Re: Gen-ART review of draft-ietf-tcpm-tcp-soft-errors-08.txt

2008-11-12 Thread Fernando Gont
expansion of TCPM WG (TCP Maintenance Working Group). Fixed! Please let me know if the above address your comments Thanks so much! Kind regards, -- Fernando Gont e-mail: [EMAIL PROTECTED] || [EMAIL PROTECTED] PGP Fingerprint: 7809 84F5 322E 45C7 F1C9

Re: [73attendees] Is USA qualifiedfor2.3ofdraft-palet-ietf-meeting-venue-selection-criteria?

2008-11-19 Thread Fernando Gont
At 07:04 p.m. 18/11/2008, Nicholas Weaver wrote: I would bet (but have no evidence) that the visa problem is almost specifically a chinese issue. It is NOT a chinese issue. I have got my USA visa, but it IS an issue to get it. Fernando Gont (from Argentina) -- Fernando Gont e-mail: [EMAIL

Re: Gen-ART review of draft-ietf-tcpm-tcp-soft-errors-08.txt

2008-12-03 Thread Fernando Gont
ts without having to add text back to the I-D. Kind regards, -- Fernando Gont e-mail: [EMAIL PROTECTED] || [EMAIL PROTECTED] PGP Fingerprint: 7809 84F5 322E 45C7 F1C9 3945 96EE A9EF D076 FFF1 ___ Ietf mailing list Ietf@ietf.org https://www.ietf.org/mailman/listinfo/ietf

RE: Gen-ART review of draft-ietf-tcpm-tcp-soft-errors-08.txt

2008-12-03 Thread Fernando Gont
o ICMP soft errors. > > I have not incorporated this change. But please let me know if you > feel strongly about it. I think the old wording seriously overstates the scope of the draft, but this is an editorial problem, not a technical one. I would still prefer to see this changed.

Re: Newcomers [Was: Evolutionizing the IETF]

2012-11-27 Thread Fernando Gont
ns to mailing-lists *and* whether they actually get to post to the mailing-lists? Or do you count as "participants" those that write documents and/or send feedback about documents? etc.. Thanks, -- Fernando Gont e-mail: ferna...@gont.com.ar || fg...@si6networks.com PGP Fingerprint: 7809 84F5 322E 45C7 F1C9 3945 96EE A9EF D076 FFF1

Re: Barely literate minutes

2012-11-30 Thread Fernando Gont
, I couldn't fully understand what the guy at the mike was saying, either because of low-volume, background noise, or a strong accent I wasn't used to. Cheers, -- Fernando Gont e-mail: ferna...@gont.com.ar || fg...@si6networks.com PGP Fingerprint: 7809 84F5 322E 45C7 F1C9 3945 96EE A9EF D076 FFF1

Re: Last Call: (Formally Deprecating Some ICMPv4 Message Types) to Proposed Standard

2013-01-18 Thread Fernando Gont
sentence of the abstract be changed to "This > document deprecates such ICMPv4 message types and annotates the > corresponding IANA registry entries." and that corresponding changes > be made elsewhere in the draft where "clean up" is used. I have no problem with a

Re: TSV-DIR review of draft-ietf-6man-ipv6-atomic-fragments-03

2013-01-23 Thread Fernando Gont
mic fragments) that we're improving. I'm not sure what kind of document you have in mind... but my personal experience says that being able to tackle isolated problems separately (rather than work on a large document that tries to address a plethora of issues) is (by far) more doable. Thanks! Best regards, -- Fernando Gont SI6 Networks e-mail: fg...@si6networks.com PGP Fingerprint: 31C6 D484 63B2 8FB1 E3C4 AE25 0D55 1D4E 7492

Re: TSV-DIR review of draft-ietf-6man-ipv6-atomic-fragments-03

2013-01-24 Thread Fernando Gont
us TCPM concerns about these techniques. We can remove "and [RFC5927]" or change it to "...Section 5.2 of [RFC4443] and documented in [RFC5927]" Thoughts? Thanks, -- Fernando Gont SI6 Networks e-mail: fg...@si6networks.com PGP Fingerprint: 31C6 D484 63B2 8FB1 E3C4 AE25 0D55 1D4E 7492

Re: On the tradition of I-D "Acknowledgements" sections

2013-03-24 Thread Fernando Gont
aft diff too at tools.ietf.org. When needed/appropriate, I've posted a summary of major changes to the relevant mailing-list. Thanks, -- Fernando Gont SI6 Networks e-mail: fg...@si6networks.com PGP Fingerprint: 31C6 D484 63B2 8FB1 E3C4 AE25 0D55 1D4E 7492

Re: Last Call: (Security Implications of IPv6 on IPv4 Networks) to Informational RFC

2013-04-01 Thread Fernando Gont
ated > from the network. Could you please elaborate? > The title of the draft is "Security Implications of IPv6 on IPv4 > Networks". The Abstract mentions "IPv4-only" networks. The > Introduction Section mentions "networks that are assumed to be > IPv4-only". Please see the quotes when we say "'IPv4-only' networks" -- in practice, there's no such a thing, and you should think v6 security even if you think/want to run an IPv4-only network. > I don't understand what this draft is about. This one I cannot do much about. :-) -- Fernando Gont SI6 Networks e-mail: fg...@si6networks.com PGP Fingerprint: 31C6 D484 63B2 8FB1 E3C4 AE25 0D55 1D4E 7492

Re: [OPSEC] Last Call: (Security Implications of IPv6 on IPv4 Networks) to Informational RFC

2013-04-01 Thread Fernando Gont
nt is saying. > We shouldn't imply that not having an IPv6 plan and blocking all IPv6 > by default is a sound strategy. It's not, and I don't think we're implying that. However, I'd note that some people are in the position of blocking traffic, or not doing anything

Re: Last Call: (Security Implications of IPv6 on IPv4 Networks) to Informational RFC

2013-04-01 Thread Fernando Gont
tions. Welcome to the real world: That cat has been out of the box for years (no matter whether you consider that a problem, or a feature). FWIW, my TP-LINK router does that, even if I don't want it to. Thanks, -- Fernando Gont SI6 Networks e-mail: fg...@si6networks.com PGP Fingerprint: 31C6 D484 63B2 8FB1 E3C4 AE25 0D55 1D4E 7492

Re: Last Call: (Security Implications of IPv6 on IPv4 Networks) to Informational RFC

2013-04-02 Thread Fernando Gont
to allow such connectivity reduces the potential problem (at the end of the day, this is kind of the whitelisting approach that has been applied to the general case by content providers -- with the caveat that in this case you positively know that such connectivity is not present). Thanks,

Re: Last Call: (Security Implications of IPv6 on IPv4 Networks) to Informational RFC

2013-04-03 Thread Fernando Gont
On 04/02/2013 10:25 PM, Ted Lemon wrote: > On Apr 2, 2013, at 7:30 PM, Fernando Gont wrote: >>> I agree with the last sentence. Happy Eyeballs is about the HTTP. >>> There are other applications protocols too. :-) >> >> Happy eyeballs is about HTTP. But par

Re: [OPSEC] Last Call: (Security Implications of IPv6 on IPv4 Networks) to Informational RFC

2013-04-09 Thread Fernando Gont
that sentence. Would that be okay with you? -- If not, please do let me know, so that we can try to find a way forward that keeps everyone happy. Thanks so much! Best regards, -- Fernando Gont SI6 Networks e-mail: fg...@si6networks.com PGP Fingerprint: 31C6 D484 63B2 8FB1 E3C4 AE25 0D55 1D4E 7492

Re: [OPSEC] Last Call: (Security Implications of IPv6 on IPv4 Networks) to Informational RFC

2013-04-12 Thread Fernando Gont
address it, please resend/ping me (most likely I tried but failed, the feedback slipped by, or whatever... ) Thanks! Best regards, -- Fernando Gont SI6 Networks e-mail: fg...@si6networks.com PGP Fingerprint: 31C6 D484 63B2 8FB1 E3C4 AE25 0D55 1D4E 7492

Re: last call comments for draft-ietf-6man-stable-privacy-addresses-06

2013-04-22 Thread Fernando Gont
oduces a bit string larger than 64 bits, and you say nothing about how you grab the IID, then the algorithm is underspecified. The easier it is for a developer to go through this document and come up with an implementation, the better. The more the open questions, the worse. Thanks, -- Fernando Gont SI6 Networks e-mail: fg...@si6networks.com PGP Fingerprint: 31C6 D484 63B2 8FB1 E3C4 AE25 0D55 1D4E 7492

Re: last call comments for draft-ietf-6man-stable-privacy-addresses-06

2013-04-22 Thread Fernando Gont
A compromise might be to add a *parenthetical* note such as: "The current IPv6 Addressing architecture defines Interface-Identifiers to be 64 bits long, hence the low-order 64-bits of F() are employed for the Interface-ID. Were the IPv6 Addressing Architecture updated to allow any arbitrary le

Re: last call comments for draft-ietf-6man-stable-privacy-addresses-06

2013-04-22 Thread Fernando Gont
orithm for generating Interface Identifiers." > > If the implementation does not provide the means for the administrator > to enable or disable the use of the algorithm, does it conform to this > specification? It'd be "conditionally-compliant", but not fully-compli

Re: last call comments for draft-ietf-6man-stable-privacy-addresses-06

2013-04-23 Thread Fernando Gont
On 04/22/2013 03:39 PM, SM wrote: > At 12:40 22-04-2013, Fernando Gont wrote: >> PLease see the Appendix. > > I read that. I was confused by the short title (Stable Privacy > Addresses) at first. I didn't see much discussion in the draft about > privacy considerations.

Re: last call comments for draft-ietf-6man-stable-privacy-addresses-06

2013-04-23 Thread Fernando Gont
faces, or enabling multi-homed hosts. FWIW, constant addreses when swapping interfaces is not really a goal f tis dcument, but rather a byproduct of it. > And I would > observe that the DAD problem cannot be solved ina reliable way. Could you please elaborate? Thanks! Best regards, -- Fernan

Re: last call comments for draft-ietf-6man-stable-privacy-addresses-06

2013-04-23 Thread Fernando Gont
rally been very influenced by the input of a number of participants... anyone who has ever sent me feedback on a document I've authored/co-authored knows I do my best to address all feedback, no matter whether that implies re-writing large portions of the document in question.) Make the spec as cl

Re: last call comments for draft-ietf-6man-stable-privacy-addresses-06

2013-04-23 Thread Fernando Gont
or how you store addresses in memory if you do store them). I see the algorithm in this document as giving more room for tradeoffs to developers than RFC4941, and the same room for tradeoffs as e.g. RFC6528. Based on the above, me, I don't find the idea of re-writing the I-D compelling -- particu

Re: Gen-ART LC Review of draft-ietf-6man-stable-privacy-addresses-06

2013-04-25 Thread Fernando Gont
ces: RFC1948 is obsoleted by 6528. Is there a reason to > reference the obsolete version? Yes: RFC1948 is only referenced in the Acks section, where I note that this document was inspired by Bellovin's work on RFC1948. While RFC6528 obsoletes RFC1948, the algorithm in that RFC is the same as that in RFC1948. Thanks! Best regards, -- Fernando Gont SI6 Networks e-mail: fg...@si6networks.com PGP Fingerprint: 31C6 D484 63B2 8FB1 E3C4 AE25 0D55 1D4E 7492

Re: Gen-ART LC Review of draft-ietf-6man-stable-privacy-addresses-06

2013-04-25 Thread Fernando Gont
Acks section, where I note >> that this document was inspired by Bellovin's work on RFC1948. >> While RFC6528 obsoletes RFC1948, the algorithm in that RFC is the >> same as that in RFC1948. > > So 6528 equally illustrates Steve Bellovin's work, and is also more > current, right? Yes. But I'm a co-author of RFC 6528 -- so it'd be a bit arrogant (and incorrect) to say that I was inspired by RFC 6528 :-) -- I was inspired by Bellovin, rather than myself. :-) Thanks! Best regards, -- Fernando Gont SI6 Networks e-mail: fg...@si6networks.com PGP Fingerprint: 31C6 D484 63B2 8FB1 E3C4 AE25 0D55 1D4E 7492

Re: last call comments for draft-ietf-6man-stable-privacy-addresses-06

2013-04-26 Thread Fernando Gont
addresses. You you do not include some sort of "Interface ID", then, when two interfaces are employed to connect to the same network, you are guaranteed to get a collision... -- Fernando Gont SI6 Networks e-mail: fg...@si6networks.com PGP Fingerprint: 31C6 D484 63B2 8FB1 E3C4 AE25 0D55 1D4E 7492

Re: Last Call: (A method for Generating Stable Privacy-Enhanced Addresses with IPv6 Stateless Address Autoconfiguration (SLAAC)) to Proposed Standard

2013-04-26 Thread Fernando Gont
using > "some of the privacy concerns" in place of "most of the privacy > concerns" in the two sections above. Is there any other one left to be mitigated other than the one I mentioned above? > > Nit: > > This link in the [Broersma] reference is broken:

Re: last call comments for draft-ietf-6man-stable-privacy-addresses-06

2013-04-26 Thread Fernando Gont
ss such as rtadvd and others...) Thanks, -- Fernando Gont SI6 Networks e-mail: fg...@si6networks.com PGP Fingerprint: 31C6 D484 63B2 8FB1 E3C4 AE25 0D55 1D4E 7492

Re: financial fun with an IETF Meeting in South America

2013-05-28 Thread Fernando Gont
On 05/27/2013 07:31 AM, Juliao Braga wrote: > According to the news published for a long time in Brazilian newspapers > and magazines, Buenos Aires (a wonderful place!) would not be > recommended. Recommended for what? And on what basis? Cheers, -- Fernando Gont e-mail: ferna...@go

Re: financial fun with an IETF Meeting in South America

2013-05-28 Thread Fernando Gont
eople this way. Particularly without any concrete data. Note: I'm not not even touching the issue of whether having a meeting in Buenos Aires is a great idea or not.. but just trying to keep the discussion objective. Un abrazo, -- Fernando Gont e-mail: ferna...@gont.com.ar || fg...@si6networks.com PGP Fingerprint: 7809 84F5 322E 45C7 F1C9 3945 96EE A9EF D076 FFF1

Re: financial fun with an IETF Meeting in South America

2013-05-28 Thread Fernando Gont
inal currency. But I could double-check if interested. That said, man shops accept dollars and euros (not pounds, though :-( ). So I guess that for the most part you could just have some small amount of money in pesos (mostly to pay cabs, I'd say), and move around the city using your credit c

Re: financial fun with an IETF Meeting in South America

2013-05-28 Thread Fernando Gont
tary to comment: > > "...But who should tell us about the true cenary would be our > Argentine friends." > > Regards, > > Julião > Em 28/05/2013 10:36, Fernando Gont escreveu: >> On 05/27/2013 07:31 AM, Juliao Braga wrote: >>> According to the ne

Re: financial fun with an IETF Meeting in South America

2013-05-28 Thread Fernando Gont
sed on what has been "heard", "rumors", or what some idiot posted on a blog pollutes and biases the discussion unfairly and inappropriately. Cheers, -- Fernando Gont SI6 Networks e-mail: fg...@si6networks.com PGP Fingerprint: 31C6 D484 63B2 8FB1 E3C4 AE25 0D55 1D4E 7492

Re: Time in the Air

2013-05-31 Thread Fernando Gont
g > overhead, indirect routing, etc. As such, this is an ideal number; > the only way to achieve anything close to it is to have a private jet > (with exceptional range). Could you please elaborate a bit more on the meaning of the second column? Thanks! -- Fernando Gont SI6 Networks e-

Re: Issues in wider geographic participation

2013-05-31 Thread Fernando Gont
han anyone else. And they generally also keep the spirit of "open" more than anyone else. Thanks, -- Fernando Gont SI6 Networks e-mail: fg...@si6networks.com PGP Fingerprint: 31C6 D484 63B2 8FB1 E3C4 AE25 0D55 1D4E 7492

ipv6hackers meeting in Berlin (July 28th, 2013)

2013-06-13 Thread Fernando Gont
ould attend, whether they would have stuff to present, etc. So I've set up a very short on-line survey to help us plan for the meeting. If you're interested, please take 5 minutes to complete the survey at: <https://www.surveymonkey.com/s/FFL386K> Thanks! Best regards, - -- Fernando

Re: Last Call: draft-ietf-tsvwg-port-randomization (Part #1)

2010-03-02 Thread Fernando Gont
e dynamic selection of server ports and is > | unrelated to ephemeral port selection, although this interpretation > | has been promoted in the past. Your suggested change makes sense to me. But as with the previous one, I'd like to hear what Lars thinks about this one. > (5) General > > A few editorial nits will be reported to the authors off-list ASAP. Looking forward to them! Thanks! Kind regards, -- Fernando Gont e-mail: ferna...@gont.com.ar || fg...@acm.org PGP Fingerprint: 7809 84F5 322E 45C7 F1C9 3945 96EE A9EF D076 FFF1 ___ Ietf mailing list Ietf@ietf.org https://www.ietf.org/mailman/listinfo/ietf

Re: Last Call: draft-ietf-tcpm-icmp-attacks (ICMP attacks against TCP) to Informational RFC

2010-04-15 Thread Fernando Gont
n and Alfred Hoenes) who provided very thorough reviews that had a very positive impact on the resulting documents. Thanks again, -- Fernando Gont e-mail: ferna...@gont.com.ar || fg...@acm.org PGP Fingerprint: 7809 84F5 322E 45C7 F1C9 3945 96EE A9

Re: IETF Attendance by continent

2010-08-12 Thread Fernando Gont
t funding for attending meetings. Just my two cents Thanks! Kind regards, -- Fernando Gont e-mail: ferna...@gont.com.ar || fg...@acm.org PGP Fingerprint: 7809 84F5 322E 45C7 F1C9 3945 96EE A9EF D076 FFF1 ___ Ietf mailing list Ietf@ietf.

Re: Varying meeting venue -- why?

2010-08-12 Thread Fernando Gont
ance (e.g., you need to schedule an appointment, whereas for the canadian visa you need not). Thanks, -- Fernando Gont e-mail: ferna...@gont.com.ar || fg...@acm.org PGP Fingerprint: 7809 84F5 322E 45C7 F1C9 3945 96EE A9EF D076 FFF1 ___ Ietf mailing list Ietf@ietf.org https://www.ietf.org/mailman/listinfo/ietf

Re: TCP persist timer min and max values (specified in RFC?)

2010-08-13 Thread Fernando Gont
d TTL (60). However, most implementations use different values for the TTL (either 255 or a power of of 2, such as 64 or 128). This, together with the fact that the TTL is assumed to be a hop limit (rather than a time count) might leave some room for using a different upper limit for the RTO (and

Re: Tourist or business visa from US?

2010-08-27 Thread Fernando Gont
of my bank account, etc. Regarding the LOI itself, they usually accept LOIs in electronic form... so I guess this is probably the case for the Chinese visa, too. Thanks, -- Fernando Gont e-mail: ferna...@gont.com.ar || fg...@acm.org PGP Fingerprint: 7809 84F5 322E 45C7 F1C9 3945 9

Re: Tourist or business visa from US?

2010-08-27 Thread Fernando Gont
because they used false information to get their visas (said they had never live in the US illegally, when they actually had). Thanks, -- Fernando Gont e-mail: ferna...@gont.com.ar || fg...@acm.org PGP Fingerprint: 7809 84F5 322E 45C7 F1C9 3945 96EE A9EF D076 FFF1

Re: Is this true?

2010-08-28 Thread Fernando Gont
entally different from IPv4 as it is deployed to day. As ironic as it may sound, some people are actually *concerned* about this. (no, not *me*) > IPv6 also make IPsec mandatory, which seems a significant change over > IPv4, too. As noted by Fred, this is mostly "words on pap

Re: Is this true?

2010-08-29 Thread Fernando Gont
ed' when in > fact they are merely repeating an ideological view of security that > has negligible support outside the IETF. That is a really bad way to > approach security. > > There is more to security than throwing cryptography at packets. Agreed. The work that we have done

Re: [78attendees] WARNING !!! Re: Maastricht to Brussels-Nat-Aero, Sat 07:09

2010-08-29 Thread Fernando Gont
uch they should charge you for e.g. a taxi from the airport to the center of the city is usually valuable information, too. It wouldn't be surprised if the taxi driver tried to charge you more than he should if he realized you have no idea of how much things cost there (this could easil

Re: Is this true?

2010-08-31 Thread Fernando Gont
Phillip Hallam-Baker wrote: > At the time email was a special case because it was the *only* application. As far as I recall *reading* (I wasn't around at the time :-) ) email was a couple of FTP commands? -- I seem to recall John Day writing about this in his book.. Thanks, -- Fernand

Re: IETF Attendance by continent

2010-09-02 Thread Fernando Gont
is Summer time. ;-) Thanks, -- Fernando Gont e-mail: ferna...@gont.com.ar || fg...@acm.org PGP Fingerprint: 7809 84F5 322E 45C7 F1C9 3945 96EE A9EF D076 FFF1 ___ Ietf mailing list Ietf@ietf.org https://www.ietf.org/mailman/listinfo/ietf

Re: Optimizing for what? Was Re: IETF Attendance by continent

2010-09-06 Thread Fernando Gont
That's my experience with getting Canadian visas (I have got four or five), from Buenos Aires (Argentina), being an Argentinian citizen. Europe is much better in this respect. For instance, they don't require visas for many latin-american countries (including Argentina). Thanks, -- Fern

Re: Last Call: (On the implementation of the TCP urgent mechanism) to Proposed Standard

2010-09-07 Thread Fernando Gont
> 5. Add a informative section discussing the pros/cons of IP-level > intermediaries altering the URG bit. > 6. Add a normative section which states that IP-level intermediaries > SHOULD NOT alter the URG bit. I don't think that tcpm is going to get consensus on "pros" of

Re: Last Call: (On the implementation of the TCP urgent mechanism) to Proposed Standard

2010-09-07 Thread Fernando Gont
for that reason) Applications that are processing "urgent data" as "out of band" data area already violating the specs -- hence the "MUST". >>> 5. Add a informative section discussing the pros/cons of IP-level >>> intermediaries altering the

Re: Last Call: (On the implementation of the TCP urgent mechanism) to Proposed Standard

2010-09-08 Thread Fernando Gont
gent data" (as a result of ambiguities in RFC 793), and this never changed. -- one might even argue that since there's no way of notifying the other end how you're interpreting the UP, trying to change this would actually break the current working code. Thanks! Kind regards, -- Fe

Re: NAT behavior for IP ID field

2010-09-10 Thread Fernando Gont
irstly, the host might not implement PMTUD, and hence setting the DF bit on its behalf could possibly cause interoperability problems. Secondly, some hosts clear the DF bit if the advertised MTU in an ICMP "frag needed" is below some specified threshols. This RFC2402-behavior could cause proble

Re: US DoD and IPv6

2010-10-06 Thread Fernando Gont
include point of attachment addresses in the app protocol break in the presence of NATs, one should probably ask whether the NAT is breaking the app, or whether the NAT is making it clear that the app was actually already broken. Thanks, -- Fernando Gont e-mail: ferna...@gont.com

Re: US DoD and IPv6

2010-10-06 Thread Fernando Gont
particular processes at particular hosts.  Some might see this as a > deficiency in the Internet > Architecture, but that's the best that we have to work with for now. If anything, the fact that "this is is the only way that the Internet Architecture defines..." doesn't ma

Re: US DoD and IPv6

2010-10-06 Thread Fernando Gont
NATs for broken application designs, and that you should not assess reasonable-ness based on existing (and questionable) application designs. Thanks, -- Fernando Gont e-mail: ferna...@gont.com.ar || fg...@acm.org PGP Fingerprint: 7809 84F5 322E 45C7 F1C9 3945 96EE A9EF D076 FFF1 ___ Ietf mailing list Ietf@ietf.org https://www.ietf.org/mailman/listinfo/ietf

Re: Fwd: [Full-disclosure] IPv6 security myths

2010-10-26 Thread Fernando Gont
Sorry, I couldn't parse this paragraph. Could you clarify this one? Thanks! Kind regards, -- Fernando Gont e-mail: ferna...@gont.com.ar || fg...@acm.org PGP Fingerprint: 7809 84F5 322E 45C7 F1C9 3945 96EE A9EF D076 FFF1 ___ Ietf mailing list

Re: [Full-disclosure] IPv6 security myths

2010-10-26 Thread Fernando Gont
after the fact... Sorry, but I don't follow. If the problem with widespread deployment of IPsec was NAT traversal, why didn't we see widespread IPsec deployment (for the general case) e.g. once RFC 3948 was published? And: Do you expect IPsec deplyment to increase dramatically as IPv6 g

Re: [Full-disclosure] IPv6 security myths

2010-10-26 Thread Fernando Gont
umes "improved security" > In the scope of things, wh does having one of out of the many needed > tools make IPv6 different than IPv4, especially given that the > indicated tool is present in both IPv4 and IPv6 implementations? > > Scratch-a-my-head. I don't see

Re: [Full-disclosure] IPv6 security myths

2010-10-26 Thread Fernando Gont
ings get uglier with CGNs. Anyway: since we will be running both IPv4 and IPv6 for lots of years, the complexity of IPv6 adds to that of IPv4. Thanks, -- Fernando Gont e-mail: ferna...@gont.com.ar || fg...@acm.org PGP Fingerprint: 7809 84F5 322E 45C7 F1C9 3945 96EE A9EF D076 FFF1 __

Re: [Full-disclosure] IPv6 security myths

2010-10-26 Thread Fernando Gont
so that it's secure, and then assume that if your IP address is authorized, the user at that IP address is authorized to print". Thanks, -- Fernando Gont e-mail: ferna...@gont.com.ar || fg...@acm.org PGP Fingerprint: 7809 84F5 322E 45C7 F1C9 3945 96EE A9EF D076 FFF1 ___

Re: TSVDIR review of draft-ietf-intarea-shared-addressing-issues-02

2011-02-02 Thread Fernando Gont
ent specs are concerned, the "accepted window" is half the timestamps space: i.e., you need to forge, at most, two different timestamps value. It also mentions that timestamps may be easily predictable. However, this does not need to be the case (see e.g., draft-gont-timestamps-generation)

Re: TSVDIR review of draft-ietf-intarea-shared-addressing-issues-02

2011-02-02 Thread Fernando Gont
acks (there are many other vectors). If you want an alternative "published" reference, here it is: http://www.cpni.gov.uk/Docs/tn-03-09-security-assessment-TCP.pdf However, it's up to the authors to include this or other references -- I jus

Re: TSVDIR review of draft-ietf-intarea-shared-addressing-issues-02

2011-02-02 Thread Fernando Gont
On 02/02/2011 10:08 p.m., Joe Touch wrote: > On 2/2/2011 5:04 PM, Fernando Gont wrote: > ... >>> At the least, it's worth noting that geolocation is already broken by >>> tunnels, and that IP addressing does not ensure geographic proximity >>> before attribu

Re: TSVDIR review of draft-ietf-intarea-shared-addressing-issues-02

2011-02-02 Thread Fernando Gont
On 02/02/2011 10:24 p.m., Fernando Gont wrote: >> On 2/2/2011 5:04 PM, Fernando Gont wrote: >> ... >>>> At the least, it's worth noting that geolocation is already broken by >>>> tunnels, and that IP addressing does not ensure geographic proximity >>

Re: TSVDIR review of draft-ietf-intarea-shared-addressing-issues-02

2011-02-02 Thread Fernando Gont
s not considered in the IP design, is irrelevant. As noted, IP wasn't meant for production, either. Thanks, -- Fernando Gont e-mail: ferna...@gont.com.ar || fg...@acm.org PGP Fingerprint: 7809 84F5 322E 45C7 F1C9 3945 96EE A9EF D076 FFF1 ___ Ietf mailing list Ietf@ietf.org https://www.ietf.org/mailman/listinfo/ietf

tsv-dir review of draft-ietf-behave-ftp64-10

2011-06-03 Thread Fernando Gont
parsing this sentence. * Section 11, page 12: A client can use the ALGS command to request the ALG's status and to enable and disable EPSV to PASV and, if implemented, EPRT to PORT translation. Please rephrase to "...disable EPSV to PASV translation and, if implemented, EPRT to

Re: HOMENET working group proposal

2011-06-29 Thread Fernando Gont
-to-end connectivity" as "gone". -- among other reasons, because it would require a change of mindset. I'm more of the idea that people will replicate the architecture of their IPv4 networks with IPv6, in which end-systems are not reachable from the public Internet. Thanks! --

Re: HOMENET working group proposal

2011-06-29 Thread Fernando Gont
Wasn't the simple/advanced security RFCs produced by v6ops aimed at typical home devices? Thanks, -- Fernando Gont e-mail: ferna...@gont.com.ar || fg...@acm.org PGP Fingerprint: 7809 84F5 322E 45C7 F1C9 3945 96EE A9EF D076 FFF1 ___ Ietf mailing l

Re: [homegate] HOMENET working group proposal

2011-06-29 Thread Fernando Gont
PNP > like functionality for nodes to talk to the firewall(s). I think this deserves a problem statement that clearly describes what we expect to be able to do (but currently can't), etc. And, if this is meant to be v6-only, state why v4 is excluded -- unless we're happy to have people c

Re: HOMENET working group proposal

2011-06-30 Thread Fernando Gont
On 06/30/2011 12:56 AM, Masataka Ohta wrote: > Fernando Gont wrote: > >> I personally consider this property of "end-to-end connectivity" as >> "gone". > > How do you think about P2P applications? I think about applications that would benefit from

Re: HOMENET working group proposal

2011-06-30 Thread Fernando Gont
our network -- i.e., "default deny") Thanks, -- Fernando Gont e-mail: ferna...@gont.com.ar || fg...@acm.org PGP Fingerprint: 7809 84F5 322E 45C7 F1C9 3945 96EE A9EF D076 FFF1 ___ Ietf mailing list Ietf@ietf.org https://www.ietf.org/mailman/listinfo/ietf

Re: [homegate] HOMENET working group proposal

2011-06-30 Thread Fernando Gont
IPv6), then that's fine... but not what I read from this discussion and the proposed charter. Thoughts? Thanks, -- Fernando Gont e-mail: ferna...@gont.com.ar || fg...@acm.org PGP Fingerprint: 7809 84F5 322E 45C7 F1C9 3945 96EE A9EF D076 FFF1 __

Re: [homegate] HOMENET working group proposal

2011-06-30 Thread Fernando Gont
k > > > > On Jun 30, 2011, at 9:25 AM, Mikael Abrahamsson wrote: > >> On Thu, 30 Jun 2011, Fernando Gont wrote: >> >>> My point was that, except for the mechanism for PD, I don't see a >>> substantial difference here that would e.g. prevent th

Re: [homegate] HOMENET working group proposal

2011-06-30 Thread Fernando Gont
network to support some v6 feature for the network to work, such that our existing v4-only devices can co-exist in whatever v6 home-network architecture we envision). Thanks, -- Fernando Gont e-mail: ferna...@gont.com.ar || fg...@acm.org PGP Fingerprint: 7809 84F5 322E 45C7 F1C9 3945 96EE A9EF D076

Re: [fun] [homegate] HOMENET working group proposal

2011-06-30 Thread Fernando Gont
IPv4 to be gone? (including "gone" from home and enterprise networks) Thanks, -- Fernando Gont e-mail: ferna...@gont.com.ar || fg...@acm.org PGP Fingerprint: 7809 84F5 322E 45C7 F1C9 3945 96EE A9EF D076 FFF1 ___ Ietf mailing list Ietf@

tsv-dir review of draft-ietf-behave-v4v6-bih-06

2011-09-14 Thread Fernando Gont
ents considerations", instead? * Section 7.3, page 22: > If the number of fragments is high enough, the memory of the host > could be exhausted. s/high/large/ ? * Section 7.3, page 22: > BIN implementations MUST implement proper protection against such > attacks, for instance

Security Assessment of the Transmission Control Protocol (TCP)

2009-02-21 Thread Fernando Gont
resulting IETF I-D is entitled "Security Assessment of the Transmission Control Protocol (TCP)" (draft-gont-tcp-security-00.txt) and is available at: http://tools.ietf.org/id/draft-gont-tcp-security-00.txt Any comments will be more than welcome. Thanks! Kind regards, - -- Fernando Gont e-mai

Re: Security Assessment of the Transmission Control Protocol (TCP)

2009-02-21 Thread Fernando Gont
;t made a difference". After all, they had already implemented the stuff discussed in the document (and so had others), so they really didn't have much of a reason to get involved in the process. I'd be glad to discuss a plan to pursue this work within the IETF. Th

Security Assessment of TCP (was: draft-gont-tcp-security)

2009-04-13 Thread Fernando Gont
liency. Thanks! Kind regards, Fernando Gont Original Message Subject: draft-gont-tcp-security Date: Mon, 13 Apr 2009 09:19:43 -0500 From: Eddy, Wesley M. (GRC-RCN0)[Verizon] To: t...@ietf.org CC: Fernando Gont , Joe Abley ,Joel Jaeggli , "rbon...@juniper.net&quo

Re: [tcpm] draft-gont-tcp-security

2009-04-13 Thread Fernando Gont
r attack, that is an OPSEC issue. Yeah... problems with deploying it in the current Internet If tcpm agreed that opsec will be a better venue for this document, I'll be glad to pursue this effort there. At this point, tcpm and opsec are two possible options, with no preference for any of the two. K

Re: [tcpm] draft-gont-tcp-security

2009-04-13 Thread Fernando Gont
hen > complaining that nonsecure TCP is being attacked. Joe, we're talkng about a simple web server being taken down because of a SYN flood, a FIN-WAIT-2 flood, or the like. Even the most stupid web server should survive these types of attacks. Kind regards, -- Fernando Gont e-mail: ferna...@gont.com.ar || fg...@acm.org PGP Fingerprint: 7809 84F5 322E 45C7 F1C9 3945 96EE A9EF D076 FFF1 ___ Ietf mailing list Ietf@ietf.org https://www.ietf.org/mailman/listinfo/ietf

Re: [OPSEC] [tcpm] draft-gont-tcp-security

2009-04-13 Thread Fernando Gont
CP basedon the document published by UK CPNI. Yet we're still debating whether to ignore it or not maybe so that we can publish an RFC in the future tagging those implementations as non-compliant... or maybe to allow tcp vulnerabilities to be "rediscovered" every few years. Thanks! K

Re: Last Call: draft-ietf-tcpm-tcpsecure (Improving TCP's Robustness to Blind In-Window Attacks) to Proposed Standard

2009-04-13 Thread Fernando Gont
yes, it could have been worse, some might argue). Thanks! Kind regards, Fernando Gont The IESG wrote: > The IESG has received a request from the TCP Maintenance and Minor > Extensions WG (tcpm) to consider the following document: > > - 'Improving TCP's Robustness to Blind

Re: [OPSEC] [tcpm] draft-gont-tcp-security

2009-04-13 Thread Fernando Gont
objective as possible. At least for the ip-security counterpart, I recall asking you to have a look at it before publication, even when I knew that you'd most likely disagree with large parts of the document. This project is already done but nevertheless I'm still spending some cycles to

Re: [OPSEC] [tcpm] draft-gont-tcp-security

2009-04-13 Thread Fernando Gont
to find any implementation that is fully-compliant with the RFCs, and let me know if you find any. The lack of advice on all these issues has put vendors in a position in which they have to figure out that advice by themselves. Sometimes they got to the right answers, sometimes not. Have a look at the vulnerability advisories referenced in the I-D: the same errors are committed over and over again. draft-gont-tcp-security is an effort to help the vendor/developer community in that area. P.S.: My apologizes for the possible politically-incorrect comments. But this is the best trade-off I have been able to get between being politically-correct and being honest. Kind regards, -- Fernando Gont e-mail: ferna...@gont.com.ar || fg...@acm.org PGP Fingerprint: 7809 84F5 322E 45C7 F1C9 3945 96EE A9EF D076 FFF1 ___ Ietf mailing list Ietf@ietf.org https://www.ietf.org/mailman/listinfo/ietf

Re: Security Assessment of TCP

2009-04-14 Thread Fernando Gont
ch I am the author of draft-gont-tcp-security. P.S.: The only reason for which my name is not in the cover page is simply that that is not the format with which CPNI are published. But I thought that my authorship of the CPNI document was implicit. Thanks, -- Fernando Gont e-mail: ferna...@gont.com

Re: [tcpm] [OPSEC] draft-gont-tcp-security

2009-04-14 Thread Fernando Gont
t seems clear to me that > the vendor community is looking for guidance here, and I do believe the > IETF should give it. This is the reason for which the output of the CPNI project was submitted as an IETF I-D. Kind regards, -- Fernando Gont e-mail: ferna...@gont.com.ar || fg...@acm.org P

Re: [tcpm] Last Call: draft-ietf-tcpm-tcpsecure (Improving TCP's Robustness to Blind In-Window Attacks) to Proposed Standard

2009-04-16 Thread Fernando Gont
nother attack vector which may be easier > > to exploit. We discuss it in Section 16.2 of > > draft-gont-tcp-security and the CPNI doc, along with advice. > > IMO, this vector should be mentioned, too. > > This again is an attack which relies on the IP functionalit

Security Assessment of TCP ([Fwd: [tcpm] poll for adopting draft-gont-tcp-security])

2009-06-24 Thread Fernando Gont
-- Wes Eddy Network & Systems Architect Verizon FNS / NASA GRC Office: (216) 433-6682 --- ___ tcpm mailing list t...@ietf.org https://www.ietf.org/mailman/listinfo/tcpm -- Fernando Gont e-mail: ferna...@gont.

Re: Gen-ART Combined Last Call and Telechat Review of draft-ietf-tcpm-rfc1948bis-01

2011-12-08 Thread Fernando Gont
the top of the next page. I'm sure the RFC-Editor will take care of this. P.S.: (All my "done", "fixed", etc., are subject to the documents shepard's agreement ;-) ) Thanks! Best regards, -- Fernando Gont e-mail: ferna...@gont.com.ar || fg...@si6networks.com PGP Finge

Re: Protocol Definition

2012-01-05 Thread Fernando Gont
On 01/05/2012 11:48 AM, Dave CROCKER wrote: > If protocol corresponds with program or algorithm, then what is the > communications term that corresponds to process? "Protocol Machine". or "Protocol Instance". Thanks, -- Fernando Gont e-mail: ferna...@gont.com.a

Re: Yet Another Reason?

2012-02-03 Thread Fernando Gont
also want to check this: <http://www.schneier.com/blog/archives/2012/01/british_tourist.html> Thanks, -- Fernando Gont SI6 Networks e-mail: fg...@si6networks.com PGP Fingerprint: 31C6 D484 63B2 8FB1 E3C4 AE25 0D55 1D4E 7492 ___ Ietf mailing

Re: Last Call: (Operational Neighbor Discovery Problems) to Informational RFC

2012-02-08 Thread Fernando Gont
;memoryand replaces existing " * Section 4: addresses (and in many cases becomes unable to perform maintenance of existing entries in the neighbor cache, and unable to answer Neighbor Solicitation). s/Solicitation/Solicitations/ * Section 7.2: s/Neighbour/Neighbor/ Thanks, -- Fernando

Re: Future Handling of Blue Sheets

2012-04-23 Thread Fernando Gont
ase in which the same person must be in two meetings that overlap? (e.g., I've *presented* at overlapping meeting) What should they do in that that case? Sign all the corresponding blue sheets? Sign none? Thanks, -- Fernando Gont e-mail: ferna...@gont.com.ar || fg...@si6networks.com PGP Fingerprint: 7809 84F5 322E 45C7 F1C9 3945 96EE A9EF D076 FFF1

Re: Future Handling of Blue Sheets

2012-04-23 Thread Fernando Gont
he tables in front of the registration desk about his (missing) badge, and told him next day he wouldn't be allowed in without a badge. And this folk ended up leaving the meeting area. Thanks, -- Fernando Gont e-mail: ferna...@gont.com.ar || fg...@si6networks.com PGP Fingerprint: 7809 84F5

Re: Proposed IESG Statement on the Conclusion of Experiments

2012-04-23 Thread Fernando Gont
necessarily the case. As noted above, I will go through the proposed IESG statement in detail and comment. However, even if what's being proposed is not seen as the proper way forward, there's still a problem (specs maintenance) that needs to be addressed somehow. Thanks, -- Fernando Gont

Re: Future Handling of Blue Sheets

2012-04-24 Thread Fernando Gont
t being rpesented by some folks at the beginning of one meeting, and some other doc being presented at the end of some other meeting?). Thanks, -- Fernando Gont e-mail: ferna...@gont.com.ar || fg...@si6networks.com PGP Fingerprint: 7809 84F5 322E 45C7 F1C9 3945 96EE A9EF D076 FFF1

Re: Last Call: (Obsoleting the Endpoint Identifier (EID) Option) to Proposed Standard

2012-10-08 Thread Fernando Gont
gt; architecture", but rather the endpoint name format supported by that option > is totally general, allowing any endpoint name format to be used. Please let me know if you have any suggestions on how to tweak the text to improve this. Thanks! Best regards, -- Fernando Gont e-mail: fe

  1   2   >