Re: APPSDIR review of draft-ietf-netmod-rfc6021-bis-01

2013-05-09 Thread Martin Rex
S Moonesamy wrote:
 At 01:32 30-04-2013, Juergen Schoenwaelder wrote:
 I am not sure what you think is unclear. Note that the definition of
 the typedef domain-name is unchanged from the one in RFC 6021. Perhaps
 you can make a concrete text change proposal so I better understand
 what your concern is.
 
 I read draft-ietf-netmod-rfc6021-bis-02.  In Section 4:
 
The domain-name type represents a DNS domain name.  The
 name SHOULD be fully qualified whenever possible.
 
 That sounds like a MAY.

That is a MAY.  That probably needs to be a may.

How do you recognize a fully qualified name anyway?


Today a huge number of machines simply does not have a
fully qualified domain name (and uses private address space).

My DSL router (a brand that is pretty common in Germany)
does _not_ provide a domain name via DHCP and will resolve
plain hostnames for all addresses that it hands out via DHCP.
And a lot of stuff that you attach to home networks comes
with a Web-UI (my DVB-S Set-Top Box, my HomeNAS, my DSL-router
(although the latter recognizes fritz.box as a name for itself).

-Martin


Re: APPSDIR review of draft-ietf-netmod-rfc6021-bis-01

2013-05-09 Thread Randy Bush
 MAY != SHOULD
 The text is as follows: The name SHOULD be fully qualified whenever
 possible.  If the working group would like a RFC 2119 SHOULD it
 would help if there is an explanation in the sentence for the reader
 weigh the implications of not following that.
 My knee-jerk reaction is to use MUST. Partially-qualified domain names
 are ambiguous at best.

that is a separate issue

 Similarly, wherever possible is unhelpful; if it's not possible to
 fully-qualify a domain name then ambiguity is guaranteed.

no, that is what SHOLD means.  e.g. when i write docco that has an ops
clause where there is likely a knob or other op choice, i do not think
i have the prerogative to tell the op how they MUST run their network.
but i can say that they SHOULD do x.

randy


Re: call for ideas: tail-heavy IETF process

2013-05-09 Thread Spencer Dawkins

On 5/8/2013 10:50 AM, Jari Arkko wrote:

Heather, all,


You are correct, Peter.  MISSREF and AUTH48 are not part of the RFC
Editor timed states, and the RFC Editor timed states have been largely
under 7 weeks for the last year.


Indeed. The actual time for what RFC Editor does for documents is quite short 
(and thank you and others at the RFC Editor side for that!).

My stats counted both MISSREF and AUTH48, I think.


I remember that when this was previously discussed (mid-2000s), we noted 
that the states didn't map 1:1 with who had to actually do something. 
Sounds like this is still true.


So in this case, we're looking at RFC Editor state = Heather, please 
do something + some working group, please do something + author(s), 
please do something, and we can't tell how much time to attribute to 
each of these ...


Spencer



Re: APPSDIR review of draft-ietf-netmod-rfc6021-bis-01

2013-05-09 Thread John C Klensin


--On Thursday, May 09, 2013 09:28 +0200 Randy Bush
ra...@psg.com wrote:

 Similarly, wherever possible is unhelpful; if it's not
 possible to fully-qualify a domain name then ambiguity is
 guaranteed.
 
 no, that is what SHOLD means.  e.g. when i write docco that
 has an ops clause where there is likely a knob or other op
 choice, i do not think i have the prerogative to tell the op
 how they MUST run their network. but i can say that they
 SHOULD do x.

If you are writing a protocol spec and you believe various bad
things can happen to you if partially-qualified names are used,
sure you do.  Whether your belief about possible damage and its
likelihood is reasonable is another question and that, IMO, is
the discussion we should be having.

Now that op has prerogatives too.   Because conformance to IETF
Standards is voluntary, it can ignore the MUST, leaving you the
option of calling the protocol police and/or deciding not to
deal with that op.  Or it could decide to not deal with you
because you make such unreasonable demands.  But neither of
those options deprive you, or the IETF, from saying MUST if
you are convinced it is necessary.  IMO, necessary should
include interoperability, security, or stable and predictable
operational reasons, despite 2119's apparent restriction to the
first of those.

best,
   john





Re: call for ideas: tail-heavy IETF process

2013-05-09 Thread John C Klensin


--On Thursday, May 09, 2013 03:32 -0500 Spencer Dawkins
spen...@wonderhamster.org wrote:

 So in this case, we're looking at RFC Editor state =
 Heather, please do something + some working group, please
 do something + author(s), please do something, and we can't
 tell how much time to attribute to each of these ...

You could further add to that list RFC Production Center,
please do something (different from an RSE wait, which is, or
at least ought to be, more significant) and IESG or appropriate
AD, please do something, which does happen.

But the RFC Editor's numbers try (almost always successfully) to
separate the two waiting on the RFC Editor Function to do
something (Heather plus Production Center plus, in principle,
Publisher) from the other states.  Those other states could,
from their point of view, be aggregated into stuck, someone
else's problem.   If we are looking for issues with IETF
end-game process, we need to parse those, but that is a
different sort of question in terms of data-gathering and
reporting.

best,
   john





Re: call for ideas: tail-heavy IETF process

2013-05-09 Thread Brian E Carpenter
On 10/05/2013 01:13, John C Klensin wrote:
 
 --On Thursday, May 09, 2013 03:32 -0500 Spencer Dawkins
 spen...@wonderhamster.org wrote:
 
 So in this case, we're looking at RFC Editor state =
 Heather, please do something + some working group, please
 do something + author(s), please do something, and we can't
 tell how much time to attribute to each of these ...
 
 You could further add to that list RFC Production Center,
 please do something (different from an RSE wait, which is, or
 at least ought to be, more significant) and IESG or appropriate
 AD, please do something, which does happen.
 
 But the RFC Editor's numbers try (almost always successfully) to
 separate the two waiting on the RFC Editor Function to do
 something (Heather plus Production Center plus, in principle,
 Publisher) from the other states.  Those other states could,
 from their point of view, be aggregated into stuck, someone
 else's problem.   If we are looking for issues with IETF
 end-game process, we need to parse those, but that is a
 different sort of question in terms of data-gathering and
 reporting.

All of which suggests that, ideally, the tracker would include
a variable onTheHook for each draft, containing at all times
the person or role responsible for the next step. That isn't
necessarily implied by the state machine. For example,
AUTH48 doesn't always imply that the author is on the hook -
it may be that the author has asked the WG Chair to ask the
WG for a quick review of a proposed last-minute change. At
that point, the WG as a whole is on the hook.

Brian


Update of draft-otis-ipv6-email-authent

2013-05-09 Thread Douglas Otis
Dear ietf, spfbis, and repute,

Until an identifier is linked with the source of an exchange by way of 
authentication, it must not be trusted as offering valid reputation input. For 
example, a valid DKIM signature lacks important context.  A valid DKIM 
signature does not depend upon actual sources or intended recipients, both of 
which are essential elements in determining unsolicited messages or even 
whether the message is valid.  SPF only offers authorization of Non-Delivery 
Notifications, and can not be considered to represent actual sources.

Three different authors attempted to repair DKIM's header field issue within 
the WG process but repairs were rejected.  As with the DKIM WG, being right 
about likely outcomes will not always prevail in offering safe and dependable 
protocols offering a well understood services.

The initial intent for DKIM was to help prevent spoofing, but that effort ran 
astray with desires to extend DKIM beyond its capabilities.  Flexibility 
allowing DKIM to be relayed removes typical rate limitations protecting a 
domain's reputation from occasional lapses or from messages easily taken out of 
context.

Since a valid DKIM signature may not preclude prepended header fields, this 
raises important questions.  When such spoofing does occur, which domain's 
reputation should be affected?  A domain too big to block that does not add the 
non-existent header field hack? A domain being spoofed to improve statistical 
filtering?  It is clear those actually responsible for abusive exchange may be 
ignored by these strategies.

Better solutions at enforcing security and offering fair reputations are 
readily available.

http://tools.ietf.org/html/draft-otis-ipv6-email-authent-01

DKIM can not be used to establish reputation without a link with those 
responsible for its transmission.  Neither DKIM nor SPF established those 
actually responsible for the exchange.  Today, unfortunately, the only thing 
that can be trusted in email is the ip address of the host connecting to the 
mail server - and even that can be subverted with BGP injection.

Regards,
Douglas Otis

Weekly posting summary for ietf@ietf.org

2013-05-09 Thread Thomas Narten
Total of 138 messages in the last 7 days.
 
script run at: Fri May 10 00:53:02 EDT 2013
 
Messages   |  Bytes| Who
+--++--+
  7.25% |   10 |  8.90% |93387 | ma...@isc.org
  6.52% |9 |  7.85% |82311 | nar...@us.ibm.com
  7.25% |   10 |  6.58% |69033 | john-i...@jck.com
  4.35% |6 |  4.92% |51589 | sc...@kitterman.com
  4.35% |6 |  3.90% |40851 | hannes.tschofe...@gmx.net
  4.35% |6 |  3.70% |38841 | sm+i...@elandsys.com
  3.62% |5 |  3.33% |34916 | brian.e.carpen...@gmail.com
  2.90% |4 |  3.30% |34585 | doug.mtv...@gmail.com
  2.90% |4 |  3.27% |34333 | alh-i...@tndh.net
  2.90% |4 |  3.06% |32061 | bcla...@cisco.com
  2.90% |4 |  3.05% |31953 | daedu...@btconnect.com
  2.90% |4 |  2.61% |27392 | ned+i...@mauve.mrochek.com
  2.17% |3 |  2.15% |22521 | do...@dougbarton.us
  2.17% |3 |  1.80% |18858 | joe...@bogus.com
  2.17% |3 |  1.63% |17072 | wor...@ariadne.com
  2.17% |3 |  1.43% |14970 | ra...@psg.com
  1.45% |2 |  1.97% |20627 | rdroms.i...@gmail.com
  1.45% |2 |  1.48% |15501 | presn...@qti.qualcomm.com
  1.45% |2 |  1.46% |15269 | hsan...@isdg.net
  1.45% |2 |  1.43% |15015 | s...@resistor.net
  1.45% |2 |  1.30% |13638 | s...@internet2.edu
  1.45% |2 |  1.28% |13407 | ted.le...@nominum.com
  1.45% |2 |  1.25% |13073 | elw...@dial.pipex.com
  1.45% |2 |  1.19% |12444 | jari.ar...@piuha.net
  1.45% |2 |  1.16% |12116 | derhoe...@gmx.net
  1.45% |2 |  1.15% |12093 | j...@jlc.net
  1.45% |2 |  1.06% |11096 | adr...@olddog.co.uk
  1.45% |2 |  1.05% |11035 | m...@sap.com
  1.45% |2 |  1.04% |10900 | pe...@akayla.com
  0.72% |1 |  1.61% |16854 | o...@nlnetlabs.nl
  0.72% |1 |  1.58% |16521 | rjspa...@nostrum.com
  0.72% |1 |  1.41% |14746 | mohamed.boucad...@orange.com
  0.72% |1 |  1.02% |10730 | l.w...@surrey.ac.uk
  0.72% |1 |  0.94% | 9817 | war...@kumari.net
  0.72% |1 |  0.92% | 9697 | c...@daydream.com
  0.72% |1 |  0.87% | 9082 | y...@checkpoint.com
  0.72% |1 |  0.82% | 8628 | t...@ecs.soton.ac.uk
  0.72% |1 |  0.79% | 8334 | gonzalo.camari...@ericsson.com
  0.72% |1 |  0.78% | 8214 | a...@yumaworks.com
  0.72% |1 |  0.73% | 7621 | jouni.nos...@gmail.com
  0.72% |1 |  0.69% | 7232 | randy_pres...@mindspring.com
  0.72% |1 |  0.68% | 7184 | r...@rfc-editor.org
  0.72% |1 |  0.68% | 7109 | superu...@gmail.com
  0.72% |1 |  0.67% | 6977 | mcqui...@pobox.com
  0.72% |1 |  0.63% | 6643 | yaronf.i...@gmail.com
  0.72% |1 |  0.62% | 6543 | mcr+i...@sandelman.ca
  0.72% |1 |  0.62% | 6505 | barryle...@computer.org
  0.72% |1 |  0.62% | 6475 | jab...@hopcount.ca
  0.72% |1 |  0.60% | 6336 | stpe...@stpeter.im
  0.72% |1 |  0.58% | 6130 | d...@dcrocker.net
  0.72% |1 |  0.58% | 6070 | spen...@wonderhamster.org
  0.72% |1 |  0.57% | 5934 | rpellet...@isoc.org
  0.72% |1 |  0.55% | 5817 | c...@tzi.org
  0.72% |1 |  0.55% | 5765 | jo...@taugh.com
  0.72% |1 |  0.55% | 5731 | mansa...@besserwisser.org
  0.72% |1 |  0.53% | 5607 | stephen.farr...@cs.tcd.ie
  0.72% |1 |  0.53% | 5583 | env...@rolamasao.org
+--++--+
100.00% |  138 |100.00% |  1048772 | Total



MMUSIC Working Group Virtual Interim Meeting, May 23, 2013

2013-05-09 Thread IESG Secretary
Greetings

This is to announce a virtual interim meeting for the MMUSIC Working
Group to take place on Thursday, May 23rd, from 7:00 am - 10:00 am
Pacific Time. The goal of this meeting is to come to a resolution on the
so-called Plan A or Plan B approach related to SDP signaling needed
by RTCWeb, CLUE, etc. (i.e. do we have potentially lots of m= lines
or very few m= lines and to what extent is there sub-negotation and
signaling at the SSRC level).

A more detailed agenda and logistics will be sent out separately. For
now, people should take a close look at the following two drafts:

http://www.ietf.org/id/draft-roach-rtcweb-plan-a-00.txt

http://www.ietf.org/internet-drafts/draft-uberti-rtcweb-plan-00.txt

You may also want to look at
http://www.ietf.org/id/draft-roach-rtcweb-glareless-add-00.txt


Thanks

-- Ari  Flemming (MMUSIC co-chairs)


PS: We are currently also considering having a physical interim meeting
the week of June 24th, likely on the US West Coast. We will await the
outcome of the virtual interim meeting before making a decision on this
but wanted to give people a heads-up for now.


RFC 6923 on MPLS Transport Profile (MPLS-TP) Identifiers Following ITU-T Conventions

2013-05-09 Thread rfc-editor
A new Request for Comments is now available in online RFC libraries.


RFC 6923

Title:  MPLS Transport Profile (MPLS-TP) Identifiers 
Following ITU-T Conventions 
Author: R. Winter, E. Gray,
H. van Helvoort, M. Betts
Status: Standards Track
Stream: IETF
Date:   May 2013
Mailbox:rolf.win...@neclab.eu, 
eric.g...@ericsson.com, 
huub.van.helvo...@huawei.com,
malcolm.be...@zte.com.cn
Pages:  12
Characters: 23811
Updates/Obsoletes/SeeAlso:   None

I-D Tag:draft-ietf-mpls-tp-itu-t-identifiers-08.txt

URL:http://www.rfc-editor.org/rfc/rfc6923.txt

This document specifies an extension to the identifiers to be used in
the Transport Profile of Multiprotocol Label Switching (MPLS-TP).
Identifiers that follow IP/MPLS conventions have already been
defined.  This memo augments that set of identifiers for MPLS-TP
management and Operations, Administration, and Maintenance (OAM)
functions to include identifier information in a format typically
used by the International Telecommunication Union Telecommunication
Standardization Sector (ITU-T).

This document is a product of the Multiprotocol Label Switching Working Group 
of the IETF.

This is now a Proposed Standard.

STANDARDS TRACK: This document specifies an Internet standards track
protocol for the Internet community,and requests discussion and suggestions
for improvements.  Please refer to the current edition of the Internet
Official Protocol Standards (STD 1) for the standardization state and
status of this protocol.  Distribution of this memo is unlimited.

This announcement is sent to the IETF-Announce and rfc-dist lists.
To subscribe or unsubscribe, see
  http://www.ietf.org/mailman/listinfo/ietf-announce
  http://mailman.rfc-editor.org/mailman/listinfo/rfc-dist

For searching the RFC series, see http://www.rfc-editor.org/rfcsearch.html.
For downloading RFCs, see http://www.rfc-editor.org/rfc.html.

Requests for special distribution should be addressed to either the
author of the RFC in question, or to rfc-edi...@rfc-editor.org.  Unless
specifically noted otherwise on the RFC itself, all RFCs are for
unlimited distribution.


The RFC Editor Team
Association Management Solutions, LLC




RFC 6937 on Proportional Rate Reduction for TCP

2013-05-09 Thread rfc-editor
A new Request for Comments is now available in online RFC libraries.


RFC 6937

Title:  Proportional Rate Reduction for TCP 
Author: M. Mathis,
N. Dukkipati,
Y. Cheng
Status: Experimental
Stream: IETF
Date:   May 2013
Mailbox:mattmat...@google.com, 
nandi...@google.com, 
ych...@google.com
Pages:  16
Characters: 39437
Updates/Obsoletes/SeeAlso:   None

I-D Tag:draft-ietf-tcpm-proportional-rate-reduction-04.txt

URL:http://www.rfc-editor.org/rfc/rfc6937.txt

This document describes an experimental Proportional Rate Reduction
(PRR) algorithm as an alternative to the widely deployed Fast
Recovery and Rate-Halving algorithms.  These algorithms determine the
amount of data sent by TCP during loss recovery.  PRR minimizes
excess window adjustments, and the actual window size at the end of
recovery will be as close as possible to the ssthresh, as determined
by the congestion control algorithm.

This document is a product of the TCP Maintenance and Minor Extensions Working 
Group of the IETF.


EXPERIMENTAL: This memo defines an Experimental Protocol for the
Internet community.  It does not specify an Internet standard of any
kind. Discussion and suggestions for improvement are requested.
Distribution of this memo is unlimited.

This announcement is sent to the IETF-Announce and rfc-dist lists.
To subscribe or unsubscribe, see
  http://www.ietf.org/mailman/listinfo/ietf-announce
  http://mailman.rfc-editor.org/mailman/listinfo/rfc-dist

For searching the RFC series, see http://www.rfc-editor.org/rfcsearch.html.
For downloading RFCs, see http://www.rfc-editor.org/rfc.html.

Requests for special distribution should be addressed to either the
author of the RFC in question, or to rfc-edi...@rfc-editor.org.  Unless
specifically noted otherwise on the RFC itself, all RFCs are for
unlimited distribution.


The RFC Editor Team
Association Management Solutions, LLC




RFC 6943 on Issues in Identifier Comparison for Security Purposes

2013-05-09 Thread rfc-editor
A new Request for Comments is now available in online RFC libraries.


RFC 6943

Title:  Issues in Identifier Comparison for 
Security Purposes 
Author: D. Thaler, Ed.
Status: Informational
Stream: IAB
Date:   May 2013
Mailbox:dtha...@microsoft.com
Pages:  26
Characters: 62676
Updates/Obsoletes/SeeAlso:   None

I-D Tag:draft-iab-identifier-comparison-09.txt

URL:http://www.rfc-editor.org/rfc/rfc6943.txt

Identifiers such as hostnames, URIs, IP addresses, and email
addresses are often used in security contexts to identify security
principals and resources.  In such contexts, an identifier presented
via some protocol is often compared using some policy to make
security decisions such as whether the security principal may access
the resource, what level of authentication or encryption is required,
etc.  If the parties involved in a security decision use different
algorithms to compare identifiers, then failure scenarios ranging
from denial of service to elevation of privilege can result.  This
document provides a discussion of these issues that designers should
consider when defining identifiers and protocols, and when
constructing architectures that use multiple protocols.

This document is a product of the Internet Architecture Board.


INFORMATIONAL: This memo provides information for the Internet community.
It does not specify an Internet standard of any kind. Distribution of
this memo is unlimited.

This announcement is sent to the IETF-Announce and rfc-dist lists.
To subscribe or unsubscribe, see
  http://www.ietf.org/mailman/listinfo/ietf-announce
  http://mailman.rfc-editor.org/mailman/listinfo/rfc-dist

For searching the RFC series, see http://www.rfc-editor.org/rfcsearch.html.
For downloading RFCs, see http://www.rfc-editor.org/rfc.html.

Requests for special distribution should be addressed to either the
author of the RFC in question, or to rfc-edi...@rfc-editor.org.  Unless
specifically noted otherwise on the RFC itself, all RFCs are for
unlimited distribution.


The RFC Editor Team
Association Management Solutions, LLC