Re: TLS vs. IPsec (Was: Re: experiments in the ietf week)

2008-03-26 Thread Iljitsch van Beijnum
On 25 mrt 2008, at 16:10, Dan Wing wrote: ... And yes, the issues I referred to are DoS and TCP spoofing. These can only be protected against at the network level. What are your thoughts on DTLS's DoS and spoofing protection? Looks like this is mostly similar to IPsec except that the port

Re: TLS vs. IPsec (Was: Re: experiments in the ietf week)

2008-03-26 Thread Eric Rescorla
At Wed, 26 Mar 2008 13:25:20 +0100, Iljitsch van Beijnum wrote: On 25 mrt 2008, at 16:10, Dan Wing wrote: ... And yes, the issues I referred to are DoS and TCP spoofing. These can only be protected against at the network level. What are your thoughts on DTLS's DoS and spoofing

Re: TLS vs. IPsec (Was: Re: experiments in the ietf week)

2008-03-26 Thread Iljitsch van Beijnum
On 26 mrt 2008, at 14:36, Eric Rescorla wrote: - Modern cryptographic implementations are extremely fast. For comparison the MacBook Air I'm typing this on will do order 10^6 HMAC-MD5s/second on 64-byte packets. So, to consume all my resources would require order 10^8 bits per second,

Re: TLS vs. IPsec (Was: Re: experiments in the ietf week)

2008-03-26 Thread Eric Rescorla
At Wed, 26 Mar 2008 15:01:21 +0100, Iljitsch van Beijnum wrote: On 26 mrt 2008, at 14:36, Eric Rescorla wrote: - Modern cryptographic implementations are extremely fast. For comparison the MacBook Air I'm typing this on will do order 10^6 HMAC-MD5s/second on 64-byte packets. So, to

Re: TLS vs. IPsec (Was: Re: experiments in the ietf week)

2008-03-26 Thread Eric Rescorla
At Wed, 26 Mar 2008 07:32:41 -0700, Eric Rescorla wrote: At Wed, 26 Mar 2008 15:01:21 +0100, Iljitsch van Beijnum wrote: On 26 mrt 2008, at 14:36, Eric Rescorla wrote: - Modern cryptographic implementations are extremely fast. For comparison the MacBook Air I'm typing this on

Usability RE: Write an RFC Was: experiments in the ietf week

2008-03-25 Thread Hallam-Baker, Phillip
would make it incumbent on us to fix the same problems in our protocols. -Original Message- From: Patrik Fältström [mailto:[EMAIL PROTECTED] Sent: Mon 24/03/2008 10:30 PM To: Hallam-Baker, Phillip Cc: Russ Housley; IETF Discussion Subject: Re: Write an RFC Was: experiments in the ietf

Re: Write an RFC Was: experiments in the ietf week

2008-03-25 Thread Andrew G. Malis
Phillip does have a point regarding 802.1x authentication, which is typically used to authenticate the user to the service, and not vice versa. Conceivably a person could set up an evil access point that advertises the same beacon as the official access points, and has 802.1x enabled to accept the

Re: TLS vs. IPsec (Was: Re: experiments in the ietf week)

2008-03-25 Thread Iljitsch van Beijnum
On 24 mrt 2008, at 18:58, Jari Arkko wrote: Now, if we had a proposal that turned IPsec into as easily deployable between random clients and known servers as TLS, I would be interested in a new experiment! But I did not see a proposal for that yet. Maybe time for that draft that Phillip

RE: Write an RFC Was: experiments in the ietf week

2008-03-25 Thread Hallam-Baker, Phillip
: Re: Write an RFC Was: experiments in the ietf week Phillip does have a point regarding 802.1x authentication, which is typically used to authenticate the user to the service, and not vice versa. Conceivably a person could set up an evil access point that advertises the same beacon as the official

RE: TLS vs. IPsec (Was: Re: experiments in the ietf week)

2008-03-25 Thread Dan Wing
Iljitsch van Beijnum wrote: ... And yes, the issues I referred to are DoS and TCP spoofing. These can only be protected against at the network level. What are your thoughts on DTLS's DoS and spoofing protection? -d ___ IETF mailing list

Re: TLS vs. IPsec (Was: Re: experiments in the ietf week)

2008-03-25 Thread Ned Freed
On 24 mrt 2008, at 18:58, Jari Arkko wrote: Now, if we had a proposal that turned IPsec into as easily deployable between random clients and known servers as TLS, I would be interested in a new experiment! But I did not see a proposal for that yet. Maybe time for that draft that Phillip

Re: experiments in the ietf week

2008-03-25 Thread Eric Rescorla
At Mon, 24 Mar 2008 15:17:56 +0100, Iljitsch van Beijnum wrote: On 19 mrt 2008, at 1:46, Eric Rescorla wrote: A more interesting experiment would be to do away with SSL for a bit and use IPsec instead. Why would this be either interesting or desirable? SSL is vulnerable to more

Re: experiments in the ietf week

2008-03-24 Thread Iljitsch van Beijnum
On 19 mrt 2008, at 1:46, Eric Rescorla wrote: A more interesting experiment would be to do away with SSL for a bit and use IPsec instead. Why would this be either interesting or desirable? SSL is vulnerable to more attacks than IPsec and IPsec is more general than SSL. As such it would be

Re: experiments in the ietf week

2008-03-24 Thread Iljitsch van Beijnum
On 16 mrt 2008, at 21:42, Henrik Levkowetz wrote: ... Nearly all IETF mailinglists are still hosted on IPv4-only servers, to name just one issue. Umm... At this time, most IETF mailing lists are hosted on mail.ietf.org a.k.a. www.ietf.org, which is IPv6 enabled. (The numbers I have for

Re: experiments in the ietf week

2008-03-24 Thread Marc Manthey
Umm... At this time, most IETF mailing lists are hosted on mail.ietf.org a.k.a. www.ietf.org, which is IPv6 enabled. (The numbers I have for active WGs are that 90 out of 120 lists are hosted on ietf.org). I can't really reconcile that with your statement above. Could you expand on your

Re: experiments in the ietf week

2008-03-24 Thread Joe Abley
On 24 Mar 2008, at 11:18 , Marc Manthey wrote: hello ipv6 peoples, sorry for crossposting how can i use ipv6 from my machine ? using leopard 10.5.2. mail ? my endpoint is 2001:6f8:1051:0:20d:93ff:fe79:f1e thought its automatic :-P I think you just need to make sure that the servers

RE: experiments in the ietf week

2008-03-24 Thread Hallam-Baker, Phillip
10:17 AM To: Eric Rescorla Cc: Mark Andrews; Jari Arkko; IETF Discussion; Kurt Erik Lindqvist Subject: Re: experiments in the ietf week On 19 mrt 2008, at 1:46, Eric Rescorla wrote: A more interesting experiment would be to do away with SSL for a bit and use IPsec instead. Why would

Write an RFC Was: experiments in the ietf week

2008-03-24 Thread Hallam-Baker, Phillip
Enough, already. If we are going to have experiments in IETF week then lets do the thing right and have a process. In particular - Proposer MUST write an Internet Draft prior to the experiment stating: 1) Purpose - the information to be obtained 2) Method - what it to be done 3) Resources

TLS vs. IPsec (Was: Re: experiments in the ietf week)

2008-03-24 Thread Jari Arkko
Phillip, Iljitsch, If you beleive that there is an attack that SSL is vulnerable to you should bring it up in TLS. I think Iljitsch meant that TLS cannot protect against TCP vulnerabilities, such as spoofed connection resets. This is obviously well known. The upside of TLS has of course been

Re: Write an RFC Was: experiments in the ietf week

2008-03-24 Thread Jari Arkko
Phillip, write an Internet Draft prior to the experiment, +1 *IPv6 Next Steps* The Philadelphia IPv6 outage tested one specific aspect of the transition - is there an IPv6 network on the other side to connect to in due course, is it possible to run a pure IPv6 network? I think that

Re: Write an RFC Was: experiments in the ietf week

2008-03-24 Thread Russ Housley
Phillip: Have you tried the SSID at the IETF meetings that is configured to make use of 802.1x? Russ At 01:49 PM 3/24/2008, Hallam-Baker, Phillip wrote: Secure WiFi Connection I would like to see some demonstration of the fact that the default WiFi configuration on all existing platforms

RE: Write an RFC Was: experiments in the ietf week

2008-03-24 Thread Hallam-Baker, Phillip
Well I would submit that there is a major problem there on the security usability front. Don't make me think. My tolerance for network configuration is vastly greater than the typical user. This has to all just work, just like my Apple Mac did on the home network the day I bought it. Not

RE: Write an RFC Was: experiments in the ietf week

2008-03-24 Thread Hallam-Baker, Phillip
. I have no trust anchor. -Original Message- From: Russ Housley [mailto:[EMAIL PROTECTED] Sent: Mon 24/03/2008 3:22 PM To: Hallam-Baker, Phillip Cc: IETF Discussion Subject: Re: Write an RFC Was: experiments in the ietf week Phillip: Have you tried the SSID at the IETF meetings

Re: Write an RFC Was: experiments in the ietf week

2008-03-24 Thread Patrik Fältström
On 25 mar 2008, at 02.18, Hallam-Baker, Phillip wrote: I am willing to have a go at it next time round but only if I have some idea what I am expected to have on my machine and what authentication indicata I am to expect. As it stands there is no way for me to evaluate an authentic or

Re: experiments in the ietf week

2008-03-19 Thread Mark Andrews
At Sun, 16 Mar 2008 19:44:12 +0100, Iljitsch van Beijnum wrote: On 16 mrt 2008, at 2:16, Mark Andrews wrote: Enable DNSSEC validation on the network's servers. At a minimum make them DNSSEC transparent. Is there any software out there for common OSes that does

Re: experiments in the ietf week

2008-03-19 Thread Eric Rescorla
At Wed, 19 Mar 2008 22:59:52 +1100, Mark Andrews wrote: At Sun, 16 Mar 2008 19:44:12 +0100, Iljitsch van Beijnum wrote: On 16 mrt 2008, at 2:16, Mark Andrews wrote: Enable DNSSEC validation on the network's servers. At a minimum make them DNSSEC

Re: experiments in the ietf week

2008-03-19 Thread Jari Arkko
Eric, I was referring to Iljitsch's suggestion about SSL and IPsec, not the suggestion about DNSSEC. Yes. FWIW, I don't think that would be interesting. DNSSEC experiments by itself might be interesting, particularly if they could be combined with some movement in getting the root signed.

Re: experiments in the ietf week

2008-03-19 Thread Hannes Tschofenig
Hi Jari, we have already started todo the same with other protocols in GEOPRIV. See http://www.ietf.org/mail-archive/web/geopriv/current/msg05453.html http://www.ietf.org/mail-archive/web/geopriv/current/msg05468.html http://www.ietf.org/mail-archive/web/geopriv/current/msg05472.html Ciao Hannes

Re: experiments in the ietf week

2008-03-19 Thread Jari Arkko
Yes, that's excellent. In particular, I like your approach of making things available for the IETF crowd, delivered by the folks who are also delivering the standards. Jari ___ IETF mailing list IETF@ietf.org https://www.ietf.org/mailman/listinfo/ietf

Re: experiments in the ietf week

2008-03-18 Thread Eric Rescorla
At Sun, 16 Mar 2008 19:44:12 +0100, Iljitsch van Beijnum wrote: On 16 mrt 2008, at 2:16, Mark Andrews wrote: Enable DNSSEC validation on the network's servers. At a minimum make them DNSSEC transparent. Is there any software out there for common OSes that does something

Re: experiments in the ietf week

2008-03-16 Thread Iljitsch van Beijnum
On 16 mrt 2008, at 2:16, Mark Andrews wrote: Enable DNSSEC validation on the network's servers. At a minimum make them DNSSEC transparent. Is there any software out there for common OSes that does something useful with this? A more interesting experiment would be to do away

Re: experiments in the ietf week

2008-03-16 Thread Henrik Levkowetz
Hi Iljitsch, On 2008-03-16 19:44 Iljitsch van Beijnum said the following: ... Nearly all IETF mailinglists are still hosted on IPv4-only servers, to name just one issue. Umm... At this time, most IETF mailing lists are hosted on mail.ietf.org a.k.a. www.ietf.org, which is IPv6 enabled.

Re: experiments in the ietf week

2008-03-16 Thread Mark Andrews
On 16 mrt 2008, at 2:16, Mark Andrews wrote: Enable DNSSEC validation on the network's servers. At a minimum make them DNSSEC transparent. Is there any software out there for common OSes that does something useful with this? Yes. It is also useful in its own

Re: experiments in the ietf week

2008-03-15 Thread Russ Housley
Jari: Challenge for our IT folks: Internationalized Internet Drafts, including file names. Doable? Six or seven years ago we had a big discussion regarding the language(s) to be used in the IETF. Harald was IETF Chair when this discussion took place, and he declared the consensus to be

Re: experiments in the ietf week

2008-03-15 Thread Kurt Erik Lindqvist
On 14 mar 2008, at 13.01, Jari Arkko wrote: We should also implement future IPv6 experiments and network deployments. But why I'm really sending this e-mail is to suggest that IPv6 might not be the only topic for such future efforts. Here's a challenge for the RAI folks: What about

Re: experiments in the ietf week

2008-03-15 Thread Brian E Carpenter
On 2008-03-16 02:09, Russ Housley wrote: Jari: Challenge for our IT folks: Internationalized Internet Drafts, including file names. Doable? Six or seven years ago we had a big discussion regarding the language(s) to be used in the IETF. Harald was IETF Chair when this discussion

Re: experiments in the ietf week

2008-03-15 Thread Mark Andrews
Enable DNSSEC validation on the network's servers. At a minimum make them DNSSEC transparent. Mark -- Mark Andrews, ISC 1 Seymour St., Dundas Valley, NSW 2117, Australia PHONE: +61 2 9871 4742 INTERNET: [EMAIL PROTECTED]

Re: experiments in the ietf week

2008-03-14 Thread Fred Baker
On Mar 14, 2008, at 8:01 AM, Jari Arkko wrote: Challenge for our IT folks: Internationalized Internet Drafts, including file names. Doable? It's doable, no doubt. The next question is whether this is actually smart. The Finnish character set is something I can deal with, although my

Re: experiments in the ietf week

2008-03-14 Thread Julian Reschke
Fred Baker wrote: On Mar 14, 2008, at 8:01 AM, Jari Arkko wrote: Challenge for our IT folks: Internationalized Internet Drafts, including file names. Doable? It's doable, no doubt. The next question is whether this is actually smart. The Finnish character set is something I can

Re: experiments in the ietf week

2008-03-14 Thread Richard Barnes
As some of you might have noticed, some GEOPRIV participants ran a small experiment, using the IETF network as a base for location-based services. We had a few folks try it, and learned a lot, but three main things: 1. Interworking with the IETF NOC was really pleasant (Thanks, guys!) 2.