Re: MBONE access?

2004-03-05 Thread James Seng
Ole didn't say Realplayer supports Multicast. He is asking why we can't 
use Real stream (or something along that line) instead.

FYI, I didnt get mbone since 1995 when I stop working for an ISP. I have 
managed to get any of my current ISPs to get it either. It is time we 
have to admit mbone is not going mainstream.

ps: https://helixcommunity.org/ - Real player (or at least Helix, the 
Open Source version of it) is available on multiplatform.

-James Seng

Frank Solensky wrote:

A nit, perhaps, but:

On Wed, 2004-03-03 at 20:17 -0800, Ole Jacobsen wrote:

..Note that Real
Player is available for multiple platforms for free, ..


The Linux version, last I tried [8.0.3.412], didn't include support for
multicast.



Re: MBONE access?

2004-03-05 Thread Paul Vixie
[EMAIL PROTECTED] (James Seng) writes:

 ...
 FYI, I didnt get mbone since 1995 when I stop working for an ISP.  I have 
 managed to get any of my current ISPs to get it either.  It is time we 
 have to admit mbone is not going mainstream.

today shep reminded me that we (shepfarm and isc, with help from cisco,
juniper, procket, verio, and a cast of others) are supporting some number
of mbone-like tunnels designed to glue otherwise disconnected walled gardens
together, with touchdowns on fix-west, paix-sfba, and equinix-sj.  naturally
there'll be pressure toward (and aid offered toward) going native, but
other than that these tunnels are free of cost.  We *Can* Fix This.

 ps: https://helixcommunity.org/ - Real player (or at least Helix, the 
 Open Source version of it) is available on multiplatform.

if that increases the market for realnetworks' proprietary server-side
products, and if realnetworks is still doing absolutely no confirmation
on e-mail addresses they send bulk e-mail to, then i'll probably continue
to boycott that application suite, no matter how free the players are.
-- 
Paul Vixie



Re: MBONE access?

2004-03-04 Thread Iljitsch van Beijnum
On 4-mrt-04, at 6:14, Joel Jaeggli wrote:

There's a reasonable cross-section of clients for most platforms the
supports a set of mostly interoperable codecs and transports. It is
possible to source with real/darwin streaming server/videolan a source
that will be visbile to users of quicktime/real/vlc and some other 
clients
via multicast or unicast transports.
Right. And unless I'm mistaken, streaming servers will happily take 
either a unicast or a multicast feed and reflect this feed over one of 
several transports (including some that will bypass NAT).

The transport is an issue. 500Kb/s isma mpeg-4 streams have a real 
cost if
you want 200 of them...
That's 100 Mbps. There are a lot of outfits that care about the IETF 
for which 100 Mbps is small change. (The latest episode of the Steve 
Jobs Show had 60,000 people watching at 300 kbps...) And 200 x 24 kbps 
audio only is just 5 Mbps, which would even be doable from the meeting 
site. A reasonable charge to cover the costs for online participation 
wouldn't be out of the question either, IMO.

The thing I consider most unworkable frankly is low-bitrate video... I
don't consider a 40 80 100Kb/s streams terribly usable regardless of 
the
codec chosen, I want to be able to read the slides, I want to be able 
hear
the speakers from someplace other than the bottom a barrel and I want 
to
be able to discern who's standing at the mic.
Our little multi6 experiment taught me that low quality video indeed 
isn't all that useful, and goood quality video isn't simple. However, 
workable quality audio is both simple and useful. So if good video 
can't be done, forget about it altogether and do audio only. If the 
speakers get in the habit of putting their slides online before a 
session and either they or the jabber scribe say which slide is up, 
that part is covered.

Another option would be slow scan tv: rather than stream relatively 
low quality moving video, why not send out periodic high quality 
stills? The advantage here is that there is no set rate at which those 
have to load so there is no binary good/none quality problem as with 
streaming.




On supporting NAT, was: Re: MBONE access?

2004-03-04 Thread Iljitsch van Beijnum
On 4-mrt-04, at 2:44, Hallam-Baker, Phillip wrote:

In case you had not noticed there are now tens of millions of NAT
devices in use. End users are not going to pay $10 per month for
an extra IP address when they can connect unlimited numbers of
devices to the net using a $40 NAT box.
Sounds like a conspiracy... ISPs charging orders of magnitude more than 
cost for additional addresses forcing people to use NAT.

The NAT war has been over for years, NAT won. The problem is that
the IETF still has not come to terms with that fact.
I don't think anyone has won here, there are just casualties all over 
the place: more work for the IETF and vendors, less functionality for 
the users.

The Internet was designed to be a network of networks. The core
architecture is NOT end-to-end, that is a political shiboleth that
has been imposed later.
Suppose for the sake of argument that the above is a valid position, 
and that we would actually want to make NAT work. What we need to do 
then is extend it such that it becomes possible to address hosts behind 
a NAT from the public internet. That should be perfectly doable, in 
essence we'd be redefining the protocol and port numbers to be part of 
the address. However, this means these must now also be put in the DNS 
and in most other places where IP addresses show up. So this adds up to 
a HUGE amount of new work.

Guess what: we already did pretty much the same thing with IPv6. The 
logical conclusion here is that we can save a lot of time and effort by 
simply adding IPv6 to the mix, as it is just a hair shy of being ready 
for full deployment, while all this stuff to make NAT actually work is 
all over the place.

In the case of H323 the problem is not just NAT, it is the derranged
protocol which uses a block of 3000 odd TCP/IP ports to receive
messages on. there is no way that this is consistent with good
firewall management
So now you are complaining because after you install a firewall, it 
turns out the thing does its job? The whole idea that decent security 
can be had by allowing packets with certain port numbers in them in and 
not others is fatally flawed, as it just makes for an arms race between 
firewall vendors that inspect deeper and deeper into packes and 
firewall bypass utilities that tunnel the real protocol through more 
and more layers of accepted protocols.

What we need is corporate zone alarm like functionality, where 
firewalls get to see which applications (and users) are trying to 
communicate with the outside world, rather than guess based on the port 
number in the packet. This would allow some very nice features such as 
blocking vulnerable versions of applications but allowing patched 
versions of the same application.




Re: MBONE access?

2004-03-04 Thread Robert G. Brown
On Wed, 3 Mar 2004, Ole Jacobsen wrote:

 Paul,
 
 This is simply silly.
 
 What you are saying is that for religious reasons you are unwilling to use
 FREE and widely used tools in order to help us develop our own.
 
 Next thing you'll be telling me PDF is a bad thing.
 
 If you want the IETF to be a place where more people can participate you
 need to ditch some of this religion.
...
  the fact that realmedia and windowsmedia aren't interoperable means that
  we (this community) failed to recognize and address a common need, and
  that the world (including this community) is suffering for it.
 
  compounding this failure by adopting proprietary technology for the primary
  work of this community -- which is interior and published communications --
  would be a bad, bad (bad) thing.

This is not silly, it is just smart in a longer timeframe than you're
thinking in.  Proprietary tools that utilize a proprietary/non-open data
interface are a serious problem for a variety of very sound,
non-religious reasons (as well as for a variety of political and
economic reasons, which is what I think you're calling religious
reasons).  Free is irrelevant to the issue, unless free means open.

   1) Proprietary data formats and long term archiving of any sort of
data are fundamentally incompatible.  Ask anybody who has lived through
the last twenty or thirty years of computer evolution how many documents
they've lost or had to go in and rescue (sometimes at great expense) as
the tools they were built with have disappeared.  Sometimes along with
their vendors.  Other times the vendors simply decided to release a new
version that was sufficiently incompatible that it could no longer
manage the old documents.  I think all of us can remember multiple
instances where this has happened to us -- I personally have lived
through wordstar, pcwrite, wordperfect, word, and several income tax
programs (which are the worst, as one HAS to be able to access the
records up to seven years later, which is a real problem with operating
systems and Moore's Law). There is also the uncertainty even now
surrounding the encumbered mp3 format versus e.g.  the unencumbered
ogg format.

Formats used to encode long-term public records need to be open and
tools to manage those records need to be available from many sources.
So putting up realmedia shows is short-run glitzy and nifty and all that
(even though lots of people won't have the players and cannot play the
media) but it is long run foolish IF the production is intended as any
sort of serious historical or archival record.

   2) Using a proprietary data format that can only be accessed by using
a proprietary tool (even a free one) leaves one vulnerable to all
sorts of shenanigans and hidden costs.  For example, nothing prevents
the vendor from waiting until you have a large amount of valuable data
built up with their format that would be very expensive to convert and
then deciding to charge you.  It's their tool, they can charge you if
and when they please.  Worse, since their tool is generally a closed
source, proprietary object, there are the usual problems with libraries
and compatibility when trying to get the tool to run on the wide range
of platforms it is advertised for.  Free may just refer to the cost of
getting the program, but it may well cost quite a bit of time to install
and maintain it, and time is money.

  3) The Internet has been built on open standards from the very
beginning.  This is absolutely the key to its success and tremendous
degree of universality and functionality to this very day.  Any vendor
can build a mail tool, an ftp tool, a tool using TCP/IP as a transport
layer.  Any vendor can build a browser, an http daemon.  The
specifications for those tools are laid out in RFCs, and modifications
to the open standards proceed in a serious and systematic way.  The
Internet has RESISTED being co-opted by monopolistic vendors who have
sought to introduce their own proprietary and essential layer of
middleware on hidden protocols, although they continue trying. The DMCA
makes it quite possible that if they ever succeed it will be
tremendously expensive and damaging to the entire structure.  You can
call this a religious argument if you like, but I think it is really a
statement of both politics and economics, in this case the politics of
freedom and the economics associated with having lots of choices.

So I'm afraid that I agree with Paul 100% on this one (although I
respectfully disagree with him on others;-).  The IETF absolutely should
avoid using proprietary tools to create documents that they might wish
to archive, and should strongly encourage the development of open
standards for and open document formats (one data format, many tools
both free and non-free) for data transmission on the Internet to ensure
that the Internet NOT be co-opted by any single vendor and that records
that might be archived today can still be accessed ten or twenty years
from now without 

RE: On supporting NAT, was: Re: MBONE access?

2004-03-04 Thread Hallam-Baker, Phillip
 Sounds like a conspiracy... ISPs charging orders of magnitude 
 more than 
 cost for additional addresses forcing people to use NAT.

Its called a monopoly.

There are good reasons why ISPs are encouraging their customers
to use NAT, they provide a weak firewall capability and that
in turn significantly reduces exposure to being hacked which
in turn reduces the cost of chasing zombie machines.

The next generation of cable modems my ISP will be installing will
have a NAT box built in.

  The NAT war has been over for years, NAT won. The problem is that
  the IETF still has not come to terms with that fact.
 
 I don't think anyone has won here, there are just casualties all over 
 the place: more work for the IETF and vendors, less functionality for 
 the users.

Less functionality is a deliberate, concious choice on the part of
the IETF. Fixing the problem is utterly trivial.

Think of all the machines in my network as a single machine with a
single IP address. The requests to open and close ports to the outside
world are simply RPC requests (without the RPC syntax).


 That should be perfectly doable, in 
 essence we'd be redefining the protocol and port numbers to 
 be part of 
 the address. However, this means these must now also be put 
 in the DNS 
 and in most other places where IP addresses show up. So this 
 adds up to 
 a HUGE amount of new work.

No, the machines do not need to be individually addressable.


 Guess what: we already did pretty much the same thing with IPv6. The 
 logical conclusion here is that we can save a lot of time and 
 effort by 
 simply adding IPv6 to the mix, as it is just a hair shy of 
 being ready 
 for full deployment, while all this stuff to make NAT 
 actually work is all over the place.

Simply repeating the claim that IPv6 is the solution to every
issue does not make it so, or advance the deployment of IPv6.
The problem is the intrinsic asymmetry between the value of
an IPv4 and an IPv6 address. An IPv4 address will be visible 
to the world, an IPv6 address will only be visible to other
IPv6 addresses.

The main reason IPv6 is nowhere is the refusal to deal with NAT
except by ideological reactions like the above. NAT is the
way to deploy IPv6. 

The consumer's internal network can then be a NAT'd IPv4 net
and the external network can be IPv6.


  In the case of H323 the problem is not just NAT, it is the derranged
  protocol which uses a block of 3000 odd TCP/IP ports to receive
  messages on. there is no way that this is consistent with good
  firewall management
 
 So now you are complaining because after you install a firewall, it 
 turns out the thing does its job? 

No, I am complaining about a protocol that is not firewall friendly.

 The whole idea that decent security 
 can be had by allowing packets with certain port numbers in 
 them in and 
 not others is fatally flawed, 

Your view is not held by the computer security industry. Sure firewalls
are not infallible. But that does not mean that they do not provide a 
valuable service.

One reason everything is migrating to Web Services is that the 
Web Services stack is designed to support a new generation of
firewalls and expose exactly the right data at the perimeter.

 What we need is corporate zone alarm like functionality, where 
 firewalls get to see which applications (and users) are trying to 
 communicate with the outside world, rather than guess based 
 on the port 
 number in the packet. This would allow some very nice 
 features such as 
 blocking vulnerable versions of applications but allowing patched 
 versions of the same application.

That is not a bad idea. In essence it would mean extending requests 
to open incomming AND outgoing ports to the perimeter defense.

Hey Mr firewall, this is Internet Explorer version 9.2, please
allow me to connect up to port 80 on 23.43.2.2




Re: MBONE access?

2004-03-04 Thread Frank Solensky
A nit, perhaps, but:

On Wed, 2004-03-03 at 20:17 -0800, Ole Jacobsen wrote:
 ..Note that Real
 Player is available for multiple platforms for free, ..

The Linux version, last I tried [8.0.3.412], didn't include support for
multicast.



signature.asc
Description: This is a digitally signed message part


Re: MBONE access?

2004-03-04 Thread Daniel Senie
At 09:51 PM 3/3/2004, Joel Jaeggli wrote:
On Wed, 3 Mar 2004, Ole Jacobsen wrote:


 begin naive question

 Apart from the eating our own dogfood bit ...

 Most other Internet events I attend, or follow remotely, use Real
 audio/video, or sometimes Windows Media Player.

 Can anyone tell me if there are any TECHNICAL reasons why we can't
 do this for the IETF meetings?
how about economic and poltical...

In point of fact it has been done, either by reflecting sources to
unicast through real servers or by simply generating additional sources.
The resources to do this on an ongoing basis (namely transit) haven't been
forthcoming.
On the economic front, there have been offers, at least from me, to PAY for 
remote attendance. Let's face it, I'd have been happy to pay $500 to have 
access to all WG sessions and plenaries via Real Player or other Unicast 
mechanism in Seoul. There's just no way my company can afford the travel 
expenses for me to personally travel to Korea.

The IETF should be interested in individuals, not just large corporations, 
participating. What better way than to provide a way for individuals to 
attend on their own budgets? If that means virtual attendance, then so be it.

Multicast is just not available to many of the folks who might otherwise 
attend. I don't care what unicast mechanism is chosen, provided it allows a 
wider crosssection of the community access to live participation in the 
meetings.


joelja

 Ole



 Ole J. Jacobsen
 Editor and Publisher,  The Internet Protocol Journal
 Tel: +1 408-527-8972   GSM: +1 415-370-4628
 E-mail: [EMAIL PROTECTED]  URL: http://www.cisco.com/ipj




--
--
Joel Jaeggli   Unix Consulting [EMAIL PROTECTED]
GPG Key Fingerprint: 5C6E 0104 BAF0 40B0 5BD3 C38B F000 35AB B67F 56B2




Re: On supporting NAT, was: Re: MBONE access?

2004-03-04 Thread Iljitsch van Beijnum
On 4-mrt-04, at 14:42, Hallam-Baker, Phillip wrote:

There are good reasons why ISPs are encouraging their customers
to use NAT, they provide a weak firewall capability and that
in turn significantly reduces exposure to being hacked which
in turn reduces the cost of chasing zombie machines.
Hm, but apparently many ISPs don't care about their customer boxes 
being turned into zombies as they let them persist in their undead 
state for long periods of time. ISPs would probably love it if there 
were no NAT (or proxies, NAT is no more than a simple way to implement 
generic proxying), that way they could extort their customers even 
more.

I don't think anyone has won here, there are just casualties all over
the place: more work for the IETF and vendors, less functionality for
the users.

Less functionality is a deliberate, concious choice on the part of
the IETF. Fixing the problem is utterly trivial.
A pointer or two to support the former would be nice. An explanation of 
the latter too, as I'm unfamiliar with this trivial fix.

Or are you referring to the issue that some client/server type 
interactions are broken when the client is behind NAT? This should 
probably be fixable in most cases (I wouldn't call updating huge 
installed bases trivial though), but that still leaves the applications 
and protocols that don't conform to the client/server model, such as 
VoIP.

Think of all the machines in my network as a single machine with a
single IP address. The requests to open and close ports to the outside
world are simply RPC requests (without the RPC syntax).
What if two boxes want to have the same port open? Believe me, you are 
just making the port number part of the address. Internal address 
allocation (your RPC w/o RPC mechanism) is only one of the issues that 
needs attention in this case.

Guess what: we already did pretty much the same thing with IPv6. The
logical conclusion here is that we can save a lot of time and
effort by simply adding IPv6 to the mix, as it is just a hair shy of
being ready for full deployment, while all this stuff to make NAT
actually work is all over the place.

Simply repeating the claim that IPv6 is the solution to every
issue does not make it so, or advance the deployment of IPv6.
It's annoying when people complain about a problem when the solution is 
right there in their face.

The problem is the intrinsic asymmetry between the value of
an IPv4 and an IPv6 address. An IPv4 address will be visible
to the world, an IPv6 address will only be visible to other
IPv6 addresses.
In this case, you only need to be visible to the streaming server... 
Use your IPv4 address for other stuff if you like.

The main reason IPv6 is nowhere is the refusal to deal with NAT
except by ideological reactions like the above. NAT is the
way to deploy IPv6.
I don't follow.

The whole idea that decent security can be had by allowing packets 
with certain port numbers in them in and not others is fatally 
flawed,

Your view is not held by the computer security industry.
The idea that security is a substance with an independent existance 
which underpins a security industry is also fatally flawed. (And one 
of the main reasons why I chose to avoid becoming a part of said 
industry.) Security is a property of all aspects of life and must be 
managed as such.

firewalls get to see which applications (and users) are trying to
communicate with the outside world, rather than guess based
on the port number in the packet.

That is not a bad idea. In essence it would mean extending requests
to open incomming AND outgoing ports to the perimeter defense.

Hey Mr firewall, this is Internet Explorer version 9.2, please
allow me to connect up to port 80 on 23.43.2.2
Right! When the firewall considers IE 9.2 safe it may allow it to 
communicate freely, but at a later time, when a vulnerability is found 
and (hopefully) a new version is installed, IE 9.2 isn't allowed to 
connect to the rest of the world anymore, or only to trusted 
destinations. This mechanism would also be great to catch trojans and 
other unauthorized software trying to communicate over the net.




RE: On supporting NAT, was: Re: MBONE access?

2004-03-04 Thread Hallam-Baker, Phillip
 Or are you referring to the issue that some client/server type 
 interactions are broken when the client is behind NAT? This should 
 probably be fixable in most cases (I wouldn't call updating huge 
 installed bases trivial though), but that still leaves the 
 applications 
 and protocols that don't conform to the client/server model, such as 
 VoIP.

VoIP is still a client-server model when you get down to the individual
communications. For that matter so is UDP.

In any communication you have to have a listener waiting for attention
and a party that initiates the message transfer. This happens even
when you look at CSP type mechanisms where there is a symmetric 
rendezvous.

 What if two boxes want to have the same port open? 

Same thing that happens when two processes on the same box ask for
the same port. The latecomer loses. Either that or the port is 
assigned on a different IP address, these could be pooled at the 
ISP level.

That is not a problem if you know about this restriction when you design
the protocol that is NAT listener friendly. 

You could even build into the protocol a feature that would allow
a response of the type, 'the port requested is already in use by 
machine at address 10.2.1.1, he is accepting requests to share 
via protocol X on port Y'

 Believe me, you are 
 just making the port number part of the address. Internal address 
 allocation (your RPC w/o RPC mechanism) is only one of the 
 issues that needs attention in this case.

Needs attention is not the same as 'impossible'.

It is very clear that the negative effects of NAT can be largely
eliminated if there is goodwill and an intention to succeed.

It is equally clear that the whole issue of NAT has been addressed
here with a complete determination to fail.

 It's annoying when people complain about a problem when the 
 solution is right there in their face.

A 'solution' that requires action by parties completely out of
my control does not qualify as such in my opinion.

At present I don't expect much in the way of NAT deployment before
2015, and that is building in expectation of a major shakeup in 
the management structure in 2010. If things go on as at present I
don't expect IPv6 deployed before 2025.

  The main reason IPv6 is nowhere is the refusal to deal with NAT
  except by ideological reactions like the above. NAT is the
  way to deploy IPv6.
 
 I don't follow.

NAT performs address translation. it is in effect an Ipv4 to IPv4 
translator. Make that transparent and you can make Ipv4 to IPv6
and IPv6 to Ipv4 transparent in the same way.


 The idea that security is a substance with an independent existance 
 which underpins a security industry is also fatally flawed. 
 (And one 
 of the main reasons why I chose to avoid becoming a part of said 
 industry.) Security is a property of all aspects of life and must be 
 managed as such.

Which is why the empirical observation that firewalls significantly 
reduce the number of successful penetration incidents is important.

The theoretical strength of a firewall against the NSA is irrelevant
when 99% of the attacks are from script kiddies. Filtering out
the 99% of script kiddies allows more time to focus on the remainder.


 Right! When the firewall considers IE 9.2 safe it may allow it to 
 communicate freely, but at a later time, when a vulnerability 
 is found 
 and (hopefully) a new version is installed, IE 9.2 isn't allowed to 
 connect to the rest of the world anymore, or only to trusted 
 destinations. This mechanism would also be great to catch trojans and 
 other unauthorized software trying to communicate over the net.

Yes, and sign the messages under a key protected by the trustworthy
computing base.

That is where Palladium gives real value.

Phill



Re: MBONE access?

2004-03-04 Thread ned . freed
On the economic front, there have been offers, at least from me, to PAY for
remote attendance. Let's face it, I'd have been happy to pay $500 to have
access to all WG sessions and plenaries via Real Player or other Unicast
mechanism in Seoul. There's just no way my company can afford the travel
expenses for me to personally travel to Korea.
I too would have no problem paying for this.

The IETF should be interested in individuals, not just large corporations,
participating. What better way than to provide a way for individuals to
attend on their own budgets? If that means virtual attendance, then so be it.
Exactly right.

Multicast is just not available to many of the folks who might otherwise
attend. I don't care what unicast mechanism is chosen, provided it allows a
wider crosssection of the community access to live participation in the
meetings.
The choice of unicast technology is largely irrelevant to me as well. While I
might find one approach somewhat more advantageous than another at this
particular point in time, if something is chosen I will take the necessary
steps to get it working. The same cannot be said for multicast, since no amount
of my own futzing will make it work for me.
Ned



Re: MBONE access?

2004-03-04 Thread Ole Jacobsen
Right, but multicast appears to be a large part of the problem.

I know this is heresy, but good engineers are usually able to use
available tools. It is possible to use the handle of a screwdriver to hit
the head of nail and drive it into the wall --- when you don't have a
hammer.

Now, it was a *naive* question, and others have pointed out the cost
of unicast alternatives, so I am not saying adopt commercial solutions
today, but if we are only doing multicast for religious reasons AND
it isn't reaching the large group of people who cannot participate
THEN it might be time to consider some alternatives, that's all.

Ole



Ole J. Jacobsen
Editor and Publisher,  The Internet Protocol Journal
Tel: +1 408-527-8972   GSM: +1 415-370-4628
E-mail: [EMAIL PROTECTED]  URL: http://www.cisco.com/ipj



On Thu, 4 Mar 2004, Frank Solensky wrote:

 A nit, perhaps, but:

 On Wed, 2004-03-03 at 20:17 -0800, Ole Jacobsen wrote:
  ..Note that Real
  Player is available for multiple platforms for free, ..

 The Linux version, last I tried [8.0.3.412], didn't include support for
 multicast.





Re: MBONE access

2004-03-04 Thread Keith Moore
FWIW, I tried to participate in a couple of WG meetings this week.  I
had to go to work to get multicast access - efforts to set up a tunnel
to my home failed (partially because there wasn't any obvious way to try
it out in advance of the actual meeting). 

Even when I could get multicast access, I could get video but the audio
would cut out after a few seconds.  This was with the latest QuickTime
player for the mac.  I also tried VLC for the mac but that didn't work
at all.

We've been experimenting with this stuff for longer than I can remember.
I'd like for this stuff to really be useful.  Here's my list of things
that I think are necessary for it to be useful:

1. We need to broadcast _every_ session, or at least most of them.

   That has a number of implications.  It means we need more bandwidth.
   It might be that we would have to use fewer codecs - maybe just
   H.261.  It might also mean that we need to set up some meeting rooms
   differently so that a single camera would suffice (thus removing the
   need for someone to switch between cameras).  Comments from the floor
   might have to be made from the front of the room.

2. We need the ability to access these transmissions via unicast.

   That probably means that we need willing parties on various
   continents to provide tunnel endpoints and/or proxies and/or
   reflectors.

3. The client software needed to participate must be available to
   everybody.

   That probably means using an open source tool as the baseline.  If it
   happens to also work with proprietary tools, so much the better.

4. It needs to be possible to test things well in advance of the
   meeting.

   By the time the meeting is underway, there's not enough time to debug
   tunnel setup, client problems, etc.  This probably means having live
   video feeds set up in advance, using the same codecs and tools that
   will be used at the meeting.  Ideally there should be feeds sourced
   from somewhere near the meeting site's point of attachment to the
   network.

5. In my limited experience, Jabber is an acceptable way for remote 
   participants to make comments - provided there is someone willing to
   read those comments to those physically present at the meeting.  But
   if this were to be a widespread practice, we'd need to have some 
   reasonably fair way to divide time between the local participants 
   and the remote participants.

6. We should require those who use slides to make them available for
   download, in a portable format, well in advance of the meeting.


I realize this is a tall order.  I'm trying to make a realistic
statement of what it takes for remote access to meetings to be useful.  
(I realize it might not seem realistic to actually _do_ this, but if 
it's not realistic, we may as well admit it.)   

I suspect the problem boils down to _money_.  Money would buy more 
bandwidth.  Money would help get local tunnel/redirector/proxies set up.
Money would help software development if open source tools needed to be
tweaked.  Money would pay for more on-site equipment and operators.

If this stuff _worked_ I would be willing to pay something close
to the full conference fee to attend the conference remotely, for those
cases when I couldn't be there in person.  Though I guess I wonder 
whether there would ever be enough remote participants to cover the
expenses.  (for that matter, if it _worked_, would lots of people stop 
travelling to meetings?)

If it is feasible it should be possible to implement this in stages:

1. Pick an open source client.  Tweak it as necessary.  Set up
   pointers in appropriate web pages so that IETFers could easily
   find and download the code.  Provide instructions for how to
   configure and use it.

2. Set up tunnel endpoints / proxies / redirectors.
   If it's necessary to limit access to IETFers, find a way to do this.

3. Set up live video/audio feeds.
   If it's necessary to limit access to IETFers, find a way to do this.

4. Encourage IETFers to download clients, test with the live feeds,
   and provide feedback.

5. Try this in one or two meeting rooms.  Experiment with a single
   microphone setup in one room.  Once it works, expand it gradually to 
   include additional meeting rooms (perhaps even during the same week).

6. Once it is demonstrated to work, start charging money :)




Re: MBONE access?

2004-03-03 Thread Hadmut Danisch
On Wed, Mar 03, 2004 at 04:18:42PM -0500, Joe Abley wrote:
 
 If you find an answer, telling this list would be good.
 
 In the past the answer has been you don't, often coupled with 
 enthusiastic statements about the mbone being in full production, and 
 tunnels no longer being necessary.


Please tell me you're kidding...



I just phoned the hotline of my provider T-DSL/T-Online.
They didn't even know what I was talking about. All they
said is that they can't help if I'm using Linux, because that
operating system is not supported. I'd have to call a
0190 number (62ct / min), which I did. Listening to the
wait queue music for about 1,5 minutes. Then there was a Lady
who also hasn't ever heard about this and couldn't imagine
what I was talking about...

Hadmut



Re: MBONE access?

2004-03-03 Thread Melinda Shore
On Wednesday, March 3, 2004, at 04:18 PM, Joe Abley wrote:
In the past the answer has been you don't, often coupled with 
enthusiastic statements about the mbone being in full production, and 
tunnels no longer being necessary.
I contacted my ISP last week about getting multicast routing configured
and they spent days trying to get it working.  They finally called their
equipment vendor, who explained to them that they need someone to route
to them, as well, which was news to them.  I'm now getting an mbone feed
through work (I'm a telecommuter so it wasn't automatic).
You can sometimes get a multicast tunnel terminated by a friendly 
university
department, if you've got such thing, but they're not as happy about 
letting
you pump a lot of traffic through them as they used to be.

BTW, the only multicast stream working during last night's plenary
was the MPEG-1 one, and because of the high bit rate it was very lossy.
The other, lower bitrate streams weren't working and the guy running
the service kind of blew me off (and I quote: watch the video in a
couple weeks after we get back).  If the problem recurs during today's
sessions, please send email to them at [EMAIL PROTECTED] so
they'll see that I'm not a lone crank.
Melinda




Re: MBONE access?

2004-03-03 Thread JORDI PALET MARTINEZ
In addition to multicast, today we should consider other inexpensive streaming 
solutions available even with IPv6 support. They allow to broadcast the event with 
lower bandwidths for those that can't get multicast, or don't have the bandwidth to 
support high bit rates.

Regards,
Jordi

- Original Message - 
From: Melinda Shore [EMAIL PROTECTED]
To: Joe Abley [EMAIL PROTECTED]
Cc: [EMAIL PROTECTED]
Sent: Thursday, March 04, 2004 6:54 AM
Subject: Re: MBONE access?


 On Wednesday, March 3, 2004, at 04:18 PM, Joe Abley wrote:
  In the past the answer has been you don't, often coupled with 
  enthusiastic statements about the mbone being in full production, and 
  tunnels no longer being necessary.
 
 I contacted my ISP last week about getting multicast routing configured
 and they spent days trying to get it working.  They finally called their
 equipment vendor, who explained to them that they need someone to route
 to them, as well, which was news to them.  I'm now getting an mbone feed
 through work (I'm a telecommuter so it wasn't automatic).
 
 You can sometimes get a multicast tunnel terminated by a friendly 
 university
 department, if you've got such thing, but they're not as happy about 
 letting
 you pump a lot of traffic through them as they used to be.
 
 BTW, the only multicast stream working during last night's plenary
 was the MPEG-1 one, and because of the high bit rate it was very lossy.
 The other, lower bitrate streams weren't working and the guy running
 the service kind of blew me off (and I quote: watch the video in a
 couple weeks after we get back).  If the problem recurs during today's
 sessions, please send email to them at [EMAIL PROTECTED] so
 they'll see that I'm not a lone crank.
 
 Melinda


**
Madrid 2003 Global IPv6 Summit
Presentations and videos on line at:
http://www.ipv6-es.com

This electronic message contains information which may be privileged or confidential. 
The information is intended to be for the use of the individual(s) named above. If you 
are not the intended recipient be aware that any disclosure, copying, distribution or 
use of the contents of this information, including attached files, is prohibited.





Re: MBONE access?

2004-03-03 Thread Iljitsch van Beijnum
On 3-mrt-04, at 22:54, Melinda Shore wrote:

BTW, the only multicast stream working during last night's plenary
was the MPEG-1 one, and because of the high bit rate it was very lossy.
The other, lower bitrate streams weren't working and the guy running
the service kind of blew me off (and I quote: watch the video in a
couple weeks after we get back).
I got a similar-spirited reaction after I posted this to the list on 
nov 18/19:

As long as we're bitching about the network: would it be possible to 
start doing some unicast streaming of sessions in the future? Access to 
multicast hasn't gotten significantly better the past decade, but 
streaming over unicast is now routine as the codecs are so much better 
these days, as is typical access bandwidth. I'll happily take 40 kbps 
MPEG-4 audio only; the video is so badly out of sync that it is 
unwatchable most of the time anyway.

Because I really wanted to follow yesterday's multi6 session, I 
arranged for some ad-hoc streaming. Kurtis Lindqvist was kind enough to 
provide me with an audio/video feed, which I ran through a streaming 
server. Despite the fact that we used a microphone built into the 
camera the audio was workable, although the video wasn't all that 
useful because of the low resolution and mounting limitations.

I think we should consider streaming audio over unicast for all 
sessions. There are already microphones in all rooms, right? As this is 
only 32 kbps (you can go even lower) and any laptop with audio in and 
suitable software can provide the feed, and there is little or no need 
to attend to anything during steaming, I'm sure it's possible to work 
out the logistics.




Re: MBONE access?

2004-03-03 Thread Joel Jaeggli
On Wed, 3 Mar 2004, Melinda Shore wrote:
 
 BTW, the only multicast stream working during last night's plenary
 was the MPEG-1 one, and because of the high bit rate it was very lossy.
 The other, lower bitrate streams weren't working and the guy running
 the service kind of blew me off (and I quote: watch the video in a
 couple weeks after we get back).  If the problem recurs during today's
 sessions, please send email to them at [EMAIL PROTECTED] so
 they'll see that I'm not a lone crank.

From the places we are able able to monitor the h.261/mpeg-1/mpeg-4 were 
all making it to the US. but the abilene router proxy was down last night 
so we had less information then we would otherwise have had. It's very 
hard to run a camera, monitor the recording and debug someone elses 
network in the United States from Korea.

For what it's worth I've been mirroring the recordings to our ftp server 
at the UO as fast as I can, the wed plenary should be there by midnight 
pst on wed.

 Melinda
 
 

-- 
-- 
Joel Jaeggli   Unix Consulting [EMAIL PROTECTED]
GPG Key Fingerprint: 5C6E 0104 BAF0 40B0 5BD3 C38B F000 35AB B67F 56B2





RE: MBONE access?

2004-03-03 Thread Hallam-Baker, Phillip
 I'm all for eating our own dog food, but IMO workable remote 
 access is more
 important.

The point about eating the dog food is so that you improve it
to the point where it is acceptable.

I think it is time to accept that the MBONE technology is
fatally flawed and is not going to be deployable.

Equally flawed and useless are the H.323 protocols that do not
tunnel through NAT or even work with a firewall in a remotely 
acceptable fashion.

This thing is not rocket science. There are lots of folk
with the little cameras and the ISPs do not want to have
their bandwidth wasted needlessly. But trying to do multicast
in the network layer has failed. The Internet considers 
complexity in the network to be stupidity and does not route
it.

Phill




RE: MBONE access?

2004-03-03 Thread Hallam-Baker, Phillip
  Equally flawed and useless are the H.323 protocols that do not
  tunnel through NAT or even work with a firewall in a remotely 
  acceptable fashion.
 
 NAT is the big bad dog here, that is what breaks the
 end to end connectivity. restart NAT war /

In case you had not noticed there are now tens of millions of NAT
devices in use. End users are not going to pay $10 per month for
an extra IP address when they can connect unlimited numbers of 
devices to the net using a $40 NAT box.

The NAT war has been over for years, NAT won. The problem is that
the IETF still has not come to terms with that fact.

The Internet was designed to be a network of networks. The core
architecture is NOT end-to-end, that is a political shiboleth that
has been imposed later.

The features of the Internet that work are the ones that work within
the end-to-end model. The features that are failures are the ones
where the end-to-end model is bogus.

The security world has long since realised that exclusive relianance
on end-to-end security is bogus. I don't know of any serious security
professionals who now claim that firewalls are bogus or that they 
will go away as the myth has it. Perimeter security is here to stay.

In the case of H323 the problem is not just NAT, it is the derranged 
protocol which uses a block of 3000 odd TCP/IP ports to receive
messages on. there is no way that this is consistent with good
firewall management - unless you go to some pretty sophisticated 
additional control to open up and shut down the ports as required.

As for IPv6, the only feasible way to deploy it is by co-opting those
NAT boxes.

Phill




Re: MBONE access?

2004-03-03 Thread JORDI PALET MARTINEZ
Most of the NAT boxes allow you to use IPv6. There are several protocols that allow it.

The simpler one 
http://www.rfc-editor.org/cgi-bin/iddoctype.pl?letsgo=draft-palet-v6ops-proto41-nat-03

Regards,
Jordi

- Original Message - 
From: Hallam-Baker, Phillip [EMAIL PROTECTED]
To: 'Jeroen Massar' [EMAIL PROTECTED]; Hallam-Baker, Phillip [EMAIL PROTECTED]
Cc: [EMAIL PROTECTED]; [EMAIL PROTECTED]
Sent: Thursday, March 04, 2004 10:44 AM
Subject: RE: MBONE access?


   Equally flawed and useless are the H.323 protocols that do not
   tunnel through NAT or even work with a firewall in a remotely 
   acceptable fashion.
  
  NAT is the big bad dog here, that is what breaks the
  end to end connectivity. restart NAT war /
 
 In case you had not noticed there are now tens of millions of NAT
 devices in use. End users are not going to pay $10 per month for
 an extra IP address when they can connect unlimited numbers of 
 devices to the net using a $40 NAT box.
 
 The NAT war has been over for years, NAT won. The problem is that
 the IETF still has not come to terms with that fact.
 
 The Internet was designed to be a network of networks. The core
 architecture is NOT end-to-end, that is a political shiboleth that
 has been imposed later.
 
 The features of the Internet that work are the ones that work within
 the end-to-end model. The features that are failures are the ones
 where the end-to-end model is bogus.
 
 The security world has long since realised that exclusive relianance
 on end-to-end security is bogus. I don't know of any serious security
 professionals who now claim that firewalls are bogus or that they 
 will go away as the myth has it. Perimeter security is here to stay.
 
 In the case of H323 the problem is not just NAT, it is the derranged 
 protocol which uses a block of 3000 odd TCP/IP ports to receive
 messages on. there is no way that this is consistent with good
 firewall management - unless you go to some pretty sophisticated 
 additional control to open up and shut down the ports as required.
 
 As for IPv6, the only feasible way to deploy it is by co-opting those
 NAT boxes.
 
 Phill


**
Madrid 2003 Global IPv6 Summit
Presentations and videos on line at:
http://www.ipv6-es.com

This electronic message contains information which may be privileged or confidential. 
The information is intended to be for the use of the individual(s) named above. If you 
are not the intended recipient be aware that any disclosure, copying, distribution or 
use of the contents of this information, including attached files, is prohibited.





Re: MBONE access?

2004-03-03 Thread Ole Jacobsen

begin naive question

Apart from the eating our own dogfood bit ...

Most other Internet events I attend, or follow remotely, use Real
audio/video, or sometimes Windows Media Player.

Can anyone tell me if there are any TECHNICAL reasons why we can't
do this for the IETF meetings?

Ole



Ole J. Jacobsen
Editor and Publisher,  The Internet Protocol Journal
Tel: +1 408-527-8972   GSM: +1 415-370-4628
E-mail: [EMAIL PROTECTED]  URL: http://www.cisco.com/ipj






Re: MBONE access?

2004-03-03 Thread JORDI PALET MARTINEZ
Agree. I didn't wanted to mention specific brands before, but we use Windows Media 
Server for our own events (www.ipv6-es.com), and it works very well (with IPv6 support)

I volunteer to help if needed.

Regards,
Jordi

- Original Message - 
From: Ole Jacobsen [EMAIL PROTECTED]
To: JORDI PALET MARTINEZ [EMAIL PROTECTED]
Cc: [EMAIL PROTECTED]
Sent: Thursday, March 04, 2004 11:30 AM
Subject: Re: MBONE access?


 
 begin naive question
 
 Apart from the eating our own dogfood bit ...
 
 Most other Internet events I attend, or follow remotely, use Real
 audio/video, or sometimes Windows Media Player.
 
 Can anyone tell me if there are any TECHNICAL reasons why we can't
 do this for the IETF meetings?
 
 Ole
 
 
 
 Ole J. Jacobsen
 Editor and Publisher,  The Internet Protocol Journal
 Tel: +1 408-527-8972   GSM: +1 415-370-4628
 E-mail: [EMAIL PROTECTED]  URL: http://www.cisco.com/ipj


**
Madrid 2003 Global IPv6 Summit
Presentations and videos on line at:
http://www.ipv6-es.com

This electronic message contains information which may be privileged or confidential. 
The information is intended to be for the use of the individual(s) named above. If you 
are not the intended recipient be aware that any disclosure, copying, distribution or 
use of the contents of this information, including attached files, is prohibited.





Re: MBONE access?

2004-03-03 Thread Steven M. Bellovin
In message [EMAIL PROTECTED], Ole Jacobsen wr
ites:

begin naive question

Apart from the eating our own dogfood bit ...

Most other Internet events I attend, or follow remotely, use Real
audio/video, or sometimes Windows Media Player.

Can anyone tell me if there are any TECHNICAL reasons why we can't
do this for the IETF meetings?


Does Windows Media Player run on a high-enough percentage of IETFers 
machines?  The incidence of Windows here is considerably lower than in 
the population as a whole.  Note that this is a technical reason:  it 
doesn't support our user base.

--Steve Bellovin, http://www.research.att.com/~smb





RE: MBONE access?

2004-03-03 Thread Dean Anderson
On Wed, 3 Mar 2004, Hallam-Baker, Phillip wrote:

  I'm all for eating our own dog food, but IMO workable remote 
  access is more
  important.
 
 The point about eating the dog food is so that you improve it
 to the point where it is acceptable.
 
 I think it is time to accept that the MBONE technology is
 fatally flawed and is not going to be deployable.

There is nothing wrong with Mbone, per se--though, as someone mentioned,
it might be nice to have better codecs. The problem is that multicast is
flawed, and not going to be globally deployable. It will be useful perhaps
to the large organization that has a potential for multicast. But it
certainly isn't useful in any potentially hostile environment.  To abuse
some more buzzwords, multicast is not a global  technology. Its more an
enterprise technology. Or, as MBone is today, arranged as tunnels to
participating and interested organizations.

 Equally flawed and useless are the H.323 protocols that do not
 tunnel through NAT or even work with a firewall in a remotely 
 acceptable fashion.

There is nothing wrong with h323.  There are good reasons for the IP
address of the client to be embedded in some h323 control messages.  In
most cases, this is a good thing, and an advantage for call control and
call routing systems.  Indeed, this is what gives h323 its scalability and
ability to compete and work in tandem with the PSTN.  But when passing
through a NAT, those addresses and port numbers have to be properly and
statefully translated---That's what a proxy does.  The problem is that
your NAT doesn't (or most likely, /didn't/ until the last year or two or
three) support h323 proxy.  You need h323 proxy support just like you need
proxy support for many non-trivial protocols.  Either upgrade your NAT
software, or if you run linux/bsd/etc, install an open source h323 proxy
on your NAT gateway.

 This thing is not rocket science. There are lots of folk
 with the little cameras and the ISPs do not want to have
 their bandwidth wasted needlessly. But trying to do multicast
 in the network layer has failed. The Internet considers 
 complexity in the network to be stupidity and does not route
 it.

Perhaps.  But it didn't fail because it was too complex. Failed probably
isn't the right word. Adopted or Allowed are probably more
appropriate.  It isn't allowed by ISPs because it isn't suitable to the
environment.  It may be allowed by cooperating organizations, which have 
to create tunnels between them. I don't a big problem with that.

--Dean





Re: MBONE access?

2004-03-03 Thread Ole Jacobsen


Actually, the use of Windows Media Player is quite rare for the events I
am talking about, Real is probably used in 90% of them, I only mentioned
the other one because it does appear from time to time. Note that Real
Player is available for multiple platforms for free, and so is Windows
Media Player, I have one for the Mac for example.

Ole


Ole J. Jacobsen
Editor and Publisher,  The Internet Protocol Journal
Tel: +1 408-527-8972   GSM: +1 415-370-4628
E-mail: [EMAIL PROTECTED]  URL: http://www.cisco.com/ipj



On Thu, 4 Mar 2004, Steven M. Bellovin wrote:

 In message [EMAIL PROTECTED], Ole Jacobsen wr
 ites:
 
 begin naive question
 
 Apart from the eating our own dogfood bit ...
 
 Most other Internet events I attend, or follow remotely, use Real
 audio/video, or sometimes Windows Media Player.
 
 Can anyone tell me if there are any TECHNICAL reasons why we can't
 do this for the IETF meetings?
 

 Does Windows Media Player run on a high-enough percentage of IETFers
 machines?  The incidence of Windows here is considerably lower than in
 the population as a whole.  Note that this is a technical reason:  it
 doesn't support our user base.

   --Steve Bellovin, http://www.research.att.com/~smb





Re: MBONE access?

2004-03-03 Thread Ole Jacobsen
Paul,

This is simply silly.

What you are saying is that for religious reasons you are unwilling to use
FREE and widely used tools in order to help us develop our own.

Next thing you'll be telling me PDF is a bad thing.

If you want the IETF to be a place where more people can participate you
need to ditch some of this religion.

Ole


Ole J. Jacobsen
Editor and Publisher,  The Internet Protocol Journal
Tel: +1 408-527-8972   GSM: +1 415-370-4628
E-mail: [EMAIL PROTECTED]  URL: http://www.cisco.com/ipj



On Wed, 4 Mar 2004, Paul Vixie wrote:

  Apart from the eating our own dogfood bit ...

 apart from that, we should all stay at our desks and use DECNet-PhaseV
 or NetWare to get our work done, and stop trying to create new protocols
 that are robust, interoperable, and open.

 in other words there is a big nothing apart from that particular thing.

 the fact that realmedia and windowsmedia aren't interoperable means that
 we (this community) failed to recognize and address a common need, and
 that the world (including this community) is suffering for it.

 compounding this failure by adopting proprietary technology for the primary
 work of this community -- which is interior and published communications --
 would be a bad, bad (bad) thing.
 --
 Paul Vixie




RE: MBONE access?

2004-03-03 Thread shogunx
So we are still faced with the question of how to deploy multicast to the
end user.  Sad.  I have two circuits running into my home office, and both
providers (one a major telco) are so cranially-rectally inverted that they
have no clue what multicast is much less how to deploy it.

What does it take, someone to go to berkeley and hack a server onto the
network to act as a tunnel broker?

Scott



On Wed, 3 Mar 2004, Dean Anderson wrote:

 On Wed, 3 Mar 2004, Hallam-Baker, Phillip wrote:

   I'm all for eating our own dog food, but IMO workable remote
   access is more
   important.
 
  The point about eating the dog food is so that you improve it
  to the point where it is acceptable.
 
  I think it is time to accept that the MBONE technology is
  fatally flawed and is not going to be deployable.

 There is nothing wrong with Mbone, per se--though, as someone mentioned,
 it might be nice to have better codecs. The problem is that multicast is
 flawed, and not going to be globally deployable. It will be useful perhaps
 to the large organization that has a potential for multicast. But it
 certainly isn't useful in any potentially hostile environment.  To abuse
 some more buzzwords, multicast is not a global  technology. Its more an
 enterprise technology. Or, as MBone is today, arranged as tunnels to
 participating and interested organizations.

  Equally flawed and useless are the H.323 protocols that do not
  tunnel through NAT or even work with a firewall in a remotely
  acceptable fashion.

 There is nothing wrong with h323.  There are good reasons for the IP
 address of the client to be embedded in some h323 control messages.  In
 most cases, this is a good thing, and an advantage for call control and
 call routing systems.  Indeed, this is what gives h323 its scalability and
 ability to compete and work in tandem with the PSTN.  But when passing
 through a NAT, those addresses and port numbers have to be properly and
 statefully translated---That's what a proxy does.  The problem is that
 your NAT doesn't (or most likely, /didn't/ until the last year or two or
 three) support h323 proxy.  You need h323 proxy support just like you need
 proxy support for many non-trivial protocols.  Either upgrade your NAT
 software, or if you run linux/bsd/etc, install an open source h323 proxy
 on your NAT gateway.

  This thing is not rocket science. There are lots of folk
  with the little cameras and the ISPs do not want to have
  their bandwidth wasted needlessly. But trying to do multicast
  in the network layer has failed. The Internet considers
  complexity in the network to be stupidity and does not route
  it.

 Perhaps.  But it didn't fail because it was too complex. Failed probably
 isn't the right word. Adopted or Allowed are probably more
 appropriate.  It isn't allowed by ISPs because it isn't suitable to the
 environment.  It may be allowed by cooperating organizations, which have
 to create tunnels between them. I don't a big problem with that.

   --Dean





sleekfreak pirate broadcast
http://sleekfreak.ath.cx:81/




Re: MBONE access?

2004-03-03 Thread Paul Vixie
 What you are saying is that for religious reasons you are unwilling to
 use FREE and widely used tools in order to help us develop our own.

well, actually, that's not what i said at all.

 Next thing you'll be telling me PDF is a bad thing.

and no, that won't be the next thing i'll tell you.

 If you want the IETF to be a place where more people can participate
 you need to ditch some of this religion.

if there were no robust open alternatives i'd be the first to say
issue an rfp.




Re: MBONE access?

2004-03-03 Thread Joel Jaeggli

On Wed, 3 Mar 2004, Ole Jacobsen wrote:
 
 What you are saying is that for religious reasons you are unwilling to use
 FREE and widely used tools in order to help us develop our own.

The focus in clients is a little misguided... 

There's a reasonable cross-section of clients for most platforms the
supports a set of mostly interoperable codecs and transports. It is
possible to source with real/darwin streaming server/videolan a source
that will be visbile to users of quicktime/real/vlc and some other clients
via multicast or unicast transports. In order to do that you have to be
somewhat selective about which codecs, and features you use.

The transport is an issue. 500Kb/s isma mpeg-4 streams have a real cost if 
you want 200 of them... 

If you want variable-rate codecs that support clients at an number of
rates simultaniously you may have to forgoe interoperabilty in favor of a
single client platform. If you want slides and video in seperate windows
you need smil but there are no interoperable smil implementations.

The thing I consider most unworkable frankly is low-bitrate video... I 
don't consider a 40 80 100Kb/s streams terribly usable regardless of the 
codec chosen, I want to be able to read the slides, I want to be able hear 
the speakers from someplace other than the bottom a barrel and I want to 
be able to discern who's standing at the mic.
 
 Next thing you'll be telling me PDF is a bad thing.

I have deep ambivalence towards pdf but that's a seperate issue for a 
different forum.

 
 If you want the IETF to be a place where more people can participate you
 need to ditch some of this religion.
 
 Ole
 
 
 Ole J. Jacobsen
 Editor and Publisher,  The Internet Protocol Journal
 Tel: +1 408-527-8972   GSM: +1 415-370-4628
 E-mail: [EMAIL PROTECTED]  URL: http://www.cisco.com/ipj
 
 
 
 On Wed, 4 Mar 2004, Paul Vixie wrote:
 
   Apart from the eating our own dogfood bit ...
 
  apart from that, we should all stay at our desks and use DECNet-PhaseV
  or NetWare to get our work done, and stop trying to create new protocols
  that are robust, interoperable, and open.
 
  in other words there is a big nothing apart from that particular thing.
 
  the fact that realmedia and windowsmedia aren't interoperable means that
  we (this community) failed to recognize and address a common need, and
  that the world (including this community) is suffering for it.
 
  compounding this failure by adopting proprietary technology for the primary
  work of this community -- which is interior and published communications --
  would be a bad, bad (bad) thing.
  --
  Paul Vixie
 
 

-- 
-- 
Joel Jaeggli   Unix Consulting [EMAIL PROTECTED]
GPG Key Fingerprint: 5C6E 0104 BAF0 40B0 5BD3 C38B F000 35AB B67F 56B2





Re: MBONE access?

2004-03-03 Thread Ole Jacobsen
Paul,

As has been pointed out, this is a little more complicated than just
the choice of client, in particular multicast is not widely available
to the average Internet user.

But I still find it ironic that I can watch a webcast from an ICANN
meeting but I am unable to do the same for an IETF meeting (until after
the fact). That is but one example.

Ole


Ole J. Jacobsen
Editor and Publisher,  The Internet Protocol Journal
Tel: +1 408-527-8972   GSM: +1 415-370-4628
E-mail: [EMAIL PROTECTED]  URL: http://www.cisco.com/ipj



On Thu, 4 Mar 2004, Paul Vixie wrote:

  What you are saying is that for religious reasons you are unwilling to
  use FREE and widely used tools in order to help us develop our own.

 well, actually, that's not what i said at all.

  Next thing you'll be telling me PDF is a bad thing.

 and no, that won't be the next thing i'll tell you.

  If you want the IETF to be a place where more people can participate
  you need to ditch some of this religion.

 if there were no robust open alternatives i'd be the first to say
 issue an rfp.





Re: MBONE access?

2004-03-03 Thread Paul Vixie
 As has been pointed out, this is a little more complicated than just
 the choice of client, in particular multicast is not widely available
 to the average Internet user.

that could be punctuated very differently and thus become even more factual.

 But I still find it ironic that I can watch a webcast from an ICANN
 meeting but I am unable to do the same for an IETF meeting (until after
 the fact). That is but one example.

well, let's do what we always do, then... have a BOF about it.  we can wire
a 1394 camera to jabber somehow, but until there's widely deployed idmr or
a whole lot of widely deployed open/shared L4 streamsplitters, this won't
be a protocol problem (like it ought to be).

for dark humour value, i note with dispair that in 1992 when i participated in
a project at DEC (r.i.p.) to move the nasdaq trading system onto tcp/ip, we
were told by several people that ya oughta use multicast.  my part of the
project was an L4 streamsplitter that was used because multicast didn't work.
folks told us that we'd regret it and have to tear it out in a year or two
when multicast became widely deployed.  someone, somewhere, is probably still
using DECrbs because for them, multicast still isn't a realistic possibility.
-- 
Paul Vixie



Re: MBONE access?

2004-03-03 Thread JORDI PALET MARTINEZ
Yes, even there are other interoperable implementations for Linux and BSD based 
platforms.

- Original Message - 
From: Steven M. Bellovin [EMAIL PROTECTED]
To: Ole Jacobsen [EMAIL PROTECTED]
Cc: JORDI PALET MARTINEZ [EMAIL PROTECTED]; [EMAIL PROTECTED]
Sent: Thursday, March 04, 2004 11:45 AM
Subject: Re: MBONE access?


 In message [EMAIL PROTECTED], Ole Jacobsen wr
 ites:
 
 begin naive question
 
 Apart from the eating our own dogfood bit ...
 
 Most other Internet events I attend, or follow remotely, use Real
 audio/video, or sometimes Windows Media Player.
 
 Can anyone tell me if there are any TECHNICAL reasons why we can't
 do this for the IETF meetings?
 
 
 Does Windows Media Player run on a high-enough percentage of IETFers 
 machines?  The incidence of Windows here is considerably lower than in 
 the population as a whole.  Note that this is a technical reason:  it 
 doesn't support our user base.
 
 --Steve Bellovin, http://www.research.att.com/~smb


**
Madrid 2003 Global IPv6 Summit
Presentations and videos on line at:
http://www.ipv6-es.com

This electronic message contains information which may be privileged or confidential. 
The information is intended to be for the use of the individual(s) named above. If you 
are not the intended recipient be aware that any disclosure, copying, distribution or 
use of the contents of this information, including attached files, is prohibited.





Re: MBONE access?

2004-03-03 Thread JORDI PALET MARTINEZ
Well we can use tools like Helix that combine Multicast, Real and Windows Media, I 
believe, into a single platform, so any kind of client can access it.

- Original Message - 
From: Ole Jacobsen [EMAIL PROTECTED]
To: Steven M. Bellovin [EMAIL PROTECTED]
Cc: JORDI PALET MARTINEZ [EMAIL PROTECTED]; [EMAIL PROTECTED]
Sent: Thursday, March 04, 2004 1:17 PM
Subject: Re: MBONE access?


 
 
 Actually, the use of Windows Media Player is quite rare for the events I
 am talking about, Real is probably used in 90% of them, I only mentioned
 the other one because it does appear from time to time. Note that Real
 Player is available for multiple platforms for free, and so is Windows
 Media Player, I have one for the Mac for example.
 
 Ole
 
 
 Ole J. Jacobsen
 Editor and Publisher,  The Internet Protocol Journal
 Tel: +1 408-527-8972   GSM: +1 415-370-4628
 E-mail: [EMAIL PROTECTED]  URL: http://www.cisco.com/ipj
 
 
 
 On Thu, 4 Mar 2004, Steven M. Bellovin wrote:
 
  In message [EMAIL PROTECTED], Ole Jacobsen wr
  ites:
  
  begin naive question
  
  Apart from the eating our own dogfood bit ...
  
  Most other Internet events I attend, or follow remotely, use Real
  audio/video, or sometimes Windows Media Player.
  
  Can anyone tell me if there are any TECHNICAL reasons why we can't
  do this for the IETF meetings?
  
 
  Does Windows Media Player run on a high-enough percentage of IETFers
  machines?  The incidence of Windows here is considerably lower than in
  the population as a whole.  Note that this is a technical reason:  it
  doesn't support our user base.
 
  --Steve Bellovin, http://www.research.att.com/~smb
 
 


**
Madrid 2003 Global IPv6 Summit
Presentations and videos on line at:
http://www.ipv6-es.com

This electronic message contains information which may be privileged or confidential. 
The information is intended to be for the use of the individual(s) named above. If you 
are not the intended recipient be aware that any disclosure, copying, distribution or 
use of the contents of this information, including attached files, is prohibited.





A/V services for the IETF (was: Re: MBONE access?)

2004-03-03 Thread Harald Tveit Alvestrand
Ole,

the multicast services are provided by the UOregon team supported by a 
grant from Cisco (+ some support from ISOC via the IETF Chair's fund).

This grant is in its final year, and the end of the grant is a convenient 
time to stop and reconsider exactly what services we (the IETF community) 
want in the area of A/V at meetings, and see how we can arrange to have 
that done, and cover the costs.

So yes, it's on my list of things to worry about - it's just not at the 
top..

  Harald

--On 3. mars 2004 18:30 -0800 Ole Jacobsen [EMAIL PROTECTED] wrote:

begin naive question

Apart from the eating our own dogfood bit ...

Most other Internet events I attend, or follow remotely, use Real
audio/video, or sometimes Windows Media Player.
Can anyone tell me if there are any TECHNICAL reasons why we can't
do this for the IETF meetings?







RE: MBone (virus on sniffers.pdf file download)

2002-09-25 Thread jim_davis_485

gm From: Gary E. Miller [mailto:[EMAIL PROTECTED]]
gm Sent: Monday, September 23, 2002 2:24 PM

gm Here is a link to how it is done:
gm http://dhar.homelinux.com/dhar/downloads/Sniffers.pdf
gm Gary E. Miller Rellim 20340 Empire Blvd, Suite E-3, Bend, OR 97701
gm [EMAIL PROTECTED]  Tel:+1(541)382-8588 Fax: +1(541)382-8676

Just a note: yesterday my attempt to follow the link
above from (I know, it was my stupidity) Microsoft
Outlook lead to my machine being (unsuccessfully)
attacked by the virus Norton calls JS.Exception.Exploit.

Attempts today to download that PDF file in a more
properly controlled fashion fail with the file not
available.

Just a note for the archives and a word of warning.

Jim Davis
Agilent Technologies




Re: MBone

2002-09-24 Thread Joe Touch

Gary E. Miller wrote:
 Yo Joe!

 On Fri, 13 Sep 2002, Joe Touch wrote:


Without a dobut you are right, though I think the degree of difference is
awful small.  Through hosts with root on switches or through wireless into
the mix and you are back to being roughly equivalent.

Hosts with root can't snoop anything but broadcast UDP on switches
unless the switch is configurable; many switches aren't.

 root has no problem seeing adjacent UDP even on a switch.  Just overflow the
 arp cache or poison it.

That all presumes the switch doesn't detect this as an attack and
shutdown that link, which is an entirely reasonable reaction.

Using a switch doesn't ensure security, but using multicast basically
ensures promiscuity (since non-multicast capable switches are more common).

joe





Re: MBone

2002-09-24 Thread Joe Touch

Gary E. Miller wrote:
 Yo Joe!

 On Mon, 23 Sep 2002, Joe Touch wrote:


root has no problem seeing adjacent UDP even on a switch.  Just
overflow the arp cache or poison it.

That all presumes the switch doesn't detect this as an attack and
shutdown that link, which is an entirely reasonable reaction.

 resonable yes, practical, no.

 The only way I know to prevent this is to hard code the MACs on the
 switch.  This is time consuming to install and to maintain.

It's sufficient to have the switch detect high rates of change, or large
numbers of MAC addresses as an attack. That's practical enough.

 Barring that, please name ONE switch, or cite ONE credible reference
 source, where arpspoofing is prevented at the switch by any means short
 of harcoding the MACs.

Practical != economical. Further, there are MACs which are hardcoded
(i.e. to prevent overwrite of MAC addresses).

What I said was that it was EASY to get at multicast, not that it wasn't
impossible to get at unicast.

Joe






Re: MBone

2002-09-24 Thread Joe Touch

Kevin C. Almeroth wrote:
Multicast is necessarily a LOT weaker:

 1) I can get a copy of packets by normal operation
 (join a group). there is no equivalent for UDP,
 notably for paths that aren't shared.


 Again, not in all cases.  You over-simplify the effectiveness of scoping.

Scoping, like TTL, can limit the visibility of packet outside a
boundary, but cannot do much about other users inside that boundary.

PS - how can you know that the scope of ALL multicast exit paths have
been properly scoped to limit access outside of some physical locale?

 You can't have it both ways.  Yes, there is a situation where you can obtain
 a copy of a multicast packet through standard operation.  But the fact
 that scoping and addressing make it non-trivial and the fact that normal
 operation doesn't prevent you from snooping UDP packets shrinks the
 gap from a LOT weaker.  And as I said before, if data security is important,
 effectively there is no gap.

Users without root can run programs that listen to multicast addresses.
If that user is inside the scope boundary, game over.

As I said, weakER. IMO, still quite a lot weaker than unicast.

 2) UDP has application, network, and tunnel encryption that
 is both widely deployed and widely used. there is
 no equivalent for multicast.

 I disagree...  a number of commercial multicast apps have encryption.
 Don't try and argue now that some relative percentage of multicast apps
 have less encryption than unicast apps.  You're comparing a protocol that
 has been around a lot longer than multicast and trying to make an
 apples-to-apples comparison based on less availability.

I can argue relative percentages just fine; we're talking about strength
today, not 'strength after X years of deployment'.

 And for the record, multicast is UDP.

As I was using it, agreed. (there are other protocols that use multicast
as well)

Joe





Re: MBone

2002-09-24 Thread Joe Touch

Joe Touch wrote:
 Gary E. Miller wrote:
...
 Barring that, please name ONE switch, or cite ONE credible reference
 source, where arpspoofing is prevented at the switch by any means short
 of harcoding the MACs.

 Practical != economical. Further, there are MACs which are hardcoded
 (i.e. to prevent overwrite of MAC addresses).

PS - as I also raised on private email earlier, some ISPs definitely
hardcode which MAC can attach to a port (i.e., they lock on the first
one that gets there, and prevent subsequent ones until there's an
override).

Specific case: Santa Barbara, Cox ISP.





Re: MBone

2002-09-24 Thread Joe Touch

Matt Crawford wrote:
Barring that, please name ONE switch, or cite ONE credible reference
source, where arpspoofing is prevented at the switch by any means short
of harcoding the MACs.

 Never mind, even hard-coding the MACs to the right ports doesn't
 solve the problem.  Eve on port X can keep up a steady stream of ARP
 replies to Alice on port Y and Bob on port Z, telling each that the
 MAC address corresponding to their intended peer is that of Eve's
 machine.  It works even if Alice and Bob are both on port Y.

Now Eve has to guess 32 bits, which is de-facto harder than guessing a
multicast address of 28 bits.

Further, again, this assumes the switch complies. Some switches at ISPs
reject ARP traffic from the port altogether, generating it internally
instead.

Joe







Re: MBone

2002-09-23 Thread Joe Touch



Kevin C. Almeroth wrote:
It only requires being on a non-IGMP'd switch or a hub; at that point,
you can snoop the traffic and see any packet going to any multicast group.

It's much harder to snoop UDP; for non-broadcast, you'd have to be
in-line (on the wire, effectively) or on a hub. While hubs are becoming
less common, they're often being replaced with cheaper non-IGMP-capable
switches. Which means that they're still hubs, as far as multicast
traffic is concerned.


 Without a dobut you are right, though I think the degree of difference is
 awful small.  Through hosts with root on switches or through wireless into
 the mix and you are back to being roughly equivalent.

Hosts with root can't snoop anything but broadcast UDP on switches
unless the switch is configurable; many switches aren't.

 However, for any reasonable content provider the difference shouldn't
 matter.  If you have sensitive/valuable content, whether it is unicast
 or multicast, it should be protected.  To say that multicast isn't being
 used because there isn't security is a non-sequitor.

There certainly may be more immediate concerns (scalability, accounting,
etc.), but that doesn't mean security isn't a concern.

 Better yet, try RFC3171.  Bottom-line:  there are weak links in the chain.
 But, if those weak links weren't there, other links would be weak links,
 and THOSE weak links would still be weak enough to require using encryption.
 It just so happens that the weak multicast links are only a bit weaker than
 the unicast links.  Understand that convoluted logic?  :-)

Not quite; as Valdis observes.

Multicast is necessarily a LOT weaker:

1) I can get a copy of packets by normal operation
(join a group). there is no equivalent for UDP,
notably for paths that aren't shared.

2) UDP has application, network, and tunnel encryption that
is both widely deployed and widely used. there is
no equivalent for multicast.

Joe




Re: MBone

2002-09-23 Thread Kevin C. Almeroth

Multicast is necessarily a LOT weaker:

  1) I can get a copy of packets by normal operation
  (join a group). there is no equivalent for UDP,
  notably for paths that aren't shared.

Again, not in all cases.  You over-simplify the effectiveness of scoping.
You can't have it both ways.  Yes, there is a situation where you can obtain
a copy of a multicast packet through standard operation.  But the fact
that scoping and addressing make it non-trivial and the fact that normal
operation doesn't prevent you from snooping UDP packets shrinks the
gap from a LOT weaker.  And as I said before, if data security is important,
effectively there is no gap. 

  2) UDP has application, network, and tunnel encryption that
  is both widely deployed and widely used. there is
  no equivalent for multicast.

I disagree...  a number of commercial multicast apps have encryption.
Don't try and argue now that some relative percentage of multicast apps
have less encryption than unicast apps.  You're comparing a protocol that 
has been around a lot longer than multicast and trying to make an 
apples-to-apples comparison based on less availability.

And for the record, multicast is UDP.

-Kevin




Re: MBone

2002-09-23 Thread Joe Touch

Kevin C. Almeroth wrote:
Multicast is necessarily a LOT weaker:

 1) I can get a copy of packets by normal operation
 (join a group). there is no equivalent for UDP,
 notably for paths that aren't shared.


 Again, not in all cases.  You over-simplify the effectiveness of scoping.

Unicast has TTLs too.

 You can't have it both ways.  Yes, there is a situation where you can obtain
 a copy of a multicast packet through standard operation.  But the fact
 that scoping and addressing make it non-trivial

Agreed - scoping sets some boundaries, but it's primitive as a
'security' mechanism, because everyone within those boundaries can very
easily get a backet.

The same is just not nearly as true for unicast.

 2) UDP has application, network, and tunnel encryption that
 is both widely deployed and widely used. there is
 no equivalent for multicast.

 I disagree...  a number of commercial multicast apps have encryption.

Agreed. What I am asserting (by the above) is that security is clearly
important to the average user, and that the average user won't accept
obfuscation as a solution.

Joe




Re: MBone

2002-09-23 Thread Gary E. Miller

Yo Joe!

On Fri, 13 Sep 2002, Joe Touch wrote:

  Without a dobut you are right, though I think the degree of difference is
  awful small.  Through hosts with root on switches or through wireless into
  the mix and you are back to being roughly equivalent.

 Hosts with root can't snoop anything but broadcast UDP on switches
 unless the switch is configurable; many switches aren't.

root has no problem seeing adjacent UDP even on a switch.  Just overflow the
arp cache or poison it.

Here is a link to how it is done:
http://dhar.homelinux.com/dhar/downloads/Sniffers.pdf

The dsniff package includes tools for this purpose:
http://monkey.org/~dugsong/dsniff/

RGDS
GARY
---
Gary E. Miller Rellim 20340 Empire Blvd, Suite E-3, Bend, OR 97701
[EMAIL PROTECTED]  Tel:+1(541)382-8588 Fax: +1(541)382-8676





Re: MBone

2002-09-23 Thread Gary E. Miller

Yo Joe!

On Mon, 23 Sep 2002, Joe Touch wrote:

  root has no problem seeing adjacent UDP even on a switch.  Just
 overflow the arp cache or poison it.

 That all presumes the switch doesn't detect this as an attack and
 shutdown that link, which is an entirely reasonable reaction.

resonable yes, practical, no.

The only way I know to prevent this is to hard code the MACs on the
switch.  This is time consuming to install and to maintain.

Barring that, please name ONE switch, or cite ONE credible reference
source, where arpspoofing is prevented at the switch by any means short
of harcoding the MACs.

RGDS
GARY
---
Gary E. Miller Rellim 20340 Empire Blvd, Suite E-3, Bend, OR 97701
[EMAIL PROTECTED]  Tel:+1(541)382-8588 Fax: +1(541)382-8676





Re: MBone

2002-09-23 Thread Valdis . Kletnieks

On Fri, 13 Sep 2002 08:06:25 PDT, Joe Touch said:

 Hosts with root can't snoop anything but broadcast UDP on switches
 unless the switch is configurable; many switches aren't.

Unfortunately, this isn't actually true - unless you've nailed down the
switch with a hardwired MAC-address-per-port configuration, you can get it
to cough up other people's data.  The canonical brute force method is to
simply flood the poor switch's ARP cache and sniff the traffic while it's
learning.  Snooping around the various repositories of such tools would
find more subtle ways of doing it
-- 
Valdis Kletnieks
Computer Systems Senior Engineer
Virginia Tech




msg08983/pgp0.pgp
Description: PGP signature


Re: MBone

2002-09-23 Thread Matt Crawford

 Barring that, please name ONE switch, or cite ONE credible reference
 source, where arpspoofing is prevented at the switch by any means short
 of harcoding the MACs.

Never mind, even hard-coding the MACs to the right ports doesn't
solve the problem.  Eve on port X can keep up a steady stream of ARP
replies to Alice on port Y and Bob on port Z, telling each that the
MAC address corresponding to their intended peer is that of Eve's
machine.  It works even if Alice and Bob are both on port Y.




Re: MBone

2002-09-23 Thread Gary E. Miller

Yo Joe!

On Mon, 23 Sep 2002, Joe Touch wrote:

 PS - as I also raised on private email earlier, some ISPs definitely
 hardcode which MAC can attach to a port (i.e., they lock on the first
 one that gets there, and prevent subsequent ones until there's an
 override).

 Specific case: Santa Barbara, Cox ISP.

I will bet $20 that COX does it on the Cable modem and not the
switch.

uncapping cable modems to get around the MAC limit is getting
pretty common these days.  See:
http://www.cablemodemhack.com/

RGDS
GARY
---
Gary E. Miller Rellim 20340 Empire Blvd, Suite E-3, Bend, OR 97701
[EMAIL PROTECTED]  Tel:+1(541)382-8588 Fax: +1(541)382-8676





Re: MBone

2002-09-23 Thread Robert Elz

Date:Mon, 23 Sep 2002 17:58:21 -0500
From:Matt Crawford [EMAIL PROTECTED]
Message-ID:  [EMAIL PROTECTED]

  | Eve on port X can keep up a steady stream of ARP
  | replies to Alice on port Y and Bob on port Z, telling each that the
  | MAC address corresponding to their intended peer is that of Eve's
  | machine.  It works even if Alice and Bob are both on port Y.

But this one is visible at the end nodes, which makes it a stretch on
snooping...   All the end node needs to do is treat a gratuitous ARP
reply as a hint to send a new ARP request, instead of using it to replace
the ARP cache (don't most people do that these days?)

There's nothing Eve can do to prevent Alice from replying to Bob's ARP
query, so either Eve keeps quiet, and so doesn't get packets, or Eve
also replies, and Bob sees two different ARP replies - which is a sure
sign of something bogus happening (more like cannon fire announcing the
charge, than someone snooping on what is happening).

kre




Re: Mbone question: the multicast addresses

2000-03-21 Thread Kevin C. Almeroth

Sorry, I could not find an answer or a pointer through 

  http://www.ietf.org/meetings/multicast.html

My provider said that it supports mbone, but only enable it on demand
for specific addresses. Therefore, could anyone please inform me the 
multicast group addresses of the coming 47th IETF?

Chan 1 audio 224.0.1.11/21010
Chan 1 video 224.0.1.12/61010
Whiteboard   224.0.1.13/41010
Chan 2 audio 224.0.1.14/21020
Chan 2 video 224.0.1.15/61020

I included ports too...  also just advertised the sessions 
from UCSB...  will be up until the Adelaide folks get their
connectivity working.

-Kevin