Re: [homenet] Paul Wouters' Discuss on draft-ietf-homenet-front-end-naming-delegation-18: (with DISCUSS and COMMENT)

2022-11-01 Thread Juliusz Chroboczek
> Juliusz, please go read RFC2026. You are completely out of order. > Proposed standards do not need *ANY* interoperable implementations. Usually, neither implementation nor operational experience is required for the designation of a specification as a Proposed Standard. However, such ex

Re: [homenet] Paul Wouters' Discuss on draft-ietf-homenet-front-end-naming-delegation-18: (with DISCUSS and COMMENT)

2022-11-01 Thread Juliusz Chroboczek
Removing the IESG from CC. > I propose you start mentioning what you believe are unspecified gaps > that could lead to interoperability issues. With all due respect, Daniel, I'm a little surprised by this development. In this WG, we did spend a lot of effort ensuring that all of our specification

Re: [homenet] Lars Eggert's Abstain on draft-ietf-homenet-naming-architecture-dhc-options-22: (with COMMENT)

2022-10-21 Thread Juliusz Chroboczek
>> this document tries to describe would see adoption, it's become very >> clear that dynamic DNS services as described in Section 4 have won out >> here. These services are far from perfect, but at least some of the >> limitations in Section 4 have been addressed, and others are arguably a >> feat

[homenet] A few comments about draft-lemon-stub-networks-02

2021-09-01 Thread Juliusz Chroboczek
I haven't been following Ted's work on stub networks, and I've only just taken some time to read through the latest draft. Sorry if I repeat things that have already been said, I haven't caught up yet with my Homenet mail. A few quick comments while I think it over. 1. There's a lack of definit

Re: [homenet] Looking for a Homenet co-chair

2021-08-27 Thread Juliusz Chroboczek
> FWIW, I think there's further work after stub networks for HomeNet to do. We > now have Babel and Source-Specific routing, but I suspect that setting it up > will involve some innovation, and that ought to be documented. That would be RFC 9080. It's fully implemented in both hnetd and shncpd.

Re: [homenet] naming drafts

2021-06-08 Thread Juliusz Chroboczek
>> https://mailarchive.ietf.org/arch/msg/homenet/7JmkTCBSSMs5nnH3VWPj6JAL0cA/ > I didn't find any clear definition of how DDNS works in that email. [...] > What's the Performance Specification that describes this process? Yes, > I know where the vendor specific documentation is. As far as I'm a

Re: [homenet] naming drafts

2021-06-05 Thread Juliusz Chroboczek
Hi Michael, >> Stephen and Juliusz expressed that they're still not convinced that >> DDNS isn't a good enough solution for the use case. > Well, I'd be happy to discuss with this them again, but they'd have to > actually tell us what "DDNS" really is for them. https://mailarchive.ietf.org/arch/

Re: [homenet] I-D Action: draft-ietf-homenet-front-end-naming-delegation-15.txt

2021-05-25 Thread Juliusz Chroboczek
> #5 The arguments why this is better than DDNS don't convince > me, except for the last one (new RR types). Given that DDNS is > deployed, what's the chances that this would also get traction? I think that's an important point. I actually asked the very same question back in 2014: https://ma

Re: [homenet] biggest L2 domain

2019-12-17 Thread Juliusz Chroboczek
> I thought that we wrote somewhere in RFC7368 that the Homenet router should > collect as many ports as possible together into a single L2 zone. Section 3.3.2? ___ homenet mailing list homenet@ietf.org https://www.ietf.org/mailman/listinfo/homenet

Re: [homenet] DNCP/HNCP Revisited

2019-09-22 Thread Juliusz Chroboczek
> AFAICS there's certainly enough room for me to experiment with patches to > i) reduce MTU to avoid problems arising from L2 MTU mismatches and > ii) to reduce the amount of fragments (at the expense of more UDP packets) > without any tweaking of the standards. In case you're interested, here's t

Re: [homenet] DNCP/HNCP Revisited

2019-09-20 Thread Juliusz Chroboczek
>>> 1) DNCP allows an option of whether a network state TLV contains optional >>> nested payload (HNCP) TLV's or not. >> I'm pretty sure that's not the case. RFC 7787 Section 7.2.2. > A OK so you're saying this is already covered in (Section 4.4 of) 7787 [...] > state hash. The Node Sta

Re: [homenet] DNCP/HNCP Revisited

2019-09-20 Thread Juliusz Chroboczek
> 1) DNCP allows an option of whether a network state TLV contains optional > nested payload (HNCP) TLV's or not. I'm pretty sure that's not the case. RFC 7787 Section 7.2.2. The Network-State TLV only contains the network state hash, short Node-State TLVs are separate top-level TLVs. An implem

Re: [homenet] DNCP/HNCP Revisited

2019-09-19 Thread Juliusz Chroboczek
> The reason for the 64k limit is clear (due to the design choice of relying on > UDP fragmentation). > What's still unclear to me is why the packet contains all the nodes' TLV's. Because HNCP allows aggregating multiple TLVs in a single packet, to the implementation's discretion. Section 4.2 of

Re: [homenet] DNCP/HNCP Revisited

2019-09-19 Thread Juliusz Chroboczek
>> HNCP is a standards track protocol, and there's nobody left who's >> willing and competent to work on a new revision. > Yes, of course. We can never change a standards track protocol. That > would be wrong. :) My wording was perhaps badly chosen. Sorry for that. I meant to say that I don't c

Re: [homenet] DNCP/HNCP Revisited

2019-09-19 Thread Juliusz Chroboczek
> I notice in the current Openwrt code that the max UDP packet size is set at > 9000 octets with the comment: > /* Very arbitrary. On some implementations, I have seen some issues > * with 10+kb frames so we use this for now. It MUST be significantly > * more than 4k, due to how code is written

Re: [homenet] DNCP/HNCP Revisited

2019-09-19 Thread Juliusz Chroboczek
> This still doesn’t address the problem that the HNCP packet needs to be > fragmented. Fragmented Multicast doesn’t scale well. HNCP doesn't fragment multicast, it only uses fragmentation for (link-local) unicast. This is way less severe than what you incorrectly claim. At any rate, the right

Re: [homenet] DNCP/HNCP Revisited

2019-09-18 Thread Juliusz Chroboczek
> If you have a discontinuous L2 MTU, you do not need fragmented packets > to see packets disappear. Ah, I see. > No fragmentation of any sort involved, just incorrectly set up L2 segments. Right. It's an incorrect network setup. To fix that, it should be enough to point the tunnel directly at

Re: [homenet] DNCP/HNCP Revisited

2019-09-18 Thread Juliusz Chroboczek
> The problem is, how’d the packet get so big that it was fragmented? HNCP relies on network-layer fragmentation: it uses UDP and has no application-layer mechanism for fragmenting large TLVs. See Section 4.2 and Appendix B.2 of RFC 7787. (I seem to recall that an earlier version of DNCP include

Re: [homenet] DNCP/HNCP Revisited

2019-09-18 Thread Juliusz Chroboczek
> The L2TPv3 tunnel has a lower MTU than the local LAN, and does not report ICMP > PTB, so HNCP packets in one direction get through, but replies get dropped. Is that not a bug? -- Juliusz ___ homenet mailing list homenet@ietf.org https://www.ietf.org

Re: [homenet] IPv6 & firewall config in a home net

2019-09-04 Thread Juliusz Chroboczek
> Question: do PCP messages always go to the default route? Yes, at least according to 6887. > I re-read 6887 and that was unclear. Section 8.1: the default router list (for IPv4 and IPv6) is used as the list of PCP server(s). [...] For the purposes of this document, only a s

Re: [homenet] [babel] Éric Vyncke's Discuss on draft-ietf-babel-applicability-07: (with DISCUSS and COMMENT)

2019-08-08 Thread Juliusz Chroboczek
> Hmm, so do you think it's possible that HOMENET could land in the "uses > secure link layers" bucket? No opinion on the above. I'll only state that HNCP supports running over DTLS (this is implemented in hnetd, the reference implementation of HNCP). Section 8.3 of RFC 7787 describes a distribut

Re: [homenet] [Babel-users] althea presentation on isp in a box at nanog 76

2019-06-20 Thread Juliusz Chroboczek
> Interesting stuff - wireguard, fq_codel/sch_cake, babel with new > metric that allows for cryptocurrency traffic billing. Justin, could you please document the private TLVs that you're using and register them with IANA? (I'm currently under pressure to make the TLV allocation more onerous, and

Re: [homenet] securing zone transfer

2019-06-13 Thread Juliusz Chroboczek
> No, we are assuming that there are one or more homenet routers that either > come with a delegated domain from the manufacturer (probably a very ugly > one), or which that CPE's ISP will delegate via DHCPv6. (or both) I see. (I still disagree with the technical choices, especially that of bindi

Re: [homenet] securing zone transfer

2019-06-12 Thread Juliusz Chroboczek
>> Your turn now. Could you please describe the UI that you envision? > The list of names (from the internal mDNS/DNS-SD, as well as DHCP hostnames) > is presented to the house owner, they click on the ones that the want to > be publically visible. Are you assuming here there's a central Homenet

Re: [homenet] securing zone transfer

2019-06-12 Thread Juliusz Chroboczek
> It would seem your objection can be summarized as "we don't need this". > Correct me if I'm wrong. No, my objection is that I cannot see how that can work in a decentralised manner -- with no central Homenet controller. > To me is like saying we don't need a new routing protocol like BABEL, be

Re: [homenet] securing zone transfer

2019-06-11 Thread Juliusz Chroboczek
> Actually, it's fatal, because you can't get a certificate for "boombox.local" > so you can't secure it that way. So you always have to use the FQDN. That sucks, of course, but the problem is completely unrelated to being published in the global DNS -- the very same problem applies to names that

Re: [homenet] securing zone transfer

2019-06-11 Thread Juliusz Chroboczek
Dear Michael, >> Please see my unanswered e-mail of 21 November 2018. >> https://mailarchive.ietf.org/arch/msg/homenet/vz1kdCJISN6UPNZpj9ZD4e8EdwQ Thank you for your detailed reply. I'm glad we're finally having a discussion about my objections to Daniel's proposal. > We strongly believe that

Re: [homenet] securing zone transfer

2019-06-11 Thread Juliusz Chroboczek
> The front end naming architecture uses a primary and a secondary dns server to > synchronize a zone. People will recall that the need for a hidden primary hasn't been established yet. Please see my unanswered e-mail of 21 November 2018. https://mailarchive.ietf.org/arch/msg/homenet/vz1kdCJIS

Re: [homenet] wifi broadcast domain - Mikael Abrahamsson's comments

2019-04-03 Thread Juliusz Chroboczek
>> If there is a more complex HNCP network, then we could probably simulate >> the L2 scenario with VXLAN, configured by HNCP. > If memory serves, VXLAN requires support for multicast, which HNCP+Babel > doesn't provide. There's a set of IBM (?) extensions to VXLAN that avoid > the use of multica

Re: [homenet] wifi broadcast domain - Mikael Abrahamsson's comments

2019-04-03 Thread Juliusz Chroboczek
> If there is a more complex HNCP network, then we could probably simulate > the L2 scenario with VXLAN, configured by HNCP. If memory serves, VXLAN requires support for multicast, which HNCP+Babel doesn't provide. There's a set of IBM (?) extensions to VXLAN that avoid the use of multicast, I'm

Re: [homenet] wifi broadcast domain - Mikael Abrahamsson's comments

2019-04-02 Thread Juliusz Chroboczek
> prplMesh solves the wifi broadcast domain issue. >https://prplfoundation.org/working-groups/prplmesh/ >From their website: « prplMesh is an open-source, carrier-grade and certifiable implementation of the WiFi Alliance’s Multi-AP specification. » That's a purely layer 2 solution that relies

Re: [homenet] homenet: what now? ... next?

2019-03-14 Thread Juliusz Chroboczek
> PIE [...] lends itself better for implementation in existing hardware, > or hardware with small modification. Could one of you please explain why? ___ homenet mailing list homenet@ietf.org https://www.ietf.org/mailman/listinfo/homenet

Re: [homenet] homenet: what now? ... next?

2019-03-08 Thread Juliusz Chroboczek
>> I think that this work should be stalled until we have an implementation >> to play with and make some in vivo experiments. > I'm not sure if by "stalled" you mean sticking with the plan above, or > something else I'm concerned about two things: - if you're not implementing yourself, every

Re: [homenet] homenet: what now? ... next?

2019-03-08 Thread Juliusz Chroboczek
Hi Stephen, Sorry if I'm repeating myself -- I've already expressed the opinions below, both at the mike and on the list. > (a) work on simple naming I think that this work should be stalled until we have an implementation to play with and make some in vivo experiments. (Experience shows that t

Re: [homenet] homenet: what now? ... next?

2019-03-03 Thread Juliusz Chroboczek
> Both HNCP and Babel carry their control traffic over link-local IPv6, but > they support both IPv4 and IPv6 with almost equal functionality. > (The only significant difference is the treatment of border routers, which > are assumed to be doing NAT in IPv4 and stateless routing in

Re: [homenet] homenet: what now? ... next?

2019-03-03 Thread Juliusz Chroboczek
> I do remember that talk. CS grad students are not our target market. First year undergrad, Ted. Eighteen year-old lass with no previous networking experience. -- Juliusz ___ homenet mailing list homenet@ietf.org https://www.ietf.org/mailman/listinfo

Re: [homenet] homenet: what now? ... next?

2019-03-03 Thread Juliusz Chroboczek
>> It should be an easy fix, feel free to go ahead. > The point of soliciting participation at hackathon is for us to gain > collective experience on the easy or difficulty of deploying homenet in > practice. Oh, that's different, and not at all the motivation you give in your previous mail. Exp

Re: [homenet] homenet: what now? ... next?

2019-03-02 Thread Juliusz Chroboczek
>> Both HNCP and Babel carry their control traffic over link-local IPv6, but >> they support both IPv4 and IPv6 with almost equal functionality. >> >> (The only significant difference is the treatment of border routers, which >> are assumed to be doing NAT in IPv4 and stateless routing in IPv6.)

Re: [homenet] homenet: what now? ... next?

2019-03-02 Thread Juliusz Chroboczek
> Both HNCP and Babel carry their control traffic over link-local IPv6, but > they support both IPv4 and IPv6 with almost equal functionality. > in fact while what you are saying is technically true, in practice IPv4 > _is_ treated like a second-class citizen in the sense that if your > IS

Re: [homenet] homenet: what now? ... next?

2019-03-02 Thread Juliusz Chroboczek
> What I meant is that homenet router protocols are v6 only. No, they're not. Both HNCP and Babel carry their control traffic over link-local IPv6, but they support both IPv4 and IPv6 with almost equal functionality. (The only significant difference is the treatment of border routers, which are

Re: [homenet] draft-ietf-homenet-front-end-naming-delegation

2018-11-21 Thread Juliusz Chroboczek
Thanks for your reply, Daniel. > If I understand correctly the question is why do we have a Homenet Naming > Authority responsible to outsource the Homenet Zone to the Public > Authoritative > Servers ( Front End architecture) instead of having each device updating their > data directly to the Pu

Re: [homenet] draft-ietf-homenet-front-end-naming-delegation

2018-11-21 Thread Juliusz Chroboczek
Dear Daniel, > I am planning to update the front end naming delegation draft [1] in the next > weeks. Before revisiting the draft, I am collecting comments that need to be > addressed. After your talk at IETF-102, I asked what is the purpose of this rather complex protocol, and why it is prefera

Re: [homenet] writeup of my 2018 homenet experience on openwrt

2018-11-08 Thread Juliusz Chroboczek
> Markus, I tried to be really clear about what I was communicating on the > slide about implementations, but probably failed. Indeed. A number of your comments about Markus' code were entirely unnecessary. -- Juliusz ___ homenet mailing list homenet@

Re: [homenet] writeup of my 2018 homenet experience on openwrt

2018-11-08 Thread Juliusz Chroboczek
> Anyway, getting back to topic of Ted's passionate speech about bad HNCP > implementations, I'd love to see him (or someone else) provide better one :-) Ted is busy working on his implementation of Simple Naming. Please leave him in peace, it's important that he convince us that Simple Naming is

Re: [homenet] writeup of my 2018 homenet experience on openwrt

2018-11-08 Thread Juliusz Chroboczek
>> From a user perspective, there are a few problems: > When an interface goes down and then up again, it's renumbered. This > includes reboots. That shouldn't happen as long as there remains at least one Homenet router to maintain the prefix (see Section 4.1 point 3 of RFC 7695). I believe that

Re: [homenet] (no subject)

2018-07-24 Thread Juliusz Chroboczek
> Juliusz is saying that he wants a nearly stateless homenet; No, I'm not. > for him, putting the public/primary functional block in the cloud makes > sense No, it doesn't. Ted, please don't put words into my mouth. It's unpleasant, and it's disrespectful. -- Juliusz

Re: [homenet] (no subject)

2018-07-23 Thread Juliusz Chroboczek
> if the homenet loses its memory, it can simply refresh it from the cloud. What? ___ homenet mailing list homenet@ietf.org https://www.ietf.org/mailman/listinfo/homenet

[homenet] (no subject)

2018-07-23 Thread Juliusz Chroboczek
>> neither SIP, nor Skype, nor BitTorrent, nor syncthing, nor anything >> else that normal people run in their home relies on the DNS for >> locating remote peers. > If publishing things into global DNS worked reliably and automatically, > and we had IPv6 everywhere, such designs would not be need

Re: [homenet] draft-ietf-homenet-front-end-naming-delegation vs. DynDNS

2018-07-23 Thread Juliusz Chroboczek
> Why? What is wrong with the owner of the network selecting which devices > / services he/she wants globally reachable I don't think this is about global reachability (which is hopefully managed by PCP), it's about exporting names into the global DNS. We ought to distinguish the two -- you can b

Re: [homenet] draft-ietf-homenet-front-end-naming-delegation vs. DynDNS

2018-07-23 Thread Juliusz Chroboczek
> Apparently my comment was clear as mud. I meant this: > https://tools.ietf.org/html/draft-ietf-opsawg-mud-25 Quote, "YANG-based JSON that describes a Thing", unquote. 61 pages. Revision 25, and still a draft. I wish you a lot of fun implementing that. > Having a public/private zone pair where

Re: [homenet] draft-ietf-homenet-front-end-naming-delegation vs. DynDNS

2018-07-23 Thread Juliusz Chroboczek
> By using DynDns are you proposing to remove the requirement of having > a naming resolution mechanism internally in the homenet ? No. Naming *internal* to the Homenet needs another mechanism, perhaps what Ted is designing (and implementing), perhaps something else. Exporting names from the Hom

Re: [homenet] draft-ietf-homenet-front-end-naming-delegation vs. DynDNS

2018-07-19 Thread Juliusz Chroboczek
> One way to automate this would be using mud. A bright light shines from the heavens, bathing you in its warm glow. An enormous, white temple stands to the north, taking most of your view. In order to enter the Temple of Homenet Naming, you must travel up the large staircase that stands in fron

Re: [homenet] draft-ietf-homenet-front-end-naming-delegation vs. DynDNS

2018-07-19 Thread Juliusz Chroboczek
> On the other hand same thing using nsupdate (using TSIG and dynamic > dns) is one command line + input file for nsupdate: Cool. Whichever end-to-end (host to DNS provider with no intermediate proxying) encrypted and authentified protocol you pick, I'm with you. -- Juliusz

Re: [homenet] draft-ietf-homenet-front-end-naming-delegation vs. DynDNS

2018-07-19 Thread Juliusz Chroboczek
>> And it's literally four lines of shell: > vs > while true; do > (omitted for brevity) You're doing end-to-end dynamic update over DNS, which is fine with me. The exact transport we end up using doesn't matter that much. You're not doing the proxying through a hidden master mandated by Daniel

Re: [homenet] draft-ietf-homenet-front-end-naming-delegation vs. DynDNS

2018-07-19 Thread Juliusz Chroboczek
> I am not speaking about discovery within the Homenet. I am speaking about > exporting names into the global DNS, which is what Daniel's draft is > about. > Yes, but the problem is that you are treating this as if these are two > separate problems, but they are not. These are two com

Re: [homenet] In-network connectivity and HNCP: IPv6 ULA

2018-07-19 Thread Juliusz Chroboczek
> I think the local ULA should be used for all intra-ULA connections. We had a > debate about this about four years ago, and apparently the text in the HNCP > spec reflects the outcome of that discussion, but I think we understand the > problem better now and we should fix this. Agreed. _

Re: [homenet] In-network connectivity and HNCP: IPv6 ULA

2018-07-19 Thread Juliusz Chroboczek
I've re-read Section 6.5 of 7788, and it looks like I was wrong. Sorry, I should not be writing technical mails in the middle of the night. As far as I can tell from the wording of 6.5: - creating ULA is SHOULD if there's no global IPv6, MUST NOT otherwise; - creating private IPv4 is MAY if

Re: [homenet] draft-ietf-homenet-front-end-naming-delegation vs. DynDNS

2018-07-19 Thread Juliusz Chroboczek
> In order for services to be discoverable on the homenet, they have to > publish their contact info on the homenet. The protocol that everyone > uses for this is DNSSD. This is how you find your printer when you want > to print to it. Nobody uses the ad-hoc DynDNS protocol for this. I am not spea

Re: [homenet] In-network connectivity and HNCP: IPv6 ULA

2018-07-18 Thread Juliusz Chroboczek
>> But if we want homenet to be widely adopted, I do not think this is the >> correct default behavior: it violates the principle of least surprise. > There's no surprise, it just works. RFC 6724, Section 6, Rule 8. Er, no. ULAs have global scope. My bad. -- Juliusz _

Re: [homenet] In-network connectivity and HNCP: IPv6 ULA

2018-07-18 Thread Juliusz Chroboczek
> In order for IPv6 to be useful, you need naming to work. No argument here. > But if we want homenet to be widely adopted, I do not think this is the > correct default behavior: it violates the principle of least surprise. There's no surprise, it just works. RFC 6724, Section 6, Rule 8. -- Ju

Re: [homenet] draft-ietf-homenet-front-end-naming-delegation vs. DynDNS

2018-07-18 Thread Juliusz Chroboczek
> All of this can be done in the DNS without resorting to any other protocol. Excellent. So what technical reasons are there to prefer the complexity of draft...front-end-naming-delegation over a trivial update protocol, whether encapsulated in HTTPS or DNS? -- Juliusz _

[homenet] In-network connectivity and HNCP: IPv6 ULA

2018-07-18 Thread Juliusz Chroboczek
During his talk, Ted claimed that he lost all connectivity when his uplink went down. This should not happen -- HNCP normally maintains an IPv6 ULA that remains stable no matter what happens to DHCPv6 prefix delegations or DHCPv4 leases. This is described in Section 6.5 of RFC 7788, and it is the

[homenet] draft-ietf-homenet-front-end-naming-delegation vs. DynDNS

2018-07-18 Thread Juliusz Chroboczek
Dear all, Since the 1990s, people have been putting their dynamically allocated IPv4 addresses into global DNS by using a family of gratuitiously incompatible trivial protocols. The technique doesn't have an official name (let alone a specification), and is usually referred to as DDNS, DynDNS or

[homenet] About Babel security

2018-07-18 Thread Juliusz Chroboczek
For people who have missed the Babel meeting, both David and I have done our best to write self-contained slides. They're here: https://datatracker.ietf.org/meeting/102/materials/slides-102-babel-hmac-in-babel-00 https://datatracker.ietf.org/meeting/102/materials/slides-102-babel-dtls-i

Re: [homenet] Benjamin Kaduk's No Objection on draft-ietf-homenet-babel-profile-06: (with COMMENT)

2018-07-18 Thread Juliusz Chroboczek
>REQ5: a Homenet implementation of Babel MUST use metrics that are of >a similar magnitude to the values suggested in Appendix A of >RFC 6126bis. > "MUST" and "similar magnitude" are not a great pairing. Fixed. This is now "must", the exact values are still SHOULD. > I agree with th

Re: [homenet] Ben Campbell's No Objection on draft-ietf-homenet-babel-profile-06: (with COMMENT)

2018-07-18 Thread Juliusz Chroboczek
> §2.1, REQ5: I agree with Benjamin Kaduk that " MUST use metrics that are of >a similar magnitude" is a bit vague to be used with a MUST. This is now "must". Exact values are still SHOULD. > §1.1: Please consider using the 8174 boilerplate. There is at least one > instance of a lower case k

Re: [homenet] Alvaro Retana's No Objection on draft-ietf-homenet-babel-profile-06: (with COMMENT)

2018-07-18 Thread Juliusz Chroboczek
> I do have some non-blocking comments: Thank you very much, Alvaro. > (1) I think that this document walks a fine line when Normatively > referring to Appendix A in rfc6126bis given that it is an informative > appendix. Fixed to use non-normative language, as you suggested. > (2) This reminds

Re: [homenet] homenet agenda update

2018-07-10 Thread Juliusz Chroboczek
> - draft-ietf-homenet-babel-profile-06 waiting on Juliusz for updated draft My current draft of -07 is here: https://raw.githubusercontent.com/jech/babel-drafts/master/draft-ietf-homenet-babel-profile/draft-ietf-homenet-babel-profile.xml It addresses all of Tim Chown's Opsdir review, almost

[homenet] A summary of Babel cryptographic extensions

2018-07-07 Thread Juliusz Chroboczek
Hi, and sorry for the massive cross-posting. I suggest followups should go to babel@ietf. The mails that I'm receiving indicate that we (Babel@IETF) have confused some people with our crypto plans. Thanks to all for your questions, and let me please try to clarify things publicly. Considering s

Re: [homenet] I-D Action: draft-ietf-homenet-simple-naming-02.txt

2018-07-03 Thread Juliusz Chroboczek
> My biggest problem is that I don't have a very clear idea of how this all fits > together. Same here. As I mentioned at the microphone in London, there's a lot of moving pieces here, and everybody would feel much more comfortable if 1. we could have a look at Ted's implementation; and 2. s

Re: [homenet] [babel] about Babel security (questions for Juliusz Chroboczek)

2018-06-29 Thread Juliusz Chroboczek
>> The draft lives here: >> >> https://github.com/jech/babel-drafts/tree/master/draft-decimo-babel-dtls > As far as the commit history goes, the file was first added to the > repository above on 25 June 2018 (four days ago), then it was updated > three times on 27 June 2018 and two times on 29

Re: [homenet] [babel] about Babel security (questions for Juliusz Chroboczek)

2018-06-29 Thread Juliusz Chroboczek
Dear Denis, Thank you very much for your kind mail. Unfortunately, I think there might be some confusion: - DTLS is Stenberg-style security; - HMAC is Ovsienko-style security, - it has four variants (7298, 7298bis, DKC, Stenberg) - two of which have fatal flaws (7298 and 7298

Re: [homenet] Introduction to draft-ietf-homenet-simple-naming

2018-05-30 Thread Juliusz Chroboczek
> Well, let me invent something. I throw together my network and it > names the printers as printer1 and printer2. Being a stickler, > I decide to rename them as Printer 1 and Printer 2. I mess around > and find a config file somewhere and manually edit it. Let me rephrase it: « F

Re: [homenet] Martin Vigoureux's No Objection on draft-ietf-homenet-babel-profile-06: (with COMMENT)

2018-05-07 Thread Juliusz Chroboczek
> Perhaps he refers to the RFC8174 update to the boilerplate: Ah, thanks. Will do. -- Juliusz ___ homenet mailing list homenet@ietf.org https://www.ietf.org/mailman/listinfo/homenet

Re: [homenet] Martin Vigoureux's No Objection on draft-ietf-homenet-babel-profile-06: (with COMMENT)

2018-05-07 Thread Juliusz Chroboczek
> you should refer to 8174. Perhaps you could kindly justify your advice? Non-capitalised "must" is used just once in this document, and I don't see any opportunity for ambiguity. -- Juliusz ___ homenet mailing list homenet@ietf.org https://www.ietf

Re: [homenet] Genart last call review of draft-ietf-homenet-babel-profile-05

2018-02-22 Thread Juliusz Chroboczek
After much thought, I have settled on the following: Rationale: support for wireless transit links is a distinguishing feature of Homenet, and one that is requested by our users. In the absence of dynamically computed metrics, the routing protocol attempts to minimise the

Re: [homenet] Genart last call review of draft-ietf-homenet-babel-profile-05

2018-02-22 Thread Juliusz Chroboczek
> we are writing a standards document, not a 19th century romance novel It is a truth generally acknowledged that a single man in possession of a good fortune must be in want of a home network. ___ homenet mailing list homenet@ietf.org https://www.ietf.

Re: [homenet] Genart last call review of draft-ietf-homenet-babel-profile-05

2018-02-21 Thread Juliusz Chroboczek
>> This is not the notion that I tried to express, probably badly. It's not >> necessarily the important feature, it's the one that will make people >> implement and deploy the protocol stack in the first place. > Suggestion for '"killer feature" of Homenet': driver for using Homenet That's good

Re: [homenet] Genart last call review of draft-ietf-homenet-babel-profile-05

2018-02-21 Thread Juliusz Chroboczek
> I too think the rationale is important but the phrasing may be confusing. > Being > a native speaker of U.S. English (and almost fluent in Southern Californiaese > ;-) I found the colloquialisms confusing. Being myself a native speaker of an Eastern-European dialect with way too many postalveol

Re: [homenet] Genart last call review of draft-ietf-homenet-babel-profile-05

2018-02-20 Thread Juliusz Chroboczek
> I am the assigned Gen-ART reviewer for this draft. Thanks for your comments, Stewart. > if implementations use conflicting route selection policies, > persistent oscillations might occur. SB> Is this consistent with the statement earlier in the para that SB> " Distinct SB> implement

Re: [homenet] security work items - what do we want to do?

2018-01-31 Thread Juliusz Chroboczek
> the AmazonEcho/GoogleHome/Mycroft/etc. devices seem like ideal platforms > to be the root of a secure network. Huh? -- Juliusz ___ homenet mailing list homenet@ietf.org https://www.ietf.org/mailman/listinfo/homenet

Re: [homenet] security work items - what do we want to do?

2018-01-24 Thread Juliusz Chroboczek
> I do agree we'd need to know e.g. whether Babel implementations would > plan to support what flavours of DTLS (e.g. pre-shared keys vs. bare > public keys vs. certs if they do plan to use DTLS), I'm not worried about Babel. I am worried about HNCP, since I fear there's nobody who's both able a

Re: [homenet] I-D Action: draft-ietf-homenet-babel-profile-04.txt

2018-01-03 Thread Juliusz Chroboczek
> Filename: draft-ietf-homenet-babel-profile-04.txt Barbara has pointed out that I had some minor changes in my git repository that I hadn't submitted yet. Barbara also requested that I upgrade this draft to Standards Track before I quit. I couldn't possibly bring myself to refuse

[homenet] I quit as editor of draft-ietf-homenet-babel-profile

2018-01-03 Thread Juliusz Chroboczek
Dear Barbara, dear Stephen, After re-reading the comments I have received on the mailing list, and re-reading my slides from 2017-03-27, I have decided that this has taken way too long. I hereby quit as editor of draft-ietf-homenet-babel-profile. Should you be able to find a new editor, I expect

Re: [homenet] homenet-babel-profile: determining link type

2017-11-21 Thread Juliusz Chroboczek
>> Should we really only suggest that the router dynamically probe the >> quality of wireless links? Or would it make sense to suggest dynamic >> probing of all links, because assuming the entire path between 2 >> routers uses a single physical layer technology may not be a good >> assumption? > I

Re: [homenet] homenet-babel-profile: determining link type

2017-11-20 Thread Juliusz Chroboczek
>REQ6: a Homenet implementation of Babel SHOULD distinguish between >wired and wireless links ; if it is unable to determine whether a link >is wired or wireless, it SHOULD make the worst-case hypothesis that >the link is wireless. It SHOULD dynamically probe the quality of >wi

Re: [homenet] homenet-babel-profile: status experimental?

2017-11-20 Thread Juliusz Chroboczek
> Currently the draft has intended status of "Experimental". That's what Mark told me to do. > Given the intended status of 6126bis is Standards Track (and HNCP (RFC > 7788) is also Standards Track), would it make sense to make > homenet-babel-profile Standards Track as well? Yes, I think so. >

Re: [homenet] homenet-babel-profile: references

2017-11-20 Thread Juliusz Chroboczek
>> draft-chouasne-babel-tos-specific-00 may also cause issues, even though >> it is just informational. You may want to consider removing the >> reference so it doesn't create issues. > Ok. Does the same apply to [BABEL-Z]? ___ homenet mailing list hom

Re: [homenet] homenet-babel-profile: references

2017-11-20 Thread Juliusz Chroboczek
Thanks, Barbara. > The first 4 references to the "Babel routing protocol" spec are to > [RFC6126bis]. All subsequent mentions are to RFC 6126. Changed to 6126bis throughout. Since Homenet depends on source-specific, and source-specific depends on mandatory bits, Homenet cannot be implemented wit

Re: [homenet] comments on babel-profile-03

2017-11-19 Thread Juliusz Chroboczek
> I re-read babel-profile-03 and have a few comments (below) > offered as a WG participant (i.e. chair hat off) as part of > WGLC. Thanks, this is appreciated. > - Req5: Is "MUST be... of a similar magnitude..." clear enough? Yes. Minor tweaks to metrics don't cause suboptimal routing -- if one

[homenet] About draft-homenet-babel-profile

2017-11-16 Thread Juliusz Chroboczek
Cross-posting between Babel and Homenet. At this morning's Babel meeting, Barbara asked whether the work going on in Babel on security means that homenet-babel-profile should be delayed. I said no. Please, no. I beg you, Barbara, no. I started working on this document in early autumn of 2016.

Re: [homenet] support for HNCP in IPv6 CE routers

2017-10-27 Thread Juliusz Chroboczek
>> I think you're underestimating normal people, James. > Bear with me please. With you -- always. > It's worth noting that in the vast majority of cases like you describe, > the CE router provided by the ISP is only serviceable by the provider, or > if it *is* serviceable by the subscriber, the

Re: [homenet] support for HNCP in IPv6 CE routers

2017-10-27 Thread Juliusz Chroboczek
> The protocols we are developing here in HOMENET are for the tiny minority > of people who prefer to build their own home networks instead of just > plumbing their ISP directly up to every device in their home. I think you're underestimating normal people, James. I do not remember the last time

Re: [homenet] support for HNCP in IPv6 CE routers

2017-10-26 Thread Juliusz Chroboczek
> I find the model of "there is a CPE, and behind that CPE, I connect > another router to get homenet functionality" a bit unsatisfactory. I think there are two possible deployment models. 1. The « My Friendly ISP » model Every ISP-provided CPE participates in HNCP. Each ISP has access to all t

Re: [homenet] Fwd: I-D Action: draft-lemon-homenet-babel-security-latest-00.txt

2017-10-25 Thread Juliusz Chroboczek
> That makes perfect sense to me. I don't think the DTLS implementation would be > that hard—is there any chance that anyone would be interested in working on > this during the hackathon in Singapore? A student of mine (Antonin, whom you might remember from Berlin) has been working on that. Unfor

Re: [homenet] Fwd: I-D Action: draft-lemon-homenet-babel-security-latest-00.txt

2017-10-25 Thread Juliusz Chroboczek
[Added babel@ietf to CC.] Thanks, Ted. > https://datatracker.ietf.org/doc/draft-lemon-homenet-babel-security-latest/ I'm not a security specialist, so just a few comments: 1. You're using a TLV, which means that the TLV parser runs before auth. Is this good practice? What about using the pack

Re: [homenet] draft-ietf-homenet-babel-profile: please review Security Considerations

2017-10-25 Thread Juliusz Chroboczek
> Please, please, please take the time to read the Security Considerations > and tell me if there's anything I need to change. > https://tools.ietf.org/html/draft-ietf-homenet-babel-profile-02#section-4 This is now https://tools.ietf.org/html/draft-ietf-homenet-babel-profile-03#section-4

[homenet] draft-ietf-homenet-babel-profile: please review Security Considerations

2017-10-25 Thread Juliusz Chroboczek
Dear all, This is just to remind you that I'm going to request Last Call for draft-ietf-homenet-babel-profile. I'll be submitting a very slightly amended (editorial changes only) version in the next days. Please, please, please take the time to read the Security Considerations and tell me if the

Re: [homenet] [Technical Errata Reported] RFC7788 (5113)

2017-09-13 Thread Juliusz Chroboczek
Confirmed, this is consistent with both known implementations of HNCP, as well as with the tcpdump parser. This was also confirmed by Markus Stenberg in a mail dated 9 June 2016 to myself and the former Homenet chairs. Message-Id: <0aacde36-6a89-471e-8eea-b6a90197b...@iki.fi> -- Juliusz _

Re: [homenet] Status of draft-tldm-simple-homenet-naming CFA

2017-08-18 Thread Juliusz Chroboczek
>> If the fast connection's DNS server replies after a delay or not at all, >> and the slow connection's DNS server replies in a timely manner, using >> a smart resolver across all the available DNS servers will improve latenc > Yes, but if your fast connection is lossy, it's not fast. Lossy looks

  1   2   3   4   5   6   7   >