Skip to main content

Specification of the IP Flow Information Export (IPFIX) Protocol for the Exchange of IP Traffic Flow Information
draft-ietf-ipfix-protocol-26

Revision differences

Document history

Date Rev. By Action
2012-08-22
26 (System) post-migration administrative database adjustment to the No Objection position for Bill Fenner
2012-08-22
26 (System) post-migration administrative database adjustment to the No Objection position for Jari Arkko
2012-08-22
26 (System) post-migration administrative database adjustment to the Yes position for Dan Romascanu
2012-08-22
26 (System) post-migration administrative database adjustment to the No Objection position for Sam Hartman
2012-08-22
26 (System) post-migration administrative database adjustment to the No Objection position for Magnus Westerlund
2012-08-22
26 (System) post-migration administrative database adjustment to the No Objection position for Russ Housley
2007-11-12
26 (System) IANA Action state changed to RFC-Ed-Ack from Waiting on RFC Editor
2007-11-09
26 (System) IANA Action state changed to Waiting on RFC Editor from In Progress
2007-11-09
26 (System) IANA Action state changed to In Progress from Waiting on Authors
2007-10-17
26 (System) IANA Action state changed to Waiting on Authors from In Progress
2007-10-16
26 Amy Vezza State Changes to RFC Ed Queue from Approved-announcement sent by Amy Vezza
2007-10-15
26 (System) IANA Action state changed to In Progress from RFC-Ed-Ack
2007-10-15
26 Amy Vezza IESG state changed to Approved-announcement sent
2007-10-15
26 Amy Vezza IESG has approved the document
2007-10-15
26 Amy Vezza Closed "Approve" ballot
2007-10-15
26 Amy Vezza State Changes to Approved-announcement to be sent from IESG Evaluation::AD Followup by Amy Vezza
2007-10-11
26 Russ Housley [Ballot Position Update] Position for Russ Housley has been changed to No Objection from Discuss by Russ Housley
2007-10-11
26 Dan Romascanu
An updated Note to RFC Editor was added to the write-up to solve the concerns raised in the DISCUSS by Russ Housley.

Note to RFC …
An updated Note to RFC Editor was added to the write-up to solve the concerns raised in the DISCUSS by Russ Housley.

Note to RFC Editor

Please make the following changes:

1. Add at the end of the currect Section 11.3 the following paragraph:

NEW:

Internationalized domain names (IDN) in either the subjectAltName
extension of type dNSName or the most specific Common Name field of the
Subject field of the X.509 certificate MUST be encoded using Punycode
[RFC3492] as described in Section 4, "Conversion Operations", of
[RFC3490].

2. Add to Section 14.1 the following two normative references:

NEW:

  [RFC3490]    Faltstrom, P., Hoffman, P., and A. Costello,
                "Internationalizing Domain Names in Applications (IDNA)",
                RFC 3490, March 2003.

  [RFC3492]    Costello, A., "Punycode: A Bootstring encoding of
                Unicode for use with Internationalized Domain Names in
                Applications (IDNA)", RFC 3492, March 2003.
2007-10-11
26 Dan Romascanu Note field has been cleared by Dan Romascanu
2007-10-10
26 Russ Housley
[Ballot discuss]
In Section 11.3, the document says:
  >
  > The fully-qualified domain name used to identify an IPFIX Collecting
  > Process …
[Ballot discuss]
In Section 11.3, the document says:
  >
  > The fully-qualified domain name used to identify an IPFIX Collecting
  > Process or Exporting Process may be stored either in a subjectAltName
  > extension of type dNSName, or in the most specific Common Name field
  > of the Subject field of the X.509 certificate.  If both are present,
  > the subjectAltName extension is given preference.
  >
  When the common name is used, how is the fully-qualified domain name
  encoded in the directory string?  This is especially important to
  specify in order to support IDNs.  I suspect that punycode will be
  needed.

The expected resolution is a new paragraph 4 of section 11.3:

  Internationalized domain names (IDN) in either the subjectAltName
  extension of type dNSName or the most specific Common Name field of
  the Subject field of the X.509 certificate MUST be encoded using
  Punycode [RFC3492] as described in Section 4, "Conversion
  Operations", of [RFC3490].

with the following new normative references:

  [RFC3490]    Faltstrom, P., Hoffman, P., and A. Costello,
              "Internationalizing Domain Names in Applications (IDNA)",
              RFC 3490, March 2003.

  [RFC3492]    Costello, A., "Punycode: A Bootstring encoding of
              Unicode for use with Internationalized Domain Names in
2007-10-05
26 (System) Removed from agenda for telechat - 2007-10-04
2007-10-04
26 Amy Vezza State Changes to IESG Evaluation::AD Followup from IESG Evaluation by Amy Vezza
2007-10-04
26 Chris Newman [Ballot comment]
Carrying forward Ted's position after review of only the deltas.
2007-10-04
26 Chris Newman [Ballot Position Update] New position, No Objection, has been recorded by Chris Newman
2007-10-03
26 Russ Housley
[Ballot comment]
In at least two places, the document says:
  >
  > The Exporting Process uses the Observation Domain ID to uniquely
  …
[Ballot comment]
In at least two places, the document says:
  >
  > The Exporting Process uses the Observation Domain ID to uniquely
  > identify to the Collecting Process the Observation Domain that
  > metered the Flows.  It is RECOMMENDED that this identifier is also
  > unique per IPFIX Device.
  >
  The document offers no advice about the assignment of these
  identifiers to meet this recommendation.  Is is provided in some
  other IPFIX document?  If so, please reference it.

  In Section 11.1: s/man in the middle/man-in-the-middle/
2007-10-03
26 Russ Housley
[Ballot discuss]
In Section 11.3, the document says:
  >
  > The fully-qualified domain name used to identify an IPFIX Collecting
  > Process …
[Ballot discuss]
In Section 11.3, the document says:
  >
  > The fully-qualified domain name used to identify an IPFIX Collecting
  > Process or Exporting Process may be stored either in a subjectAltName
  > extension of type dNSName, or in the most specific Common Name field
  > of the Subject field of the X.509 certificate.  If both are present,
  > the subjectAltName extension is given preference.
  >
  When the common name is used, how is the fully-qualified domain name
  encoded in the directory string?  This is especially important to
  specify in order to support IDNs.  I suspect that punycode will be
  needed.
2007-10-03
26 Russ Housley [Ballot Position Update] New position, Discuss, has been recorded by Russ Housley
2007-10-03
26 David Ward [Ballot Position Update] New position, No Objection, has been recorded by David Ward
2007-10-02
26 Tim Polk [Ballot Position Update] New position, No Objection, has been recorded by Tim Polk
2007-10-01
26 Ron Bonica [Ballot Position Update] New position, No Objection, has been recorded by Ron Bonica
2007-10-01
26 Ron Bonica Created "Approve" ballot
2007-09-25
26 Dan Romascanu
[Note]: 'A previous version draft-ietf-ipfix-protocol-24.txt of this draft was
already approved by the IESG. The IPFIX WG decided to make changes to that
version of …
[Note]: 'A previous version draft-ietf-ipfix-protocol-24.txt of this draft was
already approved by the IESG. The IPFIX WG decided to make changes to that
version of the document with the principal goal of removing the SCTP
stream 0 restriction. Reviews should focus on the changes since
draft-ietf-ipfix-protocol-24.txt which are mentioned in an editorial note
currently placed after the Table of Contents.
' added by Dan Romascanu
2007-09-23
26 Dan Romascanu State Changes to IESG Evaluation from Waiting for AD Go-Ahead by Dan Romascanu
2007-09-23
26 Dan Romascanu Placed on agenda for telechat - 2007-10-04 by Dan Romascanu
2007-09-23
26 Dan Romascanu
[Note]: 'A previous version draft-ietf-ipfix-protocol-24.txt of this draft was
already approved by the IESG. The IPFIX WG decided to make changes to that
version of …
[Note]: 'A previous version draft-ietf-ipfix-protocol-24.txt of this draft was
already approved by the IESG. The IPFIX WG decided to make changes to that
version of the document with the principal goal of removing the SCTP
stream 0 restriction. Reviews should focus on the changes since
draft-ietf-ipfix-protocol-26.txt which are mentioned in an editorial note
currently placed after the Table of Contents.
' added by Dan Romascanu
2007-09-20
26 (System) State has been changed to Waiting for AD Go-Ahead from In Last Call by system
2007-09-19
26 Amanda Baber
IANA Last Call comments:

For draft-ietf-ipfix-protocol-24.txt, IANA created the following new registries and populated them with their initial assignments:

- IPFIX Version Numbers
- …
IANA Last Call comments:

For draft-ietf-ipfix-protocol-24.txt, IANA created the following new registries and populated them with their initial assignments:

- IPFIX Version Numbers
- IPFIX Set IDs

Please see: http://www.iana.org/assignments/ipfix-parameters

We understand the above to be the only IANA Actions for this document.
2007-09-06
26 Amy Vezza Last call sent
2007-09-06
26 Amy Vezza State Changes to In Last Call from Last Call Requested by Amy Vezza
2007-09-06
26 Dan Romascanu State Changes to Last Call Requested from AD Evaluation::AD Followup by Dan Romascanu
2007-09-06
26 Dan Romascanu Last Call was requested by Dan Romascanu
2007-09-05
26 (System) New version available: draft-ietf-ipfix-protocol-26.txt
2007-08-17
26 (System) Sub state has been changed to AD Follow up from New Id Needed
2007-08-17
25 (System) New version available: draft-ietf-ipfix-protocol-25.txt
2007-08-10
26 Amy Vezza State Changes to AD Evaluation::Revised ID Needed from RFC Ed Queue by Amy Vezza
2007-08-10
26 Amy Vezza Dan Romascanu requested that this document be pulled from the RFC Editor Queue on August 7, 2007.
2007-02-20
26 (System) IANA Action state changed to RFC-Ed-Ack from Waiting on RFC Editor
2007-02-20
26 (System) IANA Action state changed to Waiting on RFC Editor from In Progress
2007-02-12
26 (System) IANA Action state changed to In Progress from Waiting on Authors
2007-01-29
26 (System) IANA Action state changed to Waiting on Authors from In Progress
2007-01-29
26 (System) IANA Action state changed to In Progress from Waiting on Authors
2007-01-24
26 (System) IANA Action state changed to Waiting on Authors from In Progress
2007-01-24
26 (System) IANA Action state changed to In Progress from Waiting on Authors
2007-01-22
26 (System) IANA Action state changed to Waiting on Authors from In Progress
2007-01-03
(System) Posted related IPR disclosure: Cisco's Statement about IPR claimed in draft-ietf-ipfix-protocol-24.txt
2006-11-27
26 Amy Vezza State Changes to RFC Ed Queue from Approved-announcement sent by Amy Vezza
2006-11-17
26 Amy Vezza IESG state changed to Approved-announcement sent
2006-11-17
26 Amy Vezza IESG has approved the document
2006-11-17
26 Amy Vezza Closed "Approve" ballot
2006-11-17
26 Amy Vezza State Changes to Approved-announcement to be sent from IESG Evaluation::AD Followup by Amy Vezza
2006-11-15
26 Dan Romascanu [Ballot Position Update] Position for Dan Romascanu has been changed to Yes from Discuss by Dan Romascanu
2006-11-12
26 Cullen Jennings [Ballot Position Update] Position for Cullen Jennings has been changed to Yes from No Objection by Cullen Jennings
2006-11-12
26 Cullen Jennings [Ballot discuss]
2006-11-12
26 Cullen Jennings [Ballot Position Update] Position for Cullen Jennings has been changed to No Objection from Discuss by Cullen Jennings
2006-11-09
24 (System) New version available: draft-ietf-ipfix-protocol-24.txt
2006-11-08
26 (System) Request for Early review by SECDIR Completed. Reviewer: Radia Perlman.
2006-11-08
26 (System) Request for Early review by SECDIR is assigned to Jeffrey Schiller
2006-11-08
26 (System) Request for Early review by SECDIR is assigned to Jeffrey Schiller
2006-11-08
26 Cullen Jennings
2006-10-26
26 Cullen Jennings State Change Notice email list have been change to n.brownlee@auckland.ac.nz, n.brownlee@auckland.ac.nz, plonka@doit.wisc.edu, bclaise@cisco.com from n.brownlee@auckland.ac.nz, n.brownlee@auckland.ac.nz, plonka@doit.wisc.edu
2006-10-26
26 Dan Romascanu [Ballot discuss]
I am holding a DISCUSS on Bill Fenner's COMMENT about the down reference.
2006-10-26
26 Dan Romascanu [Ballot Position Update] Position for Dan Romascanu has been changed to Discuss from Yes by Dan Romascanu
2006-10-25
26 Bill Fenner [Ballot comment]
Note: the reference to draft-ietf-ipfix-architecture is technically a downref (see RFC 3967)
2006-10-23
26 Cullen Jennings
[Ballot discuss]
This rev did a great job of addressing everyone of the comments I had put in. Thank you. I think it the new …
[Ballot discuss]
This rev did a great job of addressing everyone of the comments I had put in. Thank you. I think it the new text has a few problems which are easily resolvable.

In section 11.2 paragraph two it says that one MUST implement SCTP and SCTP-PR over DTLS as described in 4337. However, 4347 does not describe this and as written it is not implementable. I think there is a trivial fix for this - you need to say as described in the tuxen draft and put in a normative reference to that draft.

I think the text in section 11.3 is still leaves too much undefined - for example - do you use CommonName of SubjectAltName. However, if Russ and Sam are ok with this as is, then it is fine by me. I think it would be good to have the security ADs just read this.

Last point has to do with the ports. I like how you have defined the multiplexing using the ports. I note that the SCTP and TCP stuff in section 10 does not mention ports but should and that the where the ports are mentioned for UDP it does not mention the different port when using DTLS which adds to confusion. I note that 3 ports have been registered with IANA for this protocol - I think we should ask IANA to free the unused unless it is clear why we need to keep in reserved. I really don't know the answer to this but do we need to do anything in the IANA section of this document to move the port registration to be associated with this document instead of the private registration that someone when and did.
2006-10-17
26 Jari Arkko [Ballot comment]
I would suggest that Section 10.3.6, paragraph 2, be added
default values for the rate and number of copies
associated with template changes.
2006-10-17
26 Jari Arkko [Ballot Position Update] Position for Jari Arkko has been changed to No Objection from Discuss by Jari Arkko
2006-10-17
26 Sam Hartman [Ballot Position Update] Position for Sam Hartman has been changed to No Objection from Discuss by Sam Hartman
2006-10-17
26 Dan Romascanu Placed on agenda for telechat - 2006-10-26 by Dan Romascanu
2006-10-16
26 Bill Fenner [Ballot Position Update] Position for Bill Fenner has been changed to No Objection from Discuss by Bill Fenner
2006-10-16
26 Magnus Westerlund [Ballot Position Update] Position for Magnus Westerlund has been changed to No Objection from Discuss by Magnus Westerlund
2006-10-14
26 (System) IANA Action state changed to In Progress from RFC-Ed-Ack
2006-10-13
26 (System) Sub state has been changed to AD Follow up from New Id Needed
2006-10-13
23 (System) New version available: draft-ietf-ipfix-protocol-23.txt
2006-10-09
26 Cullen Jennings
Any ETA on a new rev of this - we talked about it at last IETF and I thought we had come up with good …
Any ETA on a new rev of this - we talked about it at last IETF and I thought we had come up with good path to resolve all these?
2006-07-07
26 Jari Arkko
[Ballot discuss]
> SCTP [RFC2960] and PR-SCTP [RFC3758] MUST be implemented by all
> compliant implementations.  UDP [UDP] MAY also be …
[Ballot discuss]
> SCTP [RFC2960] and PR-SCTP [RFC3758] MUST be implemented by all
> compliant implementations.  UDP [UDP] MAY also be implemented by
> compliant implementations.  TCP [TCP] MAY also be implemented by
> compliant implementations. 
>
> ...
>
> When IPFIX uses UDP as the transport protocol, Template Sets and
> Option Template Sets MUST be re-sent at regular intervals.  The
> frequency of (Options) Template transmission MUST be configurable. 
> New Template Records SHOULD be transmitted as soon as they are
> created, and SHOULD be transmitted before any associated Data Record
> is transmitted. 
>             
> In the event of configuration changes, the Exporting Process SHOULD
> send multiple copies of the new template definitions, in different
> IPFIX Messages, at an accelerated rate.  In such a case, it MAY
> transmit the changed Template Record(s) and Options Template
> Record(s), without any data, in advance to help ensure that the
> Collector will have the correct template information before
> receiving the first data.
> ...
> The Collecting Process could deduce the loss and reordering of IPFIX
> Data Records by looking at the discontinuities in the IPFIX Message
> sequence number. In the case of UDP, the IPFIX Message sequence
> number contains the total number of IPFIX Data Records received for
> the UDP association, prior to the receipt of this IPFIX Message,
> modulo 2^32. IPFIX sequence number discontinuities SHOULD be logged.

> Templates sent from the Exporting Process to the Collecting 
> Process using UDP as a transport MUST be resent at regular 
> intervals in case previous copies were lost.  Implementations 
> MAY send templates using a reliable transport protocol, and 
> send IPFIX Data Records using UDP as the transport protocol.
> ...
> Template Withdraw Messages SHOULD NOT be sent over UDP.   
> ...       
> Because UDP is not a connection oriented protocol, the Exporting
> Process is unable to determine from the transport protocol that the
> Collecting Process is no longer able to receive the IFPIX Messages. 
> Therefore, it can not invoke a failover mechanism.  However, the
> Exporting Process MAY duplicate the IPFIX Message to several
> Collecting Processes.
>
> ...
>
> 8.    Template Management
>
> This section describes Template management when using SCTP and PR-
> SCTP as the transport protocol. Any necessary changes to Template
> management specifically related to TCP or UDP transport protocols
> are specified in section 10.
 
The large set of transport options make me uneasy about real-world
interoperability. In particular, I'm worried about the lack of
guidelines and default values for re-sending, duplicate sending,
whether sequence number tracking is required, and how and how
often templates are sent. Please add such guidelines and
default values.

COMMENT part follows:

Given that withdrawals need to use a reliable
transport and SCTP is a MUST, one possible simplifying
assumption would be to say that templates are always
sent over a reliable transport.

I'm also worried about implementation complexity. Was there really a
requirement for all of these options? Is it likely that implementations
follow the MUST requirement, or is the long list an indication
that different groups intend to use different transports, making
interoperability less likely?
2006-07-06
26 Amy Vezza State Changes to IESG Evaluation::Revised ID Needed from IESG Evaluation by Amy Vezza
2006-07-06
26 (System) [Ballot Position Update] New position, No Objection, has been recorded for Ross Callon by IESG Secretary
2006-07-06
26 Lisa Dusseault [Ballot Position Update] New position, No Objection, has been recorded for Lisa Dusseault by Lisa Dusseault
2006-07-06
26 David Kessens
[Ballot comment]
Comments from the DNS review team by Ólafur Guðmundsson:

The IPFIX documents are impressive, in size and how well they are written,
I …
[Ballot comment]
Comments from the DNS review team by Ólafur Guðmundsson:

The IPFIX documents are impressive, in size and how well they are written,
I did not have time to think through the protocol but from what I
nothing was sticking out like a sore thumb.
2006-07-06
26 David Kessens [Ballot Position Update] New position, No Objection, has been recorded for David Kessens by David Kessens
2006-07-06
26 Jon Peterson [Ballot Position Update] New position, No Objection, has been recorded for Jon Peterson by Jon Peterson
2006-07-06
26 Cullen Jennings
[Ballot discuss]
I considered deferring to give me a chance to talk to the authors - I suspect that many of these things may just …
[Ballot discuss]
I considered deferring to give me a chance to talk to the authors - I suspect that many of these things may just be my misunderstanding and can be easily cleared up. I decided to just stick them in and we can start a discussion to clear them up.

I'm concerned about what is the recommended mode for using this. It seemed like it was secure with TLS and also for DOS reasons use SCTP-PR. But iI don't think you can do both of these at the same time. What is the recommended way to sue this protocol?

I do not understand how the requirements in section 10.2 of the IPFIX-ARCH are achieved when using IPSEC.

I do not understand the advantages of SCTP over having an TCP connection for each set of messages that would go on a single stream in SCTP.

There is no advice on how to use SCTP streams (other than stream 0).

DTLS seems like an obvious candidate to meet many of your requirements. Why not include it?

Section 10.3.1 leaves me wondering if UDP is deprecated or not and when would it be ok to use it. This really needs clarification. I have no idea what a link is that runs UPD but where it is not possible to have congestion. Imagine I told this protocol to log all the packets that this protocol sent including a full copy of them.

How does a collector listen for both TCP and TLS packets on the same port? I can imagine this is possible to demux but I think it is worth explaining.

I think more advice is needed on checking the names in TLS certificates and checking the certificates are valid.
2006-07-06
26 Cullen Jennings
[Ballot discuss]
I considered deferring to give me a chance to talk to the authors - I suspect that many of these things may just …
[Ballot discuss]
I considered deferring to give me a chance to talk to the authors - I suspect that many of these things may just be my misunderstanding and can be easily cleared up. I decided to just stick them in and we can start a discussion to clear them up.

I'm concerned about what is the recommended mode for using this. It seemed like it was secure with TLS and also for DOS reasons use SCTP-PR. But iI don't think you can do both of these at the same time. What is the recommended way to sue this protocol?

I do not understand how the requirements in section 10.2 of the IPFIX-ARCH are achieved when using IPSEC.

I do not understand the advantages of SCTP over having an TCP connection for each set of messages that would go on a single stream in SCTP.

There is no advice on how to use SCTP streams (other than stream 0).

DTLS seems like an obvious candidate to meet many of your requirements. Why not include it?

Section 10.3.1 leaves me wondering if UDP is deprecated or not and when would it be ok to use it. This really needs clarification. I have no idea what a link is that runs UPD but where it is not possible to have congestion. Imagine I told this protocol to log all the packets that this protocol sent including a full copy of them.

How does a collector listen for both TCP and TLS packets on the same port? I can imagine this is possible to demux but I think it is worth explaining.

I think more advice is needed on checking the names in TLS certificates and checking the certificates are valid.
2006-07-06
26 Cullen Jennings [Ballot Position Update] Position for Cullen Jennings has been changed to Discuss from Undefined by Cullen Jennings
2006-07-06
26 Cullen Jennings
[Ballot comment]
Section 6.1 seems to duplicate type specifications that are also defined in the normative IPFIX-INFO reference. Normative definitions of things in two documents …
[Ballot comment]
Section 6.1 seems to duplicate type specifications that are also defined in the normative IPFIX-INFO reference. Normative definitions of things in two documents seems like a receipt for disaster. I would have preferred to see the the IPFIX-INFO document and this document as a ballot set.

Interoperability for UDP would be improved in you recommended a default time for  retransmission of templates.

There are many places in this protocol where they are several options - I imagine arguments were made for all of them but the allowing all of them results in this being a surprisingly complex protocol when clearly the early desires were for something very simple. I'm thinking of things like the transport options, the security options, the date times options, the reduced size options,

Using dates based on 2^32 seconds since 1970 always makes me shutter.

Might be nice to have advice on accuracy of any of the times and perhaps suggest NTP.

I am very curios about the interoperability events. Any TLS implementations? Which transport? Any SCTP-PR implementations? How did people use streams?
2006-07-06
26 Cullen Jennings [Ballot Position Update] New position, Undefined, has been recorded for Cullen Jennings by Cullen Jennings
2006-07-05
26 Bill Fenner
[Ballot discuss]
Reference issues:

[IPFIX-ARCH] is expired; I guess it got renamed from -arch to -architecture?

[RFC1948] is informational, so is a downref.  …
[Ballot discuss]
Reference issues:

[IPFIX-ARCH] is expired; I guess it got renamed from -arch to -architecture?

[RFC1948] is informational, so is a downref.  I suspect it's not actually normative, from the context, but if it is this needs to be handled with the 3967 rules.
2006-07-05
26 Bill Fenner [Ballot Position Update] Position for Bill Fenner has been changed to Discuss from No Objection by Bill Fenner
2006-07-05
26 Jari Arkko
[Ballot discuss]
> SCTP [RFC2960] and PR-SCTP [RFC3758] MUST be implemented by all
> compliant implementations.  UDP [UDP] MAY also be …
[Ballot discuss]
> SCTP [RFC2960] and PR-SCTP [RFC3758] MUST be implemented by all
> compliant implementations.  UDP [UDP] MAY also be implemented by
> compliant implementations.  TCP [TCP] MAY also be implemented by
> compliant implementations. 
>
> ...
>
> When IPFIX uses UDP as the transport protocol, Template Sets and
> Option Template Sets MUST be re-sent at regular intervals.  The
> frequency of (Options) Template transmission MUST be configurable. 
> New Template Records SHOULD be transmitted as soon as they are
> created, and SHOULD be transmitted before any associated Data Record
> is transmitted. 
>             
> In the event of configuration changes, the Exporting Process SHOULD
> send multiple copies of the new template definitions, in different
> IPFIX Messages, at an accelerated rate.  In such a case, it MAY
> transmit the changed Template Record(s) and Options Template
> Record(s), without any data, in advance to help ensure that the
> Collector will have the correct template information before
> receiving the first data.
> ...
> The Collecting Process could deduce the loss and reordering of IPFIX
> Data Records by looking at the discontinuities in the IPFIX Message
> sequence number. In the case of UDP, the IPFIX Message sequence
> number contains the total number of IPFIX Data Records received for
> the UDP association, prior to the receipt of this IPFIX Message,
> modulo 2^32. IPFIX sequence number discontinuities SHOULD be logged.

> Templates sent from the Exporting Process to the Collecting 
> Process using UDP as a transport MUST be resent at regular 
> intervals in case previous copies were lost.  Implementations 
> MAY send templates using a reliable transport protocol, and 
> send IPFIX Data Records using UDP as the transport protocol.
> ...
> Template Withdraw Messages SHOULD NOT be sent over UDP.   
> ...       
> Because UDP is not a connection oriented protocol, the Exporting
> Process is unable to determine from the transport protocol that the
> Collecting Process is no longer able to receive the IFPIX Messages. 
> Therefore, it can not invoke a failover mechanism.  However, the
> Exporting Process MAY duplicate the IPFIX Message to several
> Collecting Processes.
>
> ...
>
> 8.    Template Management
>
> This section describes Template management when using SCTP and PR-
> SCTP as the transport protocol. Any necessary changes to Template
> management specifically related to TCP or UDP transport protocols
> are specified in section 10.
 
The large set of transport options make me uneasy about real-world
interoperability In particular, I'm worried about the lack of guidelines and
default values for re-sending, duplicate sending, whether
sequence number tracking is required, and how and how
often templates are sent.

Given that withdrawals need to use a reliable
transport and SCTP is a MUST, one possible simplifying
assumption would be to say that templates are always
sent over a reliable transport.

COMMENT part follows:

I'm also worried about implementation complexity. Was there really a
requirement for all of these options? Is it likely that implementations
follow the MUST requirement, or is the long list an indication
that different groups intend to use different transports, making
interoperability less likely?
2006-07-05
26 Bill Fenner [Ballot Position Update] New position, No Objection, has been recorded for Bill Fenner by Bill Fenner
2006-07-05
26 Jari Arkko
[Ballot discuss]
> SCTP [RFC2960] and PR-SCTP [RFC3758] MUST be implemented by all
> compliant implementations.  UDP [UDP] MAY also be …
[Ballot discuss]
> SCTP [RFC2960] and PR-SCTP [RFC3758] MUST be implemented by all
> compliant implementations.  UDP [UDP] MAY also be implemented by
> compliant implementations.  TCP [TCP] MAY also be implemented by
> compliant implementations. 
>
> ...
>
> When IPFIX uses UDP as the transport protocol, Template Sets and
> Option Template Sets MUST be re-sent at regular intervals.  The
> frequency of (Options) Template transmission MUST be configurable. 
> New Template Records SHOULD be transmitted as soon as they are
> created, and SHOULD be transmitted before any associated Data Record
> is transmitted. 
>             
> In the event of configuration changes, the Exporting Process SHOULD
> send multiple copies of the new template definitions, in different
> IPFIX Messages, at an accelerated rate.  In such a case, it MAY
> transmit the changed Template Record(s) and Options Template
> Record(s), without any data, in advance to help ensure that the
> Collector will have the correct template information before
> receiving the first data.
> ...
> The Collecting Process could deduce the loss and reordering of IPFIX
> Data Records by looking at the discontinuities in the IPFIX Message
> sequence number. In the case of UDP, the IPFIX Message sequence
> number contains the total number of IPFIX Data Records received for
> the UDP association, prior to the receipt of this IPFIX Message,
> modulo 2^32. IPFIX sequence number discontinuities SHOULD be logged.

> Templates sent from the Exporting Process to the Collecting 
> Process using UDP as a transport MUST be resent at regular 
> intervals in case previous copies were lost.  Implementations 
> MAY send templates using a reliable transport protocol, and 
> send IPFIX Data Records using UDP as the transport protocol.
> ...
> Template Withdraw Messages SHOULD NOT be sent over UDP.   
> ...       
> Because UDP is not a connection oriented protocol, the Exporting
> Process is unable to determine from the transport protocol that the
> Collecting Process is no longer able to receive the IFPIX Messages. 
> Therefore, it can not invoke a failover mechanism.  However, the
> Exporting Process MAY duplicate the IPFIX Message to several
> Collecting Processes.
>
> ...
>
> 8.    Template Management
>
> This section describes Template management when using SCTP and PR-
> SCTP as the transport protocol. Any necessary changes to Template
> management specifically related to TCP or UDP transport protocols
> are specified in section 10.
 
The large set of transport options make me uneasy about real-world
interoperability and implementation complexity. Was there really a
requirement for all of these options? Is it likely that implementations
follow the MUST requirement, or is the long list an indication
that different groups intend to use different transports, making
interoperability less likely? (This part of my note is only a
COMMENT.)

In particular, I'm worried about the lack of guidelines and
default values for re-sending, duplicate sending, whether
sequence number tracking is required, and how and how
often templates are sent.

Given that withdrawals need to use a reliable
transport and SCTP is a MUST, one possible simplifying
assumption would be to say that templates are always
sent over a reliable transport.
2006-07-05
26 Mark Townsley [Ballot Position Update] New position, No Objection, has been recorded for Mark Townsley by Mark Townsley
2006-07-05
26 Jari Arkko [Ballot Position Update] New position, Discuss, has been recorded for Jari Arkko by Jari Arkko
2006-07-05
26 Sam Hartman
[Ballot discuss]
Based on a security review from Radia Perlman as well as my own comments.

BCP 61 requires a mandatory to implement strong security …
[Ballot discuss]
Based on a security review from Radia Perlman as well as my own comments.

BCP 61 requires a mandatory to implement strong security solution for
this protocol.  However Section 11.1.6 makes it clear that IPsec is
not mandated and 11.2 does not mandate TLS.  Section 11.4 does not
provide adequate protection for the Internet threat model.  DTLS and
TLS are certainly easier to deploy, although writing the binding for
SCTP (the mandatory transport) may be tricky.  If you decide to make
IPsec mandatory, then to make it reasonable to deploy, you will
probably need to mandate that given some small set of configuration
information (peer identities, local identities), an IPFIX
implementation must be able to set up default SPD rules and other
IPsec configuration.  It's not sufficient to create a deployable
solution to simply mandate IPsec and to tell administrators how to set
up a complex set of IPsec configurations.



BCP 107 provides a set of guidelines for automated key management.  I
believe under that analysis, automated key management is a requirement
for this protocol.

Radia indicated she could not determine how in the configuration where
TCP and UDP are used together, the templates sent over TCP were linked
to the data sent over UDP; with a quick look I could not determine
this either.

One significant problem with both TLS and IPsec in this document is
that you don't describe how IPFIX entities are named.  What identities
are expected in a certificate?

IPsec should use ESP (possibly with null encryption) rather than AH;
ESP and AH together are definitely not the recommended way to get
confidentiality and integrity.  What do the rules in 11.1.1 and 11.1.4
mean in terms of SPD entries?  11.1.1 is possibly clear enough
although an explicit example would be helpful.  11.1.4 needs to be
more clear.  Presumably this means a discard rule for any traffic on
port 4739 after protect rules for designated peers.

Unfortunately RFC 2401 does not seem to support SCTP port selectors,
so this may need to depend on RFC 4301 and IKEV2.  That may limit
IPsec's value as a mandatory to implement security solution and
encourage the WG to choose something else.


Section 11.2 is not sufficient for interoperable implementations.  How
is TLS requested and signaled?
2006-07-05
26 Sam Hartman
[Ballot discuss]
Based on a security review from Radia Perlman as well as my own comments.

BCP 61 requires a mandatory to implement strong security …
[Ballot discuss]
Based on a security review from Radia Perlman as well as my own comments.

BCP 61 requires a mandatory to implement strong security solution for
this protocol.  However Section 11.1.6 makes it clear that IPsec is
not mandated and 11.2 does not mandate TLS.  Section 11.4 does not
provide adequate protection for the Internet threat model.  DTLS and
TLS are certainly easier to deploy, although writing the binding for
SCTP (the mandatory transport) may be tricky.  If you decide to make
IPsec mandatory, then to make it reasonable to deploy, you will
probably need to manadate that given some small set of configuration
information (peer identities, local identities), an IPFIX
implementation must be able to set up default SPD rules and other
IPsec configuration.  It's not sufficient to create a deployable
solution to simply mandate IPsec and to tell administrators how to set
up a complex set of IPsec configurations.



BCP 107 provides a set of guidelines for automated key management.  I
believe under that analysis, automated key management is a requirement
for this protocol.

Radia indicated she could not determine how in the configuration where
TCP and UDP are used together, the templates sent over TCP were linked
to the data sent over UDP; with a quick look I could not determine
this either.

One significant problem with both TLS and IPsec in this document is
that you don't describe how IPFIX entities are named.  What identities
are expected in a certificate?

IPsec should use ESP (possibly with null encryption) rather than AH;
ESP and AH together are definitely not the recommended way to get
confidentiality and integrity.  What do the rules in 11.1.1 and 11.1.4
mean in terms of SPD entries?  11.1.1 is possibly clear enough
although an explicit example would be helpful.  11.1.4 needs to be
more clear.  Presumably this means a discard rule for any traffic on
port 4739 after protect rules for designated peers.

Unfortunately RFC 2401 does not seem to support SCTP port selectors,
so this may need to depend on RFC 4301 and IKEV2.  That may limit
IPsec's value as a mandatory to implement security solution and
encourage the WG to choose something else.


Section 11.2 is not sufficient for interoperable implementations.  How
is TLS requested and signaled?
2006-07-05
26 Sam Hartman [Ballot Position Update] New position, Discuss, has been recorded for Sam Hartman by Sam Hartman
2006-07-05
26 Brian Carpenter
[Ballot comment]
"Specification of the IPFIX Protocol for the Exchange of IP Traffic
Flow Information" would be a better title.

Question: is IANA supposed to …
[Ballot comment]
"Specification of the IPFIX Protocol for the Exchange of IP Traffic
Flow Information" would be a better title.

Question: is IANA supposed to create a registry for
IPFIX Version Number or IPFIX Set ID?
2006-07-05
26 Brian Carpenter [Ballot Position Update] Position for Brian Carpenter has been changed to No Objection from Undefined by Brian Carpenter
2006-07-03
26 Ted Hardie [Ballot Position Update] New position, No Objection, has been recorded for Ted Hardie by Ted Hardie
2006-07-03
26 Magnus Westerlund
[Ballot discuss]
Page 13:
  Sequence Number
          Incremental sequence counter modulo 2^32 of all IPFIX Data
        …
[Ballot discuss]
Page 13:
  Sequence Number
          Incremental sequence counter modulo 2^32 of all IPFIX Data
          Records sent on this stream from the current Observation
          Domain by the Exporting Process.  This value SHOULD be used
          by the Collecting Process to identify whether any IPFIX Data
          Records have been missed.  Template and Options Template
          Records do not increase the Sequence Number.

The term "stream" is not defined. This results in that there is not clear that one can implement this in an interoperable way.
2006-07-03
26 Magnus Westerlund [Ballot Position Update] Position for Magnus Westerlund has been changed to Discuss from No Objection by Magnus Westerlund
2006-07-03
26 Magnus Westerlund [Ballot Position Update] New position, No Objection, has been recorded for Magnus Westerlund by Magnus Westerlund
2006-06-30
26 Lars Eggert
[Ballot comment]
Section 1.1, paragraph 1:

>    The IPFIX protocol provides network administrators with access to IP
>    flow information.  The architecture for …
[Ballot comment]
Section 1.1, paragraph 1:

>    The IPFIX protocol provides network administrators with access to IP
>    flow information.  The architecture for the export of measured IP
>    flow information out of an IPFIX exporting process to a collecting
>    process is defined in [IPFIX-ARCH], per the requirements defined in
>    [RFC3917].  This document specifies how IPFIX data record and

  Nit: s/record/records/


Section 2., paragraph 10:

>      1. one or more packet header field (e.g. destination IP address),
>      transport header field (e.g. destination port number), or
>      application header field (e.g. RTP header fields [RFC1889])

  Nit: s/field/fields/ everywhere in this paragraph


Section 10., paragraph 1:

>    The IPFIX Protocol Specification has been designed to be transport
>    protocol independent.  Note that the Exporter can export to multiple
>    Collecting Processes, using independent transport protocols.

  So why do Section 8 and Section 9 talk about specifics when SCTP is
  used? Are the mechanisms described in those sections different for
  other transports?


Section 10.3.3, paragraph 1:

>    The maximum size of exported messages MUST be configured such that
>    the total packet size does not exceed the path MTU.

  I'd recommend adding: "If the path MTU is unknown, a maximum packet
  size of 512 octets SHOULD be used."


Section 11., paragraph 4:

>    IPFIX Messages can be secured using IPsec.  Alternatively if IPFIX
>    runs on top of SCTP or TCP, TLS [TLS] can be used.

  For UDP, DTLS could be used.


Section 11.4, paragraph 3:

>    If IP address spoofing can not be prevented, some level of
>    protection against an insertion attack is required.  With a modern
>    implementation of TCP with good ISN randomization [RFC1948] or SCTP
>    insertion such attacks are difficult without the ability to snoop
>    the packet Flow [RFC2960].  UDP is vulnerable to insertion attacks,
>    and SHOULD be protected by the use of the address restriction
>    mechanism described above.

  DTLS for UDP?


Section 12., paragraph 2:

>    New assignments in either IPFIX Version Number or IPFIX Set ID
>    assignments require an Standards Action [RFC2434], i.e. they are to
>    be made via Standards Track RFCs approved by the IESG.

  Nit: s/an Standards Action/a Standards Action/
2006-06-30
26 Lars Eggert
[Ballot comment]
Section 1.1, paragraph 1:

>    The IPFIX protocol provides network administrators with access to IP
>    flow information.  The architecture for …
[Ballot comment]
Section 1.1, paragraph 1:

>    The IPFIX protocol provides network administrators with access to IP
>    flow information.  The architecture for the export of measured IP
>    flow information out of an IPFIX exporting process to a collecting
>    process is defined in [IPFIX-ARCH], per the requirements defined in
>    [RFC3917].  This document specifies how IPFIX data record and

  Nit: s/record/records/


Section 2., paragraph 10:

>      1. one or more packet header field (e.g. destination IP address),
>      transport header field (e.g. destination port number), or
>      application header field (e.g. RTP header fields [RFC1889])

  Nit: s/field/fields/ everywhere in this paragraph


Section 10., paragraph 1:

>    The IPFIX Protocol Specification has been designed to be transport
>    protocol independent.  Note that the Exporter can export to multiple
>    Collecting Processes, using independent transport protocols.

  So why do Section 8 and Section 9 talk about specifics when SCTP is
  used? Are the mechanisms described in those sections different for
  other transports?


Section 11., paragraph 4:

>    IPFIX Messages can be secured using IPsec.  Alternatively if IPFIX
>    runs on top of SCTP or TCP, TLS [TLS] can be used.

  For UDP, DTLS could be used.


Section 11.4, paragraph 3:

>    If IP address spoofing can not be prevented, some level of
>    protection against an insertion attack is required.  With a modern
>    implementation of TCP with good ISN randomization [RFC1948] or SCTP
>    insertion such attacks are difficult without the ability to snoop
>    the packet Flow [RFC2960].  UDP is vulnerable to insertion attacks,
>    and SHOULD be protected by the use of the address restriction
>    mechanism described above.

  DTLS for UDP?


Section 12., paragraph 2:

>    New assignments in either IPFIX Version Number or IPFIX Set ID
>    assignments require an Standards Action [RFC2434], i.e. they are to
>    be made via Standards Track RFCs approved by the IESG.

  Nit: s/an Standards Action/a Standards Action/
2006-06-30
26 Lars Eggert [Ballot Position Update] New position, No Objection, has been recorded for Lars Eggert by Lars Eggert
2006-06-30
26 Brian Carpenter [Ballot comment]
"Specification of the IPFIX Protocol for the Exchange of IP Traffic
Flow Information" would be a better title.
2006-06-30
26 Brian Carpenter [Ballot Position Update] New position, Undefined, has been recorded for Brian Carpenter by Brian Carpenter
2006-06-27
26 Dan Romascanu State Changes to IESG Evaluation from Waiting for Writeup by Dan Romascanu
2006-06-27
26 Dan Romascanu Placed on agenda for telechat - 2006-07-06 by Dan Romascanu
2006-06-27
26 Dan Romascanu [Ballot Position Update] New position, Yes, has been recorded for Dan Romascanu
2006-06-27
26 Dan Romascanu Ballot has been issued by Dan Romascanu
2006-06-27
26 Dan Romascanu Created "Approve" ballot
2006-06-20
22 (System) New version available: draft-ietf-ipfix-protocol-22.txt
2006-05-16
26 (System) State has been changed to Waiting for Writeup from In Last Call by system
2006-05-08
26 Yoshiko Fong
IANA Last Call Comments:

In the first paragraph of the IANA Considerations section, "them" should be more explicit.
What does the word "them" refer to? …
IANA Last Call Comments:

In the first paragraph of the IANA Considerations section, "them" should be more explicit.
What does the word "them" refer to?

We understand this document to create 2 new registries:
IPFIX Version numbers
IPFIX Set IDs

Should the new registries be placed in a new separate location? For example a new location
named ipfix-parameters? Or, should it be nested within an existing registry?

The values that are described in section 12 (0, 1, 2 and 3) appear to be for Set IDs. Are
there any initial values for version numbers?

For the data set values, are these NOT assigned by IANA?

Section 12 also describes how "changes" can be made to the registry. Does "changes"
include both new registrations and modifications to existing registrations?

Changes in either IPFIX Version Number or IPFIX Set ID assignments
require an Standards Action [RFC 2434], i.e. they are to be made via
Standards Track RFCs approved by the IESG.

We understand Standards Action RFCs are needed to make changes to these registries.

Please clarify our questions above.
2006-05-07
26 (System) IANA Action state changed to In Progress
2006-05-02
26 Amy Vezza State Changes to In Last Call from Last Call Requested by Amy Vezza
2006-05-02
26 Dan Romascanu State Changes to Last Call Requested from AD Evaluation::AD Followup by Dan Romascanu
2006-05-02
26 Dan Romascanu Last Call was requested by Dan Romascanu
2006-05-02
26 (System) Ballot writeup text was added
2006-05-02
26 (System) Last call text was added
2006-05-02
26 (System) Ballot approval text was added
2006-04-28
21 (System) New version available: draft-ietf-ipfix-protocol-21.txt
2006-04-21
26 (System) Sub state has been changed to AD Follow up from New Id Needed
2006-04-21
20 (System) New version available: draft-ietf-ipfix-protocol-20.txt
2006-03-30
26 Dan Romascanu Shepherding AD has been changed to Dan Romascanu from Bert Wijnen
2006-03-17
26 Bert Wijnen State Changes to AD Evaluation::Revised ID Needed from AD Evaluation by Bert Wijnen
2006-03-15
26 Bert Wijnen
AD review posted to WG list:

-----Original Message-----
From: majordomo listserver [mailto:majordomo@mil.doit.wisc.edu]On Behalf
Of Wijnen, Bert (Bert)
Sent: Wednesday, March 15, 2006 01:22 …
AD review posted to WG list:

-----Original Message-----
From: majordomo listserver [mailto:majordomo@mil.doit.wisc.edu]On Behalf
Of Wijnen, Bert (Bert)
Sent: Wednesday, March 15, 2006 01:22
To: 'Ipfix Wg' (E-mail) (E-mail)
Cc: David Kessens (E-mail); Dan Romascanu (E-mail)
Subject: [ipfix] AD review for: draft-ietf-ipfix-protocol-19.txt


Sorry for the long delay.

WG chairs/editors, pls let me (us ADs) know if you want to respin a new
rev first before we do IETF Last Call.

- Sect 3.
  States that Template Sets MUST be sent periodically when UDP is used.
  What if TCP or or SCTP are used? Might want to state what expected
  behaviour is in those cases as well.

- sect 3.1 under SOurce ID
  I do not understand the last sentence. WHat does it mean?
  pls clarify in text.

- Page 16 under padding
  s/zero (0) octets/zero (0) valued octets/
  or "octets with a value of zero (o)" ??
  Last sentence under "padding" may need a period or semicolon in
  the middle of the sentence?

- Sect 5/6 speak about ...DeltaUSeconds, but I cannot find that term in
  INFO spec. It talks about ...DeltaMicroSeconds. Is that what you mean?

- sect 6.1.3
  I'd like to see a reference to the IEEE spec for floats.

- sect 6.1.5
  I am not sure that by saying "it is expected that strings will be coded
  in UTF-8 format" will guanrantee interoiperability?
  Maybe better use MUST (RFC2119) language.
  Last sentence of 6.1.5 talks about "NUL" characters. That again seems
  to be ASCII language. Maybe better state "zero valued octets" .

- sect 6.1.6
  YOu might want to add a sentence how long this can serve us.
  I believ it is something like 146 years,

- sect 6.2 speaks about signed64/unsigned64 and also for 32 and 16.
  Where are those types defined??

- one but last para on page 33
  "sufficient time" should be defined/explained somewhat don't
  you think so?

- Page 35.
  Should the "All Data Templates" be changed into "All Templates" ??

- I wonder if the one but last para of section 9 is a nice opening
  for DoS attacks?

- Sect 10.1 and 10.2 seem inconsistent in the use of SCTP-PR and
  PR-SCTP

- sect 10.2.6
  Where/how is the treshold specified?
  Same for sect 10.4.1.1

- sect 10.3.7
  It is unclear to me how/where the template lifetimes are specified,
  defined or configured.

- sect 11.4 last para
  I guess that just depends of who/where the attacker is, no?
  WHat if it is an internal ISP employee?

- sect 12.1
  I do not think the IPfix version number is an IANA controlled thing.
  I also think you want that to be changebale only by an IETF standards
  action (as opposed to just IETF consensus). Afetr all you want this
  protocol to be stds track.

- sect 12.2 seems to be IPFIX-INFO material and not protocol material??

- sect 12
  You have already gotten ports for UDP, SCTP and TCP.
  Sect 10.2.4.1 however does not list the port number.
  You may want to list the port there, and maybe in the IANA considerations
  you want to say/state that Nevil has already got port numbers for TCP,
  UDP and SCTP assigned via IANA.

- sect 12.
  Sect 11.1.1 talsk about IANA assigning Selectors. I guess this needs
  to be documented under IANA Considerations too.

- Sect 12.1
  The "IPFIX Set ID" starts (I think) a new registry. So you MUST
  describe under IANA considerations how to set it up and what the
  rules are for new assignements. You have that text (more or less) in
  sect 3.3.2, but you must spell it out here for IANA as well.

  Then you have a set of Set IDs that get assigned by this document
  and you should list them clearly for IANA so they can do the initial
  population of the registry.

- It seems to me that sect 13 is more an APPENDIX and so non-normative?
  Might be good to then list it as appendix and state that it is
  non-normative.

- Refrences.
  - is 1889 really normative?


admin/nits/spelling

- references/citation issues:

  !! Contains embedded space:
  P051 L048:    by IANA, on a First Come First Served basis [RFC 2434], subject to

  !! Contains embedded space:
  P052 L005:    Expert Review [RFC 2434], i.e. review by one of a group of experts

  !! Missing Reference for citation: [RFC768]
  P041 L036:    [RFC768]

  !! Missing citation for Informative reference:
  P060 L046:    [RFC3955] Leinen, S., "Evaluation of Candidate Protocols for IP Flow

- add citation to RFC2119 first time you mention 2119.

- sect 3.1 remove one of the two words "format"
  You migth also want to add a sentence to explain why the version
  field is 0x000a for this version.

- sect 3.1 under SOurce ID
  remove one of the two "the combination"

- sect 6.2
  s/smaller type/smaller size/ ??

- sect 7
  s/MUST/MUST be/

- page 33
  s/Disused/Unused/ ??

- the last par of the "Interllectual Property Statement" on page 63
  is normally not included in the RFC. So I would remove it.


Bert
2005-11-20
26 Bert Wijnen State Changes to AD Evaluation from Publication Requested by Bert Wijnen
2005-11-09
26 Bert Wijnen Shepherding AD has been changed to Bert Wijnen from David Kessens
2005-11-04
26 Dinara Suleymanova Draft Added by Dinara Suleymanova in state Publication Requested
2005-09-06
19 (System) New version available: draft-ietf-ipfix-protocol-19.txt
2005-08-08
18 (System) New version available: draft-ietf-ipfix-protocol-18.txt
2005-07-15
17 (System) New version available: draft-ietf-ipfix-protocol-17.txt
2005-06-21
16 (System) New version available: draft-ietf-ipfix-protocol-16.txt
2005-05-31
15 (System) New version available: draft-ietf-ipfix-protocol-15.txt
2005-05-13
14 (System) New version available: draft-ietf-ipfix-protocol-14.txt
2005-05-02
13 (System) New version available: draft-ietf-ipfix-protocol-13.txt
2005-04-19
12 (System) New version available: draft-ietf-ipfix-protocol-12.txt
2005-04-04
11 (System) New version available: draft-ietf-ipfix-protocol-11.txt
2005-03-21
10 (System) New version available: draft-ietf-ipfix-protocol-10.txt
2005-03-08
09 (System) New version available: draft-ietf-ipfix-protocol-09.txt
2005-02-22
08 (System) New version available: draft-ietf-ipfix-protocol-08.txt
2004-12-09
07 (System) New version available: draft-ietf-ipfix-protocol-07.txt
2004-10-22
06 (System) New version available: draft-ietf-ipfix-protocol-06.txt
2004-08-13
05 (System) New version available: draft-ietf-ipfix-protocol-05.txt
2004-07-21
04 (System) New version available: draft-ietf-ipfix-protocol-04.txt
2004-02-16
03 (System) New version available: draft-ietf-ipfix-protocol-03.txt
2004-01-21
02 (System) New version available: draft-ietf-ipfix-protocol-02.txt
2003-11-11
(System) Posted related IPR disclosure: Cisco's Statement about IPR Claimed in draft-ietf-ipfix-protocol
2003-10-28
01 (System) New version available: draft-ietf-ipfix-protocol-01.txt
2003-06-19
00 (System) New version available: draft-ietf-ipfix-protocol-00.txt