[Ietf-dkim] Re: WG Action: Formed Mail Maintenance (mailmaint) / Commitment

2024-05-23 Thread Robert Raszuk
Hi John,

It is not that I am disparaging any individual commitment or open source -
not at all.

What I find bizarre is:

A) to commit to anything in the dark .. meaning before adopting as WG
document where the document and enclosed within itself protocol by design
could drastically change

B) to hold the original commit as a valuable promise and not to insist on
interoperable implementations instead.

Kind regards,
Robert




On Thu, May 23, 2024 at 9:21 PM John Scudder  wrote:

> Hi Robert,
>
> I see. What I most wanted to challenge in your message was the implication
> (reinforced in your note I’m replying to now) that the only meaningful
> contributions are made by “companies (vendors)”. I don't agree, nor do I
> agree that open source et al should be disparaged. I guess you don’t find
> that “convincing enough”; if so, we shall have to disagree on that.
>
> —John
>
> On May 23, 2024, at 3:07 PM, Robert Raszuk  wrote:
>
> Hi John,
>
> Yes I recall seeing this email, but it did not sound convincing enough to
> me.
>
> The fact that Mr X says "Oh in my spare time I will implement this" to me
> does not seem to be of any measurable value. At least not so much to put
> this as requirement for adoption in the WG charter.
>
> Much better would be what we do in IDR that the draft should not progress
> to IESG unless the proposed standard has been tried out in any interop
> testing and interop report has been posted on the wiki page.
>
> Thx a lot,
> R.
>
>
> On Thu, May 23, 2024 at 8:19 PM John Scudder  wrote:
>
>> Hi Robert,
>>
>> Your comments have already been addressed, most recently in Pete’s
>> message on Monday (
>> https://mailarchive.ietf.org/arch/msg/ietf/NAa6PvOvdPy8SmYtX1IxQ1Jj-pc/
>> <https://urldefense.com/v3/__https://mailarchive.ietf.org/arch/msg/ietf/NAa6PvOvdPy8SmYtX1IxQ1Jj-pc/__;!!NEt6yMaO-gk!GKul0z6xuuzCnKlxpocnxhnu24YTSPe-yezafWU4_EtT-3heNA9Ryz2zHMA3kexyMDBtot4BM2D-JQ$>).
>> To add, relative to your final paragraph about “hold responsible", there
>> are many parts of our process that rely in part on the expectation
>> participants will act in good faith, this would hardly be the first.
>>
>> —John
>>
>> On May 23, 2024, at 11:52 AM, Robert Raszuk  wrote:
>>
>> The reality in vast majority of companies (vendors) is that commitment to
>> implement something or not are no longer being driven by engineers.
>>
>> They are driven by marketing and product management teams who
>> rarely attend IETFs.
>>
>> And even if there some commitment today tomorrow based on new field
>> requirements it may change.
>>
>> With that I am really puzzled what this entire discussion is all about
>> and how anyone (presumably chairs) are going to hold responsible person X
>> for her or his "commitment to implement" (unless we are talking about hobby
>> implementations in some private code base or open source.
>>
>> Thx,
>> R.
>>
>>
>>
>>
>>
>> On Thu, May 23, 2024 at 4:59 PM Dave Crocker  wrote:
>>
>>> On 5/21/2024 9:48 AM, Murray S. Kucherawy wrote:
>>> > Before diving into this thread, I think it's important to underscore
>>> > that we're not taking anything away here.
>>>
>>> The premise of that assertion is that having this working group will not
>>> alter the decision-making by those managing the other paths.  Given
>>> human nature, that seems optimistic, at best.
>>>
>>>
>>> > The only constraint being established is: If you want this particular
>>> > working group to process your work, there's a specific minimum you
>>> > need to meet.
>>>
>>> And that minimum is both onerous and, as formal charter requirements,
>>> lacking any historical precedence in the IETF.
>>>
>>> d/
>>>
>>> --
>>> Dave Crocker
>>> Brandenburg InternetWorking
>>> bbiw.net
>>> <https://urldefense.com/v3/__http://bbiw.net__;!!NEt6yMaO-gk!GFF-Xpl7WNYMmXdLazOIdEVSW9KL6Xm09CiJknmnTsLxtfXC3LtsMJQ9a9clI1i1sEcaD8iZEfE_fg$>
>>> mast:@dcrocker@mastodon.social
>>>
>>>
>>
>
___
Ietf-dkim mailing list -- ietf-dkim@ietf.org
To unsubscribe send an email to ietf-dkim-le...@ietf.org


[Ietf-dkim] Re: WG Action: Formed Mail Maintenance (mailmaint) / Commitment

2024-05-23 Thread Robert Raszuk
Hi John,

Yes I recall seeing this email, but it did not sound convincing enough to
me.

The fact that Mr X says "Oh in my spare time I will implement this" to me
does not seem to be of any measurable value. At least not so much to put
this as requirement for adoption in the WG charter.

Much better would be what we do in IDR that the draft should not progress
to IESG unless the proposed standard has been tried out in any interop
testing and interop report has been posted on the wiki page.

Thx a lot,
R.


On Thu, May 23, 2024 at 8:19 PM John Scudder  wrote:

> Hi Robert,
>
> Your comments have already been addressed, most recently in Pete’s message
> on Monday (
> https://mailarchive.ietf.org/arch/msg/ietf/NAa6PvOvdPy8SmYtX1IxQ1Jj-pc/).
> To add, relative to your final paragraph about “hold responsible", there
> are many parts of our process that rely in part on the expectation
> participants will act in good faith, this would hardly be the first.
>
> —John
>
> On May 23, 2024, at 11:52 AM, Robert Raszuk  wrote:
>
> The reality in vast majority of companies (vendors) is that commitment to
> implement something or not are no longer being driven by engineers.
>
> They are driven by marketing and product management teams who
> rarely attend IETFs.
>
> And even if there some commitment today tomorrow based on new field
> requirements it may change.
>
> With that I am really puzzled what this entire discussion is all about and
> how anyone (presumably chairs) are going to hold responsible person X for
> her or his "commitment to implement" (unless we are talking about hobby
> implementations in some private code base or open source.
>
> Thx,
> R.
>
>
>
>
>
> On Thu, May 23, 2024 at 4:59 PM Dave Crocker  wrote:
>
>> On 5/21/2024 9:48 AM, Murray S. Kucherawy wrote:
>> > Before diving into this thread, I think it's important to underscore
>> > that we're not taking anything away here.
>>
>> The premise of that assertion is that having this working group will not
>> alter the decision-making by those managing the other paths.  Given
>> human nature, that seems optimistic, at best.
>>
>>
>> > The only constraint being established is: If you want this particular
>> > working group to process your work, there's a specific minimum you
>> > need to meet.
>>
>> And that minimum is both onerous and, as formal charter requirements,
>> lacking any historical precedence in the IETF.
>>
>> d/
>>
>> --
>> Dave Crocker
>> Brandenburg InternetWorking
>> bbiw.net
>> <https://urldefense.com/v3/__http://bbiw.net__;!!NEt6yMaO-gk!GFF-Xpl7WNYMmXdLazOIdEVSW9KL6Xm09CiJknmnTsLxtfXC3LtsMJQ9a9clI1i1sEcaD8iZEfE_fg$>
>> mast:@dcrocker@mastodon.social
>>
>>
>
___
Ietf-dkim mailing list -- ietf-dkim@ietf.org
To unsubscribe send an email to ietf-dkim-le...@ietf.org


[Ietf-dkim] Re: Fwd: WG Action: Formed Mail Maintenance (mailmaint) / Commitment

2024-05-23 Thread Robert Raszuk
The reality in vast majority of companies (vendors) is that commitment to
implement something or not are no longer being driven by engineers.

They are driven by marketing and product management teams who rarely attend
IETFs.

And even if there some commitment today tomorrow based on new field
requirements it may change.

With that I am really puzzled what this entire discussion is all about and
how anyone (presumably chairs) are going to hold responsible person X for
her or his "commitment to implement" (unless we are talking about hobby
implementations in some private code base or open source.

Thx,
R.





On Thu, May 23, 2024 at 4:59 PM Dave Crocker  wrote:

> On 5/21/2024 9:48 AM, Murray S. Kucherawy wrote:
> > Before diving into this thread, I think it's important to underscore
> > that we're not taking anything away here.
>
> The premise of that assertion is that having this working group will not
> alter the decision-making by those managing the other paths.  Given
> human nature, that seems optimistic, at best.
>
>
> > The only constraint being established is: If you want this particular
> > working group to process your work, there's a specific minimum you
> > need to meet.
>
> And that minimum is both onerous and, as formal charter requirements,
> lacking any historical precedence in the IETF.
>
> d/
>
> --
> Dave Crocker
> Brandenburg InternetWorking
> bbiw.net
> mast:@dcrocker@mastodon.social
>
>
___
Ietf-dkim mailing list -- ietf-dkim@ietf.org
To unsubscribe send an email to ietf-dkim-le...@ietf.org


Re: Draft IESG Statement on Removal of an Internet-Draft from the IETF Web Site

2012-09-09 Thread Robert Raszuk



Note - I don't agree that past IDs should be posted after expiration
without the author's consent. They were submitted with that
understanding, and post-facto changing it by the IETF is not appropriate.


I would rephrase the above as whether it is appropriate to take
someone's work and post it as your own or use the work.  For the former,
I don't think it is appropriate.  For the latter, the author has given
the IETF change control over the work.  I'll ignore the exceptions.
That does not mean that the author should not be credited for the work.
If I am not mistaken it is IETF practice to do so.


Actually regarding reusing the former drafts we have been discussing 
this in 2008 at depth when one draft reused most of the text of another 
draft.


The end result was that technically and legally it is appropriate. 
Reference section 3.3 of BCP78 / RFC5378.


However while the above documents do not mandate it I very much agree 
that it is in good taste to first ping the original authors about your 
intentions to extend and build on top of their idea.


R.




Re: IETF 92 in Dallas!

2012-08-17 Thread Robert Raszuk

Hi Bob,

Is there any way to broaden the scope of IAOC choice and provide the 
candidate locations which would meet IETF criteria by any IETF member ?


For example once I know the criteria I could check around in Poland to 
see if there is any place which would satisfy the future IETF venue.


I am sure friends from South America would be glad to conduct similar 
local research in their neighborhood. So would others from other 
continents.


Are the criteria for IETF meetings published or is this some sort of top 
secret (for example how much the venue may cost) ?


Could we all contribute via a wiki page ? Could we make the IETF choice 
of location an open process ?


Thx,
R.



Arturo,

[Reducing the cc: list to just the IETF and IAOC lists]

The IAOC seriously investigated a venue in South America for IETF92,
but based on the data we collected it did not meet the criteria for
IETF meetings.  We are continuing to talk with the group that
suggested the venue and are also looking at other venues in that
region for future meetings.

We have open meeting slots in 2015-2017.

Bob IAOC Chair


Re: IETF 92 in Dallas!

2012-08-17 Thread Robert Raszuk


 Hotel contracts by their nature need to be negotiated under mutual
 NDA unless you want all the vendors in the region to mysteriously
 arrive at the same lower bound.

All hotel rates are wide open and published on IETF web page. It's an 
interesting NDA which permits open disclosure ;-)


Besides hotel is least worry as we do know the IETF rates for the last 
few years and it is quite easy to check with any hotel if they are 
willing to meet those targets or not.


R.



On 8/17/12 12:05 PM, Robert Raszuk wrote:

Hi Bob,

Is there any way to broaden the scope of IAOC choice and provide the
candidate locations which would meet IETF criteria by any IETF member ?

For example once I know the criteria I could check around in Poland to
see if there is any place which would satisfy the future IETF venue.

I am sure friends from South America would be glad to conduct similar
local research in their neighborhood. So would others from other
continents.

Are the criteria for IETF meetings published or is this some sort of
top secret (for example how much the venue may cost) ?

Could we all contribute via a wiki page ? Could we make the IETF
choice of location an open process ?

Hotel contracts by their nature need to be negotiated under mutual NDA
unless you want all the vendors in the region to mysteriously arrive at
the same lower bound.






Re: Basic ietf process question ...

2012-08-03 Thread Robert Raszuk

Hello Brian,


That's an enormous leap that I just don't understand. Most protocols don't
need that sort of configuration complexity.


H I am of the opinion that most protocols requires configuration. I 
am also of the opinion that each vendor chooses an original way to 
configure their network elements.


Therefor if you do not define up front a standard based of configuring 
given routing protocol you will end up with exactly what we have today 
.. zoo of various different CLI commands to enable the exact same 
protocol across more then one vendor box.


Are you saying that this is ok ?

Or are you saying that there is simpler way to enable netconf based 
unified way to configure protocols and services on your network other 
then providing per component xml schema with subsequent schema 
extensions as part of IETF standardization process ?


To make it a bit more explicit ... do you really need to study 5 user 
manuals or google 5 times to enable IGP or BGP or even configure NTP 
across 5 different router OS running in your network ???


 Again: no problem with creating XML schemata where they are useful.
 But making them mandatory would be just as bad as making MIB modules
 mandatory, IMHO.

Aha .. so you are saying that MIBs are not mandatory  Very 
interesting. So I guess SSH to the routers and box by box cli 
provisioning is here to stay for a while I think :(


Best regards,
R.




Re: [OPSAWG] Basic ietf process question ...

2012-08-03 Thread Robert Raszuk

Hi Juergen,

Many thx for the great suggestion !

However perhaps you are much more knowledgeable in that area and could 
recommend which model fit the best the requirement to standardize 
configuration of any new protocol or protocol extension at least in the 
space of routing and routing protocols or services being based on them ?


As you know the current IRS framework driven by junisco is trying to 
come with common API to the routing system agreed across vendors. This 
is great as attempts never happened in the past.


But if we are at this phase I think creating a network elements 
abstraction layer and be able to configure/monitor any protocol and 
service at the unified way is one of the building blocks we should start 
with. And of course I think this is very clear to everyone if it is not 
made mandatory in each draft as new section or appendix it is just not 
going to happen in practice.


Best regards,
R.


On Fri, Aug 03, 2012 at 09:22:10AM +0200, Robert Raszuk wrote:


Aha .. so you are saying that MIBs are not mandatory  Very
interesting. So I guess SSH to the routers and box by box cli
provisioning is here to stay for a while I think :(



Robert,

you may want to take a closer look at the data models currently being
defined in the NETMOD working group. Please review them and send any
comments.

/js





Basic ietf process question ...

2012-08-02 Thread Robert Raszuk

All,

IETF documents have number of mandatory sections .. IANA Actions, 
Security Considerations, Refs, etc ...


Does anyone have a good reason why any new protocol definition or 
enhancement does not have a build in mandatory XML schema section 
which would allow to actually use such standards based enhancement in 
vendor agnostic way ?


There is a lot of talk about reinventing APIs, building network wide OS 
platform, delivering SDNs (whatever it means at any point of time for 
one) ... but how about we start with something very basic yet IMHO 
necessary to slowly begin thinking of network as one plane.


I understand that historically we had/still have SNMP however I have 
never seen this being mandatory section of any standards track document. 
Usually SNMP comes 5 years behind (if at all) making it obsolete by design.


NETCONF is great and very flexible communication channel for 
provisioning. However it is sufficient to just look at number of ops 
lists to see that those who tried to use it quickly abandoned their 
efforts due to complete lack of XML schema from each vendor they happen 
to use or complete mismatch of vendor to vendor XML interpretation.


And while perhaps this is obvious I do not think that any new single 
effort will address this. This has to be an atomic and integral part of 
each WG's document.


Looking forward for insightful comments ...

Best,
R.




Re: Basic ietf process question ...

2012-08-02 Thread Robert Raszuk

Hi Dan,

 We should be talking
 nowadays about a toolset rather than one tool that fits all.

Just to clarify what I asked about .. I am not looking for a single tool 
or single protocol to be used to configure everything.


I am asking for small building block like xml schema (or something 
similar) to be part of each new IETF proposal or protocol change. IMHO 
only that can allow any further more fancy abstractions and tools to be 
build and used in practice.


Best regards,
R.




Hi,

The OPSAWG/OPSAREA open meeting this afternoon has an item on the agenda
concerning the revision of RFC1052 and discussing a new architecture for
management protocols.


My personal take is that no one protocol, or one data modeling language
can match the operational requirements to configure and manage the wide
and wider range of hosts, routers and other network devices that are
used to implement IP networks and protocols. We should be talking
nowadays about a toolset rather than one tool that fits all. However,
this is a discussion that just starts.

Regards,

Dan





-Original Message-
From: ietf-boun...@ietf.org [mailto:ietf-boun...@ietf.org] On Behalf

Of

Robert Raszuk
Sent: Thursday, August 02, 2012 7:25 PM
Cc: ietf@ietf.org
Subject: Basic ietf process question ...

All,

IETF documents have number of mandatory sections .. IANA Actions,
Security Considerations, Refs, etc ...

Does anyone have a good reason why any new protocol definition or
enhancement does not have a build in mandatory XML schema section
which would allow to actually use such standards based enhancement in
vendor agnostic way ?

There is a lot of talk about reinventing APIs, building network wide

OS

platform, delivering SDNs (whatever it means at any point of time for
one) ... but how about we start with something very basic yet IMHO
necessary to slowly begin thinking of network as one plane.

I understand that historically we had/still have SNMP however I have
never seen this being mandatory section of any standards track

document.

Usually SNMP comes 5 years behind (if at all) making it obsolete by
design.

NETCONF is great and very flexible communication channel for
provisioning. However it is sufficient to just look at number of ops
lists to see that those who tried to use it quickly abandoned their
efforts due to complete lack of XML schema from each vendor they

happen

to use or complete mismatch of vendor to vendor XML interpretation.

And while perhaps this is obvious I do not think that any new single
effort will address this. This has to be an atomic and integral part

of

each WG's document.

Looking forward for insightful comments ...

Best,
R.









Re: Basic ietf process question ...

2012-08-02 Thread Robert Raszuk

Hi Brian,

Perhaps we understand a different thing by xml schema As example what 
I had in mind when asking this question was the example from Appendix 
A of http://tools.ietf.org/html/draft-marques-l3vpn-schema-00 where 
while perhaps not yet complete it does provide decent representation of 
one of the popular service today.


That's what I had mind asking why such appendix isn't a mandatory part 
of each new protocol extension.


It has very little to do with Web Services you may be referring to.

Many thx,
R.


I think anyone with intimate experience of the Web Services standards
experiment (trying to use XML as if it was a Turing machine) would have
extreme doubts about any proposal to impose such a requirement.

It was not for no reason that many people came to refer to the Web
Services family of standards as WS-splat. The words small and
xml schema don't really belong together,

Regards
Brian Carpenter

On 02/08/2012 18:12, Robert Raszuk wrote:

Hi Dan,


We should be talking
nowadays about a toolset rather than one tool that fits all.


Just to clarify what I asked about .. I am not looking for a single tool
or single protocol to be used to configure everything.

I am asking for small building block like xml schema (or something
similar) to be part of each new IETF proposal or protocol change. IMHO
only that can allow any further more fancy abstractions and tools to be
build and used in practice.

Best regards,
R.




Hi,

The OPSAWG/OPSAREA open meeting this afternoon has an item on the agenda
concerning the revision of RFC1052 and discussing a new architecture for
management protocols.


My personal take is that no one protocol, or one data modeling language
can match the operational requirements to configure and manage the wide
and wider range of hosts, routers and other network devices that are
used to implement IP networks and protocols. We should be talking
nowadays about a toolset rather than one tool that fits all. However,
this is a discussion that just starts.

Regards,

Dan





-Original Message-
From: ietf-boun...@ietf.org [mailto:ietf-boun...@ietf.org] On Behalf

Of

Robert Raszuk
Sent: Thursday, August 02, 2012 7:25 PM
Cc: ietf@ietf.org
Subject: Basic ietf process question ...

All,

IETF documents have number of mandatory sections .. IANA Actions,
Security Considerations, Refs, etc ...

Does anyone have a good reason why any new protocol definition or
enhancement does not have a build in mandatory XML schema section
which would allow to actually use such standards based enhancement in
vendor agnostic way ?

There is a lot of talk about reinventing APIs, building network wide

OS

platform, delivering SDNs (whatever it means at any point of time for
one) ... but how about we start with something very basic yet IMHO
necessary to slowly begin thinking of network as one plane.

I understand that historically we had/still have SNMP however I have
never seen this being mandatory section of any standards track

document.

Usually SNMP comes 5 years behind (if at all) making it obsolete by
design.

NETCONF is great and very flexible communication channel for
provisioning. However it is sufficient to just look at number of ops
lists to see that those who tried to use it quickly abandoned their
efforts due to complete lack of XML schema from each vendor they

happen

to use or complete mismatch of vendor to vendor XML interpretation.

And while perhaps this is obvious I do not think that any new single
effort will address this. This has to be an atomic and integral part

of

each WG's document.

Looking forward for insightful comments ...

Best,
R.















Re: Basic ietf process question ...

2012-08-02 Thread Robert Raszuk

Hi Joe,

Many thx for your comments.

Perhaps my intentions were not very well described. Personally I am not 
that much stuck on plain XML schema .. it could be expressed in any 
language IETF would choose to use. The point is not how to do it .. but 
to do it at the moment of bringing new protocol extension.


However for years the same functionality is completely different to 
configure using one vendor from other vendor (leave alone that even 
within single vendor there are complete different UIs to provision the 
same knob).


If anyone is even remotely serious about some form of common network OS 
IMHO the first step is to create unified configuration abstraction. The 
xml schema for each proto extension would be just a standard based API 
for configuration input.


Keep in mind that today routers are configured by scripts from central 
management clusters where there are tons of templates which in fact 
completely differ from vendor to vendor and their maintenance and 
keeping them up to date is a real pain.


Regards,
R.



On 8/2/12 9:25 AM, Robert Raszuk rob...@raszuk.net wrote:


Does anyone have a good reason why any new protocol definition or
enhancement does not have a build in mandatory XML schema section
which would allow to actually use such standards based enhancement in
vendor agnostic way ?


For docs that use XML, requiring some form of schema makes sense.
However, what we're finding at the application layer is that often times
using JSON (see RFC 4627) ends up with better interoperability more
quickly than using XML, except in the case of human-readable content like
marked-up text.  See RFC 6120, Appendix A (http://goo.gl/CBv8G) for
another example.

For those that insist on XML, RelaxNG (http://goo.gl/MYnB1) is another
language you can use to describe your XML, which is a little easier to
learn than XSD.

However, for implementors, if you start with the schema and blindly use it
for conformance checking of real-world traffic, you are likely to have
both performance and extensibility issues in practice.

If folks at other layers in the stack would like input from Apps folks,
I'm sure that we would be happy to share our lessons learned.  Join
apps-discuss (http://goo.gl/0Otjv) and ask for help.





ipad/android ietf stay current tool ...

2012-07-09 Thread Robert Raszuk


Apologies if this is too simple question, but is there any tool for ipad 
and/or android which would allow me to download for offline reading all 
ietf/irtf drafts submitted between any two dates ?


Ideally it would be great to also be able to filter by version or by 
string in the name to stay current on a given WG efforts or some 
specific document.


Just checking for prior art before even considering doing it myself ;)

Many thx,
R.


Re: Is the IETF aging?

2012-04-27 Thread Robert Raszuk

Hi John,

Who proposes does !

Can't wait to see you in Vancouver ;)

Cheers,
R.


Maybe we would do better if we required attendees to dress as furries.  Their 
conventions seem to attract a younger crowd.

Sent from my iPhone





Fwd: IETF attendees reengineer their hotel's Wi-Fi network

2012-03-29 Thread Robert Raszuk

Hi Wes,

Could we perhaps add a section to your draft 
(draft-george-travel-faq-05.txt) on how to fix wifi network in the hotel 
you are staying ?


Pointer to set of open source wifi troubleshooting tools would be 
welcome too ;)


Cheers,
R.

 Original Message 
Subject: IETF attendees reengineer their hotel's Wi-Fi network
Date: Thu, 29 Mar 2012 17:28:26 -0400
From: Russ Housley hous...@vigilsec.com
To: IETF ietf@ietf.org

Disgusted IETF attendees reengineer their Paris hotel's Wi-Fi network
What happens when a bunch of IETF super nerds show up in Paris for a 
major conference and discover their hotel's Wi-Fi network has imploded?


http://newsletters.networkworld.com/t/6464858/258923304/355639/0/





Re: Issues relating to managing a mailing list...

2012-03-14 Thread Robert Raszuk

Hello Russ,

IMHO this is a great idea and I fully support it's deployment asap. It 
is well overdue one too not only in IETF but in many other mailing lists 
in the community.


--

The only few maybe too detailed at this point questions:

- what would be (if not infinity) the expiration data of such attachment 
repository ?


- what would be the automated interface to periodically sync such 
repository on a per WG group to a local space ?


- would email contain full link or just a url short cut ?

- would the document as attachments be google indexed and fully searchable ?

- what attachment formats would be supported ?

Regards,
R.


Some suggestions have been made about the IETF mail lists.
There is a way for mailman to strip attachments and put them
in a place for downloading with a web browser.  This would be
a significant change to current practice, so the community
needs to consider this potential policy change.

What do you think?

Russ


Re: Last Call: draft-ietf-sidr-rpki-rtr-19.txt (The RPKI/RouterProtocol) to Proposed Standard

2011-12-23 Thread Robert Raszuk

Steven,

If the cache is within your domain the below sentence does not apply as 
you are not validating your IGP routes to bootstrap a router's 
reachability to a cache.


If the cache would be outside of your domain this sentence would apply 
as you would require to accept and install some set of essentially NOT 
FOUND routes to reach the cache.


Therefor if authors of draft-ietf-sidr-rpki-rtr-XX are really serious 
about recommending to keep the cache locally within each domian the 
below sentence you are quoting should be fixed or removed.


Rgs,
R.


Let me call attention to this sentence, too:


  It also SHOULD be
  topologically close so that a minimum of validated routing data
  are needed to bootstrap a router's access to a cache.



That is, there are other, quite important, reasons to keep the cache
very close to the router(s) it serves.

--Steve Bellovin, https://www.cs.columbia.edu/~smb


___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-ietf-sidr-rpki-rtr-19.txt (The RPKI/RouterProtocol) to Proposed Standard

2011-12-23 Thread Robert Raszuk

Hello Steven,

 The same principles apply here.  Given the desire to bootstrap secure
 routing, we concluded that most ISPs would rely on local -- very local
 -- caches.  In fact, I suspect that many, especially large ones, would
 want a cache per POP.

The fact that you say we concluded is indeed very interesting. I 
wonder how much real ISPs and SPs have contributed to this conclusion. 
To the extend I was part of those discussions I saw very little to none.


 Given this, and given the reality of available platforms, we had to
 make a decision.  The usage model suggests that the risk is low;
 the capabilities of the platforms suggest that we couldn't actually
 get the security we wanted,

Sorry to say this today but I think that you got the deployment model 
wrong which directly translates into platforms you are performing the 
actual validation on. I recall feedback from operators in the early 
stages of the design which suggest that validation could be done in few 
places of the domain then security applied p2mp once wrong route is 
detected.


Contrary you went and recommended upgrade of each ASBR. This is pure 
fantasy. There are IETF drafts by vendors who say black on white that 
some of their products will not get any new features in. That means that 
as long as this equipment is running basic origin validation will not 
get deployed.


When I sit and look from the perspective of both vendor and operator I 
do wonder what is the real goal here.


Last you still have not commented on the applicability of the statement 
you quoted. What is it actually saying considering no validation for IGP 
routes nor IBGP routes if anyone would like to carry it's internal 
reachability subnets within ibgp.


Happy Holidays !
R.



Let me clarify what I said (and include context that I should have
put in my earlier note).

Security mechanisms are not designed in a vacuum.  One has to consider
the users, the threats, and the usage scenarios.  To take an absurd
example, while I can do Caesar ciphers in my head I'm quite incapable
of mental exponentiations of 2048-bit numbers; accordingly, I'm forced
to trust a computer to do those for me.  On the other hand, if I'm
trying to protect a secret from a first grader who has just learned
how to read, a Caesar cipher may be all I need.

The same principles apply here.  Given the desire to bootstrap secure
routing, we concluded that most ISPs would rely on local -- very local
-- caches.  In fact, I suspect that many, especially large ones, would
want a cache per POP.

You're quite correct that this implies no validation of IGP routes.
That's by intent -- the very first sentence of the abstract states
that RPKI is intended to validate BGP routes.  (If you have outsiders
sending your internal routes into your IGP via BGP, you have bigger
problems that RPKI can fix...)

Given this, and given the reality of available platforms, we had to
make a decision.  The usage model suggests that the risk is low;
the capabilities of the platforms suggest that we couldn't actually
get the security we wanted, just like I can't do mental RSA (at least
until I get that brain chip implanted).

On Dec 23, 2011, at 5:44 36AM, Robert Raszuk wrote:


Steven,

If the cache is within your domain the below sentence does not apply as you are 
not validating your IGP routes to bootstrap a router's reachability to a cache.

If the cache would be outside of your domain this sentence would apply as you would 
require to accept and install some set of essentially NOT FOUND routes to 
reach the cache.

Therefor if authors of draft-ietf-sidr-rpki-rtr-XX are really serious about 
recommending to keep the cache locally within each domian the below sentence 
you are quoting should be fixed or removed.

Rgs,
R.


Let me call attention to this sentence, too:


  It also SHOULD be
  topologically close so that a minimum of validated routing data
  are needed to bootstrap a router's access to a cache.



That is, there are other, quite important, reasons to keep the cache
very close to the router(s) it serves.

--Steve Bellovin, https://www.cs.columbia.edu/~smb






--Steve Bellovin, https://www.cs.columbia.edu/~smb









___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-ietf-sidr-rpki-rtr-19.txt (The RPKI/RouterProtocol) to Proposed Standard

2011-12-22 Thread Robert Raszuk

Hi Tom,


The question of where the servers would be located, locally or somewhere out on
the Internet, was raised during the development of this document and the answer
was, we do not know; so I think that if you only regard it as secure when only
an internal network is involved, then that needs calling out in the Security
Considerations.


Let me observe that significant number of internal networks these days 
go over third party unencrypted or unsecured to the desired level VPNs.


So is it ok to state that a network which consists of N sites all with 
external EBGP feed while being interconnected by L3VPN could use single 
cache residing only in one site ?


Thx,
R.

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-ietf-sidr-rpki-rtr-19.txt (The RPKI/Router Protocol) to Proposed Standard

2011-12-21 Thread Robert Raszuk

Hi,

I think this is great news that two vendors are shipping a pre-standard 
implementations and are willing to produce implementation survey on it.


However I do support both Danny's and Shane's concerns.

In addition I have already voiced my own concern that current scenario 
only discusses one particular deployment model where all edge ASBRs 
perform validation and that the validation data comes from local caches.


IMHO this is way too limited model for any practical deployment of BGP 
Origin Validation.


Best regards,
R.


Folks,

I like to voice my support (on behalf of Cisco Systems) as well. Cisco
Systems has recently shipped RPKI Router protocol implementation (in IOS
software release).

Our implementation has been tested with two different RPKI cache
implementations (RIPE, RPKI.NET) and is currently going through lab tests
with our customers.

We are also in process of writing an implementation survey for this
protocol.

Regards,
Keyur

On 12/20/11 11:27 PM, Hannes Gredlerhan...@juniper.net  wrote:


hi,

hereby i want to declare (by myself and on behalf of Juniper Networks Inc.),
support for the the rpki-rtr protocol. Juniper Networks Inc. has got an
implementation
of the protocol based on, draft-ietf-sidr-rpki-rtr-19. Our implementation
passed interop testing with 3 different rpki caches (BBN, RIPE, ISC) and got
a exposure to a couple of our tier-1 SP customers for labe test purposes.

thanks !

/hannes

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-ietf-sidr-rpki-rtr-19.txt (The RPKI/Router Protocol) to Proposed Standard

2011-12-14 Thread Robert Raszuk


Let me observe that there could be middle ground to both sides here.

While I am very well aware that few of the commercial routers support 
inline origin validation and rpki-rtr protocol to retrieve the abstract 
of RPKI data needed for validation it seems also very clear that this is 
just one possible deployment model.


Let's observe that there are going to be orders of magnitude more BGP 
implementations which will never get the BGP origin validation code into 
their branches yet which will still happily run in many production 
networks for years to come which may be a significant obstacle to the 
deployment of this functionality.


Therefor I would consider an alternative deployment model where the 
validation happens (even if a bit delayed) at few distributed BGP prefix 
validators around given AS then the outcome of such validation is 
distributed in the form of BGP policy configuration (via Netconf) to all 
legacy BGP speakers.


While perhaps risking to say unpopular comment my personal preference 
would be for the latter deployment model. With this in mind I do agree 
with Shane that in general IETF should try to reuse existing protocols 
to accomplish the goals by recommending such deployment models which 
allow one to do so rather then keep inventing more and more protocols to 
address point solutions.


Best,
R.


I am not sure if this is an architectural misunderstanding V a red
herring.

As you say, NetConf is for *configuring* routers.  RPKI-rtr is not used
for router configuration, but rather dynamic data, a la IS-IS or BGP.
In fact, the RPKI-rtr payload data go into the same data structure as
the BGP data.

Of course, the configuration of the RPKI-rtr relationship to cache(s) is
router configuration, similar to configuring BGP peers, and presumably
can be done by NetConf on those platforms which support NetConf.

Bottom line: NetConf 'replaces' the CLI, not BGP.

FWIW, two or three years ago, not wanting to reinvent the wheel, we
looked at NetConf-style payload packaging.  After all, Bert and I
chartered NetConf back in the day.  I still owe a dinner to the two
NetConf folk who helped try.  Unfortunately the mismatch was
non-trivial, though nowhere near the mismatch of DNSsec, at which we
also looked (as the Tonys and I had published in 1998, Lutz in 2006,
etc., of which I presume you are unaware).

When we evaluated the data bloat for NetConf-style packaging we were not
cheered.  While probably not important for a CLI replacement, for a
continuous dynamic protocol the overhead of unpacking XML and decoding
the contained ASCII payload drew unhappy whining from the router
hackers.

NetConf is not ideal for a long-session back-and-forth protocol, with
RPKI-rtr's serial number exchange which leaves the router in control of
the exchanges and enables incremental update of the data.  You *really*
do not want the cache to send the full data set to the router every
time.  And you definitely do not want a cache trying to keep track of
the state of O(100) router clients which may or may not still think they
are its friend.

And, sadly, NetConf is not available on significant platforms where
RPKI-rtr is already running today.

So, all in all, being lazy, of course we tried.  But it was not a good
fit.  Of course, if you want to have a go at it, I am sure we would be
willing to at least kibitz.  But first you might want to talk to the
vendors who have already implemented RPKI-rtr to see if they would be
willing to re-code.

randy
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf




___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: IETF 82 Audio Streaming

2011-11-02 Thread Robert Raszuk

Hi Martin,

I was just typing the same - you have beaten me. Amazing thread btw.

If your security paranoia exceeds the threshold just use local VM on 
your machine and get over the applet horror. The hibernated VM as a 
matter of fact may start faster then an applet ;)


Lorenzo - great work !

Cheers,
R.


Randy Bush wrote:



For general remote participation including meetecho support see:


meetecho seems to require me to let a java applet have its way with my
machine.  fat frelling chance.  does the ietf really want to recommend
such a practice?


Folks who upload slides to the datatracker for the IETF Meeting
in PowerPoint format are worse than the metecho Java applet.  A Java applet
will work with most Linux LiveCDs within a throw-away virtual machine.

PowerPoint slides regularly require a real Microsoft Windows with a
PowerPoint viewer, and while the PowerPoint viewer might be free,
the underlying Microsoft Windows is not free.
I would really prefer when folks would be using one of those free PDF
printer drivers (e.g. doPDF) to convert their slides to PDF, so that
the consumer of this has more options available (preconfigured ones
and license-free ones).

-Martin
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf




___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Requirement to go to meetings

2011-10-24 Thread Robert Raszuk



get real here.  we want global participation.  the world is big and the
world is round.  you gonna pay for it with jet lag, con calls at weird
hours, or both.


Or none ... there is simple solution like meeting recording, but for 
some reason IETF proceedings are very crappy in linking wg meetings to 
their recordings (if at all available).


Example: Quebec City ISIS WG meeting

http://www.ietf.org/proceedings/81/isis.html

3 drafts presented ... looking at link to audio there is zoo of mp3 
without even containing the name of wg in their filename:


http://www.ietf.org/audio/ietf81/

Can one perhaps take an action to improve this starting Taipei ?

Best,
R.

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-kompella-l2vpn-l2vpn-07.txt (Layer 2 Virtual Private Networks Using BGP for Auto-discovery and Signaling) to Informational RFC

2011-09-01 Thread Robert Raszuk
Hi,

I support adoption and publishing draft-kompella-l2vpn-l2vpn-07.txt as
informational RFC. Using BGP for auto-discovery and signalling of L2VPNs
is by all means a right approach.

The draft also makes it very clear that underlying transport is opaque
and allows to use any form of encapsulation for PE-PE data exchange.

In that light I would not recommend to make any references in it to
RFC4447 and treat both specs as fully independent and unreleated documents.

Best regards,
R.

 Speaking as an individual, the solution in this draft has been has been
 operationally deployed in a number of service provider networks, and it
 should be documented in an informational RFC.
 
 Speaking as PWE3 co-chair, I would be happier if this draft required that
 routers that implement this solution also implement RFC 4447, that RFC 4447
 be configured as the default mechanism for pseudowire signaling, and that
 RFC 4447 was moved from an informational to a normative reference. In
 practice, I know that routers that implement this also do implement RFC
 4447, but I would like to see it in the RFC as well.
 
 Thanks,
 Andy
 
 Subject: Last Call: (Layer 2 Virtual Private Networks Using BGP for
 Auto-discovery and Signaling) to Informational RFC  Date: Tue, 30 Aug 2011
 10:50:05 -0700  From: The IESG 
 iesg-secret...@ietf.orgiesg-secret...@ietf.org  Reply-To:
 ietf@ietf.org  To: IETF-Announce 
 ietf-annou...@ietf.orgietf-annou...@ietf.org

 The IESG has received a request from an individual submitter to consider
 the following document:
 - 'Layer 2 Virtual Private Networks Using BGP for Auto-discovery and
Signaling'
   draft-kompella-l2vpn-l2vpn-07.txt as an Informational RFC

 The IESG plans to make a decision in the next few weeks, and solicits
 final comments on this action. Please send substantive comments to 
 thei...@ietf.org mailing lists by 2011-09-27. Exceptionally, comments may be
 sent to i...@ietf.org instead. In either case, please retain the
 beginning of the Subject line to allow automated sorting.

 Abstract


Layer 2 Virtual Private Networks (L2VPNs) based on Frame Relay or ATM
circuits have been around a long time; more recently, Ethernet VPNs,
including Virtual Private LAN Service, have become popular.
Traditional L2VPNs often required a separate Service Provider
infrastructure for each type, and yet another for the Internet and IP
VPNs.  In addition, L2VPN provisioning was cumbersome.  This document
presents a new approach to the problem of offering L2VPN services
where the L2VPN customer's experience is virtually identical to that
offered by traditional Layer 2 VPNs, but such that a Service Provider
can maintain a single network for L2VPNs, IP VPNs and the Internet,
as well as a common provisioning methodology for all services.




 The file can be obtained 
 viahttp://datatracker.ietf.org/doc/draft-kompella-l2vpn-l2vpn/

 IESG discussion can be tracked 
 viahttp://datatracker.ietf.org/doc/draft-kompella-l2vpn-l2vpn/


 The following IPR Declarations may be related to this I-D:

http://datatracker.ietf.org/ipr/1149/



 ___
 IETF-Announce mailing 
 listIETF-Announce@ietf.orghttps://www.ietf.org/mailman/listinfo/ietf-announce


 

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: [v6ops] draft-ietf-v6ops-6to4-to-historic

2011-07-05 Thread Robert Raszuk

Very well said Lorenzo.

+1

Unless Ron describes exactly one by one real reasons to give up on 
draft-ietf-v6ops-6to4-to-historic and majority of v6ops WG agrees with 
those reasons IMHO the document should proceed as is.


 It will say that if 6-to-4 is implemented, it must be turned
 off by default.

Last ... if something is turned on or off by default is an 
implementation choice and last time I checked IETF was not in business 
to mandate any implementation choice.


Thx,
R.



On Sat, Jul 2, 2011 at 6:36 PM, Ronald Bonica rbon...@juniper.net
mailto:rbon...@juniper.net wrote:

- In order for the new draft to be published, it must achieve both
V6OPS WG and IETF consensus

If anyone objects to this course of action, please speak up soon.


Great, back to square one.

Is the reasoning behind the decision explained somewhere? My reading of
the threads on the subject in v6ops was that the opposition to
6to4-historic was a small but vocal minority, and I thought that
qualified as rough consensus. But perhaps I missed some discussion.

Also, why do the author and the chairs think that the new draft will do
any better than 6to4-historic? I would assume that the same people who
spoke up against 6to4-historic will speak up against the new document,
and since that level of opposition was sufficient to prevent the
publication of 6to4-historic, it may be sufficient to prevent
publication of the new document as well. If so, we will have spent 3-6
months arguing about it for naught.

Please, nobody answer this question with welcome to the IETF :-)



___
v6ops mailing list
v6...@ietf.org
https://www.ietf.org/mailman/listinfo/v6ops


___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: [v6ops] draft-ietf-v6ops-6to4-to-historic

2011-07-05 Thread Robert Raszuk

Hi Keith,


I personally don't have any objection to the notion that 6to4 should
be off by default and should require explicit configuration to enable
it.


Is there any feature (perhaps other then netboot) on commercial or open 
source routers which is not off by default and which would require 
explicit configuration to enable it ?


Thx,
R.

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf