Re: [BEHAVE] Last Call: draft-ietf-behave-v4v6-bih-06.txt (Dual Stack Hosts Using Bump-in-the-Host (BIH)) to Proposed Standard

2011-09-27 Thread Hui Deng
Hi Dan

inline please,


 I believe the objection is against non-deterministic translation,
 rather than stateful versus stateless.  By non-deterministic, I mean
 that the subscriber's equipment (e.g., CPE) cannot determine the
 mapping it will have on the Internet.  A+P mechanisms are

 Could you help be more elaboration on CPE can't determine the ampping?


 deterministic (including 4rd, Dual-IVI, and draft-ymbk-aplus-p).

By the way, I would say you are missing one early draft:
http://tools.ietf.org/html/draft-murakami-softwire-4v6-translation-00
which is align with 4rd  about 4v6 translation which has been contributed by
major operators which is also align with NAT64 deployment.

-Hui




 A stateful CGN, as commonly deployed, is not deterministic.

 However -- and this is my point in this email -- a stateful CGN
 can be configured and deployed so that it deterministically maps
 traffic.  That is, it can function very much like A+P/4rd/Dual-IVI
 so that port N from subscriber A is always mapped to public
 port Z on IPv4 address Y.  We could have the CPE know about
 that fixed mapping using the same DHCP options that A+P/4rd/
 Dual-IVI would use, or use PCP, or use some other protocol.

 -d

  I would assume softwires follows these same IETF guidelines and
  therefore is
  now focusing solely on stateless approaches(?). If the IETF opinion has
  changed so that also stateful double translation solutions are now ok
  for
  IETF, then that should perhaps be reflected in this document as well.
 
  Unfortunately, I did not have chance to go to softwires interim, but
  please
  let us know if the discussions there impact also the quoted
  recommendation.
 
  Best regards,
 
Teemu
 
   -Original Message-
   From: behave-boun...@ietf.org [mailto:behave-boun...@ietf.org] On
   Behalf Of ext Satoru Matsushima
   Sent: 13. syyskuuta 2011 06:51
   To: ietf@ietf.org
   Cc: beh...@ietf.org; Satoru Matsushima
   Subject: Re: [BEHAVE] Last Call: draft-ietf-behave-v4v6-bih-06.txt
  (Dual
   Stack Hosts Using Bump-in-the-Host (BIH)) to Proposed Standard
  
   The introduction in the draft says:
  
  
  IETF recommends using dual-stack or tunneling based solutions for
   IPv6 transition and specifically recommends against deployments
   utilizing double protocol translation.  Use of BIH together with
  a
   NAT64 is NOT RECOMMENDED [RFC6180].
   
  
  
   This statement makes a strong obstacle when we develop stateless
  solution
   with translation in softwires wg.
   I think that it is still remained a room to make decision whether
  removing
  the
   statement or remaining it.
   The discussion which we'll have in the softwires interim meeting
  would be
   helpful to decide it.
  
   Best regards,
   --satoru
  
  
  
   On 2011/08/31, at 22:53, The IESG wrote:
  
   
The IESG has received a request from the Behavior Engineering for
Hindrance Avoidance WG (behave) to consider the following document:
- 'Dual Stack Hosts Using Bump-in-the-Host (BIH)'
 draft-ietf-behave-v4v6-bih-06.txt as a Proposed Standard
   
The IESG plans to make a decision in the next few weeks, and
  solicits
final comments on this action. Please send substantive comments to
  the
ietf@ietf.org mailing lists by 2011-09-14. Exceptionally, comments
  may
be sent to i...@ietf.org instead. In either case, please retain the
beginning of the Subject line to allow automated sorting.
   
Abstract
   
   
  Bump-In-the-Host (BIH) is a host-based IPv4 to IPv6 protocol
  translation mechanism that allows a class of IPv4-only
  applications
  that work through NATs to communicate with IPv6-only peers.  The
  host
  on which applications are running may be connected to IPv6-only
  or
  dual-stack access networks.  BIH hides IPv6 and makes the IPv4-
  only
  applications think they are talking with IPv4 peers by local
  synthesis of IPv4 addresses.  This draft obsoletes RFC 2767 and
  RFC
  3338.
   
   
   
   
The file can be obtained via
http://datatracker.ietf.org/doc/draft-ietf-behave-v4v6-bih/
   
IESG discussion can be tracked via
http://datatracker.ietf.org/doc/draft-ietf-behave-v4v6-bih/
   
   
No IPR declarations have been submitted directly on this I-D.
   
   
___
Behave mailing list
beh...@ietf.org
https://www.ietf.org/mailman/listinfo/behave
  
   ___
   Behave mailing list
   beh...@ietf.org
   https://www.ietf.org/mailman/listinfo/behave

 ___
 Behave mailing list
 beh...@ietf.org
 https://www.ietf.org/mailman/listinfo/behave

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Gen-ART review of draft-ietf-avtext-client-to-mixer-audio-level-05.txt

2011-09-27 Thread Alexey Melnikov

Emil Ivov wrote:


Hey Alexey,


Hi Emil,

On 27 sept. 2011, at 00:24, Alexey Melnikov alexey.melni...@isode.com 
mailto:alexey.melni...@isode.com wrote:



Jonathan Lennox wrote:


Hi, Alexey -- thank you for the Gen-ART review.


Hi Jonathan,


Alexey Melnikov writes:


Question: are the two encoding of the audio level indication option 
specified in the document really necessary?  


Do you mean the one-byte vs. two-byte forms of the header extension 
(Figure 1 vs. Figure 2)?  These are the two forms of the generic 
header extensions defined by RFC 5285.


I understood that. Does RFC 5285 require that both forms should be 
allowed?


It doesn't explicitly say so but it It actually does, yes. Here's what 
it says:


  A stream MUST contain only one-byte or two-byte
  headers: they MUST NOT be mixed within a stream.


Audio level headers can find themselves in streams that also have 
other, longer extensions, which do require the two-byte header. The 
above lines mandate that in such cases they all use the two-byte header.


Ok, this is good enough for me. Thanks for explaining.

In the same regard, although probably a bit less likely, nothing 
prevents having another sixteen header extensions in a stream that 
also has levels. In that case we'd need to switch to two-byte headers 
in order to be able to fit all the IDs.


Cheers,
Emil

--sent from my mobile

In general, it would be good to avoid multiple representations of the 
same thing.




The actual payload (one byte containing the V and level bits) is 
identical in the two cases; the only difference is the container. 
 We can add some text clarifying this point if you think it would be 
helpful.





Nits/editorial comments:



s/relys/relies ???


  


Thanks, will fix.




___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Need help tracking down problem accessing IETF Subversionrepository on Mac OS X

2011-09-27 Thread t.petch
--- Original Message -
From: Yoav Nir y...@checkpoint.com
To: Paul Hoffman paul.hoff...@vpnc.org
Cc: Stuart Cheshire chesh...@apple.com; IETF-Discussion list
ietf@ietf.org
Sent: Monday, September 26, 2011 10:11 PM

 On Sep 26, 2011, at 5:25 AM, Paul Hoffman wrote:

  On Sep 25, 2011, at 7:20 PM, Stuart Cheshire wrote:
 
  % svn info https://svn.tools.ietf.org/svn/wg/hybi
  svn: OPTIONS of 'https://svn.tools.ietf.org/svn/wg/hybi': SSL negotiation
failed: SSL error code -1/1/336032856 (https://svn.tools.ietf.org)
 
  If you're on a Mac, can you please try this command for me and let me know
if it works for you or gives the 336032856 error?
 
  Happens to everyone with a Mac. Someone else will chime in before we
Californians wake up tomorrow saying what the problem is. Speculation on a
different list was that this is a mismatch between SSL library versions with
some interaction with the new TLS renegotiation fix, but I haven't seen
substantiation.

 I guess you're awake by now, but here goes. I'm attaching a tcpdump capture.

 The client sends a SNI extension with the name svn.tools.ietf.org. For some
reason the server does not recognize the name. This is particularly puzzling
because the CommonName in the server certificate is *.tools.ietf.org, which is
usually considered a match. The server

tp
Unfortunately, we now also have RFC6125 which encourages people to
  o  Move away from including and checking strings that look like
  domain names in the subject's Common Name.
in a slightly different, but closely related, context.  It seems unlikely that
this advice is having an impact so soon, but it is another source of
potential confusion.

Tom Petch








sends a warning-level unrecognized name alert, and the client breaks the
connection.  Here's what RFC 6066 has to say on the subject:

  If the server understood the ClientHello extension but
does not recognize the server name, the server SHOULD take one of two
actions: either abort the handshake by sending a fatal-level
unrecognized_name(112) alert or continue the handshake.  It is NOT
RECOMMENDED to send a warning-level unrecognized_name(112) alert,
because the client's behavior in response to warning-level alerts is
unpredictable.

 Unpredictable indeed.

 Anyway, the server is wrong to send the alert on two counts: the name does
match, and the warning-level alert violates a NOT RECOMMENDED/

 OTOH, the client should not abort on a warning level alert.

 My opinion: it's the server that is more wrong.

 Yoav

 ___
 Ietf mailing list
 Ietf@ietf.org
 https://www.ietf.org/mailman/listinfo/ietf

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Need help tracking down problem accessing IETF Subversion

2011-09-27 Thread Yoav Nir


On 9/27/11 12:45 AM, Martin Rex m...@sap.com wrote:


So there seem to be two problems:

- The server (svn.tools.ietf.org) does not seem to be sufficiently
  aware of the server names that it is servicing.

  If it takes more than a server configuration file change to make it
  aware of that additional hostname, then there is a software bug in
  the WebServer (or the TLS-implementation used by the web server).

Pretty embarrassing that one of Yngve's extensions-intolerant servers
would have a domain name ending in .ietf.org.


___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: 240/4 unreservation (was RE: Last Call: draft-weil-shared-transition-space-request-03.txt (IANA Reserved IPv4 Prefix for Shared Transition Space) to Informational RFC)

2011-09-27 Thread Iljitsch van Beijnum
On 27 Sep 2011, at 5:45 , Christian Huitema wrote:

 if an address space is somehow set aside, we have no mechanism to enforce 
 that only ISP use it. So we have to assume it will be used by whoever feels 
 like it.

How is that different from the current situation? Is there a reason why 
potential users of 240/4 will refrain from that use because it's called class 
E but not if it's called ISP private?

And who cares anyway? If people feel it's a good idea to use addresses in the 
240/4 block, more power to them. That saves more usable addresses for other 
uses.

 It is also important to avoid mistakes during the transition period from IPv4 
 to IPv6. I understand that many actors are anxious and waiting for some kind 
 of fix. This is a common scenario for making substantial mistakes...

Agree. We have to make absolutely sure that all the hacks that are going to be 
implemented to stretch IPv4 don't find their way into the IPv6 world.
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-ietf-pim-port-08.txt (A Reliable TransportMechanism for PIM) to Experimental RFC

2011-09-27 Thread t.petch
The choice of service name for this transport seems unfortunate; having a port
number registry with a service in it called 'port' may be witty but seems like a
source of future confusion.

I notice that IANA currently have a service name of 'pim-port' which seems a
better idea and one that I think that this I-D should adopt.

Tom Petch


- Original Message -
From: The IESG iesg-secret...@ietf.org
To: IETF-Announce ietf-annou...@ietf.org
Cc: p...@ietf.org
Sent: Monday, September 26, 2011 9:40 PM
Subject: Last Call: draft-ietf-pim-port-08.txt (A Reliable TransportMechanism
for PIM) to Experimental RFC



 The IESG has received a request from the Protocol Independent Multicast
 WG (pim) to consider the following document:
 - 'A Reliable Transport Mechanism for PIM'
   draft-ietf-pim-port-08.txt as an Experimental RFC

 The IESG plans to make a decision in the next few weeks, and solicits
 final comments on this action. Please send substantive comments to the
 ietf@ietf.org mailing lists by 2011-10-10. Exceptionally, comments may be
 sent to i...@ietf.org instead. In either case, please retain the
 beginning of the Subject line to allow automated sorting.

 Abstract


This document defines a reliable transport mechanism for the PIM
protocol for transmission of Join/Prune messages.  This eliminates
the need for periodic Join/Prune message transmission and processing.
The reliable transport mechanism can use either TCP or SCTP as the
transport protocol.


 The file can be obtained via
 http://datatracker.ietf.org/doc/draft-ietf-pim-port/

 IESG discussion can be tracked via
 http://datatracker.ietf.org/doc/draft-ietf-pim-port/


 No IPR declarations have been submitted directly on this I-D.
 ___
 IETF-Announce mailing list
 ietf-annou...@ietf.org
 https://www.ietf.org/mailman/listinfo/ietf-announce

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


RE: [BEHAVE] Last Call: draft-ietf-behave-v4v6-bih-06.txt (Dual Stack Hosts Using Bump-in-the-Host (BIH)) to Proposed Standard

2011-09-27 Thread Dan Wing
 -Original Message-
 From: Hui Deng [mailto:denghu...@gmail.com]
 Sent: Monday, September 26, 2011 11:01 PM
 To: Dan Wing
 Cc: teemu.savolai...@nokia.com; satoru.matsush...@gmail.com;
 ietf@ietf.org; softwi...@ietf.org; beh...@ietf.org
 Subject: Re: [BEHAVE] Last Call: draft-ietf-behave-v4v6-bih-06.txt
 (Dual Stack Hosts Using Bump-in-the-Host (BIH)) to Proposed Standard
 
 Hi Dan
 
 inline please,
 
 
   I believe the objection is against non-deterministic
 translation,
   rather than stateful versus stateless.  By non-deterministic, I
 mean
   that the subscriber's equipment (e.g., CPE) cannot determine the
   mapping it will have on the Internet.  A+P mechanisms are
 
 
 Could you help be more elaboration on CPE can't determine the ampping?

It can't determine the public IP address and port of a mapping on the 
NAT64 (CGN), and it can't create a mapping on the NAT64 (CGN) -- because
the CGN is going to make a dynamic mapping when it sees a UDP, TCP,
or ICMP packet from the subscriber.

   deterministic (including 4rd, Dual-IVI, and draft-ymbk-aplus-p).
 
 
 By the way, I would say you are missing one early draft:
 http://tools.ietf.org/html/draft-murakami-softwire-4v6-translation-00
 which is align with 4rd  about 4v6 translation which has been
 contributed by major operators which is also align with NAT64
 deployment.

Sorry.

-d


 -Hui
 
 
 
 
   A stateful CGN, as commonly deployed, is not deterministic.
 
   However -- and this is my point in this email -- a stateful CGN
   can be configured and deployed so that it deterministically maps
   traffic.  That is, it can function very much like A+P/4rd/Dual-
 IVI
   so that port N from subscriber A is always mapped to public
   port Z on IPv4 address Y.  We could have the CPE know about
   that fixed mapping using the same DHCP options that A+P/4rd/
   Dual-IVI would use, or use PCP, or use some other protocol.
 
   -d
 
 
I would assume softwires follows these same IETF guidelines and
therefore is
now focusing solely on stateless approaches(?). If the IETF
 opinion has
changed so that also stateful double translation solutions are
 now ok
for
IETF, then that should perhaps be reflected in this document as
 well.
   
Unfortunately, I did not have chance to go to softwires
 interim, but
please
let us know if the discussions there impact also the quoted
recommendation.
   
Best regards,
   
  Teemu
   
 -Original Message-
 From: behave-boun...@ietf.org [mailto:behave-
 boun...@ietf.org] On
 Behalf Of ext Satoru Matsushima
 Sent: 13. syyskuuta 2011 06:51
 To: ietf@ietf.org
 Cc: beh...@ietf.org; Satoru Matsushima
 Subject: Re: [BEHAVE] Last Call: draft-ietf-behave-v4v6-bih-
 06.txt
(Dual
 Stack Hosts Using Bump-in-the-Host (BIH)) to Proposed
 Standard

 The introduction in the draft says:


IETF recommends using dual-stack or tunneling based
 solutions for
 IPv6 transition and specifically recommends against
 deployments
 utilizing double protocol translation.  Use of BIH
 together with
a
 NAT64 is NOT RECOMMENDED [RFC6180].
 


 This statement makes a strong obstacle when we develop
 stateless
solution
 with translation in softwires wg.
 I think that it is still remained a room to make decision
 whether
removing
the
 statement or remaining it.
 The discussion which we'll have in the softwires interim
 meeting
would be
 helpful to decide it.

 Best regards,
 --satoru



 On 2011/08/31, at 22:53, The IESG wrote:

 
  The IESG has received a request from the Behavior
 Engineering for
  Hindrance Avoidance WG (behave) to consider the following
 document:
  - 'Dual Stack Hosts Using Bump-in-the-Host (BIH)'
   draft-ietf-behave-v4v6-bih-06.txt as a Proposed Standard
 
  The IESG plans to make a decision in the next few weeks,
 and
solicits
  final comments on this action. Please send substantive
 comments to
the
  ietf@ietf.org mailing lists by 2011-09-14. Exceptionally,
 comments
may
  be sent to i...@ietf.org instead. In either case, please
 retain the
  beginning of the Subject line to allow automated sorting.
 
  Abstract
 
 
Bump-In-the-Host (BIH) is a host-based IPv4 to IPv6
 protocol
translation mechanism that allows a class of IPv4-only
applications
that work through NATs to communicate with IPv6-only
 peers.  The
host
on which applications 

RE: [BEHAVE] Last Call: draft-ietf-behave-v4v6-bih-06.txt (Dual Stack Hosts Using Bump-in-the-Host (BIH)) to Proposed Standard

2011-09-27 Thread Dan Wing
 -Original Message-
 From: teemu.savolai...@nokia.com [mailto:teemu.savolai...@nokia.com]
 Sent: Monday, September 26, 2011 11:14 PM
 To: dw...@cisco.com; satoru.matsush...@gmail.com; ietf@ietf.org
 Cc: softwi...@ietf.org; beh...@ietf.org
 Subject: RE: [BEHAVE] Last Call: draft-ietf-behave-v4v6-bih-06.txt
 (Dual Stack Hosts Using Bump-in-the-Host (BIH)) to Proposed Standard
 
  I believe the objection is against non-deterministic translation,
 rather
 than
  stateful versus stateless.  By non-deterministic, I mean that the
 subscriber's
  equipment (e.g., CPE) cannot determine the mapping it will have on
 the
  Internet.  A+P mechanisms are deterministic (including 4rd, Dual-IVI,
 and
  draft-ymbk-aplus-p).
 
  A stateful CGN, as commonly deployed, is not deterministic.
 
 I don't understand why that is significant enough factor for IETF to
 (not)
 recommend some double translation variants. I mean does existing
 applications work better if double translation is done in deterministic
 manner? 

Yes, it allows the CPE to implement an ALG -- if an application needs
an ALG (e.g., active-mode FTP).

-d

 One reasoning against double translation has been that it
 breaks
 some class of applications. Is it now so that some forms of double
 translation do not break applications while some others do?
 
   Teemu
 

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Need help tracking down problem accessing IETF Subversion

2011-09-27 Thread Yoav Nir


On 9/27/11 12:45 AM, Martin Rex m...@sap.com wrote:

- The server (svn.tools.ietf.org) does not seem to be sufficiently
  aware of the server names that it is servicing.

  If it takes more than a server configuration file change to make it
  aware of that additional hostname, then there is a software bug in
  the WebServer (or the TLS-implementation used by the web server).

The server seems to be Apache 2.2.20 (see below). Usually but not always
the underlying implementation is OpenSSL. I wouldn't think they are likely
to be so buggy.


2-54-182-251:tmp ynir$ wget --no-check-certificate -d -v
https://svn.tools.ietf.org/svn/wg/hybi/
Setting --verbose (verbose) to 1
DEBUG output created by Wget 1.13.4 on darwin10.8.0.

URI encoding = `US-ASCII'
--2011-09-27 17:09:19--  https://svn.tools.ietf.org/svn/wg/hybi/
Resolving svn.tools.ietf.org (svn.tools.ietf.org)... 208.66.40.242
Caching svn.tools.ietf.org = 208.66.40.242
Connecting to svn.tools.ietf.org
(svn.tools.ietf.org)|208.66.40.242|:443... connected.
Created socket 5.
Releasing 0x00010042c6b0 (new refcount 1).
WARNING: The certificate of `svn.tools.ietf.org' is not trusted.
WARNING: The certificate of `svn.tools.ietf.org' hasn't got a known issuer.

---request begin---
GET /svn/wg/hybi/ HTTP/1.1
User-Agent: Wget/1.13.4 (darwin10.8.0)
Accept: */*
Host: svn.tools.ietf.org
Connection: Keep-Alive

---request end---
HTTP request sent, awaiting response...
---response begin---
HTTP/1.1 200 OK
Date: Tue, 27 Sep 2011 14:09:22 GMT
Server: Apache/2.2.20 (Debian)
Last-Modified: Fri, 23 Sep 2011 19:13:05 GMT
ETag: W/137//
Accept-Ranges: bytes
Content-Length: 286
Keep-Alive: timeout=5, max=100
Connection: Keep-Alive
Content-Type: text/html; charset=UTF-8

---response end---
200 OK
Registered socket 5 for persistent reuse.
URI content encoding = `UTF-8'
Length: 286 [text/html]
Saving to: `index.html'

100%[==
] 286 --.-K/s
in 0s  

2011-09-27 17:09:26 (1.66 MB/s) - `index.html' saved [286/286]


___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


RE: 240/4 unreservation (was RE: Last Call: draft-weil-shared-transition-space-request-03.txt (IANA Reserved IPv4 Prefix for Shared Transition Space) to Informational RFC)

2011-09-27 Thread George, Wes
From: ietf-boun...@ietf.org On Behalf Of Iljitsch van Beijnum

And who cares anyway? If people feel it's a good idea to use addresses in the 
240/4 block, more power to them. That saves more usable addresses for other 
uses.

WEG] The problem is that people really can't today, because vendors mostly do 
not want to implement something for general consumption that is deliberately 
out of compliance with one or more RFCs. My point in asking the question was 
that I'm not sure that we need to define what use cases it can/should be used 
for as much as we simply need to unreserve it and provide some guidance about 
risks.
IMO, the question tree on determining what (if any) course of action to take is 
something like this:
1) should it be unreserved for *any* reason, or are we just going to stick with 
the 5735 status quo (Future use)?
2) should it be made into more global unicast space in all or in part?
3) should it be simply unreserved as non-global space with a few caveats about 
limitations, and leave the use cases to the consenting adults considering its 
use?
4) should it have a designated use(s) to the exclusion of all not explicitly 
defined?

For #1, My view is that there's no good reason to maintain the reservation, 
because then essentially no one can use it, and the likelihood of someone 
coming up with a use for it that justifies holding it in reserve for future 
use continues to drop. So it's more a question of how we might use the space, 
and the justification for doing any one of several things. I don't agree that 
the burden of proof should favor doing nothing.
For #2, We know that it is not trivial to get it working for this purpose due 
to the critical mass of support required. But in some cases where there is 
tight control over equipment and networks, and a community of interest that 
routinely communicates between one another across a portion of the Internet, 
perhaps it's possible. I'm thinking that this makes more sense as a means to 
buy us time to get IPv6 deployments completed if CGN ends up being bad and the 
demand for global IPv4 space gets high enough that any tradeoffs associated 
with using this space as global unicast are deemed acceptable. It may be that 
we carve the space up so that some of it is tentatively reserved for global 
unicast, but not released to IANA until some later point to give folks time to 
fix things. I agree that this one has a lot of risk that it ends up simply 
prolonging IPv4 without aiding the transition to IPv6.
For #3, it's mainly about the caveats to its use - it may not be supported by 
legacy equipment, we have to carve out 255.255.255.255 (or perhaps something 
between 255/8 and 255.255.255/24) for broadcast, it MUST NOT show up in the 
global routing table, etc
For #4 - I'm not sure we can come up with enough designated uses at the outset 
to not have to continue evaluating new ones all of the time and end up needing 
a WG just to keep up with the discussion. So far, we've heard about its use 
within a mobile provider in place of RFC1918 as Mobile UE addresses behind a 
CGN that's already in place today. The folks wanting a shared CGN address pool 
have already turned down 240/4 because of the limited support within the legacy 
home router CPE gear. What other potential uses are there? 1918 space in 
enterprises where all of 1918 is already in use (eg mergers, extranets, etc)?
I think Iljitsch's point is a good one - why do we care how people use it? As 
long as we can give them some guidance about how *not* to use it in order to 
avoid breakage, I think we're doing our jobs.

Wes George

This E-mail and any of its attachments may contain Time Warner Cable 
proprietary information, which is privileged, confidential, or subject to 
copyright belonging to Time Warner Cable. This E-mail is intended solely for 
the use of the individual or entity to which it is addressed. If you are not 
the intended recipient of this E-mail, you are hereby notified that any 
dissemination, distribution, copying, or action taken in relation to the 
contents of and attachments to this E-mail is strictly prohibited and may be 
unlawful. If you have received this E-mail in error, please notify the sender 
immediately and permanently delete the original and any copy of this E-mail and 
any printout.
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Need help tracking down problem accessing IETF Subversion repository on Mac OS X

2011-09-27 Thread Henrik Levkowetz
Hi,

Yoav's tcpdump analysis, together with Martin's observations, helped
me find the problem at the server end.  I've changed the config now
(addding a missing 'NameVirtualHost *:443' to Apache's config), and
Stuart's example now works for me on OS X Snow Leopard and Lion:

  svn info https://svn.tools.ietf.org/svn/wg/hybi

(The box running Lion isn't happy with the certificate, though, even
if all other means of verification I have tells me it's OK.)

Thanks and best regards,

Henrik

On 2011-09-26 22:11 Yoav Nir said:
 The client sends a SNI extension with the name svn.tools.ietf.org.
 For some reason the server does not recognize the name. This is
 particularly puzzling because the CommonName in the server
 certificate is *.tools.ietf.org, which is usually considered a
 match. The server sends a warning-level unrecognized name alert,
 and the client breaks the connection.
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


RE: [BEHAVE] Last Call: draft-ietf-behave-v4v6-bih-06.txt (Dual Stack Hosts Using Bump-in-the-Host (BIH)) to Proposed Standard

2011-09-27 Thread Dan Wing
 -Original Message-
 From: teemu.savolai...@nokia.com [mailto:teemu.savolai...@nokia.com]
 Sent: Tuesday, September 27, 2011 7:24 AM
 To: dw...@cisco.com; satoru.matsush...@gmail.com; ietf@ietf.org
 Cc: softwi...@ietf.org; beh...@ietf.org
 Subject: RE: [BEHAVE] Last Call: draft-ietf-behave-v4v6-bih-06.txt
 (Dual Stack Hosts Using Bump-in-the-Host (BIH)) to Proposed Standard
 
   I don't understand why that is significant enough factor for IETF
 to
   (not)
   recommend some double translation variants. I mean does existing
   applications work better if double translation is done in
   deterministic manner?
 
  Yes, it allows the CPE to implement an ALG -- if an application needs
 an
 ALG
  (e.g., active-mode FTP).
 
 Good point, but still in my eyes that does not count as too significant
 factor, as it is impossible to have a generic ALG and I've understood
 ALGs in CPEs are not very much desired?

Yes, it is impossible to build a successful 'generic' ALG which
fixes up all protocols.  ALGs need to be specific to each application
they're trying to 'fix'.

 So.. then.. is this sentence really still the IETF recommendation in
 the
 current state of affairs:
 --
IETF recommends using dual-stack or tunneling based solutions for
IPv6 transition and specifically recommends against deployments
utilizing double protocol translation.
 --


-d


___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


RE: Gen-ART review of draft-ietf-avtext-client-to-mixer-audio-level-05.txt

2011-09-27 Thread Jonathan Lennox
Hi, Alexey -- thank you for the Gen-ART review.

Alexey Melnikov writes:
 Question: are the two encoding of the audio level indication option specified 
 in the document really necessary?

Do you mean the one-byte vs. two-byte forms of the header extension (Figure 1 
vs. Figure 2)?  These are the two forms of the generic header extensions 
defined by RFC 5285.  The actual payload (one byte containing the V and level 
bits) is identical in the two cases; the only difference is the container.  We 
can add some text clarifying this point if you think it would be helpful.

 Nits/editorial comments:
 s/relys/relies ???

Thanks, will fix.

-- 
Jonathan Lennox
jonat...@vidyo.com
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Gen-ART review of draft-ietf-avtext-client-to-mixer-audio-level-05.txt

2011-09-27 Thread Emil Ivov
Hey Alexey,

On 27 sept. 2011, at 00:24, Alexey Melnikov alexey.melni...@isode.com wrote:

 Jonathan Lennox wrote:
 
 Hi, Alexey -- thank you for the Gen-ART review.
 
 Hi Jonathan,
 
 Alexey Melnikov writes:
 
 Question: are the two encoding of the audio level indication option 
 specified in the document really necessary?
   
 
 Do you mean the one-byte vs. two-byte forms of the header extension (Figure 
 1 vs. Figure 2)?  These are the two forms of the generic header extensions 
 defined by RFC 5285.
 
 I understood that. Does RFC 5285 require that both forms should be allowed?

It doesn't explicitly say so but it It actually does, yes. Here's what it says:

   A stream MUST contain only one-byte or two-byte
   headers: they MUST NOT be mixed within a stream.

Audio level headers can find themselves in streams that also have other, longer 
extensions, which do require the two-byte header. The above lines mandate that 
in such cases they all use the two-byte header.

In the same regard, although probably a bit less likely, nothing prevents 
having another sixteen header extensions in a stream that also has levels. In 
that case we'd need to switch to two-byte headers in order to be able to fit 
all the IDs.

Cheers,
Emil

--sent from my mobile

 In general, it would be good to avoid multiple representations of the same 
 thing.
 
 The actual payload (one byte containing the V and level bits) is identical 
 in the two cases; the only difference is the container.  We can add some 
 text clarifying this point if you think it would be helpful.
 
 Nits/editorial comments:
 s/relys/relies ???
   
 Thanks, will fix.
 
 
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


RE: [BEHAVE] Last Call: draft-ietf-behave-v4v6-bih-06.txt (Dual Stack Hosts Using Bump-in-the-Host (BIH)) to Proposed Standard

2011-09-27 Thread teemu.savolainen
 I believe the objection is against non-deterministic translation, rather
than
 stateful versus stateless.  By non-deterministic, I mean that the
subscriber's
 equipment (e.g., CPE) cannot determine the mapping it will have on the
 Internet.  A+P mechanisms are deterministic (including 4rd, Dual-IVI, and
 draft-ymbk-aplus-p).
 
 A stateful CGN, as commonly deployed, is not deterministic.

I don't understand why that is significant enough factor for IETF to (not)
recommend some double translation variants. I mean does existing
applications work better if double translation is done in deterministic
manner? One reasoning against double translation has been that it breaks
some class of applications. Is it now so that some forms of double
translation do not break applications while some others do? 

Teemu
 


smime.p7s
Description: S/MIME cryptographic signature
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


RE: [BEHAVE] Last Call: draft-ietf-behave-v4v6-bih-06.txt (Dual Stack Hosts Using Bump-in-the-Host (BIH)) to Proposed Standard

2011-09-27 Thread teemu.savolainen
  I don't understand why that is significant enough factor for IETF to
  (not)
  recommend some double translation variants. I mean does existing
  applications work better if double translation is done in
  deterministic manner?
 
 Yes, it allows the CPE to implement an ALG -- if an application needs an
ALG
 (e.g., active-mode FTP).

Good point, but still in my eyes that does not count as too significant
factor, as it is impossible to have a generic ALG and I've understood ALGs
in CPEs are not very much desired?

So.. then.. is this sentence really still the IETF recommendation in the
current state of affairs:
--
   IETF recommends using dual-stack or tunneling based solutions for
   IPv6 transition and specifically recommends against deployments
   utilizing double protocol translation.  
--

Teemu


smime.p7s
Description: S/MIME cryptographic signature
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: IAOC: delegating ex-officio responsibility

2011-09-27 Thread John C Klensin


--On Monday, September 26, 2011 13:15 -0700 Bob Hinden
bob.hin...@gmail.com wrote:

 John,
 
 I don't see how you took what I said and then interpreted it
 as suggesting that I was saying proposing an absolute
 dictatorship.  You do have a good imagination :-)

I didn't take your proposal that way at all.  I was only trying
to point out that maximizing organization efficiency -- or
minimizing the risks of organizational problems-- may not be a
very good success criterion.

 Also, I have been proposing some other ways of solving the I*
 overload problems as you suggested, except that I don't think
 the solution to the I* overload problem is in the IASA.  

There, we may just disagree.   I can't speak for anyone else,
but, if I have to make a decision about making one of the IESG,
IAB, or IASA a less efficient in the interest of reducing load
on critical and non-substitutable people, I'd be inclined to
point to the IASA first.  

FWIW, I don't think that having the IASA bear all of the burden
is right either -- I also want to look for changes that would
reduce the IAB-caused and IESG-related loads.  

For example, I favor both letting the IAB choose who represents
it on the IASA _and_ the Program model that implies, among other
things, that the IAB Chair doesn't have to have first-hold
involvement in everything.  Interesting it is exactly the
assumption that the IAB Chair will have first hand involvement
in everything that the IAB does that is cited an example of why
it is necessary to have the IAB Chair on the IASA.   So, if the
IAB succeeds in reducing the load on the IAB Chair in that way,
the argument for forcing the IAB Chair to serve on the IAOC and
Trust is reduced as well.   

I'd also like to see mechanisms explored within the IESG to
reduce the load on the IETF Chair.  To the extent to which being
General Area AD adds significant work, I'd be happy to see that
turned into a real area and handed off to someone else.  I'm
not even sure that it is critical that the IETF Chair take a
lead (and voting) technical role in the IESG; perhaps the
community should reevaluate the required skill set and determine
whether that responsibility (which, of course, includes
responsibility for document reviews, etc.) is really an optimal
use of time and skills or whether we should eliminate it and
look for a different balance of skills.  I'm not recommending
that -- I can see large disadvantages as well as advantages --
but I think it is within the range of options the community
should understand and consider.

 If we (the community) are going to solve the I* overload
 problem, it would be good to have some actual data on how the
 I* chairs spend their time.  It would be good to have a better
 understanding of the problem before proposing solutions.

Yes.  And a better understanding of how all sorts of people
spend their time, if it could actually be obtained, would be
helpful for all sorts of purposes (e.g,, I'm sure Nomcoms would
love to know for priority-setting purposes in candidate
selection)).  But, having sat in one of those seats and had an
up-close view of how several others have handled them, I think
one of the things you would find is that each person who does
those jobs sorts things out, and prioritizes them, a little bit
differently (maybe a lot differently).  From that perspective,
the observation that we've got the current IETF Chair and the
current and immediate past IAB Chairs, supporting this change
ought to send a relatively strong message... unless, again,
efficiency of the IASA is more important than efficiency of the
IAB or IESG (and I want to stress that I don't think you have
said that... if it just my inference about whether some of your
arguments lead if carried to their logical conclusion).

   john

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: IAOC: delegating ex-officio responsibility

2011-09-27 Thread Brian E Carpenter
On 2011-09-28 08:03, John C Klensin wrote:
snip

 ...  Interesting it is exactly the
 assumption that the IAB Chair will have first hand involvement
 in everything that the IAB does that is cited an example of why
 it is necessary to have the IAB Chair on the IASA.   So, if the
 IAB succeeds in reducing the load on the IAB Chair in that way,
 the argument for forcing the IAB Chair to serve on the IAOC and
 Trust is reduced as well.   

I agree, and of course this goes with my bias against the IAB
becoming the I Administration B, which imnsho is a slippery
slope that we are already on.

 
 I'd also like to see mechanisms explored within the IESG to
 reduce the load on the IETF Chair.

I agree with this phrasing. If Russ isn't too busy (joke), an
update of draft-carpenter-ietf-chair-tasks might be of interest,
especially
http://tools.ietf.org/html/draft-carpenter-ietf-chair-tasks-00#section-5

  To the extent to which being
 General Area AD adds significant work, I'd be happy to see that
 turned into a real area and handed off to someone else.  I'm
 not even sure that it is critical that the IETF Chair take a
 lead (and voting) technical role in the IESG; 

Indeed. In the above draft I also distinguished the IETF Chair
role from the IESG Chair role, and whether they can be split is
worth a discussion.

 perhaps the
 community should reevaluate the required skill set and determine
 whether that responsibility (which, of course, includes
 responsibility for document reviews, etc.) is really an optimal
 use of time and skills or whether we should eliminate it and
 look for a different balance of skills.  I'm not recommending
 that -- I can see large disadvantages as well as advantages --
 but I think it is within the range of options the community
 should understand and consider.
 
 If we (the community) are going to solve the I* overload
 problem, it would be good to have some actual data on how the
 I* chairs spend their time.  It would be good to have a better
 understanding of the problem before proposing solutions.
 
 Yes.  And a better understanding of how all sorts of people
 spend their time, if it could actually be obtained, would be
 helpful for all sorts of purposes (e.g,, I'm sure Nomcoms would
 love to know for priority-setting purposes in candidate
 selection)).  But, having sat in one of those seats and had an
 up-close view of how several others have handled them, I think
 one of the things you would find is that each person who does
 those jobs sorts things out, and prioritizes them, a little bit
 differently (maybe a lot differently).  From that perspective,
 the observation that we've got the current IETF Chair and the
 current and immediate past IAB Chairs, supporting this change
 ought to send a relatively strong message... 

And to be clear, I (still the previous IETF Chair) think that
some such change is needed, which is exactly why I wrote the
above draft in 2006. Perhaps the difference is that I see
the IAOC/Trust role as very hard to separate from the IETF Chair
role - but more easily separable from the IESG Chair role.

 unless, again,
 efficiency of the IASA is more important than efficiency of the
 IAB or IESG (and I want to stress that I don't think you have
 said that... if it just my inference about whether some of your
 arguments lead if carried to their logical conclusion).

I think we need all three to be equally efficient; before IASA
existed, we had burning administrative problems. I wouldn't
like to have to rank the importance of the three.

Brian
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-ietf-pim-port-08.txt (A Reliable TransportMechanism for PIM) to Experimental RFC

2011-09-27 Thread Joe Touch

Hi, all,

The IANA considerations in this doc are in error and need updating as 
follows. I agree that PORT is a poor acronym choice, FWIW.


Joe

11.  IANA Considerations

   This specification makes use of a TCP port number and a SCTP port
   number for the use of PIM-Over-Reliable-Transport that has been
   allocated by IANA.  It also makes use of IANA PIM Hello Options
   allocations that should be made permanent.

The current IANA allocation is called pim-port, not 
PIM-Over-Reliable-Transport. The long name (description) is PIM over 
Reliable-Transport, but that's not the authoritative name of the 
service - also, IANA does assignments (as per RFC 6335); this section 
should read as follows.


   This specification makes use of a TCP port number and a SCTP port
   number for the use of pim-port service that has been
   assigned by IANA.  It also makes use of IANA PIM Hello Options
   assignments that should be made permanent.

11.1.  PORT Port Number

   IANA has assigned a port number that is used as a destination port
   for PORT TCP and SCTP transports.  The assigned number is 8471.
   References to this document should be added to the Service Name and
   Transport Protocol Port Number Registry.

This should read:

   IANA has already assigned a port number that is used as
   a destination port
   for pim-port TCP and SCTP transports.  The assigned number is 8471.
   References to this document should be added to the Service Name and
   Transport Protocol Port Number Registry for pim-port.


On 9/27/2011 1:46 AM, t.petch wrote:

The choice of service name for this transport seems unfortunate; having a port
number registry with a service in it called 'port' may be witty but seems like a
source of future confusion.

I notice that IANA currently have a service name of 'pim-port' which seems a
better idea and one that I think that this I-D should adopt.

Tom Petch


- Original Message -
From: The IESGiesg-secret...@ietf.org
To: IETF-Announceietf-annou...@ietf.org
Cc:p...@ietf.org
Sent: Monday, September 26, 2011 9:40 PM
Subject: Last Call:draft-ietf-pim-port-08.txt  (A Reliable TransportMechanism
for PIM) to Experimental RFC




The IESG has received a request from the Protocol Independent Multicast
WG (pim) to consider the following document:
- 'A Reliable Transport Mechanism for PIM'
   draft-ietf-pim-port-08.txt  as an Experimental RFC

The IESG plans to make a decision in the next few weeks, and solicits
final comments on this action. Please send substantive comments to the
ietf@ietf.org mailing lists by 2011-10-10. Exceptionally, comments may be
sent to i...@ietf.org instead. In either case, please retain the
beginning of the Subject line to allow automated sorting.

Abstract


This document defines a reliable transport mechanism for the PIM
protocol for transmission of Join/Prune messages.  This eliminates
the need for periodic Join/Prune message transmission and processing.
The reliable transport mechanism can use either TCP or SCTP as the
transport protocol.


The file can be obtained via
http://datatracker.ietf.org/doc/draft-ietf-pim-port/

IESG discussion can be tracked via
http://datatracker.ietf.org/doc/draft-ietf-pim-port/


No IPR declarations have been submitted directly on this I-D.
___
IETF-Announce mailing list
ietf-annou...@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce


___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-sprecher-mpls-tp-oam-considerations-01.txt (The Reasons for Selecting a Single Solution for MPLS-TP OAM) to Informational RFC

2011-09-27 Thread Brian E Carpenter
Please see attached review.

I am the assigned Gen-ART reviewer for this draft. For background on
Gen-ART, please see the FAQ at
http://wiki.tools.ietf.org/area/gen/trac/wiki/GenArtfaq.

Please resolve these comments along with any other Last Call comments
you may receive.

Document: draft-sprecher-mpls-tp-oam-considerations-01.txt
Reviewer: Brian Carpenter
Review Date: 2011-09-28
IETF LC End Date: 2011-10-24
IESG Telechat date: 2011-11-03

Summary:  In good shape, some changes suggested.


Comments:
-

1. As this is a document of quite general interest, I'm sending this Gen-ART 
review
to the main IETF list too.

2. I strongly support the publication of this document, although I do have some
suggested changes mentioned below.

Open issues: 


Please define Transport as used in this document. People immersed in ITU-T
thinking understand that this is not layer 4, but the usage is very confusing
to many IETF people.

  This document is intended to explain why it would be
  unwise to standardize multiple solutions for MPLS-TP OAM, and to show
  how the existence of multiple solutions would complicate MPLS-TP
  development and deployment making networks more expensive to build,
  less stable, and more costly to operate.

Good... but then I suggest that Section 3 and Section 6 both need
a closing sub-section that summarizes the way in which they justify
more expensive to build, less stable, and more costly to operate.

Also, I found that Sections 4 and 5 get in the way of the flow of
the argument - did you consider making them into Appendices?

 3.4.  The Complexity Sausage
...
  However, when we
  drive OAM complexity out of one network element at the cost of
  increased complexity at a peer network element we loose out
  economically and, more importantly, we loose out in terms of the
  reliability of this important network functionality.

I don't understand how this argues the case for having only one solution.
It seems quite orthogonal. The following paragraph is a powerful and
relevant argument, but quite different and nothing to do with sausage:

  ...due to the need to ensure compatibility of an inter-
  working function between the two solutions (in order to achieve
  end-to-end OAM) we create a situation where neither of two disjoint
  protocol developments is able to make technical advances.


 3.5.  Inter-Working is Expensive and Has Deployment Issues
...
  The IETF has, with good reason, a history of strongly opposing
  proposals to inter-work protocols.

This sentence reads like a religious statement, so I would delete it.
The preceding arguments are already very strong, and Section 4 makes the
same point in an objective fashion.

 3.7.  Migration Issues

  Deployment of a technology that is subsequently replaced or obsoleted
  often leads to the need to migrate from one technology to another.
  Such a situation might arise if an operator deploys one of the two
  OAM protocol solutions and discovers that it needs to move to use the
  other one.

Suggested addition here:

   A specific case would be when two operators merge their networks, but
   are using different OAM solutions.

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Need help tracking down problem accessing IETF Subversion repository on Mac OS X

2011-09-27 Thread Stuart Cheshire
On 27 Sep 2011, at 7:32, Henrik Levkowetz wrote:

 Hi,
 
 Yoav's tcpdump analysis, together with Martin's observations, helped
 me find the problem at the server end.  I've changed the config now
 (addding a missing 'NameVirtualHost *:443' to Apache's config), and
 Stuart's example now works for me on OS X Snow Leopard and Lion:
 
  svn info https://svn.tools.ietf.org/svn/wg/hybi

Great. Thanks for fixing this.

Stuart Cheshire chesh...@apple.com
* Wizard Without Portfolio, Apple Inc.
* www.stuartcheshire.org

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: [payload] [Payload] Last Call: draft-ietf-payload-rfc3189bis-02.txt (RTP Payload Format for DV (IEC 61834) Video)) to Proposed Standard

2011-09-27 Thread Kazuhiro Mishima
Hi, Roni and Qin
Thank you for your comments!

I'll correspond these issues and update the draft soon.

Best regards,
Kazuhiro


2011/9/27 Qin Wu bill...@huawei.com:
 Hi, Roni:
 Thank for your replies. Your proposed changes look good to me.
 I would like to see the remaining minor issues are addressed by authors.

 Regards!
 -Qin
 - Original Message -

 From: Roni Even
 To: 'Qin Wu' ; ietf@ietf.org
 Cc: payl...@ietf.org ; 'Kazuhiro Mishima' ; i...@riken.jp ; 'Stephen Casner'
 Sent: Tuesday, September 27, 2011 2:53 AM
 Subject: RE: [payload] [Payload] Last Call:
 draft-ietf-payload-rfc3189bis-02.txt (RTP Payload Format for DV (IEC
 61834) Video)) to Proposed Standard

 Hi Qin,

 Thanks for the review see inline

 Roni



 From: payload-boun...@ietf.org [mailto:payload-boun...@ietf.org] On Behalf
 Of Qin Wu

 Sent: Tuesday, September 20, 2011 9:16 AM
 To: ietf@ietf.org
 Cc: payl...@ietf.org
 Subject: Re: [payload] [Payload] Last Call:
 draft-ietf-payload-rfc3189bis-02.txt (RTP Payload Format for DV (IEC
 61834) Video)) to Proposed Standard



 Hi,

 I have just read this document and have some minor comments, hope it is not
 late to be taken into account.

 1. Section 1:

 [Qin]: It looks this version extends RFC3189 to support some new features.
 However I can not see any dependency to RFC3189 in the introduction section
 until
 I read the last section in this document, is it more straigtforward and
 clear to merge the section 7,8
 to the introduction section and clarify how this document is different from
 RFC3189.



 Roni: This document does not extend but obsolete RFC3189, so it should not
 reference it. As for the difference from RFC3189 I think it is better to
 have a separate section.



 [Qin]: Yes, I recheck this document, you are right, this document is
 intending to replace the old feature with new feature, e.g., abandon using
 SMPTE 306M, replace with SMPTE314M. Therefore I agree with your
 justification.





 2. Section 3.1.1

 

 3.1.1.  Media Type Registration for DV Video

    Type name:  video



    Subtype name:  DV



    Required parameters:



   encode:  type of DV format.  Permissible values for encode are

  SD-VCR/525-60,
  SD-VCR/625-50,
  HD-VCR/1125-60,
  HD-VCR/1250-50,
  SDL-VCR/525-60,
  SDL-VCR/625-50,
  314M-25/525-60,
  314M-25/625-50,
  314M-50/525-60,
  314M-50/625-50,
  370M/1080-60i,
  370M/1080-50i,
  370M/720-60p,
  370M/720-50p,
  306M/525-60 (for backward compatibility),
  and 306M/625-50 (for backward compatibility).

 

 [Qin]: In section 7, you claim you have removed SMPTE 306M, since it is
 covered by SMPTE 314M format.
 However in section 3.1.2, the value for SMPTE 306M is still kept in the
 encode list. So the question is
 where do you remove SMPTE 306M in this document? Why SMPTE 306M in the media
 type registration is still kept?
 Does this conflict with what you said in the section 7?



 The same comment applies in any place of this document where SMPTE 306M is
 still kept.



 Roni: Maybe change the first bullet of section 7

  Removed SMPTE 306M, since it is covered by SMPTE 314M format

 To

 support for SMPTE 306M is only for backward interoperability, since it is
 covered by SMPTE 314M format



 [Qin]: Yes, make sense to me.



 3. Section 3.1.1

 

    Optional parameters:



   audio:  whether the DV stream includes audio data or not.

  Permissible values for audio are bundled and none.  Defaults to
  none.



    Encoding considerations:



  DV video can be transmitted with RTP as specified in RFC
  (This document).  Other transport methods are not specified.



    Security considerations:



  See Section 4 of RFC (This document).



    Interoperability considerations:  NONE

 



  [Qin]: Is it real that there is no interoperability consideration since
 Interoperability with Previous Implementations is discussed in the section 8
 of this document?



 Roni: Good, add a reference to section 8 of this RFC



 [Qin]:  Your proposal Looks good to me.



 4. Section 3.2.1

 

    Note that the examples in RFC3189 (older version of this document)
    provides incorrect SDP a=fmtp attribute usage.



 

 [Qin]: I believe it is not appropriate to spell this note out when this
 document is published but you may put
 it as errata or in the section 7.



 Roni: good point. Maybe discuss it in section 8, since this may be an
 interoperability issue





 [Qin]: Good suggestion since a=fmtp:format format-specific parameters
 should not be used in this document, instead, the format-specific parameter
 is incorporated into

 a = fmtp: payload type encode=DV-video encoding;audio ...





 Also not that the syntax  a=fmtp:payload type encode=DV-video encoding
 audio=audio

   bundled



 Does not have ; before the audio while the examples have, I think that ;
 

Protocol Action: 'RPL Objective Function Zero' to Proposed Standard (draft-ietf-roll-of0-20.txt)

2011-09-27 Thread The IESG
The IESG has approved the following document:
- 'RPL Objective Function Zero'
  (draft-ietf-roll-of0-20.txt) as a Proposed Standard

This document is the product of the Routing Over Low power and Lossy
networks Working Group.

The IESG contact persons are Adrian Farrel and Stewart Bryant.

A URL of this Internet Draft is:
http://datatracker.ietf.org/doc/draft-ietf-roll-of0/




Technical Summary

  The Routing Protocol for Low Power and Lossy Networks (RPL)
  was designed as a generic core protocol that is agnostic to
  metrics and that is adapted to a given problem using Objective
  Functions (OF). This separation of Objective Functions from the core
  protocol specification allows RPL to adapt to meet the different
  optimization criteria required by the wide range of use cases.

  RPL forms Destination Oriented Directed Acyclic Graphs (DODAGs)
  within instances of the protocol.  Each instance is associated with a
  specialized Objective Function.  A DODAG is periodically
  reconstructed in a new Version to enable a global reoptimization of
  the graph.

  An Objective Function selects the DODAG Version that a device joins
  within an instance, and a number of neighbor routers within that
  DODAG Version as parents or feasible successors.  The OF generates
  the Rank of the device, that represents an abstract distance to the
  root within the DODAG.  In turn, the Rank is used by RPL to avoid 
  loops and verify forward progression towards a destination.

  This document defines Objective Function 0 (OF0) which operates on
  parameters that are obtained from provisionning, from the RPL DODAG
  Configuration option, and from the RPL DIO base container.

  OF0 is designed as a default OF that will allow interoperation
  between implementations in a wide spectrum of use cases.  

Working Group Summary

  No discontent. 

  There has been some confusion about the WG process because of the
  large number of revisions since the first WG last call. Here is the timeline:

 01/05New revision -05
 02/22WG last call on -05
 03/13On-list discussions of changes
 03/13New revision -06
 03/13New revision -07
 03/14WG last call on -07
 03/16,,  On-list discussions
 03/30New revision -08
 04/05New revision -09
 04/11Comment on list
 04/11New revision -10
 04/21Comment on list
 05/05Notice to list about changes
 05/05New revision -11
 05/08WG chair review posted to list
 05/10Comment on list
 05/17Notice to list about changes
 05/17New revision -12
 05/18..  On-list discussion
 05/24Publication request
 06/01AD review posted to list
 06/11AD review :: Revised I-D needed
 06/17New revision -13
 06/20New revision -14
 06/20IETF Last Call
 07/04IETF Last Call ends
 07/08New revision -15
 07/16Ballot issued
 08/09IESG Discusses
 08/09..  On-list discussions
 08/11IESG telechat
 
   Thus: all changes as a result of comments made on the list. Plenty of 
explanation to
   the list about what was changing and why.

   A further poll of the WG will be carried out after changes to address IESG 
Discusses

Document Quality

  The OF0 has been extensively discussed and reviewed by key contributors
  of the Working Group. There are believed to be two implementations.

Personnel

  JP Vasseur (jvass...@cisco.com) is the Document Shepherd.
  Adrian Farrel (adr...@olddog.co.uk) is the Responsible AD.

RFC Editor Note

Section 4.2.1
OLD
   2.   An implementation SHOULD validate a router prior to selecting it
as preferred as discussed in Section 3.  The validation involves
layer 2 connectivity to the router, layer 3 connectivity offered
by the router, and may involve other factors such as policies.
In most cases, a router that does not succeed the validation
process cannot be further considered for selection as preferred
parent.  In any case a router that succeeded that validation
process SHOULD be preferred.
NEW
   2.   Prior to selecting a router as the preferred parent, an
implementation SHOULD validate the connectivity and suitability 
of the router as discussed in Section 3.  This validation 
involves checking the layer 2 connectivity to the router, the 
layer 3 connectivity offered by the router, and may involve 
examination of other factors such as locally or globally 
configured policies.

In most cases, a router that does not succeed the validation
process cannot be further considered for selection as preferred
parent.  In any case a router that succeeded that validation
process SHOULD be preferred over one that does not succeed.
END
___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce


Protocol Action: 'Using the Generic Associated Channel Label for Pseudowire in MPLS-TP' to Proposed Standard (draft-ietf-pwe3-mpls-tp-gal-in-pw-01.txt)

2011-09-27 Thread The IESG
The IESG has approved the following document:
- 'Using the Generic Associated Channel Label for Pseudowire in MPLS-TP'
  (draft-ietf-pwe3-mpls-tp-gal-in-pw-01.txt) as a Proposed Standard

This document is the product of the Pseudowire Emulation Edge to Edge
Working Group.

The IESG contact persons are Stewart Bryant and Adrian Farrel.

A URL of this Internet Draft is:
http://datatracker.ietf.org/doc/draft-ietf-pwe3-mpls-tp-gal-in-pw/




Technical Summary

This document describes the requirements for using the Generic
Associated Channel Label (GAL) in Pseudowires (PWs) in MPLS-TP
networks, and provides an update to the description of GAL usage
in RFC5586 by removing the restriction that is imposed on using
GAL for PWs especially in MPLS-TP environments. This is required
to allow PWs that do not use a PW control word to be used in MPLS-TP
and for them to use the full range of MPLS-TP OAM supported by the G-ACh.

This document is a product of the PWE3 working group.

This document is STANDARDS TRACK.


Working Group Summary

There is consensus in  the working group for this change to RFC5586.

Document Quality

There are no concerns with document quality. 

Personnel

Matthew Bocci (matthew.bo...@alcatel-lucent.com) is 
the Document Shepherd for this document.
Stewart Bryant (stbry...@cisco.com) is the Responsible 
Area Director

RFC Editor Note

In abstract
s/[RFC5586]/RFC5586/

Section 1
s/associated control channel/Associated Channel/  (per RFC 5085)
s/generalizes this for use in the/generalizes this for use as the/
s/but places restrictions on GAL usage with PWs. /but prohibits GAL usage with 
PWs./


In section 3

OLD
[RFC3985] architectures appropriate
NEW
[RFC3985] architectures as appropriate
END

s/but not for PWs using an MPLS-TP PSN./ but not for PWs in an MPLS-TP 
network./ 

... and at the very bottom of section 3

OLD
  is replaced by:

  In MPLS-TP, the GAL MUST be used with packets on a G-ACh on
  LSPs, Concatenated Segments of LSPs, and with Sections, and
  MAY be used with PWs. It MUST always be at the bottom of the
  label stack (i.e., S bit set to 1). However, in other MPLS
  environments, this document places no restrictions on where
  the GAL may appear within the label stack.

NEW

  is replaced by:

  In MPLS-TP, the GAL MUST be used with packets on a G-ACh on
  LSPs, Concatenated Segments of LSPs, and with Sections, and
  MAY be used with PWs. The presence of a GAL indicates that
  an ACH immediately follows the MPLS label stack.  
END


___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce


Re: Informational RFC to be: draft-irtf-asrg-bcp-blacklists-10.txt

2011-09-27 Thread The IESG
The IESG has no problem with the publication of 'Overview of Email DNSBL
Best Practise' draft-irtf-asrg-bcp-blacklists-10.txt as an
Informational RFC.

The IESG wants to make the IRSG aware of its concern that there is
a potential for confusion between the IETF Best Current Practice (BCP)
series and the use of the term Best Practise in the title and the abstract
as well as the use of the acronym BCP in the page header of each
page and in sections 1.2 and 3.6. Anything that the IRSG can do to
avoid this confusion would be appreciated.

The IESG would also like the IRSG to review the comments in
the datatracker
(http://datatracker.ietf.org/doc/draft-irtf-asrg-bcp-blacklists/) related
to this document and determine whether or not they merit incorporation
into the document. Comments may exist in both the ballot and the comment
log.

A URL of this Internet Draft is:
http://datatracker.ietf.org/doc/draft-irtf-asrg-bcp-blacklists/

The process for such documents is described at
http://www.rfc-editor.org/indsubs.html

Thank you,

The IESG Secretary




Technical Summary

   The rise of spam and other anti-social behavior on the Internet has
   led to the creation of shared DNS-based lists (DNSBLs) of IP
   addresses or domain names intended to help guide email filtering.
   This memo summarizes guidelines of accepted best practise for the
   management of public DNSBLs by their operators as well as for the
   proper use of such lists by mail server administrators (DNSBL users),
   and it provides useful background for both parties.  It is not
   intended to advise on the utility or efficacy of particular DNSBLs or
   the DNSBL concept in general, nor to assist end users with questions
   about spam.

Working Group Summary

   This document is a product of the Anti-Spam Research Group and
   represents the consensus of that group.

Document Quality

   This document is a research publication of the IRTF.

Personnel

   Pete Resnick presn...@qualcomm.com is the responsible Area Director.

IESG Note

   The IESG has concluded that this work is related to IETF work done
   in the MARF WG and the as-yet-unchartered REPUTE BOF, but this relationship
   does not prevent publishing.
___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce


Re: Informational RFC to be: draft-tripathi-roll-rpl-simulation-07.txt

2011-09-27 Thread The IESG
The IESG has no problem with the publication of 'Performance Evaluation
of Routing Protocol for Low Power and Lossy Networks (RPL)'
draft-tripathi-roll-rpl-simulation-07.txt as an Informational RFC.

The IESG would also like the RFC-Editor to review the comments in
the datatracker
(http://datatracker.ietf.org/doc/draft-tripathi-roll-rpl-simulation/)
related to this document and determine whether or not they merit
incorporation into the document. Comments may exist in both the ballot
and the comment log.

A URL of this Internet Draft is:
http://datatracker.ietf.org/doc/draft-tripathi-roll-rpl-simulation/

The process for such documents is described at
http://www.rfc-editor.org/indsubs.html

Thank you,

The IESG Secretary




Technical Summary

   This document presents a performance evaluation of the Routing
   Protocol for Low power and Lossy Networks (RPL) for a small outdoor
   deployment of sensor nodes and for a large scale smart meter network.
   Detailed simulations are carried out to produce several routing
   performance metrics using these real-life deployment scenarios.

Working Group Summary

  This document is submitted on the Independent Stream

  The IESG will want to note that this document was discussed over 
  six revisions on the ROLL WG mailing list. During that time a 
  number of suggestions were made, and the draft was updated
  accordingly. It should be noted that, while most of the comments 
  raised in the working group were addressed, some concerns about
  the methodology remain unanswered.

  The working group expressed interest in having a document that
  covered simulation results, but could not decide what would go in
  that document. Additionally, the authors of this document felt that
  they wished to document and describe their simulation and did not
  have the resources to take on other simulations with different
  methodologies as suggested by the working group.

  For these reasons they have brought the I-D forward on the Independent
  Stream rather than through the WG or with AD sponsorship. The existence
  of this document in no way precludes the WG from producing its own
  document describing simulations, and does not prevent other authors
  from describing their own simulations and presenting them for
  publication. All authors of RPL simulation reports are encouraged to 
  share them for open discussion on the ROLL mailing list.

Document Quality

  The document has been reviewed by Craig Partridge on behalf of the
  ISE. The authors updated the document after his review.

  As noted above, the document has been updated after several reviews
  in the ROLL WG.

  This is an Informational document and not subject to implementation.

- - - - - -

RFC Editor Note

The IESG has concluded that this work is related to IETF work done in the ROLL, 
IPPM, and BMWG working groups, but this relationship does not prevent 
publishing.
___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce


Last Call: draft-ietf-ccamp-wson-impairments-07.txt (A Framework for the Control of Wavelength Switched Optical Networks (WSON) with Impairments) to Informational RFC

2011-09-27 Thread The IESG

The IESG has received a request from the Common Control and Measurement
Plane WG (ccamp) to consider the following document:
- 'A Framework for the Control of Wavelength Switched Optical Networks
   (WSON) with Impairments'
  draft-ietf-ccamp-wson-impairments-07.txt as an Informational RFC

The IESG plans to make a decision in the next few weeks, and solicits
final comments on this action. Please send substantive comments to the
i...@ietf.org mailing lists by 2011-10-11. Exceptionally, comments may be
sent to i...@ietf.org instead. In either case, please retain the
beginning of the Subject line to allow automated sorting.

Abstract

As an optical signal progresses along its path it may be altered by
the various physical processes in the optical fibers and devices it
encounters. When such alterations result in signal degradation, these
processes are usually referred to as impairments. These physical
characteristics may be important constraints to consider when using a
GMPLS control plane to support path setup and maintenance in
wavelength switched optical networks.

This document provides a framework for applying GMPLS protocols and
the PCE architecture to support Impairment Aware Routing and
Wavelength Assignment (IA-RWA) in wavelength switched optical
networks. This document does not define optical data plane aspects;
impairment parameters, measurement of, or assessment and
qualification of a route, but rather it describes the architectural
and information components for protocol solutions.



The file can be obtained via
http://datatracker.ietf.org/doc/draft-ietf-ccamp-wson-impairments/

IESG discussion can be tracked via
http://datatracker.ietf.org/doc/draft-ietf-ccamp-wson-impairments/


No IPR declarations have been submitted directly on this I-D.
___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce


WG Review: Reputation Services (repute)

2011-09-27 Thread IESG Secretary
A new IETF working group has been proposed in the Applications 
Area.  The IESG has not made any determination as yet. The following 
draft charter was submitted, and is provided for informational purposes 
only. Please send your comments to the IESG mailing list (i...@ietf.org) 
by Tuesday, October 4, 2011. 

Reputation Services (repute)
-
Status: Proposed Working Group
Last Updated: 2011-09-13

Chair(s):
TBD

Applications Area Director(s):
  Pete Resnick (presn...@qualcomm.com)
  Peter Saint-Andre (stpe...@stpeter.im)

Applications Area Advisor:
  Pete Resnick (presn...@qualcomm.co)

Mailing Lists:
  General Discussion: rep...@ietf.org
  To Subscribe:   https://www.ietf.org/mailman/listinfo/repute
  Archive:http://www.ietf.org/mail-archive/web/repute/

Description of Working Group:

In the open Internet, making a meaningful choice about the handling
of content requires an assessment of its safety or trustworthiness.
This is based on a trust metric for the owner (identity) of an
identifier associated with the content, to distinguish (likely)
good actors from bad actors.  The generic term for such information
is reputation.  This working group will develop mechanisms for
reputation reporting by independent services.  One mechanism will be
for a basic assessment of trustworthiness.  Another will provide a
range of attribute/value data that is used as input to such an
assessment.  Each service determines the attributes it reports.

Various mechanisms have been developed for associating a verified
identifier with email content, such as with SPF (RFC4408) and DKIM
(RFC4871).  An existing reputation query mechanism is
Vouch-by-Reference (RFC5518). It provides a simple Boolean
response concerning a domain name used for email.  The current working
group effort will expand upon this, to support additional
applications -- such as Web pages and hosts -- and a wider range of
reporting information.

Given the recent adoption of domain name verification for email,
by SPF and DKIM, the most obvious initial use case for reputation is
for email.  Inbound email filters that perform message authentication
can obtain a verified domain name and then consult a reputation service
provider to make a determination (perhaps also based on other
factors) of whether or not the content is desirable and take
appropriate action with respect to delivery, routing or rejection.

Another possible use case is identity-based evaluation of web
content using technologies such as the DKIM-derived DOSETA
(work in progress).

This working group will produce specifications for:

   * the detailed requirements for reporting

   * an end-to-end system architecture in which reporting occurs

   * the mechanisms and formats for reporting

Two mechanisms are under consideration:

   * simple -- a reputation is expressed in a simple manner,
   via records in the DNS
   (see draft-kucherawy-reputation-query-dns)

   * extended -- a response can contain more complex information
 useful to an assessor, reported over HTTP using
 an encoding such as XML or JSON
 (see draft-kucherawy-reputation-query-http)

The syntactic and semantic aspects of mechanisms and formats will be
designed to be application-independent and portable (i.e., reputation
provider-independent).  By distinguishing reporting information
(format) from reporting mechanism (channel), the specifications
will permit adaptation to support reporting through additional
channels.  Limited application-specific tailoring will be
provided for email, to demonstrate the approach, which can be
applied for supportting additional applications.  The design and
specification will also permit adaptation to support reporting
through additional transport channels.

Items that are specifically out of scope for this work:

   * Specific actions to be taken in response to a reputation reply.
 It is up to assessors (i.e., the consumers of reputation data)
 to determine this.  Non-normative illustrations, however, can
 be included to demonstrate possible uses of reputation data
 in a particular context.

   * Selection of what data might be valid as the subject of a
 reputation query.  It is up to reputation service providers and
 assessors to select which qualities of a body of data might
 be useful input to reputation evaluation.

   * Concerns about methods of verifying domain names that are used
 for email reputation.  A verified domain name is a starting point
 for this work; the means by which it was obtained and the
 meaning of the name or its verification are matters for
 discussion elsewhere.

   * Algorithms to be applied to aggregated feedback in order to
 compute reputations.  These are part of a back-end system, usually
 proprietary, and not appropriate for specification as part of
 a query/reply framework and