Last Call results: draft-carpenter-rescind-3683-03.txt

2007-10-10 Thread Sam Hartman
require a new draft. If that draft were to be approved it would need to start the publication process at the beginning by finding a sponsoring AD. Brian, thanks for all your work on this issue. While we did not end up approving your draft, I think the discussion was informative and useful. Sam Hartman

Re: Comments on draft-aboba-sg-experiment-02

2007-10-10 Thread Sam Hartman
Eliot == Eliot Lear [EMAIL PROTECTED] writes: Eliot What is the result of a SG hitting its mile stones? We move on to evaluating its work. Now, there is a question of what happens when an SG misses its milestones. I could see an argument that hints at us being wrong that we had sufficient

Re: Last Call: draft-ietf-dnsop-reflectors-are-evil (Preventing Use of Recursive Nameservers in Reflector Attacks) to BCP

2007-10-03 Thread Sam Hartman
Stephane == Stephane Bortzmeyer [EMAIL PROTECTED] writes: Stephane But suggesting ORNS (Open Recursive Name Servers) for Stephane the solution to this issue is, indeed, a bad idea (do Stephane note I did not say the N word), for the reasons Stephane explained in

Re: [DNSOP] Re: Last Call: draft-ietf-dnsop-reflectors-are-evil (Preventing Use of Recursive Nameservers in Reflector Attacks) to BCP

2007-10-02 Thread Sam Hartman
Joao == Joao Damas [EMAIL PROTECTED] writes: Joao It does indeed as Stephane pointed out. Opening up your Joao resolver so you can server roaming users, without further Joao protection, is, at best, naive. I'd appreciate it if you took Paul's comments a lot more seriously and

Would someone help the secretariat figure out why they cannot route to teredo addresses?

2007-10-01 Thread Sam Hartman
Hi. I opened a ticket with the secretariat a few weeks ago complaining that I cannot reach www.ietf.org using a teredo address either allocated through the Microsoft Teredo server or the Debian teredo server. This is annoying because glibc's source address selection algorithm seems to prefer

Re: secid review of draft-ietf-ipv6-deprecate-rh0-01

2007-09-25 Thread Sam Hartman
So, BCP 61's claim that MUST is for implementers and SHOULD is for users is always something I've interpreted as non-normative and additional explanation of RFC 2199. Well, I' guess it is normative in that we do not for security reasons require that security be used. I certainly think reviewing

Re: [Geopriv] Response to appeal dated 22-June-2007

2007-09-21 Thread Sam Hartman
Ted, speaking as an individual. I completely agree that personnel decisions of ADs should be able to be appealed. I actually considered proposing text modifications to make it clear that there might be circumstances where it would be appropriate for the IESG to resolve the conflict. I and I

Re: Last Call: draft-aboba-sg-experiment (Experiment in Study Group Formation within the Internet Engineering Task Force (IETF)) to Experimental RFC

2007-09-11 Thread Sam Hartman
I think we should explicitly say that SGs follow WG rules. ___ Ietf mailing list Ietf@ietf.org https://www1.ietf.org/mailman/listinfo/ietf

Re: Symptoms vs. Causes

2007-09-11 Thread Sam Hartman
Shumon == Shumon Huque [EMAIL PROTECTED] writes: Shumon And yes, I agree that a new properly designed version of Shumon HTTP Digest authentication might be one way to help. As Shumon well as the various zero knowledge protocols. I believe that http digest plus channel bindings does

Re: [Ietf-http-auth] Re: Next step on web phishing draft (draft-hartman-webauth-phishing-05.txt)

2007-09-10 Thread Sam Hartman
Chris == Chris Drake [EMAIL PROTECTED] writes: Chris Hi Alexey, And if you would like to suggest a better process for moving things forward, please share your opinion. Chris Suggest: Properly document comments and reviews somewhere. Chris Question: what's the best way to

Re: The Internet 2.0 box Was: IPv6 addresses really are scarce after all

2007-08-23 Thread Sam Hartman
Keith == Keith Moore [EMAIL PROTECTED] writes: Keith Hallam-Baker, Phillip wrote: If we can meet the needs of 80% of Internet users with some form of shared access there will be more addresses left for the 20% with greater needs. Keith with 2**128 potential

Re: Review of draft-hartman-webauth-phishing-05

2007-08-22 Thread Sam Hartman
Ah. I must admit that I find the whole concept of informational documents a heck of a lot less useful, but your reading of 2026 is of course correct. I'll probably still end up treating informational documents as close to ietf consensus statements (but not recommendations) in my head because

Re: Review of draft-hartman-webauth-phishing-05

2007-08-22 Thread Sam Hartman
Henning == Henning Schulzrinne [EMAIL PROTECTED] writes: Henning Rather than an IESG note or in addition to, I think the Henning author should clearly state, in the abstract, that this Henning is a personal opinion only. I don't think my personal opinion would make a very useful

Re: Review of draft-hartman-webauth-phishing-05

2007-08-22 Thread Sam Hartman
Hi. Both your and Eric's comments need a longer response. It was my intent to use strong and weak password equivelantsin the same way as the IAB document. We agree on what the IAB document defines the terms to mean. I'll go look through my text and clarify what needs clarification. I'm

Re: Informational vs. Informational

2007-08-21 Thread Sam Hartman
Eric == Eric Rescorla [EMAIL PROTECTED] writes: Eric Well, the difference is in part the IESG note. More Eric importantly, the question is whether the IESG intends to Eric hold future work to the requirements in this document. If Eric they do, then this document needs

Re: IPv6 addresses really are scarce after all

2007-08-21 Thread Sam Hartman
Keith == Keith Moore [EMAIL PROTECTED] writes: Fourth, lots of folks (me included) happen to find it convenient to use NAT between my site/house/office and my upstream provider. Keith do you also find it convenient that NAT has effectively Keith thwarted the deployment of

Re: Review of draft-hartman-webauth-phishing-05

2007-08-21 Thread Sam Hartman
Paul == Paul Hoffman [EMAIL PROTECTED] writes: I do hope that we have consensus these are good requirements, Paul We absolutely do not have any such consensus. There was Paul barely any discussion during IETF Last Call. There was not a Paul mailing list for discussing the

Re: Review of draft-hartman-webauth-phishing-05

2007-08-20 Thread Sam Hartman
Hi, Eric, responding as an individual. Obviously, I disagree with your basic claim that it is too early to write a document like this. I've asked the sponsoring AD to make a consensus call on whether we have sufficient support to be making this sort of statement. If not, then I'll be happy to

Re: Informational vs. Informational

2007-08-20 Thread Sam Hartman
Paul == Paul Hoffman [EMAIL PROTECTED] writes: Paul On a thread about a specific document that is proposed to be Paul an Informational RFC coming through the IETF process: Paul At 1:12 PM -0400 8/20/07, Sam Hartman wrote: I've asked the sponsoring AD to make a consensus call

Re: draft-shirey-secgloss-v2-08.txt

2007-08-09 Thread Sam Hartman
David == David Harrington [EMAIL PROTECTED] writes: David Hi, The issue was raised during ISMS WGLC that there is a David difference between our use of the word authenticate and the David glossary in RFC2828. Since ISMS extends SNMPv3, ISMS is David using terminology consistent

Re: DHCP failures

2007-08-02 Thread Sam Hartman
Iljitsch == Iljitsch van Beijnum [EMAIL PROTECTED] writes: Iljitsch On 2-aug-2007, at 21:17, Dave Crocker wrote: It was also interesting to open the Mac network control pannel, enable my Airport (WLAN) interface, and see the IPv6 global address appear almost instantaneously

Re: Requirements for Open IESG Positions

2007-07-24 Thread Sam Hartman
Soininen == Soininen Jonne (NSN FI/Espoo) [EMAIL PROTECTED] writes: Soininen Hi, I just happened to read this mail today. I don't Soininen remember seeing such a mail during previous nomcom Soininen rounds (they might have come, but I just didn't notice Soininen them). I think

Re: Requirements for Open IESG Positions

2007-07-24 Thread Sam Hartman
Jari == Jari Arkko [EMAIL PROTECTED] writes: Jari (I also thought that the SEC requirements were a bit too Jari specific this year.) They are no more specific this year than they have been in the past. The only change is that they were at least specific in a direction that would

Re: Updating the rules?

2007-07-23 Thread Sam Hartman
Bob == Bob Braden [EMAIL PROTECTED] writes: Bob At 08:38 AM 7/20/2007 -0700, Kurt Zeilenga wrote: No, an I-D is a Draft Standard. An RFC is a Standard. :-) -- Kurt Bob No, and No. He just says that because under his rules he's probably published more draft

Re: Updating the rules?

2007-07-08 Thread Sam Hartman
Keith == Keith Moore [EMAIL PROTECTED] writes: Also from the draft: At least for the strong security requirement of BCP 61 [RFC3365], the Security Area, with the support of the IESG, has insisted that all specifications include at least one mandatory-to-implement strong

Re: PKI is weakly secure

2007-07-08 Thread Sam Hartman
Masataka == Masataka Ohta [EMAIL PROTECTED] writes: Masataka Keith Moore wrote: Also from the draft: At least for the strong security requirement of BCP 61 [RFC3365], the Security Area, with the support of the IESG, has insisted that all specifications include at least

Re: draft-williams-on-channel-binding: IANA rules too complicated

2007-07-06 Thread Sam Hartman
Jeffrey == Jeffrey Altman [EMAIL PROTECTED] writes: Jeffrey Sam Hartman wrote: Unless there is strong support for the more complex registration process in the draft, we'd like to go to expert review. Jeffrey The technical argument in favor of a review list, whether

draft-williams-on-channel-binding: IANA rules too complicated

2007-07-05 Thread Sam Hartman
on that registration process. We feel that in this instance, simple expert review is sufficient, and we don't need registrations to go to a review list. Unless there is strong support for the more complex registration process in the draft, we'd like to go to expert review. Sam Hartman Security Area

Re: Role of IANA in approving assignments

2007-06-15 Thread Sam Hartman
Robert == Robert Elz [EMAIL PROTECTED] writes: Robert Date:Fri, 15 Jun 2007 09:28:29 -0400 Robert From:Thomas Narten [EMAIL PROTECTED] Robert Message-ID: [EMAIL PROTECTED] Robert | Um, this train left the station a LONG time ago. RFC 2434 (and

draft-ietf-syslog-protocol-21.txt: section 3 contains new text to address ietf last call comments

2007-06-15 Thread Sam Hartman
I'd like to draw the attention of the community to section 3 of draft-ietf-syslog-protocol-21.txt. This text contains text and a clarified model of the various layers in the syslog architecture and new terminology for the parties. I believe this is responsive to the ietf last call comments and

Re: Withdrawing sponsorship of draft-housley-tls-authz-extns

2007-06-12 Thread Sam Hartman
p == [EMAIL PROTECTED] writes: p Sam, p While it is at each AD's discretion not to sponsor some p document (and not initiate Standards Action), I don't think p this discretion should extend to having a veto at the IESG p table when the document and community input is

Re: Should I* opinions be afforded a special status? (Re: [saag] Declining the ifare bof for Chicago)

2007-06-12 Thread Sam Hartman
Lakshminath == Lakshminath Dondeti [EMAIL PROTECTED] writes: Lakshminath Folks, If you want the history of this thread, please Lakshminath see the SAAG mailing list archive. Lakshminath Thomas, To be clear I'm not sure that I* opinions have been given special treatment in this

Withdrawing sponsorship of draft-housley-tls-authz-extns

2007-06-11 Thread Sam Hartman
has significant value and wish we'd found a way to publish it. However we follow a consensus process for many valuable reasons and it is clear that the necessary consensus is not present in this case. Sam Hartman Security Area Director ___ Ietf mailing

Re: consensus and anonymity

2007-05-31 Thread Sam Hartman
Andy == Andy Bierman [EMAIL PROTECTED] writes: Andy I think the inability of the IETF to make decisions in an Andy open, deterministic, and verifiable manner is a major flaw. I for one do not wish for deterministic decision making in the IETF.

Re: consensus and anonymity

2007-05-31 Thread Sam Hartman
Andy == Andy Bierman [EMAIL PROTECTED] writes: Andy This is not an alternative. If you are not willing to make Andy your technical objections to a technical specification Andy publicly, then they cannot be part of the IETF Andy decision-making process. At one level I agree

Re: draft-hartman-webauth-phishing-03.txt

2007-05-30 Thread Sam Hartman
I'm at an interop event this week, but I think I now get your concern with host security and section 4.1 and would like to propose fixes. Thanks for working with me to understand the concern. --Sam ___ Ietf mailing list Ietf@ietf.org

Re: draft-hartman-webauth-phishing-03.txt

2007-05-25 Thread Sam Hartman
Eliot == Eliot Lear [EMAIL PROTECTED] writes: Eliot Sam, I've reviewed draft-hartman-webauth-phishing-03.txt. Eliot In general I agree with the tone of it in terms of how to Eliot address these sorts of threats. However, I have a problem Eliot with its scope. The problem you

Re: [ietf-dkim] Re: Use of LWSP in ABNF -- consensus call

2007-05-18 Thread Sam Hartman
Keith == Keith Moore [EMAIL PROTECTED] writes: Keith it could be argued that the best thing to do is to remove Keith ALL of the rules from the ABNF spec, leaving only the Keith language definition and examples. (actually I think I did Keith argue this sometime around 1996, but

Re: [ietf-dkim] Re: Use of LWSP in ABNF -- consensus call

2007-05-17 Thread Sam Hartman
John == John C Klensin [EMAIL PROTECTED] writes: John --On Tuesday, 15 May, 2007 11:27 -0700 Dave Crocker John [EMAIL PROTECTED] wrote: Were we to deprecate every feature in IETF specifications that get mis-implemented a couple of times over 10 years, I suspect much of

Re: [ietf-dkim] Re: Use of LWSP in ABNF -- consensus call

2007-05-17 Thread Sam Hartman
John == John C Klensin [EMAIL PROTECTED] writes: John If we are going to standardize a definitional requirement or John method -- whether it is ABNF or IPR boilerplate or something John -- we need to get it right as a self-contained definition John and then live with it. We

Re: [ietf-dkim] Re: Use of LWSP in ABNF -- consensus call

2007-05-17 Thread Sam Hartman
Harald, I'm happy to accept your interpretation of the problem. However it also leads me to the conclusion that documenting possible reasons not to use ABNF's LWSP concept, or documenting implications of that rule would be a good idea. I also believe that documenting experience with a spec in

Re: [ietf-dkim] Re: Use of LWSP in ABNF -- consensus call

2007-05-17 Thread Sam Hartman
Dave == Dave Crocker [EMAIL PROTECTED] writes: Dave Sam, Ultimately cases like this should be evaluated based on whether the final result is more clear overall. Dave What about protecting the installed base for the existing Dave spec? I think that is not a useful

Re: [ietf-dkim] Re: Use of LWSP in ABNF -- consensus call

2007-05-17 Thread Sam Hartman
I think redefining the rule would require recycling at proposed. I think it would be confusing and harmful to do so. I think removing the rule would is allowed by the process (and would require updates in referencing specs as they advance but would not break anything). I think doing so would be

Re: [Geopriv] Irregularities with the GEOPRIV Meeting at IETF 68

2007-04-18 Thread Sam Hartman
to actually allow working groups to make forward progress. Sam Hartman Security Area Director ___ Ietf mailing list Ietf@ietf.org https://www1.ietf.org/mailman/listinfo/ietf

Re: [Emu] Last call comments: draft-williams-on-channel-binding-01.txt: EAP channel bindings

2007-04-13 Thread Sam Hartman
Lakshminath == Lakshminath Dondeti [EMAIL PROTECTED] writes: I think that having a single abstraction that can describe what went by multiple names in different areas can be very useful because it facilitates cross-area communication. And missing an opportunity to point out

Last call comments: draft-williams-on-channel-binding-01.txt: EAP channel bindings

2007-04-06 Thread Sam Hartman
Hi. For the last couple of years, we've been believing that EAP and GSS used the term channel bindings inconsistently. For those of us dealing with both, it's been a bit annoying. I've been thinking about EAP a lot lately. and have come to the conclusion that actually the terms are used

[Sam Hartman] Re: [consensus] comments on draft-housley-aaa-key-mgmt-07.txt

2007-04-06 Thread Sam Hartman
mean it to say. Hopefully Bernard and Russ will get back to us on that soon. ---BeginMessage--- [ietf list trimmed to make sure I get this right; then I will forward] Sam == Sam Hartman [EMAIL PROTECTED] writes: Sam There are two types of lower layer identities: those that are Sam used

Re: Last call comments: draft-williams-on-channel-binding-01.txt: EAP channel bindings

2007-04-06 Thread Sam Hartman
Nicolas == Nicolas Williams [EMAIL PROTECTED] writes: Nicolas Also, I think my draft's definition of end-point channel Nicolas bidning needs to be tightened just a bit: not only must Nicolas the end-point IDs be cryptographically bound into the Nicolas channel, it must also be

Re: [Emu] Last call comments: draft-williams-on-channel-binding-01.txt: EAP channel bindings

2007-04-06 Thread Sam Hartman
Charles == Charles Clancy [EMAIL PROTECTED] writes: to be an L2 identity. It can be any identity that's meaningful to the parties involved, and can serve as the basis for making authorization decisions. As long as it's cryptographically bound to the L2 channel and that

Re: [consensus] comments on draft-housley-aaa-key-mgmt-07.txt

2007-04-05 Thread Sam Hartman
Bernard == Bernard Aboba [EMAIL PROTECTED] writes: Bernard O, I definitely think they are session keys. [BA] They Bernard are not TSKs according to the definition in the EAP Key Bernard Management Framework. That's true. But that definition is not normative for

Re: [consensus] comments on draft-housley-aaa-key-mgmt-07.txt

2007-04-05 Thread Sam Hartman
Dan, I'd appreciate it if you could work with Russ and Bernard on seeing f the draft has adequate text to cover the issues that I think we now agree should be covered. My approach would be to clarify the definition of session key to clearly include MSK and handoff keys that fill the same role.

Re: [consensus] comments on draft-housley-aaa-key-mgmt-07.txt

2007-04-05 Thread Sam Hartman
Bernard == Bernard Aboba [EMAIL PROTECTED] writes: Bernard O, I definitely think they are session keys. [BA] They Bernard are not TSKs according to the definition in the EAP Key Bernard Management Framework. Bernard That's true. But that definition is not normative for

In support of symbolic references

2007-04-05 Thread Sam Hartman
Hi. I'm sitting here reviewing changes to a document to see if I can last call it. As part of a response to AD review comments, one of the references were changed. This document uses numeric references. Starting at reference 16, everything was renumbered. That makes the diff a pain. For

Re: Withdrawal of Approval and Second Last Call: draft-housley-tls-authz-extns

2007-04-04 Thread Sam Hartman
Dean == Dean Anderson [EMAIL PROTECTED] writes: Dean On Mon, 2 Apr 2007, Sam Hartman wrote: The IETf learned of Brown's patent application on 2006-11-29. Dean Can you elaborate? From whom or what source did the IETF Dean learn of the application? The IETF learned through

Re: [consensus] comments on draft-housley-aaa-key-mgmt-07.txt

2007-04-04 Thread Sam Hartman
Dan == Dan Harkins [EMAIL PROTECTED] writes: Dan Sam, Dan The keys in this hypothetical protocol are for network Dan access and giving them to authenticators for that purpose Dan would seem to fall under the key scope requirement. Key scope means giving an authenticator a

Re: [consensus] comments on draft-housley-aaa-key-mgmt-07.txt

2007-04-03 Thread Sam Hartman
Dan == Dan Harkins [EMAIL PROTECTED] writes: Dan Sam, Dan I guess the question is, what text in this I-D would Dan prevent a new key distribution protocol based on AAA in which Dan the authentication server sent a copy of the peer's keys Dan willy-nilly to every

Re: Withdrawal of Approval and Second Last Call: draft-housley-tls-authz-extns

2007-04-02 Thread Sam Hartman
Hi, Dean. First, with your permission I'd like to forward your comments to the ietf list. This is not a promise or invitation to forward future comments, but you have made comments on an issue that the community rather than the IESG decides and for your comments to be considered they need to be

[Dean Anderson] RE: Withdrawal of Approval and Second Last Call: draft-housley-tls-authz-extns

2007-04-02 Thread Sam Hartman
[mailto:[EMAIL PROTECTED] Sent: Thursday, March 29, 2007 10:12 AM To: Sam Hartman Cc: ietf@ietf.org; iesg@ietf.org; [EMAIL PROTECTED] Subject: Re: Withdrawal of Approval and Second Last Call: draft-housley- tls-authz-extns Sam Hartman [EMAIL PROTECTED] writes: Simon == Simon

Re: [consensus] comments on draft-housley-aaa-key-mgmt-07.txt

2007-03-30 Thread Sam Hartman
Hi. I had a few discussions in Prague and think that we're all basically on the same page about what the document should say. I'm going to describe that consensus here. I'd like to ask Russ to confirm that the document reflects the consensus and if so to ask me to remove my discuss and

Re: Withdrawal of Approval and Second Last Call: draft-housley-tls-authz-extns

2007-03-30 Thread Sam Hartman
John == John C Klensin [EMAIL PROTECTED] writes: John I also do not believe that it is appropriate to view John Informational publication as some sort of consolation prize. John If the community, and the IESG, conclude that the document John and its technology should be

Re: Withdrawal of Approval and Second Last Call: draft-housley-tls-authz-extns

2007-03-29 Thread Sam Hartman
to publish as a proposed standard. Does this seem like the right approach to folks? I plan to take some next step within the next couple of days based on input. I'm sorry this issue is taking up so much of the community's time. Sam Hartman Security Area Director

Re: Withdrawal of Approval and Second Last Call: draft-housley-tls-authz-extns

2007-03-29 Thread Sam Hartman
Simon == Simon Josefsson [EMAIL PROTECTED] writes: Simon I don't care strongly about the standards track status. Simon However, speaking as implementer of the protocol: If the Simon document ends up as informational or experimental, I Simon request that we make an exception and

Re: Withdrawal of Approval and Second Last Call: draft-housley-tls-authz-extns

2007-03-29 Thread Sam Hartman
Ted == Ted Hardie [EMAIL PROTECTED] writes: Ted I thought Eric Rescorla and Pasi Eronen had suggested that Ted this document be evaluated by the TLS working group and the Ted IPR terms evaluated there. I have that suggestion in an Ted email thread on the main IETF list, started

Re: Withdrawal of Approval and Second Last Call: draft-housley-tls-authz-extns

2007-03-29 Thread Sam Hartman
Ted == Ted Hardie [EMAIL PROTECTED] writes: Ted At 1:05 PM -0400 3/29/07, Sam Hartman wrote: The problem is that this work is outside the charter of the TLS working group. So, I don't think asking them to take on the document would be appropriate. I also don't think

Re: Withdrawal of Approval and Second Last Call: draft-housley-tls-authz-extns

2007-03-29 Thread Sam Hartman
Ted == Ted Hardie [EMAIL PROTECTED] writes: Ted At 4:25 PM -0400 3/29/07, Sam Hartman wrote: Ted, I'd like to do this. However I could use some help figuring out exactly what question I'm asking the TLS working group to provide advice on. I guess it could be as simple

Re: IETF LC comments on draft-williams-on-channel-binding-01.txt

2007-03-27 Thread Sam Hartman
I support Nico's proposed text. ___ Ietf mailing list Ietf@ietf.org https://www1.ietf.org/mailman/listinfo/ietf

Re: RFID

2007-03-27 Thread Sam Hartman
Andy == Andy Bierman [EMAIL PROTECTED] writes: Andy I find it rather annoying to listen to the constant Andy interruptions, reminding people of the process. The only Andy reasons for such an interruption are: Andy 1) it is very important to you that detailed and accurate

Re: [Dan Harkins] comments on draft-houseley-aaa-key-mgmt-07.txt

2007-03-16 Thread Sam Hartman
Narayanan, == Narayanan, Vidya [EMAIL PROTECTED] writes: Narayanan, Dan, There is a fundamental security property in all Narayanan, that we have been discussing: Narayanan, It MUST NOT be possible for an entity A, impersonating Narayanan, as entity B, to obtain any key material

Re: Last Call: draft-martin-ibcs (Identity-Based Cryptography Standard (IBCS) #1: Supersingular Curve Implementations of the BF and BB1 Cryptosystems) to Informational RFC

2007-03-13 Thread Sam Hartman
I'd feel uncomfortable approving this draft until the authors indicate that any IPR disclosures required by our process have been filed. ___ Ietf mailing list Ietf@ietf.org https://www1.ietf.org/mailman/listinfo/ietf

Re: Last Call: draft-martin-ibcs (Identity-Based Cryptography Standard (IBCS) #1: Supersingular Curve Implementations of the BF and BB1 Cryptosystems) to Informational RFC

2007-03-13 Thread Sam Hartman
Russ == Russ Housley [EMAIL PROTECTED] writes: Russ See Russ https://datatracker.ietf.org/public/ipr_detail_show.cgi?ipr_id=751 Russ At 08:43 AM 3/13/2007, Sam Hartman wrote: *Sigh* I searched on the draft before sending the last call comment and when the search tool is used

Re: TLS requirements (Last Call: draft-ietf-atompub-protocol to Proposed Standard)

2007-03-13 Thread Sam Hartman
Robert == Robert Sayre [EMAIL PROTECTED] writes: Robert From the draft: At a minimum, client and server implementations MUST be capable of being configured to use HTTP Basic Authentication [RFC2617] in conjunction with a TLS connection as specified by [RFC2818]. See

Re: TLS requirements (Last Call: draft-ietf-atompub-protocol to Proposed Standard)

2007-03-13 Thread Sam Hartman
Robert == Robert Sayre [EMAIL PROTECTED] writes: Robert Sam Hartman wrote: My preference is to resolve this by making 2818 normative; I believe we've already 3967'd 2818 so we don't need an additional last call on this one. Robert Is RFC 2818 sufficient to ensure

[Dan Harkins] comments on draft-houseley-aaa-key-mgmt-07.txt

2007-03-07 Thread Sam Hartman
Hi, folks. The following last call comment was received and based on discussion the draft was updated. This comment never seems to have made it to the ietf list though. The following text was added to address the comment. Please confirm that this text addresses the comment and that from the

Re: [Dan Harkins] comments on draft-houseley-aaa-key-mgmt-07.txt

2007-03-07 Thread Sam Hartman
Dan, again, with the text as it stands, what attacks do you see permitted by these requirements that you believe should not be permitted. The text changes you proposed were considered but are rather problematic for existing protocols. I don't think we mind mandating changing protocols for real

Re: Last Call: draft-ietf-simple-presence-rules (Presence Authorization Rules) to Proposed Standard

2007-03-03 Thread Sam Hartman
I think that a downward reference from to RFC 3325 from this document needs a bit of thought and consideration from the community as a whole. Quoting the abstract of RFC 3325: Abstract This document describes private extensions to the Session Initiation Protocol (SIP) that enable a

Re: Last Call: draft-ietf-v6ops-natpt-to-historic (Reasons to Move NAT-PT to Historic Status) to Informational RFC

2007-02-28 Thread Sam Hartman
Hallam-Baker, == Hallam-Baker, Phillip [EMAIL PROTECTED] writes: Hallam-Baker, The core assumption here seems to be that NAT is a Hallam-Baker, bad thing so lets get rid of NAT rather than trying Hallam-Baker, to make NAT work. I disagree with this characterization of the

Re: Last Call: draft-ietf-v6ops-natpt-to-historic (Reasons to Move NAT-PT to Historic Status) to Informational RFC

2007-02-28 Thread Sam Hartman
Hallam-Baker, == Hallam-Baker, Phillip [EMAIL PROTECTED] writes: From: Fred Baker [mailto:[EMAIL PROTECTED] On Feb 28, 2007, at 8:02 AM, Hallam-Baker, Phillip wrote: The core assumption here seems to be that NAT is a bad thing so lets get rid of NAT rather than

Re: Last Call: draft-ietf-v6ops-natpt-to-historic (Reasons to Move NAT-PT to Historic Status) to Informational RFC

2007-02-28 Thread Sam Hartman
Steven == Steven M Bellovin [EMAIL PROTECTED] writes: Steven On Wed, 28 Feb 2007 20:42:04 -0500 Steven Sam Hartman [EMAIL PROTECTED] wrote: Hallam-Baker, == Hallam-Baker, Phillip [EMAIL PROTECTED] writes: From: Fred Baker [mailto:[EMAIL PROTECTED

Re: Withdrawal of Approval and Second Last Call: draft-housley-tls-authz-extns

2007-02-27 Thread Sam Hartman
Eric Rescorla has agreed to deal with the third party disclosure on my behalf. thanks for all the volunteers of help. ___ Ietf mailing list Ietf@ietf.org https://www1.ietf.org/mailman/listinfo/ietf

Another disclosure on draft-housley-tls-authz-extns

2007-02-27 Thread Sam Hartman
Folks, it should be surprising to no one here that we've recieved the following disclosure; it is a direct result of my mail yesterday. I'd ask the community to evaluate this potential IPR in addition to the disclosure from Redphone. ---BeginMessage--- Dear Russ Housley, Mark Brown: An IPR

Re: Last Call: draft-klensin-norm-ref (Handling Normative References for Standards Track Documents) to BCP

2007-02-26 Thread Sam Hartman
Bill == Bill Fenner [EMAIL PROTECTED] writes: Bill On 2/24/07, Sam Hartman [EMAIL PROTECTED] wrote: I think there's a good split between RFC 3967 and this document. RFC 3967 will cover informational documents; this document will cover standards track. Bill I have

Re: Last Call: draft-klensin-norm-ref (Handling Normative References for Standards Track Documents) to BCP

2007-02-26 Thread Sam Hartman
I'd be happy with this title change. Does anyone object? ___ Ietf mailing list Ietf@ietf.org https://www1.ietf.org/mailman/listinfo/ietf

Re: Withdrawal of Approval and Second Last Call: draft-housley-tls-authz-extns

2007-02-26 Thread Sam Hartman
Folks, in addition to the IPR disclosure that triggered this second last call, I've received mail from an interested party that IPR held by a third party who as far as we know was not involved in IETF discussions of this draft may apply to the draft. While the interested party was willing to

Re: Last Call: draft-klensin-norm-ref (Handling Normative References for Standards Track Documents) to BCP

2007-02-24 Thread Sam Hartman
Tom == Tom Petch [EMAIL PROTECTED] writes: Tom I have no problem with the underlying idea, in so far as I Tom understand it, but I do not agree that this I-D is the best Tom way to achieve it. Tom I think that my problem is well illustrated by a sentence in Tom the Abstract

Re: comments on draft-houseley-aaa-key-mgmt-07.txt

2007-02-19 Thread Sam Hartman
Lakshminath == Lakshminath Dondeti [EMAIL PROTECTED] writes: Lakshminath Dan, We are discussing the case of the authenticator Lakshminath providing a different identity to the peer and the Lakshminath server here. Sam raised that issue. This is probably the last message you'll hear

Re: comments on draft-houseley-aaa-key-mgmt-07.txt

2007-02-17 Thread Sam Hartman
Vidya, I found the model you proposed didn't fit what Dan was talking about very well. In particular, Dan wants to focus on problems resulting from the fact that the name of the authenticator used between the peer and the authenticator may be different than the name of the authenticator used

Re: comments on draft-houseley-aaa-key-mgmt-07.txt

2007-02-16 Thread Sam Hartman
Speaking as an individual: I believe the attack Dan is concerned about is very important and I believe it is important that this draft make it clear that distributing keys to the wrong parties does not meet the requirements of the draft. I take no position on whether the draft does accomplish

New text in draft-housley-aaa-key-mgmt-08.txt

2007-02-16 Thread Sam Hartman
I'd like to draw your attention to changes made to resolve my discuss comments on Russ's key management draft. The authenticate all parties section has been changed to the following new text. Please let us know if you have concerns about the text; the draft is scheduled for approval in

Re: Last Call: draft-ietf-smime-cms-mult-sign (CryptographicMessageSyntax(CMS) Multiple Signer Clarification) to Proposed Standard

2007-02-15 Thread Sam Hartman
My individual opinion is that these changes are a matter of style, and that the current text is fine. If there is strong support for these changes I can enter an rfc editor note. ___ Ietf mailing list Ietf@ietf.org

Re: [secdir] Secdir review comments for draft-ietf-pim-bidir-08

2007-02-14 Thread Sam Hartman
Steven == Steven M Bellovin [EMAIL PROTECTED] writes: Steven On Wed, 7 Feb 2007 21:14:35 -0800 Steven Joseph Salowey (jsalowey) [EMAIL PROTECTED] wrote: I would like to understand better why ... no automated key management is specified. Steven Do they cite any of

Re: Last Call: draft-ietf-smime-cms-mult-sign (CryptographicMessageSyntax(CMS) Multiple Signer Clarification) to Proposed Standard

2007-02-09 Thread Sam Hartman
Denis == Denis Pinkas [EMAIL PROTECTED] writes: Denis Sam, Russ == Russ Housley [EMAIL PROTECTED] writes: Russ Denis: I do not consider these to be new comments. You made Russ them during WG Last Call, and there was considerable Russ discussion on the S/MIME WG mail list.

Re: Last Call: draft-mcwalter-uri-mib (Uniform Resource Identifier (URI) MIB) to Proposed Standard

2007-02-09 Thread Sam Hartman
The title of this document is very confusing and should be revised to include the string textual convention. Seeing this last call announcement I was very puzzled why anyone thought it would be a good idea to hae a MIB for monitoring and managing all the URIs on a managed system. I was

Re: Last Call: draft-iesg-sponsoring-guidelines (Guidance on Area Director Sponsoring of Documents) to Informational RFC

2007-02-09 Thread Sam Hartman
Personally I've been convinced that this document definitely should not be an informational RFC. It should either be an ion or a bcp at the community's choice based on how much review they want when the IESG decides to change things. It doesn't make sense to me for the IETF to publish

Re: Last Call: draft-ietf-smime-cms-mult-sign (CryptographicMessageSyntax(CMS) MultipleSigner Clarification) to Proposed Standard

2007-02-09 Thread Sam Hartman
Blake == Blake Ramsdell [EMAIL PROTECTED] writes: Blake OK, let me back up and explain the events as I see them and Blake try to clarify. And I am certainly welcome to any comments Blake or criticism about what my role is or how I should proceed Blake with this. Blake * My

Re: Last Call: draft-iesg-sponsoring-guidelines (Guidance on Area Director Sponsoring of Documents) to Informational RFC

2007-02-08 Thread Sam Hartman
John == John C Klensin [EMAIL PROTECTED] writes: John --On Thursday, 08 February, 2007 03:34 -0500 Jari Arkko John [EMAIL PROTECTED] wrote: Thanks for your note John. Let me also emphasize the need for these two drafts to be synchronized. Last calling draft-iesg at this

Re: Last Call: draft-ietf-syslog-protocol (The syslog Protocol) to Proposed Standard

2007-02-01 Thread Sam Hartman
Mark == Mark Andrews [EMAIL PROTECTED] writes: - 'The syslog Protocol ' draft-ietf-syslog-protocol-19.txt as a Proposed Standard Mark draft-ietf-syslog-protocol-19.txt recommends using a Mark reliable protocol. Existing implementations of syslog do Mark this and

Re: Last Call: draft-ietf-syslog-protocol (The syslog Protocol) to Proposed Standard

2007-02-01 Thread Sam Hartman
Mark == Mark Andrews [EMAIL PROTECTED] writes: Mark == Mark Andrews [EMAIL PROTECTED] writes: - 'The syslog Protocol ' draft-ietf-syslog-protocol-19.txt as a Proposed Standard Mark draft-ietf-syslog-protocol-19.txt recommends using a Mark reliable protocol.

Re: Last Call: draft-ietf-smime-cms-mult-sign (Cryptographic MessageSyntax (CMS) Multiple Signer Clarification) to Proposed Standard

2007-01-31 Thread Sam Hartman
Denis, it sounds like you have two issues: 1) This document goes beyond specifying how to determine if a message is validly signed by a given signer. 2) There is not enough precision in the description of how to validate a signature. I strongly suggest that you try and build consensus for

Re: [secdir] secdir review of draft-ietf-hip-mm-04.txt

2007-01-30 Thread Sam Hartman
Christian == Christian Vogt [EMAIL PROTECTED] writes: Christian unamplified flooding would also be possible for the Christian attacker without HIP because the attacker could send Christian flooding packets with an IPv6 Routing header, directing Christian the packets to the

Re: Tracking resolution of DISCUSSes

2007-01-12 Thread Sam Hartman
Let me ask a silly question here: Why do we want to distinguish proto shepherds from chairs? I at least hope all my WGs will produce documents. That means most of my chairs will be proto shepherds. Does the difference matter? ___ Ietf mailing list

<    1   2   3   4   5   6   7   8   >