Re: [MBONED] Eric Rescorla's Discuss on draft-ietf-mboned-mtrace-v2-22: (with DISCUSS and COMMENT)
Eric Rescorla <ekr@rtfm.com> Thu, 15 March 2018 07:55 UTC
Return-Path: <ekr@rtfm.com>
X-Original-To: mboned@ietfa.amsl.com
Delivered-To: mboned@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6594C12704A for <mboned@ietfa.amsl.com>; Thu, 15 Mar 2018 00:55:47 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.598
X-Spam-Level:
X-Spam-Status: No, score=-2.598 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=rtfm-com.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id uNTav483IRZG for <mboned@ietfa.amsl.com>; Thu, 15 Mar 2018 00:55:43 -0700 (PDT)
Received: from mail-qk0-x22e.google.com (mail-qk0-x22e.google.com [IPv6:2607:f8b0:400d:c09::22e]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D2E5F124B17 for <mboned@ietf.org>; Thu, 15 Mar 2018 00:55:42 -0700 (PDT)
Received: by mail-qk0-x22e.google.com with SMTP id g184so6322065qkd.10 for <mboned@ietf.org>; Thu, 15 Mar 2018 00:55:42 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=rtfm-com.20150623.gappssmtp.com; s=20150623; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=rk1GHPjWmPef+2XUpZC0BXYxMfjeVHm7TDwWCfDUGlM=; b=D3oq4P5Tv8b6Duvu496/oJygD3zhVG4JahmUW4eb78kzzOaN1gm4JUv2YHZMbECaRg ESgE8gJ7V7+Vg5TvyMhEFefVr7rVn9UNL1J0oMwwqOJSwX7FnmLCN0Y0cUcT6D38X8tk d18G9nonYkASuZK1Po5RBLRkHMBbJa+bLdSjiXM1g7MVuWnN7OVOPHXJLV6B4DDH2obY y1cuhiSah08xGlBaWO8SUfJAFHJxjTAzm9BQjcs6Dxf301HIEzXZwuPn0R+AGWKDGQFn DzkX26KojxZUhNqsPHtalFZtHj6s4L9BR6atLLFwTcL13deriN3T1MjynktbCUkjWya7 tvtg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=rk1GHPjWmPef+2XUpZC0BXYxMfjeVHm7TDwWCfDUGlM=; b=n/RZFwImvPMVrnL/z31SAXj2y2CbZDg7XHj7SDxREEZK9zYykBylRZDTPlUwbjtIP7 WuNcn+NMkkS5UAY4EM/E6zyYuYXzypcoiWXNUSMQCCMBeIXnKwZdxdRQ39OQlOaJNdbf VmrqEgCjtIqId+y0GU6sM/2lzomfo5xCTheu9bJ57tAjaG4ALyaqX1relymPAFq9JL59 EwMfLoexICY7sbYP1QqUNi48F7RB7/bUKfx6RVRRPxTh+UhZVl+teLNb3C521b0v+HGG 3rMEyPHLROZIfVdzUagRjuDUusmbhaRxs/T29RUXFIR01gN8vX8fX10jtWG64Rfie52U FRZQ==
X-Gm-Message-State: AElRT7HEhDDV9sSc18AvghtYWr+vWv6yPagbGtSKFedNNsI0uLsAwxkG uXBd+dhDu+dSCz5L2GAcXh+VVOUEydeopJeBOqNSSA==
X-Google-Smtp-Source: AG47ELunTAUg9KrdSBEU90OdzpqjMi1NaYmVVZ9GUd55ZCQCxX559DMo3yC1Ndv6tC8UAVOamba5UgAoJGWpiZ28Tx8=
X-Received: by 10.55.22.28 with SMTP id g28mr11227805qkh.152.1521100541818; Thu, 15 Mar 2018 00:55:41 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.200.37.234 with HTTP; Thu, 15 Mar 2018 00:55:01 -0700 (PDT)
In-Reply-To: <87555175-04AB-424E-9FFE-C7FEAA2F0514@ieee.org>
References: <151628969901.2325.7724014542086691903.idtracker@ietfa.amsl.com> <20180119193149.GA26689@faui40p.informatik.uni-erlangen.de> <CABcZeBNDqq_5XPad76WrsrN_JS2J1iAAC068=y0Nq12SKJOQ=Q@mail.gmail.com> <20180125223335.GA16477@faui40p.informatik.uni-erlangen.de> <CABcZeBPbCJfP=VVC6irEUtbiFuQgmMCQMEUBern=kAG-KP1SQQ@mail.gmail.com> <20180126013118.GD16477@faui40p.informatik.uni-erlangen.de> <CABcZeBN5dWkn7dGZ00tw2AkGPPAdfS+C_8mrVMuB9efc4o1a9Q@mail.gmail.com> <CAHw9_iJtqpKVDgVscQ0UwZVAHbVhTJhjPsgWLkfzCk=gQoBs7g@mail.gmail.com> <B9494C22-3353-4ADF-BEF0-B1ACB785E01B@ieee.org> <CAHw9_iJBKFF_DzU3Av0TaC5+xTx6Mm6srdhWOFAsXJUY24NneQ@mail.gmail.com> <6E5478D0-6145-4EC2-8DF3-15B095271F9D@ieee.org> <87555175-04AB-424E-9FFE-C7FEAA2F0514@ieee.org>
From: Eric Rescorla <ekr@rtfm.com>
Date: Thu, 15 Mar 2018 07:55:01 +0000
Message-ID: <CABcZeBPk7GapPu_6FS9+Ks9G2V=BksRTxtBRAv321D2DB9sRgw@mail.gmail.com>
To: Hitoshi Asaeda <asaeda@ieee.org>
Cc: Warren Kumari <warren@kumari.net>, draft-ietf-mboned-mtrace-v2@ietf.org, mboned@ietf.org, mboned-chairs@ietf.org, Toerless Eckert <tte@cs.fau.de>
Content-Type: multipart/alternative; boundary="001a11474630768f3c05676ed134"
Archived-At: <https://mailarchive.ietf.org/arch/msg/mboned/tdiAM6wh-fB_5pMw3fpU30f9AzE>
Subject: Re: [MBONED] Eric Rescorla's Discuss on draft-ietf-mboned-mtrace-v2-22: (with DISCUSS and COMMENT)
X-BeenThere: mboned@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Mail List for the Mboned Working Group <mboned.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/mboned>, <mailto:mboned-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/mboned/>
List-Post: <mailto:mboned@ietf.org>
List-Help: <mailto:mboned-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/mboned>, <mailto:mboned-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 15 Mar 2018 07:55:47 -0000
Thanks. I am happy to meet in person in London if that would be useful On Thu, Mar 15, 2018 at 7:51 AM, Hitoshi Asaeda <asaeda@ieee.org> wrote: > Hi Warren, Eric, and folks, > > Kerry and I have been working on the security threat analysis initiated by > Eric’s comments. > Kerry is now doing double check for our thoughts and will post the story > tomorrow, I guess. > > Sorry for the long delay, but please wait for a while. > > Thanks for your cooperation. > > Regards, > > Hitoshi > > > > > 2018/03/14 10:53, Hitoshi Asaeda <asaeda@ieee.org> wrote: > > > > Hi Warren, > > > > I have been working on the security threat analysis with Kerry but > > not completed the documentation. > > We will post our thoughts on the ml asap. > > I’m sorry that I cannot attend this meeting at London locally, but > > will try to attend via jabber. > > > > Regards, > > > > Hitoshi > > > > > >> 2018/03/14 6:32, Warren Kumari <warren@kumari.net> wrote: > >> > >> It has been basically 2 weeks since the last update - can you let me > >> know when I can expect progress? Will this be discussed in London? > >> > >> W > >> > >> On Wed, Feb 28, 2018 at 3:57 AM, Hitoshi Asaeda <asaeda@ieee.org> > wrote: > >>> Hi again, > >>> > >>>> 2018/02/27 8:56, Warren Kumari <warren@kumari.net> wrote: > >>>> > >>>> [ - IESG for clutter ] > >>>> > >>>> On Fri, Jan 26, 2018 at 4:58 PM, Eric Rescorla <ekr@rtfm.com> wrote: > >>>>> Hi Toerless, > >>>>> > >>>>> I appreciate the solution thinking, but I don't want to overrotate > on these > >>>>> specific threats (though of course we must address them). My concern > is that > >>>>> if there are threats this obvious then we need a more complete threat > >>>>> analysis. I.e., what are the avenues for attack with this protocol > and then > >>>>> what mechanisms prevent those things. The purpose of the security > >>>>> considerations section is to make sure that that happens. Has > someone done > >>>>> that somewhere and it just didn't make it into the document? > >>>> > >>>> > >>>> Toerless / authors, > >>>> > >>>> It has been around a month since this reply -- I'm hoping that the > >>>> there has been more discussion and that I just fell off the thread and > >>>> / or that my search foo has failed me. > >>>> > >>>> EKR makes good points (and holds a DISCUSS) - we need to figure out > >>>> how to address them. Was there more discussions on the thread > >>>> analysis? Clue bat appreciated. > >>> > >>> We may have to do some sort of security threat analysis and document > the results, > >>> along with possible remedies to address the existing threats. > >>> We’ll seek comments in the ML after the authors agree on the idea. > >>> > >>> Best regards, > >>> > >>> Hitoshi > >>> > >>> > >>>> > >>>>> > >>>>> -Ekr > >>>>> > >>>>> > >>>>> On Thu, Jan 25, 2018 at 5:31 PM, Toerless Eckert <tte@cs.fau.de> > wrote: > >>>>>> > >>>>>> On Thu, Jan 25, 2018 at 03:08:58PM -0800, Eric Rescorla wrote: > >>>>>>>> My point B.1) explicitly disables lying about the requesting > address, > >>>>>>>> so > >>>>>>>> it is explicitly meant to prohibit amplification attacks. > >>>>>>>> > >>>>>>> > >>>>>>> I don't see how that's true. The attack I am concerned about is > that you > >>>>>>> forge a *Request*, not a *Query*. And because the request > indicates the > >>>>>>> original > >>>>>>> requester. > >>>>>> > >>>>>> Ah, sorry. I thought to remember that the text from you said query. > >>>>>> I just replied for query messages so far. > >>>>>> > >>>>>>> (give or take the subnet local limitations and/or additional L2 > security > >>>>>>>> required to prohibit intra-l2-lying that i mentioned in my > original > >>>>>>>> mail). > >>>>>>> > >>>>>>> Sorry, I'm not seeing this. The point is that you pretend to be a > router > >>>>>>> that is forwarding a Request and fill in a bogus Client Address > field. > >>>>>>> Waht > >>>>>>> stops that. > >>>>>> > >>>>>> In practical deployments IMHO we can only reasonable get similar > solutions > >>>>>> to > >>>>>> what customer are also willing to deploy with PIM. For 99% > deployments > >>>>>> that > >>>>>> is configured classificatio of interfaces as > trusted/inside-clamshell or > >>>>>> untrusted/user-facing, and on the untrusted interfaces you don't > accept > >>>>>> requests, just queries. And apply the suggested B.1 policy (Mtracev2 > >>>>>> Client > >>>>>> Address must be connected on receiving interface). > >>>>>> > >>>>>> It might still be useful to have mtrace prepared for customers > protecting > >>>>>> it > >>>>>> with IPsec - without requiring special features in mtrace or IPsec > for it. > >>>>>> > >>>>>> IMHO for that, we need to have one UDP port for mtrace NNI messages > >>>>>> (requests), and another for UNI messages (query, response). > >>>>>> That would allow customers to take a vanilla IPsec implementation > and > >>>>>> protect > >>>>>> the mtrace NNI messages and therefore eleiminate interface clamshell > >>>>>> classification. In multicast signaling we got this for free: PIM > is NNI, > >>>>>> IGMP/MLD UNI. Easy to distinguish for IPsec. > >>>>>> > >>>>>>>> My points B.1, B.2, B.3) provide solid access control mechanisms > for > >>>>>>>> mtrace using mechanisms that are the most widely adopted form of > >>>>>>>> security > >>>>>>>> in ISPs > >>>>>>>> and that this option of security in mtrace should not be dismissed > >>>>>>>> just > >>>>>>>> because > >>>>>>>> it took us so long to bring the protocol in front of IESG review > even > >>>>>>>> if > >>>>>>>> we agree > >>>>>>>> that we should have better options beyond that. > >>>>>>> > >>>>>>> The question is whether those options are in fact adequate. For the > >>>>>>> reasons > >>>>>>> above I don't believe that. > >>>>>>> > >>>>>>> -Ekr > >>>>>> > >>>>>> Cheers > >>>>>> Toerless > >>>>>> > >>>>>>> > >>>>>>> > >>>>>>>> > >>>>>>>> The other point was that better security options are something we > >>>>>>>> should > >>>>>>>> not > >>>>>>>> invent as one-off protocol hack sinto mtrace (even if some mtrace > none > >>>>>>>> request/reply > >>>>>>>> messages might be fun to define) but instead we should adopt > solutions > >>>>>>>> that are more > >>>>>>>> likely in-line with existing network OAM security strategies. TLS > >>>>>>>> connections, > >>>>>>>> netconf/yang etc. pp. As i described in my email. > >>>>>>>> > >>>>>>>> Cheers > >>>>>>>> toerless > >>>>>>>> > >>>>>>>>> -Ekr > >>>>>>>>> > >>>>>>>>> > >>>>>>>>> > >>>>>>>>> The most likely next step to overcome the trusted path issue > between > >>>>>>>>>> query initiator to query responder is to make an mtrace yang > model > >>>>>>>> where > >>>>>>>>>> you can actually initiate an mtrace via netconf/yang, aka: > replace > >>>>>>>>>> the query with netconf. Like you would today just ssh into the > >>>>>>>>>> LHR and run a local mtrace client there. > >>>>>>>>>> > >>>>>>>>>> Alas, i see no easy way to get back to support A) in a > lightweight > >>>>>>>>>> fashion ;-( > >>>>>>>>>> > >>>>>>>>>> Cheers > >>>>>>>>>> Toerless > >>>>>>>>>> > >>>>>>>>>> On Thu, Jan 18, 2018 at 07:34:59AM -0800, Eric Rescorla wrote: > >>>>>>>>>>> Eric Rescorla has entered the following ballot position for > >>>>>>>>>>> draft-ietf-mboned-mtrace-v2-22: Discuss > >>>>>>>>>>> > >>>>>>>>>>> When responding, please keep the subject line intact and reply > >>>>>>>>>>> to all > >>>>>>>>>>> email addresses included in the To and CC lines. (Feel free to > >>>>>>>>>>> cut > >>>>>>>> this > >>>>>>>>>>> introductory paragraph, however.) > >>>>>>>>>>> > >>>>>>>>>>> > >>>>>>>>>>> Please refer to https://www.ietf.org/iesg/stat > >>>>>>>>>> ement/discuss-criteria.html > >>>>>>>>>>> for more information about IESG DISCUSS and COMMENT positions. > >>>>>>>>>>> > >>>>>>>>>>> > >>>>>>>>>>> The document, along with other ballot positions, can be found > >>>>>>>>>>> here: > >>>>>>>>>>> https://datatracker.ietf.org/doc/draft-ietf-mboned-mtrace-v2/ > >>>>>>>>>>> > >>>>>>>>>>> > >>>>>>>>>>> > >>>>>>>>>>> ------------------------------------------------------------ > >>>>>>>> ---------- > >>>>>>>>>>> DISCUSS: > >>>>>>>>>>> ------------------------------------------------------------ > >>>>>>>> ---------- > >>>>>>>>>>> > >>>>>>>>>>> The security considerations of this document are inadequate. My > >>>>>>>> review > >>>>>>>>>>> turns up at least the following potential issues which do > >>>>>>>>>>> not seem to be addressed or even discussed: > >>>>>>>>>>> > >>>>>>>>>>> - Amplification: this protocol does not appear to verify that > >>>>>>>>>>> the > >>>>>>>>>>> sender of the query actually owns the IP it claims. Because > >>>>>>>>>>> responses are much larger than queries, this allows for an > >>>>>>>>>> amplification > >>>>>>>>>>> attack, especially if the client is able to send a query that > >>>>>>>> elicits > >>>>>>>>>>> multiple replies. One defense here would be to fill the rest > >>>>>>>>>>> of the > >>>>>>>>>> packet > >>>>>>>>>>> with zeroes, thus somewhat reducing the amplification factor. > >>>>>>>> Access > >>>>>>>>>>> control would also help. > >>>>>>>>>>> > >>>>>>>>>>> - Forgery of responses: because the query id is so short, an > >>>>>>>>>>> attacker > >>>>>>>>>>> can generally produce a message which has a nontrivial chance > >>>>>>>>>>> of > >>>>>>>>>>> corresponding to an extant query. This could be addressed by > >>>>>>>>>>> having > >>>>>>>>>>> a query ID that was large and random. > >>>>>>>>>>> > >>>>>>>>>>> - Anyone on-path can forge responses. > >>>>>>>>>>> > >>>>>>>>>>> In addition, Section 9.4 seems inadequate. Isn't it generally > >>>>>>>>>>> the > >>>>>>>> case > >>>>>>>>>> that > >>>>>>>>>>> who is sending to who is sensitive? This seems like a fairly > >>>>>>>>>>> serious > >>>>>>>>>> privacy > >>>>>>>>>>> obstacle to using this protocol at all. > >>>>>>>>>>> > >>>>>>>>>>> It seems like many of the issues I raise above would be fixed > or > >>>>>>>>>>> at > >>>>>>>>>>> least mitigated by having some sort of access control > mechanism. > >>>>>>>>>>> I > >>>>>>>>>>> understand why it might be the case that it's not practical to > >>>>>>>>>>> have > >>>>>>>>>>> full communication security between the links (though it would > >>>>>>>>>>> of > >>>>>>>>>>> course be desirable), but it's not clear to me why arbitrary > >>>>>>>>>>> people > >>>>>>>>>>> should be allowed to instantiate queries. > >>>>>>>>>>> > >>>>>>>>>>> > >>>>>>>>>>> ------------------------------------------------------------ > >>>>>>>> ---------- > >>>>>>>>>>> COMMENT: > >>>>>>>>>>> ------------------------------------------------------------ > >>>>>>>> ---------- > >>>>>>>>>>> > >>>>>>>>>>> S 1. > >>>>>>>>>>> When an Mtrace2 client initiates a multicast trace, it sends > >>>>>>>>>>> an > >>>>>>>>>>> Mtrace2 Query packet to the LHR or RP for a multicast group > >>>>>>>>>>> and, > >>>>>>>>>>> > >>>>>>>>>>> This seems a bit confusing as there are multiple LHRs for the > >>>>>>>>>>> group. > >>>>>>>>>>> Can you rephrase? > >>>>>>>>>>> > >>>>>>>>>>> > >>>>>>>>>>> S 2.1. > >>>>>>>>>>> ALL-[protocol]-ROUTERS group > >>>>>>>>>>> It is a link-local multicast address for multicast routers > >>>>>>>>>>> to > >>>>>>>>>>> > >>>>>>>>>>> This is grammatically funny. Perhaps remove "It is" > >>>>>>>>>>> > >>>>>>>>>>> > >>>>>>>>>>> S 3. > >>>>>>>>>>> additional information associated with the message. If an > >>>>>>>>>>> implementation receives an unknown TLV type for the first TLV > >>>>>>>>>>> in a > >>>>>>>>>>> message (i.e., the header TLV), it SHOULD ignore and silently > >>>>>>>> discard > >>>>>>>>>>> the entire packet. If an implementation receives an unknown > >>>>>>>>>>> TLV > >>>>>>>> type > >>>>>>>>>>> for a subsequent TLV within a message, it SHOULD ignore and > >>>>>>>> silently > >>>>>>>>>>> discard the entire packet. > >>>>>>>>>>> > >>>>>>>>>>> ISTM that these cases are handled identically so is there a > >>>>>>>>>>> reason > >>>>>>>>>>> not just to remove the first sentence and change the second one > >>>>>>>>>>> to > >>>>>>>>>>> "for any TLV"/ > >>>>>>>>>>> > >>>>>>>>>>> > >>>>>>>>>>> > >>>>>>>>>>> S 3.2.1 > >>>>>>>>>>> An Mtrace2 Query is usually originated by an Mtrace2 client > >>>>>>>>>>> which > >>>>>>>>>>> sends an Mtrace2 Query message to the LHR. When tracing > >>>>>>>>>>> towards > >>>>>>>> the > >>>>>>>>>>> source or the RP, the intermediate routers MUST NOT modify > >>>>>>>>>>> the > >>>>>>>> Query > >>>>>>>>>>> message except the Type field. > >>>>>>>>>>> > >>>>>>>>>>> I'm not sure I follow this. Don't routers either (a) not touch > >>>>>>>>>>> this > >>>>>>>> at > >>>>>>>>>> all > >>>>>>>>>>> or (b) if they are the LHR, change Type from Query -> Request > >>>>>>>>>>> and > >>>>>>>> then > >>>>>>>>>>> add a response block? This text seems to not really capture > >>>>>>>>>>> either > >>>>>>>> case. > >>>>>>>>>>> > >>>>>>>>>>> > >>>>>>>>>>> S 3.2.4. > >>>>>>>>>>> Note that Mtrace2 does not require all the routers on the > >>>>>>>>>>> path > >>>>>>>> to > >>>>>>>>>>> have synchronized clocks in order to measure one-way > >>>>>>>>>>> latency. > >>>>>>>>>>> > >>>>>>>>>>> It's not clear to me how one does this. Can you expand? > >>>>>>>>>>> > >>>>>>>>>>> > >>>>>>>>>>> S 3.2.6. > >>>>>>>>>>> > >>>>>>>>>>> 0x01 # of the returned Standard Response Blocks > >>>>>>>>>>> > >>>>>>>>>>> Nit: Do you want to say 0x0001 > >>>>>>>>>>> > >>>>>>>>>>> Also, an example of the case covered by this section would > help, > >>>>>>>>>>> I > >>>>>>>> think. > >>>>>>>>>>> > >>>>>>>>>>> > >>>>>>>>>>> > >>>>>>>>>>> S 4.4. > >>>>>>>>>>> It might be clearer to move this up a bit in the text as it > sort > >>>>>>>>>>> of > >>>>>>>>>>> summarizes some cases you already covered before. It would be > >>>>>>>>>>> easier > >>>>>>>>>>> if it provided an overview instead. > >>>>>>>>>>> > >>>>>>>>>>> > >>>>>>>>>>> S 5.9. > >>>>>>>>>>> > >>>>>>>>>>> In this case, the Mtrace2 > >>>>>>>>>>> client may receive multiple Mtrace2 Replies from different > >>>>>>>>>>> routers > >>>>>>>>>>> along the path. When this happens, the client MUST treat > >>>>>>>>>>> them as > >>>>>>>> a > >>>>>>>>>>> single Mtrace2 Reply message. > >>>>>>>>>>> > >>>>>>>>>>> Can you please describe how the client reassembles multiple > >>>>>>>>>>> messages > >>>>>>>>>>> into one. I think I may know how to do this, but the document > >>>>>>>>>>> should > >>>>>>>>>>> tell me. > >>>>>>>>>>> > >>>>>>>>>>> S 8. > >>>>>>>>>>> The following new registries are to be created and maintained > >>>>>>>> under > >>>>>>>>>>> the "RFC Required" registry policy as specified in [4]. > >>>>>>>>>>> > >>>>>>>>>>> Why did you choose RFC Required rather than Specification > >>>>>>>>>>> Required? > >>>>>>>>>>> This just seems to unduly put load on the ISE. > >>>>>>>>>>> > >>>>>>>>>>> > >>>>>>>>>>> _______________________________________________ > >>>>>>>>>>> MBONED mailing list > >>>>>>>>>>> MBONED@ietf.org > >>>>>>>>>>> https://www.ietf.org/mailman/listinfo/mboned > >>>>>>>>>> > >>>>>>>>>> -- > >>>>>>>>>> --- > >>>>>>>>>> tte@cs.fau.de > >>>>> > >>>>> > >>>> > >>>> > >>>> > >>>> -- > >>>> I don't think the execution is relevant when it was obviously a bad > >>>> idea in the first place. > >>>> This is like putting rabid weasels in your pants, and later expressing > >>>> regret at having chosen those particular rabid weasels and that pair > >>>> of pants. > >>>> ---maf > >>>> > >>>> _______________________________________________ > >>>> MBONED mailing list > >>>> MBONED@ietf.org > >>>> https://www.ietf.org/mailman/listinfo/mboned > >>> > >> > >> > >> > >> -- > >> I don't think the execution is relevant when it was obviously a bad > >> idea in the first place. > >> This is like putting rabid weasels in your pants, and later expressing > >> regret at having chosen those particular rabid weasels and that pair > >> of pants. > >> ---maf > > > >
- Re: [MBONED] Eric Rescorla's Discuss on draft-iet… Eric Rescorla
- Re: [MBONED] Eric Rescorla's Discuss on draft-iet… Hitoshi Asaeda
- Re: [MBONED] Eric Rescorla's Discuss on draft-iet… Hitoshi Asaeda
- Re: [MBONED] Eric Rescorla's Discuss on draft-iet… Eric Rescorla
- Re: [MBONED] Eric Rescorla's Discuss on draft-iet… Eric Rescorla
- Re: [MBONED] Eric Rescorla's Discuss on draft-iet… Hitoshi Asaeda
- Re: [MBONED] Eric Rescorla's Discuss on draft-iet… Kerry Meyer
- Re: [MBONED] Eric Rescorla's Discuss on draft-iet… Kerry Meyer
- Re: [MBONED] Eric Rescorla's Discuss on draft-iet… Eric Rescorla
- Re: [MBONED] Eric Rescorla's Discuss on draft-iet… Hitoshi Asaeda
- Re: [MBONED] Eric Rescorla's Discuss on draft-iet… Warren Kumari
- Re: [MBONED] Eric Rescorla's Discuss on draft-iet… Eric Rescorla
- Re: [MBONED] Eric Rescorla's Discuss on draft-iet… Hitoshi Asaeda
- Re: [MBONED] Eric Rescorla's Discuss on draft-iet… Hitoshi Asaeda
- Re: [MBONED] Eric Rescorla's Discuss on draft-iet… Eric Rescorla
- Re: [MBONED] Eric Rescorla's Discuss on draft-iet… Eric Rescorla
- Re: [MBONED] Eric Rescorla's Discuss on draft-iet… Hitoshi Asaeda
- [MBONED] Eric Rescorla's Discuss on draft-ietf-mb… Eric Rescorla
- Re: [MBONED] Eric Rescorla's Discuss on draft-iet… Toerless Eckert
- Re: [MBONED] Eric Rescorla's Discuss on draft-iet… Hitoshi Asaeda
- Re: [MBONED] Eric Rescorla's Discuss on draft-iet… Eric Rescorla
- Re: [MBONED] Eric Rescorla's Discuss on draft-iet… Toerless Eckert
- Re: [MBONED] Eric Rescorla's Discuss on draft-iet… Eric Rescorla
- Re: [MBONED] Eric Rescorla's Discuss on draft-iet… Toerless Eckert
- Re: [MBONED] Eric Rescorla's Discuss on draft-iet… Toerless Eckert
- Re: [MBONED] Eric Rescorla's Discuss on draft-iet… Eric Rescorla
- Re: [MBONED] Eric Rescorla's Discuss on draft-iet… Warren Kumari
- Re: [MBONED] Eric Rescorla's Discuss on draft-iet… Hitoshi Asaeda
- Re: [MBONED] Eric Rescorla's Discuss on draft-iet… Warren Kumari
- Re: [MBONED] Eric Rescorla's Discuss on draft-iet… Hitoshi Asaeda
- Re: [MBONED] Eric Rescorla's Discuss on draft-iet… Hitoshi Asaeda
- Re: [MBONED] Eric Rescorla's Discuss on draft-iet… Eric Rescorla
- Re: [MBONED] Eric Rescorla's Discuss on draft-iet… Kerry Meyer
- Re: [MBONED] Eric Rescorla's Discuss on draft-iet… Eric Rescorla
- Re: [MBONED] Eric Rescorla's Discuss on draft-iet… Kerry Meyer
- Re: [MBONED] Eric Rescorla's Discuss on draft-iet… Eric Rescorla
- Re: [MBONED] Eric Rescorla's Discuss on draft-iet… Eric Rescorla
- Re: [MBONED] Eric Rescorla's Discuss on draft-iet… Kerry Meyer
- Re: [MBONED] Eric Rescorla's Discuss on draft-iet… Eric Rescorla
- Re: [MBONED] Eric Rescorla's Discuss on draft-iet… Hitoshi Asaeda