Re: I-D Action: draft-baker-ipv6-ospf-dst-flowlabel-routing-03.txt

2013-09-02 Thread Fred Baker (fred)
I thought we had been over this ground and come up with text you found acceptable? Did I inadvertently change it, or are you just bringing up the topic again? On Sep 2, 2013, at 5:16 PM, Brian E Carpenter wrote: > Hi, > > The IPv6 flow label is defined by RFC 6437. This isn't just an editori

Re: Detailed review of Significance of IPv6 Interface Identifiers

2013-08-14 Thread Fred Baker (fred)
On Aug 14, 2013, at 2:27 PM, Brian E Carpenter wrote: >> * Section 3: >>> To the extent that each method of IID creation specifies the values >>> of the "u" and "g" bits, and that each new method is carefully >>> designed in the light of its predecessors, these bits tend to reduce >>> the ch

Re: "Deprecate"

2013-07-30 Thread Fred Baker (fred)
I mostly agree. Some fuzz. On Jul 30, 2013, at 10:34 AM, Ronald Bonica wrote: > Folks, > > I think that we heard the following at yesterday's meeting: > > Title > = > The document should be renamed "IPv6 Fragmentation Considered Ineffective" "Ineffective" has to be modified by "for some

"Deprecate"

2013-07-29 Thread Fred Baker (fred)
At the mike a moment ago, I referred to an existing formal definition of "deprecate". For the record, the reference is to RFC 1158, which reads: 3.1. Deprecated Objects In order to better prepare implementors for future changes in the MIB, a new term "deprecated" may be used when describi

Re: draft-bonica-6man-frag-deprecate

2013-06-27 Thread Fred Baker (fred)
On Jun 26, 2013, at 11:39 PM, Marc Lampo mailto:marc.lampo.i...@gmail.com>> wrote: Would we think about deprecating the use of fragmentation fields in the IPv4 header and recommending they MUST always be set to 0 ? I would say "no", for the same reasons that I think it's a poor idea in IPv6.

Re: New Version Notification for draft-bonica-6man-frag-deprecate-00.txt

2013-06-26 Thread Fred Baker (fred)
On Jun 26, 2013, at 4:52 PM, Fernando Gont wrote: > On 06/26/2013 12:56 PM, Mark ZZZ Smith wrote: >> >> One of the issues with conventional ICMP PTB based PMTUD is the >> default rate limits on ICMP messages on broadband routers with PPPoE >> subscribers i.e. dumbell [1500][1492][1500] MTUs, s

Re: New Version Notification for draft-bonica-6man-frag-deprecate-00.txt

2013-06-26 Thread Fred Baker (fred)
On Jun 26, 2013, at 3:56 AM, Mark ZZZ Smith wrote: > - Original Message - >> From: Fred Baker (fred) >> To: Randy Bush >> Cc: IPv6 Deployment Prevention >> Sent: Wednesday, 26 June 2013 1:30 PM >> Subject: Re: New Version Notification for >>

Re: New Version Notification for draft-bonica-6man-frag-deprecate-00.txt

2013-06-25 Thread Fred Baker (fred)
On Jun 25, 2013, at 12:42 PM, Randy Bush wrote: > in reality, you can not count on pmtud working One of these days, I'll understand why Linux/FreeBSD/Windows/Apple don't implement RFC 4821. IETF IPv6 working group mailing li

Re: New Version Notification for draft-bonica-6man-frag-deprecate-00.txt

2013-06-25 Thread Fred Baker (fred)
The case usually mentioned is in firewalls, under a policy that targets reassembly attacks. If system A sends a fragment but not all fragments of a message to system B, some of system B's resources are consumed until a timeout-or-something occurs. Dropping fragments prevents that. Personally, I

Re: New Version Notification for draft-bonica-6man-frag-deprecate-00.txt

2013-06-24 Thread Fred Baker (fred)
On Jun 24, 2013, at 5:49 PM, Sheng Jiang wrote: > However, I personally think we would found deprecating fragmentation in whole > IPv6 protocol might be too dramatic and had too many incompatible issues > after carefully and neutral analysis. That is consistent with my view, for reasons I hav

Re: New Version Notification for draft-bonica-6man-frag-deprecate-00.txt

2013-06-24 Thread Fred Baker (fred)
On Jun 24, 2013, at 12:45 AM, Tore Anderson wrote: > * Fred Baker (fred) > >> On Jun 22, 2013, at 2:29 AM, Tore Anderson wrote: >>> - When a SIIT translator receives an IPv4 packet with DF=0 that >>> would result in an IPv6 packet that would exceed the IPv6 l

Re: New Version Notification for draft-bonica-6man-frag-deprecate-00.txt

2013-06-23 Thread Fred Baker (fred)
On Jun 22, 2013, at 2:29 AM, Tore Anderson wrote: > - When a SIIT translator receives an IPv4 packet with DF=0 that would > result in an IPv6 packet that would exceed the IPv6 link MTU, it will > split the original packet into IPv6 fragments. It *could* fragment the IPv4 packet and send it in tw

Re: New Version Notification for draft-bonica-6man-frag-deprecate-00.txt

2013-06-21 Thread Fred Baker (fred)
I suppose I'm the contrarian, but this draft gives me some heartburn surrounding the robustness principle. Yes, TCP MSS generally limits the use of fragmentation for IPv6. We don't have a counterpart to MSS for UDP, and others have noted that OSPF etc may have issues. Thinking hypothetically,

Re: I-D Action: draft-baker-ipv6-ospf-dst-flowlabel-routing-01.txt

2013-05-02 Thread Fred Baker (fred)
that and say that this is a different use case. > Regards > Brian > > On 03/05/2013 09:24, Fred Baker (fred) wrote: >> On May 2, 2013, at 2:17 PM, Brian E Carpenter >> wrote: >> >>> That's why I think the way out is to use the wiggle room mentione

Re: I-D Action: draft-baker-ipv6-ospf-dst-flowlabel-routing-01.txt

2013-05-02 Thread Fred Baker (fred)
On May 2, 2013, at 2:17 PM, Brian E Carpenter wrote: > That's why I think the way out is to use the wiggle room mentioned > above. I hope we can. I'm afraid I don't see any wiggle room. Section 3 of RFC 6437 requires every new flow - every new TCP session, in the most extreme reading of that

Re: I-D Action: draft-baker-ipv6-ospf-dst-flowlabel-routing-01.txt

2013-05-02 Thread Fred Baker (fred)
On May 2, 2013, at 1:12 PM, Brian E Carpenter wrote: >> Any such method MUST >> NOT disturb nodes taking part in the stateless scenario just >> described. Thus, any node that sets flow label values according to a >> stateful scheme MUST choose labels that conform to Section 3 of this >>

Re: IIDs, u and g bits, and 4rd

2012-12-20 Thread Fred Baker (fred)
On Dec 20, 2012, at 9:35 AM, Rémi Després wrote: >> The comment Brian is making refers to IP's requirements, which are that the >> IID used in a subnet by an interface must be unique within that subnet. > > This is a clear requirement, on which I think we all agree. > > It is worth noting here

Re: IIDs, u and g bits, and 4rd

2012-12-20 Thread Fred Baker (fred)
On Dec 20, 2012, at 12:54 AM, Rémi Després wrote: > Interface addresses at the link layer are specified by IEEE to be universally > unique. Yes, and EIU-64 is one of several seeds from which an IID can be derived. It's not the only one. The fact that an underlying technology provides an inte

Re: IIDs, u and g bits, and 4rd

2012-12-19 Thread Fred Baker (fred)
On Dec 19, 2012, at 1:24 AM, Rémi Després wrote: > (c) In the Identifier-Locator Network Protocol of RFC 6741 (ILNP), the IEEE > semantic of g=0 applies to unicast addresses (section 3). Besides, "ILNP uses > IPv6 multicast for ILNPv6", which implies that addresses are not concerned > with IID

Re: IIDs, u and g bits, and 4rd

2012-12-18 Thread Fred Baker (fred)
defined, U=1, G=1 can not occur in the normal course of events. > We can ignore it. we can define it. We can reserve it and thn sit on our > hands. But given taht we have text already, and that text is ambiguous, it > seems like we should at least clear up the ambiguity. > >

Re: IIDs, u and g bits, and 4rd

2012-12-18 Thread Fred Baker (fred)
Why do we care about u and g in the first place? Is there code in an IPv6 router or host that interprets them? On Dec 18, 2012, at 3:50 PM, Joel M. Halpern wrote: > In reading the discussion,a nd trying to think through what I understand to > be correct, it seems that there is an unforeseen amb

Re: Adding GPS location to IPv6 header

2012-11-15 Thread Fred Baker (fred)
You may certainly file an internet draft with your ideas. You will want to read about what an Internet Draft is and how to file one. http://www.ietf.org/id-info/ Filing an Internet Draft does not imply consensus around the specification, and you will need to build that consensus. You will want

Re: DAD question

2012-08-14 Thread Fred Baker (fred)
On Aug 14, 2012, at 4:41 AM, Francis Dupont wrote: > I remember (perhaps the first detected duplicate?) a very early occurrence > before 1995 with a DEC box using a cloned full config. Same Decnet address > so same MAC address so same IPv6 link-local address… Where I'm coming from in this is an

Re: DAD question

2012-08-11 Thread Fred Baker (fred)
On Aug 11, 2012, at 12:04 PM, Ole Trøan wrote: Call this "making sure I'm on the same page as anyone else"… RFC 4941 describes privacy addresses, and RFC 4291 describes an EID based on a MAC Address. RFC 4862 describes stateless address autoconfiguration, and uses RFC

Re: DAD question

2012-08-11 Thread Fred Baker (fred)
On Aug 11, 2012, at 1:33 AM, Ole Trøan wrote: > Fred, > >> Call this "making sure I'm on the same page as anyone else"… >> >> RFC 4941 describes privacy addresses, and RFC 4291 describes an EID based on >> a MAC Address. RFC 4862 describes stateless address autoconfiguration, and >> uses RFC

DAD question

2012-08-10 Thread Fred Baker (fred)
Call this "making sure I'm on the same page as anyone else"… RFC 4941 describes privacy addresses, and RFC 4291 describes an EID based on a MAC Address. RFC 4862 describes stateless address autoconfiguration, and uses RFC 4861's duplicate address detection mechanism. My question is: what happen

Re: oversized-header-chains: Receipt of illegal first-fragments

2012-07-18 Thread Fred Baker (fred)
On Jul 18, 2012, at 1:36 PM, Fernando Gont wrote: > Folks, > > There's one issue that came up during my recent exchange with Suresh on > which I'd like others (including Suresh) to weigh in: > > Since first-fragments that fail to include the entire header chain will > be illegal, I think it wou

Re: Feedback on draft-gont-6man-stable-privacy-addresses-01

2012-04-14 Thread Fred Baker
On Apr 14, 2012, at 7:23 PM, Fernando Gont wrote: > That said, a more general question would be: should we include the (numeric) > interface index rather than e.g. a hardware-specific I-D? Hmmm. I would tend to think that's a small positive integer, which isn't all that unique. Are you thinkin

Re: Feedback on draft-gont-6man-stable-privacy-addresses-01

2012-04-14 Thread Fred Baker
On Apr 14, 2012, at 5:07 PM, Christian Huitema wrote: >> As I read it, section three item one calls for the use of the EUI-64 in use >> on the interface, which presumes that the >> interface is an IEEE 802 LAN. There are other interface types. I'd like to >> see that widened to a number *such*

Re: Feedback on draft-gont-6man-stable-privacy-addresses-01

2012-04-14 Thread Fred Baker
On Apr 14, 2012, at 4:20 PM, Christian Huitema wrote: > 3) Privacy: the number should vary over time, to make it harder for Internet > services to correlate sessions started by the same host. > 4) Stability: the number should remain stable over time, so administrators > can more easily manage wh

Re: Feedback on draft-gont-6man-stable-privacy-addresses-01 (was: Re: Consensus call on adopting:....)

2012-04-14 Thread Fred Baker
Speaking for myself, I don't understand the fixation on MAC addresses. Yes, Ethernet and other IEEE standards are widely used. They are not used on serial links (we seem to mostly use /127 prefixes for that), they are not used on the air side of 3G etc, and so on. And as a matter of fact, for al

Re: [6man] Stable privacy addresses (upcoming rev)

2012-04-03 Thread Fred Baker
On Mar 30, 2012, at 9:20 PM, Fernando Gont wrote: > If the regime controls the local-link, then as far as address-tracking is > concerned, you're toast. -- They could sniff the network and log the > address->MAC mappings, have RAs require you to do DHCPv6 and then have DHCPv6 > assign you a co

Re: You asked about multicast scope

2012-03-29 Thread Fred Baker
On Mar 29, 2012, at 2:52 PM, Iljitsch van Beijnum wrote: > On 29 Mar 2012, at 14:15 , Brian Haberman wrote: > >> It is not an assumption, it is stately quite clearly in the Scoped >> Addressing Architecture (RFC 4007). From Section 5 : > >> A zone of a given scope (less than global) falls

Re: You asked about multicast scope

2012-03-29 Thread Fred Baker
On Mar 29, 2012, at 12:02 PM, Iljitsch van Beijnum wrote: > On 28 Mar 2012, at 12:08 , Fred Baker wrote: > >>> I haven't read the spec yet, but isn't PCP supposed to work in the service >>> provider run NAT64/CGN case, too? In that case, the multicasts need

Re: [homenet] Routing between hosts in ULA subnets

2012-03-23 Thread Fred Baker
On Mar 22, 2012, at 11:00 AM, Anders Brandt wrote: > As a branch of the discussion [homenet] ULA scope > [draft-ietf-6man-rfc3484-revise-05.txt], > I would like some clear explanation of the actual issues related to routing > between hosts in ULA subnets. > Some people seems to be concerned for

Re: Non-traditional PMTUD [was Re: Fragmentation-related security issues]

2012-01-09 Thread Fred Baker
On Jan 6, 2012, at 8:26 PM, Fernando Gont wrote: > I just said that PLPMTU has a long convergence time Frankly, that sounds like an implementation issue. If we're willing to set IW=10, it seems like one should be able to send the initial burst, or at least the first retransmission, with messag

Re: [v6ops] new draft: draft-asati-v6ops-dad-loopback

2011-10-11 Thread Fred Baker
Just so everyone's on the same page, although this draft originally targets v6ops, it is going to be looked at in 6man (per the 6man chairs). That's a discussion you may want to have in 6man. On Oct 11, 2011, at 11:39 AM, Hemant Singh (shemant) wrote: > Lorenzo, > > I realized that the loopin

Re: Questions from the Authors of draft-gashinsky-v6nd-enhance

2011-08-18 Thread Fred Baker
On Aug 18, 2011, at 12:43 PM, George, Wesley wrote: > B. 7.4 ND cache priming and refresh > WEG] might be worth thinking about situations where DHCPv6 is in use and > whether that can be leveraged to achieve something similar to this, i.e. > watch the DHCPv6 messages go past and pre

Re: [v6ops] Best venue to begin addressing the "/64 ND DoS" concerns ?

2011-07-17 Thread Fred Baker
On Jul 17, 2011, at 1:53 AM, Philip Homburg wrote: > In your letter dated Sun, 17 Jul 2011 11:32:37 +0930 you wrote: >> The quite novel technique of allocation transient addresses to >> applications/processes to assist with firewalling also takes advantage >> of IPv6's large address space and tha

Re: Best venue to begin addressing the "/64 ND DoS" concerns ?

2011-07-16 Thread Fred Baker
On Jul 15, 2011, at 10:35 AM, Philip Homburg wrote: > I could be wrong, but the impression I got from the various ops lists is that > the way you deal with this attack is to avoid using RFC-4862 and/or RFC-4861. I can imagine using DHCPv6 instead of SLAAC (RFC 4862 and the RS/RA component of RF

Re: [v6ops] Best venue to begin addressing the "/64 ND DoS" concerns ?

2011-07-16 Thread Fred Baker
On Jul 15, 2011, at 6:31 AM, RJ Atkinson wrote: > I apologise for being unclear. The document I was trying to propose in the > quoted text above was NOT about protocol changes, but instead would focus on > extant mitigations -- so the document I was proposing would more obviously > seem to fi

Re: /64 ND DoS

2011-07-12 Thread Fred Baker
On Jul 12, 2011, at 4:48 AM, Philip Homburg wrote: > Occasionally the subject comes up: /64 (and SLAAC) is bad because it is > easy to DoS routers by getting to perform too much ND. I suppose the same might be true of ARP. Has it been observed in the wild? ---

Re: [v6ops] Question regarding RA-Guard evasion (ND and extension headers)

2011-06-22 Thread Fred Baker
On Jun 22, 2011, at 4:15 AM, Mikael Abrahamsson wrote: > Just the same way that it's "obvious" that anyone can spoof RAs on a flat L2 > lan, it's "obvious" that fragmentation and headers can make parsing actual > payload harder and needs to be handled. These two "obvious" have historically > b

Re: [saag] ITU-T SG17 IPv6 security work items liaison

2011-06-14 Thread Fred Baker
On Jun 14, 2011, at 8:30 AM, Suresh Krishnan wrote: > RFC5157 IPv6 Implications for Network Scanning Personally, I think that RFC has been overtaken by events. Network scans have been reported in the wild. IETF IPv6 working gr

Re: [v6ops] ITU-T SG17 IPv6 security work items liaison

2011-06-04 Thread Fred Baker
BTW, in case it wasn't clear, I think the IETF should do that architecture. On Jun 4, 2011, at 11:10 PM, Fred Baker wrote: > > On Jun 4, 2011, at 9:53 AM, Stephen Farrell wrote: > >> I think we'd like to respond to them that that's great, >> and we'l

Re: [v6ops] ITU-T SG17 IPv6 security work items liaison

2011-06-04 Thread Fred Baker
On Jun 4, 2011, at 9:53 AM, Stephen Farrell wrote: > I think we'd like to respond to them that that's great, > and we'll be interested in their results, but can they > *please* come back to us before saying something should > be changed so's we can talk about it. That seems like a reasonable pro

Re: Multiple addresses [was Node Requirements: Elevating DHCPv6 from MAY to SHOULD]

2011-05-30 Thread Fred Baker
On May 30, 2011, at 3:57 PM, Ray Hunter wrote: > This is danger of going off topic I know (maybe it should go in v6ops), but > it's important to me to be able to understand the consequences of the > discussion, so please bear with me. It's definitely going to become an > operational FAQ, unles

Re: Multiple addresses [was Node Requirements: Elevating DHCPv6 from MAY to SHOULD]

2011-05-30 Thread Fred Baker
On May 30, 2011, at 2:12 PM, Brian E Carpenter wrote: > For example, setting the DSCP *as a function of > the source address* makes me cringe. We're going to have to get used to > the fact that IP addresses are not constants. good grief. The only reasonable use of a DSCP is to identify the set o

Re: Short 6MAN WG Last Call:

2011-05-09 Thread Fred Baker
On May 9, 2011, at 5:15 PM, Thomas Narten wrote: > When are we going to start counting cell phones, tablets and other electronic > devices? When they start implementing IPv6 at all... IETF IPv6 working group mailing list ipv6@

Re: Question about the link-local addresses

2011-03-05 Thread Fred Baker
Dumb question. Is there an attack in your proposal? For example, if I were to mis-identify my RA as coming from an end-host, could I now bypass RA-Guard? On Mar 5, 2011, at 2:56 PM, Mark Smith wrote: > On Sun, 06 Mar 2011 08:40:40 +1300 > Brian E Carpenter wrote: > >> Any router that forwards

Re: Question about the link-local addresses

2011-03-04 Thread Fred Baker
On Mar 4, 2011, at 6:59 PM, Yu Hua bing wrote: >>RFC4291 > > Link-Local addresses are for use on a single link. Link-Local > > addresses have the following format: > >| 10 | >| bits| 54 bits | 64 bits | >+--+-

Re: Psuedo-randomness in flow labels [was Re: [Fwd: I-D Action:draft-ietf-6man-flow-update-00.txt]]

2011-01-21 Thread Fred Baker
On Jan 21, 2011, at 11:25 AM, Brian E Carpenter wrote: > We seem to have agreed that the primary purpose of the flow label is > to facilitate load balancing, which is a statistical process. except when it is not a statistical process. ---

Re: [Fwd: I-D Action:draft-ietf-6man-flow-update-00.txt]

2011-01-11 Thread Fred Baker
On Jan 11, 2011, at 10:14 AM, Shane Amante wrote: > What causes pain and/or worry to us operators is when someone launches a > large *individual* "macro-flow"[1] at the network that start to represent a > decent fraction of the overall capacity of a physical component-link > underlying a LAG an

Re: [Fwd: I-D Action:draft-ietf-6man-flow-update-00.txt]

2011-01-11 Thread Fred Baker
On Jan 11, 2011, at 9:10 AM, Shane Amante wrote: > It's probably better to say that a hash algorithm works well where > individual, long-lived flows (regardless of traffic type) are a small-ish > fraction of the physical BW of any individual component-link in a LAG or ECMP > group. It's when

Re: Psuedo-randomness in flow labels [was Re: [Fwd: I-D Action:draft-ietf-6man-flow-update-00.txt]]

2011-01-10 Thread Fred Baker
On Jan 10, 2011, at 11:26 AM, Christian Huitema wrote: > Fred wrote: > >> Note that I am in favor of suggesting that the Flow Label be included in the >> hash when doing load balancing. It is a no brainer. At worst, it is a no op. >> But it certainly is never better to exclude it. > > Have yo

Re: [Fwd: I-D Action:draft-ietf-6man-flow-update-00.txt]

2011-01-09 Thread Fred Baker
On Jan 9, 2011, at 7:05 PM, Steven Blake wrote: > The network doesn't control port numbers, so his argument obviously doesn't > apply to ECMP or LAG. There are more than two common uses of load balancing. ECMP is a side effect of routing; we decide to multipath route when we know of two next h

Re: [Fwd: I-D Action:draft-ietf-6man-flow-update-00.txt]

2011-01-09 Thread Fred Baker
On Jan 9, 2011, at 5:45 PM, Brian E Carpenter wrote: > I'm confused. We've been talking for months about recommending > pseudo-random flow label values as inputs to hash functions, > precisely to allow scaleable and stateless load balancing and ECMP. > > I completely agree that per-flow state do

Re: [Fwd: I-D Action:draft-ietf-6man-flow-update-00.txt]

2011-01-09 Thread Fred Baker
this time around. Of course, the WG can decide otherwise, but >> embedding the use case(s) in the protocol spec does lengthen >> the discussion considerably. >> >> Regards >> Brian >> >> On 2010-12-15 14:26, Fred Baker wrote: >>> So you'

Re: Lack of responses on WG Last Calls

2010-12-17 Thread Fred Baker
On Dec 17, 2010, at 4:41 AM, Thomas Narten wrote: > Fred Baker writes: > >> When we advance a routing protocol to Proposed Standard, for reasons >> related to ancient IESG history related to routing, we generally >> require a test report that shows interoperable i

Re: Lack of responses on WG Last Calls

2010-12-16 Thread Fred Baker
orts and > just need to recast them as a draft and highlight the v6man draft tests) > > Don > > > -----Original Message- > From: Fred Baker [mailto:f...@cisco.com] > Sent: Thursday, December 16, 2010 3:56 PM > To: d.stu...@att.net > Cc: 'Brian Haberman&#x

Re: Lack of responses on WG Last Calls

2010-12-16 Thread Fred Baker
move forward in the WG. We > think they are essential to implementing non-storing ROLL RPL. By the way, > our target deployment is for Smart Metering applications in the home area > network. I added Fred Baker who chairs the Smart Power group who is aware > of our work. > &

Re: [Fwd: I-D Action:draft-ietf-6man-flow-update-00.txt]

2010-12-14 Thread Fred Baker
So you're really really not interested in discussing the one use case that people have actually talked about wanting, which has to do with load sharing? What use case are you addressing? On Dec 14, 2010, at 5:14 PM, Brian E Carpenter wrote: > Hi, > > The authors have received one off-list comm

Re: I-D Action:draft-krishnan-6man-header-reserved-bits-00.txt

2010-10-23 Thread Fred Baker
On Oct 23, 2010, at 3:23 PM, Brian E Carpenter wrote: > Lower, at the moment, since we have people very interested in the flow label > for ECMP/LAG. well, yes, but 6man does everything in its power to prevent it from being useful for that. You said that after 15-20 years of history with IPv6 t

Re: [v6ops] Fwd: I-D Action:draft-ietf-v6ops-cpe-simple-security-15.txt

2010-10-19 Thread Fred Baker
On Oct 15, 2010, at 3:40 PM, Brian E Carpenter wrote: >> I'd think that recommending having an option that disables unattended >> automatic update would address this concern. Managed service providers, >> since they'd be controlling the CPE, could go in and disable unattended >> automatic upd

Re: [Roll] Flow Label: 12 bits mutable and 8 bits immutable

2010-09-15 Thread Fred Baker
So that might use the mesh network header part of the 6lowpan header? On Sep 15, 2010, at 12:06 AM, Carsten Bormann wrote: >> Has anybody discussed adding a header with just the 3 bytes you need >> *before* the IP header? > > Yes. Ever since you proposed pretty much that at a previous IETF mee

Re: SLAAC or not [Re: New version available]

2010-09-12 Thread Fred Baker
On Sep 12, 2010, at 4:01 AM, Mark Smith wrote: > What I said was, and I'll highlight the key word, > > "Layer 2 devices inspecting traffic isn't *architecturally* acceptable > because it's a layer violation" > > The best place to fix IPv6 issues in in IPv6. well, yes, but... let me give you

Re: SLAAC or not [Re: New version available]

2010-09-10 Thread Fred Baker
On Sep 11, 2010, at 3:06 PM, Mikael Abrahamsson wrote: > On Sat, 11 Sep 2010, Mark Smith wrote: > >> How would you solve the problem? If you give end-nodes the ability to > > Exactly the way it has been done for IPv4 with the mechanisms I've given > examples of before. L2 devices look at DHCPv

Re: New version available

2010-09-10 Thread Fred Baker
On Sep 11, 2010, at 2:00 PM, Randy Bush wrote: >>> So the onus is on operators to turn their good business reasons into >>> engineering problems, eg as a requirements RFC, that the IETF will >>> then solve. > > no. it is the duty of operators to turn their business plans into > operational prac

Re: New version available

2010-09-10 Thread Fred Baker
On Sep 11, 2010, at 1:06 AM, t.petch wrote: > So the onus is on operators to turn their good business reasons into > engineering problems, eg as a requirements RFC, that the IETF will then solve. Thanks. I gather the operators have gotten a lot of bashing from IETF participants in the past; I'm

Re: SLAAC or not [Re: New version available]

2010-09-09 Thread Fred Baker
On Sep 10, 2010, at 6:44 AM, Brian E Carpenter wrote: >> SLAAC is fine for home networks (and some enterprise networks). > > That's exactly what (IMHO) we need to preserve, which has the side effect > that it's going to be the default mechanism for IPv6 nodes shipped out into > the SOHO marke

Re: New version available

2010-09-09 Thread Fred Baker
On Sep 9, 2010, at 9:48 PM, Mikael Abrahamsson wrote: > On Thu, 9 Sep 2010, Fred Baker wrote: > >> Does that solve all problems? obviously not. It does limit the impact of >> certain classes of attacks. IP Source Guard, a feature from my company and >> also from som

Re: New version available

2010-09-09 Thread Fred Baker
On Sep 9, 2010, at 9:48 PM, Mikael Abrahamsson wrote: > On Thu, 9 Sep 2010, Fred Baker wrote: >> Does that solve all problems? obviously not. It does limit the impact of >> certain classes of attacks. IP Source Guard, a feature from my company and >> also from some other

Re: New version available

2010-09-09 Thread Fred Baker
On Sep 9, 2010, at 7:29 PM, Mark Smith wrote: > SAVI and things like SeND are beneficial halfway measures, avoiding full > quarantining. I would generally agree. Just like being at a cocktail party, there is no way to know just how looped a neighbor is or how it will behave in that condition.

Re: Flow label (im)mutability

2010-09-08 Thread Fred Baker
Brian: Joel reminds me, in private email, that nobody seems to be commenting on you original question, which has to do with covert channels and whether that should affect the discussion of flow labels. Here's a covert channel for you. I was at an agency last year that uses specialized mail ser

Re: Flow label (im)mutability

2010-09-08 Thread Fred Baker
On Sep 8, 2010, at 1:02 PM, Christopher Morrow wrote: > this all gets 'crazy', I suppose if we wanted to route on flow-label > not destination-ip-address this might happen, but ... that seems > 'crazy' as I said before :) since not everyone would be using the > flow-label (maybe) and inconsistent

Re: Flow label (im)mutability

2010-09-07 Thread Fred Baker
On Sep 8, 2010, at 12:38 PM, Brian E Carpenter wrote: > The idea is that someone > figures out what flow label values will screw you In the model I proposed, the network the packet is in, as with the DSCP, is in control of the flow label value. --

Re: Flow label (im)mutability

2010-09-07 Thread Fred Baker
On Sep 8, 2010, at 11:44 AM, Christopher Morrow wrote: > On Tue, Sep 7, 2010 at 9:18 PM, Brian E Carpenter >> If this is correct, it is futile to assert that the flow label >> MUST be delivered unchanged to the destination, because we >> cannot rely on this in the real world. >> Anything that c

Re: ping-pong phenomenon with p2p links & /127 prefixes

2010-08-23 Thread Fred Baker
On Aug 23, 2010, at 2:53 PM, Manfredi, Albert E wrote: > Jared Mauch: > >> The biggest feedback I hear from people about IPv6 (besides the extra >> bits for addressses) is "Security", but they generally don't know what >> that is outside marketing speak. > > +1, in spades. Nor do these folk see

Re: ping-pong phenomenon with p2p links & /127 prefixes

2010-08-23 Thread Fred Baker
On Aug 23, 2010, at 1:15 PM, Joel Jaeggli wrote: > On 8/23/10 5:11 AM, sth...@nethelp.no wrote: >>> These mechanisms are applicable to any type of link, would preserve the >>> simplicity of universal 64 bit IIDs and the other benefits of them e.g. >>> CGAs, as well as avoiding the ping-pong probl

Re: Consensus call on adopting:draft-krishnan-6man-rs-mark-06.txt

2010-08-13 Thread Fred Baker
On Aug 13, 2010, at 3:59 PM, Hemant Singh (shemant) wrote: > So what text do we add to the Sri document to exclude MLDv2 protocol > from their proposal? I would recommend that you explain the point (why would it be inappropriate for an MLDv2 multicast to be sent to a unicast MAC address if th

Re: [Roll] Flow Label: 12 bits mutable and 8 bits immutable

2010-08-10 Thread Fred Baker
On Aug 10, 2010, at 11:21 AM, Carsten Bormann wrote: > OK, I'm not talking of "host" as in originates or terminates traffic, but > "host" in the sense of "does not participate in routing". > It appears there is no such thing inside a RPL world then. A RPL or Manet world doesn't have the 1970's-

Re: Flow Label: 12 bits mutable and 8 bits immutable

2010-08-10 Thread Fred Baker
I would find that surprising. There are ample cases where the originator of a high data rate flow (sensor data from a radio telescope to a number cruncher, to pick one example) might want to use the flow label to send data from one session down multiple paths. Multi-path TCP would be another exa

Re: draft-ietf-6man-text-addr-representation AUTH48 change

2010-08-04 Thread Fred Baker
On Aug 4, 2010, at 5:56 PM, Juergen Schoenwaelder wrote: > On Wed, Aug 04, 2010 at 05:34:39PM +0200, Fred Baker wrote: > >> I think this is a mis-use of AUTH48; the working group has >> considered the draft and said what it wanted to say, and at this >> point the

Re: draft-ietf-6man-text-addr-representation AUTH48 change

2010-08-04 Thread Fred Baker
I think this is a mis-use of AUTH48; the working group has considered the draft and said what it wanted to say, and at this point the RFC Editor is asking you whether they changed the intent of the draft in the editing process or whether perhaps your address has changed. Changing the draft in a

Re: 0 FL mutable

2010-08-04 Thread Fred Baker
intellectually, end to end signaling might make sense. If so, it belongs in the end-to-end headers. More importantly, who's using it? If using it end to end or end-to-network isn't being useful, either find a use, or deprecate it. On Aug 4, 2010, at 10:00 AM, Randy Bush wrote: > The flow-l

Re: 0 FL mutable

2010-08-04 Thread Fred Baker
On Aug 4, 2010, at 5:48 AM, Brian E Carpenter wrote: >>> The flow-label can belong either to the network -or- to the host(s): pick >>> one[1]. ++ Frankly, much of this discussion has been about dividing the flow label into two parts, one for the host to use to instruct the network on what it

Re: draft-gundavelli-v6ops-l2-unicast WGLC

2010-08-03 Thread Fred Baker
essage. One may also note > that MLD is used by ND as specified in RFC 4862 and RFC 4861. > > So what text do we add to the Sri document to exclude MLDv2 protocol > from their proposal? > > Hemant > > -Original Message- > From: ipv6-boun...@ietf.org [mailto:i

Re: draft-gundavelli-v6ops-l2-unicast WGLC

2010-08-02 Thread Fred Baker
The other truly obvious use case, standard in IPv4 ARP, is when refreshing an ARP/ND entry. You already know the MAC address, the question is whether the guy is still there or not. In IPv4, we (pretty much everybody) unicast the ARP request to the most recent MAC address; it either responds or d

Re: draft-gundavelli-v6ops-l2-unicast WGLC

2010-08-02 Thread Fred Baker
e link-layer > header, withstanding all other validity considerations as > specified in the relevant IPv6 standards specifications.” > > “An IPv6 sender node MAY choose to transmit an IPv6 multicast > message as a link-layer unicast message.” > > - Wes > > On 7/31/10 1:5

draft-gundavelli-v6ops-l2-unicast WGLC

2010-07-30 Thread Fred Baker
This is to initiate a two week working group last call of draft-gundavelli-v6ops-l2-unicast. Please read it now. If you find nits (spelling errors, minor suggested wording changes, etc), comment to the authors; if you find greater issues, such as disagreeing with a statement or finding addition

Re: flow label usage?

2010-07-28 Thread Fred Baker
On Jul 28, 2010, at 1:58 PM, Yong Lucy wrote: > What is flow label usage? > > IMO: it enforces that a set of packets with the same flow label has to be > carried through the networks in the same path or belong to the same > application at host. Is that correct? Is there other usage of flow labe

draft-troan-multihoming-without-nat66

2010-07-17 Thread Fred Baker
draft-troan-multihoming-without-nat66 will be discussed in v6ops at the IETF meeting, but is in my opinion also relevant to 6man. I would invite 6man attendance at the discussion. IETF IPv6 working group mailing list ipv6@ietf.

Re: DRAFT: Request for guidance about the flow label

2010-05-05 Thread Fred Baker
On May 5, 2010, at 2:18 AM, Tina TSOU wrote: > [Tina: How about keeping the previous flow label in the option of IPv6 Header > for restoral? When the exit router receives the packet, it uses the previous > option to replace the existing one to implement restoral.] Yes, one could do that. It lo

Re: DRAFT: Request for guidance about the flow label

2010-04-22 Thread Fred Baker
s. > > yours, > Joel > > Fred Baker wrote: >> On Apr 22, 2010, at 2:40 PM, Brian E Carpenter wrote: >>> However, consider that the flow label is a forgeable field, not >>> protected by any checksum (including IPSEC). >>> So maybe mutability is in

Re: DRAFT: Request for guidance about the flow label

2010-04-22 Thread Fred Baker
On Apr 22, 2010, at 2:40 PM, Brian E Carpenter wrote: > However, consider that the flow label is a forgeable field, not > protected by any checksum (including IPSEC). > So maybe mutability is in fact the only way to make it safe to > use across domain boundaries? Interesting. I had it in my he

Re: DRAFT: Request for guidance about the flow label

2010-04-22 Thread Fred Baker
personally, I would prefer to see it *mutable*, and undefined. Given that there are many host implementations out there, I could imagine difficulties getting any specific specification (such as a hash) widely deployed in a finite amount of time. However, if a network could use it to identify an

Re: Questions on RFC 4293 Management Information Base for the Internet Protocol (IP)

2010-04-21 Thread Fred Baker
"we didn't pay enough attention" is a very kind way to put it. The entire SNMP exercise was about monitoring; those like me who tried to make things writable pushed rocks uphill politically. That, and the experience of trying to make event triggered management rather than poll-driven management,

Re: deriving MAC address from destination Link local address without Neighbor discovery

2010-04-15 Thread Fred Baker
he RFC 3972 doesn't apply to the 64-bits of the Link-local addresses, but it > applies to 64-bit of the addresses configured via DHCPv6 > and/or stateless auto-conf RFCs 3315, 4862? > > Regards, > Parav Pandit > > --- On Thu, 4/15/10, Fred Baker wrote: > >>

Re: deriving MAC address from destination Link local address without Neighbor discovery

2010-04-14 Thread Fred Baker
There has been some water that passed under that bridge. They not only come from MAC addresses, but from random number generators and cryptographic algorithms - and can simply be numbers assigned by administrators. In addition to 2464 Transmission of IPv6 Packets over Ethernet Networks. M. Craw

Re: Discussion summary and next-step Re: Thoughts on address selection

2010-01-15 Thread Fred Baker
On Jan 15, 2010, at 8:07 AM, Dan Wing wrote: Missing a Pro that I consider significant: - Users will no longer experience multi-second connection delays due to IPv6's address selection. This means more users will leave IPv6 enabled. To me, that's the big issue. The point is to find

  1   2   >