RE: Hiroshima room rates (was Re: Non-smoking rooms at the Hiroshimavenue?)

2009-09-04 Thread Darryl (Dassa) Lynch
David Morris wrote:
|| On Fri, 4 Sep 2009, Andrew Sullivan wrote:
|| 
||| On Fri, Sep 04, 2009 at 07:43:15AM -0400, Lou Berger wrote:
 Yes.  I checked Sept 14-18.  Try it yourself, I expect you'll get
 the same results...
||| 
||| I don't understand why the rate during another period is relevant to
||| the rate we might get.  Remember that hotels, like everyone else,
||| charge more when demand is higher.
|| 
|| And the cost of meeting space and/or other standard features
|| (i.e., internet service in the room) is built into rate for meeting
|| attendees. ___

As I understand the norm, it is meeting rooms and facilities are charged as
a set fee with attendee room rates normally reduced due to the numbers
involved. Like most things, volume purchases reduce prices and unless the
meeting is held at a peak time for the hotel, good rates should be able to
be negotiated.

Rates may be higher than the norm if the negotiations included extras such
as the provision of morning and afternoon teas etc.  That is to be expected.
I imagine the committee has concluded the best deal possible.

Darryl (Dassa) Lynch 

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


RE: Possible RFC 3683 PR-action

2008-03-25 Thread Darryl (Dassa) Lynch
Spencer Dawkins wrote:
|| I've been carefully not posting in this thread for a while,
|| but can't control myself today. (So I'm not particularly
|| arguing with Ted's points, his e-mail is just the the latest e-mail
|| in the thread) 
|| 
|| My apologies in advance.
|| 
|| As Ted said, in theory, all decisions are supposed to be
|| confirmed on the mailing list, but I haven't seen anyone
|| point out the reason why - because we also think it's
|| important to have very few barriers to participation in the
|| IETF, so we don't require attendance at any face-to-face
|| meeting, ever.
|| 
|| So I'm not sure how we verify identities when anyone we
|| question can just post from an e-mail account at an ISP in
|| Tierra del Fuego, and say the next time you're in the tip
|| of South America, come by and verify my identity.
SNIP

My understanding is there is a system of peer validation in operation.  If a
contributor only posts once or twice, they are less likely to be taken
seriously than someone who posts regularly and often, especially when first
starting to participate.

The damage done by sock puppets and stooges is minimised in such systems as
they are fairly quickly recognised for what they are.

It is more a matter of judging the content of contributions rather than the
contributor.

Darryl (Dassa) Lynch

___
IETF mailing list
IETF@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


RE: IETF Eurasia

2007-11-29 Thread Darryl (Dassa) Lynch
[EMAIL PROTECTED] wrote:
 Why do IETF meetings have to be monolithic and all-inclusive?
|| 
||| I can tell you why we do - crosstalk. It can be incredibly useful
||| for people from the Security Area to look in on Applications, or for
||| Transport and RAI folks to understand the workings of the layers
||| beneath them and their users, for example.
||| 
||| That doesn't make for a has to, but it seems like a good reason to
||| choose to, from my perspective.
|| 
|| I agree with your reasoning. I should have asked, why do
|| *ALL* IETF meetings have to be monolithic and all-inclusive?
|| 
|| Smaller meetings held outside North America could be located
|| in smaller cheaper hotels, and would encourage wider
|| participation in the IETF. In fact, smaller meetings in
|| North America would achieve the same ends.
|| 
|| I'm not suggesting getting rid of the existing monolithic
|| meetings, but adding another type of meeting that is
|| smaller, cheaper to attend, and held in cities/countries
|| that are far from the USA but closer to people who should be
|| more involved in the IETF. For instance, Pune and Bangalore
|| India, Moscow and Ekaterinburg Russia, Dalian and Shanghai
|| China as well as places like Helsinki, Frankfurt, Tokyo, Seoul.
|| 
|| Note that smaller regional meetings still provide the
|| opportunities for some crosstalk, even if the variety of WG
|| choices to attend will be smaller. And it increases the
|| amount of crosstalk and cross-fertilization between people
|| who regularly work in the IETF and those who have not done
|| IETF work because they have not had the opportunity to see
|| it in action, face to face.
|| 
|| Note also that RIPE does something along these lines with
|| their regional meetings having more focus on education. I
|| expect that an IETF regional meeting would also have to have
|| more focus on education since a higher proportion of first-timers
|| would attend. 

Wouldn't the regional meetings you are suggesting have a totally different
focus and be a different type of event all together compared to the main
meetings currently?

I would expect such regional meetings to have a focus on educating the local
public about the IETF and be about increasing participation but not
including any actual work on IETF content.

Believe such regional meetings would be a great idea as a means to
facilitate mentoring of future participants and encouraging new blood into
the organization.  

Darryl (Dassa) Lynch 


___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


RE: Travel Considerations

2007-10-13 Thread Darryl (Dassa) Lynch
Jari Arkko wrote:
 Please save the planet by working on a better Internet, not
 by posting to an off-topic mail thread.

Perhaps the IETF should consider purchasing carbon credits for each
standards track document produced :)

Darryl (Dassa) Lynch 


___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


RE: joining the IETF is luxury Re: 70th IETF - Registration

2007-09-07 Thread Darryl \(Dassa\) Lynch
Adrian Farrel wrote:
 We shall see, but I don't know that putting up the price
 necessarily fixes the registration income issue. You only
 have to deter a relatively small proportion of attendees to
 wipe out the increase in charge.
 
 I assume that the converse is also being applied: viz.
 cutting meeting costs. It's hard for us oiks to tell because we only
 see: 
 - registration fee
 - breakfasts/cookies
 
 Anyway, registration is still the smallest component of attendance
 for me. Hotel and travel are still bigger problems, and I continue
 to wonder whether we could increase attendance (and hence
 registration income) by facilitating cheaper accommodation and
 travel. 

Like Adrian the associated costs are a factor for myself, the meeting fee
itself is very reasonable compared to other conferences.  The biggest factor
for me is the time.  I don't seem to have the time to contribute enough even
on the online possibilities let alone attend meetings.

I suspect that when I will have the time, the expense will not be a factor
but by then the willingness to participate will have gone.

At least at present everyone has the possibility of putting forward input
either online or in person with the IETF, it is one of the main attractions
I see with the organisation.

Darryl (Dassa) Lynch 


___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


RE: NATs as firewalls

2007-03-07 Thread Darryl (Dassa) Lynch
Hallam-Baker, Phillip wrote:
 From: John C Klensin [mailto:[EMAIL PROTECTED]
 
   And, when I conclude that IPv6 is inevitable (unless someone comes
 up with another scheme for global unique addresses RSN),
 
 Here we disagree, I don't think that IPv6 is inevitable.
 When I model the pressures on the various parties in the
 system and consider the shortest route by which the
 participants can reach their short term goals there are
 certainly alternative schemes.
 
 I certainly do not want to see these schemes deployed but
 they are certainly possible outcomes. For example, a
 hyperNAT where the ISP NATs residential Internet as a matter
 of course. I suspect we will start to see this deployed on a
 large scale as soon as the market price for IP address
 allocation reaches a particular point.
 
 There is a major difference between a NAT box plugged into
 the real Internet and a NAT box plugged into another NAT
 box. It is a pretty ugly one for the residential user.

I'm afraid it is already happening on a large scale in some parts.  Here in
Australia I've seen multiple ISP's who NAT all residential customers.  Some
of them amongst the largest players in the market.  Even some commercial
offerings are on NATs.

Personally I'm more set against the wholesale blocking of ports and services
which ISPs seem to be favouring at the moment, and the pricing that is
applied to have the blocks removed.  There are artificial blocks being
deployed to keep usage down that are a bigger problem than NATs IMHO.

Darryl (Dassa) Lynch 


___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


RE: [Nea] Re: WG Review: Network Endpoint Assessment (nea)

2006-10-12 Thread Darryl \(Dassa\) Lynch
Douglas Otis wrote:
 
 If an application happens to be malware, it seems it would
 be unlikely stop these applications.  How about:
 
 vi)   Provide application level advisory information pertaining to  
 available services. 
 
 Points that seem to be missing are:
 
 vii)  Notification of non-compliance. (Perhaps this could become a  
 restatement of i.) 
 
 viii) Time or sequence sensitive compliance certificates provided
   following a remediation process or service.
 
 
 Often bad behavior is detected, such as scanning or sending
 spam which may violate AUPs.  These violations may trigger a
 requirement for the endpoint to use a service that offers
 remedies the endpoint might use.
 There could then be a time-sensitive certificate of
 compliance offered following completion of a check-list and
 an agreement to comply with the recommendations.
 
 Those that remain infected after remediation, or that ignore
 the AUPs and are again detected, may find this process a
 reason to correct the situation or their behavior, or the
 provider may wish to permanently disable the account.

Am I mistaken or is NEA intended to be a compliance check before a node is
allowed onto the network?  As such, observed behaviour and application abuse
would seem to be issues that would be dealt with by other tools.  NEA may be
used to ensure certain applications are installed and some other
characteristics of the node but actual behaviour may not be evident until
such time as the node has joined the network and would be beyond the scope
of detection by NEA IMHO.  NEA may be used to assist in limiting the risk of
such behaviour but that is about the extent of it that I see.

My reading of the charter gives me the impression NEA is only intended for a
specific task and some of what we have been discussing seems to extend well
beyond the limited scope proposed.

Darryl (Dassa) Lynch 


___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


RE: [Nea] Re: WG Review: Network Endpoint Assessment (nea)

2006-10-11 Thread Darryl \(Dassa\) Lynch
Brian E Carpenter wrote:
 I run a very closed network, ports are closed and not opened unless
 there is a validated request, external drives are disabled etc etc.
 A contractor comes in with a notebook and needs to work on some
 files located on our internal secure network.  A trusted staff
 member rings in with the request to open a specified port.  The
 port is opened and the contractor hooks up the laptop to it.  NEA
 does it's thing and if the laptop doesn't match the requirements of
 the internal network policy it is directed to a sandbox network for
 remediation.  If the laptop does meet the policy then it allowed
 onto the internal network. 
 
 What if your contractor has carefully configured the laptop
 to give all the right answers? What if it has already been
 infected with a virus that causes it to give all the right answers?
 
 The first case is certainly current practice, and the second
 one could arrive any day.

Hello Brian

I would be monitoring for unusual behaviour on the network and would be
warned if the laptop started to behave in ways not expected.  NEA would only
save time in getting the system onto the network as instead of physically
inspecting it I'd be relying on automated means to judge compliance.  It
would be an acceptable risk.  The risk of someone wishing to hack in or
being infected with a virus as you describe is low.  I'd mainly be using NEA
to assist in those situations where the trust isn't total but there isn't
harmful intent.

If you know of a system that provides total protection, is easy for users to
perform their duties and doesn't have me or IT staff doing physical checks
I'd be more than willing to look at it.

Let's face it, there will always be a risk of someone getting around any
informational or protection mechanism put into play, we all have to judge
that risk and set up networks accordingly.  If we really want to be secure
we wouldn't allow any ad hoc connections at all.

Darryl (Dassa) Lynch 


___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


RE: [Nea] Re: WG Review: Network Endpoint Assessment (nea)

2006-10-11 Thread Darryl \(Dassa\) Lynch
Hello Ted

Comments inline as appropriate.

Ted Hardie wrote:
 At 7:55 PM +1000 10/11/06, Darryl \(Dassa\) Lynch wrote:
 I run a very closed network, ports are closed and not opened unless
 there is a validated request, external drives are disabled etc etc.
 A contractor comes in with a notebook and needs to work on some
 files located on our internal secure network.  A trusted staff
 member rings in with the request to open a specified port.  The
 port is opened and the contractor hooks up the laptop to it.  NEA
 does it's thing and if the laptop doesn't match the requirements of
 the internal network policy it is directed to a sandbox network for
 remediation. 
 
 One of the points that has been made here several times is
 that the rosy promise of a sandbox for remediation has a
 number of thorns, even in the case where a posture
 assessment method has identified a potential issue. As it
 stands, there are commonly multiple ways to work around a
 vulnerability, including base-levels upgrades (from OS Foo
 v3 to v4) specific patches (either to the OS or to the
 application), and, in some cases, configurations (turning off
 functionality BAR). Assessing those is difficult; offering
 remediation is trickier yet, especially when one or more of the
 systems which may need remediation may not even been active at the
 time of attachment. As I have expressed before, I have serious
 doubts that the standardized parameters will be sufficient to do any
 reasonable assessment, and the same carries through in
 spades for remediation, since that involves a check that
 none of the remediations has already been applied.

Very true, any remediation is difficult.  It may be there will be options
provided so once a system fails to meet NEA compliance they are offered a
number of options instead of remediation, perhaps limited access, no access
or intervention by IT staff, all this is beyond the scope of NEA at this
stage IMHO.

 Maintaining a valid, *current* set of patches, OS upgrades,
 and the like for remediation is going to be a very big task;
 managing the licensing on it a nasty problem; and handling
 the potential liability of applying the *wrong* remediation
 a nightmare.  Handling unknown states (even for those
 running recognized assessors) is an even more problematic
 issue, but you may not care that some folks run development
 drops of OSes and applications, since you can always
 remediate them by offering a downgrade.

What is the difference to maintaining the network nodes already on the
system.  They all have to be maintained and kept in compliance already.  NEA
just provides some information on what may be needed.

 In your example, the contractor presumably also agrees to
 your mucking with their laptop configuration as part of the
 contract, but the number of cases in which this is going to
 be wise is clearly a subset of all cases and it may be a
 tiny subset.  If I came into your network and offered to
 work with you, my corporate IT folks would be upset if I
 allowed you to do any of the updates discussed above, so the
 sandbox is effectively a denial of network access.
 That's a policy decision you are welcome to make (it's your
 network), but it's a complex and risky way to make it.

If they don't agree to the network policy then alternatives would need to be
available such as providing a trusted system for them to use.  Hackers and
theives wouldn't agree to abide by any policy in place but that doesn't mean
I have to provide methods to make their life easier :).

 I continue to think that the core of this work (passing an
 opaque string prior to attachment) has some benefits

I don't disagree.

 snip
 
 Just another tool to give network administrators information and
 systems they can use to ensure the majority of users get their
 requirements met in a reasonable and timely manner.
 
 And I believe others agree with your tool in the toolkit
 view.  But if you advertise a saw as a hammer, someone is going to
 get cut. 

Most accidents occur in the home.  People do have to take some
responsibility for themselves.

Darryl (Dassa) Lynch 


___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


RE: [Nea] Re: WG Review: Network Endpoint Assessment (nea)

2006-10-11 Thread Darryl \(Dassa\) Lynch
Hi Vidya

Comments inline as appropriate.

Narayanan, Vidya wrote:

 Your email indicates that you would:
 
 a) somehow require that a visitor's laptop run an NEA client,
 b) expect the device to support PAs that the server requires to be
 checked, and c) trust data coming out of it,
 
 rather than treat that endpoint as an unknown endpoint and do
 IDS/IPS in the network. 

You are limiting my options to a small subset of what I would have
available.  I may sandbox systems that don't have an NEA client and are
unwilling to install one, they would be treated as an unknown node and given
very limited access, they wouldn't be allowed onto the trusted network for
instance.  I would expect some information to be available which I would
then be able to check against my policy.  I would assume a limited amount of
trust but would continue to have other mechanisms in place to be informed
where that limited trust has been abused.

 Other than finding this a rather bizzarre trust model, I
 have to say that there will be a very small set of such
 endpoints where the owner of that endpoint is going to be
 thrilled to allow you to place such clients on his/her
 device and perform updates on it.

If they wish to join my network they have to abide by the policies I have in
place, they don't like it, they don't get to play.

 In short, this is exactly the type of endpoint I wouldn't imagine
 NEA being useful for! 

NEA is a means to automate the information gathering about this endpoint, if
they don't agree to the policies, they will have options to.  If a person or
device doesn't agree with the policies in place, it doesn't mean I should
still provide full access for them.  Risk management will dictate what will
or will not be allowed.

Darryl (Dassa) Lynch 



___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


RE: [Nea] WG Review: Network Endpoint Assessment (nea)

2006-10-09 Thread Darryl \(Dassa\) Lynch
Harald Alvestrand wrote:
SNIP
 Posture checking is certainly a leaky bucket. It doesn't
 protect all kinds of endpoint, it doesn't protect the
 endpoints against all kinds of threats, and it doesn't
 protect much of anything against a smart, resourceful
 attacker who is deeply familiar with the NEA system in use
 and is interested in investing considerable resources in
 attacking or circumventing it.

NEA itself may not offer any protection, it is more an informational tool
from my perspective.  How that information may be used could lead to some
protection but that would vary with each deployment.

 But (to recycle a very old simile) the fact that I can open
 the locks of most doors with a crowbar doesn't mean that locks are
 not useful. Organizations that have deployed products that do
 something like what NEA is talking about have reported that their
 TCO is reduced. 

In these days of information overload I still maintain, the more information
available the better it is.

Darryl (Dassa) Lynch



___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


RE: [Nea] WG Review: Network Endpoint Assessment (nea)

2006-10-08 Thread Darryl \(Dassa\) Lynch
Hi Vidya

Narayanan, Vidya wrote:
 -Original Message-
 From: Susmit Panjwani [mailto:[EMAIL PROTECTED]
 Sent: Saturday, October 07, 2006 5:04 PM
 To: Harald Alvestrand
 Cc: Narayanan, Vidya; [EMAIL PROTECTED]; iesg@ietf.org; ietf@ietf.org
 Subject: Re: [Nea] WG Review: Network Endpoint Assessment (nea)
 
 Third, I simply can't see what the organization's interests would be
in
 protecting a device that doesn't even belong to it.
 
 An organization might not be interested in protecting a device that
 does not belong to it but would definitely be interested in
 preventing the attacks originating from such device (if
 compromised) when it joins the organization network.
 
 It appears that the NEA charter is completely misleading to
 some people from what is stated in this email. As the NEA
 charter alludes to, NEA does nothing to protect against
 compromised devices. Also, as has been agreed, NEA is not a
 protection mechanism for the network - it is meant to be a
 protection mechanism for compliant, truthful and as yet
 uncompromised end hosts against known vulnerabilities.

True the NEA doesn't do anything to protect against compromised devices
but it does assist in limiting the known compromises on endpoint devices by
being a mechanism for the checking and reporting on compliance to what ever
network policy is in place including virus and patch levels.  As a network
administrator I already deploy mechanisms for doing just this, but at a
higher level than the NEA charter indicates.  To me the difference is
between being reactive or proactive.  Compliance testing I already run
occurs after an end node has joined the network, with NEA the possibility is
for compliance checking before being allowed onto the network so isolation
and immediate remediation is possible.

 Any network, in its own best interests, must assume that it
 has lying and compromised endpoints connecting to it and
 that there are unknown vulnerabilities on any NEA-compliant
 devices connecting to it. Any kind of protection that
 addresses these general threats that the network may be
 exposed to at any time will simply obviate the need for NEA from the
 network perspective. 

Reliance on one protection or reporting mechanism is not enough.  We need a
lot of varied tools to cover all the bases and minimise risk.

 A network operator that thinks the network is getting any
 protection by employing NEA is clearly ignoring the obvious
 real threats that the network is exposed to at any time.

No, NEA would just be one more tool used to improve overall security and
minimise risk.  It would be at a different level to the tools some of
already deploy.

 This is what I meant when I said that the charter is unclear
 and it must explicitly state that NEA is not meant as a
 protection mechanism of any sort for the network.

I don't believe the Charter needs to delve into this at all.  If some people
see it as part of their protection mechanisms, so be it.

Darryl (Dassa) Lynch 


___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


RE: Meetings in other regions

2006-07-14 Thread Darryl \(Dassa\) Lynch

| -Original Message-
| From: JORDI PALET MARTINEZ [mailto:[EMAIL PROTECTED] 
| Sent: Saturday, July 15, 2006 1:05 AM
| To: ietf@ietf.org
| Subject: Re: Meetings in other regions
| 
| There are two issues:

I believe there are far more issues which makes the whole thing much more
complex than most of us would like and it is sometimes a good idea to hash
over the issues now and again to see if there have been any changes which may
assist with future direction.
 
| 1) Cost. IETF has limited resources, so unless each of us 
| want to pay more and more for the registration fees or we 
| are able to compensate the cost with more sponsors (which is 
| every day more difficult), we need to look for cheaper locations.

For someone like me who is involved in a lot of things from personal interest
and inclination without corporate backing, costs are an important issue.  I've
given some thought to this, how participation is restricted for individuals
and have come to the conclusion it is not such a bad thing.  Individuals can
participate in the IETF without having it cost them a fortune which is
different to a lot of other organisations, even if that participation is
somewhat limited.  It is one of the great things about the IETF I like, how
anyone can become involved.

| 2) Is un fair that the main driver is only looking at where 
| more people comes from (this is fortunately changing anyway, 
| and thus will less and less easy to match). Even worst if 
| that's a country with doesn't allow everyone to come in.

I'm not sure if it is because I'm getting older and have more understanding or
if I have seen enough evidence to support it but I find myself relying more on
the intrinsic good will of people and assuming they make decisions after
considering all factors, more often than not.  As has been pointed out, the
location will affect demographics and I'm satisfied this is considered when a
decision is made on where the next meeting will be held.  As are a lot of
other factors.

There will always be ideas put forward for alternative locations and ways to
decide on the selection.  This is a good thing.  It keeps the whole process on
track.

Darryl (Dassa) Lynch 


___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


RE: Proposal for keeping free speech but limitting the nuisance to the working group (Was: John Cowan supports 3683 PR-action against Jefsey Morfin)

2006-01-24 Thread Dassa
| -Original Message-
| From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] 
| On Behalf Of Harald Tveit Alvestrand
| Sent: Wednesday, January 25, 2006 7:10 AM
| To: Jeroen Massar; ietf@ietf.org
| Subject: Re: Proposal for keeping free speech but 
| limitting the nuisance to the working group (Was: John Cowan 
| supports 3683 PR-action against Jefsey Morfin)
| 
| 
| 
| --On 24. januar 2006 20:46 +0100 Jeroen Massar 
| [EMAIL PROTECTED] wrote:
| 
|  My proposal to solve this issue but keeping everybody happy:
| 
|  Two mailinglists: wg@ietf.org + full.wg@ietf.org
| 
|  full.wg@ is completely open, anybody can post anything they want 
|  though hopefully on topic on the subject of the 
| workinggroup and of 
|  course based on the source address having a subscription 
| *1 full.wg@ 
|  is subscribed to wg@ thus full.wg gets everything preserving, at 
|  least parts, of the freedom of speech that is wanted and for the 
|  people who want to read a lot of mail everyday.
| 
| In fact this has been implemented at least once that I know 
| of - on the DNSO GA mailing list. The full version had 
| relatively few subscribers.
| 
| You can find the archives of that experiment at 
| http://www.dnso.org/dnso/gaarchives.html - it's probably 
| difficult to guess from the archives whether it was 
| successful; better ask someone who was there at a time 
| whether they think it worked.
snip

I was a subscriber to both of the DNSO GA mailing lists and I do think the
experiment worked for the most part.  I've seen this a few times and it does
take a load of the main list but there are dangers in the full list becoming
a dumping ground for garbage.  Both lists need dedicated people to keep them
functioning correctly. It all boils down to how much traffic and noise
individuals can handle.  It appears there are large numbers of participants
who need to be sheltered a little more than others to retain their
participation, not a bad thing, just a fact.  Anything that can be done to
improve participation is a good thing.

Darryl (Dassa) Lynch 

PS...I've known Jefsey online since those early DNSO and IDNO days and whilst
I don't always agree with him I respect his right to opinions.  I haven't
followed his postings to other lists but haven't seen anything here I object
to with regard to posting rights.  I wouldn't like to see a blanket ban placed
on his postings so a full list experiment would be a preference for me.


___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


RE: Wireless at IETF

2006-01-18 Thread Dassa
| -Original Message-
| From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] 
| On Behalf Of Ted Faber
| Sent: Thursday, January 19, 2006 5:57 AM
| To: ietf@ietf.org
| Subject: Re: Wireless at IETF
| 
| On Wed, Jan 18, 2006 at 10:30:31AM -0800, Hallam-Baker, 
| Phillip wrote:
|  The result is that 70% of wireless access points are open and can be 
|  used by Internet criminals to achieve anonymous access.
| 
| Loaded statement?  Check.
| Precise statement? Check.
| Supported statement? H.

I don't see the 70% of access points being open actually.  My own figures
indicate less than 20% within the local area, information from capital cities
tends to suggest a slightly higher figure but certainly not that high.  But
then, how many wired networks have link layer access controls?  I don't see
very many of those and implementing it is extremely difficult unless you have
everything set up exactly as the hardware has been designed for.  For example
trying to use password/password combinations instead of token/password has
proven problematic in one practical case I'm aware of for activating port
locking.  It amuses me just how easy it is to walk into a business and plug a
system in with full access to the network.

Most people/businesses do not appear to have security as a high priority.

Darryl (Dassa) Lynch 



___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


RE: Normative figures

2006-01-09 Thread Dassa
| -Original Message-
| From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] 
| On Behalf Of Stewart Bryant
| Sent: Tuesday, January 10, 2006 6:47 AM
| To: Sam Hartman
| Cc: Harald Tveit Alvestrand; ietf@ietf.org
| Subject: Re: Normative figures
| 
| Sam Hartman wrote:
| 
| Hi.  With the exception of packet diagrams, I think all the 
| examples 
| you bring up benefit significantly from clear textual description.
| 
| Sam
| 
| I am not saying that clear text is not needed to accompany a diagram.
| However a diagram allows a lot less text to be written 
| producing a shorter clearer draft with less clutter.
SNIP

Perhaps this is getting to the crux of the issues.  I see the IETF documents
as breaking down the problems into smaller chunks that can be dealt with one
at a time and which add up to a big picture description of the whole Internet.
I see each individual document as being simple within itself, limiting the
context to the smallest level an issue may be dealt with.  By adding more
complexity to the documents I feel it is allowing more complex issues to be
described in the documents but the documents then become larger, more
difficult to comprehend and will be more difficult to process.

Using the example you gave for routing costs, I see the description of routing
cost basics or specifics as one document and the description of how they may
be dealt with as another.

By forcing the documents to be in a simple format, there are limitations on
the complexity that may be explained in a single document, but I consider this
a good thing.  It forces everyone to break the problems and issues down to
their lowest levels and forces simple explanations that make it easier for
everyone to understand.

If more complex documents with full diagramatic process flows are required,
these could be books written linking a number of IETF documents together to
describe a more general practical picture of their implementation.

Darryl (Dassa) Lynch 


___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


RE: ASCII art

2005-11-23 Thread Dassa
| -Original Message-
| From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] 
| On Behalf Of Hallam-Baker, Phillip
| Sent: Thursday, November 24, 2005 3:09 AM
| To: Ted Faber
| Cc: Dave Aronson (re IETF); ietf@ietf.org
| Subject: RE: ASCII art
| 
| No, the IETF needs to demonstrate that it is CAPABLE of change.
|  
| The Internet has changed and will continue to change. If the 
| IETF wants to remain relevant to the future of the Internet 
| it must change as well. Note that 'remaining relevant' is 
| not exactly a stretch goal
|  
| How familiar the bureaucrat's definition of priorities: 
| 'needed for the good of the institution'. Does this mean 
| that you think that the IETF only exists to serve its own interests?
|  
| There are a billion users out there who expect much more of 
| this institution than they receive. We have a mission here 
| that they expect us to realize: an Internet that is open, 
| safe and accessible to everyone.

Personally I'm not against change when it is going to achieve or help us
achieve our goals.  I dislike change for the sake of change or to make someone
feel as if they are doing something.

Any change to the RFC formats has to be considered with the goals of the IETF
in mind, not the ease it may bring to a few.  I haven't seen any arguments
that convince me changing from ASCII for text and diagrams would be an
improvement or further the goals of the IETF.  I see too many drawbacks and
would hate to see RFC and other documents presented with diagrams that would
require me to find and download templates and art files to be able to view
them or to have special programs to read them.

I'm trying to convince people that plain text is the best and I often point
out IETF documents as a proof the concept works.  The KISS principle works
well with documents.  It is PR and sales that always want documents to be
flashy and contain elements not all can view.

Opening up a document in vi, notepad or MS Word and having it readable and
understandable in all is good.

If a format can be found that allows as wide an opportunity of being
compatible with the same programs people use now then it may be worthwhile to
change, I can't see any real benefits at the moment.

Darryl (Dassa) Lynch 


___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


RE: Excellent choice for summer meeting location!

2005-01-04 Thread Dassa
| -Original Message-
| From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]
| On Behalf Of Mark Prior
| Sent: Wednesday, January 05, 2005 12:22 AM
| To: [EMAIL PROTECTED]
| Cc: 'IETF Discussion'
| Subject: Re: Excellent choice for summer meeting location!
|
| Dassa wrote:
|
|  | -What kind of city with a population of 75,000 has hotel
|  | accommodations for 2000 people unless it's a tourist Mecca and
|  | likely expensive and overbooked?
| 
|  A lot of regional centres are geared to large numbers of
tourists/visitors.
|  As for expensive and overbooked, I find most large cities have prices
|  two or three times those in regional centres for accommadation and as
|  any use of a regional centre would be a big bonus to the host city,
|  there is scope for negotiation and I'm sure additional price cuts.
|
| Not many regional cities would have the conference
| facilities that will cope with an IETF, it's not your normal
| conference that just needs a single large plenary hall.

This may be the biggest issue.  True a lot of regional cities wouldn't have
the facilities.  Some do however.  It may mean that all the conference rooms
are not at the same location but the distance between them would not be
great.  Usually within a 5-10 minute walk.  I can think of at least two
regional cities in NSW that could cope fairly easily and I'm sure there
would be more in Australia.

| I will also note that in 2000 Adelaide, a city of around 1
| million people, struggled for hotel rooms given that people
| not associated with the IETF also wanted hotel rooms in the city :)

True, in a regional city, not everyone would be able to stay in the one
place and would be scattered around the city at various hotels, motels and
other accommadation.  I know of a few regional cities that can handle the
numbers talked about so far, there are sure to be others.  The timing would
have to be right so other major events are not being held at the same time
but that sort of problem exists for capital and major cities also.  For
instance Tamworth has a massive influence of people for the Country Music
Festival.  It is hard to find acccommadation there unless booked well in
advance.  I have a chat to our local Tourism Officer and see just what sort
of figures are available for some of the regional cities with regard to
facilities and how many visitors they get/can handle.  It may be
interesting.

Actually I find it hard to understand Adelaide having issues with
accommadation unless there was another major event at the same time.  How
does it cope with motor sport events, they used to hold some there didn't
they?

There would certainly be a bit more work in preparing for a meet such as the
IETF and there may be too many issues to consider regional cities but it is
a worthwhile exercise to see just what the disadvantages and advantages may
be.

Darryl (Dassa) Lynch



___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


RE: Excellent choice for summer meeting location!

2005-01-04 Thread Dassa
 not be considered.

|  It would also assist with focusing on the issue of increasing
|  broadband uptake and opportunities.  It would certainly be a good PR
|  exercise.
|
| It's not the goal of IETF meetings to do PR exercises, nor
| would one week of demand be enough to convince the local
| telco or regulators that increased deployment of broadband
| is necessary.

You would be surprised by what can be done to motivate a telco. ;)  Such a
meeting in itself would only be used as a catalyst.  I do consider PR is one
of the goals of the IETF, I may be mistaken but I certainly hope not.  It
would not be a high priority but it would certainly be within the scope of
the IETF.  Considering sponsorship and the like it is fundamental.

Darryl (Dassa) Lynch



___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


RE: Excellent choice for summer meeting location!

2005-01-03 Thread Dassa
| -Original Message-
| From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]
| On Behalf Of John C Klensin
| Sent: Tuesday, January 04, 2005 12:19 AM
| To: [EMAIL PROTECTED]; 'IETF Discussion'
| Subject: RE: Excellent choice for summer meeting location!
| Dassa,
|
| For better or worse, we've had a preference for locations
| close to major airports with significant international connections.
| We haven't been consistent about it (note, e.g., San Diego),
| but, unlike that other organization whose name starts with I
| (not IEEE, Glen), we have considered it a really bad thing
| if most of the attendees have to spend two days getting to
| and/or from a meeting: turning a five-day meeting into an
| eight- or nine-day one is really hard on those who have
| other things to do
| besides going to meetings.I have no idea how the boondocks
| of NSW would fall on that criterion, but it is what has kept
| us near or in fairly major cities.
|

Hello John

I was being a little tongue in cheek but the suggestion of regional centers
being used is one I pursue for a lot of groups.  Living in the country in a
smallish city, a lot of meetings occur in the capitals that I and others
just don't get a chance to attend.  I'm sure it would be the same in a lot
of areas.  I can understand the issues but the benefits all round may
overcome them.  For instance where I live is only an hour flight from
Sydney, you ask, why don't you fly there for meetings and I have to explain,
being in a regional area, the finances available for travel are limited.  We
tend to get paid less than equilivant workers in the capitals and companies
out here are less likely to approve spending on non-essential travel.  It is
also a fact that connections out in regional areas are often less than
optimal for most people so this has an impact for online participation.  It
is only recently I was able to get ADSL at home for instance and operated
for years with a dialup that meant long hours for participation online and I
missed a lot of broadcasts due to downloading constraints.

My suggestion is the IETF considers moving some meetings out to regional
centres within reasonable travel of the major ingress airports in an effort
to promote awareness and participation.  Within the States and other
countries, I'm sure there would be some benefits in holding meetings at
cities with populations of 30,000 - 100,000 or so rather than the capitals
and other major cities with populations into the millions.

There are issues with such locations and they may be insurmountable but I
would like to see the idea considered.  Given more people making lifestyle
changes that involve moving away from major cities, it may become more
important in the future.

Darryl (Dassa) Lynch



___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


RE: Excellent choice for summer meeting location!

2005-01-02 Thread Dassa
| -Original Message-
| From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]
| On Behalf Of Theodore Ts'o
| Sent: Monday, January 03, 2005 11:20 AM
| To: Glen Zorn (gwz)
| Cc: 'Iljitsch van Beijnum'; 'IETF Discussion'
| Subject: Re: Excellent choice for summer meeting location!
|
| Shrug  I've always liked Minneapolis, myself.  I've
| always considered it a great place for an IETF meeting.

Australia isn't bad in August :).  Perhaps some thought could be given to
holding some meetings in more regional areas also, not just major cities.

Darryl (Dassa) Lynch (who lives out in the boondocks of NSW Australia).




___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf


RE: I-D ACTION:draft-lyons-proposed-changes-statement-01.txt

2004-11-02 Thread Dassa
| -Original Message-
| From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]
| On Behalf Of Patrice Lyons
| Sent: Wednesday, November 03, 2004 2:34 AM
| To: Brian E Carpenter
| Cc: [EMAIL PROTECTED]
| Subject: Re: I-D ACTION:draft-lyons-proposed-changes-statement-01.txt
|
| Brian,
|
| While this shouldn't be viewed as legal advice on the issue,
| it is my understanding that, in general, members of an
| unincorporated association (and participants in IETF
| activities may be viewed as members) will have personal
| liability for the authorized debts and actions of the association.
| In Virginia, state statutes permit an unincorporated
| association to become a limited liability company by
| filing articles of organization, maintaining a registered
| agent in the State, paying certain fees, and meeting certain
| other requirements.  If it were to do so, IETF could limit
| the usual personal liability of its members.  But in the
| absence of some such liability-limiting legal structure, the
| general personal liability principles would apply.
|
| Regards,
|
| Patrice

When I last researched this type of issue in Australia, members of an
unincorporated association could be held liable only to an amount equal to
any memberships or fees they contribute to the association.  It was possible
for association officials to be held personally liable for higher amounts
but I don't remember the exact criteria.  Very low risk issues.  The
situation may be different in other countries but I doubt if the issue of
personal liability would be a barrier for the IETF.

Darryl (Dassa) Lynch



___
Ietf mailing list
[EMAIL PROTECTED]
https://www1.ietf.org/mailman/listinfo/ietf


RE: Naming crap (Re: IESG review of RFC Editor documents)

2004-03-28 Thread Dassa
| -Original Message-
| From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On
| Behalf Of Iljitsch van Beijnum
| Sent: Sunday, March 28, 2004 9:38 PM
| To: Harald Tveit Alvestrand
| Cc: IETF Discussion
| Subject: Re: Naming crap (Re: IESG review of RFC Editor documents)
|
| On 27-mrt-04, at 18:36, Harald Tveit Alvestrand wrote:
|
|  If we are to change the process that produces this stuff,
| we HAVE to
|  understand what the reasons are that reasonable, competent people
|  produce things that are sub-par, broken or crap. And
| IMHO, we can't
|  do that without saying what these unacceptable results of
| the process
|  are.
|
| [...]
|
|  I don't think anonymous, class-based criticism will get us much
|  further. We need to be specific about what our problems are.
|
| To me it seems that the IETF can't make up its mind: are
| RFCs just drafts that don't expire, or are they hugely
| important documents that must be absolutely perfect before
| they are published?
|
| The problem is version control. We're engineers. That means
| we are, more so than mere mortals, doomed never to get
| anything right the first time out. However, the RFC
| publishing model doesn't really allow for incremental
| changes: you have to write a completely new RFC, which then
| gets a new number that has no relation to the original RFC.
|
| What we need is a way to add information to RFCs whithout
| the need to rewrite the original RFC or make the new
| information a full-blown RFC of its own.

Personally and from observation it would appear RFCs are stand alone
documents that do not get revised.  They get superseded by new RFCs covering
the same topic.  Perhaps the way to approach this particular issue is to
provide better navigation aids through the various RFCs so that it is easier
for users to find all the related documents showing the relationship
(timeline and validity) between the documents.  A more involved and
comprehensive document management system.

Darryl (Dassa) Lynch





RE: [ga] Fracturing the Internet

2001-04-15 Thread Dassa

| -Original Message-
| From: [EMAIL PROTECTED]
| [mailto:[EMAIL PROTECTED]]On Behalf Of
| Patrick Corliss
| Sent: Monday, April 16, 2001 10:21 AM
| To: [GA]
| Subject: [ga] Fracturing the Internet
|
|
| Multilingual Top Level Domains
| Available top level domains (TLD) in Arabic:
| http://www.nativenames.net/english/whois/topleveldomains.asp
|
| Here's an example of an approach that may fracture the internet.

From
:http://www.nativenames.net/english/domains/policies/standards-warning
.asp
QUOTE
NativeNames is among the first pioneers to enter the arena of
multilingual domain names, and is among the first pioneers to support
languages of the Middle East, including Arabic, Farsi, and Urdu. As
with any pioneering efforts, there are dangers associated with being
first. The most important one which you, the domain name registrant,
need to be concerned about, is the evolution of standards regarding
domain names. Until the standards get hammered out and are ratified,
there is a chance of the same domain name being sold by different
companies. Should that happen with a domain that you purchase through
an affiliated registrar of NativeNames, NativeNames and that registrar
will make every good faith effort - God willing - to return any
prorated fees owed to you from the time of reporting to us of a
problem for the remaining part of your registration term.

Note that NativeNames, unlike many other registries, is virtually
unique in warning potential buyers. We are deeply concerned about
assuring you the best possible quality and service, and we appreciate
your business. Please also note that we are actively pursuing avenues
to minimize any potential problems. We are the first, and currently
the only, registry that is focusing on Mideastern languages. We also
hold a prominent role in the IETF's working group on Arabic domain
names (in fact, our COO is the chair of that group). We will do our
best to make sure that whoever you buy your domain name from, that
domain name is yours God willing.
End QUOTE

Wouldn't the above in the last paragraph indicate a conflict of
interest for being involved in this Registry and holding a chair in
the IETF working group?

Darryl (Dassa) Lynch.




RE: Relation email - person (re: Mail sent to midcom)

2001-02-15 Thread Dassa

|-Original Message-
|From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]
|Sent: Thursday, February 15, 2001 3:49 AM
|Subject: Re: Relation email - person (re: Mail sent to midcom) 
|
|25.00%  defunct
| 0.1%   duplicates (same person, different addresses)
| 0.01%  wrong person
|
|which is a pretty strong evidence of Harald's assertion:
|
||The mapping address - person is pretty strong, and mostly single-valued.
||The mapping person - address is multivalued, and getting more so.
|
|One would expect that in "clean" data, these mappings would 
|be even stronger.

The first and second statistics can be taken care of with management.  The last one is 
of concern but could also be taken care of with management.  Not sure that it is 
strong evidence.

I have multiple e-mail addresses, some of them redirections to other addresses and 
others that map finally through redirections to multiple addresses and individuals.

Take mailing list addresses for instance where a single address resolves out to 
multiple individuals, some in fact may not be to individuals but expanded out in other 
directions, add in wap and it starts getting complicated. It may be desirable to have 
an authoritive address for each individual and I assume this is where this thread is 
heading.  I'm interested in the subject of e-mail which is why I broke my lurking :).

Darryl (Dassa) Lynch. 




RE: Relation email - person (re: Mail sent to midcom)

2001-02-14 Thread Dassa

|-Original Message-
|From: Harald Alvestrand [mailto:[EMAIL PROTECTED]]
|Sent: Wednesday, February 14, 2001 5:41 AM
|To: Mike O'Dell; [EMAIL PROTECTED]
|Subject: Relation email - person (re: Mail sent to midcom)
|
|I recently had the dubious pleasure of sending out 40.000 
|emails to a set of email addresses gathered (with the owners' approval!) over 
|a period of seven years.
|
|The result was roughly 10.000 bounces (naturally), dozens of 
|requests to merge multiple registrations for the same person, and on the 
|order of FIVE occurences of an email address previously used by one person 
|now being used by another.
|
|The mapping address - person is pretty strong, and mostly single-valued.
|The mapping person - address is multivalued, and getting more so.
|
|Not quite "not working", if we take it for what it is.

I would consider such results the fault of the list maintainer and not a fault in the 
email system.  Much like physical addresses used within the postal system, anyone 
maintaining a list needs to provide a means to maintain the validity of the data.  If 
the data is invalid it is a cost the person using the data has to carry.  It doesn't 
mean that all the data is invalid, just the means to keep it current was inadequate.  
Most mailing lists for instance employ means to maintain the integrity of the 
subscribtions, including regular probes.  There are means available for other types of 
lists, a lot depending on the usage and value.

Darryl (Dassa) Lynch.




RE: Example of dns (non) fun

2000-12-05 Thread Dassa

Hi

Actually IMHO, it would not be such a jump for them to make.  They
impose trademark restrictions on DNS entries and the URDP has been
used to capture some generic wording.  As the by--aduwvya actually
translates to a similar wording I don't see it holding up the courts
or the URDP for long.

Dassa

|-Original Message-
|From: Stephen Dyer [mailto:[EMAIL PROTECTED]]
|Sent: Tuesday, December 05, 2000 9:14 PM
|To: vint cerf; Richard Shockey; Dan Kolis; [EMAIL PROTECTED]
|Subject: Re: Example of dns (non) fun
|
|
|Hi,
|
|There is also an interesting legal problem lurking with
|http://www.deja.fr/   and  http://www.bq--aduwvya.fr/
|
|A court might find me guilty of trademark violation of "deja"
|with the
|first URL, but I can't see them upholding the same for "bq--aduwvya"