Re: Bruce Schneier's Proposal to dedicate November meeting to saving the Internet from the NSA

2013-09-06 Thread Stefan Winter
+1. I'd +10 if I could :-)

 One thing that would be helpful is to encourage the use of
 Diffie-Hellman everywhere.  Even without certificates that can be
 trusted, we can eliminate the ability of casual, dragnet-style
 surveillance.  Sure, an attacker can still do a MITM attack.  But (a)
 people who are more clueful can do certificate pinning/verification,
 and (b) if the NSA is really putting data taps into tier 1 providers'
 high speed interconnects, they can only carry out MITM attacks on a
 bulk scale by placing racks and racks of servers, which will require
 significant amounts of cooling and power, in places that are much more
 likely where they would be noticed.  It's no longer a data tap hidden
 away somewhere in a closet near a tier 1's NAP.
 
 For too long, I think, we've let the perfect be the enemy of the good.
 Using TLS with DH to secure SMTP connections is valuable even if it is
 subject to MITM attacks, and even if the NSA/FBI can hand a National
 Security Letter to the cloud provider.  At least this way they will be
 forced to go the NSL route (and it will show up in whatever
 transparency reports that Google or Microsoft or Facebook are allowed
 to show to the public), or spend $$$ on huge racks of servers in
 public data centers, which maybe means less money to subvert standards
 setting activities.
 
 Although perfect security is ideal, increasing the cost of casual
 style dragnet surveillance is still a Good Thing.
 
   - Ted
 


-- 
Stefan WINTER
Ingenieur de Recherche
Fondation RESTENA - Réseau Téléinformatique de l'Education Nationale et
de la Recherche
6, rue Richard Coudenhove-Kalergi
L-1359 Luxembourg

Tel: +352 424409 1
Fax: +352 422473

PGP key updated to 4096 Bit RSA - I will encrypt all mails if the
recipient's key is known to me

http://pgp.mit.edu:11371/pks/lookup?op=getsearch=0xC0DE6A358A39DC66


0x8A39DC66.asc
Description: application/pgp-keys


signature.asc
Description: OpenPGP digital signature


Re: [Dime] Last Call: draft-ietf-dime-realm-based-redirect-11.txt (Realm-Based Redirection In Diameter) to Proposed Standard

2013-08-20 Thread Stefan Winter
Hi,

 When relying on S-NAPTR (RFC3958), redirection is only possible inside 
 sub-domains of the original domain name.

I don't think that's true. RFC3958 has exactly this use case in it's
first example section (2.2): a domain example.com redirects service
EM:protA to another domain, namely someisp.example - with the
non-terminal flag, as I described in my original mail. This is
absolutely a different domain name.

 This is a restriction compared to the use of normal NAPTR and REGEXP.

While making my own experiences with NAPTR, I learned that there is no
normal use of NAPTR. NAPTR records are not allowed to be used in the
wild without a valid DDDS specification defining its exact semantics.
That is precisely the reason why RFC3588 had to be revised in that
regard. RFC3958 provides that semantics, so it was a natural choice to
re-base Diameter's usage in an S-NAPTR.

 The following recommendations can be also found in the RFC6733: The domain 
 suffixes in the NAPTR replacement field SHOULD match the domain of the 
 original query. Actually, I don't even understand the SHOULD here without 
 any clarification on what to do if not... but it is another debate.

I now see that RFC6733 has put this IMHO arbitrary restriction in place.
It really serves no particular purpose; if there was some thinking
behind it, then that really should have been explained in the document.

I would tend to ignore that SHOULD if I were implementing Diameter (I'm
not :-) ). Different domain names are perfectly in scope for S-NAPTRs,
and you would have to consciously lobotomise libraries or code snippets
to *not* permit redirections to other domains.

We are also regularly using s-flag S-NAPTRs in eduroam and RADIUS
Dynamic Discovery to point to a delegate RADIUS server residing in a
different domain. It's just normal operations.

This limitation in RFC6733 is at best funny IMHO.

 Therefore, my understanding is that the use of S-NAPTR is not suitable for 
 redirection when the target domain name is different from the original one. 
 And the current draft proposes to allow any kind of redirection without any 
 impact on existing DNS infra.

I would rather take a very good look at the section in RFC6733 that
discourages other domain names in the replacement. It's more like an
erratum for me; and if that restriction were away you would have a
working solution to your redirection problem with zero effort.

And anyway, it's a SHOULD without considerations or consequences
attached. Which makes it more of a DONTCARE anyway ;-)

 But as I said, it is only based on my understanding and I'm not an expert on 
 DNS.

I don't think DNS is the problem here. It's more that Diameter butchers
its NAPTR usage unnecessarily.

Greetings,

Stefan Winter

 
 Regards,
 
 Lionel
 
 -Message d'origine-
 De : dime-boun...@ietf.org [mailto:dime-boun...@ietf.org] De la part de 
 Stefan Winter
 Envoyé : lundi 19 août 2013 10:16
 À : d...@ietf.org; 'IETF Discussion Mailing List'
 Objet : Re: [Dime] Last Call: draft-ietf-dime-realm-based-redirect-11.txt 
 (Realm-Based Redirection In Diameter) to Proposed Standard
 
 Hello,
 
 The IESG has received a request from the Diameter Maintenance and 
 Extensions WG (dime) to consider the following document:
 - 'Realm-Based Redirection In Diameter'
   draft-ietf-dime-realm-based-redirect-11.txt as Proposed Standard
 
 Sorry for bringing this up so late, but as I was writing my own dynamic 
 discovery draft for RADIUS, it occured to me that the usage of S-NAPTR for 
 Diameter brings a built-in support to signal realm-based redirect
 *if* S-NAPTR discovery is used.
 
 That only affects this document periphally; it describes realm-based redirect 
 for agent-based redirects, not for DNS-based; but still, the wording in 
 section 2 implies that using a realm-based-redirect-aware Diameter agent is 
 the only choice, and I think that should be rectified.
 
 The mechanism for S-NAPTR realm-based redirect is built into the S-NAPTR spec 
 by allowing for non-terminal lookups; this is signalled by having neither 
 an s flag (for SRV targets) nor an a flag (for A/ targets); but 
 instead an  (empty) flag. The replacement string in the NAPTR record is 
 then the label of /another/ NAPTR lookup; that lookup is then to be performed 
 with the same service/protocol tag.
 
 That makes the whole realm-based redirect problem very easy protocol-wise. 
 Consider a realm foo.example who wants to tell its Diameter peers that its 
 realm's application ID 123 is from now on served from example.com. It puts 
 into DNS
 
 foo.example.  43200   IN  NAPTR   100 10  aaa+ap123:diameter.tls 
 example.com
 
 A client who got this answer would then query for
 
 example.com NAPTR aaa+ap123:diameter.tls
 
 and would get example.com's servers via SRV or A/ records as configured 
 by the admins of example.com.
 
 This is described in section 2.2.3 of RFC3958.
 
 Now for the wording in the draft:
 
 Sction 2: the first para needs a bit

Re: [Dime] Last Call: draft-ietf-dime-realm-based-redirect-11.txt (Realm-Based Redirection In Diameter) to Proposed Standard

2013-08-20 Thread Stefan Winter
Hi,

 Thank you for quick feedback.
 I agree with your analysis. I think that we should provide more info on the 
 possible use of S-NAPTR for realm-based redirection.
 Taking into account your proposal, what do you think of the following 
 proposed changes:

The new text reads pretty well.

One thing worth considering is maybe: this draft already updates
RFC6733. It may be worth making explicit that the RFC6733 SHOULD
regarding same-domain targets is being made obsolete in by this draft.

One more sentence in the section 2 text below should do the trick:


 NEW:
 
Using the S-NAPTR DDDS application [RFC3958], the DNS-based dynamic peer 
discovery mechanism defined in the Diameter base protocol [RFC6733]
provides a simple mechanism for realm-based redirection. When S-NAPTR is
used for peer discovery, redirection of Diameter request from the original
realm to a new realm may be performed by updating the existing NAPTR 
 resource
records for the original realm as follow: the NAPTR RR for the desired 
application(s) and supported application protocol(s) provided by the 
new realm will have an empty FLAG field and the REPLACEMENT field will
contain the new realm to use for the next DNS lookup.

ADD:

The new realm can be arbitrary; the restriction in RFC6733 that the
NAPTR replacement field SHOULD match the domain of the original query
does not apply for realm-based redirect purposes.

All the rest of the text is fine.

Greetings,

Stefan Winter

 
However, the use of DNS-based dynamic peer discovery is optional for 
 Diameter 
implementations. For deployments which do not make use of S-NAPTR peer 
discovery, support of realm-based redirection MUST be specified as part of 
functionality supported by a Diameter application.  In this way, support 
 of the 
considered Diameter application (discovered during capabilities exchange 
procedures as defined in Diameter base protocol [RFC6733]) indicates 
implicit support of the realm-based redirection mechanism.  Designers of
new applications can incorporate the mechanism specified here into their 
application by normative reference to this document.
 
The result of making realm-based redirection an application-specific
behaviour is that it cannot be performed by a redirect agent as
defined in [RFC6733], but MUST be performed instead by an
application-aware Diameter node (Diameter server or proxy) (hereafter
called a Realm-based Redirect Server).
 
An application can specify that realm-based redirection operates only
on complete sessions beginning with the initial message, or on every
message within the application, even if earlier messages of the same
session were not redirected.  This distinction matters only when
realm-based redirection is first initiated.  In the former case,
existing sessions will not be disrupted by the deployment of realm-
based redirection.  In the latter case, existing sessions will be
disrupted if they are stateful.
 
 Regards,
 
 Lionel
 
 -Message d'origine-
 De : Stefan Winter [mailto:stefan.win...@restena.lu] 
 Envoyé : mardi 20 août 2013 08:37
 À : MORAND Lionel OLNC/OLN
 Cc : d...@ietf.org; 'IETF Discussion Mailing List'
 Objet : Re: [Dime] Last Call: draft-ietf-dime-realm-based-redirect-11.txt 
 (Realm-Based Redirection In Diameter) to Proposed Standard
 
 Hi,
 
 When relying on S-NAPTR (RFC3958), redirection is only possible inside 
 sub-domains of the original domain name.
 
 I don't think that's true. RFC3958 has exactly this use case in it's first 
 example section (2.2): a domain example.com redirects service EM:protA to 
 another domain, namely someisp.example - with the non-terminal flag, as I 
 described in my original mail. This is absolutely a different domain name.
 
 This is a restriction compared to the use of normal NAPTR and REGEXP.
 
 While making my own experiences with NAPTR, I learned that there is no 
 normal use of NAPTR. NAPTR records are not allowed to be used in the wild 
 without a valid DDDS specification defining its exact semantics.
 That is precisely the reason why RFC3588 had to be revised in that regard. 
 RFC3958 provides that semantics, so it was a natural choice to re-base 
 Diameter's usage in an S-NAPTR.
 
 The following recommendations can be also found in the RFC6733: The domain 
 suffixes in the NAPTR replacement field SHOULD match the domain of the 
 original query. Actually, I don't even understand the SHOULD here without 
 any clarification on what to do if not... but it is another debate.
 
 I now see that RFC6733 has put this IMHO arbitrary restriction in place.
 It really serves no particular purpose; if there was some thinking behind it, 
 then that really should have been explained in the document.
 
 I would tend to ignore that SHOULD if I were implementing Diameter (I'm not 
 :-) ). Different domain names are perfectly in scope for S-NAPTRs, and you 
 would

Re: [Dime] Last Call: draft-ietf-dime-realm-based-redirect-11.txt (Realm-Based Redirection In Diameter) to Proposed Standard

2013-08-19 Thread Stefan Winter
Hello,

 The IESG has received a request from the Diameter Maintenance and
 Extensions WG (dime) to consider the following document:
 - 'Realm-Based Redirection In Diameter'
   draft-ietf-dime-realm-based-redirect-11.txt as Proposed Standard

Sorry for bringing this up so late, but as I was writing my own dynamic
discovery draft for RADIUS, it occured to me that the usage of S-NAPTR
for Diameter brings a built-in support to signal realm-based redirect
*if* S-NAPTR discovery is used.

That only affects this document periphally; it describes realm-based
redirect for agent-based redirects, not for DNS-based; but still, the
wording in section 2 implies that using a realm-based-redirect-aware
Diameter agent is the only choice, and I think that should be rectified.

The mechanism for S-NAPTR realm-based redirect is built into the S-NAPTR
spec by allowing for non-terminal lookups; this is signalled by having
neither an s flag (for SRV targets) nor an a flag (for A/
targets); but instead an  (empty) flag. The replacement string in the
NAPTR record is then the label of /another/ NAPTR lookup; that lookup is
then to be performed with the same service/protocol tag.

That makes the whole realm-based redirect problem very easy
protocol-wise. Consider a realm foo.example who wants to tell its
Diameter peers that its realm's application ID 123 is from now on served
from example.com. It puts into DNS

foo.example.  43200   IN  NAPTR   100 10  aaa+ap123:diameter.tls 
example.com

A client who got this answer would then query for

example.com NAPTR aaa+ap123:diameter.tls

and would get example.com's servers via SRV or A/ records as
configured by the admins of example.com.

This is described in section 2.2.3 of RFC3958.

Now for the wording in the draft:

Sction 2: the first para needs a bit of a rewrite to factor in S-NAPTR's
capabilities.

I suggest something along the lines of:

Realm-based redirection is implicitly a part of the Diameter base
protocol, but only where peer discovery using S-NAPTR is used (section
5.2 of [RFC6733], by using the non-terminal S-NAPTR flag). This allows
for both application-specific realm-based redirects, and for
application-agnostic (unconditional) realm-based redirects, and does not
require any Diameter agents.

For deployments which do not make use of S-NAPTR peer discovery, support
of realm-based redirection MUST be specified as part of functionality
supported by a Diameter application. (... continue with the rest of the
section ...)

Greetings,

Stefan Winter



 
 The IESG plans to make a decision in the next few weeks, and solicits
 final comments on this action. Please send substantive comments to the
 ietf@ietf.org mailing lists by 2013-08-27. Exceptionally, comments may be
 sent to i...@ietf.org instead. In either case, please retain the
 beginning of the Subject line to allow automated sorting.
 
 Abstract
 
 
Message redirection is a basic capability provided by the Diameter
base protocol.  In its conventional form, message redirection is
performed by an application-independent redirect agent, which
returns one or more individual hosts to the message sender as
possible destinations of the redirected message.
 
However, in some circumstances an operator may wish to redirect
messages to an alternate domain without specifying individual hosts.
This document specifies an application-specific mechanism by which
that can be achieved.  New applications may incorporate this
capability by reference to the present document.
 
Because the redirection mechanism is application-specific, it must be
performed by a Diameter server or proxy rather than a basic redirect
agent as defined in the Diameter base protocol.  A new term, Realm-
based Redirect Server, is introduced in this document to
differentiate the application-specific nature of realm-based
redirection from the conventional Diameter redirection performed by a
basic redirect agent.
 
This memo updates Sections 6.13 and 6.14 of RFC6733 with respect to
the usage of the Redirect-Host-Usage and Redirect-Max-Cache-Time
AVPs.
 
 
 
 
 The file can be obtained via
 http://datatracker.ietf.org/doc/draft-ietf-dime-realm-based-redirect/
 
 IESG discussion can be tracked via
 http://datatracker.ietf.org/doc/draft-ietf-dime-realm-based-redirect/ballot/
 
 
 The following IPR Declarations may be related to this I-D:
 
http://datatracker.ietf.org/ipr/1254/
 
 
 
 ___
 DiME mailing list
 d...@ietf.org
 https://www.ietf.org/mailman/listinfo/dime
 


-- 
Stefan WINTER
Ingenieur de Recherche
Fondation RESTENA - Réseau Téléinformatique de l'Education Nationale et
de la Recherche
6, rue Richard Coudenhove-Kalergi
L-1359 Luxembourg

Tel: +352 424409 1
Fax: +352 422473



signature.asc
Description: OpenPGP digital signature


Re: Last Call: draft-ietf-emu-eap-tunnel-method-07.txt (Tunnel EAP Method (TEAP) Version 1) to Proposed Standard

2013-07-22 Thread Stefan Winter
.

It is good that NAIs are not mentioned normatively in that section;
after all Peer-Ids and also anonymous outer identities may or may not be
NAI realms - they can also be simple strings with no particular
structure. But since they can be just that - simple strings with no
structure - there is also no encoding known for these incoming strings.

I know, TEAP doesn't (and doesn't *have to*) care about the outer
identities, because they happen outside of itself and are not of
importance for neither its phase 1 or 2.

And still, some spec needs to say something about the encoding! Or we'll
never have clarity about what's coming in.

After taking a step back, looking at where to properly fix things, I'm
becoming more and more convinced that chasing individual EAP methods to
include normative language about something that happens outside their
own method-protocol; and in TEAP's case being at the whim that some
other EAP method which happens to have been configured as TEAPs inner
method has already done its homework to include provisions about
exporting its inner IDs in a sane format for the TEAP exchange as a
whole to become deterministically encoded is - impractical.

The much more straightforward approach is to mandate EAP (core) to
always force use of UTF-8 for EAP-Response/Identity.

In summary (kudos for reading this far!)
==
IMHO, TEAP should fix the following points

* Peer-Id and Server-Id should become deterministic.
* When discussing NAIs, mentions of RFC4282 should be removed, or
qualified so that readers of spec are urged to read (exclusively) its
successor as soon as it becomes available.

Things that might be tackled in TEAP, but my personal preference would
be to do that in EAP core:

* Specify the encoding in which phase 2's Peer-Id is used during the EAP
negotiation that precedes the TEAP exchange. If Peer-Ids are not used
(i.e. identity privacy support is enabled), specify in which encoding
the privacy-preserving identity hints are expected.

Thanks for reading this :-)

Note how I did not go into detail about normalization; similar
principles apply here, but the mail is long enough.

Greetings,

Stefan Winter

-- 
Stefan WINTER
Ingenieur de Recherche
Fondation RESTENA - Réseau Téléinformatique de l'Education Nationale et
de la Recherche
6, rue Richard Coudenhove-Kalergi
L-1359 Luxembourg

Tel: +352 424409 1
Fax: +352 422473



signature.asc
Description: OpenPGP digital signature


Re: Internationalization and draft-ietf-abfab-eapapplicability

2013-07-18 Thread Stefan Winter
Hi,

 We don't get to place requirements on applications except to say what
 they need to do to use EAP.  The protocol requirement for that is that
 applications using EAP need to know what character set they have so that
 EAP can convert the identity to UTF-8 and so that EAP methods can do any
 needed conversions.

That text sounds pretty good, and is probably all ABFAB needs to say
about this.

I'm still not happy with the i18n situation in EAP; especially that EAP
itself doesn't always know its requirements regarding encoding and
normalization.

I think the basic problem is that identities and other credentials are
eap-type specific and one might expect that neither core EAP nor the AAA
transport have to care about what an EAP method thinks it wants as encoding.
But that isn't true, since at least the Identity part (not the
passwords; I'm not saying these would need to be normalised at all) may
be needed by the EAP method, but they transpire through to the
EAP-Identity and RADIUS/other-AAA User-Names. It's a spill-over effect,
where an EAP method's decisions re encoding and normalisation impose
something on other protocols.

Due to that, an EAP method's way of constructing *identities* needs to
be regulated so that the method, core EAP, and AAA transports can get along.

Nothing of this needs to happen in ABFAB, but I think work needs to be done.

Either by modifying EAP itself to impose a common encoding and maybe
normalisation on EAP-Identity (which in turn forces EAP methods to use
that same encoding and/or normalisation in their outer or only
phase), or by making sure all EAP methods use an encoding that does not
create problems on EAP core and the AAA layer.

I think this really has force use of UTF-8 written all over it. The
question for me is which path to take, and where/who does the work.

Greetings,

Stefan Winter


-- 
Stefan WINTER
Ingenieur de Recherche
Fondation RESTENA - Réseau Téléinformatique de l'Education Nationale et
de la Recherche
6, rue Richard Coudenhove-Kalergi
L-1359 Luxembourg

Tel: +352 424409 1
Fax: +352 422473



signature.asc
Description: OpenPGP digital signature


Re: Internationalization and draft-ietf-abfab-eapapplicability

2013-07-17 Thread Stefan Winter
Hi,

 After reading this document, I believe that this document omits
 discussion of an important aspect, which is  internationalization.
  Since the contents of the EAP Identity and RADIUS User-Name attributes
 are specified to be encoded in UTF-8, application protocols that utilize
 encodings other than UTF-8 for user identities and passwords could have
 issues utilizing EAP (and RADIUS).  Currently RFC 4282bis proposes that
 all EAP implementations normalize identities and passwords before
 utilizing them, and therefore application protocols that do not do this
 will be at variance with RFC 4282bis.  
 
 IMHO the document needs to state what the internationalization
 requirements are for application-layer protocol use of EAP.  There are
 potential workarounds, such as requiring that application protocols
 convert identities and passwords to UTF-8 prior to use of EAP, or
 modifying RFC 4282bis so as to require normalization in RADIUS proxies
 or servers.   However, without fixes being applied and/or changes to RFC
 4282bis, use of EAP by applications may not be compatible with either
 existing specifications or implementations. 

The discussion in radext on RFC4282bis was very long and much thought
has gone into fixing internationalisation aspects. The fix is still
partial only, because of the said uncertainties about the input encoding
and normalization. RADIUS servers or proxies touching and manipulating
the Identity/User-Name was seen as the bigger of two evils; the lesser
one being the requirement on EAP supplicants to perform normalization on
their own.

If a change is needed in the eapapplicability draft, I'd prefer to
change eapapplicability to be in line with 4282bis, not the other way
around.

 Background
 
 EAP and protocols that carry it (e.g. RADIUS) assume that the
 EAP-Response/Identity is encoded in UTF-8.

  For example, RFC 3748
 Section 1.2 defines displayable message as follows: 
 
Displayable Message
   This is interpreted to be a human readable string of characters.
   The message encoding MUST follow the UTF-8 transformation format
   [RFC2279].
 
 
 Therefore EAP messages including EAP Identity and Notification that are
 described as displayable messages have a UTF-8 encoding requirement
 applied to them. 

I disagree with your reading of RFC3748.

It's true that displayable messages need to be encoded in UTF-8; but
the document does not state that an EAP-Response/Identity is a
displayable message. Section 5.1 of RFC3748 uses the term displayable
message several times, but never in conjunction with the Identity
*response*:

An optional displayable message MAY be included to
  prompt the peer in the case where there is an expectation of
  interaction with a user. 

(which is for the request, and it is optional)

and later on:

Type-Data

  This field MAY contain a displayable message in the Request,
  containing UTF-8 encoded ISO 10646 characters [RFC2279].

This is the normative language for the previous text.

I keep staring at section 5.1 of that RFC and see nothing that would
require the EAP-Response/Identity to be UTF-8.

I also believe that the lack of being clear at that particular point is
the root of all evil because it allows EAP supplicant implementers to
choose arbitrary encodings for conveying the identities.

It is somewhat understandable that EAP-Response/Identity was not tagged
as displayable message back in the day - its purpose is not to be
displayed anywhere; it's input to the authentication algorithm and is
meant to be processed by an EAP server. So, if there's nothing to
display, it's not a displayable message.

RFC3748 would have achieved more clarity and better interop if it would
have explicitly demanded the EAP-Response/Identity to be UTF-8 even
though it's not a displayable message.

Now, that would suggest an update to RFC3748, introducing a UTF-8
requirement at that spot. And guess what - we're writing a document that
updates RFC3748!

The question is: this document is about an applicability update, not a
change of the on-the-wire behaviour of EAP. If we were to try and apply
a proper fix to RFC3748 to make Identities UTF-8 everywhere, then the
impact is way beyond ABFAB. We previously tried to make the
applicability statement for all of EAP, but later decided to restrict
ourselves to ABFAB-specific updates.

The next best solution then would be to require that only ABFAB-using
EAP supplicants are required to use UTF-8 (and possibly also require a
normalisation). That would indeed solve ABFAB's i18n'ed use of EAP, but
not everybody else's. That's a bit selfish, but it would certainly be
better than nothing.

I wonder what the other authors think about nailing down a
UTF-8/NFC-normalised Identity into the draft.

Greetings,

Stefan Winter

 Since RFC 3579 Section 2.1 specifies that the EAP-Response/Identity is
 copied into the RADIUS User-Name Attribute: 
 
In order to permit non-EAP aware RADIUS proxies to forward

Re: Internationalization and draft-ietf-abfab-eapapplicability

2013-07-17 Thread Stefan Winter
Hi,

 I think assuming that 4282bis has reached consensus on
 internationalization is wildly wishful thinking at this stage.  I
 continue to be dubious that the right parties are involved in the
 discussion and even if we have consensus in radext expect significant
 discussion at ietf last call, appsdir review and IESG review.

I had the impression we are getting somewhere, but that's just a
personal opinion of course.

 However, I absolutely agree that if an application is going to use EAP
 it needs to  follow EAP's i18n conventions whatever those may be.  A
 rrequirement on anti-causal investigation for current implementation
 efforts has never stopped us before.
 I also agree the current document does not speak to this.
 
 My recommendation is that we point out the issue.  And say that strings
 used within a specific EAP method MUST follow the rules for that method.
 If AAA is used, strings used within AAA MUST follow the rules for the
 AAA protocol in use.  We can add an informative citation to 4282bis as a
 snapshot of current thinking.

Pushing the requirement down to the EAP method won't work IMHO. Take as
example EAP-TTLS in RFC5281. A full-text search for UTF in it yields 0
hits; and a look at section 7.3 (EAP Identity Information) does not
speak of any encodings.

IMHO, not being explicit in the EAP spec itself has brought us to the
i18n problems we are seeing. An EAP supplicant supporting EAP-TTLS can
use latin-1 or foobar as encoding for the EAP identity; he'll send that
bytestream on the wire without the encoding information being known,
meaning a UTF-8 sanitisation isn't possible anywhere further down the
route. The supplicant also doesn't know that the authenticator will wrap
this in RADIUS, so can't be aware of the next-hop's requirement to use
UTF-8.

The poor pass-through authenticator now gets a blob with not valid
UTF-8, and is forced to either violate RFC2865 by putting non-UTF-8 into
a RADIUS User-Name, or by rejecting the entire EAP authentication for a
reason the EAP supplicant can do nothing about because it doesn't know
about it. In the IEEE 802.1X network access case, there's also no
signalling what exactly was the reason for EAP to break; EAPoL is not
very verbose. I don't know about ABFAB; GSSAPI could well have a way to
signal that it choked on encoding - or not.

In the end, all participants in the conversation can claim they did the
right thing, and yet nothing worked.

 I would not support a normative reference to 4282bis.

That I agree with; 4282bis is about NAIs exclusively. I could well
imagine ABFAB being deployed inside an enterprise where EAP identities
do not follow the NAI provisions; any restrictions on the encoding or
normalization should apply to those deployments nontheless.

Greetings,

Stefan Winter

-- 
Stefan WINTER
Ingenieur de Recherche
Fondation RESTENA - Réseau Téléinformatique de l'Education Nationale et
de la Recherche
6, rue Richard Coudenhove-Kalergi
L-1359 Luxembourg

Tel: +352 424409 1
Fax: +352 422473



signature.asc
Description: OpenPGP digital signature


Re: Internationalization and draft-ietf-abfab-eapapplicability

2013-07-17 Thread Stefan Winter
Hi,

 Pushing the requirement down to the EAP method won't work IMHO.

Further to this: now that I have EAP-TTLS on screen, its words of wisdom
about EAP type selection show that it won't work quite clearly. And they
are valid beyond EAP-TTLS. Section 7.3 of RFC5281 states:

Note that at the time the initial EAP-Response/Identity packet is
   sent the EAP method is yet to be negotiated.  If, in addition to EAP-
   TTLS, the client is willing to negotiate use of EAP methods that do
   not support user anonymity, then the client MAY include the name of
   the user in the EAP-Response/Identity to meet the requirements of the
   other candidate EAP methods.

This was written for anonymisation reasons; but it applies to i18n as
well. If EAP-Type A uses encoding X, and EAP-Type B uses encoding Y, in
which encoding should the initial EAP-Response/Identity be sent?

One can only hope that all the EAP types which are configured on the
supplicant share one common encoding that is allowed in all of them, and
that the supplicant chooses wisely. Otherwise the question above can
turn into a does not compute.

Sure, a half-baked answer is that the real identity is in a tunnel
anyway, and the EAP type is known at that time; but that doesn't cover
all cases. EAP-pwd has no tunnel, and needs to rely on the outer
identity being in a format it can process. There are more untunneled EAP
types.

Greetings,

Stefan Winter

-- 
Stefan WINTER
Ingenieur de Recherche
Fondation RESTENA - Réseau Téléinformatique de l'Education Nationale et
de la Recherche
6, rue Richard Coudenhove-Kalergi
L-1359 Luxembourg

Tel: +352 424409 1
Fax: +352 422473



signature.asc
Description: OpenPGP digital signature


Re: Internationalization and draft-ietf-abfab-eapapplicability

2013-07-17 Thread Stefan Winter
Hi,

 Sam said: 
  
 Nah, you'd just be living in a different hell if you'd been explicit in
 the EAP spec. I know: other parts of the IETF are in that hell. The
 protocols are clear and everything is fine until you realize that the
 backend authentication systems you're dealing with are using a totally
 different set of rules than the protocols.
 That hell sucks too.
 
 [BA] I totally agree. 

I'm joyfully naïve here.

Right now, the receiving end has no guarantees about the encoding and
normalisation of the incoming string. If it doesn't match its
expectations in that regard, then that's unrecoverable.

In the other hell, it can be sure to receive UTF-8 in NFC, and if that
doesn't match what it needs, it can convert it.

In my naïve thinking, that second hell is a lot less hot and much more
habitable.

Could you point out where my thinking goes wrong?

Also: we're dealing with writing specifications here. If our
specifications are correct, and some implementations do it wrong anyway
- that's their problem, right?


 However, none of the above matters for this document.
 
 [BA] Exactly.  It's just an applicability statement, not a prescription
 for world peace :)

Sure: we need more than an applicability statement update to achieve
peace in the EAP world. But if an applicability statement update is all
we can work with, we could try and do our best in that one.

Greetings,

Stefan Winter



-- 
Stefan WINTER
Ingenieur de Recherche
Fondation RESTENA - Réseau Téléinformatique de l'Education Nationale et
de la Recherche
6, rue Richard Coudenhove-Kalergi
L-1359 Luxembourg

Tel: +352 424409 1
Fax: +352 422473



signature.asc
Description: OpenPGP digital signature


Re: Internationalization and draft-ietf-abfab-eapapplicability

2013-07-17 Thread Stefan Winter
Hi,

 [BA]  We are just talking about core EAP and RADIUS RFCs here.
  Internationalization of method-specific identities (and passwords) is
 defined by the EAP method specifications, so the Identities UTF-8
 everywhere is a much broader topic (and one which I'd argue is not
 relevant to an ABFAB applicability statement). 

Indeed; sorry for the imprecise use of everywhere. What needs to be
tackled is EAP's outer or only identity (for methods that don't have
the luxury of sending a different identity in their method-specific
payload).

 The next best solution then would be to require that only ABFAB-using
 EAP supplicants are required to use UTF-8 (and possibly also require a
 normalisation). 
 
 [BA] I would agree with a UTF-8 requirement for EAP-Response/Identities.
  That is necessary in practice, because RFC 3579 requires that the
 EAP-Response/Identity be copied into the RADIUS User-Name attribute, and
  RFC 2865 Section 5.1 states that:

You are conflating AAA with RADIUS. EAP-Response/Identity can be used in
other contexts; I heard that some use Diameter instead of RADIUS, so any
reference to RFC2865 would not apply there. And if I write
MyOwnAAAProtocol and require EAP Identities in EBCDIC encoding in my
equivalent of User-Name, then that's my thing alone and RFC2865 has
nothing to say to me.

The EAP supplicant doesn't know which AAA is going to be used behind the
authenticator; so how would it know whether to use EBCDIC or UTF-8?

Unless, of course, there is a place outside of RFC2865 which forces me
to accept/use exclusively UTF-8. An update to RFC3748 stating that comes
to mind.

 Internationalization of method-specific identities and passwords are up
 to the methods, so the document can just point this out and say see
 applicable RFCs.

As stated elsewhere in the thread, the initial EAP-Identity needs to be
sent before the EAP method is negotiated.

 Personally, I don't think that the ABFAB applicability statement has to
 mandate normalization in NAIs -  that would make it depend on RFC
 4282bis, and that doesn't seem necessary to me.  Instead, it can just
 make the reader aware of RFC 4282bis and say that uses need to conform
 to internationalization requirements which are a work in progress. 

This is a cliffhanger text with a forward-reference into the future. I
could live with a statement like that, but ...

... just listing 4282bis is not enough; EAP identities don't have to be
NAIs - if we state that applications need to conform to that future RFC,
and they read things in it like This document only defines NAIs, if you
don't use NAIs, there's nothing in it for you - then implementations
have a way too easy loophole to not care about i18n; they can just say:
oh, we don't use NAIs. It's all unstructured identities; any presence of
an @ in there is just coincidence.

I could live with it very well if there is a promise to continue the
cliffhanger situation with an all-encompassing update that covers all
EAP Identities; be they NAIs or not and be they transported over RADIUS
or not.

I.e. if we can agree that updating RFC3748 with stricter i18n rules is
going to be chartered work and will happen, then I can live with a
cliffhanger statement of stay tuned for that update in the
eapapplicability draft.

Greetings,

Stefan Winter

 
 
 
 
 
 That would indeed solve ABFAB's i18n'ed use of EAP, but
 not everybody else's. That's a bit selfish, but it would certainly be
 better than nothing.

 I wonder what the other authors think about nailing down a
 UTF-8/NFC-normalised Identity into the draft.

 Greetings,

 Stefan Winter

  Since RFC 3579 Section 2.1 specifies that the EAP-Response/Identity is
  copied into the RADIUS User-Name Attribute:
 
  In order to permit non-EAP aware RADIUS proxies to forward the
  Access-Request packet, if the NAS initially sends an
  EAP-Request/Identity message to the peer, the NAS MUST copy the
  contents of the Type-Data field of the EAP-Response/Identity received
  from the peer into the User-Name attribute and MUST include the
  Type-Data field of the EAP-Response/Identity in the User-Name
  attribute in every subsequent Access-Request.
 
 
  Therefore for use with EAP, the User-Name Attribute also inherits a
  UTF-8 encoding requirement, restricting the potential encodings
  permitted by RFC 2865 Section 5.1 (User-Name Attribute):
 
  The format of the username MAY be one of several forms:
 
  text Consisting only of UTF-8 encoded 10646 [7] characters.
 
  network access identifier
  A Network Access Identifier as described in RFC 2486
  [8].
 
  distinguished name
  A name in ASN.1 form used in Public Key authentication
  systems.
 
 
 
 
 
 
 
 


 --
 Stefan WINTER
 Ingenieur de Recherche
 Fondation RESTENA - Réseau Téléinformatique de l'Education Nationale et
 de la Recherche
 6, rue Richard Coudenhove-Kalergi
 L-1359 Luxembourg

 Tel: +352 424409 1
 Fax: +352 422473



-- 
Stefan WINTER
Ingenieur de Recherche
Fondation RESTENA - Réseau Téléinformatique de

Re: Internet Draft Final Submission Cut-Off Today

2013-02-27 Thread Stefan Winter
Hi,

 [...] ferkakte [...]

As a German, I'm now torn apart between being flattered that we've
successfully exported a German word to the U.S. and being speechlessly
shocked by the way spelling was b0rked in the process.

Stefan

-- 
Stefan WINTER
Ingenieur de Recherche
Fondation RESTENA - Réseau Téléinformatique de l'Education Nationale et
de la Recherche
6, rue Richard Coudenhove-Kalergi
L-1359 Luxembourg

Tel: +352 424409 1
Fax: +352 422473



signature.asc
Description: OpenPGP digital signature


Re: Internet Draft Final Submission Cut-Off Today

2013-02-27 Thread Stefan Winter
Hi,

 [...] ferkakte [...]

 As a German, I'm now torn apart between being flattered that we've
 successfully exported a German word to the U.S. and being
 speechlessly shocked by the way spelling was b0rked in the process.

 I believe that it's actually Yiddish.
 
 yup: 
 http://www.yiddishdictionaryonline.com/dictionary/display.php?action=searchtype=romword=farkakt
 
 still my bet would be that this Yiddish word has Germanic origins…. 

Here we see one of the *good* things about having an I-D cutoff
deadline. One finally finds time to do /other/ things ;-)

Stefan

-- 
Stefan WINTER
Ingenieur de Recherche
Fondation RESTENA - Réseau Téléinformatique de l'Education Nationale et
de la Recherche
6, rue Richard Coudenhove-Kalergi
L-1359 Luxembourg

Tel: +352 424409 1
Fax: +352 422473



signature.asc
Description: OpenPGP digital signature


Re: [radext] Security review of draft-ietf-radext-radsec

2012-01-30 Thread Stefan Winter
  (this model is optional to implement): Implementations SHOULD
  allow to configure a list of trusted certificates, identified
  via certificate fingerprint.  Implementations MUST support
  SHA-1 as the hash algorithm.

   *  TLS using TLS-PSK (this model is optional to implement)

(note that some changed to this text might occur due to pending
DISCUSSes and COMMENTs in the IESG review).

Greetings,

Stefan Winter

 
 ___
 radext mailing list
 rad...@ietf.org
 https://www.ietf.org/mailman/listinfo/radext


-- 
Stefan WINTER
Ingenieur de Recherche
Fondation RESTENA - Réseau Téléinformatique de l'Education Nationale et
de la Recherche
6, rue Richard Coudenhove-Kalergi
L-1359 Luxembourg

Tel: +352 424409 1
Fax: +352 422473



signature.asc
Description: OpenPGP digital signature
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Review of draft-ietf-radext-radsec

2012-01-26 Thread Stefan Winter
 is only
specified in the context of DynAuth (RFC5176). That attribute is listed
as only allowed in a NAK as per the attribute occurence table in 5176.

I would be hesitant to use Error-Cause in RADIUS Accounting packets -
unless the corresponding RFCs get updated to specify that this attribute
is now also to be used in Accounting semantics. And to be honest, I
would even be rather against such a change, and introduce a proper
Accounting-NAK packet type instead; but that's a different story.

The non-ability to indicate No accounting please has been discussed in
a radext wg meetint. The conclusion was that auth and acct are two
separate, unrelated items. RADIUS Accounting needs to be configured
differently and explicitly; so there is little risk that accounting
packets are sent by chance anyway. If they are sent to the wrong
place, that is an administrative error: misconfigured on the sender-side.

 Section 4
 
As a consequence, the selection of transports to communicate from a
client to a server is a manual administrative action.  An automatic
fallback to RADIUS/UDP is NOT RECOMMENDED, as it may lead to down-
bidding attacks on the peer communication.
 
 [BA] If a fixed shared secret radsec is used alongside fallback to
 RADIUS/UDP,
 that seems more like a MUST NOT!!

That paragraph was also brought up in the AD review. It was not meant in
the way you perceived it; please see the thread of the AD review of this
document for an extensive explanation how it was really meant.

In any case, I take the point that the text is confusing for readers.

While resolving the AD comments, I agreed with Dan Romascanu to
reformulate this whole paragraph and move it to Security Considerations
instead. I'll follow up with the new text later today.

 Section 6
 
In the case of dynamic peer discovery as per
[I-D.ietf-radext-dynamic-discovery], a RADIUS/TLS node needs to be
able to accept connections from a large, not previously known, group
of hosts, possibly the whole internet.  In this case, the server's
RADIUS/TLS port can not be protected from unauthorised connection
attempts with measures on the network layer, i.e. access lists and
firewalls.  This opens more attack vectors for Distributed Denial of
Service attacks, just like any other service that is supposed to
serve arbitrary clients (like for example web servers).
 
In the case of dynamic peer discovery as per
[I-D.ietf-radext-dynamic-discovery], X.509 certificates are the only
proof of authorisation for a connecting RADIUS/TLS nodes.  Special
care needs to be taken that certificates get verified properly
according to the chosen trust model (particularly: consulting CRLs,
checking critical extensions, checking subjectAltNames etc.) to
prevent unauthorised connections.
 
 
 [BA] I'd recommend collecting this and other dynamic-discovery related
 material
 into a separate section prior to 3.1.

Moved out of the document, to go into dynamic-discovery.

 Appendix C. Assessment of Crypto-Agility Requirements
 
 
The RADIUS Crypto-Agility Requirements (link to RFC once issued here)
defines numerous classification criteria for protocols that strive to
enhance the security of RADIUS.  It contains mandatory (M) and
recommended (R) criteria which crypto-agile protocols have to
fulfill.  The authors believe that the following assessment about the
crypto-agility properties of RADIUS/TLS are true.
 
 [BA] The Crypto-Agility RFC is now published so you should reference that.

Done now in my working copy.

Thanks for this extensive review, much appreciated!

Greetings,

Stefan Winter

-- 
Stefan WINTER
Ingenieur de Recherche
Fondation RESTENA - Réseau Téléinformatique de l'Education Nationale et
de la Recherche
6, rue Richard Coudenhove-Kalergi
L-1359 Luxembourg

Tel: +352 424409 1
Fax: +352 422473



signature.asc
Description: OpenPGP digital signature
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Review of draft-ietf-radext-radsec

2012-01-26 Thread Stefan Winter
Hi again,

As a consequence, the selection of transports to communicate from a
client to a server is a manual administrative action.  An automatic
fallback to RADIUS/UDP is NOT RECOMMENDED, as it may lead to down-
bidding attacks on the peer communication.

 [BA] If a fixed shared secret radsec is used alongside fallback to
 RADIUS/UDP,
 that seems more like a MUST NOT!!
 
 That paragraph was also brought up in the AD review. It was not meant in
 the way you perceived it; please see the thread of the AD review of this
 document for an extensive explanation how it was really meant.

My working copy has the following text in Security Considerations now:

   If peer communication between two devices is configured for both
   RADIUS/TLS transport (using TLS security) and RADIUS/UDP (using
   shared secret security),and where the RADIUS/UDP transport is the
   failover option if the TLS session cannot be established, a down-
   bidding attack can occur if an adversary can maliciously close the
   TCP connection, or prevent it from being established.  Situations
   where clients are configured in such a way are likely to occur during
   a migration phase from RADIUS/UDP to RADIUS/TLS.  By preventing the
   TLS session setup, the attacker can reduce the security of the packet
   payload from the selected TLS cipher suite packet encryption to the
   classic MD5 per-attribute encryption.  The situation should be
   avoided by disabling the weaker RADIUS/UDP transport as soon as the
   new RADIUS/TLS transport is established and tested.  Disabling can
   happen at either the RADIUS client or server side:

   o  Client side: de-configure the failover setup, leaving RADIUS/TLS
  as the only communication option

   o  Server side: de-configure the RADIUS/UDP client from the list of
  valid RADIUS clients

I hope that makes my intended statement clearer.

If I'm not mistaken, IETF LC period is now over. I plan to produce a new
-11 revision tomorrow to prepare the IESG review phase. It would be nice
if you could let me know whether the changes I did in the document
satisfactorily address your concerns.

Greetings,

Stefan Winter

 
 In any case, I take the point that the text is confusing for readers.
 
 While resolving the AD comments, I agreed with Dan Romascanu to
 reformulate this whole paragraph and move it to Security Considerations
 instead. I'll follow up with the new text later today.
 
 Section 6

In the case of dynamic peer discovery as per
[I-D.ietf-radext-dynamic-discovery], a RADIUS/TLS node needs to be
able to accept connections from a large, not previously known, group
of hosts, possibly the whole internet.  In this case, the server's
RADIUS/TLS port can not be protected from unauthorised connection
attempts with measures on the network layer, i.e. access lists and
firewalls.  This opens more attack vectors for Distributed Denial of
Service attacks, just like any other service that is supposed to
serve arbitrary clients (like for example web servers).

In the case of dynamic peer discovery as per
[I-D.ietf-radext-dynamic-discovery], X.509 certificates are the only
proof of authorisation for a connecting RADIUS/TLS nodes.  Special
care needs to be taken that certificates get verified properly
according to the chosen trust model (particularly: consulting CRLs,
checking critical extensions, checking subjectAltNames etc.) to
prevent unauthorised connections.


 [BA] I'd recommend collecting this and other dynamic-discovery related
 material
 into a separate section prior to 3.1.
 
 Moved out of the document, to go into dynamic-discovery.
 
 Appendix C. Assessment of Crypto-Agility Requirements


The RADIUS Crypto-Agility Requirements (link to RFC once issued here)
defines numerous classification criteria for protocols that strive to
enhance the security of RADIUS.  It contains mandatory (M) and
recommended (R) criteria which crypto-agile protocols have to
fulfill.  The authors believe that the following assessment about the
crypto-agility properties of RADIUS/TLS are true.

 [BA] The Crypto-Agility RFC is now published so you should reference that.
 
 Done now in my working copy.
 
 Thanks for this extensive review, much appreciated!
 
 Greetings,
 
 Stefan Winter
 
 
 
 
 ___
 Ietf mailing list
 Ietf@ietf.org
 https://www.ietf.org/mailman/listinfo/ietf


-- 
Stefan WINTER
Ingenieur de Recherche
Fondation RESTENA - Réseau Téléinformatique de l'Education Nationale et
de la Recherche
6, rue Richard Coudenhove-Kalergi
L-1359 Luxembourg

Tel: +352 424409 1
Fax: +352 422473



signature.asc
Description: OpenPGP digital signature
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: [radext] Review of draft-ietf-radext-radsec

2012-01-26 Thread Stefan Winter
Hi,

If peer communication between two devices is configured for both
RADIUS/TLS transport (using TLS security) and RADIUS/UDP (using
shared secret security),and where the RADIUS/UDP transport is the
failover option if the TLS session cannot be established, a down-
bidding attack can occur if an adversary can maliciously close the
TCP connection, or prevent it from being established.  Situations
where clients are configured in such a way are likely to occur during
a migration phase from RADIUS/UDP to RADIUS/TLS.  By preventing the
TLS session setup, the attacker can reduce the security of the packet
payload from the selected TLS cipher suite packet encryption to the
classic MD5 per-attribute encryption.  The situation should be
avoided by disabling the weaker RADIUS/UDP transport as soon as the
new RADIUS/TLS transport is established and tested.  Disabling can
happen at either the RADIUS client or server side:
  
o  Client side: de-configure the failover setup, leaving RADIUS/TLS
   as the only communication option
  
o  Server side: de-configure the RADIUS/UDP client from the list of
   valid RADIUS clients
  
 I hope that makes my intended statement clearer.
  
 [BA] My issue is the use of a well known shared secret with RADIUS/UDP. 
 This could be fixed by requiring that a server supporting RADIUS/TLS MUST
 check for a RADIUS/TLS connection before allowing use of the well known
 shared secret. 

Ah, I see. The spec does not mandate a fixed well-known shared secret
for RADIUS/UDP at all. It only specifies that when TLS transport is
used, security is provided on the transport layer, so the shared secret
that used to protect the RADIUS payload is useless is set to this fixed
term.

When using RADIUS/UDP, the shared secret is still chosen by the
administrator by configuration.

Would it help to clarify the first lines to read:

If peer communication between two devices is configured for both
RADIUS/TLS transport (i.e. TLS security on the transport layer,
shared secret fixed to radsec) and RADIUS/UDP (i.e. shared secret
security with a secret manually configured by the administrator),
and where the RADIUS/UDP transport is the failover option if the
TLS session cannot be established, a down-bidding attack can occur
if an adversary can maliciously close the TCP connection, or
prevent it from being established.

Just to make sure people realise that RADIUS/UDP security is untouched
by this spec?

Greetings,

Stefan Winter

-- 
Stefan WINTER
Ingenieur de Recherche
Fondation RESTENA - Réseau Téléinformatique de l'Education Nationale et
de la Recherche
6, rue Richard Coudenhove-Kalergi
L-1359 Luxembourg

Tel: +352 424409 1
Fax: +352 422473



signature.asc
Description: OpenPGP digital signature
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: [radext] Review of draft-ietf-radext-radsec

2012-01-26 Thread Stefan Winter
 suggestion of using Accounting-Response + Error-Cause. It may be
the adequate thing to do since this specification is going for
Experimental only.

In the long run though, I think this solution is inadequate; if
Accounting-NAK signalling is to be fixed, it should be fixed properly
(i.e. on a per-packet basis) for all transports, not just this one.
Maybe by updating 2866 with a consistent use of Error-Cause, or maybe by
adding an Accounting-NAK packet type, analogous to the dynauth NAKs.

It is definitely a useful thing to work on; but it's not for the
RAIDUS/TLS draft to decide. That would need a wg chartered item (luckily
radext is discussing rechartering right now; this might be worthwhile to
include...)

Please let me know if you'd prefer the Error-Cause patch to be in this
spec; I'll do as you say :-)

I promised my AD to publish the -11 revision for IESG review later
today; if our conversation didn't converge until then, there can always
be a -12. Probably necessary after the IESG review anyway :-)

Greetings,

Stefan Winter


 
 
 
 
 ___
 radext mailing list
 rad...@ietf.org
 https://www.ietf.org/mailman/listinfo/radext


-- 
Stefan WINTER
Ingenieur de Recherche
Fondation RESTENA - Réseau Téléinformatique de l'Education Nationale et
de la Recherche
6, rue Richard Coudenhove-Kalergi
L-1359 Luxembourg

Tel: +352 424409 1
Fax: +352 422473



signature.asc
Description: OpenPGP digital signature
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: one data point regarding native IPv6 support

2011-06-10 Thread Stefan Winter
Hi,

 ... when the support people for a fairly well-established telco
 haven't even heard of IPv6, it's hard to believe that it's going
 to be available anytime soon.
 [multiple people essentially reporting the same]
 At this point in time $ISP has no immediate plans for implementation.
 I would say it's about time reality finally settles in.

My reality is that I switched to an ISP who openly announced native IPv6
support in their offering in 2007. Up and running since then, and when I
had trouble setting up the IPCP+IP6CP in the same PPP channel in IOS, I
wrote them an email on a Saturday, and got a config snippet back an hour
later, as part of their standard customer service. That ISP operates
nation-wide and uses IPv6 as a marketing instrument to get techies to
subscribe. For a price of converted 15 USD per month. That's in Germany
though. Apparently, realities differ depending on where you are.

Greetings,

Stefan Winter


 Keith Moore wrote:
 Meanwhile, 6to4 continues to work just fine for me.
 So please explain again why it isn't premature to
 discourage a valuable transition mechanism?
 On that one I agree with Keith; where's the rush? Although imperfect,
 6to4 was an obvious path and its demise would be the failure of the
 IETF, following a long list of things that have been killed prematurely.


 Ned wrote:
 Anyone who doesn't believe we have a major marketing
 problem here isn't paying attention.
 Hmm that is a point of view. You think you have a solution (IPv6) to
 what you perceive to be a problem (shortage of IPv4 addresses).

 However, some ISPs (and some other companies) do not consider it a
 problem, but a blessing. What the IPv4 shortage does is that it prevents
 new large players to enter the field, while allowing existing players to
 continue to do business as usual.

 As the shortage as been predicted for a decade, some (not all) have
 stockpiled addresses and are now reaping the benefits. In business, this
 situation is worth solid gold: it's called a monopoly. I'm fat and
 happy, and I want it to continue. In this case, it's even better:
 companies who benefit from it can argue that they are not the ones who
 created the monopoly, it was a built-in limitation of the system as
 created.

 Some may not like the parallel, but we have failed the IPv6 migration
 the same way we have failed the war on drugs. A while ago, there was
 this thing called the Tier-1 cartel. As originally designed, a very
 elusive club, with almost no way in and absolutely no tears when a
 member gets de-peered.

 Some have said that the cartel has failed as a system (due to a large
 number of multilateral peering agreements and other factors). But now
 what we have is a much larger number of largely unorganized but sharing
 the same goals entities: those who already have IPv4 addresses. It's
 even worse.

 When a resource becomes scare or limited, the big picture is not how
 much of it is available, or how much it costs. The big picture is how
 much of the market one does control. Now we are in the situation where
 everyone and their sister own a piece of the pie, and as long as the
 price of the pie keeps going up, they're going to cling to it.

  
 On top of the marketing problem you mentioned, you have a bigger one:
 there are many, many organizations out there that, even if you paid them
 to deploy IPv6, would not. Because IPv6 is a territorial threat to them.

 While the new or wannabe players would like the extra address space, the
 sad truth is that the already establish players don't like newly open
 spaces and prefer the territory control that comes with owning a piece
 of a limited land space.

 Michel.

 ___
 Ietf mailing list
 Ietf@ietf.org
 https://www.ietf.org/mailman/listinfo/ietf


-- 
Stefan WINTER
Ingenieur de Recherche
Fondation RESTENA - Réseau Téléinformatique de l'Education Nationale et de la 
Recherche
6, rue Richard Coudenhove-Kalergi
L-1359 Luxembourg

Tel: +352 424409 1
Fax: +352 422473




signature.asc
Description: OpenPGP digital signature
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: one data point regarding native IPv6 support

2011-06-10 Thread Stefan Winter
Hello,

 You appear to be able to browse the IPv4 Internet only. You will not
 be able to reach IPv6-only sites.

 Please can some one visit http://test-ipv6.com/# and give me more
 explanation on the displayed result?

That message is quite clear, isn't it? You use an Internet Service
Provider which only supplies you with IPv4 connectivity. If you want to
visit a website which only supports IPv6, it will not work.

The test website can be reached on both IPv4 and IPv6. So it can tell
you: you came here via IPv4, and didn't manage to get here via IPv6. So
there is no working IPv6 for you.

Stefan


 Kind regards,

 Otunte Otueneh
 ISOC Nigeria Chapter


 On Fri, Jun 10, 2011 at 7:32 AM, Stefan Winter
 stefan.win...@restena.lu mailto:stefan.win...@restena.lu wrote:

 Hi,

  ... when the support people for a fairly well-established telco
  haven't even heard of IPv6, it's hard to believe that it's going
  to be available anytime soon.
  [multiple people essentially reporting the same]
  At this point in time $ISP has no immediate plans for
 implementation.
  I would say it's about time reality finally settles in.

 My reality is that I switched to an ISP who openly announced
 native IPv6
 support in their offering in 2007. Up and running since then, and
 when I
 had trouble setting up the IPCP+IP6CP in the same PPP channel in
 IOS, I
 wrote them an email on a Saturday, and got a config snippet back
 an hour
 later, as part of their standard customer service. That ISP operates
 nation-wide and uses IPv6 as a marketing instrument to get techies to
 subscribe. For a price of converted 15 USD per month. That's in
 Germany
 though. Apparently, realities differ depending on where you are.

 Greetings,

 Stefan Winter

 
  Keith Moore wrote:
  Meanwhile, 6to4 continues to work just fine for me.
  So please explain again why it isn't premature to
  discourage a valuable transition mechanism?
  On that one I agree with Keith; where's the rush? Although
 imperfect,
  6to4 was an obvious path and its demise would be the failure of the
  IETF, following a long list of things that have been killed
 prematurely.
 
 
  Ned wrote:
  Anyone who doesn't believe we have a major marketing
  problem here isn't paying attention.
  Hmm that is a point of view. You think you have a solution (IPv6) to
  what you perceive to be a problem (shortage of IPv4 addresses).
 
  However, some ISPs (and some other companies) do not consider it a
  problem, but a blessing. What the IPv4 shortage does is that it
 prevents
  new large players to enter the field, while allowing existing
 players to
  continue to do business as usual.
 
  As the shortage as been predicted for a decade, some (not all) have
  stockpiled addresses and are now reaping the benefits. In
 business, this
  situation is worth solid gold: it's called a monopoly. I'm fat and
  happy, and I want it to continue. In this case, it's even better:
  companies who benefit from it can argue that they are not the
 ones who
  created the monopoly, it was a built-in limitation of the system as
  created.
 
  Some may not like the parallel, but we have failed the IPv6
 migration
  the same way we have failed the war on drugs. A while ago, there was
  this thing called the Tier-1 cartel. As originally designed, a very
  elusive club, with almost no way in and absolutely no tears when a
  member gets de-peered.
 
  Some have said that the cartel has failed as a system (due to a
 large
  number of multilateral peering agreements and other factors).
 But now
  what we have is a much larger number of largely unorganized but
 sharing
  the same goals entities: those who already have IPv4 addresses. It's
  even worse.
 
  When a resource becomes scare or limited, the big picture is not how
  much of it is available, or how much it costs. The big picture
 is how
  much of the market one does control. Now we are in the situation
 where
  everyone and their sister own a piece of the pie, and as long as the
  price of the pie keeps going up, they're going to cling to it.
 
 
  On top of the marketing problem you mentioned, you have a bigger
 one:
  there are many, many organizations out there that, even if you
 paid them
  to deploy IPv6, would not. Because IPv6 is a territorial threat
 to them.
 
  While the new or wannabe players would like the extra address
 space, the
  sad truth is that the already establish players don't like newly
 open
  spaces and prefer the territory control that comes with owning a
 piece
  of a limited land space.
 
  Michel

Re: How to pay $47 for a copy of RFC 793

2011-05-09 Thread Stefan Winter
Hi,

 Today if you're an IEEE type, and you wonder where to find RFC 793, or
 you're wondering what RFC 793 is about, and you look it up in IEEE
 Xplore, the online library that all electrical engineers use, and that
 their employers have site subscriptions for, you'll find ... nothing.
 Yes, you can find it in Google, but Google isn't a particularly good
 place to look for engineering papers.  Xplore is.  RFCs aren't in the
 ACM Digital Library, either, same problem.
 Nor is it in Google Scholar, which is generally where I look first.

As a KDE user, I use the incredibly short shortcut of typing Alt+F2
and then rfc:793Enter

(which redirects to http://www.ietf.org/rfc/rfc793.txt, not the GED
hardcopy reseller :-) )

But maybe an IEEE type (whatever that is) doesn't use KDE. Or any kind
of search engine that would yield the document in a fraction of a
second. Or the internet at all?

Stefan Winter

-- 

Stefan WINTER
Ingenieur de Recherche
Fondation RESTENA - Réseau Téléinformatique de l'Education Nationale et de la 
Recherche
6, rue Richard Coudenhove-Kalergi
L-1359 Luxembourg

Tel: +352 424409 1
Fax: +352 422473




signature.asc
Description: OpenPGP digital signature
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: can we please postpone the ipv6 post-mortem?

2010-10-18 Thread Stefan Winter

 Hi,


Windows 7: enabled by default. Mac OS: enabled by default. Linux:
whatever your distro does. I fail to see your point.

Windows XP: disabled by default.  Has been sold on the majority of
Netbooks well into 2010, and Netbooks were 1/3rd of the PC sales.


By the time end consumers feel an actual *need* to run IPv6, popular 
computer magazines will have the hot, new, hacker trick 'cmd' - 'ipv6 
install'.
But by that same time, people will probably not even remember the 
acronym XP. Hopefully so, for all of us :-)



IPv6-capable beta firmwares for Fritz DSL-routers exist only for the
two most recent models 7390 and 7270(v?).  Other models (like the 7112/7113)
or 7170, 7150) do *NOT* have sufficient resources to run IPv6 -- their
flash memory is close to full as well as their RAM when they're running.


So you need to buy new IT equipment every n years, where n is by 
preference (for the vendor) a low number? I'm shocked. BTW, switching 
your DSL contract after the 2-year-handcuff of your favourite operator 
will give you a new model for free.


Stefan



-Martin



--
Stefan WINTER
Ingenieur de Recherche
Fondation RESTENA - Réseau Téléinformatique de l'Education Nationale et de la 
Recherche
6, rue Richard Coudenhove-Kalergi
L-1359 Luxembourg

Tel: +352 424409 1
Fax: +352 422473

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: can we please postpone the ipv6 post-mortem?

2010-10-15 Thread Stefan Winter

 Hi,


Huh?  Hardly anyone support IPv6 these days.

Sony KDL40*X70* internet-enabled LED-LCD-TV, 2010, IPv4-only (bought 7/2010)


My TV is bought 2009 and doesn't have any internet at all. And I don't 
care (much). It's a TV. Of all my gadgets, the TV is on my lowest 
priority for getting an IPv6 connectivity.



Western Digital MyBookWorld2 HomeNAS, 2009, IPv4-only


I don't mean to criticise your buying decision, but if you are so 
serious about IPv6 connectivity, why didn't you just buy a QNAP device? 
Comes with IPv6 just fine.



Nintendo WII appears to be IPv4-only


I do mean to criticise your buying decision: Playstation rocks :-) No, 
it won't give you IPv6 either; but it gets close to the TV argument. 
Probably my PS3 and TV will be dead (or administratively obsoleted) 
before I get headaches about them not reaching IPv6-only Firmware Update 
services etc. - because these devices still do dual-stack just fine.



most home users in Germany can not even get IPv6 from their ISP,
even when they had an IPv6-capable DSL-router.


Excuse me, but this is completely 1990s argumentation. I have native 
IPv4+IPv6 with a commodity DSL provider since years. 2006, IIRC. And my 
own /48 with it. And the operator works Germany wide. With reasonable 
costs; my flatrate costs 9,50 EUR per month (though that's a legacy 
tariff, you can't order it any more). If you want IPv6, just go order 
it. I keep hearing this very argument over and over again - and it is 
simply not at all true; at least not in Germany.


I'm not affiliated with the provider, other than being a satisfied 
customer: http://www.titan-dsl.de



What capabilities there are available on the internet backbone
or what could be enabled on newer operating systems by sophisticated
end users doesn't matter much, if most of the internet-enabled
end user equipment, that is being sold to consumers, is still IPv4-only.


Windows 7: enabled by default. Mac OS: enabled by default. Linux: 
whatever your distro does. I fail to see your point.



What we desperately need is factory-enabled transparent
internetworking on all _NEW_ networking equipment and internet-enabled
gadgets and appliances.  As long as IPv4 and IPv6 are seperate worlds
the hen-and-egg stalemate is going to continue.  And the useful
lifetime of all brand-new IPv4-only equipment that is produced by
the electronic entertainment industry is about 5-15 years.


The main point that needs attention is router equipment, IMHO. There's a 
Fritz!Box beta firmware for IPv6 right now; when it's final, pushing 
that out will fix the deployment of IPv6 for most of Germany (as they 
happen to be quite popular there).


Dates are arguable, but: I suspect it will be + 15 years before content 
providers will switch to IPv6-only. If they do so before, this will 
reduce the useful lifetime of your already-bought electronics a bit. 
Hooray for the industry: they can sell new stuff to you then. That kind 
of thinking is probably not what you as a customer appreciate, but it's 
just fine if seen from the other side :-)


Stefan


-Martin

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf



--
Stefan WINTER
Ingenieur de Recherche
Fondation RESTENA - Réseau Téléinformatique de l'Education Nationale et de la 
Recherche
6, rue Richard Coudenhove-Kalergi
L-1359 Luxembourg

Tel: +352 424409 1
Fax: +352 422473

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Last Call: draft-ietf-dime-rfc3588bis-25.txt (Diameter Base, Protocol) to Proposed Standard

2010-10-12 Thread Stefan Winter

 Hi,

I was surprised to see the line No IPR declarations were found that 
appear related to this I-D. in the message from ietf-announce. Its 
predecessor, RFC3588, has a filed IPR disclosure from Nokia, see


https://datatracker.ietf.org/ipr/323/

A very long time ago, I looked into the patents in question, and they 
seemed to be related to the T-Bit (Diameter message command flag for 
potentially re-transmitted message).


Page 35 in 3588bis still contains the T-Bit. As a naive non-legalese 
person, I would think that the same disclosure that applied to the T-Bit 
in 3588 also applies to the T-Bit in 3588bis then.


Greetings,

Stefan Winter

--
Stefan WINTER
Ingenieur de Recherche
Fondation RESTENA - Réseau Téléinformatique de l'Education Nationale et de la 
Recherche
6, rue Richard Coudenhove-Kalergi
L-1359 Luxembourg

Tel: +352 424409 1
Fax: +352 422473

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Advance travel info for IETF-78 Maastricht

2010-04-02 Thread Stefan Winter
Hi,

 I was living in France in spring 2005 when the chip and pin systems went
 live there.
 There was a very short period where cards without chip and pin did not
 work.

 Two days later, facing the inability to take money from foreigners,
 signature-based transactions were back.

 Sometimes (including in the UK) the shop-owner may sigh in a dramatic
 way as they reach for the pen, but money is money!
 ...

 The more tricky part are cases where there's nobody around to check a
 signature (ticket machines in Stockholm come to mind).

While we are on anecdotal notes on the b0rken CC system, here's one from
Germany:

Signature-based CCs were - and are - rather popular here. The Chip+PIN
system was introduced anyways, which is arguably a good thing. My bank
wrote me a nice letter that Chip+PIN had to be put on my new card, but
to ensure that I can use the card in the more convenient (WTH?) way of
signing, it had been configured to offer POSes both options, but
defaulting to signature.
This makes sure that
a) I use signature next to everywhere, which makes me forget the
nevertheless existing PIN
b) if some POS understands enough handshaking to choose between the two
and use Chip, I'm lost because I forgot it
c) if some POS insists on Chip+PIN but does not understand enough
handshaking to recognise that there is more than the default sig
method on the card, I won't get service. Due to that, I can not use any
automatic-payment refueling stations in Luxembourg, nor rent a bike
(Veloh!) in Luxembourg City. Or train ticketing machines in the UK.

I'm delighted. Thanks, financials!

That's it for the rant of the day, happy Easter!

Stefan Winter

-- 
Stefan WINTER
Ingenieur de Recherche
Fondation RESTENA - Réseau Téléinformatique de l'Education Nationale et de la 
Recherche
6, rue Richard Coudenhove-Kalergi
L-1359 Luxembourg

Tel: +352 424409 1
Fax: +352 422473




signature.asc
Description: OpenPGP digital signature
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Why the normative form of IETF Standards is ASCII

2010-03-11 Thread Stefan Winter
Hi,

(ah, flamewars! My favourite! :-) )
 Can't you notice fancy tool of you have wrongly translated a
 character in univerval. ?Any of quoted message, even though
 the original message by Martin Rex is pure ASCII.

 That is, two consequetive space charactersbefore Any is
 translated to a space character and something else, which is not
 legible to me.
   

The converted message displayed perfectly for me (no question mark, but
a non-breaking-space). That is because I use a standards-compliant mail
reader which

a) figured that the message encoding for Tim's message is ISO-8859-1
b) the character in question is listed in ISO-8859-1 as NBSP
c) consequently displayed a NBSP for me.

If your mail reader displayed something else, it is either misconfigured
or broken. Please do not use your misconfiguration or broken software as
an argument why using a beyond-ASCII character set is a bad thing in
itself. Instead, either configure your product of choice to respect the
advertised encoding, or complain to the vendor of your product of choice
to fix their software.

To get to the marginal correct point in your rant above: you may
consider it rude by Tim that he mis-quoted the original post, and did
some editing - even though the editing is not even visible. Whether or
not that alteration of the original text upsets you or not is entirely
your own thing, of course. It doesn't contribute very much to the
discussion on character sets for RFC documents though.

 You have successfully demostrated that, beyond ASCII, even the
 simplest character handling is impossible.
   

No, you have successfully demonstrated that the webmailer you are using
is doing a bad job. (And I can easily say that in this case, because for
an NBSP there is not possibly an excuse But I don't have a font which
would contain this character - NBSPs are a standard feature of every
web page, and a webmailer in particular needs to know how to handle that )

 Before saying something about long history of confusions and frauds
 on  internationalization, please don't convert someone else's pure
 ASCII message into something else.
   

Conversions happen daily in countless formats. Your mail has been
archived in the IETF's mailing list archive for ietf@ietf.org, and will
be displayed, behold, on a *web page*. Fancy HTML tags around it.
different font sizes for the headline. Does that upset you? If yes: even
the IETF web archive does a better job at displaying your mail than your
mail agent of choice. If you visit the following link, you'll see Tim's
message on the IETF web archives. Note the perfectly rendered space
instead of a question mark.

http://www.ietf.org/mail-archive/web/ietf/current/msg60578.html

(if you still see the ? instead, read above paragraph about
misconfigured or broken software)

Greetings,

Stefan Winter

-- 
Stefan WINTER
Ingenieur de Recherche
Fondation RESTENA - Réseau Téléinformatique de l'Education Nationale et de la 
Recherche
6, rue Richard Coudenhove-Kalergi
L-1359 Luxembourg

Tel: +352 424409 1
Fax: +352 422473




signature.asc
Description: OpenPGP digital signature
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Why the normative form of IETF Standards is ASCII

2010-03-11 Thread Stefan Winter
Hi,

 As usual, the discussion of ASCII plain text versus beyond-ASCII
 plain text has been mixed up with the essentially unrelated
 discussion of plain text versus another format.

+1

Stefan


 Martin Rex mrex at sap dot com wrote:

 Unicode characters are also a Royal PITA in specs, because they're
 non-discussable.  There are extremely few people who can recognize
 all unicode codepoints from their glyphs (and a number of them can
 not be distinguished by their glyphs), and even worse, most
 machines/environments do not even have fonts to display glyphs for
 most of the unicode codepoints.

 The fact that Latin A and Cyrillic А and Greek Α look the same is not
 a reason to stick with only 95 printable characters.  RFCs are not
 spoofing targets.

 The fact that most systems cannot display most of the unicode
 codepoints is irrelevant, because most English-language texts (like
 RFCs) use only characters in a small and well-known fraction of the
 Unicode code space.  You might expect an RFC to contain non-ASCII
 characters like á and — that are part of a well-known and widely used
 subset like WGL4.  You would not expect it to contain Egyptian
 hieroglyphs or Vai syllables or domino tiles.

 -- 
 Doug Ewell  |  Thornton, Colorado, USA  |  http://www.ewellic.org
 RFC 5645, 4645, UTN #14  |  ietf-languages @ http://is.gd/2kf0s ­

 ___
 Ietf mailing list
 Ietf@ietf.org
 https://www.ietf.org/mailman/listinfo/ietf


-- 
Stefan WINTER
Ingenieur de Recherche
Fondation RESTENA - Réseau Téléinformatique de l'Education Nationale et de la 
Recherche
6, rue Richard Coudenhove-Kalergi
L-1359 Luxembourg

Tel: +352 424409 1
Fax: +352 422473




signature.asc
Description: OpenPGP digital signature
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: Visas and Costs

2009-09-22 Thread Stefan Winter
Hi,

 Okay, so one advantage of having a meeting in the PRC is that the
 majority of participants (including US and Canadian ones) who can
 normally travel almost anywhere without VISAs will have to experience
 some of the pain of getting a VISA.

You may have meant this in a sarcastic way, but it very literally *is*
an advantage: it may cure some of the U.S. IETF participants who usually
hand-wave away the visa issue of non-U.S. participants in a U.S. venue
as can't be that bad, stop whining. It is always good to see the
other side. Makes for a better discussion ground.
(Disclaimer: I was not one of the people needing a visa. But I can have
empathy for other beings.)

Greetings,

Stefan Winter
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: RFC archival format, was: Re: More liberal draft formatting standards required

2009-07-08 Thread Stefan Winter
Hi,
 You're heading into new territory, here.  Right now
 IETF documents are written in English and they're

If you allow a bit of nitpicking here: they cannot be written in all the
labels the English language has to offer, and thus they can only be
written in a *subset* of English. So a devil's advocate (which I
absolutely don't mind playing here) could say that the restriction to
ASCII *prevents* expressing oneself in the full bouquet of English
language; unfortunately, English language is mandatory for IETF
documents. So, staying with ASCII would require a reformulation for IETF
language from

English

to

English words which can be expressed in ASCII encoding

Example?

Naïve is a perfectly valid English word. (If your mail reader doesn't
display this correctly: that's an i with two dots on top instead of one)
Likewise is coup d'état an English word (e with accent). All loan
words from French, but nontheless English words.

http://en.wikipedia.org/wiki/Naive
http://en.wikipedia.org/wiki/Coup_d%27Etat

At least the first one has been used in an I-D from the IAB very
recently
(http://www.ietf.org/internet-drafts/draft-iab-idn-encoding-00.txt). It
used the alternative spelling with a normal i; the other spelling was
obviously impossible for the reasons we are discussing in (parts of)
this thread. Maybe the author wanted to use that alternative spelling
anyway, but maybe he was forced to use it even though it hurt his eye
and he is now drowning in grief over the butchering of language he was
forced to execute in order to publish his work. We will never know for
sure; unless of course the author tells us about his feelings on this
list :-)

Let's give ASCII its long-overdue coup de grâce (
http://en.wikipedia.org/wiki/Coup_de_grace ).

Greetings,

Stefan Winter

 displayable on a wider variety of hardware than HTML
 is.  As I mentioned in the mail to which you're responding,
 I think the choice of formats tends to support more
 openness and accessibility.  I think you're implicitly
 arguing that that's not the right tradeoff, and frankly
 I think it's exactly the right tradeoff, myself.

 Melinda

 ___
 Ietf mailing list
 Ietf@ietf.org
 https://www.ietf.org/mailman/listinfo/ietf


-- 
Stefan WINTER
Ingenieur de Recherche
Fondation RESTENA - Réseau Téléinformatique de l'Education Nationale et de la 
Recherche
6, rue Richard Coudenhove-Kalergi
L-1359 Luxembourg

Tel: +352 424409 1
Fax: +352 422473

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: More liberal draft formatting standards required

2009-07-03 Thread Stefan Winter
Hi,

 What I hear in these discussions can get translated into a lot of it
 would be nice and
 little if any it is essential that.

 Changes to existing procedures tend to get driven by it is essential
 that, which is my point.
 A working group saying that
 the existing format restrictions are severely hindering their work
 would count for a lot here.

I'll have a go at it (I am not a working group, but I hope you allow me
to express my opinion anyway). Plain ASCII makes work on drafts which
deal with internationalisation very hard. I have just uploaded a draft
with an example second-level domain containing the German small u-Umlaut
[U+00FC] as input to an algorithm.

Sorry, in fact the draft did of course *not* contain the umlaut. I had
to escape it with the [U+00FC]. Writing that impairs the readability and
understandability of the example quite a bit since the input on paper
is not the same as the actual input. This is, IMHO, severely hindering
work.

If merely expressing oneself *about* i18n problems properly is
impossible, I'm not really surprised that internationalisation is
perceived as hard and cumbersome. (It's hard and cumbersome enough
without these restrictions already anyway.) Unicode is there for a while
already and I think switching to any kind of format that supports
international character sets is essential. Pick any format you like, as
long as it allows people to express their problems and solutions without
ugly hacks (read: as long as it supports the full set of Unicode - not
just the first 127 characters).

Greetings,

Stefan Winter

P.S.: a2ps never failed on me for producing 2-up, nicely framed and
properly page-breaked printer output.

-- 
Stefan WINTER
Ingenieur de Recherche
Fondation RESTENA - Réseau Téléinformatique de l'Education Nationale et de la 
Recherche
6, rue Richard Coudenhove-Kalergi
L-1359 Luxembourg

Tel: +352 424409 1
Fax: +352 422473

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Results from the Federated Roaming BBoF

2008-03-13 Thread stefan . winter
Hi folks,

this is a short summary of the Federated Roaming BBoF yesterday  
evening. My two Guinness hopefully left enough brain cells intact for  
this to be a complete report, but in case not: everybody who was  
there, please complete the pieces that I may have missed.

RadSec
--
After an introductory explanation of our deployment scenario in  
eduroam - aggregation of independent administrative domains  
(universities) to a central national proxy, and further aggregation of  
nationals into a continental proxy - we figured that at least in this  
particular use case, there is a good reason for a reliable transport,  
but no need for fancy Diameter features - especially since eduroam  
lacks commercial interest, i.e. accounting.
In the course of the discussion, it turned out that other people feel  
the exact contrary need: Diameter over UDP (reported by Avi Lior).  
Interestingly enough, there were also use cases in the Diameter area  
that would require proxy hierarchies. It was interesting to see that  
both of the protocols provoked the same concepts of aggregation  
hierarchies in certain use cases. There was also an agreement that  
apparently none of the two protocols is superior to the other in all  
aspects, and a deployer would need to make his choice. In the end  
there was a rough agreement of let all the AAA transports have all  
the transport profiles they think they need, but the ultimate  
decision about that would need to be taken in radext on Friday.

EAP error reporting
---
Basic problem statement: if an EAP session can not be established or  
is interrupted prematurely, there is no good error reporting mechanism  
back to the supplicant+user.
Avi confirmed that this is not only a concern for eduroam, WiMAX  
deployments see the same need. It would be good to have a reporting  
mechanism in EAP preferably (for the WiFi case, having one in 802.1X  
would also do, but EAP would be the more general solution).

Binding layer 2 authenticated entities to layer 3 addresses
---
Lawful interception is one of the drivers for that, current approaches  
to it are snooping DHCP traffic (as discussed on int-area before the  
BBoF). Having a clean solution here would be desirable. Stig's  
approach from the mailing list (distributing keys to supplicant within  
EAP and DHCP server via some other mechanism to bind the leased IP  
address to the entity was mentioned. Stig wasn't at the BBoF but later  
came up with a pretty sonsistent idea. He is going to write an I-D  
about it. (Note from self, not discussed in meeting: It is unclear  
though how this works with IPv6. Relying on DHCPv6 would need to  
disable stateless auto-config, and IPv6 Privacy Extensions wouldn't  
work any more)

EAP fragmentation
-
A report on EAP-TLS usage in eduroam came as a surprise to most  
participants: I had to report that EAP-TLS in the international  
roaming case does *not* work more often than it does. We have tracked  
down the likely causes to a) UDP fragmentation [authenticator adds  
lots of RADIUS attributes to the raw EAP data, and with EAP-TLS the  
EAP chunks are often = the link-layer MTU already, resulting RADIUS  
packet is then often  MTU between authenticator and AAA server]
When staying local, chunk sizes of EAP can be tweaked to make stuff  
work, but when roaming to an unknown network with unknown  
infrastructure, this gets difficult and would have to be done at  
end-user side, i.e. it exceeds John Doe's capabilities and can not be  
considered a usable solution.
Another possible cause is packet reordering and firewalls that then  
discard the incoming fragment because there's no observed previous  
fragment. We think that TCP as a transport (RadSec) could help  
mitigate that. There are no hard numbers and facts to prove that yet  
though. In any case, for plain RADIUS deployments, a  
max-desired-EAP-chunk discovery mechanism would be interesting.

That should be pretty much it.

May the force be with you,

Stefan Winter

___
IETF mailing list
IETF@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


BBoF on Federated Roaming: Update

2008-03-11 Thread stefan . winter
Hello,

the BBoF on Federated Roaming issues is still scheduled for Wednesday,  
20.00 hours, shortly after the plenary.

The number of responses so far was low enough to warrant ad-hoc  
location determination. Let's meet at the registration area.
As a rough indication what to expect: I'm almost 2m tall, and still in  
my late 20s (counting the days :-( ). Also I'm probably the most  
nervous person in the vicinity since this is my first BBoF-style thing  
:-)
The easiest choice from the registration area will probably be the  
Champions Bar on the ground floor, but I'm open to better ideas at any  
time.

Greetings,

Stefan Winter

___
IETF mailing list
IETF@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Discussion about Federated Roaming

2008-03-01 Thread Stefan Winter
Hello!

My name is Stefan Winter of the National Research and Education Network in 
Luxembourg, RESTENA. We are an ISP for academia and take the lead in research 
and development of a global academic wireless LAN federated roaming 
consortium: eduroam. This is based on EAP and 802.1X exclusively.

In the course of development, prototyping and rollout of eduroam, we have 
discovered that some areas of the relevant standards required some tweaking 
or workarounds. After following IETF work for some time, we also saw that 
some of the efforts exclude roaming use cases from their agenda.

So far I've heard that we are by far the biggest federated 802.1X roaming 
consortium at all, and I wonder if we are the only ones seeing some items 
that could use a second thought when considering roaming between independent 
administrative domains.

I will be at IETF71, and would like to invite anyone who is interested in 
federated roaming scenarios for an informal get-together to exchange ideas. I 
was planning to do this on Monday evening, at a location that is still TBD, 
I'll follow up. 

Below I've put together the most prominent items that are on our radar right 
now to give you a glimpse of the issues we in eduroam are dealing with.

The most prominent issue is the uneasy fact that RADIUS doesn't provide a 
reliable transport and only basic security, while Diameter has no 
implementations and NAS support in the wireless LAN area. With an EAP 
conversation requiring multiple, usually around eight, roundtrips, and a 
packet path that may literally span the whole world, this is a major concern. 
It also didn't particularly help that in a recent discussion on dime, it was 
stated that Diameter doesn't offer significant advances regarding roaming 
compared to RADIUS. 
We tried to mitigate this by proposing RadSec, RADIUS over TCP+TLS [1], and 
are pursuing this in the radext wg right now.

Another thing is that we have no sufficient signalling mechanism to reach the 
end user if the 802.1X login couldn't be completed because of an intermediary 
RADIUS proxy being down - due to the lack of possibility to provide error 
messages in the 802.1X protocol, most supplicants provide the unhelpful 
advice that Probably the password is wrong, which is wrong and generates 
user frustration. Some kind of hijacking the EAP conversation by the last 
responsive proxy to inject EAP-Notifications would be needed probably, but 
this is not thought through in its entirety yet. I'm aware that there is a 
security argument: not disclosing the reason for a failure may make attacks 
more difficult, but still: it would then be desirable to at least have the 
*option* of providing the info - right now it is impossible.

Then, encapsulating EAP in RADIUS may sometimes lead to RADIUS packets being 
so big that they have to be fragmented - not a conceptual problem, but a 
practical one, because out-of-order fragements, or even even in-order UDP 
fragments generate problems on unclever firewalls more often than not. 
Especially EAP-TLS, where both server and supplicant need to send large 
amounts of (certificate) data turned out to be a real challenge. A draft 
about that problem and a sketch of a possible solution is in the works.

Another thing that bugged us about RADIUS is the inability to contact new auth 
servers on the fly, for example when a new user realm is observed. So far, 
we stacked together RADIUS servers in a realm-based aggregation hierarchy. A 
better approach, in combination with the TCP+TLS nature of RadSec, would be 
to use a dynamic lookup mechanism (e.g. DNS NAPTR/SRV) that allows to 
discover the authoritative home server for a user's realm and to verify that 
server's eligibility by examining the certificate. This is a concept we will 
try out in semi-production use in eduroam soon, but it may have implications 
also out of the eduroam community, since it will allow arbitrary service 
providers to create an authentication fabric very easily on the technical 
side - making the *paperwork* of bootstrapping a roaming consortium the only 
big challenge.

We have been looking at the work of the NEA wg with a bit of concern, since 
its charter excludes the federated roaming case deliberately. For example, 
putting posture information into EAP will always convey the posture info to 
the home server, while it is the service provider that needs the posture 
information to make its admission decision. We understand though that there 
is work going on to make the use of NEA roaming-agnostic, which we would very 
much like to see.

Finally, there is a more exotic area in connection to roaming scenarios: 
converging roaming on the network layer (802.1X+EAP) with Single-Sign On on 
the application layer (SAML et al), with the ultimate goal that using a set 
of credentials to log into the network also generates an application layer 
token to use for signing into services - without the need to re-authenticate.

I realise that some