IPv6 Zone Identifiers Considered Hateful

2012-03-19 Thread Sabahattin Gucukoglu
I've obviously not been doing all my homework, and RFC 4007 slipped my 
attention.  Worse, for all the communication my IPv6 nodes are doing amongst 
themselves using link-local addresses, it's never really been much more than a 
hastily-justified curiosity why, when I ping one from the other using 
link-local-scoped addresses, I have to put in this zone identifier (%ifname on 
BSD and Linux).

Yesterday, I configured a DNS server to listen just using a link-local address, 
the one autoconfigured for an ethernet card accessible to all the nodes.  It's 
a host, not a router, so I'm relying on that address not being routable and 
being filtered at the router.  It didn't work.  The server would not start 
until I specified the zone suffix.  Now I am wondering why, given that there is 
no ambiguous link-local address anywhere around here, I need to do that.  Can't 
it figure it out itself?

What about the other problems with this suffix?  It's host-specific, so it's 
unsafe to share it over the network (I need to share the DNS server using 
stateless DHCPv6).  The format differs between OSes (Windows uses %n).  It 
interferes with URLs, if Wikipedia is to be believed.  It breaks expectations, 
essentially because it's the exception to the rule that the address bits (and 
hence the address format) conveys all the required information.

So zone suffixes are considered hateful.  Yes, it's true, I enjoy a good whinge 
and it's a shame I had to learn this on-demand, but really, their use should be 
limited to just those circs where it's actually necessary, and let's be honest, 
that ought to be very rare.

Cheers,
Sabahattin


RE: Last Call: draft-betts-itu-oam-ach-code-point-03.txt (Allocation of an Associated Channel Code Point for Use by ITU-T Ethernet based OAM) to Informational RFC

2012-03-19 Thread Maarten vissers
+1

 Original Message 
From: Rui Costa rco...@ptinovacao.pt
Sent: zaterdag 17 maart 2012 12:00:56 +
To: ietf@ietf.org ietf@ietf.org
Subject: RE: Last Call: draft-betts-itu-oam-ach-code-point-03.txt 
(Allocation of  an Associated Channel Code Point for Use by ITU-T 
Ethernet based OAM) to Informational RFC

Hello,  

I support the allocation of an ACH codepoint to G.8113.1, not precluding 
the ITU-T to progress refinements. Ergo, i support this draft and 
proposal http://www.ietf.org/mail-archive/web/ietf/current/msg72191.html

IMHO, the status quo analysis expressed in both 
http://www.ietf.org/mail-archive/web/ietf/current/msg72188.html and 
http://www.ietf.org/mail-archive/web/ietf/current/msg72273.html is 
accurate.   

Regards,
Rui 
=


 Original Message 
From: The IESG iesg-secret...@ietf.org
Sent: Wed, 22 Feb 2012 07:12:52 -0800
To: IETF-Announce ietf-annou...@ietf.org
Subject: Last Call: draft-betts-itu-oam-ach-code-point-03.txt 
(Allocation of  an Associated Channel Code Point for Use by ITU-T 
Ethernetbased OAM) to Informational RFC

The IESG has received a request from an individual submitter to consider 
the following document:
- 'Allocation of an Associated Channel Code Point for Use by ITU-T
 Ethernet based OAM'
draft-betts-itu-oam-ach-code-point-03.txt as an Informational RFC

The IESG plans to make a decision in the next few weeks, and solicits 
final comments on this action. Please send substantive comments to the 
ietf@ietf.org mailing lists by 2012-03-21. Exceptionally, comments may 
be sent to i...@ietf.org instead. In either case, please retain the 
beginning of the Subject line to allow automated sorting.

Abstract

 This document assigns an Associated Channel Type code point for
 carrying Ethernet based Operations, Administration, and Management
 messages in the MPLS Generic Associated Channel (G-ACh).

The file can be obtained via
http://datatracker.ietf.org/doc/draft-betts-itu-oam-ach-code-point/

IESG discussion can be tracked via
http://datatracker.ietf.org/doc/draft-betts-itu-oam-ach-code-point/


No IPR declarations have been submitted directly on this I-D.
___
IETF mailing list
IETF@ietf.org
https://www.ietf.org/mailman/listinfo/ietf  



RE: Query to the community -- An additional IETF Meeting event?

2012-03-19 Thread George, Wes
 From: ietf-boun...@ietf.org [mailto:ietf-boun...@ietf.org] On Behalf Of Henk
 Uijterwaal

 We have had cases where the opening reception was sponsored by somebody other
 than the host for the meeting (if there was a host).  The sponsor didn't get
 much more than the possibility to put a sign near the front door and get
 some recognition during one of the plenary sessions.  This proposal
 essentially
 says that the sponsors can demonstrate equipment during the reception.

[WEG] +1
I was one of the people who suggested this to IAOC after recently attending my 
first NANOG in a good while.  While I realize the audiences (and therefore the 
attractiveness to marketing budgets) are different, the sharp contrast between 
the two made it clear that there may be some opportunities to tweak IETF's 
sponsorship methods and potentially reduce the costs attendees are asked to 
bear without turning it into yet another tradeshow or forcing I* members to 
wear auto-racing-style suits emblazoned with vendor logos. :-)
In addition to Beer-n-gear, NANOG had 2 other sponsored (i.e. free to all 
attendees) socials, and enough free T-shirts to last a person a week, plus 3-4 
slides full of sponsor logos. Not that we need any more free t-shirts, but 
compare that to this IETF, where if you want a shirt, you must purchase it 
because we didn't have a primary sponsor until Cisco took pity on us (and 
apparently the shirt cannot be sponsored separately).

That said, I don't think that this potential experiment requires a *separate* 
night. I'd much prefer to replace the  current overpriced hotel cash bar 
arrangement at the welcome reception with something more like beer-n-gear. I'm 
also willing to try it in lieu of a social event, since those are typically hit 
or miss in terms of whether the environment is conducive to socializing, 
whether they're worth the additional money one must pay to attend them, and the 
fact that these are generally limited participation (tickets required), thereby 
reducing the opportunities for group socialization.

 And, having been to such sessions at NANOG and others, I know that you don't
 have to look at the gear brought by the vendors, it is perfectly possible to
 have the beer (for free) and have the hallway discussion you wanted to have
 anyway, while ignoring the demos.
[WEG] This is definitely true. The two are not mutually exclusive.

Wes George

This E-mail and any of its attachments may contain Time Warner Cable 
proprietary information, which is privileged, confidential, or subject to 
copyright belonging to Time Warner Cable. This E-mail is intended solely for 
the use of the individual or entity to which it is addressed. If you are not 
the intended recipient of this E-mail, you are hereby notified that any 
dissemination, distribution, copying, or action taken in relation to the 
contents of and attachments to this E-mail is strictly prohibited and may be 
unlawful. If you have received this E-mail in error, please notify the sender 
immediately and permanently delete the original and any copy of this E-mail and 
any printout.


Re: IPv6 Zone Identifiers Considered Hateful

2012-03-19 Thread Francis Dupont
 In your previous mail you wrote:

  So zone suffixes are considered hateful.

= in fact it is not the problem: link-local address
are considered hateful.

Regards

francis.dup...@fdupont.fr

PS: at least for use in standard applications.


Re: Trade show at IETF

2012-03-19 Thread Hector
Separate budgets, but it really all depends on the type of Trade 
Shows the IETF is contemplating. I will note it does spike my 
interest to consider going to a IETF event from a technical sales 
standpoint, illustrating products built on IETF standardized protocol 
efforts, developing technology transfer agreements, joint ventures, 
etc.   But if targeting a consumer market, thats a different set of 
departmental cost issues (Sales, engineers, technicians, etc).


My only warning with this is that it make become too successful! It 
may actually attracts more vendors, especially among those whose main 
interest is as implementators and don't care much for the getting 
involved with the protocol development politics.  As it gets bigger, 
the IETF will need to be ready with larger locations and offering 
pre-ordering space selections for the next events.   This is very 
important part of the strategic booth location planning.  Finally, a 
certain level of commitment will need to be shown because if the IETF 
does eventually decide it no longer wants (or can't) to get into this 
area, then refunds will be needed and whole slew of legal messy 
contract lawyers are needed.   Also, once its reaches of level where 
its big part of the IETF, it might begin to see the unions knocking on 
the door which adds even more cost.


--
HLS

John C Klensin wrote:


--On Friday, March 16, 2012 21:28 -0700 Joel jaeggli
joe...@bogus.com wrote:


On 3/16/12 20:04 , John C Klensin wrote:

Note too that, if the company sends only five technical people
and concludes that it doesn't suffer harm from that small a
number, the odds of getting back up to 10 if the experiment is
terminated and those five sales/market types disappear is just
about zero, at least until the economy improves considerable.

Scale and juggle the figures as you like, this is not a
zero-risk experiment.

You know nothing about marketing budgets.


Sorry, Joel.  I have both had to administer those budgets and
policies, been the victim of them, as well as seen it go on in
companies with whom I've done consulting work on organizational
and strategic matters.  Companies differ -- I tried to say that
-- but in many companies that are really oriented toward the
bottom line, marketing controls virtually all travel budgets.
In a few, sales and/or controls and perceptions of their needs
control almost all budget categories: Engineering is rarely a
profit center, the money has to come from somewhere, and the
organizational question is how much control the money source and
its needs affect how it is spent.

I didn't mean to suggest that the effects would be felt
immediately -- there are usually budget cycles.  But, over the
medium term, even more relaxed organizations in tight budget
situations do tend to eventually notice total number of people
attending from company, and push back.   If the attendees
include both people from cost centers and people from profit
centers, the latter tend to win the battle for slots, or at
least to win less.

But I suppose I should defer to your superior experience in
senior management and corporate finance roles.

john






Re: Issues relating to managing a mailing list...

2012-03-19 Thread Eric Burger
I am responding to Russ' original message, because it is too hard to pick one 
of the 52 responses received so far. A quick count is something like 10 
thinking this is a good idea with the remainder thinking this idea ranks 
somewhere between really bad and evil.

Apps Area people who have thought deeply about the topic over the last 25 years 
are in near unanimous agreement this idea is on the evil end of the spectrum.  
While Apps Area folks do not have a monopoly on email ideas, I would offer we 
listen carefully.  This idea brings out a whole host of very old (and solved!) 
issues:
   o  What constitutes a message? (if you strip stuff, you will break 
signatures)
   o  What is an attachment? (is it useless cruft like TNEF or is it S/MIME? 
What about the next part type?)
   o  What about using 15-year-old solutions like HTTP on the composing side?
   o  What about using 10-year-old solutions like IMAP 4?
   o  ...

If another vote in the Nay column is needed, here it is. Nay.
--
- Eric

On Mar 14, 2012, at 7:46 PM, Russ Housley wrote:

 Some suggestions have been made about the IETF mail lists.
 There is a way for mailman to strip attachments and put them
 in a place for downloading with a web browser.  This would be
 a significant change to current practice, so the community
 needs to consider this potential policy change.
 
 What do you think?
 
 Russ
 
 
 The only bug in the soup is that it seemed to me that we might
 want to look into an alternative approach.  We have asked people
 to post large documents somewhere and only send a pointer.  Not
 everyone can do that, lots of people forget, and some people are
 just not willing to take the extra step.
 
 Plus, we cannot expect people to keep things posted on their own
 personal, or their company's, web-site indefinitely.  If they
 don't keep it there, then the pointer in the archive will become
 stale, and information that should probably be there is lost.
 
 So we need a solution to the issue with really big email messages
 sometime.
 
 One solution might be to simpy strip attachments off, put them
 in the archive and replace them with a pointer.  That shouldn't
 be that hard, since a lot of anti-virus software does something
 similar with suspect attachment types.
 
 Or we could - once again - ask people to post attachments and use
 a pointer in their mail, only provide them with a place to post
 them in the same general area as the mail archive.
 
 If there is already something like this in place, please let me
 know what it is and I will add a pointer to it in my too big
 rejection messages.
 
 The thing about threaded messages getting too big is a slightly
 different issue, brought about by the increasing use of HTML
 format email.  I talked years ago about this with Scott Bradner
 because I really think that HTML format messages are useful and
 relatively easy to read when compared to plain old text.
 
 But using HTML leads to messages that are deceptively big.
 
 Possibly the right answer in that case is to bump the size limit
 up to maybe 100K.  Even with HTML format, people will many likely
 realize that nobody is going to read past the 10th back message
 in any case (or if they do want to, they can look at the thread
 in the archive).
 
 But even that approach is not fool proof, and there are a lot of
 resourceful fools out there.
 
 Just trying to be creative, and help out...
 



smime.p7s
Description: S/MIME cryptographic signature


Beer and Gear

2012-03-19 Thread O'Reirdan, Michael
I think this would be a good idea. I have attended a number of the NANOG events 
and always found I can talk to vendors on a technical level. Additionally, it 
provides a convivial forum for attendees to get together and talk to each 
other. I don’t think it would detract from other IETF events and to be honest, 
most large events manage to co-exist with a multiplicity of sponsors. I am 
thinking of events like NANOG, MAAWG etc.

Mike


FW: Query to the community -- An additional IETF Meeting event?

2012-03-19 Thread Knight, Frederick
I think this is a good thing to try.

-Original Message-
From: ietf-announce-boun...@ietf.org [mailto:ietf-announce-boun...@ietf.org] On 
Behalf Of IAOC Chair
Sent: Friday, March 16, 2012 4:14 PM
To: IETF Announcement List
Subject: Query to the community -- An additional IETF Meeting event?


The IESG and IAOC are considering an addition to the IETF meeting week, and we 
would like your views before we develop the idea further.

At NANOG, there is a Beer and Gear reception one evening.  There are exhibitor 
tables with product vendors (hardware and software) and service providers 
(registries, registrars, ISPs, ESPs, etc.) and anyone else interested in face 
time with NANOG participants. They show their equipment and services.  There is 
bar in the center of the room serving beer, wine, and soft drinks. There are 
hors d'oeuvres scattered around the room.

  QUESTION:  What do you think about doing a Beer and Gear style
 of event on an evening that does not conflict with
 other IETF activities?

This would be an opportunity for free food and drink for attendees, for vendors 
and service providers to talk with IETF participants, and for additional 
revenue to the IETF.  Obviously, attendance would be optional.

Technical people are at the tables, not sales or marketing staff.  Vendors know 
that the audience is very technical, so they send the people that can 
communicate with that audience.

We would charge for exhibit tables, to raise additional funds for the IETF. A 
stronger base of opportunities for IETF sponsorship distributes our funding, 
making it less fragile; this could make it less likely that we would have 
last-minute scrambles for additional sponsors, including hosts. A successful 
Beer-and-Gear like event would not solve this but it would help.

In the past, the IETF has avoided vendor exhibits and demonstrations.  However 
it is clear that NANOG has found a balance that works and that NANOG 
participants and the vendors consider the event valuable.  We believe this 
could translate well to the IETF.

We are considering some test events, hopefully to be held at IETF 84 
(Vancouver, July 2012) and IETF 85 (Atlanta, November 2012).

The kinds of evaluation criteria we are considering could include:

- Did participants enjoy the event?

- Did vendors consider the event successful?

- Did the IETF raise additional funds?

- Did the event steal potential sponsors away from other
  aspects of the meeting?

So, what do you think?  Is this something that we should try?

Please respond on the ietf@ietf.org mail list.

On behalf of the IESG and the IAOC,

Russ Housley
Bob Hinden


VS: Query to the community -- An additional IETF Meeting event?

2012-03-19 Thread teemu.savolainen
Hi,

I would find this educative. So +

Would this be also the centralized place to show prototype implementations of 
IETF technologies still in WGs process, or would/could those be separate events 
(similar to the past, e.g. dedicated room)?

Teemu

 alkuperäinen viesti 
Lähett.: ext IAOC Chair
Lähet.:  16.03.2012, 22:14
V.ottaja: IETF Announcement List
Aihe: Query to the community -- An additional IETF Meeting event?


The IESG and IAOC are considering an addition to the IETF meeting week, and we 
would like your views before we develop the idea further.

At NANOG, there is a Beer and Gear reception one evening.  There are exhibitor 
tables with product vendors (hardware and software) and service providers 
(registries, registrars, ISPs, ESPs, etc.) and anyone else interested in face 
time with NANOG participants. They show their equipment and services.  There is 
bar in the center of the room serving beer, wine, and soft drinks. There are 
hors d'oeuvres scattered around the room.

  QUESTION:  What do you think about doing a Beer and Gear style
 of event on an evening that does not conflict with
 other IETF activities?

This would be an opportunity for free food and drink for attendees, for vendors 
and service providers to talk with IETF participants, and for additional 
revenue to the IETF.  Obviously, attendance would be optional.

Technical people are at the tables, not sales or marketing staff.  Vendors know 
that the audience is very technical, so they send the people that can 
communicate with that audience.

We would charge for exhibit tables, to raise additional funds for the IETF. A 
stronger base of opportunities for IETF sponsorship distributes our funding, 
making it less fragile; this could make it less likely that we would have 
last-minute scrambles for additional sponsors, including hosts. A successful 
Beer-and-Gear like event would not solve this but it would help.

In the past, the IETF has avoided vendor exhibits and demonstrations.  However 
it is clear that NANOG has found a balance that works and that NANOG 
participants and the vendors consider the event valuable.  We believe this 
could translate well to the IETF.

We are considering some test events, hopefully to be held at IETF 84 
(Vancouver, July 2012) and IETF 85 (Atlanta, November 2012).

The kinds of evaluation criteria we are considering could include:

- Did participants enjoy the event?

- Did vendors consider the event successful?

- Did the IETF raise additional funds?

- Did the event steal potential sponsors away from other
  aspects of the meeting?

So, what do you think?  Is this something that we should try?

Please respond on the ietf@ietf.org mail list.

On behalf of the IESG and the IAOC,

Russ Housley
Bob Hinden


RE: [OAUTH-WG] Last Call: draft-ietf-oauth-v2-bearer-15.txt (The OAuth 2.0 Authorization Protocol: Bearer Tokens) to Proposed Standard

2012-03-19 Thread Eran Hammer
I am treating this issue as closed, unless someone wants to proposed language 
changes based on John's analysis below.

EH

 -Original Message-
 From: John Bradley [mailto:ve7...@ve7jtb.com]
 Sent: Thursday, March 08, 2012 8:13 AM
 To: Eran Hammer
 Cc: Julian Reschke; ietf@ietf.org; The IESG; oa...@ietf.org
 Subject: Re: [OAUTH-WG] Last Call: draft-ietf-oauth-v2-bearer-15.txt (The
 OAuth 2.0 Authorization Protocol: Bearer Tokens) to Proposed Standard
 
 Thanks that is better.
 
 Without knowing the lifetime of the token these are per guess probabilities.
 Effectively 128bits for a random value and 256bits for a HMAC or other
 signature.
 
 For tokens intended for handling by end-users it may be useful to give some
 advice.
 In general you don't want an attacker having more than a one in 2^14 chance
 of guessing a valid code for a AS during the lifetime of the code(NIST LoA 2).
 
 For a code randomly generated from a 94 character code set 4 characters
 gets you 26.3 bits of entropy.
 5 characters requires limiting an attacker to 2^12.3 (5,042) guesses per token
 lifetime.
 
 For a code randomly generated from a 94 character code set 5 characters
 gets you 32.9 bits of entropy.
 5 characters requires limiting an attacker to 2^18.9 (489,178) guesses per
 token lifetime.
 
 If the token is single use and the client uses it right away that is easy,
 however in a worst case scenario the token might live 10min?
 That would be 8.4 attempts per second as a max for a 4 character code or 815
 per second for 5 characters.
 
 That is all way too much to explain however I would recommend as a general
 rule:
 
 Credentials intended for handling by end users SHOULD be a minimum of 5
 randomly generated charters from a set of 94 or otherwise contain a
 minimum entropy of 2^32.9.
 
 That is probably high enough that the AS will notice an attack,  lower entropy
 may pass under the radar.
 Also the chances of an attacker being successful go up proportionally to the
 number simultaneous codes in flight at any point (it becomes a non targeted
 attack).
 
 It isn't something that I will loose sleep over,  It gives me something else 
 to
 profile:)
 
 Thanks
 John B.
 
 On 2012-03-07, at 8:18 PM, Eran Hammer wrote:
 
  New text:
 
   The probability of an attacker guessing generated tokens (and other
 credentials not
   intended for handling by end-users) MUST be less than or equal to
 2^(-128) and SHOULD be
   less than or equal to 2^(-160).
 
  Removed reference to RFC 1750.
 
  EH
 
  -Original Message-
  From: John Bradley [mailto:ve7...@ve7jtb.com]
  Sent: Monday, February 06, 2012 5:07 PM
  To: Eran Hammer
  Cc: Julian Reschke; ietf@ietf.org; The IESG; oa...@ietf.org
  Subject: Re: [OAUTH-WG] Last Call: draft-ietf-oauth-v2-bearer-15.txt
 (The
  OAuth 2.0 Authorization Protocol: Bearer Tokens) to Proposed Standard
 
  RE new text in Draft 23
 
  http://tools.ietf.org/html/draft-ietf-oauth-v2-23#section-10.10
 
  Generated tokens and other credentials not intended for handling by
end-users MUST be constructed from a cryptographically strong random
or pseudo-random number sequence ([RFC1750]) generated by the
authorization server.
 
  Given that many implementations may elect to use signed tokens, such as
  SAML or JWT (JOSE) this should not be a MUST.
 
  Giving people sensible defaults such as the probability of an attacker
  guessing a valid access token for the protected resource should be less
 than
  2^(-128).
 
  The probability of generating hash colisions randomly is a odd metric,  
  2^(-
  128) for a SHA256 as I recall.
  Many factors play into what is secure, token lifetime etc.
 
  I don't mind some reasonable defaults but adding a requirement for
  unstructured tokens is a bit much.
 
  Regards
  John B.
 
 
 



Re: Query to the community -- An additional IETF Meeting event?

2012-03-19 Thread Michael Richardson

 Wes == Wes George George writes:
Wes That said, I don't think that this potential experiment
Wes requires a *separate* night. I'd much prefer to replace the
Wes current overpriced hotel cash bar arrangement at the welcome
Wes reception with something more like beer-n-gear. I'm also
Wes willing to try it in lieu of a social event, since those are
Wes typically hit or miss in terms of whether the environment is
Wes conducive to socializing, whether they're worth the additional

+1.  If it's really the social, or better, the Sunday night event, then
great. I've been at two NANOGs for beer-n-gear, and while I found it a
bit weak in gear, and not that well attended, I actually enjoyed it.




pgpwC4EmV4N9j.pgp
Description: PGP signature


Re: IPv6 Zone Identifiers Considered Hateful

2012-03-19 Thread Kevin P. Fleming

On 03/19/2012 05:55 AM, Sabahattin Gucukoglu wrote:


Yesterday, I configured a DNS server to listen just using a link-local address, 
the one autoconfigured for an ethernet card accessible to all the nodes.  It's 
a host, not a router, so I'm relying on that address not being routable and 
being filtered at the router.  It didn't work.  The server would not start 
until I specified the zone suffix.  Now I am wondering why, given that there is 
no ambiguous link-local address anywhere around here, I need to do that.  Can't 
it figure it out itself?


Sure, it can, until a new network interface appears on that box (VPN, 
tunnel, hardware, etc.).


--
Kevin P. Fleming
Digium, Inc. | Director of Software Technologies
Jabber: kflem...@digium.com | SIP: kpflem...@digium.com | Skype: kpfleming
445 Jan Davis Drive NW - Huntsville, AL 35806 - USA
Check us out at www.digium.com  www.asterisk.org


Re: Query to the community -- An additional IETF Meeting event?

2012-03-19 Thread Ole Jacobsen

On Mon, 19 Mar 2012, Michael Richardson wrote:
 
 +1.  If it's really the social, or better, the Sunday night event, then
 great. I've been at two NANOGs for beer-n-gear, and while I found it a
 bit weak in gear, and not that well attended, I actually enjoyed it.
 

Must have been a while ago, the 3 last ones I've been to have been 
packed in terms of attendees, and oversold so that not all potential 
exhibitors could get a table.

Ole


Re: Query to the community -- An additional IETF Meeting event?

2012-03-19 Thread Ed Juskevicius
I have two comments on this.

1)  I am in favor of allowing the IAOC to experiment with an event (or two)
like this for the purposes of developing running code with the associated
pros, cons and economics.

2)  I would attend such an additional event if the gear on display was
related to technology I am personally interested in (e.g. commerically
available IPv6 Ready gear).

Regards,

Ed  J.

On Fri, Mar 16, 2012 at 3:49 PM, IAOC Chair bob.hin...@gmail.com wrote:


 The IESG and IAOC are considering an addition to the IETF meeting week,
 and we would like your views before we develop the idea further.

 At NANOG, there is a Beer and Gear reception one evening.  There are
 exhibitor tables with product vendors (hardware and software) and service
 providers (registries, registrars, ISPs, ESPs, etc.) and anyone else
 interested in face time with NANOG participants. They show their equipment
 and services.  There is bar in the center of the room serving beer, wine,
 and soft drinks. There are hors d'oeuvres scattered around the room.

  QUESTION:  What do you think about doing a Beer and Gear style
 of event on an evening that does not conflict with
 other IETF activities?

 This would be an opportunity for free food and drink for attendees, for
 vendors and service providers to talk with IETF participants, and for
 additional revenue to the IETF.  Obviously, attendance would be optional.

 Technical people are at the tables, not sales or marketing staff.  Vendors
 know that the audience is very technical, so they send the people that can
 communicate with that audience.

 We would charge for exhibit tables, to raise additional funds for the
 IETF. A stronger base of opportunities for IETF sponsorship distributes our
 funding, making it less fragile; this could make it less likely that we
 would have last-minute scrambles for additional sponsors, including hosts.
 A successful Beer-and-Gear like event would not solve this but it would
 help.

 In the past, the IETF has avoided vendor exhibits and demonstrations.
  However it is clear that NANOG has found a balance that works and that
 NANOG participants and the vendors consider the event valuable.  We believe
 this could translate well to the IETF.

 We are considering some test events, hopefully to be held at IETF 84
 (Vancouver, July 2012) and IETF 85 (Atlanta, November 2012).

 The kinds of evaluation criteria we are considering could include:

 - Did participants enjoy the event?

 - Did vendors consider the event successful?

 - Did the IETF raise additional funds?

 - Did the event steal potential sponsors away from other
  aspects of the meeting?

 So, what do you think?  Is this something that we should try?

 Please respond on the ietf@ietf.org mail list.

 On behalf of the IESG and the IAOC,

 Russ Housley
 Bob Hinden



Re: Last Call: draft-betts-itu-oam-ach-code-point-03.txt (Allocation of an Associated Channel Code Point for Use by ITU-T Ethernet based OAM) to Informational RFC

2012-03-19 Thread Loa Andersson

Maarten,

please be aware of what u asking for - you won't have a
an ACH codepoint to G.8113.1.

First, what is requested is an Associated Channel Type
and it will be assigned to the RFC resulting from draft-betts-.
I will not do my tutorial on Associated Channel acronyms,
but it could do it if needed, but some other venue.

Assigning the Associated Channel Type is what I see that
a solid majority want to happen!
This is not an attempt to end-run the consensus call by the AD,
just my personal read of the situation.

The first remaining caveat is the draft-betts is too poorly written
and need to be improve, suggestions has been sent to this mailing
list, I take it that people who send mails to this list saying
that they support Russ' proposal also implicitly support these
improvements.

The second caveat is that an ITU-T Recommendation is not stable
according to the criteria we normally apply to RFCs.

We are solving this by generating a RFC from draft-betts-.
I believe that the way out here is to update RFC draft-betts-
every time ITU-T rev G.8113.1. That way we will have our stable
reference pointing to the right version of G.8113.1.

I'd like to hear from the process people on this, but not as part
of this last call.

/Loa

On 2012-03-19 11:55, Maarten vissers wrote:

+1

 Original Message 
From: Rui Costarco...@ptinovacao.pt
Sent: zaterdag 17 maart 2012 12:00:56 +
To: ietf@ietf.orgietf@ietf.org
Subject: RE: Last Call:draft-betts-itu-oam-ach-code-point-03.txt
(Allocation of  an Associated Channel Code Point for Use by ITU-T
Ethernet based OAM) to Informational RFC

Hello,  

I support the allocation of an ACH codepoint to G.8113.1, not precluding
the ITU-T to progress refinements. Ergo, i support this draft and
proposal http://www.ietf.org/mail-archive/web/ietf/current/msg72191.html

IMHO, the status quo analysis expressed in both
http://www.ietf.org/mail-archive/web/ietf/current/msg72188.html and
http://www.ietf.org/mail-archive/web/ietf/current/msg72273.html is
accurate.   

Regards,
Rui 
=


 Original Message 
From: The IESGiesg-secret...@ietf.org
Sent: Wed, 22 Feb 2012 07:12:52 -0800
To: IETF-Announceietf-annou...@ietf.org
Subject: Last Call:draft-betts-itu-oam-ach-code-point-03.txt
(Allocation of  an Associated Channel Code Point for Use by ITU-T
Ethernetbased OAM) to Informational RFC

The IESG has received a request from an individual submitter to consider
the following document:
- 'Allocation of an Associated Channel Code Point for Use by ITU-T
  Ethernet based OAM'
 draft-betts-itu-oam-ach-code-point-03.txt  as an Informational RFC

The IESG plans to make a decision in the next few weeks, and solicits
final comments on this action. Please send substantive comments to the
ietf@ietf.org mailing lists by 2012-03-21. Exceptionally, comments may
be sent to i...@ietf.org instead. In either case, please retain the
beginning of the Subject line to allow automated sorting.

Abstract

  This document assigns an Associated Channel Type code point for
  carrying Ethernet based Operations, Administration, and Management
  messages in the MPLS Generic Associated Channel (G-ACh).

The file can be obtained via
http://datatracker.ietf.org/doc/draft-betts-itu-oam-ach-code-point/

IESG discussion can be tracked via
http://datatracker.ietf.org/doc/draft-betts-itu-oam-ach-code-point/


No IPR declarations have been submitted directly on this I-D.
___
IETF mailing list
IETF@ietf.org
https://www.ietf.org/mailman/listinfo/ietf  



--


Loa Andersson email: loa.anders...@ericsson.com
Sr Strategy and Standards Managerl...@pi.nu
Ericsson Inc  phone: +46 10 717 52 13
 +46 767 72 92 13


Re: Gen-ART LC review of draft-melnikov-smtp-priority-09

2012-03-19 Thread Alexey Melnikov

Hi Roni,
Thank you for your review.

On 13/03/2012 19:25, Roni Even wrote:


I am the assigned Gen-ART reviewer for this draft. For background on 
Gen-ART, please see the FAQ at 
http://wiki.tools.ietf.org/area/gen/trac/wiki/GenArtfaq.


Please resolve these comments along with any other Last Call comments 
you may receive.


Document: draft-melnikov-smtp-priority-09

Reviewer: Roni Even

Review Date:2012--3--13

IETF LC End Date: 2012--3--28

IESG Telechat date:

Summary: This draft is almost ready for publication as a standard 
track RFC.


Major issues:

Minor issues:

1.In section 4.2  In absence of both the MT-PRIORITY MAIL FROM 
parameter  and the MT-Priority header field, other message header 
fields, such  as Priority [RFC2156] and X-Priority, MAY be used for 
determining the  priority under this Priority Message Handling SMTP 
extension. .  My understanding  from the third bullet in this 
section is that for this case the message priority is 0 so I am not 
clear what this sentence means



Ah, good catch. The text should be another bullet point in the list.


and why is there a  difference if the MT-PRIORITY or MT-Priority 
values do exist with regards to Priority and X-Priority for this case.


Basically there are existing header fields with similar semantics 
already in use, so people want to use them as the last resort.
There was a bit of a debate about specific header fields during the IETF 
LC, so this text will hopefully be improved after the debate.


2.In section 8 MT-PRIORITY=3. I did not see where the MT-PRIORITY 
SMTP  extension is specified and has the syntax of using = before 
the value.



This is described by the following text in Section 3:

  One optional parameter (MT-PRIORITY) is added to the
  MAIL FROM command. The value associated with this parameter is
  a decimal integer number from -9 to 9 (inclusive)
  indicating the priority of the email message.  The syntax of

In SMTP parameter values are separated with = from the corresponding 
parameter names.


Nits/editorial comments:

1.MUA is used in section 1 but expanded only in section 5.

2.Some typos in section 5. syntatically -- syntactically prioritiy 
-- priority comminicate -- communicate contraints --constraints


3.In section 10 for X.3.TBD3 Description:  The message mas accepted 
I assume you meant was


4.In section D.2 first paragraph some typos focusses --focuses 
comparision -- comparison



All of these fixed in my copy, thanks!

Best Regards,
Alexey




Global INET 2012

2012-03-19 Thread IETF Chair
Join the Internet Society at Global INET 2012 in Geneva on 22-24 April 2012 to 
celebrate 20 years advancing the open development, evolution and use of the 
Internet for the benefit of all people throughout the world. Meet and network 
with policy makers, technologists, government representatives and business 
executives from around the globe to learn how they are addressing issues that 
will shape the Internet's future.

Visionary keynotes, industry leaders, Internet pioneers and futurists will 
share their insights and inspirations as we consider how to preserve an 
Internet responsive to all stakeholders while extending its access and power as 
an engine for education and economic growth. Pre-conference workshops for 
Chapter members and delegates will also be offered along with the latest 
developments and resources, so take advantage of this special opportunity to 
learn and share with peers around the globe.

Be part of our 20th anniversary, as the inaugural class of honorees is inducted 
into the “Internet Hall of Fame” will highlight the history and personal 
stories of the Internet’s pioneers – past, present, and future. It is all 
happening at the Awards Gala on 23 April 2012 at the InterContinental Hotel in 
Geneva.

The IETF is very fortunate to receive ongoing support from the Internet Society.

Register today!
http://www.internetsociety.org/events/inet-conferences/global-inet-2012/register

Last Call: draft-dbider-sha2-mac-for-ssh-05.txt (SHA-2 Data Integrity Verification for the Secure Shell (SSH) Transport Layer Protocol) to Proposed Standard

2012-03-19 Thread The IESG

The IESG has received a request from an individual submitter to consider
the following document:
- 'SHA-2 Data Integrity Verification for the Secure Shell (SSH) Transport
   Layer Protocol'
  draft-dbider-sha2-mac-for-ssh-05.txt as a Proposed Standard

The IESG plans to make a decision in the next few weeks, and solicits
final comments on this action. Please send substantive comments to the
i...@ietf.org mailing lists by 2012-04-16. Exceptionally, comments may be
sent to i...@ietf.org instead. In either case, please retain the
beginning of the Subject line to allow automated sorting.

Abstract


   This memo defines algorithm names and parameters for use of some of
   the SHA-2 family of secure hash algorithms for data integrity
   verification in the Secure Shell (SSH) protocol.  It also updates
   RFC4253 by specifying a new RECOMMENDED data integrity algorithm.




The file can be obtained via
http://datatracker.ietf.org/doc/draft-dbider-sha2-mac-for-ssh/

IESG discussion can be tracked via
http://datatracker.ietf.org/doc/draft-dbider-sha2-mac-for-ssh/ballot/


No IPR declarations have been submitted directly on this I-D.




Document Action: 'Simplified Multicast Forwarding' to Experimental RFC (draft-ietf-manet-smf-14.txt)

2012-03-19 Thread The IESG
The IESG has approved the following document:
- 'Simplified Multicast Forwarding'
  (draft-ietf-manet-smf-14.txt) as an Experimental RFC

This document is the product of the Mobile Ad-hoc Networks Working Group.

The IESG contact persons are Adrian Farrel and Stewart Bryant.

A URL of this Internet Draft is:
http://datatracker.ietf.org/doc/draft-ietf-manet-smf/




Technical Summary

  This document specifies some simple mechanisms to distribute multicast data
   packets within a Mobile Ad-hoc Network (MANET).

   This document provides basic and simple multicast forwarding that can
   complement the on-going unicast routing protocol efforts of the MANET
   working group. Additionally, this document describes several different 
   reduced relay set algorithms that can be used to make multicast 
   dissemination more efficient.

Working Group Summary

   There were no issues in the WG process. The I-D has progressed very
   slowly since WG lsat call as updates to address WG last call comments
   and to satisfy AD review have been slow.

Protocol Quality

   This is intended for publication as an Experimental RFC.

   Several interoperable implementations of SMF exist; although only
   one is available. Note: that several of the methods laid out in SMF
   have been included in many MANET protocols and their
   implementations. 

Personnel

   Stan Ratliff (sratl...@cisco.com) is the Document Shepherd
   Adrian Farrel (adr...@olddog.co.uk) is the Responsible AD


WG Action: INtermediary-safe SIP session ID (insipid)

2012-03-19 Thread IESG Secretary
A new IETF working group has been formed in the Real-Time Applications 
and Infrastructure Area.  For additional information, please contact the 
Area Directors or the WG Chairs.


INtermediary-safe SIP session ID (insipid)
--
Status: Active Working Group

Chairs:
 Keith Drage dr...@alcatel-lucent.com
 Hadriel Kaplan hkap...@acmepacket.com

Real-Time Applications and Infrastructure Area Directors:
 Gonzalo Camarillo gonzalo.camari...@ericsson.com
 Robert Sparks rjspa...@nostrum.com

Real-Time Applications and Infrastructure Area Advisor:
 Gonzalo Camarillo gonzalo.camari...@ericsson.com

Mailing Lists:
 General Discussion: insi...@ietf.org
 To Subscribe:  https://www.ietf.org/mailman/listinfo/insipid
 Archive:   http://www.ietf.org/mail-archive/web/insipid/

An end-to-end session identifier in SIP-based multimedia
communication networks refers to the ability for endpoints,
intermediate devices, and management and monitoring system to
identify and correlate SIP messages and dialogs of the same
higher-level end-to-end communication session across multiple
SIP devices, hops, and administrative domains.  Unfortunately,
there are a number of factors that contribute to the fact that
the current dialog identifiers defined in SIP are not suitable
for end-to-end session identification. Perhaps the most important
factor worth describing is that in real-world deployments of
Back-to-Back User Agents (B2BUAs) devices like Session Border
Controllers (SBC) often change the call identifiers (e.g., the
From-tag and To-tag that are used in conjunction with the Call-ID
header to make the dialog-id) as the session signaling passes
through.

An end-to-end session identifier should allow the possibility to
identify the communication session from the point of origin,
passing through any number of intermediaries, to the ultimate
point of termination. It should have the same aim as the
From-tag, To-tag and Call-ID conjunction, but should not be
mangled by intermediaries.

A SIP end-to-end session identifier has been considered as possible
solution of different use cases like troubleshooting, billing, session
tracking, session recording, media and signaling correlation, and so
forth.  Some of these requirements come from other working groups
within the RAI area (e.g., SIPRec). Moreover, other standards
organizations have identified the need for SIP and H.323 to carry the
same session ID value so that it is possible to identify a call
end-to end even when performing inter working between protocols.

This group will focus on a document that will specify a SIP
identifier that have the same aim as the From-tag, To-tag and Call-ID
conjunction, but is less likely to be mangled by intermediaries. In
doing this work, the group will pay attention to the privacy
implications of a session ID, for example considering the
possibility to make it intractable for nodes to correlate session IDs
generated by the same user for different sessions.

Goal and Milestone:

Dec 2012 - Specification of the new identifier sent to the IESG (PS)


WG Action: RECHARTER: Hypertext Transfer Protocol Bis (httpbis)

2012-03-19 Thread IESG Secretary
The Hypertext Transfer Protocol Bis (httpbis) working group in the Applications 
Area of the IETF has been rechartered.  For additional information, please 
contact the Area Directors or the working group Chairs.

Hypertext Transfer Protocol Bis (httpbis)
-
Status: Active Working Group

Current Status: Active Working Group

Chair(s):
Mark Nottingham  m...@mnot.net

Applications Area Director(s):
Pete Resnick  presn...@qualcomm.com
Peter Saint-Andre  stpe...@stpeter.im

Applications Area Advisor:
Peter Saint-Andre  stpe...@stpeter.im

Mailing Lists: 
General Discussion:ietf-http...@w3.org
To Subscribe:  ietf-http-wg-requ...@w3.org
In Body:   subscribe
Archive:   http://lists.w3.org/Archives/Public/ietf-http-wg/

Description of Working Group:

This Working Group is charged with maintaining and developing
the core specifications for HTTP. 

The Working Group's specification deliverables are:
* A document (or set of documents) that is suitable to supersede RFC 
 2616 (HTTP/1.1) and move RFC 2817 to Historic status
* A document cataloguing the security properties of HTTP/1.1
* A document that specifies HTTP/2.0 an improved binding of HTTP's semantics
 to the underlying transport.

HTTP/1.1


HTTP is one of the most successful and widely-used protocols on the 
Internet today. However, its specification has several editorial issues. 
Additionally, after years of implementation and extension, several 
ambiguities have become evident, impairing interoperability and the 
ability to easily implement and use HTTP.

The working group will refine RFC2616 to:
* Incorporate errata and updates (e.g., references, IANA registries, 
 ABNF)
* Fix editorial problems which have led to misunderstandings of the 
 specification
* Clarify conformance requirements
* Remove known ambiguities where they affect interoperability
* Clarify existing methods of extensibility
* Remove or deprecate those features that are not widely implemented and 
 also unduly affect interoperability
* Where necessary, add implementation advice
* Document the security properties of HTTP and its associated mechanisms 
 (e.g., Basic and Digest authentication, cookies, TLS) for common 
 applications

It will also incorporate the generic authentication framework from RFC 
2617, without obsoleting or updating that specification's definition of 
the Basic and Digest schemes.

Finally, it will incorporate relevant portions of RFC 2817 (in 
particular, the CONNECT method and advice on the use of Upgrade), so 
that that specification can be moved to Historic status.

In doing so, it should consider:
* Implementer experience
* Demonstrated use of HTTP
* Impact on existing implementations and deployments

HTTP/2.0


There is emerging implementation experience and interest in a protocol that
retains the semantics of HTTP, without the legacy of HTTP/1.x message framing
and syntax. The Working Group will leverage this to create new major version
of HTTP.

Particular goals of this effort include:

* Significantly improved perceived performance for common use cases
 (e.g., browsers, mobile)
* More efficient use of network resources; in particular, reducing the
 need to use multiple TCP connections
* Ability to be deployed on today's Internet, using IPv4 and IPv6, in the
 presence of NATs
* Maintaining HTTP's ease of deployment
* Reflecting modern security requirements and practices

With regard to security requirements, in the initial phase of work on 
HTTP/2.0, new proposals for authentication schemes can be made.  The WG
will have a a goal of choosing at least one scheme that is better than 
those available for HTTP/1.x.  However, the WG might select zero schemes.
In addition, non-selected schemes might be discussed with the IETF 
Security Area for further work there.

In documenting this protocol, the Working Group must:

* Meet the goals specified above
* Make it possible to pass through a HTTP/1.1 message with reasonable
 fidelity; i.e., to implement a gateway to or from HTTP/1.1
* consider the needs of a variety of HTTP implementers and users
 (such as back-end or web api uses of HTTP, servers and intermediaries)
* Address HTTP proxy and CDN infrastructure requirements

Changes to the existing semantics of HTTP are out of scope in order to
preserve the meaning of messages that might cross a 1.1 -- 2.0 -- 1.1
request chain. However, the effort may define new semantics to further the
goals above, along with suitable extensibility mechanisms for defining
additional semantics.

This work will be known as HTTP/2.0, unless the Working Group
determines that this isn't suitable (e.g., for interoperability).


Goals and Milestones:

DoneFirst HTTP/1.1 Revision Internet Draft 

DoneFirst HTTP Security Properties Internet Draft 

Jan 2012Request Last Call for HTTP/1.1 Revision 

Jan 2012Request Last Call for HTTP Security Properties 

Apr 2012

WG Action: RECHARTER: Locator/ID Separation Protocol (lisp)

2012-03-19 Thread IESG Secretary
The Locator/ID Separation Protocol (lisp) working group in the Internet 
Area of the IETF has been rechartered.  For additional information, 
please contact the Area Directors or the working group Chairs.

Locator/ID Separation Protocol (lisp)
-
Current Status: Active
Last updated: 2012-03-15

 Chairs:
 Joel Halpern j...@joelhalpern.com
 Terry Manderson terry.mander...@icann.org

 Internet Area Directors:
 Ralph Droms rdroms.i...@gmail.com
 Jari Arkko jari.ar...@piuha.net

 Internet Area Advisor:
 Jari Arkko jari.ar...@piuha.net

 Secretaries:
 Wassim Haddad wassim.had...@ericsson.com
 Luigi Iannone lu...@net.t-labs.tu-berlin.de

 Mailing Lists:
 General Discussion: l...@ietf.org
 To Subscribe:   https://www.ietf.org/mailman/listinfo/lisp
 Archive:
http://www.ietf.org/mail-archive/web/lisp/current/maillist.html

Description of Working Group:

The IAB's October 2006 Routing and Addressing Workshop (RFC 4984)
rekindled interest in scalable routing and addressing architectures for
the Internet. Among the many issues driving this renewed interest are
concerns about the scalability of the routing system. Since the IAB
workshop, several proposals have emerged which attempt to address the
concerns expressed there and elsewhere. In general, these proposals are
based on the locator/identifier separation.

The basic idea behind the separation is that the Internet architecture
combines two functions, routing locators, (where you are attached to the
network) and identifiers (who you are) in one number space: The IP
address. Proponents of the separation architecture postulate that
splitting these functions apart will yield several advantages, including
improved scalability for the routing system. The separation aims to
decouple locators and identifiers, thus allowing for efficient
aggregation of the routing locator space and providing persistent
identifiers in the identifier space.

A number of approaches are being looked at in parallel in other
contexts. The IRTF RRG examined several proposals, some of which were
published as IRTF-track Experimental RFCs.

The LISP WG has completed the first set of Experimental RFCs
describing the Locator/ID Separation Protocol. LISP requires no
changes to end-systems or to routers that do not directly participate
in the LISP deployment. LISP aims for an incrementally deployable
protocol.

The LISP WG is chartered to continue work on the LISP base protocol, completing
the ongoing work, and any items which directly impact LISP protocol
structures and which are related to using LISP for improving Internet routing
scalability. Specifically, the group will work on:

- Architecture description: This document will describe the
  architecture of the entire LISP system, making it easier to read the
  rest of the LISP specifications and providing a basis for discussion
  about the details of the LISP protocols. The document will include
  a description of the  cache management and ETR synchronization
  essential characteristics needed to ensure the correct operation
  of the protocol.

- Deployment models: This document will describe what kind of
  deployments can be expected for LISP, and give operational advice on
  how they can be set up.

- A description of the impacts of LISP: This document will describe
  the problems that LISP is intended to address and the impacts that
  employing LISP has. While the work on LISP was initiated by Internet
  routing scaling concerns, there has also been an interest on
  improved solutions to a number of different problems, such as
  traffic engineering. This document should describe problem areas
  (such as scaling or traffic engineer) where LISP is expected to have
  a positive effect, as well as any tradeoffs that are caused by
  LISP's design.

- LISP security threats and solutions: This document will describe the
  security analysis of the LISP system, what issues it needs to
  protect against, and a solution that helps defend against those
  issues. The replay attack problem discussed on the mailing list
  should be included in this work.

- Allocation of Endpoint IDentifier (EID) space: This document
  requests address space to be used for the LISP experiment as
  identifier space

- Alternate mapping system designs: Develop alternative mapping
  designs to be tested.

- Data models for management of LISP.

The first three items (architecture, deployment models, impacts) need
to be completed first before other items can be submitted as RFCs. The
three first documents also need to complement each other, by
describing how the architecture supports a solution for a particular
problem area and how the solution can be deployed to help with that
problem.

In addition, if work chartered in some other IETF WG requires changes
in the LISP base protocol or any items which directly impact LISP
protocol structures, then the LISP WG is chartered to work on such

Protocol Action: 'ATM-Based xDSL Bonded Interfaces MIB' to Proposed Standard (draft-ietf-adslmib-gbond-atm-mib-06.txt)

2012-03-19 Thread The IESG
The IESG has approved the following document:
- 'ATM-Based xDSL Bonded Interfaces MIB'
  (draft-ietf-adslmib-gbond-atm-mib-06.txt) as a Proposed Standard

This document is the product of the ADSL MIB Working Group.

The IESG contact persons are Dan Romascanu and Ronald Bonica.

A URL of this Internet Draft is:
http://datatracker.ietf.org/doc/draft-ietf-adslmib-gbond-atm-mib/




Technical Summary

   This document defines Management Information Base (MIB) module for
   use with network management protocols in TCP/IP based networks.  This
   document proposes an extension to the GBOND-MIB module with a set of
   objects for managing ATM-based multi-pair bonded xDSL interfaces,
   defined in ITU-T recommendation G.998.1.

Working Group Summary

   The WG process was smooth with no real controversies.
   All work took place on the mailing list. 

Document Quality

   No information is available about implementations. 

Personnel

   Menachem Dodge is the Document Shepherd for this document
   Dan Romascanu is the Responsible Area Director.





Protocol Action: 'xDSL multi-pair bonding using Time-Division Inverse Multiplexing (G.Bond/TDIM) MIB' to Proposed Standard (draft-ietf-adslmib-gbond-tdim-mib-08.txt)

2012-03-19 Thread The IESG
The IESG has approved the following document:
- 'xDSL multi-pair bonding using Time-Division Inverse Multiplexing
   (G.Bond/TDIM) MIB'
  (draft-ietf-adslmib-gbond-tdim-mib-08.txt) as a Proposed Standard

This document is the product of the ADSL MIB Working Group.

The IESG contact persons are Dan Romascanu and Ronald Bonica.

A URL of this Internet Draft is:
http://datatracker.ietf.org/doc/draft-ietf-adslmib-gbond-tdim-mib/




Technical Summary

   This document defines Management Information Base (MIB) module for
   use with network management protocols in TCP/IP based internets.
   This document proposes an extension to the GBOND-MIB module with a
   set of objects for managing multi-pair bonded xDSL interfaces using
   Time-Division Inverse Multiplexing (TDIM), defined in ITU-T
   recommendation G.998.3.

Working Group Summary

   The WG process was smooth with no real controversies.
   All work took place on the mailing list. 

Document Quality

   No information is available about implementations. 

Personnel

   Menachem Dodge is the Document Shepherd for this document
   Dan Romascanu is the Responsible Area Director.



Protocol Action: 'IANA Registry for MEDIACTRL Interactive Voice Response Control Package' to Proposed Standard (draft-ietf-mediactrl-6231-iana-00.txt)

2012-03-19 Thread The IESG
The IESG has approved the following document:
- 'IANA Registry for MEDIACTRL Interactive Voice Response Control
Package'
  (draft-ietf-mediactrl-6231-iana-00.txt) as a Proposed Standard

This document is the product of the Media Server Control Working Group.

The IESG contact persons are Robert Sparks and Gonzalo Camarillo.

A URL of this Internet Draft is:
http://datatracker.ietf.org/doc/draft-ietf-mediactrl-6231-iana/




Technical Summary

   This document creates an IANA registry for the response codes for the
   MEDIACTRL Interactive Voice Response Control Package, RFC6231.

Working Group Summary

   This document corrects an oversight in RFC6231, asking IANA to create
a registry that RFC6231 clearly intended to create - the format, initial
contents and maintenance rules were specified in RFC6231. This document
was reviewed by the working group concurrently with IETF LC.

Document Quality

This document is essentially an IANA considerations section with content
from RFC6231.

Personnel

  Eric Burger is the Document Shepherd. Robert Sparks is the responsible Area 
Director.


RFC Editor Note (applies to -00)

The following correction adds a missing word not to the description of the 
433 code:
(please view in fixed width font)
OLD:
-
   | 433  | Unsupported   | request contains  ||
   |  | collect and   | collect and ||
   |  | record| record elements and ||
   |  | capability| the MS does support   ||
   |  |   | these operations  ||
   |  |   | simultaneously.   ||


NEW:
--
   | 433  | Unsupported   | request contains  ||
   |  | collect and   | collect and ||
   |  | record| record elements and ||
   |  | capability| the MS does not   ||
   |  |   | support these ||
   |  |   | operations||
   |  |   | simultaneously.   ||




Please make this change to the IANA considerations section:
OLD:
Please create the following registry.

NEW:
Please create the following registry, with a name of 
MEDIACTRL Interactive Voice Response Control Package Registry


SIDR Interim 24/March is CANCELLED

2012-03-19 Thread IETF Secretariat
The announcement of the SIDR virtual interim
failed to reach iesg-secret...@ietf.org within
the required two weeks notice. Additionally
the agenda was published on Sunday 17th March
and thus failed to meet the requirement that
The agenda must be published at least one
week before the call or session .

The requirement to provide appropriate notice
of the meeting and its agenda is fundamental
to the IETF open standards process.

Since the failure to meet these requirement may
disadvantage some contributors, I regret that
I find it necessary to cancel the proposed SIDR
interim meeting scheduled for 24/March.

I thank those that provided feedback on the matter
and apologize for any inconvenience caused.

Stewart


Document Action: 'Overview of Pre-Congestion Notification Encoding' to Informational RFC (draft-ietf-pcn-encoding-comparison-09.txt)

2012-03-19 Thread The IESG
The IESG has approved the following document:
- 'Overview of Pre-Congestion Notification Encoding'
  (draft-ietf-pcn-encoding-comparison-09.txt) as an Informational RFC

This document is the product of the Congestion and Pre-Congestion
Notification Working Group.

The IESG contact persons are David Harrington and Wesley Eddy.

A URL of this Internet Draft is:
http://datatracker.ietf.org/doc/draft-ietf-pcn-encoding-comparison/




Technical Summary

The PCN mechanism in routers in the interior of a PCN domain marks
packets when certain configured rates are exceeded.  The PCN working
group explored a number of approaches for encoding this pre-congestion
information into the IP header.  This document describes the various
approaches that were examined and discusses the constraints that had
to be satisfied by a viable encoding mechanism.

Working Group Summary

  The document was subject to thorough review by the PCN working
  group, and strong consensus for publication was reached.

Document Quality

 The document was subject to thorough review by the PCN working
  group, and strong consensus for publication was reached.
 There are a number of companion documents that detail the
 specific approaches.

Personnel

   Document Shepherd: Steven Blake
   Responsible Area Director: David Harrington

RFC Editor Note

4.5 says RFC5696 was published as a draft Internet Standard. This is confusing, 
given the existence of the Draft Internet Standard status. RFC5696 is a 
Proposed Standard. Please reword to: The baseline encoding described in 
section 4.1 is defined in [RFC5696].



RFC 6544 on TCP Candidates with Interactive Connectivity Establishment (ICE)

2012-03-19 Thread rfc-editor

A new Request for Comments is now available in online RFC libraries.


RFC 6544

Title:  TCP Candidates with Interactive Connectivity 
Establishment (ICE) 
Author: J. Rosenberg, A. Keranen,
B. B. Lowekamp, A. B. Roach
Status: Standards Track
Stream: IETF
Date:   March 2012
Mailbox:jdro...@jdrosen.net, 
ari.kera...@ericsson.com, 
b...@lowekamp.net,  a...@nostrum.com
Pages:  29
Characters: 72318
Updates/Obsoletes/SeeAlso:   None

I-D Tag:draft-ietf-mmusic-ice-tcp-16.txt

URL:http://www.rfc-editor.org/rfc/rfc6544.txt

Interactive Connectivity Establishment (ICE) defines a mechanism for
NAT traversal for multimedia communication protocols based on the
offer/answer model of session negotiation.  ICE works by providing a
set of candidate transport addresses for each media stream, which are
then validated with peer-to-peer connectivity checks based on Session
Traversal Utilities for NAT (STUN).  ICE provides a general framework
for describing candidates but only defines UDP-based media streams.
This specification extends ICE to TCP-based media, including the
ability to offer a mix of TCP and UDP-based candidates for a single
stream.  [STANDARDS-TRACK]

This document is a product of the Multiparty Multimedia Session Control Working 
Group of the IETF.

This is now a Proposed Standard Protocol.

STANDARDS TRACK: This document specifies an Internet standards track
protocol for the Internet community,and requests discussion and suggestions
for improvements.  Please refer to the current edition of the Internet
Official Protocol Standards (STD 1) for the standardization state and
status of this protocol.  Distribution of this memo is unlimited.

This announcement is sent to the IETF-Announce and rfc-dist lists.
To subscribe or unsubscribe, see
  http://www.ietf.org/mailman/listinfo/ietf-announce
  http://mailman.rfc-editor.org/mailman/listinfo/rfc-dist

For searching the RFC series, see http://www.rfc-editor.org/rfcsearch.html.
For downloading RFCs, see http://www.rfc-editor.org/rfc.html.

Requests for special distribution should be addressed to either the
author of the RFC in question, or to rfc-edi...@rfc-editor.org.  Unless
specifically noted otherwise on the RFC itself, all RFCs are for
unlimited distribution.


The RFC Editor Team
Association Management Solutions, LLC




RFC 6549 on OSPFv2 Multi-Instance Extensions

2012-03-19 Thread rfc-editor

A new Request for Comments is now available in online RFC libraries.


RFC 6549

Title:  OSPFv2 Multi-Instance Extensions 
Author: A. Lindem, A. Roy,
S. Mirtorabi
Status: Standards Track
Stream: IETF
Date:   March 2012
Mailbox:acee.lin...@ericsson.com, 
a...@cisco.com, 
s...@cisco.com
Pages:  9
Characters: 16639
Updates:RFC2328

I-D Tag:draft-ietf-ospf-multi-instance-09.txt

URL:http://www.rfc-editor.org/rfc/rfc6549.txt

OSPFv3 includes a mechanism to support multiple instances of the
protocol running on the same interface.  OSPFv2 can utilize such a
mechanism in order to support multiple routing domains on the same
subnet.

This document defines the OSPFv2 Instance ID to enable separate
OSPFv2 protocol instances on the same interface.  Unlike OSPFv3 where
the Instance ID can be used for multiple purposes, such as putting
the same interface in multiple areas, the OSPFv2 Instance ID is
reserved for identifying protocol instances.

This document updates RFC 2328.  [STANDARDS-TRACK]

This document is a product of the Open Shortest Path First IGP Working Group of 
the IETF.

This is now a Proposed Standard Protocol.

STANDARDS TRACK: This document specifies an Internet standards track
protocol for the Internet community,and requests discussion and suggestions
for improvements.  Please refer to the current edition of the Internet
Official Protocol Standards (STD 1) for the standardization state and
status of this protocol.  Distribution of this memo is unlimited.

This announcement is sent to the IETF-Announce and rfc-dist lists.
To subscribe or unsubscribe, see
  http://www.ietf.org/mailman/listinfo/ietf-announce
  http://mailman.rfc-editor.org/mailman/listinfo/rfc-dist

For searching the RFC series, see http://www.rfc-editor.org/rfcsearch.html.
For downloading RFCs, see http://www.rfc-editor.org/rfc.html.

Requests for special distribution should be addressed to either the
author of the RFC in question, or to rfc-edi...@rfc-editor.org.  Unless
specifically noted otherwise on the RFC itself, all RFCs are for
unlimited distribution.


The RFC Editor Team
Association Management Solutions, LLC




RFC 6561 on Recommendations for the Remediation of Bots in ISP Networks

2012-03-19 Thread rfc-editor

A new Request for Comments is now available in online RFC libraries.


RFC 6561

Title:  Recommendations for the Remediation of 
Bots in ISP Networks 
Author: J. Livingood, N. Mody,
M. O'Reirdan
Status: Informational
Stream: IETF
Date:   March 2012
Mailbox:jason_living...@cable.comcast.com, 
nirmal_m...@cable.comcast.com, 
michael_oreir...@cable.comcast.com
Pages:  29
Characters: 74562
Updates/Obsoletes/SeeAlso:   None

I-D Tag:draft-oreirdan-mody-bot-remediation-20.txt

URL:http://www.rfc-editor.org/rfc/rfc6561.txt

This document contains recommendations on how Internet Service
Providers can use various remediation techniques to manage the
effects of malicious bot infestations on computers used by their
subscribers.  Internet users with infected computers are exposed to
risks such as loss of personal data and increased susceptibility to
online fraud.  Such computers can also become inadvertent
participants in or components of an online crime network, spam
network, and/or phishing network as well as be used as a part of a
distributed denial-of-service attack.  Mitigating the effects of and
remediating the installations of malicious bots will make it more
difficult for botnets to operate and could reduce the level of online
crime on the Internet in general and/or on a particular Internet
Service Provider's network.  This document is not an Internet 
Standards Track specification; it is published for informational purposes.


INFORMATIONAL: This memo provides information for the Internet community.
It does not specify an Internet standard of any kind. Distribution of
this memo is unlimited.

This announcement is sent to the IETF-Announce and rfc-dist lists.
To subscribe or unsubscribe, see
  http://www.ietf.org/mailman/listinfo/ietf-announce
  http://mailman.rfc-editor.org/mailman/listinfo/rfc-dist

For searching the RFC series, see http://www.rfc-editor.org/rfcsearch.html.
For downloading RFCs, see http://www.rfc-editor.org/rfc.html.

Requests for special distribution should be addressed to either the
author of the RFC in question, or to rfc-edi...@rfc-editor.org.  Unless
specifically noted otherwise on the RFC itself, all RFCs are for
unlimited distribution.


The RFC Editor Team
Association Management Solutions, LLC