration

2006-07-06 Thread Lindberg, Jon
PROTECTED]; ietf Mailing List Subject: Re: IETF IPv6 platform configuration My recent experiences with ftp.ietf.org: EPSV doesn't work - it gives a port which it then isn't listening on (or, more likely since we get no response at all, a firewall blocks connections to): ftp ls --- EPSV 229 Entering

Re: IETF IPv6 platform configuration

2006-07-06 Thread Jeffrey Hutzelman
On Thursday, July 06, 2006 10:45:52 AM -0400 Bill Fenner [EMAIL PROTECTED] wrote: It looks like 3 out of 4 data channel establishment mechanisms are broken with this FTP server software and configuration for IPv4. I didn't test with IPv6. I did, inadvertently. PASV worked, as did at

Re: IETF IPv6 platform configuration

2006-07-06 Thread Bill Fenner
Just for completeness, I configured 6to4 to get IPv6 working. Both EPSV and EPRT work with IPv6. ftp ls --- EPSV 229 Entering Extended Passive Mode (|||10283|) --- LIST 150 Here comes the directory listing. drwxrwxr-x 265 6060 48 8192 May 05 15:12 concluded-wg-ietf-mail-archive

Re: IETF IPv6 platform configuration

2006-07-05 Thread Ken Raeburn
On Jun 11, 2006, at 20:00, IETF Secretariat wrote: All, As you’re all aware, on 06/06/06 NSS successfully launched IPv6 services for IETF Web, Mail, and FTP. Has anyone had FTP work for them when not in passive mode since this configuration change was made? My site's got a clunky old

Re: IETF IPv6 platform configuration

2006-07-05 Thread Tom.Petch
List ietf@ietf.org Cc: [EMAIL PROTECTED] Sent: Wednesday, July 05, 2006 3:55 PM Subject: Re: IETF IPv6 platform configuration On Jun 11, 2006, at 20:00, IETF Secretariat wrote: All, As you’re all aware, on 06/06/06 NSS successfully launched IPv6 services for IETF Web, Mail, and FTP. Has

RE: IETF IPv6 platform configuration

2006-07-05 Thread Hallam-Baker, Phillip
Mailing List Cc: [EMAIL PROTECTED] Subject: Re: IETF IPv6 platform configuration On Jun 11, 2006, at 20:00, IETF Secretariat wrote: All, As you’re all aware, on 06/06/06 NSS successfully launched IPv6 services for IETF Web, Mail, and FTP. Has anyone had FTP work for them when

RE: IETF IPv6 platform configuration

2006-07-05 Thread Hallam-Baker, Phillip
PROTECTED] Subject: RE: IETF IPv6 platform configuration If memory serves me right there is a subway terminal built into the foundation of the Delta International. Where the other end of the subway goes is another matter. -Original Message- From: Ken Raeburn [mailto:[EMAIL PROTECTED

RE: IETF IPv6 platform configuration

2006-07-05 Thread Jeffrey Hutzelman
Sent: Wednesday, July 05, 2006 3:52 PM To: 'Ken Raeburn'; ietf Mailing List Cc: [EMAIL PROTECTED] Subject: RE: IETF IPv6 platform configuration If memory serves me right there is a subway terminal built into the foundation of the Delta International. Where the other end of the subway goes

Re: IETF IPv6 platform configuration

2006-06-16 Thread IETF Secretariat
Secretariat. -Original Message- From: Joe Touch [mailto:[EMAIL PROTECTED] Sent: Thursday, June 15, 2006 11:56 AM To: Iljitsch van Beijnum Cc: [EMAIL PROTECTED]; Mark Andrews; ietf@ietf.org Subject: Re: IETF IPv6 platform

Re: IETF IPv6 platform configuration

2006-06-15 Thread Iljitsch van Beijnum
On 15-jun-2006, at 1:51, Mark Andrews wrote: * Only HTTP, SMTP, FTP, and DNS traffic are permitted through an IPv6 Native firewall (pings, traceroutes etc. are dropped) Why? Shouldn't we be prompting good firewall practices? Droping ICMP was a knee jerk

Re: IETF IPv6 platform configuration

2006-06-15 Thread Joe Touch
Iljitsch van Beijnum wrote: On 15-jun-2006, at 1:51, Mark Andrews wrote: *Only HTTP, SMTP, FTP, and DNS traffic are permitted through an IPv6 Native firewall (pings, traceroutes etc. are dropped) Why? Shouldn't we be prompting good firewall practices? Droping

IETF IPv6 platform configuration

2006-06-14 Thread IETF Secretariat
. In addition, NSS is in the process of providing statistics on IPv4 vs. IPv6 that will be posted on the IETF website. IETF IPv6 platform configuration * The IPv6 access to and from IETF is tunneled from a local edge router over IPv4 to a global Internet2 backbone. * All

Re: IETF IPv6 platform configuration

2006-06-14 Thread Mark Andrews
* Only HTTP, SMTP, FTP, and DNS traffic are permitted through an IPv6 Native firewall (pings, traceroutes etc. are dropped) Why? Shouldn't we be prompting good firewall practices? Droping ICMP was a knee jerk reaction to ICMP echo to directed broadcast

Re: IETF IPv6 platform configuration

2006-06-12 Thread Sam Hartman
secIETF == IETF Secretariat [EMAIL PROTECTED] writes: secIETF * Only HTTP, SMTP, FTP, and DNS traffic are permitted through an IPv6 secIETF Native firewall (pings, traceroutes etc. are dropped) Please make sure that ICMP messages needed for path MTU discovery are not

Re: IETF IPv6 platform configuration

2006-06-12 Thread Kevin Loch
Sam Hartman wrote: secIETF == IETF Secretariat [EMAIL PROTECTED] writes: secIETF * Only HTTP, SMTP, FTP, and DNS traffic are permitted through an IPv6 secIETF Native firewall (pings, traceroutes etc. are dropped) Please make sure that ICMP messages needed for path MTU

Re: IETF IPv6 platform configuration

2006-06-12 Thread Pekka Savola
On Mon, 12 Jun 2006, Kevin Loch wrote: Sam Hartman wrote: secIETF == IETF Secretariat [EMAIL PROTECTED] writes: secIETF * Only HTTP, SMTP, FTP, and DNS traffic are permitted through an IPv6 secIETF Native firewall (pings, traceroutes etc. are dropped) Please make sure that

Re: IETF IPv6 platform configuration

2006-06-12 Thread Elwyn Davies
Kevin Loch wrote: Sam Hartman wrote: secIETF == IETF Secretariat [EMAIL PROTECTED] writes: secIETF *Only HTTP, SMTP, FTP, and DNS traffic are permitted through an IPv6 secIETF Native firewall (pings, traceroutes etc. are dropped) Please make sure that ICMP messages