Re: Last Call: draft-holsten-about-uri-scheme-06.txt (The 'about' URI scheme) to Proposed Standard

2011-06-15 Thread Mykyta Yevstifeyev

Hello Boris, all,

FYI, authors of draft-holsten-about-uri-scheme allowed me to become the 
co-author of this draft.  We got to your message.  The -07 is almost 
prepared for publication, but Lachlan pointed these comments were not 
addressed.  Let me express my opinion regarding them.


22.01.2011 7:02, Boris Zbarsky wrote:
There seem to be two differences between what the draft specifies 
right now and what Gecko, at least, does:


1) Section 5.3 says:

   Applications SHOULD resolve unrecognized about URIs in the
   same way as about:blank.

Gecko treats unknown about:* as unparseable URIs, and is not likely to 
change that behavior.  While that's allowed by the SHOULD, it's not 
clear to me why this is a SHOULD as opposed to a MAY, nor is it clear 
why this is present at all.  In particular, as specified this will 
cause situations where an empty resource is silently returned instead 
of a failure that the consumer can notice (e.g. in the DOM case via 
error event handlers and the like).
I don't think MAY is fine here, as this is a recommendation.  Moreover, 
as Gecko seems to be an only browser with such behavior, I don't think 
changing the Standards Track specification should mention/change this; 
as you noted, SHOULD is not a restriction.


2)  Section 6 says:

  For example, about:blank, about:blan%6B and about:blan%6b
  are equivalent

In Gecko they are not.  The string after ':' is treated as a literal 
string; when looking up a way to handle the URI the second and third 
URIs above are treated as unparseable by Gecko in its default 
configuration.  Changing this has some security implications that 
would require careful auditing of not only Gecko code but some 
specifications (e.g. HTML5 defines certain special-case security 
behavior for about:blank that's not obviously safe to apply to the 
other strings above).


The same section says:

  Similarly, about:blank%3F is not equivalent to about:blank?.

which I think is trying to explain by example that only unreserved 
characters need to be unescaped.  But that assumes an implementation 
of RFC 3986 which may or may not be the case in web browsers (and is 
NOT the case in Gecko, for example, for various web-compatibility 
reasons).  Unless there are very strong reasons for it, I would 
recommend that no normalization is performed on about: URIs, period.
The point of this comment is to propose abandoning normalization of 
'about' URIs because of some ad hoc behavior of an only application - 
Gecko.  The purpose of our draft is to give a stable specification of 
the scheme and normalize all existing types of behavior with regard to 
handling 'about' URIs.  It will be easier for Gecko to change its 
behavior rather than for other apps to do this.


Boris, could you please let me know whether you have some strong opinion 
regarding your January comments/insist on incorporating them in the draft.


Thanks,
Mykyta Yevstifeyev


-Boris
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf



___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-holsten-about-uri-scheme-06.txt (The 'about' URI scheme) to Proposed Standard

2011-06-15 Thread Julian Reschke

On 2011-06-15 11:07, Mykyta Yevstifeyev wrote:

...

2) Section 6 says:

For example, about:blank, about:blan%6B and about:blan%6b
are equivalent

In Gecko they are not. The string after ':' is treated as a literal
string; when looking up a way to handle the URI the second and third
URIs above are treated as unparseable by Gecko in its default
configuration. Changing this has some security implications that would
require careful auditing of not only Gecko code but some
specifications (e.g. HTML5 defines certain special-case security
behavior for about:blank that's not obviously safe to apply to the
other strings above).

The same section says:

Similarly, about:blank%3F is not equivalent to about:blank?.

which I think is trying to explain by example that only unreserved
characters need to be unescaped. But that assumes an implementation of
RFC 3986 which may or may not be the case in web browsers (and is NOT
the case in Gecko, for example, for various web-compatibility
reasons). Unless there are very strong reasons for it, I would
recommend that no normalization is performed on about: URIs, period.

The point of this comment is to propose abandoning normalization of
'about' URIs because of some ad hoc behavior of an only application -
Gecko. The purpose of our draft is to give a stable specification of the
scheme and normalize all existing types of behavior with regard to
handling 'about' URIs. It will be easier for Gecko to change its
behavior rather than for other apps to do this.
...


I agree that not treating them as equivalent is a bug.

That being said, if our Mozilla friends do not want to fix this it might 
be a good idea to warn readers that certain implementations fail to 
properly unescape, thus it's unwise to rely on that behavior (why would 
you anyway?).


Best regards, Julian
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


RE: one data point regarding native IPv6 support

2011-06-15 Thread Christian Huitema
From Noel analysis, it seems that a lot of the issues could be mitigated by a 
simple connectivity test. Have the 6to4 router perform a simple ping test 
through the tentative 6to4 relay, towards some well-known IPv6 host. Or an 
HTTP test, if we fear that ICMPv6 might be somehow tampered with.  If the test 
succeed, then it shows that the path to that 6to4 relay is clear of firewalls 
and other obstructions. If the path is not clear, pick another 6to4 relay, or 
do not enable 6to4.

Of course, this does not solve the problem of intermittent failures on the IPv4 
path to the relay, e.g. due to congestion. 

It also does not solve the problem of routers advertising an IPv6 route to 
2002::/16 and then failing to deliver the IPv4 packets. But this return 
problem is easily solved by IPv6 ISP deploying their own 6to4 routers, and thus 
avoiding dependencies on a generic path to 2002::/16.

-- Christian Huitema



___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-holsten-about-uri-scheme-06.txt (The 'about' URI scheme) to Proposed Standard

2011-06-15 Thread Mykyta Yevstifeyev

15.06.2011 13:13, Julian Reschke wrote:

On 2011-06-15 11:07, Mykyta Yevstifeyev wrote:

...

2) Section 6 says:

For example, about:blank, about:blan%6B and about:blan%6b
are equivalent

In Gecko they are not. The string after ':' is treated as a literal
string; when looking up a way to handle the URI the second and third
URIs above are treated as unparseable by Gecko in its default
configuration. Changing this has some security implications that would
require careful auditing of not only Gecko code but some
specifications (e.g. HTML5 defines certain special-case security
behavior for about:blank that's not obviously safe to apply to the
other strings above).

The same section says:

Similarly, about:blank%3F is not equivalent to about:blank?.

which I think is trying to explain by example that only unreserved
characters need to be unescaped. But that assumes an implementation of
RFC 3986 which may or may not be the case in web browsers (and is NOT
the case in Gecko, for example, for various web-compatibility
reasons). Unless there are very strong reasons for it, I would
recommend that no normalization is performed on about: URIs, period.

The point of this comment is to propose abandoning normalization of
'about' URIs because of some ad hoc behavior of an only application -
Gecko. The purpose of our draft is to give a stable specification of the
scheme and normalize all existing types of behavior with regard to
handling 'about' URIs. It will be easier for Gecko to change its
behavior rather than for other apps to do this.
...


I agree that not treating them as equivalent is a bug.

That being said, if our Mozilla friends do not want to fix this it 
might be a good idea to warn readers that certain implementations fail 
to properly unescape, thus it's unwise to rely on that behavior (why 
would you anyway?).
I fully agree with you, Julian.  I think we'll do certainly as you 
propose, unless Boris will provide some strong reasons to do in other way.


Mykyta


Best regards, Julian



___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: [v6ops] Last Call: draft-ietf-v6ops-6to4-to-historic-04.txt (Request to move Connection of IPv6 Domains via IPv4 Clouds (6to4) to Historic status) to Informational RFC

2011-06-15 Thread Lorenzo Colitti
On Tue, Jun 14, 2011 at 10:30 AM, james woodyatt j...@apple.com wrote:

 Very few of the people using 6to4 in this way will show up in Google's user
 behavior analysis, of course, because Google doesn't run its own 6to4
 return-path relay as I-D.ietf-v6ops-6to4-advisory recommends.


We would not see these users even if we operated reverse path relays as
recommended in the draft - from the point of view of the server, in both
cases it's just a TCP connection to a 2002::/16 address, regardless of
whether the relay is inside the Google network or outside it.

Those users would become visible if we added  records with 6to4
addresses, but that's a bad plan because it would likely lead to the
double-digit connection failure rates that Geoff observes. It would also
become visible if Google operated an open anycast relay, which we do not
plan to do.


 The way to find these people is to crawl the BitTorrent networks.  What's
 that old maxim?  You can't test what you don't measure.  Do you measure
 the BitTorrent networks?


No, we don't. The measurements we conduct have the purpose of determining
the impact of adding  records to web sites, so we don't measure the
population of users that has 6to4 but does not use it to make HTTP
connections to dual-stack websites. We do measure the impact of 6to4 on the
reliability of websites indirectly, e.g., by observing the difference
between OSes that prefer IPv4 over 6to4 and OSes that don't.

Also, is there a way we can put this debate to rest using real data? What if
we asked someone like Hurricane Electric how much traffic on their network
is native IPv6 vs. 6to4?

That said, I would argue that most or all 6to4 traffic could just as well
use IPv4, since both parties to the communication obviously have access to a
public IPv4 address. What is the advantage of using 6to4 over IPv4 that
makes it worth suffering an 80% failure rate?
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


RE: [IPsec] Last Call: draft-ietf-dime-ikev2-psk-diameter-06.txt (Diameter IKEv2 PSK: Pre-Shared Secret-based Support for IKEv2 Server to Diameter Server Interaction) to Proposed Standard

2011-06-15 Thread Cakulev, Violeta (Violeta)

Hi Yaron,
Thanks for the suggestions.
Please see inline.

-Violeta

-Original Message-
From: Yaron Sheffer [mailto:yaronf.i...@gmail.com]
Sent: Friday, June 03, 2011 4:32 PM
To: Cakulev, Violeta (Violeta)
Cc: ietf@ietf.org; IPsecme WG; d...@ietf.org; 
draft-ietf-dime-ikev2-psk-diame...@tools.ietf.org
Subject: Re: [IPsec] Last Call: draft-ietf-dime-ikev2-psk-diameter-06.txt 
(Diameter IKEv2 PSK: Pre-Shared Secret-based Support for IKEv2 Server to 
Diameter Server Interaction) to Proposed Standard

Hi Violeta,

thanks for your response.

I understand now where you're coming from. But the next person to read the 
document might not have the authors so readily available :-) Implementors need 
to understand the motivation for this solution as well as the missing pieces.
[VC] And the next person indeed had the same concern. Therefore, in v8 we made 
the changes as proposed below.


So I would suggest that you add:
- A short paragraph in the Introduction putting this document in perspective 
and referencing (non-normative references of course) the
3GGP2 documents.
- Another paragraph in the Security Considerations that says that 
generation/derivation of the PSK is security-critical, and provides the
3GPP2 docs again as an example of a solution to this problem.
[VC] Please see v8. We added statements both in Introduction and Security 
Considerations as proposed above.

Regarding usage of the SPI, the document says: Upon receiving the IKE_AUTH 
message from the IKEv2 Peer, the IKEv2 Server uses the information received in 
IDi *and the SPI* if available, to determine if it has the PSK for this IKEv2 
Peer.This sounds to me as if the SPI is used as part of the PSK lookup 
operation. Maybe the SPI should not be mentioned in the above text.
[VC] We modified this paragraph in v8. Please see v8.

Best regards,

 Yaron

On 06/01/2011 11:04 PM, Cakulev, Violeta (Violeta) wrote:
 Hi Yaron,
 Thanks for the comments.
 Please see inline [VC].

 -Violeta

 -Original Message-
 From: ipsec-boun...@ietf.org [mailto:ipsec-boun...@ietf.org] On Behalf
 Of Yaron Sheffer
 Sent: Sunday, May 22, 2011 2:38 PM
 To: ietf@ietf.org
 Cc: IPsecme WG; draft-ietf-dime-ikev2-psk-diame...@tools.ietf.og;
 d...@ietf.org
 Subject: Re: [IPsec] Last
 Call:draft-ietf-dime-ikev2-psk-diameter-06.txt  (Diameter IKEv2 PSK:
 Pre-Shared Secret-based Support for IKEv2 Server to Diameter Server
 Interaction) to Proposed Standard

 Hi,

 Having read this document only now, I think there's a number of serious 
 issues with it. This document was sent to the ipsec mailing list a while ago 
 but unfortunately got no review.

 Summary:
 1. I think the wrong architectural choice was made, in preferring PSK over 
 EAP authentication.
 2. There is not enough detail in the document to result in interoperable 
 implementations.
 [VC] Please see responses to detailed comments.

 Detailed comments:
 * The appropriate ref for IKEv2 is RFC 5996. This was actually noted in the 
 shepherd review back in March.
 [VC] This is fixed in v7.


 * The document notes that EAP is one of the authentication modes supported by 
 IKEv2. EAP is designed for interaction with backend AAA servers, and is quite 
 capable of performing shared-secret authentication, using a variety of EAP 
 methods (and see also RFC 5998, on IKEv2 mutual auth with EAP). Yet the 
 document does not explain why EAP is not used, instead preferring the IKE PSK 
 authentication method.
 [VC] Diameter application for Diameter client to server communication for 
 IKEv2 with EAP has been specified in RFC 5778. However, there is no Diameter 
 application specified for IKE PSK authentication method. This is stated in 
 the draft both in Abstract and Introduction. The draft does not recommend one 
 or the other, it is simply specifying what is not specified. It is up to a 
 specific use case to decide what to use. For example 3GPP2 decided to use 
 IKEv2 PSK (in 2 of its specifications), and that is what triggered this 
 effort in IETF.


 * 4.1: how can the incoming SPI be used to identify the peer?
 [VC] As stated in Section 4.1 IDi payload is extracted from the IKE_AUTH 
 message and this payload 'MUST contain an identity that is meaningful
 for the Diameter infrastructure, such as a Network Access Identifier 
 (NAI), since it is used by the IKEv2 Server to populate the User-Name
 AVP in the Diameter message'. SPI is not used to identify the peer.


 * Packing additional semantics into SPI may conflict with elements of the 
 IPsec architecture (see for example Sec. 9.3 of 
 draft-ietf-ipsecme-failure-detection-08).
 [VC] Agreed.


 * 4.1, 2nd paragraph: generation of the PSK is central to this solution, so 
 it cannot be outside the scope of the document. There is no way to 
 interoperate otherwise.
 [VC] This draft focuses on IKEv2 server, as a Diameter client, to the 
 Diameter server communication for IKEv2 with pre-
 shared secret based authentication, and specifies Diameter 

RE: Gen-ART LC review of draft-ietf-dime-ikev2-psk-diameter-07

2011-06-15 Thread Cakulev, Violeta (Violeta)

Ben,
Thanks for the comments.
Please see inline [VC].

-Violeta

-Original Message-
From: Ben Campbell [mailto:b...@nostrum.com]
Sent: Friday, June 03, 2011 4:10 PM
To: draft-ietf-dime-ikev2-psk-diameter@tools.ietf.org; gen-...@ietf.org 
Review Team
Cc: The IETF
Subject: Gen-ART LC review of draft-ietf-dime-ikev2-psk-diameter-07

I am the assigned Gen-ART reviewer for this draft. For background on Gen-ART, 
please see the FAQ at http://wiki.tools.ietf.org/area/gen/trac/wiki/GenArtfaq.

Please resolve these comments along with any other Last Call comments you may 
receive.

Document: draft-ietf-dime-ikev2-psk-diameter-07
Reviewer: Ben Campbell
Review Date: 2011-06-03
IETF LC End Date: 2011-06-03


Summary:

This draft is almost ready for publication as a proposed standard. I have a 
question concerning the procedure for generating PSKs, and a number of minor 
and editorial comments.


Major issues:

The draft says that the procedure that the HAAA follows to generate the PSK is 
out of scope. But doesn't the IKE2 initiator need to understand the procedure? 
If the procedure is not defined somewhere, how you achieve any degree of 
interoperability?
[VC] Indeed the IKEv2 initiator needs to understand the procedure. However, 
this draft focuses on IKEv2 server, as a Diameter client, to the Diameter 
server communication for IKEv2 with pre-shared key based authentication, and 
specifies Diameter application for this communication. It is left to 
specifications that make use of this Diameter application to specify where the 
PSK comes from and how it is generated. There are two 3GPP2 specs that make use 
of this Diameter application and both of those specs specify generation of the 
PSK. Statements to clarify this are added in v8.


Minor issues:

-- section 4.1, 1st paragraph:The IDi payload extracted from the IKE_AUTH 
message MUST contain an identity that is meaningful for the Diameter 
infrastructure, such as a Network Access Identifier (NAI), since it is used by 
the IKEv2 Server to populate the User-Name AVP in the Diameter message. 

Do you mean that as a normative MUST, or a statement of fact? If normative, 
isn't that a requirement on the initiator?
[VC] Good point. It is changed to statement of fact in v8.

-- section 10:

The security considerations should describe the threat models. We're talking 
about requesting an authentication key from a third party, which is tricky from 
a security perspective. Does the PSK have greater security concerns than for 
Diameter AVPs in general? In particular, what are the consequences if the PSK 
is disclosed or tampered with?
[VC] If the PSK is disclosed to an adversary then it would present a security 
breach.  Hence we recommend that the PSK be short-lived.  As well,
the assumption is that the IKEv2 Server and the Diameter Server where the PSK 
is generated are in a trusted relationship. They may be in the same 
Administrative domain (typical case) or third party but nevertheless there is a 
trust relationship between them.  As such we assume that there is an 
appropriate security mechanism to protect the communication between these 
servers.  For example the IKEV2 Server and the Diameter server would be 
deployed in the same secure network or would utilize transport layer security 
as specified by Diameter 3588 specification. We added statements in v8 to 
reflect this.

-- section 10, 1st paragraph: Furthermore, any agents that process 
IKEv2-PSK-Answer messages can see the contents of the Key AVP. For this reason, 
this specification strongly recommends avoiding Diameter agents when they 
cannot be trusted to keep the keys secret.

Should that be normative? Is there no way to protect the PSK AVP from diameter 
agents? E.g. can it be encrypted?
[VC] It is hard to use normative text here as this application can be used for 
many uses cases. Depending on the use case it may be possible to encrypt the 
PSK, however it is not possible to make it a requirement.

-- section 10, 2nd paragraph: this specification also recommends the use of 
nonces included in IKEv2-PSK-Request.

Actually, the spec requires it using a normative SHALL.
[VC] In v8 it is aligned as 'recommended' throughout the document.


Nits/editorial comments:

-- IDNits reports an out-of-date reference
[VC] I missed this one in v8. This will be fixed in v9.

-- Section 1, general:

It's probably worth elaborating that we are talking about a PSK used during the 
IKEv2 authentication process, which is distinct from any shared secrets 
negotiated by IKE for use in the resulting SA.
[VC] In v8 there are statements clarifying that it is a PSK used for IKEv2 
authentication.


-- Section 1, paragraph 1, 1st sentence:

The use, and lack of, commas in this sentence is confusing. It's easy to parse 
as saying IKE2 is a protocol and a set of algorithms, when I think you meant to 
say that the resulting SA has a set of algorithms along with the shared secret.
[VC] Changed in v8 to 'The Internet Key 

Re: [v6ops] Last Call: draft-ietf-v6ops-6to4-to-historic-04.txt (Request to move Connection of IPv6 Domains via IPv4 Clouds (6to4) to Historic status) to Informational RFC

2011-06-15 Thread Erik Kline
The youtube folks made the decision to leave the video-serving
hostnames available in blacklist-mode, meaning only very broken
networks won't get s.

This is being watched, and could easily change back.  The exact policy
for blacklisting has yet to be fully formalized.

But re: 6to4 in this case, it still gains you nothing you didn't
already have while risking randomly crappy performance.
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: [v6ops] Last Call: draft-ietf-v6ops-6to4-to-historic-04.txt (Request to move Connection of IPv6 Domains via IPv4 Clouds (6to4) to Historic status) to Informational RFC

2011-06-15 Thread Mark Smith
On Tue, 14 Jun 2011 10:59:47 -0700
Lorenzo Colitti lore...@google.com wrote:

 On Tue, Jun 14, 2011 at 10:30 AM, james woodyatt j...@apple.com wrote:
 
  Very few of the people using 6to4 in this way will show up in Google's user
  behavior analysis, of course, because Google doesn't run its own 6to4
  return-path relay as I-D.ietf-v6ops-6to4-advisory recommends.
 
 
 We would not see these users even if we operated reverse path relays as
 recommended in the draft - from the point of view of the server, in both
 cases it's just a TCP connection to a 2002::/16 address, regardless of
 whether the relay is inside the Google network or outside it.
 
 Those users would become visible if we added  records with 6to4
 addresses, but that's a bad plan because it would likely lead to the
 double-digit connection failure rates that Geoff observes. It would also
 become visible if Google operated an open anycast relay, which we do not
 plan to do.
 

I don't know if it is intentional, however if I use Google's public
8.8.8.8 and 8.8.4.4 resolvers, and prefer 6to4 over native IPv4
(via /etc/gai.conf under Linux/glibc), it seems that the video content
of all youtube videos is now being delivered over IPv6. The same thing
happens if I use my ISP's resolvers - I know they're doing IPv6 work
behind the scenes, however I don't know but dont think their
resolvers are Google whitelisted. That suggests that if there are hosts
out there that blindly prefer tunnelled IPv6 over native IPv4, and
have 6to4 available, there is a likelyhood that more people are using
6to4 now than there was before World IPv6 day.

I'm having no performance problems at all with any videos I
select, including 1080P ones.


 
  The way to find these people is to crawl the BitTorrent networks.  What's
  that old maxim?  You can't test what you don't measure.  Do you measure
  the BitTorrent networks?
 
 
 No, we don't. The measurements we conduct have the purpose of determining
 the impact of adding  records to web sites, so we don't measure the
 population of users that has 6to4 but does not use it to make HTTP
 connections to dual-stack websites. We do measure the impact of 6to4 on the
 reliability of websites indirectly, e.g., by observing the difference
 between OSes that prefer IPv4 over 6to4 and OSes that don't.
 
 Also, is there a way we can put this debate to rest using real data? What if
 we asked someone like Hurricane Electric how much traffic on their network
 is native IPv6 vs. 6to4?
 
 That said, I would argue that most or all 6to4 traffic could just as well
 use IPv4, since both parties to the communication obviously have access to a
 public IPv4 address. What is the advantage of using 6to4 over IPv4 that
 makes it worth suffering an 80% failure rate?

I'm having and have been having 100% success rate (or near enough to it
that I can remember) using 6to4 for a number of years, including with
an IPv6 MTU of as large as my PPPoE connection will support i.e. my
6to4 tunnel has an IPv6 MTU of 1472. Since noticing that youtube videos
are coming over IPv6, I've paid a bit more attention to the quality of
experience I've had, and have not found any reasons to change my
preference back to native IPv4 instead of 6to4.
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: [v6ops] Last Call: draft-ietf-v6ops-6to4-to-historic-04.txt (Request to move Connection of IPv6 Domains via IPv4 Clouds (6to4) to Historic status) to Informational RFC

2011-06-15 Thread Mark Smith
On Tue, 14 Jun 2011 16:05:33 -0700
Erik Kline e...@google.com wrote:

 The youtube folks made the decision to leave the video-serving
 hostnames available in blacklist-mode, meaning only very broken
 networks won't get s.
 
 This is being watched, and could easily change back.  The exact policy
 for blacklisting has yet to be fully formalized.
 
 But re: 6to4 in this case, it still gains you nothing you didn't
 already have while risking randomly crappy performance.

A less used content cache could give me better performance. Not that it
has happened recently, however in the past there have been IPv4
delivered performance issues with youtube here in .au. That's the
reason I've paid a bit more attention to the quality of IPv6 delivery
and tried 1080P videos when they've been available.

Regards,
Mark.
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Liaison and request for review of ITU-T document

2011-06-15 Thread Ralph Droms
Brian - thanks for your review and comments.

- Ralph

On Jun 10, 2011, at 10:45 PM 6/10/11, Brian E Carpenter wrote:

 Ralph,
 
 As far as I can tell this seems to describe some sort of a Layer 2 stateful
 per-flow QoS mechanism using new Ethertype headers. As such I don't see why
 the IETF would care. The point of it escapes me, since we have plenty of 
 reason
 to believe that such solutions are impractical and do not scale, but that 
 doesn't
 seem like our problem.
 
 I only looked at this to check if it impacted current work in 6MAN on
 the IPv6 Flow Label, and there doesn't appear to be any impact or relevance.
 
 Regards
   Brian Carpenter
 
 On 2011-06-08 08:27, Ralph Droms wrote:
 The IETF has recently received a liaison from ITU-T Q5/SG-11 regarding a 
 Draft Recommendation.  That liaison is available as 
 https://datatracker.ietf.org/liaison/1054/.  The official liaison is 
 available at https://datatracker.ietf.org/documents/LIAISON/file1232.pdf.
 
 The liaison asks for IETF review of Draft Recommendation Signalling 
 protocols and procedures relating to Flow State Aware QoS control in a 
 bounded sub-network of a NGN, which is available at 
 https://datatracker.ietf.org/documents/LIAISON/file1231.pdf.  This note 
 opens an IETF comment period on the document, ending midnight, anywhere on 
 earth, 2011/7/5.  After the comment period, a summary will be prepared and 
 returned in a liaison to ITU-T Q5/SG-11.
 
 Of specific interest to the IETF are any ways in which the signalling 
 protocols and procedures defined in the Draft Recommendation might interact 
 with existing IETF Internet protocols.  We are especially interested in 
 potential adverse interactions or interference with IETF Internet protocols. 
  The technical merits of the signalling protocols and procedures defined 
 in the Draft Recommendation are of interest inasmuch as the IETF community 
 might provide technical advice and recommendations to improve the Draft 
 Recommendation itself.
 
 Please respond with any comments on the Draft Recommendation to 
 ietf@ietf.org.  Thanks in advance for your review of the Draft 
 Recommendation.
 
 - Ralph Droms, Internet Area Director
  for the IESG
 
 
 ___
 Ietf mailing list
 Ietf@ietf.org
 https://www.ietf.org/mailman/listinfo/ietf
 

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: [Gen-art] Gen-ART LC review of draft-ietf-dime-ikev2-psk-diameter-07

2011-06-15 Thread Avi Lior
Hi Ben,

Please see inline...

-- Avi Lior
--Bridgewater Systems



eview Date: 2011-06-03
 IETF LC End Date: 2011-06-03
 
 
 Summary:
 
 This draft is almost ready for publication as a proposed standard. I
have a question concerning the procedure for generating PSKs, and a
number of minor and editorial comments.
 
 
 Major issues:
 
 The draft says that the procedure that the HAAA follows to generate the
PSK is out of scope. But doesn't the IKE2 initiator need to understand
the procedure? If the procedure is not defined somewhere, how you
achieve any degree of interoperability?
 [VC] Indeed the IKEv2 initiator needs to understand the procedure.
However, this draft focuses on IKEv2 server, as a Diameter client, to
the Diameter server communication for IKEv2 with pre-shared key based
authentication, and specifies Diameter application for this
communication. It is left to specifications that make use of this
Diameter application to specify where the PSK comes from and how it is
generated. There are two 3GPP2 specs that make use of this Diameter
application and both of those specs specify generation of the PSK.
Statements to clarify this are added in v8.

The effect of this is that this spec, as written, cannot be implemented
in an interoperable way. I don't think that meets the usual expectations
for a proposed standard. Now, I realize there are some situations where
the IETF has chosen this approach, and deliberately created a standards
track RFC that must be profiled for actual use--but hopefully that's the
exception rather than the rule.  I guess it's up to the IESG to decide if
that is reasonable in this instance. (I'm explicitly not counting
situations where the IETF puts out a standard as a series of modular
RFCs, since I gather there's no immediate intent to publish PSK
generation RFCs.)

Additionally, whether or not PSK generation mechanisms are specified in
the IETF vs somewhere else, how does an implementation (that might
support more than one such mechanism) know which to use for any given SA?
Is there a negotiation mechanism?

I agree with your comments in general. What we need to keep in mind though
is the intent of this draft, which is to deliver the PSK key to the IKEv2
server.  The issues you discuss relating to PSK are issues that are there
with or without this document.  The document uses all the information that
is available in IKEv2 to fetch that PSK and to allow a PSK to be derived
(via the nonces).  



 
 
 Minor issues:
 

[...]

[...]

 
 -- section 10, 1st paragraph: Furthermore, any agents that process
IKEv2-PSK-Answer messages can see the contents of the Key AVP. For this
reason, this specification strongly recommends avoiding Diameter agents
when they cannot be trusted to keep the keys secret.
 
 Should that be normative? Is there no way to protect the PSK AVP from
diameter agents? E.g. can it be encrypted?
 [VC] It is hard to use normative text here as this application can be
used for many uses cases. Depending on the use case it may be possible
to encrypt the PSK, however it is not possible to make it a requirement.

I don't see why a SHOULD or RECOMMENDED would cause problems here,
along with some short explanation of why it might not always be possible.
Otherwise, the text says strongly recommends, when, without normative
text, such recommendation is really pretty weak.

I may be okay with using stronger terms (SHOULD or RECOMMEND).  I actually
wish now that this entire paragraph be deleted. The reason being is that
the security issues relating to multi-hop Diameter communication is well
understood and documented in 3588 (and we already make a reference to that
document).  I don't see a need for recommendation.

[...]

 Nits/editorial comments:
 

[...]

 -- section 8, first paragraph: whether the AVP MAY be encrypted.
 
 I don't see anything about encryption in the table.
 [VC] The text referring to encryption is deleted.
 

So how does an implementor know if it can be encrypted?

We used an old style of table which is not really used.  There is no end
to end encryption mechanisms in Diameter.  And Diameter provides transport
level security (integrity and privacy protection).  If the end to end
encryption that is between the Diameter Client (IKEv2 Server) and the
Diameter Server (where the PSK is stored/generated) is needed it would
have to be built on-top of this document - so the implementor will know.


[...]

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-holsten-about-uri-scheme-06.txt (The 'about' URI scheme) to Proposed Standard

2011-06-15 Thread Andrew Sullivan
On Wed, Jun 15, 2011 at 06:05:33PM +0300, Mykyta Yevstifeyev wrote:
 15.06.2011 13:13, Julian Reschke wrote:

 That being said, if our Mozilla friends do not want to fix this it
 might be a good idea to warn readers that certain implementations
 fail to properly unescape, thus it's unwise to rely on that
 behavior (why would you anyway?).
 I fully agree with you, Julian.  I think we'll do certainly as you
 propose, unless Boris will provide some strong reasons to do in
 other way.

If I am reading the document and the above correctly, then you are
proposing the following:

1.  The document proposes to make standard rules about what
applications do with input that is, by definition, completely
internal to that application; and,

2.  You propose in addition to state what is the standard, but
note that nobody should rely on it because one of the largest
implementers of the scheme doesn't follow the supposed standard.

Do I have this correct?  If so, I would like to request that the
WINDMILL or perhaps TILT WG be chartered to deal with this manner of
work.

More substantively, I fail to understand how this specification
proposes to create a class of reserved about: URIs when the about:
scheme seems to be internal information to an application.  I think
the Security Considerations section doesn't address any of that, and
probably ought to, particularly in light of the proposal to add text
that users ought not to depend on standard behaviour.  

Best,

A

-- 
Andrew Sullivan
a...@anvilwalrusden.com
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: [v6ops] Last Call: draft-ietf-v6ops-6to4-to-historic-04.txt (Request to move Connection of IPv6 Domains via IPv4 Clouds (6to4) to Historic status) to Informational RFC

2011-06-15 Thread Keith Moore
On Jun 14, 2011, at 1:59 PM, Lorenzo Colitti wrote:

 That said, I would argue that most or all 6to4 traffic could just as well use 
 IPv4, since both parties to the communication obviously have access to a 
 public IPv4 address. What is the advantage of using 6to4 over IPv4 that makes 
 it worth suffering an 80% failure rate?


it can communicate with hosts that have only IPv6,
it can communicate with hosts that are stuck behind a single IPv4 address (if 
the router acts as a 6to4 gateway) without a NAT being in the way,
it can be used to develop and test IPv6 applications without having to build a 
special-purpose network,
it can be used to deploy applications now that already support IPv6 and so are 
in some sense future-proofed,
it can be deployed on either a single host or a network

again, trying to judge how well 6to4 works by how well it works with web sites 
that also support IPv4 is entirely missing the point.

Keith


___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: [v6ops] Last Call: draft-ietf-v6ops-6to4-to-historic-04.txt (Request to move Connection of IPv6 Domains via IPv4 Clouds (6to4) to Historic status) to Informational RFC

2011-06-15 Thread Keith Moore

On Jun 15, 2011, at 7:10 PM, Lorenzo Colitti wrote:

 On Wed, Jun 15, 2011 at 3:58 PM, Keith Moore mo...@network-heretics.com 
 wrote:
  That said, I would argue that most or all 6to4 traffic could just as well 
  use IPv4, since both parties to the communication obviously have access to 
  a public IPv4 address. What is the advantage of using 6to4 over IPv4 that 
  makes it worth suffering an 80% failure rate?
 
 
 it can communicate with hosts that have only IPv6,
 it can communicate with hosts that are stuck behind a single IPv4 address (if 
 the router acts as a 6to4 gateway) without a NAT being in the way,
 it can be used to develop and test IPv6 applications without having to build 
 a special-purpose network,
 it can be used to deploy applications now that already support IPv6 and so 
 are in some sense future-proofed,
 it can be deployed on either a single host or a network
 
 ... about 80% of the time.

A single figure doesn't really describe the situation.   The successes/failures 
aren't independent of one another.  It's not that you get only an 80% 
probability of things working on every connection.  It's more like, it either 
works fairly well for what you need it to do, or it doesn't.

Again, don't assume that this is like the web and the connections are mostly 
client-to-server, or one source to large numbers of different destinations.

 I would argue that cases 1, 3, 4, 5, and 6 can be solved more reliably using 
 configured tunnels,

There are lots of different tunneling methods each with strengths and 
weaknesses.   What you probably do in practice is try one, and if that doesn't 
work for your purposes, try another.  6to4 is very easy to try, and it often 
works. 

Keith

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


IETF Fellowship Announcement (IETF 82 and 83)

2011-06-15 Thread Steve Conte
Dear Colleagues,

The Internet Society has announced that it is inviting applications for its 
latest Internet Society Fellowships to the IETF, part of its Next Generation 
Leaders (NGL) programme (www.InternetSociety.org/Leaders). The Fellowship 
programme allows engineers from developing countries to attend an Internet 
Engineering Task Force (IETF) meeting.

As you know, the IETF is the Internet's premier standards-making body, 
responsible for the development of protocols used in IP-based networks. IETF 
participants represent an international community of network designers, 
operators, vendors, and researchers involved in the technical operation of the 
Internet and the continuing evolution of Internet architecture.

Fellowships will be awarded through a competitive application process. The 
Internet Society is currently accepting fellowship applications for the next 
two IETF meetings:

* IETF 82, 13 - 18 Nov 2011, Taipei, TW
* IETF 83, 25 - 30 March, Paris, FR

http://www.isoc.org/educpillar/fellowship/index.php

Fellowship applications for both IETF meetings are due by 15 July 2011.

Please note that this fellowship is aimed at individuals from developing 
regions that possess a solid level of technical education and enough knowledge 
about concrete areas of IETF work to follow and benefit from the meeting’s 
technical discussions. 

I encourage you to pass on information about this program to individuals 
involved in your network that have a keen interest in the Internet 
standardisation activities of the IETF.

The Internet Society Fellowships to the IETF are sponsored by Afilias, Google, 
Microsoft, and Intel.

The Internet Society’s Next Generation Leaders programme is sponsored by 
Nominet Trust, the Association Française pour le Nommage Internet en 
Coopération (AFNIC), SIDN, and the European Commission.

If you have questions, please do not hesitate to contact Steve Conte 
conte[at]isoc[dot]org.

Kind Regards,
Steve Conte
Internet Society
-
Steve Conte
co...@isoc.org



___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: one data point regarding native IPv6 support

2011-06-15 Thread Mark Andrews

In message 22f6318e46e26b498abc828879b08d4f16f...@tk5ex14mbxw653.wingroup.wind
eploy.ntdev.microsoft.com, Christian Huitema writes:
 From Noel analysis, it seems that a lot of the issues could be mitigated by=
  a simple connectivity test. Have the 6to4 router perform a simple ping tes=
 t through the tentative 6to4 relay, towards some well-known IPv6 host. Or a=
 n HTTP test, if we fear that ICMPv6 might be somehow tampered with.  If the=
  test succeed, then it shows that the path to that 6to4 relay is clear of f=
 irewalls and other obstructions. If the path is not clear, pick another 6to=
 4 relay, or do not enable 6to4.
 
 Of course, this does not solve the problem of intermittent failures on the =
 IPv4 path to the relay, e.g. due to congestion.

But happy-eyeballs does mostly solve that problem.  If the path is
congested and dropping packets then the IPv6 connect will likely
not succeed before the IPv4 connect succeeds.  happy-eyeballs also
deals with relay routers that are topologically bad for the destination
machines which are dual stack.

 It also does not solve the problem of routers advertising an IPv6 route to =
 2002::/16 and then failing to deliver the IPv4 packets. But this return p=
 roblem is easily solved by IPv6 ISP deploying their own 6to4 routers, and t=
 hus avoiding dependencies on a generic path to 2002::/16.
 
 -- Christian Huitema
-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742 INTERNET: ma...@isc.org
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: [v6ops] Last Call: draft-ietf-v6ops-6to4-to-historic-04.txt (Request to move Connection of IPv6 Domains via IPv4 Clouds (6to4) to Historic status) to Informational RFC

2011-06-15 Thread Mark Andrews

In message BANLkTi=ggay2u0sx54hnv7bz7qdgrajz9h+8rwhmwkjk+9s...@mail.gmail.com
, Lorenzo Colitti writes:
 On Wed, Jun 15, 2011 at 3:58 PM, Keith Moore mo...@network-heretics.comwrot
 e:
 
   That said, I would argue that most or all 6to4 traffic could just as well
  use IPv4, since both parties to the communication obviously have access to 
 a
  public IPv4 address. What is the advantage of using 6to4 over IPv4 that
  makes it worth suffering an 80% failure rate?
 
 
  it can communicate with hosts that have only IPv6,
  it can communicate with hosts that are stuck behind a single IPv4 address
  (if the router acts as a 6to4 gateway) without a NAT being in the way,
  it can be used to develop and test IPv6 applications without having to
  build a special-purpose network,
  it can be used to deploy applications now that already support IPv6 and so
  are in some sense future-proofed,
  it can be deployed on either a single host or a network
 
 ... about 80% of the time.

Or 99.999% of the time once you get it setup.  The problem isn't 6to4, it's
*automatic* 6to4.
 
 I would argue that cases 1, 3, 4, 5, and 6 can be solved more reliably using
 configured tunnels, and that case 2 is today solved more reliably, and in
 more cases (e.g., when no public IPv4 address is available at the border) by
 the various NAT traversal mechanisms that are implemented in applications.
 But I think we're just going around in circles here.
 
Which often times requires special software to be installed.  Tunnels
are a lot more hassle to setup and yes I've used both so I know.

6to4 historic is throwing the baby out with the bath water.

Mark
-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742 INTERNET: ma...@isc.org
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: [v6ops] Last Call: draft-ietf-v6ops-6to4-to-historic-04.txt (Request to move Connection of IPv6 Domains via IPv4 Clouds (6to4) to Historic status) to Informational RFC

2011-06-15 Thread Sabahattin Gucukoglu
On 14 Jun 2011, at 18:59, Lorenzo Colitti wrote:
 On Tue, Jun 14, 2011 at 10:30 AM, james woodyatt j...@apple.com wrote:
 Very few of the people using 6to4 in this way will show up in Google's user
 behavior analysis, of course, because Google doesn't run its own 6to4
 return-path relay as I-D.ietf-v6ops-6to4-advisory recommends.
 
 We would not see these users even if we operated reverse path relays as
 recommended in the draft - from the point of view of the server, in both
 cases it's just a TCP connection to a 2002::/16 address, regardless of
 whether the relay is inside the Google network or outside it.

Running the relay inside your network lets you correlate the failure rate you 
observe to the direction of the path the failures occur in, though.  That data 
may be valuable to you.  And since it's HTTP we're talking about, it might be a 
consolation to know that it's your side of the network generating the most 
traffic.

 Those users would become visible if we added  records with 6to4
 addresses, but that's a bad plan because it would likely lead to the
 double-digit connection failure rates that Geoff observes. It would also
 become visible if Google operated an open anycast relay, which we do not
 plan to do.

Your (Google's) problem is the relays.  So, if we take this thought a step 
further, by deploying (no, I'm not suggesting you do this, obviously) a 
6to4-reachable presence you may actually reduce the total traffic by volume 
reaching you over native IPv6, if it transpires that 6to4 is a good portion of 
the majority of tunnel traffic, the vast majority of IPv6 traffic reaching you. 
 That's not to speak of address selection algorithms which would do the right 
thing (in theory) given the choice of native or 6to4, of course.

 The way to find these people is to crawl the BitTorrent networks.  What's
 that old maxim?  You can't test what you don't measure.  Do you measure
 the BitTorrent networks?
 
 No, we don't. The measurements we conduct have the purpose of determining
 the impact of adding  records to web sites, so we don't measure the
 population of users that has 6to4 but does not use it to make HTTP
 connections to dual-stack websites. We do measure the impact of 6to4 on the
 reliability of websites indirectly, e.g., by observing the difference
 between OSes that prefer IPv4 over 6to4 and OSes that don't.

That's a real shame, because the use of peer-to-peer applications is a solid 
reason to turn various tunnel techniques on.  One popular Windows BitTorrent 
client makes it a single-button operation; others simply take the IPv6 
connectivity for granted, when available.  See:
http://thepiratebay.org/blog/146

 Also, is there a way we can put this debate to rest using real data? What if
 we asked someone like Hurricane Electric how much traffic on their network
 is native IPv6 vs. 6to4?

I agree, this would be a good thing.

 That said, I would argue that most or all 6to4 traffic could just as well
 use IPv4, since both parties to the communication obviously have access to a
 public IPv4 address. What is the advantage of using 6to4 over IPv4 that
 makes it worth suffering an 80% failure rate?

Others have beaten me to this one but I will say one thing in your favour: NAT 
traversal techniques are ubiquitous and, curse them, actually fairly 
transparent.  This is probably a good thing and it does support your view that 
at least in the case of BitTorrent or other vanilla address-neutral protocols 
the end-user transparency really doesn't usually justify the added tunnels for 
v4-to-v4 communication, regardless of technical impropriety.  However this does 
nothing to address other real concerns, most of them brought up by Keith 
already.  Most importantly, new protocols or uses of the Internet shouldn't be 
sabotaged by the need for some sort of imaginary all-or-nothing transition to 
IPv6.

One final thought: assuming we ever get to the stage of minority native IPv6 
worth service providers' time to set up IPv6 reachability for, and not just the 
big ones either, what exactly do all the tunnel brokers of the world do about 
the sudden demand for their services?

Cheers,
Sabahattin
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-ietf-dkim-rfc4871bis-12.txt (DomainKeys Identified Mail (DKIM) Signatures) to Draft Standard

2011-06-15 Thread John Levine
In article 20110615213858.9853.22165.idtrac...@ietfa.amsl.com you write:

The IESG has received a request from the Domain Keys Identified Mail WG
(dkim) to consider the following document:
- 'DomainKeys Identified Mail (DKIM) Signatures'
  draft-ietf-dkim-rfc4871bis-12.txt as a Draft Standard

I've reviewed this document, indeed my fingerprints are all over it.

It's definitely an improvement to 4871: folds in the errata, takes out
a lot of gratuitous and often wrong non-normative advice, cleans up
the 2119 MUSTage, and otherwise improves the text.  Except for the one
obscure feature that is deprecated due to lack of use, I think that
any implementation that is compliant with 4871+errata should still be
compliant with this draft.

R's,
John
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Last Call: draft-burgin-ipsec-suiteb-profile-00.txt (Suite B Profile for Internet Protocol Security (IPsec)) to Informational RFC

2011-06-15 Thread The IESG

The IESG has received a request from an individual submitter to consider
the following document:
- 'Suite B Profile for Internet Protocol Security (IPsec)'
  draft-burgin-ipsec-suiteb-profile-00.txt as an Informational RFC

The IESG plans to make a decision in the next few weeks, and solicits
final comments on this action. Please send substantive comments to the
i...@ietf.org mailing lists by 2011-07-13. Exceptionally, comments may be
sent to i...@ietf.org instead. In either case, please retain the
beginning of the Subject line to allow automated sorting.

Abstract


The United States Government has published guidelines for NSA
Suite B Cryptography dated July, 2005, which defines cryptographic
algorithm policy for national security applications.  This document
specifies the conventions for using Suite B cryptography in IP 
Security (IPsec).



The file can be obtained via
http://datatracker.ietf.org/doc/draft-burgin-ipsec-suiteb-profile/

IESG discussion can be tracked via
http://datatracker.ietf.org/doc/draft-burgin-ipsec-suiteb-profile/


The following IPR Declarations may be related to this I-D:

   http://datatracker.ietf.org/ipr/1500/



___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce


Protocol Action: 'The SSL Protocol Version 3.0' to Historic (draft-mavrogiannopoulos-ssl-version3-06.txt)

2011-06-15 Thread The IESG
The IESG has approved the following document:
- 'The SSL Protocol Version 3.0'
  (draft-mavrogiannopoulos-ssl-version3-06.txt) as a Historic

This document has been reviewed in the IETF but is not the product of an
IETF Working Group.

The IESG contact person is Sean Turner.

A URL of this Internet Draft is:
http://datatracker.ietf.org/doc/draft-mavrogiannopoulos-ssl-version3/




Technical Summary

   This document specifies Version 3.0 of the Secure Sockets Layer
   (SSL V3.0) protocol, a security protocol that provides communications
   privacy over the Internet.  The protocol allows client/server
   applications to communicate in a way that is designed to prevent
   eavesdropping, tampering, or message forgery.

Working Group Summary

   The document was proposed to be published as a TLS WG item, but
   the consensus to the discussion was that the WG was not needed
   to publish a Historic document.

Document Quality

   The document describes the SSL 3.0 protocol which is widely
   implemented by various vendors.

Personnel

   Nikos Mavrogiannopoulos is the Document Shepherd.
   Sean Turner is the Area Director.

RFC Editor Note

  Please retain the Foreword section.

  Please add the following to the beginning of the Abstract:

This document is published as a historical record
of the SSL v3.0  protocol.  The original Abstract follows.
___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce


Last Call: draft-law-rfc4869bis-01.txt (Suite B Cryptographic Suites for IPsec) to Informational RFC

2011-06-15 Thread The IESG

The IESG has received a request from an individual submitter to consider
the following document:
- 'Suite B Cryptographic Suites for IPsec'
  draft-law-rfc4869bis-01.txt as an Informational RFC

The IESG plans to make a decision in the next few weeks, and solicits
final comments on this action. Please send substantive comments to the
i...@ietf.org mailing lists by 2011-07-13. Exceptionally, comments may be
sent to i...@ietf.org instead. In either case, please retain the
beginning of the Subject line to allow automated sorting.

Abstract


This document proposes four cryptographic user interface suites 
  (UI suites) for IPsec, similar to the two suites specified in
  RFC 4308.  The four new suites provide compatibility with the United
  States National Security Agency's Suite B specifications.  This
  document obsoletes RFC 4869, which presented earlier versions of these
  suites.




The file can be obtained via
http://datatracker.ietf.org/doc/draft-law-rfc4869bis/

IESG discussion can be tracked via
http://datatracker.ietf.org/doc/draft-law-rfc4869bis/


The following IPR Declarations may be related to this I-D:

   http://datatracker.ietf.org/ipr/1499/



___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce


Last Call: draft-polk-local-emergency-rph-namespace-01.txt (IANA Registering a SIP Resource Priority Header Field Namespace for Local Emergency Communications) to Proposed Standard

2011-06-15 Thread The IESG

The IESG has received a request from an individual submitter to consider
the following document:
- 'IANA Registering a SIP Resource Priority Header Field Namespace for
   Local Emergency Communications'
  draft-polk-local-emergency-rph-namespace-01.txt as a Proposed
Standard

The IESG plans to make a decision in the next few weeks, and solicits
final comments on this action. Please send substantive comments to the
i...@ietf.org mailing lists by 2011-07-13. Exceptionally, comments may be
sent to i...@ietf.org instead. In either case, please retain the
beginning of the Subject line to allow automated sorting.

Abstract


   This document creates the new Session Initiation Protocol (SIP)
   Resource Priority header field namespace esnet for local emergency
   usage to a public safety answering point (PSAP), between PSAPs, and
   between a PSAP and first responders and their organizations, and
   places this namespace in the IANA registry.




The file can be obtained via
http://datatracker.ietf.org/doc/draft-polk-local-emergency-rph-namespace/

IESG discussion can be tracked via
http://datatracker.ietf.org/doc/draft-polk-local-emergency-rph-namespace/


No IPR declarations have been submitted directly on this I-D.


___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce


Last Call: draft-ietf-dkim-rfc4871bis-12.txt (DomainKeys Identified Mail (DKIM) Signatures) to Draft Standard

2011-06-15 Thread The IESG

The IESG has received a request from the Domain Keys Identified Mail WG
(dkim) to consider the following document:
- 'DomainKeys Identified Mail (DKIM) Signatures'
  draft-ietf-dkim-rfc4871bis-12.txt as a Draft Standard

The IESG plans to make a decision in the next few weeks, and solicits
final comments on this action. Please send substantive comments to the
i...@ietf.org mailing lists by 2011-06-29. Exceptionally, comments may be
sent to i...@ietf.org instead. In either case, please retain the
beginning of the Subject line to allow automated sorting.

Abstract

   DomainKeys Identified Mail (DKIM) permits a person, role, or
   organization that owns the signing domain to claim some
   responsibility for a message by associating the domain with the
   message.  This can be an author's organization, an operational relay
   or one of their agents.  DKIM separates the question of the identity
   of the signer of the message from the purported author of the
   message.  Assertion of responsibility is validated through a
   cryptographic signature and querying the signer's domain directly to
   retrieve the appropriate public key.  Message transit from author to
   recipient is through relays that typically make no substantive change
   to the message content and thus preserve the DKIM signature.

   This memo obsoletes RFC4871 and RFC5672.

DIffs from RFC 4871

   Changes from RFC 4871 can be found at:
   http://www.trusteddomain.org/dkim-diff.html

DOWNREFs

   This specification contains two normative references to proposed
   standard RFCs: RFC 3447 and RFC 5890.

   This specification contains two normative references to non-IETF
   RFCs: FIPS-180-3-2008 (SHA) and ITU-X660-1997 (ASN.1).

   This specification contains one normative reference to an
   informational RFC: RFC 5598.

   This specification also contains one informative reference to a
   historical document: RFC 4870.


The file can be obtained via
http://datatracker.ietf.org/doc/draft-ietf-dkim-rfc4871bis/

Implementation Report can be accessed at
http://www.ietf.org/iesg/implementation/report-rfc4871.txt

IESG discussion can be tracked via
http://datatracker.ietf.org/doc/draft-ietf-dkim-rfc4871bis/


The following IPR Declarations may be related to this I-D:

   http://datatracker.ietf.org/ipr/1547/



___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce