Re: [ietf-privacy] [Int-area] NAT Reveal / Host Identifiers

2014-06-11 Thread Joe Touch



On 6/7/2014 6:20 AM, Stephen Farrell wrote:

Yes, source addresses leak information that affects privacy. But
we do not have a practical way to mitigate that. So therefore
BCP188 does not call for doing stupid stuff, nor for new laws of
physics (unlike -04 of the draft we're discussing;-)


Again, BCP188 does not *call* for doing anything. There are no SHOULD- 
or MUST- level requirements in that doc. Let's please not wave it in the 
air as if there are.


Joe

___
ietf-privacy mailing list
ietf-privacy@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-privacy


Re: [ietf-privacy] [Int-area] NAT Reveal / Host Identifiers

2014-06-11 Thread Joe Touch



On 6/11/2014 8:09 AM, Stephen Farrell wrote:



On 11/06/14 15:54, Joe Touch wrote:



On 6/7/2014 6:20 AM, Stephen Farrell wrote:

Yes, source addresses leak information that affects privacy. But
we do not have a practical way to mitigate that. So therefore
BCP188 does not call for doing stupid stuff, nor for new laws of
physics (unlike -04 of the draft we're discussing;-)


Again, BCP188 does not *call* for doing anything. There are no SHOULD-
or MUST- level requirements in that doc. Let's please not wave it in the
air as if there are.


I don't buy that argument at all and didn't wave anything anywhere.

BCP188 very clearly says:

Pervasive monitoring is a technical attack that should be mitigated
in the design of IETF protocols, where possible.

and

Those developing IETF specifications need to be able to describe how
they have considered PM, and, if the attack is relevant to the work
to be published, be able to justify related design decisions.  This
does not mean a new pervasive monitoring considerations section is
needed in IETF documentation.  It means that, if asked, there needs
to be a good answer to the question Is pervasive monitoring relevant
to this work and if so, how has it been considered?

Reverting to RFC2119-keyword-lawyering is not IMO credible here.


That's what RFC2119 is for and how we interpret BCPs.

The doc goes out of its way - as you note - to include wiggle phrases 
like where possible and by not requiring a new considerations section.


Yes, it's fine to discuss it here, and I've already outlined a way 
forward - with the caveat that my view is do no harm, not necessarily 
fix the lack of privacy already inherent in the Internet - at least in 
this doc.


Joe



___
ietf-privacy mailing list
ietf-privacy@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-privacy


Re: [ietf-privacy] [Int-area] NAT Reveal / Host Identifiers

2014-06-08 Thread Joe Touch

On Jun 7, 2014, at 6:20 AM, Stephen Farrell stephen.farr...@cs.tcd.ie wrote:

 NATs have both good and bad properties. The slightly better privacy
 is one of the good ones.

Better for the hosts they 'hide'; worse as a common network access point.

Consider an enterprise. There are two things we can learn about it from IP 
addresses:

- without a NAT, we learn about activity of individual hosts

- with a NAT, we learn the common network access point

If I want to track host activity - or attack a host, the former is better.

If I want to know what to DOS to take down the entire enterprise, the latter is 
better.

Think of it this way: 

a NAT hides the host *at the expense* of exposing a router

If we're serious about considering privacy issues, there's a LOT more homework 
to be done.

Joe

___
ietf-privacy mailing list
ietf-privacy@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-privacy


Re: [ietf-privacy] [Int-area] NAT Reveal / Host Identifiers

2014-06-06 Thread Joe Touch



On 6/5/2014 5:48 AM, Stephen Farrell wrote:

I share those concerns. And adopting this without any consideration
of BCP188 would fly in the face of a very recent, very thoroughly
discussed, IETF consensus.


That BCP thankfully includes zero RFC2119 language except the single 
word should (not capitalized) in the abstract, thus every new document 
is trivially compliant with its recommendations.


(I really wish the IETF community cared as much about technical 
correctness and protocol robustness as they did about issuing that IMO 
largely political statement, which flies in the face of 40+ years of 
using globally-assigned, globally-unique IP addresses as endpoint 
identifiers as the basis of the Internet architecture).


Joe

___
ietf-privacy mailing list
ietf-privacy@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-privacy


Re: [ietf-privacy] [Int-area] NAT Reveal / Host Identifiers

2014-06-06 Thread Joe Touch



On 6/5/2014 1:28 PM, Brian E Carpenter wrote:
...

As a matter of fact I tend to agree with many of your criticisms
of the draft, and I like the idea (below) of adding what we might
call the misuse cases. That's a discussion the intarea WG could have.

 Brian


I'd vote for WG adoption, and agree with the above with the caveat that 
such misuse should focus on:


a) ways proposed mechanisms undo current mechanisms that *might* have 
been intended to preserve privacy (e.g., NATs are deployed for lots of 
reasons, and we never know intent per se, but privacy preservation CAN 
be a reason)


b) ways proposed mechanisms can exceed restoring what such devices 
undo and be used to track hosts, processes, or other identities beyond 
what the original packet *would have already exposed*.


I.e., for a device that inserts the source IP address and TCP source 
port for NAT traversal, it would at best be considered to 'undo' the 
potential privacy-creation intent of a NAT, but would NOT be considered 
to exceed what the original packet conveyed.


Joe

___
ietf-privacy mailing list
ietf-privacy@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-privacy


Re: pgp signing in van

2013-09-06 Thread Joe Touch



On 9/6/2013 10:17 AM, Michael Richardson wrote:


I will be happy to participate in a pgp signing party.
Organized or not.

I suggest that an appropriate venue is during the last 15 minutes of the
newcomer welcome and the first 15 minutes of the welcome reception.

Because:
   1) the WG-chairs and IESG will all be there, and a web of trust
  still needs some significant good connectivity, and we already
  know each other rather well, without needing ID
  (I am not interested myself in verifying anyone's NSA^WGovernment
  identity. I don't trust that Certification Authority...)

   2) getting newbies on-board, meeting them well enough to sign
  their key seems like a good thing.


And whose key would you sign? Anyone who showed up with a form of ID?

I've noted elsewhere that the current typical key-signing party methods 
are very weak. You should sign only the keys of those who you know well 
enough to claim you can attest to their identity.


If that's the case, how will this get newbies on-board except to invite 
them to have keys whose signatures aren't relevant, and to devalue the 
trust in WG-chairs and IESG members?


Joe


Re: pgp signing in van

2013-09-06 Thread Joe Touch



On 9/6/2013 5:10 PM, Ted Lemon wrote:

On Sep 6, 2013, at 6:42 PM, Joe Touch to...@isi.edu wrote:

I've noted elsewhere that the current typical key-signing party
methods are very weak. You should sign only the keys of those who you
know well enough to claim you can attest to their identity.


This is a ridiculously high bar.   The bar should be about at the
level of a facebook friend request.


Given I'm not on Facebook, the latter bar is infinitely high.

As per the PGP description:

---
There are several levels of confidence which can be included in such 
signatures. Although many programs read and write this information, few 
(if any) include this level of certification when calculating whether to 
trust a key.

---

And that's the problem - as long as endorsements are equal, they're only 
as good as your weakest one.


Joe


Re: TCPMUX (RFC 1078) status

2013-08-22 Thread Joe Touch



On 8/22/2013 12:44 AM, Martin Sustrik wrote:

On 21/08/13 19:00, Joe Touch wrote:


So what would you use for muxing, if TCPMUX is not a good idea?


You need to roll your own. The requirements of systems vary widely, as
do the costs/benefits of different approaches.

I listed a few before, but here's a more comprehensive list:
 - service per message
 demux based on message ID
 use IPC (interprocess comm) to handoff internal
 to your system

 - service per connection
 demux based on the first message in an
 association (TCP or UDP), and either continue to
 forward messages to a different process or handoff
 the connection


So, if I proceed with this option why not use RFC1078 to implement it?
Why write a new RFC if there's an old one that fits the bill?


There are two cases to consider:

- you're creating your own set of services, at which point
you'll need to roll your own dispatch mechanism

- you want to use TCPMUX, either for your own services or for
all services
you should already realize why that's a dead-end.
any sysadmin that blocks *any* ports will always
block TCPMUX

One final reason TCPMUX isn't deployed is that it changes the semantics 
of many existing services, many of which are defined as if the 
connection opens, then the service is there.


If you roll your own version, you can define your services to accept 
those semantics.


Joe


Re: TCPMUX (RFC 1078) status

2013-08-21 Thread Joe Touch



On 8/21/2013 12:50 AM, Martin Sustrik wrote:

On 20/08/13 17:01, Joe Touch wrote:


However, see my other message - it's hard to recommend an approach when
we don't understand the problem you're trying to solve.


The scenario is simple.

You want admin to open one port in the firewall when the project is
started. Going through the corporate process at this point is bearable
and makes sense.

Afterwards, you want to be able to expose arbitrary services through
that port without having to go through port-opening process over and
over again.


There's nothing new about multiplexing services over a single port; it's 
a known problem with a few common solutions:

- dispatch the connections inside your system based on
in-band info
- initiate connections inside a handler, and transfer them
to spawned subprocesses
- use initial connections to exchange inband info for other
connections on dynamic ports (as done in FTP)

They each have their challenges.


The services are actually different aspects of the same distributed
application, say, data distribution service, management service,
heartbeating service etc. so not requiring additional process for adding
them makes sense.


Each distinct, independently-useable service may warrant a new port or 
could all be muxed together. Which of these you seek is up to you. 
That's a design decision.



The real problem here IMO is how to distinguish between adding a
completely new application -- which should require approval process --
and adding a new component within an existing distributed application
-- which should be managed by devs themselves.


IMO it's easy - any group of services you want others to be able to use 
independently could justify a new port, but you can always mux them all 
together if you want to avoid additional firewall configuration issues.


I.e., this is your call. But it doesn't appear to have anything to do 
with the notion of a single port to access any *existing* service, which 
is what TCPMUX and its descendants does.


Joe


Re: TCPMUX (RFC 1078) status

2013-08-21 Thread Joe Touch



On 8/21/2013 12:50 AM, Martin Sustrik wrote:
...

You want admin to open one port in the firewall when the project is
started. Going through the corporate process at this point is bearable
and makes sense.

Afterwards, you want to be able to expose arbitrary services through
that port without having to go through port-opening process over and
over again.


One additional point - if you really mean arbitrary, including 
existing services, I hope you understand that a network operator that 
shuts down ANY current services would conclude they must then block 
yours too.


I.e., if I don't want FTP over the firewall (because it uses cleartext 
passwords), I definitely don't want TCPMUX (which allows FTP), or any 
other accesses arbitrary services port.


So that seems like a non-starter, unless by arbitrary you mean 
extensions within your system - which is how all current ports already 
work.


Joe


Re: TCPMUX (RFC 1078) status

2013-08-21 Thread Joe Touch



On 8/21/2013 8:31 AM, Martin Sustrik wrote:

On 21/08/13 17:12, Joe Touch wrote:


The real problem here IMO is how to distinguish between adding a
completely new application -- which should require approval process --
and adding a new component within an existing distributed application
-- which should be managed by devs themselves.


IMO it's easy - any group of services you want others to be able to use
independently could justify a new port, but you can always mux them all
together if you want to avoid additional firewall configuration issues.


So what would you use for muxing, if TCPMUX is not a good idea?


You need to roll your own. The requirements of systems vary widely, as 
do the costs/benefits of different approaches.


I listed a few before, but here's a more comprehensive list:
- service per message
demux based on message ID
use IPC (interprocess comm) to handoff internal
to your system

- service per connection
demux based on the first message in an
association (TCP or UDP), and either continue to
forward messages to a different process or handoff
the connection

- subservice on different ports
determine what subservice you want to initiate,
start it on an ephemeral port, and indicate the
port number in-band (e.g., as with FTP and others)

Given you want to keep things on a single port, the first two are 
probably more useful.


Joe


Re: TCPMUX (RFC 1078) status

2013-08-20 Thread Joe Touch



On 8/20/2013 5:35 AM, Martin Sustrik wrote:

If you want a multiplexer to serve different connections from a single
service port, you need a multiplexer server (tcpmux daemon, websockets,
whatever you want to call it).


Ack. The web server is a problem though, because you typically don't
have control of it. I.e. you cannot randomly plug-in your code into it.


You have control over a web server you install. Yes, that would eat one 
IP address, but there are a lot more IP addresses than port numbers 
(i.e., using a port to avoid using a separate IP address consumes the 
wrong resource).


However, see my other message - it's hard to recommend an approach when 
we don't understand the problem you're trying to solve.


Joe


Re: TCPMUX (RFC 1078) status

2013-08-16 Thread Joe Touch



On 8/15/2013 10:19 PM, Martin Sustrik wrote:

On 15/08/13 22:18, Joe Touch wrote:


Does anyone have any idea how widely is TCPMUX (RFC 1078) protocol
used?
Is it the case that there are inetd daemons in TCPMUX mode running
everywhere, or can it be rather considered a dead protocol?

Specifically, if I implement a new TCPMUX daemon how likely I am to
clash with an existing TCPMUX daemon listening on port 1?




It's in the FreeBSD inetd, among others, but to to my
knowledge, nobody actually turns it on. There are
probably security issues.


There are semantics issues to; see draft-touch-tcp-portnames-00 for
information (this is being revised for resubmission shortly, FWIW).


Nice, however, it requires changes to TCP stack, so even if it succeeds
it won't be a practical option for at least few years to come.


There have been other stack changes that have been deployed fairly quickly.

However, that's not relevant to the reason I cited the doc; the doc has 
a discussion of TCPMUX and its problems.


Joe


Re: TCPMUX (RFC 1078) status

2013-08-16 Thread Joe Touch



On 8/15/2013 10:38 PM, Martin Sustrik wrote:

On 16/08/13 03:23, Wesley Eddy wrote:


There are semantics issues to; see draft-touch-tcp-portnames-00 for
information (this is being revised for resubmission shortly, FWIW).


I totally agree.  In fact, in the update to the TCP roadmap [1], we
added TCPMUX to the section on Historic and Undeployed Extensions,
though it definitely bears further discussion than is currently in
the roadmap.  I think we should add a reference to your portnames doc
to explain why this should be Historic plus check a bit more to see if
the code that's out there is really being used or whether it's just
hanging out like a vestigal limb in the various inetd packages.

If it's fair to ask Martin ... I'm kind of curious why you might want
to be using it or think it sounds useful?  I think a lot of admins
would be concerned that it could be used to get around port-based
firewall rules, etc.


Ok, let me explain.

I am coming from enterprise messaging world (think of IBM MQ series,
JMS, ActiveMQ, RabbitMQ et c.)

Once I was participating on AMQP protocol development (now at OASIS).
So, what AMQP and other enterprise messaging products do is exposing a
message broker on a single TCP port, which then forwards messages to
any connected services. As can be seen, single open firewall port can be
used to access any internal service.


I don't understand that statement.

Services are currently indicated by the destination port. If there is 
only one destination port available, there is only one service provided 
- because very few services can be identified solely by in-band information.



That being obviously the *wrong* way to do things, I've written ZeroMQ
later which takes the strict approach: If you want to expose a new
service, you have to use a separate TCP port number.

Since then it turned out that this as a limitation that people are most
complaining about.


It would be useful if you could be more specific about the problem you 
are trying to solve.


So far I hear people want one port that serves multiple services. I'd 
like a pony ;-) I.e., just because they want it, doesn't mean it either 
makes sense or should get it.



Now, the reason seems to be that ZeroMQ requires you to use different
TCP connections for doing different kinds of stuff to avoid head-of-line
blocking et c. (think of SCTP channels simulated via TCP)


Different connections don't have anything to do with the use of a single 
port. A single port can serve multiple connections, and yes - that's a 
useful way to avoid HOL blocking.



What that means is that you have a lot of fine-grained services and as
the development of your application proceeds you add more of them,
remove them and so on.

That in turn requires admins (and the corporate approval process!) to
get into the deployment cycle and open the TCP ports as appropriate. The
result is that the development basically grinds to halt.


That sounds a lot like the desires of admins is in conflict with the 
desires of your users. I.e., an admin that wants to block anything they 
don't explicitly allow WANTS to block this sort of mechanism too.



The solution IMO is to preserve the port-based services functionality
for those that truly care about security and -- optionally -- support
some kind of multiplexer such as TCPMUX for those that care more about
short deployment cycle.


TCPMUX won't do what you're asking - if you're asking to block based on 
the service type. If it did, then the sysadmin would just block TCPMUX 
connections to services they didn't know, and you'd be right back where 
you are now (i.e., without TCPMUX).


Again, what is the goal?

(note: the goal of the portnames approach is NOT to provide a single 
multiplexing port; it's to decouple the dest port's two uses - demux 
info and service identifier. the primary reason for portnames is to 
allow more than 65K concurrent/timewait connections to a single service; 
FWIW, I cited it because of its description of the limitations of 
TCPMUX, not because the approach there was relevant here).



That being said, IIRC, there's such functionality in WebSockets as well.
Open a connection to fixed pot (80) and particular URL (string), then
after the initial negotiation, switch to raw TCP mode and hand the
connection to whatever application is suppose to handle it. The reason I
don't like that solution is that you have to have web server installed
to work as a multiplexer, which is kind of strange.


If you want a multiplexer to serve different connections from a single 
service port, you need a multiplexer server (tcpmux daemon, websockets, 
whatever you want to call it).


Joe


Re: TCPMUX (RFC 1078) status

2013-08-15 Thread Joe Touch



On 8/10/2013 12:29 PM, Wesley Eddy wrote:

On 8/10/2013 1:43 AM, Martin Sustrik wrote:

Hi all,

Does anyone have any idea how widely is TCPMUX (RFC 1078) protocol used?
Is it the case that there are inetd daemons in TCPMUX mode running
everywhere, or can it be rather considered a dead protocol?

Specifically, if I implement a new TCPMUX daemon how likely I am to
clash with an existing TCPMUX daemon listening on port 1?




It's in the FreeBSD inetd, among others, but to to my
knowledge, nobody actually turns it on.  There are
probably security issues.


There are semantics issues to; see draft-touch-tcp-portnames-00 for 
information (this is being revised for resubmission shortly, FWIW).


Joe


Re: Bringing back Internet transparency

2013-08-01 Thread Joe Touch



On 8/1/2013 2:16 AM, Simon Leinen wrote:

For the first couple of years that I had an ISP connection (which soon
had an early NAT box on it), whenever I called up the ISP (then, and
still, one of the largest in the US) with a service call, the first
thing I had to do was unplug the NAT box and plug in a host directly!



I don't think your anecdote contradicts Joe's claim.

In the eyes of your ISP, you were misbehaving, because you were
violating their assumption that you would use ONE (1) computer with that
connection.  If you had been what they consider an honest citizen, you
would have gotten a commercial connection to connect more than one.


Another data point is Google's recent reversal on network transparency 
focused on artificially differentiating between perceived commercial 
and individual customers:


http://www.listbox.com/member/archive/247/2013/07/sort/time_rev/page/1/entry/4:390/20130731102314:B16998B8-F9EC-11E2-AF78-DB9DE151F03B/

My experience has been that there are four ways ISPs try to break the 
Internet's assumption that all nodes are equivalent (any port, any 
time, any where, IMO), with:


1. asymmetric BW provisioning and throttling

2. NATs

3. short-lease DHCP (i.e., spinning IP addrs every day or
faster, to interfere with registering an assigned IP in the DNS)

4. legal means

ISPs use a combination of these, but the cheapest one is NATs.

Joe


Re: Bringing back Internet transparency

2013-07-30 Thread Joe Touch



On 7/30/2013 5:17 AM, Roland Bless wrote:

Hi,

my impression from several presentations seen this week at the IETF
as well as at the ISOC Panel on Improving Internet Experience
is that we probably need to do something on reducing the number
of _broken_ middleboxes (or their implementations respectively)
- I'm not focusing on NAT boxes here.


Hmm. I don't know what a non-broken middlebox is then ;-)

Joe


Re: Bringing back Internet transparency

2013-07-30 Thread Joe Touch



On 7/30/2013 6:23 AM, Noel Chiappa wrote:

The IETF doesn't have a police force, or any enforcement mechanism. If we're
going to head off these boxes, the only tool we have to do that is to build
better mousetraps - i.e. design stuff that does what people want, is more
cost-effective, and is better than these local 'point deployment' boxes.


Although I appreciate the sentiment, what people want (ISP operators, 
or at least some of them), was an artificial way to differentiate home 
customers from commercial providers.


I.e., they wanted to create a differentiation that wasn't part of the 
Internet architecture, so they put one in.


NATs did other things (reuse addresses, block services, etc.), but IMO 
mostly as a by-product of this primary motivation.


It's very hard to do what people want when what they want is to defeat 
the core concept of the architecture - that all endpoints are 'equal'.


Joe



Re: Hugh Daniel has passed away

2013-06-06 Thread Joe Touch

Paul Wouters p...@cypherpunks.ca writes:


Hugh Daniel passed away on June 3rd after what appears to have been a
heart attack.


I met Hugh many years ago when we were working on our overlay system, 
and had problems integrating it with FreeS/WAN's IPsec implementation.


And yes, I too remember the LED lights. He correlated wavelength with 
clue - the shorter the wavelength, the higher you stood in his view, 
AFAIR.


--

He visited my office about 12 years ago - unannounced, as was more 
typical than not. After talking at length, he invited me to dinner with 
a group of his friends in a nearby town. I mentioned that I was 
'closing' on a house in that same town, and would show him after dinner.


He rolled up just under a large tree and parked on the street. I asked 
him why he picked that location, and he said it was because his friend 
was three lots up the street, and this was the closest vacant spot.


He had parked directly at my new house.

Through him I met a very interesting sci-fi writer, Renfair frequenter, 
and food historian that evening, among others, at a restaurant I walk 
past nearly every day.


His contributions to my six degrees was sincerely appreciated and will 
be missed.


Joe


Re: When to adopt a WG I-D

2013-06-04 Thread Joe Touch



On 5/30/2013 7:59 AM, Paul Hoffman wrote:

On May 29, 2013, at 11:53 PM, Adrian Farrel adr...@olddog.co.uk wrote:


I can also see potential for adding some info to the Tao, but the danger there 
is that document becomes too big and too detailed to be of use.


Many would claim it already is. We discussed that here a few years ago, and informally decided 
too long was better than too short and with a lot of pointers to other documents 
that needed to be read.


Is this a tutorial?


Mainly. To quote...

  NOTE:This draft is intentionally non-normative.  It is meant as a
  guide to common practice, rather than as a formal definition of
  what is permissible.

Proposal: maybe don't do this as an Internet Draft, but do it as a tutorial.


Or in the TAO, which is fairly clearly non-normative even when issued as 
an RFC.


:-)

Joe


Re: When to adopt a WG I-D

2013-05-29 Thread Joe Touch
This doc seems more useful as a section of an update to the TAO of the 
IETF. I agree with Brian that putting it forth as a separate document 
may give the unintended impression that this is the formal procedure.


Joe

On 5/28/2013 1:26 PM, Brian E Carpenter wrote:

On 28/05/2013 21:32, Adrian Farrel wrote:

Hi,

Dave Crocker and I have this little draft [1] discussing the process and 
considerations for creating formal working group drafts that are targeted for 
publication.

We believe that this may help clarify some of the issues and concerns 
associated with this part of the process. We are targeting this as 
Informational (i.e. commentary on existing process, not new normative 
definition of process) and would like your input.

What is not clear?
What have we got wrong?


I haven't read the draft yet, and *before* I do so, I'd like to express
some doubt whether we should even informally describe this using the
word process. It seems to me that it's each WG's prerogative how it
does this; it has no impact on the standards process as a whole. The
word adopt doesn't even occur in RFC 2418, and it is not used in
the context of WG adoption in RFC 2026.

In other words, I don't think this action is part of the standards process.
It's WG folklore.

Brian


How should we resolve the remaining editor notes?

Thanks,
Adrian
(per pro Dave)

[1] http://www.ietf.org/internet-drafts/draft-crocker-id-adoption-02.txt


.



Re: When to adopt a WG I-D

2013-05-29 Thread Joe Touch



On 5/29/2013 10:36 AM, Dave Crocker wrote:

On 5/29/2013 7:31 PM, Joe Touch wrote:

This doc seems more useful as a section of an update to the TAO of the
IETF. I agree with Brian that putting it forth as a separate document
may give the unintended impression that this is the formal procedure.


Nevermind that it isn't standards track or BCP and that it says quite
explicitly that it isn't normative?


Yes, nevermind that. ;-)


Just the mere fact that it's a separate document will somehow impart
and implication of official normativeness?


Yes, to some - especially newbies who don't know the process. Except 
that's exactly whom you're trying to reach.


Consider yourself a newbie who has been told that the TAO gives all the 
informal information on how the IETF works. Then you find out about this 
doc. Wouldn't you wonder why it was treated separately? Was it that 
important? Was it not informal enough for the TAO?


There's a lot of nuance here, but overall, I said what I meant - it 
would give the *unintended* *impression* of something beyond what I 
think is the goal.


Joe


Re: When to adopt a WG I-D

2013-05-29 Thread Joe Touch



On 5/29/2013 10:51 AM, Dave Crocker wrote:

On 5/29/2013 7:42 PM, Joe Touch wrote:

Yes, to some - especially newbies who don't know the process. Except
that's exactly whom you're trying to reach.

Consider yourself a newbie who has been told that the TAO gives all the
informal information on how the IETF works.


OK.  So your premise is that someone has been given seriously flawed
guidance and based on that we need to fear their misunderstanding of
things?


My premise is that when introducing people to a new game, it makes sense 
to keep things simple and in one place p the TAO.


You can continue to disagree with that if you prefer.

Joe


Re: When to adopt a WG I-D

2013-05-29 Thread Joe Touch



On 5/29/2013 11:56 AM, Dave Crocker wrote:

On 5/29/2013 7:57 PM, Joe Touch wrote:


My premise is that when introducing people to a new game, it makes sense
to keep things simple and in one place p the TAO.

You can continue to disagree with that if you prefer.


I haven't disagreed with doing that.  I disagreed with saying that that
document contains everything they need to know.


Agreed, but if we have more to say, it would be useful to keep it in a 
single place - esp. given we have that vehicle for doing so.



Entirely different semantics to the two statements.

I think it's a dandy starting document.  But it's a really crappy 'last'
document.


Good reason to make it better, rather than fracturing that sort of info, 
though.



And by the way, the draft that's been put forward isn't just for
beginners...


Nor is the TAO, AFAICT, either.

Joe



Re: call for ideas: tail-heavy IETF process

2013-05-15 Thread Joe Touch



On 5/14/2013 5:53 PM, Ted Lemon wrote:

On May 14, 2013, at 8:27 PM, Joe Touch to...@isi.edu wrote:

That is what happens exactly because the DISCUSS holds up the
document, and most ADs don't want to burn time stalling their documents
if there's a way around that delay.


It can only happen if an author values getting their document
through  the process more than getting it right, in which case one has to wonder
why they tried to publish the document in the first place. (I assume you
meant authors, not ADs above).


No; there are times when the document authors are pressured by ADs to do 
anything to resolve pending DISCUSSes, rather than stand up to the fact 
that the issue is either incorrect or the DISCUSS is invalid.



The IESG processes documents quite
quickly; I don't think it's valid to say that there is some terrifying
stall in the document process as a result of the IESG, such that an
author needs to chew off their leg to finally get the thing through.


Well, there are IESG members who stand their ground even when it's 
incorrect, such as:


- claiming that determining WG consensus is up to the AD,
then repeatedly demanding evidence of that consensus

- failing to drop a DISCUSS even when it meets their own
criteria

Those hold up a document too, as you should know (these are examples 
from your review of my doc). As does demanding a document revision while 
there remain open ballot positions, as was done today - on this 
document, to address your pending DISCUSS.


Joe



Re: call for ideas: tail-heavy IETF process

2013-05-15 Thread Joe Touch



On 5/14/2013 4:57 PM, Joel M. Halpern wrote:

And your bottom line is exactly what te rules say, what I said, what Ted
said, and what Joe agreed is reasonable.


Unfortunately, it's not what happens/is happening right now.

Joe


Re: call for ideas: tail-heavy IETF process

2013-05-15 Thread Joe Touch



On 5/14/2013 4:03 PM, Ted Lemon wrote:

The whole point of a DISCUSS is to have a discussion.


The *whole* point of a DISCUSS is to hold a document in IETF review 
until a discussion is *resolved*.


There are thus three parts:
- having a discussion
- pausing the document
- waiting for resolution

Nothing limits the IESG to having a discussion by issuing a DISCUSS; 
they can issue COMMENTs in any position and simply ask for a dialogue.


Because DISCUSS includes these other properties, it influences authors 
to make changes simply to make a DISCUSS go away, due to pressure by the 
IESG or their own ADs.


That's why they need to be used only where that pressure is appropriate 
and not inappropriate; that's the reason there are both DISCUSS and 
NON-DISCUSS criteria, and why it's very important for those in IESG 
review to hold the IESG to that distinction.


Joe


Re: call for ideas: tail-heavy IETF process

2013-05-15 Thread Joe Touch



On 5/14/2013 9:54 PM, Keith Moore wrote:

Publishing broken or unclear documents is not progress.

Keith


Broken, agreed.

Unclear, nope - please review the NON-DISCUSS criteria, notably:

The motivation for a particular feature of a protocol is not clear 
enough. At the IESG review stage, protocols should not be blocked 
because they provide capabilities beyond what seems necessary to acquit 
their responsibilities.


The DISCUSS isn't there to make documents better - that's for 
COMMENTs. A DISCUSS there to catch a set of problems and to *block* the 
document's progress until that problem is resolved.


Joe


Re: call for ideas: tail-heavy IETF process

2013-05-15 Thread Joe Touch



On 5/14/2013 10:05 PM, Keith Moore wrote:
...

For that matter, working groups are too often echo chambers where a set
of people manage to isolate themselves from input from those whose work
they might otherwise effect.Some people seem to think that working
group output should be sacrosanct.   There's absolutely no reason to
believe that.  WGs often make technical mistakes that are uncovered by
external review.   Even when no such mistakes are encountered, WG output
rarely represents rough consensus of all interested parties, and WGs
often fail to do due diligence in considering the interests of the broad
spectrum of those potentially affected by their work.

Of course IESG isn't infallible either, and shouldn't behave as if it
is.  But review by experts from outside of the WG generally seems to
improve the IETF's output.


Sure, but note that there is a specific NON-DISCUSS criteria on this point:

Disagreement with informed WG decisions that do not exhibit problems 
outlined in Section 3.1 (DISCUSS Criteria). In other words, disagreement 
in preferences among technically sound approaches.


Finding technical mistakes is good, but imposing the IESG's preferred 
technical solution over the WG's preference is inappropriate, but happens.



As important as the DISCUSS criteria are, there are NON-DISCUSS
criteria that ought to be more carefully followed - including the
point that disagreements with the WG or clarifications are not
justification for DISCUSS.


Strongly disagree.  First, DISCUSS only means that there's something the
AD wants to discuss.


As noted in another post, it means hold this doc until the DISCUSS is 
resolved. Discussions can happen as a result of COMMENTs in any IESG 
position.



 In particular, disagreements with the WG about
technical quality are always appropriate for IESG to raise.


Yes.


same is
true of requests for clarification.


Sometimes - there's a specific NON-CRITERIA about clarification, however:

The motivation for a particular feature of a protocol is not clear 
enough. At the IESG review stage, protocols should not be blocked 
because they provide capabilities beyond what seems necessary to acquit 
their responsibilities.



Ted pointed out that DISCUSS doesn't mean the IESG doesn't like a
document - agreed, but it *does* hold up a document until the IESG
member clears it.


But there are also procedures within IESG to ignore a single DISCUSS
vote.   So ultimately it takes multiple DISCUSS votes to hold up a
document indefinitely.


Those procedures take time, so even a single DISCUSS holds things up.


DISCUSS is a heavyweight mechanism that holds up document resolution;
it should be used only where absolutely appropriate. If the IESG wants
to have a discussion with the authors, they are welcome to
participate in the WGs or IETF LC, or to contact them out of band.


DISCUSS is not supposed to be a heavyweight mechanism, and actually it's
hard to imagine a lighter weight mechanism that gives IESG review any
weight.


Oh, I'm not suggesting removing the DISCUSS mechanism.

First, it ought to have a new name - one that makes clear that this is 
heavyweight. Perhaps HOLD FOR REVISION, which is the net effect it 
already has.


The key bug is that the IESG can't easily issue a question without 
casting a ballot position, but that may also be a feature. It might be 
useful to be able to issue a QUESTION withouth changing a ballot 
position, though.


 Informal communication doesn't generally work well in practice

because it lacks transparency, and it can cause additional delay without
resolving the problem.   Voting DISCUSS puts pressure on BOTH the AD and
the WG to resolve the issue.


Which is appropriate only when the IESG should have the right to force 
that resolution, and when the path to that resolution is sufficiently 
clear. If there is no path, then vote NO. If forcing resolution and 
putting pressure isn't warranted, issue a COMMENT on any other ballot 
position.


Joe


Re: call for ideas: tail-heavy IETF process

2013-05-15 Thread Joe Touch



On 5/15/2013 7:55 AM, Ted Lemon wrote:

On May 15, 2013, at 10:41 AM, Keith Moore mo...@network-heretics.com wrote:

The motivation for a particular feature of a protocol is not
clearenough. At the IESG review stage, protocols should not be blocked
because they provide capabilities beyond what seems necessary to acquit
their responsibilities.


I strongly disagree with what the NON-DISCUSS criteria say.
DISCUSS isn't just for blocking documents. And document quality is
as important (in the sense that poor document quality can lead to
as many interoperability or other problems) as technical
correctness.


The interpretation of this particular NON-DISCUSS criterion that Joe
has given is simply wrong. The key word to pay attention to to see the
error is motivation. The point of this criterion is to eliminate a
very specific sort of stall that has been known to happen in the past:
the stall where the AD doesn't understand why the document is being put
forward at all, and therefore blocks the document until the authors
explain the motivation behind the document to the satisfaction of the AD
who is holding the DISCUSS.


I'm impressed that you have such a specific interpretation that this
criteria refers to the entire document, even when it talks about the
feature of a protocol.

So now we're supposed to accept your interpretation of this rather than 
the explicit text?



This is a real issue that has created real problems in the past, and
that is why it is in the NON-DISCUSS criteria.   But this criterion
_does not_ mean that a criticism that the document itself is unclear
is not a valid reason to hold a DISCUSS on it.


Agreed - this does not refer to the document. It refers to a specific 
feature of a protocol.



In fact, it's an
excellent reason to hold a DISCUSS on it.   A lack of clarity in a
document can result in it being implemented incorrectly, or in the
case of a BCP, interpreted incorrectly.


I agree that THESE are good reasons for a DISCUSS, but simply not being 
clear is NOT.



Or in extreme cases, not
read at all.


There's nothing you can do about that; RFCs are not read all the time.

Joe



Re: call for ideas: tail-heavy IETF process

2013-05-15 Thread Joe Touch



On 5/15/2013 10:15 AM, Ted Lemon wrote:

On May 15, 2013, at 12:36 PM, Joe Touch to...@isi.edu wrote:

I'm impressed that you have such a specific interpretation that this
criteria refers to the entire document, even when it talks about the
feature of a protocol.


The motivation for a feature of a protocol is not clear enough.
What's ambiguous or subject to interpretation about that? The commentary
exactly echoes what I said. This does not mean that all lacks of clarity
are not DISCUSS criteria: only that a lack of clarity with respect to
motivation is not.


And yet that is the precise issue of your pending DISCUSS on my current 
document.


You don't agree that the motivation for the difference between using 
16-bit vs. 32-bit ExIDs is sufficient, even though that is already 
discussed in the document.


Joe


Re: call for ideas: tail-heavy IETF process

2013-05-15 Thread Joe Touch



On 5/15/2013 11:08 AM, Ted Lemon wrote:

On May 15, 2013, at 1:23 PM, Joe Touch to...@isi.edu wrote:

You don't agree that the motivation for the difference between using 16-bit vs. 
32-bit ExIDs is sufficient, even though that is already discussed in the 
document.


I don't think this is a topic that the IETF as a whole is likely to
find very interesting. However, if anyone is curious, they are welcome
to read the DISCUSS here and see if they agree with your
characterization of my question:
http://datatracker.ietf.org/doc/draft-ietf-tcpm-experimental-options/ballot/

For those who may be interested, the last sentence of the first
paragraph is the motivation for this being a DISCUSS position (as
opposed to a comment).


Which is I think that using a 4-byte ExID runs a real risk of
overflowing the available space in the TCP header in real-world 
circumstances.


Except that the document already describes the ExID as either 16-bit or 
32-bit:


All ExIDs MUST be either 16-bits or 32-bits long.

Motivation for the additional two bytes is already explained in the 
document in several places, notably:


   The second two bytes serve as a magic number.
...
   Using the additional magic number bytes helps the option contents
   have the same byte alignment in the TCP header as they would have if
   (or when) a conventional (non-experiment) TCP option codepoint is
   assigned. Use of the same alignment reduces the potential for
   implementation errors, especially in using the same word-alignment
   padding, if the same software is later modified to use a
   conventional codepoint. Use of the longer, 32-bit ExID further
   decreases the probability of such a false positive compared to those
   using shorter, 16-bit ExIDs.
...
   Use of the longer, 32-bit ExID consumes more
   space, but provides more protection against false positives.

Which is why I feel this motivation isn't sufficient for a DISCUSS.

I'd be glad to hear others' view of this as well.

Joe





Re: call for ideas: tail-heavy IETF process

2013-05-15 Thread Joe Touch



On 5/15/2013 7:49 AM, Ralph Droms wrote:

The DISCUSS isn't there to make documents better - that's for COMMENTs. A 
DISCUSS there to catch a set of problems and to*block*  the document's progress until that 
problem is resolved.



I'll agree with you *if*  you consider an unclear description of a
feature of a protocol, severe enough that reader of the specification
are not able to build interoperable implementations, as a problem for
which a DISCUSS can be posted.

In my opinion, there are many ways in which document can be unclear
beyond the motivation for a particular feature of a protocol is not
clear enough.

- Ralph


Absolutely. Note that issues interfering with interoperability or 
correctness are among the explicit DISCUSS criteria.


Joe




Re: call for ideas: tail-heavy IETF process

2013-05-14 Thread Joe Touch

Brian, et al.,

On 5/14/2013 1:10 PM, Brian E Carpenter wrote:

I think this exchange between Cullen and Ted says it all, except
for one tweak: the IESG is allowed, even encouraged, to apply common
sense when considering the DISCUSS criteria. They are guidance,
not rules.

Also, everybody needs to take the word discuss literally. An
entirely possible outcome is that after discussion, the AD says
Oh. You're correct. Pretend I never spoke!. Or the author says
Oh. You're correct. We'll change it. Either outcome is good.


The trouble with this assumption is the IESG review process.

COMMENTS are appropriate for feedback, but the IESG review process is 
too often considered an *opportunity* for the IESG to make the document 
better, or (in some case) have an opportunity for their input.


As important as the DISCUSS criteria are, there are NON-DISCUSS criteria 
that ought to be more carefully followed - including the point that 
disagreements with the WG or clarifications are not justification for 
DISCUSS.


Ted pointed out that DISCUSS doesn't mean the IESG doesn't like a 
document - agreed, but it *does* hold up a document until the IESG 
member clears it.


That can - has - and is - being used as leverage to force changes to 
documents that are sometimes clearly out of scope (e.g., listed as 
NON-DISCUSS).


DISCUSS is a heavyweight mechanism that holds up document resolution; it 
should be used only where absolutely appropriate. If the IESG wants to 
have a discussion with the authors, they are welcome to participate in 
the WGs or IETF LC, or to contact them out of band.


Joe


Re: call for ideas: tail-heavy IETF process

2013-05-14 Thread Joe Touch



On 5/14/2013 10:18 AM, Dave Crocker wrote:

And a Discuss should be required to assert which criteria apply and how.


+1

Joe


Re: call for ideas: tail-heavy IETF process

2013-05-14 Thread Joe Touch



On 5/14/2013 1:59 PM, Stephen Farrell wrote:


Joe,

On 05/14/2013 09:45 PM, Joe Touch wrote:

As important as the DISCUSS criteria are, there are NON-DISCUSS criteria
that ought to be more carefully followed - including the point that
disagreements with the WG or clarifications are not justification for
DISCUSS.


I had assumed that the term discuss-criteria meant [1] which includes
both. Not sure if that's also what you meant but worth adding the URL
here just in case some folks aren't familiar with it.

[1] https://www.ietf.org/iesg/statement/discuss-criteria.html


DISCUSS is a heavyweight mechanism that holds up document resolution;


Agreed. But its a keystone in the current process. So getting
rid of it would be fairly revolutionary. (Not that I'm against
a bit of revolving now and then:-)


I am *not* suggesting getting rid of it.

I *am* suggesting that it needs to be used only where necessary, and 
that 'necessary' ought to be clearly proved by:


- citing the specific DISCUSS criteria involved

- providing explicit information on what would
be required to clear the DISCUSS


it
should be used only where absolutely appropriate.


s/absolutely appropriate/appropriate/ would be better.


If the IESG wants to
have a discussion with the authors, they are welcome to participate in
the WGs or IETF LC, or to contact them out of band.


With our current tail-heavy process, and ~100 WGs that's impossible
in almost all cases.


The NON-DISCUSS criteria imply that DISCUSS is not an opportunity for 
late input. I appreciate that early input isn't practical, but that does 
NOT provide a rationale for violating the NON-DISCUSS criteria 
(technical disagreement with the WG, etc. - see the list).


The IESG can offer its advice in COMMENTS in other positions. It can 
make suggestions, and let the authors and ADs decide what to do.


But it should NEVER hold a document hostage with a DISCUSS without 
specific merit.


Since some of you asked, here's a *current* example:

--

Ted Lemon issued a DISCUSS on a doc I have pending - here's the link:

http://datatracker.ietf.org/doc/draft-ietf-tcpm-experimental-options/ballot/

Note that his DISCUSS raises the point that 32-bit ExIDs don't add 
value and are pointless (despite having several paragraphs of 
justification in the doc). That's second-guessing the WG, which is 
listed among the explicit NON-DISCUSS criteria.


There's no clear no collateral damage to the Internet, just damage to 
those who might use a longer TCP option, and there are implementations 
that already use this (as well as other TCP options that are much less 
frugal in their use of option space). It affects only shared use of 
experimental option codepoints, a situation that's intended to be 
transient if an option becomes widely used. The choice of 32-bit ExIDs 
has pros and cons listed in the doc, and both 16-bit and 32-bit ExIDs 
are allowed.


Right now, he's waiting for the doc to be changed to recommend 16-bit 
ExIDs. I don't disagree with that suggestion, but is it really 
appropriate to hold a document hostage using a DISCUSS this way?


I don't think so.

I questioned this process, and he suggested that debating the validity 
of a DISCUSS was out of scope during IESG review. That's not acceptable 
to me, and I hope to others.


Joe


Re: call for ideas: tail-heavy IETF process

2013-05-14 Thread Joe Touch



On 5/14/2013 3:00 PM, Joel M. Halpern wrote:

It seems to me that if it is really a discussion, then there may be many
possible things which could resolve it, and the AD raising the question
may not know exactly what is feasible to clear it.  Otherwise it is a
demand, not a discussions.  And in my experience while ADs can be pushy
(like the rest of us), they are generally prepared to have discussion.

Thus, I find your second item below to be inappropriate.

At the same time, discussions do have to be resolvable.  If there is no
way to address it, then it is not a discuss.  But required to clar is
the wrong picture as far as I can tell.


Point taken - at least some indication on what is expected to be changed 
toward a path of resolution.


As you note, otherwise it's not a DISCUSS.

Joe



Yours,
Joel

On 5/14/2013 5:12 PM, Joe Touch wrote:

I am *not* suggesting getting rid of it.

I *am* suggesting that it needs to be used only where necessary, and
that 'necessary' ought to be clearly proved by:

 - citing the specific DISCUSS criteria involved

 - providing explicit information on what would
 be required to clear the DISCUSS


Re: call for ideas: tail-heavy IETF process

2013-05-14 Thread Joe Touch



On 5/14/2013 4:03 PM, Ted Lemon wrote:

If the authors think that the goal is to please the AD, something's
wrong.  This would suggest that they will just do what the AD says
without debate, which is exactly the wrong thing.  The whole point of
a DISCUSS is to have a discussion.   Frankly, it's pretty
disrespectful both to the AD and to the working group if the authors
make changes to please the AD.


That is what happens exactly because the DISCUSS holds up the document, 
and most ADs don't want to burn time stalling their documents if there's 
a way around that delay.


If the suggestion is a suggestion, then change your DISCUSS to some 
other position, and issue the suggestion as a COMMENT. Yes, that's both 
general advice and specific to the case we have pending, Ted.


Joe


Re: The Purpose of WG participants Review (was Re: Purpose of IESG Review)

2013-04-22 Thread Joe Touch



On 4/19/2013 2:02 AM, Yoav Nir wrote:

Only that you know enough people so that you could push a new technology even 
without attending,


IETF work officially happens on IETF lists, not at in-person meetings.

As per the Tao of the IETF: Any decision made at a face-to-face meeting 
must also gain consensus on the WG mailing list.


Team-building is also useful, but not necessary, and also can happen 
off-list and at other non-IETF meetings.


Joe


Re: Purpose of IESG Review

2013-04-15 Thread Joe Touch



On 4/15/2013 7:23 AM, Ted Lemon wrote:


So it's hard to see the harm in [late non-area input by the IESG],


It gives the IESG an exemption to participating in WG and IESG last call 
processes, which then frustrates the rest of the community that does not 
have this opportunity.


It says that the opinion of the IESG is more important than that of the 
WG; we should be judging ideas on their own merit, not their origin.


Joe


Re: Purpose of IESG Review

2013-04-15 Thread Joe Touch

On Apr 15, 2013, at 9:09 AM, Ted Lemon ted.le...@nominum.com wrote:

 On Apr 15, 2013, at 11:36 AM, Joe Touch to...@isi.edu wrote:
 It gives the IESG an exemption to participating in WG and IESG last call 
 processes, which then frustrates the rest of the community that does not 
 have this opportunity.
 
 You could equally say that the IETF last call frustrates the WG process, 
 since a document can fail IETF last call, and this can be extremely 
 frustrating for working groups.   Witness the fiasco in the MIF working group 
 when they tried to advance a DHCP route option, for example.

IETF LC does not come with a list of constraints of what is in and not in scope.

 The IETF last call process is important, but it's not a panacea.   Too many 
 documents come through the last call process for each one to get thorough 
 review by every IETF participant.   The IESG are effectively the sacrificial 
 lambs of the IETF who have to read every single document on the IETF track 
 that makes it through last call.

If docs get out of WG LC with no review, then there's a failure of IETF 
process. Every such doc should be read at least by a few independent reviewers, 
by the WG chairs, and by the ADs in that area.

The same failure can - and does - happen at the IESG level. We can continue to 
appoint groups with additional rounds of review, but IMO, they are scoped (and 
the IESG review guidance appears to back up that point).

Joe



Purpose of IESG Review

2013-04-11 Thread Joe Touch

Hi, all,

As an author who has had (and has) multiple documents in IESG review, 
I've noticed an increasing trend of this step to go beyond (IMO) its 
documented and original intent (BCP 9, currently RFC 2026):


   The IESG shall determine whether or not a specification submitted to
   it according to section 6.1.1 satisfies the applicable criteria for
   the recommended action (see sections 4.1 and 4.2), and shall in
   addition determine whether or not the technical quality and clarity
   of the specification is consistent with that expected for the
   maturity level to which the specification is recommended.

Although I appreciate that IESG members are often overloaded, and the 
IESG Review step is often the first time many see these documents, I 
believe they should be expected to more clearly differentiate their 
IESG Review (based on the above criteria) - and its accompanying 
Position ballot, with their personal review.


My concern is that by conflating their IESG position with their personal 
review, the document process is inappropriately delayed and that 
documents are modified to appease a small community that does not 
justify its position as representative.


How do others feel about this?

Joe


Re: Purpose of IESG Review

2013-04-11 Thread Joe Touch



On 4/11/2013 11:55 AM, Paul Hoffman wrote:

On Apr 11, 2013, at 10:54 AM, Joe Touch to...@isi.edu wrote:


As an author who has had (and has) multiple documents in IESG review, I've 
noticed an increasing trend of this step to go beyond (IMO) its documented and 
original intent (BCP 9, currently RFC 2026):

   The IESG shall determine whether or not a specification submitted to
   it according to section 6.1.1 satisfies the applicable criteria for
   the recommended action (see sections 4.1 and 4.2), and shall in
   addition determine whether or not the technical quality and clarity
   of the specification is consistent with that expected for the
   maturity level to which the specification is recommended.

Although I appreciate that IESG members are often overloaded, and the IESG Review step is 
often the first time many see these documents, I believe they should be expected to more 
clearly differentiate their IESG Review (based on the above criteria) - and 
its accompanying Position ballot, with their personal review.

My concern is that by conflating their IESG position with their personal 
review, the document process is inappropriately delayed and that documents are 
modified to appease a small community that does not justify its position as 
representative.

How do others feel about this?


That it is too vague to comment on?

Please point to specific examples where you feel an IESG member's review went 
beyond determining the technical quality or clarity of the specification. That 
would help make the sure-to-be ensuing flamefest more light-filled.


I've already done that within the IESG; the point of the message wasn't 
to have dozens of opinions of whether my feedback was beyond scope, but 
whether others were getting that feeling as well. At least first...


Joe


Re: question about draft-touch-tcp-ao-nat

2013-04-10 Thread Joe Touch

Hi, Nevil (and the IETF list, now).

This is my third attempt at requesting clarification about the status of 
this document. I have been trying to reach you since November.


Since you have not responded to any of my previous posts, I'm cc'ing the 
IETF list, which I sincerely hope you track.


For the IETF list - if anyone knows why these sort of questions are not 
being answered, please post.


Thanks,

Joe

On 3/20/2013 10:05 AM, Joe Touch wrote:

Hi, Nevil,

I sent this message back in November; the current version addresses all
received comments. I do not know of any pending comments that have not
been addressed.

Can you please clarify the change of state yesterday from None to
Response to Review Needed?

AFAICT, the doc has been ready to go into final processing for nearly 4
months now...

Joe

On 11/28/2012 3:19 PM, Joe Touch wrote:

Hi, Nevil,

An update draft-touch-tcp-ao-nat-04 has been submitted and should appear
in the drafts directory shortly.


(the remainder has been deleted for brevity)


Re: Less Corporate Diversity

2013-03-22 Thread Joe Touch



On 3/22/2013 4:43 AM, Margaret Wasserman wrote:
...

Granted, it may be that the list of _qualified_ candidates is less
diverse than the set of all people who are willing to run. But, if so,
that isn't because there aren't companies who are willing/able to

  ^

support candidates..


If you define diversity as many different *companies*, sure.

There are organizations besides companies that used to participate in 
the IETF more.


Joe


Re: Appointment of a Transport Area Director

2013-03-06 Thread Joe Touch



On 3/5/2013 2:52 PM, Henning Schulzrinne wrote:

While the IETF is unique in many ways, the staff-volunteer issue
isn't all that unique. Many organizations face this. As one example,
organizations like IEEE and ACM struggle with this. (For example,
they have, over the years, delegated many functions in conference
management that used to be done by volunteers to paid staff.) Even
government regulatory bodies operate with a mixture of volunteer
labor (advisory councils) and paid staff. The solution space seems
rather constrained:

...

(2) Pay the person a salary while on leave from their home
institution/employer. As an example, NSF and DARPA do this for their
program managers. The employer still takes a hit and there's some risk
to the person that they won't get their job back, but it allows a larger
number of individuals to participate.


In the US government version of this (IPA), the person remains 
officially an employee of their home institution; it's a grant/contract 
to the home institution.


So I would break this into two sub-categories:

a) pay the person while on leave

b) pay the home institution for the person's work as a
contract/grant
(this is closer to how the NSF, DARPA, and other
US govt visiting positions work)

They work out quite differently; the latter means you're paying 
overhead, and can be quite costly but might be more attractive.


Joe


Re: Appointment of a Transport Area Director

2013-03-05 Thread Joe Touch



On 3/4/2013 2:19 PM, Dave Crocker wrote:



...

  ADs do not 'lead' the work of their area.  They do not initiate
the work, produce the charters or write the specifications.  Work that
fails or succeeds does so because it has community consensus and demand,
not because an AD was diligent or clever.  The job of an AD is to
facilitate community efforts, not to direct them.


ADs also comprise the IESG, which reviews RFCs before publication.

We should not expect to appoint IESG members that need a tutorial on 
basic protocol principles. Further, if the TSV AD can't stand up for 
cong control and other TSV-specific work or TSV-specific concerns raised 
on other drafts, then who will?


Joe


Re: Appointment of a Transport Area Director

2013-03-05 Thread Joe Touch



On 3/5/2013 10:33 AM, Dave Crocker wrote:

Joe,

On 3/5/2013 10:28 AM, Joe Touch wrote:

On 3/4/2013 2:19 PM, Dave Crocker wrote:



...

  ADs do not 'lead' the work of their area.  They do not initiate
the work, produce the charters or write the specifications.  Work that
fails or succeeds does so because it has community consensus and demand,
not because an AD was diligent or clever.  The job of an AD is to
facilitate community efforts, not to direct them.


ADs also comprise the IESG, which reviews RFCs before publication.

We should not expect to appoint IESG members that need a tutorial on
basic protocol principles. Further, if the TSV AD can't stand up for
cong control and other TSV-specific work or TSV-specific concerns raised
on other drafts, then who will?



If you can explain how your note relates to mine, I'd appreciate it.


I took your point as suggesting that an AD could get by with less 
background because they weren't leaders. In the past, ADs have either 
been people who do lead, or have led in the recent past.


If that's not your intent, I still stand by my post as relating to the 
overall thread, but apologize for any confusion.


Joe


Re: Internet Draft Final Submission Cut-Off Today

2013-02-26 Thread Joe Touch

On 2/26/2013 11:23 AM, joel jaeggli wrote:

On 2/26/13 11:12 AM, Michael Tuexen wrote:

On Feb 26, 2013, at 8:01 PM, Dale R. Worley wrote:


From: James Polk jmp...@cisco.com

Personally, I'd trust date -u much sooner than any random person.
Even better:

$ date --date='00:00 Feb 26, 2013 UTC'
Mon Feb 25 19:00:00 EST 2013
$

Requires a Unix like system...

Finding the current time in UTC could reasonably  be left as an exercise
for the reader...


It could be posted on the Internet Draft submission tool page, including 
a countdown clock too, if you really want useful  ;-)


Then again, having these deadlines at all is a bit silly.

It just forces authors to informally distribute updates directly on 
the list, and cuts off access to work that doesn't need to happen in 
sync with an IETF meeting.


Joe


Re: Internet Draft Final Submission Cut-Off Today

2013-02-26 Thread Joe Touch



On 2/26/2013 11:47 AM, Marc Petit-Huguenin wrote:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 02/26/2013 11:39 AM, Joe Touch wrote:

On 2/26/2013 11:23 AM, joel jaeggli wrote:

On 2/26/13 11:12 AM, Michael Tuexen wrote:

On Feb 26, 2013, at 8:01 PM, Dale R. Worley wrote:


From: James Polk jmp...@cisco.com

Personally, I'd trust date -u much sooner than any random
person. Even better:

$ date --date='00:00 Feb 26, 2013 UTC' Mon Feb 25 19:00:00 EST
2013 $

Requires a Unix like system...

Finding the current time in UTC could reasonably  be left as an exercise
for the reader...


It could be posted on the Internet Draft submission tool page, including a
countdown clock too, if you really want useful  ;-)

Then again, having these deadlines at all is a bit silly.

It just forces authors to informally distribute updates directly on the
list, and cuts off access to work that doesn't need to happen in sync with
an IETF meeting.


Something like documents published less than two weeks before a WG session
cannot be discussed in this session would be better.  Also, slides published
less than one week before a WG session cannot be used in this session.


That's fine, though it still puts minor mods in the same class as 
complete revisions.


Maybe we need a two-tiered numbering system, e.g., major revs cannot 
occur less than two weeks before a meeting where they will be discussed, 
but minor mods are OK up to 48 hours in advance.


:-)

Joe


Re: back by popular demand - a DNS calculator

2013-02-15 Thread Joe Touch



On 2/15/2013 12:19 AM, Stephane Bortzmeyer wrote:

On Thu, Feb 14, 2013 at 03:02:48PM -0800,
  Joe Touch to...@isi.edu wrote
  a message of 16 lines which said:


By popular request, I've restored the DNS calculator function as an
operational service.


Why no delegation from postel.org? It is not really DNS if you have to
use an explicit name server.


I don't follow your logic.

FYI, postel.org entries are hosted on a hidden master DNS server 
inside the postel.org domain on a research host. The public masters for 
that domain are hosted elsewhere on production machines.


The response you got below is because the public masters hadn't caught 
up. I'm checking on why that hasn't happened, but in the meantime (as 
per the web page) you can go directly to the hidden master:


dig @dns.postel.org ANY 3.4.add.calc.postel.org

Joe



% dig @128.9.160.161 ANY 3.4.add.calc.postel.org


;  DiG 9.7.3  @128.9.160.161 ANY 3.4.add.calc.postel.org
; (1 server found)
;; global options: +cmd
;; Got answer:
;; -HEADER- opcode: QUERY, status: NXDOMAIN, id: 30695
;; flags: qr aa rd; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; WARNING: recursion requested but not available

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags: do; udp: 4096
;; QUESTION SECTION:
;3.4.add.calc.postel.org.   IN  ANY

;; AUTHORITY SECTION:
postel.org. 15  IN  SOA dns.postel.org. 
touch.postel.org. 2013021402 60 30 1209600 15

;; Query time: 195 msec
;; SERVER: 128.9.160.161#53(128.9.160.161)
;; WHEN: Fri Feb 15 09:19:33 2013
;; MSG SIZE  rcvd: 98



Re: back by popular demand - a DNS calculator

2013-02-15 Thread Joe Touch



On 2/14/2013 3:07 PM, Marco Davids (Prive) wrote:

Op 15-02-13 00:02, Joe Touch schreef:


By popular request, I've restored the DNS calculator function as an
operational service. See:

http://www.isi.edu/touch/tools/dns-calc.html


Great! But I was hoping it would do DNSSEC by now.

Like Bert's  tool has been doing for ages:

dig 2.3.*.2.+.rp.secret-wg.org TXT +dnssec

http://bert.secret-wg.org/Tools/index.html


I'd be glad to know how long that's been up (mine was posted in 2001 for 
the Sigcomm OO session). AFAICT, that web page was put up in 2003, but 
I'd be glad to hear otherwise.


Some key differences, FWIW:

- my variant returns the response as an IP address,
rather than inside a TXT record (there's a point to
that, as per the OO slides posted on the page above)

- the Bert version uses DNS strings that aren't valid
(*, +, ',', ++)

- my variant has a static number of entries (40,003).
That's intentional to avoid potential impact on
DNS caches.

Joe


Re: back by popular demand - a DNS calculator

2013-02-15 Thread Joe Touch



On 2/15/2013 2:06 PM, Patrik Fältström wrote:

On 15 feb 2013, at 18:19, Joe Touch to...@isi.edu wrote:


- the Bert version uses DNS strings that aren't valid
(*, +, ',', ++)


Are we going to open again the question whether the DNS protocol can handle any 
value in the octets, as compared to the hostname definition that says something 
more limited? ;-)

Patrik


Let's just say that there doesn't appear to be disagreement that the DNS 
can handle a-z/0-9/'-'.


Other values _may or may not_ be permitted or handled opaquely in the 
lookup, AFAICT. It remains a question AFAICT.


Joe




Re: back by popular demand - a DNS calculator

2013-02-15 Thread Joe Touch



On 2/15/2013 3:17 PM, John C Klensin wrote:



--On Friday, February 15, 2013 14:10 -0800 Joe Touch
to...@isi.edu wrote:


Let's just say that there doesn't appear to be disagreement
that the DNS can handle a-z/0-9/'-'.

Other values _may or may not_ be permitted or handled opaquely
in the lookup, AFAICT. It remains a question AFAICT.


Joe,

Except for IDNs (or labels starting with xn-- more
specifically), for which there are special rules, it appears to
me that the spec is _extremely_ clear that a lookup operation
that fails to deal with those other values in labels
--including even properly-escaped embedded . characters -- is
unambiguously non-conforming.


Seems clear to me:

RFC1035:

The labels must follow the rules for ARPANET host names.  They must
start with a letter, end with a letter or digit, and have as interior
characters only letters, digits, and hyphen.  There are also some
restrictions on the length.  Labels must be 63 characters or less.

--

If any label were allowed, then why does IDN conversion go so far out of 
its way to exclude particular strings, e.g., those beginning/ending with 
'-' and encodes everything 0..7F into a-z/0-9?


(I was focused on looking up A records given FQDNs)

Joe


back by popular demand - a DNS calculator

2013-02-14 Thread Joe Touch

Hi, all,

By popular request, I've restored the DNS calculator function as an
operational service. See:

http://www.isi.edu/touch/tools/dns-calc.html

(this was designed for a Sigcomm OO session, but it's been used several
places as an example why the DNS should NOT be anything more than a
mapping service)

Joe

PS - if you do happen to use it as an example, please do drop me a note;
I'd be very glad to track that info. and/or include a pointer to any
classes that use it.


Re: FW: Last Call: draft-farrell-ft-03.txt (A Fast-Track way to RFCwith Running Code) to Experimental RFC

2013-01-28 Thread Joe Touch



On 1/28/2013 3:12 AM, Stephen Farrell wrote:


On 01/28/2013 04:27 AM, Joe Touch wrote:


...

If this is an experiment, then you presumably answers to the following
questions:

 1- what is your an hypothesis?
 2- what you intend to measure?
 3- what is your 'control' against which to compare the results?
 4- what is your objective metric for success/failure?


Well, its not a scientific experiment, and nor does it need to
be. Quoting 3933:

-A statement of the problem expected to be resolved is
   desirable but not required (the intent is to keep the firm
   requirements for such an experiment as lightweight as possible).
   Similarly, specific experimental or evaluative criteria, although
   highly desirable, are not required -- for some of the process
   changes we anticipate, having the IESG reach a conclusion at the
   end of the sunset period that the community generally believes
   things to be better (or worse) will be both adequate and
   sufficient. 

My take is that even though 3933 says desirable a couple of
times there, it's probably best to not go there, at least in this
case, but for now probably more generally. The reason I think
that is that I reckon the IETF has got itself into a log-jam
that almost prevents us from modifying our processes in any way
and every additional word provides additional barriers to doing
anything, since there'll always be someone for whom those added
words raise what seems to them to be a red flag.


Lightweight != vacuous.

Perhaps the lack of the discussion of these issues is part of the reason 
so many previous proposals have not been tried.


That isn't a reason to ignore those issues here. But a bigger concern is 
your reasoning as presented in this response:



I've heard only one hypothesis - that this reduces time to publication.
I disagree that this is a useful hypothesis to test for the following
reasons:

 - time to publication isn't a goal of the IETF
 IMO, any doc that isn't useful in 5 years ought
 to not be published here; we don't need to
 document every sneeze


IMO reduced time to publication is definitely *a* goal.
I've heard lots of IETF participants complain about how
long things take, lots of times. Perhaps you're in the
rough on that. (I also note that this experiment doesn't
actually aim for any major reduction in time to publication
as it says in the draft.)


There are plenty of places where existing process is in a logjam. My 
experience over the past 15 years is most of the delay happens during 
the following:


- changes in the IETF process where ideas like this throw
a wrench into the process, and create confusion

I had a few informational docs wait over a year
in the queue because a process change was put
into effect before the necessary boilerplate
was resolved.

-- this has a *simple* solution. Grandfather everything that
has been submitted to a given queue to changes in that queue's
process.

- IESG review, during which issues are often raised that
were addressed during WG review that are then re-hashed,
even though they are not relevant to the area of their
appointment

Overlapping community review has no impact on either of these.


The draft itself also discusses reasons why running code
might also lead to better quality specifications.


No disagreement there, but better quality doesn't mean the doc 
wouldn't still need - and substantively benefit from - serial review in 
increasingly larger communities.



 - thorough review ought to be a requirement
 and this 'experiment' potentially compromises that
 by reducing the overall time of review


I think the likelihood of that doing damage during the
experiment is very small.


Damage =
- publishing ideas not sufficiently vetted
that later need to be updated/errata'd

- wasting the community's time by having a
large group review an issue that could have been
addressed and corrected within a smaller community

Do you seriously think these concerns should outweigh a few weeks of 
reduced time to publication?



In addition, I might be wrong,
but the thoroughness of review doesn't correlate that
well with the duration of review would be my guess.


I've heard many on this list - including myself - point out specific 
reasons why this should not be believed.


If still believe every process can be accelerated, I encourage you to 
review Brooks the Mythical Man Month.



Having this entire community burn cycles on this document speaks for
itself. It should have been vetted in a smaller, more invested community
first.


I'm following the 3933 process.



I don't know of any smaller but open venue for discussing rfc
3933 experiments. Perhaps there ought be such, but given how
rarely 3933 experiments

Re: FW: Last Call: draft-farrell-ft-03.txt (A Fast-Track way to RFCwith Running Code) to Experimental RFC

2013-01-27 Thread Joe Touch

About the idea of an experiment:

On 1/25/2013 5:07 AM, Stephen Farrell wrote:


Responses to some points below but I'd really like to ask
people to consider a few things here:

- what's proposed is an experiment, it'd likely get tried out
   a few times and won't consume any huge resource anywhere


If this is an experiment, then you presumably answers to the following 
questions:


1- what is your an hypothesis?
2- what you intend to measure?
3- what is your 'control' against which to compare the results?
4- what is your objective metric for success/failure?

I've heard only one hypothesis - that this reduces time to publication. 
I disagree that this is a useful hypothesis to test for the following 
reasons:


- time to publication isn't a goal of the IETF
IMO, any doc that isn't useful in 5 years ought
to not be published here; we don't need to
document every sneeze

- thorough review ought to be a requirement
and this 'experiment' potentially compromises that
by reducing the overall time of review

- community resources ought to be considered
and this 'experiment' burns group resources
due to having a broad group concurrently review
a doc that could have been reviewed by smaller
groups first

Given the limited cycles this community has to review docs, I cannot see 
a benefit to this experiment that is worth the cost.


Having this entire community burn cycles on this document speaks for 
itself. It should have been vetted in a smaller, more invested community 
first.


Calling something an 'experiment' doesn't make it worthwhile to test.

Joe




Re: TSV-DIR review of draft-ietf-6man-ipv6-atomic-fragments-03

2013-01-24 Thread Joe Touch
FWIW, this document includes text that somewhat defeats the previous 
recommendations of TCPM regarding RFC5927.


RFC5927 includes specific text indicating that the techniques described 
are being documented, but that the TCP standard was NOT being changed to 
include those ICMP validation checks.


This document states that:

  Many implementations fail to perform validation checks on the
  received ICMPv6 error messages, as recommended in Section 5.2 of
  [RFC4443] and [RFC5927].

I.e., the second RFC does NOT recommend changes; it documents them. This 
document should be VERY carefully reviewed to ensure that it does not 
undo the previous TCPM concerns about these techniques.


Joe


Re: TSV-DIR review of draft-ietf-6man-ipv6-atomic-fragments-03

2013-01-24 Thread Joe Touch



On 1/24/2013 1:24 PM, Fernando Gont wrote:

Joe,

On 01/24/2013 04:35 PM, Joe Touch wrote:

FWIW, this document includes text that somewhat defeats the previous
recommendations of TCPM regarding RFC5927.

RFC5927 includes specific text indicating that the techniques described
are being documented, but that the TCP standard was NOT being changed to
include those ICMP validation checks.

This document states that:

   Many implementations fail to perform validation checks on the
   received ICMPv6 error messages, as recommended in Section 5.2 of
   [RFC4443] and [RFC5927].


Are we fine if I remove and [RFC5927]? -- Because RFC4443 does
recommend that ICMPv6 messages be validated.


Sure.


I.e., the second RFC does NOT recommend changes; it documents them. This
document should be VERY carefully reviewed to ensure that it does not
undo the previous TCPM concerns about these techniques.


We can remove and [RFC5927] or change it to ...Section 5.2 of
[RFC4443] and documented in [RFC5927]


That might do it, but it would be useful if another pair of eyes would 
check.


Joe



Thoughts?

Thanks,



Re: TSV-DIR review of draft-ietf-6man-ipv6-atomic-fragments-03

2013-01-24 Thread Joe Touch
Thanks - I wasn't positive about the second one. Glad to have it 
resolved quickly.


Joe

On 1/24/2013 5:57 PM, Allison Mankin wrote:

Joe and Fernando,

I just looked at how RFC 5297 is handled in the draft, to be that other
pair of eyes.

The first fix is right, to remove reference to RFC 5297 from that
sentence entirely.

Allison

On Jan 24, 2013 7:19 PM, Joe Touch to...@isi.edu
mailto:to...@isi.edu wrote:
 
 
 
  On 1/24/2013 1:24 PM, Fernando Gont wrote:
 
  Joe,
 
  On 01/24/2013 04:35 PM, Joe Touch wrote:
 
  FWIW, this document includes text that somewhat defeats the previous
  recommendations of TCPM regarding RFC5927.
 
  RFC5927 includes specific text indicating that the techniques described
  are being documented, but that the TCP standard was NOT being
changed to
  include those ICMP validation checks.
 
  This document states that:
 
 Many implementations fail to perform validation checks on the
 received ICMPv6 error messages, as recommended in Section 5.2 of
 [RFC4443] and [RFC5927].
 
 
  Are we fine if I remove and [RFC5927]? -- Because RFC4443 does
  recommend that ICMPv6 messages be validated.
 
 
  Sure.
 
 
  I.e., the second RFC does NOT recommend changes; it documents them.
This
  document should be VERY carefully reviewed to ensure that it does not
  undo the previous TCPM concerns about these techniques.
 
 
  We can remove and [RFC5927] or change it to ...Section 5.2 of
  [RFC4443] and documented in [RFC5927]
 
 
  That might do it, but it would be useful if another pair of eyes
would check.
 
  Joe
 
 
  Thoughts?
 
  Thanks,
 



Re: FW: Last Call: draft-farrell-ft-03.txt (A Fast-Track way to RFC with Running Code) to Experimental RFC

2013-01-22 Thread Joe Touch

Hi, all,

On 1/11/2013 8:21 AM, Adrian Farrel wrote:

Hi Alexa,

Please be aware of this document that has just entered a four-week IETF last
call. The document describes a proposed IETF process experiment under the rules
of RFC 3933.

The proposed experiment calls on the IETF Secretariat to take specific actions
under certain circumstances in corner cases of the experiment. C


This is a silly idea.

First, running code should already be considered as part of the context 
of review.


Second, running code is not correlated to correctness, appropriateness, 
or safety. See Linux for numerous examples.


Third, running code doesn't mean the doc is sufficient that multiple 
parties can generate interoperable instances. It's merely the sound of 
one hand clapping ;-)


Finally, NOTHING should circumvent the multi-tiered review process. That 
process helps reduce the burden on the community at large via the 
presumption that smaller groups with more context have already reviewed 
proposals before they get to the broader community.


This is a bad idea even as an experiment.

Joe


Re: FW: Last Call: draft-farrell-ft-03.txt (A Fast-Track way to RFC with Running Code) to Experimental RFC

2013-01-22 Thread Joe Touch



On 1/22/2013 9:00 AM, Stephen Farrell wrote:


Hi Joe,

On 01/22/2013 04:39 PM, Joe Touch wrote:

...

This is a silly idea.


So you're in two minds about it eh:-)



First, running code should already be considered as part of the context
of review.

Second, running code is not correlated to correctness, appropriateness,
or safety. See Linux for numerous examples.

Third, running code doesn't mean the doc is sufficient that multiple
parties can generate interoperable instances. It's merely the sound of
one hand clapping ;-)


Your second and third and points seem opposed to your first.
The latter ones imply that running code is useless, the first
one says its not.


I never said useless; I explained several ways in which it alone is 
correlated to any of the issues relevant to speeding up the review process.


Multiple interoperable implementations helps ensure a doc sufficiently 
describes a protocol - nothing less, but also NOTHING MORE.



I don't believe any of us have any quantitative basis on which to
base assertions that this will improve or dis-improve our processes
or output, or be neutral. (Hence proposing it as an experiment.)


It takes more than an unknown to make an experiment. There has to be 
an hypothesis. Near as I can tell, yours is running code means it's OK 
to run concurrent review at multiple levels.


Please explain why you think that is true. I gave multiple reasons why 
it is not.



Finally, NOTHING should circumvent the multi-tiered review process. That
process helps reduce the burden on the community at large via the
presumption that smaller groups with more context have already reviewed
proposals before they get to the broader community.


I disagree with the shouted NOTHING - if there are non-silly
ways in which we figure we can improve our processes then we
ought be open to trying 'em out. You may or may not be right
that this is silly, but merely asserting that it is doesn't
make it so.

Being stuck with current processes or only ever adding more
review tiers would IMO be sillier than this proposal. But
that seems to be where we're mostly at.


OK, so let's try an experiment where authors with the first name 
Stephen pay everyone $1,000 to review their docs. It certainly hasn't 
been tried, so - by your metric - it's worth considering?


Some things are simply not.


This is a bad idea even as an experiment.


Sorry, I don't get the bad aspect - rhetoric aside, in what
way do you see running this experiment doing harm?


It puts more work on the community at large to review an idea that could 
have been either rejected or significantly improved in a smaller 
community before wasting the larger communities time.


This document is a prime example of such.

Joe


Re: A proposal for a scientific approach to this question [was Re: I'm struggling with 2219 language again]

2013-01-09 Thread Joe Touch

On 1/7/2013 6:01 PM, John Day wrote:

All standards groups that I am aware of have had the same view.  This is
not uncommon.

Although, I would point out that the TCP specification nor do most
protocols specifications of this type follow this rule.  State
transitions are not visible on the wire.  The rules for sliding window
are not described entirely in terms of the behavior seen on the line, etc.

I have seen specifications that attempted this and the implementations
built from them were very different and did not come close to
interoperating or in some cases of even doing the same thing.

In fact, I remember that we thought the new Telnet spec (1973) was a
paragon of clarity until a new site joined the Net that had not been
part of the commuity and came up with an implementation that bore no
relation to what anyone else had done.

This problem is a lot more subtle than you imagine.


+1

A protocol *is*:

- the states at the endpoints
- the messages on the wire
- a description of input events (message arrival, upper-layer
interface requests, timer expiration) that indicates
the subsequent change of state and output event
(message departure, upper layer indication,
or timers to set)

(i.e., a Mealy machine, attaching events to arcs)

The wire is the second of these, and entirely insufficient as a 
protocol spec.


Yes, there are two ways to try to write a protocol spec:
- procedural
defining the above explicitly
- behavioral
defining a protocol only from its external
behavior

The difference between these is easy to see for sort algorithms:

procedural:
quicksort
heapsort
etc.

behavioral:
sort

AFAICT, on the wire often implies behavioral equivalence, but it's a 
lot more complicated than just the on-wire messages. A behavioral 
description of a protocol would treat the protocol as a black box and 
explain its behavior under every possible input.


I'll take procedural descriptions of protocols over behavioral any day.

Joe


call for papers - IEEE From Research to Standards workshop

2012-12-12 Thread Joe Touch

Hi, all,

I'm helping disseminate the following CFP for a research to standards 
workshop at IEEE ICC 2013 in Budapest, Hungary. This meeting is directly 
soliciting the participation of various standards community members, 
including the IETF and IRTF.


Last year I spoke on a panel contrasting the IEEE, ITU, and IETF/IRTF.

I hope this might be of interest to some people on this list, and 
encourage you to consider submitting a paper on your experiences.


If you have any questions on this, please let me know.

Thanks, and apologies for any diversion,

Joe

--


CALL FOR PAPERS
   2nd IEEE Workshop On Telecommunications Standards
  “From Research to Standards”

   June 9-13, 2013, Budapest, Hungary
 Co-located with IEEE ICC 2013

   http://www.research2standards.net/

Paper abstract deadline Jan 4, 2013
Paper submission deadline Jan 11, 2013

Building on the success of the first edition of the IEEE Workshop on
Telecommunications Standards: From Research to Standards (which won
the Best IEEE ComSoc Workshop Award at IEEE ICC 2012), we are happy to
announce the organization of its second edition in Budapest, Hungary,
collocated with IEEE ICC 2013.

The goal of this Workshop is to bridge the gap between researchers,
scientists, and standards experts in both academia and industry and to
promote standardization as an important vehicle for information sharing
and cooperation between academia and industry. An additional goal is to
  bring together experts from different standardization bodies,
providing opportunities for closer understanding and collaboration;
catalyzing development of more interoperable standards and more
efficient and effective communication systems.

The Workshop technical program will deliver high quality technical as
well as visionary papers that will be reviewed and selected by an
international program committee representing both academia and industry
with a strong standardization background. All submissions are required
to comply with ICC’s guidelines. Accepted papers will appear in IEEE
Xplore.

Looking forward your submissions to the 2nd IEEE Workshop on
Telecommunications Standards: From Research to Standards.

Kind regards,

Workshop Official Website: http://www.research2standards.net

Workshop General Chair
• Dr. Tarik Taleb, NEC Europe, Germany
TPC co-Chairs
• Dr. Tuncer Baykas, Tohoku University, Japan
• Dr. Alex Reznik, InterDigital, USA
• Dr. Konstantinos Samdanis , NEC Europe, Germany
Publicity co-chairs
• Prof. Joe Touch, Univ. of Southern California, USA
• Dr. Periklis Chatzimisios, Alexander TEI of Thessaloniki, Greece

IMPORTANT DATES
PAPER REGISTRATION: Jan. 04, 2013 SUBMISSION DEADLINE: Jan. 11, 2013
ACCEPTANCE NOTIFICATION: Feb. 22, 2013 FINAL MANUSCRIPT: Mar. 08, 2013


Re: IETF work is done on the mailing lists

2012-11-27 Thread Joe Touch



On 11/27/2012 10:07 AM, Marc Blanchet wrote:


Le 2012-11-27 à 13:00, Barry Leiba a écrit :


So here's my question:
Does the community want us to push back on those situations?  Does the
community believe that the real IETF work is done on the mailing
lists, and not in the face-to-face meetings, to the extent that the
community would want the IESG to refuse to publish documents whose
process went as I've described above, on the basis that IETF process
was not properly followed?


no. Our work is done both on mailing lists and f2f meetings. As co-chair
of a few wg, we have been doing great progress during f2f meeting with
high-bandwidth interactions.


RFC2418 says that business happens in either place:

   ...
   All working group actions shall be taken in a public forum, and wide
   participation is encouraged. A working group will conduct much of its
   business via electronic mail distribution lists but may meet
   periodically to discuss and review task status and progress, to
   resolve specific issues and to direct future activities. ...

Overall, WG *decisions* are supposed to be consensus of the WG, not 
just those who happen to be present at a given meeting, so I would 
expect that such decisions would be confirmed on the mailing list even 
if initiated at a meeting. At most meetings I've attended, this is how 
action items were confirmed.


So my conclusion is that:
- activity/participation can happen in either place
- consensus should include mailing list confirmation

YMMV.

Joe


so document shepherd and AD should exercise judgement on how to see the
community consensus/participation.

Marc.



I realize that this question is going to elicit some vehemence.
Please be brief and polite, as you respond.  :-)

Barry, Applications AD




CFP - 2nd IEEE Workshop On Telecommunications Standards

2012-11-05 Thread Joe Touch

Hi, all,

The following is hopefully of interest to the IETF community.

Joe

--

   CALL FOR PAPERS
  2nd IEEE Workshop On Telecommunications Standards
 “From Research to Standards”

  June 9-13, 2013, Budapest, Hungary
Co-located with IEEE ICC 2013

  http://www.research2standards.net/

Paper abstract deadline Jan 4, 2013
Paper submission deadline Jan 11, 2013

Building on the success of the first edition of the IEEE Workshop on 
Telecommunications Standards: From Research to Standards (which won 
the Best IEEE ComSoc Workshop Award at IEEE ICC 2012), we are happy to 
announce the organization of its second edition in Budapest, Hungary, 
collocated with IEEE ICC 2013.


The goal of this Workshop is to bridge the gap between researchers, 
scientists, and standards experts in both academia and industry and to 
promote standardization as an important vehicle for information sharing 
and cooperation between academia and industry. An additional goal is to 
 bring together experts from different standardization bodies, 
providing opportunities for closer understanding and collaboration; 
catalyzing development of more interoperable standards and more 
efficient and effective communication systems.


The Workshop technical program will deliver high quality technical as 
well as visionary papers that will be reviewed and selected by an 
international program committee representing both academia and industry 
with a strong standardization background. All submissions are required 
to comply with ICC’s guidelines. Accepted papers will appear in IEEE Xplore.


Looking forward your submissions to the 2nd IEEE Workshop on 
Telecommunications Standards: From Research to Standards.


Kind regards,

Workshop Official Website: http://www.research2standards.net

Workshop General Chair
• Dr. Tarik Taleb, NEC Europe, Germany
TPC co-Chairs
• Dr. Tuncer Baykas, Tohoku University, Japan
• Dr. Alex Reznik, InterDigital, USA
• Dr. Konstantinos Samdanis , NEC Europe, Germany
Publicity co-chairs
• Prof. Joe Touch, Univ. of Southern California, USA
• Dr. Periklis Chatzimisios, Alexander TEI of Thessaloniki, Greece

IMPORTANT DATES
PAPER REGISTRATION: Jan. 04, 2013 SUBMISSION DEADLINE: Jan. 11, 2013 
ACCEPTANCE NOTIFICATION: Feb. 22, 2013 FINAL MANUSCRIPT: Mar. 08, 2013


Re: Draft IESG Statement on Removal of an Internet-Draft from the IETF Web Site

2012-09-21 Thread Joe Touch

Hi, Russ,

FWIW, you seem to be conveniently ignoring at least two issues:

1) all the IDs before March 1994
which should not be published at all until
permission is given (opt-in)

2) all the IDs published before boilerplate inclusion was required
the IETF cannot merely assert its rights;
authors need to consent (and if submission were consent
then the IEEE, ACM, et al. wouldn't need the
copyright transfer statements they regularly use)

Others have noted that click-based rights transfer may not be sufficient 
as well (the organizations above largely still use explicit signature 
agreements).


And, ultimately, this won't be determined by analysis, but by a court.

Joe

On 9/21/2012 1:28 PM, Russ Housley wrote:

I believe that the IETF has all of the necessary rights to reproduce, 
distribute, and display publicly all Internet-Drafts.  Here is my analysis:

In RFC 1310, March 1992, the IAB describes Internet-Drafts, but
it does not define the rights that contributors grant.  As best I can
determine, the very first I-D was posted shortly after this RFC
was published.

In RFC 1602, March 1994, the grant of rights becomes very
explicit:

Contributor agrees to grant, and does grant to ISOC, a
perpetual, non-exclusive, royalty-free, world-wide right
and license under any copyrights in the contribution to
reproduce, distribute, perform or display publicly and
prepare derivative works that are based on or incorporate
all or part of the contribution, and to reproduce,
distribute and perform or display publicly any such
derivative works, in any form and in all languages, and to
authorize others to do so.

In RFC 2026, BCP 9, October 1996, the explicit grant of rights
is published in a consensus BCP:

Some works (e.g. works of the U.S. Government) are not subject to
copyright.  However, to the extent that the submission is or may
be subject to copyright, the contributor, the organization he
represents (if any) and the owners of any proprietary rights in
the contribution, grant an unlimited perpetual, non-exclusive,
royalty-free, world-wide right and license to the ISOC and the
IETF under any copyrights in the contribution.  This license
includes the right to copy, publish and distribute the
contribution in any way, and to prepare derivative works that are
based on or incorporate all or part of the contribution, the
license to such derivative works to be of the same scope as the
license of the original contribution.

Internet-Drafts provide important historical records for the open and 
transparent operation of the IETF.  For this reason, removal of an I-D from the 
Public I-D Archive is a significant action.

If someone posted an I-D under RFC 1310, when the grant was not explicit, and 
they want to have their Internet-Draft removed from the Public I-D Archive, 
then they ought to request that action from the IESG.  However, RFC 1602 and 
RFC 2026 are quite clear about the grant.  The request for removal of an 
Internet-Draft posted after March 1994 needs to be associated with some legal 
action or some form of abuse.

Russ



Re: Draft IESG Statement on Removal of an Internet-Draft from the IETF Web Site

2012-09-21 Thread Joe Touch



On 9/21/2012 2:48 PM, Paul Hoffman wrote:

On Sep 21, 2012, at 1:54 PM, Joe Touch to...@isi.edu wrote:


And, ultimately, this won't be determined by analysis, but by a court.


These kinds of threats seem a bit over the top.


It was an observation, not a threat (at all).

No analysis of legal matters is ever decided until a court weighs in. 
Lawyers will say what they are willing to defend - pro and con - but 
their statements aren't fact. So even if they claim this is cut-and-dry, 
it isn't until case is decided.


Joe


Re: Draft IESG Statement on Removal of an Internet-Draft from the IETF Web Site

2012-09-21 Thread Joe Touch



On 9/21/2012 4:38 PM, John C Klensin wrote:

Joe,

While I've somewhat sympathetic to your position -- I don't
think the IETF should be supporting a public archival collection
of expired I-Ds, especially older ones, either-- I think you are
getting a little over the top.  Specifically...

--On Friday, September 21, 2012 13:54 -0700 Joe Touch
to...@isi.edu wrote:


Hi, Russ,

FWIW, you seem to be conveniently ignoring at least two issues:

1) all the IDs before March 1994
which should not be published at all until
permission is given (opt-in)


While I agree, I think that most of the reason for that has to
do with implicit or explicit IETF commitments to individuals
rather than legal constraints.  That is not to say the legal
constraints aren't there.  IANAL, much less a judge, and have no
opinion on that which anyone else should pay attention to.


IMO, the IETF should not set an example of post what you want, and take 
things down only on legal threat.


It's reasonable to post what the IETF has rights to. Posting things that 
the IETF *wants* but does *not* have explicit rights too seems a 
non-starter.



Suppose that, as a modified form of opt-out under the latest
proposed policy, you were to send a note to the IESG asking that
all of your old I-Ds be taken down from the public archive on
the grounds that having them public is abusive of commitments
you have good reason to believe were made to you.If the IESG
said nope, not abusive enough, you could then either appeal
(probably a more constructive way of airing things under our
rules than involving the legal process) or claim that the IETF
had no rights to keep a document posted to which you believe you
have retained copyright and get a DMCA take-down request issued.
Such a request would give the IESG and IETF Trust the
opportunity to consider how much risk they wanted to assume to
keep your documents posted and possibly to discuss that with the
community.  Sadly, they might consider the odds that you would
actually choose to sue in their risk assessment (see below).


I expect that might be what transpires here, but if we're in an 
organization that does that I would seriously reconsider writing future 
contributions.



That wouldn't let you made document availability decisions by
default for anyone else (e.g., by forcing opt-in), but would,
IMO, focus the discussion in a way that increasingly heated
comments on the IETF list would not.


Sure, having the IETF step on authors' rights certainly focuses the 
discussion. I sincerely hope this organization understands its 
responsibility to the community better, and respects the rights of 
others in its action (not merely the cost of legal entanglements).

...
And, ultimately, this won't be determined by analysis, but by
a court.


Well, it would be determined by a court only if someone felt
strongly enough about a particular document or set of documents
to go to the expense of going down that path.


Agreed; I'm only noting that this is all conjecture, not fact.

...

If no one feels mean-tempered enough to launch such a court
case, then the policy won't be settled by a judge, it will stand
because no one challenges it.


Perhaps. Perhaps those of us who feel the IETF is setting a bad example 
should just walk away. That solves the problem, right?


Joe


Re: Draft IESG Statement on Removal of an Internet-Draft from the IETF Web Site

2012-09-20 Thread Joe Touch



On 9/19/2012 3:31 PM, John Levine wrote:

In article 505a2b08.70...@isi.edu you write:



On 9/19/2012 11:24 AM, John Levine wrote:

Utility can determine whether it's worth the effort/expense to run a
public archive, but your utility never undermines my rights as an author.


We're very deep into Junior Lawyer territory here.


I'm not. I'm simply refuting *any* argument that starts with because
it's useful to the community.


Could you answer the question, please?  Are you saying that you are
unaware, or do not believe that you have already given the IETF a
permanent license for all of your I-Ds and all your other IETF
contributions, which means it can publish them any way it wants
whether you like it or not?


I definitely have IDs that predate the new policies, and did not 
transfer rights to the IETF for those.



This horse left the barn so long ago that the barn has long since
been torn down and replaced by a parking lot.


So could you answer this question - do you pirate DVDs too? That horse 
also left the barn, and presumably wild horses determine what you think 
is both legal and appropriate.


Joe





Re: Draft IESG Statement on Removal of an Internet-Draft from the IETF Web Site

2012-09-19 Thread Joe Touch



On 9/16/2012 6:56 AM, Lawrence Conroy wrote:
...

It is VERY useful to be able to search through drafts to see how we
got here, AND to see things that were explored and abandoned.


Thieves find it very useful to have what they steal. That doesn't 
legitimize their theft.


Utility can determine whether it's worth the effort/expense to run a 
public archive, but your utility never undermines my rights as an author.


Joe



Re: Draft IESG Statement on Removal of an Internet-Draft from the IETF Web Site

2012-09-19 Thread Joe Touch



On 9/19/2012 11:24 AM, John Levine wrote:

Utility can determine whether it's worth the effort/expense to run a
public archive, but your utility never undermines my rights as an author.


We're very deep into Junior Lawyer territory here.


I'm not. I'm simply refuting *any* argument that starts with because 
it's useful to the community.


There are other arguments - that lawyers will make - that depend on the 
particular boilerplate used, when the ID was published, whether 
click-based copyright transfer holds up, and so forth.


But utility doesn't drive the law. There are rights -rights of the 
author, and rights of the copyright holder - which are protected here, 
and they trump any perceived benefit to the community.


Joe


Re: Draft IESG Statement on Removal of an Internet-Draft from the IETF Web Site

2012-09-13 Thread Joe Touch



On 9/12/2012 11:01 PM, Martin Rex wrote:

While the 6-month timer (or any earlier I-D update!!) will, in fact,
change how the*IETF*  distributes and promotes a particular I-D (version),
there is actually*NO*  limitation in what folks downloading I-Ds
with the URLs from the i-d-announce  I-D Action: EMails do with
any of the I-Ds that they download.


At least one limitation is here:

c. Pre-5378 Material.  In some cases, IETF 
Contributions or IETF Documents may contain material from IETF 
Contributions or IETF Documents published or made publicly available 
before November 10, 2008 as to which the persons controlling the 
copyright in such material have not granted rights to the IETF Trust 
under the terms of RFC 5378 (“Pre-5378 Material”).  If a Contributor 
includes the legend contained in Section 6.c.iii of these Legal 
Provisions on such IETF Contributions or IETF Documents containing 
Pre-5378 Materials, the IETF Trust agrees that it shall not grant any 
third party the right to use such Pre-5378 Material outside the IETF 
Standards Process unless and until it has obtained sufficient rights to 
do so from the persons controlling the copyright in such Pre-5378 
Material.  Where practical, Contributors are encouraged to identify 
which portions of such IETF Contributions and IETF Documents contain 
Pre-5378 Material, including the source (by RFC number or otherwise) of 
the Pre-5378 Material.


Note that the standards process is defined in a way that includes 
archiving, but does not explicitly include publication:


b. IETF Standards Process.  The term IETF Standards 
Process has the meaning assigned to it in RFC 5378.  In addition, the 
IETF Trust interprets the IETF Standards Process to include the 
archiving of IETF Documents in perpetuity for reference in support of 
IETF activities and the implementation of IETF standards and specifications.


So it's not a slam dunk that you have the rights you think for every 
I-D; you definitely don't have those rights for IDs published before Nov 
10, 2008 since the copyright was not transferred to the ISOC/IETF or 
their Trustees.


Joe


Re: Draft IESG Statement on Removal of an Internet-Draft from the IETF Web Site

2012-09-13 Thread Joe Touch



On 9/13/2012 12:02 AM, Dave Crocker wrote:


On 9/12/2012 11:30 PM, John C Klensin wrote:

But nothing in the above, nor in the text you cite, requires
that _keep_ imply guarantee to have available for retrieval
over the network by any interested party, with no requirement
for a special request.



It's interesting how this line of analysis entirely ignores pragmatics.

It has been noted by a number of folk that public access has repeatedly
been demonstrated to be... useful.

That's why they were made accessible.

d/


PirateBay believes this too, and helps make movies available for public 
access, honoring pragmatics.


Good luck with that line of reasoning.

Joe


Re: Draft IESG Statement on Removal of an Internet-Draft from the IETF Web Site

2012-09-13 Thread Joe Touch

On 9/13/2012 12:28 PM, Martin Rex wrote:

Joe,



So it's not a slam dunk that you have the rights you think for every
I-D; you definitely don't have those rights for IDs


We're NOT talking about rights that were transfered from the document
author to arbitrary third parties here, but about rights that were
given to the IETF (IETF contribution), and which have never been
time-limited.


The expires term and corresponding entire text of the ID submissions 
guidelines suggest otherwise.



So archival and making accessible I-D contributions past the expiration
of an I-D is perfectly legal for the IETF, unless the I-D contains an
explicit copyright notice to the contrary (most I-Ds from 199x do not
seem to carry any copyright notice at all).


I've already pointed out text that, e.g., someone might use to make the 
case to the contrary.


Finally, in the US, lawyer isn't who would decide this; a jury would.


Where you are _correct_ is, copypasting parts of such an old I-D
or the whole document into new documents will in fact require contacting
the original author(s)/copyright holder(s) and obtain permission,
the Note Well provisions likely will not be sufficient, at least for those
old I-Ds. (it is not just a matter of courtesy, but a requirement).

I assume the latter is what rfc5378 is supposed to fix.


There are several variants of issues that apply, at least three I recall:

pre 1994
1994-2008
2008-now

This isn't the first time this issue has been discussed on this list.

RFC 5378 is intended to address reuse of material, as you suggest - not 
whether that material can be publicly posted.


Joe





Re: Draft IESG Statement on Removal of an Internet-Draft from the IETF Web Site

2012-09-13 Thread Joe Touch



On 9/13/2012 11:04 AM, Melinda Shore wrote:

On 9/12/12 11:19 PM, Joe Touch wrote:

PirateBay believes this too, and helps make movies available for public
access, honoring pragmatics.


I'm not sure I understand this analogy.  Are you saying that there are
IPR issues related to making expired drafts available?


Yes. Depends on the IDs, when they were authored, and which version of 
the boilerplate they contain.


Joe


Re: Draft IESG Statement on Removal of an Internet-Draft from the IETF Web Site

2012-09-13 Thread Joe Touch
There were times when there were no rights granted explicitly, at least. 
I indicated the three ranges in a previous mail.


Joe

On 9/13/2012 8:40 PM, John Levine wrote:

I'm not sure I understand this analogy.  Are you saying that there are
IPR issues related to making expired drafts available?


Yes. Depends on the IDs, when they were authored, and which version of
the boilerplate they contain.


Can you give a concrete example of an I-D with this problem?  I don't ever
recall a time when the grant of rights to the IETF had a time limit.

R's,
John



Re: Draft IESG Statement on Removal of an Internet-Draft from the IETF Web Site

2012-09-13 Thread Joe Touch

Note well, as you noted well, does not go back to the beginning of all IDs.

I.e., this is a tangled mess of different copyrights, different note 
wells, etc., and it's not as simple as it's the IETF's right to do 
anything except - maybe - going forward with a new copyright statement 
for IDs.




Joe

On 9/13/2012 10:10 PM, Martin Rex wrote:

Joe Touch wrote:


There were times when there were no rights granted explicitly, at least.
I indicated the three ranges in a previous mail.


In which case the Note Well concludently applies to the I-D contents,
which seems to have first appeared on www.ietf.org around 2001,

   http://web.archive.org/web/20010413091132/http://ietf.org/overview.html

and slightly extended in 2002:

   http://web.archive.org/web/20020605140239/http://ietf.org/overview.html

primarily refering to the IETF process described in rfc2026 section 10:

http://tools.ietf.org/html/rfc2026#section-10

   10.2, 10.3, 10.3.1 (2), 10.3.1 (5), 10.3.1 (7)


   10.3.1.  All Contributions

7. The contributor represents that there are no limits to the
   contributor's ability to make the grants acknowledgments and
   agreements above that are reasonably and personally known to the
   contributor.

   By ratifying this description of the IETF process the Internet
   Society warrants that it will not inhibit the traditional open and
*free access to IETF documents for which license and right have
*been assigned according to the procedures set forth in this
*section, including Internet-Drafts and RFCs. This warrant is
*perpetual and will not be revoked by the Internet Society or its
*successors or assigns.


So which specific part of including Internet-Drafts and RFCs
and This warrent is perpetual caused your impression that
there was a time-limit on an I-D contribution?

-Martin


btw. rfc2026 10.3.1 (2) looks like an explicit non-policy for dissemmination
or termination of dissemination to me:

2. The contributor acknowledges that the ISOC and IETF have no duty
   to publish or otherwise use or disseminate any contribution.


I would be OK with a single person from (IESG member or IETF Chair)
quickly decides about suspending dissemination of a document based on
personal judgement and that the IESG wiggles out by themselves an
informal procedure (rather than a formal policy) for safeguarding
the process (from bias and abuse).  This cuts into their time budget
and seems to not be a concerningly frequent occurence to spend
much polish on it at this point.



Re: Draft IESG Statement on Removal of an Internet-Draft from the IETF Web Site

2012-09-12 Thread Joe Touch



On 9/12/2012 5:59 PM, Martin Rex wrote:

Barry Leiba wrote:

This raises the question of what expires means.


At the least, if IDs are published publicly forever, then expires is no
longer meaningful and the entirety of that notion needs to be expunged
from the ID process.


You seem to think it means something like expunged from the record, and no
longer available for viewing.

I think it means no longer current for the purposes of work and
discussion.


I fully agree to the latter.

Expunging I-Ds that are older than 6 months looks like a silly idea
to me.  Nothing in Note Well indicates that an IETF contribution
that is not published as RFC or regurgitated as a successor I-D
will be automatically un-contributed from the IETF.


Nothing in the Note Well, but there is specific text in the ID 
Guidelines (written by the IESG):


http://www.ietf.org/ietf-ftp/1id-guidelines.txt

8.  Expiring

   An Internet-Draft will expire exactly 185 days from the date that it
   is posted on the IETF Web site (http://www.ietf.org/id-info/)
   unless it is replaced by an updated version (in which case the clock
   will start all over again for the new version, and the old version
   will be removed from the I-D repository), or unless it is under
   official review by the IESG (i.e., a request to publish it as an RFC
   has been submitted)...

I.e., this is not a matter of interpretation.

If you want to change the rules, then it cannot apply to past IDs unless 
authors give explicit permission, because the IETF would be changing the 
terms of this statement.


Joe


Re: Draft IESG Statement on Removal of an Internet-Draft from the IETF Web Site

2012-09-12 Thread Joe Touch

Hi, Barry,

On 9/12/2012 8:13 PM, Barry Leiba wrote:

I think it means no longer current for the purposes of work and
discussion.


Nothing in the Note Well, but there is specific text in the ID Guidelines
(written by the IESG):

http://www.ietf.org/ietf-ftp/1id-guidelines.txt

8.  Expiring

An Internet-Draft will expire exactly 185 days from the date that it
is posted on the IETF Web site (http://www.ietf.org/id-info/)
unless it is replaced by an updated version (in which case the clock
will start all over again for the new version, and the old version
will be removed from the I-D repository), or unless it is under
official review by the IESG (i.e., a request to publish it as an RFC
has been submitted)...

I.e., this is not a matter of interpretation.


'tis, apparently, because you are still interpreting it differently to how I am.

There's nothing in the quote above that says that the expired document
will not be available *in the archive*.


There's nothing that says it won't be available by Santa Claus delivery 
either. However, the document states how things will be made available, 
and how that will change upon expiration.



And then the statement you cite further goes on to say this:

An expired I-D may be unexpired when necessary to further the work of
the IETF, including IETF liaison with other standards bodies.  Such
action will be taken by request of an IESG member, a chair of the
working group associated with the I-D, or one of the document
authors.

That *clearly* implies that it's not *gone*, else how could it be
unexpired when necessary, by anyone's request?


Nobody is debating whether the IETF can/should have an archive. The 
question is whether that archive should be public - which effectively 
negates the concept of taking the doc out of the I-D repository.


And I see you selectively omitted the rest of that paragraph:

   Such a request may be overridden; e.g., a chair of the
   working group associated with the I-D will be notified if an author
   requests unexpiration and may request that the action not occur.
   This request should be sent to internet-dra...@ietf.org (using the
   suggested subject line Resurrect I-D filename) and should come
   from an author, a working group chair, or an IESG member.

I recognize the IETF might change this policy, but I want to be clear 
that I don't consider this is ambiguous to date.


If the IETF wants to put all old IDs on a public site, I consider that 
equivalent to unexpiration, and the authors must be given the right to 
opt-out.


Joe


Re: Draft IESG Statement on Removal of an Internet-Draft from the IETF Web Site

2012-09-10 Thread Joe Touch



On 9/10/2012 8:24 AM, David Borman wrote:
...

The original reason for expiring drafts, along with giving them long,
complicated names that includes the word draft, was to keep them
from being referenced as if they were standards, based on experience
gathered from the short lived IDEA document series.


It was also to encourage authors to post half-baked* ideas without 
having them persist - either as standards, or in general as something 
the author needed to continue to defend.


 I don't think

that having an archive of expired drafts weakens that original goal.


It weakens both goals. A key complaint has been that the doc disappears 
from an IETF site. Neither the length nor the name has been an impediment


Joe




Re: Draft IESG Statement on Removal of an Internet-Draft from the IETF Web Site

2012-09-08 Thread Joe Touch



On 9/8/2012 1:14 AM, Brian E Carpenter wrote:
...

The factual reality is that I-D's have always been more or less perpetual,
given that anonymous FTP has existed longer than any I-D.


It has always been the case that some sites have violated the copyright 
and explicit instructions of IDs.



The difference today is that we are sort-of admitting officially that
obsolete drafts can be found, and that this is useful.


Admitting that there is piracy is not the same as the IETF posting them 
publicly on their site.



The word expired is perhaps not ideal; obsolete or out of date would
perhaps be more precise, but it's probably too late to change it now.


Nothing about an ID is inherently obsolete or out of date after 6 months 
except its being publicly available on authorized sites (up until now).


If we remove that rule, then the notion of expiration is outdated.

If it's not too late to change the they are removed from the IESG site 
rule, it's absolutely not too late to remove the Expires: indication 
on all IDs published as we go forward.


Note - I don't agree that past IDs should be posted after expiration 
without the author's consent. They were submitted with that 
understanding, and post-facto changing it by the IETF is not appropriate.


Joe


Re: Draft IESG Statement on Removal of an Internet-Draft from the IETF Web Site

2012-09-08 Thread Joe Touch



On 9/8/2012 8:19 AM, Melinda Shore wrote:

On 9/7/12 7:58 PM, Joe Touch wrote:

What can that mean if it remains available to the public?  What
purpose does such an automatic timeout have if it is left up? IMO,
none.


It seems to me that the timeout takes the draft out of consideration.


A new draft supercedes that timeout.

And if they're useful, then you're admitting that continued discussion 
can occur after 6 months.


At which point there is no meaning to expiration. Any note regarding how 
long the discussion of a draft should occur would be on the mailing list 
anyway, and thus no longer would belong on the document.


---

I'm baffled by the notion that posting IDs forever is OK, but that 
simply removing the Expires statement is so controversial.


Joe


Re: Draft IESG Statement on Removal of an Internet-Draft from the IETF Web Site

2012-09-08 Thread Joe Touch



On 9/8/2012 11:59 AM, Melinda Shore wrote:

On 9/8/12 10:51 AM, Joe Touch wrote:

Nothing about an ID is inherently obsolete or out of date after 6 months
except its being publicly available on authorized sites (up until now).


I think this is absolutely incorrect.  Internet Drafts are IETF
documents, and expiration changes the relationship between the draft
and the IETF.  I have to say that I think it's terribly unprofessional
not to hang onto archival material


Draft != archival

Or do you keep copies of all versions of papers you publish, including 
the ones submitted for review? In case lawyers might need it, or for the 
benefit of the public?



and frankly it's in the interest
of the IETF as an *open* standards organization to keep archival
material accessible.


Agreed.


When you're working on a problem that's been around forever and
still hasn't been solved (like, oh, I dunno - firewall/NAT traversal?),
easy access to expired drafts is an enormous help.


The needs of the community - including the lawyers - do not outweigh the 
rights of the author or the agreement they make with the IETF to date.


The original point of having drafts expire seems to have been forgotten 
here. That's a pity. It did have a reason, and it was useful.



Would you be more comfortable if there were some sort of visual
flag that a draft had expired?


If you post it, it's not expired. There's no point in claiming otherwise.

Joe


Re: Draft IESG Statement on Removal of an Internet-Draft from the IETF Web Site

2012-09-07 Thread Joe Touch



On 9/5/2012 7:51 AM, SM wrote:
...

Creating a perpetual I-D archive for the sake of rfcdiff is not a good
idea as it goes against the notion of letting an I-D expire gracefully.


+1

Let's not forget there was a reason for expiration.

I'm OK with the archive being public so long as at least the authors can 
remove an ID *without needing to provide a reason*.


Yes, removal from the IETF site will not expunge copies from the entire 
Internet, but the IETF site should set the example here, and respect the 
original intent of allowing an ID to expire.


Joe


Re: Draft IESG Statement on Ethertype Assignments for IETF Protocols

2012-09-07 Thread Joe Touch

Hi, all,

This statement seems fine, but it's worth noting that it would apply 
only to  *IETF* protocol specs. The IESG has, IMO, no authority to make 
such claims for independent submissions (and what about IRTF ones?), and 
the IEEE should recognize that such protocols are described by RFCs too.


Joe

On 9/3/2012 5:02 PM, IETF Chair wrote:

The IESG is considering this IESG Statement.  Comments from the community are 
solicited.

On behalf of the IESG,
Russ

--- DRAFT IESG STATEMENT ---

Subject: Ethertype Assignments for IETF Protocols

The IEEE Registration Authority Committee (RAC) assigns Ethertypes.
(See http://standards.ieee.org/develop/regauth/ethertype/.)  Some IETF
protocol specification make use of Ethertypes.  Since Ethertypes are a
fairly scarce resource, the IEEE RAC will not assign a new Ethertype to
a new IETF protocol specification that needs one until the IESG has
approved the protocol specification for publication as an RFC.

To let the IEEE RAC know that the IESG has approved an IETF protocol
specification for publication, all future requests for assignment of
Ethertypes for IETF protocol specifications will be made by the IESG.

Note that playpen Ethertypes have been assigned in IEEE 802 [1] for use
during development and experimentation.


[1] IEEE Std 802a-2003 (Amendment to IEEE Std 802-2001).
IEEE standard for Local and Metropolitan Area Networks:
Overview and Architecture -- Amendment 1: Ethertypes for
Prototype and Vendor-Specific Protocol Development.




Re: Draft IESG Statement on Removal of an Internet-Draft from the IETF Web Site

2012-09-07 Thread Joe Touch



On 9/7/2012 8:32 AM, Brian E Carpenter wrote:

On 07/09/2012 15:48, Joe Touch wrote:

...

Let's not forget there was a reason for expiration.


Expired != invisible


Expired = no longer *published*.

IMO, the expires indication on an ID indicates the expiration of the 
ability of the ISOC to publish the draft.


So IMO the ISOC is then violating the terms of submission of a doc if it 
posts it publicly in perpetuity.


...

I think making it clear that the archive contains expired documents is
necessary, but expiry by obscurity isn't going to work.


It worked for a very long time. If you're now claiming it cannot work, 
you need to consider the potential effect on the ID process.


If IDs are published forever, ***WHY BOTHER WITH RFCS***?

Joe


Re: Draft IESG Statement on Removal of an Internet-Draft from the IETF Web Site

2012-09-07 Thread Joe Touch

PS - to note an astonishing concept:

On 9/7/2012 8:32 AM, Brian E Carpenter wrote:

On 07/09/2012 15:48, Joe Touch wrote:



On 9/5/2012 7:51 AM, SM wrote:
...

Creating a perpetual I-D archive for the sake of rfcdiff is not a good
idea as it goes against the notion of letting an I-D expire gracefully.


Speaking as a document reviewer for both Gen-ART and the Independent
Submission stream, and for that matter as a generic reviewer of various
WG documents, I consider the I-D archive to be an invaluable resource.
Looking back to see when a particular change was made can be quite
important.


It's not always about what is best for *you* or for other reviewers.

It's about what encourages a more open exchange of ideas.

If the community doesn't think that ID expiration serves that purpose 
anymore, fine. However, let's make this decision on *that* basis.


Joe


Re: Draft IESG Statement on Removal of an Internet-Draft from the IETF Web Site

2012-09-07 Thread Joe Touch



On 9/7/2012 8:56 AM, Dave Crocker wrote:



On 9/7/2012 8:45 AM, Joe Touch wrote:

It's not always about what is best for *you* or for other reviewers.


Actually, it is.  The documents are issued by the IETF to facilitate
public discussion.  It's the only reason to have the mechanism.


There are reasons not to have this too.

As I noted, if the IETF publishes IDs, why bother with RFCs?

What other publishing arena keeps its drafts public?

Joe



Re: Draft IESG Statement on Ethertype Assignments for IETF Protocols

2012-09-07 Thread Joe Touch

Hi, Ralph,

I agree with your assessment below, but historically the IETF guidelines 
work more smoothly when cases are spelled out rather than dealt with by 
omission. I think a few sentences being more explicit about what is not 
covered would be useful, esp. for the IEEE.


Joe

On 9/7/2012 9:15 AM, Ralph Droms wrote:


On Sep 7, 2012, at 10:51 AM 9/7/12, Joe Touch wrote:


Hi, all,

This statement seems fine, but it's worth noting that it would apply only to  
*IETF* protocol specs.


What did you have in mind as noting?  This text seems pretty clear to me as applying 
only to IETF protocol specifications:

   the IEEE RAC will not assign a new Ethertype to
   a new IETF protocol specification that needs one until the IESG has
   approved the protocol specification for publication as an RFC.




The IESG has, IMO, no authority to make such claims for independent submissions 
(and what about IRTF ones?), and the IEEE should recognize that such protocols 
are described by RFCs too.


Where do you see any such claims in this statement?  What would you change?

- Ralph



Joe

On 9/3/2012 5:02 PM, IETF Chair wrote:

The IESG is considering this IESG Statement.  Comments from the community are 
solicited.

On behalf of the IESG,
Russ

--- DRAFT IESG STATEMENT ---

Subject: Ethertype Assignments for IETF Protocols

The IEEE Registration Authority Committee (RAC) assigns Ethertypes.
(See http://standards.ieee.org/develop/regauth/ethertype/.)  Some IETF
protocol specification make use of Ethertypes.  Since Ethertypes are a
fairly scarce resource, the IEEE RAC will not assign a new Ethertype to
a new IETF protocol specification that needs one until the IESG has
approved the protocol specification for publication as an RFC.

To let the IEEE RAC know that the IESG has approved an IETF protocol
specification for publication, all future requests for assignment of
Ethertypes for IETF protocol specifications will be made by the IESG.

Note that playpen Ethertypes have been assigned in IEEE 802 [1] for use
during development and experimentation.


[1] IEEE Std 802a-2003 (Amendment to IEEE Std 802-2001).
IEEE standard for Local and Metropolitan Area Networks:
Overview and Architecture -- Amendment 1: Ethertypes for
Prototype and Vendor-Specific Protocol Development.






Re: Draft IESG Statement on Removal of an Internet-Draft from the IETF Web Site

2012-09-07 Thread Joe Touch



On 9/7/2012 9:21 AM, Dave Crocker wrote:
...

  And by the way, formally, I-D's are not published.  That's a
semantic point, but apparently it's important for this discussion.


At lease one of the ISOC's boilerplates states:

  This document may not be modified, and derivative works of it
  may not be created, and it may not be published except as an
^
  Internet-Draft.

The term published is used throughout the process.

Web postings are often considered published.

Joe


Re: Draft IESG Statement on Removal of an Internet-Draft from the IETF Web Site

2012-09-07 Thread Joe Touch



On 9/7/2012 11:37 AM, SM wrote:

At 08:43 07-09-2012, Joe Touch wrote:

IMO, the expires indication on an ID indicates the expiration of the
ability of the ISOC to publish the draft.


This raises the question of what expires means.


At the least, if IDs are published publicly forever, then expires is 
no longer meaningful and the entirety of that notion needs to be 
expunged from the ID process.


Joe


Re: Draft IESG Statement on Removal of an Internet-Draft from the IETF Web Site

2012-09-07 Thread Joe Touch


On Sep 7, 2012, at 7:36 PM, Barry Leiba barryle...@computer.org wrote:

  This raises the question of what expires means.
 
  At the least, if IDs are published publicly forever, then expires is no
  longer meaningful and the entirety of that notion needs to be expunged
  from the ID process.
 
 But you haven't addressed SM's comment. The point is that you and I have 
 different views of what it means for a draft to expire.
 
 You seem to think it means something like expunged from the record, and no 
 longer available for viewing.

I seem to think it means what it wk ways has.  The desire to change that is the 
basis of this thread. 

 I think it means no longer current for the purposes of work and discussion.

What can that mean if it remains available to the public?  What purpose does 
such an automatic timeout have if it is left up? IMO, none. 

 And I think those are very different things.  The fact that expired drafts 
 used to not be available for public viewing on the IETF site does not, by 
 itself, mean that that was or is the intent of expiration.

That is exact what it meant. Or are you claiming that it was a coincidence that 
this entire time that derafts were removed in sync with that expiry?

Joe

Re: Gen-ART LC Review of draft-ietf-mptcp-api-05

2012-08-17 Thread Joe Touch



On 8/13/2012 7:14 AM, philip.eard...@bt.com wrote:

Ben,
Thanks for your review.

The right status isn't clear-cut (I think), but when we (Chairs  Wes) 
discussed it, Info seemed best
* mainly because precedent seems to be that API docs are informational, for 
example socket API extensions for SCTP http://datatracker.ietf.org/doc/rfc6458/


This has been a big mistake in the past, IMO.

A key part of the definition of any protocol is its API. It is exactly 
as important as the on the wire component and the endpoint state and 
semantics of message exchanges.


See RFC793 for a great example. What we know as sockets there is 
basically a direct implementation of the *specified* API for TCP.


I can't argue that this document is a reason for the IETF to correct its 
past mistake, but the sooner it does the better. APIs ought to be a 
*mandatory* part of any protocol specification. As such, they should be 
at the same level as any other part of that spec (e.g.., standards track 
or experimental).


Joe


Re: Last Call: draft-ietf-intarea-ipv4-id-update-05.txt (Updated Specification of the IPv4 ID Field) to Proposed Standard

2012-08-13 Thread Joe Touch


On 8/13/2012 2:45 AM, Masataka Ohta wrote:
 Joe Touch wrote:
 
 Again, this doc is about updating the IPv4 ID specification in RFC791 -
 which has not yet been updated.
 
 But, the way you update rfc791 requires updating rfc2460,
 rfc2765 and their implementations, for which there is no
 consensus.

It certainly does not.

 That is, though your draft claims to more closely reflect
 current practice and more closely match IPv6, the way you
 update rfc791 does not reflect current practice nor match
 IPv6.

It does - it doesn't reflect the errors in IPv6-IPv4 translation, which
is not IPv6.

Joe


Re: Last Call: draft-ietf-intarea-ipv4-id-update-05.txt (Updated Specification of the IPv4 ID Field) to Proposed Standard

2012-08-07 Thread Joe Touch
Hi,

On 8/7/2012 12:26 AM, Masataka Ohta wrote:
 Joe Touch wrote:
 
 RFC2765 specifies that translators can merely copy the
 low-order bits of the field.

 Yes, but this is not compatible with RFC791.
 
 Then, which should we revice? RFC791, RFC2765 or both?

2765.

There is no useful way to revise 791 to make the text in 2765 correct.

 Without such a decision, there is no point to publish something
 based on RFC791 and is not compatible with RFC2765.

Sure there is - when IPv6 is not involved. That is the case for
ipv4-id-update. At best it makes things a little better for some cases
of IPv6-IPv4 translation - which can be noted - but it does not correct
for the failings of 2765, which are out of scope.

 The case above occurs only when the source gets back a packet too big
 message with a desired MTU less than 1280.
 
 which means RFC2460 expects it.
 
 Note that this might never
 happen, in which case there would never be any Fragment header.
 
 If you can assume so, let's better assume that accidental ID
 match never happen and we all can be very happy.

My words were ambiguous; permit me to clarify:

An IPv6 source might never send packets larger than IPv4 can natively
handle - i.e., it could send packets 576 bytes or smaller. In that case,
the IPv6 source would never get an ICMP too big because they're not as
far as IPv4 is concerned. In that case, the IPv6 source would never
insert the Fragmentation Header.

That is the fundamental flaw in these IPv6 RFCs, but it is behavior that
is out of scope for an IPv4 source. My doc focuses on the behavior of
IPv4 sources.

 However, even when it does happen, there is no instruction above about
 how to construct the header that is compliant with RFC791.
 
 That is the problem. That is, if you insist on RFC791 as is, not
 enough is specified on how to generate IPv6 ID.

Yes, but that does not affect an IPv4 source; it remains a problem, but
out of scope for this doc.

 Further, the source might already be inserting the fragmentation header
 (e.g., on a 2KB packet).
 
 Thus, there can be only one way (the one in RFC2765) to map IPv6
 ID to IPv4 ID

I have no idea why the fantasy exists that IPv6 packets MUST be
translatable into IPv4 based on the existing specs. As specified in
RFC2460, this simply isn't the case.

Yes, this is a nice goal, but it would have required IPv6 hosts insert
16-bit IDs into *every* packet and make them just as unique as IPv4 does.

...
 There's no instruction in how fragment headers
 are constructed in general that complies with RFC791.
 
 Is it a problem of RFC791 or RFC2460/2765?

RFC2460/2765.

 Simply using the low 16 bits is not correct. In particular, RFC2460
 suggests that its 32-bit counter can wrap once a minute, and that only
 one such counter might be needed for an endpoint for all connections.
 
 Never mind.
 
 IPv6 specification is not self consistent at all.

Correct - not regarding translation to IPv4. That's what I've been
trying to say ;-)

 Or, are you saying RFC2460 and RFC2765 violate RFC791?

 Yes.
 
 Then, as fixing RFC2460 is politically impossible, we must
 abandone IPv6 and live with IPv4 forever.

I didn't say we couldn't fix - or at least try to fix - this situation.
But it remains out of scope for this doc.

 This document updates RFC791, but does not fix either RFC2460 or
 RFC2765. This document does not make any statements about how IPv6
 generates its IDs.
 
 You draft says:
 
 This document updates the specification of the IPv4 ID field to more
 closely reflect current practice, and to include considerations taken
 into account during the specification of the similar field in IPv6.
 
 but, the specification of the similar field in IPv6 is, in
 your opinion, incomplete, let's finish it first, 

IPv6 is fine when it talks to IPv6 only. The goal is to make IPv4 work
in a similar way.

The goal is NOT to deal with translation. IPv6-IPv4 translation has two
directions - IPv4-IPv6 (which might be in scope for this doc, but isn't
really affected by the changes - we can add a statement on that) and
IP6-IPv4 (this doc similarly doesn't break that; if anything, it makes
it easier. it doesn't make it completely correct, though - there remain
problems that have nothing to do with the changes in this doc that need
to be addressed separately.

 only after
 which you can revise your draft to include considerations
 taken into account during the specification of the similar
 field in IPv6.
 
 More specifically, for example, the following statement in your draft:
 
 The latter case is relevant only for
 IPv6 datagrams sent to IPv4 destinations to support subsequent
 fragmentation after translation to IPv4.
 
 is incorrect because NAT646 refer RFC2765.

That will be fixed, yes.

 For another example,
 
 Finally, the IPv6 ID field is
 32 bits, and required unique per source/destination address pair for
 IPv6,
 
 is, in your opinion, violation of RFC791.

No; the violation occurs only

Re: Last Call: draft-ietf-intarea-ipv4-id-update-05.txt (Updated Specification of the IPv4 ID Field) to Proposed Standard

2012-08-03 Thread Joe Touch


On 8/3/2012 4:19 PM, Masataka Ohta wrote:
 Joe Touch wrote:
 
 Translators violate RFC791. They cannot merely copy the
 low-order bits of the field, since that is insufficiently
 unique, and isn't specified as being generated at the
 IPv6 source in compliance with IPv4 requirements.
 
 RFC2765 specifies that translators can merely copy the
 low-order bits of the field.

Yes, but this is not compatible with RFC791.

 Moreover, RFC2460 specifies:
 
 In that case, the IPv6 node
 is not required to reduce the size of subsequent packets to less than
 1280, but must include a Fragment header in those packets so that the
 IPv6-to-IPv4 translating router can obtain a suitable Identification
 value to use in resulting IPv4 fragments.
 
 That is, RFC2460 guarantees that translators can obtain a
 suitable Identification value from IPv6 Fragment header.

The case above occurs only when the source gets back a packet too big
message with a desired MTU less than 1280. Note that this might never
happen, in which case there would never be any Fragment header.

However, even when it does happen, there is no instruction above about
how to construct the header that is compliant with RFC791.

Further, the source might already be inserting the fragmentation header
(e.g., on a 2KB packet). There's no instruction in how fragment headers
are constructed in general that complies with RFC791.

Simply using the low 16 bits is not correct. In particular, RFC2460
suggests that its 32-bit counter can wrap once a minute, and that only
one such counter might be needed for an endpoint for all connections. In
that case, the entire number space wraps twice as fast as RFC791/RFC1122
require for IPv4, and it's half the bit-width, so the low-order bits
alone wrap 120,000x faster.

 Or, are you saying RFC2460 and RFC2765 violate RFC791?

Yes.

 I'm afraid you must say so, if you insist on existing systems
 violate the current specification (quote from abstract of your
 draft).
 
 It quotes IPv6 examples, but does not propose to change
 IPv6 processing. That may be needed, but that would be
 outside the scope of this doc.
 
 It is inside the scope because RFC2765 specifies how IPv4
 ID is generated from RFC2460 fragment header, which is,
 according to your draft, a violation of RFC791.

This document updates RFC791, but does not fix either RFC2460 or
RFC2765. This document does not make any statements about how IPv6
generates its IDs.

 Finally, the IPv6 ID field is
 32 bits, but lower 16 bits are required unique per
 source/destination address pair for
 IPv6,

 That's incorrect as per RFC2460. Other RFCs may violate that
 original spec, but that needs to be cleaned up separately.
 
 As I stated above, RFC2460 guarantees a suitable Identification
 value for IPv4 ID is there in IPv6 fragmentation ID.

Not the way I interpret the text, especially because there are other
ways to generate IDs in RFC2460 that could be translated to IPv4 that
might not result from ICMP errors, or that might never have
Fragmentation headers anyway.

 Or, if you think RFC2460 does not mind ID uniqueness (of IPv4,
 at least) so much, RFC791 should not either.

I think there are a lot of IETF documents that are not reviewed in the
correct context of existing standards. I don't think that applies to
this draft, though.

Joe


Re: Last Call: draft-ietf-intarea-ipv4-id-update-05.txt (Updated Specification of the IPv4 ID Field) to Proposed Standard

2012-07-18 Thread Joe Touch

On Jul 17, 2012, at 11:16 PM, Masataka Ohta wrote:

 Joe Touch wrote:
 
 Or, are 6 to 4 translators are required to rate limit and
 drop rate-violating packets to make the stateless
 translators full of states.
 
 I would expect that the translator would be responsible
 for this, though
 
 Do you mean translators must rate limit, or translators
 violate RFC2765:

Translators violate RFC791. They cannot merely copy the low-order bits of the 
field, since that is insufficiently unique, and isn't specified as being 
generated at the IPv6 source in compliance with IPv4 requirements.

 there is the problem that multiple translators interfere
 with each other.
 
 Yes, even rate limiting translators may interfere each other,
 which means rate limiting must be done at the IPv6 source
 node.
 
 Regardless, this is outside the scope of the ipv4-id-update doc.
 
 In the ID, there are a lot of references to IPv6.

It quotes IPv6 examples, but does not propose to change IPv6 processing. That 
may be needed, but that would be outside the scope of this doc.

 For example, the following statement of the ID:
 
   Finally, the IPv6 ID field is
   32 bits, and required unique per source/destination address pair for
   IPv6, whereas for IPv4 it is only 16 bits and required unique per
   source/destination/protocol triple.
 
 must be modified as:
 
   Finally, the IPv6 ID field is
   32 bits, but lower 16 bits are required unique per
   source/destination address pair for
   IPv6,

That's incorrect as per RFC2460. Other RFCs may violate that original spec, but 
that needs to be cleaned up separately.

Joe

Re: Last Call: draft-ietf-intarea-ipv4-id-update-05.txt (Updated Specification of the IPv4 ID Field) to Proposed Standard

2012-07-02 Thread Joe Touch
Hi,

On 6/20/2012 5:57 PM, Masataka Ohta wrote:
 Though the ID states:
 
 This
 document underscores the point that not only is reassembly (and
 possibly subsequent fragmentation) required for translation, it can
 be used to avoid issues with IPv4 ID uniqueness.
 
 according to RFC2765, which does not need port numbers for
 address mapping:
 
 If the IPv6 packet contains a Fragment header the header fields are
 set as above with the following exceptions:
 
   Identification:
   Copied from the low-order 16-bits in the
   Identification field in the Fragment header.
 
   Flags:
   The More Fragments flag is copied from the M flag in
   the Fragment header.  The Don't Fragments flag is set
   to zero allowing this packet to be fragmented by IPv4
   routers.
 
 the translated IPv4 packets are not atomic with 16bit IDs.
 
 Note that the RFC is referred by NAT646 etc.
 
 Then, aren't IPv6 nodes are required to rate limit packets
 they generate with fragment headers assuming 16bit IDs?
 
 Or, are 6 to 4 translators are required to rate limit and
 drop rate-violating packets to make the stateless
 translators full of states.

I would expect that the translator would be responsible for this, though
there is the problem that multiple translators interfere with each other.

Regardless, this is outside the scope of the ipv4-id-update doc.

 Or?
 
   Masataka Ohta
 
 PS
 
 As the RFC specifies ID=0 when DF is set 0, it should also
 be updated to conform to the robustness principle.

That is an error in this RFC, which also is outside the scope of the
ipv4-id-update doc.

Joe



Re: Last Call: draft-ietf-intarea-ipv4-id-update-05.txt (Updated Specification of the IPv4 ID Field) to Proposed Standard

2012-06-18 Thread Joe Touch
I will include a response to the rest of this in my summary of the last
call concerns. Regarding your last point:

On 6/18/2012 5:39 AM, Masataka Ohta wrote:
...
 PS
 
 While your draft is rather harmful than useless, I'm fine
 if the following point of the draft:
 
   Originating sources MAY set the IPv4 ID field of atomic
 datagrams to any value.
 
 is changed to:
 
   Originating sources MUST set the IPv4 ID field of atomic
 datagrams to values as unique as possible.
 
 which is what the current BSD implementations do.

There are implementations that set DF=1 and ID=0 (cellphones).

BSD does not make IDs as unique as possible; it selects them according
to a pseudorandom algorithm that does not take into account the
datagram's source IP, destination IP, or protocol. I.e., BSD code
repeats the IDs more frequently than necessary when a host concurrently
sources datagrams with different (srcIP, dstIP, proto) tuples.

So it would already be in violation of your proposed wording, as would
most ID generation mechanisms.

Joe


  1   2   3   4   5   >