Re: IETF63 wireless

2005-03-14 Thread Tim Chown
On Sun, Mar 13, 2005 at 01:47:05PM -0800, Ole Jacobsen wrote:
 
 Simply saying that a network which is built by volunteers (or by anyone
 else for that matter) MUST be reliable is just naive. It's a bit like
 saying operating systems and other software must be bug free. Keep in
 mind that the people who spend their time doing this have lots of
 experience, but they, and by extension we the IETF, learn new lessons
 every time. That can't be a bad thing.

Given each IETF has 1200-ish delegates, paying $500US, there is $600K dollars
to hand for IETF.

How about removing some of those ghastly fattening breakfast/break pastries
and replacing them with the more basic breads that always disappear first
in the morning, and using the savings towards wireless? :)   [Getting a
healthy breakfast/snack in the IETF corridors is a separate thread...:]

The wireless is something we will have a growing dependency on; there were
many sessions that had no jabber log due to the failing network, nor could
attendees in the room see comments from remote participants/friends.

Tim

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: IETF63 wireless

2005-03-14 Thread Tim Chown
On Sun, Mar 13, 2005 at 05:02:00PM -0500, John C Klensin wrote:
 
 It is precisely the style of thinking, and not the specifics,
 that I was trying to suggest and illustrate.  

Indeed; there seems to be some 'smart' Alcatel software that is doing
some ARP/DHCP trickery (at least the APs are Alcatel, so the favourite
for the s/w is the same vendor...).

Note that my problem all week was getting dis-associated from WLAN a
few times each hour, then seeing a long, if not indefinite, wait to get
a v4 address once re-associated.  And when I was associated RTTs to the
default router of commonly 1000ms.

We have had many IETFs with more attendees that have had excellent WLAN.

We need to understand why - documenting past experience - good or bad - 
has to only be helpful.

Tim

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: IETF63 wireless

2005-03-14 Thread Ole Jacobsen
Tim,

I was trying to say that:

- Wireless 802.11 is an emerging technology (read not fully cooked yet)

- Wireless 802.11 is a wireless (read radio) technology subject to
  complex patterns of interference and station interactions (station
  includes both basestations and clients)

So, it is not clear that throwing extra money at the problem would help,
unless we use it to redesign hotels and convention centers, creating a
series of carefully interconnected Faraday Cages. Remember that each
and every location has its own set of radio characteristics.

PS:
I suspect the food will not be a problem in Paris. I've never managed to
find bad food there outside of those American restaurants :-)

Ole

Ole J. Jacobsen
Editor and Publisher,  The Internet Protocol Journal
Academic Research and Technology Initiatives, Cisco Systems
Tel: +1 408-527-8972   GSM: +1 415-370-4628
E-mail: [EMAIL PROTECTED]  URL: http://www.cisco.com/ipj


On Mon, 14 Mar 2005, Tim Chown wrote:

 On Sun, Mar 13, 2005 at 01:47:05PM -0800, Ole Jacobsen wrote:
 
  Simply saying that a network which is built by volunteers (or by anyone
  else for that matter) MUST be reliable is just naive. It's a bit like
  saying operating systems and other software must be bug free. Keep in
  mind that the people who spend their time doing this have lots of
  experience, but they, and by extension we the IETF, learn new lessons
  every time. That can't be a bad thing.

 Given each IETF has 1200-ish delegates, paying $500US, there is $600K dollars
 to hand for IETF.

 How about removing some of those ghastly fattening breakfast/break pastries
 and replacing them with the more basic breads that always disappear first
 in the morning, and using the savings towards wireless? :)   [Getting a
 healthy breakfast/snack in the IETF corridors is a separate thread...:]

 The wireless is something we will have a growing dependency on; there were
 many sessions that had no jabber log due to the failing network, nor could
 attendees in the room see comments from remote participants/friends.

 Tim

 ___
 Ietf mailing list
 Ietf@ietf.org
 https://www1.ietf.org/mailman/listinfo/ietf


___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: RFC - 2229 / Dictionary Server Protocol

2005-03-14 Thread Frank Ellermann
Baker Fred wrote:

 I have some bed-time reading for you

Thanks, excl. the new 3978/3979 I had read these texts.
Looking again into 2026 I'm still not sure how Gaurav
could handle this if the authors don't answer.  And if
the inventors of IsNot also invented dict he might
need a lawyer _before_ publishing any I-D.  Bye, Frank



___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Introduction to ATP

2005-03-14 Thread Jason Gao
Here ATP stands for Asymmetric Transport Protocol (somewhat for historical
reason), not Appletalk Transaction Protocol.

Welcome to http://atp.ebloggy.com/ to add comment.

Known problems:
Lack of references section;
Lack of elliptic curve parameter definition;
and much more:)

Briefly:

ATP aims to provide mobility and multi-home support in transport layer. But
why not patching TCP, extending SCTP, or exploiting HIP? The answer is that
when taking account of syndicate effect, it is more efficient to use ATP.

Patching TCP software to support mobility and multi-home is not difficult.
But widely deploying the new TCP implementation may be an enduring work.

SCTP supports multi-home, and it is quite easy to extend it to support
mobility. But as SCTP is already quite heavy weighted, and its congestion
control mechanism arguably suffers same trouble as TCP, it is difficulty to
persuade mass users to accept SCTP.

HIP decouples identity and locator role of IP address by adding a new layer.
It is quite exquisite. But unfortunately to add a new layer is to add a new,
non-trivial trouble of reliability.

The name of Asymmetric Transport Protocol is somewhat historical. ATP takes
advantages of asymmetric cryptography (and asymmetry of communication). It
is designed to be an alternate of transport layer protocols, alongside of
TCP and UDP [RFC768].

ATP aims to
²   Decouple locator and identity role of network layer address by keep
it from taking part in transport layer identity and/or address.
²   Support mobility
²   Support multi-home
²   Facilitate high performance parallel communication
²   Facilitate high efficiency transactional communication
²   Provide transport encryption service
²   Provide some QoS service
²   Keep simple

ATP supports mobility and multi-home by decoupling locator and identity role
of network layer address with connection key.

There are three connection modes in ATP: fast-mode, normal mode and
encrypted transport mode. In the host environment, each ATP connection is
uniquely associated with a 64-bit connection key.

In the context of each normal mode ATP connection, there is a shared secret.
The shared secret is established in Elliptic Curve Diffie-Hellman [ECC] key
agreement process when the connection is set up. ATP endpoint seals every
ATP packet with Integrity/Identity Check Code (ICC). In normal mode ICC is
calculated by applying HMAC-SHA1 [RFC2104] [RFC3174] on the ATP packet
header with the shared secret as the key. As far as only the connected peers
know both the connection key and the shared secret, integrity of the ATP
packet header and identity of the ATP packet source are secured by ICC.

In fast mode, ATP endpoints do not establish a shared secret, and agree on
the connection key only. The 64-bit connection key solely acts the identity
check role. ICC is a CCITT-CRC-16 code [CRC] that weakly protects packet
integrity.

In encrypted transport mode ATP endpoints use AES-IV-SHA1-80 algorithm to
protect privacy of the payload, integrity of the full packet, and identity
of the packet source. AES-IV-SHA1-80 algorithm is integration of AES
[FIPS-197] and SHA1-80 [RFC3174]. AES encryption key is installed by the
upper layer application (ULA), or derived from the shared secret on request
of ULA; 64-bit initial vector is the low-order 64-bit part of the result of
applying SHA1-80 on the ATP packet header. High-order 16 bits are exploited
for preliminary integrity check. Encrypted transport mode is not only a
feature of mobility and multi-home but a simple and useful feature of
security as well.

Mobility support is further reinforced by the feature of re-locating via
courier.

ATP supports high performance, high efficiency parallel and/or transactional
communication with connection clone and auto-reconnect features.

ATP also features First-In-First-Deplete traffic class, in addition to
traditional best-effort traffic class.

ATP DOES NOT provide reliable multicast support, nor does it do full-fledged
congestion control. However, ATP does have cooperative congestion control
feature.

We assume that
²   Mobility context is L4-comfortable. That is, frequency of IP address
change is limited so that the IP addresses of two endpoints remain stable as
long as they are negotiating a connection.
²   Ownership of upper layer application over connection key is secure.
²   Upper Layer Application is willing and able to defense against
man-in-the-middle attack.
²   Acceptable information asymmetry. One participant in communication,
the responder, is willing to and able to make the other participant, the
initiator, know the rendezvous key, but not necessarily vice versa.



___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: Why?

2005-03-14 Thread Brian E Carpenter
Michel Py wrote:
Terry Gray wrote:
Keith,
Quick note from the peanut gallery:  I believe your vision is
only achievable if the address allocation policies for v6 are
such that every man/woman/child and enterprise can obtain an
ample amount of provider-independent v6 space (or some number
of address bits that the enterprise can *own*). If people feel
like they are held hostage to others for the operation of their
internal enterprise (or home!) networks, you can take it to the
bank that v6 NAT will become just as pervasive and entrenched
as v4 NAT is.

This is precisely why I have stated earlier that v6 NAT is unavoidable:
'every man/woman/child and enterprise can obtain an ample
amount of provider-independent v6 space'
Catch is we don't know how to make this scalable. We have tried for 10
years and we still don't.
Well, we could continue to rehearse these arguments for a while longer.
(Don't want to insult anybody, but I haven't seen anything in this
thread that I haven't seen many times before, including the absence
of scalable routing for PI space.)
Alternatively, people could contribute constructively to relevant
IETF activities
- behave, which is trying to codify NAT behavior such that NAT would
  become easier to deal with when we *have* to deal with it
- v6ops, and specifically draft-vandevelde-v6ops-nap-01.txt*, which
  is trying to show how to deploy IPv6 without any need for NAT
- shim6, which will define how to solve at least one of the problems
  in this area
*truth in advertising: I am a co-author of this draft.
Brian

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: RFC - 2229 / Dictionary Server Protocol

2005-03-14 Thread Gaurav Vaish
 Looking again into 2026 I'm still not sure how Gaurav
 could handle this if the authors don't answer.  And if

From 2229 (C) statement:
quote

   However, this
   document itself may not be modified in any way, such as by removing
   the copyright notice or references to the Internet Society or other
   Internet organizations, except as needed for the purpose of
   developing Internet standards in which case the procedures for
   copyrights defined in the Internet Standards process must be
   followed, or as required to translate it into languages other than
   English.

/quote

   I think the authors have given permissions to modify it so that it
can be updated for developing Internet standards -- which, IMO, gives
me permissions - without requiring an explicit one from the authors -
to go ahead.

 the inventors of IsNot also invented dict he might
 need a lawyer _before_ publishing any I-D.  Bye, Frank

  Can I create my own Dict-Serv protocol? As a matter of fact, I
thought about DictServ protocol sitting on my laptop and doing some
work... after doing a lot work, it just came to my mind to see if
anything exists. RFC was the last thing on my mind and the first
response from Google.

   I was looking to SOAP-implementations and that's why you'd also see
a mention of XML in the response formats.

   Or instead... I'd then go to W3C and ask for a standard
SOAP-data-exchange-format for dictionary. However, it will be in SOAP
(over HTTP to start with).


-- 
Cheers,
Gaurav Vaish
http://www.mastergaurav.org
http://mastergaurav.blogspot.com


___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


What? No PPT or wireless? [Re: IETF63 wireless]

2005-03-14 Thread Brian E Carpenter
Keith Moore wrote:
...
actually I haven't attended an IETF meeting in the past several years
where I didn't get the impression that we'd be much more effective
at getting work done _without_ wireless access.   large rooms that are
full of people sitting down typing on laptops and not paying attention
to what is being said are not conducive to getting work done - even
among the people who are paying attention.  it further exacerbates the
phenomenon where meetings consist of highly scripted presentations 
rather than discussion time.  most people don't pay attention to the 
presentations because the information content is so low, so they use
their laptops to keep them occupied.

if we could get rid of wireless and powerpoint, we'd be much better off.
Personal opinion: disagree. Wireless is immensely useful to grab a
document, check something on another SDO's web site, and - yes -
for instant messaging (e.g. we need you in here right now). And some
people simply have to multitask in order to be able to attend IETF
meetings in the first place. The jabber scribing has become very
important for remote participants - this time we even had one Area
Director who was partcipating actively by jabber (and audio streaming).
The wireless glitches that interrupted jabber were a real problem
this time.
As for presentations, the fact that they vary in quality can't be
blamed on PPT. It should be blamed on the presenters, perhaps.
   Brian
___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: RFC - 2229 / Dictionary Server Protocol

2005-03-14 Thread Gaurav Vaish
Or instead... I'd then go to W3C and ask for a standard

And I just forgot how costly it is to be a member of W3C :D


-- 
Cheers,
Gaurav Vaish
http://www.mastergaurav.org
http://mastergaurav.blogspot.com


___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: What? No PPT or wireless? [Re: IETF63 wireless]

2005-03-14 Thread Bruce Campbell
On Mon, 14 Mar 2005, Brian E Carpenter wrote:

 Keith Moore wrote:
 ...
  if we could get rid of wireless and powerpoint, we'd be much better off.

 meetings in the first place. The jabber scribing has become very
 important for remote participants - this time we even had one Area

The IETF Meeting crew should look at supplying an additional 3 ethernet
and power drops per room, labelled 'chair', 'presenter' and '(jabber)
scribe' with the expectation that they be used accordingly.  These
functions, IMHO, are too important to leave to the possible
failures/overloads of the wireless or laptop battery life.

( Actually, I'm surprised that these are either not there or are not
  advertised already; it really reduces the number of complaints about
  'the wireless failed in the middle of my presentation' )

-- 
 Bruce CampbellRIPE
   Systems/Network Engineer NCC
 www.ripe.net - PGP562C8B1B

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: What? No PPT or wireless? [Re: IETF63 wireless]

2005-03-14 Thread Stewart Bryant

The IETF Meeting crew should look at supplying an additional 3 ethernet
and power drops per room, labelled 'chair', 'presenter' and '(jabber)
scribe' with the expectation that they be used accordingly.  These
functions, IMHO, are too important to leave to the possible
failures/overloads of the wireless or laptop battery life.
Power has, in my experience, always been available to the chair 
presenter, but I agree that Ethernet drops as a backstop against
wireless problems is a good idea.
Stewart

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: [e2e] Introduction to ATP

2005-03-14 Thread Lars Eggert
Jason Gao wrote:
Here ATP stands for Asymmetric Transport Protocol (somewhat for historical
reason), not Appletalk Transaction Protocol.
Welcome to http://atp.ebloggy.com/ to add comment.
Is there a paper on it? The web page and your email don't have details.
--
Lars Eggert NEC Network Laboratories


smime.p7s
Description: S/MIME Cryptographic Signature
___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: FW: Why?

2005-03-14 Thread Tom Petch
inline
Tom Petch

From: Kevin Loch [EMAIL PROTECTED]
Cc: nanog@merit.edu; ietf@ietf.org
Sent: Friday, March 11, 2005 10:09 PM
Subject: Re: FW: Why?



 As you know, the value of a network is roughly proportional to
 the square of the participants.

The value of a network can depend on what is on it, not how many or who.  One
useful (http/ftp/...) server can make a network worth accessing, worth paying
for.  Even if there was noone else on this Internet, even if I never wanted to
e-mail anyone or anything, there are servers worth paying to access.

I saw the Internet explode in the 1990s because of web servers, not because n**2
people could now talk to each other, so I think this a general point..

By contrast, IPv6, like 3G mobile, has nothing worth getting access to; they are
just bits of technology with no applications worth accessing.  Have a look at
models of the adoption of technology.



___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: What? No PPT or wireless? [Re: IETF63 wireless]

2005-03-14 Thread Keith Moore
if we could get rid of wireless and powerpoint, we'd be much better 
off.
Personal opinion: disagree. Wireless is immensely useful to grab a 
document, check something on another SDO's web site, and - yes - for 
instant messaging (e.g. we need you in here right now). And some 
people simply have to multitask in order to be able to attend IETF 
meetings in the first place. The jabber scribing has become very 
important for remote participants - this time we even had one Area 
Director who was partcipating actively by jabber (and audio 
streaming). The wireless glitches that interrupted jabber were a real 
problem this time.
yes, yes, and yes.  but in many meetings it's hard to escape the 
impression that most of the people in the room aren't really paying 
more than say 10% of their attention to the meeting.

As for presentations, the fact that they vary in quality can't be
blamed on PPT. It should be blamed on the presenters, perhaps.
not on PPT as opposed to any of the other similar tools that exist for 
that purpose.  but there's something about that medium that seems to 
encourage poor presentations - slides consisting of a small amount of 
text (because of the low resolution of the medium) rather than drawings 
(because it's easier to type in text on a keyboard than it is to draw 
drawings with a mouse or trackpad).  even with the old-style 
transparencies you could get more readable information on a page, and 
you could draw on them in real time.

and yet even this is beside the point.  maybe this is age setting in, 
but it seems to me we used to get a lot more work done when we used our 
meetings primarily for discussion rather than scheduling presentations 
for most or all of the meeting time.   these days some IETF WG meetings 
remind me of Apple's 1984 commercial...except that there's nobody to 
throw a hammer through the screen.

one benefit of our somewhat reduced attendance should be that we can 
get more work done by reverting to a more effective meeting style.  (or 
maybe our reduced attendance can be attributed to a widespread 
realization that we're not getting much work done in these meetings?)

Keith
___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: RFC - 2229 / Dictionary Server Protocol

2005-03-14 Thread Bruce Lilly
  Date: 2005-03-14 04:24
  From: Frank Ellermann [EMAIL PROTECTED]

 Looking again into 2026 I'm still not sure how Gaurav
 could handle this if the authors don't answer.

Anybody can write an Internet-Draft (getting IETF community consensus
is another matter).  In the case of a revision of a document created
by others, it would be appropriate to acknowledge the contribution
of the original authors in a Contributors or Acknowledgments section.

Regarding mechanics of an update, if one is at all familiar with
troff/nroff/groff, see RFC 2223 and draft-lilly-using-troff (update
expected imminently).  Cutting and pasting from the original RFC
(ignore boilerplate and TOC) or editing a copy of the original to
remove boilerplate and TOC and to add directives should take no more
than 45 minutes for a novice, less than half that for an experienced
person.

Then come the difficult parts:
the EBNF in the original has to be converted (manually) to ABNF
   you'll need a good understanding of the intent of the original
   EBNF and a working knowledge of RFC 2234 as amended by errata
   (http://www.rfc-editor.org/cgi-bin/errata.pl)
references need to be updated (see the rfc-ref.txt document made
   available by the RFC Editor) and checked against the referring
   text -- references are supposed to be categorized as either
   normative or informative, so a decision needs to be made for
   each reference. You'll want to update the reference to RFC
   1122 to 2119 (normative), for example.
desired changes can be made (keep track of what is changed; the
   question will be asked -- put a list of changes in an Appendix
   to head off the question); make absolutely sure to pay careful
   attention to backwards compatibility (generation of new URIs
   should not be such that an existing (2229-based) parser will
   break or cause illegal content to be handed to some other
   protocol (in that respect, the mailto draft is the wrong
   document to use as a reference))
don't forget to include a suggestion for a discussion mailing
   list in the Abstract

Then it gets easy again:
format the document to generate text with up-to-date boilerplate,
   TOC, and references
check with Henrik Levkowetz' idnits program, and revise until
   there are no nits (http://ietf.levkowetz.com/tools/idnits/)
submit the formatted and checked text as an Internet-Draft as
   described in the guidelines (see http://www.ietf.org/ID.html)
subscribe to the I-D-announce mailing list: when the draft is
   announced, notify the discussion mailing list (if the Secretariat
   didn't copy that list in the announcement)
after a suitable discussion period (min. two weeks), revise the
   draft according to comments from the discussion and repeat to
   produce the next draft version
when the draft is stable (no additional comments during discussion),
   ask the appropriate Area Director(s) (Applications Area, in this
   case) to submit the draft to the IESG for approval as an
   (Informational or Proposed Standard) RFC
subscribe to the IETF-announce mailing list; if the IESG approves,
   a Last Call will be issued on the draft, with discussion taking
   place on the IETF discussion (that's this list) or IESG mailing
   lists -- Last Call for an individual submission runs a minimum
   of four weeks
if there are substantive comments during Last Call, revise the draft
   again and repeat the cycle
if/when the draft is stable and passes Last Call with no serious
   objections, the IESG may approve it as an RFC; then you work
   with the RFC Editor to generate a published RFC (should be
   quick and painless if you use groff and macros as mentioned above);
   there is a final (nominally) 48-hour author review where you're
   supposed to carefully review the document to ensure that
   everything is the way you want it
if the IESG decided to publish as a Proposed Standard, you can
   then set about collecting information to proceed to Draft
   Standard (minimum of two independent and fully interoperable
   implementations need to be documented).

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re:Why?

2005-03-14 Thread JORDI PALET MARTINEZ
This may be interesting if you want to take a look at models of adoption of
technology.

http://www.ist-ipv6.org/modules.php?op=modloadname=Newsfile=articlesid=62
9


Regards,
Jordi




 De: Tom Petch [EMAIL PROTECTED]
 Responder a: Tom Petch [EMAIL PROTECTED]
 Fecha: Mon, 14 Mar 2005 10:46:40 +0100
 Para: Kevin Loch [EMAIL PROTECTED]
 CC: ietf@ietf.org ietf@ietf.org
 Asunto: Re: FW: Why?
 
 inline
 Tom Petch
 
 From: Kevin Loch [EMAIL PROTECTED]
 Cc: nanog@merit.edu; ietf@ietf.org
 Sent: Friday, March 11, 2005 10:09 PM
 Subject: Re: FW: Why?
 
 
 
 As you know, the value of a network is roughly proportional to
 the square of the participants.
 
 The value of a network can depend on what is on it, not how many or who.  One
 useful (http/ftp/...) server can make a network worth accessing, worth paying
 for.  Even if there was noone else on this Internet, even if I never wanted to
 e-mail anyone or anything, there are servers worth paying to access.
 
 I saw the Internet explode in the 1990s because of web servers, not because
 n**2
 people could now talk to each other, so I think this a general point..
 
 By contrast, IPv6, like 3G mobile, has nothing worth getting access to; they
 are
 just bits of technology with no applications worth accessing.  Have a look at
 models of the adoption of technology.
 
 
 
 ___
 Ietf mailing list
 Ietf@ietf.org
 https://www1.ietf.org/mailman/listinfo/ietf




___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: What? No PPT or wireless? [Re: IETF63 wireless]

2005-03-14 Thread Carl Malamud
 As for presentations, the fact that they vary in quality can't be
 blamed on PPT. It should be blamed on the presenters, perhaps.
 
 Brian
 

Edward Tufte makes a very convincing case that in the case of
powerpoint, the medium certainly influences the message:

Summary of Tufte's views in Wired:
http://www.wired.com/wired/archive/11.09/ppt2.html
At a minimum, a presentation format should do no harm. Yet the PowerPoint 
style routinely disrupts, dominates, and trivializes content. Thus PowerPoint 
presentations too often resemble a school play - very loud, very slow, and 
very simple.

Tufte's own site:
http://www.edwardtufte.com/tufte/powerpoint
(Worth checking out for the cartoon).

Next slide please ...

Regards,

Carl

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: What? No PPT or wireless? [Re: IETF63 wireless]

2005-03-14 Thread Carsten Bormann
On Mar 14 2005, at 14:07 Uhr, Keith Moore wrote:
we used to get a lot more work done when we used our meetings 
primarily for discussion rather than scheduling presentations for most 
or all of the meeting time.
Yes.  WG chairs planning WG meetings, take note.
But then, one difference is that a lot more stuff happens outside the 
WG meetings (e.g., on the mailing list) than ten years ago.
People don't convene in one place to do original work but to decide on 
the fate of work that has been done elsewhere.
Also, the things being worked on are simply way more complex than ten 
years ago.
(The best WG meeting I ever attended was one where Tony Li hammered out 
most of the IP-over-firewire details in one session by asking the 
attending firewire experts all the right questions in one sitting.  I'm 
still wowed for life.  But you can't do this for something as complex 
as VPLS.)

All that would explain a tendency to mainly do progress reports.
This does not (fully) explain why we don't discuss things as much any 
more, however.

Right now, if you need significant discussion in a WG, it seems you 
have to schedule an interim.

Gruesse, Carsten
___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: What? No PPT or wireless? [Re: IETF63 wireless]

2005-03-14 Thread Melinda Shore
On Monday, March 14, 2005, at 08:34 AM, Carl Malamud wrote:
Edward Tufte makes a very convincing case that in the case of
powerpoint, the medium certainly influences the message:
The NY Times ran an article on PowerPoint and the deterioration of
public speaking a few years ago, before Tufte started pointing
out the problem, and the article had a photoshopped photograph
of Martin Luther King standing in front of a projected slide.
The slide heading was I Have a Dream, and the body of the slide
was The dream consists of: and a bulleted list of items.
However, while slides do tend to lead to a presentation-type
meeting format, I think there are other factors substantially
contributing to that, as well.
Melinda
___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: RFC - 2229 / Dictionary Server Protocol

2005-03-14 Thread Brian E Carpenter
I would add that the first step in such an effort should
probably be to contact the appropriate IETF Area Directors
for guidance and for the names of other people who might be
interested in helping.
This looks like Applications Area material to me.
See http://www.ietf.org/html.charters/wg-dir.html#Applications%20Area
   Brian
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Brian E Carpenter
IETF Chair
Distinguished Engineer, Internet Standards  Technology, IBM

Bruce Lilly wrote:
Date: 2005-03-14 04:24
From: Frank Ellermann [EMAIL PROTECTED]

Looking again into 2026 I'm still not sure how Gaurav
could handle this if the authors don't answer.

Anybody can write an Internet-Draft (getting IETF community consensus
is another matter).  In the case of a revision of a document created
by others, it would be appropriate to acknowledge the contribution
of the original authors in a Contributors or Acknowledgments section.
Regarding mechanics of an update, if one is at all familiar with
troff/nroff/groff, see RFC 2223 and draft-lilly-using-troff (update
expected imminently).  Cutting and pasting from the original RFC
(ignore boilerplate and TOC) or editing a copy of the original to
remove boilerplate and TOC and to add directives should take no more
than 45 minutes for a novice, less than half that for an experienced
person.
Then come the difficult parts:
the EBNF in the original has to be converted (manually) to ABNF
   you'll need a good understanding of the intent of the original
   EBNF and a working knowledge of RFC 2234 as amended by errata
   (http://www.rfc-editor.org/cgi-bin/errata.pl)
references need to be updated (see the rfc-ref.txt document made
   available by the RFC Editor) and checked against the referring
   text -- references are supposed to be categorized as either
   normative or informative, so a decision needs to be made for
   each reference. You'll want to update the reference to RFC
   1122 to 2119 (normative), for example.
desired changes can be made (keep track of what is changed; the
   question will be asked -- put a list of changes in an Appendix
   to head off the question); make absolutely sure to pay careful
   attention to backwards compatibility (generation of new URIs
   should not be such that an existing (2229-based) parser will
   break or cause illegal content to be handed to some other
   protocol (in that respect, the mailto draft is the wrong
   document to use as a reference))
don't forget to include a suggestion for a discussion mailing
   list in the Abstract
Then it gets easy again:
format the document to generate text with up-to-date boilerplate,
   TOC, and references
check with Henrik Levkowetz' idnits program, and revise until
   there are no nits (http://ietf.levkowetz.com/tools/idnits/)
submit the formatted and checked text as an Internet-Draft as
   described in the guidelines (see http://www.ietf.org/ID.html)
subscribe to the I-D-announce mailing list: when the draft is
   announced, notify the discussion mailing list (if the Secretariat
   didn't copy that list in the announcement)
after a suitable discussion period (min. two weeks), revise the
   draft according to comments from the discussion and repeat to
   produce the next draft version
when the draft is stable (no additional comments during discussion),
   ask the appropriate Area Director(s) (Applications Area, in this
   case) to submit the draft to the IESG for approval as an
   (Informational or Proposed Standard) RFC
subscribe to the IETF-announce mailing list; if the IESG approves,
   a Last Call will be issued on the draft, with discussion taking
   place on the IETF discussion (that's this list) or IESG mailing
   lists -- Last Call for an individual submission runs a minimum
   of four weeks
if there are substantive comments during Last Call, revise the draft
   again and repeat the cycle
if/when the draft is stable and passes Last Call with no serious
   objections, the IESG may approve it as an RFC; then you work
   with the RFC Editor to generate a published RFC (should be
   quick and painless if you use groff and macros as mentioned above);
   there is a final (nominally) 48-hour author review where you're
   supposed to carefully review the document to ensure that
   everything is the way you want it
if the IESG decided to publish as a Proposed Standard, you can
   then set about collecting information to proceed to Draft
   Standard (minimum of two independent and fully interoperable
   implementations need to be documented).
___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: What? No PPT or wireless? [Re: IETF63 wireless]

2005-03-14 Thread Marshall Eubanks
On Mon, 14 Mar 2005 08:07:05 -0500
 Keith Moore moore@cs.utk.edu wrote:
  if we could get rid of wireless and powerpoint, we'd be much better 
  off.
 
  Personal opinion: disagree. Wireless is immensely useful to grab a 
  document, check something on another SDO's web site, and - yes - for 
  instant messaging (e.g. we need you in here right now). And some 
  people simply have to multitask in order to be able to attend IETF 
  meetings in the first place. The jabber scribing has become very 
  important for remote participants - this time we even had one Area 
  Director who was partcipating actively by jabber (and audio 
  streaming). The wireless glitches that interrupted jabber were a real 
  problem this time.
 
 yes, yes, and yes.  but in many meetings it's hard to escape the 
 impression that most of the people in the room aren't really paying 
 more than say 10% of their attention to the meeting.
 
  As for presentations, the fact that they vary in quality can't be
  blamed on PPT. It should be blamed on the presenters, perhaps.
 
 not on PPT as opposed to any of the other similar tools that exist for 
 that purpose.  but there's something about that medium that seems to 
 encourage poor presentations - slides consisting of a small amount of 
 text (because of the low resolution of the medium) rather than drawings 
 (because it's easier to type in text on a keyboard than it is to draw 
 drawings with a mouse or trackpad).  even with the old-style 
 transparencies you could get more readable information on a page, and 
 you could draw on them in real time.
 


Edward Tufte has some useful things to say about power point (alas, not free).

http://www.edwardtufte.com/tufte/powerpoint
http://www.wired.com/wired/archive/11.09/ppt2.html

I personally think that it may be appropriate that most people are not paying 
attention
much of the time. In some WG, you may only really care about 1 or 2 drafts, and 
not at all 
about the details of the editorial progress of some other draft.

It seems to me that the best discussion happens when there is a review of
some open issue; maybe that could be promoted as invited reviews by the chairs
and given slots in the schedule. 

Of course the real work of any meeting happens in the corridor...

Regards
Marshall Eubanks

 and yet even this is beside the point.  maybe this is age setting in, 
 but it seems to me we used to get a lot more work done when we used our 
 meetings primarily for discussion rather than scheduling presentations 
 for most or all of the meeting time.   these days some IETF WG meetings 
 remind me of Apple's 1984 commercial...except that there's nobody to 
 throw a hammer through the screen.
 
 one benefit of our somewhat reduced attendance should be that we can 
 get more work done by reverting to a more effective meeting style.  (or 
 maybe our reduced attendance can be attributed to a widespread 
 realization that we're not getting much work done in these meetings?)
 
 Keith
 
 
 ___
 Ietf mailing list
 Ietf@ietf.org
 https://www1.ietf.org/mailman/listinfo/ietf


___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: What? No PPT or wireless? [Re: IETF63 wireless]

2005-03-14 Thread Keith Moore
I personally think that it may be appropriate that most people are not 
paying attention
much of the time. In some WG, you may only really care about 1 or 2 
drafts, and not at all
about the details of the editorial progress of some other draft.
Whenever I see a presentation about the editorial progress of some 
draft, I find myself wondering - does _anybody_ here need to be 
watching this?  If someone has typed in this summary in PPT, couldn't 
it as easily be posted to the WG mailing list, or placed in the 
appendix of the I-D?

Face to face time seems better used for interaction.
___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: IETF63 wireless

2005-03-14 Thread Bill Sommerfeld
On Mon, 2005-03-14 at 03:10, Tim Chown wrote:
 Indeed; there seems to be some 'smart' Alcatel software that is doing
 some ARP/DHCP trickery (at least the APs are Alcatel, so the favourite
 for the s/w is the same vendor...).
 
 Note that my problem all week was getting dis-associated from WLAN a
 few times each hour, then seeing a long, if not indefinite, wait to get
 a v4 address once re-associated.  And when I was associated RTTs to the
 default router of commonly 1000ms.

Somehow I think that a few of the recommendations from the old IETF 
Meeting Network Infrastructure Lore document (as archived at  
http://www.ietf.org/meetings/draft-ymbk-termroom.txt) need to be remembered:

  2.1 LAN Separation
...
   There MUST NOT be firewalls, NATs, or other end-to-end breakage
   between the public LAN(s) and the global internet.

Assuming claims about what the 802.11 infrastructure was doing are 
correct, this provision was ignored and bad things happened.  
Stateful DHCP lease tracking was clearly causing more trouble than 
it's worth to the IETF network.

  3.13 Advanced Technology

   While it is tempting for a host/vendor to show off fancy
   technology at an IETF, this audience runs and uses the most
   arcane assortment of services, and is a very poor place to find
   out that your fancy new switch breaks when someone tries to run
   IPv42 through it.  Run a simple production network.  If one must
   run a technology demo, isolate it onto a separate network segment
   so that it is unable to interfere with the production network.

And maybe we need a new entry in:

   3.14 Failed Technology

   Two attempts have been made to use ATM LAN Emulation, aka LANE,
   as the primary backbone protocol connecting all ethernet switches
   and routers at IETF meetings.  Both attempts were disasters.
   Some have asserted that IETF traffic patterns are unusually
   unsuited to LANE.  You MUST NOT try to use LANE.

For the next couple of meetings, for 802.11b service we should go back to 
using conventional AP's connected via a conventional switched ethernet 
to a conventional dhcp server/relay and a conventional router or three.

This, at least, would allow the folks running the network to reboot any
and all components without forcing clients to reinitialize/rerun DHCP/etc.

- Bill



___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: What? No PPT or wireless? [Re: IETF63 wireless]

2005-03-14 Thread Pekka Savola
On Mon, 14 Mar 2005, Keith Moore wrote:
Whenever I see a presentation about the editorial progress of some draft, I 
find myself wondering - does _anybody_ here need to be watching this?  If 
someone has typed in this summary in PPT, couldn't it as easily be posted to 
the WG mailing list, or placed in the appendix of the I-D?

Face to face time seems better used for interaction.

From the top of my head, there are at least three kinds of 
presentations I see frequently at the IETFs:
 a) about 5 slides (or less) of background for the work, some major 
points, and maybe what has changed, on the last slide soliciting for 
input on certain specific topics,

 b) presentations where the document editor goes through all the open 
issues in the document (typically sent to the list beforehand, but no 
comments there), trying to use face-to-face time for discussion and 
gaining consensus on these items

 c) longer presentations which often result in focus getting lost.
Do you see other kinds?  Do you feel (at least) a) and b) are good use 
of our time?

In any case, what I've seen in a dozen or two IETF presentations I 
made during the last year or so that people don't usually jump up and 
start discussing, unless you have a contentious topic or phrase the 
questions really well (in a contentiuous manner)?  Or maybe it's just 
my bad presentations..

Maybe the audience is also not what it once used to be.. :)
--
Pekka Savola You each name yourselves king, yet the
Netcore Oykingdom bleeds.
Systems. Networks. Security. -- George R.R. Martin: A Clash of Kings
___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: What? No PPT or wireless? [Re: IETF63 wireless]

2005-03-14 Thread Bill Sommerfeld
On Mon, 2005-03-14 at 06:26, Bruce Campbell wrote:
 The IETF Meeting crew should look at supplying an additional 3 ethernet
 and power drops per room, labelled 'chair', 'presenter' and '(jabber)
 scribe' with the expectation that they be used accordingly.  

Power was most assuredly not a problem at this IETF; the seating areas were 
amply provisioned.  And since I've been a WG chair, with perhaps one exception,
power at the chair's table has pretty much always been available.

But, yes, two or three network drops at the front of the room would help in the 
event that the wireless network melts down.

- Bill







___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: What? No PPT or wireless? [Re: IETF63 wireless]

2005-03-14 Thread Keith Moore
 From the top of my head, there are at least three kinds of 
 presentations I see frequently at the IETFs:
 
   a) about 5 slides (or less) of background for the work, some major 
 points, and maybe what has changed, on the last slide soliciting for 
 input on certain specific topics,
 
   b) presentations where the document editor goes through all the open
   
 issues in the document (typically sent to the list beforehand, but no 
 comments there), trying to use face-to-face time for discussion and 
 gaining consensus on these items
 
   c) longer presentations which often result in focus getting lost.
 
 Do you see other kinds?  Do you feel (at least) a) and b) are good use
 of our time?

I see a lot of those in category c), fewer in categories a) and b).
I do feel that a) and b) are reasonable ways to use meeting time.
 
 In any case, what I've seen in a dozen or two IETF presentations I 
 made during the last year or so that people don't usually jump up and 
 start discussing, unless you have a contentious topic or phrase the 
 questions really well (in a contentiuous manner)?  Or maybe it's just 
 my bad presentations..

There's something about the medium.  Not just the use of PPT, but the
setting ... a room with theater seating and the projection screen the 
most prominent feature.  There is always something on the screen 
even if the information content is low.  Some low-level noise from 
air conditioning or whatever.  It all seems to encourage people to sit 
down, shut up, and watch the screen rather than to engage in dialogue.  

When the speaker speaks for more than a few minutes without any 
interaction with other attendees, that reinforces the one-way nature
of the meeting.

The need for those on the floor to use a microphone (not just in 
large rooms and multicast rooms now, but in _every_ room) further
discourages interaction. (aren't there microphones these days that can
pick up what is being said without being held next to the speaker's
mouth?)


___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: FW: Why?

2005-03-14 Thread Jonathan Rosenberg
inline.
Tony Hain wrote:
Joel M. Halpern wrote:
This discussion seems to take as a premise the view that if we define
applications only on IPv6, even though they could be defined on IPv4, that
this will give people a reason to use IPv6.
It also seems to take as a premise that if we don't define ways to work
around NATs, people won't use the applications with NATs.

I suffer from no such disillusions as those are not the premise for the
initial note, though without having the background in the original note it
is easy to see why someone might come to that conclusion. 

My assumption is that the market will not ignore the opportunity to develop
NAT traversal technologies. That does not equate to a need for the IETF to
waste valuable resources standardizing hacks that attempt to mask previous
hacks. In particular the IAB needs to be looking forward and helping the
application community understand that there are approaches today that allow
them to ignore the nonsense that has grown in the network by using IPv6
tunneling as a NAT traversal tool. This approach completely avoids the need
for complex and error prone ALGs.
I agree that ALGs are not the answer, and I believe the reasons for that 
are treated in:

http://www.ietf.org/internet-drafts/draft-iab-nat-traversal-considerations-00.txt
As I mentioned during the plenary, the document above makes a case that 
the right answer in many situations are vpn-ish technologies that 
include v6 tunnels. However, different applications have different 
needs, and there are real differences between the various vpn-ish 
solutions (TURN, STUN, teredo, etc.) that are driving their development 
and adoption. For VoIP, where the nat traversal issue has been 
especially painful, the increase in voice latency, packet loss, and 
substantial cost increase of relaying traffic through the tunnel 
servers, has driven people to solutions like STUN. Thus, I cannot agree 
that there only needs to be a single solution here.

That said, I agree that the IAB nat traversal consideration document 
lacks adequate consideration of how evolution plays into this, and I'll 
endeavor to improve the document on that front.

Another concern I have is that, in an IPv6-only world, even if you 
eliminate NAT, there will still be firewalls, and those firewalls will 
frequently have the property that they block traffic coming from the 
outside to a particular IP/port on the inside unless an outbound packet 
has been generated from the inside from that IP/port. This means that IP 
addresses are not globally reachable. You'd still need most of the same 
solutions we have on the table today to deal with this problem. Indeed, 
in the VoIP space, I believe you'd need pretty much everything, 
excepting you'd be able to remove a single attribute from a few of the 
protocols (STUN and TURN in particular), which tell the endpoint its 
address on the other side of the NAT. The endpoint knows its address, 
but all of the protocol machinery is still needed to rendezvous with the 
other participant in the call.

-Jonathan R.
--
Jonathan D. Rosenberg, Ph.D.   600 Lanidex Plaza
Director, Service Provider VoIP Architecture   Parsippany, NJ 07054-2711
Cisco Systems
[EMAIL PROTECTED]  FAX:   (973) 952-5050
http://www.jdrosen.net PHONE: (973) 952-5000
http://www.cisco.com
___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: What? No PPT or wireless? [Re: IETF63 wireless]

2005-03-14 Thread Jari Arkko
Melinda Shore wrote:
However, while slides do tend to lead to a presentation-type
meeting format, I think there are other factors substantially
contributing to that, as well.
Yes. Another factor is the ratio of work items to meeting time.
If there are 5-6 or even more items per a two-hour slot there
isn't really that much time left for each one... and there's some
constant overhead in every presentation to bring in the context.
Chairs taking care of all status things in their document status
report, minimizing unnecessary non-controversial things in
presentations, etc. help this of course. Interim meetings, private
meetings within a draft author group, etc. can help to increase
the amount of available discussion time. So does cutting unneccessary
work items, but that can be hard in a large group that is developing
widely used technology with a lot of demand for new functions.
And Pekka Savola wrote:
 a) about 5 slides (or less) of background for the work, some major 
points, and maybe what has changed, on the last slide soliciting for 
input on certain specific topics,

 b) presentations where the document editor goes through all the open 
issues in the document (typically sent to the list beforehand, but no 
comments there), trying to use face-to-face time for discussion and 
gaining consensus on these items
These are good use of meeting time. Note that type b) presentations range
from listing minor issues to major architectural questions.
 c) longer presentations which often result in focus getting lost.
I did not quite see what the difference between c) and others were, except
that c) was longer and the focus got lost.  I'm not sure longer is 
necessarily
bad, particularly if the issues in question are central to the WG.

In my experience the main indicators of successful discussion are that it
(1) there's some controversy or problem left so that it makes sense to
have a presentation about it, and (2) the presenter and other participants
have done enough preparation so that they have a reasonable chance of
making progress on the issue.
In any case, what I've seen in a dozen or two IETF presentations I 
made during the last year or so that people don't usually jump up and 
start discussing, unless you have a contentious topic or phrase the 
questions really well (in a contentiuous manner)?  Or maybe it's just 
my bad presentations.. 
I have sensed this too. Not sure why.
--Jari
___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re:Why?

2005-03-14 Thread JORDI PALET MARTINEZ
Regarding the firewalls and IPv6, I agree with your comment, but also there
are some other reasons why that's bad, see:

draft-vives-v6ops-ipv6-security-ps-03.txt
and
draft-palet-v6ops-ipv6security-02.txt

Regards,
Jordi




 De: Jonathan Rosenberg [EMAIL PROTECTED]
 Responder a: [EMAIL PROTECTED]
 Fecha: Mon, 14 Mar 2005 10:34:51 -0500
 Para: Tony Hain [EMAIL PROTECTED]
 CC: ietf@ietf.org ietf@ietf.org
 Asunto: Re: FW: Why?
 
 inline.
 
 Tony Hain wrote:
 
 Joel M. Halpern wrote:
 
 This discussion seems to take as a premise the view that if we define
 applications only on IPv6, even though they could be defined on IPv4, that
 this will give people a reason to use IPv6.
 It also seems to take as a premise that if we don't define ways to work
 around NATs, people won't use the applications with NATs.
 
 
 I suffer from no such disillusions as those are not the premise for the
 initial note, though without having the background in the original note it
 is easy to see why someone might come to that conclusion.
 
 My assumption is that the market will not ignore the opportunity to develop
 NAT traversal technologies. That does not equate to a need for the IETF to
 waste valuable resources standardizing hacks that attempt to mask previous
 hacks. In particular the IAB needs to be looking forward and helping the
 application community understand that there are approaches today that allow
 them to ignore the nonsense that has grown in the network by using IPv6
 tunneling as a NAT traversal tool. This approach completely avoids the need
 for complex and error prone ALGs.
 
 I agree that ALGs are not the answer, and I believe the reasons for that
 are treated in:
 
 http://www.ietf.org/internet-drafts/draft-iab-nat-traversal-considerations-00.
 txt
 
 As I mentioned during the plenary, the document above makes a case that
 the right answer in many situations are vpn-ish technologies that
 include v6 tunnels. However, different applications have different
 needs, and there are real differences between the various vpn-ish
 solutions (TURN, STUN, teredo, etc.) that are driving their development
 and adoption. For VoIP, where the nat traversal issue has been
 especially painful, the increase in voice latency, packet loss, and
 substantial cost increase of relaying traffic through the tunnel
 servers, has driven people to solutions like STUN. Thus, I cannot agree
 that there only needs to be a single solution here.
 
 That said, I agree that the IAB nat traversal consideration document
 lacks adequate consideration of how evolution plays into this, and I'll
 endeavor to improve the document on that front.
 
 Another concern I have is that, in an IPv6-only world, even if you
 eliminate NAT, there will still be firewalls, and those firewalls will
 frequently have the property that they block traffic coming from the
 outside to a particular IP/port on the inside unless an outbound packet
 has been generated from the inside from that IP/port. This means that IP
 addresses are not globally reachable. You'd still need most of the same
 solutions we have on the table today to deal with this problem. Indeed,
 in the VoIP space, I believe you'd need pretty much everything,
 excepting you'd be able to remove a single attribute from a few of the
 protocols (STUN and TURN in particular), which tell the endpoint its
 address on the other side of the NAT. The endpoint knows its address,
 but all of the protocol machinery is still needed to rendezvous with the
 other participant in the call.
 
 
 -Jonathan R.
 -- 
 Jonathan D. Rosenberg, Ph.D.   600 Lanidex Plaza
 Director, Service Provider VoIP Architecture   Parsippany, NJ 07054-2711
 Cisco Systems
 [EMAIL PROTECTED]  FAX:   (973) 952-5050
 http://www.jdrosen.net PHONE: (973) 952-5000
 http://www.cisco.com
 
 ___
 Ietf mailing list
 Ietf@ietf.org
 https://www1.ietf.org/mailman/listinfo/ietf




___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: RFC - 2229 / Dictionary Server Protocol

2005-03-14 Thread Gaurav Vaish
Wooaah!

   Great to see your mail, Rik.

 [EMAIL PROTECTED] mailing list.  This is the mailing list for the

   Another great to see.

 I wasn't able to find mail from you dated prior to yesterday (maybe the
 spam filters got it).

   Yikes. And there's something to hate the spam filters. ;-)

 composed of characters from the UCS character set [ISO10644] using the

   It seems I missed this point. It means, I have to implement one thing less.

 RFC 2229 also explains how to add experimental extensions to the

   I'm not sure what you mean by experimental extensions. They are
extensions -- I'll forward my original mail to you once again. But I
don't want to take them as experimental but want to take them
forward to production.

 [EMAIL PROTECTED], then you'll probably get a lot of feedback regarding

   Thanks. I will start a discussion on the mailing list.


-- 
Cheers,
Gaurav Vaish
http://www.mastergaurav.org
http://mastergaurav.blogspot.com


___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


for your amusement

2005-03-14 Thread Lucy E. Lynch
follow on to the Boeing presentation at the IAB Plenary:
http://www.vrvs.org/Announcements/Plane/VRVS_in_the_air.html

Lucy E. Lynch   Academic User Services
Computing CenterUniversity of Oregon
llynch  @darkwing.uoregon.edu   (541) 346-1774

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: idea for spam protection

2005-03-14 Thread Dave Singer
At 9:22 AM -0500 3/13/05, Bruce Lilly wrote:
   Date: 2005-03-12 11:18
  From: Bill Sommerfeld [EMAIL PROTECTED]

 where's that Final Ultimate Solution to the Spam Problem scorecard?
You're probably thinking of
http://www.rhyolite.com/anti-spam/you-might-be.html
great list.  but just because there is no final ultimate technical 
solution, doesn't mean that (a) governmental/legal solutions are 
viable or (b) that nothing can be done to ameliorate the situation.

the list conspicuously doesn't mention understanding the spam 
industry and particularly its money-flow.  this is kinda like trying 
to eradicate a disease without really understanding its biology or 
food-sources;  you might succeed, but it's probably more luck than 
science.  we 'merely' have to tip the tables so that spam is mostly 
unprofitable, after all (presuming that spammers are not in it for 
altruism).
--
David Singer
Apple Computer/QuickTime

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: What? No PPT or wireless? [Re: IETF63 wireless]

2005-03-14 Thread ned . freed
 if we could get rid of wireless and powerpoint, we'd be much better
 off.

 Personal opinion: disagree. Wireless is immensely useful to grab a
 document, check something on another SDO's web site, and - yes - for
 instant messaging (e.g. we need you in here right now). And some
 people simply have to multitask in order to be able to attend IETF
 meetings in the first place. The jabber scribing has become very
 important for remote participants - this time we even had one Area
 Director who was partcipating actively by jabber (and audio
 streaming). The wireless glitches that interrupted jabber were a real
 problem this time.

yes, yes, and yes.  but in many meetings it's hard to escape the
impression that most of the people in the room aren't really paying
more than say 10% of their attention to the meeting.
I completely agree with this assessment, having made it and gotten angry 
about
it myself. However, I recall reaching this conclusion at the first IETF I
attended - St. Louis, circa 1990. Recall the state of laptops at the time -
wireless connectivity didn't enter into it.
The reality is that a fair number of the people who attend our meetings do not
participate in any meaningful way. It was true 15 years ago and it is true now.
The distaction of choice may have changed, but that's about it. And IMO
the benefits of wireless connectivity to thhose who do participate are
well worth it.
maybe this is age setting in,
but it seems to me we used to get a lot more work done when we used our
meetings primarily for discussion rather than scheduling presentations
for most or all of the meeting time.   these days some IETF WG meetings
remind me of Apple's 1984 commercial...except that there's nobody to
throw a hammer through the screen.
The only significant change I've noticed over time is that since the 
dot-bust
we no longer seem to attact nearly as many lookee loos. For a while there you
had a room where the majority of the overly large audience clearly didn't have
a clue what was being discussed, irrespective of whether or not they were
actually paying attention to what's going on.
The past two meetings I've been to (San Diego and Minneapolis) have to some
extent gotten us back to the way things used to be. But excluding the tourists
of the recent past I don't see any significant change in the amount of
attention people are paying to things.
one benefit of our somewhat reduced attendance should be that we can
get more work done by reverting to a more effective meeting style.  (or
maybe our reduced attendance can be attributed to a widespread
realization that we're not getting much work done in these meetings?)
There was a big change in the overall tone of the meeting this time. But it 
had
to do with the audio streaming and the need for everyone to use a microphone.
This plus the absence of microphones on stands created a flow control problem
we're unaccustomed to.
There were quite a few occasions where I noticed someone start to say
something, consider the microphone issue, and simply give up. Of course it is
impossible to know whether any of the comments they might otherwise have made
would actually have been useful, but the fact remains it has changed the scope
of participation materially.
Someone in another message suggested that better microphone technology is the
answer. Speaking as a someone with a fair amount of experience in this area,
there are effective solutions (for the smaller rooms at least) but they tend to
be expensive. Less expensive solutions are possible, but they tend to require
manual adjustment.
The ability for people to participate remotely was incredibly useful, however,
and it isn't something I would want to lose. I would therefore suggest that:
(1) We continue to stream all the sessions.
(2) One or two (depending on the room size) microphone stands be added to
   the standard setup. This should avoid wasting time fumbling for
   the wireless mic.
(3) We experiment with micing the entire room in one or two of the smaller
   meeting rooms the next time around.
Ned
___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: for your amusement

2005-03-14 Thread Carsten Bormann
Lucy,
congratulations, but First intercontinental videoconference from the 
air; hmm.
Some of us have done this before (using iChat, no less).

Gruesse, Carsten
___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: IETF63 wireless

2005-03-14 Thread Joel Jaeggli
On Sun, 13 Mar 2005, Dave Crocker wrote:
This is about a mindset and an organizational approach that does not 
leave those volunteers out on a limb with fragile equipment, or 
insufficient resources. It is about our approaching this as a utility 
service and ensuring that that is what is delivered.
So, how much are you(ietf attendees in general) willing to pay over and 
above the current cost of the meeting fee for the wireless service you 
want?

Every time.

  In case it isn't clear, I think Dave and I are in violent agreement.
yup.
 d/
 ---
 Dave Crocker
 Brandenburg InternetWorking
 +1.408.246.8253
 dcrocker  a t ...
 WE'VE MOVED to:  www.bbiw.net
___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf
--
-- 
Joel Jaeggli  	   Unix Consulting 	   [EMAIL PROTECTED] 
GPG Key Fingerprint: 5C6E 0104 BAF0 40B0 5BD3 C38B F000 35AB B67F 56B2
___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: IETF63 wireless

2005-03-14 Thread Geoff Huston
I believe that the concept that meeting registration fees must cover all 
IETF suport costs is, a best,  an historical statement (and not even 
correct in that context). With the changes with the IASA activity I believe 
we have the opportunity to get this right, rather than muddling around 
attempting to do something on the cheap every time that works sometimes and 
clearly does not work other times (such as last week). The IETF should 
state clearly what it needs to get its work done. Yes, its likely that ISOC 
will need to contribute more than it has done so historically to meet this 
objective of supporting financially what is required by the IETF to get the 
work done. But that's what ISOC has already done when it stood up and said 
we are prepared to support the IETF to get its work done.

So perhaps the real question is what is required to be able to set up a 
reliable and working network 3 times a year that meets the connectivity 
needs of IETF attendees, and work onward from there, rather than a 
somewhat orthogonal discussion about breakfast menus!

regards,
  Geoff

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: for your amusement

2005-03-14 Thread Marshall Eubanks
On Mon, 14 Mar 2005 09:22:53 -0800 (PST)
 Lucy E. Lynch [EMAIL PROTECTED] wrote:
 follow on to the Boeing presentation at the IAB Plenary:
 http://www.vrvs.org/Announcements/Plane/VRVS_in_the_air.html
 
 Lucy E. Lynch Academic User Services
 Computing Center  University of Oregon
 llynch  @darkwing.uoregon.edu (541) 346-1774
 
 ___
 Ietf mailing list
 Ietf@ietf.org
 https://www1.ietf.org/mailman/listinfo/ietf

Apple did this a while ago - note that they didn't claim priority :

from June, 2004
http://www.apple.com/hotnews/articles/2004/06/ichat_at_35k/

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: IETF63 wireless

2005-03-14 Thread Dave Crocker
 On Mon, 14 Mar 2005 09:54:35 -0800 (PST), Joel Jaeggli wrote:
  So, how much are you(ietf attendees in general) willing to pay over and
  above the current cost of the meeting fee for the wireless service you
  want?

it would, in fact, be really nice to be presented with a concrete proposal, for 
assured service, that carried a firm price.

by rights, however, this should divide at least between captial costs, 
management costs, and staff costs.  The reason is that the first is amortized 
over some number of years, the second probably is real, hard money for hiring 
professionals, and i bet the last is dandy to use volunteers for.


  d/
  ---
  Dave Crocker
  Brandenburg InternetWorking
  +1.408.246.8253
  dcrocker  a t ...
  WE'VE MOVED to:  www.bbiw.net


___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: for your amusement

2005-03-14 Thread Alexandru Petrescu
Carsten Bormann wrote:
Lucy,
congratulations, but First intercontinental videoconference from the
 air; hmm. Some of us have done this before (using iChat, no less).
Well, I've read my emails at 9.6kbps 2-3 years ago, even replied to
some, while above Atlantic.  I must not have been the first doing this
either...
What is the advertised bandwidth of the link between aircraft and the
rest?  Is it like 2Mbps?
Alex


signature.asc
Description: OpenPGP digital signature
___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: IETF63 wireless

2005-03-14 Thread Aaron Falk
Bill Sommerfeld wrote:
 
 Stateful DHCP lease tracking was clearly causing more trouble than
 it's worth to the IETF network.

Ya' know, I'd be happy if I received a static IP address with my
meeting registration confirmation.  I'd even be happy to supply my
wireless MAC address...

--aaron 

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: What? No PPT or wireless? [Re: IETF63 wireless]

2005-03-14 Thread Aaron Falk
Carsten Bormann wrote:

 (The best WG meeting I ever attended was one where Tony Li hammered
 out most of the IP-over-firewire details in one session by asking
 the attending firewire experts all the right questions in one
 sitting.  I'm still wowed for life.  But you can't do this for
 something as complex as VPLS.)
 

Carsten-

You've given an example for something that I've been wanting to
articulate.  WG chairs have *lot* of influence over how productive a
meeting is.  It takes thought and preparation to decide what the best
use of the wg time should be.  I've seen a tendency for wgchairs to
make agendas = list of drafts in development.  A better practice would
be to start the hard questions that need to be discussed (to take
advantage of the face time) and back into background reading from
there.  

I think the emphasis on tourists, surfing, and powerpoint is a red
herring.

--aaron

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: FW: Why?

2005-03-14 Thread JFC (Jefsey) Morfin
On 10:46 14/03/2005, Tom Petch said:
 As you know, the value of a network is roughly proportional to
 the square of the participants.
The value of a network can depend on what is on it, not how many or who.  One
useful (http/ftp/...) server can make a network worth accessing, worth paying
for.  Even if there was noone else on this Internet, even if I never wanted to
e-mail anyone or anything, there are servers worth paying to access.
Tom,
The formula I use is value = Sigma (users) Sigma (externets) (n.log(n) - 
µ.n**2) where externets are the links between the members of a class (IN, 
CHAOS in the Internet) and the group of hosts accessible to a class (partly 
supported in the Internet through views). It can be reduced to value = 
n.log(n)-µ.n**2.

Steve Crocker documented a good mathematical analysis of the n.log(n) part, 
simple thinking makes obvious (see below) and reality proves for 30 years. 
However, the µ.n**2 correction is the key element to understand a real 
network evolution, and to accompany its development. This because a network 
permits access to a decreasing number of pertinent value added 
peoples/information (when you got a good answer you have less better 
answers available - this is a logarithmic degression) while there are as 
many people hiding them than others - the Metcalf law applies, negatively. 
Reeds' law (2**n) is a theoretical formula for the Angels - you need 
everyone to be of interest and eternity to fully take advantage from it: 
when you consider we are in a polylogue area (to speak to many though many) 
it becomes the big bang formula.

µ is the noise/confusion/pertinence hiding factor. when µ = log (n) / n 
we reach the state where the is no more value for the users and the 
externet interest decreases. Managing a network is reducing the relative 
value of the µ factor. But this becomes more difficult as n grows.

I saw the Internet explode in the 1990s because of web servers, not 
because n**2 people could now talk to each other, so I think this a 
general point..
Yes. The web externet grown. But users understood it as an example of what 
the Internet made possible. Realizing it, was just a commercial dazibao 
they partly lost interest (no real decrease the µ factor) while their 
number in increasing reduced the value, hence the blunt decrease in the 
Internet value. New applications and stabilization reduced µ, but spam now 
is increasing the µ factor to a critical level.

The solution is to find new externets to reboost the network. 
Multilingualism may provide 7260 of them. National risk containment and 
intelligence protection permit to motivate people for 192 of them. 
Proximity networks for cities, probably 10.000 of them or more. SNHN (small 
network, small networks) permits to consider billions of externets. Each of 
them with a higher local  value, because of a smaller number of users and 
probably of a lower µ factor (better adequation). Unfortunately, languages 
are not quoted by IAB RFC 3869, the RFC 3066 issue and IDNs do not help 
multilingualims based development, the global vision and the disinterest in 
WGIG do not help nation/local interest support by IETF, lack of market 
feed-backs in the Internet standard process leaves SNHN without real support.

The need is for a generalized IPv6 support (and IP permanent ISP 
independent number for every man/woman/kid, organization and service, and 
for all their endbox interfaces, sites, applications) through a transition 
from the current NRO IPv4/IPv6 deployment, to a worldwide salability.

By contrast, IPv6, like 3G mobile, has nothing worth getting access to; 
they are just bits of technology with no applications worth accessing.
Oh! yes, there is one: you and me. A stable global network opens the world 
to the world. The IPv6 IPv4 extension has no problem in supporting it if 
adequately  supported.

Have a look at models of the adoption of technology.
Here is where is the problem. IETF - and it is its job - looks for new 
services, technologies, management rules and procedures to accompany the 
convergence of IPv4 into a fully deployed IPv6 (but its job is not that 
deployment). The problem is that the current routing oriented allocation 
system is an initial deployment approach. We need now a stabilized fully 
scalable management directory based allocation approach. But this will not 
be carried in one day: we need a transition between them two.

This is why a support coopetition rather than a competition between NRO 
(RIRs) and a meant to everyone intergoverned new IP allocation system, to 
foster cost decrease, better quality and innovation. Obviously ICANN failed 
seeing that. I hope the WSIS will come with a solution by the end of the 
year. But again, this has nothing to do with IPv6, it has to do in reducing 
the real digital divide which is between those who have a permanent ISP 
independent IP address and those who have not.

jfc
___
Ietf mailing list

Re: RFC - 2229 / Dictionary Server Protocol

2005-03-14 Thread Gaurav Vaish
 probably be to contact the appropriate IETF Area Directors
 for guidance and for the names of other people who might be

Thanks, Brian for the pointer.
However, since I first visited the URL yesterday, I am confused as to
which one to join. The closest that I could think of is ediint. Is
that a correct deduction?

I would directly get in touch with Ted / Scott, as you suggest.

-- 
Cheers,
Gaurav Vaish
http://www.mastergaurav.org
http://mastergaurav.blogspot.com


___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: Why?

2005-03-14 Thread Noel Chiappa
 From: Keith Moore moore@cs.utk.edu

 yeah, it *is* easier to deploy first and then later make incremental
 modifications for scalability - if you like NAT.

 You do have to build upgrade paths into the architecture if you want it
 to last ... Making an architecture last is all about .. creating
 interfaces for the rest of the system that can be stable across drastic
 changes in technology.

But that's exactly what support of multiple addresses is - the key
architectural feature needed to make large-scale multi-homing work (within the
existing routing/entity-naming architecture, i.e. the one that IPv6 shares
with IPv4). I.e. it's the thing we need to have in the architecture to allow
the upgrade path you mention.


In thinking about this whole point of acceptance of the use of multiple
addresses, I came upon an interesting way to look at it all. It starts with
the supposition that it seems likely that one way people will do multi-homing
is to use a NAT box, and thereby restrict the knowledge of the multiple
different addresses (i.e. location-dependent routing-names) to the border
of their system.

However, another way to look at this is to say that what they really want is
to configure their machines with only one identifier, one which is (mostly)
location-indepedent, and therefore serves mostly to identify them. They are
quite happy to then have those machines depend on another device, at the edge
of their network, to provide the location-dependent routing-names for their
machines.

At an architectural level, this is obviously basically the same as saying
that one configures machines with identities, and the machines pick up their
routing-names from devices within their network, which provide this data.
(This was pretty much exactly Mo O'Dell's enhancement on Dave Clark's basic
8+8 idea.)

So why people were and are so resistant to doing the latter is a more than a
little puzzling to me, because they are clearly happy to do effectively
exactly the same thing when a NAT box is involved.

Noel

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: [e2e] Introduction to ATP

2005-03-14 Thread Jason Gao
Sorry, there isn't any paper on it yet. I think I should write a paper in a
few weeks.
Anyway, it is just a paper design with many open issues, such as quantitive
comparison with TCP, SCTP and so on.

--
: Lars Eggert [mailto:[EMAIL PROTECTED] 
: 2005314 19:55
: Jason Gao
: [EMAIL PROTECTED]; ietf@ietf.org
: Re: [e2e] Introduction to ATP

Jason Gao wrote:
 Here ATP stands for Asymmetric Transport Protocol (somewhat for 
 historical reason), not Appletalk Transaction Protocol.
 
 Welcome to http://atp.ebloggy.com/ to add comment.

Is there a paper on it? The web page and your email don't have details.

-- 
Lars Eggert NEC Network Laboratories



___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


RE: FW: Why?

2005-03-14 Thread Tony Hain
Jonathan Rosenberg wrote:
 ...
 I agree that ALGs are not the answer, and I believe the reasons for that
 are treated in:
 
 http://www.ietf.org/internet-drafts/draft-iab-nat-traversal-
 considerations-00.txt

I have a fundamental problem with an IAB document that implies NAT provides
a firewall. The artifact of lack of state is exploited to prevent inbound
connections, but that has nothing to do with a policy rich firewall, and
even less to do with anything resembling 'security'. 

As I said in an earlier post, the entire focus of this document is the wrong
direction for the IAB. It should be focused on simplifying application
operation, so there should be no NAT in the title. The IAB should be looking
at how applications can avoid worrying about the convolution in the network,
not focusing on how to navigate it.

It is also broken in that it focuses on Client/Server application models,
which are generally less of an issue for applications in a NAT environment.
Peer-to-peer applications have more trouble with mangled headers so the
second thing to do (after changing the title  focus) is to rework this so
that P2P issues are up front.

 
 As I mentioned during the plenary, the document above makes a case that
 the right answer in many situations are vpn-ish technologies that
 include v6 tunnels. However, different applications have different
 needs, and there are real differences between the various vpn-ish
 solutions (TURN, STUN, teredo, etc.) that are driving their development
 and adoption. For VoIP, where the nat traversal issue has been
 especially painful, the increase in voice latency, packet loss, and
 substantial cost increase of relaying traffic through the tunnel
 servers, has driven people to solutions like STUN. Thus, I cannot agree
 that there only needs to be a single solution here.

You appear to be too focused on the weeds to notice the path forward. Yes
many of the IPv6 transition technologies have the same issues as the NAT
traversal technologies in IPv4 (in many cases they do exactly the same thing
but with different encapsulated packets). That said if the applications
community doesn't get the point that they can leave all that crap behind
when native IPv6 is available to them then they will never move. If the
applications community doesn't do their part we will always be stuck with
the garbage in the network. 

 
 That said, I agree that the IAB nat traversal consideration document
 lacks adequate consideration of how evolution plays into this, and I'll
 endeavor to improve the document on that front.

I will try to send text, but I am buried for the next couple of months.

 
 Another concern I have is that, in an IPv6-only world, even if you
 eliminate NAT, there will still be firewalls, and those firewalls will
 frequently have the property that they block traffic coming from the
 outside to a particular IP/port on the inside unless an outbound packet
 has been generated from the inside from that IP/port. 

There is work going on outside the IETF to deal with this issue. There is no
point in wasting years arguing when progress can be made in the real world.

 This means that IP
 addresses are not globally reachable. You'd still need most of the same
 solutions we have on the table today to deal with this problem. 

Not necessarily. 

 Indeed,
 in the VoIP space, I believe you'd need pretty much everything,
 excepting you'd be able to remove a single attribute from a few of the
 protocols (STUN and TURN in particular), which tell the endpoint its
 address on the other side of the NAT. The endpoint knows its address,
 but all of the protocol machinery is still needed to rendezvous with the
 other participant in the call.
 
 
 -Jonathan R.
 --
 Jonathan D. Rosenberg, Ph.D.   600 Lanidex Plaza
 Director, Service Provider VoIP Architecture   Parsippany, NJ 07054-2711
 Cisco Systems
 [EMAIL PROTECTED]  FAX:   (973) 952-5050
 http://www.jdrosen.net PHONE: (973) 952-5000
 http://www.cisco.com


___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


RE: FW: Why?

2005-03-14 Thread Pyda Srisuresh

Hi Tony,

I have not been followign this thread at all. But, I did happen to look at this
e-mail and decided to respond. Please see my comments below. Thanks.

regards,
suresh

--- Tony Hain [EMAIL PROTECTED] wrote:
 Jonathan Rosenberg wrote:
  ...
  I agree that ALGs are not the answer, and I believe the reasons for that
  are treated in:
  
  http://www.ietf.org/internet-drafts/draft-iab-nat-traversal-
  considerations-00.txt
 
 I have a fundamental problem with an IAB document that implies NAT provides
 a firewall. The artifact of lack of state is exploited to prevent inbound

[suresh] Why is it a problem with what Jonathan said in the IAB document? It is
true that traditinal NATs do inherently provide a limited firewall
functionality. Jonathan did not say that NAT function implies full Firewall
functionality. 

Also, what exactly do you mean by the comment about lack of state being
exploited to prevent inbound connections? Many firewalls are stateful and so
are NATs. Who is exploiting lack of state in what?

 connections, but that has nothing to do with a policy rich firewall, and
 even less to do with anything resembling 'security'. 
 
[suresh] Agree with your comment about firewalls being policy rich. The comment
about security in the draft relates just to the filtering of inbound
connections. Given that, why is it OK to say that a firewall secures an
organization by not permitting inbound connections, but not OK to draw the same
conclusion about a NAT?

 As I said in an earlier post, the entire focus of this document is the wrong
 direction for the IAB. It should be focused on simplifying application
 operation, so there should be no NAT in the title. The IAB should be looking
 at how applications can avoid worrying about the convolution in the network,
 not focusing on how to navigate it.
 
[suresh] This sounds like some kind of an unwritten rule, or something. Why is
it wrong for the IAB to address real-life problems involving NATs? A tremendous
amount of work has been ongoing in the IETF lately concerning how applications
should traverse NATs. A new IPsec standard has emerged to deal with NAT
traversal. I think, it makes sense that the IAB recognizes that and makes a
statement about NAT traversal for the apps. That is not to say that application
designers should not design for the V6 networks.

 It is also broken in that it focuses on Client/Server application models,
 which are generally less of an issue for applications in a NAT environment.
 Peer-to-peer applications have more trouble with mangled headers so the
 second thing to do (after changing the title  focus) is to rework this so
 that P2P issues are up front.
 

[suresh] The focus is principaly on the P2P applications in the draft, from
what I can tell.

  
  As I mentioned during the plenary, the document above makes a case that
  the right answer in many situations are vpn-ish technologies that
  include v6 tunnels. However, different applications have different
  needs, and there are real differences between the various vpn-ish
  solutions (TURN, STUN, teredo, etc.) that are driving their development
  and adoption. For VoIP, where the nat traversal issue has been
  especially painful, the increase in voice latency, packet loss, and
  substantial cost increase of relaying traffic through the tunnel
  servers, has driven people to solutions like STUN. Thus, I cannot agree
  that there only needs to be a single solution here.
 
 You appear to be too focused on the weeds to notice the path forward. Yes
 many of the IPv6 transition technologies have the same issues as the NAT
 traversal technologies in IPv4 (in many cases they do exactly the same thing
 but with different encapsulated packets). That said if the applications
 community doesn't get the point that they can leave all that crap behind
 when native IPv6 is available to them then they will never move. If the
 applications community doesn't do their part we will always be stuck with
 the garbage in the network. 
 
[suresh] It sounds like you are suggesting that the IAB should advocate the
mantra that application desginers shoudl jettison the issue of NAT traversal
and simply write apps that work with v6 only. Why do you  believe the
application designers will heed that? Application desginers cannot afford to
ignore the current deployment. After all, they want their apps to be deployed. 


  
  That said, I agree that the IAB nat traversal consideration document
  lacks adequate consideration of how evolution plays into this, and I'll
  endeavor to improve the document on that front.
 
 I will try to send text, but I am buried for the next couple of months.
 
[suresh] That sounds good.

  
  Another concern I have is that, in an IPv6-only world, even if you
  eliminate NAT, there will still be firewalls, and those firewalls will
  frequently have the property that they block traffic coming from the
  outside to a particular IP/port on the inside unless an outbound packet
  has 

RE: Why?

2005-03-14 Thread Michel Py
 Noel Chiappa wrote:
 However, another way to look at this is to say that what
 they really want is to configure their machines with only
 one identifier, one which is (mostly) location-independent,
 and therefore serves mostly to identify them. They are
 quite happy to then have those machines depend on another
 device, at the edge of their network, to provide the
 location-dependent routing-names for their machines.

This is exactly what MHAP does, but there is a catch too: the complexity
reduction at the host level requires extra infrastructure and/or
complexity for the ID/LOC mapping that becomes a show-stopper and barely
offsets the benefits of the added simplicity at the host level. The
complexity issue is not eliminated, simply moved from one realm to the
other and this is not enough to cut it.

This is pretty much the issue with all solutions so far: in terms of
simplicity (or complexity) what the solution puts in one pocket it
steals from the other one and the overall complexity is not reduced.

Michel.


___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


RE: FW: Why?

2005-03-14 Thread Tony Hain
Pyda Srisuresh wrote:
 [suresh] Why is it a problem with what Jonathan said in the IAB document?
 It is
 true that traditinal NATs do inherently provide a limited firewall
 functionality. Jonathan did not say that NAT function implies full
 Firewall
 functionality.
 
 Also, what exactly do you mean by the comment about lack of state being
 exploited to prevent inbound connections? Many firewalls are stateful and
 so
 are NATs. Who is exploiting lack of state in what?

Lack of state is what is being marketed as a firewall function. As soon as
any node behind the nat establishes state there is no firewall for the
opened path. If addressing behind the nat changes while the state persists
the new node with the mapped address is unexpectedly exposed. 

 
  connections, but that has nothing to do with a policy rich firewall, and
  even less to do with anything resembling 'security'.
 
 [suresh] Agree with your comment about firewalls being policy rich. The
 comment
 about security in the draft relates just to the filtering of inbound
 connections. Given that, why is it OK to say that a firewall secures an
 organization by not permitting inbound connections, but not OK to draw the
 same
 conclusion about a NAT?

No, because a firewall may in fact permit inbound connections according to
policy. A nat may also be pre-mapped to a specific node to allow inbound
connections. It is wrong to imply that a nat is any kind of firewall or
security mechanism because it is neither. It is simply an impediment to
applications that under some circumstances allows utility.

 
 [suresh] This sounds like some kind of an unwritten rule, or something.
 Why is
 it wrong for the IAB to address real-life problems involving NATs? A
 tremendous
 amount of work has been ongoing in the IETF lately concerning how
 applications
 should traverse NATs. 

'A tremendous amount of work' is the fundamental point of my complaint. We
are wasting valuable resources patching a hack. It is marginally acceptable
for the IESG to deal with this, but the IAB should be looking forward and
charting the course, not focusing on the weeds. 

In any case there is no need for new standardization work involving nats,
they are a dead end, we know they are a dead end, yet because they present
intellectual challenges people want to focus on them. Get over it and move
on.


 A new IPsec standard has emerged to deal with NAT
 traversal. I think, it makes sense that the IAB recognizes that and makes
 a
 statement about NAT traversal for the apps. That is not to say that
 application
 designers should not design for the V6 networks.

And how much further would we all have been if the effort that was wasted on
that had been focused on simplifying the application environment by getting
rid of nat?

 
 ...
 [suresh] The focus is principaly on the P2P applications in the draft,
 from
 what I can tell.

I just browsed through it, but the entirety of section 2 lays out the model
and it is clearly client/server. Section 3 talks about the techniques for
nat traversal and 4 is deployment issues. So where is the P2P model? I will
have to spend more time on it, but it is not jumping out.

 
 
 [suresh] It sounds like you are suggesting that the IAB should advocate
 the
 mantra that application desginers shoudl jettison the issue of NAT
 traversal
 and simply write apps that work with v6 only. Why do you  believe the
 application designers will heed that? Application desginers cannot afford
 to
 ignore the current deployment. After all, they want their apps to be
 deployed.

Their apps will be easier to deploy and maintain by using the IPv6 tunneling
approaches to traverse nat. They don't need to wait, and for those that are
targeted at the Windows environment all they need to do is turn on the
existing IPv6 stack in XP as the app is installed. The whole point of
automated tunneling is to remove the ISPs from being deployment blockers.
Applications MUST work or else there is no 'demand' for ISPs to deploy the
service. NAT traversal for an IPv4 app is complex and requires a significant
amount of operational effort to maintain, so everyone is better off moving
to IPv6 because the transition technologies go away where the nat traversal
components only persist and get more complex. 

 
 ...
 [suresh] VOIP appls go through the same kind of paylod processing in
 firewalls
 as do NATs with ALG support for the application. In many implementations,
 firewall and NAT share the same ALG for protocol monitoring and
 application
 processing.

This will be interesting when the VoIP apps start encrypting end to end.
SRTP is just as opaque to those ALGs as IPsec, so either route will mean a
change to traditional firewalls and policies. 

Tony 



___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: RFC - 2229 / Dictionary Server Protocol

2005-03-14 Thread Gaurav Vaish
 Anybody can write an Internet-Draft (getting IETF community consensus
 is another matter).  In the case of a revision of a document created

Hi Bruce,

   Great exhaustive mail. Thanks a ton. And I know, now, that it's
going to be a little tedious job. I have forgotten troff -- not worked
on it for last 6yrs now, but remember some parameters. :-)

   After ID writing, you gave me another tough task - two independent
and fully interoperable implementation. Hooh!

  btw, can I have these two implementations - in two different
languages / platforms? ;-)


-- 
Cheers,
Gaurav Vaish
http://www.mastergaurav.org
http://mastergaurav.blogspot.com


___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Re: FW: Why?

2005-03-14 Thread Juergen Schoenwaelder
On Mon, Mar 14, 2005 at 04:09:18PM +0100, JFC (Jefsey) Morfin wrote:

 The solution is to find new externets to reboost the network. 

The Internet started as an overlay network over the telephony networks.
It has been tremendously successful for various reasons and it is now 
even seeking to replace the telephony networks. 

Nowadays, we see a bunch of overlay networks running over the Internet. 
These overlays are developing fast (much like the Internet many years 
ago) and they provide services end users seem to be interested in and 
which they are willing to deploy.

I think it is important to realize that the IETF's mission in the 
networking world has changed and much of the real innovative networking 
work appreciated by the end users is to a large extend happening outside 
of the IETF.

/js

-- 
Juergen Schoenwaelder   International University Bremen
http://www.eecs.iu-bremen.de/ P.O. Box 750 561, 28725 Bremen, Germany

___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


Protocol Action: 'Fibre Channel Management MIB' to Proposed Standard

2005-03-14 Thread The IESG
The IESG has approved the following document:

- 'Fibre Channel Management MIB '
   draft-ietf-ips-fcmgmt-mib-06.txt as a Proposed Standard

This document is the product of the IP Storage Working Group. 

The IESG contact persons are Allison Mankin and Jon Peterson.

Technical Summary
 
This document describes managed objects for information related to
Fibre Channel.  It also establishes an IANA registry for Fibre Channel
Port Types.
 
Working Group Summary
 
 This MIB is a complete re-start of the Fibre Channel MIB, independent
 of the one begun in the concluded IPFC WG.  During chartering of
 the IPS WG, experts on Fibre Channel, the chairs, the Fibre Channel
 IPS coordinators, OPS and Transport ADs, and others supported restarting
 this MIB in the new WG.
 
Protocol Quality
 
The document was reviewed by Mike MacFaden of the MIB Doctors, Bert Wijnen,
 and Allison Mankin for the IESG.   

Expert Reviewer Appointment by the IESG

The IESG appoints Roger Cummings, [EMAIL PROTECTED], 
for the Fibre Channel Port Types Expert Reviewer role defined in this
document.


___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf-announce


Document Action: 'Hypertext Transfer Protocol (HTTP) Digest Authentication Using Authentication and Key Agreement (AKA) Version-2' to Informational RFC

2005-03-14 Thread The IESG
The IESG has approved the following document:

- 'Hypertext Transfer Protocol (HTTP) Digest Authentication Using 
   Authentication and Key Agreement (AKA) Version-2 '
   draft-torvinen-http-digest-aka-v2-02.txt as an Informational RFC

This document has been reviewed in the IETF but is not the product of an
IETF Working Group. 

The IESG contact person is Allison Mankin.

RFC Editor Note

Abstract

OLD:

   
  HTTP Digest as specified in [4] is known to be vulnerable to
   man-in-the-middle attacks if the client fails to authenticate the
   server in TLS, or if the same passwords are used for authentication
   in some other context without TLS.  This is a general problem that
   exist not just with HTTP Digest but also with other IETF protocols
   that use tunneled authentication.  This document specifies version 2
   of the HTTP Digest AKA algorithm [6].  This algorithm can be
   implemented in a way that it is resistant to the man-in-the-middle
   attack.

NEW:

   HTTP Digest as specified in RFC 2617 is known to be vulnerable to
   man-in-the-middle attacks if the client fails to authenticate the
   server in TLS, or if the same passwords are used for authentication
   in some other context without TLS.  This is a general problem that
   exist not just with HTTP Digest but also with other IETF protocols
   that use tunneled authentication.  This document specifies version 2
   of the HTTP Digest AKA algorithm (RFC 3310).  This algorithm can be
   implemented in a way that it is resistant to the man-in-the-middle
   attack.


___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf-announce


Last Call: 'The Codecs Parameter for Bucket Media Types' to Proposed Standard

2005-03-14 Thread The IESG
The IESG has received a request from an individual submitter to consider the 
following document:

- 'The Codecs Parameter for Bucket Media Types '
   draft-gellens-mime-bucket-03.txt as a Proposed Standard

Although this document is a submission to the IETF from an individual
it received review in the AVT working group and the IETF-types
mailing list.

The IESG plans to make a decision in the next few weeks, and solicits
final comments on this action.  Please send any comments to the
iesg@ietf.org or ietf@ietf.org mailing lists by 2005-04-11.

The file can be obtained via
http://www.ietf.org/internet-drafts/draft-gellens-mime-bucket-03.txt


___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf-announce