Re: interception proxies

2000-04-17 Thread Joe Touch
Erik Nordmark wrote: > > > A copy of the note, admittedly very rough (just an outline, and a very > > rough one at that) is at: > > > > http://www.isi.edu/touch/pubs/hazards-outline.txt > > This doesn't list what I thought was an obvious issue. > If multiple nodes are originating packets

Re: interception proxies

2000-04-14 Thread Erik Nordmark
> A copy of the note, admittedly very rough (just an outline, and a very > rough one at that) is at: > > http://www.isi.edu/touch/pubs/hazards-outline.txt This doesn't list what I thought was an obvious issue. If multiple nodes are originating packets with the same source IP address it wi

Re: interception proxies

2000-04-13 Thread Vijay Gill
On 13 Apr 2000, Marc Horowitz wrote: > Vijay Gill <[EMAIL PROTECTED]> writes: > > >> think this would be more of an end system issue rather than a "core" or a > >> "backbone" issue, where the end system is the box prior to the ISP handoff > >> and not quite under the ISP's control and not the en

Re: interception proxies

2000-04-13 Thread Salvador Vidal
Hello Vernon, At 21:48 12/04/00 -0600, you wrote: >I also think you need to give up the idea of >having computers make value judgements, but maybe that's just my lack of >imagination. > Sure that computers will improve doing judgements, but donĀ“t lost the main force on Interenet, there are hund

Re: interception proxies

2000-04-13 Thread John Martin
Keith, At 07:59 PM 11/04/00 -0400, Keith Moore wrote: > > This was a choice - in some larger sense, if sourcing other-owned IP > > addresses or TCP connections is considered an architectural problem, > > needs to come down from above, rather than up from WREC. > >sounds like a convenient excuse t

Re: interception proxies

2000-04-13 Thread John Martin
Vernon, At 04:47 PM 11/04/00 -0600, Vernon Schryver wrote: >Call me a non-team playing scab, but I refuse to the honor the old guild >work rule that limits the questions I can consider. If sourcing >other-owned etc. or anything else is an architectural or other problem, >then professional pride

Re: interception proxies

2000-04-13 Thread Marc Horowitz
Vijay Gill <[EMAIL PROTECTED]> writes: >> Any specific ISP's that one could care to name? Coming from an ISP, what >> I've seen in general is that most routers have just enough cycles in the >> forwarding path to keep up with the offered traffic, much less sit around >> watching for SYN's in fli

Re: interception proxies

2000-04-12 Thread Valdis . Kletnieks
On Wed, 12 Apr 2000 21:48:28 MDT, Vernon Schryver <[EMAIL PROTECTED]> said: > circumstances you care about. An interception proxy can affect > only traffic directed to it by a router in the path between IP > peers (e.g. HTTP client and server). Your "computers anywhere" > won't be using the ver

Re: interception proxies

2000-04-12 Thread Vernon Schryver
or persons to do > censor, ranking to do their purchases decisions or whatever they want!, and > probabily some people want to have more than one truster and balance them. > ... > So please, which will be the right tool for a truster service? Please read the two WREC drafts to discove

Re: interception proxies

2000-04-12 Thread Joe Touch
Keith Moore wrote: > > > As to the known-probs doc, that focuses on problems of the sort that > > TCPIMPL did - errors in the implementation, not deliberately changing > > specs. > > yes, but given that there are no specs for interception proxies, > how do y

Re: interception proxies

2000-04-12 Thread Keith Moore
> As to the known-probs doc, that focuses on problems of the sort that > TCPIMPL did - errors in the implementation, not deliberately changing > specs. yes, but given that there are no specs for interception proxies, how do you judge what is and is not an error in the implementation?

Re: interception proxies

2000-04-12 Thread Keith Moore
> > where did the wrec folks get the idea that the IP specification was > > obsolete? > > (speaking not for the entire WREC, but my impression of the meetings) I > did get the impression (mistakenly or not) that addressing the whole of > the IP spec was not particularly in scope (e.g., from our

Re: interception proxies

2000-04-12 Thread Joe Touch
"Dick St.Peters" wrote: > > Would you settle for "The IP spec authors didn't have enough foresight > to foresee a need to rewrite source addresses" ? :) > > Whatever anyone thinks of it, people are doing it. On the right are > people saying it is immoral, evil, and dangerous, not to mention >

Re: interception proxies

2000-04-12 Thread Joe Touch
Vernon Schryver wrote: > > My impression from the two WG documents is that in the WG consensus is > that HTTP interception proxies are at least tolerable and often necessary > and good, and by extension probably also for SMTP and everything else. The arch document defines, it doe

Re: interception proxies

2000-04-12 Thread Joe Touch
Keith Moore wrote: > > > This was a choice - in some larger sense, if sourcing other-owned IP > > addresses or TCP connections is considered an architectural problem, > > needs to come down from above, rather than up from WREC. > > sounds like a convenient excuse to me... > where did the wrec

Re: interception proxies

2000-04-12 Thread Keith Moore
> Actually, the view that everything about IP was cast in stone forever > in the IP spec is exactly the view that is being argued about. nobody has said anything about IP being cast in stone forever. Keith

Re: interception proxies

2000-04-12 Thread Salvador Vidal
ly values there will be >> also fun aplications of trusters. >> ... > >That is based on a fundamental misunderstanding of interception proxies. >Unless your ONGs, churges, other organizations, and so forth operate >geographically non-trivial IP networks, they need not and shou

Re: interception proxies

2000-04-12 Thread Dick St.Peters
Charles Lynn writes: > You have misread the specification. That "source" is not (IP Header) > "Source Address" that you imply, but the "source" mentioned earlier in > the sentence, i.e., "address in the source route" (option). Apparently so - though given that the part I emphasized immediately

Re: interception proxies

2000-04-12 Thread Vernon Schryver
n, I think that ONGs, churchs, and > other organizations and people will want to become Internet trusters soon, > to defend their values throught Internet, and not only values there will be > also fun aplications of trusters. > ... That is based on a fundamental misunderstanding of interc

Re: interception proxies

2000-04-12 Thread Valdis . Kletnieks
On Wed, 12 Apr 2000 18:51:51 +0200, Salvador Vidal said: > May be the first step of a ecologist truster will be to devolop a black > list of companies that are very agresive agains nature, the people that > join this truster will be able to have censorship of this companies in > order to presure t

Re: interception proxies

2000-04-12 Thread Salvador Vidal
Hello Vernon, >listed are technical nits. If you assume that "traffic redirection" >and an "interception proxy" are good things, then you might well worry >about the "lack of HTTP/1.1 compliance for proxy caches" or whether >"interception proxie

Re: interception proxies

2000-04-12 Thread J. Noel Chiappa
> From: "Dick St.Peters" <[EMAIL PROTECTED]> > The authors of the standard had the vision to foresee ... > they designed a protocol flexible enough to encompass things they > could not foresee. Pardon me if I emit a "balderdash". There's this tendency to act like IPv4 was handed

Re: interception proxies

2000-04-12 Thread C. M. Heard
On Wed, 12 Apr 2000, Dick St.Peters wrote: > Quoted from RFC791, the IP specification, in the section on loose > source routing, page 19 [emphasis added]: > >If the address in destination address field has been reached and >the pointer is not greater than the length, the next address in >

Re: interception proxies

2000-04-12 Thread Matt Crawford
Dick St.Peters says: > Quoted from RFC791, the IP specification, in the section on loose > source routing, page 19 [emphasis added]: > >If the address in destination address field has been reached and >the pointer is not greater than the length, the next address in >the source route r

Re: interception proxies

2000-04-12 Thread Charles Lynn
Dick, > Quoted from RFC791, the IP specification, in the section on loose > source routing, page 19 [emphasis added]: > >If the address in destination address field has been reached and >the pointer is not greater than the length, the next address in >the source route replaces the ad

Re: interception proxies

2000-04-12 Thread Keith Moore
> The authors of the standard had the vision to foresee that rewriting > the source address might be desireable under some circumstances. the authors of the IP standard provided for loose source routing. this should not be interpreted as license to impersonate a host when source routing was not r

Re: interception proxies

2000-04-12 Thread Dick St.Peters
Keith Moore writes: > > This was a choice - in some larger sense, if sourcing other-owned IP > > addresses or TCP connections is considered an architectural problem, > > needs to come down from above, rather than up from WREC. > > sounds like a convenient excuse to me... > where did the wrec fol

Re: interception proxies

2000-04-12 Thread Keith Moore
participation in the discussion. > My impression from the two WG documents is that in the WG consensus is > that HTTP interception proxies are at least tolerable and often necessary > and good, and by extension probably also for SMTP and everything else. the documents aren't publishe

Re: interception proxies

2000-04-11 Thread Vernon Schryver
cing something, then it can be important to not participate. Participation even in opposition inevitably supports the official position. 30 years ago the word "co-opted" was used to describe the problem. My impression from the two WG documents is that in the WG consensus is that HTTP

Re: interception proxies

2000-04-11 Thread Vijay Gill
On Tue, 11 Apr 2000, Theodore Y. Ts'o wrote: > And the latest kludge which has been called to my attention is ISP's > that tamper with the MSS values in TCP SYN packets in flight. This is > done to work around smaller MTU's caused by PPP over Ethernet (and other > tunnelling mechanisms) interac

Re: interception proxies

2000-04-11 Thread Theodore Y. Ts'o
Date: Tue, 11 Apr 2000 16:47:04 -0600 (MDT) From: Vernon Schryver <[EMAIL PROTECTED]> Which is why it was depressing. Oh, well, perhaps a future version of the Problems draft will consider that issue and say as others wrote, it's not a problem and can be fixed with big buffers wat

Re: interception proxies

2000-04-11 Thread Joe Touch
FWIW, there _was_ discussion in WREC of the hazards of transparent web caching. I dug up an old e-mail, describing the hazards of transparent web caching which I summarized at the time, when WREC was forming. A copy of the note, admittedly very rough (just an outline, and a very rough one at that

Re: interception proxies

2000-04-11 Thread Keith Moore
> Call me a non-team playing scab, but I refuse to the honor the old guild > work rule that limits the questions I can consider. If sourcing > other-owned etc. or anything else is an architectural or other problem, > then professional pride ought to force one to raise the issue insetad of > waiti

Re: interception proxies

2000-04-11 Thread Keith Moore
> This was a choice - in some larger sense, if sourcing other-owned IP > addresses or TCP connections is considered an architectural problem, > needs to come down from above, rather than up from WREC. sounds like a convenient excuse to me... where did the wrec folks get the idea that the IP spec

Re: interception proxies

2000-04-11 Thread Joe Touch
... > > Joining that mailing list would not be useful, prudent, or honest for > > people with sentiments like mine. Moving the question of the wisdom of > > such proxies to WREC would be equivalent to moving the question of the > > wisdom of wiretapping to the wiretapping working group. At best

Re: interception proxies

2000-04-11 Thread Vernon Schryver
time I've been told "we can't think about that; we'll have to ask to marketing" ... on the other hand, most of those shares would be merely expensive wallpaper. > >... That there is no mention of the problems that IP > > fragmentation can caus

Re: interception proxies

2000-04-11 Thread Joe Touch
"BookIII, Robert" wrote: > > Joe, > Am I to presume by your statement that you are of the mind that the > time for considering whether vs. which has already come and gone? Is there > anyone on this list who thinks that? With respect to 'inside the WG', yes, the assumption has been (to

RE: interception proxies

2000-04-11 Thread BookIII, Robert
]] Sent: Tuesday, April 11, 2000 4:03 PM To: Vernon Schryver Cc: [EMAIL PROTECTED]; [EMAIL PROTECTED] Subject:Re: interception proxies Vernon Schryver wrote: > >

Re: interception proxies

2000-04-11 Thread Joe Touch
Vernon Schryver wrote: > > > From: John Martin <[EMAIL PROTECTED]> > > > There has been a lot of discussion about the problems associated with > > so-called "interception proxies". This discussion is very much within the > > charter of the WREC W

Re: interception proxies

2000-04-11 Thread Keith Moore
wrec is supposed to be about *web* replication and caching. which probably doesn't include email. so I can hardly blame them for not talking about port 25. since other kinds of interception proxies exist, perhaps they should clarify their document slightly to say it's about web in

Re: interception proxies

2000-04-11 Thread Vernon Schryver
> From: John Martin <[EMAIL PROTECTED]> > There has been a lot of discussion about the problems associated with > so-called "interception proxies". This discussion is very much within the > charter of the WREC WG. In fact, we even have a current draft whose sole &

interception proxies

2000-04-10 Thread John Martin
There has been a lot of discussion about the problems associated with so-called "interception proxies". This discussion is very much within the charter of the WREC WG. In fact, we even have a current draft whose sole purpose is to document such problems. The known problems draft is