
From jouni.nospam@gmail.com  Tue Jun  4 02:41:55 2013
Return-Path: <jouni.nospam@gmail.com>
X-Original-To: dmm@ietfa.amsl.com
Delivered-To: dmm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2B72921F9B60 for <dmm@ietfa.amsl.com>; Tue,  4 Jun 2013 02:41:55 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id WKCebZWSMQcm for <dmm@ietfa.amsl.com>; Tue,  4 Jun 2013 02:41:45 -0700 (PDT)
Received: from mail-la0-x22f.google.com (mail-la0-x22f.google.com [IPv6:2a00:1450:4010:c03::22f]) by ietfa.amsl.com (Postfix) with ESMTP id 6104421F9BC9 for <dmm@ietf.org>; Tue,  4 Jun 2013 01:34:23 -0700 (PDT)
Received: by mail-la0-f47.google.com with SMTP id fe20so188000lab.6 for <dmm@ietf.org>; Tue, 04 Jun 2013 01:34:23 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=subject:mime-version:content-type:from:x-priority:in-reply-to:date :cc:content-transfer-encoding:message-id:references:to:x-mailer; bh=LvFnZpGJYoP/s/5gNRBajsJ6djzXt/CU0ZEDK3dhYoY=; b=SaH/LVS32GbVaG+u38JnCyfLGV6p9Jez3T0JEx+mdjv7xAehvFHyaMgktBoEZ45rOp 6/TTth4wzDgxeD4Ha3m9jz53lSCShI34ziEf021SSW0kH03iy/ycu6qp+x6fdbHSOoRP IXJJ3gWvnC6zeO58LxgZz/sKKvHf1y3dynqPVIU+PBjLOL/6uSCLJ+mm425uma9cT83N QpzfTnOQUfdJjkValGPnBw3gGfVKseK/nyfVCd1AD1pGW6eSOqBHPNeAqdMzqiB5UGKj jW+J86IpSM00tURqHDGUNFnjxzT0Pg27k1IszR10+I/9gcBgCsy3rlo3msKakiHqUfF6 Ra3w==
X-Received: by 10.152.19.39 with SMTP id b7mr12684789lae.38.1370334863062; Tue, 04 Jun 2013 01:34:23 -0700 (PDT)
Received: from [192.168.250.39] ([194.100.71.98]) by mx.google.com with ESMTPSA id x3sm25743513lag.6.2013.06.04.01.34.21 for <multiple recipients> (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Tue, 04 Jun 2013 01:34:22 -0700 (PDT)
Mime-Version: 1.0 (Mac OS X Mail 6.3 \(1503\))
Content-Type: text/plain; charset=iso-8859-1
From: Jouni Korhonen <jouni.nospam@gmail.com>
X-Priority: 3
In-Reply-To: <5FA05057C5AF4DADB42AEA954DD98822@china.huawei.com>
Date: Tue, 4 Jun 2013 11:34:20 +0300
Content-Transfer-Encoding: quoted-printable
Message-Id: <6F38A4EC-CD6E-4E8A-8D19-FA30509EF3A8@gmail.com>
References: <5FA05057C5AF4DADB42AEA954DD98822@china.huawei.com>
To: H Anthony Chan <h.a.chan@ieee.org>, "dmm@ietf.org" <dmm@ietf.org>
X-Mailer: Apple Mail (2.1503)
Subject: Re: [DMM] Mail regarding draft-ietf-dmm-requirements (2.1, 3.2)
X-BeenThere: dmm@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Distributed Mobility Management Working Group <dmm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmm>, <mailto:dmm-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmm>
List-Post: <mailto:dmm@ietf.org>
List-Help: <mailto:dmm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmm>, <mailto:dmm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 04 Jun 2013 09:41:55 -0000

Anthony,


Regarding issue #14 (which was about Section 3.1 and 3.2, not 2.1 and =
3.2 as I wrote into issue tracker).

The text in -04 is OK, except with a small change

Section 3.1

OLD:

   words, such mobility management systems are centralized in both the
   control plane and the data plane.

NEW:

   words, such mobility management systems are centralized in both the
   control plane and the data plane (mobile node IP traffic).


And issue #15 seems to be resolved in -04. I have marked that resolved =
in the issue tracker.


- Jouni=

From jouni.nospam@gmail.com  Tue Jun  4 05:49:05 2013
Return-Path: <jouni.nospam@gmail.com>
X-Original-To: dmm@ietfa.amsl.com
Delivered-To: dmm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0DF8721F9D54 for <dmm@ietfa.amsl.com>; Tue,  4 Jun 2013 05:49:05 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.099
X-Spam-Level: 
X-Spam-Status: No, score=-3.099 tagged_above=-999 required=5 tests=[AWL=0.500,  BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ALJuISSm3J2s for <dmm@ietfa.amsl.com>; Tue,  4 Jun 2013 05:48:49 -0700 (PDT)
Received: from mail-lb0-f181.google.com (mail-lb0-f181.google.com [209.85.217.181]) by ietfa.amsl.com (Postfix) with ESMTP id 8AB9121F9774 for <dmm@ietf.org>; Tue,  4 Jun 2013 04:23:24 -0700 (PDT)
Received: by mail-lb0-f181.google.com with SMTP id 13so518398lba.12 for <dmm@ietf.org>; Tue, 04 Jun 2013 04:23:23 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=content-type:mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to:x-mailer; bh=XWav5FF758fGIiGdthv0Q2z5dBK7CWyZW8FBr9W8Nz4=; b=UKqyfLoiuR9SA/I1b0LZz4u1sw8j5z+I4sbIiVLLVvRt0nz9Jzar9hF72L+lRkHN5i bzB71kyNkJ830xf9ICvmQ/wMbR6xrmyIxwM1dxj90WtLuV7AhSEwK7a2SkwmJL6bTAUx PhBWUp3qM5JLYYb8CNYPeByfJvz/njxAJaJi9ldOUy0Qgu2MDGM4H5tx8wN4/LCZ2nW+ WdbIGviM84eniPWoA40gyXbxGlMgzZ+qtNaErzEUnxPMVbQVdjmxrp0A+GK/hbhF7pJ1 CmHjL/3hMPcKaKjaNzZr29TsDvHvEz2bNtt4OgZS/hMpA2rYmeIQVQDTIuMdAh2UJuNq 9YtA==
X-Received: by 10.112.137.230 with SMTP id ql6mr7331619lbb.28.1370345003252; Tue, 04 Jun 2013 04:23:23 -0700 (PDT)
Received: from [192.168.250.39] ([194.100.71.98]) by mx.google.com with ESMTPSA id 9sm24981056lbz.16.2013.06.04.04.23.21 for <multiple recipients> (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Tue, 04 Jun 2013 04:23:22 -0700 (PDT)
Content-Type: text/plain; charset=us-ascii
Mime-Version: 1.0 (Mac OS X Mail 6.3 \(1503\))
From: Jouni Korhonen <jouni.nospam@gmail.com>
In-Reply-To: <060.3350372c6b3d6df8622576aa3d7b97cb@tools.ietf.org>
Date: Tue, 4 Jun 2013 14:23:19 +0300
Content-Transfer-Encoding: quoted-printable
Message-Id: <2574BD53-68FF-4E82-9089-B5548A9AADCA@gmail.com>
References: <060.3350372c6b3d6df8622576aa3d7b97cb@tools.ietf.org>
To: "dmm@ietf.org" <dmm@ietf.org>, h chan <h.anthony.chan@huawei.com>
X-Mailer: Apple Mail (2.1503)
Subject: Re: [DMM] [dmm] #22: Multicast clarifications
X-BeenThere: dmm@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Distributed Mobility Management Working Group <dmm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmm>, <mailto:dmm-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmm>
List-Post: <mailto:dmm@ietf.org>
List-Help: <mailto:dmm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmm>, <mailto:dmm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 04 Jun 2013 12:49:05 -0000

While I mostly agree the text in -04 I still think it could be enhanced:

   REQ7:  DMM should enable multicast solutions in flexible distribution
          scenario.  This flexibility pertains to the preservation of IP
          multicast nature from the perspective of a mobility entiry and
                                                                ^^^^
          transmission of mulitcast packets to/from varius multicast-
                           ^^^^
          enabled entities.  Therefore, this flexibility enables

I just do not understand what the second sentence tries to say.

          different IP multicast flows with respect to a mobile host to
          be managed (e.g., subscribed, received and/or transmitted)
          using multiple multicast-enabled endpoints.

          Motivation: The motivation of this requirement is to consider
                      ^^^^^^^^^^^^^^^^^^
repetition..                          =20

          multicast early so that solutions can be developed to avoid
          network inefficiency issues in multicast traffic delivery.
          The multicast solution should therefore avoid restricting the
          managment of all IP multicast traffic relative to a host
          ^^^^^^^^^^
          through a dedicated interface on multicast-capable access
          routers.


- JOuni

On Apr 15, 2013, at 11:39 PM, dmm issue tracker =
<trac+dmm@tools.ietf.org> wrote:

> #22: Multicast clarifications
>=20
> 20) Section 4.7
>=20
> 4.7.  Flexible multicast distribution
>=20
>   REQ7:  DMM should enable multicast solutions in flexible =
distribution
>          scenario.  This flexibility enables different IP multicast
>          flows with respect to a mobile host to be managed (e.g.,
>          subscribed, received and/or transmitted) using multiple
>          endpoints.
>=20
> o What is "flexible distribution scenario"? That is not mentioned =
earlier
>  or defined.
> o I would reword the section title to something else like plain
>  "Multicast" or "Multicast considerations".
> o "..using multiple endpoint." is supposed to mean what? I kind of
>  understand that as an aggregation or what does it intend to say?
>=20
> --=20
> =
------------------------------------+------------------------------------
> Reporter:  jouni.nospam@gmail.com  |      Owner:  =
jouni.nospam@gmail.com
>     Type:  defect                  |     Status:  new
> Priority:  major                   |  Milestone:
> Component:  requirements            |    Version:
> Severity:  In WG Last Call         |   Keywords:
> =
------------------------------------+------------------------------------
>=20
> Ticket URL: <http://wiki.tools.ietf.org/wg/dmm/trac/ticket/22>
> dmm <http://tools.ietf.org/dmm/>
>=20


From jouni.nospam@gmail.com  Tue Jun  4 05:50:40 2013
Return-Path: <jouni.nospam@gmail.com>
X-Original-To: dmm@ietfa.amsl.com
Delivered-To: dmm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9053221F9D70 for <dmm@ietfa.amsl.com>; Tue,  4 Jun 2013 05:50:39 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.349
X-Spam-Level: 
X-Spam-Status: No, score=-3.349 tagged_above=-999 required=5 tests=[AWL=0.250,  BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 3cQwDo6oB+Az for <dmm@ietfa.amsl.com>; Tue,  4 Jun 2013 05:50:24 -0700 (PDT)
Received: from mail-lb0-f174.google.com (mail-lb0-f174.google.com [209.85.217.174]) by ietfa.amsl.com (Postfix) with ESMTP id CA54521F99D5 for <dmm@ietf.org>; Tue,  4 Jun 2013 04:26:14 -0700 (PDT)
Received: by mail-lb0-f174.google.com with SMTP id u10so519286lbi.33 for <dmm@ietf.org>; Tue, 04 Jun 2013 04:26:13 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=content-type:mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to:x-mailer; bh=yaHFWDSgwcLBRsQAmh7Ealid3Svix4fiG0IFIzeTm98=; b=biZB5eNYAPS50Y9XomtjyrNrNnyFqTfv+nhFj5MFKdzxMF1xVrpQkWj4AMcn6+ZJRf rXxHMkIav1pqMnlDTuhYe5V090tGm6/7ysYoW6YTiz1/nkKdi0Lg8UTuTKb45GMyaxZ2 sGiCoqAvOhqaEM6X5ZN5PEJPk0jPOf1IPJcPFPkMusi3Cz5lhiMMKMgjuoXU4SBswklL X1dJUBwZKsZTLkHhfwf1aSG0lUzQuqYzoiBSdeH1awZFoYo8oIWy8xX5w+YliO2wKuHd PxZ4i0UzJJ0ZxnNWCJMacvvOdh7W48w11qNHxrrvYxB8NkxzookJCwmhm2goEqIkApi0 D0Mw==
X-Received: by 10.112.155.65 with SMTP id vu1mr12973337lbb.12.1370345173600; Tue, 04 Jun 2013 04:26:13 -0700 (PDT)
Received: from [192.168.250.39] ([194.100.71.98]) by mx.google.com with ESMTPSA id b3sm21700479lbs.8.2013.06.04.04.26.12 for <multiple recipients> (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Tue, 04 Jun 2013 04:26:13 -0700 (PDT)
Content-Type: text/plain; charset=us-ascii
Mime-Version: 1.0 (Mac OS X Mail 6.3 \(1503\))
From: Jouni Korhonen <jouni.nospam@gmail.com>
In-Reply-To: <060.ff08bcc8458f79039abb34d73710fcfb@tools.ietf.org>
Date: Tue, 4 Jun 2013 14:26:11 +0300
Content-Transfer-Encoding: quoted-printable
Message-Id: <BFA10C13-6286-4AE2-89FC-0AEEE30778E7@gmail.com>
References: <060.ff08bcc8458f79039abb34d73710fcfb@tools.ietf.org>
To: "dmm@ietf.org" <dmm@ietf.org>, h chan <h.anthony.chan@huawei.com>
X-Mailer: Apple Mail (2.1503)
Subject: Re: [DMM] [dmm] #25: Security clarifications
X-BeenThere: dmm@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Distributed Mobility Management Working Group <dmm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmm>, <mailto:dmm-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmm>
List-Post: <mailto:dmm@ietf.org>
List-Help: <mailto:dmm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmm>, <mailto:dmm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 04 Jun 2013 12:50:40 -0000

Any comment on this? I did not see anything about on-link/first-hop =
security
mentioned/addressed in -04.

- Jouni


On Apr 15, 2013, at 11:41 PM, dmm issue tracker =
<trac+dmm@tools.ietf.org> wrote:

> #25: Security clarifications
>=20
> 23) Section 5
>=20
>   It is necessary to provide sufficient defense against possible
>   security attacks, or to adopt existing security mechanisms and
>   protocols to provide sufficient security protections.  For instance,
>   EAP-based authentication can be used for access network security,
>   while IPsec can be used for end-to-end security.
>=20
> o EAP-based security does not necessarily address on-link / first
>  hop threats. You gain access, and then can fool around.. does not
>  sound too promising, unless the security considerations can scope
>  the used link type better i.e. in p2p links this might be sufficient
>  but not in all.
>=20
> --=20
> =
------------------------------------+------------------------------------
> Reporter:  jouni.nospam@gmail.com  |      Owner:  =
jouni.nospam@gmail.com
>     Type:  defect                  |     Status:  new
> Priority:  minor                   |  Milestone:
> Component:  requirements            |    Version:
> Severity:  In WG Last Call         |   Keywords:
> =
------------------------------------+------------------------------------
>=20
> Ticket URL: <http://wiki.tools.ietf.org/wg/dmm/trac/ticket/25>
> dmm <http://tools.ietf.org/dmm/>
>=20


From jouni.nospam@gmail.com  Tue Jun  4 05:52:30 2013
Return-Path: <jouni.nospam@gmail.com>
X-Original-To: dmm@ietfa.amsl.com
Delivered-To: dmm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B7CA021F9A78 for <dmm@ietfa.amsl.com>; Tue,  4 Jun 2013 05:52:26 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.932
X-Spam-Level: 
X-Spam-Status: No, score=-2.932 tagged_above=-999 required=5 tests=[AWL=-0.333, BAYES_00=-2.599]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 4227d0gAMwP9 for <dmm@ietfa.amsl.com>; Tue,  4 Jun 2013 05:52:00 -0700 (PDT)
Received: from mail-lb0-f176.google.com (mail-lb0-f176.google.com [209.85.217.176]) by ietfa.amsl.com (Postfix) with ESMTP id B6A2521F9BFE for <dmm@ietf.org>; Tue,  4 Jun 2013 04:26:59 -0700 (PDT)
Received: by mail-lb0-f176.google.com with SMTP id z5so511367lbh.7 for <dmm@ietf.org>; Tue, 04 Jun 2013 04:26:58 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=content-type:mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to:x-mailer; bh=TgmZhcv8G5iLYiFZglBOYBct87kW1fj1Rjy5NPUdreU=; b=mM3nxianqY9kJIJ4XvZs9bDHjeg3KRsztNYUZJZo6NQLo8Ab4MmBmDtpF8fenTWb1w YSEhLkSesnvPg0x/Ef4wK3XfmgWrszi43LFQz/A0L7CEz8Wb7hLirSVFEd3FMW60w5kk P+Sw/0qfge4pZ2UPjQ3594P8wxvYa1W27u2EZlvYW4H5IVgtXNXHK+uuZcJILoPXZi57 KowGSQVpa2iGvLUb/ZKzxvtuRhnrD50CjJh/Ym6qeBjBwvPA3az5x7LfWPO7DF+pAgJo CLwK8K8Po0lVzFI+D9ylts3Y+NdSvSN88ox91BCbMFvb56axmscKvsJgrl047kQslhgq 4BbA==
X-Received: by 10.152.26.225 with SMTP id o1mr13030420lag.43.1370345218356; Tue, 04 Jun 2013 04:26:58 -0700 (PDT)
Received: from [192.168.250.39] ([194.100.71.98]) by mx.google.com with ESMTPSA id b3sm21700479lbs.8.2013.06.04.04.26.53 for <multiple recipients> (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Tue, 04 Jun 2013 04:26:53 -0700 (PDT)
Content-Type: text/plain; charset=us-ascii
Mime-Version: 1.0 (Mac OS X Mail 6.3 \(1503\))
From: Jouni Korhonen <jouni.nospam@gmail.com>
In-Reply-To: <060.34ae6d925aa063be77caffa714364ad4@tools.ietf.org>
Date: Tue, 4 Jun 2013 14:26:53 +0300
Content-Transfer-Encoding: quoted-printable
Message-Id: <BCC5D120-BF56-4236-BBDA-147F96A6646D@gmail.com>
References: <060.34ae6d925aa063be77caffa714364ad4@tools.ietf.org>
To: "dmm@ietf.org" <dmm@ietf.org>, H Anthony Chan <h.a.chan@ieee.org>
X-Mailer: Apple Mail (2.1503)
Subject: Re: [DMM] [dmm] #6: Terminology
X-BeenThere: dmm@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Distributed Mobility Management Working Group <dmm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmm>, <mailto:dmm-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmm>
List-Post: <mailto:dmm@ietf.org>
List-Help: <mailto:dmm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmm>, <mailto:dmm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 04 Jun 2013 12:52:32 -0000

Any comment/opinion on this?

- Jouni

On Apr 15, 2013, at 11:26 PM, dmm issue tracker =
<trac+dmm@tools.ietf.org> wrote:

> #6: Terminology
>=20
> 6) Section 1
>=20
>   and scalability, which require costly network dimensioning and
>=20
> o Ins't distribution dimensioning as well?
>=20
> --=20
> =
------------------------------------+------------------------------------
> Reporter:  jouni.nospam@gmail.com  |      Owner:  =
jouni.nospam@gmail.com
>     Type:  enhancement             |     Status:  new
> Priority:  minor                   |  Milestone:
> Component:  requirements            |    Version:
> Severity:  In WG Last Call         |   Keywords:
> =
------------------------------------+------------------------------------
>=20
> Ticket URL: <http://wiki.tools.ietf.org/wg/dmm/trac/ticket/6>
> dmm <http://tools.ietf.org/dmm/>
>=20


From jouni.nospam@gmail.com  Tue Jun  4 05:54:13 2013
Return-Path: <jouni.nospam@gmail.com>
X-Original-To: dmm@ietfa.amsl.com
Delivered-To: dmm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 29F5D21F9BFB for <dmm@ietfa.amsl.com>; Tue,  4 Jun 2013 05:54:13 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.349
X-Spam-Level: 
X-Spam-Status: No, score=-3.349 tagged_above=-999 required=5 tests=[AWL=0.250,  BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id MsRMzv2MC1UF for <dmm@ietfa.amsl.com>; Tue,  4 Jun 2013 05:53:55 -0700 (PDT)
Received: from mail-lb0-f171.google.com (mail-lb0-f171.google.com [209.85.217.171]) by ietfa.amsl.com (Postfix) with ESMTP id 27E5021F9D34 for <dmm@ietf.org>; Tue,  4 Jun 2013 04:28:42 -0700 (PDT)
Received: by mail-lb0-f171.google.com with SMTP id v5so518298lbc.2 for <dmm@ietf.org>; Tue, 04 Jun 2013 04:28:41 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=content-type:mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to:x-mailer; bh=RuuPHRIDgv5sZg3LEAXxM3IDvhbhhrP1LEHRm2NSSH0=; b=LpD0XO8f3dMzXo747TAu6GvBOzHx3IEU4IfyfaK7PRSBq3udiAyMOAmu/L1nJCmfJm DT/rDKVpqOB0X4a6hOruRL/KEi+9HWyRzswGvyjFEwbvx+eSbbmvOxV2uBh8lOWA5Omf 7tFDk6UG5zltJcEW+vvJNLrGJyxeDoZUuNB4JovWMg9KULD8zHn7ZQIwEIiyIjvEr7I+ PGpa8fqZSXgRLCPnsl6iZcv7VAMQZV3SneFzIQM4t2zwxhE83b2VVl3ZzJT3DyE/LOPF ykwk70iMD7bsjFsW9OpEhnRVPbGiJMYBWYWUXre4haDPXFeDfHzYnXmLTe89ZoJrbWEj SVtg==
X-Received: by 10.112.130.163 with SMTP id of3mr12762225lbb.41.1370345321826;  Tue, 04 Jun 2013 04:28:41 -0700 (PDT)
Received: from [192.168.250.39] ([194.100.71.98]) by mx.google.com with ESMTPSA id n7sm25090888lbd.12.2013.06.04.04.28.38 for <multiple recipients> (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Tue, 04 Jun 2013 04:28:38 -0700 (PDT)
Content-Type: text/plain; charset=us-ascii
Mime-Version: 1.0 (Mac OS X Mail 6.3 \(1503\))
From: Jouni Korhonen <jouni.nospam@gmail.com>
In-Reply-To: <060.9a1988aac0f2e2124d230f80f7f804ee@tools.ietf.org>
Date: Tue, 4 Jun 2013 14:28:37 +0300
Content-Transfer-Encoding: quoted-printable
Message-Id: <81E9F6EA-6B95-489F-BF66-41AB98A9F03A@gmail.com>
References: <060.9a1988aac0f2e2124d230f80f7f804ee@tools.ietf.org>
To: "dmm@ietf.org" <dmm@ietf.org>, H Anthony Chan <h.a.chan@ieee.org>
X-Mailer: Apple Mail (2.1503)
Subject: Re: [DMM] [dmm] #16: Clarifications
X-BeenThere: dmm@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Distributed Mobility Management Working Group <dmm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmm>, <mailto:dmm-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmm>
List-Post: <mailto:dmm@ietf.org>
List-Help: <mailto:dmm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmm>, <mailto:dmm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 04 Jun 2013 12:54:13 -0000

I would like to see a note that states why MIP RO or PMIP LR are not =
adequate.
Just for the completeness.. Is it because a single HA/LMA is still =
maintained?

- Jouni.

On Apr 15, 2013, at 11:35 PM, dmm issue tracker =
<trac+dmm@tools.ietf.org> wrote:

> #16: Clarifications
>=20
> 14) Section 4.1
>=20
>   REQ1:  Distributed deployment
>=20
> o This requirement must imho state why route optimization (MIPv6) or
>  localized routing (PMIPv6) as of today are not adequate/enough. The
>  requirement text itself is OK but the question above needs an answer.
>=20
> --=20
> =
------------------------------------+------------------------------------
> Reporter:  jouni.nospam@gmail.com  |      Owner:  =
jouni.nospam@gmail.com
>     Type:  defect                  |     Status:  new
> Priority:  major                   |  Milestone:
> Component:  requirements            |    Version:
> Severity:  In WG Last Call         |   Keywords:
> =
------------------------------------+------------------------------------
>=20
> Ticket URL: <http://wiki.tools.ietf.org/wg/dmm/trac/ticket/16>
> dmm <http://tools.ietf.org/dmm/>
>=20


From pierrick.seite@orange.com  Tue Jun  4 07:48:24 2013
Return-Path: <pierrick.seite@orange.com>
X-Original-To: dmm@ietfa.amsl.com
Delivered-To: dmm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 245D621F9017 for <dmm@ietfa.amsl.com>; Tue,  4 Jun 2013 07:48:24 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.598
X-Spam-Level: 
X-Spam-Status: No, score=-2.598 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, UNPARSEABLE_RELAY=0.001]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id H-Db3CVrIG95 for <dmm@ietfa.amsl.com>; Tue,  4 Jun 2013 07:48:10 -0700 (PDT)
Received: from relais-inet.francetelecom.com (relais-ias92.francetelecom.com [193.251.215.92]) by ietfa.amsl.com (Postfix) with ESMTP id 981F121F8FAF for <dmm@ietf.org>; Tue,  4 Jun 2013 06:02:14 -0700 (PDT)
Received: from omfedm08.si.francetelecom.fr (unknown [xx.xx.xx.4]) by omfedm14.si.francetelecom.fr (ESMTP service) with ESMTP id 54AEA22D2B5; Tue,  4 Jun 2013 15:02:13 +0200 (CEST)
Received: from Exchangemail-eme1.itn.ftgroup (unknown [10.114.1.186]) by omfedm08.si.francetelecom.fr (ESMTP service) with ESMTP id 32D97238077; Tue,  4 Jun 2013 15:02:13 +0200 (CEST)
Received: from PEXCVZYM12.corporate.adroot.infra.ftgroup ([fe80::81f:1640:4749:5d13]) by PEXCVZYH01.corporate.adroot.infra.ftgroup ([::1]) with mapi id 14.02.0328.009; Tue, 4 Jun 2013 15:02:12 +0200
From: <pierrick.seite@orange.com>
To: Jouni Korhonen <jouni.nospam@gmail.com>, "dmm@ietf.org" <dmm@ietf.org>, "H Anthony Chan" <h.a.chan@ieee.org>
Thread-Topic: [DMM] [dmm] #6: Terminology
Thread-Index: AQHOYSJkf3VdG9rHkk++Uob26YRJ7JklhNPA
Date: Tue, 4 Jun 2013 13:02:12 +0000
Message-ID: <23341_1370350933_51ADE555_23341_16_39_81C77F07008CA24F9783A98CFD706F710F114B@PEXCVZYM12.corporate.adroot.infra.ftgroup>
References: <060.34ae6d925aa063be77caffa714364ad4@tools.ietf.org> <BCC5D120-BF56-4236-BBDA-147F96A6646D@gmail.com>
In-Reply-To: <BCC5D120-BF56-4236-BBDA-147F96A6646D@gmail.com>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.197.38.3]
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-PMX-Version: 5.6.1.2065439, Antispam-Engine: 2.7.2.376379, Antispam-Data: 2013.5.21.113319
Subject: Re: [DMM] [dmm] #6: Terminology
X-BeenThere: dmm@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Distributed Mobility Management Working Group <dmm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmm>, <mailto:dmm-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmm>
List-Post: <mailto:dmm@ietf.org>
List-Help: <mailto:dmm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmm>, <mailto:dmm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 04 Jun 2013 14:48:24 -0000

Suggestion for revision:

s/ and scalability, which require costly network dimensioning /and scalabil=
ity, which require costly network  engineering to resolve./

-----Message d'origine-----
De=A0: dmm-bounces@ietf.org [mailto:dmm-bounces@ietf.org] De la part de Jou=
ni Korhonen
Envoy=E9=A0: mardi 4 juin 2013 13:27
=C0=A0: dmm@ietf.org; H Anthony Chan
Objet=A0: Re: [DMM] [dmm] #6: Terminology


Any comment/opinion on this?

- Jouni

On Apr 15, 2013, at 11:26 PM, dmm issue tracker <trac+dmm@tools.ietf.org> w=
rote:

> #6: Terminology
>=20
> 6) Section 1
>=20
>   and scalability, which require costly network dimensioning and
>=20
> o Ins't distribution dimensioning as well?
>=20
> --=20
> ------------------------------------+------------------------------------
> Reporter:  jouni.nospam@gmail.com  |      Owner:  jouni.nospam@gmail.com
>     Type:  enhancement             |     Status:  new
> Priority:  minor                   |  Milestone:
> Component:  requirements            |    Version:
> Severity:  In WG Last Call         |   Keywords:
> ------------------------------------+------------------------------------
>=20
> Ticket URL: <http://wiki.tools.ietf.org/wg/dmm/trac/ticket/6>
> dmm <http://tools.ietf.org/dmm/>
>=20

_______________________________________________
dmm mailing list
dmm@ietf.org
https://www.ietf.org/mailman/listinfo/dmm

___________________________________________________________________________=
______________________________________________

Ce message et ses pieces jointes peuvent contenir des informations confiden=
tielles ou privilegiees et ne doivent donc
pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu=
 ce message par erreur, veuillez le signaler
a l'expediteur et le detruire ainsi que les pieces jointes. Les messages el=
ectroniques etant susceptibles d'alteration,
France Telecom - Orange decline toute responsabilite si ce message a ete al=
tere, deforme ou falsifie. Merci.

This message and its attachments may contain confidential or privileged inf=
ormation that may be protected by law;
they should not be distributed, used or copied without authorisation.
If you have received this email in error, please notify the sender and dele=
te this message and its attachments.
As emails may be altered, France Telecom - Orange is not liable for message=
s that have been modified, changed or falsified.
Thank you.


From internet-drafts@ietf.org  Wed Jun  5 10:08:46 2013
Return-Path: <internet-drafts@ietf.org>
X-Original-To: dmm@ietfa.amsl.com
Delivered-To: dmm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 11B6621F9C2F; Wed,  5 Jun 2013 10:08:46 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.526
X-Spam-Level: 
X-Spam-Status: No, score=-102.526 tagged_above=-999 required=5 tests=[AWL=0.074, BAYES_00=-2.599, NO_RELAYS=-0.001, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id gp3WqShoEuKd; Wed,  5 Jun 2013 10:08:44 -0700 (PDT)
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id E724E21F9B5E; Wed,  5 Jun 2013 10:08:44 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: quoted-printable
From: internet-drafts@ietf.org
To: i-d-announce@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 4.50
Message-ID: <20130605170844.7443.61240.idtracker@ietfa.amsl.com>
Date: Wed, 05 Jun 2013 10:08:44 -0700
Cc: dmm@ietf.org
Subject: [DMM] I-D Action: draft-ietf-dmm-requirements-05.txt
X-BeenThere: dmm@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Distributed Mobility Management Working Group <dmm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmm>, <mailto:dmm-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmm>
List-Post: <mailto:dmm@ietf.org>
List-Help: <mailto:dmm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmm>, <mailto:dmm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 05 Jun 2013 17:08:46 -0000

A New Internet-Draft is available from the on-line Internet-Drafts director=
ies.
 This draft is a work item of the Distributed Mobility Management Working G=
roup of the IETF.

	Title           : Requirements for Distributed Mobility Management
	Author(s)       : H Anthony Chan
                          Dapeng Liu
                          Pierrick Seite
                          Hidetoshi Yokota
                          Jouni Korhonen
	Filename        : draft-ietf-dmm-requirements-05.txt
	Pages           : 19
	Date            : 2013-06-05

Abstract:
   This document defines the requirements for Distributed Mobility
   Management (DMM) in IPv6 deployments.  The hierarchical structure in
   traditional wireless networks has led to deployment models which are
   in practice centralized.  Mobility management with logically
   centralized mobility anchoring in current mobile networks is prone to
   suboptimal routing and raises scalability issues.  Such centralized
   functions can lead to single points of failure and inevitably
   introduce longer delays and higher signaling loads for network
   operations related to mobility management.  The objective is to
   enhance mobility management in order to meet the primary goals in
   network evolution, i.e., improve scalability, avoid single points of
   failure, enable transparent mobility support to upper layers only
   when needed, and so on.  Distributed mobility management must be
   secure and may co-exist with existing network deployments and end
   hosts.



The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-dmm-requirements

There's also a htmlized version available at:
http://tools.ietf.org/html/draft-ietf-dmm-requirements-05

A diff from the previous version is available at:
http://www.ietf.org/rfcdiff?url2=3Ddraft-ietf-dmm-requirements-05


Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/


From jouni.nospam@gmail.com  Thu Jun  6 13:02:40 2013
Return-Path: <jouni.nospam@gmail.com>
X-Original-To: dmm@ietfa.amsl.com
Delivered-To: dmm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 304A821E809A for <dmm@ietfa.amsl.com>; Thu,  6 Jun 2013 13:02:40 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.6
X-Spam-Level: 
X-Spam-Status: No, score=-2.6 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, NO_RELAYS=-0.001]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id IE5SAodPj3PV for <dmm@ietfa.amsl.com>; Thu,  6 Jun 2013 13:02:39 -0700 (PDT)
Received: from mail-ea0-x230.google.com (mail-ea0-x230.google.com [IPv6:2a00:1450:4013:c01::230]) by ietfa.amsl.com (Postfix) with ESMTP id BAC3011E80FD for <dmm@ietf.org>; Thu,  6 Jun 2013 13:02:29 -0700 (PDT)
Received: by mail-ea0-f176.google.com with SMTP id z15so51545ead.35 for <dmm@ietf.org>; Thu, 06 Jun 2013 13:02:28 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=content-type:mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to:x-mailer; bh=MxZwTjR5kCXMM8xgQjmNcONj8ANpbpLVfJRHWDCNLLk=; b=hk2kzjtKHEoOt5uNALz3dqcnRlACyNIA0GNQMDfSSVe+JdP1WoF1gA+/KrbsIWmCjh R9EAQF2quJP1/S30gqsofqnCjcqM/nLGLd8OqrFaj03a1lNYMiFSmm+lYxkMXX+lpXgi louIyy5nEp4XowHbEos786f4exGCB3ELosRwTQlNJgjgvSJ3ndLXnxyLM+L2uPmKPi+W cuXgy7fo0lwkA4y2DeqqJZB/Qlo5S9Uqse+RWoRhzAp9CoYw8xUW4kFRhhu2C0d9BAmb EHYgRbZbULuBN2OItb4LTqgktwflfe7IU2G/pZyTwi7xUy5M+pP1dBZoAU0mqT5RO7ko n0Qg==
X-Received: by 10.14.179.68 with SMTP id g44mr36147179eem.18.1370548948666; Thu, 06 Jun 2013 13:02:28 -0700 (PDT)
Received: from ?IPv6:2001:1bc8:101:f101:1c8e:e155:cc2:5b3e? ([2001:1bc8:101:f101:1c8e:e155:cc2:5b3e]) by mx.google.com with ESMTPSA id c5sm92646538eeu.8.2013.06.06.13.02.25 for <multiple recipients> (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Thu, 06 Jun 2013 13:02:26 -0700 (PDT)
Content-Type: text/plain; charset=iso-8859-1
Mime-Version: 1.0 (Mac OS X Mail 6.3 \(1503\))
From: Jouni Korhonen <jouni.nospam@gmail.com>
In-Reply-To: <23341_1370350933_51ADE555_23341_16_39_81C77F07008CA24F9783A98CFD706F710F114B@PEXCVZYM12.corporate.adroot.infra.ftgroup>
Date: Thu, 6 Jun 2013 23:02:22 +0300
Content-Transfer-Encoding: quoted-printable
Message-Id: <334F5373-E2C2-4B30-851D-10B904DF5DBD@gmail.com>
References: <060.34ae6d925aa063be77caffa714364ad4@tools.ietf.org> <BCC5D120-BF56-4236-BBDA-147F96A6646D@gmail.com> <23341_1370350933_51ADE555_23341_16_39_81C77F07008CA24F9783A98CFD706F710F114B@PEXCVZYM12.corporate.adroot.infra.ftgroup>
To: pierrick.seite@orange.com
X-Mailer: Apple Mail (2.1503)
Cc: H Anthony Chan <h.a.chan@ieee.org>, "dmm@ietf.org" <dmm@ietf.org>
Subject: Re: [DMM] [dmm] #6: Terminology
X-BeenThere: dmm@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Distributed Mobility Management Working Group <dmm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmm>, <mailto:dmm-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmm>
List-Post: <mailto:dmm@ietf.org>
List-Help: <mailto:dmm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmm>, <mailto:dmm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 06 Jun 2013 20:02:40 -0000

I guess I am ok with this rewording.

- Jouni


On Jun 4, 2013, at 4:02 PM, pierrick.seite@orange.com wrote:

> Suggestion for revision:
>=20
> s/ and scalability, which require costly network dimensioning /and =
scalability, which require costly network  engineering to resolve./
>=20
> -----Message d'origine-----
> De : dmm-bounces@ietf.org [mailto:dmm-bounces@ietf.org] De la part de =
Jouni Korhonen
> Envoy=E9 : mardi 4 juin 2013 13:27
> =C0 : dmm@ietf.org; H Anthony Chan
> Objet : Re: [DMM] [dmm] #6: Terminology
>=20
>=20
> Any comment/opinion on this?
>=20
> - Jouni
>=20
> On Apr 15, 2013, at 11:26 PM, dmm issue tracker =
<trac+dmm@tools.ietf.org> wrote:
>=20
>> #6: Terminology
>>=20
>> 6) Section 1
>>=20
>>  and scalability, which require costly network dimensioning and
>>=20
>> o Ins't distribution dimensioning as well?
>>=20
>> --=20
>> =
------------------------------------+------------------------------------
>> Reporter:  jouni.nospam@gmail.com  |      Owner:  =
jouni.nospam@gmail.com
>>    Type:  enhancement             |     Status:  new
>> Priority:  minor                   |  Milestone:
>> Component:  requirements            |    Version:
>> Severity:  In WG Last Call         |   Keywords:
>> =
------------------------------------+------------------------------------
>>=20
>> Ticket URL: <http://wiki.tools.ietf.org/wg/dmm/trac/ticket/6>
>> dmm <http://tools.ietf.org/dmm/>
>>=20
>=20
> _______________________________________________
> dmm mailing list
> dmm@ietf.org
> https://www.ietf.org/mailman/listinfo/dmm
>=20
> =
__________________________________________________________________________=
_______________________________________________
>=20
> Ce message et ses pieces jointes peuvent contenir des informations =
confidentielles ou privilegiees et ne doivent donc
> pas etre diffuses, exploites ou copies sans autorisation. Si vous avez =
recu ce message par erreur, veuillez le signaler
> a l'expediteur et le detruire ainsi que les pieces jointes. Les =
messages electroniques etant susceptibles d'alteration,
> France Telecom - Orange decline toute responsabilite si ce message a =
ete altere, deforme ou falsifie. Merci.
>=20
> This message and its attachments may contain confidential or =
privileged information that may be protected by law;
> they should not be distributed, used or copied without authorisation.
> If you have received this email in error, please notify the sender and =
delete this message and its attachments.
> As emails may be altered, France Telecom - Orange is not liable for =
messages that have been modified, changed or falsified.
> Thank you.
>=20


From jouni.nospam@gmail.com  Mon Jun 17 02:37:56 2013
Return-Path: <jouni.nospam@gmail.com>
X-Original-To: dmm@ietfa.amsl.com
Delivered-To: dmm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 44F6C21F9B4A for <dmm@ietfa.amsl.com>; Mon, 17 Jun 2013 02:37:56 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.986
X-Spam-Level: 
X-Spam-Status: No, score=-2.986 tagged_above=-999 required=5 tests=[AWL=-0.386, BAYES_00=-2.599]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id fYoLJyg5HYXH for <dmm@ietfa.amsl.com>; Mon, 17 Jun 2013 02:37:55 -0700 (PDT)
Received: from mail-la0-x22c.google.com (mail-la0-x22c.google.com [IPv6:2a00:1450:4010:c03::22c]) by ietfa.amsl.com (Postfix) with ESMTP id B9DFD21F9B09 for <dmm@ietf.org>; Mon, 17 Jun 2013 02:37:54 -0700 (PDT)
Received: by mail-la0-f44.google.com with SMTP id er20so2263104lab.31 for <dmm@ietf.org>; Mon, 17 Jun 2013 02:37:53 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=from:content-type:content-transfer-encoding:subject:message-id:date :to:mime-version:x-mailer; bh=mX5y6ShXq9Vdg+u8Z9neDCwqBHZwH4Y/kGAlFZmx4PU=; b=N1CxvKZGs8TihP4a3x0Z7M6U77p6zAviCS3nKLnIsf7A63+76BsF59bdDGGodWAqP5 GoZrUV3gYqJp0j5IFu/fJH0EayBIBiTwCEVyejQHEGqJk5U7dtWNWYuQDZ3JDWApvODz l5frkLjxK4nDzzF2d9Geux/OJCGxzjhsYxCVk0d7BU521BUo98Ib0+86NLTFeMGmxq97 n1UfX1N1CM/aidriBFvDWa5yhJ7+DV42nvqjeiGCLGo3iZ51LjVyHicZruo7lT/A30AX IZk3NbaaRTH1mcuUJHJdKjfSCGU9FFTmrwJUmNx/FgTtA5W8WKqHvp9z5AWeL4wlPPoU TRcw==
X-Received: by 10.152.87.234 with SMTP id bb10mr1674274lab.55.1371461873524; Mon, 17 Jun 2013 02:37:53 -0700 (PDT)
Received: from [192.168.250.206] ([194.100.71.98]) by mx.google.com with ESMTPSA id p6sm5088518lbv.15.2013.06.17.02.37.52 for <dmm@ietf.org> (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Mon, 17 Jun 2013 02:37:52 -0700 (PDT)
From: Jouni Korhonen <jouni.nospam@gmail.com>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-Id: <83E08F47-2EAB-4696-A81A-F8A46643402B@gmail.com>
Date: Mon, 17 Jun 2013 12:37:51 +0300
To: "dmm@ietf.org" <dmm@ietf.org>
Mime-Version: 1.0 (Mac OS X Mail 6.5 \(1508\))
X-Mailer: Apple Mail (2.1508)
Subject: [DMM] draft-ietf-dmm-requirements progress
X-BeenThere: dmm@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Distributed Mobility Management Working Group <dmm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmm>, <mailto:dmm-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmm>
List-Post: <mailto:dmm@ietf.org>
List-Help: <mailto:dmm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmm>, <mailto:dmm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 17 Jun 2013 09:37:56 -0000

Folks,

After the latest -05 revision we are down to 13 tickets out of 39 in
the issue tracker! I would remind those who issued tickets to check
whether their concerns are addressed and close the corresponding
tickets. If there are more clarifications needed, obviously post your
comments on the list and update the ticket. Once we are done with the
remaining tickets we can take the next steps.

- Jouni & Julien 


From internet-drafts@ietf.org  Mon Jun 17 08:07:08 2013
Return-Path: <internet-drafts@ietf.org>
X-Original-To: dmm@ietfa.amsl.com
Delivered-To: dmm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 282CC21F9D09; Mon, 17 Jun 2013 08:07:08 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.511
X-Spam-Level: 
X-Spam-Status: No, score=-102.511 tagged_above=-999 required=5 tests=[AWL=0.089, BAYES_00=-2.599, NO_RELAYS=-0.001, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id GLO-FUQL7rt3; Mon, 17 Jun 2013 08:07:07 -0700 (PDT)
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id B3CF321F9C95; Mon, 17 Jun 2013 08:07:07 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: quoted-printable
From: internet-drafts@ietf.org
To: i-d-announce@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 4.51.p2
Message-ID: <20130617150707.18413.52999.idtracker@ietfa.amsl.com>
Date: Mon, 17 Jun 2013 08:07:07 -0700
Cc: dmm@ietf.org
Subject: [DMM] I-D Action: draft-ietf-dmm-best-practices-gap-analysis-01.txt
X-BeenThere: dmm@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Distributed Mobility Management Working Group <dmm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmm>, <mailto:dmm-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmm>
List-Post: <mailto:dmm@ietf.org>
List-Help: <mailto:dmm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmm>, <mailto:dmm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 17 Jun 2013 15:07:08 -0000

A New Internet-Draft is available from the on-line Internet-Drafts director=
ies.
 This draft is a work item of the Distributed Mobility Management Working G=
roup of the IETF.

	Title           : Distributed Mobility Management: Current practices and g=
ap analysis
	Author(s)       : Dapeng Liu
                          Juan Carlos Zuniga
                          Pierrick Seite
                          H Anthony Chan
                          Carlos J. Bernardos
	Filename        : draft-ietf-dmm-best-practices-gap-analysis-01.txt
	Pages           : 21
	Date            : 2013-06-17

Abstract:
   The present document analyses deplyment practices of existing
   mobility protocols in a distributed mobility management environment.
   It also identifies some limitations compared to the expected
   functionality of a fully distributed mobility management system.  The
   comparison is made taking into account the identified DMM
   requirements.


The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-dmm-best-practices-gap-analysis

There's also a htmlized version available at:
http://tools.ietf.org/html/draft-ietf-dmm-best-practices-gap-analysis-01

A diff from the previous version is available at:
http://www.ietf.org/rfcdiff?url2=3Ddraft-ietf-dmm-best-practices-gap-analys=
is-01


Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/


From JuanCarlos.Zuniga@InterDigital.com  Mon Jun 17 08:10:49 2013
Return-Path: <JuanCarlos.Zuniga@InterDigital.com>
X-Original-To: dmm@ietfa.amsl.com
Delivered-To: dmm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id ED0F921F998D for <dmm@ietfa.amsl.com>; Mon, 17 Jun 2013 08:10:48 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Geb1tVT7b-3P for <dmm@ietfa.amsl.com>; Mon, 17 Jun 2013 08:10:44 -0700 (PDT)
Received: from smtp-out1.interdigital.com (smtp-out1.interdigital.com [64.208.228.135]) by ietfa.amsl.com (Postfix) with ESMTP id B3FEC21F998A for <dmm@ietf.org>; Mon, 17 Jun 2013 08:10:44 -0700 (PDT)
Received: from SAM.InterDigital.com ([10.30.2.11]) by smtp-out1.interdigital.com with Microsoft SMTPSVC(6.0.3790.4675);  Mon, 17 Jun 2013 11:10:43 -0400
X-MimeOLE: Produced By Microsoft Exchange V6.5
Content-class: urn:content-classes:message
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
Date: Mon, 17 Jun 2013 11:10:42 -0400
Message-ID: <D60519DB022FFA48974A25955FFEC08C052718D2@SAM.InterDigital.com>
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
Thread-Topic: New Version Notification for draft-ietf-dmm-best-practices-gap-analysis-01.txt
Thread-Index: Ac5rbGtlbNRQjFNhSXWjn7dM6W3vRgAAAgvw
From: "Zuniga, Juan Carlos" <JuanCarlos.Zuniga@InterDigital.com>
To: <dmm@ietf.org>
X-OriginalArrivalTime: 17 Jun 2013 15:10:43.0410 (UTC) FILETIME=[D62AEB20:01CE6B6C]
Subject: [DMM] FW: New Version Notification for draft-ietf-dmm-best-practices-gap-analysis-01.txt
X-BeenThere: dmm@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Distributed Mobility Management Working Group <dmm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmm>, <mailto:dmm-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmm>
List-Post: <mailto:dmm@ietf.org>
List-Help: <mailto:dmm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmm>, <mailto:dmm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 17 Jun 2013 15:10:49 -0000
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From jouni.nospam@gmail.com  Tue Jun 18 00:39:51 2013
Return-Path: <jouni.nospam@gmail.com>
X-Original-To: dmm@ietfa.amsl.com
Delivered-To: dmm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AEBCD21F9C22 for <dmm@ietfa.amsl.com>; Tue, 18 Jun 2013 00:39:51 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.792
X-Spam-Level: 
X-Spam-Status: No, score=-2.792 tagged_above=-999 required=5 tests=[AWL=-0.193, BAYES_00=-2.599]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id zqNU+DIZPDsT for <dmm@ietfa.amsl.com>; Tue, 18 Jun 2013 00:39:51 -0700 (PDT)
Received: from mail-la0-x236.google.com (mail-la0-x236.google.com [IPv6:2a00:1450:4010:c03::236]) by ietfa.amsl.com (Postfix) with ESMTP id ED81821F9C15 for <dmm@ietf.org>; Tue, 18 Jun 2013 00:39:50 -0700 (PDT)
Received: by mail-la0-f54.google.com with SMTP id ec20so3249696lab.13 for <dmm@ietf.org>; Tue, 18 Jun 2013 00:39:49 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=from:content-type:content-transfer-encoding:subject:message-id:date :to:mime-version:x-mailer; bh=RdpwMi7b8A+l0ebMAQaRoIj8iw9/1Kft2lqH+nYgBsM=; b=ZKzwPoEjo9d3EFDobsA2d+p1CBMXHmhtR4h6tzBoaY5XYQb8GHccwGw0Kyc5Y/sVcr N+TNdKmz878xFRKBkbolj71x7nYnnCC2b1jwIDIdMwxO653AkZJDpqjMvNPY5CaS9RVg 4f8Z0Sxf/Dgzbs9EkCQH4NWddA7ynCTxR6vtuRmBiRzkfBj9P/hrYTYiikAYBYRAKRSN zn6gU5938m1/Ot8Fcwuh93G4HOK0mjGnIL8dX4Maz1ZUaMM46qYF4VgNhgxEVXUv9gPa Sm+BIOn7Ayv+l1PrxSpU4pPtp/Tx7RIHAwTvhKOzM5IoXRHaj3DW024FCSE7Ma52I3dg P9Xg==
X-Received: by 10.152.43.52 with SMTP id t20mr8511921lal.62.1371541189698; Tue, 18 Jun 2013 00:39:49 -0700 (PDT)
Received: from [192.168.250.166] ([194.100.71.98]) by mx.google.com with ESMTPSA id s3sm6670706lbs.14.2013.06.18.00.39.48 for <dmm@ietf.org> (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Tue, 18 Jun 2013 00:39:49 -0700 (PDT)
From: Jouni Korhonen <jouni.nospam@gmail.com>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-Id: <C9CB264D-1001-402F-93EC-E04CB2831E0B@gmail.com>
Date: Tue, 18 Jun 2013 10:39:47 +0300
To: "dmm@ietf.org" <dmm@ietf.org>
Mime-Version: 1.0 (Mac OS X Mail 6.5 \(1508\))
X-Mailer: Apple Mail (2.1508)
Subject: [DMM] requirements and the security considerations
X-BeenThere: dmm@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Distributed Mobility Management Working Group <dmm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmm>, <mailto:dmm-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmm>
List-Post: <mailto:dmm@ietf.org>
List-Help: <mailto:dmm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmm>, <mailto:dmm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 18 Jun 2013 07:39:51 -0000

<no co-chair cap/bowler>

Folks,

I have been reading Section 6 Security Considerations:

   It is necessary to provide sufficient defense against possible
   security attacks, or to adopt existing security mechanisms and
   protocols to provide sufficient security protections.  For instance,
   EAP-based authentication can be used for access network security,
   while IPsec can be used for end-to-end security.

I think this text still deserves some tweaking. First, "provide sufficient
defense against possible security attacks".. against whom?

Second, should the text say something that the DMM protocol itself 
must not be usable as a tool to launch an attack by a malicious
mobile node that happens to know that it is attached to a network
implementing DMM and knows (somehow) how the DMM protocol functions?

- Jouni

From jouni.nospam@gmail.com  Tue Jun 18 00:44:15 2013
Return-Path: <jouni.nospam@gmail.com>
X-Original-To: dmm@ietfa.amsl.com
Delivered-To: dmm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8E79021F9C62 for <dmm@ietfa.amsl.com>; Tue, 18 Jun 2013 00:44:15 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.321
X-Spam-Level: 
X-Spam-Status: No, score=-3.321 tagged_above=-999 required=5 tests=[AWL=0.278,  BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 3koOutxjZLqr for <dmm@ietfa.amsl.com>; Tue, 18 Jun 2013 00:44:09 -0700 (PDT)
Received: from mail-lb0-f176.google.com (mail-lb0-f176.google.com [209.85.217.176]) by ietfa.amsl.com (Postfix) with ESMTP id 3D04B21F9CF2 for <dmm@ietf.org>; Tue, 18 Jun 2013 00:44:09 -0700 (PDT)
Received: by mail-lb0-f176.google.com with SMTP id z5so3254377lbh.21 for <dmm@ietf.org>; Tue, 18 Jun 2013 00:44:08 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=content-type:mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to:x-mailer; bh=VXkdmVhz0a2h21CzSiswdDvCBOvhwUUUCRd1zHTCFQk=; b=L3ogygrYNGkbkDVLCEnWpLkgpNKK3I9yOClBcXTw+UWW1w6dy2HATnts++l2WP58RH lAOI5J3LcHghjPXN+BpqRlP1665wEODEr7yUJxRrtaBwk2X+d7T+Q0zW+Twtzlm+0Z9b S1rIlIJcDsEejb9iW/h36ny3z+PkVdiuXdtvCyVnkhPgWVQ3zbUaRhgv26vWXNipRR3d labAoOpVU1NMyBV7jIQCP92msuwiNKafGXsufs6fTDkmrnzmo7iwJXe6rW9GGxALfGCP yWUmgfcEFGREyUe8gGxvb/psMpS0bfxIpnSDK6IzyOAKJmayeo4zOaa1fg1OxtVNm0E9 FzkA==
X-Received: by 10.152.27.40 with SMTP id q8mr8472565lag.75.1371541448192; Tue, 18 Jun 2013 00:44:08 -0700 (PDT)
Received: from [192.168.250.166] ([194.100.71.98]) by mx.google.com with ESMTPSA id n7sm6679297lbd.12.2013.06.18.00.44.07 for <multiple recipients> (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Tue, 18 Jun 2013 00:44:07 -0700 (PDT)
Content-Type: text/plain; charset=us-ascii
Mime-Version: 1.0 (Mac OS X Mail 6.5 \(1508\))
From: Jouni Korhonen <jouni.nospam@gmail.com>
In-Reply-To: <16964F03-F728-4342-A2EF-7CF345C135FA@gmail.com>
Date: Tue, 18 Jun 2013 10:44:04 +0300
Content-Transfer-Encoding: 7bit
Message-Id: <5BEE3906-E733-424A-A794-4ACDBE764EDE@gmail.com>
References: <16964F03-F728-4342-A2EF-7CF345C135FA@gmail.com>
To: dmm@ietf.org
X-Mailer: Apple Mail (2.1508)
Cc: dmm-chairs@tools.ietf.org
Subject: Re: [DMM] Call for agenda items for IETF#87 Berlin meeting
X-BeenThere: dmm@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Distributed Mobility Management Working Group <dmm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmm>, <mailto:dmm-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmm>
List-Post: <mailto:dmm@ietf.org>
List-Help: <mailto:dmm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmm>, <mailto:dmm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 18 Jun 2013 07:44:15 -0000

Just a reminder.

- Jouni & Julien

On May 26, 2013, at 6:36 PM, Jouni <jouni.nospam@gmail.com> wrote:

> Folks,
> 
> We have requested for two hour meeting slot. If you feel like
> presenting your work (be that in the current charter or not),
> send a request to the co-chairs. Obviously, chartered items
> will be prioritized over other topics.
> 
> - Jouni & Julien
> 


From hassan.aliahmad@orange.com  Wed Jun 19 05:01:19 2013
Return-Path: <hassan.aliahmad@orange.com>
X-Original-To: dmm@ietfa.amsl.com
Delivered-To: dmm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8C7CB21F9AFB for <dmm@ietfa.amsl.com>; Wed, 19 Jun 2013 05:01:19 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.598
X-Spam-Level: 
X-Spam-Status: No, score=-2.598 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, UNPARSEABLE_RELAY=0.001]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id w2LhRy0pE0OV for <dmm@ietfa.amsl.com>; Wed, 19 Jun 2013 05:01:15 -0700 (PDT)
Received: from relais-inet.francetelecom.com (relais-ias92.francetelecom.com [193.251.215.92]) by ietfa.amsl.com (Postfix) with ESMTP id E114121F91A5 for <dmm@ietf.org>; Wed, 19 Jun 2013 05:01:13 -0700 (PDT)
Received: from omfedm08.si.francetelecom.fr (unknown [xx.xx.xx.4]) by omfedm12.si.francetelecom.fr (ESMTP service) with ESMTP id 7E0D818C8EC; Wed, 19 Jun 2013 14:01:12 +0200 (CEST)
Received: from Exchangemail-eme1.itn.ftgroup (unknown [10.114.1.186]) by omfedm08.si.francetelecom.fr (ESMTP service) with ESMTP id 61EB323807F; Wed, 19 Jun 2013 14:01:12 +0200 (CEST)
Received: from PEXCVZYM11.corporate.adroot.infra.ftgroup ([fe80::a441:e6a9:6143:6f0f]) by PEXCVZYH01.corporate.adroot.infra.ftgroup ([::1]) with mapi id 14.02.0328.009; Wed, 19 Jun 2013 14:01:12 +0200
From: <hassan.aliahmad@orange.com>
To: 'Jouni Korhonen' <jouni.nospam@gmail.com>, "dmm@ietf.org" <dmm@ietf.org>
Thread-Topic: [DMM] draft-ietf-dmm-requirements progress
Thread-Index: AQHOaz5djjD+JirQyUaBUpQ8ZuBOCZk88d6w
Date: Wed, 19 Jun 2013 12:01:11 +0000
Message-ID: <11671_1371643272_51C19D88_11671_7876_1_C5B6A9A3D7D5C941A08B34159DEFE902078AF438@PEXCVZYM11.corporate.adroot.infra.ftgroup>
References: <83E08F47-2EAB-4696-A81A-F8A46643402B@gmail.com>
In-Reply-To: <83E08F47-2EAB-4696-A81A-F8A46643402B@gmail.com>
Accept-Language: en-US, fr-FR
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.197.38.3]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-PMX-Version: 5.6.1.2065439, Antispam-Engine: 2.7.2.376379, Antispam-Data: 2013.6.19.74233
Subject: Re: [DMM] draft-ietf-dmm-requirements progress
X-BeenThere: dmm@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Distributed Mobility Management Working Group <dmm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmm>, <mailto:dmm-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmm>
List-Post: <mailto:dmm@ietf.org>
List-Help: <mailto:dmm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmm>, <mailto:dmm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 19 Jun 2013 12:01:20 -0000

Hello,

It has been said offline, but just to share my view with the others.

I think that the new version considers the issues; I have closed my issues =
and I am in favor of adopting it.

Regards,
Hassan



-----Original Message-----
From: dmm-bounces@ietf.org [mailto:dmm-bounces@ietf.org] On Behalf Of Jouni=
 Korhonen
Sent: Monday, June 17, 2013 11:38 AM
To: dmm@ietf.org
Subject: [DMM] draft-ietf-dmm-requirements progress

Folks,

After the latest -05 revision we are down to 13 tickets out of 39 in
the issue tracker! I would remind those who issued tickets to check
whether their concerns are addressed and close the corresponding
tickets. If there are more clarifications needed, obviously post your
comments on the list and update the ticket. Once we are done with the
remaining tickets we can take the next steps.

- Jouni & Julien=20

_______________________________________________
dmm mailing list
dmm@ietf.org
https://www.ietf.org/mailman/listinfo/dmm

___________________________________________________________________________=
______________________________________________

Ce message et ses pieces jointes peuvent contenir des informations confiden=
tielles ou privilegiees et ne doivent donc
pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu=
 ce message par erreur, veuillez le signaler
a l'expediteur et le detruire ainsi que les pieces jointes. Les messages el=
ectroniques etant susceptibles d'alteration,
France Telecom - Orange decline toute responsabilite si ce message a ete al=
tere, deforme ou falsifie. Merci.

This message and its attachments may contain confidential or privileged inf=
ormation that may be protected by law;
they should not be distributed, used or copied without authorisation.
If you have received this email in error, please notify the sender and dele=
te this message and its attachments.
As emails may be altered, France Telecom - Orange is not liable for message=
s that have been modified, changed or falsified.
Thank you.


From h.anthony.chan@huawei.com  Thu Jun 20 17:15:07 2013
Return-Path: <h.anthony.chan@huawei.com>
X-Original-To: dmm@ietfa.amsl.com
Delivered-To: dmm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2828D21E80EB for <dmm@ietfa.amsl.com>; Thu, 20 Jun 2013 17:15:07 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.599
X-Spam-Level: 
X-Spam-Status: No, score=-6.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 89N+TwmfjylK for <dmm@ietfa.amsl.com>; Thu, 20 Jun 2013 17:14:58 -0700 (PDT)
Received: from lhrrgout.huawei.com (lhrrgout.huawei.com [194.213.3.17]) by ietfa.amsl.com (Postfix) with ESMTP id 329D821E80E1 for <dmm@ietf.org>; Thu, 20 Jun 2013 17:14:58 -0700 (PDT)
Received: from 172.18.7.190 (EHLO lhreml203-edg.china.huawei.com) ([172.18.7.190]) by lhrrg01-dlp.huawei.com (MOS 4.3.5-GA FastPath queued) with ESMTP id AUC79734; Fri, 21 Jun 2013 00:14:55 +0000 (GMT)
Received: from LHREML406-HUB.china.huawei.com (10.201.5.243) by lhreml203-edg.huawei.com (172.18.7.221) with Microsoft SMTP Server (TLS) id 14.1.323.7; Fri, 21 Jun 2013 01:14:16 +0100
Received: from SZXEML417-HUB.china.huawei.com (10.82.67.156) by lhreml406-hub.china.huawei.com (10.201.5.243) with Microsoft SMTP Server (TLS) id 14.1.323.7; Fri, 21 Jun 2013 01:14:53 +0100
Received: from szxeml557-mbx.china.huawei.com ([169.254.5.42]) by szxeml417-hub.china.huawei.com ([10.82.67.156]) with mapi id 14.01.0323.007; Fri, 21 Jun 2013 08:14:49 +0800
From: h chan <h.anthony.chan@huawei.com>
To: Jouni Korhonen <jouni.nospam@gmail.com>, "dmm@ietf.org" <dmm@ietf.org>, "KIM, BYOUNG-JO J (BYOUNG-JO" <macsbug@research.att.com>
Thread-Topic: [DMM] requirements and the security considerations
Thread-Index: AQHOa/cO6+OjSDxRFUaXhLYdLk/Tupk/TbGw
Date: Fri, 21 Jun 2013 00:14:49 +0000
Message-ID: <6E31144C030982429702B11D6746B98C3709289C@szxeml557-mbx.china.huawei.com>
References: <C9CB264D-1001-402F-93EC-E04CB2831E0B@gmail.com>
In-Reply-To: <C9CB264D-1001-402F-93EC-E04CB2831E0B@gmail.com>
Accept-Language: en-US, zh-CN
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.192.11.114]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-CFilter-Loop: Reflected
Cc: Jong-Hyouk Lee <hurryon@gmail.com>
Subject: Re: [DMM] requirements and the security considerations
X-BeenThere: dmm@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Distributed Mobility Management Working Group <dmm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmm>, <mailto:dmm-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmm>
List-Post: <mailto:dmm@ietf.org>
List-Help: <mailto:dmm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmm>, <mailto:dmm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 21 Jun 2013 00:15:07 -0000

The comments from Byoung-Jo Kim to REQ6 and Section 6 in version 4 were the=
 following:
There are too much text in the security REQ6 that are vague and too wide.=20

And Section 6. Security considerations should say "none", 'cause that's usu=
ally the section that discusses security considerations related to the draf=
t itself. Since this is a requirement draft, there is no such thing.
There is a separate requirement earlier to cover security issues due to DMM=
.

REQ6:  Security considerations

          DMM protocol solutions MUST consider security risks introduced
          by DMM into the network.  Examples of such risks to be
          considered may include authentication and authorization mechanism=
s
          that allow a mobile host/router to use the mobility
          support provided by the DMM solution; redirecting traffic to
          the wrong host when providing DMM support; signaling message
          protection for authentication, integrity and confidentiality.

          Motivation: Various attacks such as impersonation, denial of
          service, man-in-the-middle attacks, and so on, may become newly=20
          possible or easier to mount due to the introduction of DMM.  Proo=
f
          of possession of past and new IP addresses may be needed.

H Anthony Chan


-----Original Message-----
From: dmm-bounces@ietf.org [mailto:dmm-bounces@ietf.org] On Behalf Of Jouni=
 Korhonen
Sent: Tuesday, June 18, 2013 2:40 AM
To: dmm@ietf.org
Subject: [DMM] requirements and the security considerations

<no co-chair cap/bowler>

Folks,

I have been reading Section 6 Security Considerations:

   It is necessary to provide sufficient defense against possible
   security attacks, or to adopt existing security mechanisms and
   protocols to provide sufficient security protections.  For instance,
   EAP-based authentication can be used for access network security,
   while IPsec can be used for end-to-end security.

I think this text still deserves some tweaking. First, "provide sufficient =
defense against possible security attacks".. against whom?

Second, should the text say something that the DMM protocol itself must not=
 be usable as a tool to launch an attack by a malicious mobile node that ha=
ppens to know that it is attached to a network implementing DMM and knows (=
somehow) how the DMM protocol functions?

- Jouni
_______________________________________________
dmm mailing list
dmm@ietf.org
https://www.ietf.org/mailman/listinfo/dmm

From h.anthony.chan@huawei.com  Thu Jun 20 17:25:57 2013
Return-Path: <h.anthony.chan@huawei.com>
X-Original-To: dmm@ietfa.amsl.com
Delivered-To: dmm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3D54A21F9433 for <dmm@ietfa.amsl.com>; Thu, 20 Jun 2013 17:25:57 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.599
X-Spam-Level: 
X-Spam-Status: No, score=-6.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id x3-wa1dJsF3O for <dmm@ietfa.amsl.com>; Thu, 20 Jun 2013 17:25:52 -0700 (PDT)
Received: from lhrrgout.huawei.com (lhrrgout.huawei.com [194.213.3.17]) by ietfa.amsl.com (Postfix) with ESMTP id 724E221F855F for <dmm@ietf.org>; Thu, 20 Jun 2013 17:25:52 -0700 (PDT)
Received: from 172.18.7.190 (EHLO lhreml203-edg.china.huawei.com) ([172.18.7.190]) by lhrrg01-dlp.huawei.com (MOS 4.3.5-GA FastPath queued) with ESMTP id AUC80132; Fri, 21 Jun 2013 00:25:51 +0000 (GMT)
Received: from LHREML404-HUB.china.huawei.com (10.201.5.218) by lhreml203-edg.huawei.com (172.18.7.221) with Microsoft SMTP Server (TLS) id 14.1.323.7; Fri, 21 Jun 2013 01:25:14 +0100
Received: from SZXEML463-HUB.china.huawei.com (10.82.67.206) by lhreml404-hub.china.huawei.com (10.201.5.218) with Microsoft SMTP Server (TLS) id 14.1.323.7; Fri, 21 Jun 2013 08:25:50 +0800
Received: from szxeml557-mbx.china.huawei.com ([169.254.5.42]) by szxeml463-hub.china.huawei.com ([10.82.67.206]) with mapi id 14.01.0323.007; Fri, 21 Jun 2013 08:25:43 +0800
From: h chan <h.anthony.chan@huawei.com>
To: Jouni Korhonen <jouni.nospam@gmail.com>, "dmm@ietf.org" <dmm@ietf.org>, "KIM, BYOUNG-JO J (BYOUNG-JO" <macsbug@research.att.com>
Thread-Topic: [DMM] requirements and the security considerations
Thread-Index: AQHOa/cO6+OjSDxRFUaXhLYdLk/Tupk/TbGwgAAD8OA=
Date: Fri, 21 Jun 2013 00:25:43 +0000
Message-ID: <6E31144C030982429702B11D6746B98C370928A2@szxeml557-mbx.china.huawei.com>
References: <C9CB264D-1001-402F-93EC-E04CB2831E0B@gmail.com> 
Accept-Language: en-US, zh-CN
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.192.11.114]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-CFilter-Loop: Reflected
Cc: Jong-Hyouk Lee <hurryon@gmail.com>
Subject: Re: [DMM] requirements and the security considerations
X-BeenThere: dmm@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Distributed Mobility Management Working Group <dmm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmm>, <mailto:dmm-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmm>
List-Post: <mailto:dmm@ietf.org>
List-Help: <mailto:dmm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmm>, <mailto:dmm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 21 Jun 2013 00:25:57 -0000

Seil or Sergio,
Can you reply to the following:

The comments from Byoung-Jo Kim to REQ7 in version 4 is as follows:

I suggest to drop this requirement or make a clearer statement like "DMM sh=
ould allow multicast to survive IP layer mobility without packet loss", or =
more modestly, "DMM should not foreclose multicast support during IP layer =
mobility.", etc..


His suggested text is to replace REQ7 with something like the following:

   REQ7:  DMM SHOULD enable multicast packet delivery during mobility event=
s as needed.

H Anthony Chan


-----Original Message-----
From: h chan=20
Sent: Thursday, June 20, 2013 7:15 PM
To: 'Jouni Korhonen'; dmm@ietf.org; 'KIM, BYOUNG-JO J (BYOUNG-JO'
Cc: 'Jong-Hyouk Lee'
Subject: RE: [DMM] requirements and the security considerations

The comments from Byoung-Jo Kim to REQ6 and Section 6 in version 4 were the=
 following:
There are too much text in the security REQ6 that are vague and too wide.=20

And Section 6. Security considerations should say "none", 'cause that's usu=
ally the section that discusses security considerations related to the draf=
t itself. Since this is a requirement draft, there is no such thing.
There is a separate requirement earlier to cover security issues due to DMM=
.

REQ6:  Security considerations

          DMM protocol solutions MUST consider security risks introduced
          by DMM into the network.  Examples of such risks to be
          considered may include authentication and authorization mechanism=
s
          that allow a mobile host/router to use the mobility
          support provided by the DMM solution; redirecting traffic to
          the wrong host when providing DMM support; signaling message
          protection for authentication, integrity and confidentiality.

          Motivation: Various attacks such as impersonation, denial of
          service, man-in-the-middle attacks, and so on, may become newly=20
          possible or easier to mount due to the introduction of DMM.  Proo=
f
          of possession of past and new IP addresses may be needed.

H Anthony Chan


-----Original Message-----
From: dmm-bounces@ietf.org [mailto:dmm-bounces@ietf.org] On Behalf Of Jouni=
 Korhonen
Sent: Tuesday, June 18, 2013 2:40 AM
To: dmm@ietf.org
Subject: [DMM] requirements and the security considerations

<no co-chair cap/bowler>

Folks,

I have been reading Section 6 Security Considerations:

   It is necessary to provide sufficient defense against possible
   security attacks, or to adopt existing security mechanisms and
   protocols to provide sufficient security protections.  For instance,
   EAP-based authentication can be used for access network security,
   while IPsec can be used for end-to-end security.

I think this text still deserves some tweaking. First, "provide sufficient =
defense against possible security attacks".. against whom?

Second, should the text say something that the DMM protocol itself must not=
 be usable as a tool to launch an attack by a malicious mobile node that ha=
ppens to know that it is attached to a network implementing DMM and knows (=
somehow) how the DMM protocol functions?

- Jouni
_______________________________________________
dmm mailing list
dmm@ietf.org
https://www.ietf.org/mailman/listinfo/dmm

From h.anthony.chan@huawei.com  Thu Jun 20 17:38:05 2013
Return-Path: <h.anthony.chan@huawei.com>
X-Original-To: dmm@ietfa.amsl.com
Delivered-To: dmm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BDC9D21E80EE for <dmm@ietfa.amsl.com>; Thu, 20 Jun 2013 17:38:05 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.599
X-Spam-Level: 
X-Spam-Status: No, score=-6.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id eowp5ZU3qYCH for <dmm@ietfa.amsl.com>; Thu, 20 Jun 2013 17:38:01 -0700 (PDT)
Received: from lhrrgout.huawei.com (lhrrgout.huawei.com [194.213.3.17]) by ietfa.amsl.com (Postfix) with ESMTP id 0C88821E80DC for <dmm@ietf.org>; Thu, 20 Jun 2013 17:38:00 -0700 (PDT)
Received: from 172.18.7.190 (EHLO lhreml204-edg.china.huawei.com) ([172.18.7.190]) by lhrrg01-dlp.huawei.com (MOS 4.3.5-GA FastPath queued) with ESMTP id AUC80615; Fri, 21 Jun 2013 00:37:59 +0000 (GMT)
Received: from LHREML402-HUB.china.huawei.com (10.201.5.241) by lhreml204-edg.china.huawei.com (172.18.7.223) with Microsoft SMTP Server (TLS) id 14.1.323.7; Fri, 21 Jun 2013 01:37:31 +0100
Received: from SZXEML407-HUB.china.huawei.com (10.82.67.94) by lhreml402-hub.china.huawei.com (10.201.5.241) with Microsoft SMTP Server (TLS) id 14.1.323.7; Fri, 21 Jun 2013 01:37:58 +0100
Received: from szxeml557-mbx.china.huawei.com ([169.254.5.42]) by szxeml407-hub.china.huawei.com ([10.82.67.94]) with mapi id 14.01.0323.007; Fri, 21 Jun 2013 08:37:46 +0800
From: h chan <h.anthony.chan@huawei.com>
To: h chan <h.anthony.chan@huawei.com>, Jouni Korhonen <jouni.nospam@gmail.com>, "dmm@ietf.org" <dmm@ietf.org>, "KIM, BYOUNG-JO J (BYOUNG-JO" <macsbug@research.att.com>
Thread-Topic: [DMM] requirements and the security considerations
Thread-Index: AQHOa/cO6+OjSDxRFUaXhLYdLk/Tupk/TbGwgAAJVCA=
Date: Fri, 21 Jun 2013 00:37:46 +0000
Message-ID: <6E31144C030982429702B11D6746B98C370928BF@szxeml557-mbx.china.huawei.com>
References: <C9CB264D-1001-402F-93EC-E04CB2831E0B@gmail.com> <6E31144C030982429702B11D6746B98C3709289C@szxeml557-mbx.china.huawei.com>
In-Reply-To: <6E31144C030982429702B11D6746B98C3709289C@szxeml557-mbx.china.huawei.com>
Accept-Language: en-US, zh-CN
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.192.11.114]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-CFilter-Loop: Reflected
Cc: Jong-Hyouk Lee <hurryon@gmail.com>
Subject: Re: [DMM] requirements and the security considerations
X-BeenThere: dmm@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Distributed Mobility Management Working Group <dmm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmm>, <mailto:dmm-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmm>
List-Post: <mailto:dmm@ietf.org>
List-Help: <mailto:dmm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmm>, <mailto:dmm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 21 Jun 2013 00:38:05 -0000

Can anyone please reply to this:


Text suggested by Byoung-Jo:

REQ6:  Security considerations

          DMM protocol solutions MUST consider security risks introduced
          by DMM into the network.  Examples of such risks to be
          considered may include authentication and authorization mechanism=
s
          that allow a mobile host/router to use the mobility
          support provided by the DMM solution; redirecting traffic to
          the wrong host when providing DMM support; signaling message
          protection for authentication, integrity and confidentiality.

          Motivation: Various attacks such as impersonation, denial of
          service, man-in-the-middle attacks, and so on, may become newly=20
          possible or easier to mount due to the introduction of DMM.  Proo=
f
          of possession of past and new IP addresses may be needed

For comparison, text in version 5 is
   REQ6:  Security considerations

          DMM protocol solutions MUST consider security risks introduced
          by DMM into the network.  Such considerations may include
          authentication and authorization mechanisms that allow a
          mobile host/router to use the mobility support provided by the
          DMM solution; measures against redirecting traffic to the
          wrong host when providing DMM support; signaling message
          protection for authentication, integrity and confidentiality.

          Motivation: Various attacks such as impersonation, denial of
          service, man-in-the-middle attacks, and so on, may become
          newly possible or easier to mount due to the introduction of
          DMM.  Proof of possession of past and new IP addresses may be
          needed.

          Signaling messages can be subject to various attacks since
          they carry critical context information about a mobile node/
          router.  For instance, a malicious node can forge a number of
          signaling messages thus redirecting traffic from its
          legitimate path.  Consequently, the specific node is under a
          denial of service attack, whereas other nodes do not receive
          their traffic.  As signaling messages may travel over the
          Internet, end-to-end security between communicating hosts must

H Anthony Chan


-----Original Message-----
From: dmm-bounces@ietf.org [mailto:dmm-bounces@ietf.org] On Behalf Of h cha=
n
Sent: Thursday, June 20, 2013 7:15 PM
To: Jouni Korhonen; dmm@ietf.org; KIM, BYOUNG-JO J (BYOUNG-JO
Cc: Jong-Hyouk Lee
Subject: Re: [DMM] requirements and the security considerations

The comments from Byoung-Jo Kim to REQ6 and Section 6 in version 4 were the=
 following:
There are too much text in the security REQ6 that are vague and too wide.=20

And Section 6. Security considerations should say "none", 'cause that's usu=
ally the section that discusses security considerations related to the draf=
t itself. Since this is a requirement draft, there is no such thing.
There is a separate requirement earlier to cover security issues due to DMM=
.

REQ6:  Security considerations

          DMM protocol solutions MUST consider security risks introduced
          by DMM into the network.  Examples of such risks to be
          considered may include authentication and authorization mechanism=
s
          that allow a mobile host/router to use the mobility
          support provided by the DMM solution; redirecting traffic to
          the wrong host when providing DMM support; signaling message
          protection for authentication, integrity and confidentiality.

          Motivation: Various attacks such as impersonation, denial of
          service, man-in-the-middle attacks, and so on, may become newly=20
          possible or easier to mount due to the introduction of DMM.  Proo=
f
          of possession of past and new IP addresses may be needed.

H Anthony Chan


-----Original Message-----
From: dmm-bounces@ietf.org [mailto:dmm-bounces@ietf.org] On Behalf Of Jouni=
 Korhonen
Sent: Tuesday, June 18, 2013 2:40 AM
To: dmm@ietf.org
Subject: [DMM] requirements and the security considerations

<no co-chair cap/bowler>

Folks,

I have been reading Section 6 Security Considerations:

   It is necessary to provide sufficient defense against possible
   security attacks, or to adopt existing security mechanisms and
   protocols to provide sufficient security protections.  For instance,
   EAP-based authentication can be used for access network security,
   while IPsec can be used for end-to-end security.

I think this text still deserves some tweaking. First, "provide sufficient =
defense against possible security attacks".. against whom?

Second, should the text say something that the DMM protocol itself must not=
 be usable as a tool to launch an attack by a malicious mobile node that ha=
ppens to know that it is attached to a network implementing DMM and knows (=
somehow) how the DMM protocol functions?

- Jouni
_______________________________________________
dmm mailing list
dmm@ietf.org
https://www.ietf.org/mailman/listinfo/dmm
_______________________________________________
dmm mailing list
dmm@ietf.org
https://www.ietf.org/mailman/listinfo/dmm

From seiljeon@av.it.pt  Fri Jun 21 05:37:19 2013
Return-Path: <seiljeon@av.it.pt>
X-Original-To: dmm@ietfa.amsl.com
Delivered-To: dmm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0382221E8106 for <dmm@ietfa.amsl.com>; Fri, 21 Jun 2013 05:37:19 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.598
X-Spam-Level: 
X-Spam-Status: No, score=-2.598 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id EWYPb+ChbqWW for <dmm@ietfa.amsl.com>; Fri, 21 Jun 2013 05:37:14 -0700 (PDT)
Received: from av.it.pt (mail.av.it.pt [193.136.92.53]) by ietfa.amsl.com (Postfix) with ESMTP id AB0F421E810B for <dmm@ietf.org>; Fri, 21 Jun 2013 05:37:06 -0700 (PDT)
Received: from [192.168.23.78] (account seiljeon@av.it.pt HELO SeilATNOG) by av.it.pt (CommuniGate Pro SMTP 5.4.2) with ESMTPSA id 69784474; Fri, 21 Jun 2013 13:36:59 +0100
From: "Seil Jeon" <seiljeon@av.it.pt>
To: "'h chan'" <h.anthony.chan@huawei.com>, "'Jouni Korhonen'" <jouni.nospam@gmail.com>
References: <C9CB264D-1001-402F-93EC-E04CB2831E0B@gmail.com> <6E31144C030982429702B11D6746B98C370928A2@szxeml557-mbx.china.huawei.com>
In-Reply-To: <6E31144C030982429702B11D6746B98C370928A2@szxeml557-mbx.china.huawei.com>
Date: Fri, 21 Jun 2013 13:36:59 +0100
Message-ID: <000301ce6e7c$063bb760$12b32620$@av.it.pt>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----=_NextPart_000_0004_01CE6E84.68074B50"
X-Mailer: Microsoft Outlook 14.0
Thread-Index: AQIMqymg9PuE5JZ9D7E0aD8SC6a+9QIblnyHmLK9+rA=
Content-Language: ko
Cc: dmm@ietf.org
Subject: Re: [DMM] requirements and the security considerations
X-BeenThere: dmm@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Distributed Mobility Management Working Group <dmm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmm>, <mailto:dmm-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmm>
List-Post: <mailto:dmm@ietf.org>
List-Help: <mailto:dmm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmm>, <mailto:dmm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 21 Jun 2013 12:37:19 -0000

This is a multipart message in MIME format.

------=_NextPart_000_0004_01CE6E84.68074B50
Content-Type: text/plain;
	charset="us-ascii"
Content-Transfer-Encoding: 7bit

Hi, Anthony and all,

 

Actually, when it comes to reviewing BJ's comment, it seems touching very
fundamental statement by mentioning the need of IP layer mobility support
for multicast session (if needed), though this requirement itself has
implicitly included it. But it's ok to me.

 

@Jouni, we respond to the ticket #22 as well.

As you know, we have tried to identify and discuss the meaning of flexible
distribution in the list. If we unfold the meaning hidden in the abstract
words, it would be fit to what you said. But the reworded sentences were
mostly copied from "Motivation" paragraph and arranged. Overall, the
Motivation was reworded.

 

By taking into account two comments, the revised text is as follows.

 

REQ7: DMM SHOULD consider multicast early so that solutions can

be developed not only to provide IP mobility to keep IP multicast sessions
when it is needed, but to avoid network inefficiency issues in multicast
traffic delivery (such as duplicate multicast subscriptions
towards the downstream tunnel entitiesy). The multicast solutions
should therefore avoid restricting the management of all IP
multicast traffic to a single host through a dedicated
(tunnel) interface on multicast-capable access routers.

Motivation: Existing multicast deployment have been introduced after
completing the design of the reference mobility protocol, then optimization
and extensions have been followed, by "patching-up" procedure, thus leading
to network inefficiency and non-optimal routing. The multicast solutions
should therefore be required to consider efficiency nature in multicast
traffic delivery.

 

p.s. @Jouni, I remember #33 ticket was resolved by answering Charlie's
comment. Check it, please.

 

 

Regards,

Seil

 

 

-----Original Message-----
From: dmm-bounces@ietf.org [mailto:dmm-bounces@ietf.org] On Behalf Of h chan
Sent: Friday, June 21, 2013 1:26 AM
To: Jouni Korhonen; dmm@ietf.org; KIM, BYOUNG-JO J (BYOUNG-JO
Cc: Jong-Hyouk Lee
Subject: Re: [DMM] requirements and the security considerations

 

Seil or Sergio,

Can you reply to the following:

 

The comments from Byoung-Jo Kim to REQ7 in version 4 is as follows:

 

I suggest to drop this requirement or make a clearer statement like "DMM
should allow multicast to survive IP layer mobility without packet loss", or
more modestly, "DMM should not foreclose multicast support during IP layer
mobility.", etc..

 

 

His suggested text is to replace REQ7 with something like the following:

 

   REQ7:  DMM SHOULD enable multicast packet delivery during mobility events
as needed.

 

H Anthony Chan

 

 

-----Original Message-----

From: h chan 

Sent: Thursday, June 20, 2013 7:15 PM

To: 'Jouni Korhonen';  <mailto:dmm@ietf.org> dmm@ietf.org; 'KIM, BYOUNG-JO J
(BYOUNG-JO'

Cc: 'Jong-Hyouk Lee'

Subject: RE: [DMM] requirements and the security considerations

 

The comments from Byoung-Jo Kim to REQ6 and Section 6 in version 4 were the
following:

There are too much text in the security REQ6 that are vague and too wide. 

 

And Section 6. Security considerations should say "none", 'cause that's
usually the section that discusses security considerations related to the
draft itself. Since this is a requirement draft, there is no such thing.

There is a separate requirement earlier to cover security issues due to DMM.

 

REQ6:  Security considerations

 

          DMM protocol solutions MUST consider security risks introduced

          by DMM into the network.  Examples of such risks to be

          considered may include authentication and authorization mechanisms

          that allow a mobile host/router to use the mobility

          support provided by the DMM solution; redirecting traffic to

          the wrong host when providing DMM support; signaling message

          protection for authentication, integrity and confidentiality.

 

          Motivation: Various attacks such as impersonation, denial of

          service, man-in-the-middle attacks, and so on, may become newly 

          possible or easier to mount due to the introduction of DMM.  Proof

          of possession of past and new IP addresses may be needed.

 

H Anthony Chan

 

 

-----Original Message-----

From:  <mailto:dmm-bounces@ietf.org> dmm-bounces@ietf.org [
<mailto:dmm-bounces@ietf.org> mailto:dmm-bounces@ietf.org] On Behalf Of
Jouni Korhonen

Sent: Tuesday, June 18, 2013 2:40 AM

To:  <mailto:dmm@ietf.org> dmm@ietf.org

Subject: [DMM] requirements and the security considerations

 

<no co-chair cap/bowler>

 

Folks,

 

I have been reading Section 6 Security Considerations:

 

   It is necessary to provide sufficient defense against possible

   security attacks, or to adopt existing security mechanisms and

   protocols to provide sufficient security protections.  For instance,

   EAP-based authentication can be used for access network security,

   while IPsec can be used for end-to-end security.

 

I think this text still deserves some tweaking. First, "provide sufficient
defense against possible security attacks".. against whom?

 

Second, should the text say something that the DMM protocol itself must not
be usable as a tool to launch an attack by a malicious mobile node that
happens to know that it is attached to a network implementing DMM and knows
(somehow) how the DMM protocol functions?

 

- Jouni

_______________________________________________

dmm mailing list

 <mailto:dmm@ietf.org> dmm@ietf.org

 <https://www.ietf.org/mailman/listinfo/dmm>
https://www.ietf.org/mailman/listinfo/dmm

_______________________________________________

dmm mailing list

 <mailto:dmm@ietf.org> dmm@ietf.org

 <https://www.ietf.org/mailman/listinfo/dmm>
https://www.ietf.org/mailman/listinfo/dmm


------=_NextPart_000_0004_01CE6E84.68074B50
Content-Type: text/html;
	charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" =
xmlns:o=3D"urn:schemas-microsoft-com:office:office" =
xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" =
xmlns=3D"http://www.w3.org/TR/REC-html40"><head><meta =
http-equiv=3DContent-Type content=3D"text/html; =
charset=3Dus-ascii"><meta name=3DGenerator content=3D"Microsoft Word 14 =
(filtered medium)"><style><!--
/* Font Definitions */
@font-face
	{font-family:Gulim;
	panose-1:2 11 6 0 0 1 1 1 1 1;}
@font-face
	{font-family:Gulim;
	panose-1:2 11 6 0 0 1 1 1 1 1;}
@font-face
	{font-family:"Malgun Gothic";
	panose-1:2 11 5 3 2 0 0 2 0 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
@font-face
	{font-family:Gulim;
	panose-1:2 11 6 0 0 1 1 1 1 1;}
@font-face
	{font-family:"Malgun Gothic";
	panose-1:2 11 5 3 2 0 0 2 0 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0cm;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";
	color:windowtext;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
p.MsoPlainText, li.MsoPlainText, div.MsoPlainText
	{mso-style-priority:99;
	mso-style-link:"Plain Text Char";
	margin:0cm;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Arial","sans-serif";
	color:windowtext;}
p
	{mso-style-priority:99;
	mso-margin-top-alt:auto;
	margin-right:0cm;
	mso-margin-bottom-alt:auto;
	margin-left:0cm;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";
	color:black;}
p.MsoAcetate, li.MsoAcetate, div.MsoAcetate
	{mso-style-priority:99;
	mso-style-link:"Balloon Text Char";
	margin:0cm;
	margin-bottom:.0001pt;
	font-size:8.0pt;
	font-family:"Tahoma","sans-serif";
	color:windowtext;}
span.PlainTextChar
	{mso-style-name:"Plain Text Char";
	mso-style-priority:99;
	mso-style-link:"Plain Text";
	font-family:"Arial","sans-serif";}
span.BalloonTextChar
	{mso-style-name:"Balloon Text Char";
	mso-style-priority:99;
	mso-style-link:"Balloon Text";
	font-family:"Tahoma","sans-serif";}
.MsoChpDefault
	{mso-style-type:export-only;
	font-family:"Calibri","sans-serif";}
@page WordSection1
	{size:612.0pt 792.0pt;
	margin:3.0cm 72.0pt 72.0pt 72.0pt;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]--></head><body lang=3DEN-US link=3Dblue =
vlink=3Dpurple><div class=3DWordSection1><p class=3DMsoPlainText>Hi, =
Anthony and all,<o:p></o:p></p><p =
class=3DMsoPlainText><o:p>&nbsp;</o:p></p><p =
class=3DMsoPlainText>Actually, when it comes to reviewing BJ's comment, =
it seems touching very fundamental statement by mentioning the need of =
IP layer mobility support for multicast session (if needed), though this =
requirement itself has implicitly included it. But it's ok to =
me.<o:p></o:p></p><p class=3DMsoPlainText><o:p>&nbsp;</o:p></p><p =
class=3DMsoPlainText>@Jouni, we respond to the ticket #22 as =
well.<o:p></o:p></p><p class=3DMsoPlainText>As you know, we have tried =
to identify and discuss the meaning of flexible distribution in the =
list. If we unfold the meaning hidden in the abstract words, it would be =
fit to what you said. But the reworded sentences were mostly copied from =
&#8220;Motivation&#8221; paragraph and arranged. Overall, the Motivation =
was reworded.<o:p></o:p></p><p =
class=3DMsoPlainText><o:p>&nbsp;</o:p></p><p class=3DMsoPlainText>By =
taking into account two comments, the revised text is as =
follows.<o:p></o:p></p><p class=3DMsoPlainText><o:p>&nbsp;</o:p></p><p =
style=3D'background:#FFFFDD'><span style=3D'font-size:11.0pt'>REQ7: DMM =
SHOULD consider multicast early so that solutions =
can</span><o:p></o:p></p><p style=3D'background:#FFFFDD'><span =
style=3D'font-size:11.0pt'>be developed not only to </span><span =
style=3D'font-size:11.0pt;color:red'>provide IP mobility to keep IP =
multicast sessions when it is needed</span><span =
style=3D'font-size:11.0pt'>, but to avoid network inefficiency issues in =
multicast<br>traffic delivery (such as duplicate multicast =
subscriptions<br>towards the downstream tunnel entit</span><span =
style=3D'font-size:11.0pt;color:red'>ies<s>y</s></span><span =
style=3D'font-size:11.0pt'>). The multicast solution</span><span =
style=3D'font-size:11.0pt;color:red'>s</span><span =
style=3D'font-size:11.0pt'><br>should therefore avoid restricting the =
management of all IP<br>multicast traffic to a single host through a =
dedicated<br>(tunnel) interface on multicast-capable access =
routers.</span><o:p></o:p></p><p style=3D'background:#FFFFDD'><span =
style=3D'font-size:11.0pt'>Motivation: Existing multicast deployment =
have been introduced after completing the design of the reference =
mobility protocol, then optimization and extensions have been followed, =
by &#8220;patching-up&#8221; procedure, thus leading to network =
inefficiency and non-optimal routing. The multicast solutions should =
therefore be required to consider efficiency nature in multicast traffic =
delivery.<o:p></o:p></span></p><p =
class=3DMsoPlainText><o:p>&nbsp;</o:p></p><p class=3DMsoPlainText>p.s. =
@Jouni, I remember #33 ticket was resolved by answering Charlie&#8217;s =
comment. Check it, please.<o:p></o:p></p><p =
class=3DMsoPlainText><o:p>&nbsp;</o:p></p><p =
class=3DMsoPlainText><o:p>&nbsp;</o:p></p><p =
class=3DMsoPlainText>Regards,<o:p></o:p></p><p =
class=3DMsoPlainText>Seil<o:p></o:p></p><p =
class=3DMsoPlainText><o:p>&nbsp;</o:p></p><p =
class=3DMsoPlainText><o:p>&nbsp;</o:p></p><p =
class=3DMsoPlainText>-----Original Message-----<br>From: =
dmm-bounces@ietf.org [mailto:dmm-bounces@ietf.org] On Behalf Of h =
chan<br>Sent: Friday, June 21, 2013 1:26 AM<br>To: Jouni Korhonen; =
dmm@ietf.org; KIM, BYOUNG-JO J (BYOUNG-JO<br>Cc: Jong-Hyouk =
Lee<br>Subject: Re: [DMM] requirements and the security =
considerations</p><p class=3DMsoPlainText><o:p>&nbsp;</o:p></p><p =
class=3DMsoPlainText>Seil or Sergio,<o:p></o:p></p><p =
class=3DMsoPlainText>Can you reply to the following:<o:p></o:p></p><p =
class=3DMsoPlainText><o:p>&nbsp;</o:p></p><p class=3DMsoPlainText>The =
comments from Byoung-Jo Kim to REQ7 in version 4 is as =
follows:<o:p></o:p></p><p class=3DMsoPlainText><o:p>&nbsp;</o:p></p><p =
class=3DMsoPlainText>I suggest to drop this requirement or make a =
clearer statement like &quot;DMM should allow multicast to survive IP =
layer mobility without packet loss&quot;, or more modestly, &quot;DMM =
should not foreclose multicast support during IP layer mobility.&quot;, =
etc..<o:p></o:p></p><p class=3DMsoPlainText><o:p>&nbsp;</o:p></p><p =
class=3DMsoPlainText><o:p>&nbsp;</o:p></p><p class=3DMsoPlainText>His =
suggested text is to replace REQ7 with something like the =
following:<o:p></o:p></p><p class=3DMsoPlainText><o:p>&nbsp;</o:p></p><p =
class=3DMsoPlainText>&nbsp;&nbsp; REQ7:&nbsp; DMM SHOULD enable =
multicast packet delivery during mobility events as =
needed.<o:p></o:p></p><p class=3DMsoPlainText><o:p>&nbsp;</o:p></p><p =
class=3DMsoPlainText>H Anthony Chan<o:p></o:p></p><p =
class=3DMsoPlainText><o:p>&nbsp;</o:p></p><p =
class=3DMsoPlainText><o:p>&nbsp;</o:p></p><p =
class=3DMsoPlainText>-----Original Message-----<o:p></o:p></p><p =
class=3DMsoPlainText>From: h chan <o:p></o:p></p><p =
class=3DMsoPlainText>Sent: Thursday, June 20, 2013 7:15 =
PM<o:p></o:p></p><p class=3DMsoPlainText>To: 'Jouni Korhonen'; <a =
href=3D"mailto:dmm@ietf.org"><span =
style=3D'color:windowtext;text-decoration:none'>dmm@ietf.org</span></a>; =
'KIM, BYOUNG-JO J (BYOUNG-JO'<o:p></o:p></p><p class=3DMsoPlainText>Cc: =
'Jong-Hyouk Lee'<o:p></o:p></p><p class=3DMsoPlainText>Subject: RE: =
[DMM] requirements and the security considerations<o:p></o:p></p><p =
class=3DMsoPlainText><o:p>&nbsp;</o:p></p><p class=3DMsoPlainText>The =
comments from Byoung-Jo Kim to REQ6 and Section 6 in version 4 were the =
following:<o:p></o:p></p><p class=3DMsoPlainText>There are too much text =
in the security REQ6 that are vague and too wide. <o:p></o:p></p><p =
class=3DMsoPlainText><o:p>&nbsp;</o:p></p><p class=3DMsoPlainText>And =
Section 6. Security considerations should say &quot;none&quot;, 'cause =
that's usually the section that discusses security considerations =
related to the draft itself. Since this is a requirement draft, there is =
no such thing.<o:p></o:p></p><p class=3DMsoPlainText>There is a separate =
requirement earlier to cover security issues due to =
DMM.<o:p></o:p></p><p class=3DMsoPlainText><o:p>&nbsp;</o:p></p><p =
class=3DMsoPlainText>REQ6:&nbsp; Security =
considerations<o:p></o:p></p><p =
class=3DMsoPlainText><o:p>&nbsp;</o:p></p><p =
class=3DMsoPlainText>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p; DMM protocol solutions MUST consider security risks =
introduced<o:p></o:p></p><p =
class=3DMsoPlainText>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p; by DMM into the network.&nbsp; Examples of such risks to =
be<o:p></o:p></p><p =
class=3DMsoPlainText>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p; considered may include authentication and authorization =
mechanisms<o:p></o:p></p><p =
class=3DMsoPlainText>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p; that allow a mobile host/router to use the mobility<o:p></o:p></p><p =
class=3DMsoPlainText>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p; support provided by the DMM solution; redirecting traffic =
to<o:p></o:p></p><p =
class=3DMsoPlainText>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p; the wrong host when providing DMM support; signaling =
message<o:p></o:p></p><p =
class=3DMsoPlainText>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p; protection for authentication, integrity and =
confidentiality.<o:p></o:p></p><p =
class=3DMsoPlainText><o:p>&nbsp;</o:p></p><p =
class=3DMsoPlainText>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p; Motivation: Various attacks such as impersonation, denial =
of<o:p></o:p></p><p =
class=3DMsoPlainText>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p; service, man-in-the-middle attacks, and so on, may become newly =
<o:p></o:p></p><p =
class=3DMsoPlainText>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;possible or easier to mount due to the introduction of =
DMM.&nbsp; Proof<o:p></o:p></p><p =
class=3DMsoPlainText>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p; of possession of past and new IP addresses may be =
needed.<o:p></o:p></p><p class=3DMsoPlainText><o:p>&nbsp;</o:p></p><p =
class=3DMsoPlainText>H Anthony Chan<o:p></o:p></p><p =
class=3DMsoPlainText><o:p>&nbsp;</o:p></p><p =
class=3DMsoPlainText><o:p>&nbsp;</o:p></p><p =
class=3DMsoPlainText>-----Original Message-----<o:p></o:p></p><p =
class=3DMsoPlainText>From: <a href=3D"mailto:dmm-bounces@ietf.org"><span =
style=3D'color:windowtext;text-decoration:none'>dmm-bounces@ietf.org</spa=
n></a> [<a href=3D"mailto:dmm-bounces@ietf.org"><span =
style=3D'color:windowtext;text-decoration:none'>mailto:dmm-bounces@ietf.o=
rg</span></a>] On Behalf Of Jouni Korhonen<o:p></o:p></p><p =
class=3DMsoPlainText>Sent: Tuesday, June 18, 2013 2:40 =
AM<o:p></o:p></p><p class=3DMsoPlainText>To: <a =
href=3D"mailto:dmm@ietf.org"><span =
style=3D'color:windowtext;text-decoration:none'>dmm@ietf.org</span></a><o=
:p></o:p></p><p class=3DMsoPlainText>Subject: [DMM] requirements and the =
security considerations<o:p></o:p></p><p =
class=3DMsoPlainText><o:p>&nbsp;</o:p></p><p class=3DMsoPlainText>&lt;no =
co-chair cap/bowler&gt;<o:p></o:p></p><p =
class=3DMsoPlainText><o:p>&nbsp;</o:p></p><p =
class=3DMsoPlainText>Folks,<o:p></o:p></p><p =
class=3DMsoPlainText><o:p>&nbsp;</o:p></p><p class=3DMsoPlainText>I have =
been reading Section 6 Security Considerations:<o:p></o:p></p><p =
class=3DMsoPlainText><o:p>&nbsp;</o:p></p><p =
class=3DMsoPlainText>&nbsp;&nbsp; It is necessary to provide sufficient =
defense against possible<o:p></o:p></p><p =
class=3DMsoPlainText>&nbsp;&nbsp; security attacks, or to adopt existing =
security mechanisms and<o:p></o:p></p><p =
class=3DMsoPlainText>&nbsp;&nbsp; protocols to provide sufficient =
security protections.&nbsp; For instance,<o:p></o:p></p><p =
class=3DMsoPlainText>&nbsp;&nbsp; EAP-based authentication can be used =
for access network security,<o:p></o:p></p><p =
class=3DMsoPlainText>&nbsp;&nbsp; while IPsec can be used for end-to-end =
security.<o:p></o:p></p><p class=3DMsoPlainText><o:p>&nbsp;</o:p></p><p =
class=3DMsoPlainText>I think this text still deserves some tweaking. =
First, &quot;provide sufficient defense against possible security =
attacks&quot;.. against whom?<o:p></o:p></p><p =
class=3DMsoPlainText><o:p>&nbsp;</o:p></p><p =
class=3DMsoPlainText>Second, should the text say something that the DMM =
protocol itself must not be usable as a tool to launch an attack by a =
malicious mobile node that happens to know that it is attached to a =
network implementing DMM and knows (somehow) how the DMM protocol =
functions?<o:p></o:p></p><p class=3DMsoPlainText><o:p>&nbsp;</o:p></p><p =
class=3DMsoPlainText>- Jouni<o:p></o:p></p><p =
class=3DMsoPlainText>_______________________________________________<o:p>=
</o:p></p><p class=3DMsoPlainText>dmm mailing list<o:p></o:p></p><p =
class=3DMsoPlainText><a href=3D"mailto:dmm@ietf.org"><span =
style=3D'color:windowtext;text-decoration:none'>dmm@ietf.org</span></a><o=
:p></o:p></p><p class=3DMsoPlainText><a =
href=3D"https://www.ietf.org/mailman/listinfo/dmm"><span =
style=3D'color:windowtext;text-decoration:none'>https://www.ietf.org/mail=
man/listinfo/dmm</span></a><o:p></o:p></p><p =
class=3DMsoPlainText>_______________________________________________<o:p>=
</o:p></p><p class=3DMsoPlainText>dmm mailing list<o:p></o:p></p><p =
class=3DMsoPlainText><a href=3D"mailto:dmm@ietf.org"><span =
style=3D'color:windowtext;text-decoration:none'>dmm@ietf.org</span></a><o=
:p></o:p></p><p class=3DMsoPlainText><a =
href=3D"https://www.ietf.org/mailman/listinfo/dmm"><span =
style=3D'color:windowtext;text-decoration:none'>https://www.ietf.org/mail=
man/listinfo/dmm</span></a><o:p></o:p></p></div></body></html>
------=_NextPart_000_0004_01CE6E84.68074B50--


From jonghyouk@gmail.com  Sat Jun 22 09:16:37 2013
Return-Path: <jonghyouk@gmail.com>
X-Original-To: dmm@ietfa.amsl.com
Delivered-To: dmm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4E95F21F9362 for <dmm@ietfa.amsl.com>; Sat, 22 Jun 2013 09:16:37 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001, NO_RELAYS=-0.001]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id bS17U-RDOGzT for <dmm@ietfa.amsl.com>; Sat, 22 Jun 2013 09:16:35 -0700 (PDT)
Received: from mail-ve0-x235.google.com (mail-ve0-x235.google.com [IPv6:2607:f8b0:400c:c01::235]) by ietfa.amsl.com (Postfix) with ESMTP id 6B74921F9007 for <dmm@ietf.org>; Sat, 22 Jun 2013 09:16:35 -0700 (PDT)
Received: by mail-ve0-f181.google.com with SMTP id db10so7339351veb.40 for <dmm@ietf.org>; Sat, 22 Jun 2013 09:16:34 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; bh=pboStLExBclsc96HLDc7IsrX6erniF18p8PD9dE4ZI4=; b=fqYlpVONKLViZSWa4MWOPF9IgZ4zkZFfHnYv7Lmtb2L1Ma5oGwZnoEn6qu2Xo+Po93 JMtvuviShh7qsk9mQnSGra/kw1JgtgH2/tTeZNfAZs1s4A7tfqmpimSmVrIr7P0LJnfs 3hIr2alHB/8hqdcJgjXpVhIwkoN9AUnBaU/G7cMIdi9N+jShk4uVpZK1kgIelJCi4/u3 hO2CyJVMN3AZnYqFJ/fxGWFOFgR4UFmZf9t8qIdhlAwmC9kxQh2x7qO/PVzIB5Dpex0D Xz+W2zdguRcTKjd3gKw6A/RyMWge4Ta/UI+yAa2M75ucbPHT8ns/EnXX+dwRB7e/seuM AQ+Q==
MIME-Version: 1.0
X-Received: by 10.58.68.138 with SMTP id w10mr8164472vet.92.1371917794815; Sat, 22 Jun 2013 09:16:34 -0700 (PDT)
Received: by 10.58.201.66 with HTTP; Sat, 22 Jun 2013 09:16:34 -0700 (PDT)
In-Reply-To: <000301ce6e7c$063bb760$12b32620$@av.it.pt>
References: <C9CB264D-1001-402F-93EC-E04CB2831E0B@gmail.com> <6E31144C030982429702B11D6746B98C370928A2@szxeml557-mbx.china.huawei.com> <000301ce6e7c$063bb760$12b32620$@av.it.pt>
Date: Sun, 23 Jun 2013 01:16:34 +0900
Message-ID: <CAB2CD_W3UJVfGQm=tJw6GRCVNeXQA6SixZ7-hx+XzOc=OzNR7Q@mail.gmail.com>
From: Jong-Hyouk Lee <jonghyouk@gmail.com>
To: "dmm@ietf.org" <dmm@ietf.org>, h chan <h.anthony.chan@huawei.com>
Content-Type: multipart/alternative; boundary=047d7b339f27d2360904dfc080b8
Subject: Re: [DMM] requirements and the security considerations
X-BeenThere: dmm@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Distributed Mobility Management Working Group <dmm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmm>, <mailto:dmm-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmm>
List-Post: <mailto:dmm@ietf.org>
List-Help: <mailto:dmm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmm>, <mailto:dmm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 22 Jun 2013 16:16:37 -0000

--047d7b339f27d2360904dfc080b8
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

Hi all,

Here is text for security. Apologize for being late, Anthony.

=3D=3D=3D=3D=3D=3D
5.6.  Security

REQ6: DMM MUST be protected by security mechanisms/protocols in terms of
network access security and end-to-end security. Network access security is
required between the mobile host/router and the access network deploying
DMM, to allow only a legitimate mobile host/router to use DMM. End-to-end
security is required between nodes that participate in DMM, to protect DMM
signaling messages. Existing security mechanisms/protocols MAY be possible
to provide sufficient security protections to DMM. For instance, EAP-based
authentication can be used for network access security, while IPsec can be
used for end-to-end security. Note that when the existing security
mechanisms/protocols are applied to DMM, security risks that MAY be
introduced by DMM MUST be considered to be eliminated.

A security mechanism/protocol that provides proof of possession of past and
new IP addresses of a mobile host/router MAY be needed.

Motivation: Various attacks such as impersonation, denial of service,
man-in-the-middle attacks, and so on, MAY be launched against DMM.
Accordingly, security mechanisms/protocols providing access control,
integrity, authentication, authorization, confidentiality, etc. MUST be
required to protect DMM. For instance, an illegitimate node attempts to
access a network providing DMM. Another example is that a malicious node
can forge a number of signaling messages thus redirecting traffic from its
legitimate path. Consequently, the specific node is under a denial of
service attack, whereas other nodes do not receive their traffic. As
signaling messages MAY travel over the Internet, the end-to-end security
between communicating nodes MUST be required.

This requirement addresses the problems of potentially insecure mobility
management protocols which make deployment infeasible because platforms
conforming to the protocols are at risk for data loss and numerous other
dangers, including financial harm to users. (I leave it to be modified or
improved by Anthony)

6.  Security Considerations
(Now I do not think we need to put text here)
=3D=3D=3D=3D=3D=3D


On Fri, Jun 21, 2013 at 9:36 PM, Seil Jeon <seiljeon@av.it.pt> wrote:

> Hi, Anthony and all,****
>
> ** **
>
> Actually, when it comes to reviewing BJ's comment, it seems touching very
> fundamental statement by mentioning the need of IP layer mobility support
> for multicast session (if needed), though this requirement itself has
> implicitly included it. But it's ok to me.****
>
> ** **
>
> @Jouni, we respond to the ticket #22 as well.****
>
> As you know, we have tried to identify and discuss the meaning of flexibl=
e
> distribution in the list. If we unfold the meaning hidden in the abstract
> words, it would be fit to what you said. But the reworded sentences were
> mostly copied from =E2=80=9CMotivation=E2=80=9D paragraph and arranged. O=
verall, the
> Motivation was reworded.****
>
> ** **
>
> By taking into account two comments, the revised text is as follows.****
>
> ** **
>
> REQ7: DMM SHOULD consider multicast early so that solutions can****
>
> be developed not only to provide IP mobility to keep IP multicast
> sessions when it is needed, but to avoid network inefficiency issues in
> multicast
> traffic delivery (such as duplicate multicast subscriptions
> towards the downstream tunnel entitiesy). The multicast solutions
> should therefore avoid restricting the management of all IP
> multicast traffic to a single host through a dedicated
> (tunnel) interface on multicast-capable access routers.****
>
> Motivation: Existing multicast deployment have been introduced after
> completing the design of the reference mobility protocol, then optimizati=
on
> and extensions have been followed, by =E2=80=9Cpatching-up=E2=80=9D proce=
dure, thus leading
> to network inefficiency and non-optimal routing. The multicast solutions
> should therefore be required to consider efficiency nature in multicast
> traffic delivery.****
>
> ** **
>
> p.s. @Jouni, I remember #33 ticket was resolved by answering Charlie=E2=
=80=99s
> comment. Check it, please.****
>
> ** **
>
> ** **
>
> Regards,****
>
> Seil****
>
> ** **
>
> ** **
>
> -----Original Message-----
> From: dmm-bounces@ietf.org [mailto:dmm-bounces@ietf.org] On Behalf Of h
> chan
> Sent: Friday, June 21, 2013 1:26 AM
> To: Jouni Korhonen; dmm@ietf.org; KIM, BYOUNG-JO J (BYOUNG-JO
> Cc: Jong-Hyouk Lee
> Subject: Re: [DMM] requirements and the security considerations
>
> ** **
>
> Seil or Sergio,****
>
> Can you reply to the following:****
>
> ** **
>
> The comments from Byoung-Jo Kim to REQ7 in version 4 is as follows:****
>
> ** **
>
> I suggest to drop this requirement or make a clearer statement like "DMM
> should allow multicast to survive IP layer mobility without packet loss",
> or more modestly, "DMM should not foreclose multicast support during IP
> layer mobility.", etc..****
>
> ** **
>
> ** **
>
> His suggested text is to replace REQ7 with something like the following:*=
*
> **
>
> ** **
>
>    REQ7:  DMM SHOULD enable multicast packet delivery during mobility
> events as needed.****
>
> ** **
>
> H Anthony Chan****
>
> ** **
>
> ** **
>
> -----Original Message-----****
>
> From: h chan ****
>
> Sent: Thursday, June 20, 2013 7:15 PM****
>
> To: 'Jouni Korhonen'; dmm@ietf.org; 'KIM, BYOUNG-JO J (BYOUNG-JO'****
>
> Cc: 'Jong-Hyouk Lee'****
>
> Subject: RE: [DMM] requirements and the security considerations****
>
> ** **
>
> The comments from Byoung-Jo Kim to REQ6 and Section 6 in version 4 were
> the following:****
>
> There are too much text in the security REQ6 that are vague and too wide.
> ****
>
> ** **
>
> And Section 6. Security considerations should say "none", 'cause that's
> usually the section that discusses security considerations related to the
> draft itself. Since this is a requirement draft, there is no such thing.*=
*
> **
>
> There is a separate requirement earlier to cover security issues due to
> DMM.****
>
> ** **
>
> REQ6:  Security considerations****
>
> ** **
>
>           DMM protocol solutions MUST consider security risks introduced*=
*
> **
>
>           by DMM into the network.  Examples of such risks to be****
>
>           considered may include authentication and authorization
> mechanisms****
>
>           that allow a mobile host/router to use the mobility****
>
>           support provided by the DMM solution; redirecting traffic to***=
*
>
>           the wrong host when providing DMM support; signaling message***=
*
>
>           protection for authentication, integrity and confidentiality.**=
*
> *
>
> ** **
>
>           Motivation: Various attacks such as impersonation, denial of***=
*
>
>           service, man-in-the-middle attacks, and so on, may become newly
> ****
>
>           possible or easier to mount due to the introduction of DMM.
> Proof****
>
>           of possession of past and new IP addresses may be needed.****
>
> ** **
>
> H Anthony Chan****
>
> ** **
>
> ** **
>
> -----Original Message-----****
>
> From: dmm-bounces@ietf.org [mailto:dmm-bounces@ietf.org<dmm-bounces@ietf.=
org>]
> On Behalf Of Jouni Korhonen****
>
> Sent: Tuesday, June 18, 2013 2:40 AM****
>
> To: dmm@ietf.org****
>
> Subject: [DMM] requirements and the security considerations****
>
> ** **
>
> <no co-chair cap/bowler>****
>
> ** **
>
> Folks,****
>
> ** **
>
> I have been reading Section 6 Security Considerations:****
>
> ** **
>
>    It is necessary to provide sufficient defense against possible****
>
>    security attacks, or to adopt existing security mechanisms and****
>
>    protocols to provide sufficient security protections.  For instance,**=
*
> *
>
>    EAP-based authentication can be used for access network security,****
>
>    while IPsec can be used for end-to-end security.****
>
> ** **
>
> I think this text still deserves some tweaking. First, "provide sufficien=
t
> defense against possible security attacks".. against whom?****
>
> ** **
>
> Second, should the text say something that the DMM protocol itself must
> not be usable as a tool to launch an attack by a malicious mobile node th=
at
> happens to know that it is attached to a network implementing DMM and kno=
ws
> (somehow) how the DMM protocol functions?****
>
> ** **
>
> - Jouni****
>
> _______________________________________________****
>
> dmm mailing list****
>
> dmm@ietf.org****
>
> https://www.ietf.org/mailman/listinfo/dmm****
>
> _______________________________________________****
>
> dmm mailing list****
>
> dmm@ietf.org****
>
> https://www.ietf.org/mailman/listinfo/dmm****
>
> _______________________________________________
> dmm mailing list
> dmm@ietf.org
> https://www.ietf.org/mailman/listinfo/dmm
>
>


--=20
RSM Department, TELECOM Bretagne, France
Jong-Hyouk Lee, living somewhere between /dev/null and /dev/random

#email: jonghyouk (at) gmail (dot) com
#webpage: http://sites.google.com/site/hurryon/

--047d7b339f27d2360904dfc080b8
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">Hi all,<div><br></div><div>Here is text for security. Apol=
ogize for being late, Anthony.<br><div><br></div><div><div>=3D=3D=3D=3D=3D=
=3D</div><div>5.6. =C2=A0Security</div><div><br></div><div>REQ6: DMM MUST b=
e protected by security mechanisms/protocols in terms of network access sec=
urity and end-to-end security. Network access security is required between =
the mobile host/router and the access network deploying DMM, to allow only =
a legitimate mobile host/router to use DMM. End-to-end security is required=
 between nodes that participate in DMM, to protect DMM signaling messages. =
Existing security mechanisms/protocols MAY be possible to provide sufficien=
t security protections to DMM. For instance, EAP-based authentication can b=
e used for network access security, while IPsec can be used for end-to-end =
security. Note that when the existing security mechanisms/protocols are app=
lied to DMM, security risks that MAY be introduced by DMM MUST be considere=
d to be eliminated.=C2=A0</div>
<div><br></div><div>A security mechanism/protocol that provides proof of po=
ssession of past and new IP addresses of a mobile host/router MAY be needed=
.</div><div><br></div><div>Motivation: Various attacks such as impersonatio=
n, denial of service, man-in-the-middle attacks, and so on, MAY be launched=
 against DMM. Accordingly, security mechanisms/protocols providing access c=
ontrol, integrity, authentication, authorization, confidentiality, etc. MUS=
T be required to protect DMM. For instance, an illegitimate node attempts t=
o access a network providing DMM. Another example is that a malicious node =
can forge a number of signaling messages thus redirecting traffic from its =
legitimate path. Consequently, the specific node is under a denial of servi=
ce attack, whereas other nodes do not receive their traffic. As signaling m=
essages MAY travel over the Internet, the end-to-end security between commu=
nicating nodes MUST be required.</div>
<div><br></div><div>This requirement addresses the problems of potentially =
insecure mobility management protocols which make deployment infeasible bec=
ause platforms conforming to the protocols are at risk for data loss and nu=
merous other dangers, including financial harm to users. (I leave it to be =
modified or improved by Anthony)</div>
<div><br></div><div>6. =C2=A0Security Considerations</div><div>(Now I do no=
t think we need to put text here)</div><div>=3D=3D=3D=3D=3D=3D</div></div><=
/div></div><div class=3D"gmail_extra"><br><br><div class=3D"gmail_quote">On=
 Fri, Jun 21, 2013 at 9:36 PM, Seil Jeon <span dir=3D"ltr">&lt;<a href=3D"m=
ailto:seiljeon@av.it.pt" target=3D"_blank">seiljeon@av.it.pt</a>&gt;</span>=
 wrote:<br>
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex"><div lang=3D"EN-US" link=3D"blue" vlink=3D"p=
urple"><div><p>Hi, Anthony and all,<u></u><u></u></p><p><u></u>=C2=A0<u></u=
></p><p>Actually, when it comes to reviewing BJ&#39;s comment, it seems tou=
ching very fundamental statement by mentioning the need of IP layer mobilit=
y support for multicast session (if needed), though this requirement itself=
 has implicitly included it. But it&#39;s ok to me.<u></u><u></u></p>
<p><u></u>=C2=A0<u></u></p><p>@Jouni, we respond to the ticket #22 as well.=
<u></u><u></u></p><p>As you know, we have tried to identify and discuss the=
 meaning of flexible distribution in the list. If we unfold the meaning hid=
den in the abstract words, it would be fit to what you said. But the reword=
ed sentences were mostly copied from =E2=80=9CMotivation=E2=80=9D paragraph=
 and arranged. Overall, the Motivation was reworded.<u></u><u></u></p>
<p><u></u>=C2=A0<u></u></p><p>By taking into account two comments, the revi=
sed text is as follows.<u></u><u></u></p><p><u></u>=C2=A0<u></u></p><p styl=
e=3D"background:#ffffdd"><span style=3D"font-size:11.0pt">REQ7: DMM SHOULD =
consider multicast early so that solutions can</span><u></u><u></u></p>
<p style=3D"background:#ffffdd"><span style=3D"font-size:11.0pt">be develop=
ed not only to </span><span style=3D"font-size:11.0pt;color:red">provide IP=
 mobility to keep IP multicast sessions when it is needed</span><span style=
=3D"font-size:11.0pt">, but to avoid network inefficiency issues in multica=
st<br>
traffic delivery (such as duplicate multicast subscriptions<br>towards the =
downstream tunnel entit</span><span style=3D"font-size:11.0pt;color:red">ie=
s<s>y</s></span><span style=3D"font-size:11.0pt">). The multicast solution<=
/span><span style=3D"font-size:11.0pt;color:red">s</span><span style=3D"fon=
t-size:11.0pt"><br>
should therefore avoid restricting the management of all IP<br>multicast tr=
affic to a single host through a dedicated<br>(tunnel) interface on multica=
st-capable access routers.</span><u></u><u></u></p><p style=3D"background:#=
ffffdd">
<span style=3D"font-size:11.0pt">Motivation: Existing multicast deployment =
have been introduced after completing the design of the reference mobility =
protocol, then optimization and extensions have been followed, by =E2=80=9C=
patching-up=E2=80=9D procedure, thus leading to network inefficiency and no=
n-optimal routing. The multicast solutions should therefore be required to =
consider efficiency nature in multicast traffic delivery.<u></u><u></u></sp=
an></p>
<p><u></u>=C2=A0<u></u></p><p>p.s. @Jouni, I remember #33 ticket was resolv=
ed by answering Charlie=E2=80=99s comment. Check it, please.<u></u><u></u><=
/p><p><u></u>=C2=A0<u></u></p><p><u></u>=C2=A0<u></u></p><p>Regards,<u></u>=
<u></u></p><p>Seil<u></u><u></u></p>
<p><u></u>=C2=A0<u></u></p><p><u></u>=C2=A0<u></u></p><p></p><div class=3D"=
im">-----Original Message-----<br>From: <a href=3D"mailto:dmm-bounces@ietf.=
org" target=3D"_blank">dmm-bounces@ietf.org</a> [mailto:<a href=3D"mailto:d=
mm-bounces@ietf.org" target=3D"_blank">dmm-bounces@ietf.org</a>] On Behalf =
Of h chan<br>
Sent: Friday, June 21, 2013 1:26 AM<br>To: Jouni Korhonen; <a href=3D"mailt=
o:dmm@ietf.org" target=3D"_blank">dmm@ietf.org</a>; KIM, BYOUNG-JO J (BYOUN=
G-JO<br>Cc: Jong-Hyouk Lee<br></div><div><div class=3D"h5">Subject: Re: [DM=
M] requirements and the security considerations</div>
</div><p></p><div><div class=3D"h5"><p><u></u>=C2=A0<u></u></p><p>Seil or S=
ergio,<u></u><u></u></p><p>Can you reply to the following:<u></u><u></u></p=
><p><u></u>=C2=A0<u></u></p><p>The comments from Byoung-Jo Kim to REQ7 in v=
ersion 4 is as follows:<u></u><u></u></p>
<p><u></u>=C2=A0<u></u></p><p>I suggest to drop this requirement or make a =
clearer statement like &quot;DMM should allow multicast to survive IP layer=
 mobility without packet loss&quot;, or more modestly, &quot;DMM should not=
 foreclose multicast support during IP layer mobility.&quot;, etc..<u></u><=
u></u></p>
<p><u></u>=C2=A0<u></u></p><p><u></u>=C2=A0<u></u></p><p>His suggested text=
 is to replace REQ7 with something like the following:<u></u><u></u></p><p>=
<u></u>=C2=A0<u></u></p><p>=C2=A0=C2=A0 REQ7:=C2=A0 DMM SHOULD enable multi=
cast packet delivery during mobility events as needed.<u></u><u></u></p>
<p><u></u>=C2=A0<u></u></p><p>H Anthony Chan<u></u><u></u></p><p><u></u>=C2=
=A0<u></u></p><p><u></u>=C2=A0<u></u></p><p>-----Original Message-----<u></=
u><u></u></p><p>From: h chan <u></u><u></u></p><p>Sent: Thursday, June 20, =
2013 7:15 PM<u></u><u></u></p>
<p>To: &#39;Jouni Korhonen&#39;; <a href=3D"mailto:dmm@ietf.org" target=3D"=
_blank"><span style=3D"color:windowtext;text-decoration:none">dmm@ietf.org<=
/span></a>; &#39;KIM, BYOUNG-JO J (BYOUNG-JO&#39;<u></u><u></u></p><p>Cc: &=
#39;Jong-Hyouk Lee&#39;<u></u><u></u></p>
<p>Subject: RE: [DMM] requirements and the security considerations<u></u><u=
></u></p><p><u></u>=C2=A0<u></u></p><p>The comments from Byoung-Jo Kim to R=
EQ6 and Section 6 in version 4 were the following:<u></u><u></u></p><p>Ther=
e are too much text in the security REQ6 that are vague and too wide. <u></=
u><u></u></p>
<p><u></u>=C2=A0<u></u></p><p>And Section 6. Security considerations should=
 say &quot;none&quot;, &#39;cause that&#39;s usually the section that discu=
sses security considerations related to the draft itself. Since this is a r=
equirement draft, there is no such thing.<u></u><u></u></p>
<p>There is a separate requirement earlier to cover security issues due to =
DMM.<u></u><u></u></p><p><u></u>=C2=A0<u></u></p><p>REQ6:=C2=A0 Security co=
nsiderations<u></u><u></u></p><p><u></u>=C2=A0<u></u></p><p>=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 DMM protocol solutions MUST conside=
r security risks introduced<u></u><u></u></p>
<p>=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 by DMM into the n=
etwork.=C2=A0 Examples of such risks to be<u></u><u></u></p><p>=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 considered may include authentic=
ation and authorization mechanisms<u></u><u></u></p><p>=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 that allow a mobile host/router to use=
 the mobility<u></u><u></u></p>
<p>=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 support provided =
by the DMM solution; redirecting traffic to<u></u><u></u></p><p>=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 the wrong host when providing=
 DMM support; signaling message<u></u><u></u></p><p>=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 protection for authentication, integrity =
and confidentiality.<u></u><u></u></p>
<p><u></u>=C2=A0<u></u></p><p>=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0 Motivation: Various attacks such as impersonation, denial of<u></=
u><u></u></p><p>=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 serv=
ice, man-in-the-middle attacks, and so on, may become newly <u></u><u></u><=
/p><p>=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0possible =
or easier to mount due to the introduction of DMM.=C2=A0 Proof<u></u><u></u=
></p>
<p>=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 of possession of =
past and new IP addresses may be needed.<u></u><u></u></p><p><u></u>=C2=A0<=
u></u></p><p>H Anthony Chan<u></u><u></u></p><p><u></u>=C2=A0<u></u></p><p>=
<u></u>=C2=A0<u></u></p><p>-----Original Message-----<u></u><u></u></p>
<p>From: <a href=3D"mailto:dmm-bounces@ietf.org" target=3D"_blank"><span st=
yle=3D"color:windowtext;text-decoration:none">dmm-bounces@ietf.org</span></=
a> [<a href=3D"mailto:dmm-bounces@ietf.org" target=3D"_blank"><span style=
=3D"color:windowtext;text-decoration:none">mailto:dmm-bounces@ietf.org</spa=
n></a>] On Behalf Of Jouni Korhonen<u></u><u></u></p>
<p>Sent: Tuesday, June 18, 2013 2:40 AM<u></u><u></u></p><p>To: <a href=3D"=
mailto:dmm@ietf.org" target=3D"_blank"><span style=3D"color:windowtext;text=
-decoration:none">dmm@ietf.org</span></a><u></u><u></u></p><p>Subject: [DMM=
] requirements and the security considerations<u></u><u></u></p>
<p><u></u>=C2=A0<u></u></p><p>&lt;no co-chair cap/bowler&gt;<u></u><u></u><=
/p><p><u></u>=C2=A0<u></u></p><p>Folks,<u></u><u></u></p><p><u></u>=C2=A0<u=
></u></p><p>I have been reading Section 6 Security Considerations:<u></u><u=
></u></p><p>
<u></u>=C2=A0<u></u></p><p>=C2=A0=C2=A0 It is necessary to provide sufficie=
nt defense against possible<u></u><u></u></p><p>=C2=A0=C2=A0 security attac=
ks, or to adopt existing security mechanisms and<u></u><u></u></p><p>=C2=A0=
=C2=A0 protocols to provide sufficient security protections.=C2=A0 For inst=
ance,<u></u><u></u></p>
<p>=C2=A0=C2=A0 EAP-based authentication can be used for access network sec=
urity,<u></u><u></u></p><p>=C2=A0=C2=A0 while IPsec can be used for end-to-=
end security.<u></u><u></u></p><p><u></u>=C2=A0<u></u></p><p>I think this t=
ext still deserves some tweaking. First, &quot;provide sufficient defense a=
gainst possible security attacks&quot;.. against whom?<u></u><u></u></p>
<p><u></u>=C2=A0<u></u></p><p>Second, should the text say something that th=
e DMM protocol itself must not be usable as a tool to launch an attack by a=
 malicious mobile node that happens to know that it is attached to a networ=
k implementing DMM and knows (somehow) how the DMM protocol functions?<u></=
u><u></u></p>
<p><u></u>=C2=A0<u></u></p><p>- Jouni<u></u><u></u></p><p>_________________=
______________________________<u></u><u></u></p><p>dmm mailing list<u></u><=
u></u></p><p><a href=3D"mailto:dmm@ietf.org" target=3D"_blank"><span style=
=3D"color:windowtext;text-decoration:none">dmm@ietf.org</span></a><u></u><u=
></u></p>
<p><a href=3D"https://www.ietf.org/mailman/listinfo/dmm" target=3D"_blank">=
<span style=3D"color:windowtext;text-decoration:none">https://www.ietf.org/=
mailman/listinfo/dmm</span></a><u></u><u></u></p><p>_______________________=
________________________<u></u><u></u></p>
<p>dmm mailing list<u></u><u></u></p><p><a href=3D"mailto:dmm@ietf.org" tar=
get=3D"_blank"><span style=3D"color:windowtext;text-decoration:none">dmm@ie=
tf.org</span></a><u></u><u></u></p><p><a href=3D"https://www.ietf.org/mailm=
an/listinfo/dmm" target=3D"_blank"><span style=3D"color:windowtext;text-dec=
oration:none">https://www.ietf.org/mailman/listinfo/dmm</span></a><u></u><u=
></u></p>
</div></div></div></div><br>_______________________________________________=
<br>
dmm mailing list<br>
<a href=3D"mailto:dmm@ietf.org">dmm@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/dmm" target=3D"_blank">htt=
ps://www.ietf.org/mailman/listinfo/dmm</a><br>
<br></blockquote></div><br><br clear=3D"all"><div><br></div>-- <br><div>RSM=
 Department, TELECOM Bretagne, France</div><div>Jong-Hyouk Lee, living some=
where between /dev/null and /dev/random</div><div><br></div><div>#email:=C2=
=A0jonghyouk (at) gmail (dot) com</div>
<div>#webpage: <a href=3D"http://sites.google.com/site/hurryon/" target=3D"=
_blank">http://sites.google.com/site/hurryon/</a></div>
</div>

--047d7b339f27d2360904dfc080b8--

From rute.sofia@ulusofona.pt  Mon Jun 24 03:50:52 2013
Return-Path: <rute.sofia@ulusofona.pt>
X-Original-To: dmm@ietfa.amsl.com
Delivered-To: dmm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1105A21E80DF for <dmm@ietfa.amsl.com>; Mon, 24 Jun 2013 03:50:52 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id By-v9zzDatVT for <dmm@ietfa.amsl.com>; Mon, 24 Jun 2013 03:50:51 -0700 (PDT)
Received: from mail-bk0-x229.google.com (mail-bk0-x229.google.com [IPv6:2a00:1450:4008:c01::229]) by ietfa.amsl.com (Postfix) with ESMTP id DB9A821E80DB for <dmm@ietf.org>; Mon, 24 Jun 2013 03:50:49 -0700 (PDT)
Received: by mail-bk0-f41.google.com with SMTP id jc3so4167900bkc.28 for <dmm@ietf.org>; Mon, 24 Jun 2013 03:50:48 -0700 (PDT)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=message-id:date:from:user-agent:mime-version:to:subject :content-type:content-transfer-encoding:x-gm-message-state; bh=3OltOFw99iyYEpvh87TOrdjEAfCgH13gzvBXnvThfB8=; b=EcIcScuSpb9gxfgbgIVGbVp7dP2+mJmFR1iTVYGd3XzBvWB0gQe4NAp+ZzQ89oNZEW EbcMYQy+FloHLtdsRWjP3iW5HuNHpMraKWHeisDB1CxWMQnUELfS903+CXWmbqDPLsyw lrIV9tP4GB1Bb7MTxWyhIp/JTUZPmnpOgJhM0iK8tiqKGMyXKTSHPWrYUOXbWgNOOM3Y gCy7hcceI9f7KtozziboD/2MC8q274/FCwfJw3FsAB7I3k50yJ9MLj2LkpS467GTfc5a UTEwD156LT7UYs+sPKoVp2IS//jD9go+7Wtt9QUFzR7S5OklDpNFFc5m4klXhhA8OoSN zT+g==
X-Received: by 10.205.24.81 with SMTP id rd17mr3635362bkb.138.1372071048469; Mon, 24 Jun 2013 03:50:48 -0700 (PDT)
Received: from linux-8b5g.lan (sitivoip.ulusofona.pt. [193.137.75.156]) by mx.google.com with ESMTPSA id oe10sm4279151bkb.1.2013.06.24.03.50.46 for <multiple recipients> (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Mon, 24 Jun 2013 03:50:47 -0700 (PDT)
Message-ID: <51C82485.1000906@ulusofona.pt>
Date: Mon, 24 Jun 2013 11:50:45 +0100
From: Rute Sofia <rute.sofia@ulusofona.pt>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:17.0) Gecko/20130510 Thunderbird/17.0.6
MIME-Version: 1.0
To: dmm@ietf.org, dmm-chairs@tools.ietf.org
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
X-Gm-Message-State: ALoCoQnGmDz5xjUKscxvv3B5MfxSFafLw6Ulej1QKcGJ5sUYhP/hk8RokZgPx1m7WDqDT47J8fO7
Subject: [DMM] DMM at IETF 87, contributions
X-BeenThere: dmm@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Distributed Mobility Management Working Group <dmm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmm>, <mailto:dmm-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmm>
List-Post: <mailto:dmm@ietf.org>
List-Help: <mailto:dmm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmm>, <mailto:dmm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 24 Jun 2013 10:50:52 -0000

Dear Jouni and Julien,

as the IETF 87th meeting is approaching, I would like to know if the 
2-hour reserved DMM slot is still up, and if there is still room to 
propose contributions.

Best Regards,

-- 
Melhores Cumprimentos/Best Regards/mit freundlichen Gruessen,

Rute Carvalho Sofia


........................................................
Rute Sofia, PhD (rute.sofia@ulusofona.pt)
SITILABS - R&D in Informatics Systems and Technologies
Scientific Director for Technology
University Lusofona, Portugal
rute.sofia@ulusofona.pt

http://siti.ulusofona.pt
Tel.: +351 21 7505021/20
.......................................................


From jouni.nospam@gmail.com  Tue Jun 25 12:42:07 2013
Return-Path: <jouni.nospam@gmail.com>
X-Original-To: dmm@ietfa.amsl.com
Delivered-To: dmm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 477F011E8137 for <dmm@ietfa.amsl.com>; Tue, 25 Jun 2013 12:42:07 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[AWL=-0.000, BAYES_00=-2.599]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id wm-IUfWubq4E for <dmm@ietfa.amsl.com>; Tue, 25 Jun 2013 12:42:06 -0700 (PDT)
Received: from mail-ea0-x22f.google.com (mail-ea0-x22f.google.com [IPv6:2a00:1450:4013:c01::22f]) by ietfa.amsl.com (Postfix) with ESMTP id 25A7111E8130 for <dmm@ietf.org>; Tue, 25 Jun 2013 12:42:02 -0700 (PDT)
Received: by mail-ea0-f175.google.com with SMTP id z7so6953903eaf.20 for <dmm@ietf.org>; Tue, 25 Jun 2013 12:42:01 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=content-type:mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to:x-mailer; bh=HWSxeWFL69FeuDFBoHugAPQax3GTwNPREIA/qkzckwk=; b=O4/jh3sQcobJR2e4hjGOEsyiO5Bz+P9XsPbH4s8EiiBa5onFZpp9gXIsDq3xeNZoGD kjAXMjfka4jKdSJ13GoPIGf0ZllM6pWXmxGcw+e1MK+23kmb1WSof3HQX/CQtaPvFmCR JE2PVsqG/0LAbE7CEyxSmEuO5RZUi5ekznT/lp383H+7zN1LwnTAHuHXXFBlHQF5fZvz 7RhxhzuomA0qiX4NEwOMQ0dC/h4tZJSUclmcxUlVbV0jcDIcrxCVkHpsHB0mQLhOFG3M LRi296yILh3piepSjitajsfmdJTd2DhqgxwnTJJ3bSgMZ0ATBBOEaIg9qakCoTP4Mo5U zVGw==
X-Received: by 10.14.6.198 with SMTP id 46mr474656een.121.1372189321097; Tue, 25 Jun 2013 12:42:01 -0700 (PDT)
Received: from [188.117.15.110] ([188.117.15.110]) by mx.google.com with ESMTPSA id w43sm38194301eez.6.2013.06.25.12.41.59 for <multiple recipients> (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Tue, 25 Jun 2013 12:42:00 -0700 (PDT)
Content-Type: text/plain; charset=us-ascii
Mime-Version: 1.0 (Mac OS X Mail 6.5 \(1508\))
From: Jouni Korhonen <jouni.nospam@gmail.com>
In-Reply-To: <51C82485.1000906@ulusofona.pt>
Date: Tue, 25 Jun 2013 22:41:58 +0300
Content-Transfer-Encoding: quoted-printable
Message-Id: <B871E124-4C49-447C-B61F-6D88E9A3E213@gmail.com>
References: <51C82485.1000906@ulusofona.pt>
To: Rute Sofia <rute.sofia@ulusofona.pt>
X-Mailer: Apple Mail (2.1508)
Cc: dmm@ietf.org, dmm-chairs@tools.ietf.org
Subject: Re: [DMM] DMM at IETF 87, contributions
X-BeenThere: dmm@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Distributed Mobility Management Working Group <dmm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmm>, <mailto:dmm-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmm>
List-Post: <mailto:dmm@ietf.org>
List-Help: <mailto:dmm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmm>, <mailto:dmm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 25 Jun 2013 19:42:07 -0000

The IETF wide draft agenda is due 27th June. We are still supposed to =
have
our DMM WG meeting. Agenda slots for the WG meeting are given typically =
using
the algorithm: first WG items, second chartered/milestoned but still =
individual
work usually using fifo order, and last the rest in fifo order till the =
slot
time runs out.

- Jouni


On Jun 24, 2013, at 1:50 PM, Rute Sofia <rute.sofia@ulusofona.pt> wrote:

> Dear Jouni and Julien,
>=20
> as the IETF 87th meeting is approaching, I would like to know if the =
2-hour reserved DMM slot is still up, and if there is still room to =
propose contributions.
>=20
> Best Regards,
>=20
> --=20
> Melhores Cumprimentos/Best Regards/mit freundlichen Gruessen,
>=20
> Rute Carvalho Sofia
>=20
>=20
> ........................................................
> Rute Sofia, PhD (rute.sofia@ulusofona.pt)
> SITILABS - R&D in Informatics Systems and Technologies
> Scientific Director for Technology
> University Lusofona, Portugal
> rute.sofia@ulusofona.pt
>=20
> http://siti.ulusofona.pt
> Tel.: +351 21 7505021/20
> .......................................................
>=20
> _______________________________________________
> dmm mailing list
> dmm@ietf.org
> https://www.ietf.org/mailman/listinfo/dmm


From jouni.nospam@gmail.com  Tue Jun 25 12:47:06 2013
Return-Path: <jouni.nospam@gmail.com>
X-Original-To: dmm@ietfa.amsl.com
Delivered-To: dmm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 40EC321E80CE for <dmm@ietfa.amsl.com>; Tue, 25 Jun 2013 12:47:06 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[AWL=-0.000, BAYES_00=-2.599]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id YHmoc9TA4fmi for <dmm@ietfa.amsl.com>; Tue, 25 Jun 2013 12:47:05 -0700 (PDT)
Received: from mail-ea0-x235.google.com (mail-ea0-x235.google.com [IPv6:2a00:1450:4013:c01::235]) by ietfa.amsl.com (Postfix) with ESMTP id C700421E80CD for <dmm@ietf.org>; Tue, 25 Jun 2013 12:47:04 -0700 (PDT)
Received: by mail-ea0-f181.google.com with SMTP id a15so7114626eae.40 for <dmm@ietf.org>; Tue, 25 Jun 2013 12:47:03 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=content-type:mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to:x-mailer; bh=IRASglmbKyLxSCw7Mve5TGvXRjm+175+mFjHL3VsPCA=; b=sGKTjc0KQgYNwxgUpFReCHycL205jYjyrX8n1VgRU4uNgb52MEyFSMkWBoE5eX8kot 3/cmuEA/7a+xH+0dVHFEvkdEiyAsUj/FAL11hOEV/LnLjsLFZxY5ZrP6Fiukz1o/Iihj O5jaQnJX7RoM3GXWGvTbNK5Oj+FTMrUCxaYjhLhrBkvDLEPNZJ9y4e1764ASxCC6OvPg wq0gl0iDOvSs2LJr5F4OjcE3ZRa6szdx8wYiMYA7nAkUxQzs/isSsn6K9pGRVMXEFxIu FQZ001jPzQsainXFFkG3/yWkrt566gU/p+OizH+/LhuxIbQm74ueqYFam3rxLRsVRagg Wcfg==
X-Received: by 10.14.47.73 with SMTP id s49mr559998eeb.71.1372189623602; Tue, 25 Jun 2013 12:47:03 -0700 (PDT)
Received: from [188.117.15.110] ([188.117.15.110]) by mx.google.com with ESMTPSA id o5sm38225938eef.5.2013.06.25.12.46.59 for <multiple recipients> (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Tue, 25 Jun 2013 12:47:00 -0700 (PDT)
Content-Type: text/plain; charset=windows-1252
Mime-Version: 1.0 (Mac OS X Mail 6.5 \(1508\))
From: Jouni Korhonen <jouni.nospam@gmail.com>
In-Reply-To: <000301ce6e7c$063bb760$12b32620$@av.it.pt>
Date: Tue, 25 Jun 2013 22:46:58 +0300
Content-Transfer-Encoding: quoted-printable
Message-Id: <4A026278-F5A5-4A89-9CE2-AC6DC12A9343@gmail.com>
References: <C9CB264D-1001-402F-93EC-E04CB2831E0B@gmail.com> <6E31144C030982429702B11D6746B98C370928A2@szxeml557-mbx.china.huawei.com> <000301ce6e7c$063bb760$12b32620$@av.it.pt>
To: Seil Jeon <seiljeon@av.it.pt>, "Charles E. Perkins" <charliep@computer.org>
X-Mailer: Apple Mail (2.1508)
Cc: dmm@ietf.org
Subject: Re: [DMM] requirements and the security considerations
X-BeenThere: dmm@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Distributed Mobility Management Working Group <dmm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmm>, <mailto:dmm-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmm>
List-Post: <mailto:dmm@ietf.org>
List-Help: <mailto:dmm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmm>, <mailto:dmm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 25 Jun 2013 19:47:06 -0000

Sorry for the slow response. I am supposed to be on my summer vacation =
;)


On Jun 21, 2013, at 3:36 PM, Seil Jeon <seiljeon@av.it.pt> wrote:

> p.s. @Jouni, I remember #33 ticket was resolved by answering Charlie=92s=
 comment. Check it, please.

Probably. However, this issue was not recorded by me so I have not
cleared it either automatically.

@Charlie: does -05 address your concern on #33 ?

- Jouni




> =20
> =20
> Regards,
> Seil
> =20
> =20

From jouni.nospam@gmail.com  Tue Jun 25 12:58:26 2013
Return-Path: <jouni.nospam@gmail.com>
X-Original-To: dmm@ietfa.amsl.com
Delivered-To: dmm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1706821E805F for <dmm@ietfa.amsl.com>; Tue, 25 Jun 2013 12:58:26 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[AWL=-0.000, BAYES_00=-2.599]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id gZKy7zkmV7cY for <dmm@ietfa.amsl.com>; Tue, 25 Jun 2013 12:58:25 -0700 (PDT)
Received: from mail-ee0-x235.google.com (mail-ee0-x235.google.com [IPv6:2a00:1450:4013:c00::235]) by ietfa.amsl.com (Postfix) with ESMTP id 3F70F21E804D for <dmm@ietf.org>; Tue, 25 Jun 2013 12:58:24 -0700 (PDT)
Received: by mail-ee0-f53.google.com with SMTP id c41so7011886eek.26 for <dmm@ietf.org>; Tue, 25 Jun 2013 12:58:24 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=content-type:mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to:x-mailer; bh=R4gyFmIvOi1fcBVRJjei6P1WzpgAn5BXBWdkcJ5/62A=; b=Gj1d8Yr+M78tk5GN6IrU/NvyopDDx4qHDm03RcrZIxQxfdVa7Rg970o3MrHuQLaOho nm4SvqW/Fn9e0jpbhU5bgarv8h1L3NJ0HT1YanSoEnHz1Ex8hcYc+qBjRHPYCtoHXvDD Tl2fvS0FRS/rfp2J0bcOfKQEpqtePGKizeD6TwhOF+BKyoJoRh4Kkct+JcpnHXs9EIF8 52y1k0ipBbupNJXU0a8/bltyMlNuuekd+ua4VfTzSJ+lIwGJNf2w3/9Aa3uxrCr0rtMr UzGQYkyAOYH51BtjTyVGYOxEQsfJQRetbvEtmqPhvZ0OG0yxJ203UgJ2rOamXLLhk058 awZw==
X-Received: by 10.14.199.134 with SMTP id x6mr543374een.114.1372190304256; Tue, 25 Jun 2013 12:58:24 -0700 (PDT)
Received: from [188.117.15.110] ([188.117.15.110]) by mx.google.com with ESMTPSA id bj46sm38266395eeb.13.2013.06.25.12.58.23 for <multiple recipients> (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Tue, 25 Jun 2013 12:58:23 -0700 (PDT)
Content-Type: text/plain; charset=us-ascii
Mime-Version: 1.0 (Mac OS X Mail 6.5 \(1508\))
From: Jouni Korhonen <jouni.nospam@gmail.com>
In-Reply-To: <6E31144C030982429702B11D6746B98C3709289C@szxeml557-mbx.china.huawei.com>
Date: Tue, 25 Jun 2013 22:58:22 +0300
Content-Transfer-Encoding: quoted-printable
Message-Id: <14AA4109-B449-4A00-9487-476086DD8540@gmail.com>
References: <C9CB264D-1001-402F-93EC-E04CB2831E0B@gmail.com> <6E31144C030982429702B11D6746B98C3709289C@szxeml557-mbx.china.huawei.com>
To: h chan <h.anthony.chan@huawei.com>
X-Mailer: Apple Mail (2.1508)
Cc: Jong-Hyouk Lee <hurryon@gmail.com>, "dmm@ietf.org" <dmm@ietf.org>
Subject: Re: [DMM] requirements and the security considerations
X-BeenThere: dmm@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Distributed Mobility Management Working Group <dmm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmm>, <mailto:dmm-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmm>
List-Post: <mailto:dmm@ietf.org>
List-Help: <mailto:dmm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmm>, <mailto:dmm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 25 Jun 2013 19:58:26 -0000

On Jun 21, 2013, at 3:14 AM, h chan <h.anthony.chan@huawei.com> wrote:

> The comments from Byoung-Jo Kim to REQ6 and Section 6 in version 4 =
were the following:
> There are too much text in the security REQ6 that are vague and too =
wide.=20
>=20
> And Section 6. Security considerations should say "none", 'cause =
that's usually the section that discusses security considerations =
related to the draft itself. Since this is a requirement draft, there is =
no such thing.
> There is a separate requirement earlier to cover security issues due =
to DMM.

In some recent requirements documents I have seen rather extensive
Security Consideration sections. What I would assume to see here, is
a generic discussion on the security considerations on distributed
environment. That is not about requirements itself per se.

- JOuni (as an individual.. too hot here to wear any hat etc :)


>=20
> REQ6:  Security considerations
>=20
>          DMM protocol solutions MUST consider security risks =
introduced
>          by DMM into the network.  Examples of such risks to be
>          considered may include authentication and authorization =
mechanisms
>          that allow a mobile host/router to use the mobility
>          support provided by the DMM solution; redirecting traffic to
>          the wrong host when providing DMM support; signaling message
>          protection for authentication, integrity and confidentiality.
>=20
>          Motivation: Various attacks such as impersonation, denial of
>          service, man-in-the-middle attacks, and so on, may become =
newly=20
>          possible or easier to mount due to the introduction of DMM.  =
Proof
>          of possession of past and new IP addresses may be needed.
>=20
> H Anthony Chan
>=20
>=20
> -----Original Message-----
> From: dmm-bounces@ietf.org [mailto:dmm-bounces@ietf.org] On Behalf Of =
Jouni Korhonen
> Sent: Tuesday, June 18, 2013 2:40 AM
> To: dmm@ietf.org
> Subject: [DMM] requirements and the security considerations
>=20
> <no co-chair cap/bowler>
>=20
> Folks,
>=20
> I have been reading Section 6 Security Considerations:
>=20
>   It is necessary to provide sufficient defense against possible
>   security attacks, or to adopt existing security mechanisms and
>   protocols to provide sufficient security protections.  For instance,
>   EAP-based authentication can be used for access network security,
>   while IPsec can be used for end-to-end security.
>=20
> I think this text still deserves some tweaking. First, "provide =
sufficient defense against possible security attacks".. against whom?
>=20
> Second, should the text say something that the DMM protocol itself =
must not be usable as a tool to launch an attack by a malicious mobile =
node that happens to know that it is attached to a network implementing =
DMM and knows (somehow) how the DMM protocol functions?
>=20
> - Jouni
> _______________________________________________
> dmm mailing list
> dmm@ietf.org
> https://www.ietf.org/mailman/listinfo/dmm


From jouni.nospam@gmail.com  Tue Jun 25 13:07:55 2013
Return-Path: <jouni.nospam@gmail.com>
X-Original-To: dmm@ietfa.amsl.com
Delivered-To: dmm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5BC4521F9E71 for <dmm@ietfa.amsl.com>; Tue, 25 Jun 2013 13:07:55 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[AWL=-0.000, BAYES_00=-2.599]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id mRlxgADMvm4d for <dmm@ietfa.amsl.com>; Tue, 25 Jun 2013 13:07:54 -0700 (PDT)
Received: from mail-ea0-x22d.google.com (mail-ea0-x22d.google.com [IPv6:2a00:1450:4013:c01::22d]) by ietfa.amsl.com (Postfix) with ESMTP id 9A95F21F9E56 for <dmm@ietf.org>; Tue, 25 Jun 2013 13:07:54 -0700 (PDT)
Received: by mail-ea0-f173.google.com with SMTP id g15so7118472eak.18 for <dmm@ietf.org>; Tue, 25 Jun 2013 13:07:53 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=content-type:mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to:x-mailer; bh=vqHQx7G95rBvda6tOcf5SqJG1iOCc6qbGLWXiZDPdNg=; b=R49WLim1J4kKnbPv48cwHOEJOFUUloeUZS333CrYdaYzmovh10s42BVudprKJqxw3X QPQFED6BSKeC+NmdS8aKFOOUpYGnFPlIT7yp6ui7qz9cjOyRtYsSDI/4ibZMvbmWTdnB iSDMBXWlD+Mq/YhUD3LeheVOYIJlSfsmTQZ3aA+Ng/0dxu7SDxPrZokiviKZKDHcroWb AL7wKp6f6S1m1HneQ6l9ypXqFU0FqKNQuOFq7aH61WD14eUIUyiHqQDjAFz++M15OK2V GdblV918wb/oQqBk3iCkyxEF0uOsGKKeGW8qQFue0q4Jj8Fdmbo8UXdKwngRfA1dLqgU hX6Q==
X-Received: by 10.15.107.6 with SMTP id ca6mr557436eeb.120.1372190873774; Tue, 25 Jun 2013 13:07:53 -0700 (PDT)
Received: from [188.117.15.110] ([188.117.15.110]) by mx.google.com with ESMTPSA id n5sm38319805eed.9.2013.06.25.13.07.52 for <multiple recipients> (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Tue, 25 Jun 2013 13:07:53 -0700 (PDT)
Content-Type: text/plain; charset=windows-1252
Mime-Version: 1.0 (Mac OS X Mail 6.5 \(1508\))
From: Jouni Korhonen <jouni.nospam@gmail.com>
In-Reply-To: <000301ce6e7c$063bb760$12b32620$@av.it.pt>
Date: Tue, 25 Jun 2013 23:07:51 +0300
Content-Transfer-Encoding: quoted-printable
Message-Id: <9F98D456-0471-422D-B170-D4606ADB363D@gmail.com>
References: <C9CB264D-1001-402F-93EC-E04CB2831E0B@gmail.com> <6E31144C030982429702B11D6746B98C370928A2@szxeml557-mbx.china.huawei.com> <000301ce6e7c$063bb760$12b32620$@av.it.pt>
To: Seil Jeon <seiljeon@av.it.pt>
X-Mailer: Apple Mail (2.1508)
Cc: dmm@ietf.org
Subject: Re: [DMM] requirements and the security considerations
X-BeenThere: dmm@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Distributed Mobility Management Working Group <dmm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmm>, <mailto:dmm-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmm>
List-Post: <mailto:dmm@ietf.org>
List-Help: <mailto:dmm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmm>, <mailto:dmm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 25 Jun 2013 20:07:55 -0000

> By taking into account two comments, the revised text is as follows.
>=20
> REQ7: DMM SHOULD consider multicast early so that solutions can
>=20
> be developed not only to provide IP mobility to keep IP multicast =
sessions when it is needed, but to avoid network inefficiency issues in =
multicast
> traffic delivery (such as duplicate multicast subscriptions
> towards the downstream tunnel entitiesy). The multicast solutions
> should therefore avoid restricting the management of all IP
> multicast traffic to a single host through a dedicated
> (tunnel) interface on multicast-capable access routers.
>=20
> Motivation: Existing multicast deployment have been introduced after =
completing the design of the reference mobility protocol, then =
optimization and extensions have been followed, by =93patching-up=94 =
procedure, thus leading to network inefficiency and non-optimal routing. =
The multicast solutions should therefore be required to consider =
efficiency nature in multicast traffic delivery.
>=20

The above would work for me.. at least better than the current text
in the I-D.

- Jouni


From maxpassion@gmail.com  Thu Jun 27 03:48:18 2013
Return-Path: <maxpassion@gmail.com>
X-Original-To: dmm@ietfa.amsl.com
Delivered-To: dmm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EA1BD21F9702 for <dmm@ietfa.amsl.com>; Thu, 27 Jun 2013 03:48:18 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.6
X-Spam-Level: 
X-Spam-Status: No, score=-2.6 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, NO_RELAYS=-0.001]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id yL78aWN3vvwX for <dmm@ietfa.amsl.com>; Thu, 27 Jun 2013 03:48:18 -0700 (PDT)
Received: from mail-ve0-x22c.google.com (mail-ve0-x22c.google.com [IPv6:2607:f8b0:400c:c01::22c]) by ietfa.amsl.com (Postfix) with ESMTP id E210121F997A for <dmm@ietf.org>; Thu, 27 Jun 2013 03:48:03 -0700 (PDT)
Received: by mail-ve0-f172.google.com with SMTP id jz10so501281veb.3 for <dmm@ietf.org>; Thu, 27 Jun 2013 03:48:02 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; bh=9FG/eco4i+LzGmN4ScLBFnyibNqZOsjb9whjj3nEwV4=; b=VEQOebjQ7ohMiKYh4xFoIBB5qwmrSSJuWHPYVE63SEq/GvWZHE3XB7lGqwPKZvjjSz P1hBlCcWgQzJ8hH+ghBkeHZIWy/tZuMRCnpbbpQhPSX9rwdjjkVhpmkYnS7HAd8k3VIL 9Diz3Cygdiczan3UN0QKEorH96Hjy2PnH52H8yVQ74u8EyO0EgjgpadT/qaJmmNg/Col ks+ZX7zRg3Exo8FDxcjbxeeK58KTy2Spx3wwE6/LqXeVXMgKCb8KeZzIMWuCpIcYPNF7 aNxvCg0bXzP3I75H/2FGCgbemOw6bGuUlri6BfHdpvX2Lo2tbIaod6r8lYMLXbGHBQHY vVJg==
MIME-Version: 1.0
X-Received: by 10.52.69.177 with SMTP id f17mr2844477vdu.48.1372330082332; Thu, 27 Jun 2013 03:48:02 -0700 (PDT)
Received: by 10.220.210.195 with HTTP; Thu, 27 Jun 2013 03:48:01 -0700 (PDT)
In-Reply-To: <D60519DB022FFA48974A25955FFEC08C052718D2@SAM.InterDigital.com>
References: <D60519DB022FFA48974A25955FFEC08C052718D2@SAM.InterDigital.com>
Date: Thu, 27 Jun 2013 18:48:01 +0800
Message-ID: <CAKcc6AcOP2Cy6+SEXEmW=MemjteygqerPgwUdriU5kBeH1SnuA@mail.gmail.com>
From: Liu Dapeng <maxpassion@gmail.com>
To: "Zuniga, Juan Carlos" <JuanCarlos.Zuniga@interdigital.com>
Content-Type: text/plain; charset=ISO-8859-1
Cc: dmm <dmm@ietf.org>
Subject: Re: [DMM] FW: New Version Notification for draft-ietf-dmm-best-practices-gap-analysis-01.txt
X-BeenThere: dmm@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Distributed Mobility Management Working Group <dmm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmm>, <mailto:dmm-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmm>
List-Post: <mailto:dmm@ietf.org>
List-Help: <mailto:dmm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmm>, <mailto:dmm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 27 Jun 2013 10:48:19 -0000

Hello folks:

To make good progress in Berlin meeting, it is better for us to start
discussion and resolve comments in the list now. Please help to review
and feel free to send comments.

quick summary of the draft:
-----
Section 4 'DMM practice' mainly analyses the mobility deployment
practice in WLAN and 3GPP network. Both client-based and network-based
mobility protocols are discussed.

Section 5 'Gap analysis' tentatively discusses the gaps. Please have a
look whether you agree on those gaps and whether you want to propose
any new ones. Any input from the group will be welcomed.

Thanks,
Dapeng Liu

2013/6/17 Zuniga, Juan Carlos <JuanCarlos.Zuniga@interdigital.com>:
> Hi all,
>
> We have posted an updated version of the current practices and gap analysis draft. We would like to make one more update before Berlin, so your comments and feedback are very welcome.
>
> Regards,
>
> Juan Carlos et al.
>
> -----Original Message-----
> From: internet-drafts@ietf.org [mailto:internet-drafts@ietf.org]
> Sent: Monday, June 17, 2013 11:07 AM
> To: Carlos J. Bernardos; H Anthony Chan; Zuniga, Juan Carlos; Anthony Chan; Dapeng Liu; Zuniga, Juan Carlos; Pierrick Seite
> Subject: New Version Notification fordraft-ietf-dmm-best-practices-gap-analysis-01.txt
>
>
> A new version of I-D, draft-ietf-dmm-best-practices-gap-analysis-01.txt
> has been successfully submitted by Dapeng Liu and posted to the
> IETF repository.
>
> Filename:        draft-ietf-dmm-best-practices-gap-analysis
> Revision:        01
> Title:           Distributed Mobility Management: Current practices and gap analysis
> Creation date:   2013-06-17
> Group:           dmm
> Number of pages: 21
> URL:             http://www.ietf.org/internet-drafts/draft-ietf-dmm-best-practices-gap-analysis-01.txt
> Status:          http://datatracker.ietf.org/doc/draft-ietf-dmm-best-practices-gap-analysis
> Htmlized:        http://tools.ietf.org/html/draft-ietf-dmm-best-practices-gap-analysis-01
> Diff:            http://www.ietf.org/rfcdiff?url2=draft-ietf-dmm-best-practices-gap-analysis-01
>
> Abstract:
>    The present document analyses deplyment practices of existing
>    mobility protocols in a distributed mobility management environment.
>    It also identifies some limitations compared to the expected
>    functionality of a fully distributed mobility management system.  The
>    comparison is made taking into account the identified DMM
>    requirements.
>
>
>
>
> The IETF Secretariat
>
> _______________________________________________
> dmm mailing list
> dmm@ietf.org
> https://www.ietf.org/mailman/listinfo/dmm



-- 

------
Best Regards,
Dapeng Liu

From jouni.nospam@gmail.com  Thu Jun 27 14:06:41 2013
Return-Path: <jouni.nospam@gmail.com>
X-Original-To: dmm@ietfa.amsl.com
Delivered-To: dmm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9CC8311E80D9 for <dmm@ietfa.amsl.com>; Thu, 27 Jun 2013 14:06:41 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2
X-Spam-Level: 
X-Spam-Status: No, score=-2 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, J_CHICKENPOX_13=0.6, NO_RELAYS=-0.001]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id FP5HT7i28wAL for <dmm@ietfa.amsl.com>; Thu, 27 Jun 2013 14:06:41 -0700 (PDT)
Received: from mail-bk0-x22c.google.com (mail-bk0-x22c.google.com [IPv6:2a00:1450:4008:c01::22c]) by ietfa.amsl.com (Postfix) with ESMTP id CADAB11E80D5 for <dmm@ietf.org>; Thu, 27 Jun 2013 14:06:37 -0700 (PDT)
Received: by mail-bk0-f44.google.com with SMTP id r7so513359bkg.17 for <dmm@ietf.org>; Thu, 27 Jun 2013 14:06:36 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=from:content-type:content-transfer-encoding:subject:date:references :to:message-id:mime-version:x-mailer; bh=kcU++rp2KDP3vMLg00+gFrmT47JnC0YsLxh7t1I+yXI=; b=WI+zI64uQ32EWf5bAcF3reDP049VMwNILieGqH+AaHzRw3UxGCg1qrj7jSg1Ec/gib n/PQLRSKSWunnl1mQZX1HkEqRPMJZB07AAHHeHi0+HC3PuiggUVa8En+e9gTe2RH9uBe g0XUMQBg1ng5fAwucGgTLYxaNdtuL6ovtbWAeobsVqtfVM+ImViEEv2Bxq9OCskGx1vb O8dnIxnxs5EXJnEGWC2JDOzhS631MbWFkSgj4SUkw4hVlojnzV1DGE+8M/6MnHPGDgB+ MmScILWRKdDVRiTj7NzZxb8FhmSnnSEpty78mlL7HZw/2O2rvUStBzKCFDe2ipFcTPut ErGQ==
X-Received: by 10.204.236.136 with SMTP id kk8mr1403070bkb.151.1372367196879;  Thu, 27 Jun 2013 14:06:36 -0700 (PDT)
Received: from ?IPv6:2001:1bc8:101:f101:29e3:eb80:897d:8b3e? ([2001:1bc8:101:f101:29e3:eb80:897d:8b3e]) by mx.google.com with ESMTPSA id hn4sm2338873bkc.2.2013.06.27.14.06.33 for <dmm@ietf.org> (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Thu, 27 Jun 2013 14:06:34 -0700 (PDT)
From: Jouni <jouni.nospam@gmail.com>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: quoted-printable
Date: Fri, 28 Jun 2013 00:06:33 +0300
References: <20130627201845.12037.66865.idtracker@ietfa.amsl.com>
To: dmm@ietf.org
Message-Id: <095C8FDD-8D54-4C78-AF00-FD527856EAC8@gmail.com>
Mime-Version: 1.0 (Apple Message framework v1283)
X-Mailer: Apple Mail (2.1283)
Subject: [DMM] Fwd: dmm - Requested session has been scheduled for IETF 87
X-BeenThere: dmm@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Distributed Mobility Management Working Group <dmm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmm>, <mailto:dmm-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmm>
List-Post: <mailto:dmm@ietf.org>
List-Help: <mailto:dmm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmm>, <mailto:dmm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 27 Jun 2013 21:06:41 -0000

FYI

Begin forwarded message:

> From: "\"IETF Secretariat\"" <agenda@ietf.org>
> Subject: dmm - Requested session has been scheduled for IETF 87
> Date: June 27, 2013 11:18:45 PM GMT+03:00
> To: jouni.nospam@gmail.com
> Cc: dmm-ads@tools.ietf.org, julien.ietf@gmail.com, =
jouni.nospam@gmail.com, amorris@amsl.com
>=20
> Dear Jouni Korhonen,
>=20
> The session(s) that you have requested have been scheduled.
> Below is the scheduled session information followed by
> the original request.=20
>=20
> dmm Session 1 (2:00:00)
>    Thursday, Morning Session I 0900-1020
>    Room Name: Charlottenburg 1
>    ---------------------------------------------
>=20
>=20
>=20
> Request Information:
>=20
>=20
> ---------------------------------------------------------
> Working Group Name:=20
> Area Name:=20
> Session Requester:=20
>=20
> Number of Sessions: 1
> Length of Session(s):  2 Hours
> Number of Attendees: 50
> Conflicts to Avoid:=20
> First Priority: dime radext intarea v6ops
> Second Priority: 6man mif multimob homenet netext
> Third Priority: 6lowpan hip lisp lwig savi core softwire sunset4
>=20
>=20
> Special Requests:
>=20
> ---------------------------------------------------------
>=20


From sarikaya2012@gmail.com  Fri Jun 28 14:34:56 2013
Return-Path: <sarikaya2012@gmail.com>
X-Original-To: dmm@ietfa.amsl.com
Delivered-To: dmm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D82DF21F9A18 for <dmm@ietfa.amsl.com>; Fri, 28 Jun 2013 14:34:56 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001, NO_RELAYS=-0.001]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id k7xlzvfvVgRW for <dmm@ietfa.amsl.com>; Fri, 28 Jun 2013 14:34:56 -0700 (PDT)
Received: from mail-lb0-x22d.google.com (mail-lb0-x22d.google.com [IPv6:2a00:1450:4010:c04::22d]) by ietfa.amsl.com (Postfix) with ESMTP id 7301421F9A1C for <dmm@ietf.org>; Fri, 28 Jun 2013 14:34:51 -0700 (PDT)
Received: by mail-lb0-f173.google.com with SMTP id v1so1289738lbd.4 for <dmm@ietf.org>; Fri, 28 Jun 2013 14:34:50 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:reply-to:date:message-id:subject:from:to:content-type; bh=P3kEF9LaMvBKX2pQBvO+s0KyoN2zJIesdhdT38dyHxo=; b=qDFC2nFw01VyHxNWbgFx6iHlFxJqRJGbr5uLhtzk0tJywD8tvfh9hnm41qGCrXyY9C 472i9vJrFvp09QLagr9/yG1X2oif75AMv0MJz/im40L0uKOwlffjDKDMmSiCTskWjPFk ExLmsmXe49kqYuSpT7JPnHGEAqAj1GhpN1iKAO4Y7/mU2EPFIpyPjKDIv/vWlZ2zNZPQ gc3VhakbCwFY87Zw5swUz+bQcThiGpQhCmYYXhaz7h+Bh4yNecq03XVUpyXM8/rc7DJ6 w8eq9w/SkAkpN0i5JoTek0KRN49W+ld+BHPOdNvENJt0NPWRai66MqVXAIv3xniXokqP +j3w==
MIME-Version: 1.0
X-Received: by 10.112.13.199 with SMTP id j7mr7441582lbc.25.1372455289921; Fri, 28 Jun 2013 14:34:49 -0700 (PDT)
Received: by 10.114.186.104 with HTTP; Fri, 28 Jun 2013 14:34:49 -0700 (PDT)
Date: Fri, 28 Jun 2013 16:34:49 -0500
Message-ID: <CAC8QAcdFdiHM7-Ew8KKBHrdaMymmhwWHBjBzk9F0zhu-oaLKUw@mail.gmail.com>
From: Behcet Sarikaya <sarikaya2012@gmail.com>
To: dmm@ietf.org
Content-Type: multipart/alternative; boundary=001a11c3cb9e06a5f004e03da64d
Subject: [DMM] Last Call comment on dmm requirements
X-BeenThere: dmm@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
Reply-To: sarikaya@ieee.org
List-Id: Distributed Mobility Management Working Group <dmm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmm>, <mailto:dmm-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmm>
List-Post: <mailto:dmm@ietf.org>
List-Help: <mailto:dmm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmm>, <mailto:dmm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 28 Jun 2013 21:34:57 -0000

--001a11c3cb9e06a5f004e03da64d
Content-Type: text/plain; charset=ISO-8859-1

Add this requirement:

R. XX. In network based dmm solutions, the mobile node MUST not be
modified. No changes on the mobile node behavior can be allowed.


Regards,

Behcet

--001a11c3cb9e06a5f004e03da64d
Content-Type: text/html; charset=ISO-8859-1

Add this requirement:<br><br>R. XX. In network based dmm solutions, the mobile node MUST not be modified. No changes on the mobile node behavior can be allowed.<br><br><br>Regards,<br><br>Behcet<br><br>

--001a11c3cb9e06a5f004e03da64d--

From alper.yegin@yegin.org  Sat Jun 29 04:33:04 2013
Return-Path: <alper.yegin@yegin.org>
X-Original-To: dmm@ietfa.amsl.com
Delivered-To: dmm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E4A0721F9FDF for <dmm@ietfa.amsl.com>; Sat, 29 Jun 2013 04:33:04 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -101.853
X-Spam-Level: 
X-Spam-Status: No, score=-101.853 tagged_above=-999 required=5 tests=[AWL=0.744, BAYES_00=-2.599, HTML_MESSAGE=0.001, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id cVkh4MeXwCjU for <dmm@ietfa.amsl.com>; Sat, 29 Jun 2013 04:32:59 -0700 (PDT)
Received: from mout.perfora.net (mout.perfora.net [74.208.4.194]) by ietfa.amsl.com (Postfix) with ESMTP id 093C521F9FE1 for <dmm@ietf.org>; Sat, 29 Jun 2013 04:32:59 -0700 (PDT)
Received: from [192.168.2.49] (88.247.135.202.static.ttnet.com.tr [88.247.135.202]) by mrelay.perfora.net (node=mrus4) with ESMTP (Nemesis) id 0LrNcy-1U7QXS0k0q-013Rm7; Sat, 29 Jun 2013 07:32:57 -0400
From: Alper Yegin <alper.yegin@yegin.org>
Content-Type: multipart/alternative; boundary="Apple-Mail=_B03B45CE-7E94-4CDA-BEC5-2A4F5F88601F"
Date: Sat, 29 Jun 2013 14:32:52 +0300
Message-Id: <A2B1CFC1-74DC-4A15-9D2D-8032A0EFFC88@yegin.org>
To: dmm@ietf.org
Mime-Version: 1.0 (Apple Message framework v1283)
X-Mailer: Apple Mail (2.1283)
X-Provags-ID: V02:K0:oplWDV168KAgrD7NZdIOcOMIe8SdlIVyW+Af5Nsf4RL OsTNh0X2RKMmt31QFQtNF/RZpdb/2xbhs/aNg/WQ7Xpc/dcBHy RMgZNc7iZFI/Equ6u07e5W1LVSFWLAspoEBiJpAgcfPX7l4fg3 fA2MwVFXwZZ/Pv7YwunPWtXuFijNuGiq/6G5ECkXHQPhgm1RFj enGmmB304Az+v9ynlqhG9kUbkj7g8cLkxMH53fxHNhPCg0/26p J2sUv8O3vNFxRMYoCKFKDSvIPPyrGStNWOct0OH3VOoXFSF1R9 nElk3iFlVlc5VscLJI8faVFK/zMXmU9UzWZQbHG/gV3MJxfW0t q3TnJ7SY3AHja8OX2dI/SZDwSosxbHNdrbqK5WmMDcD7qcNYKn SpaLAKY8gRlEw==
Subject: [DMM] Comments on dmm-requirements
X-BeenThere: dmm@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Distributed Mobility Management Working Group <dmm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmm>, <mailto:dmm-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmm>
List-Post: <mailto:dmm@ietf.org>
List-Help: <mailto:dmm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmm>, <mailto:dmm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 29 Jun 2013 11:33:05 -0000

--Apple-Mail=_B03B45CE-7E94-4CDA-BEC5-2A4F5F88601F
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=us-ascii

Hello,

Here I have a comment on the DMM requirements document.


6.  Security Considerations

   Distributed mobility management (DMM) requires two kinds of security
   considerations.  The first consideration is on access network
   security required between the mobile host/router and the access
   network deploying DMM.  It allows only a legitimate mobile host/
   router to use DMM.  The second consideration is on end-to-end
   security required between nodes that participate in the DMM protocol.
   It protects the DMM signaling messages.

I'm not sure I understand this. Is the first one about "access network =
security"?=20
Like ensuring only the authorized nodes can attach to the access =
network, and once they attach their traffic can be origin authenticated, =
replay and integrity protected?=20
If so, that's not related to DMM.
In fact, one could even claim that nodes attached to unsecure network, =
e.g., open WiFi, should also be able to use DMM.



   It is necessary to provide sufficient defense against possible
   security attacks, or to adopt existing security mechanisms and
   protocols to provide sufficient security protections.  For instance,
   EAP-based authentication can be used for access network security,
   while IPsec can be used for end-to-end security.

Again, the former is about access network security, and the latter is =
about end-to-end communication security. None of these are related to =
"DMM security."

Btw, I'd have expected this section to state just this: "Security =
considerations related to the DMM are described in section 5.6."

Alper










--Apple-Mail=_B03B45CE-7E94-4CDA-BEC5-2A4F5F88601F
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=us-ascii

<html><head></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; -webkit-line-break: after-white-space; =
">Hello,<div><br></div><div>Here I have a comment on the DMM =
requirements document.</div><div><br></div><div><br></div><div><div =
style=3D"margin-top: 0px; margin-right: 0px; margin-bottom: 0px; =
margin-left: 0px; font: normal normal normal 13px/normal Courier; =
">6.&nbsp; Security Considerations</div><div style=3D"margin-top: 0px; =
margin-right: 0px; margin-bottom: 0px; margin-left: 0px; font: normal =
normal normal 13px/normal Courier; min-height: 16px; "><br></div><div =
style=3D"margin-top: 0px; margin-right: 0px; margin-bottom: 0px; =
margin-left: 0px; font: normal normal normal 13px/normal Courier; =
">&nbsp;&nbsp; Distributed mobility management (DMM) requires two kinds =
of security</div><div style=3D"margin-top: 0px; margin-right: 0px; =
margin-bottom: 0px; margin-left: 0px; font: normal normal normal =
13px/normal Courier; ">&nbsp;&nbsp; considerations.&nbsp; The first =
consideration is on access network</div><div style=3D"margin-top: 0px; =
margin-right: 0px; margin-bottom: 0px; margin-left: 0px; font: normal =
normal normal 13px/normal Courier; ">&nbsp;&nbsp; security required =
between the mobile host/router and the access</div><div =
style=3D"margin-top: 0px; margin-right: 0px; margin-bottom: 0px; =
margin-left: 0px; font: normal normal normal 13px/normal Courier; =
">&nbsp;&nbsp; network deploying DMM.&nbsp; It allows only a legitimate =
mobile host/</div><div style=3D"margin-top: 0px; margin-right: 0px; =
margin-bottom: 0px; margin-left: 0px; font: normal normal normal =
13px/normal Courier; ">&nbsp;&nbsp; router to use DMM.&nbsp; The second =
consideration is on end-to-end</div><div style=3D"margin-top: 0px; =
margin-right: 0px; margin-bottom: 0px; margin-left: 0px; font: normal =
normal normal 13px/normal Courier; ">&nbsp;&nbsp; security required =
between nodes that participate in the DMM protocol.</div><div =
style=3D"margin-top: 0px; margin-right: 0px; margin-bottom: 0px; =
margin-left: 0px; font: normal normal normal 13px/normal Courier; =
">&nbsp;&nbsp; It protects the DMM signaling messages.</div><div =
style=3D"margin-top: 0px; margin-right: 0px; margin-bottom: 0px; =
margin-left: 0px; font: normal normal normal 13px/normal Courier; =
min-height: 16px; "><br></div><div style=3D"margin-top: 0px; =
margin-right: 0px; margin-bottom: 0px; margin-left: 0px; font: normal =
normal normal 13px/normal Courier; ">I'm not sure I understand this. Is =
the first one about "access network security"?&nbsp;</div><div =
style=3D"margin-top: 0px; margin-right: 0px; margin-bottom: 0px; =
margin-left: 0px; font: normal normal normal 13px/normal Courier; ">Like =
ensuring only the authorized nodes can attach to the access network, and =
once they attach their traffic can be origin authenticated, replay and =
integrity protected?&nbsp;</div><div style=3D"margin-top: 0px; =
margin-right: 0px; margin-bottom: 0px; margin-left: 0px; font: normal =
normal normal 13px/normal Courier; ">If so, that's not related to =
DMM.</div><div style=3D"margin-top: 0px; margin-right: 0px; =
margin-bottom: 0px; margin-left: 0px; font: normal normal normal =
13px/normal Courier; ">In fact, one could even claim that nodes attached =
to unsecure network, e.g., open WiFi, should also be able to use =
DMM.</div><div style=3D"margin-top: 0px; margin-right: 0px; =
margin-bottom: 0px; margin-left: 0px; font: normal normal normal =
13px/normal Courier; min-height: 16px; "><br></div><div =
style=3D"margin-top: 0px; margin-right: 0px; margin-bottom: 0px; =
margin-left: 0px; font: normal normal normal 13px/normal Courier; =
min-height: 16px; "><br></div><div style=3D"margin-top: 0px; =
margin-right: 0px; margin-bottom: 0px; margin-left: 0px; font: normal =
normal normal 13px/normal Courier; min-height: 16px; "><br></div><div =
style=3D"margin-top: 0px; margin-right: 0px; margin-bottom: 0px; =
margin-left: 0px; font: normal normal normal 13px/normal Courier; =
">&nbsp;&nbsp; It is necessary to provide sufficient defense against =
possible</div><div style=3D"margin-top: 0px; margin-right: 0px; =
margin-bottom: 0px; margin-left: 0px; font: normal normal normal =
13px/normal Courier; ">&nbsp;&nbsp; security attacks, or to adopt =
existing security mechanisms and</div><div style=3D"margin-top: 0px; =
margin-right: 0px; margin-bottom: 0px; margin-left: 0px; font: normal =
normal normal 13px/normal Courier; ">&nbsp;&nbsp; protocols to provide =
sufficient security protections.&nbsp; For instance,</div><div =
style=3D"margin-top: 0px; margin-right: 0px; margin-bottom: 0px; =
margin-left: 0px; font: normal normal normal 13px/normal Courier; =
">&nbsp;&nbsp; EAP-based authentication can be used for access network =
security,</div><div style=3D"margin-top: 0px; margin-right: 0px; =
margin-bottom: 0px; margin-left: 0px; font: normal normal normal =
13px/normal Courier; ">&nbsp;&nbsp; while IPsec can be used for =
end-to-end security.</div><div style=3D"margin-top: 0px; margin-right: =
0px; margin-bottom: 0px; margin-left: 0px; font: normal normal normal =
13px/normal Courier; min-height: 16px; "><br></div><div =
style=3D"margin-top: 0px; margin-right: 0px; margin-bottom: 0px; =
margin-left: 0px; font: normal normal normal 13px/normal Courier; =
min-height: 16px; ">Again, the former is about access network security, =
and the latter is about end-to-end communication security. None of these =
are related to "DMM security."</div><div style=3D"margin-top: 0px; =
margin-right: 0px; margin-bottom: 0px; margin-left: 0px; font: normal =
normal normal 13px/normal Courier; min-height: 16px; "><br></div><div =
style=3D"margin-top: 0px; margin-right: 0px; margin-bottom: 0px; =
margin-left: 0px; font: normal normal normal 13px/normal Courier; =
min-height: 16px; ">Btw, I'd have expected this section to state just =
this: "Security considerations related to the DMM are described in =
section 5.6."</div></div><div style=3D"margin-top: 0px; margin-right: =
0px; margin-bottom: 0px; margin-left: 0px; font: normal normal normal =
13px/normal Courier; min-height: 16px; "><br></div><div =
style=3D"margin-top: 0px; margin-right: 0px; margin-bottom: 0px; =
margin-left: 0px; font: normal normal normal 13px/normal Courier; =
min-height: 16px; ">Alper</div><div style=3D"margin-top: 0px; =
margin-right: 0px; margin-bottom: 0px; margin-left: 0px; font: normal =
normal normal 13px/normal Courier; min-height: 16px; =
"><br></div><div><br></div><div><br></div><div><br></div><div><br></div><d=
iv><br></div><div><br></div><div><br></div><div><br></div></body></html>=

--Apple-Mail=_B03B45CE-7E94-4CDA-BEC5-2A4F5F88601F--

From jouni.nospam@gmail.com  Sat Jun 29 04:53:06 2013
Return-Path: <jouni.nospam@gmail.com>
X-Original-To: dmm@ietfa.amsl.com
Delivered-To: dmm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5B61D21F9FF9 for <dmm@ietfa.amsl.com>; Sat, 29 Jun 2013 04:53:06 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id iJAgXyYjOnrG for <dmm@ietfa.amsl.com>; Sat, 29 Jun 2013 04:53:05 -0700 (PDT)
Received: from mail-bk0-x230.google.com (mail-bk0-x230.google.com [IPv6:2a00:1450:4008:c01::230]) by ietfa.amsl.com (Postfix) with ESMTP id 9956221F9FF4 for <dmm@ietf.org>; Sat, 29 Jun 2013 04:53:05 -0700 (PDT)
Received: by mail-bk0-f48.google.com with SMTP id jf17so1105042bkc.35 for <dmm@ietf.org>; Sat, 29 Jun 2013 04:53:04 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=content-type:mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to:x-mailer; bh=CeqvGTM5h4MJ9M9PW1AfT5mcs5N/HMUZ/xg5CBG02OA=; b=HiUAXzQthvWrwFxS30Bh7LOSIbA2AyACc4I/t+KiDLioFiMrOwE/1aClpiIieJOmcQ WyaYHpUQiigFti0gyUiE6aTQ24peXWb/+bODr0MIgbJSet5ngHqkZ2AabVVN9RHBwQ20 soCqLMcLRbx6R2HpzjwR4VStgdjTzR8NW10JrSkxBVxL9MbIRKurMF/yjUZDhjMGXQFg RXmnqQQd9FoE4NjZJ/aZnyU3R+FrBlwqcY5rEhCp/OoyGO7tq7mkMbWIb2XiQ7sdElF/ Ipo/piHbyWp+4uVl1C11CfYdA+zhjoz5I1P83Ov0iYBPbiF96b9/d7m9OwnrMvDVGvkl s9Pg==
X-Received: by 10.204.186.208 with SMTP id ct16mr2207560bkb.165.1372506784597;  Sat, 29 Jun 2013 04:53:04 -0700 (PDT)
Received: from [188.117.15.109] ([188.117.15.109]) by mx.google.com with ESMTPSA id px7sm4915420bkb.9.2013.06.29.04.53.01 for <multiple recipients> (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Sat, 29 Jun 2013 04:53:01 -0700 (PDT)
Content-Type: text/plain; charset=iso-8859-1
Mime-Version: 1.0 (Mac OS X Mail 6.5 \(1508\))
From: Jouni Korhonen <jouni.nospam@gmail.com>
In-Reply-To: <CAC8QAcdFdiHM7-Ew8KKBHrdaMymmhwWHBjBzk9F0zhu-oaLKUw@mail.gmail.com>
Date: Sat, 29 Jun 2013 14:52:59 +0300
Content-Transfer-Encoding: quoted-printable
Message-Id: <8BA31414-9A76-44B4-B8DB-AB63BA1CEDC5@gmail.com>
References: <CAC8QAcdFdiHM7-Ew8KKBHrdaMymmhwWHBjBzk9F0zhu-oaLKUw@mail.gmail.com>
To: sarikaya@ieee.org
X-Mailer: Apple Mail (2.1508)
Cc: dmm@ietf.org
Subject: Re: [DMM] Last Call comment on dmm requirements
X-BeenThere: dmm@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Distributed Mobility Management Working Group <dmm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmm>, <mailto:dmm-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmm>
List-Post: <mailto:dmm@ietf.org>
List-Help: <mailto:dmm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmm>, <mailto:dmm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 29 Jun 2013 11:53:06 -0000

On Jun 29, 2013, at 12:34 AM, Behcet Sarikaya <sarikaya2012@gmail.com> =
wrote:

> Add this requirement:
>=20
> R. XX. In network based dmm solutions, the mobile node MUST not be =
modified. No changes on the mobile node behavior can be allowed.

In addition to being a bit late in the cycle proposing for new =
requirements,
I cannot agree with MUST NOT. I could agree with SHOULD NOT. The charter
makes it clear that solutions that may involve a host are within our =
scope.

- JOuni


>=20
>=20
> Regards,
>=20
> Behcet
>=20
> _______________________________________________
> dmm mailing list
> dmm@ietf.org
> https://www.ietf.org/mailman/listinfo/dmm


From danny.moses@intel.com  Sun Jun 30 02:24:06 2013
Return-Path: <danny.moses@intel.com>
X-Original-To: dmm@ietfa.amsl.com
Delivered-To: dmm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EB8CF21F9D54 for <dmm@ietfa.amsl.com>; Sun, 30 Jun 2013 02:24:06 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -10.598
X-Spam-Level: 
X-Spam-Status: No, score=-10.598 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-8]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id sPV8qt0bxhhV for <dmm@ietfa.amsl.com>; Sun, 30 Jun 2013 02:24:01 -0700 (PDT)
Received: from mga14.intel.com (mga14.intel.com [143.182.124.37]) by ietfa.amsl.com (Postfix) with ESMTP id B02E221F9AEC for <dmm@ietf.org>; Sun, 30 Jun 2013 02:24:01 -0700 (PDT)
Received: from azsmga002.ch.intel.com ([10.2.17.35]) by azsmga102.ch.intel.com with ESMTP; 30 Jun 2013 02:23:06 -0700
X-ExtLoop1: 1
X-IronPort-AV: E=Sophos;i="4.87,968,1363158000";  d="scan'208,217";a="261946369"
Received: from fmsmsx108.amr.corp.intel.com ([10.19.9.228]) by AZSMGA002.ch.intel.com with ESMTP; 30 Jun 2013 02:22:11 -0700
Received: from FMSMSX110.amr.corp.intel.com (10.18.116.10) by FMSMSX108.amr.corp.intel.com (10.19.9.228) with Microsoft SMTP Server (TLS) id 14.3.123.3; Sun, 30 Jun 2013 02:22:11 -0700
Received: from hasmsx151.ger.corp.intel.com (10.184.195.9) by fmsmsx110.amr.corp.intel.com (10.18.116.10) with Microsoft SMTP Server (TLS) id 14.3.123.3; Sun, 30 Jun 2013 02:22:11 -0700
Received: from hasmsx106.ger.corp.intel.com ([169.254.2.62]) by HASMSX151.ger.corp.intel.com ([169.254.5.187]) with mapi id 14.03.0123.003; Sun, 30 Jun 2013 12:22:08 +0300
From: "Moses, Danny" <danny.moses@intel.com>
To: "sarikaya@ieee.org" <sarikaya@ieee.org>, "dmm@ietf.org" <dmm@ietf.org>
Thread-Topic: [DMM] Last Call comment on dmm requirements
Thread-Index: AQHOdEfl+7AH7k/BjkWBtja32df3R5lN/F+g
Date: Sun, 30 Jun 2013 09:22:08 +0000
Message-ID: <F0CF5715D3D1884BAC731EA1103AC281027EF8F0@HASMSX106.ger.corp.intel.com>
References: <CAC8QAcdFdiHM7-Ew8KKBHrdaMymmhwWHBjBzk9F0zhu-oaLKUw@mail.gmail.com>
In-Reply-To: <CAC8QAcdFdiHM7-Ew8KKBHrdaMymmhwWHBjBzk9F0zhu-oaLKUw@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.184.70.12]
Content-Type: multipart/alternative; boundary="_000_F0CF5715D3D1884BAC731EA1103AC281027EF8F0HASMSX106gercor_"
MIME-Version: 1.0
Subject: Re: [DMM] Last Call comment on dmm requirements
X-BeenThere: dmm@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Distributed Mobility Management Working Group <dmm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmm>, <mailto:dmm-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dmm>
List-Post: <mailto:dmm@ietf.org>
List-Help: <mailto:dmm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmm>, <mailto:dmm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 30 Jun 2013 09:24:07 -0000

--_000_F0CF5715D3D1884BAC731EA1103AC281027EF8F0HASMSX106gercor_
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable

Hi,

I am sorry by this requirement sounds to me too generic and limiting. What =
functionality must not be modified? Why?
I am assuming that the motivation might be related to backwards compatibili=
ty. If this is the case, it is already addressed. Furthermore, I do not see=
 a reason why not to enable modifications that may enhance performance or i=
mprove user experience as long as they are optional (hence do not violate t=
he backwards compatibility requirement).

Regards,
                /Danny

From: dmm-bounces@ietf.org [mailto:dmm-bounces@ietf.org] On Behalf Of Behce=
t Sarikaya
Sent: Saturday, June 29, 2013 00:35
To: dmm@ietf.org
Subject: [DMM] Last Call comment on dmm requirements

Add this requirement:

R. XX. In network based dmm solutions, the mobile node MUST not be modified=
. No changes on the mobile node behavior can be allowed.


Regards,

Behcet
---------------------------------------------------------------------
A member of the Intel Corporation group of companies

This e-mail and any attachments may contain confidential material for
the sole use of the intended recipient(s). Any review or distribution
by others is strictly prohibited. If you are not the intended
recipient, please contact the sender and delete all copies.

--_000_F0CF5715D3D1884BAC731EA1103AC281027EF8F0HASMSX106gercor_
Content-Type: text/html; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii">
<meta name=3D"Generator" content=3D"Microsoft Word 14 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
span.EmailStyle17
	{mso-style-type:personal-reply;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-family:"Calibri","sans-serif";}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.25in 1.0in 1.25in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">Hi,<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">I am sorry by this requir=
ement sounds to me too generic and limiting. What functionality must not be=
 modified? Why?<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">I am assuming that the mo=
tivation might be related to backwards compatibility. If this is the case, =
it is already addressed. Furthermore, I do not see a reason
 why not to enable modifications that may enhance performance or improve us=
er experience as long as they are optional (hence do not violate the backwa=
rds compatibility requirement).<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">Regards,<o:p></o:p></span=
></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; /Danny<o:=
p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,&quot;sans-serif&quot;">From:</span></b><span style=3D"font-s=
ize:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;"> dmm-boun=
ces@ietf.org [mailto:dmm-bounces@ietf.org]
<b>On Behalf Of </b>Behcet Sarikaya<br>
<b>Sent:</b> Saturday, June 29, 2013 00:35<br>
<b>To:</b> dmm@ietf.org<br>
<b>Subject:</b> [DMM] Last Call comment on dmm requirements<o:p></o:p></spa=
n></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt">Add this requirement:=
<br>
<br>
R. XX. In network based dmm solutions, the mobile node MUST not be modified=
. No changes on the mobile node behavior can be allowed.<br>
<br>
<br>
Regards,<br>
<br>
Behcet<o:p></o:p></p>
</div>
<p>---------------------------------------------------------------------<br>
A member of the Intel Corporation group of companies</p>

<p>This e-mail and any attachments may contain confidential material for<br>
the sole use of the intended recipient(s). Any review or distribution<br>
by others is strictly prohibited. If you are not the intended<br>
recipient, please contact the sender and delete all copies.</p></body>
</html>

--_000_F0CF5715D3D1884BAC731EA1103AC281027EF8F0HASMSX106gercor_--

