Re: [paws] WG Review: Protocol to Access White Space database (paws)

2011-04-20 Thread Alexey Melnikov

Peter Saint-Andre wrote:


On 4/19/11 1:47 PM, Paul Lambert wrote:
 


How does the area that the group is assigned impact the choices of
technology?

I'm an advocate for an efficient solution set for PAWS ... it will be
much like DNS for spectrum in the future and should be viewed as a
core infrastructural component that needs careful design.  There are
good reasons that routing protocols don't use XML.

Applications now days tend to go for the simple, quick to make a web
application solutions using XML or the like ...  My concern is that
Applications imply that efficiency does not matter.
   

Absolutely not. There are several counter examples in Apps, both past 
and present. (E.g. Lemonade WG was about optimized use of bandwidth for 
IMAP.)



A quick look at the specifications for the CORE WG in the Applications
Area will show you that we're able to produce protocols that are quite
slim on the wire.


Exactly.

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: [paws] WG Review: Protocol to Access White Space database (paws)

2011-04-20 Thread Andrew Sullivan
On Tue, Apr 19, 2011 at 10:13:13PM -0400, Joel M. Halpern wrote:

 There is an argument, which you allude to, which would place this WG
 in the Internet Area as part of infrastructure.  While that does
 not resonate with me, I do see that there is some merit in that
 perspective.

On the other hand (to continue the analogy with the DNS despite
Richard's shuddering), DNS Extensions is also sort of an awkward fit
in the Internet area (perhaps partly because many applications ought
to be able to use DNS data but aren't, and perhaps partly because it
is in fact an application sitting atop all those other things worked
on in the Internet area).

 encoding.  (The arguments get complex, and it takes care to avoid
 religious assertions.)

Indeed -- particularly when history becomes one of those topics of
religious dispute.

A

-- 
Andrew Sullivan
a...@shinkuro.com
Shinkuro, Inc.
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Politics and technology, was Call for a Jasmine Revolution

2011-04-20 Thread Alessandro Vesely
On 12/Apr/11 18:31, Phillip Hallam-Baker wrote:
 Todd, 
 
 This is totally confused and you are completely wrong.

Under the Federal Election Campaign Act
http://en.wikipedia.org/wiki/Federal_Election_Campaign_Act, an
organization becomes a political committee by receiving
contributions or making expenditures in excess of $1,000 for the
purpose of influencing a federal election
[Source Wikipedia]
 
 Since neither the IETF nor ISOC has any interest in influencing a
 federal election, nor does it engage in any activity intended to do
 so, it is not a political committee under the terms of the act.

The way politics is currently being done is not necessarily adequate.

Let me just note that the root problem is that we are sharing this
planet among a few billions individuals.  That is certainly a
political problem.  However, given that communication is potentially
proportional to the square of the communicating parties, it is also a
technical problem.  I claim that it is not possible to neatly discern
between political and technical issues, although only one of those
two aspects appears to be dominant in many specific cases.  To
justify this claim, suffice it to say that the /amount/ of traffic
has a paramount physical limit, time, whose use cannot be regulated
by any single-sided approach --either political or technical, only.
For an example: spam.

Is it an only-technical problem to devise adequate means for politics?
For the reciprocal question, whether politics should intrude into
technology, the ISOC, talking about the IETF and similar bodies,
recommends that politics do not assert any authority over those
organizations by any mechanism [1].  So, how do we tackle spam and
similar issues where neither aspect is prevalent?

1. ISOC's response to NTIA request for comments on IANA functions
http://isoc.org/wp/newsletter/files/2011/03/Internet-Society-Response-Docket.pdf
30 March 2011
 On Mon, Apr 11, 2011 at 4:56 PM, todd glassey tglas...@earthlink.net
 mailto:tglas...@earthlink.net wrote:
 
 On 3/23/2011 12:02 AM, Hannes Tschofenig wrote:
 
 On Mar 23, 2011, at 6:52 AM, SM wrote:
 
 The IETF can only address the technical problems.
 
 This is an argument I often hear. I do, however, believe that
 you cannot see technology in isolation.
 
 Yeah - sure you can... if you want to be totally about the
 original design and practice of the IETF and its vision. It was
 built to advance protocol standardization and not to decide what
 protocols it would allow on the Internet and which it wouldn't.
  But  lately many have forgotten this and are using the IETF as a
 formal lobby for technological policy advancement and that's a no-no.
 
 Bluntly the IETF members are becoming more and more aggressively
 politically and this statement is based on IAB and other
 publication on what the IETF does and does not allow through its
 frameworks. In doing so their statements about allowing protocols
 or not allowing protocols to be standardized based on their stated
 perception of what damages the Internet or what they personally
 want to see as a free access to all information and ideas model,
 creates a real serious divergence from the Standards Practice this
 organization was set up as, and IMHO is one which is designed
 clearly to destroy global Intellectual Property law and practice.
 
 However, in many cases the technology, regulatory environment,
 business aspects, and the social context gets mixed together.
 
 No Hannes  - it doesn't unless the Chair allows it to - meaning
 that the Chair in this instance has allowed political materials to
 be fielded (filed in this instance) into the IETF and trust me I
 am already filing a formal complaint with the Treasury about
 ISOC's becoming a formal PAC and its locking out protocol efforts
 based on its own desires therein...
 
 
 http://tools.ietf.org/html/draft-morris-policy-cons-00
 
 
 I suggest that the Chair immediately post a formal statement that
 the IETF is a-political and will not do anything but standardize
 technology.  Also that ONLY technology drafts can be accepted
 since the IETF is part of ISOC and not registered as a political
 PAC or Lobbying Agency which it clearly has become in direct
 violation of the NTIA MOU which gave it (ISOC and its ARIN) the
 real power.
 
 
 Todd Glassey
 
 Please have a look at:
 http://tools.ietf.org/html/draft-morris-policy-cons-00
 
 Ciao
 Hannes
 
 
 Hannes - this is the issue with the IETF and the gross number of
 flaming idiots inside of it. The IETF is not a Social Reform
 Agency, nor is it a freaking political action group since its
 financial filings prevent this.
 
 Todd Glassey
___
Ietf mailing list
Ietf@ietf.org

Review of: draft-iab-dns-applications-01

2011-04-20 Thread Dave CROCKER


Review --

Title:Architectural Considerations on Application Features in the DNS
By:   Kolkman, Peterson, Tschofenig, Aboba
I-D:  draft-iab-dns-applications-01

Reviewer: D. Crocker dcroc...@bbiw.net
Review Date:  20 April 2011




RFC 882:  DNS Concepts and Facilities (1982)


   Need:
  The number of resources (for example mailboxes), the number of locations
  for resources, and the diversity of such an environment cause formidable
  problems when we wish to create consistent methods for referencing
  particular resources that are similar but scattered throughout the
  environment.
  ...
  The problem for computer mail is more severe.
  ...
  The basic need is for a consistent name space which will be
  used for referring to resources.

   Solution:
  The DOMAIN NAME SPACE, which is a specification for a tree
  structured name space.
  ...
  NAME SERVERS are server programs which hold information about
  the domain tree's structure and set information.
  ...
  RESOLVERS are programs that extract information from name
  servers in response to user requests.




Draft Summary
-

The DNS provides critical infrastructure service to the public Internet.
Proposed enhancements must have a first do no harm basis, with respect to
existing operations.  However, DNS capabilities and experiences already support
addition of new data and new types of data, so that all enhancements are not
equally suspect.

The draft lays out its goals in terms of a a set of increasing functional
demands being made, considered or possible by applications wishing to use the 
DNS:

 Proposals to piggyback more sophisticated application behavior on top
  of the DNS, however, have raised questions about the propriety of
  instantiating some features in that way, especially those with
  security sensitivities.

This establishes the actual focus of the draft on fears of misuse, rather than
on guidance for proper enhancement.

It offers to explore architectural consequences of installing application
features in the DNS and to offer guidance for such efforts.  However it does
not explain what it means by application features in the DNS, and it offers
little discussion and less substance about architecture or guidance.

The draft has four major sections.

   Motivations:

   This summarizes DNS background, goals and earlier enhancements. The section
demonstrates a misunderstanding of the basis and history of the DNS, forming its
premises from a simplistic and narrow assessment of popular DNS usage, rather
than from the service's design, as captured in the above RFC 882 text.  For
example the draft treats some features as unexpected enhancements when they were
part of the original vision.  The draft also appears to be unaware that mnemonic
host names were in use for more than 10 years before the DNS was defined and
that the primary motivations for the DNS were administration and operations
scaling, not merely the creation of symbolic names.  The statement that the
principal purpose of the DNS is to translate names to IP Addresses suggests
that the in-addr.arpa use and any use of CNAME do not represent principal
purposes.  The original DNS design discussion is in terms that are more generic
than this draft acknowledges. Hence the original use of resource rather than
the draft's focus on host and address.


   Overview of DNS Applications Usages:

   This lays out three basic services, covering service lookup, transforming one
name into another using NAPTR or DDDS, and storage of arbitrary content.  The
draft appears to misunderstand that DDDS is an independent layered service,
which merely has a sub-component that is specified to map onto existing DNS
services.  Rather, the draft discusses it as if DDDS makes a change to the DNS.
It makes no change and there is nothing obvious in the design or operation
of the mapping component that will cause problems for the DNS.


   Challenges for the DNS:

   This lists service needs that might be problematic, covering compound queries
and including requester-specific responses, as well as metadata about tree
structure, and domain redirection.  The first two have no apparent constituency
in current DNS work and discussion of the latter provides no explanation of the
substantive problems that supposedly would be caused.


   Principles and Guidance:

   This offers advice for the types of services that do and do not make sense
to attempt via the DNS. It postulates use of HTTP as an alternative, but without
any concrete design or operational experience. As always, untested and
unimplemented, hypothetical alternatives fare better in an analysis against
real-world ones, because they are not required to suffer real-world constraints
and costs nor to demonstrate real-world operational superiority.


In general, the document needs to be much 

RE: [paws] WG Review: Protocol to Access White Space database (paws)

2011-04-20 Thread Bernard Aboba

When I hear the term device identity spoofing, IEEE 802.1ar comes to mind 
(see http://standards.ieee.org/getieee802/download/802.1AR.-2009.pdf).  

In addition to the liaisons with IEEE 802.19, 802.22 and IEEE 802.11af, is 
there a liaison contemplated to IEEE 802.1 relating to device identity?

 From: scott.proba...@nokia.com
 To: stephen.farr...@cs.tcd.ie; ietf@ietf.org
 Subject: RE: [paws] WG Review: Protocol to Access White Space database (paws)
 Date: Wed, 20 Apr 2011 14:41:23 +
 CC: p...@ietf.org; i...@ietf.org
 
 Hi Stephen, All,
 
 I believe the current wording
  Robust security mechanisms are required to prevent:
  device identity spoofing, modification of device requests, modification
  of channel enablement information, ...
 is acceptable because mechanisms are required means they should be in the 
 protocol, it does not mean they cannot be optional. PAWS should support 
 Regulator requirements globally, and thus I believe there will be procedures 
 or capabilities which are required to be in the protocol but will be 
 optional during run time. Thus different or conflicting requirements from 
 different regions of the world can be supported. (Several regulatory groups 
 around the world are still developing their views and requirements).
 
 It's not the time to dig deep into proposed solutions, just my opinion is the 
 current proposed wording is an acceptable definition to allow a Work Group to 
 get started defining the details.
 
 Regards,
 Scott
 
 -Original Message-
 From: paws-boun...@ietf.org [mailto:paws-boun...@ietf.org] On Behalf Of ext 
 Stephen Farrell
 Sent: Tuesday, April 19, 2011 4:28 PM
 To: IETF-Discussion
 Cc: p...@ietf.org; i...@ietf.org
 Subject: Re: [paws] WG Review: Protocol to Access White Space database (paws)
 
 
 I think this is a good and timely thing for the IETF to do.
 
 One part of this where I think it might be useful to get
 some broader input (which may have happened already, I'm not
 sure) is the following:
 
 On 19/04/11 17:56, IESG Secretary wrote:
  The protocol must protect both the channel enablement process and the
  privacy of users. 
 
 That part is fine but it goes on to say:
 
  Robust security mechanisms are required to prevent:
  device identity spoofing, modification of device requests, modification
  of channel enablement information, ...
 
 I'm told (and believe) this in response to (at least) US
 FCC requirements that call for a device ID and sometimes
 serial number to be (securely, for some value of securely)
 sent with the query.
 
 Those appear to be real regulatory requirements in the
 US, presumably so the regulator can stomp on someone who
 messes about in the wrong spectrum at the wrong time.
 (The link below [1] may be to the right or wrong bit of
 those US regulations, I'm not at all sure, not being
 from there;-)
 
 So my questions:
 
 Are there may be similar (or conflicting!) requirements
 elsewhere?
 
 Does this bit of the charter text need changes to work
 well for other regions?
 
 Separately, I'm not sure how to square those kinds of
 regulatory requirements with protecting privacy where the
 device is carried by a person and has some FCC device ID
 (which lots do I guess) and the person might not want
 the database operator to know who's asking. But I think
 that's ok as something for the WG to figure out since
 the charter already calls for respecting privacy.
 
 I'm more concerned in case e.g. some other regional regulation
 called for this protocol to be completely anonymous or
 something, in which case the current charter text might
 be problematic.
 
 Cheers,
 Stephen.
 
 [1]
 http://ecfr.gpoaccess.gov/cgi/t/text/text-idx?c=ecfrsid=3e9c322addf1f7e897d8c84a6c7aca78rgn=div8view=textnode=47:1.0.1.1.14.8.243.9idno=47
 ___
 paws mailing list
 p...@ietf.org
 https://www.ietf.org/mailman/listinfo/paws
  ___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: [paws] WG Review: Protocol to Access White Space database (paws)

2011-04-20 Thread Joel M. Halpern
Building from Bernard's note, it strikes me that if we are going to get 
into device identity, we probably need to be communicating with (liaise) 
3GPP/3GPP2, because they have very strong views on that topic.  (Whether 
one agrees or disagrees with their biases, talking to them seems important.)


Yours,
Joel

On 4/20/2011 10:55 AM, Bernard Aboba wrote:

When I hear the term device identity spoofing, IEEE 802.1ar comes to
mind (see http://standards.ieee.org/getieee802/download/802.1AR.-2009.pdf).

In addition to the liaisons with IEEE 802.19, 802.22 and IEEE 802.11af,
is there a liaison contemplated to IEEE 802.1 relating to device identity?


___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


RE: [paws] WG Review: Protocol to Access White Space database (paws)

2011-04-20 Thread Paul Lambert


How does the area that the group is assigned impact the choices of technology?

I'm an advocate for an efficient solution set for PAWS ... it will be much like 
DNS for spectrum in the future and should be viewed as a core infrastructural 
component that needs careful design.  There are good reasons that routing 
protocols don't use XML.

Applications now days tend to go for the simple, quick to make a web 
application solutions using XML or the like ...  My concern is that 
Applications imply that efficiency does not matter.

Paul



 -Original Message-
 From: paws-boun...@ietf.org [mailto:paws-boun...@ietf.org] On Behalf Of
 Joel M. Halpern
 Sent: Tuesday, April 19, 2011 10:50 AM
 To: i...@ietf.org
 Cc: p...@ietf.org; IETF discussion list
 Subject: Re: [paws] WG Review: Protocol to Access White Space database
 (paws)
 
 I think this working group is a good idea.
 My inclination would be to place it in the Applications area.  It looks
 like a nice application protocol to me.
 There is a reasonable argument for placing it in RAI, as that is where
 the relevant GEOLOC work has been done up till now.
 
 Yours,
 Joel M. Halpern
 
 On 4/19/2011 12:56 PM, IESG Secretary wrote:
  A new IETF working group has been proposed.  The IESG has not made
 any
  determination as yet. The following draft charter was submitted, and
 is
  provided for informational purposes only. Please send your comments
 to the
  IESG mailing list (i...@ietf.org) by Tuesday, April 26, 2011.
 
 
  Protocol to Access White Space database (paws)
  
  Current Status: Proposed Working Group
  Last updated: 2011-04-14
 
  Chairs:
  TBD
 
  Area Directors:
  TBD
 
  Area Advisor:
  TBD
 
  Mailing lists:
  Address: p...@ietf.org
  To Subscribe: https://www.ietf.org/mailman/listinfo/paws
  Archive: http://www.ietf.org/mail-archive/web/paws/
 
  Description of Working Group:
 
  Governments around the world continue to search for new pieces of
 radio
  spectrum which can be used by the expanding wireless communications
  industry to provide more services in the usable spectrum. The concept
  of allowing secondary transmissions (licensed or unlicensed) in
  frequencies allocated to a primary user is a technique to unlock
  existing spectrum for new use. An obvious requirement is that these
  secondary transmissions do not interfere with the primary use of the
  spectrum. Often, in a given physical location, the primary user(s)
 may
  not be using the entire band allocated to them. The available
 spectrum
  for a secondary use would then depend on the location of the
 secondary
  user. The primary user may have a schedule when it uses the spectrum,
  which may be available for secondary use outside that schedule. The
  fundamental issue is how to determine for a specific location and
  specific time, if any of the primary spectrum is available for
 secondary
  use. One simple mechanism is to use a geospatial database that
 records
  protected contours for primary users, and require the secondary users
 to
  check the database prior to selecting what part of the spectrum they
  use. Such databases could be available on the Internet for query by
  users.
 
  In a typical implementation of geolocation and database to access TV
  white space, a radio is configured with, or has the capability to
  determine its location in latitude and longitude. At power-on, before
  the device can transmit or use any of the spectrum set aside for
  secondary use, the device must identify the relevant database to
 query,
  contact the database, provide its geolocation and receive in return a
  list of unoccupied or white space spectrum (for example, in a TV
  White space implementation, the list of available channels at that
  location). The device can then select one of the channels from the
 list
  and begin to transmit and receive on the selected channel. The device
  must query the database subsequently on a periodic basis for a list
 of
  unoccupied channels based on certain conditions, e.g. a fixed amount
 of
  time has passed or the device has changed location beyond a specified
  threshold.
 
  The databases are expected to be reachable via the Internet and the
  devices querying these databases are expected to have some form of
  Internet connectivity, directly or indirectly. The databases may be
  country specific since the available spectrum and regulations may
 vary,
  but the fundamental operation of the protocol should be country
  independent, thus extensibility of data structures will be required.
 The
  solution will not be tied to any specific spectrum, country, or
  phy/mac/air interface but may incorporate relevant aspects of these
 as
  needed for proper operation.
 
  The proposed working group will :
  - standardize a protocol for querying the database, which includes a
  location sensitive database discovery mechanism and security for the
  protocol, and application services.
  - 

Re: [paws] WG Review: Protocol to Access White Space database (paws)

2011-04-20 Thread Rex Buddenberg
On Tue, 2011-04-19 at 12:47 -0700, Paul Lambert wrote:
 
 How does the area that the group is assigned impact the choices of
 technology?
 
 I'm an advocate for an efficient solution set for PAWS ... it will be
 much like DNS for spectrum in the future and should be viewed as a
 core infrastructural component that needs careful design.  There are
 good reasons that routing protocols don't use XML.

While the DNS analogy works, I was thinking more a parallel -- or
extension -- of SNMP.  

Still remain within 'applications', Joel?

 
 Applications now days tend to go for the simple, quick to make a web
 application solutions using XML or the like ...  My concern is that
 Applications imply that efficiency does not matter.
 
 Paul
 
 
 
  -Original Message-
  From: paws-boun...@ietf.org [mailto:paws-boun...@ietf.org] On Behalf Of
  Joel M. Halpern
  Sent: Tuesday, April 19, 2011 10:50 AM
  To: i...@ietf.org
  Cc: p...@ietf.org; IETF discussion list
  Subject: Re: [paws] WG Review: Protocol to Access White Space database
  (paws)
  
  I think this working group is a good idea.
  My inclination would be to place it in the Applications area.  It looks
  like a nice application protocol to me.
  There is a reasonable argument for placing it in RAI, as that is where
  the relevant GEOLOC work has been done up till now.
  
  Yours,
  Joel M. Halpern
  
  On 4/19/2011 12:56 PM, IESG Secretary wrote:
   A new IETF working group has been proposed.  The IESG has not made
  any
   determination as yet. The following draft charter was submitted, and
  is
   provided for informational purposes only. Please send your comments
  to the
   IESG mailing list (i...@ietf.org) by Tuesday, April 26, 2011.
  
  
   Protocol to Access White Space database (paws)
   
   Current Status: Proposed Working Group
   Last updated: 2011-04-14
  
   Chairs:
   TBD
  
   Area Directors:
   TBD
  
   Area Advisor:
   TBD
  
   Mailing lists:
   Address: p...@ietf.org
   To Subscribe: https://www.ietf.org/mailman/listinfo/paws
   Archive: http://www.ietf.org/mail-archive/web/paws/
  
   Description of Working Group:
  
   Governments around the world continue to search for new pieces of
  radio
   spectrum which can be used by the expanding wireless communications
   industry to provide more services in the usable spectrum. The concept
   of allowing secondary transmissions (licensed or unlicensed) in
   frequencies allocated to a primary user is a technique to unlock
   existing spectrum for new use. An obvious requirement is that these
   secondary transmissions do not interfere with the primary use of the
   spectrum. Often, in a given physical location, the primary user(s)
  may
   not be using the entire band allocated to them. The available
  spectrum
   for a secondary use would then depend on the location of the
  secondary
   user. The primary user may have a schedule when it uses the spectrum,
   which may be available for secondary use outside that schedule. The
   fundamental issue is how to determine for a specific location and
   specific time, if any of the primary spectrum is available for
  secondary
   use. One simple mechanism is to use a geospatial database that
  records
   protected contours for primary users, and require the secondary users
  to
   check the database prior to selecting what part of the spectrum they
   use. Such databases could be available on the Internet for query by
   users.
  
   In a typical implementation of geolocation and database to access TV
   white space, a radio is configured with, or has the capability to
   determine its location in latitude and longitude. At power-on, before
   the device can transmit or use any of the spectrum set aside for
   secondary use, the device must identify the relevant database to
  query,
   contact the database, provide its geolocation and receive in return a
   list of unoccupied or white space spectrum (for example, in a TV
   White space implementation, the list of available channels at that
   location). The device can then select one of the channels from the
  list
   and begin to transmit and receive on the selected channel. The device
   must query the database subsequently on a periodic basis for a list
  of
   unoccupied channels based on certain conditions, e.g. a fixed amount
  of
   time has passed or the device has changed location beyond a specified
   threshold.
  
   The databases are expected to be reachable via the Internet and the
   devices querying these databases are expected to have some form of
   Internet connectivity, directly or indirectly. The databases may be
   country specific since the available spectrum and regulations may
  vary,
   but the fundamental operation of the protocol should be country
   independent, thus extensibility of data structures will be required.
  The
   solution will not be tied to any specific spectrum, country, or
   phy/mac/air interface but 

RE: [paws] WG Review: Protocol to Access White Space database (paws)

2011-04-20 Thread scott.probasco
Hi Stephen, All,

I believe the current wording
 Robust security mechanisms are required to prevent:
 device identity spoofing, modification of device requests, modification
 of channel enablement information, ...
is acceptable because mechanisms are required means they should be in the 
protocol, it does not mean they cannot be optional. PAWS should support 
Regulator requirements globally, and thus I believe there will be procedures or 
capabilities which are required to be in the protocol but will be optional 
during run time. Thus different or conflicting requirements from different 
regions of the world can be supported. (Several regulatory groups around the 
world are still developing their views and requirements).

It's not the time to dig deep into proposed solutions, just my opinion is the 
current proposed wording is an acceptable definition to allow a Work Group to 
get started defining the details.

Regards,
Scott

-Original Message-
From: paws-boun...@ietf.org [mailto:paws-boun...@ietf.org] On Behalf Of ext 
Stephen Farrell
Sent: Tuesday, April 19, 2011 4:28 PM
To: IETF-Discussion
Cc: p...@ietf.org; i...@ietf.org
Subject: Re: [paws] WG Review: Protocol to Access White Space database (paws)


I think this is a good and timely thing for the IETF to do.

One part of this where I think it might be useful to get
some broader input (which may have happened already, I'm not
sure) is the following:

On 19/04/11 17:56, IESG Secretary wrote:
 The protocol must protect both the channel enablement process and the
 privacy of users. 

That part is fine but it goes on to say:

 Robust security mechanisms are required to prevent:
 device identity spoofing, modification of device requests, modification
 of channel enablement information, ...

I'm told (and believe) this in response to (at least) US
FCC requirements that call for a device ID and sometimes
serial number to be (securely, for some value of securely)
sent with the query.

Those appear to be real regulatory requirements in the
US, presumably so the regulator can stomp on someone who
messes about in the wrong spectrum at the wrong time.
(The link below [1] may be to the right or wrong bit of
those US regulations, I'm not at all sure, not being
from there;-)

So my questions:

Are there may be similar (or conflicting!) requirements
elsewhere?

Does this bit of the charter text need changes to work
well for other regions?

Separately, I'm not sure how to square those kinds of
regulatory requirements with protecting privacy where the
device is carried by a person and has some FCC device ID
(which lots do I guess) and the person might not want
the database operator to know who's asking. But I think
that's ok as something for the WG to figure out since
the charter already calls for respecting privacy.

I'm more concerned in case e.g. some other regional regulation
called for this protocol to be completely anonymous or
something, in which case the current charter text might
be problematic.

Cheers,
Stephen.

[1]
http://ecfr.gpoaccess.gov/cgi/t/text/text-idx?c=ecfrsid=3e9c322addf1f7e897d8c84a6c7aca78rgn=div8view=textnode=47:1.0.1.1.14.8.243.9idno=47
___
paws mailing list
p...@ietf.org
https://www.ietf.org/mailman/listinfo/paws
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: IAOC: delegating ex-officio responsibility

2011-04-20 Thread SM

Hi Bob,
At 14:04 19-04-2011, Bob Hinden wrote:
But that may not always be the case that all IAOC members have a lot 
of IETF experience.  We need to have a governance model that works 
into the future.


Yes, it may happen that some IAOC members may not have a lot of IETF 
experience.  How do you ensure that the IAOC members have a lot of 
IETF experience?  You can tweak the governance model.  The IETF 
community also have to be convinced that it is the better model or 
else it will be changed.  There are some safeguards in the IETF model 
that I won't get into.  It's merely a matter of time for that to 
change.  I'll list the names of the people who have participated on 
this thread:


 Dave Crocker
 Lucy Lynch
 John Klensin
 Russ Housley
 Jari Arkko
 Olaf Kolkman
 Brian Carpenter
 Henk Uijterwaal
 Leslie Daigle
 Ole Jacobsen
 Marshall Eubanks
 Joe Touch
 Joel Jaeggli
 Steve Crocker
 Michael Richardson
 Barry Leiba
 Spencer Dawkins
 Bert Wijnen

The people listed below were part of NomCom:

 Gregory Cauchie
 Mehmet Ersue
 Dorothy Gellert
 Tony Hansen
 Suresh Krishnan
 Dirk Kroeselberg
 Jan Seedorf
 Pete St. Pierre
 Rolf Winter

You may notice that there isn't any intersection with the previous list.

It would certainly give the IAOC chair a broader view, but still not 
the views of the I* chair.  Also, if the I* chairs (3 of 9 voting 
members) regularly didn't attend, it would be much harder to get a 
quorum for a meeting and pass motions.


I did not comment on getting a quorum previously as it's only adding 
one more problem to the mix.  The IAOC decides the details about its 
decision-making rules, including its rules for quorum, conflict of 
interest, and breaking of ties.


I agree with you that the views of the I* Chairs are important.  It 
also helps avoid back and forth discussion between I* bodies; e.g. is 
this an IESG decision or can the IAOC decide.  I don't think that the 
IAB or the IESG can be absolved from the responsibility if the IAOC 
takes a negative turn as each of them chooses an IAOC member.


If the ex-IAB Chair and the IESG Chair ask for a change to the model 
due to the workload, is it on a whim?  This is where people walk away 
from a problem because they tried and got stone-walled.  If the IETF 
believes that it is appropriate to mince everything they can get out 
of a person in the name of good governance, so be it.


Regards,
-sm 


___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: IAOC: delegating ex-officio responsibility

2011-04-20 Thread Dave CROCKER



On 4/19/2011 12:53 PM, Bob Hinden wrote:

1. ISOC, IAB and IESG each appoint one person currently.  Change this to be
two each, the same as Nomcom.  Each year, they would appoint one person.

2. Move the I* Chairs to be non-voting ex-officio participants, the same as
the IETF Administrative Director.  They are welcome to participate or be
explicitly invited to all IAOC/Trust activities.

This produces the continuity that is needed for the admin work, but also
retains access to the expertise of the I* chairs.


I don't agree.  Appointing two people (or more?) doesn't solve the problem I
am concerned about, it still doesn't bring the chairs perspective.  It also
significantly changes the governance model by changing the balance between
between nomcom, iab, iesg, and ISOC appointed members.  Also, adding six
people (still counting the chairs) will make the IAOC much larger and
unwieldy.



For clarification:

1.  The IAB, IESG and ISOC each put two voting people onto the IAOC/Trust today. 
 My proposal preserves that.


2. The intent behind moving the I* Chairs to non-voting status, like the IAD, is 
to ensure that they can continue to participate but remove from the the 
requirement for daily IAOC/Trust activities.  The presumption is that they dive 
in for the big stuff, of the sort you cited, but do not have the burden of 
regular participation.


For emphasis:

As SM notes, my starting point is two of these folk saying they have to have a 
change.  Looking at the list of their duties, no one should be surprised that 
they feel (and are) overloaded.  So, they looked over their current duties and 
decided this is the one they'd like to change.  I don't have -- and haven't 
heard anyone else suggest -- that some other change in their duties would be 
more appropriate.  So I see the relevant question as how to make a change, not 
whether.


d/

ps. As for the broader concern about having a sufficient base of experience on 
the IAOC/Trust, that applies for all appointments to all of our management 
groups.  Worse, we have a continuing challenge to select for the right kinds of 
experience.  For example, merely hanging around the IETF for a long time does 
not mean one knows how to manage an area or manage a budget.  (I'm stating the 
obvious.  The reason is that I don't see the current effort to change I* Chair 
participation in the IAOC/Trust as changing this issue.)


--

  Dave Crocker
  Brandenburg InternetWorking
  bbiw.net
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: IAOC: delegating ex-officio responsibility

2011-04-20 Thread John Leslie
Dave CROCKER d...@dcrocker.net wrote:
 On 4/19/2011 12:53 PM, Bob Hinden wrote:
 [Dave CROCKER d...@dcrocker.net wrote:]
 
 1. ISOC, IAB and IESG each appoint one person currently.  Change this
to be two each, the same as Nomcom.  Each year, they would appoint
one person.

 2. Move the I* Chairs to be non-voting ex-officio participants, the
same as the IETF Administrative Director. They are welcome to
participate or be explicitly invited to all IAOC/Trust activities.

 This produces the continuity that is needed for the admin work, but
 also retains access to the expertise of the I* chairs.

   I always respect Dave's suggestions. (Of course, I don't always agree
with them... ;^)

 I don't agree. Appointing two people (or more?) doesn't solve the
 problem I am concerned about, it still doesn't bring the chairs
 perspective.

   I usually respect Bob's suggestions, but I don't always understand
them. (In particular, he's lost me here.)

 It also significantly changes the governance model by changing the
 balance between between nomcom, iab, iesg, and ISOC appointed members.

   The change in balance seems rather minimal -- but that could
certainly be fine-tuned.

 Also, adding six people (still counting the chairs) will make the
 IAOC much larger and unwieldy.

   That I understand. Perhaps we shouldn't be adding any...

   However, Russ  Olaf seem to think there's work they have been
expected to do. How will that work get done? Is the proposal first
floated simply telling them the work is their responsibility -- and
they need to find volunteers to do it?

   Us hoi-polloi aren't getting these details!

 For clarification:
 
 1.  The IAB, IESG and ISOC each put two voting people onto the IAOC/Trust 
 today. My proposal preserves that.
 
 2. The intent behind moving the I* Chairs to non-voting status, like the 
 IAD, is to ensure that they can continue to participate but remove from
 the the requirement for daily IAOC/Trust activities. The presumption is
 that they dive in for the big stuff, of the sort you cited, but do not
 have the burden of regular participation.

   I have a slightly different view: that the IAOC is entitled to try to
entice them into participation, but they would have the right to say No.

 For emphasis:
 
 As SM notes, my starting point is two of these folk saying they have to 
 have a change. Looking at the list of their duties, no one should be 
 surprised that they feel (and are) overloaded. So, they looked over
 their current duties and decided this is the one they'd like to change.
 I don't have -- and haven't heard anyone else suggest -- that some other
 change in their duties would be more appropriate. So I see the relevant
 question as how to make a change, not whether.

   I agree. Hopefully most of us can agree.

   Charging them to find someone to do the work feels wrong to me.

   Moving them to non-voting status feels right.

   Enabling them to participate in areas they feel critical feels right.

   Adding other individuals with voting status seems reasonable, but
not-exactly-right.

   Perhaps the most important change would be simply not counting them
for purposes of quorum...

--
John Leslie j...@jlc.net
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Revising I-Ds became painful

2011-04-20 Thread Behcet Sarikaya
Hi,
  It seems like I-D submission for a revised draft (after expiration) 
encounters 
so many new hurdles:

1. Version number. Submission page complains about the version number even 
though it is correct. This seems to be because the system keeps the expiration 
message in html format as the new version to be submitted. 

Is there a way to get around this?

2. RFC XML has changed. It seem like 
xml.resource.org has a new xml compiler. I had a lot of trouble in compiling my 
existing xml files. I am OK with improving RFC XML but why not keep upward 
compatibility?

Regards,

Behcet

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: [paws] WG Review: Protocol to Access White Space database (paws)

2011-04-20 Thread t.petch
- Original Message -
From: Joel M. Halpern j...@joelhalpern.com
To: Rex Buddenberg bud...@nps.navy.mil
Cc: Paul Lambert p...@marvell.com; p...@ietf.org; i...@ietf.org; IETF
discussion list ietf@ietf.org
Sent: Wednesday, April 20, 2011 4:17 AM
Subject: Re: [paws] WG Review: Protocol to Access White Space database (paws)


 Actually, as far as I can tell, there is very little parallel between
 the PAWS problem and SNMP.
 SNMP tends to be initiated by the manager, and used to extract
 information from the device in the network, or set information in teh
 device.

Joel

I see one small parallel with SNMP. All the recent work on SNMP has
been on security, and while setting up a secure channel is easy, TLS or SSH,
knowing that it goes where you want it to as opposed to via a MITM is
more difficult, both when the device calls home to send an alert, or
when home calls the device to solicit information.

And the credentials used by the transport need binding securely to
the identity at a higher layer.  This was troublesome and I will
be interested to see how this is solved.  By comparison  I expect
that the application will fall out in the wash.

Channel binding anyone?  One for the security area?

Tom Petch





 This protocol is used by the client.  It extracts basically stable
 information about what frequencies can be used in this geographic region
 at this time.
 There is no network management going on.  the interaction does not
 look like SNMP.  And the effect does not look like SNMP.  While Radius
 or Diameter are closer, this protocol is not even a policy decision
 protocol.  There is no policy.

 So no, I do not think this looks anything like network management.
 The protocols, the transaction drivers and behavior, the problem space,
 and the underlying data behavior are all very different from any of our
 NM work.

 Yours,
 Joel

 On 4/19/2011 5:21 PM, Rex Buddenberg wrote:
  On Tue, 2011-04-19 at 12:47 -0700, Paul Lambert wrote:
 
  How does the area that the group is assigned impact the choices of
  technology?
 
  I'm an advocate for an efficient solution set for PAWS ... it will be
  much like DNS for spectrum in the future and should be viewed as a
  core infrastructural component that needs careful design.  There are
  good reasons that routing protocols don't use XML.
 
  While the DNS analogy works, I was thinking more a parallel -- or
  extension -- of SNMP.
 
  Still remain within 'applications', Joel?
 
 
  Applications now days tend to go for the simple, quick to make a web
  application solutions using XML or the like ...  My concern is that
  Applications imply that efficiency does not matter.
 
  Paul
 
 
 
  -Original Message-
  From: paws-boun...@ietf.org [mailto:paws-boun...@ietf.org] On Behalf Of
  Joel M. Halpern
  Sent: Tuesday, April 19, 2011 10:50 AM
  To: i...@ietf.org
  Cc: p...@ietf.org; IETF discussion list
  Subject: Re: [paws] WG Review: Protocol to Access White Space database
  (paws)
 
  I think this working group is a good idea.
  My inclination would be to place it in the Applications area.  It looks
  like a nice application protocol to me.
  There is a reasonable argument for placing it in RAI, as that is where
  the relevant GEOLOC work has been done up till now.
 
  Yours,
  Joel M. Halpern
 
  On 4/19/2011 12:56 PM, IESG Secretary wrote:
  A new IETF working group has been proposed.  The IESG has not made
  any
  determination as yet. The following draft charter was submitted, and
  is
  provided for informational purposes only. Please send your comments
  to the
  IESG mailing list (i...@ietf.org) by Tuesday, April 26, 2011.
 
 
  Protocol to Access White Space database (paws)
  
  Current Status: Proposed Working Group
  Last updated: 2011-04-14
 
  Chairs:
  TBD
 
  Area Directors:
  TBD
 
  Area Advisor:
  TBD
 
  Mailing lists:
  Address: p...@ietf.org
  To Subscribe: https://www.ietf.org/mailman/listinfo/paws
  Archive: http://www.ietf.org/mail-archive/web/paws/
 
  Description of Working Group:
 
  Governments around the world continue to search for new pieces of
  radio
  spectrum which can be used by the expanding wireless communications
  industry to provide more services in the usable spectrum. The concept
  of allowing secondary transmissions (licensed or unlicensed) in
  frequencies allocated to a primary user is a technique to unlock
  existing spectrum for new use. An obvious requirement is that these
  secondary transmissions do not interfere with the primary use of the
  spectrum. Often, in a given physical location, the primary user(s)
  may
  not be using the entire band allocated to them. The available
  spectrum
  for a secondary use would then depend on the location of the
  secondary
  user. The primary user may have a schedule when it uses the spectrum,
  which may be available for secondary use outside that schedule. The
  fundamental issue is how to determine for a specific 

Re: [paws] WG Review: Protocol to Access White Space database (paws)

2011-04-20 Thread Cullen Jennings

GEOLOC has been a WG that is somewhat on the edge between Apps and RAI. Much of 
what geoloc was doing, particularly the location for emergency calling, had 
real time issues and the interested people largely lined up with the the other 
RAI groups even though geoloc has uses outside anything to do with SIP. PAWS on 
the other hand does not seem to have real time application issues so it seems 
like Apps is probably a more appropriate area for it. 

Cullen


On Apr 19, 2011, at 11:50 AM, Joel M. Halpern wrote:

 I think this working group is a good idea.
 My inclination would be to place it in the Applications area.  It looks like 
 a nice application protocol to me.
 There is a reasonable argument for placing it in RAI, as that is where the 
 relevant GEOLOC work has been done up till now.
 
 Yours,
 Joel M. Halpern
 
 On 4/19/2011 12:56 PM, IESG Secretary wrote:
 A new IETF working group has been proposed.  The IESG has not made any
 determination as yet. The following draft charter was submitted, and is
 provided for informational purposes only. Please send your comments to the
 IESG mailing list (i...@ietf.org) by Tuesday, April 26, 2011.
 
 
 Protocol to Access White Space database (paws)
 
 Current Status: Proposed Working Group
 Last updated: 2011-04-14
 
 Chairs:
 TBD
 
 Area Directors:
 TBD
 
 Area Advisor:
 TBD
 
 Mailing lists:
 Address: p...@ietf.org
 To Subscribe: https://www.ietf.org/mailman/listinfo/paws
 Archive: http://www.ietf.org/mail-archive/web/paws/
 
 Description of Working Group:
 
 Governments around the world continue to search for new pieces of radio
 spectrum which can be used by the expanding wireless communications
 industry to provide more services in the usable spectrum. The concept
 of allowing secondary transmissions (licensed or unlicensed) in
 frequencies allocated to a primary user is a technique to unlock
 existing spectrum for new use. An obvious requirement is that these
 secondary transmissions do not interfere with the primary use of the
 spectrum. Often, in a given physical location, the primary user(s) may
 not be using the entire band allocated to them. The available spectrum
 for a secondary use would then depend on the location of the secondary
 user. The primary user may have a schedule when it uses the spectrum,
 which may be available for secondary use outside that schedule. The
 fundamental issue is how to determine for a specific location and
 specific time, if any of the primary spectrum is available for secondary
 use. One simple mechanism is to use a geospatial database that records
 protected contours for primary users, and require the secondary users to
 check the database prior to selecting what part of the spectrum they
 use. Such databases could be available on the Internet for query by
 users.
 
 In a typical implementation of geolocation and database to access TV
 white space, a radio is configured with, or has the capability to
 determine its location in latitude and longitude. At power-on, before
 the device can transmit or use any of the spectrum set aside for
 secondary use, the device must identify the relevant database to query,
 contact the database, provide its geolocation and receive in return a
 list of unoccupied or white space spectrum (for example, in a TV
 White space implementation, the list of available channels at that
 location). The device can then select one of the channels from the list
 and begin to transmit and receive on the selected channel. The device
 must query the database subsequently on a periodic basis for a list of
 unoccupied channels based on certain conditions, e.g. a fixed amount of
 time has passed or the device has changed location beyond a specified
 threshold.
 
 The databases are expected to be reachable via the Internet and the
 devices querying these databases are expected to have some form of
 Internet connectivity, directly or indirectly. The databases may be
 country specific since the available spectrum and regulations may vary,
 but the fundamental operation of the protocol should be country
 independent, thus extensibility of data structures will be required. The
 solution will not be tied to any specific spectrum, country, or
 phy/mac/air interface but may incorporate relevant aspects of these as
 needed for proper operation.
 
 The proposed working group will :
 - standardize a protocol for querying the database, which includes a
 location sensitive database discovery mechanism and security for the
 protocol, and application services.
 - Standardize the data structure to be carried by the query
 protocol.
 
 The protocol must protect both the channel enablement process and the
 privacy of users. Robust security mechanisms are required to prevent:
 device identity spoofing, modification of device requests, modification
 of channel enablement information, impersonation of registered database
 services and unauthorized disclosure of a users 

Re: IAOC: delegating ex-officio responsibility

2011-04-20 Thread Brian E Carpenter
On 2011-04-20 21:13, SM wrote:
 Hi Bob,
 At 14:04 19-04-2011, Bob Hinden wrote:
 But that may not always be the case that all IAOC members have a lot
 of IETF experience.  We need to have a governance model that works
 into the future.

...

 You may notice that there isn't any intersection with the previous list.

I think you are overlooking that some of the people in the first list
have been in liaison positions in NomCom; in terms of understanding
NomCom's challenges, that is sufficient. In any case, the difficulty
of finding available candidates is quite apparent.
...

 I agree with you that the views of the I* Chairs are important.

In the case of the IETF Chair I believe the issue is that it's
highly desirable, from a governance viewpoint, that the IETF Chair
has *personal* responsibility in IAOC decisions, and therefore should
be a voting member as a matter of principle.

I don't believe that argument applies to the IAB Chair - we should
IMHO have a collective goal to sharply reduce the IAB's involvement
in administrative issues, so that it can do its architectural and
liaison jobs properly. Delegating the IAB Chair role in the IAOC
would be a step in that direction, along with appointing the permanent
RFC Series Editor.

We haven't discussed the third proposed delegation, that of the ISOC
President's seat, very much. Assuming it was delegated to another
officer of ISOC, that would seem reasonable too. But it shouldn't
be delegated to just anybody, IMHO.

   Brian

Brian
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: IAOC: delegating ex-officio responsibility

2011-04-20 Thread Bob Hinden
Brian,

If we are going to do this, then I tend to agree with your conclusions.

 
 
 I agree with you that the views of the I* Chairs are important.
 
 In the case of the IETF Chair I believe the issue is that it's
 highly desirable, from a governance viewpoint, that the IETF Chair
 has *personal* responsibility in IAOC decisions, and therefore should
 be a voting member as a matter of principle.


My preference is that the IETF not delegate this responsibility.  One 
additional reason for this is that the IETF chair is appointed by the nomcom 
(vs. the IAB who appoints their own chair).  It is part of the job and an 
important part.


 I don't believe that argument applies to the IAB Chair - we should
 IMHO have a collective goal to sharply reduce the IAB's involvement
 in administrative issues, so that it can do its architectural and
 liaison jobs properly. Delegating the IAB Chair role in the IAOC
 would be a step in that direction, along with appointing the permanent
 RFC Series Editor.


In the case of the IAB, I would prefer that the IAB selected it's 
representative to the IAOC and that they become the full IAOC voting member 
(and a member of the IETF trust).  That is, it be completely delegated for a 
fixed term.  The IAB could consider this person as a vice-chair or even a 
co-chair.  The both represent other ways to reduce the load on the chair.  


 We haven't discussed the third proposed delegation, that of the ISOC
 President's seat, very much. Assuming it was delegated to another
 officer of ISOC, that would seem reasonable too. But it shouldn't
 be delegated to just anybody, IMHO.

Also agree.  I think it should be limited to the CFO or COO.  I think, as above 
with the IAB, it should be fully delegated.

Bob


___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Revising I-Ds became painful

2011-04-20 Thread Glen Zorn
On 4/21/2011 12:18 AM, Behcet Sarikaya wrote:

 Hi,
   It seems like I-D submission for a revised draft (after expiration) 
 encounters 
 so many new hurdles:
 
 1. Version number. Submission page complains about the version number even 
 though it is correct. This seems to be because the system keeps the 
 expiration 
 message in html format as the new version to be submitted. 
 
 Is there a way to get around this?

Don't let I-Ds expire?

 
 2. RFC XML has changed. It seem like 
 xml.resource.org has a new xml compiler. I had a lot of trouble in compiling 
 my 
 existing xml files. 

Hmm.  I'm not experiencing any problems, either with the on-line or the
host based tools.  Are you sure that your XML was valid before?

 I am OK with improving RFC XML but why not keep upward 
 compatibility?
 
 Regards,
 
 Behcet
 
 ___
 Ietf mailing list
 Ietf@ietf.org
 https://www.ietf.org/mailman/listinfo/ietf
 
 
attachment: gwz.vcf___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


CLUE WG Virtual Interim Meeting: May 12, 2011

2011-04-20 Thread IESG Secretary
The CLUE WG will hold an interim virtual meeting on:
2011-05-12, 15.00-17.00 GMT (starting at 8.00 Pacific, 10.00 Central,
11.00
Eastern).

Agenda and details will be announced on the CLUE WG mailing list
(http://www.ietf.org/mail-archive/web/clue/) as soon as available.
___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce


RFC 6111 on Additional Kerberos Naming Constraints

2011-04-20 Thread rfc-editor

A new Request for Comments is now available in online RFC libraries.


RFC 6111

Title:  Additional Kerberos Naming Constraints 
Author: L. Zhu
Status: Standards Track
Stream: IETF
Date:   April 2011
Mailbox:l...@microsoft.com
Pages:  6
Characters: 14113
Updates:RFC4120

I-D Tag:draft-ietf-krb-wg-naming-07.txt

URL:http://www.rfc-editor.org/rfc/rfc6111.txt

This document defines new naming constraints for well-known Kerberos
principal names and well-known Kerberos realm names.  [STANDARDS-
TRACK]

This document is a product of the Kerberos WG Working Group of the IETF.

This is now a Proposed Standard Protocol.

STANDARDS TRACK: This document specifies an Internet standards track
protocol for the Internet community,and requests discussion and suggestions
for improvements.  Please refer to the current edition of the Internet
Official Protocol Standards (STD 1) for the standardization state and
status of this protocol.  Distribution of this memo is unlimited.

This announcement is sent to the IETF-Announce and rfc-dist lists.
To subscribe or unsubscribe, see
  http://www.ietf.org/mailman/listinfo/ietf-announce
  http://mailman.rfc-editor.org/mailman/listinfo/rfc-dist

For searching the RFC series, see http://www.rfc-editor.org/rfcsearch.html.
For downloading RFCs, see http://www.rfc-editor.org/rfc.html.

Requests for special distribution should be addressed to either the
author of the RFC in question, or to rfc-edi...@rfc-editor.org.  Unless
specifically noted otherwise on the RFC itself, all RFCs are for
unlimited distribution.


The RFC Editor Team
Association Management Solutions, LLC


___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce


RFC 6112 on Anonymity Support for Kerberos

2011-04-20 Thread rfc-editor

A new Request for Comments is now available in online RFC libraries.


RFC 6112

Title:  Anonymity Support for Kerberos 
Author: L. Zhu, P. Leach,
S. Hartman
Status: Standards Track
Stream: IETF
Date:   April 2011
Mailbox:larry@microsoft.com, 
pau...@microsoft.com, 
hartmans-i...@mit.edu
Pages:  16
Characters: 37858
Updates:RFC4120, RFC4121, RFC4556

I-D Tag:draft-ietf-krb-wg-anon-12.txt

URL:http://www.rfc-editor.org/rfc/rfc6112.txt

This document defines extensions to the Kerberos protocol to allow a
Kerberos client to securely communicate with a Kerberos application
service without revealing its identity, or without revealing more
than its Kerberos realm.  It also defines extensions that allow a
Kerberos client to obtain anonymous credentials without revealing its
identity to the Kerberos Key Distribution Center (KDC).  This
document updates RFCs 4120, 4121, and 4556.  [STANDARDS-TRACK]

This document is a product of the Kerberos WG Working Group of the IETF.

This is now a Proposed Standard Protocol.

STANDARDS TRACK: This document specifies an Internet standards track
protocol for the Internet community,and requests discussion and suggestions
for improvements.  Please refer to the current edition of the Internet
Official Protocol Standards (STD 1) for the standardization state and
status of this protocol.  Distribution of this memo is unlimited.

This announcement is sent to the IETF-Announce and rfc-dist lists.
To subscribe or unsubscribe, see
  http://www.ietf.org/mailman/listinfo/ietf-announce
  http://mailman.rfc-editor.org/mailman/listinfo/rfc-dist

For searching the RFC series, see http://www.rfc-editor.org/rfcsearch.html.
For downloading RFCs, see http://www.rfc-editor.org/rfc.html.

Requests for special distribution should be addressed to either the
author of the RFC in question, or to rfc-edi...@rfc-editor.org.  Unless
specifically noted otherwise on the RFC itself, all RFCs are for
unlimited distribution.


The RFC Editor Team
Association Management Solutions, LLC


___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce


RFC 6113 on A Generalized Framework for Kerberos Pre-Authentication

2011-04-20 Thread rfc-editor

A new Request for Comments is now available in online RFC libraries.


RFC 6113

Title:  A Generalized Framework for Kerberos 
Pre-Authentication 
Author: S. Hartman, L. Zhu
Status: Standards Track
Stream: IETF
Date:   April 2011
Mailbox:hartmans-i...@mit.edu, 
larry@microsoft.com
Pages:  48
Characters: 121122
Updates:RFC4120

I-D Tag:draft-ietf-krb-wg-preauth-framework-17.txt

URL:http://www.rfc-editor.org/rfc/rfc6113.txt

Kerberos is a protocol for verifying the identity of principals
(e.g., a workstation user or a network server) on an open network.
The Kerberos protocol provides a facility called pre-authentication.
Pre-authentication mechanisms can use this facility to extend the
Kerberos protocol and prove the identity of a principal.

This document describes a more formal model for this facility.  The
model describes what state in the Kerberos request a
pre-authentication mechanism is likely to change.  It also describes
how multiple pre-authentication mechanisms used in the same request
will interact.

This document also provides common tools needed by multiple
pre-authentication mechanisms.  One of these tools is a secure channel
between the client and the key distribution center with a reply key
strengthening mechanism; this secure channel can be used to protect
the authentication exchange and thus eliminate offline dictionary
attacks.  With these tools, it is relatively straightforward to chain
multiple authentication mechanisms, utilize a different key management
system, or support a new key agreement algorithm.  [STANDARDS-TRACK]

This document is a product of the Kerberos WG Working Group of the IETF.

This is now a Proposed Standard Protocol.

STANDARDS TRACK: This document specifies an Internet standards track
protocol for the Internet community,and requests discussion and suggestions
for improvements.  Please refer to the current edition of the Internet
Official Protocol Standards (STD 1) for the standardization state and
status of this protocol.  Distribution of this memo is unlimited.

This announcement is sent to the IETF-Announce and rfc-dist lists.
To subscribe or unsubscribe, see
  http://www.ietf.org/mailman/listinfo/ietf-announce
  http://mailman.rfc-editor.org/mailman/listinfo/rfc-dist

For searching the RFC series, see http://www.rfc-editor.org/rfcsearch.html.
For downloading RFCs, see http://www.rfc-editor.org/rfc.html.

Requests for special distribution should be addressed to either the
author of the RFC in question, or to rfc-edi...@rfc-editor.org.  Unless
specifically noted otherwise on the RFC itself, all RFCs are for
unlimited distribution.


The RFC Editor Team
Association Management Solutions, LLC


___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce


RFC 6169 on Security Concerns with IP Tunneling

2011-04-20 Thread rfc-editor

A new Request for Comments is now available in online RFC libraries.


RFC 6169

Title:  Security Concerns with IP Tunneling 
Author: S. Krishnan, D. Thaler,
J. Hoagland
Status: Informational
Stream: IETF
Date:   April 2011
Mailbox:suresh.krish...@ericsson.com, 
dtha...@microsoft.com, 
jim_hoagl...@symantec.com
Pages:  20
Characters: 45018
Updates/Obsoletes/SeeAlso:   None

I-D Tag:draft-ietf-v6ops-tunnel-security-concerns-04.txt

URL:http://www.rfc-editor.org/rfc/rfc6169.txt

A number of security concerns with IP tunnels are documented in this
memo.  The intended audience of this document includes network
administrators and future protocol developers.  The primary intent of this
document is to raise the awareness level regarding the security issues 
with IP tunnels as deployed and propose strategies for the mitigation of 
those issues.  [STANDARDS-TRACK]

This document is a product of the IPv6 Operations Working Group of the IETF.


INFORMATIONAL: This memo provides information for the Internet community.
It does not specify an Internet standard of any kind. Distribution of
this memo is unlimited.

This announcement is sent to the IETF-Announce and rfc-dist lists.
To subscribe or unsubscribe, see
  http://www.ietf.org/mailman/listinfo/ietf-announce
  http://mailman.rfc-editor.org/mailman/listinfo/rfc-dist

For searching the RFC series, see http://www.rfc-editor.org/rfcsearch.html.
For downloading RFCs, see http://www.rfc-editor.org/rfc.html.

Requests for special distribution should be addressed to either the
author of the RFC in question, or to rfc-edi...@rfc-editor.org.  Unless
specifically noted otherwise on the RFC itself, all RFCs are for
unlimited distribution.


The RFC Editor Team
Association Management Solutions, LLC


___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce


RFC 6197 on Location-to-Service Translation (LoST) Service List Boundary Extension

2011-04-20 Thread rfc-editor

A new Request for Comments is now available in online RFC libraries.


RFC 6197

Title:  Location-to-Service Translation (LoST) Service List 
Boundary Extension 
Author: K. Wolf
Status: Experimental
Stream: IETF
Date:   April 2011
Mailbox:karlheinz.w...@nic.at
Pages:  15
Characters: 27562
Updates/Obsoletes/SeeAlso:   None

I-D Tag:draft-ietf-ecrit-lost-servicelistboundary-05.txt

URL:http://www.rfc-editor.org/rfc/rfc6197.txt

Location-to-Service Translation (LoST) maps service identifiers and
location information to service contact URIs.  If a LoST client wants
to discover available services for a particular location, it will
perform a listServicesByLocation query to the LoST server.
However, the LoST server, in its response, does not provide context
information; that is, it does not provide any additional information
about the geographical region within which the returned list of
services is considered valid.  Therefore, this document defines a
Service List Boundary that returns a local context along with the
list of services returned, in order to assist the client in not
missing a change in available services when moving.  This document 
defines an Experimental Protocol for the Internet community.

This document is a product of the Emergency Context Resolution with Internet 
Technologies Working Group of the IETF.


EXPERIMENTAL: This memo defines an Experimental Protocol for the
Internet community.  It does not specify an Internet standard of any
kind. Discussion and suggestions for improvement are requested.
Distribution of this memo is unlimited.

This announcement is sent to the IETF-Announce and rfc-dist lists.
To subscribe or unsubscribe, see
  http://www.ietf.org/mailman/listinfo/ietf-announce
  http://mailman.rfc-editor.org/mailman/listinfo/rfc-dist

For searching the RFC series, see http://www.rfc-editor.org/rfcsearch.html.
For downloading RFCs, see http://www.rfc-editor.org/rfc.html.

Requests for special distribution should be addressed to either the
author of the RFC in question, or to rfc-edi...@rfc-editor.org.  Unless
specifically noted otherwise on the RFC itself, all RFCs are for
unlimited distribution.


The RFC Editor Team
Association Management Solutions, LLC


___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce


RFC 6213 on IS-IS BFD-Enabled TLV

2011-04-20 Thread rfc-editor

A new Request for Comments is now available in online RFC libraries.


RFC 6213

Title:  IS-IS BFD-Enabled TLV 
Author: C. Hopps, L. Ginsberg
Status: Standards Track
Stream: IETF
Date:   April 2011
Mailbox:cho...@cisco.com, 
ginsb...@cisco.com
Pages:  7
Characters: 15527
Updates/Obsoletes/SeeAlso:   None

I-D Tag:draft-ietf-isis-bfd-tlv-03.txt

URL:http://www.rfc-editor.org/rfc/rfc6213.txt

This document describes a type-length-value (TLV) for use in the
IS-IS routing protocol that allows for the proper use of the
Bidirectional Forwarding Detection (BFD) protocol.  There exist
certain scenarios in which IS-IS will not react appropriately to a
BFD-detected forwarding plane failure without use of either this TLV
or some other method.  [STANDARDS-TRACK]

This document is a product of the IS-IS for IP Internets Working Group of the 
IETF.

This is now a Proposed Standard Protocol.

STANDARDS TRACK: This document specifies an Internet standards track
protocol for the Internet community,and requests discussion and suggestions
for improvements.  Please refer to the current edition of the Internet
Official Protocol Standards (STD 1) for the standardization state and
status of this protocol.  Distribution of this memo is unlimited.

This announcement is sent to the IETF-Announce and rfc-dist lists.
To subscribe or unsubscribe, see
  http://www.ietf.org/mailman/listinfo/ietf-announce
  http://mailman.rfc-editor.org/mailman/listinfo/rfc-dist

For searching the RFC series, see http://www.rfc-editor.org/rfcsearch.html.
For downloading RFCs, see http://www.rfc-editor.org/rfc.html.

Requests for special distribution should be addressed to either the
author of the RFC in question, or to rfc-edi...@rfc-editor.org.  Unless
specifically noted otherwise on the RFC itself, all RFCs are for
unlimited distribution.


The RFC Editor Team
Association Management Solutions, LLC


___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce