Re: Ok .. I want my IETF app for my iPad ..

2010-04-04 Thread Bill Strahm

Tim Bray wrote:

On Sun, Apr 4, 2010 at 11:38 AM, Mark Nottingham m...@mnot.net wrote:
  

Step-by-step instructions (with illustrations) for Americans to use their 
credit cards overseas.



Anyhow, it has to be an iPad app, rather than iPhone/iPod-touch,
because the smaller devices can't display 80-char-66-line ASCII
properly.  -T

  
Just thinking what would happen if someone were to propose a Windows 7 
app for the IETF.  Maybe Wordpad to write those pesky ASCII I-Ds, maybe 
a meeting planner, scheduler and calendar, maybe a program to help 
organize and read all of those pesky e-mail lists.  I know someone has 
to have done something like that...


Oh wait - I'll leave you back to your regularly scheduled vendor 
specific lock-in now.


Bill (darn it - 3 days late - but I had to skip April Fools this year)
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Westin Bayshore throwing us out

2007-11-28 Thread Bill Strahm

Yeah - but who wants to go to Minneapolis one more time

/duckcover
Bill
Dave Crocker wrote:



Fred Baker wrote:
well, it's gotta be the IAOC's fault then. Tell you what, you can cut 
my IAOC salary in half as a penalty.


Nah.  You deserve every penny you get.  In fact, let's double your 
salary, for taking all this crap from the peanut gallery.



 The IAOC is looking at the coming budget, and about to discuss it 
with the ISOC Board.

...
  That is in part what Ray has been doing in getting hotel contracts 
two years out, and in making a deal with the Hilton company about 
repeat business at Hiltons. But maybe we're willing to pay extra for 
no construction.


Getting reduced rates has always been a goal and the benefits of signing 
early were discussed perhaps 15 years ago.  So we certainly don't want 
to reverse any of that fine, recent improvement.


Your last sentence is interesting, however, in the idea that we would 
have to pay extra in order to ensure that the hotel does not make it 
impossible for us to do our work.  While that wasn't your wording, I 
think it is a realistic implication.


I keep thinking that folks who rent space are renting the right to use 
it, and that a landlord who makes the space unusable is at fault.  One 
does not need to pay extra for the right; the rent already is the 
payment.  And I think the IETF meeting situation is comparable to 
renting space, albeit with a more interesting payment model.


We still seem to be constantly wandering into hotels for the first time, 
and somehow it's hard to believe that that doesn't cost the IETF a 
premium, if only in staff time learning the new place, especially for 
the net ops folk.  I even wonder whether repeating among a small set of 
venues would not also lead to some relationship building between the 
different staffs, thereby making everything go a lot more smoothly?


d/




___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: IETF/US General Election

2006-10-09 Thread Bill Strahm
Be careful offering legal advise.  I believe what you are proposing is a 
state issue.  For example in Oregon we ONLY have mail in ballots.  Other 
states will have varying degrees of absentee balloting - each with their 
own fun interpretations.


Bill
Moskovitz, Ram Austryjak wrote:

You can choose permanent absentee status and vote using paper
indefinitely.


-Original Message-
From: Michael C. StJohns [mailto:[EMAIL PROTECTED] 
Sent: Monday, October 09, 2006 2:43 PM

To: ietf@ietf.org
Subject: IETF/US General Election 


Just a reminder - (and apologies to our non-US participants)

For the first time ever (at least I can't remember another
occurrence) the US bi-annual general elections will occur during an IETF
week.  If you're a US citizen and planning on voting this cycle (and not
from San Diego!), don't forget to submit a request for an absentee
ballot before your state's deadline.

Mike


___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf





___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: Last Call: 'Definitions of Managed Objects for Remote Ping, Traceroute, and Lookup Operations' to Proposed Standard

2006-02-26 Thread Bill Strahm

Robert Elz wrote:

I cannot see why there's a debate going on here.   If someone, anyone,
can read a spec, and, in good faith, point out a possible ambiguity in
the text, before the doc is finalised, and if fixing it to avoid the problem 
is easy, what possible justification can there be for not adding a few

words to clarify things, and make sure that confusion does not happen?

Whenever someone points out a problem like this, the response should be
something like OK, if we write it like ... does that make it clear? or
perhaps What would you suggest as clearer wording? but never It is
clear enough as it is as the latter is already demonstrated to be false.

My mother can't read internet drafts either.  Should we change our 
language so that my mother can read and comprehend them.


It is assumed that there is a baseline knowledge when we write drafts... 
If you don't know how MIBs work in general - there are a LOT of problems 
that you have to sort out before you can provide technical feedback to 
the community.  Someone who is practiced in the art of 
reading/writting/implementing MIBs isn't going to have a problem with 
strictly monotonically increasing Indexes - knowing what that means, and 
how to implement it and test the implementation for correctness.


Somone who has been watching a rant on the list recently invovling the 
work monotonically increasing, MIGHT see the word and get confused.  I 
am not to worried about that - the document really isn't for their eyes 
anyway (I'm not about to comment on various security drafts either - 
should they be simplified so I can understand them, I hope I am expected 
to put in the work so that I understand them instead)




Certainly it is possible to explain the wording on the list, and convince
the objector that very careful understanding of the context makes the
intent clear - but that does nothing for the next person who comes along
and makes the same interpretation mistake (perhaps without even
realising the possibility for ambiguity, but simply interpreting the text
a different way).



Bill

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: Last Call: 'TLS User Mapping Extension' to Proposed Standard

2006-02-19 Thread Bill Strahm

I saw all of the huff, and while I agree with it, I am more concerned about

Appendix A. IPR Disclosure

   TBD

What does that mean, and more specifically is a document with a TBD 
section really ready for last call at all ?


Bill
Russ Housley wrote:
I misunderstood the original question.  I'll get it fixed or withdraw 
the Last Call.


Russ


At 12:38 AM 2/19/2006, Bill Fenner wrote:


Can we have a Proposed Standard
without the IETF having change control?

No.  RFC3978 says, in section 5.2 where it describes the derivative
works limitation that's present in draft-santesson-tls-ume, These
notices may not be used with any standards-track document.

  Bill




___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf





___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: IANA Considerations

2005-07-06 Thread Bill Strahm

John C Klensin wrote:


--On Wednesday, 06 July, 2005 15:23 -0700 Bob Braden
[EMAIL PROTECTED] wrote:

 


 * harmful, and that the best way to insure coverage of IANA
issues is to have an   * explicit check for such things as
part of our review process.
   



 


Ned,

As I expect you know, the IANA checks all documents at Last
Call time, and the RFC Editor checks them before publication,
for missing missed IANA actions.  However, redundancy does not
seem to me to be a bad idea.
   



Bob, as I expect you know, the IANA no longer has the staff
skills to perform an in-depth analysis of a document to
determine whether there are issues IANA needs to deal with.
Yes, I think they try, but the whole purpose of this section was
to move toward providing them better instructions and hints than
go do your own detective work.  I'm grateful that the RFC
Editor continues to make those checks, but it is in everyone's
interest that the IANA actions be understood much earlier in the
process, leaving the RFC Editor review as the safety net of last
resort.

That said, I think we should be paying careful attention to
Bruce's implied suggestion about how template
boilerplate-generators should be constructed.   In terms of the
checking process Ned asks for (and which I still believe is the
right solution) there is a world of difference between a
template that generates:

IANA Considerations
   Nothing for IANA to do

and one that generates 


IANA Considerations
   If you see this text, the author hasn't gotten around
to thinking about this issue.

john

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


 


I actually would prefer
IANA Considerations
   This section left intentionally blank

Reminds me of some wonderful manuals back in the day (and frankly 
currently as well)


Bill

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: Need for an Agenda Cutoff date?

2005-03-07 Thread Bill Strahm
Brian E Carpenter wrote:
Joe,
There is an agenda cutoff that WG chairs are supposed
to respect. This time it was:
 The agenda for the Working Group is due by Monday,
 February 28 at 12:00 ET (17:00 GMT).
But there were many late agendas and there was a glitch
in the process of posting them.
Guilty (IPoIB WG Chair here) - now solution space
For BOFs, the formal BOF proposal must include an agenda,
and that was due this time on February 21.
We need to try and follow our own rules next time.
Time to get Hard about this - if WG agendas aren't published by the 
cutoff date - the WG doesn't meet.  Anyone I've ever talked to says good 
meeting practice includes publishing an agenda - if there isn't enough 
interest in publishing an agenda, there isn't enough interest in 
attending a meeting.

If a WG is scheduled to meet on the cutoff date and there isn't an 
agenda published on the cutoff - a message goes to the WG chair (and 
maybe to the WG as well) with a warning and if they don't get an agenda 
to the IETF in 24 hours...

CANCEL THE MEETING
Brian - is this going to be your first contribution to the IETF as the 
incoming chair ?

Bill
(who would have had his meeting cancelled today with these rules - but 
this is the right thing to do)

   Brian
Joe Touch wrote:
Hi, all,
With agendas appearing ever later - including last night, the issue 
of cutoff dates should be revisited.

If reading the drafts to be discussed is NOT an issue, then the I-D 
cutoff dates should be dropped.

If reading the drafts IS an issue, then, by correlary, there should 
be a corresponding cutoff date for agendas - e.g., 1 week after the 
last cutoff I-D date. Jjust as I-Ds that pass the cutoffs are not 
published for this IETF, WGs that fail to meet that deadline should 
be CANCELLED.

Consider this a proposal, or at least a request.
Joe

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


RE: Excellent choice for summer meeting location!

2005-01-03 Thread Bill Strahm
I don't know how airline pricing works in .au - but here in the .us it
seems that adding a short flight into a more regional airport can more
than double the cost of an airplane ticket.

Also note that a town of 100,000 will seldom have conference space that
can host a conference that attracts 1500 people - I know of no such
facility in  Hillsboro (where I live) that is outside of Portland (more
a suburb, than a regional center).  I would be interested in knowing
what somewhere like Spokaine, Boise, or other smaller site might have.

Bill 

-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of
Dassa
Sent: Monday, January 03, 2005 12:55 PM
To: 'John C Klensin'; 'IETF Discussion'
Subject: RE: Excellent choice for summer meeting location!

| -Original Message-
| From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]
| On Behalf Of John C Klensin
| Sent: Tuesday, January 04, 2005 12:19 AM
| To: [EMAIL PROTECTED]; 'IETF Discussion'
| Subject: RE: Excellent choice for summer meeting location!
| Dassa,
|
| For better or worse, we've had a preference for locations
| close to major airports with significant international connections.
| We haven't been consistent about it (note, e.g., San Diego),
| but, unlike that other organization whose name starts with I
| (not IEEE, Glen), we have considered it a really bad thing
| if most of the attendees have to spend two days getting to
| and/or from a meeting: turning a five-day meeting into an
| eight- or nine-day one is really hard on those who have
| other things to do
| besides going to meetings.I have no idea how the boondocks
| of NSW would fall on that criterion, but it is what has kept
| us near or in fairly major cities.
|

Hello John

I was being a little tongue in cheek but the suggestion of regional
centers
being used is one I pursue for a lot of groups.  Living in the country
in a
smallish city, a lot of meetings occur in the capitals that I and others
just don't get a chance to attend.  I'm sure it would be the same in a
lot
of areas.  I can understand the issues but the benefits all round may
overcome them.  For instance where I live is only an hour flight from
Sydney, you ask, why don't you fly there for meetings and I have to
explain,
being in a regional area, the finances available for travel are limited.
We
tend to get paid less than equilivant workers in the capitals and
companies
out here are less likely to approve spending on non-essential travel.
It is
also a fact that connections out in regional areas are often less than
optimal for most people so this has an impact for online participation.
It
is only recently I was able to get ADSL at home for instance and
operated
for years with a dialup that meant long hours for participation online
and I
missed a lot of broadcasts due to downloading constraints.

My suggestion is the IETF considers moving some meetings out to regional
centres within reasonable travel of the major ingress airports in an
effort
to promote awareness and participation.  Within the States and other
countries, I'm sure there would be some benefits in holding meetings at
cities with populations of 30,000 - 100,000 or so rather than the
capitals
and other major cities with populations into the millions.

There are issues with such locations and they may be insurmountable but
I
would like to see the idea considered.  Given more people making
lifestyle
changes that involve moving away from major cities, it may become more
important in the future.

Darryl (Dassa) Lynch



___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: Adding [ietf] considered harmful

2003-12-17 Thread Bill Strahm
Hmmm,

I am wondering if running this e-mail thread is adding a couple years worth of 6byte 
additions to the subject.

Seems silly to me - I prefer lists to do this - makes many peoples life easier - 
doesn't make anyones life harder (and frankly if 6 bytes is going to blow your 
bandwidth budget - you have worse troubles than this proposal)

Please consider this as someone who thinks it is a good idea because some people want 
it - regardless if they can jump through 10 more hoops and get the same functionality 
with filters (on what ? - I hate it when people bcc: mailing lists and you loose the 
from/cc field containing the mailing list you are filtering on) - procmail (oppps what 
about the people that don't use that, etc.

Bill
On Thu, Dec 18, 2003 at 10:39:21AM +1200, Franck Martin wrote:
 Because we, people on the road, use various mail systems and even web
 based mail, where the filters are not applied yet...
 
 Why such a war for just 6 characters, while all mailing lists do it?
 
 Have you been out there?
 
 Let's give it a try and see...
 
 Cheers
 
 On Thu, 2003-12-18 at 04:26, Keith Moore wrote:
 
   
   would it be asking too much to add [ietf]  to the subject line of each message?
  
  yes.  it's completely redundant information, and it interferes with readability,
  particularly on small displays.
  
  why don't you get a better mail reader that lets you classify mail as it arrives?
  that is a much better way to distinguish one list's traffic from another.
 
 
 Franck Martin
 [EMAIL PROTECTED]
 SOPAC, Fiji
 GPG Key fingerprint = 44A4 8AE4 392A 3B92 FDF9  D9C6 BE79 9E60 81D9 1320
 Toute connaissance est une reponse a une question G.Bachelard





Re: Proposal to define a simple architecture to differentiate legitimate bulk email from Spam (UBE)

2003-09-09 Thread Bill Strahm
Why is this even difficult.  I have yet to see a firm proposal (ie. an
Internet Draft), and once there is one, it is a simple matter of asking an AD
to sponsor a BOF to see if there is interest in forming a working group to 
solve the problem.  I remember sitting through several YATP (Yet another
Tunnelling Protocol) BOFs years ago, I don't see what the problem is with
creating some YASPP BOFs (Yet Another Spam Prevention Protocol).

This is the IETF, that is the IETF process... Why are we arguing here about
killing it without having a firm proposal, and a BOF chartered to form a WG
to go solve the problem.  Any more breath we waste now doesn't help anybody.

My challenge - Go forth - publish your protocol in ID form, contact the 
correct APP (probably) area AD and get a BOF in Minneapolis - Convince the
IETF in general there that a WG should be chartered to solve the problem.
Go and solve the problem

Bill

On Tue, Sep 09, 2003 at 01:41:33PM -0400, Dean Anderson wrote:
 My apologies for this message.  This discussion is winding down. Iljitsch
 makes some interesting points, to which I have tried to respond
 thoughtfully.
 
   --Dean
 
 On Tue, 9 Sep 2003, Iljitsch van Beijnum wrote:
 
  On maandag, sep 8, 2003, at 17:30 Europe/Amsterdam, Dean Anderson wrote:
 
   Nobody cares. Making a roof 100.00% impervious to water molecules
   may be impossible, but that doesn't mean we have to resign to getting
   wet every time it rains.
 
   People care because when someone comes around saying you can have a
   100%
   impervious roof if only you jump through these inconvenient hoops, we
   know that they are wrong, and don't need to waste time considering how
   inconvenient the hoops are.
 
  Your analogy doesn't fly. Our email protocols have holes big enough to
  drive a truck through. Is it unreasonable when people ask the IETF
  leadership for a place to work on this?
 
 I don't think our email protocols have any holes at all. They can be
 abused. But mere abuse is not a hole.
 
   We, meaning the IETF, care, because this is very useful aid to
   deciding what to work on. We know that we need to focus on leak
   stoppage, not trying to invent leak-proof protocols.  There is no
   point researching something that is impossible.
 
  Let's first define our goal before declaring it impossible to reach.
 
 Well, I think the goal has been stated: Create an abuse-free email
 protocol.  That goal is impossible. Thus, we have abusable protocols.
 
 Perhaps you have a different goal in mind, but it doesn't sound like you
 accept the premise that it impossible to create an abuse-free protocol.
 
   After I first posted this on IETF a while back, someone suggested
   that covert channels require cooperation, and that spam therefore
   isn't a covert channel.
 
   Where does this covert channel stuff come from anyway?
 
   What do you mean?
 
  The jump from spam to covert channel isn't immediately obvious. And
  if any proof of why spam is a covert channel has been offered, I've
  managed to miss it.
 
 The NCSC's definition refers to ANY communication not authorized by the
 security model.  Note that the term Covert Channel is frequently
 associated with Multilevel Secure Operating Systems. The liturature uses
 other terms to describe the same concept: information leakage, sneaky
 signalling, hidden data flows, side channels. So you must not get too
 caught up in the peculiarities of operating systems.  The concept is quite
 general.
 
 It is immediately obvious that covert channels have 3 characteristics: It
 is a CHANNEL, it is COVERT, and it VIOLATES SECURITY POLICY. (Caps for
 emphasis of definition, not loudness.)
 
 
 CHANNEL:  Spam is a type of Email. Email is a channel transfering signals
 from A to B. Email is really a subchannel of the internet, which is a
 subchannel of the PSTN, public and private fiber networks, etc.
 
 COVERT: Spam is hidden in so far as possible from the system operators. It
 is an unintended communication in that the system operators intended that
 only non-broadcast, solicited commercial communication flow. This not an
 exclusive list of what is permitted, but illustrates that spam isn't
 permitted.
 
 VIOLATES SECURITY POLICY:  System Operators specified an acceptable use
 policy that outlines what is permitted and what is not permitted. UCE is
 not permitted.  Various methods have been implemented to enforce this
 policy.
 
 
   the spammer's achilles heel is that they need to send out incredible
   amounts of email in order to fulfill their objectives, whichever
   those are. Detecting bulk mail is doable, and it shouldn't be too
   hard to come up with something to differentiate legitimate bulk
   emailing from spam. For instance, we can reverse the burden of proof
   here and only allow know bulk emailers.
 
   Detecting abuse is quite different from making a protocol that can't
   be abused.
 
  If you can detect abuse on input rather than on output, detecting 

Re: Proposal to define a simple architecture to differentiate legitimate bulk email from Spam (UBE)

2003-09-09 Thread Bill Strahm
Very nice.  I say to post an Internet Draft - you post a link to a simple 
archived e-mail.  The IETF process starts with an Internet Draft - without it
we are all just wasting time.  An internet draft is a concrete proposal that
can be discussed, archived, debated successfully, etc.

I challenge you to take your e-mail posting and turn it into an Internet Draft
with a legitimate security section (since you are solving a security problem)
then post a single message to this list showing the internet draft, and a
mailing list that people can join if they are interested in discussing it
further.  

From there it is easy to determine if there is enough interest in forming a BOF
in Minnesota ( or S. Korea in March ) to forward the work in a Working Group.

The problem you have run into is you haven't taken the first step, which is to
simply submit an Internet Draft to the Internet Drafts editor... very simple
process with no politics in the way.  From there you can pursue forming a 
Working Group (where you will get your first taste of politics).  Being that
you haven't taken the first step (publishing an Internet Draft) I am not sure
you really meet the charter (Ok, yes you do, but putting out a draft is SO
important - it should be the first step) and you have allowed the topic to grow
WAY beyond initial discussions (I am actually waiting for Harold to post one
of his famous Top n Talker lists soon).  The next step is to get a mailing
list somewhere and move the discussion off of this list onto that list

Bill
On Wed, Sep 10, 2003 at 05:10:06AM +0800, Shelby Moore wrote:
 Why is this even difficult.  I have yet to see a firm proposal (ie. an
 Internet Draft),...
 My challenge - Go forth - publish your protocol in ID form...
 
 
 1. I remind you to read my initial post that started this thread:
 
 http://www1.ietf.org/mail-archive/ietf/Current/msg22035.html
 
 Request for opinions on whether to creating a working group or publish the 
 following idea as an internet draft?
 
 I think that qualifes under initial discussion of the charter of this list (see #2 
 below).
 
 
 2. And to read the charter for this mailing list:
 
 http://www.ietf.org/maillist.html
 
 This list is meant for initial discussion only. Discussions that fall within the 
 area of any working group or well established list should be moved to such more 
 specific forum...
 
 
 3. Just a fews posts back in this thread, it was suggested that IRTF would be a 
 better forum for anti-spam proposals and discussions, and I agreed (to consider it 
 if possible and applicable).
 
 However there is a another line of discussion in this thread pertaining to general 
 information theory and modeling of channels which is still winding down (initial 
 discussion) and seems quite general to internet engineering.
 
 
 4. The basic difficulty has been those violating the charter of the list:
 
 http://www.ietf.org/maillist.html
 
 Unprofessional commentary, regardless of the general subject. such as the Kook 
 thread offshoot that someone started.
 
 Shelby Moore
 http://AntiViotic.com



Re: A modest proposal - allow the ID repository to hold xml

2003-09-02 Thread Bill Strahm
I'll give you one good reason.  And that is updating the drafts once
the initial RFC is published.  If the origional XML/.doc/input language of the 
day is available, then I don't have to spend my time converting the text
into a usable form to get the formating done easily.

For this reason only, having origional input would be useful.
(Yes I know, I can always go ask the origional editor for the input source,
but that may take time locating that person and getting access to the
input doc)

Bill
On Tue, Sep 02, 2003 at 11:19:29AM -0700, Paul Hoffman / IMC wrote:
 At 10:47 AM -0700 9/2/03, Eliot Lear wrote:
 I don't know about about you, Paul, but I'm writing my drafts using 
 EMACS and Marshall's tool.  That allows for generation of HTML, 
 NROFF, and text.  The HTML allows for hyperlinks, which is REALLY 
 nice.
 
 Great! Why does that mean that the XML input should be published in 
 the Internet Drafts directory along with the text output?
 
 --Paul Hoffman, Director
 --Internet Mail Consortium



Re: Securing SNMPv3 via SSH tunnels

2003-08-06 Thread Bill Strahm
The problem that you have with TCP (and made worse by SSH tunneling on top of
it) is that the number of round trips needed to successfully get a data packet
through is unreasonably high in a situation where you are attempting to 
diagnose a network fault.

The other choice is to leave a LOT of state open (ie. TCP connections)
requiring a lot of extra memory, etc. on the device.  That said there is no 
reason why you can not create a tunnel to a secure environment and run your
SNMP traffic from there.

Bill

On Wed, Aug 06, 2003 at 08:42:49AM -0700, Fleischman, Eric wrote:
 I am seeking to secure SNMPv3 communications (e.g., RFC 3414), trying to protect 
 against its well-known vulnerabilities such as spoofing. Had SNMPv3 run over TCP, 
 instead of UDP as it does, then I perhaps may attempt to protect it via SSH port 
 forwarding (i.e., SSH tunneling). Coincidentally, I've just read a description in 
 Bob Toxen's book Real World Linux Security (page 141) about an approach he has 
 apparently used of wrapping UDP in TCP and SSH in order to accomplish SSH port 
 forwarding for UDP-based protocols as well. This makes me wonder whether SNMPv3 may 
 be a viable candidate for SSH tunneling after all. I am wondering whether anybody in 
 the list has any insights as to the viability and weaknesses of this suggested 
 approach. I am especially interested in learning how people on this list secure 
 SNMPv3. Thank you.



Re: re the plenary discussion on partial checksums

2003-07-16 Thread Bill Strahm
Ok, I have to ask a silly question (not like that would be a first on this list)

Why, oh WHY would I want to receive a known corrupted packet ?

Are we talking about someone thinks they can eeke out 1% more performance
because their phy/mac can cut over immediately rather than wait for the packet
and verify the checksum ??? (or compute it on the sending side)

I guess I don't see the benefit, I guess rather than a hardware L2 check, you 
rely on something in your hardware later up to fail a check (including a L7
protocol) and drop the frame there ???

I wish I had been there to see the discussion

Bill


On Wed, Jul 16, 2003 at 04:21:47PM -0400, John Stracke wrote:
 Keith Moore wrote:
 
 so it seems like what we need is a bit in the IP header to indicate that
 L2 integrity checks are optional, and to specify for various kinds of
 IP-over-FOO how to implement that bit in FOO.
   
 
 How would an app know to set this bit? The problem is that different L2s 
 will have different likelihoods of corruption; you may decide that it's 
 safe to set the bit on Ethernet, but not on 802.11*.  And, in general, 
 the app doesn't know all of the L2s that may be involved when it sends a 
 packet.
 
 -- 
 /==\
 |John Stracke  |[EMAIL PROTECTED]   |
 |Principal Engineer|http://www.centive.com |
 |Centive   |My opinions are my own.|
 |==|
 |Linux: the Unix defragmentation tool. |
 \==/
 
 



Re: Financial state of the IETF - to be presented Wednesday

2003-03-17 Thread Bill Strahm
I tend to disagree with you Ross,

First it is not excessive by definition because we are not covering our costs.  Second 
I don't think it is excessive because I know of MANY weeklong conferences that want in 
the order of 1000-1700 registration fees...

I can see how this is VERY different between someone whos company pays (who cares it 
isn't my money) and someone on a grant, sending themselves (every penny counts, cause 
money I don't spend going to an IETF meeting goes into my pocket that lets me spend it 
on my little girl... or pick your favorite way of spending money)

The other thing that will be interesting is how do the IETF meeting expenses scale 
with participation... Do we spend 300,000K regardless of how many show up, or as the 
number of attendies goes up we spend more money and if so how much more

Bill
On Mon, Mar 17, 2003 at 11:17:31AM -0800, Ross Finlayson wrote:
 At 10:22 AM 3/17/03, you wrote:
 I'm having quite a hard time seeing what the problem is here, but maybe I'm
 missing something... Based on Harald's analysis the  projected annual
 shortfall is in the region of $350,000 per annum. Assuming ~5,000 attendees
 per annum, that equates to ~$70 per year per attendee.
 
 The trouble with this analysis is that the 5000 attendees each year are not 
 all different people.  Many, if not most, people attend more than one IETF 
 meeting per year.
 
 A more accurate analysis would be: A shortfall of $350,000 per annum means 
 ~$120,000 per IETF meeting.  So, if 1200 people attend each IETF meeting, 
 then that means $120 extra per person.  (Or, if 2400 people attend each 
 IETF meeting, then that means $60 extra per person.)
 
 (Personally, I think that even the current $425 fee feels excessive, 
 especially in the current economic climate.)
 
  Ross.
 



RE: Dan Bernstein's issues about namedroppers list operation

2003-01-15 Thread Bill Strahm


-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]] On Behalf Of D.
J. Bernstein
Sent: Wednesday, January 15, 2003 4:59 PM
To: [EMAIL PROTECTED]; [EMAIL PROTECTED]; [EMAIL PROTECTED]
Subject: Re: Dan Bernstein's issues about namedroppers list operation


Thomas Narten writes:
 One can debate whether including the specific information cited above 
 was the right thing to do

That's the paragraph Bush added to other people's messages.

Bush added a different paragraph to my messages. (The ones he didn't
throw away, that is.) In that paragraph, he specifically included my
private subscription address, which hadn't appeared anywhere in the
messages I actually sent.

Unintentional, eh?

---D. J. Bernstein, Associate Professor, Department of Mathematics,
Statistics, and Computer Science, University of Illinois at Chicago





RE: DNSEXT WGLC Summary: AXFR clarify

2002-12-18 Thread Bill Strahm
Please god NO...

I hope EVERYONE deeply involved in a WG documentation process has deep
DEEP conflict of interest problems.  I mean if we are not working on the
things we are documenting, how will we know if they work or not.  Saying
that WG chairs can not work for companies that need the efforts of the
WG seems like setting up a big failure, there are checks and balances,
you don't like what the chairs of a WG are doing, talk to the ADs, don't
like what the ADs say go to the IAB... This is a documented process.

I do not know about the DNS WG, but most working groups that I am aware
of also have two co-chairs, usually from different companies/areas - and
I know that my co-chair and I have to be in agreement on char
descisions, reducing the effect of one of us having a massive conflict
of interest.

Please do not require conflict of interest rules to enter the IETF, this
isn't the government, we NEED this to work

Bill Strahm

-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]] On Behalf Of
[EMAIL PROTECTED]
Sent: Wednesday, December 18, 2002 1:34 PM
To: Stephane Bortzmeyer
Cc: D. J. Bernstein; [EMAIL PROTECTED]; [EMAIL PROTECTED]
Subject: Re: DNSEXT WGLC Summary: AXFR clarify 


On Tue, 17 Dec 2002 10:53:28 +0100, Stephane Bortzmeyer said:
 On Tue, Dec 17, 2002 at 08:58:22AM -,
  D. J. Bernstein [EMAIL PROTECTED] wrote
  a message of 26 lines which said:
 
  DNSEXT chair Olafur Gudmundsson, who has been paid for BIND work, 
  writes:
 
 For me, this is too much.

Now, on the *one* hand, I'd be surprised indeed if the chair of DNSEXT
had NOT been paid by somebody to do BIND consulting somewhere along the
line.

On the other hand, if Olafur is in fact making a living doing BIND9
development and coding for ISC or one of their clients, that might be
called a conflict of interest when the issue at hand is that a
specific document is too BIND9 specific.

Personally, I'm OK with Olafur making money doing BIND.  I'm even OK on
him possibly making more if the draft becomes an RFC in its current
state.  I admit I've looked through RFC2026 and found nothing about
disclosure of conflict of interest(*).  I hate making more work for the
AD and IESG, but I think at least a We've talked to Olafur and do/dont
think there's a problem is called for.

(*) I'll let wiser people than I decide if there should be such a
section in a son-of-2026
-- 
Valdis Kletnieks
Computer Systems Senior Engineer
Virginia Tech







RE: Reminder: Deadline for input on sub-ip discussion

2002-12-09 Thread Bill Strahm
I have an interesting set of questions for you Harold,
1) How effective would the IESG be with 2 more members, more effective,
or less
2) What would happen to any new IESG members in the SUB-IP area, if
the area is shut down ?

In otherwords, does the IESG think that a two new members would help
overall effectiveness, or make it lower

If the consensus of the IESG is that adding more members would make them
less effective go with the victim/temporary route.

If the consensus of the IESG is that adding two members would make the
IESG more effective, lets look at making it permanent, or have a place
to put the extra members when the temporary area shuts down.

In other words what makes that IESG more effective 

Bill


-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]] On Behalf Of
Harald Tveit Alvestrand
Sent: Monday, December 09, 2002 1:22 PM
To: [EMAIL PROTECTED]
Subject: Reminder: Deadline for input on sub-ip discussion


All,

On Wed Dec 4th, we asked for input to help us decide on the future of
the SUB-IP Area. See our posting at

  http://www.ietf.org/mail-archive/ietf/Current/msg18370.html

We had a large majority of people at the SUBIP Area meeting in Atlanta
expressing that they want the area to be long(er) lived. This will be
part of our input.

But we need/want to hear from the IETF community. So please express your
opionion (and the reasoning behind it) asap on [EMAIL PROTECTED], but 
certainly before Thursday Dec 12th 10am US Eastern time.

As expressed in the above posting (with data points and discussion 
included),
the 3 choices for the SUB-IP Area seem to be:

  1/ move WGs (back) to permanent areas: migrate the SUB-IP
 working groups to other IETF areas sometime soon, likely before
next
 summer and close the SUB-IP area. Also, reconstitute the SUB-IP
(and/or
 other) directorates to ensure the continued coordination between
the
 remaining WGs.

  2/ establish a long-term area: decide that the SUB-IP
 area will be a long-term one, clearly define its charter, and ask
the
 nomcom to select one or two people to be Area Directors

  3/ status quo: continue the SUB-IP Area as a temporary,
 ad-hoc effort, much as it has been, with the IESG selecting two
sitting
 ADs to continue the effort that Bert  Scott have been doing. But
maybe
 give more responsibility to the working group's technical advisors,
 normally the AD from the area where the working group might
otherwise
 live.

The opinions expressed so far seem to show clearly that the community is

divided on the issue, with perhaps some preference for the status quo 
(alternative 3).

If you have a strong preference for one (or two) of these, and have not
yet 
said so, please indicate your opinion (and your reasons) by mail to 
[EMAIL PROTECTED] before Thursday.

Thank you!

  Harald Alvestrand, for the IESG

(please repost this message where appropriate)






RE: namedroppers mismanagement, continued

2002-11-29 Thread Bill Strahm
I don't know about others, but I use the IETF mailing list service to
manage the list.  If you want to send a message all it takes is a
subscribe, but please don't send me any e-mails... Very easy to do with
a Webpage...

This only guarantees that I won't see your mail and possibly make a
mistake, hopefully I don't make too many mistakes, but I am human

Bill

-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]
Sent: Tuesday, November 26, 2002 2:33 PM
To: [EMAIL PROTECTED]
Cc: 'Keith Moore'; [EMAIL PROTECTED]
Subject: Re: namedroppers mismanagement, continued


 No I don't want random people sending stuff to a low volume list ( a
 couple messages a week is normal ) so I think asking people to
 subscribe is a low overhead task...

I understand where you are coming from, but too many IETF working
groups' output has suffered from lack of outside input.  Certainly it's
reasonable to expect frequent contributors to at least get on an
allowed posters list, but it's not reasonable to exclude occasional
input from others.

Keith






RE: namedroppers, continued

2002-11-29 Thread Bill Strahm
Silly question,

But you DO know what it will take to get your message to be immediately
seen by the list, you just aren't willing to do it... 

I believe the problem is in your court, easily solved and it is not time
to move on to something that might be slightly productive

Bill

-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]] On Behalf Of D.
J. Bernstein
Sent: Friday, November 29, 2002 3:22 PM
To: [EMAIL PROTECTED]
Cc: [EMAIL PROTECTED]; [EMAIL PROTECTED]
Subject: Re: namedroppers, continued


Keith claims that allowing ``contributions from outsiders'' requires
delay and manual review. That claim is absurd. Immediately bounce the
message to the ``outsider,'' with instructions explaining how to have
the message sent to subscribers; end of problem.

---D. J. Bernstein, Associate Professor, Department of Mathematics,
Statistics, and Computer Science, University of Illinois at Chicago






RE: namedroppers mismanagement, continued

2002-11-28 Thread Bill Strahm
Ok... I have to know...

Randy,

Can you please put [EMAIL PROTECTED] on the approved posters list for
namedroppers ?

Isn't it as simple as that ?

Bill

-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]] On Behalf Of
Keith Moore
Sent: Thursday, November 28, 2002 10:18 AM
To: Erik Nordmark
Cc: [EMAIL PROTECTED]
Subject: Re: namedroppers mismanagement, continued 


 If folks need to post all the time from a different
 address than their subscription address *they* should take the step to

 get that posting address added to the approved posters list.

that might be fine, except

- in the current situation, even postings from occasional posters 
  are being blocked.  and when postings are blocked, the message is 
  terse and cryptic (even insulting) and contains no clue about how 
  to workaround the problem

- getting on the approved posters list is not well documented or
  understood.  for some list software this is a manual operation 
  requiring the list admin to edit a file; on others it is under
  control of the subscriber but he/she has to subscribe the alternate
  address using some obscure option like /NOMAIL.
 
I've run several IETF lists myself and I know how much of a pain it is
to filter out spam.  Yes, the process is error prone.  Yes it's 
a pain to keep approving posts from the same person (though it's 
easy to fix that problem, and no I don't think adding that person to an
approved posters lists is assuming too much).  And yet I still don't
think that namedroppers is being managed appropriately.

Can we please fix this problem which has gone on for several years and
stop pretending that this behavior is acceptable?

Keith






RE: namedroppers mismanagement, continued

2002-11-26 Thread Bill Strahm
Keith,
I almost agree with you... Except here is the problem...

The [EMAIL PROTECTED] mailing list has 17 request(s) waiting for your
consideration at:

https://www1.ietf.org/mailman/admindb/ipoverib

I'll go ahead and remove the 17 messages trying to sell sex, toner
cartridges, stuff in char sets I don't even know what they are...

No I don't want random people sending stuff to a low volume list ( a
couple messages a week is normal ) so I think asking people to subscribe
is a low overhead task... You don't even have to receive the mail
traffic.

It is also not in the communities interest to slog through 100's of
spams to find a usefull nugget of truth either.

Bill

-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]] On Behalf Of
Keith Moore
Sent: Tuesday, November 26, 2002 6:41 AM
To: Eliot Lear
Cc: D. J. Bernstein; [EMAIL PROTECTED]
Subject: Re: namedroppers mismanagement, continued


   Join the list already.  How hard is that for a so-called mail guru?

there are valid reasons to post to a list when you're not subscribed, or
from a different address from the one you use for your subscription.

and it's not in the community's interest to ignore useful input.





RE: Palladium (TCP/MS)

2002-10-23 Thread Bill Strahm
Well the first thing you have to realize is that there is no such thing
as TCP/MS, and there for any answer you get would be highly speculative
at best.

This is a huge red herring, based on speculation that for some unknown
reason, Microsoft will Embrace/Extend/Extinguish the IP protocol and
successfully be able to put their own protocol (MS) onto the internet in
such a way that you will be required to use a MS product to use the
internet...

I don't know about you but I find the whole scenario dubious at best,
and this whole thread is becoming a massive troll

Bill
(Who is getting ready to take his lunch and eat it rather than feeding
trolls)

-Original Message-
From: [EMAIL PROTECTED] [mailto:owner-ietf;IETF.ORG] On Behalf Of Sean
Jones
Sent: Wednesday, October 23, 2002 1:38 AM
To: [EMAIL PROTECTED]
Subject: RE: Palladium (TCP/MS) 


Good Morning Valdis

Thank you for your prompt reply. Perhaps I did not phrase my question
properly. 

I know what PTR records are, I know how TCP/IP works  etc (I've done a
routed IP network or two, and worked at an ISP for a while) so please
let me re-phrase my question.

Why is a PTR (or DNS) record with MS TCP different from the standard
TCP/IP record? 

(Perhaps it is me in my ignorance, or lack of understanding :o) )

Regards

Sean

 -Original Message-
 From: [EMAIL PROTECTED] [mailto:Valdis.Kletnieks;vt.edu]
 Sent: 22 October 2002 18:39
 To: Sean Jones
 Cc: [EMAIL PROTECTED]
 Subject: Re: Palladium (TCP/MS)
 
 
 On Tue, 22 Oct 2002 16:42:03 BST, Sean Jones said:
  Forgive my ignorance, but what the heck do you mean?
 
 % dig -x 207.46.230.218
 
 ;;  ANSWER SECTION:
 218.230.46.207.in-addr.arpa. 2665 INPTR microsoft.com.
 218.230.46.207.in-addr.arpa. 2665 INPTR microsoft.net.
 218.230.46.207.in-addr.arpa. 2665 INPTR 
 www.domestic.microsoft.com.
 218.230.46.207.in-addr.arpa. 2665 INPTR www.us.microsoft.com.
 
 Of course, it isn't that simple - those 4 PTR entries each
 point back at a
 multihomed host. I was about ready to throw a yellow flag and a 5-yard
 procedural penalty until I double-checked RFC2181, section 
 10.2 - that's legal.
 
 Gonna need a lot longer ACL on that Cisco to actually make it
 work (don't
 forget all their msft.net servers.
 
 Bringing it back to IETF territory now:  Is there a need for
 an RFC for
 best practices in securing the download of software updates (DNSSEC,
 PGP signatures, etc)?  The two scariest things about online 
 updates (at least
 while wearing my security hat) are the MITM attack (as 
 demonstrated against
 Apple) and the hacked download attack (as has hit 
 windowsupdate, openssh,
 sendmail, and others).  If it's WG fodder, I'd specifically 
 declare the
 question of whether the patch *works* as off-topic - the task 
 is merely
 verifying that the bits are the correct bits, and from the 
 correct vendor.
 -- 
   Valdis Kletnieks
   Computer Systems Senior Engineer
   Virginia Tech
 
 







RE: TCP/IP Terms

2002-10-08 Thread Bill Strahm

Cynicism
I always figured it was based on the number of managers that you have on
the project, one manager for each layer...  At least that is how it was
done at a previous company I worked for...

/Cynicism

Models are very nice to help you get people to think about something the
same way.  Of course the best engineers that I know, understand the
model, but think way outside it... Letting unique solutions that break
the model, but deliver better results...

Bill

-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]] On Behalf Of Dave
Crocker
Sent: Tuesday, October 08, 2002 12:25 PM
To: Robert Elz
Cc: [EMAIL PROTECTED]
Subject: Re: TCP/IP Terms 


At 11:38 PM 10/7/2002 +0700, Robert Elz wrote:
Attempting to give these things absolute numbers, other than for ease 
of reference in some particular context is lunacy.

Not that I disagree with your primary point, it is worth noting that
there 
is some basis for hovering about 7, for an *overall* model.

It's that memory limit thing (7, plus or minus 2.)  The plus or minus is

statistical, so if you want to make sure that people really have no
trouble 
grokking the total set, 5 is a better choice.

d/


Dave Crocker mailto:[EMAIL PROTECTED]
TribalWise, Inc. http://www.tribalwise.com
tel +1.408.246.8253; fax +1.408.850.1850







RE: Report on Peering and Transit Economics (etc)

2002-09-30 Thread Bill Strahm

All I have to say is WOW A three page executive summary.  I am afraid
to read the rest... Guess I will have to see what is going on especially
when they start talking about ICANN (At the VERY bottom) I'd love to
know how that fits into Peering and Transit economics


Bill

-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]] On Behalf Of
Gordon Cook
Sent: Sunday, September 29, 2002 9:46 AM
To: [EMAIL PROTECTED]
Subject: Report on Peering and Transit Economics (etc)


I have published an extremely detailed report on the economics, 
technology, and politics of peering and transit.  At 
http://cookreport.com/11.08-09.shtml you will find the complete 
introductory article, contents and  list of 25 contributors to the 
effort.  The report centers on interviews with Bill Woodcock, an 
essay / critique by Farooq Hussain and an edited version of the 6 
weeks of discussion by the 25 contributors.

I  include here the executive summary from the report.  This summary 
is not on my web site and I am not posting it elsewhere.

Executive Summary

Whither the Policy, Technology, and Economics of the Interconnection 
of the Internet?

The collapse of the industry and of the price of bandwidth is 
bringing significant changes into the ways in which ISPs and the 
remnants of the Old Guard of Tier 1 backbones interconnect.

Some people who are affected have made some significant steps in 
using NetFlow data in developing tools that are being refined into 
what can function as bandwidth cost management systems.  We identify 
several explorations being taken in this direction and explore what 
looks to be the most refined developed by Bill Woodcock with the 
assistance of Alex Tudor at Agilent Labs.

Bill has developed a philosophy of interconnection that appears to 
have a sound  business model behind it.  Bill's approach was 
developed from the point of view of a small ISP that needs to 
understand with as much precision as possible what it does cost to 
get its bandwidth delivered.  His model says that ISPs that are 
multi-homed and have their own leased line customers need to peer as 
much and as cheaply as possible.  They also need to have two reliable 
transit providers in case one fails.  As long as their peering can 
cut over to transit if it fails, he points out that economics would 
seem to demand delivery of as much bandwidth by cheap peering as 
possible to cut down on the requirement for expensive transit 
bandwidth.

ISPs need to avoid local loop charges from their LECs and acquire 
their own back haul to an exchange for inexpensive peering and if 
possible a different exchange or exchanges for more reliable transit. 
In order to figure how to most cost effectively architect their 
networks they need to take and manipulate NetFlow samples of their 
traffic in order to identify potential new peers via a study of the 
traffic being delivered by their transit providers.  If they have 
automated tools to take samples from appropriate points, they can 
over time get clear pictures of how their traffic is evolving through 
actual NetFlow path analysis.

But Woodcock's colleagues seem to agree that he has done something 
unique.  He explains it in writing for the first time in this issue 
of the COOK Report.  Namely he does what he calls synthetic path 
analysis by tacking his actual path data and doing a series of what 
if transformations on that data.  With the help of Alex Tudor from 
Agilent labs he explains using actual data from January 31 2002 how 
this synthetic analysis can be applied so that for the first time an 
ISP, by plugging circuit cost data into its modeling software, can 
know how much it really does cost to deliver its bits.

These ideas are new. While our experts agreed that perhaps 100 ISPs 
may be doing some form of actual NetFlow data analysis, virtually no 
one except Woodcock had done the synthetic path analysis.  Avi 
Freedman in his position as Chief Network Scientist at Akamai has had 
ample occasion to use network routing and DNS to figure out data 
flows.  After studying Bill Woodcock's explanation found that he had 
evidence from his own related experience that indicated Bill's 
approach seemed valid. He points out that since 1999 he has been 
doing a what if analysis on Akamai flows similar to Woodcock's 
synthetic path analysis on router flows.

Our 50,000 word eight week long discussion involving 25 different 
people contains a quite interesting dialog between the Avi and Bill 
as they compare their approaches to the problem and conclude that the 
ideas appear to be valid. However, we must also point out that Bill's 
synthetic path analysis is not meant to be  the sole criterion on 
which to base peering and transit decisions.  Once they have 
identified potentially good peers, ISPs will find that factors of 
geography and costs of interconnection at various exchanges may 
become decisive factors in making their final decisions.

Although the largest carriers 

RE: ECN and ISOC: request for help...

2002-07-24 Thread Bill Strahm

I don't see why this is embarrasing.  I have no problems with people
setting up filtering rules that say DENY-ALL accept packets that I
EXPLICITLY know what every bit does, and I want to allow it...

That said, ECN is a relatively recent addition to the suite and I
wouldn't expect all firewalling rules to be setup to use it (I believe
that some of the bits involved have been used by other experimental
protocols for other things).  For this reason I don't think this
behavior is as bad or embarrassing as you think it is.  

Bill

-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]] On Behalf Of
Franck Martin
Sent: Tuesday, July 23, 2002 10:17 PM
To: 'Gary E. Miller'; Christian Huitema
Cc: ietf
Subject: RE: ECN and ISOC: request for help...


I'm not in a campaign to promote ECN, or anything... I'm saying that
ISOC web site is not reachable if you enable ECN, which RFC793(standard)
or RFC3168(proposed Standard) talk about.

I don't want to talk about what is a standard or what is not... What is
compliant or not...

Will there be anybody to volunteer and fix the routers leading to ISOC
web site, mailing lists, e-mail addresses and so on?

This is what my message is all about. Please IETF members in Washington
DC, Area, please give a call to ISOC and offer some help...

This is embarrassing, that's all

Cheers.

Franck Martin
Network and Database Development Officer
SOPAC South Pacific Applied Geoscience Commission
Fiji
E-mail: [EMAIL PROTECTED] mailto:[EMAIL PROTECTED] 
Web site: http://www.sopac.org/
http://www.sopac.org/ Support FMaps: http://fmaps.sourceforge.net/
http://fmaps.sourceforge.net/ 
Certificate: https://www.sopac.org/ssl/ 

This e-mail is intended for its addresses only. Do not forward this
e-mail without approval. The views expressed in this e-mail may not be
necessarily the views of SOPAC.



-Original Message-
From: Gary E. Miller [mailto:[EMAIL PROTECTED]]
Sent: Wednesday, 24 July 2002 3:02 
To: Christian Huitema
Cc: ietf
Subject: RE: ECN and ISOC: request for help...


Yo Christian!

Actually, RFC 3168 has nothing to do with it.  The issue is RFC 793.

RFC 793 is a Standard, not a Proposed Standard

RFC 793 lists the bits later used by ECN as Reserved.  Computer
programs are supposed to ignore Reserved bits unless they really know
what they are doing.

If a router treats bits in the header as required by the STANDARD RFC
793 then RFC 3168 will cause no harm.I do not have a copy of Baker
handy, but I bet it agrees.

RGDS
GARY

---
Gary E. Miller Rellim 20340 Empire Blvd, Suite E-3, Bend, OR 97701
[EMAIL PROTECTED]  Tel:+1(541)382-8588 Fax: +1(541)382-8676

On Tue, 23 Jul 2002, Christian Huitema wrote:

 So, if you are on a campaign to promote ECN, then maybe you should 
 first try to promote this specification to the next standard level... 
 You may also want to take a stab at revising the Requirements for IP 
 Version 4 Routers; the last edition, RFC 1812 by Fred Baker, dates 
 from June 1995.







RE: postings to ietf mailing lists

2002-06-12 Thread Bill Strahm

Can't say about other maillist software, but the software that runs the
@ietf.org lists allows this, you can subscribe from as many addresses as
you want, and only get mail sent to a single address...

This works well for people that can't control what their company does as
far as @foo.company.com where foo seems to change quite a bit...

Bill

-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]] On Behalf Of
[EMAIL PROTECTED]
Sent: Wednesday, June 12, 2002 5:31 AM
To: [EMAIL PROTECTED]
Subject: postings to ietf mailing lists

i have noticed that some ietf working groups don't anymore allow
postings except from addresses that have subscribed to the list.  this
not good unless there is a way to register another email address from
which postings are allowed.  the reason is that many people don't want
to get any mailing list traffic to their personal mail boxes and
therefore have subscribed an alias rather than their own personal email
address.

could it be made a policy of ietf mailing lists to include support for a
posting address that is not the same as subscription address?  some
mailing lists already do this, but not all.

-- juha





Re: IPR at IETF 54

2002-05-30 Thread Bill Strahm

On Thu, 30 May 2002, RJ Atkinson wrote:


 On Thursday, May 30, 2002, at 09:48 , Melinda Shore wrote:
  Here's one for starters: there's no guidance on how or whether to
  treat differences in licensing terms for competing proposals.  It
  would be nice to be able to say that all other things being more-or-
  less equal we should prefer technology which will be available
  royalty-free,

   Agree.

   My druthers would be to have an IETF policy explicitly saying that
 the first
 choice is to use unencumbered technology if it can be made to work,
 second choice
 is encumbered but royalty-free technology, and last choice is fair and
 reasonable
 licence terms (or whatever the equivalent correct legal wording might be
 for that last).

   And it would be good to have a conventional template for the
 royalty-free
 licence -- one that the IETF's legal counsel has reviewed and believes
 is acceptable
 for IETF purposes.
I disagree with this, I don't think the IETF can afford to keep a staff of
lawyers working on determining the licencing statements of all of the
standards being churned out.

That said, I don't think it would do any good anyway, lets say the IETF
lawyer gives his Okey Dokie, then my company implements the standard and a
problem with the licencing terms comes up... Who do I go sue, the IETF ???

I hope not, but that could be creating a legal liability for the IETF if
its lawyers make statements on the licencing terms of protocols...

Bill