Message Authentication Code for the Network Time Protocol
draft-ietf-ntp-mac-06
Revision differences
Document history
Date | Rev. | By | Action |
---|---|---|---|
2019-06-19
|
06 | (System) | RFC Editor state changed to AUTH48-DONE from AUTH48 |
2019-04-11
|
06 | (System) | RFC Editor state changed to AUTH48 from RFC-EDITOR |
2019-04-01
|
06 | (System) | RFC Editor state changed to RFC-EDITOR from EDIT |
2019-02-11
|
06 | (System) | RFC Editor state changed to EDIT |
2019-02-11
|
06 | (System) | IESG state changed to RFC Ed Queue from Approved-announcement sent |
2019-02-11
|
06 | (System) | Announcement was received by RFC Editor |
2019-02-11
|
06 | (System) | IANA Action state changed to No IANA Actions from In Progress |
2019-02-11
|
06 | (System) | IANA Action state changed to In Progress |
2019-02-11
|
06 | Cindy Morgan | IESG state changed to Approved-announcement sent from Approved-announcement to be sent |
2019-02-11
|
06 | Cindy Morgan | IESG has approved the document |
2019-02-11
|
06 | Cindy Morgan | Closed "Approve" ballot |
2019-02-11
|
06 | Cindy Morgan | Ballot approval text was generated |
2019-02-11
|
06 | Suresh Krishnan | IESG state changed to Approved-announcement to be sent from Approved-announcement to be sent::Point Raised - writeup needed |
2019-01-04
|
06 | Aanchal Malhotra | New version available: draft-ietf-ntp-mac-06.txt |
2019-01-04
|
06 | (System) | New version approved |
2019-01-04
|
06 | (System) | Request for posting confirmation emailed to previous authors: Sharon Goldberg , Aanchal Malhotra |
2019-01-04
|
06 | Aanchal Malhotra | Uploaded new revision |
2019-01-02
|
05 | Suresh Krishnan | Still waiting for a new revision to address (non blocking) IESG comments. |
2018-11-27
|
05 | Jean Mahoney | Closed request for Last Call review by GENART with state 'No Response' |
2018-11-21
|
05 | Cindy Morgan | IESG state changed to Approved-announcement to be sent::Point Raised - writeup needed from IESG Evaluation |
2018-11-21
|
05 | Martin Vigoureux | [Ballot comment] Just a nit: s/succesfully/successfully/ |
2018-11-21
|
05 | Martin Vigoureux | [Ballot Position Update] New position, No Objection, has been recorded for Martin Vigoureux |
2018-11-20
|
05 | Terry Manderson | [Ballot Position Update] New position, No Objection, has been recorded for Terry Manderson |
2018-11-20
|
05 | Ben Campbell | [Ballot comment] §2: "is not a secure MAC and therefore MUST be deprecated." That "MUST" seems like a statement of fact rather than a normative … [Ballot comment] §2: "is not a secure MAC and therefore MUST be deprecated." That "MUST" seems like a statement of fact rather than a normative requirement. |
2018-11-20
|
05 | Ben Campbell | [Ballot Position Update] New position, No Objection, has been recorded for Ben Campbell |
2018-11-20
|
05 | Spencer Dawkins | [Ballot Position Update] New position, No Objection, has been recorded for Spencer Dawkins |
2018-11-19
|
05 | Adam Roach | [Ballot comment] Thanks to everyone who worked on this document. I agree with Mirja's concerns about the backwards compatibility aspects, especially from an operational perspective … [Ballot comment] Thanks to everyone who worked on this document. I agree with Mirja's concerns about the backwards compatibility aspects, especially from an operational perspective -- in particular, is there some way to roll this change out incrementally, or does it require a flag day? It seems to me that this document really needs an "operational considerations" section that either explains how this change might be deployed or cites some already existing NTP document that does so. I also have a handful of minor and editorial comments that you may want to consider addressing. --------------------------------------------------------------------------- Please consider addressing these id-nits issues: ** The abstract seems to contain references ([RFC5905], [RFC4493]), which it shouldn't. Please replace those with straight textual mentions of the documents in question. -- The draft header indicates that this document updates RFC5905, but the abstract doesn't seem to directly say this. --------------------------------------------------------------------------- §1.1: > The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", > "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this > document are to be interpreted as described in RFC 2119 [RFC2119]. Please update to use the boilerplate in RFC 8174. --------------------------------------------------------------------------- §3: > A symmetric key is a triplet of ID, > type (e.g. MD5, AES-CMAC) and the key itself. I don't follow this. A naïve reading of this sentence would lead me to believe that the key contains three fields, one of which is itself. I suspect you're using "key" here to refer to two somewhat different constructs. Consider giving them more unique names. |
2018-11-19
|
05 | Adam Roach | Ballot comment text updated for Adam Roach |
2018-11-19
|
05 | Adam Roach | [Ballot comment] Thanks to everyone who worked on this document. I agree with Mirja's concerns about the backwards compatibility aspects, especially from an operational perspective … [Ballot comment] Thanks to everyone who worked on this document. I agree with Mirja's concerns about the backwards compatibility aspects, especially from an operational perspective -- in particular, is there some way to roll this change out incrementally, or does it require a flag day? It seems to me that this document really needs an "operational considerations" section that either explains how this change might be deployed or cites some already existing NTP document that does so. I also have a handful of minor and editorial comments that you may want to consider addressing. --------------------------------------------------------------------------- Please consider addressing these id-nits issues: ** The abstract seems to contain references ([RFC5905], [RFC4493]), which it shouldn't. Please replace those with straight textual mentions of the documents in question. -- The draft header indicates that this document updates RFC5905, but the abstract doesn't seem to directly say this. --------------------------------------------------------------------------- §1.1: > The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", > "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this > document are to be interpreted as described in RFC 2119 [RFC2119]. Please update to use the boilerplate in RFC 8174. --------------------------------------------------------------------------- §3: > A symmetric key is a triplet of ID, > type (e.g. MD5, AES-CMAC) and the key itself. I don't follow this. The key is composed of the ID, the type, and the key. Where the ID is a key identifier, the type is the MAC algorithm, and the key is... composed of the ID, the type, and the key, I guess? This seems infinitely recursive. I suspect you're using "key" here to refer to two somewhat different constructs. Consider giving them more unique names. |
2018-11-19
|
05 | Adam Roach | [Ballot Position Update] New position, No Objection, has been recorded for Adam Roach |
2018-11-19
|
05 | Alissa Cooper | [Ballot comment] Section 4: It seems like Intel's New Instruction Set either needs a citation or needs to be removed as a specific example unless … [Ballot comment] Section 4: It seems like Intel's New Instruction Set either needs a citation or needs to be removed as a specific example unless it's expected to continue to be a meaningful example for as long as this document remains in force. Section 6: "NIST document" seems like it should have a more descriptive title Section 9.1: The link to the NIST document is broken. |
2018-11-19
|
05 | Alissa Cooper | [Ballot Position Update] New position, No Objection, has been recorded for Alissa Cooper |
2018-11-19
|
05 | Suresh Krishnan | IESG state changed to IESG Evaluation from Waiting for Writeup |
2018-11-19
|
05 | Alvaro Retana | [Ballot comment] From §3: If authentication is implemented, then AES-CMAC as specified in RFC 4493 [RFC4493] SHOULD be computed over all … [Ballot comment] From §3: If authentication is implemented, then AES-CMAC as specified in RFC 4493 [RFC4493] SHOULD be computed over all fields in the NTP header, and any extension fields that are present in the NTP packet as described in RFC 5905 [RFC5905]. When would AES-CMAC not be computer over all fields, or when would it not be used? IOW, why is a MUST not used? The text already indicates that it is talking about "if authentication is implemented..." |
2018-11-19
|
05 | Alvaro Retana | Ballot comment text updated for Alvaro Retana |
2018-11-19
|
05 | Alvaro Retana | [Ballot comment] From §3: If authentication is implemented, then AES-CMAC as specified in RFC 4493 [RFC4493] SHOULD be computed over all … [Ballot comment] From §3: If authentication is implemented, then AES-CMAC as specified in RFC 4493 [RFC4493] SHOULD be computed over all fields in the NTP header, and any extension fields that are present in the NTP packet as described in RFC 5905 [RFC5905]. When would AES-CMAC not be computer over all fields, or when would it not be used? IOW, why is a MUST not used? The text already indicates that is is talking about "if authentication is implemented..." |
2018-11-19
|
05 | Alvaro Retana | [Ballot Position Update] New position, No Objection, has been recorded for Alvaro Retana |
2018-11-19
|
05 | Warren Kumari | [Ballot comment] It would be useful to know if this is actually implemented / deployed. I spent some time looking around, and found something saying … [Ballot comment] It would be useful to know if this is actually implemented / deployed. I spent some time looking around, and found something saying that this was slated for ntp-4.4.0, but it looks like ntp-4.2.8p12 was just recently released? There was some mumbling about new numbering formats, but I didn't explore that rabbithole. https://github.com/ntp-project/ntp/blob/stable/ntpd/ntp.conf.html has refernces to MD-5, but not AES, so, um, perhaps it isn't? |
2018-11-19
|
05 | Warren Kumari | [Ballot Position Update] New position, No Objection, has been recorded for Warren Kumari |
2018-11-19
|
05 | Deborah Brungard | [Ballot Position Update] New position, No Objection, has been recorded for Deborah Brungard |
2018-11-19
|
05 | Benjamin Kaduk | [Ballot comment] Please consider using the RFC 8174 version of the BCP14 boilerplate. It's somewhat surprising to me that this document seems to focus on … [Ballot comment] Please consider using the RFC 8174 version of the BCP14 boilerplate. It's somewhat surprising to me that this document seems to focus on the "md5 is broken" aspect of the previous ntp-md5 construction, with no mention that there is additionally a cryptographic flaw: it is subject to length-extension attacks. (I'm told that no practical attacks of this nature are known, but it still seems prudent to note the additional flaw in the mechanism being replaced.) Similarly, to avoid concerns about the risk of extension attacks with the new construction, it may be worth explicitly noting that the CMAC construction is secure even in the presence of variable length messages (see, e.g., [OMAC1a] from RFC 4493). (In other contexts the message length is explicitly included as an input to the MAC, though given the above that does not seem necessary here.) Section 3 If authentication is implemented, then AES-CMAC as specified in RFC Maybe "NTP authentication"? described in RFC 5905 [RFC5905]. The MAC key for NTP MUST be at least 128 bits long AES-128 key and the resulting MAC tag MUST be at least 128 bits long as stated in section 2.4 of RFC 4493 [RFC4493]. I'm not sure I understand why these are "at least" -- if AES-128 is used, exact matching should be fine. |
2018-11-19
|
05 | Benjamin Kaduk | [Ballot Position Update] New position, No Objection, has been recorded for Benjamin Kaduk |
2018-11-19
|
05 | Ignas Bagdonas | [Ballot comment] What is the implementation status of this, and is there any deployment experience? |
2018-11-19
|
05 | Ignas Bagdonas | [Ballot Position Update] New position, No Objection, has been recorded for Ignas Bagdonas |
2018-11-19
|
05 | Kathleen Moriarty | Request for Last Call review by SECDIR Completed: Ready. Reviewer: Kathleen Moriarty. Sent review to list. |
2018-11-17
|
05 | Eric Rescorla | [Ballot comment] Rich version of this review at: https://mozphab-ietf.devsvcdev.mozaws.net/D3591 COMMENTS S 3. > If authentication is implemented, then AES-CMAC as specified in RFC … [Ballot comment] Rich version of this review at: https://mozphab-ietf.devsvcdev.mozaws.net/D3591 COMMENTS S 3. > If authentication is implemented, then AES-CMAC as specified in RFC > 4493 [RFC4493] SHOULD be computed over all fields in the NTP header, > and any extension fields that are present in the NTP packet as > described in RFC 5905 [RFC5905]. The MAC key for NTP MUST be at > least 128 bits long AES-128 key and the resulting MAC tag MUST be at > least 128 bits long as stated in section 2.4 of RFC 4493 [RFC4493]. Is there a way for either of these values to be > 128 bits? If not, maube just say "must be 128 buts: |
2018-11-17
|
05 | Eric Rescorla | [Ballot Position Update] New position, No Objection, has been recorded for Eric Rescorla |
2018-11-17
|
05 | Alexey Melnikov | [Ballot Position Update] New position, No Objection, has been recorded for Alexey Melnikov |
2018-10-30
|
05 | Mirja Kühlewind | [Ballot comment] I guess the assumption is that all hosts configured to use the same authentication scheme? Or would makse sense to add a short … [Ballot comment] I guess the assumption is that all hosts configured to use the same authentication scheme? Or would makse sense to add a short note on backward compatibility? |
2018-10-30
|
05 | Mirja Kühlewind | [Ballot Position Update] New position, No Objection, has been recorded for Mirja Kühlewind |
2018-10-22
|
05 | Amy Vezza | Placed on agenda for telechat - 2018-11-21 |
2018-10-21
|
05 | Suresh Krishnan | Ballot has been issued |
2018-10-21
|
05 | Suresh Krishnan | [Ballot Position Update] New position, Yes, has been recorded for Suresh Krishnan |
2018-10-21
|
05 | Suresh Krishnan | Created "Approve" ballot |
2018-10-21
|
05 | Suresh Krishnan | Ballot writeup was changed |
2018-10-19
|
05 | (System) | IESG state changed to Waiting for Writeup from In Last Call |
2018-10-15
|
05 | Gunter Van de Velde | Request for Last Call review by OPSDIR is assigned to Tim Wicinski |
2018-10-15
|
05 | Gunter Van de Velde | Request for Last Call review by OPSDIR is assigned to Tim Wicinski |
2018-10-11
|
05 | Jean Mahoney | Request for Last Call review by GENART is assigned to Fernando Gont |
2018-10-11
|
05 | Jean Mahoney | Request for Last Call review by GENART is assigned to Fernando Gont |
2018-10-11
|
05 | (System) | IANA Review state changed to IANA OK - No Actions Needed from IANA - Review Needed |
2018-10-11
|
05 | Sabrina Tanamal | (Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs: The IANA Functions Operator has reviewed draft-ietf-ntp-mac-05, which is currently in Last Call, and has the following comments: We … (Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs: The IANA Functions Operator has reviewed draft-ietf-ntp-mac-05, which is currently in Last Call, and has the following comments: We understand that this document doesn't require any registry actions. While it's often helpful for a document's IANA Considerations section to remain in place upon publication even if there are no actions, if the authors strongly prefer to remove it, we do not object. If this assessment is not accurate, please respond as soon as possible. Thank you, Sabrina Tanamal Senior IANA Services Specialist |
2018-10-11
|
05 | Tero Kivinen | Request for Last Call review by SECDIR is assigned to Kathleen Moriarty |
2018-10-11
|
05 | Tero Kivinen | Request for Last Call review by SECDIR is assigned to Kathleen Moriarty |
2018-10-05
|
05 | Cindy Morgan | IANA Review state changed to IANA - Review Needed |
2018-10-05
|
05 | Cindy Morgan | The following Last Call announcement was sent out (ends 2018-10-19): From: The IESG To: IETF-Announce CC: ntp@ietf.org, odonoghue@isoc.org, Karen O'Donoghue , ntp-chairs@ietf.org, … The following Last Call announcement was sent out (ends 2018-10-19): From: The IESG To: IETF-Announce CC: ntp@ietf.org, odonoghue@isoc.org, Karen O'Donoghue , ntp-chairs@ietf.org, draft-ietf-ntp-mac@ietf.org, suresh@kaloom.com Reply-To: ietf@ietf.org Sender: Subject: Last Call: (Message Authentication Code for the Network Time Protocol) to Proposed Standard The IESG has received a request from the Network Time Protocol WG (ntp) to consider the following document: - 'Message Authentication Code for the Network Time Protocol' as Proposed Standard The IESG plans to make a decision in the next few weeks, and solicits final comments on this action. Please send substantive comments to the ietf@ietf.org mailing lists by 2018-10-19. Exceptionally, comments may be sent to iesg@ietf.org instead. In either case, please retain the beginning of the Subject line to allow automated sorting. Abstract RFC 5905 [RFC5905] states that Network Time Protocol (NTP) packets should be authenticated by appending a 128-bit key to the NTP data, and hashing the result with MD5 to obtain a 128-bit tag. This document deprecates MD5-based authentication, which is considered to be too weak, and recommends the use of AES-CMAC [RFC4493] as a replacement. The file can be obtained via https://datatracker.ietf.org/doc/draft-ietf-ntp-mac/ IESG discussion can be tracked via https://datatracker.ietf.org/doc/draft-ietf-ntp-mac/ballot/ No IPR declarations have been submitted directly on this I-D. |
2018-10-05
|
05 | Cindy Morgan | IESG state changed to In Last Call from Last Call Requested |
2018-10-05
|
05 | Suresh Krishnan | Last call was requested |
2018-10-05
|
05 | Suresh Krishnan | Last call announcement was generated |
2018-10-05
|
05 | Suresh Krishnan | Ballot approval text was generated |
2018-10-05
|
05 | Suresh Krishnan | Ballot writeup was generated |
2018-10-05
|
05 | Suresh Krishnan | IESG state changed to Last Call Requested from AD Evaluation |
2018-10-03
|
05 | Aanchal Malhotra | New version available: draft-ietf-ntp-mac-05.txt |
2018-10-03
|
05 | (System) | New version approved |
2018-10-03
|
05 | (System) | Request for posting confirmation emailed to previous authors: Sharon Goldberg , Aanchal Malhotra |
2018-10-03
|
05 | Aanchal Malhotra | Uploaded new revision |
2018-08-22
|
04 | Suresh Krishnan | IESG state changed to AD Evaluation from Publication Requested |
2018-06-08
|
04 | Bernie Volz | Request for Early review by INTDIR is assigned to DENG Hui |
2018-06-08
|
04 | Bernie Volz | Request for Early review by INTDIR is assigned to DENG Hui |
2018-06-08
|
04 | Suresh Krishnan | Requested Early review by INTDIR |
2018-05-30
|
04 | Karen O'Donoghue | This is the publication request and document shepherd write up for: Message Authentication Code for the Network Time Protocol draft-ietf-ntp-mac Prepared by: Karen O’Donoghue, 29 … This is the publication request and document shepherd write up for: Message Authentication Code for the Network Time Protocol draft-ietf-ntp-mac Prepared by: Karen O’Donoghue, 29 May 2018 (1) What type of RFC is being requested (BCP, Proposed Standard, Internet Standard, Informational, Experimental, or Historic)? Why is this the proper type of RFC? Is this type of RFC indicated in the title page header? This document is being requested for publication as a Proposed Standard given that it updates an existing Proposed Standard (RFC 5905). (2) The IESG approval announcement includes a Document Announcement Write-Up. Please provide such a Document Announcement Write-Up. Recent examples can be found in the "Action" announcements for approved documents. The approval announcement contains the following sections: Technical Summary: RFC 5905 [RFC5905] states that Network Time Protocol (NTP) packets should be authenticated by appending a 128-bit key to the NTP data, and hashing the result with MD5 to obtain a 128-bit tag. This document deprecates MD5-based authentication, which is considered to be too weak, and recommends the use of AES-CMAC [RFC4493] as a replacement. Working Group Summary: The document has clear working group consensus for publication, and has been reviewed by several WG participants since its initial adoption as a working group item. Document Quality: This document has been reviewed and revised several times during its development. There were no specific external expert reviews conducted. Personnel: Karen O'Donoghue is acting as the Document Shepherd. Suresh Krishnan is the Responsible Area Director. (3) Briefly describe the review of this document that was performed by the Document Shepherd. If this version of the document is not ready for publication, please explain why the document is being forwarded to the IESG. The document shepherd has followed the working group process and reviewed the final document and feels this document is ready for IESG review. (4) Does the document Shepherd have any concerns about the depth or breadth of the reviews that have been performed? The document shepherd does not have any concerns about the reviews that were performed. (5) Do portions of the document need review from a particular or from broader perspective, e.g., security, operational complexity, AAA, DNS, DHCP, XML, or internationalization? If so, describe the review that took place. This document does not require any special reviews beyond those planned during the IESG review process. (6) Describe any specific concerns or issues that the Document Shepherd has with this document that the Responsible Area Director and/or the IESG should be aware of? For example, perhaps he or she is uncomfortable with certain parts of the document, or has concerns whether there really is a need for it. In any event, if the WG has discussed those issues and has indicated that it still wishes to advance the document, detail those concerns here. The Document Shepherd is comfortable with this document as a simple update to RFC 5905 aligned with the long held position of the IETF to deprecate MD5. (7) Has each author confirmed that any and all appropriate IPR disclosures required for full conformance with the provisions of BCP 78 and BCP 79 have already been filed. If not, explain why? The authors have confirmed that they have dealt with all appropriate IPR disclosures. (8) Has an IPR disclosure been filed that references this document? If so, summarize any WG discussion and conclusion regarding the IPR disclosures. There is no IPR disclosures for this document. (9) How solid is the WG consensus behind this document? Does it represent the strong concurrence of a few individuals, with others being silent, or does the WG as a whole understand and agree with it? The document represents strong WG consensus. (10) Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarize the areas of conflict in separate email messages to the Responsible Area Director. There have been no threats of anyone appealing the documents. (11) Identify any ID nits the Document Shepherd has found in this document. (See http://www.ietf.org/tools/idnits/ and the Internet-Drafts Checklist). Boilerplate checks are not enough; this check needs to be thorough. Two errors have been found in the ID nits tool. Both can be fixed easily and will be discussed with the AD. idnits 2.15.01 /tmp/draft-ietf-ntp-mac-04.txt: ** The abstract seems to contain references ([RFC5905], [RFC4493]), which it shouldn't. Please replace those with straight textual mentions of the documents in question. ** Downref: Normative reference to an Informational RFC: RFC 4493 (12) Describe how the document meets any required formal review criteria, such as the MIB Doctor, media type, and URI type reviews. There are no formal review criteria for this document. (13) Have all references within this document been identified as either normative or informative? All references are tagged as normative or informative. (14) Are there normative references to documents that are not ready for advancement or are otherwise in an unclear state? If such normative references exist, what is the plan for their completion? All normative references are completed. (15) Are there downward normative references (see RFC 3967)? If so, list these downward references to support the Area Director in the Last Call procedure. There is one downward normative reference to the Information RFC (4493) that specifies the AES-CMAC cryptographic algorithm used in this document. (16) Will publication of this document change the status of any existing RFCs? Are those RFCs listed on the title page header, listed in the abstract, and discussed in the introduction? If the RFCs are not listed in the Abstract and Introduction, explain why, and point to the part of the document where the relationship of this document to the other RFCs is discussed. If this information is not in the document, explain why the WG considers it unnecessary. This document updates RFC 5905. (17) Describe the Document Shepherd's review of the IANA considerations section, especially with regard to its consistency with the body of the document. Confirm that all protocol extensions that the document makes are associated with the appropriate reservations in IANA registries. Confirm that any referenced IANA registries have been clearly identified. Confirm that newly created IANA registries include a detailed specification of the initial contents for the registry, that allocations procedures for future registrations are defined, and a reasonable name for the new registry has been suggested (see RFC 5226). There are no new IANA considerations contained in this document. (18) List any new IANA registries that require Expert Review for future allocations. Provide any public guidance that the IESG would find useful in selecting the IANA Experts for these new registries. There are no new IANA considerations contained in this document. (19) Describe reviews and automated checks performed by the Document Shepherd to validate sections of the document written in a formal language, such as XML code, BNF rules, MIB definitions, etc. There are no formal language sections in this document. |
2018-05-30
|
04 | Karen O'Donoghue | Responsible AD changed to Suresh Krishnan |
2018-05-30
|
04 | Karen O'Donoghue | IETF WG state changed to Submitted to IESG for Publication from WG Consensus: Waiting for Write-Up |
2018-05-30
|
04 | Karen O'Donoghue | IESG state changed to Publication Requested |
2018-05-30
|
04 | Karen O'Donoghue | IESG process started in state Publication Requested |
2018-05-30
|
04 | Karen O'Donoghue | Changed document writeup |
2018-05-30
|
04 | Karen O'Donoghue | IETF WG state changed to WG Consensus: Waiting for Write-Up from In WG Last Call |
2018-05-30
|
04 | Karen O'Donoghue | Changed consensus to Yes from Unknown |
2018-05-30
|
04 | Karen O'Donoghue | Intended Status changed to Proposed Standard from None |
2018-03-21
|
04 | Karen O'Donoghue | Added to session: IETF-101: ntp Thu-1550 |
2018-03-05
|
04 | Aanchal Malhotra | New version available: draft-ietf-ntp-mac-04.txt |
2018-03-05
|
04 | (System) | New version approved |
2018-03-05
|
04 | (System) | Request for posting confirmation emailed to previous authors: Sharon Goldberg , Aanchal Malhotra |
2018-03-05
|
04 | Aanchal Malhotra | Uploaded new revision |
2017-10-30
|
03 | Aanchal Malhotra | New version available: draft-ietf-ntp-mac-03.txt |
2017-10-30
|
03 | (System) | New version approved |
2017-10-30
|
03 | (System) | Request for posting confirmation emailed to previous authors: Sharon Goldberg , Aanchal Malhotra |
2017-10-30
|
03 | Aanchal Malhotra | Uploaded new revision |
2017-10-30
|
02 | Aanchal Malhotra | New version available: draft-ietf-ntp-mac-02.txt |
2017-10-30
|
02 | (System) | New version approved |
2017-10-30
|
02 | (System) | Request for posting confirmation emailed to previous authors: Sharon Goldberg , Aanchal Malhotra |
2017-10-30
|
02 | Aanchal Malhotra | Uploaded new revision |
2017-09-01
|
01 | Karen O'Donoghue | Notification list changed to Karen O'Donoghue <odonoghue@isoc.org> |
2017-09-01
|
01 | Karen O'Donoghue | Document shepherd changed to Karen O'Donoghue |
2017-08-08
|
01 | Karen O'Donoghue | IETF WG state changed to In WG Last Call from WG Document |
2017-07-03
|
01 | Aanchal Malhotra | New version available: draft-ietf-ntp-mac-01.txt |
2017-07-03
|
01 | (System) | New version approved |
2017-07-03
|
01 | (System) | Request for posting confirmation emailed to previous authors: Aanchal Malhotra , Sharon Goldberg |
2017-07-03
|
01 | Aanchal Malhotra | Uploaded new revision |
2017-05-25
|
00 | Karen O'Donoghue | This document now replaces draft-aanchal4-ntp-mac instead of None |
2017-01-10
|
01 | (System) | Request for posting confirmation emailed to previous authors: "Sharon Goldberg" , "Aanchal Malhotra" |
2017-01-10
|
01 | Aanchal Malhotra | Uploaded new revision |
2017-01-05
|
00 | Aanchal Malhotra | New version available: draft-ietf-ntp-mac-00.txt |
2017-01-05
|
00 | (System) | WG -00 approved |
2016-11-23
|
00 | Aanchal Malhotra | Set submitter to "Aanchal Malhotra ", replaces to (none) and sent approval email to group chairs: ntp-chairs@ietf.org |
2016-11-23
|
00 | Aanchal Malhotra | Uploaded new revision |