IESG Narrative Minutes
Narrative Minutes of the IESG Teleconference on 2011-01-06. These are not an official record of the meeting.
Narrative scribe: John Leslie (The scribe was sometimes uncertain who was speaking.)
Corrections from: Dan
1 Administrivia
- Roll Call 1134 EST Amy:
- Jari Arkko--- y
- Ron Bonica--- y
- Stewart Bryant--- y
- Gonzalo Camarillo--- regrets
- Michelle Cotton---
- Ralph Droms--- y
- Linda Dunbar---
- Lars Eggert--- regrets
- Adrian Farrel--- y
- Sandy Ginoza--- y
- Susan Hares--- regrets
- David Harrington--- y
- Russ Housley--- y
- Olaf Kolkman---
- Glenn Kowack--- regrets
- Barry Leiba---
- John Leslie--- y
- Alexey Melnikov--- y
- Cindy Morgan--- y
- Ray Pelletier--- regrets
- Tim Polk--- y
- Dan Romascanu--- regrets, but joined in time for mgmt item
- Peter Saint-Andre--- y
- Robert Sparks--- y
- Hannes Tschofenig--- (silence)
- Sean Turner--- y
- Amy Vezza--- y
- Bash the Agenda
- Amy: any new
- Robert: action item, mgmt issue
- Amy: any other changes
- Approval of the Minutes of the past telechat
- December 16 minutes--- approved
- December 16 narrative minutes--- approved
- Review of Action Items from last Telechat
- Jari Arkko to add guidance on multi-Area work to the wiki
Jari: no progress
- Michelle Cotton to provide draft of -bis document for RFC 4020 Allocation procedures
Amy: Michelle put an update in jabber, still in progress
- Tim Polk to update the IESG statement on choosing between Informational and Experimental status
Tim: no progress, New Year's resolution!
- Alexey Melnikov to draft an IESG Statement on MIME Type Registrations from other SDOs, to include a statement on the stability of references in Media Type Registrations
Alexey: in progress
- Robert Sparks to assist IANA in finding an expert for the RFC 5727 registries [IANA #306256]
Robert: name proposed
Amy: any objection, hearing none, approved; action item done
- Jari Arkko and Ralph Droms to propose text to be sent to the ITU regarding appropriate naming in the ITU flowstatesig draft
Ralph: exchanged email, still in progress
2. Protocol Actions
2.1 WG Submissions
2.1.1 New Items
- OCSP Algorithm Agility (Proposed Standard)
draft-ietf-pkix-ocspagility-09
Token: Tim Polk
Note: Stephen Kent <kent@bbn.com> is the document shepherd
Discusses/comments (from ballot 3388):
- Jari Arkko: Discuss [2011-01-04]:
"...A responder SHOULD always apply the lowest numbered selection mechanism that is known, supported, and that meets the responder's criteria for cryptographic algorithm strength."
I am confused by the last sentence and how it uses the words "selection mechanism". Does this sentence talk about algorithms or the above selection methods? But the selection methods do not have an algorithmic strength, nor are they negotiated. Suggested replacement text:
"A responder SHOULD always apply the lowest numbered selecetion mechanism that results in the selection of a known and supported algorithm that meets the responder's criteria for cryptographic algorithm strength."
- Adrian Farrel: Discuss [2011-01-05]:
I find a small discrepency at the end of Section 4
"The server SHOULD use one of the preferred signature algorithms for signing OCSP responses to the requesting client."
This means (I think) that the server MAY use an algarithm not listed by the client as preferred. You need to cover:
- under what circumstances
- what expectations of success it will have
But, in fact, I think the whole of Section 5 is dedicated to the question of how to select a suitable algorithm, and that means that this sentence in Section 4 needs to be replaced with:
"Section 5 of this document describes how a server selects an algorithm for signing OCSP responses to the requesting client."
- Adrian Farrel: Comment [2011-01-05]:
The RFC Editor will ask you to remove the citation from the Abstract.
acronyms are used without expansion.
Section 5.1: Did you think of splitting option 5 into:
5. select a mandatory algorithm
6. select a recommended algorithm
since there is a very marked difference in the likelihood of success.
- Alexey Melnikov: Comment [2011-01-04]:
In Section 4: "The client MUST support each of the specified preferred signature algorithms and the client MUST specify the algorithms in the order of preference."
I think this is not actually saying what the order is. I suggest adding something like
"from the most preferred to the least preferred"
8.3. Denial of Service Attack: "Algorithm agility mechanisms defined in this document introduces a slightly increased attack surface for Denial of Service attacks where the client request is altered to require algorithms that are not supported by the server, alternatively does not match pre-generated responses."
The last part (after the final comma) is not readable.
[NEWASN] - is this a Downref?... is [NEWASN] in the Downref registry?
- Peter Saint-Andre: Comment [2011-01-05]:
1. Section 8.1 uses the phrases "considered unacceptably insecure" and "not considered acceptably secure". Are these equivalent?
2. In Section 8.3, please consider citing RFC 4732 on the concept of denial of service attacks.
- Sean Turner: Comment [2011-01-04]:
I am going to recuse myself from this draft because I was involved in proposing the ASN.1 structure. I don't consider that an insignificant contribution. I am however happy with this draft.
Telechat:
- Amy: number of open, David, no thanks; couple of discusses
- Tim: straightforward, need to discuss with authors, revised-ID needed
- HTTP State Management Mechanism (Proposed Standard)
draft-ietf-httpstate-cookie-20
Token: Peter Saint-Andre
Note: Jeff Hodges (chair of the HTTPSTATE WG) is the document shepherd.
Discusses/comments (from ballot 3438):
- Jari Arkko: Comment [2011-01-03]:
I agree with the Discusses from Alexey, Robert, Tim, and for the most part with Sean. I do not agree with the Discuss from Adrian. Obviously the document can make those actions.
- Adrian Farrel: Comment [2010-12-13]:
Section 1: Please don't be so timid.
Section 10.2: "[Netscape]"
1. Are you sure this is the best version of the spec? The document is headed: "Preliminary Specification - Use with caution"
2. RFC Erratum 1491 reads... Can you confirm that you do not need to add a "copy available" statement to this document?
Erratum 2644 seems to have been submitted after the date of your I-D. I assume that this Erratum will be rejected as soon as your I-D becomes an RFC.
Section 2.1: "..." Do you really mean "performant" which my dictionary gives only as a noun meaning " a perforemer".
- Alexey Melnikov: Discuss [2010-12-20]:
[Updated as per -20]
This is a well written document. I am contemplating voting Yes on this document once my issues (see below) are discussed/resolved, not because Cookies are pretty, but because this is the best attempt to describe them properly.
7) In Section 5.4: "..." Clients can't assume that an arbitrary sequence of octets generated by the server would be a valid UTF-8. This needs to be clarified.
9) From Lisa Dusseault's Apps Area Review:
Section 3. "Origin servers can send a Set-Cookie response header with any response.". Do we happen to know if it's more common for user agents to handle, or ignore Set-Cookie response headers on error responses?
- Alexey Melnikov: Comment [2010-12-20]:
5.1.1. Dates: "year = 1*4DIGIT ( non-digit *OCTET )"
Do people really use 1 digit and 3 digit years?
- Tim Polk: Discuss [2011-01-06]:
This discuss was motivated in part by Richard Barnes' Gen-ART review. Richard noted that:
"Many of these integrity issues are caused by user agents accepting cookies from outside the context where they would send them, in particular with the Secure and Path attributes. It seems like this document, in specifying the desired/proper behavior of user agents, should require behavior that would mitigate these attacks. In direct parallel to the handling of the Domain attribute:
"1. Set-Cookies with the Secure flag should only be accepted over secure channels
"2. Set-Cookies with the Path attribute set should only be accepted if the path value matches the request-uri of the request (That is, update Steps 7 and 8 of S5.3 to match Steps 6 and 9/10)"
The author responded:
"I agree that these would be desirable changes to the cookie protocol. However, the http-state working group is not chartered to change the cookie protocol. In particular, the charter reads as follows: "The working group must not introduce any new syntax or new semantics not already in common use." "
I understand that this document cannot impose new rules or syntax. However, as written this document appears to *prohibit* clients from extending the algorithm to protect themselves: User agents are required to implement algorithms "equivalent to" the algorithms specified in Section 5 to process dates (section 5.1.1), paths (5.1.4), parse a set cookie string (Section 5.2), and the processing the cookie (Section 5.3, which was at the heart of Richard's issues), processing the cookie header (section 5.4), etc. This does not leave an implementer with any wiggle room, forcing them to accept insecure processing rules.
This document should not prohibit clients from doing additional processing to enhance their own security, especially since the processing rules proposed by Richard apparently would not affect interoperability with a well-behaved server.
I believe that a better model is the PKIX path validation processing algorithm, where "functionally equivalent" implementations are required but are explicitly permitted to extend the model to enhance security. For example, some implementers have chosen to require that a certificate and CRL be signed by the same cryptographic key to guard against name collisions. This is not required by PKIX but implementations that include this feature are still compliant.
Is there a good reason why extensions to the user agent's processing cannot be extended as Richard suggested?
- Tim Polk: Comment [2010-12-16]:
I found the following Note at the end of 4.1.1 confusing: "NOTE: Some user agents represent dates using 32-bit UNIX time_t values. Some of these user agents might contain bugs that cause them to process dates after the year 2038 incorrectly."
After considering this for a while, I concluded that the point is that user agents might convert the dates into UNIX time_t values for storage and processing, and implementation bugs mean that dates after 2038 are not interpreted correctly. If that is correct, then maybe the following would be an appropriate substitution: ...
- Robert Sparks: Discuss [2010-12-14]:
In 4.1.1 (Syntax) - Why is the specification part of this proposed standard allowing implementations to violate the grammar defined by this standard?...
- Robert Sparks: Comment [2010-12-14]:
Please consider moving the SHOULD in the first of the two NOTE:s at the end of 4.1.1 out of the NOTE.
Consider noting in the discussion of "public suffixes" that the problems this mechanism attempts to avoid are still present in deeper heirarchies (A server at math.example.edu will be able to set cookies for example.edu, potentially affecting the behavior of infosec.example.edu)
- Sean Turner: Discuss [2010-12-16]:
[These are my preliminary discusses. I might find more later.]
#1) I'd like to see a new security consideration section that addresses persistent cookies. I think we need to mention how expiry date can be abused. Is there some kind of recommendation we can give on their lifetimes? Are cookies good for 2, 5, 20 years okay?
#2) I'd like to see a new privacy|security consideration that says what's being touted as "private browsing" doesn't protect cookies it only stops the history from being updated.
#3) Section 7.1: I understand it's hard to have one policy for third-party cookies. But, couldn't we say that assuming sites aren't behaving badly or somehow otherwise sharing tracking data that users that wish to not be tracked by third-parties ensure that third-party cookies be blocked?
#4) Section 7.2: It's not a protocol thing, but should we really make the following two SHOULDs:
User agents should provide users with a mechanism for managing the cookies stored in the cookie store.
User agents should provide users with a mechanism for disabling cookies.
#5) Section 8.3/8.5: Should point out that the format for signature/encryption is server specific.
#6) Section 8.3, last paragraph:
a) The last paragraph, I believe, discusses "sidejacking" and "cookie monster" attacks (or is that the 1st paragraph in 8.5?). Is it worth explicitly mentioning the name of these attacks?
b) To that end, can we add something like (I'm not wed to the words) the following to the end of the paragraph in 8.3:...
#7) Sec 8: Where would we say something about how when multiple users use the same machine, they're not protected from one another?
#8) Sec 8: Shouldn't we have a section on cross-site scripting attacks (i.e., scripts that make browser send cookies to malicious servers that should not receive them) and how http-only helps? I.e., servers should set httpOnly to stop these?
#9) Sec 4.2/8 ?: Where are cookie poising attack discussed (i.e., client returns a different cookie than the one set by the server)?
- Sean Turner: Comment [2010-12-16]:
#1) Section 4: It's odd that following is in Section 4, which is titled Server Requirements: "User agents, however, MUST implement the requirements in Section 5 to ensure interoperability with servers making use of the full semantics."
Shouldn't it be in Section 5?
#2) In Section 5.2, add "(see Section 7.1)" to the end of: "For example, the user agent might wish to block responses to "third-party" requests from setting cookies."
#3) In Section 5.4, add "(see Section 7.1)" to the end of: "For example, the user agent might wish to block sending cookies during "third-party" requests."
Telechat:
- Amy: open not here; number of discusses
- Peter: we've been working by email
- Tim: is mine clear enough?
- Peter: I'll get back to you
- Peter: Robert, how's my proposed text
- Robert: waiting for dust to settle
- Peter: revised-ID needed
- PIM Group-to-RP Mapping (Proposed Standard)
draft-ietf-pim-group-rp-mapping-08
Token: Adrian Farrel
Note: Mike McBride is the document shepherd (mmcbride@cisco.com).
Discusses/comments (from ballot 3536):
- Adrian Farrel: Comment [2010-12-31]:
Routing Area Directorate review by Dimitri Papadimitriou raises a few very minor editorial points that should be looked at together with any other comments and issues raised during IESG review.
- Tim Polk: Discuss [2011-01-05]:
This is a pretty straightforward discuss, and should be easy to clear. As noted in Vincent Roca's security directorate review, the document would benefit from some expansion of the security considerations. In particular, some pointers to mechanisms for learning group-to-rp mappings that satisfy the constraint are considered secure would be helpful. Please use Vincent's review as an input to your revisions.
- Dan Romascanu: Discuss [2011-01-04]:
The issue of the relation between this document and RFC 5060 was raised by Adrian with the MIB Doctors. At the end of the discussion which prompted to various methods of altering the behavior of the routers that already support the MIB module the resolution communicated by Adrian was: 'we have decided that we do NOT want to update the semantics of the existing objects'.
I am still to be convinced that this is the case.
7. Interpretation of MIB Objects: "..."
First, in RFC 5060 the 'pimGroupMappingPrecedence' and 'pimStaticRPPrecedence' objects are in two different tables - pimGroupMappingTable and pimStaticRPTable. Each of the table has a different 'precedence' object and a different behavior.
Does pimStaticRPTable has any function with the new RP mapping algorithm? In RFC 5060 it is used to define static entries that may precede and override those defined by the algorithm in 5060. Does this apply also to the algorithm defined here?
What does exactly mean 'the usage of these fields will decline'? All the MIB module defined in RFC 5060 is supported ('we do not want to update the semantics') - so what happens with the pimGroupMappingTable? Section 8 describes how objects in this table will continue to be used to indicate Group-to-RP mapping. Whay I am missing is what happenss if a manager creates a new entry as per RFC 5060? Should the router just ignore it? We cannot assume all managers are 'well-bahaved' and we need to prevent I think mis-configuration.
If the writeable part of the of this table is not disabled, this would be a serious security problem, as it would interfere with the works of the new algorithm.
A proper solution should include an update of RFC 5060, including changes in MODULE-COMPLIANCE and possibly a new read-only table that would help the operators read the entries created as result of the application of the new mechanism. I understand that the authors and WG do not plan to do this in the near future, but they need to define a clear and acceptable behavior of the agents runing RFC 5060. Dully obsoleting RFC 5060 (and the usage of the MIB module defined there) would be another solution at this point, but this is not what the WG wants, as I understand.
- Dan Romascanu: Comment [2011-01-04]:
1. Section 5: "A network management station can determine the RP for a specific group in a specific router by running this algorithm on the Group-to-RP mapping table fetched using SNMP MIB objects."
MIB objects are meant to work not only with SNMP. Please change 'SNMP MIB objects' to 'SMI MIB objects' or just 'MIB objects'.
2. Need to expand MIB and SNMP at first occurence.
- Peter Saint-Andre: Discuss [2011-01-05]:
This is a fine document. However, the algorithm does not specify rules for determining which hash value or IP address is "highest", which might inhibit interoperability. Please specify such rules (e.g., convert to "network byte order" octet string representation and then apply i;octet collation from RFC 4790), or refer to specifications that define such rules.
Telechat:
- Amy: couple of open, Jari, (silence); number of discusses
- Adrian: don't think we need to discuss, Tim, email exchange, can you sign off? will have email discussion about MIB objects; revised-ID needed
- The Trickle Algorithm (Proposed Standard)
draft-ietf-roll-trickle-07
Token: Adrian Farrel
Note: JP Vasseur (jpv@cisco.com) is the document shepherd.
Discusses/comments (from ballot 3545):
- Stewart Bryant: Discuss [2010-12-15]:
"All that matters is that some nodes communicate with one another at some nonzero rate."
This is not right. If every node received, nothing would get communicated. In addition I tend to think of communication as requiring some degree transmission. I think that you mean transmits at some nonzero rate.
Considering that later text says that Trickle breaks if there is a parameter mismatch, I am concerned that this text is not strict enough:
"It is RECOMMENDED that a protocol which uses Trickle includes mechanisms to inform nodes of configuration parameters at runtime. However, it is not always possible to do so."
I am also concerned with the get out clause that allows the degradation of a MUST to a RECOMMENDATION. Surely for the cost of a few bytes the parameters can at least be announced so that other nodes can get some hint that the mismatch is occurring.
- Ralph Droms: Comment [2010-12-14]:
Nit: 3rd para of section 3, s/their/its/
Question: is the typical value of k in the range 1-5 independent of the density of the network nodes, where I'm thinking of "density" as the number of nodes that hear a given message?
- Lars Eggert: Discuss [2010-12-16]:
I'm sorry for deferring this document to the next telechat. I want the TSV directorate to review it and I didn't realize this in time to get the review assigned.
I'm also balloting DISCUSS. That is, because looking at the current ROLL charter, I have a hard time understanding how this document is in scope of the WG. This document does not fall under any of the work items on the charter; and it's not even what I'd consider a "routing" protocol.
- Adrian Farrel: Comment [2010-12-24]:
Rtg Dir review from Alia Atlas says: "I have reviewed draft-ietf-roll-trickle-06. It is one of the best drafts that I have read and I do not have any substantial or even editorial comments on it. I found the protocol as described to be clear, simple and pretty elegant."
- Robert Sparks: Comment [2010-12-14]:
In section 6.5 - The comment about "having the parameter describe k-1 instead of k being confusing" is confusing. I had to think for some time to convince myself that I understood what you were trying to say. I encourage you to further explain, or rewrite the comment.
Why are you allowing different uses of trickle to give different meanings to k=0? It would seem to facilitate interoperability (and simplify implementation) if you just defined k=0 to mean turning off suppression in all cases. Individual uses of trickle can forbid setting k=0 if they don't want to allow turning off suppression.
Telechat:
- Amy: open not here, couple of discusses
- Adrian: Lars not here; Stewart, pleas check author's response
- Stewart: my concern is no bi-directionality, someone has to transmit, I'll follow up offline, who needs to do what
- Jari: comment on Lars discuss, I think this is in-scope
- Adrian: hoping he'll clear on that; some nits need attention, revised-ID needed
- Pseudowire (PW) OAM Message Mapping (Proposed Standard)
draft-ietf-pwe3-oam-msg-map-14
Token: Stewart Bryant
Note: Andrew Malis, andrew.g.malis@verizon.com is the document shepherd.
IPR: Cisco's Statement about IPR Claimed in draft-ietf-pwe3-oam-msg-map-05.txt
Discusses/comments (from ballot 3588):
- Adrian Farrel: Discuss [2011-01-03]:
There are a couple of nits reported by idnits... I think the license statement should be fixed and posted (to reflect the authors' intent) before the document is approved.
I see IPR disclosed at http://datatracker.ietf.org/ipr/863/... I don't see this declared in the proto write-up. More important, it is not present in the IETF last call announcement in datatracker.
What is the situation wrt multi-segment PWs? I can understand that this document was developed before the WG turned to MS-PWs, but we now have RFC 5254 and RFC 5659.
I would prefer that this document fully addressed MS-PWs...
However, an option is to declare MS-PW out of scope, and provide a forward reference to work being done on OAM message mapping for MS-PWs in the PWE3 WG.
Section 4.2: "If LSP-Ping [RFC4379] is run over a PW as described in [RFC4377], it will be referred to as "VCCV-Ping"."
I believe s/RFC4377/RFC5085/
Section 5: You should add a note to explain why the CE ends of the ACs are not considered as possible defect locations. They are part of the emulated service, so a naif reader might expect to see them listed. Possibly you will want to explicitly include it in case (a).
Additionally, your text does not match the figure: c. Defect on a PE1 PSN interface. But (c) also appears on the PE2-PSN interface in the figure.
Furthermore, (e) and (f) appear tbe reversed in the figure compared to the text.
Section 13: RFC 5085 and RFC 4447 should be presented as references.
I will let Security experts comment further, but: It seems to me that facilitating end-to-end coordination of PW status and fualt reporting provides an extra tool for attackers. I would expect this to be pointed out and held up as a reason for ensuring the use of the security mechanisms.
I think that there are security coordination issues. Perhaps these are already mentioned in the references. Consider carrying NS OAM from CE to CE across the PSN in Single Emulated OAM Loop mode or Coupled OAM Loops mode. The security relationship perceived by the CEs would presumably be between each other, but doesn't the PE need to participate?
- Adrian Farrel: Comment [2011-01-03]:
Section 3: s/whereby/where/
The Introduction uses a number of acronyms without prior expansion. On the other hand, having defined acronyms in Section 4.1, you don't gave to expand them in subsequent sections.
Section 4.1: Several acronyms are not used in the rest of the document.
s/label Switched Path/Label Switched Path/
s/Operations, Administration and Maintenance/Operations, Administration, and Maintenance/
Section 4.2: "The words "defect" and "fault" are used interchangeably to mean any condition that obstructs forwarding of user traffic between the CE endpoints of the PW service."
I'm fine with this, but I think "obstructs" is ambiguous. Do you mean "impose a complete blockage", or do you mean to include degradation in some form? Perhaps you could add a clarification.
Section 4.2: "If BFD is run over a PW as described in [RFC5885], it will be referred to as "VCCV-BFD".
Add a reference to [RFC5880]
Section 4.2: "A "transmit defect" is any defect that impacts traffic that is meant to be sent or relayed by the observing PE. A "receive defect" is any defect that impacts traffic that is meant to be received by the observing PE."
While "meant to be" is appropriate for the reception of data, I don't think it necessarily applies to transmission. Consider that the defect may be somewhat downstream of (and not yet notfied to) the upstream PE such that the traffic that is impaced is that which *has* been sent or relayed by the observing PE.
Additionally, the term "observing PE" has not been defined and may clarify or complicate the meaning of the text.
I had a few problems with Section 8.1. I think my issue is with the use of the control plane as an OAM exchange mechanism (this also shows up in Appendix B). I believe the section could benefit from some polishing.
"For MPLS and MPLS/IP PSNs, a PE that establishes a PW using Label Distribution Protocol [RFC3036] MUST use the LDP status TLV as the mechanism for AC and PW status and defect notification, as explained in [RFC4447]."
I don't think that this "MUST" is good or consitent with:
- the text in Section 7 that is relaxed in saying "LDP or in the ACH"
- the work in MPLS-TP
It sounds like 3036 (or rather 5036) is a normative reference.
While conveying PW status in LDP per 4447 is fine, it is not OAM with the utility of rapid propagation of fault notifications. LDP, reliant as it is on TCP, is not suitable to that purpose.
Wouldn't it be better to require the use of the ACH for OAM fault notification messages, and (if you must :-) mandate the use of LDP for status information propagation when LDP is present (but not as a replacement for real OAM).
Additionally...: "Additionally, a PE MAY use VCCV-BFD Connectivity Verification (CV) for fault detection only (CV types 0x04 and 0x10 [RFC5885]) but SHOULD notify the remote PE using the LDP Status TLV.
The "SHOULD" here seems to be in conflict with te previous "MUST"
And it goes on...: "A PE that establishes a PW using means other than LDP, e.g., by static configuration or by use of BGP, MAY use VCCV-BFD CV (CV types 0x08 and 0x20 [RFC5885]) for AC and PW status and defect notification. Note that these CV types SHOULD NOT be used when the PW is established with the LDP control plane."
If you supply only a "MAY" you should probably describe how else the fault notification might work.
As to the "SHOULD NOT" in the last sentence. Well, see my previous comments. And what possible harm could it do?
Section 6: "Generally, a PE cannot detect transmit defects directly and will therefore need to be notified of AC transmit or PW transmit defects by other devices."
I think you mean s/directly/direct/
Section 8.1.1: "[RFC4447] specifies that the "Pseudowire forwarding" code point is used to clear all faults. It also specifies that the "Pseudowire Not Forwarding" code is used to convey any defect that cannot be represented by the other code points."
The language seems rather week. The use of the code point does not clear the faults. It is used to report (notify) that the faults have been cleared. Likewise, defects are not conveyed by the use of a control points, but existence of the defect can be reported (or conveyed, if you like).
- Russ Housley: Comment [2011-01-05]:
Appendix B.3: s/Los/Loss/
Telechat:
- Tim: I deferred that, we really do need the review
- Stewart: apparently it needs another LastCall, due to IPR
- Tim: I'll get someone to review it right away; may need second review
- Stewart: authors mood, really hard document, decline to comment on multi-?
- Robert: do we have process requirement to redo LastCall over IPR (is that a defect?)
- Tim: IPR linked to the document, up to Stewart, if they weren't it would be mandatory
- Stewart: there was late IPR, but it was withdrawn, remaining IPR is years old (2007?)
- Tim: judgment call in this case
- Stewart: in this case, I'll repeat the LastCall
- Russ: nothing in IESG wiki, we should update that if there's going to be any change, tool recently updated to automatically include in LastCall
- Tim: elliptic-curve patents, tracker may not put it in; I'll volunteer to write a few sentences (for you to shoot at)
- Stewart: don't think it will be ready for next agenda
- Amy: with LastCall, status will change
- Tim: don't wait for me
- Amy: deferred by Tim, will go into LastCall, action item for Tim
- Tim: LastCall process for IPR
- RTP Control Protocol (RTCP) Port for Source-Specific Multicast (SSM) Sessions (Proposed Standard)
draft-ietf-avt-rtcp-port-for-ssm-04
Token: Robert Sparks
Note: The document shepherd for this document is Keith Drage (keith.drage@alcatel-lucent.com).
Discusses/comments (from ballot 3614):
- Adrian Farrel: Comment [2011-01-05]:
As idnits points out, you can strip the RFC 2119 boilerplate and reference. I'm sure the RFC Editor can handle this.
- David Harrington: Comment [2011-01-05]:
1) in section 1, "the +1 rule" is mentioned without definition or reference.
- Sean Turner: Comment [2011-01-05]:
Section 5 has: "This can, for example, be achieved on an end-to-end basis using S/MIME [RFC5652] when SDP is used in a signaling packet using MIME types (application/sdp)."
Technically, S/MIME messages aren't in [RFC5652] they're in [RFC5751]. RFC 5652 is CMS, which is profiled for email in RFC 5751. I've noted that when used with SDP S/MIME has been referred to as follows: RFC 4566 uses text that is similar, but omits a reference for S/MIME; RFC 4657 uses RFC 3851 (previous version of RFC 5751); RFC 4658 uses RFC 3851; RFC 3605 uses RFC 3852 (prior version of RFC 5652); RFC 3261 refers to both 2633 (S/MIME) and 2630 (CMS). Maybe the right approach is to point to both CMS and S/MIME.
Telechat:
- Amy: open positions, Ralph, no thanks, Alexey, no position, no discusses, hearing no objection, approved
- Robert: no notes needed (will work with authors to capture comments)
- Guidelines for Choosing RTP Control Protocol (RTCP) Canonical Names (CNAMEs) (Proposed Standard)
draft-ietf-avt-rtp-cnames-03
Token: Robert Sparks
Note: Keith Drage (keith.drage@alcatel-lucent.com) is the document shepherd.
Discusses/comments (from ballot 3635):
- Stewart Bryant: Discuss [2011-01-05]:
I think it would be helpful to the reader to briefly note that whilst the methods described in this document are good enough for most practical purposes they are not technically perfect. Whilst I can see no particular problem in the application described here, these methods may well be re-purposed as convenient general purpose UID mechanisms.
Specifically when the method described in (5) does not use an EUI-64 there is a non-zero probability of collision, and the method in (4) that uses the MAC address is only as good as the quality procedures and ethics of the hardware manufacturer.
- Adrian Farrel: Comment [2011-01-05]:
Support Stewart's Discuss since we have observed "clone" equipment with identical MAC addresses in the past. Also, I believe that some h/w exists with configurable MAC addresses.
Abstract" s/these/those/
- Russ Housley: Discuss [2011-01-05]:
The Gen-ART Review by Suresh Krishnan on 2-Jan-2011 raised an issue that needs to be resolved before publication. Section 5, Step 2, describes the use of an EUI-64 identifier and how to generate one if it does not exist. The procedure for the creation of the EUI-64 from a 48-bit MAC address is incorrect: ...
While I recognize that no interoperability issues will result from this difference, there may be issues with testing if this is not resolved. Therfore, I suggest using the term "modified EUI-64" instead of EUI-64 or changing the reference from RFC 4291 to the IEEE document.
- Alexey Melnikov: Comment [2010-12-25]:
5. Procedure to Generate a Unique Identifier: "2. Obtain an EUI-64 identifier from the system running this..."
I think this needs an Informative reference to a document which explains what is EUI-64.
- Tim Polk: Comment [2011-01-06]:
I support Sean's discuss: hard-coding SHA-1 is unnecessary and counterproductive. There is no reason that all clients need to use the same secure hash algorithm, IMHO. (For example, two clients using SHA-256 and SHA-512 are no more likely to generate a collision than two clients using SHA-256.) I suggest "compute a message digest using a secure hash function (e.g., SHA-256)" would provide the right level of detail for section 5.
A short paragraph should also be added to the security considerations section with appropriate references. (I think Sean's discuss has the right list.)
I would also note that the algorithm in section 5 does not *guarantee* uniqueness. I think your odds of a collision are one in 2**48 (but check with a real mathematician!). I note this since the Requirements section states "It is believed that obtaining uniqueness is an important property ..."
Section 4.2, third bullet: "After performing the procedure, the significant 96 bits are used ..."
Please specify "most significant" or "least significant"; the latter would be consistent with the preceding bullet.
- Dan Romascanu: Comment [2011-01-04]:
1. "After obtaining a identifier by doing (a) or (b), the least significant 48 bits are converted to the standard colon-separated hexadecimal format, e.g., "00:23:32:af:9b:aa", resulting in a 17-octet printable string representation.
It would be good to provide a reference for this 'standard ... format'. RFC 5342 uses a different notation, so arguably there is more than one format used in RFCs.
2. Also from 5342 - here is a reference for EUI-64 which could be added (also answers the COMMENT from Alexey)
- Peter Saint-Andre: Discuss [2011-01-05]:
This is a fine document with the laudable goal of improving interoperability, but in one respect I think it is both overly specific and unclear about the requirements it is working to meet.
Section 4.1 states: "An implementation that wishes to discourage this type of third-party monitoring can generate a unique RTCP CNAME for each RTP session...."
However, a unique identifier does not necessarily discourage third-party monitoring, e.g., incrementing from UniqueID-1 UniqueID-2 might ensure uniqueness but not privacy. I suggest that we provide a reference to RFC 4086 here and recommend that those who desire privacy need to generate identifiers that are not only unique but also random.
This issue is connected to Section 4.2, which mandates one algorithm for long-term identifiers and a different algorithm for short-term identifiers (with seemingly different security properties, since long-term identifiers are 36 octets in length whereas short-term identifiers are only 17 octets in length). Would an implementation that generates a UUID for short-term identifiers violate the spec? If so, why? As long as the short-term identifier is unique, the implementation has met the relevant requirement. (Perhaps there is a further requirement or desire to make the identifier random, as mentioned above, but that is a separate issue.)
- Sean Turner: Discuss [2011-01-06]:
#2 was revised based on some side discussions.
#1) Section 5: On the use of SHA-1: What properties are you looking from the output? If you require no collisions then SHA-1 is probably a bad idea (see https://datatracker.ietf.org/doc/draft-turner-sha0-sha1-seccon/). It would be much better to use SHA-256 and truncate it. And, then point to https://datatracker.ietf.org/doc/draft-eastlake-sha2b/. Yes it is a dependency but it's in AD Evaluation.
#2) Section 5: Algorithm agility would be really nice here. Locking yourself in to one hash algorithm isn't a good idea. If the client is the only entity that is ever going to generate this hash true algorithm agility might not be needed, but you could get it by picking a length you want and then saying that one of the algorithms x, y, or z MUST be used. That way the implementer can pick on that they're doing in their cipher suite.
- Sean Turner: Comment [2011-01-05]:
Section 4: Need to add "NOT RECOMMENDED" to Section 2. It's used as a key word and the 2119 errata allow it, but you need to include it as shown in the errata (http://www.rfc-editor.org/errata_search.php?rfc=2119).
Any chance for an example per-session unique identifier?
Telechat:
- Amy: open not here; number of discusses
- Robert: email is flowing, does anybody need to raise anything today, revised-ID needed
- Domain Name System (DNS) IANA Considerations (BCP)
draft-ietf-dnsext-5395bis-02
Token: Ralph Droms
Note: Olafur Gudmundsson (ogud@ogud.com) is the document shepherd.
Discusses/comments (from ballot 3657):
- Jari Arkko: Comment [2011-01-05]:
This is a good document and should go forward. A few comments regarding the comments and discusses from other ADs:
- I do not believe this document is the place to obsolete z-bit. This is an IANA considerations doc.
- Regarding URLs and the template, I note that Specification Required is not explictly called for. Maybe it should be, and that would solve the URL problem (as the semantics of Specification Required have been defined elsewhere and reference stability is one criteria).
- Stewart Bryant: Comment [2011-01-05]:
I agree with David Harrington's discuss.
- Adrian Farrel: Discuss [2011-01-05]:
A small piece of IANA pedantry... Section 1.1: "IETF Standards Action", "IETF Review", "Specification Required", and "Private Use" are as defined in [RFC5226].
5226 uses the term "Standards Action" not "IETF Standards Action". Could you fix this up throughout the document?
- Adrian Farrel: Comment [2011-01-05]:
A nit: The Abstract reads... "Internet Assigned Number Authority (IANA) parameter assignment considerations are specified for the allocation of Domain Name System (DNS) resource record types, CLASSes, operation codes, error codes, DNS protocol message header bits, and AFSDB resource record subtypes."
Pedantically, this Abstract says nothing about *this* document. Could you make it read... "This document specifies Internet Assigned Number Authority (IANA) parameter assignment considerations for the allocation of..."
- David Harrington: Discuss [2011-01-04]:
in section 2.1, should the document state that the ancient usage is hereby obsoleted and the z-bit MUST NOT be used for this ancient purpose in implmenetations compliant to this spec?
in Annex 1, field E, should the document specify that it MUST be a long-lived, stable URL if a URL is used? What happens if the URL disappears? Should a document be required for escrow purposes?
- David Harrington: Comment [2011-01-04]:
in section 1, s/is the change is the public review mailing list /is the change to the public review mailing list/
in section 2.3, might it be good to recommend NOT overloading the values, ala the 16 bit, since we have 60000+ bits available?
section 3.1.4 uses MX RR without prior definition, or reference to the definition.
in Annex 1, field E, why does this end in a colon?
why is field J on a totally separate page?
- Alexey Melnikov: Comment [2010-12-19]:
I have a couple of comments. Taking into consideration that this is a bis document, I am making them Comment-level:
1) 3.1.1. DNS RRTYPE Allocation Policy: "No less than three weeks and no more than six weeks after a completed template has been formally posted to dnsext@ietf.org, the selected Expert shall post a message, explicitly accepting or rejecting the application, to IANA, dnsext@ietf.org, and the email address provided by the applicant. If the Expert does not post such a message, the application shall be considered rejected but may be re-submitted to IANA."
The last sentence: is "rejection by silence" a good idea? Has this worked well in the past?
2) Excuse my ignorance, but what is the relationship between 2 mailing lists:
3.1.1. DNS RRTYPE Allocation Policy: "No less than three weeks and no more than six weeks after a completed template has been formally posted to dnsext@ietf.org, the selected Expert shall post a message, explicitly accepting or rejecting the application, to IANA, dnsext@ietf.org, and the email address provided by the applicant."
5. IANA Considerations: This document consists entirely of DNS IANA Considerations.
"IANA shall establish a process for accepting Annex A templates, selecting an Expert from those appointed to review such template form applications, and archive and make available all approved RRTYPE allocation templates. It is the duty of the applicant to post the formal application template to the dns-rrtype-applications@ietf.org mailing list. See Section 3.1 and Annex A for more details."
Is a request always posted to dns-rrtype-applications@ietf.org and then to dnsext@ietf.org? If the answer is yes, why have 2 mailing lists?
Telechat:
- Amy: open not here, couple of discusses
- Ralph: Adrian's well taken, easy to resolve, David, changes to 5395, discussion on mailing-list, encourage David, Steward, Alexey to find a way to get this doc through quickly (to get mailing-list changes); your point deserves longer discussion
- David: concerned about putting through something with known faults, I want assurance it's getting addressed FAST
- Ralph: would it help to put through a different document that just addresses mailing-list
- David: would it take six months to change to "specification required"; not clear to me why people would start a new debate
- Ralph: anticipation of issue, not known issue
- Michelle: we sent comments: doesn't represent what we actually do now; response, wait for next document
- Ralph: agree 5395 needs more extensive revision, what about quick document which doesn't try to be a -bis?
- Michelle: OK either way, no better or worse than current document
- Ralph: couple of alternatives for moving forward
- Alexey: would like lists explained in the document, should I raise my comment to a DISCUSS
- Ralph: reasonable to raise to a DISCUSS; revised-ID needed
- The use of AES-192 and AES-256 in Secure RTP (Proposed Standard)
draft-ietf-avt-srtp-big-aes-05
Token: Robert Sparks
Note: Keith Drage (keith.drage@alcatel-lucent.com) is the document shepherd.
Discusses/comments (from ballot 3659):
- Russ Housley: Discuss [2011-01-02]:
The Gen-ART Review by Richard Barnes on 10-Dec-2010 raises a question that deserves a response. I have not see a response to the question.
- Russ Housley: Comment [2011-01-02]:
Please consider the nit and editorial comments from the Gen-ART Review by Richard Barnes on 10-Dec-2010:
- Alexey Melnikov: Comment [2010-12-24]:
3.1. Usage Requirements: "When AES_192_CM is used for encryption, AES_192_CM SHOULD be used as"
I think the 2nd AES_192_CM should be AES_192_CM_PRF
"the key derivation function, and AES_128_CM MUST NOT be used as the"
s/AES_128_CM/AES_128_CM_PRF ?
"When AES_256_CM is used for encryption, AES_256_CM SHOULD be used as the key derivation function. Both AES_128_CM and AES_192_CM MUST NOT be used as the key derivation function."
Same comments as above.
- Tim Polk: Comment [2011-01-04]:
Please note Hilarie Orman's secdir review.
(1) In particular, she notes: "The block counter "b_c" is two octets, but the "default key lifetime" is 2^31. Is this perhaps the "maximum" key lifetime? Should implementors introduce an internal counter to keep track of the history of key usage (across sessions?)? Perhaps earlier documents explain this?"
Should implementers use the rollover counter (ROC) from RFC 3711 in combination with b_c, or is there another mechanism that the authors had in mind?
(2) You might consider moving the rationale to the front of the section as an alternative to Hilarie's suggestions on section 3.1,
- Sean Turner: Discuss [2011-01-05]:
I don't think SHA-1 is part of any Suite B specifications. Because of this, it's unclear to me that you should hint that by implementing this RFC an implementation would be considered Suite B compliant.
- Sean Turner: Comment [2011-01-05]:
#1) Support Russ' and Tim's discusses.
#2) Section 3: "In this note, the AES-192 counter mode PRF and AES-256 counter mode PRF are and are denoted as AES_192_CM_PRF and AES_256_CM_PRF respectively."
extra words "are and"?
#3) Section 3.1 (similar to Russ's 2nd comment): Should the rationale include a MUST?
Telechat:
- Amy: open not here; couple of discusses
- Robert: no need to discuss today, conversation going well; revised-ID needed
2.1.2 Returning Items
- MPLS Upstream Label Assignment for LDP (Proposed Standard)
draft-ietf-mpls-ldp-upstream-09
Token: Adrian Farrel
Note: Loa Andersson (loa@pi.nu) is the Document Shepherd.
IPR: Juniper's Statement of IPR related to draft-ietf-mpls-ldp-upstream-03
IPR: Huawei Technologies Co.,Ltd's Statement about IPR related to draft-ietf-mpls-ldp-upstream-09 and draft-ietf-mpls-ldp-p2mp-11
Discusses/comments (from ballot 3375):
- Jari Arkko: Discuss [2010-12-02]:
Section 5 should explain what the semantics of the second field of the Sub-TLVs are. Presumably that has been defined in some earlier RFC that defined the syntax for Sub-TLVs. A reference would suffice.
Reference to Section 4.2 for some behaviour needs to be changed as there is no Section 4.2.
- Jari Arkko: Comment [2010-12-02]:
A few comments from Ari Keränen:...
- Stewart Bryant: Comment [2010-12-02]:
(blank)
- Adrian Farrel: Comment [2010-12-02]:
Gen Art review comments from Avshalom Houri...
- David Harrington: Comment [2010-11-30]:
SECTION 3: s/MUST be carried only LDP initialization messages/MUST be carried only in LDP initialization messages/
- Russ Housley: Comment [2010-11-28]:
The Gen-ART Review by Avshalom Houri on 13-Oct-2010 includes some editorial suggestions. Please consider them.
- Sean Turner: Comment [2010-11-30]:
Section 4: Shouldn't the two "optional"s be "OPTIONAL"? They're indicating support requirements.
Telechat:
- Amy: one open, Alexey, no thanks; a discuss
- Adrian: no need to discuss today, returing due to late IPR, revised-ID needed
2.2 Individual Submissions
2.2.1 New Items
- Cloud Data Management Interface (CDMI) Media Types (Proposed Standard)
draft-cdmi-mediatypes-06
Token: Peter Saint-Andre
Discusses/comments (from ballot 3598):
- Adrian Farrel: Comment [2011-01-05]:
Support Alexey's Discuss wrt the reference to 4627 and the potential positioning of this document as Informational in which case I don't think the minimal usage of 2119 language would suffer from being changed to lower case, since it seems to be referenced from another specification.
- Alexey Melnikov: Discuss [2010-12-21]:
[Updated as per -06]
DISCUSS DISCUSS (something that I want to discuss with IESG, no action from the author required):
RFC 4627 is a Normative reference, so this is a DOWNREF. If the document is changed to Informational, the issue will go away.
- Alexey Melnikov: Comment [2010-12-21]:
(blank)
- Sean Turner: Discuss [2011-01-05]:
#1) Sec 3.1: "The implementations are free to store the data in any form they choose, but the application/cdmi-object SHOULD be represented in the CDMI interface as defined in section 8 of the CDMI specification."
Seems like there's a normative reference missing to the CDMI spec.
#2) Sec 3.2: "The implementations are free to represent the container in any form they choose, but the application/cdmi-container SHOULD be represented in the CDMI interface as defined in section 9 of the CDMI specification."
Seems like there's a normative reference missing to the CDMI spec.
#3) Sec 4 says: "We do not expect the CDMI to operate over other protocols, nor to use a transport protocol, such as TCP (RFC 793), directly."
Sec 6.1 says: "CDMI does not contain any specific mechanisms, and relies on transport mechanisms such as TLS (see https [RFC2818]) for confidentiality and integrity of the messages across the network."
Is Sec 4 wrong? 2818 doesn't mandate TCP, but it sure strong hints at it.
- Sean Turner: Comment [2011-01-05]:
From Sec 3.2: ... includes standardized and optional metadata.
There can be standardized optional metadata - no? Is this "required and optional meadata"?
Telechat:
- Amy: open, Ralph, no thanks; couple of discusses
- Peter: briefly, intended status, relates to media-types from other SDOs, I'd be happy with Informational, I don't see a need for standards-track
- Alexey: no strong opinion; Informational seems fine, if standards-track would need new LastCall
- Peter: Informational seems better to me, not getting enough reviews to feel comfortable with standards-track, will check with authors... AD followup
- Moving mailserver: URI scheme to historic (Proposed Standard)
draft-melnikov-mailserver-uri-to-historic-00
Token: Peter Saint-Andre
Discusses/comments (from ballot 3639):
- Sean Turner: Comment [2011-01-05]:
Should "Updates: 1738 (once approved)" appear on the 1st page?
Telechat:
- Amy: no discusses, hearing no objection, approved
- Peter: I added RFCed note to obsolete RFC ??
- Authentication-Results Registration For Vouch By Reference Results (Proposed Standard)
draft-kucherawy-authres-vbr-02
Token: Alexey Melnikov
Note: Barry Leiba <barryleiba@computer.org> is the document shepherd.
Discusses/comments (from ballot 3658):
- (none)
Telechat:
- Amy: no discusses, but not enough positions
- Alexey: one position short
- Amy: Jari?
- Jari: no position today
- Ralph: didn't have time to review yet
- Russ: can just wait for anyone to state a position
- Amy: will go on January 20 agenda, but can be approved before then
2.2.2 Returning Items
- (none)
3. Document Actions
3.1 WG Submissions
3.1.1 New Items
- Operations, Administration and Maintenance Framework for MPLS- based Transport Networks (Informational)
draft-ietf-mpls-tp-oam-framework-10
Token: Adrian Farrel
Note: Loa Andersson (loa@pi.nu) is the Document Shepherd.
IPR: Alcatel Lucent's Statement about IPR related to draft-ietf-mpls-tp-oam-framework-07
Discusses/comments (from ballot 3411):
- Stewart Bryant: Discuss [2011-01-05]:
I am concerned about this text: "Protection Switching: default transmission period is 3.33ms (i.e. transmission rate of 300 packets/second)."
Firstly the the requirement in RFC5654 only specifies the total time to detect and to act as 50ms and how the system partitions this time should be a local matter.
Secondly there are some applications of MPLS-TP that may not need this high peed detection, and it is unreasonable to burden them with the need to implement this high speed detection mechanism.
- Adrian Farrel: Comment [2010-12-31]:
Three Directorate reviews have been addressed, but a few non-blocking comments remain that should be addressed to improve the document before it is published as an RFC:
SecDir - vincent.roca@inrialpes.fr ...
GenArt - david.black@emc.com ...
RtgDir - thomas.morin@orange-ftgroup.com ...
- Russ Housley: Comment [2011-01-02]:
The Gen-ART Review by David Black lead to some document updates. However, one comment was not addressed. Please consider updates to the security considerations section. David said:
"[D] The security considerations section should include specific mention of injection of LKI request OAM packets as a vector for a denial-of-service attack (this is an obvious way for a man-in-the-middle to quickly cause serious havoc). That would be a good specific example to add to the end of the current security considerations paragraph that requires the network to be physically secure against man-in-the-middle attacks."
While the security considerations section does cover the countermeasures necessary to prevent this attack, it seems like a good idea to document something that can go badly wrong when implementers do not pay attention.
Telechat:
- Amy: no discusses, hearing no objection, approved
- Adrian: point-raised, please
- Sieve Email Filtering: Use of Presence Information with Auto Responder functionality (Informational)
draft-ietf-sieve-autoreply-03
Token: Peter Saint-Andre
Note: The Document Shepherd is Cyrus Daboo.
Discusses/comments (from ballot 3525):
- Stewart Bryant: Comment [2011-01-05]:
This is somewhat unusual language to find in a RFC to be:
Consider whether it's truly important to tell people that you'll read their mail in an hour or so, or whether that can just be taken as how email works. There are times when this makes sense, but let's not use it to exacerbate information overload.
- Adrian Farrel: Comment [2011-01-05]:
Your homily to users in Section 1 is a good message, but I think it is in the wrong document or targeted at the wrong audience. *This* document would, I think, mainly apply to application developers since it is an unusual user who writes their own Seive scripts. So the warning is better rephrased to advise application developers to be careful to not provide too many knobs and whistles, or to make sure that their implementations warn users to exercise appropriate caution.
I would also note in this context that presence information might be a good tool to reduce the amount of autoresponses generated thus mitigating the sad effect of auto-responder functionality.
Section 4: "Despite the "intelligence", too, errors in scripts can result in private information getting to senders inappropriately."
Is "too," superfluous? I find it hard to parse.
- Robert Sparks: Comment [2011-01-05]:
Example 2 in section 3 does what the last paragraph in section 1 says is a bad idea. Please consider reconciling these two parts of the document.
Telechat:
- Amy: no discusses, hearing no objection, approved
- Peter: some changes, point-raised please (maybe RFCed note, maybe revised-ID)
- LoST Service List Boundary Extension (Experimental)
draft-ietf-ecrit-lost-servicelistboundary-05
Token: Robert Sparks
Note: Richard Barnes (rbarnes@bbn.com) is the document shepherd.
Discusses/comments (from ballot 3548):
- Tim Polk: Comment [2011-01-06]:
This document *defines* a Service List Boundary extension, not *proposes* a Service List Boundary. Perhaps the -00 draft was a proposal, but this one is a technical specification.
I suggest a minor edit in the Abstract to clarify the document scope.
- Sean Turner: Discuss [2011-01-05]:
Section 3.2, 2nd to last paragraph: Add a normative reference to BCP 106/RFC 4086 for randomness requirements (should have been in RFC 5222).
- Sean Turner: Comment [2011-01-05]:
Sec 3.3: r/is optional and/is OPTIONAL and
Telechat:
- Amy: no discusses, hearing no objection, approved
- Robert: RFCed note is correct
- IP Flow Anonymisation Support (Experimental)
draft-ietf-ipfix-anon-05
Token: Dan Romascanu
Note: Nevil Brownlee is the Document Shepherd
Discusses/comments (from ballot 3589):
- Stewart Bryant: Discuss [2010-12-13]:
In the security section you say: "When releasing anonymised data, publishers need to ensure that data that could be used in deanonymisation is not leaked through the export protocol; guidelines for addressing this risk are provided in Section 7.2."
However it's not just protocol action that needs to be secured, the anonymising system (i.e. h/w, s/w, operational procedures) itself needs to be secure and is a system that will be the prime focus of any attack to recover the base data.
- Stewart Bryant: Comment [2010-12-13]:
"Binning can be seen as a special case of precision degradation; the operation is identical, except for in precision degradation the counter ranges are uniform, and in binning they need not be. For example, a common counter binning scheme for packet counters could be to bin values 1-2 together, and 3-infinity together, thereby separating potentially completely-opened TCP connections from unopened ones.
I am not a TCP specialist, so I do not understand the leap from the simple text "to bin values 1-2 together, and 3-infinity together" to the TCP connection example, however I suspect that grouping and the protocol state are in the wrong order. Either way, a few more words of a different example would add clarity.
- Adrian Farrel: Comment [2011-01-03]:
Thanks for bringing this work forward as Experimental. While it is not a requirement, I think it is helpful to the community if Experimental documents give some indication of the scope of the experiment. Where will these protocol extensions be used? How will they be kept separate from the wider IPFIX deployment? How will the success or failure of the experiment be judged? What is the plan, assuming success? (The latter is usually: return to update this document based on experience, and move it to the standards track.) Note that some of the answers were presented in the proto writeup.
I see questions from IANA in the data tracker that appear to have been answered by email during IETF last call. It would be good to get these answers transfered into the document or added as an RFC Editor Note. Additionally, the registry referenced is split into two ranges, but there is no advice to IANA about which range should be used.
- Alexey Melnikov: Comment [2010-12-26]:
5.1. Stability: "If no information about stability is available, users of anonymised data MAY assume that the techniques used are stable across the entire dataset, but unstable across datasets."
This doesn't look like an implementation choice, so I think MAY is wrong here.
6.1. Anonymisation Records and the Anonymisation Options Template: "First, reliability is important: an Exporting Process SHOULD export Anonymisation Records after the Templates they describe have been exported, and SHOULD export anonymisation records reliably."
What is the exact meaning of the last SHOULD?
TLS and DTLS need Informational References.
Telechat:
- Amy: Dan not here, couple of discusses, do discuss-holders feel revised ID needed (yes)
- Security Concerns With IP Tunneling (Informational)
draft-ietf-v6ops-tunnel-security-concerns-04
Token: Ron Bonica
Note: Joel Jaeggli (joelja@bogus.com) v6ops wg cochair is the document shepherd.
Discusses/comments (from ballot 3615):
- Jari Arkko: Comment [2011-01-05]:
Section 6.1.1 attack does not appear to be any worse than the assumptions required for this attack to be possible. If you can spoof the victim's DNS, you can hijack the victim's communications, tunnels or no tunnels.
In this light the recommendation to prefer IPv4 over tunneled IPv6 is odd. Also, its not clear that whoever is selecting which addresses to use is aware of whether tunneling is being done or not (host vs. router, for instance).
(This recommendation may be good for other reasons, of course.)
- Stewart Bryant: Comment [2011-01-05]:
There are a lot of tunnel mechanisms are being deployed simply so that end users can work around the fact that they do not have enough IP addresses by creating a private overlay network.
The document seems to miss the opportunity to say that by deploying IPv6 the need for many of these tunnels can be removed.
- Adrian Farrel: Discuss [2011-01-05]:
I *think* that the scope of this document is intended to be "security considerations for the use of IP tunnels in IPv6 migration scenarios."
It looks like the document goes on mainly to consider the issues that arise in such situations, although the title and abstract etc. are not clear on this limitation, and some places in the text seem to open the discussion up more general tunneling applications.
While v6ops is a good home for a document with limited scope, it worries me that the more general discussion is restricted to that working group. The shepherd write-up declares "The document has been quite extensively socialized", without explaining where this socialization took place.
In short, scoped so widely (i.e., not limited to the applicability of tunnels to v6 migration strategies) this document appears to be out of scope for the v6ops working group.
There would appear to be two solutions:
1. Add a few small changes to make clear that the scope is limited to v6 migration (or maybe to v6 use of tunnels)
2. Find the right review forums within the IETF to ensure proper breadth of review (opsec, WGs responsible for the main tunneling protocols, ...)
Note that I do not consider that the IETF last call on a document with a file name starting "draft-ietf-v6ops-..." guarantees broad enough review.
I would like to see a little more clarity on the meaning of "IP tunnels". I think you are trying to discuss situations where an IP packet can contain, through some form of encapsulation, another IP packet. It would be really nice to make this crystal clear.
- Adrian Farrel: Comment [2011-01-05]:
Section 2.1.1: "This reduces defense in depth and may cause security gaps."
I can't parse this :-( Do you mean... "This reduces the depth of security available, and may cause security gaps."
Is it right that Section 2.3 is limited only to source routing? Isn't it the case that tunneling can be used to inject any IP option into a network and cause trouble?
- Russ Housley: Discuss [2011-01-05]:
The Gen-ART Review by Joel Halpern on 28-Dec-2010 raises a question that has not been answered. I think that a response is needed.
- Tim Polk: Comment [2011-01-05]:
Issue #1: I think the intended scope of this document is not consistently stated (explicitly and implicitly):
(1) the document title is "Tunneling Security Concerns";
(2) the abstract states "The primary intent of this document is to raise the awareness level ..."
(3) the introduction states "This document discusses security concerns ... and includes recommendations where relevant."
(4) the introduction also states "The primary intent is to help improve security deployments ..."
Based on the title and the abstract, I was expecting a problem statement draft. The first bit I quoted from the intro implies that this is a problem statement draft, and the recommendations are an afterthought. The last bit says the recommendations are the whole point of the document.
IMHO, the recommendations are the most important contribution made by this document. I would like to see edits in the abstract and intro to clearly state that. It may be too late to address the title, but "Mitigating Tunneling Security Concerns" would also clearly demonstrate that scope.
Issue #2: The document presents a collection of network architecture and network administration recommendations, but readers might really benefit from some summary recommendations. I was hoping for a section that moved the document from a laundry list to a methodology of sorts that worked through the architectural decisions first, then moved on to mitigating the specific problems remaining after the architectural decisions are made. For example, it seems that architecting your network so that tunnels don't cross security boundaries is a key first step. If you don't follow that recommendation, everything else is harder, isn't it?
Issue #3: The introduction closes with "The intended audience ... includes network administrators and future protocol developers." I had a hard time understanding what the lessons are for future protocol developers.
Perhaps a paragraph or two summarizing recommendations for protocol developers would be useful here.
Issue #3: Section 5.1 is conspicuous in its structure: it includes a "5.1.1 Problem", but omits the expected "5.1.2 Discussion" and "5.1.3 Recommendations". Is it true that there is nothing to say here?
Telechat:
- Amy: couple of discusses
- Ron: for a minute, Russ, isn't this against a different document
- Russ: I meant to clear it
- Amy: I show discusses from Adrian and Russ
- Adrian: sorts out the first part of my discuss; I'd like to consider the title as well
- Ron: narrowing the scope
- Jari: not sure
- Ron: you two guys duke it out
- Adrian: I said either... you said scoped to v6
- Jari: trying to remember if this discussed in INT area
- Ralph: don't recall we did
- Jari: thought the document was pretty good... not making a complaint about change, more useful if generic
- Ron: if it has the wider scope, v6ops lacks the authority to publish it
- Jari: we haven't been that strict
- Ron: we could send for LastCall in INT area...
- Adrian: document as-is is v6-specific, not generic about tunneling, e.g. routing concerns not mentioned
- Jari: host-centric document, tunneling can be dangerous regardless of v6/v4
- Ron: initial intent was v6... problem if we scope it higher?
- Jari: scoped to v6-only, you'd have to be really careful with the text
- Russ: propose that Adrian reach out to routing community
- Adrian: hesitant about "host-oriented" document
- Russ: maybe will result in "need to add this section"; we mustn't put Ron in a position where there's no way to progress this document
- Ron: current RFCed note talks of "transition mechanism"
- Russ: router folks do worry about implementing v6
- Jari: document would be better as generic, don't know how big that task is
- Ron: seems like it would take 30 pages, and routing knows what they contain, v6-ops doesn't; let's take this offline
- Russ: agenda item for an informal telechat
- Jari: please talk to the authors before the informal telechat, have them explain the intended scope
- Ron: I'll talk to them today
- Russ: AD-followup
- Routing Loop Attack using IPv6 Automatic Tunnels: Problem Statement and Proposed Mitigations (Informational)
draft-ietf-v6ops-tunnel-loops-01
Token: Ron Bonica
Note: Joel Jaeggli (joelja@bogus.com) is the document shepherd.
Discusses/comments (from ballot 3637):
- Jari Arkko: Discuss [2011-01-05]:
This is a good document and should be published. However, I have one concern about the described neighbor cache check solution. First off, the document is incorrect that hosts must continuously send RSes to keep their address configuration up to date. More importantly, the neighbor cache is just that, a cache. A better solution would be to probe for a neighbor and only drop the packet if there was no response. This is already described in the document. My suggestion would be to delete the neighbor cache check solution entirely from the document.
I think it would also be great if this document made a stronger statement about the IMO most important use case for automatic tunnels: broadband home networks. These are very simple networks with just one exit router and it would be important to highlight the significance (or lack thereof) of the attack in this case & point to the recommended solution.
- Stewart Bryant: Discuss [2011-01-05]:
"based on protocol-41 encapsulation" needs a reference
I have tried to read section 2 a number of times and I do not understand the loop.
I do not understand what "The attacker exploits the fact that R2 does not know that R1 does not take part of T2" means.
- Adrian Farrel: Discuss [2011-01-06]:
Having had some time to go back and re-read this document I am now not comfortable.
1. In Figure 1, why is R2 advertising reachability to an IPv6 at all? It has only one point of attachment to the v6 network. I think you are trying to say that there is a virtual link (v6 capable) running over the v4 network. Isn't that link simply part of the v6 network?
2. Why is R2 advertising reachability to an address that is not reachable through it? You say: "...destined to a fictitious end point that appears to be reached via T2..."
- Russ Housley: Discuss [2011-01-05]:
The Gen-ART Review by Joel Halpern on 28-Dec-2010 raises a question that has not been answered. I think that a response is needed.
- Tim Polk: Comment [2011-01-05]:
Please clarify that the document's scope does not address the Teredo attacks specified in the USENIX paper.
- Peter Saint-Andre: Comment [2011-01-05]:
Given that the document describes an attack that can result in denial of service, a reference to RFC 4732 would be appropriate.
Telechat:
- Amy: number of discusses
- Ron: need to go back to the authors, revised-ID needed
3.1.2 Returning Items
- VPLS Interoperability with CE Bridges (Informational)
draft-ietf-l2vpn-vpls-bridge-interop-06
Token: Stewart Bryant
Note: Shane Amante <Shane.Amante@Level3.com> is the document shepherd.
Discusses/comments (from ballot 2633):
- Adrian Farrel: Comment [2010-03-09]:
The new revision addresses a number of the points I raised in my review of 11-Apr-2009. I will clear my Discuss and record the three unaddressed points here.
Section 2: Maybe this could use a figure. There is a lot of information conveyed and perhaps a figure of a VPLS showing the network and instance would help.
Figure 2+: I can sort of look at figures 1 and 2 and see a more complete picture of the PE model with PWs on one side and CEs on another. I think that in figure 2 it would help to label the ACs (C-VLANs), but it would also be helpful to show CE attachment when the ACs are not VLANs. Is there some way to give this more comprehensive picture?
Section 9: To me, this section feels very light. I am not a security expert, but the fact that you are extending an architectural model should give rise to new security issues for consideration.
- Sam Hartman: Discuss [2007-12-19]:
Security directorate comments by Phillip Hallam-baker have not been addressed. These comments were not submitted as public last call comments. However they raise serious readability and interpretability questions of the document. I do know that some of Phil's comments are wrong because I've read some of the VPLS base specs. So, I tried to make an independent review of the document in order to determine if there was anything blocking. However I failed to be able to comprehend the document well enough to follow it. I gave up in the middle of section 3 with very little understanding of where the document was going and low confidence that the description of VPLS in this document matched my understanding from the base VPLS specs.
To make this discuss actionable, I recommend that the authors work with reviewers outside their working group and improve the document to a point where someone who has not worked extensively in the L2VPN working group but who has read the VPLS documents can easily follow the document and can accurately describe what is going on.
- Russ Housley: Comment [2010-03-10]:
(blank)
- David Ward: Discuss [2007-12-20]:
Unfort, I find the doc very, very terse and almost unable to understand the points that are being made and the suggested recommendations. In addition I find it odd that there are cases where interop needs to be "worked out." It suggests that an interop procedure or recommendation is incomplete and thus, the doc is premature.
Telechat:
- Amy: no discusses, hearing no objection, approved
- Stewart: no notes needed
3.2 Individual Submissions Via AD
3.2.1 New Items
- Known Issues and Best Practices for the Use of Long Polling and Streaming in Bidirectional HTTP (Informational)
draft-loreto-http-bidirectional-07
Token: Alexey Melnikov
Note: Martin Thomson <Martin.Thomson@andrew.com> is the document shepherd.
Discusses/comments (from ballot 3451):
- Sean Turner: Comment [2011-01-05]:
Sec 8: r/attacks.[RFC4732]./attacks [RFC4732].
Telechat:
- Amy: no discusses, hearing no objection, approved
- Alexey: no notes needed
- Updated Security Considerations for the MD5 Message-Digest and the HMAC-MD5 Algorithms (Informational)
draft-turner-md5-seccon-update-08
Token: Alexey Melnikov
Note: Sean Turner (turners@ieca.com) is the document shepherd.
Discusses/comments (from ballot 3493):
- Russ Housley: Comment [2011-01-05]:
I think this documnet would be more useful to people trying to choose an algorithm if Section 2 were structured to present the conclusions at the beginning, and then provide the details in the susbsections. I suggest:
"MD5 was published in 1992 as an Informational RFC. Since that time, MD5 has been extensively studied and new cryptographic attacks have been discovered. Message digest algorithms are designed to provide collision, pre-image, and second pre-image resistance. In addition, message digest algorithms are used with a shared secret value for message authentication in HMAC, and in this context, some people may find the guidance for key lengths and algorithm strengths in [SP800-57] and [SP800-131] useful.
"MD5 is no longer acceptable where collision resistance is required such as digital signatures. It is not urgent to stop using MD5 in other ways, such as HMAC-MD5; however, since MD5 must not be used for digital signatures, new protocol designs should not employ HMAC-MD5. Alternatives to HMAC-MD5 include HMAC-SHA256 [HMAC][HMAC-SHA256] and [AES-CMAC] when AES is more readily available than a hash function."
Telechat:
- Amy: no discusses, hearing no objection, approved
- Alexey: RFCed note is correct
- MD2 to Historic Status (Informational)
draft-turner-md2-to-historic-10
Token: Robert Sparks
Note: Sean Turner (turners@ieca.com) is the document Shepherd.
Discusses/comments (from ballot 3575):
- Adrian Farrel: Comment [2011-01-04]:
Comment transferred from my previous process Discuss.
I fully support knocking MD2 on the head. However, I am a little inexperienced with the process of making an I-D Historic.
What happens to an standards track documents with references (especially normative references) to 1319 as listed in Section 3? Should they at least also be marked as "updated by" this draft?
Similarly, 1319 updates 1115. What happens to 1115 and its text on MD2?
- Alexey Melnikov: Comment [2010-12-19]:
Updates: 1319 (once approved)
- why not Obsolete: 1319 ? This document is moving RFC 1319 to Historic.
3. Documents that Reference RFC 1319
MD2 has been specified in the following RFCs:
*Use* of MD2 has been specified ...
Telechat:
- Amy: no discusses, hearing no objection
- Robert: there has been a request to talk about metadata noting documents that reference the obsoleted document
- Russ: IKEv1 issue, documents keep coming updating it
- Sean: don't believe we're allowed to update standard-track by Informational
- Robert: agree we need to mention documents that "update", but not docs that merely have normative references, floor back to Amy
- Amy: approved, announcement will be sent
- MD4 to Historic Status (Informational)
draft-turner-md4-to-historic-10
Token: Robert Sparks
Note: Sean Turner (turners@ieca.com) is the document Shepherd.
Discusses/comments (from ballot 3611):
- Adrian Farrel: Comment [2011-01-05]:
As with the MD2 document, I think it is worth listing the standards track documents shown in Section 3 as Updated in the document header.
It looks to me that you might also want to update some of the informational documents listed here.
The prime benefit is that those documents will be marked in the RFC repository as having been updated by this document.
Abstract, etc.: Once published, this document should be more assertive. Thus:
OLD: This document recommends RFC 1320 be moved to Historic status.
NEW: This document moves RFC 1320 to Historic status.
4. Impact on Moving MD4 to Historic: s/on/of/
Section 4: MD4 was used in the Inter-Domain Routing Protocol (IDRP); each IDRP message carries a 16-octet hash that is computed by applying the MD-4 algorithm (RFC 1320) to the context of the message itself. Over time IDRP was replaced by BGP-4."
Need to add a refernce to 4271, and an indication that BGP-4 requires at least MD-5. You could reference 2385, but that might be de trop.
Section 4: "The three Microsoft RFCs, [RFC2433], [RFC2759], and [RFC4757], are:
Do we need to describe these as "Microsoft RFCs"? How about: "The three RFCs describing Microsoft protocols"?
- Alexey Melnikov: Comment [2010-12-19]:
The document header has: "Updates: 1320 (once approved)" Why not "Obsoletes: 1320" ?
Telechat:
- Amy: no discusses, hearing no objection
- Robert: point-raised, please
3.2.2 Returning Items
- (none)
3.3 IRTF and Independent Submission Stream Documents
3.3.1 New Items
- Cisco Vendor Specific RADIUS Attributes for the Delivery of Keying Material (Informational)
draft-zorn-radius-keywrap-17
Token: Dan Romascanu
Discusses/comments (from ballot 2377):
- (none)
Telechat:
- (deleted from agenda, deferred)
- A Framework of Media-Independent Pre-Authentication (MPA) for Inter- domain Handover Optimization (Informational)
draft-irtf-mobopts-mpa-framework-08
Token: Jari Arkko
Note: Rajeev Koodli (rkoodli@cisco.com) is the document shepherd.
Discusses/comments (from ballot 3602):
- Ralph Droms: Comment [2011-01-06]:
I strongly suggest that the following comments are addressed before publication:
In section 7.3.1, a DHCP relay agent does not have the capability to operate independently and perform a DHCP message exchange with a DHCP server in anticipation of an eventual DHCP message exchange initiated by a client. The mecahnism described in this section would require the definition of a new DHCP proxy function.
In the case of IPv6, it's probably required to forward the RA to the mobile node regardless of the address assignment model, to pre-configure the mobile node with all the requisite information about prefixes, etc.
In section 7.3.3, there is a conflict with the DHCPv6 specification, which requires that a DHCPv6 client send any messages to the DHCPv6 servers/relays multicast address, rather than unicast to a server.
There may also be a problem with all of these methods using DHCP: how does the CTN DHCP server know what address to assign to the client?
Other comments:
Perhaps a nit, but I was somewhat mislead by the title, "A Framework of Media-Independent Pre-Authentication (MPA) for Inter-domain Handover Optimization" to believe that I was going to read about a protocol that focused on authentication and secure communication. In my opinion, this document describes a complete framework for media-independent inter-domain handover optimization that goes beyond authentication and security.
In Appendix A, wouldn't DAD be performed by the NAR rather than the PAR?
From the Intro: "In this document we discuss a framework to support terminal mobility that provides seamless handovers with low latency and low loss."
Are there other components to terminal mobility aside from MPA?
Section 1.2: "A trade-off between one-way-delay and packet loss is desired based on the type of application."
Unclear to me - a trade-off should be available through tuning or one-way-delay should be improved relative to packet loss?
Section 3: Define "inter-subnet handover"?
Section 6.1: "MPA provides three basic procedures to provide this functionality. The first procedure is referred to as "pre-authentication", the second procedure is referred to as "pre-configuration", the combination of the third and fourth procedures are referred to as "secure proactive handover"."
"three basic procedures" and "third and fourth procedures" is confusing; where did that fourth procedure come from?
Section 6.1: "Especially, the third procedure described above (i.e., binding update procedure)"
Change "third procedure described above" to "step (iii) in the previous paragraph" to avoid confusion with the use of "procedures in the earlier paragraph in section 6.1.
Section 6.2: "The authentication protocol MUST be able to derive a key between the mobile node and the authentication agent and SHOULD be able to provide mutual authentication."
Is "derive a key between ..." a term of art or can the requirement be described more accurately as "establish a shared key between..."?
"The authentication protocol SHOULD be able to interact with a AAA protocol such as RADIUS and Diameter to carry authentication credentials to an appropriate authentication server in the AAA infrastructure."
Does the authentication protocol interact directly with the AAA protocol, or does the interaction happen through the AA?
Telechat:
- Amy: no discusses, hearing no objection, approved for no-problem message
- Jari: ready to go
3.3.2 Returning Items
- The Internet Routing Overlay Network (IRON) (Experimental)
draft-templin-iron-16
Token: Jari Arkko
Note: Tony Li (tony.li@tony.li) is the document shepherd.
Discusses/comments (from ballot 3638):
- Jari Arkko: Comment [2010-12-16]:
(blank)
- Stewart Bryant: Comment [2010-12-15]:
I am surprise that the document contains no reference to LISP which is operating broadly in this space.
SRA is not a defined abbreviation.
This needs a few words of clarification - presumably the "locator addresses" are the addresses learned from the relay.
"After the Client receives an SRA message from the nearby Relay listing the locator addresses of nearby Servers, it sends SRS test messages to one or more of the locator addresses to elicit SRA messages."
"If this Server fails, the Client will quickly select a new one which will automatically update the VPC overlay network mapping system with a new EP-to-Server mapping."
"quickly" is a non-specific metric
[I-D.templin-intarea-seal] looks like it should be normative
[I-D.templin-intarea-vet] looks like it should be normative
Although the RFCeditor may wish to overlook this if there is a concern that these drafts will not be taken to completion.
- Ralph Droms: Comment [2010-12-16]:
I have one suggestion about the content of the document. I'd like to see an analysis of how IRON actually "provide[s] scalable PI addressing without changing the current BGP [RFC4271] routing system" along with costs incurred by IRON. How does hiding the EPA addresses inside the IRON locator prefixes reduce the routes in the real Internet core? What is the cost in the routing tables maintained by the relays? How expensive is the anycast routing? How does inter-VPC routing work and how expensive is it?
The remainder of my COMMENTs are editorial.
In Section 6.1, I think I understand what this text is trying to explain, but I don't think it's correct:
"It is therefore essential that the Client send the initial packets through its Server to avoid loss of SCMP messages that cannot traverse a NAT in the reverse direction."
Does this mean to explain that the Client sends packets through its Server to establish NAT state so SCMP messages from the Server to the Client can traverse the NAT?
In Section 6.2, this text uses "into the Internet" in a confusing way, assuming I'm understanding the meaning of the text correctly:
"The Server then forwards the revised packet into the Internet via a default or more-specific route, where it will be directed to the closest Relay within the destination VPC overlay network."
Everywhere else in this section "into the Internet" is used to describe the forwarding of a decapsulated datagram, after the outer header with locator addresses have been removed, into the (non-IRON) Internet. In the text quoted aboce, "into the Internet" seems to mean forwarding of an encapsulated datagram, which is described elsewhere in this section as simply "forwards" or "sends". I suggest rewriting, for consistency, as
"The Server then forwards to the closest Relay within the destination VPC overlay network."
In Figure 6, why would the anycast datagram from Server(A) be delivered to Relay(B) rather than Relay(A) (which presumably would be in the routing fabric for ISP A)? Does it matter?
Once Server(B) receives the datagram to be forwarded to Client(B), is it possible for Server(B) to send a redirect to Client(A) so Client(A) can send traffic directly to Client(B)?
Stylistic nit in section 6.4.1 (and elsewhere) - why start using the verb "releases" instead of the previously used "forwards" or "sends"? Seems like lots of unnecessary verbiage right after Figure 6; why not something like "..., host A sends packets to host B through its EUN. Client(A), as the defautl router for the EUN, receives the packets, encapsulates them in the IRON encapsulation and forwards them to Server(A). ..." (etc.) All the explanation of routing, etc., seems redundant at this point.
Sorry, can't help myself; in section 6.6:
"The IRON approach to renumbering avoidance therefore depends on VPCs conducting ethical business practices and offering reasonable rates."
... as opposed to the unethical business practices and unreasonably high rates from those evil, greedy ISPs.
Seriously, has the renumbering problem simply been moved from the ISPs to the VPCs?
- Adrian Farrel: Comment [2010-12-16]:
Thank you for bringing this work forward as Experimental and so increasing the documentation and discussion of potential solutions.
I feel that it would be helpful if the document contained a pointer to draft-irtf-rrg-recommendation so that the other ideas in the field can be easily found and compared.
Telechat:
- Amy: in interesting state, came from IRTF, Aaron indicated it needs to be revised, what should we do
- Jari: they sent email, I replied, suggesting the changes not needed; author still wants to make less-major changes; we don't know what's going to happen, perhaps AD-is-watching, no-problem for this version is appropriate (but not necessarily for a revision)
Russ: suggest text saying "for this version, we're done; for a revision, review changes"
- Amy: approved-point-raised, basically
1253 EST break
1258 EST back
- Jari Arkko--- y
- Ron Bonica--- y
- Stewart Bryant--- y
- Gonzalo Camarillo---
- Michelle Cotton--- y
- Ralph Droms--- y
- Linda Dunbar---
- Lars Eggert---
- Adrian Farrel--- y
- Sandy Ginoza--- y
- Susan Hares---
- David Harrington--- y
- Russ Housley--- y
- Olaf Kolkman---
- Glenn Kowack---
- Barry Leiba---
- John Leslie--- y
- Alexey Melnikov--- y
- Cindy Morgan--- y
- Ray Pelletier--- regrets
- Tim Polk--- y
- Dan Romascanu---
- Peter Saint-Andre--- y
- Robert Sparks--- y
- Hannes Tschofenig--- y
- Sean Turner--- y
- Amy Vezza--- y
4 Working Group Actions
4.1 WG Creation
4.1.1 Proposed for IETF Review
- Audio/Video Transport Payloads (payload)
Token: Robert
Telechat:
- Amy: any objection to external review
- Robert: Dec 3 version is correct
- Peter: interesting discussions...
- Robert: interesting one was XRBLOCK I may have over-reacted to chair pulling out; working on WGC candidates
- Amy: external review approved
- Metric Blocks for use with RTCP's Extended Report Framework (xrblock)
Token: Robert
Telechat:
- Amy: any objection to external review, approved
- Audio/Video Transport Core Maintenence (avtcore)
Token: Robert
Telechat:
- Amy: any objection to external review, approved
- Audio/Video Transport Extensions (avtext)
Token: Robert
Telechat:
- Amy: any objection to external review, approved
- Robert: Dec 3 versions of charters are all correct
4.1.2 Proposed for Approval
- ControLling mUltiple streams for TElepresence (clue)
Token: Gonzalo
Telechat:
- Amy: Gonzalo not with us, passed token to Robert; any objection to creation, hearing none, approved, we have all pieces
- Robert: one nit, capitalization
- Amy: we can change to lower-case-T, approved with lower-case-T
4.2 WG Rechartering
4.2.1 Under evaluation for IETF Review
- (none)
4.2.2 Proposed for Approval
- (none)
5. IAB News We can use
- Hannes: ITU-T liaison, flowstate discussion, ongoing discussion; ITU-T proposal related to QoS, rejected, worked on it, came back with modification, how do we react, protocol-ownership question, not clear where the work could be done in IETF; BoF? AD-sponsored?... discussion ongoing
- Russ: discussion has been jointly on IAB and IETF lists
- Ron: how about my proposed text?
- Ralph: my revision, wouldn't want to send what you wrote
- David: don't like Ron's text
- Jari: OK with Ralph's text
- Russ: depends on who signs it (as liaison)
- Ron: I will review
- Ralph: complete version
- Russ: open issue, which I will address
- Hannes: typically IAB receives
- Russ: actually, IAB manages, typically defer to IETF WG
- Ralph: question of how to approve joint response
- Hannes: didn't reach a conclusion (dissenting opinion by IAB member)
- Russ: due tomorrow; basic principles set, do something completely independent or send it our way
- Stewart: isn't it more work should be done it IETF (proposers bring the work here)
- Ralph: in past, proponents just throw it our way, expecting a RFC to magically appear: they need to be active through IETF process... leave details to future liaison exchange; propose ask them to say whether it will be independent or within-IETF
- Ron: I'm happy with your proposed text
- Russ: propose they contact specific individual
- Ralph: question to Hannes, deadline tomorrow, can you caucus IAB whether they're OK sending this text
- Hannes: you will post to IAB list, right
- Ralph: yes
- Russ: working on it
6. Management Issues
- IPFIX interoperability meeting in Prague (Dan Romascanu)
Telechat:
- Amy: Dan joined us a few minutes ago
- Dan: clarified some issues... advancing to Draft, asking for IETF help the week before IETF meeting, difficult to allocate space, perhaps Saturday & Sunday
- Russ: what if the answer is, only Sunday
- Dan: I'll ask, whatever the answer... they may look for alternate space
- Hannes: I'm also trying to find a room (for a different use), getting in touch with university...
- Jari: heard Marsha was working on it
- Russ: haven't gotten that answer (buying space earlier) from the hotel
- WG and BoF Scheduling for IETF 80 (Russ)
Telechat:
- Russ: do we need to change cutoff dates?
- Peter: problemmatic to change them after publishing
- Robert: I'd vote to wait until IETF 81
- Jari: I agree... different question, some negative reactions
- Russ: that was BoF-Monday, seemed happier once we abandoned that question
- Tim: I'm OK with dates this time
- Russ: both dates would have to shift, will work with Secretariat to propose dates for IETF-81
- Note (Amy)
Telechat:
- Amy: quick note, using new tracker exclusively, old tracker losing functionality; let us know of any issues with new tracker
7. Agenda Working Group News
- Stewart Bryant (Routing)--- none
- Gonzalo Camarillo (RAI)---
- Ralph Droms (Internet)--- left, said no news
- Lars Eggert (Transport)---
- Adrian Farrel (Routing)--- PIM, multi-vendor design team, working through errata, aiming up the standards ladder
- David Harrington (Transport)--- none
- Russ Housley (General)--- highlight message re joint working agreement, we need to discuss the change
Adrian: he's trying to edit the MOU??
Russ: changes to RFC, need to read it, need to respond, we need to spend some time on this
- Alexey Melnikov (Apps)--- pass
- Tim Polk (Security)--- not today
- Dan Romascanu (O & M)--- nothing
- Peter Saint-Andre (Apps)--- none
- Robert Sparks (RAI)--- pass
- Sean Turner (Security)--- pass
- Jari Arkko (Internet)--- needing some new WGCs, under discussion; plan to create WG on lightweight-IP?; room in Beijing keen, but not implementors, plan to create WG if we get appropriate experts
- Ron Bonica (O & M)--- nothing
1338 EST Adjourned
Appendix: Snapshot of discusses/comments
(at 2011-01-06 07:27:56 PST)
draft-ietf-pkix-ocspagility
- Jari Arkko: Discuss [2011-01-04]:
> A responder MAY maximize the potential for ensuring interoperability
> by selecting a supported signature algorithm using the following
> order of precedence, as long as the selected algorithm meets all
> security requirements of the OCSP responder, where the first method
> has the highest precedence:
>
> 1. Select an algorithm specified as a preferred signing algorithm in
> the client request
>
> 2. Select the signing algorithm used to sign a CRL issued by the
> certificate issuer providing status information for the
> certificate specified by CertID
>
> 3. Select the signing algorithm used to sign the OCSPRequest
>
> 4. Select a signature algorithm that has been advertised as being
> the default signature algorithm for the signing service using an
> out of band mechanism
>
> 5. Select a mandatory or recommended signing algorithm specified for
> the version of the OCSP protocol in use
>
> A responder SHOULD always apply the lowest numbered selection
> mechanism that is known, supported, and that meets the responder's
> criteria for cryptographic algorithm strength.
I am confused by the last sentence and how it uses the words "selection
mechanism". Does this sentence talk about algorithms or the above selection
methods? But the selection methods do not have an algorithmic strength, nor are
they negotiated. Suggested replacement text:
A responder SHOULD always apply the lowest numbered selecetion mechanism that
results in the selection of a known and supported algorithm that meets the
responder's criteria for cryptographic algorithm strength.
- Jari Arkko: Comment [2011-01-04]:
- Adrian Farrel: Discuss [2011-01-05]:
I find a small discrepency at the end of Section 4
The server SHOULD use one of the preferred signature algorithms for
signing OCSP responses to the requesting client.
This means (I think) that the server MAY use an algarithm not listed by the
client as preferred. You need to cover:
- under what circumstances
- what
expectations of success it will have
But, in fact, I think the whole of Section 5 is dedicated to the question of how
to select a suitable algorithm, and that means that this sentence in Section 4
needs to be replaced with:
Section 5 of this document describes how a server selects an
algorithm for signing OCSP responses to the requesting client.
- Adrian Farrel: Comment [2011-01-05]:
The RFC Editor will ask you to remove the citation from the Abstract.
---
http://www.rfc-editor.org/rfc-style-guide/abbrev.expansion.txt shows
that OCSP is not a "well-known" acronym. SO could you please expand it
in the document title, the Abstract, and on first use in Section 2.
---
A number of other acronyms are used without expansion.
CA
CRL
DSA
---
Section 5.1
Did you think of splitting option 5 into:
5. select a mandatory algorithm
6. select a recommended algorithm
since there is a very marked difference in the likelihood of success.
- Alexey Melnikov: Comment [2011-01-04]:
In Section 4:
The client MUST support each of the specified preferred signature
algorithms and the client MUST specify the algorithms in the order of
preference.
I think this is not actually saying what the order is. I suggest adding
something like
"from the most preferred to the least preferred"
8.3. Denial of Service Attack
Algorithm agility mechanisms defined in this document introduces a
slightly increased attack surface for Denial of Service attacks where
the client request is altered to require algorithms that are not
supported by the server, alternatively does not match pre-generated
responses.
The last part (after the final comma) is not readable.
[NEWASN] - is this a Downref? If it is (and it wasn't explicitly called out
during the IETF LC), is [NEWASN] in the Downref registry?
- Peter Saint-Andre: Comment [2011-01-05]:
1. Section 8.1 uses the phrases "considered unacceptably insecure" and "not
considered acceptably secure". Are these equivalent?
2. In Section 8.3, please consider citing RFC 4732 on the concept of denial of
service attacks.
- Sean Turner: Comment [2011-01-04]:
I am going to recuse myself from this draft because I was involved in proposing
the ASN.1 structure. I don't consider that an insignificant contribution. I am
however happy with this draft.
draft-ietf-httpstate-cookie
- Jari Arkko: Comment [2011-01-03]:
I agree with the Discusses from Alexey, Robert, Tim, and for the most part with
Sean. I do not agree with the Discuss from Adrian. Obviously the document can
make those actions.
- Adrian Farrel: Comment [2010-12-13]:
Section 1
Please don't be so timid.
OLD
This
document attempts to specify the syntax and semantics of these
headers as they are actually used on the Internet.
NEW
This
document specifies the syntax and semantics of these
headers as they are actually used on the Internet.
END
---
Section 10.2
You have:
[Netscape]
Netscape Communications Corp., "Persistent Client State --
HTTP Cookies", 1999, <http://web.archive.org/web/
20020803110822/http://wp.netscape.com/newsref/std/
cookie_spec.html>.
1. Are you sure this is the best version of the spec? The document is
headed: "Preliminary Specification - Use with caution"
2. RFC Erratum 1491 reads:
Section 12 says:
[Netscape] "Persistent Client State -- HTTP Cookies", available at
<http://www.netscape.com/newsref/std/cookie_spec.html>,
undated.
It should say:
[Netscape] "Persistent Client State -- HTTP Cookies", available at
<http://www.netscape.com/newsref/std/cookie_spec.html>,
undated.
Copy avalaible at <http://curl.haxx.se/rfc/cookie_spec.html>
Can you confirm that you do not need to add a "copy available"
statement to this document?
(See http://www.rfc-editor.org/errata_search.php?eid=1491)
---
Erratum 2644 seems to have been submitted after the date of your I-D.
I assume that this Erratum will be rejected as soon as your I-D
becomes an RFC.
(See http://www.rfc-editor.org/errata_search.php?eid=2644)
---
Section 2.1
In particular, the algorithms defined in this
specification are intended to
be easy to understand and are not
intended to be performant.
Do you really mean "performant" which my dictionary gives only as a
noun meaning " a perforemer".
I found
http://weblogs.asp.net/jgalloway/archive/2007/05/10/performant-isn-t-a-word.aspx
- Alexey Melnikov: Discuss [2010-12-20]:
[Updated as per -20]
This is a well written document. I am contemplating voting Yes on this document
once my issues (see below) are discussed/resolved, not because Cookies are
pretty, but because this is the best attempt to describe them properly.
7) In Section 5.4:
NOTE: Despite its name, the cookie-string is actually a sequence of
octets, not a sequence of characters. To convert the cookie-string
(or components thereof) into a sequence of characters (e.g., for
presentation to the user), the user agent might wish use the UTF-8
character encoding [RFC3629] to decode the octet sequence.
Clients can't assume that an arbitrary sequence of octets generated by the
server would be a valid UTF-8.
This needs to be clarified.
9) From Lisa Dusseault's Apps Area Review:
Section 3. "Origin servers can send a Set-Cookie response header with
any response.". Do we happen to know if it's more common for user
agents to handle, or ignore Set-Cookie response headers on error
responses? I'd be surprised if user-agents do handle them including
on 500-level, 400-level and particularly on a 100 Continue response,
but I haven't tested it. Is it part of your tests? So while this
statement is factual, it might not help servers much. If my
assumption about some clients ignoring the header on some classes of
responses is correct, I would add that information to the document in
a non-normative sentence.
- Alexey Melnikov: Comment [2010-12-20]:
5.1.1. Dates
year = 1*4DIGIT ( non-digit *OCTET )
Do people really use 1 digit and 3 digit years?
I very much doubt that a single digit year is allowed, so may I suggest:
year = 2*4DIGIT ( non-digit *OCTET )
- Tim Polk: Discuss [2011-01-06]:
This discuss was motivated in part by Richard Barnes' Gen-ART review. Richard
noted that:
"Many of these integrity issues are caused by user agents accepting cookies from
outside the context where they would send them, in particular with the Secure
and Path attributes. It seems like this document, in specifying the
desired/proper behavior of user agents, should require behavior that would
mitigate these attacks. In direct parallel to the handling of the Domain
attribute:
1. Set-Cookies with the Secure flag should only be accepted over
secure channels
2. Set-Cookies with the Path attribute set should only be
accepted if the path value matches the request-uri of the request
(That is,
update Steps 7 and 8 of S5.3 to match Steps 6 and 9/10)
The author responded:
"I agree that these would be desirable changes to the cookie protocol.
However, the http-state working group is not chartered to change the
cookie protocol. In particular, the charter reads as follows:
The working group must not introduce any new syntax or new semantics
not already in common use."
I understand that this document cannot impose new rules or syntax. However, as
written this document
appears to *prohibit* clients from extending the algorithm
to protect themselves: User agents are required
to implement algorithms
"equivalent to" the algorithms specified in Section 5 to process dates (section
5.1.1),
paths (5.1.4), parse a set cookie string (Section 5.2), and the
processing the cookie (Section 5.3, which was
at the heart of Richard's issues),
processing the cookie header (section 5.4), etc. This does not leave an
implementer with any wiggle room, forcing them to accept insecure processing
rules.
This document should not prohibit clients from doing additional processing to
enhance their own security,
especially since the processing rules proposed by
Richard apparently would not affect interoperability with
a well-behaved server.
I believe that a better model is the PKIX path validation processing algorithm,
where "functionally equivalent"
implementations are required but are explicitly
permitted to extend the model to enhance security. For example,
some
implementers have chosen to require that a certificate and CRL be signed by the
same cryptographic key
to guard against name collisions. This is not required
by PKIX but implementations that include this feature
are still compliant.
Is there a good reason why extensions to the user agent's processing cannot be
extended as Richard suggested?
- Tim Polk: Comment [2010-12-16]:
I found the following Note at the end of 4.1.1 confusing:
NOTE: Some user agents represent dates using 32-bit UNIX time_t
values. Some of these user agents might contain bugs that cause them
to process dates after the year 2038 incorrectly.
After considering this for a while, I concluded that the point is that user
agents
might convert the dates into UNIX time_t values for storage and
processing, and
implementation bugs mean that dates after 2038 are not
interpreted correctly. If
that is correct, then maybe the following would be an
appropriate substitution:
NOTE: Some user agents store and process dates in cookies as 32-bit UNIX
time_t values. Implementation bugs in the libraries supporting time_t
processing
on some systems may cause such user agents to process dates after
the year
2038 incorrectly.
- Robert Sparks: Discuss [2010-12-14]:
In 4.1.1 (Syntax) - Why is the specification part of this proposed standard
allowing implementations to
violate the grammar defined by this standard? The
SHOULD NOT in the first paragraph of this section must
be a MUST NOT. If the
intent is to make sure clients are liberal in what they accept because existing
servers may generate non-conformant grammar, just say that (and if possible,
point to what they might
need to expect). If the intent is to allow servers that
are compliant to generate messages not covered
by this grammar, then the grammar
is incorrect. If that's the case, the grammar should be extended to
allow the
alternate behavior and the document's prose can say that servers SHOULD NOT use
those parts
of the grammar.
- Robert Sparks: Comment [2010-12-14]:
Please consider moving the SHOULD in the first of the two NOTE:s at the end of
4.1.1 out of the NOTE.
Consider noting in the discussion of "public suffixes" that the problems this
mechanism attempts
to avoid are still present in deeper heirarchies (A server at
math.example.edu will be able to
set cookies for example.edu, potentially
affecting the behavior of infosec.example.edu)
- Sean Turner: Discuss [2010-12-16]:
[These are my preliminary discusses. I might find more later.]
This is a well written document, but I've got a couple of things I'd like to
discuss:
#1) I'd like to see a new security consideration section that addresses
persistent cookies. I think we need to mention how expiry date can be abused.
Is there some kind of recommendation we can give on their lifetimes? Are
cookies good for 2, 5, 20 years okay?
#2) I'd like to see a new privacy|security consideration that says what's being
touted as "private browsing" doesn't protect cookies it only stops the history
from being updated.
#3) Section 7.1: I understand it's hard to have one policy for third-party
cookies. But, couldn't we say that assuming sites aren't behaving badly or
somehow otherwise sharing tracking data that users that wish to not be tracked
by third-parties ensure that third-party cookies be blocked?
#4) Section 7.2: It's not a protocol thing, but should we really make the
following two SHOULDs:
User agents should provide users with a mechanism for managing the
cookies stored in the cookie store.
User agents should provide users with a mechanism for disabling
cookies.
#5) Section 8.3/8.5: Should point out that the format for signature/encryption
is server specific.
#6) Section 8.3, last paragraph:
a) The last paragraph, I believe, discusses "sidejacking" and "cookie monster"
attacks (or is that the 1st paragraph in 8.5?). Is it worth explicitly
mentioning the name of these attacks?
b) To that end, can we add something like (I'm not wed to the words) the
following to the end of the paragraph in 8.3:
For example, a webmail server that is initially accessed via HTTPS but later
exchanges mail (and cookies) over HTTP will expose whatever cookie (and mail) is
exchanged between the client and server. Sidejacking is when a MITM intercepts
the HTTP exchanges. If a server incorrectly sets the Secure attribute and sends
a cookie that otherwise should have been sent over a secure channel, a MITM can
access the cookie (sometimes called a cookie monster attack).
#7) Sec 8: Where would we say something about how when multiple users use the
same machine, they're not protected from one another?
#8) Sec 8: Shouldn't we have a section on cross-site scripting attacks (i.e.,
scripts that make browser send cookies to malicious servers that should not
receive them) and how http-only helps? I.e., servers should set httpOnly to
stop these?
#9) Sec 4.2/8 ?: Where are cookie poising attack discussed (i.e., client returns
a different cookie than the one set by the server)?
- Sean Turner: Comment [2010-12-16]:
#1) Section 4: It's odd that following is in Section 4, which is titled Server
Requirements:
User agents,
however, MUST implement the requirements in Section 5 to ensure
interoperability with servers making use of the full semantics.
Shouldn't it be in Section 5?
#2) In Section 5.2, add "(see Section 7.1)" to the end of:
For example, the user agent might wish to block responses to "third-party"
requests from setting cookies.
#3) In Section 5.4, add "(see Section 7.1)" to the end of:
For example, the user agent might wish to block sending cookies during "third-
party" requests.
draft-ietf-pim-group-rp-mapping
- Adrian Farrel: Comment [2010-12-31]:
Routing Area Directorate review by Dimitri Papadimitriou raises a few very minor
editorial points that should be looked at together with any other comments and
issues raised during IESG review.
> Section 1:
>
> - "Each PIM-SM router may learn Group-to-RP mappings through
> various mechanisms." which mechanisms ? ref's would be helpful
>
> - "It is critical that each router select the same 'RP' for a specific
> multicast group address." why ? a short sentence would be helpful
> - note this requirement applies to al routers in the same "domain"
>
> Section 4:
>
> - "A Group-to-RP mapping learned for PIM-BIDIR mode is preferred to
> an entry learned for PIM-SM mode."
> is this reason dictated by arbitrary criteria or protocol operation
> criteria (dictated by RFC 5059) or other ?
>
> Section 5:
>
> - Add ref's to BSR and Auto-RP in sentence
> "In this case, to support some specific applications, they might like to
> learn Group-to-RP mappings dynamically using either BSR or Auto-RP
> mechanism."
>
> - "This is not an issue for IPv6 Multicast address ranges." what "this"
> refers to ?
>
> Section 6:
>
> - What's the input to this algorithm ? there is a need to describe the set
> of information onto which this procedure applies (the output is implicit).
>
> - The description seems to mandate a sequential execution (from 1 to
> 10) but this is not stated ahead in the Section 6.
>
> Section 9:
>
> - " The algorithm in this document MUST be used. " on all routers in
> the domain? Please clarify.
>
> - "improve stability under misconfiguration" stability of what ?
>
> Section 11:
>
> - does the term "block" refers to disable or filter ? or left unspecified ?
- Tim Polk: Discuss [2011-01-05]:
This is a pretty straightforward discuss, and should be easy to clear. As noted
in Vincent Roca's security
directorate review, the document would benefit from
some expansion of the security considerations. In particular,
some pointers to
mechanisms for learning group-to-rp mappings that satisfy the constraint are
considered secure
would be helpful. Please use Vincent's review as an input to
your revisions.
- Dan Romascanu: Discuss [2011-01-04]:
The issue of the relation between this document and RFC 5060 was raised by
Adrian with the MIB Doctors. At the end of the discussion which prompted to
various methods of altering the behavior of the routers that already support the
MIB module the resolution communicated by Adrian was: 'we have decided that we
do NOT want to update the semantics of the existing objects'.
I am still to be convinced that this is the case.
7. Interpretation of MIB Objects
The algorithm defined in this document does not use the concept of
precedence and therefore the values configured in the
'pimGroupMappingPrecedence' and 'pimStaticRPPrecedence' objects of
the 'pimGroupMappingTable' table in the PIM-STD-MIB module [RFC5060]
are not applicable to the new algorithm. The objects still retain
their meaning for 'legacy' implementations, but since the algorithm
defined in this document is to be used in preference to that found in
PIM-SM [RFC4601] and PIM-STD-MIB [RFC5060], the usage of these fields
will decline as implementations are upgraded to support the new
algorithm.
First, in RFC 5060 the 'pimGroupMappingPrecedence' and 'pimStaticRPPrecedence'
objects are in two different tables - pimGroupMappingTable and pimStaticRPTable.
Each of the table has a different 'precedence' object and a different behavior.
Does pimStaticRPTable has any function with the new RP mapping algorithm? In RFC
5060 it is used to define static entries that may precede and override those
defined by the algorithm in 5060. Does this apply also to the algorithm defined
here?
What does exactly mean 'the usage of these fields will decline'? All the MIB
module defined in RFC 5060 is supported ('we do not want to update the
semantics') - so what happens with the pimGroupMappingTable? Section 8 describes
how objects in this table will continue to be used to indicate Group-to-RP
mapping. Whay I am missing is what happenss if a manager creates a new entry
as per RFC 5060? Should the router just ignore it? We cannot assume all managers
are 'well-bahaved' and we need to prevent I think mis-configuration.
If the writeable part of the of this table is not disabled, this would be a
serious security problem, as it would interfere with the works of the new
algorithm.
A proper solution should include an update of RFC 5060, including changes in
MODULE-COMPLIANCE and possibly a new read-only table that would help the
operators read the entries created as result of the application of the new
mechanism. I understand that the authors and WG do not plan to do this in the
near future, but they need to define a clear and acceptable behavior of the
agents runing RFC 5060. Dully obsoleting RFC 5060 (and the usage of the MIB
module defined there) would be another solution at this point, but this is not
what the WG wants, as I understand.
- Dan Romascanu: Comment [2011-01-04]:
1. Section 5:
A network management station can determine the RP for a specific
group in a specific router by running this algorithm on the
Group-to-RP mapping table fetched using SNMP MIB objects.
MIB objects are meant to work not only with SNMP. Please change 'SNMP MIB
objects' to 'SMI MIB objects' or just 'MIB objects'.
2. Need to expand MIB and SNMP at first occurence.
- Peter Saint-Andre: Discuss [2011-01-05]:
This is a fine document. However, the algorithm does not specify rules for
determining which hash value or IP address is "highest", which might inhibit
interoperability. Please specify such rules (e.g., convert to "network byte
order" octet string representation and then apply i;octet collation from RFC
4790), or refer to specifications that define such rules.
draft-ietf-roll-trickle
- Stewart Bryant: Discuss [2010-12-15]:
"All that matters is that
some nodes communicate with one another at some nonzero rate."
This is not right. If every node received, nothing would get communicated. In
addition I tend to think of communication as requiring some degree transmission.
I think that you mean transmits at some nonzero rate.
=======
Considering that later text says that Trickle breaks if there is a parameter
mismatch, I am concerned that this text is not strict enough:
It is RECOMMENDED that a protocol which uses Trickle includes
mechanisms to inform nodes of configuration parameters at runtime.
However, it is not always possible to do so.
I am also concerned with the get out clause that allows the degradation of a
MUST to a RECOMMENDATION. Surely for the cost of a few bytes the parameters can
at least be announced so that other nodes can get some hint that the mismatch is
occurring.
- Ralph Droms: Comment [2010-12-14]:
Nit: 3rd para of section 3, s/their/its/
Question: is the typical value of k in the range 1-5 independent of
the density of the network nodes, where I'm thinking of "density" as
the number of nodes that hear a given message?
- Lars Eggert: Discuss [2010-12-16]:
I'm sorry for deferring this document to the next telechat. I want the TSV
directorate to review it and I didn't realize this in time to get the review
assigned.
I'm also balloting DISCUSS. That is, because looking at the current ROLL
charter, I have a hard time understanding how this document is in scope of the
WG. This document does not fall under any of the work items on the charter; and
it's not even what I'd consider a "routing" protocol.
- Adrian Farrel: Comment [2010-12-24]:
Rtg Dir review from Alia Atlas says:
I have reviewed draft-ietf-roll-trickle-06. It is one of the best drafts that
I have read and I do not have any substantial or even editorial comments on it.
I found the protocol as described to be clear, simple and pretty elegant.
- Robert Sparks: Comment [2010-12-14]:
In section 6.5 - The comment about "having the parameter describe k-1 instead of
k being confusing" is confusing. I had to think for some time to convince myself
that I understood what you were trying to say. I encourage you to further
explain, or rewrite the comment.
Why are you allowing different uses of trickle to give different meanings to
k=0? It would seem to facilitate interoperability (and simplify implementation)
if you just defined k=0 to mean turning off suppression in all cases. Individual
uses of trickle can forbid setting k=0 if they don't want to allow turning off
suppression.
draft-ietf-pwe3-oam-msg-map
- Adrian Farrel: Discuss [2011-01-03]:
There are a couple of nits reported by idnits (an out of date reference,
an old license statement). I think the license statement should be
fixed and posted (to reflect the authors' intent) before the document is
approved.
---
I see IPR disclosed at http://datatracker.ietf.org/ipr/863/
I don't see this declared in the proto write-up. More important, it is
not present in the IETF last call announcement in datatracker.
---
What is the situation wrt multi-segment PWs? I can understand that this
document
was developed before the WG turned to MS-PWs, but we now have
RFC 5254 and RFC
5659.
I would prefer that this document fully addressed MS-PWs. That would not
be hard because each PW segment at an S-PE regards the adjacent segments
as ACs, so it could probably be addressed in just one or two paragraphs
in a new section.
However, an option is to declare MS-PW out of scope, and provide a
forward
reference to work being done on OAM message mapping for MS-PWs
in the PWE3 WG.
---
Section 4.2
If LSP-Ping [RFC4379] is run over a PW as described in [RFC4377], it
will be referred to as "VCCV-Ping".
I believe s/RFC4377/RFC5085/
---
Section 5
You should add a note to explain why the CE ends of the ACs are not
considered
as possible defect locations. They are part of the emulated
service, so a naif
reader might expect to see them listed. Possibly you
will want to explicitly
include it in case (a).
Additionally, your text does not match the figure:
c. Defect on a PE1 PSN interface.
But (c) also appears on the PE2-PSN interface in the figure.
Furthermore, (e) and (f) appear tbe reversed in the figure compared to
the text.
---
Section 13
RFC 5085 and RFC 4447 should be presented as references.
I will let Security experts comment further, but:
It seems to me that facilitating end-to-end coordination of PW status
and fualt reporting provides an extra tool for attackers. I would
expect this to be pointed out and held up as a reason for ensuring the
use of the security mechanisms.
I think that there are security coordination issues. Perhaps these are
already mentioned in the references. Consider carrying NS OAM from CE
to CE across the PSN in Single Emulated OAM Loop mode or Coupled OAM
Loops mode. The security relationship perceived by the CEs would
presumably be between each other, but doesn't the PE need to
participate?
- Adrian Farrel: Comment [2011-01-03]:
Section 3
s/whereby/where/
---
The Introduction uses a number of acronyms without prior expansion.
On the other hand, having defined acronyms in Section 4.1, you don't
gave to expand them in subsequent sections.
---
Section 4.1
Several acronyms are not used in the rest of the document.
BDI
CPCS
IWF
s/label Switched Path/Label Switched Path/
s/Operations, Administration and Maintenance/
Operations, Administration, and Maintenance/
---
Section 4.2
The words "defect" and "fault" are used interchangeably to mean any
condition that obstructs forwarding of user traffic between the CE
endpoints of the PW service.
I'm fine with this, but I think "obstructs" is ambiguous. Do you mean
"impose a complete blockage", or do you mean to include degradation in
some form? Perhaps you could add a clarification.
---
Section 4.2
If BFD is run over a PW as
described in [RFC5885], it will be referred to as "VCCV-BFD".
Add a reference to [RFC5880]
---
Section 4.2
A "transmit defect" is any defect that impacts traffic that is meant
to be sent or relayed by the observing PE. A "receive defect" is any
defect that impacts traffic that is meant to be received by the
observing PE.
While "meant to be" is appropriate for the reception of data, I don't
think it necessarily applies to transmission. Consider that the defect
may be somewhat downstream of (and not yet notfied to) the upstream PE
such that the traffic that is impaced is that which *has* been sent or
relayed by the observing PE.
Additionally, the term "observing PE" has not been defined and may
clarify or complicate the meaning of the text.
---
I had a few problems with Section 8.1. I think my issue is with the
use of the control plane as an OAM exchange mechanism (this also shows
up in Appendix B). I believe the section could benefit from some
polishing.
For MPLS and MPLS/IP PSNs, a PE that establishes a PW using Label
Distribution Protocol [RFC3036] MUST use the LDP status TLV as the
mechanism for AC and PW status and defect notification, as explained
in [RFC4447].
I don't think that this "MUST" is good or consitent with:
- the text in Section 7 that is relaxed in saying "LDP or in the ACH"
- the work in MPLS-TP
It sounds like 3036 (or rather 5036) is a normative reference.
While conveying PW status in LDP per 4447 is fine, it is not OAM with
the utility of rapid propagation of fault notifications. LDP, reliant
as it is on TCP, is not suitable to that purpose.
Wouldn't it be better to require the use of the ACH for OAM fault
notification messages, and (if you must :-) mandate the use of LDP
for status information propagation when LDP is present (but not as a
replacement for real OAM).
Additionally...
Additionally, a PE MAY use VCCV-BFD Connectivity
Verification (CV) for
fault detection only (CV types 0x04 and 0x10
[RFC5885]) but SHOULD notify the
remote PE using the LDP Status TLV.
The "SHOULD" here seems to be in conflict with te previous "MUST"
And it goes on...
A PE that establishes a PW using means other than LDP, e.g., by
static configuration or by use of BGP, MAY use VCCV-BFD CV (CV types
0x08 and 0x20 [RFC5885]) for AC and PW status and defect
notification. Note that these CV types SHOULD NOT be used when the
PW is established with the LDP control plane.
If you supply only a "MAY" you should probably describe how else the
fault notification might work.
As to the "SHOULD NOT" in the last sentence. Well, see my previous
comments. And what possible harm could it do?
---
Section 6
Generally, a PE cannot detect transmit defects directly and will
therefore need to be notified of AC transmit or PW transmit defects
by other devices.
I think you mean s/directly/direct/
---
Section 8.1.1
[RFC4447] specifies that the "Pseudowire forwarding" code point is
used to clear all faults. It also specifies that the "Pseudowire Not
Forwarding" code is used to convey any defect that cannot be
represented by the other code points.
The language seems rather week.
The use of the code point does not clear the faults. It is used to
report (notify) that the faults have been cleared.
Likewise, defects are not conveyed by the use of a control points, but
existence of the defect can be reported (or conveyed, if you like).
- Russ Housley: Comment [2011-01-05]:
Appendix B.3: s/Los/Loss/
draft-ietf-avt-rtcp-port-for-ssm
- Adrian Farrel: Comment [2011-01-05]:
As idnits points out, you can strip the RFC 2119 boilerplate and
reference. I'm sure the RFC Editor can handle this.
- David Harrington: Comment [2011-01-05]:
1) in section 1, "the +1 rule" is mentioned without definition or reference.
- Sean Turner: Comment [2011-01-05]:
Section 5 has:
This
can, for example, be achieved on an end-to-end basis using S/MIME
[RFC5652] when SDP is used in a signaling packet using MIME types
(application/sdp).
Technically, S/MIME messages aren't in [RFC5652] they're in [RFC5751]. RFC 5652
is CMS, which is profiled for email in RFC 5751. I've noted that when used
with SDP S/MIME has been referred to as follows: RFC 4566 uses text that is
similar, but omits a reference for S/MIME; RFC 4657 uses RFC 3851 (previous
version of RFC 5751); RFC 4658 uses RFC 3851; RFC 3605 uses RFC 3852 (prior
version of RFC 5652); RFC 3261 refers to both 2633 (S/MIME) and 2630 (CMS).
Maybe the right approach is to point to both CMS and S/MIME.
draft-ietf-avt-rtp-cnames
- Stewart Bryant: Discuss [2011-01-05]:
I think it would be helpful to the reader to briefly note that whilst the
methods described in this document are good enough for most practical purposes
they are not technically perfect. Whilst I can see no particular problem in the
application described here, these methods may well be re-purposed as convenient
general purpose UID mechanisms.
Specifically when the method described in (5) does not use an EUI-64 there is a
non-zero probability of collision, and the method in (4) that uses the MAC
address is only as good as the quality procedures and ethics of the hardware
manufacturer.
- Adrian Farrel: Comment [2011-01-05]:
Support Stewart's Discuss since we have observed "clone" equipment with
identical MAC addresses in the past. Also, I believe that some h/w exists with
configurable MAC addresses.
---
Abstract
s/these/those/
- Russ Housley: Discuss [2011-01-05]:
The Gen-ART Review by Suresh Krishnan on 2-Jan-2011 raised an issue
that needs to be resolved before publication. Section 5, Step 2,
describes the use of an EUI-64 identifier and how to generate one if
it does not exist. The procedure for the creation of the EUI-64 from a
48-bit MAC address is incorrect:
RFC 4291 describes how to create a *modified* EUI-64 identifier (not a
EUI-64 identifier) from a MAC address. A MAC address of
xx:78:90:12:34:56 will be transformed to a modified EUI-64 of
yy7890FFFE123456, where yy is the value of xx with the u/l bit (bit 6)
flipped. The IEEE reference for creation of an EUI-64 from a 48-bit
MAC address (http://standards.ieee.org/develop/regauth/tut/eui64.pdf)
would result in an EUI-64 of xx7890FFFF123456 for the same MAC address.
While I recognize that no interoperability issues will result from
this difference, there may be issues with testing if this is not
resolved. Therfore, I suggest using the term "modified EUI-64" instead
of EUI-64 or changing the reference from RFC 4291 to the IEEE
document.
- Alexey Melnikov: Comment [2010-12-25]:
5. Procedure to Generate a Unique Identifier
2. Obtain an EUI-64 identifier from the system running this
I think this needs an Informative reference to a document which explains what is
EUI-64.
algorithm. If an EUI-64 does not exist, one can be created from
a 48-bit MAC address as specified in [RFC4291]. If an EUI-64
cannot be obtained or created, a suitably unique identifier,
local to the node, should be used (e.g., system serial number).
- Tim Polk: Comment [2011-01-06]:
I support Sean's discuss: hard-coding SHA-1 is unnecessary and
counterproductive. There is no reason that all
clients need to use the same
secure hash algorithm, IMHO. (For example, two clients using SHA-256 and
SHA-512
are no more likely to generate a collision than two clients using
SHA-256.) I suggest "compute a message digest
using a secure hash function
(e.g., SHA-256)" would provide the right level of detail for section 5.
A short paragraph should also be added to the security considerations section
with appropriate references. (I think
Sean's discuss has the right list.)
I would also note that the algorithm in section 5 does not *guarantee*
uniqueness. I think your odds of a collision
are one in 2**48 (but check with a
real mathematician!). I note this since the Requirements section states "It is
believed that obtaining uniqueness is an important property ..."
Section 4.2, third bullet:
"After performing the procedure, the significant 96 bits are used ..."
Please specify "most significant" or "least significant"; the latter would be
consistent with the preceding bullet.
- Dan Romascanu: Comment [2011-01-04]:
1.
> After obtaining a identifier by doing (a) or (b),
the least significant 48 bits are converted to the standard colon-
separated hexadecimal format, e.g., "00:23:32:af:9b:aa", resulting
in a 17-octet printable string representation.
It would be good to provide a reference for this 'standard ... format'. RFC 5342
uses a different notation, so arguably there is more than one format used in
RFCs.
2. Also from 5342 - here is a reference for EUI-64 which could be added (also
answers the COMMENT from Alexey)
[EUI-64] IEEE, "Guidelines for 64-bit Global Identifier (EUI-64)
Registration Authority", <http://standards.ieee.org/
regauth/oui/tutorials/EUI64.html>, March 1997.
- Peter Saint-Andre: Discuss [2011-01-05]:
This is a fine document with the laudable goal of improving interoperability,
but in one respect I think it is both overly specific and unclear about the
requirements it is working to meet.
Section 4.1 states:
An implementation that wishes to
discourage this type of third-party monitoring can generate a unique
RTCP CNAME for each RTP session....
However, a unique identifier does not necessarily discourage third-party
monitoring, e.g., incrementing from UniqueID-1 UniqueID-2 might ensure
uniqueness but not privacy. I suggest that we provide a reference to RFC 4086
here and recommend that those who desire privacy need to generate identifiers
that are not only unique but also random.
This issue is connected to Section 4.2, which mandates one algorithm for long-
term identifiers and a different algorithm for short-term identifiers (with
seemingly different security properties, since long-term identifiers are 36
octets in length whereas short-term identifiers are only 17 octets in length).
Would an implementation that generates a UUID for short-term identifiers violate
the spec? If so, why? As long as the short-term identifier is unique, the
implementation has met the relevant requirement. (Perhaps there is a further
requirement or desire to make the identifier random, as mentioned above, but
that is a separate issue.)
- Sean Turner: Discuss [2011-01-06]:
#2 was revised based on some side discussions.
#1) Section 5: On the use of SHA-1: What properties are you looking from the
output? If you require no collisions then SHA-1 is probably a bad idea (see
https://datatracker.ietf.org/doc/draft-turner-sha0-sha1-seccon/). It would be
much better to use SHA-256 and truncate it. And, then point to
https://datatracker.ietf.org/doc/draft-eastlake-sha2b/. Yes it is a dependency
but it's in AD Evaluation.
#2) Section 5: Algorithm agility would be really nice here. Locking yourself in
to one hash algorithm isn't a good idea. If the client is the only entity that
is ever going to generate this hash true algorithm agility might not be needed,
but you could get it by picking a length you want and then saying that one of
the algorithms x, y, or z MUST be used. That way the implementer can pick on
that they're doing in their cipher suite.
- Sean Turner: Comment [2011-01-05]:
Section 4: Need to add "NOT RECOMMENDED" to Section 2. It's used as a key word
and the 2119 errata allow it, but you need to include it as shown in the errata
(http://www.rfc-editor.org/errata_search.php?rfc=2119).
Any chance for an example per-session unique identifier?
draft-ietf-dnsext-5395bis
- Jari Arkko: Comment [2011-01-05]:
This is a good document and should go forward.
A few comments regarding the comments and discusses from other ADs:
- I do not believe this document is the place to obsolete z-bit. This is
an IANA considerations doc.
- Regarding URLs and the template, I note that Specification Required
is not explictly called for. Maybe it should be, and that would solve
the URL problem (as the semantics of Specification Required have
been defined elsewhere and reference stability is one criteria).
- Stewart Bryant: Comment [2011-01-05]:
I agree with David Harrington's discuss.
- Adrian Farrel: Discuss [2011-01-05]:
A small piece of IANA pedantry...
Section 1.1.
"IETF Standards Action", "IETF Review", "Specification Required", and
"Private Use" are as defined in [RFC5226].
5226 uses the term "Standards Action" not "IETF Standards Action". Could
you fix this up throughout the document?
- Adrian Farrel: Comment [2011-01-05]:
A nit:
The Abstract reads...
Internet Assigned Number Authority (IANA) parameter assignment
considerations are specified for the allocation of Domain Name System
(DNS) resource record types, CLASSes, operation codes, error codes,
DNS protocol message header bits, and AFSDB resource record subtypes.
Pedantically, this Abstract says nothing about *this* document.
Could you make it read...
This document specifies Internet Assigned Number Authority (IANA)
parameter assignment considerations for the allocation of...
- David Harrington: Discuss [2011-01-04]:
in section 2.1, should the document state that the ancient usage is hereby
obsoleted and the z-bit MUST NOT be used for this ancient purpose in
implmenetations compliant to this spec?
in Annex 1, field E, should the document specify that it MUST be a long-lived,
stable URL if a URL is used?
What happens if the URL disappears?
Should a
document be required for escrow purposes?
- David Harrington: Comment [2011-01-04]:
in section 1, s/is the change is the public review mailing list /is the change
to the public review mailing list/
in section 2.3, might it be good to recommend NOT overloading the values, ala
the 16 bit, since we have 60000+ bits available?
section 3.1.4 uses MX RR without prior definition, or reference to the
definition.
in Annex 1, field E, why does this end in a colon?
why is field J on a totally separate page?
- Alexey Melnikov: Comment [2010-12-19]:
I have a couple of comments. Taking into consideration that this is a bis
document, I am making them Comment-level:
1)
3.1.1. DNS RRTYPE Allocation Policy
No less than three weeks and no more than six weeks after a completed
template has been formally posted to dnsext@ietf.org, the selected
Expert shall post a message, explicitly accepting or rejecting the
application, to IANA, dnsext@ietf.org, and the email address provided
by the applicant. If the Expert does not post such a message, the
application shall be considered rejected but may be re-submitted to
IANA.
The last sentence: is "rejection by silence" a good idea? Has this worked well
in the past?
2) Excuse my ignorance, but what is the relationship between 2 mailing lists:
3.1.1. DNS RRTYPE Allocation Policy
No less than three weeks and no more than six weeks after a completed
template has been formally posted to dnsext@ietf.org, the selected
Expert shall post a message, explicitly accepting or rejecting the
application, to IANA, dnsext@ietf.org, and the email address provided
by the applicant.
5. IANA Considerations
This document consists entirely of DNS IANA Considerations.
IANA shall establish a process for accepting Annex A templates,
selecting an Expert from those appointed to review such template form
applications, and archive and make available all approved RRTYPE
allocation templates. It is the duty of the applicant to post the
formal application template to the dns-rrtype-applications@ietf.org
mailing list. See Section 3.1 and Annex A for more details.
Is a request always posted to dns-rrtype-applications@ietf.org and then to
dnsext@ietf.org?
If the answer is yes, why have 2 mailing lists?
draft-ietf-avt-srtp-big-aes
- Russ Housley: Discuss [2011-01-02]:
The Gen-ART Review by Richard Barnes on 10-Dec-2010 raises a question
that deserves a response. I have not see a response to the question.
>
> The Suite B specifications require the use of SHA-256 and SHA-384 as
> hash functions for SECRET and TOP SECRET, respectively. Given that
> Suite B compatibility is listed as an objective of this document, it
> seems like there should be a cryptosuite that would use Suite B hash
> algorithms as well as encryption algorithms.
- Russ Housley: Comment [2011-01-02]:
Please consider the nit and editorial comments from the Gen-ART Review
by Richard Barnes on 10-Dec-2010:
>
> [Section3] In the first sentence, should "AES_CM PRF" be changed
> to "AES_CM_PRF"?
>
> [Section3.1] Do you want to say explicitly that stronger KDFs MAY
> be used? That you could use the AES_256_CM KDF with AES_192_CM as
> the bulk encryption algorithm, or use either 192 or 256 with 128?
- Alexey Melnikov: Comment [2010-12-24]:
3.1. Usage Requirements
When AES_192_CM is used for encryption, AES_192_CM SHOULD be used as
I think the 2nd AES_192_CM should be AES_192_CM_PRF
the key derivation function, and AES_128_CM MUST NOT be used as the
s/AES_128_CM/AES_128_CM_PRF ?
key derivation function.
When AES_256_CM is used for encryption, AES_256_CM SHOULD be used as
the key derivation function. Both AES_128_CM and AES_192_CM MUST NOT
be used as the key derivation function.
Same comments as above.
- Tim Polk: Comment [2011-01-04]:
Please note Hilarie Orman's secdir review.
(1) In particular, she notes:
The block counter "b_c" is two octets, but the "default key lifetime"
is 2^31. Is this perhaps the "maximum" key lifetime? Should
implementors introduce an internal counter to keep track of the
history of key usage (across sessions?)? Perhaps earlier documents
explain this?
Should implementers use the rollover counter (ROC) from RFC 3711
in combination with b_c, or is there another mechanism that the
authors had in mind?
(2) You might consider moving the rationale to the front of the section
as an alternative to Hilarie's suggestions on section 3.1,
- Sean Turner: Discuss [2011-01-05]:
I don't think SHA-1 is part of any Suite B specifications. Because of this,
it's unclear to me that you should hint that by implementing this RFC an
implementation would be considered Suite B compliant.
- Sean Turner: Comment [2011-01-05]:
#1) Support Russ' and Tim's discusses.
#2) Section 3:
In
this note, the AES-192 counter mode PRF and AES-256 counter mode PRF
are and are denoted as AES_192_CM_PRF and AES_256_CM_PRF
respectively.
extra words "are and"?
#3) Section 3.1 (similar to Russ's 2nd comment): Should the rationale include a
MUST? For example:
The cryptographic strength of the key derivation function MUST
meet or exceed the cryptographic strength of the encryption method.
draft-ietf-mpls-ldp-upstream
- Jari Arkko: Discuss [2010-12-02]:
Section 5 should explain what the semantics of the second field of the Sub-TLVs
are. Presumably that has been defined in some earlier RFC that defined the
syntax for Sub-TLVs. A reference would suffice.
Reference to Section 4.2 for some behaviour needs to be changed as there
is no Section 4.2.
- Jari Arkko: Comment [2010-12-02]:
A few comments from Ari Keränen:
The format of the packet format figures is not consistent: in the
section 5's sub-TLVs "type" is given with syntax "Type = XX" whereas in
rest of the figures it's "Name (code)".
The second field of sub-TLVs (length?) is not defined at all in the
figures but just the value is given. Also the length seems to include
the type and length of the TLV -- is that intentional? Especially since
in the other TLVs do not seem to include type and length.
Also the sentence "The TLV value in the sub-TLV acts as the tunnel
identifier" is strange. Do you mean "the value of the sub-TLV"?
1. RSVP-TE P2MP LSP TLV. Type = 28 (To be assigned by IANA). Value of
the TLV is as carried in the RSVP-TE P2MP LSP SESSION Object
[RFC4875].
The second sentence above is a bit confusing. Perhaps removing the "as
carried in" part from the sentence and changing "value of the TLV" into
"value of the sub-TLV" would help, if you mean that the whole object is
in the value of the sub-TLV.
It's also somewhat confusing that with RSVP-TE P2MP LSP TLV there are
Type and Length in the figure and with LDP P2MP LSP TLV there aren't.
The format of the 3rd and 4th sub-TLV seems underspecified. For example,
how do you encode a "<Source Address, Multicast Group Address> tuple" in
a sub-TLV?
6. LDP Point-to-Multipoint LSPs on a LAN
Processing
of the Label Request and Label Mapping messages for LDP upstream-
assigned labels is as described in section 4.2.
Section 4.2. does not exist.
2. The following hash is performed: H = (Sum Opaque value) modulo N,
where N is the number of candidate upstream LSRs. Opaque value is
defined in [MLDP] and comprises the P2MP LSP identifier.
What does the "Sum" in the hash equation mean? I would assume it's sum
over all opaque values if there is more than one, but it's not really
clear from the context. Also, how do you convert the opaque value(s)
into number(s)?
- Stewart Bryant: Comment [2010-12-02]:
- Adrian Farrel: Comment [2010-12-02]:
Gen Art review comments from Avshalom Houri
Summary: The document is ready for a Standard Track RFC.
Major issues: None
Minor issues: None
Nits/editorial comments:
One or more occurrences in the document
a LDP -> an LDP
a LSR -> an LSR
a MPLS -> an MPLS
Line 540
[MLDP] describe how to setup P2MP LSPs using LDP. On a LAN the
-> [MLDP] describes how to setup P2MP LSPs using LDP. On a LAN the
Line 572
Ru on receiving this message sends back a Label Mapping message to Rd
-> On receiving this message, Ru sends back a Label Mapping message to Rd
- David Harrington: Comment [2010-11-30]:
SECTION 3: s/MUST be carried only LDP initialization messages/MUST be carried
only in LDP initialization messages/
- Russ Housley: Comment [2010-11-28]:
The Gen-ART Review by Avshalom Houri on 13-Oct-2010 includes some
editorial suggestions. Please consider them.
- Sean Turner: Comment [2010-11-30]:
Section 4: Shouldn't the two "optional"s be "OPTIONAL"? They're indicating
support requirements.
draft-cdmi-mediatypes
- Adrian Farrel: Comment [2011-01-05]:
Support Alexey's Discuss wrt the reference to 4627 and the potential
positioning of this document as Informational in which case I don't
think the minimal usage of 2119 language would suffer from being
changed to lower case, since it seems to be referenced from another
specification.
- Alexey Melnikov: Discuss [2010-12-21]:
[Updated as per -06]
DISCUSS DISCUSS (something that I want to discuss with IESG, no action from the
author required):
RFC 4627 is a Normative reference, so this is a DOWNREF. If the document is
changed to Informational, the issue will go away.
- Alexey Melnikov: Comment [2010-12-21]:
- Sean Turner: Discuss [2011-01-05]:
updated to remove #3
#1) Sec 3.1: The implementations are free to store the data in
any form they choose, but the application/cdmi-object SHOULD be
represented in the CDMI interface as defined in section 8 of the CDMI
specification.
Seems like there's a normative reference missing to the CDMI spec.
#2) Sec 3.2: The implementations are free to represent the
container in any form they choose, but the application/cdmi-container
SHOULD be represented in the CDMI interface as defined in section 9
of the CDMI specification.
Seems like there's a normative reference missing to the CDMI spec.
- Sean Turner: Comment [2011-01-05]:
From Sec 3.2: ... includes standardized and optional metadata.
There can be standardized optional metadata - no? Is this "required and
optional meadata"?
draft-melnikov-mailserver-uri-to-historic
- Sean Turner: Comment [2011-01-05]:
Should "Updates: 1738 (once approved)" appear on the 1st page?
draft-kucherawy-authres-vbr
- (none)
draft-ietf-mpls-tp-oam-framework
- Stewart Bryant: Discuss [2011-01-05]:
I am concerned about this text:
Protection Switching: default transmission period is 3.33ms (i.e. transmission
rate of 300 packets/second).
Firstly the the requirement in RFC5654 only specifies the total time to detect
and to act as 50ms and how the system partitions this time should be a local
matter.
Secondly there are some applications of MPLS-TP that may not need this high peed
detection, and it is unreasonable to burden them with the need to implement this
high speed detection mechanism.
- Adrian Farrel: Comment [2010-12-31]:
Three Directorate reviews have been addressed, but a few non-blocking comments
remain that should be addressed to improve the document before it is published
as an RFC:
SecDir - vincent.roca@inrialpes.fr
> However there's a (naive) question which you didn't answer: is it
> realistic to assume the physical network can be secured? Are there
> known weaknesses in the MPLS infrastructure? Nothing is said in
> the I-D.
>
> Another point (from -10). It is said:
>
> However
> it should be observed that the combination of the need for
> timeliness of OAM transaction exchange and all permutations of
> unique MEP to MEP, MEP to MIP, and intermediate system
> originated transactions mitigates against the practical
> establishment and maintenance of a large number of security
> associations per MEG either in advance or as required.
>
> The reasons mentioned here to justify nothing is done is critical.
> Only two reasons are listed: timeliness and combinatorial motivations.
> In your answer you also mention the high transmission frequency of
> heartbeats. This is not mentioned. Something else?
GenArt - david.black@emc.com
> The authors have addressed most of the items noted in the Gen-ART review
> of
the -09 version, but there is one item that could still use some attention.
>
From the original review:
>
> [D] The security considerations section
should include specific mention
> of injection of LKI request OAM packets
as a vector for a denial-of-service
> attack (this is an obvious way for a
man-in-the-middle to quickly cause
> serious havoc). That would be a good
specific example to add to the end
> of the current security
considerations paragraph that requires the network
> to be physically
secure against man-in-the-middle attacks.
>
> This has not been done. While the
security considerations section does
> cover the countermeasures necessary to
prevent this attack, I prefer security
> considerations sections that include
examples of things that can go badly
> wrong when implementers don't pay
attention when the examples are simple.
> That preference is a matter of
style/taste that I'll leave to the responsible AD's
> judgment
RtgDir - thomas.morin@orange-ftgroup.com
> I replied to Dave Allan that my current
> feeling, after going through today's revision of the OAM framework
> document, is that the comments I made are only partially addressed.
- Russ Housley: Comment [2011-01-02]:
The Gen-ART Review by David Black lead to some document updates.
However, one comment was not addressed. Please consider updates
to the security considerations section. David said:
>
> [D] The security considerations section should include specific
> mention of injection of LKI request OAM packets as a vector for a
> denial-of-service attack (this is an obvious way for a man-in-the-
> middle to quickly cause serious havoc). That would be a good
> specific example to add to the end of the current security
> considerations paragraph that requires the network to be
> physically secure against man-in-the-middle attacks.
>
While the security considerations section does cover the
countermeasures necessary to prevent this attack, it seems like
a good idea to document something that can go badly wrong when
implementers do not pay attention.
draft-ietf-sieve-autoreply
- Stewart Bryant: Comment [2011-01-05]:
This is somewhat unusual language to find in a RFC to be:
Consider whether it's truly important to tell people that
you'll read their mail in an hour or so, or whether that can just be
taken as how email works. There are times when this makes sense, but
let's not use it to exacerbate information overload.
- Adrian Farrel: Comment [2011-01-05]:
Your homily to users in Section 1 is a good message, but I think it is
in the wrong document or targeted at the wrong audience. *This* document
would, I think, mainly apply to application developers since it is an
unusual user who writes their own Seive scripts. So the warning is
better rephrased to advise application developers to be careful to not
provide too many knobs and whistles, or to make sure that their
implementations warn users to exercise appropriate caution.
I would also note in this context that presence information might be a
good tool to reduce the amount of autoresponses generated thus
mitigating the sad effect of auto-responder functionality.
---
Section 4
Despite the "intelligence", too, errors in scripts can result in
private information getting to senders inappropriately.
Is "too," superfluous? I find it hard to parse.
- Robert Sparks: Comment [2011-01-05]:
Example 2 in section 3 does what the last paragraph in section 1 says is a bad
idea. Please consider reconciling these two parts of the document.
draft-ietf-ecrit-lost-servicelistboundary
- Tim Polk: Comment [2011-01-06]:
My apologies before climbing onto the editorial soapbox, but...
This document *defines* a Service List Boundary extension, not *proposes* a
Service List Boundary. Perhaps the
-00 draft was a proposal, but this one is a
technical specification.
I suggest a minor edit in the Abstract to clarify the document scope.
- Sean Turner: Discuss [2011-01-05]:
Section 3.2, 2nd to last paragraph: Add a normative reference to BCP 106/RFC
4086 for randomness requirements (should have been in RFC 5222).
[RFC4086] Eastlake, D., 3rd, Schiller, J., and S. Crocker, "Randomness
Requirements for Security", BCP 106, RFC 4086, June 2005.
- Sean Turner: Comment [2011-01-05]:
Sec 3.3: r/is optional and/is OPTIONAL and
draft-ietf-ipfix-anon
- Stewart Bryant: Discuss [2010-12-13]:
In the security section you say
"When releasing anonymised data, publishers need to ensure that data that could
be used in deanonymisation is not leaked through the export protocol;
guidelines for addressing this risk are provided in Section 7.2."
However it's not just protocol action that needs to be secured, the anonymising
system (i.e. h/w, s/w, operational procedures) itself needs to be secure and is
a system that will be the prime focus of any attack to recover the base data.
- Stewart Bryant: Comment [2010-12-13]:
"Binning can be seen as a special case of precision degradation; the operation
is identical, except for in precision degradation the counter ranges are
uniform, and in binning they need not be. For example, a common counter
binning scheme for packet counters could be to bin values 1-2 together, and
3-infinity together, thereby separating potentially completely-opened TCP
connections from unopened ones.
I am not a TCP specialist, so I do not understand the leap from the simple text
"to bin values 1-2 together, and 3-infinity together" to the TCP connection
example, however I suspect that grouping and the protocol state are in the wrong
order.
Either way, a few more words of a different example would add clarity.
- Adrian Farrel: Comment [2011-01-03]:
Thanks for bringing this work forward as Experimental. While it is not a
requirement, I think it is helpful to the community if Experimental documents
give some indication of the scope of the experiment. Where will these protocol
extensions be used? How will they be kept separate from the wider IPFIX
deployment? How will the success or failure of the experiment be judged? What is
the plan, assuming success? (The latter is usually: return to update this
document based on experience, and move it to the standards track.) Note that
some of the answers were presented in the proto writeup.
I see questions from IANA in the data tracker that appear to have been answered
by email during IETF last call. It would be good to get these answers transfered
into the document or added as an RFC Editor Note. Additionally, the registry
referenced is split into two ranges, but there is no advice to IANA about which
range should be used.
- Alexey Melnikov: Comment [2010-12-26]:
5.1. Stability
If no information about stability is available, users of anonymised
data MAY assume that the techniques used are stable across the entire
dataset, but unstable across datasets.
This doesn't look like an implementation choice, so I think MAY is wrong here.
6.1. Anonymisation Records and the Anonymisation Options Template
First, reliability is important: an
Exporting Process SHOULD export Anonymisation Records after the
Templates they describe have been exported, and SHOULD export
anonymisation records reliably.
What is the exact meaning of the last SHOULD?
TLS and DTLS need Informational References.
draft-ietf-v6ops-tunnel-security-concerns
- Jari Arkko: Comment [2011-01-05]:
Section 6.1.1 attack does not appear to be any worse than the assumptions
required for this attack to be possible. If you can spoof the victim's
DNS, you can hijack the victim's communications, tunnels or no tunnels.
In this light the recommendation to prefer IPv4 over tunneled IPv6
is odd. Also, its not clear that whoever is selecting which addresses
to use is aware of whether tunneling is being done or not (host vs.
router, for instance).
(This recommendation may be good for other reasons, of course.)
- Stewart Bryant: Comment [2011-01-05]:
There are a lot of tunnel mechanisms are being deployed simply so that end users
can work around the fact that they do not have enough IP addresses by creating a
private overlay network.
The document seems to miss the opportunity to say that by deploying IPv6 the
need for many of these tunnels can be removed.
- Adrian Farrel: Discuss [2011-01-05]:
I think this is a worthwhile and useful document
I *think* that the scope of this document is intended to be "security
considerations for the use of IP tunnels in IPv6 migration scenarios."
It looks like the document goes on mainly to consider the issues that
arise in such situations, although the title and abstract etc. are
not clear on this limitation, and some places in the text seem to
open the discussion up more general tunneling applications.
While v6ops is a good home for a document with limited scope, it
worries me that
the more general discussion is restricted to that
working group.
The shepherd write-up declares "The document has been
quite extensively
socialized", without explaining where this
socialization took place.
In short, scoped so widely (i.e., not limited to the applicability of
tunnels to v6 migration strategies) this document appears to be out of
scope for the v6ops working group.
There would appear to be two solutions:
1. Add a few small changes to make clear
that the scope is limited to
v6 migration (or maybe
to v6 use of tunnels)
2. Find the right review forums within the IETF to ensure
proper
breadth of review (opsec, WGs responsible for the main tunneling
protocols, ...)
Note that I do not consider that the IETF last call on a document with
a file name starting "draft-ietf-v6ops-..." guarantees broad enough
review.
---
I would like to see a little more clarity on the meaning of "IP
tunnels". I think you are trying to discuss situations where an IP
packet can contain, through some form of encapsulation, another IP
packet. It would be really nice to make this crystal clear.
- Adrian Farrel: Comment [2011-01-05]:
Section 2.1.1
This reduces defense in depth
and may cause security gaps.
I can't parse this :-( Do you mean...
This reduces the depth of security available, and may cause security
gaps.
---
Is it right that Section 2.3 is limited only to source routing? Isn't
it the case that tunneling can be used to inject any IP option into a
network and cause trouble?
- Russ Housley: Discuss [2011-01-05]:
The Gen-ART Review by Joel Halpern on 28-Dec-2010 raises a question
that has not been answered. I think that a response is needed.
Joel says:
> It is unclear in the document what assumptions section 3.1 makes
> about the relationship between supported tunnels and checked
> embedded addresses. Is there an assumption that the router only has
> to check for addresses in the format and prefix it supports?
- Tim Polk: Comment [2011-01-05]:
This is a useful document and I support its publication. I believe this could
be a better and more useful document
if the authors could address a few issues
before publication:
Issue #1
I think the intended scope of this document is not consistently stated
(explicitly and implicitly):
(1) the document title is "Tunneling Security
Concerns";
(2) the abstract states "The primary intent of this document is to
raise the awareness level ..."
(3) the introduction states "This document
discusses security concerns ... and includes recommendations
where relevant."
(4) the introduction also states "The primary intent is to help improve security
deployments ..."
Based on the title and the abstract, I was expecting a problem statement draft.
The first bit I quoted from the
intro implies that this is a problem statement
draft, and the recommendations are an afterthought. The last bit
says the
recommendations are the whole point of the document.
IMHO, the recommendations are the most important contribution made by this
document. I would like to see
edits in the abstract and intro to clearly state
that. It may be too late to address the title, but "Mitigating
Tunneling
Security Concerns" would also clearly demonstrate that scope.
Issue #2
The document presents a collection of network architecture and network
administration recommendations,
but readers might really benefit from some
summary recommendations. I was hoping for a section that
moved the document
from a laundry list to a methodology of sorts that worked through the
architectural
decisions first, then moved on to mitigating the specific
problems remaining after the architectural decisions
are made. For example, it
seems that architecting your network so that tunnels don't cross security
boundaries is a key first step. If you don't follow that recommendation,
everything else is harder, isn't it?
Issue #3
The introduction closes with "The intended audience ... includes network
administrators and future protocol
developers." I had a hard time
understanding what the lessons are for future protocol developers.
Perhaps a paragraph or two summarizing recommendations for protocol developers
would be useful here.
Issue #3
Section 5.1 is conspicuous in its structure: it includes a "5.1.1 Problem", but
omits the expected
"5.1.2 Discussion" and "5.1.3 Recommendations". Is it true
that there is nothing to say here?
draft-ietf-v6ops-tunnel-loops
- Jari Arkko: Discuss [2011-01-05]:
This is a good document and should be published.
However, I have one concern about the described neighbor cache check
solution. First off, the document is incorrect that hosts must
continuously send RSes to keep their address configuration up to date.
More importantly, the neighbor cache is just that, a cache. A better
solution would be to probe for a neighbor and only drop the packet if
there was no response. This is already described in the document.
My suggestion would be to delete the neighbor cache check solution
entirely from the document.
I think it would also be great if this document made a stronger statement
about the IMO most important use case for automatic tunnels: broadband
home networks. These are very simple networks with just one exit router
and it would be important to highlight the significance (or lack
thereof) of the attack in this case & point to the recommended solution.
- Jari Arkko: Comment [2011-01-05]:
- Stewart Bryant: Discuss [2011-01-05]:
"based on protocol-41 encapsulation" needs a reference
I have tried to read section 2 a number of times and I do not understand the
loop.
I do not understand what "The attacker exploits the fact that R2 does not know
that R1 does not take part of T2" means.
- Stewart Bryant: Comment [2011-01-05]:
- Adrian Farrel: Discuss [2011-01-06]:
Having had some time to go back and re-read this document I am now not
comfortable.
1. In Figure 1, why is R2 advertising reachability to an IPv6 at all? It has
only one point of attachment to the v6
network. I think you are trying to say
that there is a virtual link (v6 capable) running over the v4 network. Isn't
that link simply part of the v6 network?
2. Why is R2 advertising reachability to an address that is not reachable
through it? You say:
"...destined to a fictitious end point that appears
to be reached via T2..."
- Russ Housley: Discuss [2011-01-05]:
The Gen-ART Review by Joel Halpern on 28-Dec-2010 raises a question
that has not been answered. I think that a response is needed.
Joel says:
> It is unclear in the document what assumptions section 3.1 makes
> about the relationship between supported tunnels and checked
> embedded addresses. Is there an assumption that the router only has
> to check for addresses in the format and prefix it supports?
The Gen-ART Review by Joel Halpern on 28-Dec-2010 raises a question
that has not been answered. I think that a response is needed.
- Tim Polk: Comment [2011-01-05]:
Please clarify that the document's scope does not address the Teredo attacks
specified in the USENIX paper.
- Peter Saint-Andre: Comment [2011-01-05]:
Given that the document describes an attack that can result in denial of
service, a reference to RFC 4732 would be appropriate.
draft-ietf-l2vpn-vpls-bridge-interop
- Adrian Farrel: Comment [2010-03-09]:
The new revision addresses a number of the points I raised in my review of
11-Apr-2009. I will clear my Discuss and record the three unaddressed points
here.
Section 2
Maybe this could use a figure. There is a lot of information conveyed
and perhaps a figure of a VPLS showing the network and instance would
help.
---
Figure 2+
I can sort of look at figures 1 and 2 and see a more complete picture
of the PE model with PWs on one side and CEs on another. I think that
in figure 2 it would help to label the ACs (C-VLANs), but it would also
be helpful to show CE attachment when the ACs are not VLANs.
Is there some way to give this more comprehensive picture?
---
Section 9
To me, this section feels very light. I am not a security expert,
but the fact that you are extending an architectural model should
give rise to new security issues for consideration.
- Sam Hartman: Discuss [2007-12-19]:
Security directorate comments by Phillip Hallam-baker have not been
addressed. These comments were not submitted as public last call
comments. However they raise serious readability and interpretability
questions of the document. I do know that some of Phil's comments are
wrong because I've read some of the VPLS base specs. So, I tried to
make an independent review of the document in order to determine if
there was anything blocking. However I failed to be able to
comprehend the document well enough to follow it. I gave up in the
middle of section 3 with very little understanding of where the
document was going and low confidence that the description of VPLS in
this document matched my understanding from the base VPLS specs.
To make this discuss actionable, I recommend that the authors work
with reviewers outside their working group and improve the document to
a point where someone who has not worked extensively in the L2VPN
working group but who has read the VPLS documents can easily follow
the document and can accurately describe what is going on.
- Russ Housley: Comment [2010-03-10]:
- David Ward: Discuss [2007-12-20]:
Unfort, I find the doc very, very terse and almost unable to understand the
points that are being made and the suggested recommendations. In addition I find
it odd that there are cases where interop needs to be "worked out." It suggests
that an interop procedure or recommendation is incomplete and thus, the doc is
premature.
draft-loreto-http-bidirectional
- Sean Turner: Comment [2011-01-05]:
Sec 8: r/attacks.[RFC4732]./attacks [RFC4732].
draft-turner-md5-seccon-update
- Russ Housley: Comment [2011-01-05]:
I think this documnet would be more useful to people trying to choose
an algorithm if Section 2 were structured to present the conclusions
at the beginning, and then provide the details in the susbsections. I
suggest:
MD5 was published in 1992 as an Informational RFC. Since that time,
MD5 has been extensively studied and new cryptographic attacks have
been discovered. Message digest algorithms are designed to provide
collision, pre-image, and second pre-image resistance. In addition,
message digest algorithms are used with a shared secret value for
message authentication in HMAC, and in this context, some people may
find the guidance for key lengths and algorithm strengths in
[SP800-57] and [SP800-131] useful.
MD5 is no longer acceptable where collision resistance is required
such as digital signatures. It is not urgent to stop using MD5 in
other ways, such as HMAC-MD5; however, since MD5 must not be used for
digital signatures, new protocol designs should not employ HMAC-MD5.
Alternatives to HMAC-MD5 include HMAC-SHA256 [HMAC][HMAC-SHA256] and
[AES-CMAC] when AES is more readily available than a hash function.
draft-turner-md2-to-historic
- Adrian Farrel: Comment [2011-01-04]:
Comment transferred from my previous process Discuss.
I fully support knocking MD2 on the head. However, I am a little
inexperienced with the process of making an I-D Historic.
What happens to an standards track documents with references
(especially normative references) to 1319 as listed in Section 3?
Should they at least also be marked as "updated by" this draft?
Similarly, 1319 updates 1115. What happens to 1115 and its text
on MD2?
- Alexey Melnikov: Comment [2010-12-19]:
Updates: 1319 (once approved)
- why not Obsolete: 1319 ? This document is moving RFC 1319 to Historic.
3. Documents that Reference RFC 1319
MD2 has been specified in the following RFCs:
*Use* of MD2 has been specified ...
draft-turner-md4-to-historic
- Adrian Farrel: Comment [2011-01-05]:
As with the MD2 document, I think it is worth listing the standards
track documents shown in Section 3 as Updated in the document header.
It looks to me that you might also want to update some of the
informational documents listed here.
The prime benefit is that those documents will be marked in the RFC
repository as having been updated by this document.
---
Abstract, etc.
Once published, this document should be more assertive. Thus:
OLD
This document recommends RFC 1320 be moved to Historic status.
NEW
This document moves RFC 1320 to Historic status.
END
etc.
---
4. Impact on Moving MD4 to Historic
s/on/of/
---
Section 4
o MD4 was used in the Inter-Domain Routing Protocol (IDRP); each IDRP
message carries a 16-octet hash that is computed by applying the
MD-4 algorithm (RFC 1320) to the context of the message itself.
Over time IDRP was replaced by BGP-4.
Need to add a refernce to 4271, and an indication that BGP-4 requires at
least MD-5. You could reference 2385, but that might be de trop.
---
Section 4
o The three Microsoft RFCs, [RFC2433], [RFC2759], and [RFC4757], are
Do we need to describe these as "Microsoft RFCs"?
How about: "The three RFCs describing Microsoft protocols"?
- Alexey Melnikov: Comment [2010-12-19]:
The document header has:
Updates: 1320 (once approved)
Why not "Obsoletes: 1320" ?
draft-irtf-mobopts-mpa-framework
- Ralph Droms: Comment [2011-01-06]:
I strongly suggest that the following comments are addressed
before publication:
In section 7.3.1, a DHCP relay agent does not have the capability to
operate independently and perform a DHCP message exchange with a DHCP
server in anticipation of an eventual DHCP message exchange initiated
by a client. The mecahnism described in this section would require
the definition of a new DHCP proxy function.
In the case of IPv6, it's probably required to forward the RA to the
mobile node regardless of the address assignment model, to
pre-configure the mobile node with all the requisite information about
prefixes, etc.
In section 7.3.3, there is a conflict with the DHCPv6 specification,
which requires that a DHCPv6 client send any messages to the DHCPv6
servers/relays multicast address, rather than unicast to a server.
There may also be a problem with all of these methods using DHCP: how
does the CTN DHCP server know what address to assign to the client?
Other comments:
Perhaps a nit, but I was somewhat mislead by the title, " A Framework
of Media-Independent Pre-Authentication (MPA) for Inter-domain
Handover Optimization" to believe that I was going to read about a
protocol that focused on authentication and secure communication. In
my opinion, this document describes a complete framework for
media-independent inter-domain handover optimization that goes beyond
authentication and security.
In Appendix A, wouldn't DAD be performed by the NAR rather than the
PAR?
From the Intro:
In this document
we discuss a framework to support terminal mobility that provides
seamless handovers with low latency and low loss.
Are there other components to terminal mobility aside from MPA?
Section 1.2:
A trade-off between one-way-delay and
packet loss is desired based on the type of application.
Unclear to me - a trade-off should be available through tuning or
one-way-delay should be improved relative to packet loss?
Section 3: Define "inter-subnet handover"?
Section 6.1:
MPA provides three basic procedures to provide this functionality.
The first procedure is referred to as "pre-authentication", the
second procedure is referred to as "pre-configuration", the
combination of the third and fourth procedures are referred to as
"secure proactive handover".
"three basic procedures" and "third and fourth procedures" is
confusing; where did that fourth procedure come from?
Section 6.1:
Especially, the third procedure described above (i.e., binding update
procedure)
Change "third procedure described above" to "step (iii) in the
previous paragraph" to avoid confusion with the use of "procedures in
the earlier paragraph in section 6.1.
Section 6.2:
The authentication
protocol MUST be able to derive a key between the mobile node and the
authentication agent and SHOULD be able to provide mutual
authentication.
Is "derive a key between ..." a term of art or can the requirement be
described more accurately as "establish a shared key between..."?
The authentication protocol SHOULD be able to
interact with a AAA protocol such as RADIUS and Diameter to carry
authentication credentials to an appropriate authentication server in
the AAA infrastructure.
Does the authentication protocol interact directly with the AAA
protocol, or does the interaction happen through the AA?
draft-templin-iron
- Jari Arkko: Comment [2010-12-16]:
- Stewart Bryant: Comment [2010-12-15]:
I am surprise that the document contains no reference to LISP which is
operating broadly in this space.
=======
SRA is not a defined abbreviation.
=======
This needs a few words of clarification - presumably the "locator addresses" are
the addresses learned from the relay.
After the Client receives an SRA message from the nearby Relay
listing the locator addresses of nearby Servers, it sends SRS test
messages to one or more of the locator addresses to elicit SRA
messages.
=======
If this Server fails, the Client will quickly select a new
one which will automatically update the VPC overlay network mapping
system with a new EP-to-Server mapping.
"quickly" is a non-specific metric
=======
[I-D.templin-intarea-seal] looks like it should be normative
[I-D.templin-intarea-vet] looks like it should be normative
Although the RFCeditor may wish to overlook this if there is a concern that
these drafts will not be taken to completion.
- Ralph Droms: Comment [2010-12-16]:
I have one suggestion about the content of the document. I'd like to
see an analysis of how IRON actually "provide[s] scalable PI
addressing without changing the current BGP [RFC4271] routing system"
along with costs incurred by IRON. How does hiding the EPA addresses
inside the IRON locator prefixes reduce the routes in the real
Internet core? What is the cost in the routing tables maintained by
the relays? How expensive is the anycast routing? How does inter-VPC
routing work and how expensive is it?
The remainder of my COMMENTs are editorial.
In Section 6.1, I think I understand what this text is trying to
explain, but I don't think it's correct:
It
is therefore essential that the Client send the initial packets
through its Server to avoid loss of SCMP messages that cannot
traverse a NAT in the reverse direction.
Does this mean to explain that the Client sends packets through its
Server to establish NAT state so SCMP messages from the Server to the
Client can traverse the NAT?
In Section 6.2, this text uses "into the Internet" in a confusing way,
assuming I'm understanding the meaning of the text correctly:
The Server then
forwards the revised packet into the Internet via a default or more-
specific route, where it will be directed to the closest Relay within
the destination VPC overlay network.
Everywhere else in this section "into the Internet" is used to
describe the forwarding of a decapsulated datagram, after the outer
header with locator addresses have been removed, into the (non-IRON)
Internet. In the text quoted aboce, "into the Internet" seems to mean
forwarding of an encapsulated datagram, which is described elsewhere
in this section as simply "forwards" or "sends". I suggest rewriting,
for consistency, as
The Server then
forwards to the closest Relay within
the destination VPC overlay network.
In Figure 6, why would the anycast datagram from Server(A) be
delivered to Relay(B) rather than Relay(A) (which presumably would be
in the routing fabric for ISP A)? Does it matter?
Once Server(B) receives the datagram to be forwarded to Client(B), is
it possible for Server(B) to send a redirect to Client(A) so Client(A)
can send traffic directly to Client(B)?
Stylistic nit in section 6.4.1 (and elsewhere) - why start using the
verb "releases" instead of the previously used "forwards" or "sends"?
Seems like lots of unnecessary verbiage right after Figure 6; why not
something like "..., host A sends packets to host B through its EUN.
Client(A), as the defautl router for the EUN, receives the packets,
encapsulates them in the IRON encapsulation and forwards them to
Server(A). ..." (etc.) All the explanation of routing, etc., seems
redundant at this point.
Sorry, can't help myself; in section 6.6:
The IRON approach to
renumbering avoidance therefore depends on VPCs conducting ethical
business practices and offering reasonable rates.
... as opposed to the unethical business practices and unreasonably
high rates from those evil, greedy ISPs.
Seriously, has the renumbering problem simply been moved from the ISPs
to the VPCs?
- Adrian Farrel: Comment [2010-12-16]:
Thank you for bringing this work forward as Experimental and so increasing the
documentation and discussion of potential solutions.
I feel that it would be helpful if the document contained a pointer to draft-
irtf-rrg-recommendation so that the other ideas in the field can be easily found
and compared.