A Framework for Transmission of IP Datagrams over MPEG-2 Networks
draft-ietf-ipdvb-arch-04
Revision differences
Document history
Date | Rev. | By | Action |
---|---|---|---|
2012-08-22
|
04 | (System) | post-migration administrative database adjustment to the No Objection position for Russ Housley |
2005-05-09
|
04 | Amy Vezza | State Changes to RFC Ed Queue from Approved-announcement sent by Amy Vezza |
2005-05-05
|
04 | Amy Vezza | IESG state changed to Approved-announcement sent |
2005-05-05
|
04 | Amy Vezza | IESG has approved the document |
2005-05-05
|
04 | Amy Vezza | Closed "Approve" ballot |
2005-05-05
|
04 | Margaret Cullen | State Changes to Approved-announcement to be sent from IESG Evaluation::AD Followup by Margaret Wasserman |
2005-05-02
|
04 | Russ Housley | [Ballot Position Update] Position for Russ Housley has been changed to No Objection from Discuss by Russ Housley |
2005-05-02
|
04 | (System) | Sub state has been changed to AD Follow up from New Id Needed |
2005-05-02
|
04 | (System) | New version available: draft-ietf-ipdvb-arch-04.txt |
2005-03-04
|
04 | (System) | Removed from agenda for telechat - 2005-03-03 |
2005-03-03
|
04 | Amy Vezza | State Changes to IESG Evaluation::Revised ID Needed from IESG Evaluation by Amy Vezza |
2005-03-03
|
04 | David Kessens | [Ballot Position Update] New position, No Objection, has been recorded for David Kessens by David Kessens |
2005-03-02
|
04 | Michelle Cotton | IANA Comments: We understand this document to have NO IANA Actions. |
2005-03-01
|
04 | Russ Housley | [Ballot discuss] In section 8, 5th paragraph, the text says: > > A related role for subnetwork security is to protect users against … [Ballot discuss] In section 8, 5th paragraph, the text says: > > A related role for subnetwork security is to protect users against > traffic analysis, i.e., identifying the communicating parties (by IP > or MAC address) and determining their communication patterns, even > when their actual contents are protected by strong end-to-end > security mechanisms (this is important for networks such as > broadcast/radio, where eaves-dropping is easy). > I agree that the link layer is the only place in the protocol stack to protect against traffic analysis. However, most link layer security protocols do not provide this service. For example, the encryption provided by IEEE 802.11i does not cover the MAC addresses. I do not know about the MPE encryption capabilities. Does MPE protect layer 2 address information? In section 8.1, 2nd paragraph, the text says: > > MPE supports optional link encryption using a pair of bits within > the MPE protocol header to indicate the use of encryption. To > support optional link level encryption, it is recommended that a new > encapsulation also supports optional encryption of the SNDU payload. > Furthermore, it may be desirable to encrypt/authenticate some/all of > the SNDU headers. However, the specification must provide > appropriate code points to allow such encryption to be implemented > at the link layer. > I take the first sentence as tutorial. The rest confuses me. I think it is saying that MPE encryption is not supported by this specification, and making some recommendations to future authors that might want to write a specification to support it. |
2005-03-01
|
04 | Russ Housley | [Ballot Position Update] Position for Russ Housley has been changed to Discuss from Undefined by Russ Housley |
2005-03-01
|
04 | Russ Housley | [Ballot comment] In section 8.1, 3rd paragraph: s!PGP!OpenPGP! In section 8.1, 1st paragraph: s!SSL!TLS! s!PGP!OpenPGP, S/MIME! |
2005-03-01
|
04 | Russ Housley | [Ballot Position Update] New position, Undefined, has been recorded for Russ Housley by Russ Housley |
2005-02-26
|
04 | Margaret Cullen | [Ballot Position Update] New position, Yes, has been recorded for Margaret Wasserman |
2005-02-26
|
04 | Margaret Cullen | Ballot has been issued by Margaret Wasserman |
2005-02-26
|
04 | Margaret Cullen | Created "Approve" ballot |
2005-02-26
|
04 | (System) | Ballot writeup text was added |
2005-02-26
|
04 | (System) | Last call text was added |
2005-02-26
|
04 | (System) | Ballot approval text was added |
2005-02-25
|
04 | Margaret Cullen | State Changes to IESG Evaluation from AD Evaluation by Margaret Wasserman |
2005-02-25
|
04 | Margaret Cullen | Placed on agenda for telechat - 2005-03-03 by Margaret Wasserman |
2005-01-18
|
03 | (System) | New version available: draft-ietf-ipdvb-arch-03.txt |
2005-01-10
|
04 | Margaret Cullen | Date: Mon, 27 Dec 2004 00:12:56 -0800 (PST) From: Bernard Aboba To: margaret@thingmagic.com cc: Jari Arkko , farid.adrangi@intel.com Subject: EAP WG Review of draft-adrangi-eap-network-discovery-07.txt X-Originating-IP: … Date: Mon, 27 Dec 2004 00:12:56 -0800 (PST) From: Bernard Aboba To: margaret@thingmagic.com cc: Jari Arkko , farid.adrangi@intel.com Subject: EAP WG Review of draft-adrangi-eap-network-discovery-07.txt X-Originating-IP: 67.182.139.247 X-Report-Abuse-To: abuse@dyndns.org (see http://www.mailhop.org/outbound/abuse.html for abuse reporting information) X-MHO-User: aboba X-Spam: [F=0.0016566822; B=0.500(0); HS=0.500(-5800); S=0.010; MH=0.500(2004122603); R=0.141(s935/n5693)] At this point, the EAP WG has completed its review of draft-adrangi-eap-network-discovery-07.txt. The document describes a mechanism by which "Identity Selection hints" may be communicated to an EAP peer, helping it to select an appropriate Network Access Identifier (NAI). This mechanism is useful not only for wireless LAN roaming (the target application) but also in other applications such as wired network authentication where link layer identity hints may not be available. The document has gone through two "pseudo-WG last calls" during which a number of issues were brought up and subsequently resolved. The document was also reviewed by IEEE 802.11u. A summary of the issues that were raised and resolved (including Issues 256, 271, 280 and 281) can be found on the EAP Issues List: http://www.drizzle.com/~aboba/EAP/eapissues.html Both EAP WG chairs (Jari and myself) have read the document, and approve of its publication. Discussion on the document was not contentious and an appeal is not expected. However, it is worth noting that IPR has been asserted with respect to the document: http://www.ietf.org/ietf/IPR/telecom-italia-ipr-wlan-access.txt In terms of existing usage, the mechanism described in this document for communication of hints (NUL separator after the displayable message within an EAP-Request/Identity) is described in RFC 3748, and has been implemented in shipping products, although not for the purpose described in the document. The ABNF within the specification has been reviewed for backward compatibility with existing practice. Given that EAP WG review has been completed on the document, we recommend that the IESG approve the document for publication as an Informational RFC via the individual submission route. Note that the document has a normative dependence on RFC 2486bis (draft-ietf-radext-rfc2486bis-02.txt) which has recently gone to IETF last call. |
2005-01-10
|
04 | Margaret Cullen | State Changes to AD Evaluation from Publication Requested by Margaret Wasserman |
2004-12-17
|
04 | Dinara Suleymanova | Draft Added by Dinara Suleymanova in state Publication Requested |
2004-12-07
|
02 | (System) | New version available: draft-ietf-ipdvb-arch-02.txt |
2004-09-30
|
01 | (System) | New version available: draft-ietf-ipdvb-arch-01.txt |
2004-07-09
|
00 | (System) | New version available: draft-ietf-ipdvb-arch-00.txt |