Re: bozoproofing the net, was The Value of Reputation

2006-01-03 Thread Stephen Farrell



Jeffrey Hutzelman wrote:



On Monday, January 02, 2006 08:51:20 PM -0800 Dave Crocker 
[EMAIL PROTECTED] wrote:



I don't
believe we have ever turned winning by exhaustion or winning
by intimidation into virtues, even though those techniques are



Actually we have.

It is used with some regularity by various folk in IETF management, in
lieu of honoring the requirements of plausible that I provided above.


If that's true (and I'm not expressing any opinion as to whether it is), 
that doesn't make it a virtue.



Note the change that Russ is making to the charter.


I think a lot of people might be missing a key point about how our 
process works.  In fact, it's looked that way to me for a while, and so 
since you bring it up, I'll try to clear things up for anyone who might 
be confused. Please don't think I'm singling you out...

[...]
In other words, Russ is within his rights to make changes to the charter 
he is willing to bring to the IESG -- especially in a case such as this 
where the proposed charter has been discussed so publicly that the rest 
of the IESG cannot possibly be deceived into thinking the charter Russ 
brings them is exactly the one the DKIM proponents proposed.


I agree. As I believe do a number of other dkim proponents, most
of whom are, I'd say, much less concerned about these (IMO mainly
process-nit) issues with the charter text and who'd like to get on
with the work in a working group with all that that entails - most
especially including establishing wg-consensus on the text of the
chartered deliverables.

Stephen.


___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


RE: IETF Last Call: draft-salowey-tls-ticket-06.txt

2006-01-03 Thread Pasi . Eronen
Bernard Aboba wrote:

 From what I can see, the Ticket structure does not uniquely
 identify the ticket type or ticket version, so that there is no
 easy way for the server to determine what type of ticket has been
 submitted to it, or whether the client is using the recommended
 format or not.  The server checks the mac in the last 20 octets,
 and if this is valid, then it decrypts the encrypted_state.
 However, if the client were using the same mac, but a different
 ticket format, the mac could check out, but the StatePlaintext
 would not match.  A Ticket Type/Version field would make it clear
 to the server whether it is handling a Ticket of known type.

The MAC will check out only if the servers are using the same key.  
If the servers regularly generate new keys (as is suggested in the
document, although not with an uppercase keyword), this implies either
that they have different keys (so MAC won't match and the server won't
attempt to interpret the ticket) or there's some server-to-server key
distribution mechanism between cluster members.

Any server-to-server protocols are very much beyond the scope of
this document, so we don't expect any interoperability there.  

But perhaps the document should contain more explicit requirements
about key management (e.g. the keys used to protect the tickets
must not be used for any other purpose, including sharing with other
non-identical nodes)...

  What the specification does not currently have is a detailed
  instructions for those who want to design their own ticket
  format section. Personally I do not think it would be a very
  useful thing to include. It might actually encourage people to
  design their own ticket formats, and there's no way the section
  could cover all the possible ways to get things wrong :-)
 
 The problem is that without normative language, almost any
 implementation can claim compliance, regardless of whether they 
 use the recommended ticket format or heed the security 
 considerations.

It's certainly true that implements all the MUSTs in the document
does not imply the system is secure, but that applies pretty much 
to any document (unless it says the system MUST be secure :-). 

 The server might at some point want to change algorithms for all
 clients, no? Or might it not want to be able to verify that the
 ticket was constructed using algorithms that it supports?  Or even
 that the ticket utilizes the format recommended in this
 specification, as opposed to another format?

Yes, changing the algorithm for all clients is a realistic
possibility. But if you generate new keys when you change the
algorithm (which you really should do anyway), then it's enough 
to verify that the MAC is correct (if it isn't, it isn't really 
important to know why it was not correct).

  The recommended ticket construction does include a timestamp 
  saying when the ticket was issued. 
 
 If a client submits a ticket that is unacceptable to the 
 server for some reason (expired, not the right format, etc.) 
 does it get back an error message letting it know whether 
 to continue to cache the ticket? 
 
 For example, if the server understands the ticket and says it 
 has expired, this is different from not being able to understand 
 the ticket. 

Currently, there are not special error messages to communicate why the
ticket was not accepted, since I don't think the client really needs
to know the reason. If the ticket is not accepted, the server simply
starts full TLS handshake, and once that's done, may either send a new
ticket, or indicate that it doesn't want to use stateless session
resumption this time (by sending a zero-length ticket).

Best regards,
Pasi

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


RE: IETF Last Call: draft-salowey-tls-ticket-06.txt

2006-01-03 Thread Pasi . Eronen
Bernard Aboba wrote:

 If a client obtains a ticket from Server A, running software
 version X, and then sends it to server B, running software
 version Y, how is Server B supposed to figure out that it is the
 wrong version?

This becomes a problem only if the servers are using the same key
to MAC the tickets. (If they're using different keys, the MAC 
won't match anyway, and server B doesn't need to know what version 
server A is using.)

But you're quite right, this could be a problem if one shares
the keys in heterogeneous environment, and the document should
probably warn about this.

Best regards,
Pasi

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: IETF Last Call: draft-salowey-tls-ticket-06.txt

2006-01-03 Thread Jari Arkko

Pasi,

The MAC will check out only if the servers are using the same key.  
If the servers regularly generate new keys (as is suggested in the
 


Yes.


But perhaps the document should contain more explicit requirements
about key management (e.g. the keys used to protect the tickets
must not be used for any other purpose, including sharing with other
non-identical nodes)...
 


This change would be useful, I think. I would also like
to see the MAC/encryption-keys-are-independent requirement
that Bernard was talking about.


Yes, changing the algorithm for all clients is a realistic
possibility. But if you generate new keys when you change the
algorithm (which you really should do anyway), then it's enough 
to verify that the MAC is correct (if it isn't, it isn't really 
important to know why it was not correct).
 


Doesn't the key_version field also provide a hint
as to whether the ticket is something that you
can recognize? Presumably, you could have multiple
versions, if you wanted to support old/new algorithms
and associated keys for a while...

In any case, it seems that it would be useful to add
a requirement that new keys and key_version values
be generated upon algorithm/format changes.

--Jari


___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: WG Review: EAP Method Update (emu)

2006-01-03 Thread Jari Arkko

Clint Chaplin wrote:


Has an email list been set up for this effort yet?
 


We are currently operating under the secmech list:

 General Discussion: [EMAIL PROTECTED]
 To Subscribe:   https://www1.ietf.org/mailman/listinfo/secmech
 Archive:http://www.ietf.org/mail-archive/web/secmech/index.html

But a new list [EMAIL PROTECTED] will be created upon
WG approval. Stay tuned for subscription instructions.

--Jari


___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: participation sans meeting attendance (was RE: Alternative formats for IDs)

2006-01-03 Thread Melinda Shore
On 1/2/06 11:32 PM, Jeffrey Hutzelman [EMAIL PROTECTED] wrote:
 I think we're doing better on this front than we have in many
 years.

The technical support for remote participation really has become
terrific.  Some sessions are run with great sensitivity to remote
participation, others are not - it depends on the chairs.  However,
on the other hand it does seem as if groups have become more
likely to make final decisions during meetings and not on
mailing lists.  Rarely you run into the perfect storm of
no jabber scribe, poor microphone placement, and decisions made
in meetings only, but it does happen.  I haven't travelled to
a meeting in about a year but I have participated remotely, and
although the handling of remote participation has been inconsistent
from working group to working group overall it's been pretty good.

Melinda

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: IETF Last Call: draft-salowey-tls-ticket-06.txt

2006-01-03 Thread Bernard Aboba
 The MAC will check out only if the servers are using the same key.  If the
 servers regularly generate new keys (as is suggested in the

If there is no rnormative requirement that the MAC field actually contain 
a MAC, how can we assume this?  And if there is no algorithm indication, 
how do we know how long the MAC field is? 

 Doesn't the key_version field also provide a hint
 as to whether the ticket is something that you
 can recognize? 

If the key_version field was globally and temporally unique (for example, 
if it included the server name + a counter) then it would provide that 
information.  But it's just a 32-bit integer.  If servers start
at zero, the chance of collision will be qu ite high. 

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: Troubles with UTF-8

2006-01-03 Thread Peter Dambier

Tim Bray wrote:

On Dec 28, 2005, at 12:46 PM, Randy Presuhn wrote:


Reserving NUL as a special terminator is a C library-ism.  I think  that
history has shown that the use of this kind of mechanism, rather than
explicitly tracking the string's length, was a mistake.




I guess variably lenght V-records of type

string {int type,
int length,
int data[] );

would be horror. That will lose you 4 bytes per word and 2 bytes for
every printable sign.

C-ASCII Randy Presuhn = 14 char + '\0'.

Compare it to

 9,  R, a, n, d, y,
 9,  P, r, e, s, h, u, n

That is 28 characters now. No alternative.




I used to think so too, but I don't any more; twenty years of doing  
text processing has convinced me that C's null-terminated strings  
simply cannot be improved on in a low-level programming language.   For 
more on the subject see http://www.tbray.org/ongoing/When/200x/ 
2003/04/13/Strings  -Tim



___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf





--
Peter and Karin Dambier
The Public-Root Consortium
Graeffstrasse 14
D-64646 Heppenheim
+49(6252)671-788 (Telekom)
+49(179)108-3978 (O2 Genion)
+49(6252)750-308 (VoIP: sipgate.de)
mail: [EMAIL PROTECTED]
mail: [EMAIL PROTECTED]
http://iason.site.voila.fr/
https://sourceforge.net/projects/iason/


___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


RE: IETF Last Call: draft-salowey-tls-ticket-06.txt

2006-01-03 Thread Bernard Aboba
 The MAC will check out only if the servers are using the same key.  

That's not necessarily true.  Since the ticket is not self-describing. 
and there is no normative language relating to ticket construction, there 
is no guarantee that implementations will put the MAC field in the same 
place or use the same algorithm.  This could be fixed by including a 
globally and temporally unique ticket identifier, and mandating that the 
MAC field be put at the end. 

 It's certainly true that implements all the MUSTs in the document
 does not imply the system is secure, but that applies pretty much 
 to any document (unless it says the system MUST be secure :-). 

While it's certainly true that normative language doesn't guarantee 
security, most specifications do use normative language, if only to pin 
down some basic features of the specification.  It is quite possible for 
this specification to allow innovation along many dimensions, by 
mandating a few critical items, enough to avoid interoperability problems, 
and leaving the rest open. 


___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


RE: IETF Last Call: draft-salowey-tls-ticket-06.txt

2006-01-03 Thread Pasi . Eronen
Bernard Aboba wrote:

  The MAC will check out only if the servers are using the same key.  
 
 That's not necessarily true.  Since the ticket is not
 self-describing.  and there is no normative language relating to
 ticket construction, there is no guarantee that implementations will
 put the MAC field in the same place or use the same algorithm.  This
 could be fixed by including a globally and temporally unique ticket
 identifier, and mandating that the MAC field be put at the end.

If the servers use different keys, it does not matter where the MAC
field is placed, or whether the same or different algorithm is used.
If it would, the MAC algorithm would be seriously flawed, and totally
unsuitable for this use even if the field locations were fixed...

  It's certainly true that implements all the MUSTs in the document
  does not imply the system is secure, but that applies pretty much 
  to any document (unless it says the system MUST be secure :-). 
 
 While it's certainly true that normative language doesn't guarantee
 security, most specifications do use normative language, if only to
 pin down some basic features of the specification.  It is quite
 possible for this specification to allow innovation along many
 dimensions, by mandating a few critical items, enough to avoid
 interoperability problems, and leaving the rest open.

I don't share your enthusiasm about using the uppercase RFC2119
keywords, but would adding a couple of requirements along the
following lines satisfy your concerns?

The key(s) used to protect the tickets
- MUST be generated securely, taking [RFC4086] into account
- MUST be at least 128 bits in strength
- MUST NOT be used for any other purpose than generating and
  verifying tickets of a particular ticket format in a single
  logical TLS server (which may encompass multiple CPUs or hosts
  in a distributed environment).
- MUST be changed regularly
- MUST be changed if the ticket format changes
- MUST NOT be used with multiple cryptographic algorithms

Since the document is an extension of TLS session resumption (which
happens between a single logical TLS client and server who have been
in contact before), I don't think we need to include interoperability
between servers in the document. All that is required is that a server
can recognize whether the ticket is something it sent out earlier.
The simplest way to do this is to MAC the ticket with a key known only
to the server; addiong globally unique issued-by-server-known-as-X
fields is not necessary for this purpose, and would IMHO just encourage
clients to inspect the tickets and hurt interoperability.

Best regards,
Pasi

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: WG Review: EAP Method Update (emu)

2006-01-03 Thread Jari Arkko

Pekka,

Is there a particular reason why the proposed charter does not mention 
EAP-TTLS?


I know very little about different EAP types, but as a potential 
operator and user of EAP, I'd definitely want to see focus on 
something like EAP-TTLS.


Given that EAP-TTLS seems to be becoming an industry standard in 
certain scenarios, it would be useful to clarify the relation of the 
work of this proposed WG wrt EAP-TTLS in the charter.  The relation 
may already be obvious to those who've been working on that space 
more, but as an EAP user, I'd like to make it explicit to ensure folks 
are on the same page..


First, some background on the difference of EAP TLS vs. EAP-TTLS.
EAP TLS uses TLS mutual authentication (typically with certs).
In contrast, tunneled EAP methods, such as EAP-TTLS or PEAP employ
TLS and an inner method. Typically, the outer TLS authentication
is for the server only, and used to protect an inner authentication
that may happen, for instance, with passwords. Tunneled EAP methods
typically have also additional built-in functionality, for instance, to
exchange various parameters for configuration and verification
purposes.

EAP-TLS is an existing Experimental RFC that the EMU WG is
chartered to update and extend. Tunneled EAP methods have
been described in drafts, and there are a few different ones
and they have a few different versions.

There has been some discussion previously about working
on tunnel methods in EMU. Assuming there'd be willing
contributors  change control would be given to IETF, this
would be a useful area to work, since, as you point out, these
are widely used methods. Drawbacks include a lot of existing
deployment with sometimes incompletely documented
and proprietary methods. I also worry about doing too many
things in EMU at the same time; we are already on the limit.
But once work items get completed, new things can be
worked on. The EAP TLS update should be fairly easy and
non-controversial task, for instance, so hopefully it is
completed soon.

In any case, the charter does include work on password-based
methods. The specific arrangement for how passwords are to
be used is TBD, but tunneled TLS- like methods are one
possibility. While password-based client/cert-based server
authentication is a special case of what existing tunnel
methods can do, it may be the most important case. If
we succeed in defining these methods, one can hope
that the new method would start to take over some
existing TTLS et al usage.

--Jari


___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: WG Review: Domain Keys Identified Mail (dkim)

2006-01-03 Thread Tony Hansen
agreed.

Tony Hansen
[EMAIL PROTECTED]

John Levine wrote:
Here is the revised proposed charter text:
 
 Thanks for pulling this together.
 
 If I had unlimited time to waste, I might niggle about a word or two,
 but it's fine as is, and I look forward to moving ahead and getting
 some work done.

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: Alternative formats for IDs

2006-01-03 Thread Stephane Bortzmeyer
On Tue, Jan 03, 2006 at 06:40:41AM +0200,
 Yaakov Stein [EMAIL PROTECTED] wrote 
 a message of 83 lines which said:

 Which is exactly the reason all the other SDOs use MS Word for input
 and PDF for output.

Blatantly false. For instance, W3C and Oasis do not use MS Word.

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Support for cooperative work (Was: Alternative formats for IDs

2006-01-03 Thread Stephane Bortzmeyer
On Tue, Jan 03, 2006 at 08:27:43AM +0200,
 Yaakov Stein [EMAIL PROTECTED] wrote 
 a message of 31 lines which said:

 Neither of these has any support for cooperative work.

Support is not in the format (what we discuss here) but in the
tools. There are a lot of tools for cooperative work with text /
ASCII, text / UTF-8 or XML files (CVS, xmldiff, diff, Subversion,
darcs, Trac, etc).


___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: Alternative formats for IDs

2006-01-03 Thread Randy.Dunlap
On Tue, 3 Jan 2006, Stephane Bortzmeyer wrote:

 On Tue, Jan 03, 2006 at 06:40:41AM +0200,
  Yaakov Stein [EMAIL PROTECTED] wrote
  a message of 83 lines which said:

  Which is exactly the reason all the other SDOs use MS Word for input
  and PDF for output.

 Blatantly false. For instance, W3C and Oasis do not use MS Word.

It depends on how one defines all other SDOs.  :)

or concensus.
Maybe like .us politicians redefine words to suit their own meanings.

-- 
~Randy  [agreeing with Stephane]

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Working Group chartering

2006-01-03 Thread Dave Crocker

Jeffrey,

(I have changed the subject line, so that this discussion is explicitly NOT 
about any current IETF chartering activities.  I hope folks will not take my 
comments as having any implication about any of those efforts or discussions 
about them...)



I think a lot of people might be missing a key point about how our 
process works.  



What makes things particularly challenging is the difference between Procrustean 
 attention to documented rules, versus applying them in an integrated manner 
with subjective assessment of the pragmatics of being productive.  Any 
organization that strictly resolves disputes based on the letter of its laws 
quickly alienates is workforce.


When we wrote the rules regarding chartering, the intent was to have the 
cognizant AD conduct whatever discussion were needed to create a working group 
that would be productive.  This is inherently a fuzzy process, so it was -- and 
remains -- important to avoid over-documenting the procedure.


For example, an AD who entirely ignores the concerns and desires of those who 
will do the bulk of the work risks having a working group without workers.


The pragmatics, therefore, require the AD to try to juggle various political, 
technical and project management concerns, and put forward a charter that they 
feel will offer the best chance at productive working group output.


Frequently -- maybe usually -- this is primarily through a private dialogue 
among those who will form the small core of the working group effort, including 
likely chairs.  However it is not uncommon for a public dialogue to be 
conducted.  For example, a BOF usually includes a review of candidate charter 
text.  That the open group's consensus is not binding on the AD merely indicates 
the delicate nature of chartering, rather than the irrelevance of that consensus.



This ability to determine what work will be done and under what terms is 
a fundamental part of what it means to steer; without it, the IESG 
would not be much of a steering group.


Actually, this highlights why steering group is exactly the wrong term for the 
IETF process management team.  They do not initiate work and they are not 
primary contributors to that work.  Hence, they do not really steer anything. 
 When the IESG tries to act like it does, they often find no workers and a mass 
of dissatsfaction.


The job of the IESG is to facilitate the initiatives of others and to ensure 
enforcement of useful quality assurance.



It's beneficial to apply 
constraints like only considering solutions with domain-level 
granularity, or only addressing how to _provide_ identity information 
and not what to do with it.  Particularly given the IETF's previous 
experience with attempted anti-spam work, I think such constraints are 
necessary to narrow the problem space to one for which a working group 
will produce something in a finite time.


Besides being necessary, those constraints are also acceptable because 
while they limit _this_ working group to solving one piece of the 
problem, there is no implication that other working groups will not be 
chartered to work on other pieces.  And, while _this_ working group is 
constrained to a particular approach, there is no implication that other 
approaches might not also be tried.  


all of the above is nicely said, as comments about a class of working group 
startup efforts.



What I do _not_ think is reasonable is a demand that the working group 
be constrained to produce exactly the protocol proposed, making changes 
only if absolutely necessary.  


And here is where we have the major disconnect.

Working groups start from a wide variety of places.  Some start with an idea. 
Some with a detailed proposal.  Some with a detailed specification and some with 
existing and deployed technology.  When a working group starts, it must make the 
strategic decision about how much prior work to preserve, versus how much new 
work to encourage or require.


There are obvious and significant trade-offs in this choice.  What is essential 
is that the trade-offs get serious consideration and that the choice be 
appropriate to the particular situation.  It absolutely is NOT true that all 
chartered working groups must be allowed to throw away any and all prior work. 
The loss of invested community effort and the loss of momentum would be disastrous.


At the least, an effort that seeks to use existing technology needs to explain 
clearly and convincingly what needs to be preserved.  Equally, any efforts to 
deny the stability of re-using that work must make a compelling and concrete 
case for the changes that are needed.




Note that the XMPP case is somewhat different from this one.


Remembering that this new thread is about a general issue, rather than debating 
a particular working group effort, I'll comment on the particulars of your 
reference:


  In that
case, a working group was formed to adopt an existing technology from 
another process, 

Re: WG Review: Domain Keys Identified Mail (dkim)

2006-01-03 Thread Ned Freed
 Here is the revised proposed charter text:

 Thanks for pulling this together.

 If I had unlimited time to waste, I might niggle about a word or two,
 but it's fine as is, and I look forward to moving ahead and getting
 some work done.

Complete ageement here. This is plenty good enough to move forward.

Ned

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


RE: Alternative formats for IDs

2006-01-03 Thread John C Klensin


--On Tuesday, 03 January, 2006 06:47 +0200 Yaakov Stein
[EMAIL PROTECTED] wrote:

 The downside is that when a group is working on a document
 in Word, anyone not having the SW would not be able to
 directly  contribute - but joint work is not really practical
 using any system without tracking anyway.

That is an interesting observation.  It must be true since you
say it is.   

However, I wonder what it means that I have my name, as author
or editor, on, by rough count, 27 RFCs.  And I've been a major
contributor (of text, not just ideas, for a few more).  Of
those,  all but about three were collaborative, with multiple
people contributing text.   And, of that group, the number that
started in Word, including one of those non-listed-editor
collaborations, was two.

I guess the other 25+ documents must not have been practical to
produce.

At one level, I'm sympathetic to what you are saying and trying
to accomplish.  While there are many characteristics of Word
that I dislike, I like its tracking facilities and ability to
turn tracking displays and marginal comments on and off.  Used
properly, I find them much more satisfactory than anything I've
been able to do with CVS-like and Diff-like systems: the latter
are better at identifying what has been changed (although that
can be effectively simulated in Word by letting it generate
change tracking by comparing two documents) but far worse at
recording and identifying the reasons why the changes were made.
Unfortunately, even if one ignores most of the issues with
proprietary format and costs, it is hopeless for IETF use in
managing working documents and RFCs.  Among the problems:

(1) Its template mechanism is very version-sensitive and
fairly fragile.  If one makes template or option changes
to accommodate IETF needs, one cannot then go back and
forth with the formatting requirements of day job
documents without risking making a royal, and
essentially irreversible, mess.

(2) Its Style model is even more version-sensitive and
even more fragile.  It is also badly documented and
idiosyncratic.  But it, or major template changes, or
both, are necessary if one is going to produce IETF
documents that correspond to RFC Editor norms (and I'm
not just talking about ASCII output).

(3) Its cross-reference model is so smart in terms of
what can be referenced, what header styles it can be
used with, etc., that cross-references in RFC Style and
within RFC objects are not consistently possible.  The
facilities of WordPerfect 4.2 in this area, nearly two
decades ago, were far superior, I believe because of
less of an attitude of we know what you need and, if we
don't supply it, you don't need it.

(4) Others have pointed out the versioning problem in
terms of reading documents, but it is worse than that.
I've seen document formatting and structure destroyed
beyond recognition or recovery by the simple mechanism
of being moved back and forth among authors who are
using different version of Word, even when Word 2000 is
the oldest of them.   I know how to mitigate that
problem but it would require far more drastic changes in
how the IETF does business than merely switching working
document formats.

(5) Other than change-tracking, Word has very little
built-in collaboration machinery.  I have the impression
that there are even fewer such facilities in recent
versions than in earlier ones.  Instead, the strong
collaboration facilities require even more expensive
versions of Office, use of Outlook for email, and other
client and server conventions that would be far more
problematic for the IETF.

(6) While I had high hopes for the XML output from Word
(again, available only with Office Professional and
above, if there is an above), the 2003 version turns
out to be one of the stranger things I have every seen.
The XML output from Office 12 is supposed to be much
better -- I haven't seen it-- but it is, again,
incompatible.

That is by no means my entire list, but it is indicative.  And
others may have other lists or entries.

For all of those reasons and others -- and I am still concerned
about costs and share the concerns of others about proprietary
and changing formats -- actually IETF use of Word seems to be to
be a non-starter.

I do believe that, if you want to do initial document
preparation in Word, you should be able to do that.  As others
have suggested, no one I know of is really interested in
standardizing on or requiring a particular editor.  But, to do
so, you need to be able to produce an editable format that is no
worse than ASCII.  You may have better ideas, but, 

RE: Alternative formats for IDs

2006-01-03 Thread Ned Freed
  Second, your assumption that other SDOs have been able to blissfully make 
  use
  of private formats like MS Word without incident is simply untrue. One 
  obvious
  counterexample I know of is the CCITT/ITU, which has in the past used MS 
  Word
  as a distribution format for many of it's documents. I have quite a few of
  these documents on hand and occasionally need to refer to old versions of 
  them,
  but when I try and read them using modern tools the results are rarely good.
  Many of these documents simply refuse to open, sometimes crashing the tool 
  I'm
  using, while others do open but are misformatted, sometimes to the point of
  being illegible.

 [YJS] I think that something has been lost in the translation here.
 
Indeed it does: You appear to be unfamiliar with the specifics of your own
proposal, which quite clearly calls for MS Word as both an INPUT and OUTPUT
format.

 ITU (I have participated in the ITU-T for many years, and ALWAYS
 sent in my contributions in Word) ONLY accepts contributions in Word
 and ONLY works on documents in Word (using ITU designed templates).
 
I don't know and don't particularly care what process the ITU uses for this. My
comments were directed at the notion of using Word as an output format for
RFCs.

However, I note in passing that at least one other person has stated that the
procedure the ITU uses does not, in their opinion, work well at all. I cannot
say I'm surprised by this.

 The OUTPUT documents are available in Word and PDF, with PDF
 the recommended format (due to Word's bad habit of changing pagination
 when using different page sizes, etc). The PDF output should be readable
 indefinitely.

That appears to be true today. It wasn't true in the past. Many of the ITU
specifications I have are in Word format only.
 
 The Word format is mainly there for people who may need to work on
 updates of the standard (unlike RFCs, ITU Recommendations are updated).

Except when it's the only choice, in which case everyone who wants to
read the thing has to put up with it.

 If such a Word doc is unreadable for anyone needing it, the
 secretariat has tools to convert it.
 
I am extremely skeptical that the ITU Secretariat stands ready and willing
to assist any random schlub who comes along with a handful of old
ITU documents they acquired several decades back and can no longer read.

  Try CVS or SVN and diff - works for everyone.

 Sorry, although I have such toys on my home computer
 I am not allowed to install such unsupported SW
 on my work computer. 

So? As it happens the place where I work has rules severely restricting the use
of various Microsoft products. CVS, SVN and diff, OTOH, are all fully supported
tools in my work environment.

As Russ pointed out, it is no more reasonable to expect you to be swayed by the
vagarities of my workplace than it is for me to give a damn about those of
yours. The intersection of the tools allowed by everyone's workplace is pretty
much guaranteed to be the empty.

In any case, since I've seen not even the slightest hint of any support for
your proposal to adopt proprietary formats for I-Ds and RFCs, it appears that
further discussion is a waste of time. So this will be my final message on this
topic.

Ned

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


RE: Alternative formats for IDs

2006-01-03 Thread Gray, Eric

-- Lets go ahead and ask then -
-- Does anyone else think that IETF should allow documents which
-- format/structure is not publicly known as one of the ways to
-- distribute IETF specifications?

Clarifying that publicly known means well defined and publicly 
available, I would answer no...

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: Alternative formats for IDs

2006-01-03 Thread Larry J. Blunk
 From http://www.itu.int/ITU-T/edh/faqs-docsub.html

When submitting a document which contains figures, it is highly recommended
that the figures be created using a graphic software and inserted into the
document rather than creating the figure using the default Picture Editor in
Word. Drawings made using Picture Editor do not convert properly in different
versions Word for Windows and in some cases, the figures do not appear at all.
In cases where the author has used the Picture Editor, the author must ensure
that all the elements or objects in the figure are grouped (defined as one
figure) to avoid objects being re-aligned when the margins or paper size
are modified.


  Not exactly confidence inspiring.   Good thing they highly recommend not
using the default Picture Editor in Word.

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: The Value of Reputation

2006-01-03 Thread Jim Fenton
John Leslie wrote:

Nathaniel Borenstein [EMAIL PROTECTED] wrote:
  

On Dec 24, 2005, at 4:09 PM, Douglas Otis wrote:



Reputation remains the only solution able to abate the bulk of abuse.
  

... I think most of us pretty much agree about the critical role of
reputation.



   I've noticed a lot of what I call lip service about the critical
role of reputation. To say this differently, many folks seem to think
you can choose a reputation system almost at random, and it's sure
to improve your signal/noise ratio, unless you've chosen the wrong one.
(which, I suppose, is a tautology...)

   But, in my view, we have no basis to choose the right one unless
we have a good understanding of what it measures and a workable idea
of how to end run when it falsely rejects good messages.
  

I completely agree that reputation has a critical role (although
accreditation is important in many situations, as Phill has pointed out,
and should not be ignored).  However, I have come to believe that there
is a great deal of subtlety below the surface of any good reputation system:

- Preventing abusers from gaming the system to get good scores
- Preventing attackers from damaging the reputations of others
- Defending the reputation system against legal actions from those who
feel they have been hurt
- Making it all work within the law, considering privacy laws, restraint
of trade, and so forth, considering that the laws governing this vary by
jurisdiction

For this reason, I don't think the operation of reputation systems
themselves should be defined by IETF; different users will have
different needs.  However, standard protocols for communicating with
reputation systems will be needed, and this is a very important area for
IETF to address.  Transaction rates for lookups will be high, and
careful protocol design is needed.  The use of standard protocols in
this area will allow clients to pick a suitable reputation service, and
to change services without changing their infrastructure.  Both
reporting and query protocols will need to be defined.

Much of this applies to accreditation services as well, although there
are some different requirements (negotiating an accreditor to use
between sender and recipient/verifier, for example).

-Jim

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: Question about the Neustar logo on www.ietf.org

2006-01-03 Thread JFC (Jefsey) Morfin

At 00:15 03/01/2006, John Levine wrote:

 NeuStar is the .us Registy and has entered into an open root
 agreement with the GSMA, supporting the .gprs TLD. That the IETF
 pays to host a link to them may certainly be perceived as a
 political signal.

Oh, no, not this again.  Neustar's .gprs TLD exists only on a special
purpose private network disjoint from the public Internet, used for
GSM signalling and invisible to anyone who doesn't run a GSM phone
switch.


Dear John,
do you agree I ask your head the day I can reach .gprs names from my PC?


It is not the network that GSM phone users see when they use
web or mail services over their phones.  I don't care what names the
GSMA uses on their private network, and I don't see any reason that
anyone else would, either.


ICANN has suggested the IETF to run a testbed on this kind of 
evolution. It even suggested to use classes as per the adequate 
proposition of John Klensin. The IETF prefered not to.



There may be reasons not to like Neustar, but the fact that they
happen to provide network infrastructure to phone companies is not one
of them.


No reason to dislike NeuStar. They introduce competition where there 
is none. IMHO this is a blessing for the native Internet and a 
challenge for the international network and the IGF. What is 
dangerous is to consider all this neutral.


jfc





___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


optional clip screening in H.323 supplementary service

2006-01-03 Thread Daniele Giordano
H.323 recommendation has supplementary services defined in H.450 ITU
recommendations.
One of them is H.450.3 call diversion service.
In many H.323 devices H.450.3 implements clip screening.
This function makes a manipulation of CLI (calling line identification) of
the caller:

 if A (generic user) calls B (my network client) and B has a H.450.3 call
forward unconditionally to C (mobile phone of B), C receive a call with the
CLI of A

A -- B - C
|_CLI_|


 Usually this scenario is correct but in a case where billing is based on
CLI this is a problem because the call is generated from A (which isn't a
client of my network) and so i haven't the billing of the call.

Without clip screening:

A -- B - C
|___CLI| |___CLI___|

 C receive a call generated from B (my client) and so the billing is ok.

Is there a protocol/reccomendation which implements this function?
What is your opinion?
Thanks.


___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: The Value of Reputation

2006-01-03 Thread John Leslie
Jim Fenton [EMAIL PROTECTED] wrote:
 John Leslie wrote:
 
 But, in my view, we have no basis to choose the right one unless
 we have a good understanding of what it measures and a workable idea
 of how to end run when it falsely rejects good messages.
 
 I completely agree that reputation has a critical role (although
 accreditation is important in many situations, as Phill has pointed out,
 and should not be ignored).  However, I have come to believe that there
 is a great deal of subtlety below the surface of any good reputation system:
 
 - Preventing abusers from gaming the system to get good scores

   This, IMHO, can never be standardized. We can ask for a web page
(subject to change without notice) detailing what is measured, but I
doubt we could even standardize the questions such a web page should
answer.

 - Preventing attackers from damaging the reputations of others

   This is an area which could benefit from standardization, IMHO.
I'm not sure, though, whether consensus is attainable. I think CSV
did a reasonable job here. While I think SPF fails at this, I doubt
we'd ever get the SPF folks to agree.

 - Defending the reputation system against legal actions from those who
   feel they have been hurt

   I think we should steer clear of this issue.

 - Making it all work within the law, considering privacy laws, restraint
   of trade, and so forth, considering that the laws governing this vary
   by jurisdiction

   I see no point in trying to standardize for conflicting jurisdictions.

 For this reason, I don't think the operation of reputation systems
 themselves should be defined by IETF; different users will have
 different needs. 

   I entirely agree.

 However, standard protocols for communicating with reputation systems
 will be needed, and this is a very important area for IETF to address. 

   I would very much like to do so.

 Transaction rates for lookups will be high, and careful protocol design
 is needed.  The use of standard protocols in this area will allow
 clients to pick a suitable reputation service, and to change services
 without changing their infrastructure. 

   Ease of changing reputation services trumps most other considerations,
in the real world.

 Both reporting and query protocols will need to be defined.

   Reporting, IMHO, needs a standardized minimal-set, not a full set.

   Query protocols should see _a_ standard query, which need not
necessarily return all available information.

 Much of this applies to accreditation services as well, although there
 are some different requirements (negotiating an accreditor to use
 between sender and recipient/verifier, for example).

   In CSV, we standardized a way for sender to advertise accreditor(s).
I'm not sure if anything beyond that will be practical.

   The question of standards for reputation and accreditation, IMHO,
deserves IETF work and could deliver great value. But to be clear, I
do not think it belongs in DKIM.

--
John Leslie [EMAIL PROTECTED]

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: The Value of Reputation

2006-01-03 Thread Jim Fenton
John Leslie wrote:

   The question of standards for reputation and accreditation, IMHO,
deserves IETF work and could deliver great value. But to be clear, I
do not think it belongs in DKIM.

  

I strongly agree.  By CCing the ietf-dkim list on my message I didn't
mean to imply that the work belongs there.

-Jim

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: Troubles with UTF-8

2006-01-03 Thread Bob Braden


The morality of string delimiters vs. character counts
 is a debate that has been going on for some 40 years!
Some things never change... ;-)

Bob Braden



...

I think the use of explicitly encoded length, rather than special terminator
or deliminator sequences, is simpler to code and debug, as well as
being more robust in avoiding buffer overflow problems, etc.


...


Reserving NUL as a special terminator is a C library-ism.  I think that
history has shown that the use of this kind of mechanism, rather than
explicitly tracking the string's length, was a mistake.

Randy







___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: Troubles with UTF-8

2006-01-03 Thread James Seng
On 12/23/05, Tom.Petch [EMAIL PROTECTED] wrote:
A) Character set.UTF-8 implicitly specifies the use of Unicode/IS10646 whichcontains 97,000 - and rising - characters.Some (proposed) standards limitthemselves to ..007F, which is not at all international, others to
-00FF, essentially Latin-1, which suits many Western languages but is nottruly international.Is 97,000 really appropriate or should there be a definedsubset?Why should there be a subset? You really really dont want to go into a debate of which script is more important then the other.
B) Code point. Many standards are defined in ABNF [RFC4234] which allows code
points to be specified as, eg,%b00010011 %d13 or %x0D none of which areterribly Unicode-like (U+000D).The result is standards that use one notationin the ABNF and a different one in the body of the document; should ABNF allow
something closer to Unicode (as XML has done with #000D;)?Following RFC4234, Unicode code point U+ABCD will just be represented as %xABCD. I do not see the problem you mention or am I missing something?
C) Length. Text is often variable in length so the length must be determined.
This may be implicit from the underlying protocol or explicit as in a TLV.Thelatter is troublesome if the protocol passes through an application gatewaywhich wants to normalise the encoding so as to improve security and wants to
convert UTF to its shortest form with corresponding length changes (Unicodelacks a no-op, a meaningless octet, one that could be added or removed withoutcausing any change to the meaning of the text).
While the simple byte counting obviously wont give you the accurate length of the text (since one character in Unicode maybe represented by one or more bytes), it is fairly trival to write a script to count the length of the text accurately. Heck, perl 
5.6 onwards even support Unicode natively.Other protocols use a terminating sequence.NUL is widely used in *ix; some
protocols specify that NUL must terminate the text, some specify that it mustnot, one at least specifies that embedded NUL means that text after a NUL mustnot be displayed (interesting for security).Since UTF-8 encompasses so much,
there is no natural terminating sequence.NUL is defined in Unicode btw but I am disgressing; You already started with a wrong foot if you think UTF-8 as some sort of programming encoding scheme rather then what it is; an encoding scheme for a character reportairs.
D) Transparency.An issue linked to C), protocols may have reserved characters,
used to parse the data, which must not then appear in text.Some protocolsprohibit these characters (or at least the single octet encoding of them),others have a transfer syntax, such as base64, quoted-printable, %xx or an
escape character (  \ %).We could do with a standard syntax.In those cases, Unicode U+ABCD or ANBF %xABCD do nicely. Why do we need another one?
E) Accessibility.The character encoding is specified in UTF-8 [RFC3629] whichis readily accessible (of course:-) but to use it properly needs reference toIS10646, which is not.I would like to check the correct name of eg
hyphen-minus (Hyphen-minus, Hyphen-Minus, ???) and in the absence of IS10646 amunable to do so.In absence of a dictionary, I couldn't understand most of the words you used in an RFC. OMG, what should I do?
http://www.unicode.org/charts/-James Seng
___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


RE: Alternative formats for IDs

2006-01-03 Thread Yaakov Stein
 

 Clarifying that publicly known means well defined and publicly
available, I would answer no...

and if it is restricted to mean 
  open description so that you could write your own editor to read and
write this format ?



___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: Troubles with UTF-8

2006-01-03 Thread Masataka Ohta
Tim Bray wrote:

 That problem is that Unicode is stateful with complex and
 indefinitely long term states

 Has this ever caused a real problem to a real programmer in real life?

Yes, of course. State information preserved between lines is
really annoying.

But, you miss the point in my original mail:

: Unicode is not even finite state, which means some pattern
: matching and normalization problems are hard or insolvable.

that is, with Unicode, you can not search strings in reasonable
amount of time.

 I have written a whole bunch of mission-critical code that reads and  
 generates UTF-8, and any correct implementation will have to deal  with 
 the fact that there is no necessary connection between the  number of 
 glyphs on the screen and bytes in its encoding.

You completely miss the point. It has nothing to do with the long
term state.

 It would  be perfectly 
 reasonable for an implementation to declare a  limitation, for example 
 that it will not process than 32 trailing  modifiers on any character, 
 and this would not cause problems in  production because sequences of 
 such a length do not occur in the  encoding of any known text.

I said long term state, which, of course, is not confined in a
character with or without modifiers.

 Which is to say, Ohta's statement about statefulness is true, but the  
 conclusion that this is a problem is erroneous. -Tim

Instead, your statement: I have written a whole bunch of mission-
critical code that reads and generates UTF-8 is untrustworthy.

Of course, it is perfectly reasonable for an implementation to
declare a limitation, for example, that it will not process
non-ASCII characters, which may also be the assumption of your
code.

Masataka Ohta 



___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Nominees for IAOC seat to be appointed by the IESG

2006-01-03 Thread IETF Chair
As described in BCP 101 (RFC 4071) and BCP 113 (RFC 4333),
the IESG and the IAB each select one person for a two-year IAOC
term in alternate years. This year, the IESG will select one person
for a term ending in spring 2008.

Following the call for nominations which ran from November 30
through December 23, 2005, the IESG received two nominations of
people who are willing to serve. They are:

  Kurtis Lindqvist
  Jordi Palet Martinez

The IESG expects to make a decision on or before February 3 (prior
to the expected date at which the Nomcom will select its IAOC nominee).
If any member of the community wishes to make confidential comments
on one or both of these candidates, please write to [EMAIL PROTECTED]
before the end of January.

   Brian Carpenter

___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf-announce