Re: [72attendees] In-room network

"LANGE Andrew" <Andrew.Lange@alcatel-lucent.com> Tue, 29 July 2008 14:06 UTC

Return-Path: <72attendees-bounces@ietf.org>
X-Original-To: 72attendees-archive@ietf.org
Delivered-To: ietfarch-72attendees-archive@core3.amsl.com
Received: from [127.0.0.1] (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id BB0FD28C31E; Tue, 29 Jul 2008 07:06:14 -0700 (PDT)
X-Original-To: 72attendees@core3.amsl.com
Delivered-To: 72attendees@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 04DE128C17C for <72attendees@core3.amsl.com>; Tue, 29 Jul 2008 07:06:13 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.461
X-Spam-Level:
X-Spam-Status: No, score=-2.461 tagged_above=-999 required=5 tests=[AWL=0.137, BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id xkoLISrFnw-L for <72attendees@core3.amsl.com>; Tue, 29 Jul 2008 07:06:11 -0700 (PDT)
Received: from audl951.usa.alcatel.com (audl951.usa.alcatel.com [143.209.238.161]) by core3.amsl.com (Postfix) with ESMTP id C66B828C325 for <72attendees@ietf.org>; Tue, 29 Jul 2008 07:06:10 -0700 (PDT)
Received: from usdalsbhs01.ad3.ad.alcatel.com (usdalsbhs01.usa.alcatel.com [172.22.216.19]) by audl951.usa.alcatel.com (ALCANET) with ESMTP id m6TE5KeO002158; Tue, 29 Jul 2008 09:05:20 -0500
Received: from USDALSMBS02.ad3.ad.alcatel.com ([172.22.216.10]) by usdalsbhs01.ad3.ad.alcatel.com with Microsoft SMTPSVC(6.0.3790.2499); Tue, 29 Jul 2008 09:05:19 -0500
Received: from USDALSMBS05.ad3.ad.alcatel.com ([172.22.216.33]) by USDALSMBS02.ad3.ad.alcatel.com with Microsoft SMTPSVC(6.0.3790.2499); Tue, 29 Jul 2008 09:05:19 -0500
X-MimeOLE: Produced By Microsoft Exchange V6.5
Content-class: urn:content-classes:message
MIME-Version: 1.0
Date: Tue, 29 Jul 2008 09:05:19 -0500
Message-ID: <66F9363AB70F764C96547BD8A0A3679E154B8C@USDALSMBS05.ad3.ad.alcatel.com>
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
Thread-Topic: [72attendees] In-room network
Thread-Index: AcjxglTYaLBhruG8S4OPLcx3UiTvQwAAMJkH
References: <0A7D7D6BC1EEF6489C3D0AE1B6B161950334B865@xmb-sjc-223.amer.cisco.com><8BC845943058D844ABFC73D2220D4665077DD0FB@nics-mail.sbg.nic.at><200807290055.m6T0t26n004039@raisinbran.srv.cs.cmu.edu><25833CB3A33A957FCC91DC49@atlantis.pc.cs.cmu.edu><1BCC7D52-F720-4B78-8255-4059B1BEF96C@multicasttech.com><C0BBC19F-C51A-44B3-8221-683FCE25C39F@google.com> <CD58F2CB-24F5-49A9-8646-84FE49BF8106@cisco.com>
From: LANGE Andrew <Andrew.Lange@alcatel-lucent.com>
To: Richard Pruss <ric@cisco.com>, Vint Cerf <vint@google.com>
X-OriginalArrivalTime: 29 Jul 2008 14:05:19.0680 (UTC) FILETIME=[227F3C00:01C8F184]
X-Scanned-By: MIMEDefang 2.64 on 143.209.238.34
Cc: 72attendees@ietf.org, Marshall Eubanks <tme@multicasttech.com>, Jeffrey Hutzelman <jhutz@cmu.edu>
Subject: Re: [72attendees] In-room network
X-BeenThere: 72attendees@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: "Discussion list for the attendees of IETF 72 meeting." <72attendees.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/72attendees>, <mailto:72attendees-request@ietf.org?subject=unsubscribe>
List-Archive: <https://www.ietf.org/mailman/private/72attendees>
List-Post: <mailto:72attendees@ietf.org>
List-Help: <mailto:72attendees-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/72attendees>, <mailto:72attendees-request@ietf.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============0726546398=="
Sender: 72attendees-bounces@ietf.org
Errors-To: 72attendees-bounces@ietf.org

The hotel has been very responsive to our needs.  They jumped on this issues this morning as soon as they came in.

The fix for PPTP passthrough broke IPSec/UDP, since the internal IP's were not set to always map to the same external IP.  This caused multiple sessions from the same host to get mapped to multiple external IPs. This has been fixed.  It's good to hear confirmation that this has cleared up the problem.

The hotel has not been blocking any ports out since we have arrived.  We've arranged for as clear a pipe as possible without breaking their other systems. 

Andrew


-----Original Message-----
From: 72attendees-bounces@ietf.org on behalf of Richard Pruss
Sent: Tue 7/29/2008 8:51 AM
To: Vint Cerf
Cc: 72attendees@ietf.org; Marshall Eubanks; Jeffrey Hutzelman
Subject: Re: [72attendees] In-room network
 
IPSec/UDP is working again.  Thanks to our hosts for taking on  
repairing this for us, I understand it was outside your  
responsibilities. Thanks for the extra effort,
Ric

On 29/07/2008, at 1:27 PM, Vint Cerf wrote:

> AIM seems to be working now in room block 16XX
>
> v
>
> On Jul 29, 2008, at 8:24 AM, Marshall Eubanks wrote:
>
>> Something that I did not mention that is relevant is that I was  
>> using AIM from the room Sunday night.
>>
>> So, something changed over 24 hours.
>>
>> Regards
>> Marshall
>>
>> On Jul 29, 2008, at 7:29 AM, Jeffrey Hutzelman wrote:
>>
>>> --On Monday, July 28, 2008 08:14:03 PM -0400 Marshall Eubanks <tme@multicasttech.com 
>>> > wrote:
>>>
>>>> Tonight from my room, I get connection failures for AIM, but  
>>>> jabber, ssh,
>>>> http, etc., all work fine. It sounds like port blockage to me.
>>>
>>> Really?  Have you collected any data that shows that your packets  
>>> are not getting through?  Or are you simply assuming that if it  
>>> doesn't work, it must be because the port is blocked?
>>>
>>> Someone noted earlier that the hotel's NAT seems to be allocating  
>>> a different outside IP address for each outgoing  
>>> "connection" (which, for UDP, often means each packet).  There are  
>>> certainly a lot of UDP-based protocols that that will break, if  
>>> it's true (I'm not entirely convinced, because I run things that  
>>> it _should_ break pretty badly but that seem to work fine).
>>>
>>> FWIW, I've also noticed AIM breaking from behind other NAT's  
>>> lately, which may indicate the protocol is NAT-unfriendly in some  
>>> way.  That would be news to me, but then, it's not a protocol I  
>>> use often, and I avoid NAT's when I can.
>>>
>>> Of course, it's also possible that some people's VPN connections  
>>> are breaking because they expect to use a particular port, either  
>>> for tunneled traffic or for IKE, or because they expect to use a  
>>> protocol for which the NAT cannot multiplex multiple connections.   
>>> Those of us who've done this a few times presumably know about  
>>> these pitfalls by now, but there will always be someone who's  
>>> never encountered the problem before.
>>>
>>>
>>> I would suggest that if folks are having problems getting  
>>> particular protocols to work, that they collect as much data as  
>>> possible about what is going on and then report the problem to the  
>>> hotel.  Maybe one of the NOC folks can give us an idea of what  
>>> sorts of data are most useful.
>>>
>>> -- Jeff
>>
>> _______________________________________________
>> 72attendees mailing list
>> 72attendees@ietf.org
>> https://www.ietf.org/mailman/listinfo/72attendees
>
> _______________________________________________
> 72attendees mailing list
> 72attendees@ietf.org
> https://www.ietf.org/mailman/listinfo/72attendees

_______________________________________________
72attendees mailing list
72attendees@ietf.org
https://www.ietf.org/mailman/listinfo/72attendees

_______________________________________________
72attendees mailing list
72attendees@ietf.org
https://www.ietf.org/mailman/listinfo/72attendees