Re: any concerns of SEND mixed with Proxy Gateway described in draft-nachum-sarp-06?

2013-08-01 Thread Erik Nordmark
On 7/31/13 11:11 AM, Linda Dunbar wrote: However, when SEND is used, Access (or Aggregation) switches might not possess knowledge of the attached hosts (VMs)’ private keys. Are there any concerns/feedback for giving the following recommendation in our draft? Any preferences? 1) state that

Re: lifetime of the IID - RFC 4941

2013-08-01 Thread Erik Nordmark
On 7/31/13 1:12 PM, Hosnieh Rafiee wrote: From the above sections, I presume that the current approach in RFC 4941 uses the same approach that is defined in RFC 4862. So, it removes the IID independent of the upper layer protocols. For the questions you are asking, they behave the same. (The

UDP+Fragmentation (was: Deprecate)

2013-08-01 Thread Ronald Bonica
Cmh, When I read this message, my first reaction was to scream that such a thing could not possibly be deployed, because operators will filter anything that they don't know or have an immediate use for. But after a few hallway discussions, I am starting to think that the idea might be viable.

6MAN session recording available

2013-08-01 Thread Meetecho Team
Dear all, the full recording (synchronized video, audio, slides and jabber room) of the 6MAN WG session at IETF 87 is available at the following URL: http://ietf87.conf.meetecho.com/index.php/Recorded_Sessions#6MAN For the chair(s): please feel free to put the link to the recording in the

RE: any concerns of SEND mixed with Proxy Gateway described in draft-nachum-sarp-06?

2013-08-01 Thread Linda Dunbar
-Original Message- My take is that *if* we want to have the approach where a host's IP address should map to somebody else's MAC address, then I think the simplest (and secure) approach would be to have the host (somehow) find out the MAC address to use, and then have the hosts

Re: ra-privacy: my responses to comments

2013-08-01 Thread Keith Moore
On reflection I wanted to respond to this a bit more: I was responding to slide 9, and in particular the bullet point that says The node Should not use public addresses. When I initially read this, I interpreted public addresses with the meaning that they tend to have in IPv4 - which is to say

Re: ra-privacy: my responses to comments

2013-08-01 Thread Scott Brim
On 08/01/13 14:31, Keith Moore allegedly wrote: There are many people (in IETF and elsewhere) who believe that applications should never use IP addresses directly or in referrals to other applications. This is often cited as if it were some architectural principle - in fact just last night,

RE: ra-privacy: my responses to comments

2013-08-01 Thread Hosnieh Rafiee
Many thanks for your comments. On 08/01/13 14:31, Keith Moore allegedly wrote: There are many people (in IETF and elsewhere) who believe that applications should never use IP addresses directly or in referrals to other applications. This is often cited as if it were some

Re: ra-privacy: my responses to comments

2013-08-01 Thread Keith Moore
On Aug 1, 2013, at 3:47 PM, Hosnieh Rafiee wrote: All sources of Internet public services need to have DNS names, but that's it. Other than that, names are only needed in higher layer communications, and can be handled there. For example, your laptop doesn't need a name to open

Re: ra-privacy: my responses to comments

2013-08-01 Thread Scott Brim
On 08/01/13 16:09, Keith Moore allegedly wrote: I do not think it is appropriate to assume that nodes are either clients or servers.Nodes can (and routinely do) support several applications in which the local protocol engine acts as a client, a server, or a peer, depending on the needs of

Re: ra-privacy: my responses to comments

2013-08-01 Thread Keith Moore
On Aug 1, 2013, at 4:17 PM, Scott Brim wrote: On 08/01/13 16:09, Keith Moore allegedly wrote: I do not think it is appropriate to assume that nodes are either clients or servers.Nodes can (and routinely do) support several applications in which the local protocol engine acts as a client,

Re: Deprecate

2013-08-01 Thread RJ Atkinson
On Tuesday 30th July, Ron Bonica wrote, in part: I think that we heard the following at yesterday's meeting: Title = The document should be renamed IPv6 Fragmentation Considered Ineffective That is an improvement because it more accurately describes the content of the draft. One might

Re: Deprecate

2013-08-01 Thread RJ Atkinson
On July 30th, Bob Hinden wrote, in part: I think the draft (especially since is headed toward BCP) should also include a message that PMTUD is useful and should not be blocked by routers/firewalls/middleboxes/etc. Aside: My note of a few minutes before had a bit of candidate text. There

Re: UDP+Fragmentation (was: Deprecate)

2013-08-01 Thread RJ Atkinson
I agree that C.M. Heard's ideas should be explored in more detail by the IETF. (I defer to the Powers That Be which list that might belong to -- TSV WG list might be one option, but it is not as likely to have IPv6 operators as well represented as the IPv6 list seems to have.) Yours, Ran

RE: UDP+Fragmentation (was: Deprecate)

2013-08-01 Thread Templin, Fred L
Hi Ron, SEAL already handles the segmentation/reassembly such that it would not be necessary to define a new UDP. Plus, SEAL can be used independently of any transport layer, e.g., for IP-in-IP tunneling. If you are looking for a replacement for IPv6 fragmentation (which you should be) IMHO SEAL

RE: ra-privacy: my responses to comments

2013-08-01 Thread Hosnieh Rafiee
Thanks a lot for your comments. They were actually quite helpful and made some good points. Here are my answers: There are many people (in IETF and elsewhere) who believe that applications should never use IP addresses directly or in referrals to Other applications. This is often cited as if it

Re: ra-privacy: my responses to comments

2013-08-01 Thread Brian E Carpenter
On 02/08/2013 01:26, Scott Brim wrote: On 08/01/13 14:31, Keith Moore allegedly wrote: There are many people (in IETF and elsewhere) who believe that applications should never use IP addresses directly or in referrals to other applications. This is often cited as if it were some

Re: ra-privacy: my responses to comments

2013-08-01 Thread Keith Moore
I do think it might be useful to recommend that DNS servers be configured as to refuse requests to list DNS zones as a means to thwart attackers from looking for IPv6 addresses. But assuming that such listing is disabled, I don't know why listing a host's address in DNS would make that host a

Re: UDP+Fragmentation (was: Deprecate)

2013-08-01 Thread Bob Hinden
Ron, On Aug 1, 2013, at 10:37 AM, Ronald Bonica rbon...@juniper.net wrote: Cmh, When I read this message, my first reaction was to scream that such a thing could not possibly be deployed, because operators will filter anything that they don't know or have an immediate use for. But after

Test

2013-08-01 Thread Bob Hinden
Test, please ignore. IETF IPv6 working group mailing list ipv6@ietf.org Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6

RE: Deprecate

2013-08-01 Thread Templin, Fred L
Hi Ran, Discussion: Deployments using tunnels, whether IP-in-IP, GRE, IPsec tunnel-mode, or some other IETF specified technology, are NOT going away. Yes, this is the same as I and others have been saying all along. If the physical MTU is 1280, then the tunnel MTU will be smaller.

RE: ra-privacy: my responses to comments

2013-08-01 Thread Manfredi, Albert E
-Original Message- From: ipv6-boun...@ietf.org [mailto:ipv6-boun...@ietf.org] On Behalf Of Scott Brim peer is also a nit - if you want an unknown someone to be able to contact you, you need to make yourself findable, whether the protocol design is p2p or not. Otherwise you don't.

Re: Deprecate

2013-08-01 Thread Mark Andrews
In message 2134f8430051b64f815c691a62d983180dc...@xch-blv-504.nw.nos.boeing.co m, Templin, Fred L writes: Hi Ran, Discussion: Deployments using tunnels, whether IP-in-IP, GRE, IPsec tunnel-mode, or some other IETF specified technology, are NOT going away. Yes, this is the same

Re: Deprecate

2013-08-01 Thread Mark Andrews
Mark Andrews writes: I can write up my suggestion as a I-D. It provides the information stateless middleware needs to pass fragments. It also helps firewalls that decide they need to see the entire contents of packets by providing protection to their reassembly queues. Done.

Re: UDP+Fragmentation (was: Deprecate)

2013-08-01 Thread Mark ZZZ Smith
Hi, - Original Message - From: C. M. Heard he...@pobox.com To: IPv6 ipv6@ietf.org Cc: Sent: Friday, 2 August 2013 3:11 AM Subject: Re: UDP+Fragmentation (was: Deprecate) On Thu, 1 Aug 2013, RJ Atkinson wrote: I agree that C.M. Heard's ideas should be explored in more detail