RE: [Ietf-honest] Subscriptions to ietf-honest

2009-03-24 Thread Hallam-Baker, Phillip
$100 so far And Dean is in my state so small claims is just down the road. -Original Message- From: ietf-honest-boun...@lists.iadl.org on behalf of Dean Anderson Sent: Mon 3/23/2009 10:46 PM To: John Levine Cc: ietf-hon...@lists.iadl.org; ietf@ietf.org; dcroc...@bbiw.net Subject: Re:

Proposal RE: Subscriptions to ietf-honest

2009-03-24 Thread Hallam-Baker, Phillip
I suggest that all mail that is cross posted to Mr Andreson IETF-Honest or whatever other spam list Mr Spammer decides to create be blocked from all IETF lists. That way any IETF-er who feeds the troll will not anoy the rest. And any IETF-er who blacklists Mr Spammer and his spam lists will

RE: [Ietf-honest] Subscriptions to ietf-honest

2009-03-23 Thread Hallam-Baker, Phillip
I asked to be unsubscribed, he refused. I have informed him that any further messages will be considered consulting engagements and billed as such. I suggest everyone else does the same. I am a professional chartered engineer. I offer consulting services at a commercial rate. Anyone who

RE: [Ietf-honest] Consensus Call for draft-housley-tls-authz

2009-03-12 Thread Hallam-Baker, Phillip
And this is inevitable as you cannot control use of technology by controlling a registry. IANA is a consensual illusion. It only has the power to assign names as long as the community agrees that it performs that role. Patent encumberances must not be used to deny IANA code points. If that

RE: Terminal room at IETF74

2009-03-11 Thread Hallam-Baker, Phillip
OK lets do a closer security analysis. What is the asset at risk here? - The data on the hard drive What is the risk? - Disclosure So lets take a deperimeterized approach, what is the smallest security perimeter that secures the assets? - Round the hard drive. So one solution that many of us

RE: Consensus Call for draft-housley-tls-authz

2009-03-10 Thread Hallam-Baker, Phillip
ensure that there is almost no visible correlation between the success of a protocol and progress in IETF process. From: Stephan Wenger [mailto:st...@stewe.org] Sent: Tue 3/10/2009 9:40 AM To: Hallam-Baker, Phillip; Steven M. Bellovin Cc: SM; r...@gnu.org; ietf

RE: Consensus Call for draft-housley-tls-authz

2009-03-10 Thread Hallam-Baker, Phillip
Institute the policy as you suggest and you have just given the patent trolls the power to place an indefinite hold on any IETF proposal. So instead of extorting payment for exercise of the claims they hold the standard hostage. -Original Message- From: ietf-boun...@ietf.org

RE: Consensus Call for draft-housley-tls-authz

2009-03-09 Thread Hallam-Baker, Phillip
1) Patents happen, get over it. Under the current patent system a company that does not apply for patents risks finding that a patent troll has applied for their idea. This is perjury, it should be prosecuted. But it is not. And fighting that type of lawsuit has cost comapnies involved in

RE: Consensus Call for draft-housley-tls-authz

2009-03-09 Thread Hallam-Baker, Phillip
Steve, Endorsment of a standard implies two (separable) assertions: 1) Do 'X'. 2) If you are going to do 'X', then do it by doing 'Y' An experimental specification on the other hand contains the assertions 1) It might be desirable to do 'X' 2) It might be possible to do 'X' by doing 'Y'

RE: Consensus Call for draft-housley-tls-authz

2009-03-09 Thread Hallam-Baker, Phillip
When British Leyland shut down the assembly line for the Triumph TR7 they found a note that said, 'Your proposal to prime and paint the TR7 bodyshells before moving them a hundred miles in open rail cars to the assembly plant has been made before. If only stopping rust was so simple'. The

RE: Abstract on Page 1?

2009-03-05 Thread Hallam-Baker, Phillip
I doubt that this is a huge tool-builder issue. Lets not go looking for problems. I think moving the boilerplate is a good idea, particularly for people who are still reading the TXT versions of the docs. The only piece I would keep on the front page is the bit that says where comments should

RE: Terminal room at IETF74

2009-03-04 Thread Hallam-Baker, Phillip
Indeed I recently read an indignant complaint from one country concerning commercial espionage conducted by a second. Said conduct having been exposed by the employment by similar espionage tactics by the first against the second. -Original Message- From: ietf-boun...@ietf.org on

RE: Internet Society joins Liberty Alliance Management Board: Why?

2009-03-03 Thread Hallam-Baker, Phillip
I think that a rather more fundamental problem is the fact that the IETF constitution prevents any organization or party speaking on behalf of the IETF as a whole. I agree that it would be rather better if the IAB could take on this particular role than ISOC. But even the IAB can only

RE: Running Code

2009-03-03 Thread Hallam-Baker, Phillip
I don't see the value of running code quite as others do. For me the value of running code is that the requirement to actually implement stuff does tend to reduce the scope for complexity, you have someone in the room pushing against something that will make work for them. And the other

RE: Terminal room at IETF74

2009-03-02 Thread Hallam-Baker, Phillip
Does this help? http://www.bayarealaptops.com/ -Original Message- From: ietf-boun...@ietf.org on behalf of Dearlove, Christopher (UK) Sent: Mon 3/2/2009 5:04 AM To: ietf@ietf.org Subject: Terminal room at IETF74 I believe this to be on-topic for this list based on the summary of

RE: Comments requested on recent appeal to the IESG

2009-02-26 Thread Hallam-Baker, Phillip
. This is inevitable because there will be occasions where the intended authorization policy for a resource is to allow through everything that is authenticated. From: Stephen Kent [mailto:k...@bbn.com] Sent: Fri 2/20/2009 2:49 PM To: Hallam-Baker, Phillip Cc: ietf

RE: Proposal to create IETF IPR Advisory Board

2009-02-19 Thread Hallam-Baker, Phillip
I already tried weaving that particular bright shiny object. plus the suggestion that we move from a three stage standards process to two. And it did not work. Quick someone mention nazis. From: ietf-boun...@ietf.org on behalf of Christian Huitema Sent: Thu

RE: Comments requested on recent appeal to the IESG

2009-02-19 Thread Hallam-Baker, Phillip
Just as a matter of observation, there is not and never has been a security requirement to rigidly separate authentication and authorization. Indeed there is no real world deployment in which authentication and authorization are not conflated to some degree. The separation of authentication

RE: Previous consensus on not changing patent policy (Re: Referencesto Redphone's patent)

2009-02-18 Thread Hallam-Baker, Phillip
Do you think that the IETF has changed direction though? Methinks not. This is one of those issues where there is a faction that will defend the status quo regardless of the flaws that are revealed. They will wait till the end of the discussion and announce that there is no consensus to do

RE: Proposal to create IETF IPR Advisory Board

2009-02-18 Thread Hallam-Baker, Phillip
I am somewhat concerned about the legal liabilities of such a board. There are many types of patent encumberance, as with many other issues in a consensus organization, the stupider the claim, the more difficulty it causes. Lets look at some examples: Case 1: DH/RSA Patent here was

RE: Previous consensus on not changing patent policy (Re:Referencesto Redphone's patent)

2009-02-18 Thread Hallam-Baker, Phillip
of their minions? I think not. -Original Message- From: Powers Chuck-RXCP20 [mailto:chuck.pow...@motorola.com] Sent: Wed 2/18/2009 5:32 PM To: Hallam-Baker, Phillip; TSG; John Levine Cc: ietf@ietf.org Subject: RE: Previous consensus on not changing patent policy (Re:Referencesto Redphone's patent

How we got here, RE: References to Redphone's patent

2009-02-13 Thread Hallam-Baker, Phillip
There is certainly something wrong, but the source is not necessarily the IETF. The USPTO seems to be a bigger source of the problem here. There are many problems with the current approach of leaving patent policy to groups, not least the fact that case by case negotiation on a per-working

RE: References to Redphone's patent

2009-02-13 Thread Hallam-Baker, Phillip
No, please do not go there. You do not want negotiating flexibility in this type of situation. Instead of looking how to arrive at a deal, the IETF needs to think about structuring the incentives so that there is no gain for a patent troll. -Original Message- From:

RE: How we got here, RE: References to Redphone's patent

2009-02-13 Thread Hallam-Baker, Phillip
. Moreover nobody can implement until the IPR issues are fully understood. -Original Message- From: Brian E Carpenter [mailto:brian.e.carpen...@gmail.com] Sent: Fri 2/13/2009 6:40 PM To: Hallam-Baker, Phillip Cc: ietf@ietf.org Subject: Re: How we got here, RE: References to Redphone's patent

RE: IETF and open source license compatibility

2009-02-12 Thread Hallam-Baker, Phillip
Some points: 1) Open Source software and 'free software' as defined by the FSF are not the same thing. Historically, open source licenses such as BSD and Apache or in the case of CERN libwww, a grant to the public domain have proved considerably more effective than GNU copyleft. The World

RE: TLS WG Chair Comments on draft-ietf-tls-authz-07

2009-02-11 Thread Hallam-Baker, Phillip
Could I just point out here the real risk that this relevant objection might get lost in the sea of irrelevant aggitation from the FSF supporters? From: ietf-boun...@ietf.org on behalf of Eric Rescorla Sent: Tue 2/10/2009 11:57 PM To: ietf@ietf.org Subject:

RE: Ah, I see the cause of the situation now... (tls-authz situation)

2009-02-10 Thread Hallam-Baker, Phillip
I think Melinda makes a good point here. The fundamental problem with these RMS-grams is that RMS has a longstanding habit of working in write only mode. He makes little or often no effort to determine what the situation is. I have in the past found him entirely interested in responding to

RE: The internet architecture

2008-12-28 Thread Hallam-Baker, Phillip
It depends on what level you are looking at the problem from In my opinion, application layer systems should not make assumptions that have functional (as opposed to performance) implications on the inner semantics of IP addresses. From the functionality point of view an IP address should be

RE: The Great Naming Debate (was Re: The internet architecture)

2008-12-16 Thread Hallam-Baker, Phillip
feel that a lot of the disagreement results from a misunderstanding of exactly what I (and perhaps others who have made similar proposals) was proposing... On Dec 4, 2008, at 10:29 PM, Keith Moore wrote: Hallam-Baker, Phillip wrote: I am trying to parse this claim. Are you saying

RE: The internet architecture

2008-12-05 Thread Hallam-Baker, Phillip
Yes, that is indeed where the world is going. My point is that it would be nice if the IETF had a means of guiding the outcome here through an appropriate statement from the IAB. Legacy applications are legacy. But we can and should push new applications to use SRV based connections or some

IAB plenary discussion: Was RE: Applications assume bilateral connections?

2008-12-04 Thread Hallam-Baker, Phillip
From: John C Klensin [mailto:[EMAIL PROTECTED] It was not clear from the context of the argument what was being referred to. Seemed more likely that they were imaging something involving more parties than bilateral. It was one of those 'well people only disagree with me because they are

RE: The internet architecture

2008-12-04 Thread Hallam-Baker, Phillip
I am trying to parse this claim. Are you saying that the DNS is fragile and raw IP relatively robust? If so I can show you mountains of evidence to show that you are completely wrong. -Original Message- From: [EMAIL PROTECTED] on behalf of Keith Moore Sent: Thu 12/4/2008 1:23 PM To:

NAT66 discussion has been exhausted long ago (was: RE: where to have the NAT66 discussion )

2008-12-03 Thread Hallam-Baker, Phillip
There are really two separate questions here: 1) Should application developers write protocols that make assumptions as to the Source/Destination IP headers remaining constant end to end? 2) Should NAT66 be prohibited in order to allow such assumptions to be made? And then there is the

Applications assume bilateral connections?

2008-12-02 Thread Hallam-Baker, Phillip
One of the topics that came up in the architectural debate is that a few folk made statements of the form that application developers assume that applications only engage in bilateral communications. In fact one person went so far that applications developers are not aware of the range of

RE: Applications assume bilateral connections?

2008-12-02 Thread Hallam-Baker, Phillip
: John C Klensin [mailto:[EMAIL PROTECTED] Sent: Tue 12/2/2008 10:43 AM To: Hallam-Baker, Phillip; ietf@ietf.org Subject: Re: Applications assume bilateral connections? --On Tuesday, 02 December, 2008 07:04 -0800 Hallam-Baker, Phillip [EMAIL PROTECTED] wrote: One of the topics that came up

RE: [BEHAVE] Lack of need for 66nat : Long term impacttoapplicationdevelopers

2008-12-02 Thread Hallam-Baker, Phillip
Why should anyone care if an internal network is on IPv6 or not? That is probably the silliest part of the NAT66 debate. I am only going to be deploying IPv6 for the few hosts that actually need to receive inbound connections. And I don't expect that to be more than a few hosts on a home

RE: The internet architecture

2008-12-01 Thread Hallam-Baker, Phillip
Right, the DNS is no longer providing mere hostname mapping and host discovery, it is providing service mapping and service discovery. [EMAIL PROTECTED] does not connect to an IP address, the outgoing email server first attempts to resolve MX records. What we are discussing here is

RE: The internet architecture

2008-12-01 Thread Hallam-Baker, Phillip
Well technically you are right, but you are still wrong :-0 I know you can get IPv4 on a controller. But I think you will need more than 1kB for IPv6 since IPSEC is required... And IPSEC requires public key on the controller. Yes there are bigger processors, but what I am interested in doing

RE: [BEHAVE] Lack of need for 66nat : Long term impact to applicationdevelopers

2008-11-28 Thread Hallam-Baker, Phillip
: Mark Andrews [mailto:[EMAIL PROTECTED] Sent: Wed 11/26/2008 5:40 PM To: Hallam-Baker, Phillip Cc: Eric Klein; Fred Baker; [EMAIL PROTECTED] WG; IAB; IETF Discussion; [EMAIL PROTECTED]; IESG IESG Subject: Re: [BEHAVE] Lack of need for 66nat : Long term impact to applicationdevelopers In message

RE: [BEHAVE] Lack of need for 66nat : Long term impact toapplicationdevelopers

2008-11-28 Thread Hallam-Baker, Phillip
It is quite easy to see how an application that is designed to tolerate renumbering is able to cope with it given appropriate O/S and protocol level support. I suspect what is happening there is that SSH loses the connection and then transparently attempts to reconnect before telling the user

RE: [BEHAVE] Lack of need for 66nat : Long term impactto applicationdevelopers

2008-11-28 Thread Hallam-Baker, Phillip
Again, there needs to be an expectations reset here. The pro-NAT faction are not 'asking' for anything. They are serving notice that this is the approach that they intend to take. You are saying, 'you can beg for your NAT but I am not giving it to you, now go away'. They are saying, 'I do not

The internet architecture

2008-11-26 Thread Hallam-Baker, Phillip
[Behave dropped, this is an architectural level discussion. If we don't want this on ietf we should start a different forum] I don't think that this claim is right: Promoters of NAT, particularly vendors, seem to have a two-valued view of the network in which inside is good and outside is

RE: Lack of need for 66nat : Long term impact to applicationdevelopers

2008-11-26 Thread Hallam-Baker, Phillip
Could we agree on a consensus point that: 'Any application developer who designs a protocol on the assumption it will not be subject to NAT66 may be disappointed' I think that it is beyond rational argument to claim otherwise. Furthermore, if it is really the interests of application layer

RE: [BEHAVE] Lack of need for 66nat : Long term impact to applicationdevelopers

2008-11-26 Thread Hallam-Baker, Phillip
The problem here is that the Behave group seems to have people who are making IETF wide policy. So that is why opponents of the behave position think that the appropriate forum is the IETF list. Behave can decide not to do a NAT66. But what they cannot do is to decide that NAT66 should be

RE: [BEHAVE] Lack of need for 66nat : Long term impact to applicationdevelopers

2008-11-26 Thread Hallam-Baker, Phillip
Eric, The problem here is that you assume that the IETF has decision power that can magic away NAT66. Clearly it did not for NAT44 and will not for NAT66. So the real question for App designers is: 1) Should they design protocols that assume no NAT66 2) Should they regard the assumption

RE: [BEHAVE] Lack of need for 66nat : Long term impact to applicationdevelopers

2008-11-26 Thread Hallam-Baker, Phillip
Keith More writes: I don't think so in either case. The reason I don't think so is that I suspect the NAT traversal problem is really a firewall traversal problem in disguise. Absolutely, and that is why there needs to be a permissions system that allows effective decisions to be made

RE: [BEHAVE] Lack of need for 66nat : Long term impact to applicationdevelopers

2008-11-26 Thread Hallam-Baker, Phillip
I don't quite understand what you men by this. My internal DNS for the house does not reveal the existence of any of the machines to the outside world. Multiple horizons have been a feature of DNS for decades now. The only thing global about DNS is that there is only one consensus holder of

RE: [BEHAVE] Lack of need for 66nat : Long term impact toapplicationdevelopers

2008-11-26 Thread Hallam-Baker, Phillip
when it is not. Making use of that cheap energy is going to mean moving the computing effort to where the power is. From: Ned Freed [mailto:[EMAIL PROTECTED] Sent: Wed 11/26/2008 12:17 PM To: Hallam-Baker, Phillip Cc: Eric Klein; Fred Baker; behaveietforg WG; IAB

FTP to HISTORIC? RE: [BEHAVE] Can we have on NAT66 discussion?

2008-11-14 Thread Hallam-Baker, Phillip
and let others propose a replacement if there is a genuine need. From: Keith Moore [mailto:[EMAIL PROTECTED] Sent: Thu 11/13/2008 6:03 PM To: Hallam-Baker, Phillip Cc: Mark Townsley; Eric Klein; Routing Research Group Mailing List; Behave WG; [EMAIL PROTECTED

RE: [BEHAVE] Can we have on NAT66 discussion?

2008-11-14 Thread Hallam-Baker, Phillip
, Phillip Cc: Keith Moore; Behave WG; IETF Discussion; Routing Research Group Mailing List; Eric Klein; Mark Townsley Subject: Re: [BEHAVE] Can we have on NAT66 discussion? On 13 nov 2008, at 23:50, Hallam-Baker, Phillip wrote: The most successful Internet protocols do not involve connections

RE: several messages

2008-11-13 Thread Hallam-Baker, Phillip
This is a somewhat silly discussion, pretty much the ONLY real reason to use your own domain rather than a gmail or aol or whatever is precisely the fact that switching costs are high. And the real problem is not gmail.com but comcast.net. If access to the email address requires continuation

RE: [BEHAVE] Can we have on NAT66 discussion?

2008-11-13 Thread Hallam-Baker, Phillip
I beleive that the question would not arise If we had a coherent Internet architecture The idea that an application can or should care that the IP address of a packet is constant from source to destination is plain bonkers. It was no an assumption in the original Internet architecture and

RE: IPv6 traffic stats (was: Re: Last Call: draft-irtf-asrg-dnsbl(DNS Blacklists and Whitelists))

2008-11-13 Thread Hallam-Baker, Phillip
Who cares about the use measurement? I care about the proportion of the Internet where I can obtain acceptable service with full functionality via an IPv6-only endpoint connection. From: [EMAIL PROTECTED] on behalf of David Kessens Sent: Wed 11/12/2008 4:28 PM

RE: [BEHAVE] Can we have on NAT66 discussion?

2008-11-13 Thread Hallam-Baker, Phillip
, Phillip Cc: Mark Townsley; Eric Klein; Routing Research Group Mailing List; Behave WG; [EMAIL PROTECTED]; ietf@ietf.org Subject: Re: [BEHAVE] Can we have on NAT66 discussion? On 11/13/08 10:06 AM, Hallam-Baker, Phillip allegedly wrote: I beleive that the question would not arise If we had

RE: [BEHAVE] Can we have on NAT66 discussion?

2008-11-13 Thread Hallam-Baker, Phillip
before that book came out). From: Eric Klein [mailto:[EMAIL PROTECTED] Sent: Thu 11/13/2008 2:07 PM To: Hallam-Baker, Phillip Cc: Mark Townsley; Routing Research Group Mailing List; Behave WG; [EMAIL PROTECTED]; ietf@ietf.org Subject: Re: [BEHAVE] Can we have

RE: IP-based reputation services vs. DNSBL (long)

2008-11-13 Thread Hallam-Baker, Phillip
if the other side has queued up RCPT and DATA commands in the HELO packet. From: [EMAIL PROTECTED] on behalf of Chris Lewis Sent: Thu 11/13/2008 3:52 PM Cc: IETF Subject: Re: IP-based reputation services vs. DNSBL (long) Hallam-Baker, Phillip wrote: To answer your

RE: Context specific semantics was Re: uncooperative DNSBLs, wasseveral messages

2008-11-13 Thread Hallam-Baker, Phillip
Since I have been critical of the insistence on a new RR in other contexts, I will give the reasons why I am unconvinced in this particular case and indeed would argue that a specific RR would be more effective. First, let us consider the reasons why you might want to re-use an RR rather than

RE: [BEHAVE] Can we have on NAT66 discussion?

2008-11-13 Thread Hallam-Baker, Phillip
[mailto:[EMAIL PROTECTED] Sent: Thu 11/13/2008 4:34 PM To: Hallam-Baker, Phillip Cc: [EMAIL PROTECTED]; Behave WG; IETF Discussion; Routing Research Group Mailing List Subject: Re: [BEHAVE] Can we have on NAT66 discussion? On 13 nov 2008, at 22:15, Hallam-Baker, Phillip wrote: Well yes

RE: [BEHAVE] Can we have on NAT66 discussion?

2008-11-13 Thread Hallam-Baker, Phillip
:[EMAIL PROTECTED] Sent: Thu 11/13/2008 5:28 PM To: Hallam-Baker, Phillip Cc: Mark Townsley; Eric Klein; Routing Research Group Mailing List; Behave WG; [EMAIL PROTECTED]; ietf@ietf.org Subject: Re: [BEHAVE] Can we have on NAT66 discussion? Hallam-Baker, Phillip wrote: I beleive

RE: IPv6 traffic stats

2008-11-12 Thread Hallam-Baker, Phillip
It looks to me as if these are developer and interoperability issues that are not going to be addressed of their own accord through regular IETF meetings. I think that the only way we could expect progress here would be to have a series of interop events that involve representatives from all

RE: IP-based reputation services vs. DNSBL (long)

2008-11-12 Thread Hallam-Baker, Phillip
Agree with your conclusion but your statement is not quite accurate. Some spammers have in fact developed schemes that involve spoofing the source IP address of TCP sessions, but only where both IP addresses were under spammer control. What some spammers used to do when dialup connections

RE: IP-based reputation services vs. DNSBL (long)

2008-11-11 Thread Hallam-Baker, Phillip
Well, we have a critical dependency on a star that is going to run out of hydrogen at some point... From: [EMAIL PROTECTED] on behalf of Dave CROCKER Sent: Tue 11/11/2008 10:42 AM To: [EMAIL PROTECTED] Cc: ietf@ietf.org Subject: Re: IP-based reputation

Hey my local ISP has IPv6 connection!

2008-10-29 Thread Hallam-Baker, Phillip
Did a ping this morning from my residential broadband, was surprised to see responses from an IPv6 address. Woo-hoo! Only small problem is the complete lack of IPv4. ___ Ietf mailing list Ietf@ietf.org https://www.ietf.org/mailman/listinfo/ietf

RE: placing a dollar value on IETF IP.

2008-10-28 Thread Hallam-Baker, Phillip
There was indeed a major struggle over the standardization of the light bulb socket. And the sad part is that due to patent encumberances the US unfortunately ended up with the inferior product! Neither Swan nor Edison thought much about the mount. It was Swan's brother who did most to refine

RE: placing a dollar value on IETF IP.

2008-10-28 Thread Hallam-Baker, Phillip
are your friend. That said, any new protocol would have to use the DNS and MIME content types at a minimum. From: John C Klensin [mailto:[EMAIL PROTECTED] Sent: Tue 10/28/2008 1:12 PM To: Hallam-Baker, Phillip; Andrew G. Malis Cc: [EMAIL PROTECTED]; IETF Discussion

RE: On being public (Was: Call for Nominees)

2008-09-16 Thread Hallam-Baker, Phillip
We have made changes of this nature in the past. For example, last time this issue came up the solution that was defacto adopted was to impose term limits. I don't necessarily think term limits are the best solution but there was a definite probem of long term incumbency in certain particular

RE: SHOULD vs MUST case sensitivity

2008-07-01 Thread Hallam-Baker, Phillip
Looks good, but needs some smitthing. I think that the sense that I would want is: * Whenever the keywords are used they are to be considered normative * Whenever the keywords are used they SHOULD be capitalized * Editors SHOULD avoid use of normative keywords for non-normative language, even

RE: SHOULD vs MUST case sensitivity

2008-07-01 Thread Hallam-Baker, Phillip
requirements for those protocols are met. * You SHOULD specify test vectors * You MAY include code that implements the algorithm And so on. From: John Levine [mailto:[EMAIL PROTECTED] Sent: Tue 7/1/2008 11:40 AM To: ietf@ietf.org Cc: Hallam-Baker, Phillip Subject

RE: Update of RFC 2606 based on the recent ICANN changes ?

2008-07-01 Thread Hallam-Baker, Phillip
Another like restriction that might be investigated is whether http://microsoft/ or other similar corporate TLDs would work as intended with deployed legacy browsers. I suspect (but have not tried) that if you simply type 'Microsoft' into the address bar of some browsers you might have the

RE: Update of RFC 2606 based on the recent ICANN changes ?

2008-06-27 Thread Hallam-Baker, Phillip
Just register .local and do not assign it in the same way that 10.x.x.x and 192.168.x.x are registered. From: [EMAIL PROTECTED] on behalf of Joe Abley Sent: Fri 6/27/2008 4:31 PM To: David Conrad Cc: SM; ietf@ietf.org Subject: Re: Update of RFC 2606 based on the

RE: I mentioned once that certain actions of the IETF may be criminallyprosecutable in nature...

2008-06-02 Thread Hallam-Baker, Phillip
Todd, This is nonsense, stop it. Of course IETF communications could give rise to the posibility of criminal prosecutions in certain circumstances. The IESG could in theory plot a murder. That does not mean that every legal concotion you imagine is backed by criminal sanctions. On

RE: ISSN for RFC Series under Consideration

2008-05-23 Thread Hallam-Baker, Phillip
Some points: 1) If the objective is to have a URN for RFCs this has already been done: RFC 2648: http://www.ietf.org/rfc/rfc2648.txt A URN Namespace for IETF Documents These identifiers must be the canonical identifiers for the RFC series. But they need not be the only identifiers. 2)

RE: ISSN for RFC Series under Consideration

2008-05-23 Thread Hallam-Baker, Phillip
I would rather pay $1 to provide bigger, better cookies or tap-dancing penguins during the plenaries. I see no value in doing this and in fact plenty of reasons to oppose it. Where is the $1500 of value to the IETF here? I can see the value to DOI. If the IETF were to go this route it

Re: ISSN for RFC Series under Consideration

2008-05-21 Thread Hallam-Baker, Phillip
So? The rules of academic citation are broken. Take a look at their idiotic criteria for citing web pages. Unfortunately the folk who designed the reference manager for office 2008 made the mistake of taking them seriously. It is not possible to cite urls for articles as a result. Sent

RE: IETF Website Redesign Effort

2008-05-08 Thread Hallam-Baker, Phillip
Actually this represents currently accepted engineering practice in the usability field. According to Nielsen you can identify 80% of issues with small scale studies of 5 people. The point here is not to create a statistically representative sample, it is to identity the chief issues that may be

RE: IESG Statement on Spam Control on IETF Mailing Lists

2008-04-15 Thread Hallam-Baker, Phillip
I don't think it is helpful for the IETF to describe its work product as 'flavor-of-the-month'. DKIM is an IETF Proposed Standard. Using DKIM is thus a dog-food issue. SPF/Sender-ID on the other hand are arguably not at the same status but there is a general consensus amongst the spam

RE: IESG Statement on Spam Control on IETF Mailing Lists

2008-04-14 Thread Hallam-Baker, Phillip
I would suggest that the IESG also think about hosting all IETF lists in house in the future. The main reason for this is legal, a list that is maintained by the IETF is much more satisfactory in a patent dispute than one run by a third party. Last thing we want is to have patent trolls dragging

RE: IESG Statement on Spam Control on IETF Mailing Lists

2008-04-14 Thread Hallam-Baker, Phillip
. I would suggest doing this gradually by making in house maintenance a requirement for all new lists as they are created. -Original Message- From: Russ Housley [mailto:[EMAIL PROTECTED] Sent: Monday, April 14, 2008 10:25 AM To: Hallam-Baker, Phillip Cc: ietf@ietf.org; [EMAIL

RE: Last Call: draft-klensin-rfc2821bis

2008-03-27 Thread Hallam-Baker, Phillip
. And begging the question is a logical fallacy in which the conclusion is assumed in the premise, petition principii. From: Tony Hain [mailto:[EMAIL PROTECTED] Sent: Wed 26/03/2008 6:59 PM To: Hallam-Baker, Phillip; ietf@ietf.org Subject: RE: Last Call: draft

RE: Last Call: draft-klensin-rfc2821bis

2008-03-27 Thread Hallam-Baker, Phillip
The key issue here is whether people who rely on are likely to achieve their desired result. Today it does not matter because anyone who relies on alone with no A fallback is going to receive almost no mail. That in turn is going to depend on whether software implementations are written

RE: Last Call: draft-klensin-rfc2821bis

2008-03-26 Thread Hallam-Baker, Phillip
I don't undestand the reasoning here. My understanding is that we implicitly deprecated receivers relying on fallback to A in 2821. Section 5 makes it clear that you look for MX first and that MX takes priority. It is thus not compliant to look at records today and I see no reason to

IPv6 incentive? RE: Last Call: draft-klensin-rfc2821bis

2008-03-26 Thread Hallam-Baker, Phillip
It is pretty clear here that we are talking about a configuration that is actually specfically prohibited by 2821. If you are doing SMTP and claiming to be 2821 compliant you must lookup the MX and you must not look at the A if there is no MX there. Any sender that is breaking those rules is

Usability RE: Write an RFC Was: experiments in the ietf week

2008-03-25 Thread Hallam-Baker, Phillip
would make it incumbent on us to fix the same problems in our protocols. -Original Message- From: Patrik Fältström [mailto:[EMAIL PROTECTED] Sent: Mon 24/03/2008 10:30 PM To: Hallam-Baker, Phillip Cc: Russ Housley; IETF Discussion Subject: Re: Write an RFC Was: experiments in the ietf

RE: Write an RFC Was: experiments in the ietf week

2008-03-25 Thread Hallam-Baker, Phillip
with human subjects criteria. Its not much of a security experiment if you only measure whether people can deploy it. From: Andrew G. Malis [mailto:[EMAIL PROTECTED] Sent: Tue 25/03/2008 9:05 AM To: Patrik Fältström Cc: Hallam-Baker, Phillip; IETF Discussion Subject

Re: Possible RFC 3683 PR-action

2008-03-25 Thread Hallam-Baker, Phillip
If someone participates under a pseudonym with the objective of inserting patented technology and anyone finds out they are in big trouble. Much worse than any prior case. The much bigger problem is people who read an rfc and write out a patent application over it. It has happened and people

RE: experiments in the ietf week

2008-03-24 Thread Hallam-Baker, Phillip
These claims are meaningless to me. Transport and network layer security have distinct objectives and purposes. They are not replacements or interchangeable in any sense. If you beleive that there is an attack that SSL is vulnerable to you should bring it up in TLS. In general the higher

Write an RFC Was: experiments in the ietf week

2008-03-24 Thread Hallam-Baker, Phillip
Enough, already. If we are going to have experiments in IETF week then lets do the thing right and have a process. In particular - Proposer MUST write an Internet Draft prior to the experiment stating: 1) Purpose - the information to be obtained 2) Method - what it to be done 3) Resources -

RE: Write an RFC Was: experiments in the ietf week

2008-03-24 Thread Hallam-Baker, Phillip
Well I would submit that there is a major problem there on the security usability front. Don't make me think. My tolerance for network configuration is vastly greater than the typical user. This has to all just work, just like my Apple Mac did on the home network the day I bought it. Not

RE: Write an RFC Was: experiments in the ietf week

2008-03-24 Thread Hallam-Baker, Phillip
. I have no trust anchor. -Original Message- From: Russ Housley [mailto:[EMAIL PROTECTED] Sent: Mon 24/03/2008 3:22 PM To: Hallam-Baker, Phillip Cc: IETF Discussion Subject: Re: Write an RFC Was: experiments in the ietf week Phillip: Have you tried the SSID at the IETF meetings

RE: Confirming vs. second-guessing

2008-03-18 Thread Hallam-Baker, Phillip
Lets look at this from a security usability point of view. The whole nomcon process is opaque, all meetings and discussions are secret. Requests for comment are solicited in confidence. Given those circumstances it is a reasonable assumption for a participant to make that all nomcon actions

RE: Confirming vs. second-guessing

2008-03-18 Thread Hallam-Baker, Phillip
But what is an 'obvious mistake in the result'? All I can think of is that the Nomcon would make a choice that the confirming body found controversial. While that might be because the ten momcon members somehow managed to remain ignorant that a particular person was incompetent, had a felony

RE: Confirming vs. second-guessing

2008-03-18 Thread Hallam-Baker, Phillip
Well there you hit the problem of the status-quo veto. The most effective aspect of the IETF constitution is that it is essentially impossible to overturn the status-quo without arriving at a 'consensus', the existence of which is judged by the incumbent establishment. We cannot apparently

RE: Confirming vs. second-guessing

2008-03-18 Thread Hallam-Baker, Phillip
The minutes of that meeting are online, its pretty much the point at which the system then broke for many years: http://www.iab.org/documents/iabmins/IABmins.1992-06-18.html Understanding this particular history is rather helpful if you want to understand the early history of the World Wide

RE: Confirming vs. second-guessing

2008-03-17 Thread Hallam-Baker, Phillip
I think you have the whole confirmation process backwards. If you start from the premise that the absolute priority is to keep control in the hands of the establishment you naturally arrive at a need for at least two bodies arranged so that each acts as a guardianship council to the other.

Re: IETF Last Call on Walled Garden Standard for the Internet

2008-03-13 Thread Hallam-Baker, Phillip
It occurs to me that a protocol of this type might well have been used to effect by the recently reired governor of a nearby state to ensure that his communications were in strict compliance with certain regulations that enforce certain geographic routing restrictions. Sent from my GoodLink

Design for Deployment (yes you IPv6 wg!) RE: Was it foreseen ..

2008-03-10 Thread Hallam-Baker, Phillip
the economics of deployment is a critical part of deploying the solution. Ross Anderson has some resources on this topic. -Original Message- From: [EMAIL PROTECTED] on behalf of Hallam-Baker, Phillip Sent: Sat 08/03/2008 9:18 PM To: Jeroen Massar; Patrik Fältström Cc: IETF discussion list

Re: Was it foreseen that the Internet might handle 242 Gbps of trafficfor Oprah's Book Club webinars?

2008-03-09 Thread Hallam-Baker, Phillip
(www.good.com) -Original Message- From: Patrik Fältström [mailto:[EMAIL PROTECTED] Sent: Sunday, March 09, 2008 06:49 AM Pacific Standard Time To: Hallam-Baker, Phillip Cc: Jeroen Massar; IETF discussion list Subject:Re: Was it foreseen that the Internet might handle 242

RE: Was it foreseen that the Internet might handle 242 Gbps of trafficfor Oprah's Book Club webinars?

2008-03-08 Thread Hallam-Baker, Phillip
The problem with multicast in this application is that it only works if all the clients are accepting the same data stream and viewing it live. That's not how people tend to view Web video, there might be 50% of the crowd watching it as Oprah speaks but the rest are likely to be time shifted

Re: LAST CALL on: draft-iab-dns-choices-05

2008-03-06 Thread Hallam-Baker, Phillip
I have changed the subject line to reflect the fact that the IAB chair informs me that this is in fact a consultation period and not as was indicated in the original subject line a report of a decision already taken. The list of comments does not include my core objection made in the 'Domain

RE: Impending publication: draft-iab-dns-choices-05

2008-03-04 Thread Hallam-Baker, Phillip
The IAB tracker indicated this document was dead, now we are told that publication is imminent. Why? Do we get to ask the author to address the other proposals that have been made to address this issue (XPTR) or does it just get published regardless of whether the claims made are true or not?

  1   2   3   4   5   6   7   8   >