Re: Last Call: draft-ietf-dnsext-axfr-clarify (DNS Zone Transfer Protocol (AXFR)) to Proposed Standard

2010-03-01 Thread Alfred Hönes
 At 11:00 22-02-10, The IESG wrote:
 The IESG has received a request from the DNS Extensions WG (dnsext) to
 consider the following document:

 - 'DNS Zone Transfer Protocol (AXFR) '
draft-ietf-dnsext-axfr-clarify-13.txt as a Proposed Standard

 ...
 
 In Section 2.2.5:
 
The contents of this section MUST follow the guidelines for EDNS0 and
 TSIG, SIG(0), or whatever other future record is possible here.
 
 Does the MUST apply to guidelines specified after the publication 
 of this document?
 
 Regards,
 -sm

Yes.  


Kind regards,
  Alfred.

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


RE: [tcpm] Last Call: draft-ietf-tcpm-tcp-auth-opt (The TCP Authentication Option) to Proposed Standard

2010-03-01 Thread Smith, Donald
I have commented numerous times that with a paragraph that specifically 
provides vendors to make connection-less resets == attack packets this will 
not get much if any use among ISPs or other bgp speakers.

Those statements have pretty much been ignored.

I do not support this draft and believe I have wasted my time trying to explain 
why to someone that is unwilling to compromise with even a a vendor MAY 
maintain state to allow connectionless resets to work.



(coffee != sleep)  (!coffee == sleep)
donald.sm...@qwest.com gcia

 -Original Message-
 From: tcpm-boun...@ietf.org [mailto:tcpm-boun...@ietf.org] On
 Behalf Of The IESG
 Sent: Wednesday, February 24, 2010 10:25 AM
 To: IETF-Announce
 Cc: t...@ietf.org
 Subject: [tcpm] Last Call: draft-ietf-tcpm-tcp-auth-opt (The
 TCP Authentication Option) to Proposed Standard

 The IESG has received a request from the TCP Maintenance and Minor
 Extensions WG (tcpm) to consider the following document:

 - 'The TCP Authentication Option '
draft-ietf-tcpm-tcp-auth-opt-10.txt as a Proposed Standard

 The IESG plans to make a decision in the next few weeks, and solicits
 final comments on this action.  Please send substantive
 comments to the
 ietf@ietf.org mailing lists by 2010-03-10. Exceptionally,
 comments may be sent to i...@ietf.org instead. In either case, please
 retain the beginning of the Subject line to allow automated sorting.

 The file can be obtained via
 http://www.ietf.org/internet-drafts/draft-ietf-tcpm-tcp-auth-o
 pt-10.txt


 IESG discussion can be tracked via
 https://datatracker.ietf.org/public/pidtracker.cgi?command=vie
 w_iddTag=16685rfc_flag=0

 ___
 tcpm mailing list
 t...@ietf.org
 https://www.ietf.org/mailman/listinfo/tcpm


This communication is the property of Qwest and may contain confidential or
privileged information. Unauthorized use of this communication is strictly
prohibited and may be unlawful.  If you have received this communication
in error, please immediately notify the sender by reply e-mail and destroy
all copies of the communication and any attachments.
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


RE: [tcpm] Last Call: draft-ietf-tcpm-tcp-auth-opt (The TCP Authentication Option) to Proposed Standard

2010-03-01 Thread Smith, Donald
Hi Wesley, I stand red faced and corrected.
The last version I saw did not address this (I think that was either 08 or 09) 
and I assumed the .10 didn't either.
I withdraw my objection and apologize for having missed this significant 
rewrite!!


(coffee != sleep)  (!coffee == sleep)
donald.sm...@qwest.com gcia

 -Original Message-
 From: Eddy, Wesley M. (GRC-MS00)[ASRC AEROSPACE CORP]
 [mailto:wesley.m.e...@nasa.gov]
 Sent: Friday, February 26, 2010 4:18 PM
 To: Smith, Donald; 'ietf@ietf.org'
 Cc: 't...@ietf.org'
 Subject: RE: [tcpm] Last Call: draft-ietf-tcpm-tcp-auth-opt
 (The TCP Authentication Option) to Proposed Standard

 Hi Donald, as the document shepherd, I need to set the record
 straight on this, as your statement is simply false.

 In checking that the WGLC comments had been handled in the
 following document update, I looked at both the email thread
 you participated in and the updated document.  In this case,
 the editor very clearly responded to your inputs and made
 significant changes to the document.

 You can find an entirely new section (9.7 Connectionless
 Resets) starting in version 09 of the draft, which
 specifically responds to your comments with resolutions that
 were discussed on the mailing list.  This section discusses
 maintenance of the traffic keys across reboots which answers
 your concern and makes the practice a SHOULD which is
 stronger even than the MAY that you mention below.

 I do not understand why you feel like your inputs were
 ignored, but I hope that you'll agree that this was not the case.


 
 From: tcpm-boun...@ietf.org [tcpm-boun...@ietf.org] On Behalf
 Of Smith, Donald [donald.sm...@qwest.com]
 Sent: Friday, February 26, 2010 2:45 PM
 To: 'ietf@ietf.org'; 'IETF-Announce'
 Cc: 't...@ietf.org'
 Subject: Re: [tcpm] Last Call: draft-ietf-tcpm-tcp-auth-opt
 (TheTCP Authentication Option) to Proposed Standard

 I have commented numerous times that with a paragraph that
 specifically provides vendors to make connection-less resets
 == attack packets this will not get much if any use among
 ISPs or other bgp speakers.

 Those statements have pretty much been ignored.

 I do not support this draft and believe I have wasted my time
 trying to explain why to someone that is unwilling to
 compromise with even a a vendor MAY maintain state to allow
 connectionless resets to work.



 (coffee != sleep)  (!coffee == sleep)
 donald.sm...@qwest.com gcia

  -Original Message-
  From: tcpm-boun...@ietf.org [mailto:tcpm-boun...@ietf.org] On
  Behalf Of The IESG
  Sent: Wednesday, February 24, 2010 10:25 AM
  To: IETF-Announce
  Cc: t...@ietf.org
  Subject: [tcpm] Last Call: draft-ietf-tcpm-tcp-auth-opt (The
  TCP Authentication Option) to Proposed Standard
 
  The IESG has received a request from the TCP Maintenance and Minor
  Extensions WG (tcpm) to consider the following document:
 
  - 'The TCP Authentication Option '
 draft-ietf-tcpm-tcp-auth-opt-10.txt as a Proposed Standard
 
  The IESG plans to make a decision in the next few weeks,
 and solicits
  final comments on this action.  Please send substantive
  comments to the
  ietf@ietf.org mailing lists by 2010-03-10. Exceptionally,
  comments may be sent to i...@ietf.org instead. In either
 case, please
  retain the beginning of the Subject line to allow automated sorting.
 
  The file can be obtained via
  http://www.ietf.org/internet-drafts/draft-ietf-tcpm-tcp-auth-o
  pt-10.txt
 
 
  IESG discussion can be tracked via
  https://datatracker.ietf.org/public/pidtracker.cgi?command=vie
  w_iddTag=16685rfc_flag=0
 
  ___
  tcpm mailing list
  t...@ietf.org
  https://www.ietf.org/mailman/listinfo/tcpm
 

 This communication is the property of Qwest and may contain
 confidential or
 privileged information. Unauthorized use of this
 communication is strictly
 prohibited and may be unlawful.  If you have received this
 communication
 in error, please immediately notify the sender by reply
 e-mail and destroy
 all copies of the communication and any attachments.
 ___
 tcpm mailing list
 t...@ietf.org
 https://www.ietf.org/mailman/listinfo/tcpm

This communication is the property of Qwest and may contain confidential or
privileged information. Unauthorized use of this communication is strictly
prohibited and may be unlawful.  If you have received this communication
in error, please immediately notify the sender by reply e-mail and destroy
all copies of the communication and any attachments.
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Last Call: draft-harkins-emu-eap-pwd (EAP Authentication Using Only A Password) to Informational RFC

2010-03-01 Thread Dorothy Stanley
I am submitting one comment on draft-harkins-emu-eap-pwd :

 

(1) Channel bindings are becoming increasingly necessary for new and
evolving uses of EAP. 

This EAP-PWD protocol should provide for them.

 

Dorothy Stanley

 



Dorothy Stanley

Aruba Networks

dstan...@arubanetworks.com

630-363-1389

 

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: DNSCurve vs. DNSSEC - FIGHT! (was OpenDNS today announced it has adopted DNSCurve to secure DNS)

2010-03-01 Thread Phillip Hallam-Baker
Who are these 'security researchers' of whom you speak? I am a
principal in the security field, if you want to contradict me then you
should either say that something is your personal opinion or you
should specify the other parties you are referring to.

The reason that I want to see what the key registration process is
going to look like is precisely because the validation process
matters. It is the reason that I sent out the invitations to the
original meeting that started the process that created EV
certificates.

Moving to DNSSEC, regardless of the technical model does not eliminate
the need for certificates or CAs. The purpose of EV certificates is to
re-establish the principle of accountability.

You can design a PKI to meet many different needs. Identity is one
purpose, but not a very useful one. Which is the real reason that
identity systems are so hard to deploy. If you want security from a
PKI you will do better with a validation system that provides
accountability.

I use words very carefully. I know that you can use SSH keys protected
by DNSSEC. But at the moment there is not a complete proposal for a
Secure DNS system. Key parts of that system are being left to chance
and that is why the prospects for an alternative system are much
better than you imagine.


On Thu, Feb 25, 2010 at 11:55 AM, Paul Wouters p...@xelerance.com wrote:
 On Thu, 25 Feb 2010, Phillip Hallam-Baker wrote:

 But SSH would be much better if we could integrate the key
 distribution into a secured DNS.

 See previous post. Already done and running.

 And self-signed SSL certs would be
 better if we could use hash values distributed through a secured DNS
 to verify them.

 Yes. The CERT/CERTQ record is still a bit of a problem and needs some
 work.

 If DNSSEC succeeds, the domain validated certificate business will
 have to either transform or eventually die. I think that for most CAs,
 the business opportunities from SSL+DNSSEC are greater than the
 opportunities from the current DV SSL business. DNSSEC cannot deploy
 unless the registrars have cryptography expperience, the CAs have that
 experience.

 If you ask security researchers, it has been proven that CA's sacrificed
 security for profitability. The CA model has failed to work. 2 second
 validation based on email, md5 based * root certificates signed, etc etc.
 The last two years saw a significant amount of attacks against CA's, and
 CA's have seen their profit margin fall to near zero, so even if they
 wanted to, they cannot increase security (you ask me a confirmation for
 my cert, I'll go to this other ssl provider that doesn't).

 CERT's in DNS(SEC) put the responsibility of the cert within the domain of
 the customer. If they care, they can do their security. The time of
 outsourcing security to CA's is over.

 Paul




-- 
-- 
New Website: http://hallambaker.com/
View Quantum of Stupid podcasts, Tuesday and Thursday each week,
http://quantumofstupid.com/
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: DNSCurve vs. DNSSEC - FIGHT! (was OpenDNS today announced it has adopted DNSCurve to secure DNS)

2010-03-01 Thread Phillip Hallam-Baker
Some CAs sacrificed security for profitability. Which was the reason I
started the EV process. If the race to the bottom had continued the
products we sold would have no value at all.

Getting your root into a browser requires you to get a WebTrust audit
against your CPS. The problem is that before EV there were no
requirements for the CPS. So long as your process said 'I do
absolutely nothing at all', you could get your WebTrust audit. Some of
the browser providers impose other requirements, but none addressed
the validation criteria until EV was created.

http://technet.microsoft.com/en-us/library/cc751157.aspx

The only thing that was holding the system together was the fact that
the older browsers could not update their root stores. So new CAs
could only get a start by paying to cross-certify with an existing
root. And all the roots that were inserted pre-Web Trust had been
required to provide a CPS that actually committed them to do something
with at least some meaning. That is why it costs more to get your CA
cross-signed by some roots than others, those that promised least can
command the highest prices.

At this stage there are far fewer older browsers due to natural
attrition and the older roots timing out. And at the end of this year
Microsoft is going to pull the 1024 bit roots from the program. That
is a good thing from the crypto point of view but will eliminate the
last vestiges of control in the DV market unless something is done.


I would like to deploy DNSSEC for the same reasons that you give. The
problem is that at the moment it runs straight into a buzz-saw of
global international politics. That is in the process of being fixed.


On Thu, Feb 25, 2010 at 3:18 PM, Shumon Huque shu...@isc.upenn.edu wrote:
 On Thu, Feb 25, 2010 at 11:55:03AM -0500, Paul Wouters wrote:
 On Thu, 25 Feb 2010, Phillip Hallam-Baker wrote:
 If DNSSEC succeeds, the domain validated certificate business will
 have to either transform or eventually die. I think that for most CAs,
 the business opportunities from SSL+DNSSEC are greater than the
 opportunities from the current DV SSL business. DNSSEC cannot deploy
 unless the registrars have cryptography expperience, the CAs have that
 experience.

 If you ask security researchers, it has been proven that CA's sacrificed
 security for profitability. The CA model has failed to work. 2 second
 validation based on email, md5 based * root certificates signed, etc etc.
 The last two years saw a significant amount of attacks against CA's, and
 CA's have seen their profit margin fall to near zero, so even if they
 wanted to, they cannot increase security (you ask me a confirmation for
 my cert, I'll go to this other ssl provider that doesn't).

 I'll refrain from inserting the obligatory Matt Blaze CA quote
 here :-)

 The time of outsourcing security to CA's is over.

 Paul

 Exactly. What many of us would like to see is the ability for
 enterprises to issue X.509 certificates themselves for their own
 application services. If we're going to have a global PKI,
 the way I think it should work is that CA's higher up in the
 hierarchy should certify CA's below them (enterprises or
 some trusted intermediaries) using 'name constraint's so that
 the subordinate CA's can only issue certificates for subject
 identities in the namespace for which they have authority. And
 ideally the higher level CAs should be multi-lateral non-profits,
 rather than states or for-profit corporations engaged in a
 collective race to the bottom.

 The current situation with commercial CAs is beyond horrible. Just
 take a look at how many root CAs are embedded in your favorite
 browser, and with virtually no constraints on the name space in
 which they can issue certs. Do you really trust all of them? Any
 of them, whether by malice or by being tricked, can issue a certificate
 for any of your services. Our security is basically as good as the
 the CA with the laxest policies  worst security.

 And in terms of functionality, they are woefully inadequate too.
 Most of them can only issue certs for hostnames in subject or
 subject alternative name dnsname fields. What if I want to deploy
 a certificate with other types of extension fields to better
 compartmentalize security or to enable new functionality, eg. URI,
 SRVName, a custom SAN, or application-service specific EKU fields?
 Allowing organizations to issue their own certificates allows them
 to deploy security infrastructure that actually addresses their needs.

 Perhaps it's wishful thinking, but I kinda look forward to the
 day that DNSSEC is widely deployed. I look forward to using SSHFP,
 IPSECKEY, and (a better version of) CERT to displace the broken
 Internet PKI ..

 --Shumon.




-- 
-- 
New Website: http://hallambaker.com/
View Quantum of Stupid podcasts, Tuesday and Thursday each week,
http://quantumofstupid.com/
___
Ietf mailing list
Ietf@ietf.org

Re: DNSCurve vs. DNSSEC - FIGHT! (was OpenDNS today announced it has adopted DNSCurve to secure DNS)

2010-03-01 Thread Phillip Hallam-Baker
Once you have established an SSH relationship the protocol allows you
to determine with a high degree of confidence that you are connecting
to the same end point in future.

That is not a perfect security control but it is a very useful one. It
is a much more useful control than any provided by infrastructure that
is not deployed.

On Fri, Feb 26, 2010 at 3:58 AM, Masataka Ohta
mo...@necom830.hpcl.titech.ac.jp wrote:
 Phillip Hallam-Baker wrote:

 SSH is not a bad security protocol. It provides a very high level of
 protection against high probability risks with little or no impact on
 the user. There is a narrow window of vulnerability to a man in the
 middle attack.

 As a security researcher, I can teach you that the security you
 observe is not of SSH but of return routability.

 Return routability over many third party ISPs is not 'verifiable',
 of course.

                                                        Masataka Ohta






-- 
-- 
New Website: http://hallambaker.com/
View Quantum of Stupid podcasts, Tuesday and Thursday each week,
http://quantumofstupid.com/
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


ietf 1id_guidelines tool broken

2010-03-01 Thread William Allen Simpson

As of Feb 9th, the IESG posted a second status boilerplate.  But the tool
doesn't yet recognize it  Be warned.
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: ietf 1id_guidelines tool broken

2010-03-01 Thread William Allen Simpson

Henrik Levkowetz wrote:

On 2010-02-26 20:42 William Allen Simpson said the following:

As of Feb 9th, the IESG posted a second status boilerplate.  But the tool
doesn't yet recognize it  Be warned.


Specifics, please?

 * Is this the idnits tool or some other tool?
 * Which version did you use?


Whatever the IETF Secretariat is using.



 * Did you use the downloaded script or the web-service, and if so, with which 
URL?
 * Which boilerplate change specifically isn't recognized? I.e., what is your 
input?


http://www.ietf.org/ietf-ftp/1id-guidelines.txt

I-D Guidelines R. Housley (for the IESG)
  Vigil Security
 9 February 2010

   In the modern Internet, the need for stable URLs is more important
   than providing multiple sites around the world to obtain I-Ds.
   Also, search engines have replaced the need for a file containing
   a collection of I-D abstracts.  As a result, the second choice is:

  This Internet-Draft is submitted in full conformance with the
  provisions of BCP 78 and BCP 79.

  Internet-Drafts are working documents of the Internet Engineering
  Task Force (IETF). Note that other groups may also distribute
  working documents as Internet-Drafts. The list of current
  Internet-Drafts is at http://datatracker.ietf.org/drafts/current.

  Internet-Drafts are draft documents valid for a maximum of six
  months and may be updated, replaced, or obsoleted by other
  documents at any time. It is inappropriate to use Internet-
  Drafts as reference material or to cite them other than as
  work in progress.



 * What is the output of the tool, given your input?


  ** The document seems to lack a 1id_guidelines paragraph about
 Internet-Drafts being working documents -- however, there's a paragraph
 with a matching beginning. Boilerplate error?

 1id_guidelines, paragraph 1:
 Internet-Drafts are working documents of the Internet Engineering Task
  Force (IETF), its areas, and its working groups.  Note that other
  groups may also distribute working documents as Internet-Drafts.

 ... text found in draft:
 Internet-Drafts are working documents of the Internet Engineering Task
  Force (IETF). Note that other groups may also distribute working
..^
  documents as Internet-Drafts. The list of current Internet-Drafts
  is at http://datatracker.ietf.org/drafts/current.;


  ** The document seems to lack a 1id_guidelines paragraph about the list of
 current Internet-Drafts.

 1id_guidelines, paragraph 3:
 The list of current Internet-Drafts can be accessed at
  http://www.ietf.org/1id-abstracts.html;

  ** The document seems to lack a 1id_guidelines paragraph about the list of
 Shadow Directories.

 1id_guidelines, paragraph 4:
 The list of Internet-Draft Shadow Directories can be accessed at
  http://www.ietf.org/shadow.html;
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: ietf 1id_guidelines tool broken

2010-03-01 Thread William Allen Simpson

Henrik Levkowetz wrote:

The short response to the information below is that it seems that the
secretariat is still running version 2.12.00 of idnits, while the newer
version 2.12.01 (released 4 Feb 2010) accepts the new boilerplate correctly.
I'm notifying the secretariat so they can update to the newest version.

---

The longer response is that diagnosing this required much more time than
would have been required if all the requested and available information
had been supplied below (instead of flippancy); further comments inline:

On 2010-02-27 00:03 William Allen Simpson said the following:

Henrik Levkowetz wrote:

On 2010-02-26 20:42 William Allen Simpson said the following:

As of Feb 9th, the IESG posted a second status boilerplate.  But the tool
doesn't yet recognize it  Be warned.

Specifics, please?

 * Is this the idnits tool or some other tool?
 * Which version did you use?

Whatever the IETF Secretariat is using.


Not particularly helpful.  The program version is indicated on the first line
of its output.  It would have been good if you'd provided the full output
below, instead of snipping away part of it.


I forwarded you the full output section that was sent to me by the
IETF Drafts Team internet-dra...@ietf.org.  There is no version.

The sentence before was Please let me know if you have any questions.

The line after was Sincerely,

Obviously, that was all boilerplate.  When I called her, Stephanie had no
idea that there was a problem.  Her hands were tied.



 * What is the output of the tool, given your input?



As indicated earlier, what you provide here is only part of the output, and
you've managed to snip away the part which would have made the actual problem
obvious without detective work.


You are incorrect.  Get off your high horse.  You should have notified the
secretariat of the version change weeks ago.

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: ietf 1id_guidelines tool broken

2010-03-01 Thread William Allen Simpson

Henrik Levkowetz wrote:

Your initial 'bugreport' contained no specifics whatsoever.

You inappropriately sent the 'tool is broken' message to the whole IETF
general discussion list, in addition to addressing me directly (so it's
not as if you didn't know where to direct a bug report).


All IETF draft submitters need to know promptly, as Monday is the deadline
for -00 version internet-drafts.

It took some time (2 hours) to figure out that you had written the tool
that generated the bad output, as the secretariat does not put your name
(nor the tool name nor the version number) in their response message.

I'm regretting wasting my time (finding you).

And you probably shouldn't increment the .trivial for such a huge change.
That was really a major change (as was 1id_guidelines itself).

Maybe that's the reason the secretariat didn't think it was important
enough to install.



All of the above earns you no respect with me, and that colours my
responses.  Next time, send a bug report to the secretariat or to me
directly, containing specifics that lets us *fix* the problem, rather
than blazoning an unspecific and unhelpful 'Things don't work' message
across the sky, and you might get a different tone back.


It was reported to the secretariat directly ~13:53 EST by 'phone, but
could not be fixed promptly.

AFAICT, it's still not updated!

  http://tools.ietf.org/tools/idnits/

At this very moment:

Version: 2.12.00
Author:

Note the author is missing here, too.

Also, the verbose output doesn't count line lengths correctly.  Apparently,
it is including the non-printing FF in the count.  Not good.

sarcasm
Also, this was somewhat amusing:

  ** Obsolete normative reference: RFC 1700 (ref. 'RFC 3232') (Obsoleted by
 RFC 3232)

Outstanding!  Fails on the reference to RFC 1700 in the *title* of the
RFC 3232 reference that obsoleted RFC 1700:

1432   [RFC 3232]  Reynolds, J., Assigned Numbers: RFC 1700 is Replaced by
1433   an On-line Database, January 2002.
/sarcasm

At least the secretariat was smart enough to know that ** pseudo-error
was bogus, and didn't include it in their message to me.

As I wrote previously, get off your high horse.  We really don't need the
attitude  Next time, test to see that your own code was installed and
actually works.  It's obvious that you never tested much of anything.
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: ietf 1id_guidelines tool broken

2010-03-01 Thread William Allen Simpson

Henrik Levkowetz wrote:

So you're still maintaining that it's good and right to send out a notice
of a problem widely and provide no information which makes it possible to
resolve it?  Bah!


Please stop before you embarrass yourself further.  The original report
was very clear:

  As of Feb 9th, the IESG posted a second status boilerplate.

Indeed, the new Feb 9th status section itself is clearly written with the
word second.  (I've also sent you the *entire* section as written.)

  But the tool doesn't yet recognize it

*PROVEN*, as of yesterday, and you admit farther down this message that
some (many/most) servers weren't running the needed updated software.

Given the secretariat message doesn't identify the tool or the version,
you had *all* the information that was sent me by the secretariat.



You're not duplicating what I've been saying.  The tool *was* installed
on February 4th.  Somewhere there's been a slip-up, but translating that
into evaluation of importance is nonsense.


No, it wasn't.  At least, not on the server the secretariat was using,
nor on the server that I accessed a day later.  Two strikes.



AFAICT, it's still not updated!

   http://tools.ietf.org/tools/idnits/

At this very moment:

Version: 2.12.00


Ooh, that's not good.  The .01 version is only available on some of the
tools servers, not all.  Fixed.


Author:

Note the author is missing here, too.


Funny.  I see my name quite clearly on the web page there.


Still missing.  Apparently, somebody thought that field should be
displayed with javascript, which no security-minded person runs.



Also, the verbose output doesn't count line lengths correctly.  Apparently,
it is including the non-printing FF in the count.  Not good.


Same problem with idnits 2.12.01



sarcasm
Also, this was somewhat amusing:

   ** Obsolete normative reference: RFC 1700 (ref. 'RFC 3232') (Obsoleted by
  RFC 3232)

Outstanding!  Fails on the reference to RFC 1700 in the *title* of the
RFC 3232 reference that obsoleted RFC 1700:


I'm afraid I can't comment on this, as the error message is based on the content
of the reference entry in your document, which you've not seen fit to provide,
although I requested it in my first note.


1432   [RFC 3232]  Reynolds, J., Assigned Numbers: RFC 1700 is Replaced by
1433   an On-line Database, January 2002.
/sarcasm


And yet, you don't seem to be able to read the entry provided before your
very eyes.  That's it.  Try it in your own testbed.  Or wait for the
internet-draft to be posted, and test it then.



It would be obvious to you if you'd looked at the idnits report of your own
submission that idnits *had* been installed:
  https://datatracker.ietf.org/idst/display_idnit.cgi?submission_id=21622


That is a URL you have apparently made up to access your tool.  Of course
it works as you desire, and accesses the appropriate tool version (today).
Prior to your message, there was never any indication such a URL exists.

The URL provided by the secretariat in an email on Feb 25th was:

I-D Submission Tool URL: 
https://datatracker.ietf.org/idst/status.cgi?submission_id=21622

At this moment in time today, that still doesn't work:

blockquote
Your request was not processed due to the following error(s):
Error - Draft is not in an appropriate status for the requested page
/blockquote

I have no idea what that means
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Gen-ART review for draft-ietf-ipsecme-esp-null-heuristics-05.txt

2010-03-01 Thread Tero Kivinen
Spencer Dawkins writes:
 I don't feel strongly about this, but do suggest s/uses the same policy/uses 
 the same policy, and that changes to that single policy can be coordinated 
 throughout the administrative domain/, to capture what you said in your 
 response, which I found helpful.

Changed that sentence as you suggested and the full sentence is now:

Also, such a solution might require some kind of centralized
policy management to make sure everybody in an administrative
domain uses the same policy, and that changes to that single
policy can be coordinated throughout the administrative
domain.

 I saw that this isn't a 2119 document, but it's hard for people who are 
 familiar with 2119 language to ignore the words when they are in lower case 
 :D
 
 I really liked the explanation you gave in your response here. I suggest 
 picking one of can/will/should, probably can, and including your 
 response in the document.
 
 The resulting text (with some additional edits) might look something like 
 As ESP-NULL heuristics need to know the same protocols as a deep inspection 
 device, an ESP-NULL instance of an unknown protocol can be handled the same 
 way as a cleartext instance of the same unknown protocol.

Changed to the text you suggested.

 OK, that's the part that was missing for me. I would suggest the packet has 
 already transited a NAT box which changed the IP addresses but assumed any 
 ESP payload was encryped and did not recalculate the transport checksums 
 with the new IP addresses. Thus

Made the changes you requested, but used fix instead recalculate
as most of the nats do not recalculate checksum, but do incremental
update on it. The whole text section is now:

  The most obvious field, TCP checksum, might not be usable, as it
  is possible that the packet has already transited a NAT box
  which changed the IP addresses but assumed any ESP payload was
  encrypted and did not fix the transport checksums with the new
  IP addresses. Thus the IP numbers used in the checksum are
  wrong, thus the checksum is wrong.

 This explanation is helpful. I'd suggest adding This hueristic is most 
 helpful when only one packet is outstanding. For example, if a TCP SYN 
 packet is lost, the next packet would always be a retransmission of the SYN 
 packet.

Changed (with minor edits) as you suggested. The full text is now:

  One good method of detection is if a packet is dropped then the
  next packet will most likely be a retransmission of the previous
  packet. Thus if two packets are received with the same source,
  and destination port numbers, and where sequence numbers are
  either same or right after each other, then it's likely a TCP
  packet has been correctly detected. This heuristics is most
  helpful when only one packet is outstanding. For example, if a
  TCP SYN packet is lost (or dropped because of policy), the next
  packet would always be a retransmission of the same TCP SYN
  packet.

 Your explanation was very helpful. I'd suggest
 
 Forcing use of ESP-NULL everywhere inside the enterprise, so that 
 accounting, logging, network monitoring, and intrusion detection all work, 
 increases the risk of sending confidential information where eavesdroppers 
 can see it 

Changed to use your text.

I updated the draft and submitted 06 version which includes these
changes.
-- 
kivi...@iki.fi
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: DNSCurve vs. DNSSEC - FIGHT! (was OpenDNS today announced it has adopted DNSCurve to secure DNS)

2010-03-01 Thread Joe Baptista
I just want to remind everyone that a DNScurve draft is on the table.

http://tools.ietf.org/html/draft-dempsky-dnscurve-01

There is an urgent need to solve the DNS security issues within a reasonable
period of time.

Please remember the Kaminsky dns bug did not identify a security problem
with the DNS but the UDP transport. DNScurve fixes the problem today without
having to spend 15 more years getting it right.

And it does not cost a fortune to implement. DNSSEC is more of a make work
project then it is a solution. And DNSSEC does not solve the UDP issue. And
that is the problem DNScurve fixes NOW.

If there is any common sense left at the IETF. And I think there are sparks
here and there. Then I strongly recommend IETF members get DNScurve
established as RFC. We need leadership - not more DNSSEC blah blah blah.

Together let's exercise some common sense and support
draft-dempsky-dnscurve-01.

regards
joe baptista

On Thu, Feb 25, 2010 at 3:01 PM, Phillip Hallam-Baker hal...@gmail.comwrote:

 Who are these 'security researchers' of whom you speak? I am a
 principal in the security field, if you want to contradict me then you
 should either say that something is your personal opinion or you
 should specify the other parties you are referring to.

 The reason that I want to see what the key registration process is
 going to look like is precisely because the validation process
 matters. It is the reason that I sent out the invitations to the
 original meeting that started the process that created EV
 certificates.

 Moving to DNSSEC, regardless of the technical model does not eliminate
 the need for certificates or CAs. The purpose of EV certificates is to
 re-establish the principle of accountability.

 You can design a PKI to meet many different needs. Identity is one
 purpose, but not a very useful one. Which is the real reason that
 identity systems are so hard to deploy. If you want security from a
 PKI you will do better with a validation system that provides
 accountability.

 I use words very carefully. I know that you can use SSH keys protected
 by DNSSEC. But at the moment there is not a complete proposal for a
 Secure DNS system. Key parts of that system are being left to chance
 and that is why the prospects for an alternative system are much
 better than you imagine.


 On Thu, Feb 25, 2010 at 11:55 AM, Paul Wouters p...@xelerance.com wrote:
  On Thu, 25 Feb 2010, Phillip Hallam-Baker wrote:
 
  But SSH would be much better if we could integrate the key
  distribution into a secured DNS.
 
  See previous post. Already done and running.
 
  And self-signed SSL certs would be
  better if we could use hash values distributed through a secured DNS
  to verify them.
 
  Yes. The CERT/CERTQ record is still a bit of a problem and needs some
  work.
 
  If DNSSEC succeeds, the domain validated certificate business will
  have to either transform or eventually die. I think that for most CAs,
  the business opportunities from SSL+DNSSEC are greater than the
  opportunities from the current DV SSL business. DNSSEC cannot deploy
  unless the registrars have cryptography expperience, the CAs have that
  experience.
 
  If you ask security researchers, it has been proven that CA's sacrificed
  security for profitability. The CA model has failed to work. 2 second
  validation based on email, md5 based * root certificates signed, etc etc.
  The last two years saw a significant amount of attacks against CA's, and
  CA's have seen their profit margin fall to near zero, so even if they
  wanted to, they cannot increase security (you ask me a confirmation for
  my cert, I'll go to this other ssl provider that doesn't).
 
  CERT's in DNS(SEC) put the responsibility of the cert within the domain
 of
  the customer. If they care, they can do their security. The time of
  outsourcing security to CA's is over.
 
  Paul
 



 --
 --
 New Website: http://hallambaker.com/
 View Quantum of Stupid podcasts, Tuesday and Thursday each week,
 http://quantumofstupid.com/
 ___
 Ietf mailing list
 Ietf@ietf.org
 https://www.ietf.org/mailman/listinfo/ietf

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: DNSCurve vs. DNSSEC - FIGHT! (was OpenDNS today announced it has adopted DNSCurve to secure DNS)

2010-03-01 Thread David Conrad
On Mar 1, 2010, at 8:34 AM, Joe Baptista wrote:
 Please remember the Kaminsky dns bug did not identify a security problem with 
 the DNS but the UDP transport.

The problem Dan Kaminsky exploited is a known weakness in the DNS protocol, 
specifically that a 16-bit identifier space is too small. 

 DNScurve fixes the problem today without having to spend 15 more years 
 getting it right.

Not really.  Ignoring for the moment that there is a limited amount of deployed 
software that supports DNScurve, DNScurve addresses the DNS protocol problem by 
protecting the channel of communication. It doesn't actually protect DNS data.

 And it does not cost a fortune to implement.

How much did it cost you to implement DNScurve?  DId you make your code open 
source or otherwise available?

 And DNSSEC does not solve the UDP issue.

Actually, DNSSEC does address the DNS protocol issue by ensuring any 
modification to DNS data can be identified.  In the DNSSEC world, it no longer 
matters how you get the DNS data or what channel the data comes over or how 
secure that channel is.  The same is not true of DNScurve.

 And that is the problem DNScurve fixes NOW.

DNSSEC is already deployed in 12 top-level domains and the root is in the 
process of being signed.  Multiple interoperable implementations of DNSSEC 
exist in production software.

 Together let's exercise some common sense and support 
 draft-dempsky-dnscurve-01.

As has been pointed out on several occasions, DNSSEC and DNScurve are not 
mutually exclusive.  Of course, if you implement DNSSEC, the protections 
provided by DNScurve are superfluous (and the opposite isn't true), but that 
doesn't stop anyone from deploying both.

Regards,
-drc

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: DNSCurve vs. DNSSEC - FIGHT! (was OpenDNS today announced it has adopted DNSCurve to secure DNS)

2010-03-01 Thread Tony Finch
On Mon, 1 Mar 2010, David Conrad wrote:

 DNSSEC is already deployed in 12 top-level domains

Add a half for .uk :-) It has a deliberately invalid DNSKEY this week,
full deployment next week.

Tony.
-- 
f.anthony.n.finch  d...@dotat.at  http://dotat.at/
GERMAN BIGHT HUMBER: SOUTHWEST 5 TO 7. MODERATE OR ROUGH. SQUALLY SHOWERS.
MODERATE OR GOOD.
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: DNSCurve vs. DNSSEC - FIGHT! (was OpenDNS today announced it has adopted DNSCurve to secure DNS)

2010-03-01 Thread Paul Wouters

On Mon, 1 Mar 2010, Tony Finch wrote:


DNSSEC is already deployed in 12 top-level domains


Add a half for .uk :-) It has a deliberately invalid DNSKEY this week,
full deployment next week.


There is more then the 12 in itar. From the top of my head: .br .us .museum and 
.pt,
and of course a large part of the reverse (all RIPE zones) and ENUM.

Paul
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


IETF Workshop on Broadband Home Gateways

2010-03-01 Thread IESG Secretary
During the 76th IETF meeting, the Transport Area sponsored a Broadband
Home Gateway BoF, called HOMEGATE. Since that time, interested IETF
participants have been working to narrow the scope of the draft charter
and to reach out to other Standards Development Organizations (SDOs) to
ensure that the planned work is complimentary and not overlapping with
their respective work.

To further that goal, the IETF's Transport and Internet Areas intend to
co-sponsor a two-day workshop on HOMEGATE between IETF-77 and IETF-78.
This workshop is slated to take place on April 20-21, 2010 in London,
England.

In order to reserve a properly sized meeting facility, it is important
for interested people to indicate their interest in attending AS SOON AS
POSSIBLE. Please do so at http://event.pingg.com/HomeGateLondonMtg

NOTE: Due to potential venue limitations and the desire to allow
participants from different stakeholder groups to be represented, physical
attendance may need to be limited. Attendance will be confirmed at a later
time (and certainly early enough for people to book reasonably priced
travel accommodations). Remote listening or participation facilities of
some sort will be available to all.

PLEASE INDICATE YOUR INTEREST NOW if you wish to attend this interim
meeting in person: http://event.pingg.com/HomeGateLondonMtg

In addition:

- You can find the HOMEGATE wiki at
http://trac.tools.ietf.org/area/tsv/trac/wiki/HOMEGATE

- You should join the HOMEGATE mailing list at
https://www.ietf.org/mailman/listinfo/homegate

Thank you in advance for your interest and participation!

Regards,
Lars Eggert  Magnus Westerlund, Transport Area Directors
Jari Arkko  Ralph Droms, Internet Area Directors
___
IETF-Announce mailing list
ietf-annou...@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce


smime.p7s
Description: S/MIME cryptographic signature
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: DNSCurve vs. DNSSEC - FIGHT! (was OpenDNS today announced it has adopted DNSCurve to secure DNS)

2010-03-01 Thread Masataka Ohta
Phillip Hallam-Baker wrote:

 Moving to DNSSEC, regardless of the technical model does not eliminate
 the need for certificates or CAs. The purpose of EV certificates is to
 re-establish the principle of accountability.

I don't know what EV means, but anything human, including CA, is not
infallible, which is why PKI is insecure.

Is EV divine?

Masataka Ohta

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: DNSCurve vs. DNSSEC - FIGHT! (was OpenDNS today announced it has adopted DNSCurve to secure DNS)

2010-03-01 Thread Wassim Haddad
On Mon, Mar 1, 2010 at 2:13 PM, Masataka Ohta 
mo...@necom830.hpcl.titech.ac.jp wrote:

Phillip Hallam-Baker wrote:

  Moving to DNSSEC, regardless of the technical model does not eliminate
  the need for certificates or CAs. The purpose of EV certificates is to
  re-establish the principle of accountability.

 I don't know what EV means, but anything human, including CA, is not
 infallible, which is why PKI is insecure.


= Can you please explain in few lines what would be your preference(s) for
a solution to enable
DNSsec?
I apologize if you have already submitted a proposal about it which I must
have missed... in which case,
I would appreciate a pointer.


Regards,

Wassim H.
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


PKIgate

2010-03-01 Thread Masataka Ohta
Phillip Hallam-Baker wrote:

 You can design a PKI to meet many different needs.

No, PKI can be designed for imaginary needs only with no real security.

 Identity is one purpose, but not a very useful one.

It is an example of imaginary security.

 If you want security from a
 PKI you will do better with a validation system that provides
 accountability.

Real accountability needs a real account with real *M*O*N*E*Y*
in it.

If you loss $1M by a wrong operation of a CA, the CA should be
able to compensated the amount of the loss, which is the
accountability.

*M*O*N*E*Y* is the reality.

Then, what if, a wrong operation of a CA causes $1000 loss for 1M
people?

Bankruptcy of the CA does not help the people.

A CA charging $2000 for 1M certificates may have $10 in
its account and may be able to compensate $1000 loss of 1M people.
But, what the point of people paying $2000, only to receive $1000
compensation? It's better for the people not to pay anything to
the CA. What if, if the loss is $1M loss for 1M people?

The only thing serious CAs can do is to make the possibility of
wrong operation absolute ZERO, which is not human and costs
infinite amount of money, which makes the CAs not profitable.

On the other hand, less serious CAs do little, if not nothing, and
just sell imaginary security at low cost to people who really need
real security.

That's how PKI is designed and CAs work.

PKI is a system of fraud.

Masataka Ohta

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Patent disclosure in draft-shin-augmented-pake-00.txt

2010-03-01 Thread Simon Josefsson
Hi.  This document [1] contains the following section:

6.  Intellectual Property

   The National Institute of Advanced Industrial Science and Technology
   (AIST) has submitted a patent application about the AugPAKE protocol,
   described in this document.  For details of the patent application
   and its status, please contact the authors of this document.

That by itself does not fulfill the IETF procedures regarding patent
disclosure.  Please read section 6.1 of RFC 3979:

http://tools.ietf.org/html/rfc3979#section-6.1

Searching for a patent disclosure on this document suggests that none
has been filed (yet):

https://datatracker.ietf.org/ipr/search/?option=document_searchdocument_search=draft-shin-augmented-pake

Therefor you need to file the proper patent disclosure for your
submission to comply with the IETF rules.

To make your technology benefit Internet applications everywhere, please
consider licensing your patent in a liberal way.  One example what I
believe is a friendly patent license would be this one:

https://datatracker.ietf.org/ipr/941/

Writing a patent license in friendly way is complicated, if you are
interested I can work with you and the Free Software Foundation or the
Software Freedom Law Center to help you write a good license.

Thanks,
/Simon

[1] http://www.ietf.org/internet-drafts/draft-shin-augmented-pake-00.txt
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: DNSCurve vs. DNSSEC - FIGHT! (was OpenDNS today announced it has adopted DNSCurve to secure DNS)

2010-03-01 Thread Masataka Ohta
Wassim Haddad wrote:

I don't know what EV means, but anything human, including CA, is not
infallible, which is why PKI is insecure.

 = Can you please explain in few lines what would be your preference(s) for
 a solution to enable DNSsec?
 I apologize if you have already submitted a proposal about it which I must
 have missed... in which case, I would appreciate a pointer.

If you are talking about a technical mechanism not to cause message
size overflow beyond 512B even with 2048bit keys, the solution is
to use different RR types for different kind of keys, which I
proposed more than 15 yeas ago in draft-ohta-simple-dns-00:

   In general, data size for authentication is often as large as of 100
   bytes or more.  So, it is a bad idea to share a single RR type value
   between different authentication mechanisms, because querying them
   all will often break 512 byte limit of UDP query.  So, authentication
   algorithms are distinguished by RR type values, not by something like
   an algorithm type field.

It's crazy to share an RR type between ZSK and KSK.

For key roll over, different RR types should be used for even and
odd generations. You may also use elliptic curve cryptography,
though I don't prefer it.

But, later, I noticed fundamental fraud in PKI, against which no
technical solution exists. Note that separation of ZSK and KSK
was an impossible attempt make inherently insecure PKI less
insecure.

Masataka Ohta


___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Gen-ART LC/Telechat review of draft-ietf-ipfix-export-per-sctp-stream-06

2010-03-01 Thread Ben Campbell
I have been selected as the General Area Review Team (Gen-ART)
reviewer for this draft (for background on Gen-ART, please see
http://www.alvestrand.no/ietf/gen/art/gen-art-FAQ.html).

Please wait for direction from your document shepherd
or AD before posting a new version of the draft.

Document: draft-ietf-ipfix-export-per-sctp-stream-06
Reviewer: Ben Campbell
Review Date: 1 March 2010
IESG Telechat date: 4 March 2010

Summary: This document is almost ready for publication as a proposed standard, 
but there is an open issue that should be considered first.


Major issues:

-- section 4.5, general:

I am confused as to  how the collector determines the exporter supports this 
extension. If I understand correctly (and it's probable that I do not, since 
this is my first real exposure to IPFix), the collector basically has to infer 
exporter support from the behavior of the exporter. But then the second 
paragraph after the numbered list (i.e. 2 paragraphs after item 4) says:

 In the case where the Exporting Process does not support the 
per-SCTP-stream extension, then the first Data Record received 
by the Collecting Process will disable the extension for the 
specific Exporter on the Collecting side.

This seems to conflict. Why would the collector need to worry about items 1-4 
if it can categorically determine exporter support from the first data record?

In general, though, I think that having the collector infer support is not the 
right way to do this. It would be far better to explicitly signal support, if 
that is at all possible in IPFix. Otherwise, it seems like the collector has to 
watch every record for violations of 1-4, and make fairly complex decisions on 
a per-record basis.

Minor issues:

-- section 4.2, 3rd paragraph from end, starting with When an Options 
Template...

I'm confused by this paragraph. Would exporters using this extension ever send 
the options template and associated data records in different streams?

Nits/editorial comments:

-- section 4.1, description of dataRecordsReliability:

I find the first sentence hard to parse.

-- section 4.2, first paragraph ...exporting processes should follow...

(Note that an identical comment applies to the first paragraph of several of 
the specification sections.)

It would be best to avoid the word should in this context. Even though we all 
know a lower case should is not normative, it's still enough to confuse a 
reader into interpreting as a normative SHOULD, which is actually weaker than 
the real requirement. That is, I don't think you mean to say that, in order to 
take advantage of this extension and implementation SHOULD follow this 
specification. 

-- section 4.3, paragraph 3:

pedantic nit - I think you mean all IPFIX messages in a single stream MUST be 
sent in order--not that all messages have to be in a single stream, right? The 
current wording is (slightly) ambiguous on that point.

-- section 4.3, last paragraph:

Why mention the alternative if it is not feasible in production?

--Examples, figure 3:

Is Data 257 a typo?

-- idnits has some warnings. Please check before publication.
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Last Call: draft-ietf-nsis-rmd (RMD-QOSM - The Resource Management in Diffserv QOS Model) to Experimental RFC

2010-03-01 Thread The IESG
The IESG has received a request from the Next Steps in Signaling WG 
(nsis) to consider the following document:

- 'RMD-QOSM - The Resource Management in Diffserv QOS Model '
   draft-ietf-nsis-rmd-16.txt as an Experimental RFC

The IESG plans to make a decision in the next few weeks, and solicits
final comments on this action.  Please send substantive comments to the
i...@ietf.org mailing lists by 2010-03-22. Exceptionally, 
comments may be sent to i...@ietf.org instead. In either case, please 
retain the beginning of the Subject line to allow automated sorting.

The file can be obtained via
http://www.ietf.org/internet-drafts/draft-ietf-nsis-rmd-16.txt


IESG discussion can be tracked via
https://datatracker.ietf.org/public/pidtracker.cgi?command=view_iddTag=12558rfc_flag=0

___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce


Last Call: draft-ietf-ippm-twamp-session-cntrl (Individual Session Control Feature for TWAMP) to Proposed Standard

2010-03-01 Thread The IESG
The IESG has received a request from the IP Performance Metrics WG (ippm) 
to consider the following document:

- 'Individual Session Control Feature for TWAMP '
   draft-ietf-ippm-twamp-session-cntrl-04.txt as a Proposed Standard

The IESG plans to make a decision in the next few weeks, and solicits
final comments on this action.  Please send substantive comments to the
i...@ietf.org mailing lists by 2010-03-15. Exceptionally, 
comments may be sent to i...@ietf.org instead. In either case, please 
retain the beginning of the Subject line to allow automated sorting.

The file can be obtained via
http://www.ietf.org/internet-drafts/draft-ietf-ippm-twamp-session-cntrl-04.txt


IESG discussion can be tracked via
https://datatracker.ietf.org/public/pidtracker.cgi?command=view_iddTag=17883rfc_flag=0

___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce


Last Call: draft-ietf-ipfix-mediators-problem-statement (IPFIX Mediation: Problem Statement) to Informational RFC

2010-03-01 Thread The IESG
The IESG has received a request from the IP Flow Information Export WG 
(ipfix) to consider the following document:

- 'IPFIX Mediation: Problem Statement '
   draft-ietf-ipfix-mediators-problem-statement-08.txt as an Informational RFC

The IESG plans to make a decision in the next few weeks, and solicits
final comments on this action.  Please send substantive comments to the
i...@ietf.org mailing lists by 2010-03-15. Exceptionally, 
comments may be sent to i...@ietf.org instead. In either case, please 
retain the beginning of the Subject line to allow automated sorting.

The file can be obtained via
http://www.ietf.org/internet-drafts/draft-ietf-ipfix-mediators-problem-statement-08.txt


IESG discussion can be tracked via
https://datatracker.ietf.org/public/pidtracker.cgi?command=view_iddTag=17243rfc_flag=0

___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce


Internet Draft Initial Version (-00) Cut-Off Today

2010-03-01 Thread IETF Secretariat


This is a reminder that the Internet Draft Initial Version (-00) cut-off
is today, Monday, March 1, 2010. 

All Initial Version (-00) submissions are due by 17:00 PST (01:00
Tuesday, March 2 UTC).

All drafts can be uploaded using the ID submission tool located here:
https://datatracker.ietf.org/idst/upload.cgi

Thank you!
___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce


Re: [rfc-i] Glenn Kowack appointed as Transitional RFC Series Editor

2010-03-01 Thread Olaf Kolkman

On Feb 26, 2010, at 3:25 PM, IAB Chair wrote:
 
 The IAB also acknowledges the support of the volunteers that served on
 the the Ad-hoc Advisory Committee (ACEF) and assisted the IAB in their
 selection. They are: Joel Halpern (who took the responsibility for
 coordinating), Bob Hinden, Joe Touch, and Jim Schaad, Craig Partridge
 (who left the committee in October 2009) and Scott Bradner (who
 recused in December 2009). They worked with IAB members John Klensin,
 Russ Housley, and me.


I am a bit embarrassed to confess that I made a mistake in the above 
acknowledgments: 
Joe Touch was never on the committee, Bruce Davies was.


--Olaf
___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce


Re: [rfc-i] Glenn Kowack appointed as Transitional RFC Series Editor

2010-03-01 Thread Glenn Kowack
As the newly appointed Transitional RSE, Olaf asked me to introduce myself to 
the community.

I first got onto the ARPANET in the mid-1970s while studying computer science 
at the University of Illinois.  Since then, I've done networking and operating 
systems (mostly UNIX) RD first as a programmer and later as director of a UNIX 
RD center.  I even managed an ARPANET IMP.  For the past 20 years I've been 
leading networking start-ups in Europe and the US: I was founding CEO of EUnet, 
Europe's first commercial internet service provider, and founding CEO of 
NextHop Technologies, which developed routing software. I've also been on the 
boards of international internet organizations such as Ebone and the Commercial 
Internet Exchange (CIX), and was a VP for Strategy and Planning at ISOC in the 
late 1990s.

I've done a lot of of organizational development in corporations, including 
creating and leading teams of technical writers, and have done my share of 
technical writing.  I've published ACM and IEEE articles on Internet and 
technology history and policy. I worked closely with Jon Postel as IANA's 
delegate to the Policy Oversight Committee, which provided leadership in the 
gTLD debates that led to ICANN's formation.

My association with the 'IETF' began in the late 1970s when I was on Jon 
Postel's mailing lists.  I attended my first IETF in the early 1990s and have 
been a frequent participant since then.  I've led or worked with engineering 
teams that contributed to protocol standards, largely radius and routing.  
However, I've never personally written an RFC.

My experience qualifies me as a long-standing participant in the IETF, and 
gives me an understanding of and appreciation for its history, processes, and 
culture.  However, I have not been intimately involved in administration of the 
RFC editorial process.  This combination affords me a broad perspective, but no 
specific opinions or biases regarding the current situation.  That means I'm 
starting from a blank page, which I will fill by working closely with the 
entire community.  The IAB has made it very clear that I'm to work with 
complete independence of process and analytical method, which I will do.

I am calling for interested community members to contact me to share your 
thinking about the RSE function.  Your input is essential to fulfilling my 
mission.  For at least several weeks, you'll hear me say I don't know - I 
haven't enough information to form an opinion about that yet.  What do you 
think? 

I hope you will find me a most open-minded and interested listener.  I look 
forward to working with all of you on this critically important project.

best regards,
Glenn
Transitional RFC Series Editor
___

On Feb 26, 2010, at 9:25 AM, IAB Chair wrote:

 Dear Colleagues,
 
 I am happy to announce that Glenn Kowack will be the Transitional RFC
 Series Editor(RSE).
 
 Glenn will take up his responsibilities as of March 1.  His main
 responsibility [2] is that of formulating the RSE as defined in
 RFC5620 in practice while critically reviewing all aspects of the
 model and its implementation. Specifically, Glenn will be working with
 the IAB, the RFC Series Advisory Group (RSAG, see RFC5620) as
 appropriate, the IAOC, and the community to refine the definition of
 the role and relationships of the RSE. This involves providing:
 
 (i) recommendations for changes to the RFC Series model structure, 
 
 (ii) recommendations for changes to the role and responsibilities of
the RFC Series Editor, and
 
 (iii) recommendations to effect the acquisition of an RFC Series
Editor.
 
 In the cause of the next weeks Glenn will be taking over
 responsibilities from Bob Braden who is acting RSE currently and will
 remain available as a resource of knowledge and experience. The actual
 title will pass between March 1 and April 19.
 
 During the next few months Glenn will talk to many of us. I hope that
 Glenn can count on your collaboration and frankness. Glenn will
 introduce himself shortly.
 
 With the appointment of Glenn Kowack as TRSE and the appointment of
 Nevil Brownlee as Inependent Submissions Editor the four pieces of the
 RFC Editor model are now in place.
 
 The IAB would like to thank the candidates that stepped forward
 between June and December last year.
 
 The IAB also acknowledges the support of the volunteers that served on
 the the Ad-hoc Advisory Committee (ACEF) and assisted the IAB in their
 selection. They are: Joel Halpern (who took the responsibility for
 coordinating), Bob Hinden, Joe Touch, and Jim Schaad, Craig Partridge
 (who left the committee in October 2009) and Scott Bradner (who
 recused in December 2009). They worked with IAB members John Klensin,
 Russ Housley, and me.
 
 The ACEF has served its purpose for this appointment cycle and has
 been dismantled.
 
 For the IAB,
 
 Olaf Kolkman
 IAB Chair.
 ___
 IETF-Announce mailing list
 IETF-Announce@ietf.org
 

IETF Workshop on Broadband Home Gateways

2010-03-01 Thread IESG Secretary
During the 76th IETF meeting, the Transport Area sponsored a Broadband
Home Gateway BoF, called HOMEGATE. Since that time, interested IETF
participants have been working to narrow the scope of the draft charter
and to reach out to other Standards Development Organizations (SDOs) to
ensure that the planned work is complimentary and not overlapping with
their respective work.

To further that goal, the IETF's Transport and Internet Areas intend to
co-sponsor a two-day workshop on HOMEGATE between IETF-77 and IETF-78.
This workshop is slated to take place on April 20-21, 2010 in London,
England.

In order to reserve a properly sized meeting facility, it is important
for interested people to indicate their interest in attending AS SOON AS
POSSIBLE. Please do so at http://event.pingg.com/HomeGateLondonMtg

NOTE: Due to potential venue limitations and the desire to allow
participants from different stakeholder groups to be represented, physical
attendance may need to be limited. Attendance will be confirmed at a later
time (and certainly early enough for people to book reasonably priced
travel accommodations). Remote listening or participation facilities of
some sort will be available to all.

PLEASE INDICATE YOUR INTEREST NOW if you wish to attend this interim
meeting in person: http://event.pingg.com/HomeGateLondonMtg

In addition:

- You can find the HOMEGATE wiki at
http://trac.tools.ietf.org/area/tsv/trac/wiki/HOMEGATE

- You should join the HOMEGATE mailing list at
https://www.ietf.org/mailman/listinfo/homegate

Thank you in advance for your interest and participation!

Regards,
Lars Eggert  Magnus Westerlund, Transport Area Directors
Jari Arkko  Ralph Droms, Internet Area Directors
___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce