Re: How does the IETF evolve to continue to be an effective, efficient, and relevant source of high quality Internet standards? Was: Re: IETF Diversity Question on Berlin Registration?

2013-04-30 Thread S Moonesamy

At 13:15 29-04-2013, Michael StJohns wrote:

Let me ask a couple of specific questions of you.


I think that these are good questions.

Who have you mentored in the past 5 years?  Have  they ended up as 
working group chairs, or ADs or IAB members?   Do they mostly 
represent under-represented groups?  How many of them were employed 
by your employer (e.g. was this a work related task?)?


I don't mentor IETF participants as I consider everyone who does not 
have a title as a peer.  None of the peers I have interacted with 
ended up as working group chair, Area Director or IAB member.  I have 
not given much thought about whether most of the peers I have 
interacted with represent under-represented groups.  My guess is that 
it is a significant number.


During your time as an AD, how many women did you arm twist/recruit 
specifically  (or ask nicely) to take WG positions in your area (as 
opposed to them coming to you or your co-AD)?


I do some things on behalf of the Applications Area directorate.  At 
the last IETF meeting I asked four women whether they would like to 
do some reviews.  There was one positive answer.  There are people of 
different ages.  There are people who work for a range of vendors on 
the directorate.  There are a few people who work for 
universities.  There are people who come from different parts of the 
world.  The list of reviewers and the work they perform is published 
on an IETF web site [1].  If anyone has questions about 
under-represented groups in relation to the directorate please post a 
message to this mailing list and I will reply.


Regards,
S. Moonesamy

1. http://trac.tools.ietf.org/area/app/trac/wiki/ApplicationsAreaDirectorate 



Re: FW: Last Call: draft-ietf-netmod-interfaces-cfg-10.txt (A YANG Data Model for Interface Management) to Proposed Standard

2013-04-30 Thread Benoit Claise

Thanks Dave for your thorough review.
You have some very valid points.

I've not seen any replies from the author. Maybe he doesn't monitor this 
list. So, including some extra mailing lists.

Martin, NETMOD WG, can you please address David's points.

Note: there is also a reply from Tom Petch on this email. See 
http://www.ietf.org/mail-archive/web/ietf/current/msg78808.html


Regards, Benoit

Hi,

I have reviewed this document and feel that is almost ready for approval.
This document defines a new data model in YANG format, based on the same
information model as the Interfaces MIB module (IF-MIB).
Effectively, the YANG model is a second (duplicative) standard for much of
the same information.
It is expected that devices may implement both the MIB and the YANG data
models.

My primary concern regards co-existence and synchronization across data
models.
I think this document would benefit from an Operational Considerations
section that discusses synchronization, or an explanation why they might
reasonably be out-of-sync.
Here are a few points to consider:

1) the ifIndex of an interface is used within the YANG model, matching the
ifIndex in IF-MIB.
RFC2863 discusses the fact that ifIndex numbering might change during
hot-swaps.
This document does not discuss the need to ensure that IF-MIB ifIndex
changes need to be reflected in the YANG model.
The ifIndex in the YANG module must match that in IF-MIB (really, that in
the underlying instrumentation).
Failure to sync the ifIndex could lead NM applications to confuse which
already-retrieved data records are related to which interface.
This could cause an NM application to misinterpret/corrupt gathered
trending information, and possibly to apply changes to the wrong
interfaces.

2) ifType - can an interface be hot-swapped to use a different type? Is
this discussed someplace?

3) ifType - the description says the value of this mandatory object MAY be
initialized. What value should an NM application expect if it is NOT
initialized?

4) enabled - Systems that implement the IF-MIB use the value of this leaf
to set IF-MIB.ifAdminStatus ...; should this be a MAY/SHOULD/MUST? How
will this coexist with SNMP-based NM applications? Is there potential for
conflict? What if NETCONF sets this as enabled, then an operator sets it
to disabled via SNMP?
Does NETCONF know that its enable value (adminStatus) is out of date?
(does it matter? See note 7).
What if the NETCONF system directky changes the underlying instrumentation
for adminstatus without going through the MIB?

5) is there a reason why description value MAY match IF-MIB ifAlias
***and MAY restrict the values***?
Is there a particular use case for this lack of standardization of
restrictions across data models?
The persistence is a pretty important restriction related to the
functionality of ifAlias, and the dynamism of ifIndex.
If NETCONF is used to set the value, ignoring IF-MIB restrictions, what
happens to IF-MIB ifAlias as a persistent handle to the interface?

6) What error is returned via NETCONF if YANG attempts to set a value that
violates the SNMP agent implementation restrictions, and the SNMP agent
refuses the requested SET operation to ifAlias?
Is there a simple way for an operator to tell whether the implementation
supports the restrictions (other than deliberately triggering an error)?

7) what should an NM application or operator do if the YANG oper-status
and the IF-MIB operStatus differ?
IF-MIB has substantial discussion of the relationship between
ifAdminStatus and ifOperStatus. The YANG module doesn't have a comparable
discussion.
Given that there could e additional delay incurred between setting enable,
updating ifAdminStatus, the change to ifOperStatus, and the update to
oper-status, I recommend some mention in the description of enable and/or
oper-status of the detailed description in RFC2863, and applicability to
ietf-interfaces.

8) link-up-down-trap-enable: The text says this indicates whether traps
should be generated for the interface; shouldn't this be configures?

9) persistence isn't discussed in the config object descriptions. Do they
match the IF-MIB object persistences?

10) IF-MIB counters do not typically start at zero; a delta must be
calculated. This is a common misunderstanding for new MIB developers and
users.
I don't see any comparable discussion related to ietf-interfaces counters.
Where should one look for a discussion of YANG counter initialization
values?
Where should one look for a discussion of YANG counter rollover?
It would help to have a discussion of how to utilize discontinuity_time
and counters, especially for implementers not familiar with SNMP (and not
implementing IF-MIB).

11) Is it expected that counters in ietf-interfaces and counters in IF-MIB
are synchronized? Can an NM application reasonably compare two readings -
one of in-octets and one of ifHCInOctets? If not, I think that should be
made clear. (The reference clauses seem to link them)

12) From 

Re: IETF Diversity Question on Berlin Registration?

2013-04-30 Thread Abdussalam Baryun
I was counting femal ADs. I ment no female names in the AD list apears (in
my understandning I mybe wrong because in my culture some families name
their memebrs with names that we cannot notice gender). As I am a remote
participant I am not aware and may never notice difference. But I can refer
now for better than my count [1].

http://www.ietf.org/mail-archive/web/ietf/current/msg78882.html

AB

On 19 April 2013 at 12:22 Abdussalam Baryun abdussalambaryun at gmail.com
wrote
on this list:

 No name in the AD list appear so far, but if your the discuss-list is
 right then it may be good progress, hoping for more names for
 diversity.

I count three ADs on the diversity discussion list at the moment.  Why is
my
count different from yours?

Adrian


Re: [netmod] Last Call: draft-ietf-netmod-interfaces-cfg-10.txt (A YANG Data Model for Interface Management) to Proposed Standard

2013-04-30 Thread Benoit Claise

Martin,

It's interesting to note that Dave came up with similar feedback as I 
had during my AD review.
And you had to re-explain this again, via email. This leads me to think 
that we need some more background information, typically in Operational 
Considerations section.
http://tools.ietf.org/html/draft-ietf-netmod-interfaces-cfg-10#section-4 
could be part of that new section, but other topics could/should be 
addressed:

- Failure to sync the ifIndex
- is there a reason why description value MAY match IF-MIB ifAlias 
***and MAY restrict the values***?
-  what should an NM application or operator do if the YANG oper-status 
and the IF-MIB operStatus differ?

- persistence
- Is it expected that counters in ietf-interfaces and counters in IF-MIB 
are synchronized?

- etc...

Basically addressing many points made by Dave

Regards, Benoit

Hi David,

Thank you for your detailed review!  Comments inline.

David Harrington ietf...@comcast.net wrote:

Hi,
  
I have reviewed this document and feel that is almost ready for approval.

This document defines a new data model in YANG format, based on the same
information model as the Interfaces MIB module (IF-MIB).
Effectively, the YANG model is a second (duplicative) standard for much of
the same information.
It is expected that devices may implement both the MIB and the YANG data
models.
  
My primary concern regards co-existence and synchronization across data

models.
I think this document would benefit from an Operational Considerations
section that discusses synchronization, or an explanation why they might
reasonably be out-of-sync.
Here are a few points to consider:
  
1) the ifIndex of an interface is used within the YANG model, matching the

ifIndex in IF-MIB.
RFC2863 discusses the fact that ifIndex numbering might change during
hot-swaps.

Actually, RFC 2863 points out that a ifIndex must not be reused until
after the following re-initialization of the network management
system.


This document does not discuss the need to ensure that IF-MIB ifIndex
changes need to be reflected in the YANG model.
The ifIndex in the YANG module must match that in IF-MIB (really, that in
the underlying instrumentation).

Absolutely!  That's the intention.  The description for the read-only
leaf if-index says:

The ifIndex value for the ifEntry represented by this
interface.



Failure to sync the ifIndex could lead NM applications to confuse which
already-retrieved data records are related to which interface.
This could cause an NM application to misinterpret/corrupt gathered
trending information, and possibly to apply changes to the wrong
interfaces.

Fully agree - this is why the if-index is present; to facilitate the
mapping between the models.


2) ifType - can an interface be hot-swapped to use a different type? Is
this discussed someplace?

Hot-swapping sounds like a physical property.  The data model in this
document can handle this -- provided the system physically supports
it, of course.  Note that the type is a writable leaf just like
others.  You can change it, but as with any other leaf a device that
cannot support a particular change will reject it.


3) ifType - the description says the value of this mandatory object MAY be
initialized. What value should an NM application expect if it is NOT
initialized?

None.  And since it is mandatory, in this case the NM application has
to explicitly provide the type.  If you write a completely generic NM
application you would probably always provide the type, since you
cannot count on the server auto-initializing it.  But if you *know*
that the server auto-initialize the type, you don't have to provide
it.


4) enabled - Systems that implement the IF-MIB use the value of this leaf
to set IF-MIB.ifAdminStatus ...; should this be a MAY/SHOULD/MUST? How
will this coexist with SNMP-based NM applications? Is there potential for
conflict? What if NETCONF sets this as enabled, then an operator sets it
to disabled via SNMP?
Does NETCONF know that its enable value (adminStatus) is out of date?
(does it matter? See note 7).
What if the NETCONF system directky changes the underlying instrumentation
for adminstatus without going through the MIB?

It is not clear to me if we can / want to require that these objects
share the same instrumentation.

Some of this might be b/c ifAdminStatus is a a bit unclear in some
regards.  For example, it talks about how

 per configuration information
 retained by the managed system, ifAdminStatus is then
 changed [...]

I would assume (but this might be incorrect) that the configuration
information could be things configured through the CLI for example,
and this configuration information could thus also be the data
defined in this YANG model.

So it seems RFC 2863 makes a distinction between ifAdminStatus and
what is actually configured.

Also, the description of ifAdminStatus doesn't say anything about
persistence, so it might be 

Re: [netmod] Last Call: draft-ietf-netmod-interfaces-cfg-10.txt (A YANG Data Model for Interface Management) to Proposed Standard

2013-04-30 Thread Benoit Claise

On 30/04/2013 13:07, Benoit Claise wrote:

Martin,

It's interesting to note that Dave came up with similar feedback as I 
had during my AD review.
And you had to re-explain this again, via email. This leads me to 
think that we need some more background information, typically in 
Operational Considerations section.
http://tools.ietf.org/html/draft-ietf-netmod-interfaces-cfg-10#section-4 
could be part of that new section, but other topics could/should be 
addressed:

- Failure to sync the ifIndex
- is there a reason why description value MAY match IF-MIB ifAlias 
***and MAY restrict the values***?
-  what should an NM application or operator do if the YANG 
oper-status and the IF-MIB operStatus differ?

- persistence
- Is it expected that counters in ietf-interfaces and counters in 
IF-MIB are synchronized?

- etc...

Basically addressing many points made by Dave
And I see that Carlos, part of the Re: RtgDir review: 
draft-ietf-netmod-interfaces-cfg-10.txt feedback has got some similar  
points.

- physical versus virtual interfaces
- location
- counter32 and counter64, and mapping to the MIB OIDs
- etc...

That reinforces in my thinking that we need an operational 
considerations section.


Regards, Benoit


Regards, Benoit

Hi David,

Thank you for your detailed review!  Comments inline.

David Harrington ietf...@comcast.net wrote:

Hi,
  I have reviewed this document and feel that is almost ready for 
approval.
This document defines a new data model in YANG format, based on the 
same

information model as the Interfaces MIB module (IF-MIB).
Effectively, the YANG model is a second (duplicative) standard for 
much of

the same information.
It is expected that devices may implement both the MIB and the YANG 
data

models.
  My primary concern regards co-existence and synchronization across 
data

models.
I think this document would benefit from an Operational Considerations
section that discusses synchronization, or an explanation why they 
might

reasonably be out-of-sync.
Here are a few points to consider:
  1) the ifIndex of an interface is used within the YANG model, 
matching the

ifIndex in IF-MIB.
RFC2863 discusses the fact that ifIndex numbering might change during
hot-swaps.

Actually, RFC 2863 points out that a ifIndex must not be reused until
after the following re-initialization of the network management
system.


This document does not discuss the need to ensure that IF-MIB ifIndex
changes need to be reflected in the YANG model.
The ifIndex in the YANG module must match that in IF-MIB (really, 
that in

the underlying instrumentation).

Absolutely!  That's the intention.  The description for the read-only
leaf if-index says:

The ifIndex value for the ifEntry represented by this
interface.



Failure to sync the ifIndex could lead NM applications to confuse which
already-retrieved data records are related to which interface.
This could cause an NM application to misinterpret/corrupt gathered
trending information, and possibly to apply changes to the wrong
interfaces.

Fully agree - this is why the if-index is present; to facilitate the
mapping between the models.


2) ifType - can an interface be hot-swapped to use a different type? Is
this discussed someplace?

Hot-swapping sounds like a physical property.  The data model in this
document can handle this -- provided the system physically supports
it, of course.  Note that the type is a writable leaf just like
others.  You can change it, but as with any other leaf a device that
cannot support a particular change will reject it.

3) ifType - the description says the value of this mandatory object 
MAY be

initialized. What value should an NM application expect if it is NOT
initialized?

None.  And since it is mandatory, in this case the NM application has
to explicitly provide the type.  If you write a completely generic NM
application you would probably always provide the type, since you
cannot count on the server auto-initializing it.  But if you *know*
that the server auto-initialize the type, you don't have to provide
it.

4) enabled - Systems that implement the IF-MIB use the value of 
this leaf

to set IF-MIB.ifAdminStatus ...; should this be a MAY/SHOULD/MUST? How
will this coexist with SNMP-based NM applications? Is there 
potential for
conflict? What if NETCONF sets this as enabled, then an operator 
sets it

to disabled via SNMP?
Does NETCONF know that its enable value (adminStatus) is out of date?
(does it matter? See note 7).
What if the NETCONF system directky changes the underlying 
instrumentation

for adminstatus without going through the MIB?

It is not clear to me if we can / want to require that these objects
share the same instrumentation.

Some of this might be b/c ifAdminStatus is a a bit unclear in some
regards.  For example, it talks about how

 per configuration information
 retained by the managed system, ifAdminStatus is then
 changed [...]

I would assume 

Re: [netmod] Last Call: draft-ietf-netmod-interfaces-cfg-10.txt (A YANG Data Model for Interface Management) to Proposed Standard

2013-04-30 Thread Carlos Pignataro (cpignata)

On Apr 30, 2013, at 7:25 AM, Benoit Claise bcla...@cisco.com wrote:

 On 30/04/2013 13:07, Benoit Claise wrote:
 Martin,
 
 It's interesting to note that Dave came up with similar feedback as I had 
 during my AD review.
 And you had to re-explain this again, via email. This leads me to think that 
 we need some more background information, typically in Operational 
 Considerations section.
 http://tools.ietf.org/html/draft-ietf-netmod-interfaces-cfg-10#section-4 
 could be part of that new section, but other topics could/should be 
 addressed:
 - Failure to sync the ifIndex
 - is there a reason why description value MAY match IF-MIB ifAlias ***and 
 MAY restrict the values***?
 -  what should an NM application or operator do if the YANG oper-status and 
 the IF-MIB operStatus differ?
 - persistence
 - Is it expected that counters in ietf-interfaces and counters in IF-MIB are 
 synchronized?
 - etc...
 
 Basically addressing many points made by Dave
 And I see that Carlos, part of the Re: RtgDir review: 
 draft-ietf-netmod-interfaces-cfg-10.txt feedback has got some similar  
 points.
 - physical versus virtual interfaces
 - location
 - counter32 and counter64, and mapping to the MIB OIDs
 - etc...
 
 That reinforces in my thinking that we need an operational considerations 
 section.

+1.

I think that an Operational Considerations addressing these issues would be a 
most useful addition to this document.

For context, full review at 
http://www.ietf.org/mail-archive/web/netmod/current/msg08035.html

Thanks,

-- Carlos.

 
 Regards, Benoit
 
 Regards, Benoit
 Hi David,
 
 Thank you for your detailed review!  Comments inline.
 
 David Harrington ietf...@comcast.net wrote:
 Hi,
  I have reviewed this document and feel that is almost ready for approval.
 This document defines a new data model in YANG format, based on the same
 information model as the Interfaces MIB module (IF-MIB).
 Effectively, the YANG model is a second (duplicative) standard for much of
 the same information.
 It is expected that devices may implement both the MIB and the YANG data
 models.
  My primary concern regards co-existence and synchronization across data
 models.
 I think this document would benefit from an Operational Considerations
 section that discusses synchronization, or an explanation why they might
 reasonably be out-of-sync.
 Here are a few points to consider:
  1) the ifIndex of an interface is used within the YANG model, matching the
 ifIndex in IF-MIB.
 RFC2863 discusses the fact that ifIndex numbering might change during
 hot-swaps.
 Actually, RFC 2863 points out that a ifIndex must not be reused until
 after the following re-initialization of the network management
 system.
 
 This document does not discuss the need to ensure that IF-MIB ifIndex
 changes need to be reflected in the YANG model.
 The ifIndex in the YANG module must match that in IF-MIB (really, that in
 the underlying instrumentation).
 Absolutely!  That's the intention.  The description for the read-only
 leaf if-index says:
 
The ifIndex value for the ifEntry represented by this
interface.
 
 
 Failure to sync the ifIndex could lead NM applications to confuse which
 already-retrieved data records are related to which interface.
 This could cause an NM application to misinterpret/corrupt gathered
 trending information, and possibly to apply changes to the wrong
 interfaces.
 Fully agree - this is why the if-index is present; to facilitate the
 mapping between the models.
 
 2) ifType - can an interface be hot-swapped to use a different type? Is
 this discussed someplace?
 Hot-swapping sounds like a physical property.  The data model in this
 document can handle this -- provided the system physically supports
 it, of course.  Note that the type is a writable leaf just like
 others.  You can change it, but as with any other leaf a device that
 cannot support a particular change will reject it.
 
 3) ifType - the description says the value of this mandatory object MAY be
 initialized. What value should an NM application expect if it is NOT
 initialized?
 None.  And since it is mandatory, in this case the NM application has
 to explicitly provide the type.  If you write a completely generic NM
 application you would probably always provide the type, since you
 cannot count on the server auto-initializing it.  But if you *know*
 that the server auto-initialize the type, you don't have to provide
 it.
 
 4) enabled - Systems that implement the IF-MIB use the value of this leaf
 to set IF-MIB.ifAdminStatus ...; should this be a MAY/SHOULD/MUST? How
 will this coexist with SNMP-based NM applications? Is there potential for
 conflict? What if NETCONF sets this as enabled, then an operator sets it
 to disabled via SNMP?
 Does NETCONF know that its enable value (adminStatus) is out of date?
 (does it matter? See note 7).
 What if the NETCONF system directky changes the underlying instrumentation
 for adminstatus without going through 

Re: Last Call: draft-ietf-netmod-interfaces-cfg-10.txt (A YANG Data Model for Interface Management) to Proposed Standard

2013-04-30 Thread Martin Bjorklund
Hi David,

Thank you for your detailed review!  Comments inline.

David Harrington ietf...@comcast.net wrote:
 Hi, 
  
 I have reviewed this document and feel that is almost ready for approval. 
 This document defines a new data model in YANG format, based on the same 
 information model as the Interfaces MIB module (IF-MIB). 
 Effectively, the YANG model is a second (duplicative) standard for much of 
 the same information. 
 It is expected that devices may implement both the MIB and the YANG data 
 models. 
  
 My primary concern regards co-existence and synchronization across data 
 models. 
 I think this document would benefit from an Operational Considerations 
 section that discusses synchronization, or an explanation why they might 
 reasonably be out-of-sync. 
 Here are a few points to consider: 
  
 1) the ifIndex of an interface is used within the YANG model, matching the 
 ifIndex in IF-MIB.  
 RFC2863 discusses the fact that ifIndex numbering might change during 
 hot-swaps. 

Actually, RFC 2863 points out that a ifIndex must not be reused until
after the following re-initialization of the network management
system.

 This document does not discuss the need to ensure that IF-MIB ifIndex 
 changes need to be reflected in the YANG model. 
 The ifIndex in the YANG module must match that in IF-MIB (really, that in 
 the underlying instrumentation). 

Absolutely!  That's the intention.  The description for the read-only
leaf if-index says:

   The ifIndex value for the ifEntry represented by this
   interface.


 Failure to sync the ifIndex could lead NM applications to confuse which 
 already-retrieved data records are related to which interface. 
 This could cause an NM application to misinterpret/corrupt gathered 
 trending information, and possibly to apply changes to the wrong 
 interfaces. 

Fully agree - this is why the if-index is present; to facilitate the
mapping between the models.

 2) ifType - can an interface be hot-swapped to use a different type? Is 
 this discussed someplace? 

Hot-swapping sounds like a physical property.  The data model in this
document can handle this -- provided the system physically supports
it, of course.  Note that the type is a writable leaf just like
others.  You can change it, but as with any other leaf a device that
cannot support a particular change will reject it.

 3) ifType - the description says the value of this mandatory object MAY be 
 initialized. What value should an NM application expect if it is NOT 
 initialized? 

None.  And since it is mandatory, in this case the NM application has
to explicitly provide the type.  If you write a completely generic NM
application you would probably always provide the type, since you
cannot count on the server auto-initializing it.  But if you *know*
that the server auto-initialize the type, you don't have to provide
it.

 4) enabled - Systems that implement the IF-MIB use the value of this leaf 
 to set IF-MIB.ifAdminStatus ...; should this be a MAY/SHOULD/MUST? How 
 will this coexist with SNMP-based NM applications? Is there potential for 
 conflict? What if NETCONF sets this as enabled, then an operator sets it 
 to disabled via SNMP? 
 Does NETCONF know that its enable value (adminStatus) is out of date? 
 (does it matter? See note 7). 
 What if the NETCONF system directky changes the underlying instrumentation 
 for adminstatus without going through the MIB? 

It is not clear to me if we can / want to require that these objects
share the same instrumentation.

Some of this might be b/c ifAdminStatus is a a bit unclear in some
regards.  For example, it talks about how

per configuration information
retained by the managed system, ifAdminStatus is then
changed [...]

I would assume (but this might be incorrect) that the configuration
information could be things configured through the CLI for example,
and this configuration information could thus also be the data
defined in this YANG model.

So it seems RFC 2863 makes a distinction between ifAdminStatus and
what is actually configured.

Also, the description of ifAdminStatus doesn't say anything about
persistence, so it might be impossible to map this to the persistently
stored configuration.


 5) is there a reason why description value MAY match IF-MIB ifAlias 
 ***and MAY restrict the values***? 
 Is there a particular use case for this lack of standardization of 
 restrictions across data models? 
 The persistence is a pretty important restriction related to the 
 functionality of ifAlias, and the dynamism of ifIndex. 
 If NETCONF is used to set the value, ignoring IF-MIB restrictions, what 
 happens to IF-MIB ifAlias as a persistent handle to the interface? 

The only reason the description leaf is mapped to ifAlias is b/c
this is what many implementations do.  So we wanted to point out the
differences in the value space for these objects so that implementers
are aware of this.

And of course it is 

Re: [netmod] Last Call: draft-ietf-netmod-interfaces-cfg-10.txt (A YANG Data Model for Interface Management) to Proposed Standard

2013-04-30 Thread Ladislav Lhotka

On Apr 30, 2013, at 12:20 PM, Martin Bjorklund m...@tail-f.com wrote:

 
 5) is there a reason why description value MAY match IF-MIB ifAlias 
 ***and MAY restrict the values***? 
 Is there a particular use case for this lack of standardization of 
 restrictions across data models? 
 The persistence is a pretty important restriction related to the 
 functionality of ifAlias, and the dynamism of ifIndex. 
 If NETCONF is used to set the value, ignoring IF-MIB restrictions, what 
 happens to IF-MIB ifAlias as a persistent handle to the interface? 
 
 The only reason the description leaf is mapped to ifAlias is b/c
 this is what many implementations do.  So we wanted to point out the

I think it is a dubious practice.

 differences in the value space for these objects so that implementers
 are aware of this.
 
 And of course it is not possible to actually set *ifAlias* and ignore
 its syntax constraints.  However, you can use non 7-bit ascii in
 description, and in this case the description value cannot be used
 unmodified as ifAlias.

If I correctly understand IF-MIB, a natural mapping would be

   +--++
   | YANG data node   | IF-MIB object  |
   +--++
   | name | ifAlias|
   | local-name   | ifName |
   +--++

with local-name being a new config=false leaf. The location leaf then could 
be removed.
The lack of correspondence between name and ifName is somewhat confusing, 
so perhaps an alternative could be to follow suit of IF-MIB and use alias (== 
ifAlias) as the key of interface list, and name (== ifName) as the 
config=false local name. 

Lada


--
Ladislav Lhotka, CZ.NIC Labs
PGP Key ID: E74E8C0C






Re: Do we have an estimated date for completing the IESG selection process for this year?

2013-04-30 Thread Martin Stiemerling

Hi Ted,

On 04/30/2013 01:19 AM, Ted Hardie wrote:

So, this page: http://www.ietf.org/iesg/members.html still has TBD
listed for one of the transport ADs.  Is there a projected date for
appointment at this point?

Forgive the broad distribution of the question, but it's not clear
whether this question is solely directed at the nomcom, the IESG, the
IAB or the community at large.


It is the NOMCOM and the IAB as confirming body.

  Martin

--
IETF Transport Area Director

martin.stiemerl...@neclab.eu

NEC Laboratories Europe
NEC Europe Limited
Registered Office:
Athene, Odyssey Business Park, West End  Road, London, HA4 6QE, GB
Registered in England 2832014


Re: [renum] Gen-art review: draft-ietf-6renum-gap-analysis-05.txt

2013-04-30 Thread Robert Sparks

On 4/2/13 4:58 AM, Brian E Carpenter wrote:

Just picking a couple of points for further comment:

On 02/04/2013 08:46, Liubing (Leo) wrote:

Hi, Robert

...


-Original Message-
From: Robert Sparks [mailto:rjspa...@nostrum.com]

...

The document currently references
draft-chown-v6ops-renumber-thinkabout
several times.
That document is long expired (2006). It would be better to simply
restate what is
important from that document here and reference it only once in the
acknowlegements
rather than send the reader off to read it.

[Bing] draft-chown-v6ops-renumber-thinkabout is an important input for the gap 
analysis. Although the draft is expired, most of the content are still valid.
draft-chown is a more comprehensive analysis, while the gap draft is focusing 
on gaps in enterprise renumbering. So it might not easy to abstract several 
points as important from draft-chown to this draft. We actually encourage 
people to read it.

Robert is right, though, sending people to a long-expired draft is a bad idea.
Of course we have to acknowledge it, but maybe we should pull some of its text
into an Appendix.

Tim Chown, any opinion?
The most recent version (and the one slated for the next telechat) still 
has this long-expired draft referenced.


RjS



Re: [renum] Gen-art review: draft-ietf-6renum-gap-analysis-05.txt

2013-04-30 Thread joel jaeggli

On 4/30/13 8:33 AM, Robert Sparks wrote:

On 4/2/13 4:58 AM, Brian E Carpenter wrote:

Just picking a couple of points for further comment:

On 02/04/2013 08:46, Liubing (Leo) wrote:

Hi, Robert

...


-Original Message-
From: Robert Sparks [mailto:rjspa...@nostrum.com]

...

The document currently references
draft-chown-v6ops-renumber-thinkabout
several times.
That document is long expired (2006). It would be better to simply
restate what is
important from that document here and reference it only once in the
acknowlegements
rather than send the reader off to read it.
[Bing] draft-chown-v6ops-renumber-thinkabout is an important input 
for the gap analysis. Although the draft is expired, most of the 
content are still valid.
draft-chown is a more comprehensive analysis, while the gap draft is 
focusing on gaps in enterprise renumbering. So it might not easy to 
abstract several points as important from draft-chown to this draft. 
We actually encourage people to read it.
Robert is right, though, sending people to a long-expired draft is a 
bad idea.
I'm not sure I see that as worse than referring to Wikipedia, an expired 
draft has the property that it's not going to change. I have no problem 
with the idea that it would be an informative reference.   but yes it's 
a bit much to say go read this.
Of course we have to acknowledge it, but maybe we should pull some of 
its text

into an Appendix.

Tim Chown, any opinion?
The most recent version (and the one slated for the next telechat) 
still has this long-expired draft referenced.


RjS





Re: IETF Diversity Question on Berlin Registration?

2013-04-30 Thread t . p .
- Original Message -
From: Margaret Wasserman m...@lilacglade.org
To: t.p. daedu...@btconnect.com
Cc: Dan Harkins dhark...@lounge.org; ietf@ietf.org
Sent: Monday, April 29, 2013 1:53 AM

Hi Tom,

On Apr 19, 2013, at 6:03 AM, t.p. daedu...@btconnect.com wrote:
 If we required the IETF to reflect the diversity of people who are,
 e.g., IT network professionals, then the IETF would fall apart for
lack
 of ability.
[…]
 If the ADs of the IETF have to represent the diversity of the world -
 which could in extremes..

Has anyone even suggested that IESG should reflect the diversity of
these groups?  Where is this coming from?  You are putting up strawmen,
so that you can tear them down…

The question that people are asking is why the diversity of the IETF
leadership doesn't reflect the diversity of _the IETF_.

There is no inherent reason why 40+-year-old, white, western males who
work at large networking equipment vendors are inherently more capable
of serving on the IESG than people from other groups within the IETF,
and there would be _considerable internal benefit_ to having an IESG
that was more diverse, because diverse groups make better decisions and
better represent the needs of the whole organization.  Therefore, if
there is something about our culture, our structure, our selection
process, or the way we run our meetings that is causing us to
predominantly select our leadership from a restricted group, we would
have _more capable_ and _better_ leadership if we could find a way to
broaden that pool.

_That_ is what this discussion is about.  This is not an effort to meet
some externally imposed notion of diversity.

tp
Margaret

The first I saw of this idea was the post by Ray, which said

 The IETF is concerned about diversity.  As good engineers, we would
like
 to attempt to measure diversity while working on addressing and
increasing
 it.  To that end, we are considering adding some possibly sensitive
 questions to the registration process, for example, gender.

For me, this came out of the blue.  I have no idea why it is considered
that the IETF - note, IETF not IAB or IESG or IAOC - has become
concerned nor what evidence there is of concern.

And note, 'for example, gender' which seems to have become the only
measure under consideration; was that Ray's intent, or was he being coy
and leaving out other frequent lacks of diversity which are more
delicate to discuss? I immediately assumed the latter, based on no
evidence at all!  Given the way the discussion has gone, perhaps he
meant
'only and exclusively gender but I could not possibly say that':-)

As Michael StJohns has said,
How does the IETF evolve to continue to be an effective, efficient, and
relevant source of high quality Internet standards?
which I think is spot on.  I do not see diversity (lack of) as being
part of that until it is shown to be.  I do see the IESG as key to the
work of the IETF and see
filling positions there as challenging, perhaps a risk to the long term
existence of the IETF.  The requirements - technical knowledge,
experience,
time to spend on IETF business, e.g. - make the candidate pool rather
small
and I believe that any more constraints will weaken that pool and could
hazard
the IETF.

There are workshops for (potential?) WG Chairs; I would see merit in
more such sessions on how to work effectively within the IETF, at any
level, with a subtext of it is possible to do more, to 'advance', it is
really not (quite) impossible.  Diversity would have no place in such
workshops but it could increase the candidate pool for a variety of
posts.

Tom Petch
/tp

Margaret










Re: [IETF] Re: IETF Diversity Question on Berlin Registration?

2013-04-30 Thread t . p .

- Original Message -
From: Warren Kumari war...@kumari.net
To: Joe Abley jab...@hopcount.ca
Cc: Sam Hartman hartmans-i...@mit.edu; ietf@ietf.org;
stbry...@cisco.com
Sent: Monday, April 29, 2013 10:01 PM
On Apr 29, 2013, at 4:55 PM, Joe Abley jab...@hopcount.ca wrote:


 On 2013-04-29, at 16:49, Sam Hartman hartmans-i...@mit.edu wrote:

 Stewart == Stewart Bryant stbry...@cisco.com writes:


   Stewart Why would you disregard a statistical analysis? That seems
   Stewart akin to disregarding the fundamentals of science and

 Statistical analysis is only useful if it's going to tell you
something
 that matters for your decision criteria.

 http://i.imgur.com/47D7zGq.png

Wow, that *was* useful, and has helped reinforce my belief that I chose
the right browser -- Think of the children, don't use IE.

tp
Warren

The correlation that has attracted attention near me is the marked drop
in crime rates compared with a reduction in the use of leaded petrol;
here, you can make a comparison with countries that have or have not
reduced the use of leaded petrol at different times, and the correlation
stands up, so perhaps Microsoft is not implicated in this one.

Tom Petch


Couldn't resist: http://xkcd.com/552/

W





 Joe


--
There were such things as dwarf gods. Dwarfs were not a naturally
religious species, but in a world where pit props could crack without
warning and pockets of fire damp could suddenly explode they'd seen the
need for gods as the sort of supernatural equivalent of a hard hat.
Besides, when you hit your thumb with an eight-pound hammer it's nice to
be able to blaspheme. It takes a very special and straong-minded kind of
atheist to jump up and down with their hand clasped under their other
armpit and shout, Oh, random-fluctuations-in-the-space-time-continuum!
or Aaargh, primitive-and-outmoded-concept on a crutch!
  -- Terry Pratchett






Re: [spfbis] [dnsext] Obsoleting SPF RRTYPE

2013-04-30 Thread Alessandro Vesely
On Tue 30/Apr/2013 01:07:42 +0200 Mark Andrews wrote:
 
   The really annoying thing is that SPF is techically superior
   to TXT is lots of ways.
 
   1. It uniquely identifies the roll of the record.
 
   2. As SPF records are singletons you don't need to identify
  and remove the old record when updating.  You can just
  remove all SPF record and add the replacement.
 
  For TXT you need to lookup the existing RRset, extract
  the v=spf1 record from it.  You then need to create a
  UPDATE message to delete just that record as well as add
  the new TXT record.   You then have to hope that no one
  else is performing a simultanious update as you may get
  two TXT v=spf1 records in the RRset.

That's true, except that one has TXT records anyway.

   The complains about using SPF is that there are broken
   firewalls and some servers drop queries for it, some registars
   don't support it.

Nits, as explained below.  The basic fact that killed the SPF type is
the ability to use TXT as a replacement.  There must be an analogous
of Gresham's law:  Bad types drive out good ones.

   For firewalls, fix/replace the firewall if you intend to
   deploy SPF and it doesn't support it.  It is total !@##@#
   that firewall are incapable of handling new DNS record
   types.  New records we exected to occur from the very
   beginning and have been coming out regularly ever since the
   DNS was invented.  Firewall vendors that are incapable of
   handling new DNS types are incompetent and do not deserve
   repeat business.
 
   For servers than drop SPF queries they really are at the
   noise level.  When you identify one you complain to the
   owners of it.  Yes, that does work.  We needed to do that
   for  records.
 
   For registrars, change registrar to one that does.

While it's too late for SPF, we can learn this lesson.


Gen-art telechat review: draft-ietf-6renum-gap-analysis-06.txt

2013-04-30 Thread Robert Sparks

I am the assigned Gen-ART reviewer for this draft. For background on
Gen-ART, please see the FAQ at
 http://wiki.tools.ietf.org/area/gen/trac/wiki/GenArtfaq.

Please wait for direction from your document shepherd
or AD before posting a new version of the draft.

Document: draft-ietf-6renum-gap-analysis-05.txt
Reviewer: Robert Sparks
Review Date: April 1, 2013
IETF LC End Date: April 10, 2013
IESG Telechat date: May 16, 2013

Summary: Ready with nits (that border on minor issues)

This update improved the readability significantly, and addressed my 
major concern about being able to build a list of the gaps. Thank you.


There are a few issues from my last call review that are still not 
addressed.
I have left the classification of minor issue vs nits the same as the 
original review to make referring to the earlier review easier,
but please consider all of these Nits. The IESG will need to decide 
whether to escalate them.


I've trimmed away the points that were addressed.

On 4/1/13 3:46 PM, Robert Sparks wrote:

--
Minor issues:

The document currently references 
draft-chown-v6ops-renumber-thinkabout several times.
That document is long expired (2006). It would be better to simply 
restate what is
important from that document here and reference it only once in the 
acknowlegements

rather than send the reader off to read it.
This version still references that long expired draft. There was also 
conversation on apps-discuss
about making that reference normative. IMHO, this is not the right way 
to treat the RFC series, and
strongly encourage moving the text that you want to reference into 
something that will

become an RFC.



Should section 8 belong to some other document? It looks like 
operational renumbering
advice/considerations, but doesn't seem to be exploring renumbering 
gaps, except for
the very short section 8.2 which says we need a better mechanism 
without much explanation.
Afaict, this wasn't addressed at all. In particular, we need a better 
mechanism is still all that

section 8.2 says.



Section 5.1, first bullet. The list below the impact of ambiguous M/O 
flags says things like
there is no standard and it is unspecified. I think you are trying 
to say that there is
ambiguity in what's written, not that nothing's written. This entire 
list would benefit from

being recast in terms of what needs to be done (what are the gaps?).

This text remains unmodified.


--
Nits/editorial comments:

There are a few sentences ending with etc. in the document. Please 
consider deleting the

word from the list - it doesn't help each sentence make its point.
There were some changes, but mostly these still exist. I'll leave 
pressing this point further to the RFC Editor.



Seciton 7.1: The first bullet does not parse. If I guess its meaning 
correctly
(that it would be benificial to tell hosts that local DNS has been 
updated and
they may want to make fresh queries), please be careful with the 
wording. The

hosts don't know which names are likely to resolve locally.
This text remained unchanged, and when coming back to the document for a 
re-review
(which is somewhat like coming back to an RFC you've read before just 
for reference),
it's even harder to understand what it's trying to say than it was when 
reading the document

linearly.

I think you are trying to say
A notification mechanism may be needed to indicate _to_ hosts that a 
renumbering event has _changed how local recursive DNS servers will 
respond_. That mechanism may also need to indicate that such a change 
will happen at a specific time in the future.




Section 7.1, third bullet - This isn't obviously about notification. 
Why is it

in this section? What's the gap this is trying to identify?

This text was unchanged.


Section 9.4 - what is it about these that make them gaps, much less 
unsolvable gaps.

Is this discussion in the wrong section of the document?
This is now section 10.3 and is mostly unchanged. It's still not clear 
why this discussion is in the unsolvable gaps section.




Call for Technical Plenary Topics

2013-04-30 Thread IAB Chair
The plenary topic for IETF 86, The End of POTS, was proposed by an IETF 
participant.  That plenary topic was well received.  As the IAB prepares for 
IETF 87, we want to reach out to the IETF community for technical plenary 
topics.  Please send suggestions to iab at iab.org.

The IAB is interested in hearing suggestions that could be presented by invited 
speakers, panels, or lightning talks.  In other words, please do not let the 
format of past plenary presentations narrow your suggestions.

Thank you,
 Russ Housley
 IAB Chair



Re: [spfbis] [dnsext] Obsoleting SPF RRTYPE

2013-04-30 Thread Doug Barton

On 04/30/2013 09:28 AM, Alessandro Vesely wrote:

While it's too late for SPF, we can learn this lesson.


As has been repeatedly pointed out in the discussion on both dnsext and 
spfbis, it is NOT too late for SPF. The way forward is simple:


1. Publish the bis draft which says for senders to publish both SPF and 
TXT versions, and receivers to query first for the SPF RRtype.


2. Update the HOW-TO docs to reflect this change.

3. Update the software to query SPF first (Note, Perl's NET::SPF, used 
by SpamAssassin, already made this change).


4. Let time pass.

5. When the next version of the SPF protocol (v=spf{1}) comes out make 
it SPF/99 only.


The discussion about this on the spfbis list all revolved around the 
fact that TXT is widespread, SPF/99 is rarely used, so let's just stick 
with TXT. In a pre-3597 world there _were_ problems with querying for 
SPF first, so the fact that historically querying for SPF/99 first was 
painful is a valid data point. However the problems encountered in the 
early days of SPF deployment with servers not handing unknown types 
gracefully haven't been relevant for many years now. Yet, the SPF 
community has continued to push TXT only, in spite of the advice of 
4408. Almost like a self-fulfilling prophecy ...


The reasons brought forward by participants in the spfbis group to not 
make this change all revolve around the fact that it would involve 
additional work. Personally I don't find those arguments compelling. 
First, some of the arguments about the extra work are just plain silly 
(ala, cut and paste of the same data for 2 RRtypes is too difficult). 
Second, there are not that many implementations that query SPF, and the 
change is not difficult. Third, most of the work to be done is to wait 
for time to pass and for people to upgrade to the new versions of 
software. This is a bog-simple long tail problem that we deal with in 
the DNS world all the time.


There was one objection that made some sense, which is that right now, 
because the SPF world has steadfastly distributed the advice to use TXT 
only, querying for SPF/99 first gives you what is likely to be 1 
spurious DNS lookup per e-mail message. The obvious answer to that is to 
do a better job of encouraging folks to publish SPF records. Meanwhile, 
I have a fairly traditional mail server implementation that does a 
variety of anti-spam checks. By rough count it generates about 8 DNS 
queries for every message already. Generating 1 more is in the noise 
in the short term, and as shown above goes away in the long term.


Not only is this a case where doing the right thing is good for SPF, the 
SPF example of let's just go with TXT because using a new RRtype is 
hard has spread like wildfire, especially in the mail authentication 
world (DKIM, DMARC, etc.). The slippery slope has been well-greased at 
this point, and it would be nice to move things back in the right 
direction (see 5507 for example).


To be fair, there was one other objection raised, which is that DNS 
provisioning systems haven't caught up with the need for new RRtypes. So 
some can't go to their registrar's/web hoster's/etc. web interface and 
enter a proper SPF record. That's a problem, sure. But it's a problem 
that has to be solved, assuming we're actually going to take the advice 
in 5507 seriously. Personally I'm not willing to allow all progress 
forward in DNS to be stymied by those unwilling to make an investment in 
their own infrastructure.


In case Dave is still wondering what all the fuss is about, and because 
the folks in spfbis seem completely unwilling to deal with this issue in 
the group, consider this my first draft of an IETF last call objection 
to the fact that 4408bis wants to deprecate use of the SPF RRtype.


Doug



Re: [spfbis] [dnsext] Obsoleting SPF RRTYPE

2013-04-30 Thread Dave Crocker

On 4/30/2013 10:11 AM, Doug Barton wrote:

As has been repeatedly pointed out in the discussion on both dnsext and
spfbis, it is NOT too late for SPF.



As has repeatedly been pointed out, the market has already had plenty of 
time to adopt the RR and has overwhelmingly rejected it.


d/

--
Dave Crocker
Brandenburg InternetWorking
bbiw.net


Appointment of Deborah Brungard as new IETF Liaison Manager to the ITU-T for MPLS

2013-04-30 Thread IAB Chair
The IAB has just notified the ITU-T that Deborah Brungard will be the new IETF 
Liaison Manager to the ITU-T for MPLS. Deborah was appointed following an open 
call for volunteers (see email from Scott Mansfield to the IETF list on Fri 
3/29/2013 4:32 PM EDT). Please congratulate Deborah when you see her. 

Please thank Scott Mansfield for his past service in this role.  Scott is now 
the overall liaison manager to ITU-T, and as such I am confident that he will 
provide valuable support for Deborah.

Thanks,
Russ



 From: IAB Chair iab-ch...@iab.org
 Date: April 30, 2013 1:35:53 PM EDT
 To: tsbs...@itu.int, ITU-T TSAG tsbt...@itu.int
 Cc: ITU TSBDir tsb...@itu.int, IAB i...@iab.org, IESG i...@ietf.org, 
 IETF Liaison Statements stateme...@ietf.org
 Subject: Appointment of Deborah Brungard as new IETF Liaison Manager to the 
 ITU-T for MPLS
 
 
 The IAB would like to bring to the ITU-T's attention the appointment of Ms 
 Deborah Brungard as the new IETF Liaison Manager to the ITU-T for MPLS.
 
 The IETF-ITU-T MPLS liaison role helps facilitate communication between the 
 IETF and the ITU-T on matters of MPLS.  The MPLS liaison manager is 
 responsible for ensuring the liaisons from the IETF on MPLS are routed to the 
 correct study group(s) in the ITU-T and any incoming liaison from the ITU-T 
 on MPLS is communicated to the proper working groups, usually MPLS, CCAMP, 
 and PWE3 working groups.
 
 Deborah Brungard has been with ATT for more than 28 years with experience in 
 network and service management. She is a Lead Member of Technical Staff in 
 ATT's Network Technologies Unit. She is IETF Routing Area's CCAMP Co-Chair, 
 she has co-chaired CCAMP for more than 6 years. CCAMP (Common Control and 
 Measurement Plane) is responsible for GMPLS and works cooperatively with 
 MPLS, L2VPN, PWE3, OSPF, PCE, IDR, and ISIS. She is also the Routing Area 
 Directorate Coordinator and Routing Area Secretary. Deborah has actively 
 contributed in SG15 for more than 15 years, including as an Editor (in the 
 early 2000's). She is very familiar with the ITU-T process, she was Chair of 
 ANSI (American National Standards) T1X1.5 (Optical Standards) for several 
 years in the early 2000's.
 
 For the IAB,
 Russ Housley
 IAB Chair
 



Re: [spfbis] [dnsext] Obsoleting SPF RRTYPE

2013-04-30 Thread Edward Lewis
On Apr 30, 2013, at 12:28, Alessandro Vesely wrote:
 ...The basic fact that killed the SPF type is
 the ability to use TXT as a replacement.  There must be an analogous
 of Gresham's law:  Bad types drive out good ones.


I disagree with the assertion that what killed SPF is the ability to use TXT 
as a replacement.   It has nothing to do with one option being superior to the 
other, it was the lack of technical incentive to switch from one to the other.  
I post this in the sense that if the root cause is not understood, no solution 
will stick.  Here is a message with my recounting of what led us to this point:

http://www.ietf.org/mail-archive/web/dnsext/current/msg12681.html

I don't see the death of SPF has a harbinger of things to come.  There's a 
strong case to be made the failure happened before 2004 and the root cause has 
since been corrected by changing the RRTYPE type allocation policies.  Still 
that fix was too late to ever let SPF sprout wings.

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Edward Lewis 
NeuStarYou can leave a voice message at +1-571-434-5468

There are no answers - just tradeoffs, decisions, and responses.



Re: [spfbis] [dnsext] Obsoleting SPF RRTYPE

2013-04-30 Thread David Conrad
Dave,

On Apr 30, 2013, at 10:13 AM, Dave Crocker d...@dcrocker.net wrote:
 On 4/30/2013 10:11 AM, Doug Barton wrote:
 As has been repeatedly pointed out in the discussion on both dnsext and 
 spfbis, it is NOT too late for SPF.
 
 As has repeatedly been pointed out, the market has already had plenty of time 
 to adopt the RR and has overwhelmingly rejected it.

What is the IETF-approved timeframe in which the market is allowed to 
accept/reject a particular technology?

Given no one appears to be making the argument that using the TXT RR and the 
MAIL FROM/HELO identity is the optimal solution (to put it mildly), I'm a bit 
confused why deprecating the SPF RR is being pushed so hard at this point in 
time. Is there some forcing function here?

Regards,
-drc



Re: Do we have an estimated date for completing the IESG selection process for this year?

2013-04-30 Thread Yoav Nir
Hi Martin,

On Apr 30, 2013, at 6:21 PM, Martin Stiemerling martin.stiemerl...@neclab.eu 
wrote:

 Hi Ted,
 
 On 04/30/2013 01:19 AM, Ted Hardie wrote:
 So, this page: http://www.ietf.org/iesg/members.html still has TBD
 listed for one of the transport ADs.  Is there a projected date for
 appointment at this point?
 
 Forgive the broad distribution of the question, but it's not clear
 whether this question is solely directed at the nomcom, the IESG, the
 IAB or the community at large.
 
 It is the NOMCOM and the IAB as confirming body.
 

While this is true, we've been aware of a problem for three months now, and 
we're not aware of any resolution or of any attempt to resolve the issue. We 
know that there are several candidates (Still listed on the NomCom website) and 
for some reason (which we can only guess at) none of them is being appointed.

Will that seat remain vacant for a year? Two years? Is there some flaw in the 
process that prevents this issue from being resolved?

Inquiring minds want to know

Yoav

Re: [spfbis] [dnsext] Obsoleting SPF RRTYPE

2013-04-30 Thread Dave Crocker

On 4/30/2013 11:08 AM, David Conrad wrote:

As has repeatedly been pointed out, the market has already had
plenty of time to adopt the RR and has overwhelmingly rejected it.


What is the IETF-approved timeframe in which the market is allowed
to accept/reject a particular technology?


I've no idea what the lower limit is or should be, but I'm quite sure 
that 7 years exceeds it by a very comfortable margin.




Given no one appears to be making the argument that using the TXT RR
and the MAIL FROM/HELO identity is the optimal solution (to put it
mildly), I'm a bit confused why deprecating the SPF RR is being
pushed so hard at this point in time. Is there some forcing function
here?


Surely this has been amply covered, multiple times.  Rehashing it won't 
be productive.


d/


--
Dave Crocker
Brandenburg InternetWorking
bbiw.net


Re: [spfbis] [dnsext] Obsoleting SPF RRTYPE

2013-04-30 Thread Murray S. Kucherawy
Doug,

Aren't you tired of repeatedly pointing out your half of the argument?  I
am of ours.  The Monty Python argument clinic sketch comes to mind.

On Tue, Apr 30, 2013 at 10:11 AM, Doug Barton do...@dougbarton.us wrote:

 The discussion about this on the spfbis list all revolved around the fact
 that TXT is widespread, SPF/99 is rarely used, so let's just stick with
 TXT. In a pre-3597 world there _were_ problems with querying for SPF first,
 so the fact that historically querying for SPF/99 first was painful is a
 valid data point. However the problems encountered in the early days of SPF
 deployment with servers not handing unknown types gracefully haven't been
 relevant for many years now. Yet, the SPF community has continued to push
 TXT only, in spite of the advice of 4408. Almost like a self-fulfilling
 prophecy ...


As has been repeatedly pointed out, the haven't been relevant for many
years now conclusion you've reached is contradicted by both anecdotal and
empirical data.

I assure you that I hear all of the points you are making.  I also assure
you that none of them resolve any of the points being made on the other
side.  There's no dialog happening here.



 The reasons brought forward by participants in the spfbis group to not
 make this change all revolve around the fact that it would involve
 additional work. Personally I don't find those arguments compelling.


Sure, because you don't have to do the work, nor are you confronted with
the weight of the long tail in this case.  I submit that it is presumptuous
to assert that the properties of one community's long tail problems are the
same as they are in others.


 First, some of the arguments about the extra work are just plain silly
 (ala, cut and paste of the same data for 2 RRtypes is too difficult).


I don't think anyone said that's difficult.  I would also point out that
it's not difficult, given a jumble of TXT RRs in a reply, to find any that
start with a particular identifying substring which would mean this is an
SPF record, so let's nip that one in the bud right now.

These are all distractions from the real points being made.


 Second, there are not that many implementations that query SPF, and the
 change is not difficult.


Nobody said that's a problem either.


 Third, most of the work to be done is to wait for time to pass and for
 people to upgrade to the new versions of software. This is a bog-simple
 long tail problem that we deal with in the DNS world all the time.


...during which time the service arguably operates in a degraded state.

The assertion that You should just fix your DNS infrastructure! ignores
the fact that the interfering piece of the infrastructure may not be under
the control of the operator who can't complete an SPF operation, or, worse,
that the owner of the problem lacks the resources or interest to get it
fixed for a long while, if at all.

Do we just have SPF operators call you for emotional support during this
protracted transition time?



 Not only is this a case where doing the right thing is good for SPF, the
 SPF example of let's just go with TXT because using a new RRtype is hard
 has spread like wildfire, especially in the mail authentication world
 (DKIM, DMARC, etc.). The slippery slope has been well-greased at this
 point, and it would be nice to move things back in the right direction (see
 5507 for example).


This is also a separate argument given the underscore prefix debate.



 To be fair, there was one other objection raised, which is that DNS
 provisioning systems haven't caught up with the need for new RRtypes. So
 some can't go to their registrar's/web hoster's/etc. web interface and
 enter a proper SPF record. That's a problem, sure. But it's a problem that
 has to be solved, assuming we're actually going to take the advice in 5507
 seriously. Personally I'm not willing to allow all progress forward in DNS
 to be stymied by those unwilling to make an investment in their own
 infrastructure.


What are you prepared to do to help address the broken infrastructure?
It's all well and good to lob directives over the wall, but I'd like to
hear some advice about how to compel inattentive infrastructure operators
to make these changes, especially when those operators aren't necessarily
the ones affected.

-MSK


Re: [spfbis] [dnsext] Obsoleting SPF RRTYPE

2013-04-30 Thread David Conrad
Murray,

On Apr 30, 2013, at 11:29 AM, Murray S. Kucherawy superu...@gmail.com wrote:
 I would also point out that it's not difficult, given a jumble of TXT RRs in 
 a reply, to find any that start with a particular identifying substring which 
 would mean this is an SPF record, so let's nip that one in the bud right 
 now.

SPF using TXT and hence, SPFBIS forces the uniquification of the DNS response 
into the application instead of in the DNS library. Given the ordering of 
individual TXT RRs within an RRset is not guaranteed, I suspect the chances 
that every application is going to do that parsing correctly is relatively low 
(btw, the example in 3.3 in spfbis-14 is a bit misleading: assuming second 
string is in a separate TXT RR (which is implied), the concatenation might be 
second stringv=spf1 . first).  The more interesting bit is if/when 
another protocol uses TXT at the same ownername.

 What are you prepared to do to help address the broken infrastructure?

Argue against deprecating the SPF RR :).

The RR has been allocated and it is supported in most DNS servers and resolver 
libraries in one form or another.  Provisioning systems take much longer, but 
that isn't surprising and shouldn't be an argument to deprecate (if it is, we 
might as well close the RRtype registry for new entries).

In the past, the IETF used to make decisions based on long-term 
technical/architectural correctness, even in the face of pragmatic 
complications (e.g., the choice to mandate strong crypto despite real world 
challenges some companies faced in exporting that crypto in products). In this 
particular case, there seems to be an argument to explicitly disallow the 
long-term technically/architecturally correct approach because some folks 
choose not to add an RR to their zone files or support that RR in their 
provisioning systems.  As I said in DNSEXT, this seems like the wrong approach 
to me.

Regards,
-drc





Re: [spfbis] [dnsext] Obsoleting SPF RRTYPE

2013-04-30 Thread David Conrad
On Apr 30, 2013, at 11:12 AM, Dave Crocker d...@dcrocker.net wrote:
 What is the IETF-approved timeframe in which the market is allowed to 
 accept/reject a particular technology?
 I've no idea what the lower limit is or should be, but I'm quite sure that 7 
 years exceeds it by a very comfortable margin.

By that logic we should abandon IPv6, DNSSEC, EDNS0, etc.

Thanks,
-drc




Re: [spfbis] [dnsext] Obsoleting SPF RRTYPE

2013-04-30 Thread Dave Crocker

On 4/30/2013 12:54 PM, David Conrad wrote:

On Apr 30, 2013, at 11:12 AM, Dave Crocker d...@dcrocker.net wrote:

What is the IETF-approved timeframe in which the market is allowed to 
accept/reject a particular technology?

I've no idea what the lower limit is or should be, but I'm quite sure that 7 
years exceeds it by a very comfortable margin.


By that logic we should abandon IPv6, DNSSEC, EDNS0, etc.



Gosh, David.  I guess you win.


d/


--
Dave Crocker
Brandenburg InternetWorking
bbiw.net



Re: IETF Diversity Question on Berlin Registration?

2013-04-30 Thread Jari Arkko
I think the statistics are very interesting and we should continue developing 
them, but we should also not be driven by them. I'll repeat again what I've 
said before: I can see increasing both participation diversity and leadership 
diversity being useful for the IETF. We are limited by various constraints, 
type of people who are in our field, where the industry is located in the 
world, funding resources, expertise gained by various participants, etc. But 
within those constraints, I'd see plenty of benefits to increasing diversity 
along many axes. (Or indeed even relaxing some of the constraints, such 
lowering participation costs by remote participation, or lowering leadership 
costs by requiring less than 100% time commitments.)

Jari



Re: IETF Diversity Question on Berlin Registration?

2013-04-30 Thread Randy Bush
you don't need a weatherman to know which way the wind blows.
-- bob dylan

we do not need measurements to know the ietf is embarrassingly
non-diverse.  it is derived from and embedded in an embarrassingly
non-diverse culture.

we need to do what we can to remedy this.  progress not perfection is
our goal.

measurement may be useful to see if we are having effect and/or what
things have effect (meeting locales, size of cookies, ...).

we should be asking the minorities and those struggling to particiate
what we can do to help.

randy


Re: IETF Diversity Question on Berlin Registration?

2013-04-30 Thread David Meyer
On Tue, Apr 30, 2013 at 1:41 PM, Randy Bush ra...@psg.com wrote:

 you don't need a weatherman to know which way the wind blows.
 -- bob dylan

 we do not need measurements to know the ietf is embarrassingly
 non-diverse.  it is derived from and embedded in an embarrassingly
 non-diverse culture.

 we need to do what we can to remedy this.  progress not perfection is
 our goal.

 measurement may be useful to see if we are having effect and/or what
 things have effect (meeting locales, size of cookies, ...).

 we should be asking the minorities and those struggling to particiate
 what we can do to help.

 randy


Nicely said Randy. --dmm


Re: [spfbis] [dnsext] Obsoleting SPF RRTYPE

2013-04-30 Thread David Conrad
On Apr 30, 2013, at 1:20 PM, Dave Crocker d...@dcrocker.net wrote:
 I've no idea what the lower limit is or should be, but I'm quite sure that 
 7 years exceeds it by a very comfortable margin.
 By that logic we should abandon IPv6, DNSSEC, EDNS0, etc.
 Gosh, David.  I guess you win.

Gee Dave, great way to elevate the discussion.

*plonk*




Re: IETF Diversity Question on Berlin Registration?

2013-04-30 Thread Ralph Droms

On Apr 30, 2013, at 4:53 PM 4/30/13, David Meyer d...@1-4-5.net wrote:

 
 
 On Tue, Apr 30, 2013 at 1:41 PM, Randy Bush ra...@psg.com wrote:
 you don't need a weatherman to know which way the wind blows.
 -- bob dylan
 
 we do not need measurements to know the ietf is embarrassingly
 non-diverse.  it is derived from and embedded in an embarrassingly
 non-diverse culture.
 
 we need to do what we can to remedy this.  progress not perfection is
 our goal.
 
 measurement may be useful to see if we are having effect and/or what
 things have effect (meeting locales, size of cookies, ...).
 
 we should be asking the minorities and those struggling to particiate
 what we can do to help.
 
 randy
 
 Nicely said Randy. --dmm

Agreed - without consulting a weatherman, we've been having a discussion (among 
a rather un-diverse group of participants) about where we are, as opposed to 
asking the questions Randy suggests.

- Ralph

  
 



Re: [spfbis] [dnsext] Obsoleting SPF RRTYPE

2013-04-30 Thread Dave Crocker

On 4/30/2013 2:37 PM, David Conrad wrote:

On Apr 30, 2013, at 1:20 PM, Dave Crocker d...@dcrocker.net wrote:

I've no idea what the lower limit is or should be, but I'm quite sure that 7 
years exceeds it by a very comfortable margin.

By that logic we should abandon IPv6, DNSSEC, EDNS0, etc.

Gosh, David.  I guess you win.


Gee Dave, great way to elevate the discussion.



You were discussing?

d/


--
Dave Crocker
Brandenburg InternetWorking
bbiw.net


Re: [spfbis] [dnsext] Obsoleting SPF RRTYPE

2013-04-30 Thread Mark Andrews

In message 51802793.3010...@dcrocker.net, Dave Crocker writes:
 On 4/30/2013 12:54 PM, David Conrad wrote:
  On Apr 30, 2013, at 11:12 AM, Dave Crocker d...@dcrocker.net wrote:
  What is the IETF-approved timeframe in which the market is allowed to a
 ccept/reject a particular technology?
  I've no idea what the lower limit is or should be, but I'm quite sure that
  7 years exceeds it by a very comfortable margin.
 
  By that logic we should abandon IPv6, DNSSEC, EDNS0, etc.
 
 
 Gosh, David.  I guess you win.

When just about none of the documentation mentions the SPF record type
nor has examples with both SPF and TXT records it isn't the market
choosing.  You can't choose of you really havn't been informed.

BEWARE OF THE LEOPARD

But Mr Dent, the plans have been available in the local planning
 office for the last nine months.

Oh yes, well as soon as I heard I went straight round to see
 them, yesterday afternoon. You hadn't exactly gone out of your
 way to call attention to them, had you? I mean, like actually
 telling anybody or anything.

But the plans were on display ...

On display? I eventually had to go down to the cellar to find them.

That's the display department.

With a flashlight.

Ah, well the lights had probably gone.

So had the stairs.

But look, you found the notice didn't you?

Yes, said Arthur, yes I did. It was on display in the bottom
 of a locked filing cabinet stuck in a disused lavatory with a
 sign on the door saying 'Beware of the Leopard'.

 The Hitchhiker’s Guide to the Galaxy
 Douglas Adams

Mark
-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742 INTERNET: ma...@isc.org


ICANN Nomcom Extends Deadline for SOIs to 15 May 2013

2013-04-30 Thread Ole Jacobsen

http://www.icann.org/en/news/announcements/announcement-30apr13-en.htm

In order to provide additional time for candidates to apply, ICANN's 
2013 Nominating Committee (NomCom) has extended the deadline for 
Statements of Interest until 15 May 2013 at 23:59 UTC.

The 2013 NomCom is actively seeking qualified candidates for the 
following key positions within ICANN:

* Three members of the Board of Directors of ICANN

* Three members of the At Large Advisory Committee (ALAC) (one each 
  from the Africa, Asia/Australia/Pacific Islands and Latin 
  America/Caribbean Islands regions)

* Two members of the Council of the Generic Names Supporting 
  Organization (GNSO)

* One member of the Council of the Country-Code Names Supporting 
  Organization (ccNSO)

More information about the positions is available at:

http://nomcom.icann.org/positions-2013.htm


Ole J. Jacobsen (2013 ICANN nomcom member)



Re: [spfbis] [dnsext] Obsoleting SPF RRTYPE

2013-04-30 Thread Sam Hartman
I think I understand this issue well enough to comment and so I will.

1) I totally believe it is reasonable to consider operational challenges
when designing protocols. Just upgrade your infrastructure, just use
another registrar, just upgrade the infrastructure of the people you
communicate with, are not generally reasonable advice to give people;
ingoring these concerns tend to lead to things that cannot be deployed.

2) I think it's fine to come up with a solution that   is harder to
implement because it is easier to deploy given the sorts of concerns in
1.

3) having reviewed the DNS arguments, I generally would recommend txt
records with distinct owner names over new RR types for most
protocols. I understand there are residual issues with that approach.

4) Using txt RRs the way SPF does--where the owner name is shared
potentially with other applications is kind of unfortunate.  I don't
know it's unfortunate enough to push for the SPF RR. But the issues
people have brought up with regard to updates and RR order are very
real.
But so are the operational issues with SPF.

So my personal opinion is that this is a valid discussion to be having
even if we're having it again in IETF LC.  However, to be successful we
need to get new participants and to ad more respect for arguments to the
discussion.


Re: [spfbis] [dnsext] Obsoleting SPF RRTYPE

2013-04-30 Thread Mark Andrews

In message 517ff144.5040...@tana.it, Alessandro Vesely writes:
 On Tue 30/Apr/2013 01:07:42 +0200 Mark Andrews wrote:
  
  The really annoying thing is that SPF is techically superior
  to TXT is lots of ways.
  
  1. It uniquely identifies the roll of the record.
  
  2. As SPF records are singletons you don't need to identify
 and remove the old record when updating.  You can just
 remove all SPF record and add the replacement.
  
 For TXT you need to lookup the existing RRset, extract
 the v=spf1 record from it.  You then need to create a
 UPDATE message to delete just that record as well as add
 the new TXT record.   You then have to hope that no one
 else is performing a simultanious update as you may get
 two TXT v=spf1 records in the RRset.
 
 That's true, except that one has TXT records anyway.

nsupdate
update del example.com SPF
update add example.com 3600 SPF v=spf1 
send

txt=`dig +short example.com TXT | \
sed -n -e '/^v=spf1 /s/^/update del example.com TXT /p' \
   -e '/^v=spf1$/^/update del example.com TXT /p'`
nsupdate  EOF
$txt
update add example.com 3600 TXT v=spf1 
send
EOF

But that doesn't work for 'example.com TXT v = s p f 1'
which is a perfectly legal SPF record.

sed -n -e '/^v=spf1 /s/^/update del example.com TXT /p' \
   -e '/^v =spf1 /s/^/update del example.com TXT /p' \
   -e '/^v = spf1 /s/^/update del example.com TXT /p' \
   -e '/^v = s pf1 /s/^/update del example.com TXT /p' \
   -e '/^v = s p f1 /s/^/update del example.com TXT /p' \
   -e '/^v = s p f 1 /s/^/update del example.com TXT /p' 
\
   -e '/^v = s p f 1  /s/^/update del example.com TXT 
/p' \
   -e '/^v=spf1$/^/update del example.com TXT /p'`

And keep going because the delete needs the rdata to be a
perfect match to identify the record to be removed.

I'm sure I could come up with a more compact way of identifying
a spf record but it wouldn't be needed if people published type
SPF.

  The complains about using SPF is that there are broken
p firewalls and some servers drop queries for it, some registars
  don't support it.
 
 Nits, as explained below.  The basic fact that killed the SPF type is
 the ability to use TXT as a replacement.  There must be an analogous
 of Gresham's law:  Bad types drive out good ones.
 
  For firewalls, fix/replace the firewall if you intend to
  deploy SPF and it doesn't support it.  It is total !@##@#
  that firewall are incapable of handling new DNS record
  types.  New records we exected to occur from the very
  beginning and have been coming out regularly ever since the
  DNS was invented.  Firewall vendors that are incapable of
  handling new DNS types are incompetent and do not deserve
  repeat business.
  
  For servers than drop SPF queries they really are at the
  noise level.  When you identify one you complain to the
  owners of it.  Yes, that does work.  We needed to do that
  for  records.
  
  For registrars, change registrar to one that does.
 
 While it's too late for SPF, we can learn this lesson.
-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742 INTERNET: ma...@isc.org


Re: [spfbis] [dnsext] Obsoleting SPF RRTYPE

2013-04-30 Thread Mark Andrews

In message 517ffb33.30...@dougbarton.us, Doug Barton writes:
 On 04/30/2013 09:28 AM, Alessandro Vesely wrote:
  While it's too late for SPF, we can learn this lesson.
 
 As has been repeatedly pointed out in the discussion on both dnsext and 
 spfbis, it is NOT too late for SPF. The way forward is simple:
 
 1. Publish the bis draft which says for senders to publish both SPF and 
 TXT versions, and receivers to query first for the SPF RRtype.
 
 2. Update the HOW-TO docs to reflect this change.
 
 3. Update the software to query SPF first (Note, Perl's NET::SPF, used 
 by SpamAssassin, already made this change).

As has libspf2.

 4. Let time pass.
 
 5. When the next version of the SPF protocol (v=spf{1}) comes out make 
 it SPF/99 only.
 
 The discussion about this on the spfbis list all revolved around the 
 fact that TXT is widespread, SPF/99 is rarely used, so let's just stick 
 with TXT. In a pre-3597 world there _were_ problems with querying for 
 SPF first, so the fact that historically querying for SPF/99 first was 
 painful is a valid data point. However the problems encountered in the 
 early days of SPF deployment with servers not handing unknown types 
 gracefully haven't been relevant for many years now. Yet, the SPF 
 community has continued to push TXT only, in spite of the advice of 
 4408. Almost like a self-fulfilling prophecy ...
 
 The reasons brought forward by participants in the spfbis group to not 
 make this change all revolve around the fact that it would involve 
 additional work. Personally I don't find those arguments compelling. 
 First, some of the arguments about the extra work are just plain silly 
 (ala, cut and paste of the same data for 2 RRtypes is too difficult). 
 Second, there are not that many implementations that query SPF, and the 
 change is not difficult. Third, most of the work to be done is to wait 
 for time to pass and for people to upgrade to the new versions of 
 software. This is a bog-simple long tail problem that we deal with in 
 the DNS world all the time.
 
 There was one objection that made some sense, which is that right now, 
 because the SPF world has steadfastly distributed the advice to use TXT 
 only, querying for SPF/99 first gives you what is likely to be 1 
 spurious DNS lookup per e-mail message. The obvious answer to that is to 
 do a better job of encouraging folks to publish SPF records. Meanwhile, 
 I have a fairly traditional mail server implementation that does a 
 variety of anti-spam checks. By rough count it generates about 8 DNS 
 queries for every message already. Generating 1 more is in the noise 
 in the short term, and as shown above goes away in the long term.
 
 Not only is this a case where doing the right thing is good for SPF, the 
 SPF example of let's just go with TXT because using a new RRtype is 
 hard has spread like wildfire, especially in the mail authentication 
 world (DKIM, DMARC, etc.). The slippery slope has been well-greased at 
 this point, and it would be nice to move things back in the right 
 direction (see 5507 for example).
 
 To be fair, there was one other objection raised, which is that DNS 
 provisioning systems haven't caught up with the need for new RRtypes. So 
 some can't go to their registrar's/web hoster's/etc. web interface and 
 enter a proper SPF record. That's a problem, sure. But it's a problem 
 that has to be solved, assuming we're actually going to take the advice 
 in 5507 seriously. Personally I'm not willing to allow all progress 
 forward in DNS to be stymied by those unwilling to make an investment in 
 their own infrastructure.
 
 In case Dave is still wondering what all the fuss is about, and because 
 the folks in spfbis seem completely unwilling to deal with this issue in 
 the group, consider this my first draft of an IETF last call objection 
 to the fact that 4408bis wants to deprecate use of the SPF RRtype.
 
 Doug
 
-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742 INTERNET: ma...@isc.org


Re: [spfbis] [dnsext] Obsoleting SPF RRTYPE

2013-04-30 Thread Scott Kitterman
On Wednesday, May 01, 2013 07:54:46 AM Mark Andrews wrote:
 In message 51802793.3010...@dcrocker.net, Dave Crocker writes:
  On 4/30/2013 12:54 PM, David Conrad wrote:
   On Apr 30, 2013, at 11:12 AM, Dave Crocker d...@dcrocker.net wrote:
   What is the IETF-approved timeframe in which the market is allowed
   to a
  
  ccept/reject a particular technology?
  
   I've no idea what the lower limit is or should be, but I'm quite sure
   that
 
   7 years exceeds it by a very comfortable margin.
 
   By that logic we should abandon IPv6, DNSSEC, EDNS0, etc.
 
  
  
 
  Gosh, David.  I guess you win.
 
 When just about none of the documentation mentions the SPF record type
 nor has examples with both SPF and TXT records it isn't the market
 choosing.  You can't choose of you really havn't been informed.

I've run what I believe to be the most popular online SPF record validator 
since 2005.  You'll find it frequently linked to by other parties:

http://kitterman.com/spf/validate.html

The published SPF record validation part of the tool checks both for records 
of type TXT and of type SPF and mentions the absence of the type SPF record.  
It has done this since I first published the validator (in 2005 I believe, it 
may have been 2006).

So it has been both supported and mentioned.  The only real documentation, RFC 
4408, mentions it effectively enough that some people were fooled into 
believing that publishing type SPF only would be a good idea, fortunately only 
a few were confused by the official documentation.

Scott K


Re: [spfbis] [dnsext] Obsoleting SPF RRTYPE

2013-04-30 Thread Scott Kitterman
On Wednesday, May 01, 2013 11:16:48 AM Mark Andrews wrote:
  3. Update the software to query SPF first (Note, Perl's NET::SPF, used 
  by SpamAssassin, already made this change).

Actually it's Mail::SPF and as we already discussed on the spfbis list this 
design choice caused operational problems and in some cases applications that 
use Mail::SPF have disabled type SPF queries as a result.

One perl module designer being overly theoretically correct doesn't really add 
much to your overly theoretical argument.

So far, compared to the discussion we had in the working group at the time, 
there isn't any new information to evaluate.

Scott K


Re: [spfbis] [dnsext] Obsoleting SPF RRTYPE

2013-04-30 Thread Murray S. Kucherawy
On Tue, Apr 30, 2013 at 12:52 PM, David Conrad d...@virtualized.org wrote:

 SPF using TXT and hence, SPFBIS forces the uniquification of the DNS
 response into the application instead of in the DNS library. Given the
 ordering of individual TXT RRs within an RRset is not guaranteed, I suspect
 the chances that every application is going to do that parsing correctly is
 relatively low (btw, the example in 3.3 in spfbis-14 is a bit misleading:
 assuming second string is in a separate TXT RR (which is implied), the
 concatenation might be second stringv=spf1 . first).  The more
 interesting bit is if/when another protocol uses TXT at the same ownername.


Yes, I understand all of that, and I've written code to deal with it.  It's
not rocket science.


 The RR has been allocated and it is supported in most DNS servers and
 resolver libraries in one form or another.  Provisioning systems take much
 longer, but that isn't surprising and shouldn't be an argument to deprecate
 (if it is, we might as well close the RRtype registry for new entries).


We're not only talking about provisioning systems here.  We're also talking
about interference with queries and replies at the DNS protocol level.  The
survey work done for RFC6686 showed that something on the order of
thousands of domains in the sample set suffered from this.  It is a very
real issue for a deployed protocol.


 In the past, the IETF used to make decisions based on long-term
 technical/architectural correctness, even in the face of pragmatic
 complications (e.g., the choice to mandate strong crypto despite real world
 challenges some companies faced in exporting that crypto in products). In
 this particular case, there seems to be an argument to explicitly disallow
 the long-term technically/architecturally correct approach because some
 folks choose not to add an RR to their zone files or support that RR in
 their provisioning systems.  As I said in DNSEXT, this seems like the wrong
 approach to me.


All things being equal, I would agree with you.  And if SPF were starting
anew today, I suspect I might have a different opinion.  The question,
then, is the weight of the mitigating circumstances, which obviously the
two communities evaluate quite differently.

-MSK


Call for Technical Plenary Topics

2013-04-30 Thread IAB Chair
The plenary topic for IETF 86, The End of POTS, was proposed by an IETF 
participant.  That plenary topic was well received.  As the IAB prepares for 
IETF 87, we want to reach out to the IETF community for technical plenary 
topics.  Please send suggestions to iab at iab.org.

The IAB is interested in hearing suggestions that could be presented by invited 
speakers, panels, or lightning talks.  In other words, please do not let the 
format of past plenary presentations narrow your suggestions.

Thank you,
 Russ Housley
 IAB Chair



Appointment of Deborah Brungard as new IETF Liaison Manager to the ITU-T for MPLS

2013-04-30 Thread IAB Chair
The IAB has just notified the ITU-T that Deborah Brungard will be the new IETF 
Liaison Manager to the ITU-T for MPLS. Deborah was appointed following an open 
call for volunteers (see email from Scott Mansfield to the IETF list on Fri 
3/29/2013 4:32 PM EDT). Please congratulate Deborah when you see her. 

Please thank Scott Mansfield for his past service in this role.  Scott is now 
the overall liaison manager to ITU-T, and as such I am confident that he will 
provide valuable support for Deborah.

Thanks,
Russ



 From: IAB Chair iab-ch...@iab.org
 Date: April 30, 2013 1:35:53 PM EDT
 To: tsbs...@itu.int, ITU-T TSAG tsbt...@itu.int
 Cc: ITU TSBDir tsb...@itu.int, IAB i...@iab.org, IESG i...@ietf.org, 
 IETF Liaison Statements stateme...@ietf.org
 Subject: Appointment of Deborah Brungard as new IETF Liaison Manager to the 
 ITU-T for MPLS
 
 
 The IAB would like to bring to the ITU-T's attention the appointment of Ms 
 Deborah Brungard as the new IETF Liaison Manager to the ITU-T for MPLS.
 
 The IETF-ITU-T MPLS liaison role helps facilitate communication between the 
 IETF and the ITU-T on matters of MPLS.  The MPLS liaison manager is 
 responsible for ensuring the liaisons from the IETF on MPLS are routed to the 
 correct study group(s) in the ITU-T and any incoming liaison from the ITU-T 
 on MPLS is communicated to the proper working groups, usually MPLS, CCAMP, 
 and PWE3 working groups.
 
 Deborah Brungard has been with ATT for more than 28 years with experience in 
 network and service management. She is a Lead Member of Technical Staff in 
 ATT's Network Technologies Unit. She is IETF Routing Area's CCAMP Co-Chair, 
 she has co-chaired CCAMP for more than 6 years. CCAMP (Common Control and 
 Measurement Plane) is responsible for GMPLS and works cooperatively with 
 MPLS, L2VPN, PWE3, OSPF, PCE, IDR, and ISIS. She is also the Routing Area 
 Directorate Coordinator and Routing Area Secretary. Deborah has actively 
 contributed in SG15 for more than 15 years, including as an Editor (in the 
 early 2000's). She is very familiar with the ITU-T process, she was Chair of 
 ANSI (American National Standards) T1X1.5 (Optical Standards) for several 
 years in the early 2000's.
 
 For the IAB,
 Russ Housley
 IAB Chair
 



RFC 6930 on RADIUS Attribute for IPv6 Rapid Deployment on IPv4 Infrastructures (6rd)

2013-04-30 Thread rfc-editor
A new Request for Comments is now available in online RFC libraries.


RFC 6930

Title:  RADIUS Attribute for IPv6 Rapid 
Deployment on IPv4 Infrastructures (6rd) 
Author: D. Guo, 
S. Jiang,
Ed., R. Despres,
  R. Maglione
Status: Standards Track
Stream: IETF
Date:   April 2013
Mailbox:guo...@huawei.com, 
jiangsh...@huawei.com, 
despres.r...@laposte.net,  rob...@cisco.com
Pages:  12
Characters: 23573
Updates/Obsoletes/SeeAlso:   None

I-D Tag:draft-ietf-softwire-6rd-radius-attrib-11.txt

URL:http://www.rfc-editor.org/rfc/rfc6930.txt

The IPv6 Rapid Deployment on IPv4 Infrastructures (6rd) provides both IPv4 and
IPv6 connectivity services simultaneously during the IPv4/IPv6 coexistence
period.  The Dynamic Host Configuration Protocol (DHCP) 6rd option has been
defined to configure the 6rd Customer Edge (CE).  However, in many
networks, the configuration information may be stored in
the Authentication Authorization and Accounting (AAA) servers, while user
configuration is mainly acquired from a Broadband Network Gateway
(BNG) through the DHCP protocol.  This document defines a Remote
Authentication Dial-In User Service (RADIUS) attribute that carries
6rd configuration information from the AAA server to BNGs.

This document is a product of the Softwires Working Group of the IETF.

This is now a Proposed Standard.

STANDARDS TRACK: This document specifies an Internet standards track
protocol for the Internet community,and requests discussion and suggestions
for improvements.  Please refer to the current edition of the Internet
Official Protocol Standards (STD 1) for the standardization state and
status of this protocol.  Distribution of this memo is unlimited.

This announcement is sent to the IETF-Announce and rfc-dist lists.
To subscribe or unsubscribe, see
  http://www.ietf.org/mailman/listinfo/ietf-announce
  http://mailman.rfc-editor.org/mailman/listinfo/rfc-dist

For searching the RFC series, see http://www.rfc-editor.org/rfcsearch.html.
For downloading RFCs, see http://www.rfc-editor.org/rfc.html.

Requests for special distribution should be addressed to either the
author of the RFC in question, or to rfc-edi...@rfc-editor.org.  Unless
specifically noted otherwise on the RFC itself, all RFCs are for
unlimited distribution.


The RFC Editor Team
Association Management Solutions, LLC




RFC 6929 on Remote Authentication Dial In User Service (RADIUS) Protocol Extensions

2013-04-30 Thread rfc-editor
A new Request for Comments is now available in online RFC libraries.


RFC 6929

Title:  Remote Authentication Dial In User 
Service (RADIUS) Protocol Extensions 
Author: A. DeKok, A. Lior
Status: Standards Track
Stream: IETF
Date:   April 2013
Mailbox:al...@networkradius.com, 
avi.i...@lior.org
Pages:  68
Characters: 133099
Updates:RFC 2865, RFC 3575, RFC 6158

I-D Tag:draft-ietf-radext-radius-extensions-13.txt

URL:http://www.rfc-editor.org/rfc/rfc6929.txt

The Remote Authentication Dial-In User Service (RADIUS) protocol is
nearing exhaustion of its current 8-bit Attribute Type space.  In
addition, experience shows a growing need for complex grouping, along
with attributes that can carry more than 253 octets of data.  This
document defines changes to RADIUS that address all of the above
problems.

This document is a product of the RADIUS EXTensions Working Group of the IETF.

This is now a Proposed Standard.

STANDARDS TRACK: This document specifies an Internet standards track
protocol for the Internet community,and requests discussion and suggestions
for improvements.  Please refer to the current edition of the Internet
Official Protocol Standards (STD 1) for the standardization state and
status of this protocol.  Distribution of this memo is unlimited.

This announcement is sent to the IETF-Announce and rfc-dist lists.
To subscribe or unsubscribe, see
  http://www.ietf.org/mailman/listinfo/ietf-announce
  http://mailman.rfc-editor.org/mailman/listinfo/rfc-dist

For searching the RFC series, see http://www.rfc-editor.org/rfcsearch.html.
For downloading RFCs, see http://www.rfc-editor.org/rfc.html.

Requests for special distribution should be addressed to either the
author of the RFC in question, or to rfc-edi...@rfc-editor.org.  Unless
specifically noted otherwise on the RFC itself, all RFCs are for
unlimited distribution.


The RFC Editor Team
Association Management Solutions, LLC




RFC 6930 on RADIUS Attribute for IPv6 Rapid Deployment on IPv4 Infrastructures (6rd)

2013-04-30 Thread rfc-editor
A new Request for Comments is now available in online RFC libraries.


RFC 6930

Title:  RADIUS Attribute for IPv6 Rapid 
Deployment on IPv4 Infrastructures (6rd) 
Author: D. Guo, 
S. Jiang, Ed., 
R. Despres,
R. Maglione
Status: Standards Track
Stream: IETF
Date:   April 2013
Mailbox:guo...@huawei.com, 
jiangsh...@huawei.com, 
despres.r...@laposte.net,
rob...@cisco.com
Pages:  12
Characters: 23573
Updates/Obsoletes/SeeAlso:   None

I-D Tag:draft-ietf-softwire-6rd-radius-attrib-11.txt

URL:http://www.rfc-editor.org/rfc/rfc6930.txt

The IPv6 Rapid Deployment on IPv4 Infrastructures (6rd) provides both IPv4 
and IPv6 connectivity services simultaneously during the IPv4/IPv6 
coexistence period.  The Dynamic Host Configuration Protocol (DHCP) 6rd 
option has been defined to configure the 6rd Customer Edge (CE).  However, 
in many networks, the configuration information may be stored in
the Authentication Authorization and Accounting (AAA) servers, while user
configuration is mainly acquired from a Broadband Network Gateway
(BNG) through the DHCP protocol.  This document defines a Remote
Authentication Dial-In User Service (RADIUS) attribute that carries
6rd configuration information from the AAA server to BNGs.

This document is a product of the Softwires Working Group of the IETF.

This is now a Proposed Standard.

STANDARDS TRACK: This document specifies an Internet standards track
protocol for the Internet community,and requests discussion and suggestions
for improvements.  Please refer to the current edition of the Internet
Official Protocol Standards (STD 1) for the standardization state and
status of this protocol.  Distribution of this memo is unlimited.

This announcement is sent to the IETF-Announce and rfc-dist lists.
To subscribe or unsubscribe, see
  http://www.ietf.org/mailman/listinfo/ietf-announce
  http://mailman.rfc-editor.org/mailman/listinfo/rfc-dist

For searching the RFC series, see http://www.rfc-editor.org/rfcsearch.html.
For downloading RFCs, see http://www.rfc-editor.org/rfc.html.

Requests for special distribution should be addressed to either the
author of the RFC in question, or to rfc-edi...@rfc-editor.org.  Unless
specifically noted otherwise on the RFC itself, all RFCs are for
unlimited distribution.


The RFC Editor Team
Association Management Solutions, LLC




RFC 6935 on IPv6 and UDP Checksums for Tunneled Packets

2013-04-30 Thread rfc-editor
A new Request for Comments is now available in online RFC libraries.


RFC 6935

Title:  IPv6 and UDP Checksums for 
Tunneled Packets 
Author: M. Eubanks, P. Chimento,
M. Westerlund
Status: Standards Track
Stream: IETF
Date:   April 2013
Mailbox:marshall.euba...@gmail.com, 
philip.chime...@jhuapl.edu, 
magnus.westerl...@ericsson.com
Pages:  12
Characters: 29055
Updates:RFC2460

I-D Tag:draft-ietf-6man-udpchecksums-08.txt

URL:http://www.rfc-editor.org/rfc/rfc6935.txt

This document updates the IPv6 specification (RFC 2460) to improve
performance when a tunnel protocol uses UDP with IPv6 to tunnel
packets.  The performance improvement is obtained by relaxing the
IPv6 UDP checksum requirement for tunnel protocols whose header
information is protected on the inner packet being carried.
Relaxing this requirement removes the overhead associated with the
computation of UDP checksums on IPv6 packets that carry the tunnel
protocol packets.  This specification describes how the IPv6 UDP
checksum requirement can be relaxed when the encapsulated packet
itself contains a checksum.  It also describes the limitations and
risks of this approach and discusses the restrictions on the use of
this method.

This document is a product of the IPv6 Maintenance Working Group of the IETF.

This is now a Proposed Standard.

STANDARDS TRACK: This document specifies an Internet standards track
protocol for the Internet community,and requests discussion and suggestions
for improvements.  Please refer to the current edition of the Internet
Official Protocol Standards (STD 1) for the standardization state and
status of this protocol.  Distribution of this memo is unlimited.

This announcement is sent to the IETF-Announce and rfc-dist lists.
To subscribe or unsubscribe, see
  http://www.ietf.org/mailman/listinfo/ietf-announce
  http://mailman.rfc-editor.org/mailman/listinfo/rfc-dist

For searching the RFC series, see http://www.rfc-editor.org/rfcsearch.html.
For downloading RFCs, see http://www.rfc-editor.org/rfc.html.

Requests for special distribution should be addressed to either the
author of the RFC in question, or to rfc-edi...@rfc-editor.org.  Unless
specifically noted otherwise on the RFC itself, all RFCs are for
unlimited distribution.


The RFC Editor Team
Association Management Solutions, LLC




RFC 6936 on Applicability Statement for the Use of IPv6 UDP Datagrams with Zero Checksums

2013-04-30 Thread rfc-editor
A new Request for Comments is now available in online RFC libraries.


RFC 6936

Title:  Applicability Statement for the Use 
of IPv6 UDP Datagrams with Zero 
Checksums 
Author: G. Fairhurst, M. Westerlund
Status: Standards Track
Stream: IETF
Date:   April 2013
Mailbox:go...@erg.abdn.ac.uk, 
magnus.westerl...@ericsson.com
Pages:  40
Characters: 99557
Updates/Obsoletes/SeeAlso:   None

I-D Tag:draft-ietf-6man-udpzero-12.txt

URL:http://www.rfc-editor.org/rfc/rfc6936.txt

This document provides an applicability statement for the use of UDP
transport checksums with IPv6.  It defines recommendations and
requirements for the use of IPv6 UDP datagrams with a zero UDP
checksum.  It describes the issues and design principles that need to
be considered when UDP is used with IPv6 to support tunnel
encapsulations, and it examines the role of the IPv6 UDP transport
checksum.  The document also identifies issues and constraints for
deployment on network paths that include middleboxes.  An appendix
presents a summary of the trade-offs that were considered in
evaluating the safety of the update to RFC 2460 that changes the use
of the UDP checksum with IPv6.

This document is a product of the IPv6 Maintenance Working Group of the IETF.

This is now a Proposed Standard.

STANDARDS TRACK: This document specifies an Internet standards track
protocol for the Internet community,and requests discussion and suggestions
for improvements.  Please refer to the current edition of the Internet
Official Protocol Standards (STD 1) for the standardization state and
status of this protocol.  Distribution of this memo is unlimited.

This announcement is sent to the IETF-Announce and rfc-dist lists.
To subscribe or unsubscribe, see
  http://www.ietf.org/mailman/listinfo/ietf-announce
  http://mailman.rfc-editor.org/mailman/listinfo/rfc-dist

For searching the RFC series, see http://www.rfc-editor.org/rfcsearch.html.
For downloading RFCs, see http://www.rfc-editor.org/rfc.html.

Requests for special distribution should be addressed to either the
author of the RFC in question, or to rfc-edi...@rfc-editor.org.  Unless
specifically noted otherwise on the RFC itself, all RFCs are for
unlimited distribution.


The RFC Editor Team
Association Management Solutions, LLC




RFC 6941 on MPLS Transport Profile (MPLS-TP) Security Framework

2013-04-30 Thread rfc-editor
A new Request for Comments is now available in online RFC libraries.


RFC 6941

Title:  MPLS Transport Profile (MPLS-TP) Security 
Framework 
Author: L. Fang, Ed.,
B. Niven-Jenkins, Ed.,
S. Mansfield, Ed.,
R. Graveman, Ed.
Status: Informational
Stream: IETF
Date:   April 2013
Mailbox:luf...@cisco.com, 
b...@niven-jenkins.co.uk, 
scott.mansfi...@ericsson.com,
r...@acm.org
Pages:  15
Characters: 27119
Updates/Obsoletes/SeeAlso:   None

I-D Tag:draft-ietf-mpls-tp-security-framework-09.txt

URL:http://www.rfc-editor.org/rfc/rfc6941.txt

This document provides a security framework for the MPLS Transport
Profile (MPLS-TP).  MPLS-TP extends MPLS
technologies and introduces new Operations, Administration, and
Maintenance (OAM) capabilities, a transport-oriented path protection
mechanism, and strong emphasis on static provisioning supported by
network management systems.  This document addresses the security
aspects relevant in the context of MPLS-TP specifically.  It describes
potential security threats as well as mitigation procedures related
to MPLS-TP networks and to MPLS-TP interconnection to other MPLS and
GMPLS networks.  This document is built on RFC 5920
(Security Framework for MPLS and GMPLS Networks) by providing
additional security considerations that are applicable to the MPLS-TP
extensions.  All the security considerations from RFC 5920 are
assumed to apply.

This document is a product of a joint Internet Engineering Task Force
(IETF) / International Telecommunication Union Telecommunication
Standardization Sector (ITU-T) effort to include an MPLS Transport
Profile within the IETF MPLS and Pseudowire Emulation Edge-to-Edge (PWE3)
architectures to support the capabilities and functionality of a
packet transport network.

This document is a product of the Multiprotocol Label Switching Working Group 
of the IETF.


INFORMATIONAL: This memo provides information for the Internet community.
It does not specify an Internet standard of any kind. Distribution of
this memo is unlimited.

This announcement is sent to the IETF-Announce and rfc-dist lists.
To subscribe or unsubscribe, see
  http://www.ietf.org/mailman/listinfo/ietf-announce
  http://mailman.rfc-editor.org/mailman/listinfo/rfc-dist

For searching the RFC series, see http://www.rfc-editor.org/rfcsearch.html.
For downloading RFCs, see http://www.rfc-editor.org/rfc.html.

Requests for special distribution should be addressed to either the
author of the RFC in question, or to rfc-edi...@rfc-editor.org.  Unless
specifically noted otherwise on the RFC itself, all RFCs are for
unlimited distribution.


The RFC Editor Team
Association Management Solutions, LLC




RFC 6944 on Applicability Statement: DNS Security (DNSSEC) DNSKEY Algorithm Implementation Status

2013-04-30 Thread rfc-editor
A new Request for Comments is now available in online RFC libraries.


RFC 6944

Title:  Applicability Statement: DNS Security (DNSSEC) 
DNSKEY Algorithm Implementation Status 
Author: S. Rose
Status: Standards Track
Stream: IETF
Date:   April 2013
Mailbox:scottr.n...@gmail.com
Pages:  7
Characters: 13876
Updates:RFC 2536, RFC 2539, RFC 3110, RFC 4034, 
RFC 4398, RFC 5155, RFC 5702, RFC 5933

I-D Tag:draft-ietf-dnsext-dnssec-algo-imp-status-04.txt

URL:http://www.rfc-editor.org/rfc/rfc6944.txt

The DNS Security Extensions (DNSSEC) requires the use of
cryptographic algorithm suites for generating digital signatures over
DNS data.  There is currently an IANA registry for these algorithms,
but there is no record of the recommended implementation status of
each algorithm.  This document provides an applicability statement on
algorithm implementation status for DNSSEC component software.  This
document lists each algorithm's status based on the current
reference.  In the case that an algorithm is specified without an
implementation status, this document assigns one.  This document
updates RFCs 2536, 2539, 3110, 4034, 4398, 5155, 5702, and 5933.

This document is a product of the DNS Extensions Working Group of the IETF.

This is now a Proposed Standard.

STANDARDS TRACK: This document specifies an Internet standards track
protocol for the Internet community,and requests discussion and suggestions
for improvements.  Please refer to the current edition of the Internet
Official Protocol Standards (STD 1) for the standardization state and
status of this protocol.  Distribution of this memo is unlimited.

This announcement is sent to the IETF-Announce and rfc-dist lists.
To subscribe or unsubscribe, see
  http://www.ietf.org/mailman/listinfo/ietf-announce
  http://mailman.rfc-editor.org/mailman/listinfo/rfc-dist

For searching the RFC series, see http://www.rfc-editor.org/rfcsearch.html.
For downloading RFCs, see http://www.rfc-editor.org/rfc.html.

Requests for special distribution should be addressed to either the
author of the RFC in question, or to rfc-edi...@rfc-editor.org.  Unless
specifically noted otherwise on the RFC itself, all RFCs are for
unlimited distribution.


The RFC Editor Team
Association Management Solutions, LLC