Re: Another look at 6to4 (and other IPv6 transition issues)

2011-07-18 Thread Roger Jørgensen
On Sun, Jul 17, 2011 at 6:59 AM, Doug Barton do...@dougbarton.us wrote:
 On 07/16/2011 07:02, John C Klensin wrote:
 --On Friday, July 15, 2011 15:39 -0700 Doug Barton
 do...@dougbarton.us wrote:
snip
 But, while some people have argued that 6to4 has caused so much
 damage by being misconfigured that it should, presumably as
 punishment or to create a public example, be eliminated entirely
 as an option

 My perspective, which I've described at length many times now, is not
 that 6to4 needs to be punished, but that the widespread deployment of
 IPv6 is being harmed as a result of the negative user experience that it
 creates for the majority of its users (particularly the unintentional
 ones) and therefore the network as a whole is better off if it goes away.

That do sum it up pretty good.


snip
 Furthermore you have the huge problem that neither end of the 6to4
 equation has *any* motivation to fix it. The ISP side can simply block
 tunnels (or even simpler, ignore the problem). The content side can
 simply not deploy  records.

My wild guess is that the ISP will sooner or later stop routing the entire
2002::/16 block...  and _yes_ that will hurt bad but it will force a hard error
on the whole 6to4 issue. It's so much better with one hard error than lots
of possible errors.



snip
 But I don't recall seeing the sort of venom
 that is directed toward 6to4 being focused on them.  Perhaps
 there weren't enough complaints or you have solid data that 6to4
 has caused even more damage.

 Once again repeating myself ... I have no venom towards 6to4. This isn't
 a personal attack. And yes, various people and organizations that have
 vested interests in seeing IPv6 deployed have posted the data about why
 6to4 causes way more problems than it solves, and I believe them.

I dare to say the content providers want 6to4 gone because it _can_ be
pointed at as a risk when enabling IPv6.
And I do think the ISP see this as a quite black/white problem _if_ they
have to deal with it. Either 6to4 are on and working all the time without
them doing much, or it's gone.





And this will be my last post on the subject at all, see no point in using more
time on it. Lets move on :)



-- 

Roger Jorgensen           |
rog...@gmail.com          | - IPv6 is The Key!
http://www.jorgensen.no   | ro...@jorgensen.no
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Review of draft-yevstifeyev-ion-report-06

2011-07-18 Thread Harald Alvestrand

On 07/16/11 06:12, Mykyta Yevstifeyev wrote:

Hello Harald,

As you could see in one of my previous messages, I did intend to 
include some analysis in the draft 
(http://www.ietf.org/mail-archive/web/ietf/current/msg67491.html).  
However, numerous responses which discouraged me from doing this were 
received, and including that section will create problems with consensus. 
I saw the messages. It is very hard to write an analysis on behalf of 
someone else - to my mind, the analysis of why the IESG decided what 
they did has to be based on information from the IESG; it's impossible 
for any outsider, including you and me, to divine what their thought 
processes on this matter were.


There's no IETF consensus to be documented here; the analysis and 
decision was done by the IESG, and the IESG (as it was composed at that 
time) is the body from which the information has to come. All any 
outsider (like you and me) can do is to help with the editing.
However, I share your opinion that the document won't be full, so I 
think the following analysis section, which is different from the 
previous proposed one, can satisfy you and everybody else:
Now, if someone were to speak for the then-present IESG and say the same 
thing, I would make the following comments:



3.4. Analysis

   There were a number of reasons which forced IESG to close the IONs
   experiment. 
Nit: forced IESG - caused the IESG to decide. There's no forcing 
function.

One of them is a complexity of their approval and
   publication, compared with ones for IESG Statements and simple Web
   Pages.  As IONs were intended to represent operational experience,
   they might have needed to be updated quickly.  Even though these
   documents were meant to have a very lightweight approval procedure,
   it could sometimes be inappropriate for that material which was
   contained therein.
In a protocol, I'd ask for a definition of quickly. Days, weeks or 
months? Examples of documents where days is the correct timescale?


   Secondly, due to the nature of the scope of IONs, there was no need
   to allow the access to the revision history (which is unavailable in
   simple Web Pages as well).
I disagree with this statement, obviously. If the IESG thought so, it is 
correct to include it.


   Thirdly, IONs on procedural question could step into the conflict
   with Best Current Practice (BCP) RFCs; moreover, as IONs approval
   procedure did not imply any formal community review, unlike BCPs,
   they could easily fall in the community non-acceptance.
I believe this is a red herring. However, I can fully believe that the 
argument was raised, even though I don't believe it, so if the IESG 
indeed thought that, I'm fine with having that documented.


   Correspondingly, it was concluded that the mandate of IONs can fully
   be fulfilled by RFCs, when documenting IETF procedures, IESG
   Statements, when clearing up other issues for which RFC publication
   process is not appropriate, and Web Pages, when dealing with other
   IETF-related issues. 

Nit: it was concluded - the IESG concluded.

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Confidentiality notices on email messages

2011-07-18 Thread Harald Alvestrand

Content-disposition: noise.

On 07/16/11 09:15, Nathaniel Borenstein wrote:

Notice Of Intentions in Sending Email?

On Jul 16, 2011, at 1:09 AM, Murray S. Kucherawy wrote:


-Original Message-
From: ietf-boun...@ietf.org [mailto:ietf-boun...@ietf.org] On Behalf Of John C 
Klensin
Sent: Thursday, July 14, 2011 11:39 AM
To: Randall Gellens; Marc Petit-Huguenin
Cc: IETF discussion list
Subject: Re: Confidentiality notices on email messages

If one starts down that path, there is a real possibility for a
semantically-rich environment.  For example, consider a noise
type for flaming, repetitive, responses to a topic on the IETF
list.  One could also very efficiently reflect what I assume was
the intent of a recent observation on the list with
noise-type=hitler :-(

The trick though, alas, is to get people using such disclaimers to begin using 
such a media type.

Maybe we need an attractive acronym for NOISE as a decoy.
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf



___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Confidentiality notices on email messages

2011-07-18 Thread Wes Hardaker
 On Mon, 18 Jul 2011 14:41:35 +0200, Harald Alvestrand 
 har...@alvestrand.no said:

HA Content-disposition: noise.

Or: Content-disposition: delete
-- 
Wes Hardaker
SPARTA, Inc.
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Another look at 6to4 (and other IPv6 transition issues)

2011-07-18 Thread John C Klensin


--On Friday, July 15, 2011 15:39 -0700 Doug Barton
do...@dougbarton.us wrote:

 To address your concern about whether or not vendors are paying
 attention to this discussion, and why historic status is
 substantively different than off by default, no really, OFF
 BY DEFAULT, I'll put my FreeBSD developer hat on for a minute
 and tell you that we definitely do pay attention to stuff like
 this, and whereas we already have it off by default (and have
 for some time) moving it to historic gives us the cover we
 need to remove the code at some point down the road when that's
 appropriate. That's an extremely important distinction, and
 one of the reasons that as a member of v6ops I ultimately
 came down in support of the 2-document strategy.

Doug,

And that is exactly where we agree on the effect and disagree
about whether it is desirable.

I think there is consensus that 6to4 is dangerous unless
carefully and intelligently configured and that is certainly
should not be turned on by default.  If anyone has argued
against that position, they are in a tiny minority.  

Similarly, I think there is consensus that following the advice
in the advice document makes 6to4 much safer to use, even if
not entirely risk-free (I contend that there is no risk-free,
perhaps as a corollary to the principle that, if we invent
something idiot-proof, someone will invent a better idiot).  So
there should be no question about the desirability about
publishing the content of that document.  

The question, as far as the advice document is concerned, is
how to get the message out most effectively, most clearly, and
on as timely a basis as possible.  I think that having it
update the base 6to4 specs is important because that is how
the RFC Series is threaded.  Without that, there is an increased
risk of people finding the 6to4 specs and implementing them
without ever seeing the advice piece (just as, even with the
updates/updated by pointers, we still hear about new TCP
implementations based on RFC 793 alone).  For the reasons
discussed above, I don't think anyone would find that outcome
desirable.  As to whether there should be a single document or a
separate Applicability Statement that points to both the base
specifications and the advice document, I'm really pretty
agnostic even though I don't see many advantages in two
documents.   A separate Applicability Statement that does update
the base documents but points to the advice one would
accomplish much the same purpose and eliminate the requirement
that the advice document explicitly update the base ones.
While I think publishing a separate document just to avoid that
linkage would waste time, I'm actually pretty agnostic about
that option too.

But, while some people have argued that 6to4 has caused so much
damage by being misconfigured that it should, presumably as
punishment or to create a public example, be eliminated entirely
as an option -- for FreeBSD users, the exact effect of your
removing the code -- I haven't seen nearly as strong as case, or
anything even close to consensus, for that position.   If it was
actually what the community believed, then the advice document
would be a complete waste of time except possibly as a
retrospective on how 6to4 might have been better specified (a
retrospective that we would want to publish as (immediately)
Historic).

If the thing is still useful, even in limited circumstances and
used correctly, then the IETF should not provide you with
cover to remove the code because it is not in the best
interest of the community for you to remove the code.   Might
both your removing the code and moving 6to4 to Historic in the
future be appropriate?  Sure.  I also look forward to the day
when we can move IPv4 to Historic (just as the various
specifications that make up NCP should have been moved years ago
if we paid attention to that sort of housekeeping).

Summary: we should not move something to Historic that is still
in use, useful, and that can be used correctly.  We explain how
to use it or the circumstances under which is should or should
not be used, narrowing those descriptions as much as needed.
And/or we explain all of the situations in which it should not
be used.  Simply reclassifying it as Historic is problematic to
the use cases that actually do work and doesn't provide nearly
enough information as what people should actually do, especially
people who already have the protocol deployed in some form.
Using Historic, rather than, e.g., NOT RECOMMENDED [any more] as
a sort of super-deprecation mechanism depends too much on our
assumption that people with working deployments will simply
ignore us.  While the assumption is right, it puts the whole
situation into one in which the IETF is publicly operating on
the assumption that its advice won't be followed.   If we do
that very often, we might as well just go home.

FWIW, I note that there are at least a few other things that
shipped for years with FreeBSD that could cause a lot of 

Re: Confidentiality notices on email messages

2011-07-18 Thread Richard Kulawiec
On Thu, Jul 14, 2011 at 01:45:44AM -, John Levine wrote:
 It's clueless cargo cult lawyering.  

+1, and see also:

http://www.river.com/users/share/etiquette/#legalistic

which reads in part:

First, such boilerplate contains useless adhesions, meaning
the explicit and implied threats they make are particularly
annoying. If you send something via email, the recipients (are
you sure you aren't sending to a mailing list?) and anyone else
who sees your clear text postcard in transit can undetectably and
with full deniability do whatever they want with the information
written on it in plain view. Even casual users of email know
email is not a secure communications medium. Thus the threats in
typical bogus legalistic boilerplate are naught but an attempt
at highly improper intimidation. Demands made in this manner
will be regarded as evidence of a hostile attitude on your
part by a significant portion of recipients. The threats will
negatively affect how your recipients perceive the other ideas
in your message.

Second, in the case of mailing lists (are you sure the address
to which you sent isn't one?) or USENET posts, falsely claiming
a message is confidential and privileged is simply too stupid
for words.


---rsk
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Another look at 6to4 (and other IPv6 transition issues)

2011-07-18 Thread Keith Moore
On Jul 18, 2011, at 3:36 AM, Roger Jørgensen wrote:

 My wild guess is that the ISP will sooner or later stop routing the entire
 2002::/16 block...  and _yes_ that will hurt bad but it will force a hard 
 error
 on the whole 6to4 issue. It's so much better with one hard error than lots
 of possible errors.

Actually, no.  It will cause a significant increase in the number of service 
calls that will last for years.  And those will be the fault of the ISPs 
blocking the traffic.

It must be re-iterated that the vast majority of problems associated with 6to4 
appear to be caused by operators, not by 6to4 itself.  6to4 does have some real 
problems, and some of us are looking for ways to fix them.   But that's no 
excuse for operators to deliberately make things worse.

 I dare to say the content providers want 6to4 gone because it _can_ be
 pointed at as a risk when enabling IPv6.
 And I do think the ISP see this as a quite black/white problem _if_ they
 have to deal with it. Either 6to4 are on and working all the time without
 them doing much, or it's gone.

Part of the problem seems to be that operators want a quick solution that is 
under their control, when it appears that no such solution can exist.

- Changes to the default address selection rules, already implemented or being 
implemented, should help significantly, but it will take some time for hosts to 
get updated to reflect those changes.  (Asking Microsoft, Apple, and Linux 
vendors to include those changes in incremental updates - if they haven't 
already done so - might help speed that process along.)
- The changes in -advisory will help somewhat, but it will take time for 
operators and vendors to learn about them and implement them, and the effect 
will be gradual.
- The changes in -experimental will also help somewhat, if those changes are 
published in some form, but the effect will also be gradual.
- Improvements to the 6to4 protocol (especially where relay routers are 
concerned) might help, but again will require updates to hosts and/or routers.  
 (it's conceivable that fixes could be implemented in hosts that don't require 
the routers to be upgrade in order for those changes to be helpful)
- As I said yesterday, there are ways that content providers can use IPv6 to 
distribute content to their customers over HTTP, as well as monitor the 
percentage of their users that are IPv6 capable, though they're a tad trickier 
than simply adding  records to the DNS and turning on v6 in their servers.

All of the above can help.   However,

- Yelling 6to4 is Evil as loudly as possible, e.g. declaring it Historic and 
publishing -historic,
- Filtering protocol 41 packets,
- Blocking 2002::/16 traffic or routing advertisements, or
- Blocking 192.88.99.0/24 traffic or routing advertisements, 

will all make the situation worse for users, operators, and content providers. 

Keith

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Meeting Materials for IETF 81

2011-07-18 Thread Marc Petit-Huguenin
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Why, one week before the beginning of the IETF meeting, is the Meeting
Materials link not enabled on the web site?

There was a discussion on this very mailing-list few months ago (what is the
problem bis) that discussed about the productivity of WG sessions.  I do
believe that having the slides for the presentations posted ahead of time helps
participants to understand the problem and focus on questions and discussion
during the f2f, which makes for a better use of our time.  Obviously not
everybody agree with me, as it is common to see presentations uploaded few
minutes before the presentation and even in at least one case, few hours after!

- -- 
Marc Petit-Huguenin
Personal email: m...@petit-huguenin.org
Professional email: petit...@acm.org
Blog: http://blog.marc.petit-huguenin.org
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.11 (GNU/Linux)

iEYEARECAAYFAk4kTZYACgkQ9RoMZyVa61eGuACfZvEdmU+FcADkAcJ3TTOZF+xK
KjMAnRRcQw1cmTMyixr2PFPDqbfw0+aB
=J3+E
-END PGP SIGNATURE-
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Meeting Materials for IETF 81

2011-07-18 Thread Paul Hoffman
In the meantime: https://datatracker.ietf.org/meeting/81/materials.html

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Meeting Materials for IETF 81

2011-07-18 Thread Alexa Morris

The link is now live.

Alexa

On Jul 18, 2011, at 8:13 AM, Marc Petit-Huguenin wrote:


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Why, one week before the beginning of the IETF meeting, is the  
Meeting

Materials link not enabled on the web site?

There was a discussion on this very mailing-list few months ago  
(what is the
problem bis) that discussed about the productivity of WG sessions.   
I do
believe that having the slides for the presentations posted ahead of  
time helps
participants to understand the problem and focus on questions and  
discussion
during the f2f, which makes for a better use of our time.  Obviously  
not
everybody agree with me, as it is common to see presentations  
uploaded few
minutes before the presentation and even in at least one case, few  
hours after!


- --
Marc Petit-Huguenin
Personal email: m...@petit-huguenin.org
Professional email: petit...@acm.org
Blog: http://blog.marc.petit-huguenin.org
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.11 (GNU/Linux)

iEYEARECAAYFAk4kTZYACgkQ9RoMZyVa61eGuACfZvEdmU+FcADkAcJ3TTOZF+xK
KjMAnRRcQw1cmTMyixr2PFPDqbfw0+aB
=J3+E
-END PGP SIGNATURE-
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf



---
Alexa Morris / Executive Director / IETF
48377 Fremont Blvd., Suite 117, Fremont, CA  94538
Phone: +1.510.492.4089 / Fax: +1.510.492.4001
Email: amor...@amsl.com

Managed by Association Management Solutions (AMS)
Forum Management, Meeting and Event Planning
www.amsl.com http://www.amsl.com/

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


RE: Another look at 6to4 (and other IPv6 transition issues)

2011-07-18 Thread Noel Chiappa
 From: Ronald Bonica rbon...@juniper.net

 RFC 2026's very terse definition of HISTORIC. According to RFC 2026,
 A specification that has been superseded by a more recent
 specification or is for any other reason considered to be obsolete
 is assigned to the Historic level. That's the entire definition.
 Anything more is read into it.
 ...
 A more likely interpretation is as follows:
 the IETF is not likely to invest effort in the technology in the
   future
 the IETF does not encourage (or discourage) new deployments of this
   technology.

But in giving other interpretations, are you thereby not comitting the
exact error you call out above: Anything more is read into it.?

To me, Historic has always (including pre-2026) meant just what the
orginal meaning of the word is (caveat - see below) - something that is
now likely only of interest to people who are looking into the history of
networking. (The dictionary definition is Based on or concerned with
events in history.) I think obsolete is probably the best one-word
description (and note that 'obsolete' != 'obsolescent').

(Caveat: technically, it probably should have been 'historical', not
historic - historic actually means 'in the past, but very noteworthy',
e.g.  'CYCLADES was a historic networking design', so not every historical
protocol is historic.)

Noel
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Another look at 6to4 (and other IPv6 transition issues)

2011-07-18 Thread james woodyatt
On Jul 18, 2011, at 24:36 , Roger Jørgensen wrote:
 
 My wild guess is that the ISP will sooner or later stop routing the entire 
 2002::/16 block...

You mean, your wild guess is service providers will unilaterally implement the 
phase-out plan I proposed as a standards action.

Why not just sign up for a standard phase-out plan?  Don't we want 6to4 users 
to have any advanced notice that we plan to break their Internet?  Or, is the 
idea that we don't believe we can achieve a tactical victory over 6to4 users 
unless we mount a surprise attack on them?


--
james woodyatt j...@apple.com
member of technical staff, core os networking



___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Another look at 6to4 (and other IPv6 transition issues)

2011-07-18 Thread Keith Moore
On Jul 18, 2011, at 3:30 PM, james woodyatt wrote:

 On Jul 18, 2011, at 24:36 , Roger Jørgensen wrote:
 
 My wild guess is that the ISP will sooner or later stop routing the entire 
 2002::/16 block...
 
 You mean, your wild guess is service providers will unilaterally implement 
 the phase-out plan I proposed as a standards action.
 
 Why not just sign up for a standard phase-out plan?  Don't we want 6to4 users 
 to have any advanced notice that we plan to break their Internet?  Or, is the 
 idea that we don't believe we can achieve a tactical victory over 6to4 users 
 unless we mount a surprise attack on them?

I don't understand the desire for a phase out plan when there's nothing better 
to phase in that's generally available.

Preferring IPv4 to 6to4 makes sense. But filtering 6to4 traffic or its 
routing advertisements is a denial-of-service attack.

Keith

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


RE: Another look at 6to4 (and other IPv6 transition issues)

2011-07-18 Thread Ronald Bonica
Noel,

Given that each of us reads something different into the definition of 
HISTORIC, is there any hope that this thread will ever converge?

  Ron


 -Original Message-
 From: Noel Chiappa [mailto:j...@mercury.lcs.mit.edu]
 Sent: Monday, July 18, 2011 11:34 AM
 To: ietf@ietf.org
 Cc: j...@mercury.lcs.mit.edu; v6...@ietf.org
 Subject: RE: Another look at 6to4 (and other IPv6 transition issues)
 
  From: Ronald Bonica rbon...@juniper.net
 
  RFC 2026's very terse definition of HISTORIC. According to RFC
 2026,
  A specification that has been superseded by a more recent
  specification or is for any other reason considered to be
 obsolete
  is assigned to the Historic level. That's the entire definition.
  Anything more is read into it.
  ...
  A more likely interpretation is as follows:
  the IETF is not likely to invest effort in the technology in the
  future
  the IETF does not encourage (or discourage) new deployments of
 this
  technology.
 
 But in giving other interpretations, are you thereby not comitting the
 exact error you call out above: Anything more is read into it.?
 
 To me, Historic has always (including pre-2026) meant just what the
 orginal meaning of the word is (caveat - see below) - something that is
 now likely only of interest to people who are looking into the history
 of
 networking. (The dictionary definition is Based on or concerned with
 events in history.) I think obsolete is probably the best one-word
 description (and note that 'obsolete' != 'obsolescent').
 
 (Caveat: technically, it probably should have been 'historical', not
 historic - historic actually means 'in the past, but very
 noteworthy',
 e.g.  'CYCLADES was a historic networking design', so not every
 historical
 protocol is historic.)
 
   Noel
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: [v6ops] Another look at 6to4 (and other IPv6 transition issues)

2011-07-18 Thread Brian E Carpenter
On 2011-07-19 11:26, Erik Kline wrote:
 Given that each of us reads something different into the definition of 
 HISTORIC, is there any hope that this thread will ever converge?
 
 I don't see any progress.
 
 We may just have to blacklist any resolvers that have 6to4 clients
 behind them and leave it at that.

Why? How would that help anybody?

What would help is following the steps in the -advisory document.

(Discussing how many angels can dance on the head of an RFC certainly
won't help either. Could we all stop now please?)

   Brian
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Last Call: draft-ietf-tsvwg-rsvp-security-groupkeying-10.txt (Applicability of Keying Methods for RSVP Security) to Informational RFC

2011-07-18 Thread The IESG

The IESG has received a request from the Transport Area Working Group 
(tsvwg) to consider the following document:
- 'Applicability of Keying Methods for RSVP Security'
  draft-ietf-tsvwg-rsvp-security-groupkeying-10.txt as an Informational
RFC

The IESG plans to make a decision in the next few weeks, and solicits
final comments on this action. Please send substantive comments to the
i...@ietf.org mailing lists by 2011-08-01. Exceptionally, comments may be
sent to i...@ietf.org instead. In either case, please retain the
beginning of the Subject line to allow automated sorting.

Abstract


   The Resource reSerVation Protocol (RSVP) allows hop-by-hop integrity
   protection of RSVP neighbors.  This requires messages to be
   cryptographically protected using a shared secret between
   participating nodes.  This document compares group keying for RSVP
   with per neighbor or per interface keying, and discusses the
   associated key provisioning methods as well as applicability and
   limitations of these approaches.  The document also discusses
   applicability of encrypting RSVP messages.

The Responsible AD notes that the IPR declaration terms seem to apply to
standards-track documents, but not necessarily to an Informational document.

The file can be obtained via
http://datatracker.ietf.org/doc/draft-ietf-tsvwg-rsvp-security-groupkeying/

IESG discussion can be tracked via
http://datatracker.ietf.org/doc/draft-ietf-tsvwg-rsvp-security-groupkeying/


The following IPR Declarations may be related to this I-D:

   http://datatracker.ietf.org/ipr/988/



___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce


Second Last Call: draft-ietf-mpls-loss-delay-profile-03.txt (A Packet Loss and Delay Measurement Profile for MPLS-based Transport Networks) to Informational RFC

2011-07-18 Thread The IESG

The IESG has received a request from the Multiprotocol Label Switching WG
(mpls) to consider the following document:
- 'A Packet Loss and Delay Measurement Profile for MPLS-based Transport
Networks'
draft-ietf-mpls-tp-loss-delay-profile-03.txt as an Informational RFC

This is a second last call. The last call is only necessary because of a
late-received IPR disclosure.

The IESG plans to make a decision in the next few weeks, and solicits
final comments on this action. Please send substantive comments to the
i...@ietf.org mailing lists by 2011-08-01. Exceptionally, comments may be
sent to i...@ietf.org instead. In either case, please retain the
beginning of the Subject line to allow automated sorting.

Abstract

Procedures and protocol mechanisms to enable the efficient and
accurate measurement of packet loss, delay, and throughput in MPLS
networks are defined in RFC .

The MPLS Transport Profile (MPLS-TP) is the set of MPLS protocol
functions applicable to the construction and operation of packet-
switched transport networks.

This document describes a profile of the general MPLS loss, delay,
and throughput measurement techniques that suffices to meet the
specific requirements of MPLS-TP.

This document is a product of a joint Internet Engineering Task Force
(IETF) / International Telecommunication Union Telecommunication
Standardization Sector (ITU-T) effort to include an MPLS Transport
Profile within the IETF MPLS and Pseudowire Emulation Edge-to-Edge
(PWE3) architectures to support the capabilities and functionalities
of a packet transport network as defined by the ITU-T.

This Informational Internet-Draft is aimed at achieving IETF
Consensus before publication as an RFC and will be subject to an IETF
Last Call.

[RFC Editor, please remove this note before publication as an RFC and
insert the correct Streams Boilerplate to indicate that the published
RFC has IETF consensus.]

[RFC Editor, please replace  with the RFC number assigned to
draft-ietf-mpls-loss-delay.]


The file can be obtained via
http://datatracker.ietf.org/doc/draft-ietf-mpls-tp-loss-delay-profile/

IESG discussion can be tracked via
http://datatracker.ietf.org/doc/draft-ietf-mpls-tp-loss-delay-profile/


The following IPR Declarations may be related to this I-D:

http://datatracker.ietf.org/ipr/1583/


___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce


Third Last Call: draft-ietf-mpls-loss-delay-03.txt (Packet Loss and Delay Measurement for MPLS Networks) to Proposed Standard

2011-07-18 Thread The IESG
The IESG has received a request from the Multiprotocol Label Switching WG
(mpls) to consider the following document:
- 'Packet Loss and Delay Measurement for MPLS Networks'
draft-ietf-mpls-loss-delay-03.txt as a Proposed Standard

This is a third last call. The last call is only necessary because of a
further late-received IPR disclosure.

The IESG plans to make a decision in the next few weeks, and solicits
final comments on this action. Please send substantive comments to the
i...@ietf.org mailing lists by 2011-08-01. Exceptionally, comments may be
sent to i...@ietf.org instead. In either case, please retain the
beginning of the Subject line to allow automated sorting.

Abstract

Many service provider service level agreements (SLAs) depend on the
ability to measure and monitor performance metrics for packet loss
and one-way and two-way delay, as well as related metrics such as
delay variation and channel throughput. This measurement capability
also provides operators with greater visibility into the performance
characteristics of their networks, thereby facilitating planning,
troubleshooting, and evaluation. This document specifies protocol
mechanisms to enable the efficient and accurate measurement of these
performance metrics in MPLS networks.


The file can be obtained via
http://datatracker.ietf.org/doc/draft-ietf-mpls-loss-delay/

IESG discussion can be tracked via
http://datatracker.ietf.org/doc/draft-ietf-mpls-loss-delay/


The following IPR Declarations may be related to this I-D:

http://datatracker.ietf.org/ipr/1574/
http://datatracker.ietf.org/ipr/1584/
___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce


Last Call: draft-ietf-karp-threats-reqs-03.txt (The Threat Analysis and Requirements for Cryptographic Authentication of Routing Protocols' Transports) to Informational RFC

2011-07-18 Thread The IESG

The IESG has received a request from the Keying and Authentication for
Routing Protocols WG (karp) to consider the following document:
- 'The Threat Analysis and Requirements for Cryptographic Authentication
   of Routing Protocols' Transports'
  draft-ietf-karp-threats-reqs-03.txt as an Informational RFC

The IESG plans to make a decision in the next few weeks, and solicits
final comments on this action. Please send substantive comments to the
i...@ietf.org mailing lists by 2011-08-15. Exceptionally, comments may be
sent to i...@ietf.org instead. In either case, please retain the
beginning of the Subject line to allow automated sorting.

Abstract


   Different routing protocols exist and each employs its own mechanism
   for securing the protocol packets on the wire.  While most already
   have some method for accomplishing cryptographic message
   authentication, in many cases the existing methods are dated,
   vulnerable to attack, and employ cryptographic algorithms that have
   been deprecated.  The Keying and Authentication for Routing
   Protocols (KARP) effort aims to overhaul and improve these
   mechanisms.

   This document has two main parts - the first describes the threat
   analysis for attacks against routing protocols' transports and the
   second enumerates the requirements for addressing the described
   threats.  This document, along with the KARP design guide will be
   used by KARP design teams for specific protocol review and overhaul.
   This document reflects the input of both the IETF's Security Area and
   Routing Area in order to form a jointly agreed upon guidance.




The file can be obtained via
http://datatracker.ietf.org/doc/draft-ietf-karp-threats-reqs/

IESG discussion can be tracked via
http://datatracker.ietf.org/doc/draft-ietf-karp-threats-reqs/


No IPR declarations have been submitted directly on this I-D.


___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce


Protocol Action: 'Configuration Data Model for IPFIX and PSAMP' to Proposed Standard (draft-ietf-ipfix-configuration-model-10.txt)

2011-07-18 Thread The IESG
The IESG has approved the following document:
- 'Configuration Data Model for IPFIX and PSAMP'
  (draft-ietf-ipfix-configuration-model-10.txt) as a Proposed Standard

This document is the product of the IP Flow Information Export Working
Group.

The IESG contact persons are Dan Romascanu and Ron Bonica.

A URL of this Internet Draft is:
http://datatracker.ietf.org/doc/draft-ietf-ipfix-configuration-model/




Technical Summary

   This document specifies a data model for configuring and monitoring
   Selection Processes, Caches, Exporting Processes, and Collecting
   Processes of IPFIX and PSAMP compliant Monitoring Devices using the
   NETCONF protocol [RFC4741].  The data model is defined using UML
   (Unified Modeling Language) class diagrams and formally specified
   using YANG [RFC6020].  The configuration data is encoded in
   Extensible Markup Language (XML).

Working Group Summary

   The mediation framework was added to the IPIFX charter in 2008.
   The document was discussed at all meetings since then and had
   several revisions. There was nothing special about this document.
   There is a strong consensus in the IPFIX WG to publish this version
   of the document. There are no particular issues in the document
   without strong consensus in the IPFIX WG.

Document Quality

   The document underwent a WG last call in the IPFIX WG and a YANG
   doctor review. This way, a high document quality has been achieved already.

Personnel

   Juergen Quittek is the Document Shepherd.
   Dan Romascanu is the Responsible Area Director.

RFC Editor Note

OLD: 

[W3C.REC-xml-20040204]
  Paoli, J., Maler, E., Yergeau, F., Sperberg-McQueen, C.,
  and T. Bray, Extensible Markup Language (XML) 1.0 (Third
  Edition), World Wide Web Consortium FirstEdition REC-xml-
  20040204, February 2004,
  http://www.w3.org/TR/2004/REC-xml-20040204


NEW: 

[W3C.REC-xml-20081126]
  Paoli, J., Yergeau, F., Sperberg-McQueen, C., Maler, E.,
  and T. Bray, Extensible Markup Language (XML) 1.0 (Fifth
  Edition), World Wide Web Consortium Recommendation REC-
  xml-20081126, November 2008,
  http://www.w3.org/TR/2008/REC-xml-20081126.


___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce


Protocol Action: 'Terminology Used in Internationalization in the IETF' to BCP (draft-ietf-appsawg-rfc3536bis-06.txt)

2011-07-18 Thread The IESG
The IESG has approved the following document:
- 'Terminology Used in Internationalization in the IETF'
  (draft-ietf-appsawg-rfc3536bis-06.txt) as a BCP

This document is the product of the Applications Area Working Group.

The IESG contact persons are Pete Resnick and Peter Saint-Andre.

A URL of this Internet Draft is:
http://datatracker.ietf.org/doc/draft-ietf-appsawg-rfc3536bis/




Technical Summary 

This document provides a glossary of terms used in the IETF when discussing 
internationalization.  
The purpose is to help frame discussions of internationalization in the various 
areas of the IETF and 
to help introduce the main concepts to IETF participants.

This document gives an overview of internationalization as it applies to IETF 
standards work by lightly 
covering the many aspects of internationalization and the vocabulary associated 
with those topics. 
Some of the overview is a somewhat tuturial in nature.  It is not meant to be a 
complete description 
of internationalization.  The definitions in this document are not normative 
for IETF standards; 
however, they are useful and standards may make informative reference to this 
document after it 
becomes an RFC.  Some of the definitions in this document come from many 
earlier IETF documents 
and books.

Working Group Summary 

Not surprisingly for a document such as this, there were many suggestions of 
terminology to include, 
and of alternative definitions to the ones included.  The editors have done a 
good job of striking a 
necessary balance between an overly bloated document and one that includes the 
right set of terms, 
with definitions that reflect reasonable consensus, if not always unanimity.  
There were a number of 
such discussions, with none bearing particular mention here.

Document Quality 

This document replaces RFC 3536, cleaning up and updating many of the 
definitions therein.  RFC 
3536 has been in use for eight years, and this document reflects that maturity 
and what we've learned 
about the gaps in the terminology and definitions over that time.  Section 7 is 
a significant new section 
that talks about IDNA work done since RFC 3536.
___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce


Document Action: 'Conclusion of FYI RFC Sub-series' to Informational RFC (draft-iesg-rfc1150bis-01.txt)

2011-07-18 Thread The IESG
The IESG has approved the following document:
- 'Conclusion of FYI RFC Sub-series'
  (draft-iesg-rfc1150bis-01.txt) as an Informational RFC

This document has been reviewed in the IETF but is not the product of an
IETF Working Group.

The IESG contact person is Adrian Farrel.

A URL of this Internet Draft is:
http://datatracker.ietf.org/doc/draft-iesg-rfc1150bis/




Technical Summary

  This document concludes the For Your Information (FYI) sub-series of
  RFCs, established by RFC 1150 for use by the IETF User Services Area,
  which no longer exists.  The IESG does not intend to make any further
  additions to this RFC sub-series, and this document provides a record
  of this decision.  This document also obsoletes RFC 1150 and changes
  the status of RFC 1150 to Historic.

Working Group Summary
  
  This document is not the product of any IETF working group.

Document Quality

  This document was discussed on the rfc-interest mail list.  No one
  spoke against closure of the FYI sub-series on that mail list.

Personnel

  Adrian Farrel is the Document Shepherd.
  Adrian Farrel is the Responsible Area Director.

RFC Editor Note

Section 1
  OLD:
... information that regarding the Internet and might be
interesting to ...
  NEW:
... information regarding the Internet that might be
interesting to ... 

---

Section 2 para 1:
s/publishing/to produce/

---

Section 2, para 2
s/should be used/can be used/
___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce


Re: Informational RFC to be: draft-bankoski-vp8-bitstream-04.txt

2011-07-18 Thread The IESG
The IESG has no problem with the publication of 'VP8 Data Format and
Decoding Guide' draft-bankoski-vp8-bitstream-04.txt as an Informational
RFC.

The IESG would also like the RFC-Editor to review the comments in
the datatracker
(http://datatracker.ietf.org/doc/draft-bankoski-vp8-bitstream/) related
to this document and determine whether or not they merit incorporation
into the document. Comments may exist in both the ballot and the comment
log.

A URL of this Internet Draft is:
http://datatracker.ietf.org/doc/draft-bankoski-vp8-bitstream/

The process for such documents is described at
http://www.rfc-editor.org/indsubs.html

Thank you,

The IESG Secretary




Technical Summary

  This document describes the VP8 compressed video data format,
  together with a discussion of the decoding procedure for the format.

Working Group Summary

  This document is not the result of any IETF Working Group.  
  It is an Independent Stream submission to the RFC Editor.

Personnel

  Robert Sparks shepherded the RFC5742 review.

Note to the RFC Editor

   Per RFC5742:

   1. The IESG has concluded that there is no conflict between this
  document and IETF work.

___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce


Nomcom 2011-2012: Results of Random Selection

2011-07-18 Thread NomCom Chair
Hi all,

The following is the list of 10 Nomcom volunteers selected randomly
from this list: https://datatracker.ietf.org/ann/nomcom/2991/

118. Lianshu Zheng, Huawei Technologies;
 35. Stephen Hanna, Juniper Networks;
100. Simo Veikkolainen, Nokia;
 44. Sheng Jiang, Huawei Technologies Co. Ltd.;
 84. Rifaat Shekh-Yusef, Avaya;
 92. Pascal Thubert, Cisco;
  1. Jaap Akkerhuis, NLnet labs;
 99. Olivier Vautrin, Juniper Networks;
108. IJsbrand Wijnands, Cisco;
 58. Dapeng Liu, China Mobile;

Congratulations to everyone who got selected as a voting member.
This begins the one week community review of the selection - please
let me know ASAP if you see any problems with the selections. The
challenge period will close at 23:59 EDT on Monday July 25, 2011.

I am in the process of contacting the individuals to confirm they are
still able to serve on the Nomcom.

Once again, I would like to thank everyone who volunteered for the
Nomcom and I hope you will continue volunteering in the years to come.

Suresh Krishnan
Nomcom Chair 2011-2012
Email: nomcom-ch...@ietf.org, suresh.krish...@ericsson.com

NOTE: 76. Allyn Romanow, Cisco Systems was picked as 10th selection
but had to be skipped due to the two members per affiliation
restriction specified in Section 4 Rule 17 of RFC3777.


Selection Details 
=

Seed Values:
The seed values used in selecting the committee members are follows:

Canadian Lottery Lotto 649
Saturday July 16, 2011 Results:
  
http://diffusion.loto-quebec.com/sw3/res/asp/index.asp?l=1pRequest=2cProduit=4
  (7 numbers including the bonus number: numbers between 1 and 49)
Value: 02 12 23 35 39 49 44

US National debt (Debt Held by the Public), published by the
Treasury department as of Friday, July 15, 2011
  http://www.treasurydirect.gov/NP/BPDLogin?application=np 
  Last 8 digits, ignore the commas and periods
Value: 43838132

US National debt (Intragovernmental Holdings), published by the
Treasury department as of Friday, July 15, 2011
  http://www.treasurydirect.gov/NP/BPDLogin?application=np 
  Last 8 digits, ignore the commas and periods
Value: 43531153

Euromillions Lottery
Friday July 15, 2011 Results:
  
http://www.europeanlotteryguild.com/lottery_results/euromillions_results/draw_history?results_date=2011-08-01
  (7 numbers including the star balls: 5 numbers between 1 and 50 and 2 star 
balls between 1 and 11)
Value: 06 26 33 34 39 03 04

With the selection algorithm results are based on RFC 3797 as follows:

[suresh@beeblebrox nomcom11]$./nomcom
Type size of pool:
(or 'exit' to exit) Type number of items to be selected:
(or 'exit' to exit) Approximately 62.1 bits of entropy needed.

Type #1 randomness or 'end' followed by new line.
Up to 16 integers or the word 'float' followed by up
to 16 x.y format reals.
2 12 23 35 39 44 49
Type #2 randomness or 'end' followed by new line.
Up to 16 integers or the word 'float' followed by up
to 16 x.y format reals.
43838132
Type #3 randomness or 'end' followed by new line.
Up to 16 integers or the word 'float' followed by up
to 16 x.y format reals.
43531153
Type #4 randomness or 'end' followed by new line.
Up to 16 integers or the word 'float' followed by up
to 16 x.y format reals.
3 4 6 26 33 34 39
Type #5 randomness or 'end' followed by new line.
Up to 16 integers or the word 'float' followed by up
to 16 x.y format reals.
Key is:
 2.12.23.35.39.44.49./43838132./43531153./3.4.6.26.33.34.39./
indexhex value of MD5div  selected
 1  0DC9765D111926682972CDB0BE0D2F75  120  - 118 -
 2  D6A71A7BA3B379743C7C2E86ED793FB4  119  - 35 -
 3  FD440C774ED64A735F817DDB414D69FE  118  - 100 -
 4  90DAB0968FC05AA4A3E854F88BE2CBF2  117  - 44 -
 5  7CFDC92829037007F178BEA0FB2838C5  116  - 84 -
 6  FF1B0A4C427822E41CFD7AA072F87483  115  - 92 -
 7  0A2F3DD7A862AD8B7A99323DF747FB36  114  -  1 -
 8  8F74E1BF0926172EE4907EDA97E8083A  113  - 99 -
 9  50A198675A31BB4225AC3358265C1464  112  - 108 -
10  834B1152DF1E7FA6EA7C4C2C3B6AB625  111  - 76 -
11  19CF15ADFA7B364A20D498F64A5E1236  110  - 58 -
12  A23A41557BC2447A183BFBC32D8EEE92  109  - 104 -
13  700AA85DC4CAA77FC303B08E58B2F506  108  - 54 -
14  166E56A9AB07A49C4EC77EEBA9F6DE06  107  - 97 -
15  9F2F1498FD73BF4FA6C54382E217B5D6  106  - 90 -

Done, type any character to exit.
[suresh@beeblebrox nomcom11]$

___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce