Re: Last Call: draft-ietf-appsawg-http-forwarded-06.txt (Forwarded HTTP Extension) to Proposed Standard

2012-07-10 Thread Andreas Petersson
On Mon, 9 Jul 2012 14:27:49 -0400 Alissa Cooper acoo...@cdt.org wrote: (incorporating some responses to http://www.ietf.org/mail-archive/web/apps-discuss/current/msg06599.html as a LC comment) It would be helpful if this document could further motivate the need for proxies to generate

Re: [apps-discuss] Last Call: draft-ietf-appsawg-http-forwarded-06.txt (Forwarded HTTP Extension) to Proposed Standard

2012-07-10 Thread Andreas Petersson
On Mon, 09 Jul 2012 13:59:43 -0700 SM s...@resistor.net wrote: Also, this statement in 8.3 is not really true and probably better left out: Proxies using this extension will preserve the information of a direct connection, which has an end-user privacy impact, if the end- user or

Re: [apps-discuss] Last Call: draft-ietf-appsawg-http-forwarded-06.txt (Forwarded HTTP Extension) to Proposed Standard

2012-07-10 Thread Andreas Petersson
On Mon, 09 Jul 2012 22:48:59 +0100 Stephen Farrell stephen.farr...@cs.tcd.ie wrote: So I have a question about this draft that wasn't resolved on apps-discuss and is maybe more suited for IETF LC anyway. With geopriv, we've gone to a lot of trouble to support end-users having some

Re: [apps-discuss] Last Call: draft-ietf-appsawg-http-forwarded-06.txt (Forwarded HTTP Extension) to Proposed Standard

2012-07-10 Thread Andreas Petersson
On Mon, 09 Jul 2012 09:28:48 -0700 The IESG iesg-secret...@ietf.org wrote: 1. While RFC Required forces new registrations through the IETF RFC process, and might discourage registrations from individuals or organizations that are unfamiliar with or averse to that process, Specification

Re: Last Call: draft-ietf-appsawg-http-forwarded-06.txt (Forwarded HTTP Extension) to Proposed Standard

2012-07-10 Thread Alissa Cooper
Hi Andreas, On Jul 10, 2012, at 7:27 AM, Andreas Petersson wrote: The first statement above gets at this, but it seems to me that the middle ground between random generation per request and permanent unique token is worth emphasizing if there will be proxies that want to keep per-client

Re: Last Call: draft-ietf-appsawg-http-forwarded-06.txt (Forwarded HTTP Extension) to Proposed Standard

2012-07-10 Thread Andreas Petersson
On Tue, 10 Jul 2012 10:54:53 -0400 Alissa Cooper acoo...@cdt.org wrote: Hi Andreas, On Jul 10, 2012, at 7:27 AM, Andreas Petersson wrote: The first statement above gets at this, but it seems to me that the middle ground between random generation per request and permanent unique token is

Re: Last Call: draft-ietf-appsawg-http-forwarded-06.txt (Forwarded HTTP Extension) to Proposed Standard

2012-07-10 Thread Alissa Cooper
On Jul 10, 2012, at 12:07 PM, Andreas Petersson wrote: The first half of the statement is basically a refinement of the previous sentence in the section (The Forwarded HTTP header field, by design, exposes information that some users consider privacy sensitive), so I don't see what is lost

Re: [apps-discuss] Last Call: draft-ietf-appsawg-http-forwarded-06.txt (Forwarded HTTP Extension) to Proposed Standard

2012-07-10 Thread SM
Hi Andreas, At 04:28 10-07-2012, Andreas Petersson wrote: I interpret it the other way around. It makes a deployer aware that there is also end user expectations to take into considerations. Removing it may work as well, but I think that less well reflects the discussion on the apps-list.

Re: Gen-ART review of draft-ietf-behave-lsn-requirements-07

2012-07-10 Thread Simon Perreault
On 07/03/2012 08:24 AM, Alexey Melnikov wrote: I found the justification for REQ-6 hard to read/understand. Why does access to servers being on the internal network need to go through CGN at all? Here's the thing: the server is not on the internal network. It's on the external network, but it

secdir review of draft-ietf-behave-lsn-requirements

2012-07-10 Thread Sam Hartman
I have reviewed this document as part of the security directorate's ongoing effort to review all IETF documents being processed by the IESG.  These comments were written primarily for the benefit of the security area directors.  Document editors and WG chairs should treat these comments just like

Re: [apps-discuss] Last Call: draft-ietf-appsawg-http-forwarded-06.txt (Forwarded HTTP Extension) to Proposed Standard

2012-07-10 Thread Willy Tarreau
On Mon, Jul 09, 2012 at 10:48:59PM +0100, Stephen Farrell wrote: So I have a question about this draft that wasn't resolved on apps-discuss and is maybe more suited for IETF LC anyway. With geopriv, we've gone to a lot of trouble to support end-users having some control over their

Announce Bits-N-Bites Sponsor Program

2012-07-10 Thread IETF Chair
We are pleased to announce Bits-N-Bites, a new community networking experimental event that will take place for the first time at IETF 84 in Vancouver. This event will bring together IETF participants, with exhibitors, product vendors, and service providers to share information, and showcase

Re: secdir review of draft-ietf-behave-lsn-requirements

2012-07-10 Thread Simon Perreault
(adding p...@ietf.org to the recipients list...) Sam, Thanks for the review, comments inline... On 07/10/2012 02:16 PM, Sam Hartman wrote: Requirement 9 requires a Port Control Protocol (PCP) server. I think we need to say somewhat more about that in order for PCP to be secure on a CGN. In

Re: [pcp] secdir review of draft-ietf-behave-lsn-requirements

2012-07-10 Thread Simon Perreault
On 07/10/2012 04:03 PM, Sam Hartman wrote: and MUST NOT support the third-party option. Simon I think pcp-base-26 added restrictions to THIRD_PARTY so that it could Simon be used in CGN scenarios. If that is right, wouldn't it then make Simon sense to allow THIRD_PARTY on

Re: [pcp] secdir review of draft-ietf-behave-lsn-requirements

2012-07-10 Thread Shin Miyakawa
Then that still permits the case of third_party for administration motivating the text in 13.1. Makes sense to me. +1 How about adding a sentence like... CGN as described in this document does not provide any security benefits over either single-user NAT or no NAT at all. I agree with

WG Action: Formed Sip Traversal Required for Applications to Work (straw)

2012-07-10 Thread The IESG
A new IETF working group has been formed in the Real-time Applications and Infrastructure Area. For additional information please contact the Area Directors or the WG Chairs. Sip Traversal Required for Applications to Work (straw) Current Status:

RFC 6645 on IP Flow Information Accounting and Export Benchmarking Methodology

2012-07-10 Thread rfc-editor
A new Request for Comments is now available in online RFC libraries. RFC 6645 Title: IP Flow Information Accounting and Export Benchmarking Methodology Author: J. Novak Status: Informational Stream: IETF

RFC 6644 on Rebind Capability in DHCPv6 Reconfigure Messages

2012-07-10 Thread rfc-editor
A new Request for Comments is now available in online RFC libraries. RFC 6644 Title: Rebind Capability in DHCPv6 Reconfigure Messages Author: D. Evans, R. Droms, S. Jiang Status: Standards Track

Announce Bits-N-Bites Sponsor Program

2012-07-10 Thread IETF Chair
We are pleased to announce Bits-N-Bites, a new community networking experimental event that will take place for the first time at IETF 84 in Vancouver. This event will bring together IETF participants, with exhibitors, product vendors, and service providers to share information, and showcase

New Non-WG Mailing List: tcmtf -- Tunneling Compressed Multiplexed Traffic Flows (TCMTF) discussion list

2012-07-10 Thread IETF Secretariat
A new IETF non-working group email list has been created. List address: tc...@ietf.org Archive: http://www.ietf.org/mail-archive/web/tcmtf/ To subscribe: https://www.ietf.org/mailman/listinfo/tcmtf Purpose: This list is for discussing TCMTF, and the potential for a working group to focus on