Re: Network Working Group

2003-03-11 Thread Scott W Brim
On Mon, Mar 10, 2003 12:16:45PM -0800, Fred Baker allegedly wrote:
 I personally would like to see us stop attributing documents to them.
 The world has long since moved on, and those who don't recognize it
 date themselves. 

I stopped using it on drafts a few years ago.  I use the relevant WG.



Re: Network Working Group

2003-03-11 Thread Masataka Ohta
 At 01:27 PM 3/10/2003 -0800, Bob Braden wrote:
 The archive of early NWG discussions is the RFC series itself.
 
 I started to reply saying that, but I think he's referring to a pointer to 
 the working group's discussions.

A pointer to the working group's discussions???

NWG could be replaced by IETF or ISOC, but...

Are you all assuming that individuals can not submit RFCs?

Masataka Ohta



Re: Network Working Group

2003-03-11 Thread Donald Eastlake 3rd
I sometimes put the working group name on drafts also. But an RFC is 
never issued by a working group. It is issued by the I* after IESG 
review and usually after IETF Last Call. I'm dubious about putting the 
WG name in the RFC but if that were done, it shouldn't be more than  an 
interior footnote.

Thanks,
Donald
==
 Donald E. Eastlake 3rd   [EMAIL PROTECTED]
 155 Beaver Street  +1-508-634-2066(h) +1-508-851-8280(w)
 Milford, MA 01757 USA   [EMAIL PROTECTED]

On Tue, 11 Mar 2003, Scott W Brim wrote:

 Date: Tue, 11 Mar 2003 09:17:05 -0500
 From: Scott W Brim [EMAIL PROTECTED]
 To: [EMAIL PROTECTED]
 Subject: Re: Network Working Group
 
 On Mon, Mar 10, 2003 12:16:45PM -0800, Fred Baker allegedly wrote:
  I personally would like to see us stop attributing documents to them.
  The world has long since moved on, and those who don't recognize it
  date themselves. 
 
 I stopped using it on drafts a few years ago.  I use the relevant WG.





RE: IAB policy on anti-spam mechanisms?

2003-03-11 Thread Spencer Dawkins
It might be interesting for IAB to think about the estimated half-life
of well-known port numbers in the Internet architecture, since we've been
seeing 

(1) firewalls that limit traversal based on port numbers, 

(2) ISPs that have opinions about what services go where, based on port numbers,
 
(3) URL schemes that support alternate port numbers fairly easily,

(4) Mechanisms like SOAP that use HTTP as a substrate (ne: RFC 3205) specifically 
to avoid (1) and (2), and

(5) Servers running at alternate ports specifically to avoid (1) and (2)

Knowing what port 25 means seems like something our children won't understand...

... although they may wonder why everything EXCEPT web access is running over
port 80!

Spencer

 -Original Message-
 From: Theodore Ts'o [mailto:[EMAIL PROTECTED]
 Sent: Thursday, February 27, 2003 8:33 AM
 To: RL 'Bob' Morgan
 Cc: IETF
 Subject: Re: IAB policy on anti-spam mechanisms?
 
 
 On Thu, Feb 27, 2003 at 12:41:41AM -0600, RL 'Bob' Morgan wrote:
  Many sites, including my university, support STARTTLS+AUTH on the
  Submission port (587, RFC 2476), which I believe is the recommended
  service for clients to use to submit mail in any case (though not
  well-supported among MUAs, to my knowledge), and also is 
 effective at
  getting around ISP blockage of port 25.  Of course if it 
 becomes very
  popular the misguided ISPs will block it too.
 
 Yup, the problem with well-known ports is that well-known port numbers
 get either (a) blocked by misguded ISP's, or (b) transparently proxed
 by misguided ISP's.  Since I have no idea what sort of stupidity I
 might encounter at various different hotel, conference, or 802.11
 hotspot networks, it's more convenient for me to use a non-standard
 port.





Re: cables

2003-03-11 Thread john smith
standard time?

rather than arguing about standards on ietf?


- Original Message -
From: shogunx [EMAIL PROTECTED]
To: john smith [EMAIL PROTECTED]
Cc: [EMAIL PROTECTED]
Sent: Thursday, February 27, 2003 9:43 AM
Subject: Re: cables


 On Thu, 20 Feb 2003, john smith wrote:

 
  on ethernet,
 
 
  If all ports were DTE pin configured (same pair everywhere for rx and
tx)
 
  and all cables were cross
 
  life would be simpler.

 I once built a network using nothing but cross-connects.  It was nice.

 Scott

 
  -JS
 
 
 
 
 

 sleekfreak pirate broadcast
 world tour 2002-3
 live from daytona beach
 http://sleekfreak.ath.cx







unsubscribe

2003-03-11 Thread Deepak Saini
unsubscribe







Re: IAB policy on anti-spam mechanisms?

2003-03-11 Thread ietf1
The nicest solution that I can see is for the ISPs to transparently
proxy port 25 to their MTA. They should offer STARTTLS.

Assuming you're not pulling my leg, I couldn't disagree more
strongly. This is even worse than blocking port 25 outright.

I actually encountered an ISP that does this. I can't remember their
name, but they provide many of the DSL Ethernet hookups in hotel
rooms. I discovered only after I had sent a few messages that they
were hijacking (the only correct word) my outbound connections to port
25 and redirecting them to their own mailservers. They didn't support
STARTTLS, and even if they did there is no reason I should trust them.

It did teach me the importance of protecting against the
man-in-the-middle attack. This is not often done, at least not by
default, in many STARTTLS implementations.

I do agree with you about the utility of IPsec and IPv6 tunneling as
ways around this braindamage. TCP connection tunneling over SSH is
another good approach.

Phil





Re: BLOCK: Abstract of proposed Internet Draft for Best Current Practice

2003-03-11 Thread Gary F
On Sat, 01 Mar 2003 22:22:27 +0700, Dr. Jeffrey Race
[EMAIL PROTECTED] wrote:

On Sat, 15 Feb 2003 17:34:46 +0700, Gary Feldman [EMAIL PROTECTED]
wrote: [snip]
...
I want to encompass both webhosting firm and ISP.   I agree it is
clumsy to introduce a new acronym.   Please offer a suggestion here.

Personally, I would use ISP as a catchall.  Even though I recently used
it in a more narrow sense on the spam-l list, I think it works well
enough for provider of any general internet services when the context
is clear.

Alternatively, spell it out.  Abbreviating a two word term is overly
aggressive abbreviation, in my opinion.  Bytes on that scale are cheap.


The term abuse is already well-known to describe the
entire class of problems; calling it pollution is at best an
annoying
distraction.

Here I have a particular psychological point in mind.   I want to 

I understand that point, and I think it works well in that article you
wrote and recently cited (I think in the port 25 thread).  I'm less
sure about putting it into a BCP/RFC document, at least at this point
in time.  Besides, abuse carries its own appropriate psychological
baggage, especially where I believe we both are (Massachusetts), with
regard to other current events that dominated the news media over the
last year.

I often feel the desire to want to convince the world to change
terminology, so I respect your motives here, but I find that fighting
such battles to be an inefficient use of energy - at least for me.

Gary


__
Do you Yahoo!?
Yahoo! Tax Center - forms, calculators, tips, more
http://taxes.yahoo.com/





RE: beauty of freedom

2003-03-11 Thread Spencer Dawkins
I remember when telephony vendors sold 

o calling line ID (CLID) as a feature, and then 
o call blocking based on CLID as a feature, and then
o CLID delivery supression as a feature, and then
o call blocking for anonymous calls as a feature, and then ...

It's great to have guarenteed lifetime employment for
software developers, but are we sure spam plus spam
supression is making the world a better place?

Spencer, half :-}

 -Original Message-
 From: Bill Cunningham [mailto:[EMAIL PROTECTED]
 Sent: Wednesday, March 05, 2003 6:32 AM
 To: [EMAIL PROTECTED]
 Subject: beauty of freedom
 
 
 Just something to throw out
 
 I was browsing an ftp site a few days ago and came across 
 some interesting
 downloads that got me thinking.
 
 On the same site (and the same page) I saw a piece of 
 software to abtain
 email addresses to send of spam :O , and on the same page, a 
 filter to block
 spam. With all this talk of stopping spam, isn't some good 
 spam blocking
 good enough?
 
 
 
 
 ___
 This message was passed through 
 [EMAIL PROTECTED], which is a sublist of 
 [EMAIL PROTECTED] Not all messages are passed. Decisions on what 
 to pass are made solely by Raffaele D'Albenzio.
 





Re: [Asrg] SHEESH!

2003-03-11 Thread Chris Lewis
Vernon Schryver wrote:
I guess I shouldn't have used the V-word when talking about spam on
the IRTF's mailing list about spam.

sheesh!--talk about utterly lame and misguided spam filters.
But in the case of the V word, it works.  The only concern I'd have is 
whether the rejection message implies that it's far more unnecessarily 
draconian on other words/phrases.

8+ months of blocking on it, 10's of thousands of rejects, approximately 
4 false positives.  5 if Vern had gotten it thru the mailing list. 
Better than a .01% FP rate.  Not bad.

IETF mailing lists are particularly prone to high volumes of spam. I for 
one am particularly glad that they're moving to filters.  Takes a _huge_ 
load of end-user complaints off _my_ head, as well as those of my 
colleagues running IETF mailing lists of their own.

Speaking of which, I should whitelist [EMAIL PROTECTED]






FW: Last Call: Fast Reroute Extensions to RSVP-TE for LSP Tunnels to Proposed Standard

2003-03-11 Thread Shahram Davari
Hi,

Section 6.1.1 and 6.1.2 mention two very different method for backup path
identification and signaling. It is not clear which one should be implemented for 
compliance to
this draft. For interoperability reason  ONE of them should be Mandatory and the other 
one optional. 


Yours,
Shahram Davari


-Original Message-
From: The IESG [mailto:[EMAIL PROTECTED]
Sent: Wednesday, March 05, 2003 2:30 PM
To: IETF-Announce
Cc: [EMAIL PROTECTED]
Subject: Last Call: Fast Reroute Extensions to RSVP-TE for LSP Tunnels
to Proposed Standard



The IESG has received a request from the Multiprotocol Label Switching 
Working Group to consider Fast Reroute Extensions to RSVP-TE for LSP 
Tunnels draft-ietf-mpls-rsvp-lsp-fastreroute-02.txt as a Proposed 
Standard.  

The IESG plans to make a decision in the next few weeks, and solicits
final comments on this action.  Please send any comments to the 
[EMAIL PROTECTED] or [EMAIL PROTECTED] mailing lists by 2003-3-25.

Files can be obtained via 
http://www.ietf.org/internet-drafts/draft-ietf-mpls-rsvp-lsp-fa
streroute-02.txt








RE: Last Call: Fast Reroute Extensions to RSVP-TE for LSP Tunnels to Proposed Standard

2003-03-11 Thread Shahram Davari
Hi,

Also Facility back-up and Detour both do protection. Which one must be
implemented to comply with this draft? For interoperability reasons it seems that
one of them should be Mandatory and the other one Optional.

Thanks,
Shahram Davari

-Original Message-
From: Shahram Davari 
Sent: Wednesday, March 05, 2003 4:09 PM
To: '[EMAIL PROTECTED]'
Subject: FW: Last Call: Fast Reroute Extensions to RSVP-TE for LSP
Tunnels to Proposed Standard


Hi,

Section 6.1.1 and 6.1.2 mention two very different method for 
backup path
identification and signaling. It is not clear which one should 
be implemented for compliance to
this draft. For interoperability reason  ONE of them should be 
Mandatory and the other one optional. 


Yours,
Shahram Davari


-Original Message-
From: The IESG [mailto:[EMAIL PROTECTED]
Sent: Wednesday, March 05, 2003 2:30 PM
To: IETF-Announce
Cc: [EMAIL PROTECTED]
Subject: Last Call: Fast Reroute Extensions to RSVP-TE for LSP Tunnels
to Proposed Standard



The IESG has received a request from the Multiprotocol Label 
Switching 
Working Group to consider Fast Reroute Extensions to RSVP-TE for LSP 
Tunnels draft-ietf-mpls-rsvp-lsp-fastreroute-02.txt as a Proposed 
Standard.  

The IESG plans to make a decision in the next few weeks, and solicits
final comments on this action.  Please send any comments to the 
[EMAIL PROTECTED] or [EMAIL PROTECTED] mailing lists by 2003-3-25.

Files can be obtained via 
http://www.ietf.org/internet-drafts/draft-ietf-mpls-rsvp-lsp-fa
streroute-02.txt









Re: Last Call: Instructions to Request for Comments (RFC) Authors to BCP

2003-03-11 Thread J. Noel Chiappa
 From: Lloyd Wood [EMAIL PROTECTED]

 Do you like quoting dictionary definitions but don't know the
 background of how the definitions developed? .. Are you horribly
 literal-minded but horribly illiterate?

Acrynomius, n,; to become acrimonious over the definition of 'acronym'.

Anyway, if it's not an acronym if you don't say it as a word, is TLA a
self-referential acronym or not? :-)

Noel (who still spells colour with a 'u', if you want to know which
side of the Atlantic I'm from)

PS: Languages aren't static things entirely enclosed in books; if something
comes into general use, it *is* a word. If you asked me what the term TCP
was, I'd have said acronym, since it's i) not for the purpose of remember
ing (which lets out mnemonic), and ii) it's formed from the initial
letters. So if everyone thinks acronym means a term derived from the first
letters of a group of words, then that's what it means, and the dictionary
writers will catch up one day.





Re: [Asrg] SHEESH!

2003-03-11 Thread Chris Lewis
Vernon Schryver wrote:
From: Chris Lewis [EMAIL PROTECTED]



I guess I shouldn't have used the V-word when talking about spam on
the IRTF's mailing list about spam.

sheesh!--talk about utterly lame and misguided spam filters.
But in the case of the V word, it works. ...

I wonder if you'd say that if your employer were in the drug industry.
Of course not.  So?  I'd simply not deploy such a filter.

Until the IETF has WGs on pharmaceuticals, I don't think we need to 
worry about the IETF's filtering in this regard.

IETF mailing lists are particularly prone to high volumes of spam. I for 
one am particularly glad that they're moving to filters.  Takes a _huge_ 
load of end-user complaints off _my_ head, as well as those of my 
colleagues running IETF mailing lists of their own.

There are other things the IETF lists should do instead.  To start,
they should rejectm mail with MIME content headers declaring mail is
not English, and specifically reject JP, KR, and GB character sets.
The IETF has no foreign language special interest groups?  Like on 
character sets and internationalization?  It would be as dumb as a 
pharmaceutical company banning the V word.

They should probably also reject any MIME multipart mail,
That would annoy the Mime, multimedia and other specialized WGs would it 
not?

I think they should also use the DCC to reject all bulk mail, but
that's probably only my bias speaking.
That's a _much_ better idea than banning specific character sets or mime.






Re: Acronyms Et Al. (was: Last Call: Instructions to Request forComments (RFC) Authors to BCP)

2003-03-11 Thread John Stracke
Tomson Eric (Yahoo.fr) wrote:

- an acronym is a word composed of initials ; e.g.: ASAP, LASER, NATO,
OSI, RADAR, SCUBA, are well-known acronyms. They sound like words, while
they are actually groups of initials.
- initials are the first letters of words ; e.g.: IETF, CIA, FBI, IBM,
RFC, TCP, are well-known initials, too complex to be used as acronyms.
 

I never heard this distinction before today.  It seems like a pretty 
strange hair to split in a written forum like the IETF.  It boils down 
to how hard a series of letters is to pronounce in English; but most of 
our communication doesn't get pronounced.

--
/==\
|John Stracke  |[EMAIL PROTECTED]   |
|Principal Engineer|http://www.centive.com |
|Centive   |My opinions are my own.|
|==|
|Collect call from reality, will you accept the-- *click*|
\==/






Registration silliness

2003-03-11 Thread Spencer Dawkins
So I'm wondering why, if we're all individuals at the IETF, 
Company is a required field on the registration form?

Mysteriously yours,

Spencer





Re: A charter for the IESG

2003-03-11 Thread p vanheurck
Hello to all,

Personally. I think the iesg (and ietf)  is a process that seems to be
working OK, insofar as
it accepts input from any user who cares to subscribe to the relevant groups
...
such as me ...
I gladly accept 20 - 40 e-mails daily for the opportunity to throw in my
comments when they seem relevant,
and otherwise to observe when people who know more about the topic debate,
and try to learn from same.

If anyone cares about my opinion, this arena of opinions is one of the
closest approximations to a true democracy
i have ever seen, of which i totally approve, wish to see continue, and will
gladly support.

As responsive to the original post, I support full discussion on the ietf
list, and look forward to the debate.

I must admit that this is not only in response to this post, but also in
 more or less ) response to other recent posts  re
the whole mission of ietf  /  iesg ... any limitation of this global user
input seems unacceptable ... one only need look at ICANN to
see my whole point ...

Oh well, I have said all I have at this point, let the flame wars begin,

Phil

- Original Message -
From: [EMAIL PROTECTED]
To: [EMAIL PROTECTED]; [EMAIL PROTECTED]
Sent: Friday, March 07, 2003 19:37
Subject: RE: A charter for the IESG


Harald,

 -Original Message-
 From: ext Harald Tveit Alvestrand [mailto:[EMAIL PROTECTED]
 Subject: A charter for the IESG

 Some discussion has taken place on the POISED list
 ([EMAIL PROTECTED]), but the point has been made that
 for such a
 potentially important document, the IETF list may actually be a more
 appropriate venue for discussion. Hence this note.

Could you point to the archive of this list? At least the pointer in the
'Poisson' WG (concluded)
(http://www.ietf.org/html.charters/OLD/poisson-charter.html) does not seem
to be valid. It would be rather interesting to see what has been discussed.

 This IESG charter attempts to capture what the IESG has
 believed that it
 has been asked to do by the IETF community. Most of the
 document is simply
 collecting references to sections of other IETF BCP documents, and
 attempting to form a coherent picture of what the IESG is
 supposed to be
 doing. I do not believe that it shows the IESG to be much
 different from
 what the community currently believes it is.

Is this view of the IESG share by the whole IESG? What I mean is if you have
discussed this within the IESG already?


 What I hope to do with this document is:

 - Discuss it on this mailing list and on the POISED mailing
 list as the
 community finds appropriate

I am not sure what would be the right 'process'. However, at least I
personally would find it better to have the discussion in a discussion list
that is also officially alive, and has a current archive. This makes it
easier for everybody to follow/contribute to the discussion.

Cheers,

Jonne.







Re: [Asrg] SHEESH!

2003-03-11 Thread Chris Lewis
Vernon Schryver wrote:
From: Chris Lewis [EMAIL PROTECTED]
Vernon wrote: 
I think they should also use the DCC to reject all bulk mail, but
that's probably only my bias speaking.
That's a _much_ better idea than banning specific character sets or mime.

Maybe so or maybe not.  Using the DCC to reject all bulk mail would
prune a lot of conference announcements and calls for papers.  I think
that would be a good thing, but I know others disagree with me.
Not _inbound_ to the IETF.

Only if they spammed it, got DCC reports, and then forwarded to the IETF 
would it get blocked.  Which is what you want, no?






Re: [Asrg] SHEESH!

2003-03-11 Thread Kee Hinckley
At 1:24 AM -0500 3/7/03, Chris Lewis wrote:
I wonder if you'd say that if your employer were in the drug industry.
Of course not.  So?  I'd simply not deploy such a filter.
That takes care of some of the incoming.  But how do you send email 
about that drug to anybody outside of your company?  (Never mind 
that some ISPs have egress filters).
--
Kee Hinckley
http://www.puremessaging.com/Junk-Free Email Filtering
http://commons.somewhere.com/buzz/   Writings on Technology and Society

I'm not sure which upsets me more: that people are so unwilling to accept
responsibility for their own actions, or that they are so eager to regulate
everyone else's.




PL PMTUD BOF

2003-03-11 Thread Matt Mathis
Are you tired of having your favorite {VPN,tunnel,encapsulation,transition}
protocol get stalled in deployment, because the end systems just can't figure 
out the proper path MTU?

We are working on a new Packetization Layer Path MTU Discovery Algorithm,
that might solve your problem.  There is a IETF BoF scheduled for 1630 on
Thursday to discuss the formation of a WG.

See http://www.ietf.org/ietf/03mar/plpmtud.txt - This new algorithm does not
rely on ICMP or other messages from the network (so it is not subject to the
problems described in RFC2923).  Instead it finds the proper MTU by starting
with relatively small packets and searching up wards by probing with test
packets.

Or read the (very preliminary) draft: draft-mathis-plpmtud-00.txt

One of the agenda items for the BoF is to inventory current protocols and 
technologies that are impaired by not having a robust path MTU discovery
algorithm.

BTW, My other agenda (Pushing up the deployed MTU's in the Internet), is out
of scope for this BoF.

Thanks,
--MM--
---
Matt Mathis  http://www.psc.edu/~mathis
Work:412.268.3319Home/Cell:412.654.7529
---






Re: Network Working Group

2003-03-11 Thread John Stracke
Donald Eastlake 3rd wrote:

I sometimes put the working group name on drafts also. But an RFC is 
never issued by a working group. It is issued by the I* after IESG 
review and usually after IETF Last Call. I'm dubious about putting the 
WG name in the RFC but if that were done, 

As a practical matter, if one wants to find people to discuss an RFC 
with, knowing what WG it came from (if any) can save steps.  The 
authors' addresses are included, of course, but those sometimes go stale 
before the WG closes down.

--
/\
|John Stracke  |[EMAIL PROTECTED] |
|Principal Engineer|http://www.centive.com   |
|Centive   |My opinions are my own.  |
||
|Diplomacy: The art of letting someone else have your way|
\/






Re: Network Working Group

2003-03-11 Thread John Stracke
Bob Braden wrote:

 * Perhaps with a pointer to where the archived discussions of the working
 * group might be found?
The archive of early NWG discussions is the RFC series itself.
The other archives, which no doubt existed, were written on DEC
tapes, IBM 360 mainframe files, etc.  Not too useful today.
 

I believe he meant for new documents.  I'm not sure, of course, since he 
put his comments at the start of his reply instead of alongside the 
quoted text he was referring to.

--
/==\
|John Stracke  |[EMAIL PROTECTED]   |
|Principal Engineer|http://www.centive.com |
|Centive   |My opinions are my own.|
|==|
|Who died and made you king? My father.|
\==/






Re: Request to mailing list Asrg rejected (fwd)

2003-03-11 Thread Vern Paxson
 which prompts the questions: Why isn't the list set up to appear to
 be run from the irtf.org vanity domain, where different policies are
 obviously expected? Because the people concerned with formulating
 anti-spam policies who set up this list really appreciate the impact
 of clear expression of policy, right?

Because the volunteer who runs irtf.org doesn't have an equivalent mailing
list system available nor the cycles to put one up and manage it.

If someone wants to volunteer to do this - *on an archival basis*, meaning
it really does have to stick around in a permanent fashion, and have timely
support/maintenance - please do contact me.

Vern





Re: IAB policy on anti-spam mechanisms?

2003-03-11 Thread Vernon Schryver
 From: [EMAIL PROTECTED]

 Reply-to: [EMAIL PROTECTED]

[EMAIL PROTECTED]?
I've been meaning to ask about that.  If the goal is to avoid
Microsoft out-of-office noise and other hassles, wouldn't 
[EMAIL PROTECTED] or some other obvious bit bucket be better?

 ...
 I actually encountered an ISP that does this. ...

Hasn't AOL been running SMTP redirection proxies for their IP customers
for years?

 25 and redirecting them to their own mailservers. They didn't support
 STARTTLS, and even if they did there is no reason I should trust them.

 It did teach me the importance of protecting against the
 man-in-the-middle attack. This is not often done, at least not by
 default, in many STARTTLS implementations.

Which STARTTLS are those that cannot be told to check certificates?
By default sendmail only says verify=FAIL in the received header when
the authentication part fails, but I think I recall a sendmail.cf
switch that says refuse mail without a good certificate.


Vernon Schryver[EMAIL PROTECTED]



Re: beauty of freedom

2003-03-11 Thread Melinda Shore
 It's great to have guarenteed lifetime employment for
 software developers, but are we sure spam plus spam
 supression is making the world a better place?

This is a tremendous problem in firewall-land, where there's
a continuing arms race that's moving firewall functionality
further and further up the stack.  Entities like port
numbers and IP addresses are terrible descriptors of higher
level policy, but on the other hand increasing use of
encryption across firewall traversal points is rendering
traffic content inspection useless (that's a good thing).

On a third hand, service providers want to be able to
concentrate service management function in their own
networks, and you'll notice that at this upcoming meeting,
in addition to the OPES working group, there are two BOF
(pads and intersec) that are dealing with this issue to a
greater or lesser extent.  The tension between trying to
provide those services in a way that's both secure and
architecturally sound and trying to maintain some level of
end-to-end integrity is a pretty serious problem for the
IETF right now.  

I'd like to hope that any lessons we've learned from
firewalls about bad design leading to escalation and
ultimately failure in the face of technology short can be
applied to spam protection, too.

Melinda




RE: Last Call: Fast Reroute Extensions to RSVP-TE for LSP Tunnels to Proposed Standard

2003-03-11 Thread Ping Pan
Please ask your customers on which method they prefer. Both methods and
all three path identification have been developed and deployed. We are
only describing how protocols suppose to work, not mandating customer
requirements.

If you have questions on protocol detail issues, please forward them to
the MPLS list.

Thanks!

- Ping

 Hi,
 
 Also Facility back-up and Detour both do protection. Which 
 one must be implemented to comply with this draft? For 
 interoperability reasons it seems that one of them should be 
 Mandatory and the other one Optional.
 
 Thanks,
 Shahram Davari
 



Re: IAB policy on anti-spam mechanisms?

2003-03-11 Thread Eric Rescorla
[EMAIL PROTECTED] writes:
 It did teach me the importance of protecting against the
 man-in-the-middle attack. This is not often done, at least not by
 default, in many STARTTLS implementations.

Indeed. The problem is that it's pretty hard to determine
a priori what certificate the peer server ought to be offering,
due to mail relaying and MX records.

-Ekr

-- 
[Eric Rescorla   [EMAIL PROTECTED]
http://www.rtfm.com/



RE: Last Call: Fast Reroute Extensions to RSVP-TE for LSP Tunnels to Proposed Standard

2003-03-11 Thread Shahram Davari
Please ask your customers on which method they prefer. Both methods and
all three path identification have been developed and deployed. We are
only describing how protocols suppose to work, not mandating customer
requirements.

I am not sure I agree with you. IESG has repeatedly asked for a single
mandatory method. Otherwise IETF RFCs become an archive for peoples 
implementations. For proof just look at PWE3 ATM-ENCAP draft. 

Thanks,
Shahram


If you have questions on protocol detail issues, please forward them to
the MPLS list.

Thanks!

- Ping

 Hi,
 
 Also Facility back-up and Detour both do protection. Which 
 one must be implemented to comply with this draft? For 
 interoperability reasons it seems that one of them should be 
 Mandatory and the other one Optional.
 
 Thanks,
 Shahram Davari
 




RE: Last Call: Fast Reroute Extensions to RSVP-TE for LSP Tunnels to Proposed Standard

2003-03-11 Thread Ping Pan
 Please ask your customers on which method they prefer. Both 
 methods and 
 all three path identification have been developed and 
 deployed. We are 
 only describing how protocols suppose to work, not mandating 
 customer 
 requirements.
 
 I am not sure I agree with you. IESG has repeatedly asked for 
 a single mandatory method. Otherwise IETF RFCs become an 
 archive for peoples 
 implementations. 

Both methods solve different problems, thus, they are mandatory.

 For proof just look at PWE3 ATM-ENCAP draft. 
 

I don't know much about IESG process, but I do know that the proof of
the pudding is in the eating.

- Ping



RE: Last Call: Fast Reroute Extensions to RSVP-TE for LSP Tunnels to Proposed Standard

2003-03-11 Thread Shahram Davari
 
 I am not sure I agree with you. IESG has repeatedly asked for 
 a single mandatory method. Otherwise IETF RFCs become an 
 archive for peoples 
 implementations. 

Both methods solve different problems, thus, they are mandatory.

What are those different problems? As far as I can see they both
solve the same problem which is link/node protection.


 For proof just look at PWE3 ATM-ENCAP draft. 
 

I don't know much about IESG process, but I do know that the proof of
the pudding is in the eating.

Proof of what? I said look at this draft to see that there are
4 methods for transporting ATM over mpls, out of which only one method
is mandatory and 3 others are optional. Now what is the relevance
of pudding/eating here?

-Shahram



- Ping




Re: IAB policy on anti-spam mechanisms?

2003-03-11 Thread John Kristoff
On Thu, 27 Feb 2003 10:15:34 -0600
Spencer Dawkins [EMAIL PROTECTED] wrote:

 It might be interesting for IAB to think about the estimated half-life
 of well-known port numbers in the Internet architecture, since we've
 been seeing 

It might be interesting to find a way to make port numbers so
meaningless that you either have to let them all through or none of them
through (which obviously isn't useful).

Perhaps the notion of a well known port is a concept whose time has
passed.  At least for connection oriented protocols, doing away with
well known ports might have some good properties for some basic
authentication/cookie mechanism as well.

Or we could just let HTTP become the transport layer until blocking is
done within the content of those messages, but we can just keep building
transports on top until some MTU is reached.  :-)

John



Re: IAB policy on anti-spam mechanisms?

2003-03-11 Thread Lawrence Greenfield
   From: Eric Rescorla [EMAIL PROTECTED]
   Date: 11 Mar 2003 11:21:51 -0800

   [EMAIL PROTECTED] writes:
It did teach me the importance of protecting against the
man-in-the-middle attack. This is not often done, at least not by
default, in many STARTTLS implementations.

   Indeed. The problem is that it's pretty hard to determine
   a priori what certificate the peer server ought to be offering,
   due to mail relaying and MX records.

This is a bigger problem than just SMTP. Any protocol that uses SRV
records has this indirection and this problem.

One (poor) solution to this is codified in
draft-ietf-ldapext-locate-08:

   [when using TLS,] if the DN cn=John
   Doe,ou=accounting,dc=example,dc=net is converted to the DNS name
   example.net, the server's name MUST match example.net.

which means that if an equivalent sort of mapping is done for instant
messaging, an organization is going to have many many different
servers all with the same certificate name of example.net. This is
especially poor when different servers are under different
administrative control.

Larry







Re: IAB policy on anti-spam mechanisms?

2003-03-11 Thread John Stracke
John Kristoff wrote:

Perhaps the notion of a well known port is a concept whose time has
passed.  At least for connection oriented protocols, doing away with
well known ports might have some good properties for some basic
authentication/cookie mechanism as well.
 

Well, there's SRV records; but that basically pushes the problem up a 
layer.  If services are identified by well-known service names in the 
SRV record, then people will start filtering at the DNS level.

--
/=\
|John Stracke  |[EMAIL PROTECTED]  |
|Principal Engineer|http://www.centive.com|
|Centive   |My opinions are my own.   |
|=|
|If God had meant us to be in the Army, we would've been born with|
|green, baggy skin.   |
\=/






beauty of freedom

2003-03-11 Thread Bill Cunningham
Perhaps spam is not best for the Internet. It does take up bandwidth that
could be used elsewhere. Whatever's best for the net, then the individuals
who use it.





Re: Registration silliness

2003-03-11 Thread Donald Eastlake 3rd
(1) Tradition.
(2) To distinguish people with similar names that are affiliated with 
different organizations.

Thanks,
Donald
==
 Donald E. Eastlake 3rd   [EMAIL PROTECTED]
 155 Beaver Street  +1-508-634-2066(h) +1-508-851-8280(w)
 Milford, MA 01757 USA   [EMAIL PROTECTED]

On Wed, 5 Mar 2003, Spencer Dawkins wrote:

 Date: Wed, 5 Mar 2003 16:39:51 -0600
 From: Spencer Dawkins [EMAIL PROTECTED]
 To: [EMAIL PROTECTED]
 Subject: Registration silliness
 
 So I'm wondering why, if we're all individuals at the IETF, 
 Company is a required field on the registration form?
 
 Mysteriously yours,
 
 Spencer
 
 
 
 




Re: WG Action: Differentiated Services (diffserv) to conclude

2003-03-11 Thread Pekka Savola
On Tue, 11 Mar 2003, The IESG wrote:
 The Differentiated Services (diffserv) Working Group in the Transport 
 Area of the IETF has concluded.

Out of curiousity, is there a particular reason why the subject line says 
to conclude but the body of the messages has concluded.

This is not specific to diffserv, I believe, of course.

-- 
Pekka Savola You each name yourselves king, yet the
Netcore Oykingdom bleeds.
Systems. Networks. Security. -- George R.R. Martin: A Clash of Kings




Re: IAB policy on anti-spam mechanisms?

2003-03-11 Thread Keith Moore
On Tuesday, March 11, 2003, at 02:21  PM, Eric Rescorla wrote:

[EMAIL PROTECTED] writes:
It did teach me the importance of protecting against the
man-in-the-middle attack. This is not often done, at least not by
default, in many STARTTLS implementations.
Indeed. The problem is that it's pretty hard to determine
a priori what certificate the peer server ought to be offering,
due to mail relaying and MX records.
or at least, proper behavior isn't well-defined.  IMHO, about the only 
behavior that is reasonable (assuming a single cert, which IIRC is what 
TLS assumes) is to have the peer server offer a cert for the domain 
name associated with the A record, not the one associated with the MX 
record.

this doesn't protect against bogus MX records.  but if the site doesn't 
want to be an MX for that domain then it will refuse the mail - ideally 
with an enhanced status code that indicates why the mail was refused.  
it might even be reasonable for MTAs to detect that case and handle it 
specially.




Re: IETF consensus in IANA considerations [was Re: Last Call: CR-LDP Extensions for ASON to Informational ]

2003-03-11 Thread Keith Moore
The idea what we can ever proceed without a Last Call strikes me as a
fundamental anathema for the IETF.
agree entirely

Keith




Re: IETF consensus in IANA considerations [was Re: Last Call: CR-LDP Extensions for ASON to Informational ]

2003-03-11 Thread Dave Crocker
Harald,

Tuesday, February 18, 2003, 7:30:51 AM, you wrote:

HTA Given that a large portion of the IETF does not in fact subscribe to the
HTA ietf-announce list, and that in some cases the IETF consensus is pretty
HTA obvious (for instance when the decision is just paperwork following up on
HTA another IETF consensus decision), I wouldn't even say that a Last Call is
HTA always required.

That perspective on project management is very different from the one
that I have been taught. As Elze notes, obvious to one viewer is
obscure to another.

Even when authority is essentially dictatorial and project goals and
methods are crystal clear, it is essential to poll and review status
and needs regularly.  In fact it was Cerf who taught me that it is
essential to check a situation repeatedly and in different ways,
essentially treating such information as statistical.  It's not that
people want to give bad information -- though of course some do -- it
is that human communication is a hugely noisy process.

The IETF has extremely diffuse authority, so we need to be extremely
careful -- and non-parental -- in assessing and asserting our rough
consensus.

The idea what we can ever proceed without a Last Call strikes me as a
fundamental anathema for the IETF.


HTA But it's certainly one tool, and a fairly powerful one, for getting
HTA objections out in public.

indeed.

d/
--
 Dave Crocker mailto:[EMAIL PROTECTED]
 Brandenburg InternetWorking http://www.brandenburg.com
 Sunnyvale, CA  USA tel:+1.408.246.8253, fax:+1.866.358.5301






RE: Last Call: Routing Extensions in Support of Generalized MPLS vto Proposed Standard

2003-03-11 Thread Stephen Shew
Title: RE: Last Call: Routing Extensions in Support of Generalized MPLS  vto  Proposed Standard





I don't know if the pun was intended, but I do like Kireeti's comment about bring them to light. Undoubtedly, this would be within the ITU-T (wavelength) grid! ;-)

There is, I think, some commonality in the comments and the reply in that the intent is to generalize the extensions needed for routing to accomodate non-PSC resources. I agree with the first 4 points that Jonathan made in that I think layer information must be included in routing so that important functions can be performed. I believe that the use of one or two bandwidth values was motivated by the desire to use a lowest common denominator attribute to generalize on path computation and avoid extensive details of links. Unfortunately, this can obscure variable adaptation on a link and the ability to determine a path at a particular adaptation (e.g., VC-3).

In variable adaptation, multiple layers can be supported on a link (actually a G.805 trail) as mentioned in the 2nd point. When a label (channel) is used at a particular layer, it has the effect of modifying the available labels in other layers supported on the same link. It is important to thus be able to reflect the layer relationship in routing.

For the issue of path computation at a particular layer, while bandwidth can give a superset of possible paths, what is needed in many contexts is a path at a specific adaptation. Because different combinations of adaptations can provide the same b/w, the result is that it infeasible paths can be computed because there is no distinction between what type of adaptation can be supported. There are times when for example, you want to have a VC-3 connection end-to-end and not just an LSP with its equivalent bandwidth because the service that was sold was specifically a VC-3.

-Original Message-
From: Kireeti Kompella [mailto:[EMAIL PROTECTED]] 
Sent: Saturday, March 01, 2003 14:29
To: Jonathan Sadler
Cc: [EMAIL PROTECTED]; [EMAIL PROTECTED]; [EMAIL PROTECTED]
Subject: Re: Last Call: Routing Extensions in Support of Generalized MPLS vto Proposed Standard



Hi Jonathan,


On Sun, 23 Feb 2003, Jonathan Sadler wrote:


 Please consider the following comments on these drafts:
 draft-ietf-ccamp-gmpls-routing-05.txt
 draft-ietf-ccamp-ospf-gmpls-extensions-09.txt
 Many of the comments are based on implementation experience. These 
 comments are marked with a (*).


Thanks for your comments. Most of these would have more appropriate to raise in the WG Last Call, but it is certainly better to bring them to light now than never.

 ==

 1. In section 4.4.2 of draft-ietf-ccamp-gmpls-routing-05.txt, the 
 operations for Packet Switch Capable (PSC) are defined. Reference is 
 made to Minimum LSP bandwidth for SDH encoding. None of the examples 
 in section 5 of draft-ietf-ccamp-gmpls-routing-05.txt show how this 
 field should filled.


Note that all possible permutations cannot possibly be addressed; however, we will consider adding some examples here.


 2. The mechanism for showing relationships between server and client 
 layers is not generalized*. Specifically:
 - Relationships between SONET/SDH layers (ISC type: TDM) are
 implicitly stated based on the Min and Max LSP bandwidth
 advertised*. To quote draft-ietf-ccamp-gmpls-routing-05.txt:

 On an interface having Standard SDH multiplexing, an LSP
 at priority p could reserve any bandwidth allowed by the
 branch of the SDH hierarchy, with the leaf and the root
 of the branch being defined by the Minimum LSP Bandwidth
 and the Maximum LSP Bandwidth at priority p.

 This requires node doing the route calculation to understand
 the G.707 multiplexing hierarchy. Since LSP routing is source
 routed, it could be the node doing the route calculation
 doesn't understand G.707.


This document does *not* cover how path computation is done. Of course, the information is less than useful if it cannot be used effectively. However, it has been pointed out implicitly and explicitly in several documents that the head end does *not* have to do the entire route computation -- this is one reason why there are loose hops in the ERO. See also the various drafts on multi-area TE computation.

 - Relationships between PSC-n (for IP switching) and SONET/SDH are
 explicitly specified on the encoding type specified in the PSC-n
 announcement*. However, SONET/SDH is not a single layer. It
 must be possible to identify if the PSC-n layer can be carried
 by a VC-11 trail, a VC-12 trail, a VC-3 trail, a VC-4 trail,
 or a VC-4-nc trail.

 Section 4.4.2 of draft-ietf-ccamp-gmpls-routing-05.txt tries
 to deal with this in the following paragraph:

 On a PSC interface that supports Standard SDH encoding, an
 LSP at priority p could reserve any bandwidth allowed by
 the branch of the SDH hierarchy, with the leaf and the root
 of the branch being defined by the Minimum LSP Bandwidth
 and the Maximum LSP Bandwidth at priority 

Re: Last Call: Routing Extensions in Support of Generalized MPLS vto Proposed Standard

2003-03-11 Thread Yangguang Xu


Kireeti,

I am trying to understand what you mean about a general document. Does a general
document cover only lowest common denominator or define a flexible mechanism
that could accommodate various situations? I think it should be the latter.
Then, layering and flexible layer adaptation are pretty common, I think this
draft should define a general mechanism to deal with it. (and sure, xxx
technology specific values can be defined in other xxx specific draft)

BTW, could a general document be really general without fully
studying/understanding most of xxx specific routings first? 

Thanks,

Yangguang 


 It is also not the intent of this document to provide a full description
 of routing info for SDH.  This is a *general* document.  The intent is
 to provide a code point for SDH to be expanded by another document.  This
 was the model used for signaling as well: a *general* func spec, a
 *general* doc for each protocol, and *SDH-specific* docs.  There is an
 SDH specific routing doc; detailed comments are better directed there.
 
   - Sometimes layer relationships are described in an inverted
 manner*. Section 5.1 of draft-ietf-ccamp-gmpls-routing-05.txt
 states:
   STM-16 POS Interface on a LSR
 
Interface Switching Capability Descriptor:
   Interface Switching Capability = PSC-1
   Encoding = SDH
   Max LSP Bandwidth[p] = 2.5 Gbps, for all p
 
 Where PSC-1 is the client of an SDH (sic) server.
 
 Section 5.5 states:
Interface of an opaque OXC (SDH framed) with support for
 one lambda per port/interface
 
   Interface Switching Capability Descriptor:
   Interface Switching Capability = LSC
   Encoding = SDH
 
 In this case, SDH is a client of a wavelength server (LSC).
 However, unlike in section 5.1, the layer relationship is
 inverted.
 
 Is this pointed out as a curiosity, or is there a question that needs
 to be addressed?
 
  3. Layer specific attributes are not supported*.  Specifically:
 
 Good points.  Please raise this with the SDH routing doc.
 
  4. The TDM Interface Switching Capability presumably includes
 layers other than SONET/SDH, such as PDH* (DS1, DS3, E1, E3) and
 G.709.  The interaction with these layers needs to be defined.
 
 Ditto.
 
  5. In many cases, 8 levels of priority are not necessary*.  A more
 compact encoding that has a bitfield stating the priority levels
 being announced would reduce the size of the announcement.
 
 This has been discussed elsewhere.  This is the model in the base
 TE document; it has proven reasonable in practice.  If deployment
 proves otherwise, this is easy to fix.  For now, though, I would
 leave it as is.
 
 Thanks again for your comments,
 Kireeti.





RE: Last Call: Routing Extensions in Support of Generalized MPLS vto Proposed Standard

2003-03-11 Thread Stephen Shew
Title: RE: Last Call: Routing Extensions in Support of Generalized MPLS   vto  Proposed Standard





Kireeti, I can provide text but I need about a day to think about it and write it succinctly. On the matter of the limitations of bandwidth value, I can live with your suggestions (a) and (b).

-Original Message-
From: Kireeti Kompella [mailto:[EMAIL PROTECTED]] 
Sent: Monday, March 03, 2003 17:40
To: Shew, Stephen [SKY:Q850:EXCH]
Cc: Jonathan Sadler; [EMAIL PROTECTED]; [EMAIL PROTECTED]; [EMAIL PROTECTED]
Subject: RE: Last Call: Routing Extensions in Support of Generalized MPLS vto Proposed Standard



Hi Stephen,


On Mon, 3 Mar 2003, Stephen Shew wrote:


 I don't know if the pun was intended, but I do like Kireeti's comment 
 about bring them to light.


You're laser sharp, Stephen! :-)


 Undoubtedly, this would be within the ITU-T (wavelength) grid! ;-)


After the discussions we've had, I wouldn't dare not comply.


 There is, I think, some commonality in the comments and the reply in 
 that the intent is to generalize the extensions needed for routing to 
 accomodate non-PSC resources. I agree with the first 4 points that 
 Jonathan made in that I think layer information must be included in 
 routing so that important functions can be performed.


Okay. Can you provide text?


 I believe that the use of one or two bandwidth
 values was motivated by the desire to use a lowest common 
 denominator attribute to generalize on path computation and avoid 
 extensive details of links. Unfortunately, this can obscure variable 
 adaptation on a link and the ability to determine a path at a 
 particular adaptation (e.g., VC-3).


You're right on both counts (about LCD, and about obscuring info). The thinking was (a) let's see how far we can get with just the LCD;

(b) as we learn more, we can incorporate them, ideally in the SDH routing doc.


Thoughts?


Kireeti.





path-decoupled signaling (pads) BOF

2003-03-11 Thread sven . van_den_bosch
We have added a mailing list for this BOF and updated the agenda.

Path-decoupled signaling BOF (pads)

Thursday, March 20 at 1530-1730
==

CHAIRS:  Sven Van den Bosch, [EMAIL PROTECTED]
 Marcus Brunner, [EMAIL PROTECTED]

Mailing list:
[EMAIL PROTECTED]
To subscribe - [EMAIL PROTECTED]
Archive - http://psg.com/lists/pads

Description

The Next Steps in Signaling (NSIS) WG is developing a next-generation
general purpose signaling protocol for state installation along the data
path. NSIS is currently focusing on an interpretation of 'along the data
path' as 'visiting the same routers as the data flow'. This is denoted as
path-coupled signaling. For a number of applications, it would be useful to
have a somewhat broader interpretation of 'along the data path', e.g.
'visiting the same AS's as the data flow'. This is denoted as
path-decoupled signaling.

The purpose of the BOF session is to survey and discuss the path-decoupled
signaling case. The first part of the discussion should bring forward
arguments for path-decoupled signaling and describe use cases for
path-decoupled signaling, potentially limiting the scope of the signalling,
e.g. to a single AS.
The second part deals with the expected  impact path-decoupled signaling
would have on the NSIS protocol.

Proposed Agenda

Introduction, Chair
Use cases for path-decoupled signaling, Olov Schelen
([EMAIL PROTECTED]), Cedric Aoun ([EMAIL PROTECTED])
Impact on nsis, TBD
Discussion and round-up

Drafts related to the discussion:
draft-schelen-nsis-opopsig-01
draft-geib-sig-guarandif-00.txt
draft-ietf-nsis-fw-02.txt
draft-declercq-vsn-arch-00.txt







RE: draft-iesg-vendor-extensions-00.txt

2003-03-11 Thread Shahram Davari
I don't mind, but I followed Scott Bradner's advice.

Yours,
Shahram

-Original Message-
From: Alex Zinin [mailto:[EMAIL PROTECTED]
Sent: Thursday, March 06, 2003 6:06 PM
To: Shahram Davari
Cc: [EMAIL PROTECTED]; [EMAIL PROTECTED]; [EMAIL PROTECTED]
Subject: Re: draft-iesg-vendor-extensions-00.txt


Shahram,

  Since the draft in subject is not specific to the CCAMP or MPLS WGs,
  or even the SUB-IP area, may I suggest that we don't abuse the
  mailing lists of these WGs and take the discussion to [EMAIL PROTECTED]

-- 
Alex

Thursday, March 6, 2003, 11:35:16 AM, Shahram Davari wrote:
 Hi All,

 I would like to make an alternative proposal to what is 
proposed in this draft.
 I think that IETF should not prevent other SDOs from 
developing extensions (minor or major),
 to IETF protocols, as long as they don't call those 
extensions being IETF compliant.
 I think IETF could recommend that the other SDOs present 
their protocol extensions
 to IETF (in the form of a draft). The IETF community then 
has 3 choices:

 1) IETF agrees with the requirements and nature of the 
extensions and find them useful. In that case IETF could 
engage in technical discussions with the other SDO and reach 
to a mutually agreeable
 draft, which could then be advanced to Proposed Standard.

 2) IETF agrees with the requirement, but does not agree with 
the proposed extension, and prefers other solutions/extensions 
that it thinks meet those requirements. In that case IETF could develop
 its solution and present it to the requesting SDO. If that 
SDO is satisfied with
 IETF's solution, then fine, otherwise nobody can prevent 
them from developing their own extension. If that happens then 
there would be two solutions for the same requirements
 and we should let the Market decide which solution/extension 
do they prefer.

 3) IETF does not agree with the requirement for such 
extensions at all. In that case, the
 other SDO should be free to developed their own extension, 
provided they don't call those extensions to be IETF compliant.



 Thanks,
 -Shahram






Re: IAB policy on anti-spam mechanisms?

2003-03-11 Thread Eric Rescorla
Keith Moore [EMAIL PROTECTED] writes:
 or at least, proper behavior isn't well-defined.  IMHO, about the only
 behavior that is reasonable (assuming a single cert, which IIRC is
 what TLS assumes) is to have the peer server offer a cert for the
 domain name associated with the A record, not the one associated with
 the MX record.
Just to make sur I understand, do you mean that if someone is sending
mail to [EMAIL PROTECTED], and there's an MX for rtfm.com pointing to
mail.isp.com, the cert should contain mail.isp.com in the subject
name?

If so, this really isn't satisfactory, because it allows
anyone who can tamper with the DNS to intercept mail
destined for any server.

-Ekr

-- 
[Eric Rescorla   [EMAIL PROTECTED]
http://www.rtfm.com/



Re: IAB policy on anti-spam mechanisms?

2003-03-11 Thread Keith Moore
On Wednesday, March 12, 2003, at 12:27  AM, Eric Rescorla wrote:

Keith Moore [EMAIL PROTECTED] writes:
or at least, proper behavior isn't well-defined.  IMHO, about the only
behavior that is reasonable (assuming a single cert, which IIRC is
what TLS assumes) is to have the peer server offer a cert for the
domain name associated with the A record, not the one associated with
the MX record.
Just to make sur I understand, do you mean that if someone is sending
mail to [EMAIL PROTECTED], and there's an MX for rtfm.com pointing to
mail.isp.com, the cert should contain mail.isp.com in the subject
name?
yes.  because mail.isp.com is the name of a server which might support 
thousands of MXed domains.

If so, this really isn't satisfactory, because it allows
anyone who can tamper with the DNS to intercept mail
destined for any server.
I see your point.  But I suspect it illustrates a significant 
limitation of the SSL/TLS protocol - in that SSL/TLS seems to assume 
that an IP address and port number are used by only one named service.  
It's been awhile since I looked at the TLS protocol but I don't recall 
any way for the client to say prove to me that you are authorized to 
provide the SMTP service associated with DNS name foo.com.   or did I 
just forget that feature?




Re: IAB policy on anti-spam mechanisms?

2003-03-11 Thread Eric Rescorla
Keith Moore [EMAIL PROTECTED] writes:
 yes.  because mail.isp.com is the name of a server which might support
 thousands of MXed domains.
That's what I figured.

  If so, this really isn't satisfactory, because it allows
  anyone who can tamper with the DNS to intercept mail
  destined for any server.
 
 I see your point.  But I suspect it illustrates a significant
 limitation of the SSL/TLS protocol - in that SSL/TLS seems to assume
 that an IP address and port number are used by only one named service.
 It's been awhile since I looked at the TLS protocol but I don't recall
 any way for the client to say prove to me that you are authorized to
 provide the SMTP service associated with DNS name foo.com.   or did I
 just forget that feature?
This could be conceivably accomplished in two ways:

(1) By the application protocol (in this case SMTP) indicating
what server the client wanted to talk to. This isn't
possible in STARTTLS, but it could easily have been specifid
that way. I would have designed things differently.

(2) You could use the TLS domain name extension described in
draft-ietf-tls-extensions-06.txt, recently approved at
Proposed by the IESG.

Unfortunately, neither of these fixes solves the real problem,
which is that it's impractical for a relaying MTA to have a
a certificate for every host it might potentially receive
mail for, but that's what's required here.

I suppose you could call this as a limitation in TLS, but it's
really a basic limitation of pretty much any channel security
scheme. If you want to do better, you really need an object
security scheme like S/MIME.

-Ekr

-- 
[Eric Rescorla   [EMAIL PROTECTED]
http://www.rtfm.com/