Re: DNSSEC is NOT secure end to end (more tutorial than debating)

2009-06-05 Thread Masataka Ohta
Mark Andrews wrote:

Thus, we must, anyway, protect cache.

Then, where is the point to introduce DNSSEC only to have another
possibility of security holes?

 We still lock doors and windows despite the possiblity of people
 breaking in by lifting tiles.

I'm afraid DNSSEC people have been arguing against SCTP saying
DNSSEC is good enough.

Worse, though I have been warning for these 15 years that cached
glue may be used only for glue with same refferal, a broken
concept of bailiwick was introduced only to enable so called
Kaminsky attack.

 Attacks at the registry level are the
 equivalient of lifting tiles.  It happens sometimes. 

Protection of DNSSEC at the registy level is equivalent
to protection against lifting tiles. Not practical at all.

 Locking the doors and windows stops most attacks however.

Then, let's lock the doors and windows first, before working on
DNSSEC.

Masataka Ohta

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-ietf-opsawg-operations-and-management(Guidelinesfor Considering Operations and Management of NewProtocols and ProtocolExtensions) to BCP

2009-06-05 Thread Tom.Petch
- Original Message -
From: Adrian Farrel adr...@olddog.co.uk
To: ietf@ietf.org
Cc: ops...@ietf.org
Sent: Thursday, June 04, 2009 11:58 AM

 In the discussion of IETF consensus of this document and its position as a
 BCP or otherwise, can I throw into the melting pot
 draft-ietf-pce-manageability-requirements-06.txt

Yes, a clear concise set of steps to follow when writing an I-D.

The other comment I would make on the I-D under Last Call is on the first
sentence of the abstract, to whit,
  New protocols or protocol extensions are best designed with due
   consideration of functionality needed to operate and manage the
   protocols. 

True, but not, I think, addressed by this document.  There is plenty in this I-D
for the I-D editor but little for the protocol designer. The latter might
benefit
from advice on how to structure elements of the PDUs and the interchange of
PDUs; it may be difficult to know whether or not a network is functioning if
there is no keepalive.  (A comparable discussion surfaced recently on
apps-discuss over the best way to encode lengths).

I appreciate that this I-D does not set out to give such advice but think that
someone reading the abstract might expect it to.

Tom Petch

 This particular I-D was developed within the PCE working group to apply only
 in that working group. It covers similar topics, but is more focused on
 ensuring that the protocols that are developed in PCE are manageable.

 The I-D has rough WG consensus (or did at the time I stopped being chair a
 few months ago), but is not mandatory to implement within the WG.

 It is my opinion that those PCE I-Ds that have taken the draft on board have
 produced better solutions that will be more successfully implemented and
 deployed.

 Cheers,
 Adrian

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


DNSSEC was never designed for transport end to end security

2009-06-05 Thread Bill Manning

So quit trying to be a dead horse that is not even there.
If you are so interested in transport layer security, then
by all means, encourage, promote, and develop solutions.

STCP is one such measure.  IPSEC is another.  there are 
many choices.

transport level security (integrity, authenticity) are orthoginal
to application level security (DNSSEC, SSH, HTTPS, etc)

DNSSEC was never designed to provide or assure end to end security
as seen at the transport layer.  It couldn't, since its not a transport
protocol.

or is there some subtle nuance that I am missing in your arguement
that is being overshadowed by your strident insistance that DNSSEC is
not secure end to end.  I agree with you that it is not, and I say
so what... thats not what it was designed for.  



-- 
--bill

Opinions expressed may not even be mine by the time you read them, and
certainly don't reflect those of any other entity (legal or otherwise).

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


DNSSEC is NOT secure end to end

2009-06-05 Thread Masataka Ohta
Bill Manning wrote:

 If you are so interested in transport layer security, then
 by all means, encourage, promote, and develop solutions.

The discussion of the paper of David Clark about public key is not
on a transport but on an administrative layer.

The paper says:

However, there is a key role for a third party, which is to
issue a Public Key Certificate and manage the stock of such
certificates; such parties are called certificate authorities.

and the issuance and management of certificates, which is the key,
involves no transportation of the certificates and is not transport
but local (local to zone) administrative issues.

Or, if you insist the paper discusses on transport layer security
of public key cryptography, please feel free to quote the relevant
part of the paper.

I mention transport security merely because it is still required
with DNSSEC, because administrative security of DNSSEC is
cryptographically weak.

So, let's throw away DNSSEC and the broken-from-the-beginning
idea of bailiwick. Let's move on to lock the doors and windows.

Masataka Ohta

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: DNSSEC is NOT secure end to end

2009-06-05 Thread Andrew Sullivan
On Fri, Jun 05, 2009 at 08:10:55AM +0900, Masataka Ohta wrote:

 In general, registries welcome DNSSEC, no matter how secure it is,
 as long as its complicated operation works as an excuse to increase
 (or not to reduce) registration charge and registries' revenue.

That is a serious charge.  I've seen no evidence that DNSSEC
represents a revenue opportunity for registries.  On the contrary, so
far as I've seen, most registries are introducing it without any fee,
even though it represents a substantial additional operational cost.
(Indeed, some of us were at times under the impression that the
practical inability to charge anything in order to offset this
additional cost was one of the biggest barriers to DNSSEC deployment.)
What registries are you thinking of that are charging extra for DNSSEC
delegations (i.e. for accepting a DS record)?

A

-- 
Andrew Sullivan
a...@shinkuro.com
Shinkuro, Inc.
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: DNSSEC is NOT secure end to end

2009-06-05 Thread Masataka Ohta
Shane Kerr wrote:

 I think we all understand that it is possible to inject bad data into
 the DNS at the parent.

What do you mean the parent?

Do you mean master zone file of the parent or some caching server
expected by a client to have parent data?

 What I do not understand about this comment is how transport security
 can help in that case. Can you please explain?

Explanation depends on your definition of the parent.

Masataka Ohta

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Gen-ART LC Review of draft-ietf-geopriv-http-location-delivery-14

2009-06-05 Thread Richard Barnes

Ben,

Thanks for your review.  With respect to the HTTP issue you raise, is 
your claim that the HTTP binding prevents the use of Digest or Basic 
based on this sentence from Section 6.3?



HELD error messages MUST be carried by a 200 OK HTTP/HTTPS response.


If so, then I think that's a misinterpretation that calls for a 
clarification. The authors should feel free to correct me, but I think 
that HTTP-level errors (e.g., the need for authentication, or even a LIS 
not listening at a given path) can still generate other HTTP response 
codes (e.g., 401 or 404).  It's just that if the only thing that's gone 
wrong is at the HELD layer -- if it's the positioning that failed, not 
the communications -- then you have to use a 200.


Assuming that all the above is accurate, proposed text:

HELD error messages MUST be carried by a 200 OK HTTP/HTTPS response. 
(Other response codes may still be generated at the HTTP layer, if the 
problem is with the HTTP part of the message, not the HELD part.  For 
instance, if the request needs to be authenticated with Basic or Digest 
authentication, the server may issue a 401 Unauthorized response as a 
challenge, or if the indicated path is not valid, then the server may 
issue a 404 Not Found.)



Cheers,
--Richard




Ben Campbell wrote:

I have been selected as the General Area Review Team (Gen-ART)
reviewer for this draft (for background on Gen-ART, please see
http://www.alvestrand.no/ietf/gen/art/gen-art-FAQ.html).

Please resolve these comments along with any other Last Call comments
you may receive.

Document: draft-ietf-geopriv-http-location-delivery-14
Reviewer: Ben Campbell
Review Date: 2009-06-04
IETF LC End Date: 2009-06-09
IESG Telechat date: (if known)

Summary:

This draft is ready for publication as a proposed standard. I have a few 
editorial and clarity comments that might could slightly improve the 
draft, but can safely be ignored. Additionally, I have one comment 
highlighting a feature that is not necessarily a problem, but is 
architecturally important enough that I want to make sure the IESG 
thinks about it.


Major issues: None.

Minor issues:

-- There is one feature of HELD that the ADs should explicitly think 
about: The HTTP binding forbids LIS reliance on HTTP digest or basic 
authentication. If I understand correctly, this means effectively that 
the _only_ method for client authentication is the built in reverse 
routeability test. I am agnostic as to whether this is sufficient.


Nits/editorial comments:

-- section 4, paragraph 1:

Please expand (and reference) PIDF-LO on first mention.

-- Section 6.2, value list:

-- In my previous review, I was confused as to the relationship between 
the geodetic/civic and LoBV/LoBR choices. I think it's worth some 
clarification in this section that geodetic and civic imply LoBV.
-- section 9.3, 5th paragraph: A temporary spoofing of IP address could 
mean that a device could request a Location Object or Location URI that 
would result in another Device's location.


It might be worth clarifying that (if I understand correctly) that this 
is more than a spoofing attack, in that the attacker must not only spoof 
its source address, but must be able to receive packets sent to the 
spoofed address?


-- same paragraph: ... re-use of the Device's
   IP address could result in another Device receiving the original
   Device's location rather than its own location.

It seems like this problem is pretty unlikely to occur by _accident_ 
when HELD is used over TCP (the only binding right now), right? And 
certain not to happen over TLS? Might be worth a mitigating mention.



___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Gen-ART LC Review of draft-ietf-geopriv-http-location-delivery-14

2009-06-05 Thread Ben Campbell


On Jun 5, 2009, at 8:43 AM, Richard Barnes wrote:


Ben,

Thanks for your review.  With respect to the HTTP issue you raise,  
is your claim that the HTTP binding prevents the use of Digest or  
Basic based on this sentence from Section 6.3?



HELD error messages MUST be carried by a 200 OK HTTP/HTTPS response.


No, I based it on the last sentence, second paragraph in section 8:

The LIS MUST NOT rely on device support for cookies [RFC2965] or use  
Basic or Digest authentication [RFC2617].


It doesn't explicitly forbid the use of digest authn, but if it  
can't depend on client support, then it can't really base any decision  
on it.






If so, then I think that's a misinterpretation that calls for a  
clarification. The authors should feel free to correct me, but I  
think that HTTP-level errors (e.g., the need for authentication, or  
even a LIS not listening at a given path) can still generate other  
HTTP response codes (e.g., 401 or 404).  It's just that if the only  
thing that's gone wrong is at the HELD layer -- if it's the  
positioning that failed, not the communications -- then you have to  
use a 200.


Assuming that all the above is accurate, proposed text:

HELD error messages MUST be carried by a 200 OK HTTP/HTTPS response.  
(Other response codes may still be generated at the HTTP layer, if  
the problem is with the HTTP part of the message, not the HELD  
part.  For instance, if the request needs to be authenticated with  
Basic or Digest authentication, the server may issue a 401  
Unauthorized response as a challenge, or if the indicated path is  
not valid, then the server may issue a 404 Not Found.)



Cheers,
--Richard




Ben Campbell wrote:

I have been selected as the General Area Review Team (Gen-ART)
reviewer for this draft (for background on Gen-ART, please see
http://www.alvestrand.no/ietf/gen/art/gen-art-FAQ.html).
Please resolve these comments along with any other Last Call comments
you may receive.
Document: draft-ietf-geopriv-http-location-delivery-14
Reviewer: Ben Campbell
Review Date: 2009-06-04
IETF LC End Date: 2009-06-09
IESG Telechat date: (if known)
Summary:
This draft is ready for publication as a proposed standard. I have  
a few editorial and clarity comments that might could slightly  
improve the draft, but can safely be ignored. Additionally, I have  
one comment highlighting a feature that is not necessarily a  
problem, but is architecturally important enough that I want to  
make sure the IESG thinks about it.

Major issues: None.
Minor issues:
-- There is one feature of HELD that the ADs should explicitly  
think about: The HTTP binding forbids LIS reliance on HTTP digest  
or basic authentication. If I understand correctly, this means  
effectively that the _only_ method for client authentication is the  
built in reverse routeability test. I am agnostic as to whether  
this is sufficient.

Nits/editorial comments:
-- section 4, paragraph 1:
Please expand (and reference) PIDF-LO on first mention.
-- Section 6.2, value list:
-- In my previous review, I was confused as to the relationship  
between the geodetic/civic and LoBV/LoBR choices. I think it's  
worth some clarification in this section that geodetic and civic  
imply LoBV.
-- section 9.3, 5th paragraph: A temporary spoofing of IP address  
could mean that a device could request a Location Object or  
Location URI that would result in another Device's location.
It might be worth clarifying that (if I understand correctly) that  
this is more than a spoofing attack, in that the attacker must not  
only spoof its source address, but must be able to receive packets  
sent to the spoofed address?

-- same paragraph: ... re-use of the Device's
  IP address could result in another Device receiving the original
  Device's location rather than its own location.
It seems like this problem is pretty unlikely to occur by  
_accident_ when HELD is used over TCP (the only binding right now),  
right? And certain not to happen over TLS? Might be worth a  
mitigating mention.


___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Let's move on - Let's DNSCurve Re: DNSSEC is NOT secure end to end

2009-06-05 Thread Joe Baptista
On Fri, Jun 5, 2009 at 8:32 AM, Masataka Ohta 
mo...@necom830.hpcl.titech.ac.jp wrote:

 So, let's throw away DNSSEC and the broken-from-the-beginning
 idea of bailiwick. Let's move on to lock the doors and windows.


Words of wisdom.  I however propose we do not throw it away.  I propose it
be allowed to wither on the vine until DNSSEC life signs show it as being
dead.  Then the IETF can then do it's job and give it the proper burial it
deserves.

I propose all developers simply secure the DNS.  A transparent solution tha
is available NOW - is DNSCurve.  Will ensure the end to end transport of DNS
UDP packets is secure.  And that basically fixes once and for all the
insecurity we have in the UDP transport.

DNSCurve encrypts all DNS packets.  DNSSEC does not.

DNSCurve cryptographically authenticates all DNS responses, eliminating
forged DNS packets.  DNSSEC does not.

DNSCurve very quickly recognizes and discards forged packets, so attackers
have much more trouble preventing DNS data from getting through. DNSSEC does
not.

so I ask you - who wins the cookie in this race?

regards
joe baptista

-- 
Joe Baptista

www.publicroot.org
PublicRoot Consortium

The future of the Internet is Open, Transparent, Inclusive, Representative 
Accountable to the Internet community @large.

 Office: +1 (360) 526-6077 (extension 052)
Fax: +1 (509) 479-0084

Personal: www.joebaptista.wordpress.com
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: [Asrg] DNSSEC is NOT secure end to end

2009-06-05 Thread David Wilson
On Tue, 2009-06-02 at 22:38 +0900, Masataka Ohta wrote:
 Yes, security of DNSSEC is totally hop by hop.

I am nervous of adding to this debate (and should it really be on ASRG?)
However, I think there is some difference in the way people are using
some terms. My understanding of the terms hop-by-hop and end-to-end is
this:

A data item traverses a number of nodes within a network. (E.g. a UDP
datagram moving through an inter-network, or a Email message from its
submitting UA via a sequence of MTAs to the recipient's UA).

End-to-end security means that the security of that data item does not
depend on the trustworthiness of any intermediate node, or channel.

Hop-by-hop security means that you do rely on the trustworthiness of
the intermediate nodes and channels. (E.g. CRC provides no defence
against deliberate tampering, TLS for email is only as trustworthy as
the least trusted intermediate MTA).

PKI establishes a chain of trust between the signing certificate (i.e.
the certificate containing the public key corresponding to the private
key used to generate the signature) and your trust anchors (which you
choose). This is not really hop-by-hop as data is not hopping. Like a
real chain, it is only as strong as its weakest link. However, the chain
operates in a different 'space' from that used to transfer the data
being protected. 

As far as I understand, the key thing which DNSSEC gives you is data
origin authentication (although that by itself without data integrity
would be useless). The DNS attacks which were the start of the
discussion are all based on the attacker sending false data to the
system under attack. Having an effective means for determining from whom
data comes is necessary to overcome this kind of attack.

best regards

David Wilson

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: [OSPF] Last Call: draft-ietf-ospf-dynamic-hostname (Dynamic Hostname Exchange Mechanism for OSPF) to Proposed Standard

2009-06-05 Thread Mitchell Erblich

Group,

Here are a few stupid/nit questions,

1) What do you do with host naming collisions?

2) Is a blank string blank equal to a string?

3) Is the hostname case sensitive?

4) Since the hostnames are human readable, would
a backspace within the name make logical sense?

5) Don't some system implement x chars per tab,
then how do we show a consistent hostname?

6) If bell is included, does the system need to create
a sound each time the name is displayed?

7) If the router is localized to a different country, wouldn't
a logical hostname representation be able to support
multi-character and multi-byte foreign languages?

8) Underline support?

Thus, IMO, someone needs to re-write part of this to equal
http(s) URL type representation? or only alphanumeric chars

And specify some sort of left/right printing justification and
a way to deal with non printable chars..

Mitchell Erblich
===


On Jun 2, 2009, at 2:37 PM, The IESG wrote:

The IESG has received a request from the Open Shortest Path First  
IGP WG

(ospf) to consider the following document:

- 'Dynamic Hostname Exchange Mechanism for OSPF '
  draft-ietf-ospf-dynamic-hostname-03.txt as a Proposed Standard

The IESG plans to make a decision in the next few weeks, and solicits
final comments on this action.  Please send substantive comments to  
the

ietf@ietf.org mailing lists by 2009-06-16. Exceptionally,
comments may be sent to i...@ietf.org instead. In either case, please
retain the beginning of the Subject line to allow automated sorting.

The file can be obtained via
http://www.ietf.org/internet-drafts/draft-ietf-ospf-dynamic-hostname-03.txt


IESG discussion can be tracked via
https://datatracker.ietf.org/public/pidtracker.cgi?command=view_iddTag=17203rfc_flag=0

___
OSPF mailing list
o...@ietf.org
https://www.ietf.org/mailman/listinfo/ospf


___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


RE: DNSSEC is NOT secure end to end

2009-06-05 Thread Christian Huitema
  Yes, security of DNSSEC is totally hop by hop.
 
 
 Thus, you imply a definition of hop by hop along digital signature
 relationships. Indeed, DNSSEC security is limited to the weakest link
 along the chain from the bottom to the top of the DNS hierarchy. Nothing
 new there. I don't think any DNSSEC expert ever claimed differently.

Even in the presence of the attack by a trusted party, there are still huge 
differences between DNSSEC and transport-hop-by-transport-hop security. 
Transport based solution, SCTP or TCP, are open to attacks by any party in the 
path between two hops -- NAT routers come to mind. DNSSEC is immune to such 
attacks, a big advantage in practice.

Also, it is actually possible to improve on DNSSEC by introducing additional 
knowledge. If two domains have an establish relation, their servers can 
memorize the relevant public keys. If a host has a relation with a domain, it 
can memorize that domain's public key. This kind of peer-to-peer improvement 
makes the domain-to-domain or host-to-domain DNSSEC service immune to attacks 
by nodes higher in the hierarchy.

-- Christian Huitema

 
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: DNSSEC is NOT secure end to end

2009-06-05 Thread Shane Kerr
Ohta-san,

On Fri, 2009-06-05 at 21:32 +0900, Masataka Ohta wrote:
 I mention transport security merely because it is still required
 with DNSSEC, because administrative security of DNSSEC is
 cryptographically weak.

I think we all understand that it is possible to inject bad data into
the DNS at the parent.

What I do not understand about this comment is how transport security
can help in that case. Can you please explain?

Thanks,

--
Shane

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: DNSSEC is NOT secure end to end

2009-06-05 Thread Shane Kerr
Ohta-san,

On Fri, 2009-06-05 at 22:15 +0900, Masataka Ohta wrote:
 
  I think we all understand that it is possible to inject bad data into
  the DNS at the parent.
 
 What do you mean the parent?
 
 Do you mean master zone file of the parent or some caching server
 expected by a client to have parent data?

I the parent in the same sense as in RFC 1034 - the delegating level.
So, for EXAMPLE.COM this would be COM.

  What I do not understand about this comment is how transport security
  can help in that case. Can you please explain?
 
 Explanation depends on your definition of the parent.

--
Shane

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-solinas-suiteb-cert-profile (Suite B Certificate and Certificate Revocation List (CRL) Profile) to Informational RFC

2009-06-05 Thread Sean Turner

The IESG wrote:

The IESG has received a request from an individual submitter to consider
the following document:

- 'Suite B Certificate and Certificate Revocation List (CRL) Profile '
   draft-solinas-suiteb-cert-profile-03.txt as an Informational RFC

The IESG plans to make a decision in the next few weeks, and solicits
final comments on this action.  Please send substantive comments to the
ietf@ietf.org mailing lists by 2009-07-01. Exceptionally, 
comments may be sent to i...@ietf.org instead. In either case, please 
retain the beginning of the Subject line to allow automated sorting.


The file can be obtained via
http://www.ietf.org/internet-drafts/draft-solinas-suiteb-cert-profile-03.txt


IESG discussion can be tracked via
https://datatracker.ietf.org/public/pidtracker.cgi?command=view_iddTag=18056rfc_flag=0



Lydia and Jim,

Here are some comments.

#1 Non-repudiation bit

During the development of other profiles where the NR bit wasn't set, 
sometime after the profile gets developed I've usually gotten questions 
like so you're not setting N-R can I use it for non-repudiation 
services?  To answer this question, I sometimes put text in that said 
yes you can (below).  Maybe we should add something like this maybe in 
the security considerations?


Note that setting keyCertSign, cRLSign, and digitialSignature also means
that the certificate could be used by applications that require
non-repudiation services for certificate, CRL, and content signing,
respectively.

#2 Section 3.1 (add dashes)

r/SHA256/SHA-256
r/SHA384/SHA-384

#3 Section 3.2 (add a new line):

OLD:

  certicom-arc OBJECT IDENTIFIER ::= {
 iso(1) identified-organization(3) certicom(132) }
  id-ecPublicKey OBJECT IDENTIFIER ::= {
 ansi-X9-62 keyType(2) 1 }

NEW:

  certicom-arc OBJECT IDENTIFIER ::= {
 iso(1) identified-organization(3) certicom(132) }

  id-ecPublicKey OBJECT IDENTIFIER ::= {
 ansi-X9-62 keyType(2) 1 }

#4 Section 4.2 (add reference to 5480 and ECDSA-Sig-Value)

I sometimes think it's easier to understand that we've defined an ASN.1
structure for the r/s combo:

 ECDSA-Sig-Value ::= SEQUENCE {
 r  INTEGER,
 s  INTEGER
   }

It's in RFC 3279 and in RFC 5480.  Don't point to X9.62 they did some
odd things to this structure.  Maybe the 2nd para in 4.2 could be
changed as follows:

OLD:

The ECDSA signatureValue in an X.509 certificate is encoded as a BIT
STRING value of a DER encoded SEQUENCE of the two INTEGERS.  For
example, in a signature using P-256 and hex notation:

NEW:

The ECDSA signatureValue in an X.509 certificate is encoded as a BIT
STRING value of a DER encoded SEQUENCE of the two INTEGERS.  As per
[RFC5480], the structure, included for convenience, is as follows:

 ECDSA-Sig-Value ::= SEQUENCE {
 r  INTEGER,
 s  INTEGER
   }

For example, in a signature using P-256 and hex notation:

#5 Question: 4.2 Conversion Routine

Aren't the conversion routines in SEC1 and ANSI X9.62 the same?  5480
pointed to SEC1 because it was more readily available (online and free
versus online and not free for ANSI).  Curious why you chose to point to
3279 and not 5480?  2.3.5 of 3279 points to 4.3.3 and 4.3.6 of ANSI
X9.62.  2.2 of 5480 points to 2.3.1 and 2.3.2 of SEC1G. If we don't
point to 3279 here and the next one, you could delete it as a reference.

#6 Section 4.2 5th para: r/RFC3279/RFC5480  (the same routine is in 5480
section 2.2)

#7 Section 4.5.2: r/[5280]/[RFC5280]

Cheers,

spt

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: DNS Additional Section Processing Globally Wrong

2009-06-05 Thread Olafur Gudmundsson

At 02:06 04/06/2009, Sabahattin Gucukoglu wrote:

On 4 Jun 2009, at 04:06, Mark Andrews wrote:
In message 
aaab52ef-ad0a-4d3c-9b28-b864f342d...@sabahattin-gucukoglu.com , 
Sabahattin Gucukoglu writes:

The problem is this: the authoritative servers for a domain can
easily
never be consulted for DNS data if the resource being looked up
happens to be available at the parent zone.  That is,
bigbox.example.net's address and the RR's TTL can never be as
specified by the zone master unless he or she has control over the
parent zone's delegation to example.net if bigbox.example.net happens
to be serving for example.net.  (Registries give you address control,
of course, but often they fix on large TTLs.)

As far as I can tell, every public recursive server I can reach,
dnscache and BIND9, and one Microsoft cache and one of whatever
OpenDNS uses, all do the wrong thing (TM) and never look up true data
from authoritative name servers.  They hang on to additional section
data from the delegating name server and pass this on as truth, the
whole truth, and nothing but the truth to everybody who asks.


Except they don't.  What you may be seeing is parent servers
returning glue as answers and that being accepted.


Glue data, additional and non-authoritative by design, intent and
specification, aren't what I want caches to keep.  The data I spent my
lunch hour putting into my zone file is. :-)

As a matter of fact, it never occurred to me to wonder at this
misbehaviour - it clearly wasn't that much of a big deal when I was
running things myself - but the 2008 cache-poison attacks found me
surprised that this is how it is.  In particular, they only worked
because the cache was happy to keep additional data for hosts that
were pertinent to the query, but in which it had no business caching.
If it had instead chased up the referal, the attacker would at least
have had to run a nameserver to answer the Is it really you? query.

Cheers,
Sabahattin


Strictly speaking the Additional Section processing is correct.
The Missing step is that recursive resolvers have optimized away
the safety step of fetching authorative delegation information.

File bug reports, send mail to namedroppers insisting that Forgery resilience
effort mandate fetch authorative behavior, even if that will break some
important stuff as implementors of fake DNS servers do not return
NS sets when asked (actually they have started to).

Olafur

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Nomcom 2009-10: Second Call for Volunteers

2009-06-05 Thread Mary Barnes
Hi all, 

As noted last week, the IETF nominating committee process for 2009-10 is
underway. The list of people and posts whose terms end with the March
2010 IETF meeting, and thus the positions for which the nominating
committee is responsible, are summarized in the initial announcement:  
https://datatracker.ietf.org/ann/nomcom/1936/

The IETF nominating committee appoints folks to fill the open slots on
the IAOC, the IAB, and the IESG. The 10 nominating committee members are
selected randomly from a pool of volunteers.  The details of the
operation of the nomcom can be found in RFC 3777.  

We've had a very good response to the initial call for volunteers, with
the following individuals currently in the pool:

Marc Blanchet, Viagnie
John Drake, Boeing Satellite Systems
Stephen Hanna, Juniper Networks
Lixia Zhang, UCLA
Sean Turner, IECA, Inc.
Wassim Haddad, Ericsson
David H. Crocker, Brandenburg InternetWorking 
David Meyer, Cisco/University of Oregon 
Kurt Zeilenga, Isode Limited 
Spencer Dawkins, Huawei Technologies (USA) 
Yi Zhao, Huawei USA 
Glen Zorn, Network Zen 
Christian Schmidt, Nokia Siemens Networks 
Jouni Korhonen, Nokia Siemens Networks 
Enrico Marocco, Telecom Italia 
Ingemar Johansson, Ericsson AB 
Christer Holmberg, LM Ericsson 
Theo Zourzouvillys, VoIP.co.uk 
Scott Brim, Cisco 
Bernie Hoeneisen, Swisscom 
Stephen Farrell, Trinity College Dublin/NewBay Software 
Simon Perreault, Viagnie 
Teemu Savolainen, Nokia 
Suresh Krishnan, Ericsson 
David Sinicrope, Ericsson 
Stephen Kent, BBN Technologies 
Richard Barnes, BBN Technologies 
Pete Resnick, Qualcomm Incorporated 
Feng Hu, Huawei 
Salvatore Loreto, Ericsson 
Jan Melen, Ericsson 
Mehmet Ersue, Nokia Siemens Networks 
Yakov Rekhter, Juniper Networks 
Conny Jorgen Larsson, Ericsson AB 
Joe Abley, ICANN 
Shane Kerr, ISC

If you have volunteered and are not on the above list or have not heard
from me otherwise, please contact me ASAP.

However, we still need more volunteers - the more volunteers, the better
chance we have of choosing a random yet representative cross section of
the IETF population.  And, while you have until July 3rd to volunteer,
volunteering early really improves the efficiency of the administrative
process and ensures that we can quickly make the selection after the
deadline. 

As a reminder, volunteers must have attended 3 of the past 5 IETF
meetings - per RFC 3777, which means 3 of the following meetings:
IETF-70, IETF-71, IETF-72, IETF-73 and IETF-74.  If you qualify, and are
willing to forgo appointment to any of the positions for which the
nominating committee is responsible, please volunteer. 

The primary activity for this nomcom will begin just prior to IETF-75 in
Stockholm and should be completed in early January 2010.  The nomcom
will be collecting requirements from the community, as well as talking
to candidates and to community members about candidates. There will be
weekly conference calls to ensure progress. Thus, being a nomcom member
does require some time commitment.  While, there is no requirement in
RFC 3777 that a participant attend IETF meetings while serving on
nomcom, folks should consider that during the IETF meetings, folks that
do not attend would be expected to remotely participate during the day
in the timezones of the meeting locations - Stockholm the end of July
and Hiroshima in November. 

If you are not yet sure you would like to volunteer, please consider
that nomcom members play a very important role in shaping the leadership
of the IETF.  Ensuring the leadership of the IETF is fair and balanced
and comprised of those who can lead the IETF in the right direction is
an important responsibility that rests on the IETF participants at
large.
Volunteering for the nomcom is a good way of contributing in that
direction.

Please volunteer by sending an email before 5:00 pm CDT July 3, 2009 as
follows:

To: mary.bar...@nortel.com
Subject: Nomcom 2009-10 Volunteer

Please include the following information in the body:

Your Full Name  // As you enter in the IETF Registration Form,
  // First/Given name followed by Last/Family Name 
  // Please include all variations of names you might
have used

Current Primary Affiliation
  // as entered in the in the IETF Registration Form 

Preferred email address  

all email addresses used to Register for the past 5 IETF meetings 

Telephone number // May be used for confirmation if selected

Please expect an email response from me within 1-2 days.  If you don't
receive a response, please re-send your email with the tag Duplicate:
added to the subject line.

I will be publishing a more detailed target timetable, as well as
details of the randomness seeds to be used for the RFC 3797 selection
process within the next couple weeks.

Thank you,
Mary H. Barnes
mary.bar...@nortel.com
nomcom-ch...@ietf.org

___
Ietf mailing list
Ietf@ietf.org

RE: DNSSEC is NOT secure end to end

2009-06-05 Thread Paul Wouters

On Wed, 3 Jun 2009, Christian Huitema wrote:


Also, it is actually possible to improve on DNSSEC by introducing additional knowledge. 
If two domains have an establish relation, their servers can memorize the relevant public 
keys. If a host has a relation with a domain, it can memorize that domain's public key. 
This kind of peer-to-peer improvement makes the domain-to-domain or 
host-to-domain DNSSEC service immune to attacks by nodes higher in the hierarchy.


How do you handle key changes? How do you determine if the key change
is performed by the domain holder or an attacker?

There is no reason for such a leap of faith caching. In fact, with
SSHFP records, we can also nail down that leap of faith for ssh finally :)

Paul
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


FW: [secdir] secdir review of draft-dusseault-impl-reports-02

2009-06-05 Thread David Harrington
Hi,

I have reviewed this document as part of the security directorate's
ongoing effort to review all IETF documents being processed by the
IESG. These comments were written primarily for the benefit of the
security area directors. Document editors and WG chairs should
treat these comments just like any other last call comments.

The document describes updates to existing processes for
implementation and interoperability reports, and provides
recommendations about the level of detail required.

The document is about IETF standards process, is well written, and
introduces no new security concerns.

David Harrington
dbharring...@comcast.net
ietf...@comcast.net
dharring...@huawei.com

___
secdir mailing list
sec...@ietf.org
https://www.ietf.org/mailman/listinfo/secdir

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: DNSSEC is NOT secure end to end

2009-06-05 Thread Doug Otis


On Jun 3, 2009, at 12:23 AM, Christian Huitema wrote:


Yes, security of DNSSEC is totally hop by hop.


Thus, you imply a definition of hop by hop along digital signature  
relationships. Indeed, DNSSEC security is limited to the weakest  
link along the chain from the bottom to the top of the DNS  
hierarchy. Nothing new there. I don't think any DNSSEC expert ever  
claimed differently.


Even in the presence of the attack by a trusted party, there are  
still huge differences between DNSSEC and transport-hop-by- 
transport-hop security. Transport based solution, SCTP or TCP, are  
open to attacks by any party in the path between two hops -- NAT  
routers come to mind. DNSSEC is immune to such attacks, a big  
advantage in practice.


Also, it is actually possible to improve on DNSSEC by introducing  
additional knowledge. If two domains have an establish relation,  
their servers can memorize the relevant public keys. If a host has a  
relation with a domain, it can memorize that domain's public key.  
This kind of peer-to-peer improvement makes the domain-to-domain  
or host-to-domain DNSSEC service immune to attacks by nodes higher  
in the hierarchy.


Private ad-hoc caching of keys would make DNS fairly fragile.   While  
the trust anchor issue for DNSSEC looms, DNS will remain prone to  
inadvertently cached unsigned content.   Benefits obtained by using  
DNS over SCTP would be significant protection from out-of-path  
poisoning, whether information is signed or not.  Once DNSSEC is fully  
implemented and trust anchor issues are resolved, information  
contained within DNS would not depend upon transport protections.   
When that might happen remains unknown.  However, once DNSSEC becomes  
widely adopted, the Internet may need protection from UDP/EDNS0 source  
spoofing.  For this, SCTP would offer protection from source spoofing  
that DNSSEC does not prevent.  EDNS0 should also have min/max limits  
imposed, where packets of a greater size should  be handled by SCTP.


The brute force strategy that allows DNS over UDP to cope with source  
spoofing and misuse, also makes DNSSEC over UDP a greater risk.  UDP  
does not lend itself to being moderated or flow controlled, as some  
suggest.  Although TCP permits flow control, TCP is much more  
vulnerable to resource exhaustion, creating significant costs when  
defending TCP services compared to those using UDP or SCTP.   
Reliability, performance and DDoS immunity makes SCTP an attractive  
solution over TCP.  SCTP should perform well as a transport for either  
DNS or DNSSEC.  SCTP would also provide improved security and  
performance for HTTP as well. :^)


-Doug

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-ietf-mipshop-mos-dns-discovery (Locating IEEE 802.21 Mobility Servers using DNS) to Proposed Standard

2009-06-05 Thread SM

At 06:39 05-06-2009, The IESG wrote:

The IESG has received a request from the Mobility for IP: Performance,
Signaling and Handoff Optimization WG (mipshop) to consider the following
document:

- 'Locating IEEE 802.21 Mobility Servers using DNS '
   draft-ietf-mipshop-mos-dns-discovery-06.txt as a Proposed Standard

The IESG plans to make a decision in the next few weeks, and solicits
final comments on this action.  Please send substantive comments to the


In Section 2.2:

  If no NAPTR records are found, the client constructs SRV queries for
   those transport protocols it supports, and does a query for each.
   Queries are done using the service identifier _MIHIS for the MIH
   Information Service, _MIHES for the MIH Event Service and _MIHCS
   for the MIH Command Service. A particular transport is supported if
   the query is successful.  The client MAY use any transport protocol
   it desires which is supported by the server.

The document discourages the use of the regexp field.  I cannot tell 
why the author went to such lengths to define a DDDS application when 
it would have been easier to use SRV queries for the transport protocols.


In Section 2.3:

  If TARGET is a numeric IP address, the MN uses that IP address and
   the already chosen transport to contact the server providing the
   desired service.

According to RFC 2782, the target in SVR RR is a the domain name of 
the target host.


In Section 7, the Author's email address is listed as 
gabor(dot)bajko(at)nokia(dot)com.  Could the author please publish a 
valid email address instead of obfuscating the email address like 
that?  It makes it easier for readers who have questions or comments 
to contact the author.


Regards,
-sm 


___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Stockholm IETF Code Sprint

2009-06-05 Thread IETF Chair
A wiki has been set up for the Stockholm code strint:
http://trac.tools.ietf.org/tools/ietfdb/wiki/IETF75Sprint

The wiki includes a sign-up page.  Please add your name to the table
if you are planning to participate.

Thanks,
  Russ


IETF Chair wrote:
 Stockholm IETF Code Sprint
 
 When:  July 25, 2009, begining at 9:30 AM
 
 Where: IETF Hotel in Stockholm 
 
 What:  A bunch of hackers get together to work on code for the IETF web
site.  Some people may be porting of existing functionality to
the new framework; some people may be adding exciting new
functionality.  All code will become part of the open source
IETF tools.
 
 Who:   Hopefully you can help
 
 Chris Newman will be helping with advance planning.  Henrik Levkowetz
 will be coordinating the event in Stockholm.  You will hear more from
 them shortly.  Many of the results of the last code sprint are being
 used every day.
 
 Please support the tools development effort,
Russ

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-solinas-suiteb-cert-profile (Suite B Certificate and Certificate Revocation List (CRL) Profile) to Informational RFC

2009-06-05 Thread Paul Hoffman
At 12:39 PM -0400 6/5/09, Sean Turner wrote:
#1 Non-repudiation bit

During the development of other profiles where the NR bit wasn't set, sometime 
after the profile gets developed I've usually gotten questions like so you're 
not setting N-R can I use it for non-repudiation services?  To answer this 
question, I sometimes put text in that said yes you can (below).  Maybe we 
should add something like this maybe in the security considerations?

Note that setting keyCertSign, cRLSign, and digitialSignature also means
that the certificate could be used by applications that require
non-repudiation services for certificate, CRL, and content signing,
respectively.

I disagree that this needs to be added, and I certainly don't think this 
qualifies as a security consideration. The draft already says (three times...) 
that the nonRepudiation bit MAY be set.

#5 Question: 4.2 Conversion Routine

Aren't the conversion routines in SEC1 and ANSI X9.62 the same?  5480
pointed to SEC1 because it was more readily available (online and free
versus online and not free for ANSI).  Curious why you chose to point to
3279 and not 5480?  2.3.5 of 3279 points to 4.3.3 and 4.3.6 of ANSI
X9.62.  2.2 of 5480 points to 2.3.1 and 2.3.2 of SEC1G. If we don't
point to 3279 here and the next one, you could delete it as a reference.


That's a good question. It is good for us to point to free and easily-retrieved 
documents when possible.

--Paul Hoffman, Director
--VPN Consortium
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


RFC Editor's Bidders Conference Update

2009-06-05 Thread Ray Pelletier

All;

The Bidders Conference was held on 3 June and lasted almost 4 hours.   
ISI made excellent presentations.


The transcript of the Conference, including handouts and screen shots  
can be found under Bidders Conference at:

http://iaoc.ietf.org/rfced-procurement.html

NOTE:
The period for questions to be submitted to rpellet...@isoc.org has  
been extended from 5 June to 9 June.  The official responses may be

posted on 15 June, instead of 12 June, which remains the goal.

Ray Pelletier
IETF Administrative Director


___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-dawkins-nomcom-dont-wait (Nominating Committee Process: Earlier Announcement of Open Positions and Solicitation of Volunteers) to BCP

2009-06-05 Thread Russ Housley

Pekka:


- 'Nominating Committee Process: Earlier Announcement of Open Positions
  and Solicitation of Volunteers'
  draft-dawkins-nomcom-dont-wait-03.txt as a BCP


I have two issues with this.

 1) This places a new responsibility at the feet of IETF secretariat.
That's a new actor (not even a person but a role) in the process.
This is not good.

Better would be that the process allowed some already responsible
party (be it ISOC president, former NomCom chair, IETF chair, IAB
chair, or all of the above) the _option_ to allow IETF secretariat
to perform this announcement. (More about the option issue
below)

 2) As proposed, the IETF secretariat's role is exclusive.  In the
future no one else would have the authority to publish the
solicitation.  I don't think this is good.  The role should be
optional, if _responsible_ party(ies) chooses to take that path,
or at most inclusive of other parties' authority.


The IETF Executive Director, who is part of the Secretariat, already 
has a role in NomCom.  The IETF Executive Director provides the 
requirements for the open positions.


Would you be more comfortable if the Executive Director were named as 
the responsible party?


Russ 


___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: DNSSEC is NOT secure end to end

2009-06-05 Thread Masataka Ohta
Shane Kerr wrote:

I think we all understand that it is possible to inject bad data into
the DNS at the parent.

 I the parent in the same sense as in RFC 1034 - the delegating level.
 So, for EXAMPLE.COM this would be COM.

If you mean COM zone, it is not necessary to inject any data into
the zone.

You, instead, can inject a forged certificate into some cache used
by your victim.

It will be extremely easy if people are deceived that DNSSEC were
so secure that no proteciton on cache were necessary.

Masataka Ohta


___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: [Asrg] DNSSEC is NOT secure end to end

2009-06-05 Thread Masataka Ohta
David Wilson wrote:

 However, I think there is some difference in the way people are using
 some terms.

According to the terminology of David Clark, PKI including DNSSEC
is not secure end to end.

 End-to-end security means that the security of that data item does not
 depend on the trustworthiness of any intermediate node, or channel.

According to the terminology of David Clark, certificate authorities
are intermediate nodes.

If you have different terminology, use it outside of the Internet
community but not within.

Masataka Ohta


___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Last Call: draft-ietf-mipshop-mos-dns-discovery (Locating IEEE 802.21 Mobility Servers using DNS) to Proposed Standard

2009-06-05 Thread The IESG
The IESG has received a request from the Mobility for IP: Performance, 
Signaling and Handoff Optimization WG (mipshop) to consider the following
document:

- 'Locating IEEE 802.21 Mobility Servers using DNS '
   draft-ietf-mipshop-mos-dns-discovery-06.txt as a Proposed Standard

The IESG plans to make a decision in the next few weeks, and solicits
final comments on this action.  Please send substantive comments to the
i...@ietf.org mailing lists by 2009-06-19. Exceptionally, 
comments may be sent to i...@ietf.org instead. In either case, please 
retain the beginning of the Subject line to allow automated sorting.

The file can be obtained via
http://www.ietf.org/internet-drafts/draft-ietf-mipshop-mos-dns-discovery-06.txt


IESG discussion can be tracked via
https://datatracker.ietf.org/public/pidtracker.cgi?command=view_iddTag=17213rfc_flag=0

___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce


Nomcom 2009-10: Second Call for Volunteers

2009-06-05 Thread Mary Barnes
Hi all, 

As noted last week, the IETF nominating committee process for 2009-10 is
underway. The list of people and posts whose terms end with the March 2010
IETF meeting, and thus the positions for which the nominating committee is
responsible, are summarized in the initial announcement:  
https://datatracker.ietf.org/ann/nomcom/1936/

The IETF nominating committee appoints folks to fill the open slots on
the IAOC, the IAB, and the IESG. The 10 nominating committee members are
selected randomly from a pool of volunteers.  The details of the operation
of the nomcom can be found in RFC 3777.  

We've had a very good response to the initial call for volunteers, with
the following individuals currently in the pool:

Marc Blanchet, Viag�nie
John Drake, Boeing Satellite Systems
Stephen Hanna, Juniper Networks
Lixia Zhang, UCLA
Sean Turner, IECA, Inc.
Wassim Haddad, Ericsson
David H. Crocker, Brandenburg InternetWorking
David Meyer, Cisco/University of Oregon
Kurt Zeilenga, Isode Limited
Spencer Dawkins, Huawei Technologies (USA)
Yi Zhao, Huawei USA
Glen Zorn, Network Zen
Christian Schmidt, Nokia Siemens Networks
Jouni Korhonen, Nokia Siemens Networks
Enrico Marocco, Telecom Italia
Ingemar Johansson, Ericsson AB
Christer Holmberg, LM Ericsson 
Theo Zourzouvillys, VoIP.co.uk
Scott Brim, Cisco 
Bernie Hoeneisen, Swisscom
Stephen Farrell, Trinity College Dublin/NewBay Software
Simon Perreault, Viag�nie
Teemu Savolainen, Nokia
Suresh Krishnan, Ericsson
David Sinicrope, Ericsson  
Stephen Kent, BBN Technologies
Richard Barnes, BBN Technologies
Pete Resnick, Qualcomm Incorporated
Feng Hu, Huawei
Salvatore Loreto, Ericsson
Jan Melen, Ericsson
Mehmet Ersue, Nokia Siemens Networks
Yakov Rekhter, Juniper Networks
Conny Jorgen Larsson, Ericsson AB
Joe Abley, ICANN
Shane Kerr, ISC

If you have volunteered and are not on the above list or have not heard
from me otherwise, please contact me ASAP.

However, we still need more volunteers - the more volunteers, the better
chance we have of choosing a random yet representative cross section of
the IETF population.  And, while you have until July 3rd to volunteer,
volunteering early really improves the efficiency of the administrative
process and ensures that we can quickly make the selection after the
deadline. 

As a reminder, volunteers must have attended 3 of the past 5 IETF
meetings - per RFC 3777, which means 3 of the following meetings: IETF-70,
IETF-71, IETF-72, IETF-73 and IETF-74.  If you qualify, and are willing to
forgo appointment to any of the positions for which the nominating
committee is responsible, please volunteer. 

The primary activity for this nomcom will begin just prior to IETF-75 in
Stockholm and should be completed in early January 2010.  The nomcom will
be collecting requirements from the community, as well as talking to
candidates and to community members about candidates. There will be weekly
conference calls to ensure progress. Thus, being a nomcom member does
require some time commitment.  While, there is no requirement in RFC 3777
that a participant attend IETF meetings while serving on nomcom, folks
should consider that during the IETF meetings, folks that do not attend
would be expected to remotely participate during the day in the timezones
of the meeting locations - Stockholm the end of July and Hiroshima in
November. 

If you are not yet sure you would like to volunteer, please consider that
nomcom members play a very important role in shaping the leadership of the
IETF.  Ensuring the leadership of the IETF is fair and balanced and
comprised of those who can lead the IETF in the right direction is an
important responsibility that rests on the IETF participants at large.
Volunteering for the nomcom is a good way of contributing in that
direction.

Please volunteer by sending an email before 5:00 pm CDT July 3, 2009 as
follows:

To: mary.bar...@nortel.com
Subject: Nomcom 2009-10 Volunteer

Please include the following information in the body:

Your Full Name  // As you enter in the IETF Registration Form,
  // First/Given name followed by Last/Family Name 
  // Please include all variations of names you might have
used

Current Primary Affiliation
  // as entered in the in the IETF Registration Form 

Preferred email address  

all email addresses used to Register for the past 5 IETF meetings 

Telephone number // May be used for confirmation if selected

Please expect an email response from me within 1-2 days.  If you don't
receive a response, please re-send your email with the tag Duplicate:
added to the subject line.

I will be publishing a more detailed target timetable, as well as details
of the randomness seeds to be used for the RFC 3797 selection process
within the next couple weeks.

Thank you,
Mary H. Barnes
mary.bar...@nortel.com
nomcom-ch...@ietf.org

___
IETF-Announce mailing list
IETF-Announce@ietf.org

Protocol Action: 'Carrying Location Objects in RADIUS and Diameter' to Proposed Standard

2009-06-05 Thread The IESG
The IESG has approved the following document:

- 'Carrying Location Objects in RADIUS and Diameter '
   draft-ietf-geopriv-radius-lo-24.txt as a Proposed Standard

This document is the product of the Geographic Location/Privacy Working 
Group. 

The IESG contact persons are Cullen Jennings and Robert Sparks.

A URL of this Internet-Draft is:
http://www.ietf.org/internet-drafts/draft-ietf-geopriv-radius-lo-24.txt

Technical Summary

 This document specifies RADIUS attributes for conveying access
 network location information, in both civic and geospatial location
 formats, along with access network ownership.  The distribution of
 location information is a privacy sensitive task.  Dealing with
 mechanisms to preserve the user's privacy is important and is
 addressed throughout, for various scenarios of location information
 function within AAA.

WG Summary

 The WG reached solid consensus to advance this document after
 a number of iterations.  The WG had initial hesitation about
 taking on the work, because the RFC 4119 pidf_lo object could
 not be used within RADIUS attribute size constraints.  The 
 WG concerns were met with an eventual functional compromise,
 providing a mandated attribute with the pidf_lo policy markers,
 and opaque attributes pointing to the geopriv location
 formats developed for DHCP which had constraints similar
 to RADIUS.   

 This document is a Critical Requirement for 3GPP.  Both the
 GSM Association and the ITU have specified Operator Namespace
 Tokens for use in this protocol.  (The document has customers).

Document Quality

 The protocol was reviewed in depth by both the GEOPRIV and
 RADEXT Working Groups.  RADEXT's formal issues list was 
 cleared.  GEOPRIV and RADEXT had some overlapping 
 issues, especially location information design,
 and scenario evaluation.  The conclusion that location-
 aware AAA systems need to be able to implement the
 formats and processing found in the GEOPRIV documents
 was very useful, because it meant that GEOPRIV did not
 have to intercept or anticipate any enhancements of the
 RADIUS data model. 

 The document is especially careful in projecting GEOPRIV's
 paranoia towards exposing location information.  Section
 8.3 contains a detailed review against the previously
 defined requirements related to this, and the Security
 Considerations details the use of security services
 RADIUS provides as the using protocol to meet requirements.

___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce


Re: Stockholm IETF Code Sprint

2009-06-05 Thread IETF Chair
A wiki has been set up for the Stockholm code strint:
http://trac.tools.ietf.org/tools/ietfdb/wiki/IETF75Sprint

The wiki includes a sign-up page.  Please add your name to the table
if you are planning to participate.

Thanks,
  Russ


IETF Chair wrote:
 Stockholm IETF Code Sprint
 
 When:  July 25, 2009, begining at 9:30 AM
 
 Where: IETF Hotel in Stockholm 
 
 What:  A bunch of hackers get together to work on code for the IETF web
site.  Some people may be porting of existing functionality to
the new framework; some people may be adding exciting new
functionality.  All code will become part of the open source
IETF tools.
 
 Who:   Hopefully you can help
 
 Chris Newman will be helping with advance planning.  Henrik Levkowetz
 will be coordinating the event in Stockholm.  You will hear more from
 them shortly.  Many of the results of the last code sprint are being
 used every day.
 
 Please support the tools development effort,
Russ

___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce


Last Call: draft-ietf-smime-new-asn1 (New ASN.1 Modules for CMS and S/MIME) to Informational RFC

2009-06-05 Thread The IESG
The IESG has received a request from the S/MIME Mail Security WG (smime)
to consider the following document:

- 'New ASN.1 Modules for CMS and S/MIME '
   draft-ietf-smime-new-asn1-05.txt as an Informational RFC

The IESG plans to make a decision in the next few weeks, and solicits
final comments on this action.  Please send substantive comments to the
i...@ietf.org mailing lists by 2009-06-19. Exceptionally, 
comments may be sent to i...@ietf.org instead. In either case, please 
retain the beginning of the Subject line to allow automated sorting.

The file can be obtained via
http://www.ietf.org/internet-drafts/draft-ietf-smime-new-asn1-05.txt


IESG discussion can be tracked via
https://datatracker.ietf.org/public/pidtracker.cgi?command=view_iddTag=16823rfc_flag=0

___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce


Last Call: draft-dawkins-nomcom-openlist (Nominating Committee Process: Open Disclosure of Willing Nominees) to BCP

2009-06-05 Thread The IESG
The IESG has received a request from an individual submitter to consider
the following document:

- 'Nominating Committee Process: Open Disclosure of Willing Nominees '
   draft-dawkins-nomcom-openlist-04.txt as a BCP

The IESG plans to make a decision in the next few weeks, and solicits
final comments on this action.  Please send substantive comments to the
i...@ietf.org mailing lists by 2009-07-03. Exceptionally, 
comments may be sent to i...@ietf.org instead. In either case, please 
retain the beginning of the Subject line to allow automated sorting.

The file can be obtained via
http://www.ietf.org/internet-drafts/draft-dawkins-nomcom-openlist-04.txt


IESG discussion can be tracked via
https://datatracker.ietf.org/public/pidtracker.cgi?command=view_iddTag=18213rfc_flag=0

___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce