IKEv2-Derived Shared Secret Key for the One-Way Active Measurement Protocol (OWAMP) and Two-Way Active Measurement Protocol (TWAMP)
draft-ietf-ippm-ipsec-11
Revision differences
Document history
Date | Rev. | By | Action |
---|---|---|---|
2015-12-04
|
11 | (System) | RFC Editor state changed to AUTH48-DONE from AUTH48 |
2015-11-24
|
11 | (System) | RFC Editor state changed to AUTH48 from RFC-EDITOR |
2015-11-24
|
11 | (System) | RFC Editor state changed to RFC-EDITOR from EDIT |
2015-10-19
|
11 | (System) | RFC Editor state changed to EDIT from MISSREF |
2015-10-14
|
11 | (System) | Notify list changed from ietf@trammell.ch, ippm-chairs@ietf.org to (None) |
2015-10-14
|
11 | (System) | IANA Action state changed to RFC-Ed-Ack from Waiting on RFC Editor |
2015-10-12
|
11 | (System) | IANA Action state changed to Waiting on RFC Editor from Waiting on Authors |
2015-10-08
|
11 | (System) | IANA Action state changed to Waiting on Authors from In Progress |
2015-10-06
|
11 | (System) | RFC Editor state changed to MISSREF |
2015-10-06
|
11 | (System) | IESG state changed to RFC Ed Queue from Approved-announcement sent |
2015-10-06
|
11 | (System) | Announcement was received by RFC Editor |
2015-10-06
|
11 | (System) | IANA Action state changed to In Progress |
2015-10-06
|
11 | Amy Vezza | IESG state changed to Approved-announcement sent from Approved-announcement to be sent |
2015-10-06
|
11 | Amy Vezza | IESG has approved the document |
2015-10-06
|
11 | Amy Vezza | Closed "Approve" ballot |
2015-10-06
|
11 | Amy Vezza | Ballot approval text was generated |
2015-10-06
|
11 | Amy Vezza | Ballot writeup was changed |
2015-10-06
|
11 | Amy Vezza | IESG state changed to Approved-announcement to be sent from IESG Evaluation::AD Followup |
2015-10-06
|
11 | Brian Haberman | [Ballot Position Update] Position for Brian Haberman has been changed to Yes from Discuss |
2015-10-05
|
11 | Spencer Dawkins | [Ballot comment] I'm clearing my Discuss-for-IANA, now that draft-ietf-ippm-owamp-registry is on the next telechat agenda. |
2015-10-05
|
11 | Spencer Dawkins | [Ballot Position Update] Position for Spencer Dawkins has been changed to Yes from Discuss |
2015-08-26
|
11 | Kostas Pentikousis | New version available: draft-ietf-ippm-ipsec-11.txt |
2015-06-05
|
10 | Ben Campbell | [Ballot comment] Thanks for addressing my DISCUSS and comments! |
2015-06-05
|
10 | Ben Campbell | [Ballot Position Update] Position for Ben Campbell has been changed to No Objection from Discuss |
2015-05-29
|
10 | Stephen Farrell | [Ballot Position Update] Position for Stephen Farrell has been changed to No Objection from Discuss |
2015-05-29
|
10 | (System) | Sub state has been changed to AD Followup from Revised ID Needed |
2015-05-29
|
10 | Kostas Pentikousis | IANA Review state changed to Version Changed - Review Needed from IANA OK - Actions Needed |
2015-05-29
|
10 | Kostas Pentikousis | New version available: draft-ietf-ippm-ipsec-10.txt |
2015-04-16
|
09 | Meral Shirazipour | Request for Telechat review by GENART Completed: Ready. Reviewer: Meral Shirazipour. |
2015-04-09
|
09 | Cindy Morgan | IESG state changed to IESG Evaluation::Revised I-D Needed from IESG Evaluation |
2015-04-09
|
09 | Tero Kivinen | Request for Telechat review by SECDIR Completed: Has Issues. Reviewer: Hannes Tschofenig. |
2015-04-09
|
09 | Spencer Dawkins | [Ballot discuss] I'm just holding a Discuss so IANA can recheck whatever we end up doing with the registry conversation (no new actions required). |
2015-04-09
|
09 | Spencer Dawkins | [Ballot Position Update] Position for Spencer Dawkins has been changed to Discuss from Yes |
2015-04-09
|
09 | Jari Arkko | [Ballot Position Update] New position, No Objection, has been recorded for Jari Arkko |
2015-04-09
|
09 | Stephen Farrell | [Ballot discuss] (1) Are O/TWAMP vulnerable to reflection attacks with this scheme? If so that's not good. Sorry that I didn't manage to figure that … [Ballot discuss] (1) Are O/TWAMP vulnerable to reflection attacks with this scheme? If so that's not good. Sorry that I didn't manage to figure that out in the time available but I'm hoping you can just tell me the answer quickly:-) If it's not vulnerable, that's great though it might be worth making that clearer. If it is, then that seems like a bad plan about which we ought chat. The usual solution would be to derive different keys for each direction of use, and just say to use those appropriately. And even if O/TWAMP are thusly vulnerable with a PSK, it'd be fine, and quite possible to fix that here now we're doing better key mgmt. (2) Is it clear what to do if a key needs to be derived for O/TWAMP whilst re-keying is in progress for the IKE SA? (Hannes' review made me wonder, and I don't recall if the text on this is quite clear enough to not allow for a case where the two sides end up with different values derived from the DH share.) |
2015-04-09
|
09 | Stephen Farrell | Ballot discuss text updated for Stephen Farrell |
2015-04-09
|
09 | Martin Stiemerling | [Ballot Position Update] New position, No Objection, has been recorded for Martin Stiemerling |
2015-04-08
|
09 | Joel Jaeggli | [Ballot Position Update] New position, No Objection, has been recorded for Joel Jaeggli |
2015-04-08
|
09 | Alia Atlas | [Ballot Position Update] New position, No Objection, has been recorded for Alia Atlas |
2015-04-08
|
09 | Alvaro Retana | [Ballot Position Update] New position, No Objection, has been recorded for Alvaro Retana |
2015-04-08
|
09 | Deborah Brungard | [Ballot Position Update] New position, No Objection, has been recorded for Deborah Brungard |
2015-04-08
|
09 | Stephen Farrell | [Ballot discuss] Are O/TWAMP vulnerable to reflection attacks with this scheme? If so that's not good. Sorry that I didn't manage to figure that out … [Ballot discuss] Are O/TWAMP vulnerable to reflection attacks with this scheme? If so that's not good. Sorry that I didn't manage to figure that out in the time available but I'm hoping you can just tell me the answer quickly:-) If it's not vulnerable, that's great though it might be worth making that clearer. If it is, then that seems like a bad plan about which we ought chat. The usual solution would be to derive different keys for each direction of use, and just say to use those appropriately. And even if O/TWAMP are thusly vulnerable with a PSK, it'd be fine, and quite possible to fix that here now we're doing better key mgmt. |
2015-04-08
|
09 | Stephen Farrell | [Ballot comment] Since you're touching on the key managment code, I'd have loved to see you also update the O/TWAMP crypto itself to e.g. use … [Ballot comment] Since you're touching on the key managment code, I'd have loved to see you also update the O/TWAMP crypto itself to e.g. use an AEAD cipher rather than AES-CBC. Did the WG consider that? (I assume it's too late now, but I'm not clear from the write-up if this is implemented or not, so I guess there's a small chance that the WG may want to update more than just the key mgmt.) |
2015-04-08
|
09 | Stephen Farrell | [Ballot Position Update] New position, Discuss, has been recorded for Stephen Farrell |
2015-04-07
|
09 | Ben Campbell | [Ballot discuss] In the last paragraph, the text indicates that if the IKEv2 SA is rekeyed or deleted, O/TWAMP can continue to use the same … [Ballot discuss] In the last paragraph, the text indicates that if the IKEv2 SA is rekeyed or deleted, O/TWAMP can continue to use the same shared secret. The language seems to make such a continuance optional. Does that cause an interoperability problem if the endpoints don't agree on the strategy? If so, this may need a 2119 MUST (or possibly SHOULD). |
2015-04-07
|
09 | Ben Campbell | [Ballot comment] Section 1, paragraph 4: This paragraph casts the decision whether to send O/TWAMP inside or outside of an IPSec tunnel as a question … [Ballot comment] Section 1, paragraph 4: This paragraph casts the decision whether to send O/TWAMP inside or outside of an IPSec tunnel as a question of how you want to secure the O/TWAMP packets. It seems to me that this is really more a matter of what you want to measure, given that the tunneled data and non-tunneled data may have different performance capabilities. Sentence starting with "In this case...": The antecedent of "this" is unclear. Section 1, 2nd to last paragraph: I assume the last sentence means that IKEv2 derived keys SHOULD be used instead of shared secrets when otherwise using IKEv2. That seems to add a normative requirement to OWAMP and TWAMP in general, in which case this doc should be listed as updating those. Section 3: I agree with Brian's DISCUSS. Section 4.1: Please expand HMAC on first mention. Section 5.1: "SK_d MUST be computed as per [ref]" :That doesn't need 2119 language. "string "IPPM" comprises four ASCII characters ": This is oddly constructed. Is this intended to observe that IPPM has 4 letters? Section 5.2, paragraph after Figure 2: "Clearly, an implementation .... MUST ..." It is not as clear to me. Why does the use of IKEv2 create a stronger requirement to support all 3 protection modes? Section 5.3:, first paragraph: "The Set-Up-Response Message should be updated": Do you mean to say it _is_ updated? Paragraph after figure 3: s/ "can uniquely identify" / "uniquely identifies" 5.4, last sentence: The sentence is confusing. Do you mean to say that O/TWAMP SHOULD be configured to use the tunnel? |
2015-04-07
|
09 | Ben Campbell | [Ballot Position Update] New position, Discuss, has been recorded for Ben Campbell |
2015-04-07
|
09 | Barry Leiba | [Ballot comment] General: the "implementations compatible with this specification" stuff is really awkward and unnecessary. It would be better if it were changed to "implementations … [Ballot comment] General: the "implementations compatible with this specification" stuff is really awkward and unnecessary. It would be better if it were changed to "implementations of this method" (and similar phrasing, such as "clients implementing this method") throughout the document. But this is non-blocking, and there's no reason to discuss it. I urge you to consider the change, but please do with that urging as you think best. -- Section 3 -- This document reserves from the TWAMP-Modes registry the Mode value IKEv2Derived which is equal to 128 (i.e. bit set in position 7) and MUST be used by TWAMP implementations compatible with this specification. Pete Resnick has left the IESG in body only, but not in spirit. I think what you mean here is that you signal that you're using this method by setting IKEv2Derived. Is that correct? Assuming so, this would be more clearly and simply said in a way such as this (definitely without any 2119 words, which aren't appropriate for that): NEW TWAMP implementations signal the use of this method by setting IKEv2Derived (see Section 7). END Please leave the details of the registry, and which bit was assigned, to the IANA Considerations section, where that stuff belongs. The reference to Section 7 makes it easy to find. -- Section 5.2 -- As in Section 3, it's better just to refer to IKEv2Derived, and not to talk about the registration details here. So: OLD The Modes field in Figure 2 will need to allow for support of key derivation as discussed in Section 5.1. As such, the Modes value extension MUST be supported by implementations compatible with this document, indicating support for deriving the shared key from the IKEv2 SA. The new Modes value indicating support for this specification is IKEv2Derived and is equal to 128 (i.e. bit set in position 7). Clearly, an implementation compatible with this specification MUST support the authenticated, encrypted and mixed modes as per [RFC4656][RFC5357][RFC5618]. NEW The Modes field in Figure 2 will need to allow for support of key derivation as discussed in Section 5.1. Therefore, when this method is used, the Modes value extension MUST be supported. Support for deriving the shared key from the IKEv2 SA is indicated by setting IKEv2Derived (see Section 7). The authenticated, encrypted and mixed modes (see [RFC4656][RFC5357][RFC5618]) MUST also be supported. END |
2015-04-07
|
09 | Barry Leiba | [Ballot Position Update] New position, No Objection, has been recorded for Barry Leiba |
2015-04-06
|
09 | Terry Manderson | [Ballot Position Update] New position, No Objection, has been recorded for Terry Manderson |
2015-04-06
|
09 | Brian Haberman | [Ballot discuss] I hope this is a short discussion and I can change my ballot to a Yes... The applicability section says "Until an IANA … [Ballot discuss] I hope this is a short discussion and I can change my ballot to a Yes... The applicability section says "Until an IANA registry for OWAMP Mode values is established, the use this feature in OWAMP implementations MUST be arranged privately among consenting OWAMP users." Is there an issue with this document creating that registry? Or, if separation is needed, a companion document spun quickly to create this registry? The functionality specified here seems quite applicable to OWAMP and requiring private agreements to use it seems sub-optimal. |
2015-04-06
|
09 | Brian Haberman | [Ballot Position Update] New position, Discuss, has been recorded for Brian Haberman |
2015-04-05
|
09 | Kathleen Moriarty | [Ballot comment] Thanks for considering the SecDir review and providing edits in the current draft revision. https://www.ietf.org/mail-archive/web/secdir/current/msg05444.html |
2015-04-05
|
09 | Kathleen Moriarty | [Ballot Position Update] New position, No Objection, has been recorded for Kathleen Moriarty |
2015-04-02
|
09 | Jean Mahoney | Request for Telechat review by GENART is assigned to Meral Shirazipour |
2015-04-02
|
09 | Jean Mahoney | Request for Telechat review by GENART is assigned to Meral Shirazipour |
2015-04-02
|
09 | Tero Kivinen | Request for Telechat review by SECDIR is assigned to Hannes Tschofenig |
2015-04-02
|
09 | Tero Kivinen | Request for Telechat review by SECDIR is assigned to Hannes Tschofenig |
2015-03-27
|
09 | (System) | IANA Review state changed to IANA OK - Actions Needed from Version Changed - Review Needed |
2015-03-27
|
09 | Spencer Dawkins | Placed on agenda for telechat - 2015-04-09 |
2015-03-27
|
09 | Spencer Dawkins | Changed consensus to Yes from Unknown |
2015-03-27
|
09 | Spencer Dawkins | IESG state changed to IESG Evaluation from Waiting for Writeup |
2015-03-27
|
09 | Spencer Dawkins | Ballot has been issued |
2015-03-27
|
09 | Spencer Dawkins | [Ballot Position Update] New position, Yes, has been recorded for Spencer Dawkins |
2015-03-27
|
09 | Spencer Dawkins | Created "Approve" ballot |
2015-03-27
|
09 | Spencer Dawkins | Ballot writeup was changed |
2015-02-13
|
09 | Meral Shirazipour | Request for Last Call review by GENART Completed: Ready with Nits. Reviewer: Meral Shirazipour. |
2015-02-12
|
09 | Tero Kivinen | Request for Last Call review by SECDIR Completed: Has Issues. Reviewer: Hannes Tschofenig. |
2015-02-11
|
09 | Kostas Pentikousis | IANA Review state changed to Version Changed - Review Needed from IANA - Not OK |
2015-02-11
|
09 | Kostas Pentikousis | New version available: draft-ietf-ippm-ipsec-09.txt |
2015-02-09
|
08 | (System) | IESG state changed to Waiting for Writeup from In Last Call |
2015-02-05
|
08 | Gunter Van de Velde | Request for Last Call review by OPSDIR Completed: Ready. Reviewer: Fred Baker. |
2015-02-03
|
08 | (System) | IANA Review state changed to IANA - Not OK from IANA - Review Needed |
2015-02-03
|
08 | Pearl Liang | IESG/Authors/WG Chairs: IANA has reviewed draft-ietf-ippm-ipsec-08. Authors should review the comments and/or questions below. Please report any inaccuracies and respond to any questions as soon … IESG/Authors/WG Chairs: IANA has reviewed draft-ietf-ippm-ipsec-08. Authors should review the comments and/or questions below. Please report any inaccuracies and respond to any questions as soon as possible. IANA has some questions about the IANA action requested by this draft. We received the following comments/questions from the IANA's reviewer: IANA understands that, upon approval of this document, there is a single action which must be completed. In the TWAMP-Modes subregistry of the Two-way Active Measurement Protocol (TWAMP) Parameters registry located at: https://www.iana.org/assignments/twamp-parameters/ a single new value is to be registered as follows: Value: TBD Description: IKEv2Derived Mode Capability Semantics definition: Section 5.2, bit position 7 Reference: [ RFC-to-be ] IANA understands that value 128 is being requested. Question: A place holder 'TBD' is used in section 5.3: 5.3. Set-Up-Response Update The Set-Up-Response Message should be updated as in Figure 3. When a O/TWAMP client compatible with this specification receives a Server Greeting indicating support for Mode IKEv2Derived it SHOULD reply to the O/TWAMP server with a Set-Up response that indicates so. For example, a compatible O/TWAMP client choosing the authenticated mode with IKEv2 shared secret key derivation should set Mode to 130, i.e. set the bits in positions 1 and 7 (TBD IANA) to one. Q1. Have the authors decided to use value 128 as documented in the IANA Considerations (IC) section? Q2. Section 5.3 said "set the bits in positions 1 and 7". However, the IC mentions only position 7. Are the authors requesting another value for position 1 for the place holder TBD? IANA understands that this is the only action required to be completed upon approval of this document. Note: The actions requested in this document will not be completed until the document has been approved for publication as an RFC. This message is only to confirm what actions will be performed. Please note that IANA cannot reserve specific values. However, early allocation is available for some types of registrations. For more information, please see RFC 7120. |
2015-01-31
|
08 | Gunter Van de Velde | Request for Last Call review by OPSDIR is assigned to Fred Baker |
2015-01-31
|
08 | Gunter Van de Velde | Request for Last Call review by OPSDIR is assigned to Fred Baker |
2015-01-29
|
08 | Tero Kivinen | Request for Last Call review by SECDIR is assigned to Hannes Tschofenig |
2015-01-29
|
08 | Tero Kivinen | Request for Last Call review by SECDIR is assigned to Hannes Tschofenig |
2015-01-28
|
08 | Jean Mahoney | Request for Last Call review by GENART is assigned to Meral Shirazipour |
2015-01-28
|
08 | Jean Mahoney | Request for Last Call review by GENART is assigned to Meral Shirazipour |
2015-01-26
|
08 | Amy Vezza | IANA Review state changed to IANA - Review Needed |
2015-01-26
|
08 | Amy Vezza | The following Last Call announcement was sent out: From: The IESG To: IETF-Announce CC: Reply-To: ietf@ietf.org Sender: Subject: Last Call: (IKEv2-based Shared Secret Key for … The following Last Call announcement was sent out: From: The IESG To: IETF-Announce CC: Reply-To: ietf@ietf.org Sender: Subject: Last Call: (IKEv2-based Shared Secret Key for O/TWAMP) to Proposed Standard The IESG has received a request from the IP Performance Metrics WG (ippm) to consider the following document: - 'IKEv2-based Shared Secret Key for O/TWAMP' as Proposed Standard The IESG plans to make a decision in the next few weeks, and solicits final comments on this action. Please send substantive comments to the ietf@ietf.org mailing lists by 2015-02-09. Exceptionally, comments may be sent to iesg@ietf.org instead. In either case, please retain the beginning of the Subject line to allow automated sorting. Abstract The O/TWAMP security mechanism requires that both the client and server endpoints possess a shared secret. Since the currently- standardized O/TWAMP security mechanism only supports a pre-shared key mode, large scale deployment of O/TWAMP is hindered significantly. At the same time, recent trends point to wider IKEv2 deployment which, in turn, calls for mechanisms and methods that enable tunnel end-users, as well as operators, to measure one-way and two- way network performance in a standardized manner. This document describes the use of keys derived from an IKEv2 SA as the shared key in O/TWAMP. If the shared key can be derived from the IKEv2 SA, O/ TWAMP can support certificate-based key exchange, which would allow for more operational flexibility and efficiency. The key derivation presented in this document can also facilitate automatic key management. The file can be obtained via http://datatracker.ietf.org/doc/draft-ietf-ippm-ipsec/ IESG discussion can be tracked via http://datatracker.ietf.org/doc/draft-ietf-ippm-ipsec/ballot/ No IPR declarations have been submitted directly on this I-D. |
2015-01-26
|
08 | Amy Vezza | IESG state changed to In Last Call from Last Call Requested |
2015-01-26
|
08 | Spencer Dawkins | Last call announcement was generated |
2015-01-26
|
08 | Spencer Dawkins | Last call was requested |
2015-01-26
|
08 | Spencer Dawkins | Last call announcement was generated |
2015-01-26
|
08 | Spencer Dawkins | Ballot approval text was generated |
2015-01-26
|
08 | Spencer Dawkins | Ballot writeup was generated |
2015-01-26
|
08 | Spencer Dawkins | IESG state changed to Last Call Requested from AD Evaluation::AD Followup |
2015-01-26
|
08 | (System) | Sub state has been changed to AD Followup from Revised ID Needed |
2015-01-26
|
08 | Kostas Pentikousis | New version available: draft-ietf-ippm-ipsec-08.txt |
2015-01-22
|
07 | Spencer Dawkins | IESG state changed to AD Evaluation::Revised I-D Needed from AD Evaluation |
2015-01-13
|
07 | Spencer Dawkins | IESG state changed to AD Evaluation from Publication Requested |
2015-01-06
|
07 | Brian Trammell | (1) What type of RFC is being requested (BCP, Proposed Standard, Internet Standard, Informational, Experimental, or Historic)? Why is this the proper type of RFC? … (1) What type of RFC is being requested (BCP, Proposed Standard, Internet Standard, Informational, Experimental, or Historic)? Why is this the proper type of RFC? Is this type of RFC indicated in the title page header? Proposed Standard (2) The IESG approval announcement includes a Document Announcement Write-Up. Please provide such a Document Announcement Write-Up. Recent examples can be found in the "Action" announcements for approved documents. The approval announcement contains the following sections: Technical Summary The O/TWAMP security mechanism requires that both the client and server endpoints possess a shared secret. Since the currently- standardized O/TWAMP security mechanism only supports a pre-shared key mode, large scale deployment of O/TWAMP is hindered significantly. At the same time, recent trends point to wider IKEv2 deployment which, in turn, calls for mechanisms and methods that enable tunnel end-users, as well as operators, to measure one-way and two-way network performance in a standardized manner. This document discusses the use of keys derived from an IKEv2 SA as the shared key in O/TWAMP. If the shared key can be derived from the IKEv2 SA, O/ TWAMP can support certificate-based key exchange, which would allow for more operational flexibility and efficiency. The key derivation presented in this document can also facilitate automatic key management. Working Group Summary The document was discussed extensively within the IPPM WG, and has gone through two WGLCs. There was no significant controversy during the discussion of the document -- the main points of discussion had to do with the details of how to implement the binding between O/TWAMP and IPsec and whether the packet format used needed to be backward-compatible with non-IPsec O/TWAMP. The document has consensus to go forward. Document Quality As the document "glues" O/TWAMP to IPsec, it required review from both communities The document has had less comment from the IPsec WG than from the IPPM WG, but comments from IPsec were addressed. Personnel Brian Trammell is the document shepherd. Spencer Dawkins is the responsible AD. (3) Briefly describe the review of this document that was performed by the Document Shepherd. If this version of the document is not ready for publication, please explain why the document is being forwarded to the IESG. The document shepherd has been reviewing the document and following discussion and changes since its adoption as a WG item, and believes the document is ready for publication. (4) Does the document Shepherd have any concerns about the depth or breadth of the reviews that have been performed? IPPM reviews on the O/TWAMP side of the document are more than adequate. More review from IPsec would have been nice (we had one in-depth review, and the reviewer there also expressed concern that more IPsec review would be useful), but were not forthcoming. (5) Do portions of the document need review from a particular or from broader perspective, e.g., security, operational complexity, AAA, DNS, DHCP, XML, or internationalization? If so, describe the review that took place. See (4) above. (6) Describe any specific concerns or issues that the Document Shepherd has with this document that the Responsible Area Director and/or the IESG should be aware of? For example, perhaps he or she is uncomfortable with certain parts of the document, or has concerns whether there really is a need for it. In any event, if the WG has discussed those issues and has indicated that it still wishes to advance the document, detail those concerns here. No. (7) Has each author confirmed that any and all appropriate IPR disclosures required for full conformance with the provisions of BCP 78 and BCP 79 have already been filed. If not, explain why. Yes. (8) Has an IPR disclosure been filed that references this document? If so, summarize any WG discussion and conclusion regarding the IPR disclosures. No. (9) How solid is the WG consensus behind this document? Does it represent the strong concurrence of a few individuals, with others being silent, or does the WG as a whole understand and agree with it? I have no concerns about WG consensus. (10) Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarise the areas of conflict in separate email messages to the Responsible Area Director. (It should be in a separate email because this questionnaire is publicly available.) No. (11) Identify any ID nits the Document Shepherd has found in this document. (See http://www.ietf.org/tools/idnits/ and the Internet-Drafts Checklist). Boilerplate checks are not enough; this check needs to be thorough. No nits. (12) Describe how the document meets any required formal review criteria, such as the MIB Doctor, media type, and URI type reviews. No formal review criteria. (13) Have all references within this document been identified as either normative or informative? Yes (14) Are there normative references to documents that are not ready for advancement or are otherwise in an unclear state? If such normative references exist, what is the plan for their completion? No. (15) Are there downward normative references references (see RFC 3967)? If so, list these downward references to support the Area Director in the Last Call procedure. No. (16) Will publication of this document change the status of any existing RFCs? Are those RFCs listed on the title page header, listed in the abstract, and discussed in the introduction? If the RFCs are not listed in the Abstract and Introduction, explain why, and point to the part of the document where the relationship of this document to the other RFCs is discussed. If this information is not in the document, explain why the WG considers it unnecessary. No. (17) Describe the Document Shepherd's review of the IANA considerations section, especially with regard to its consistency with the body of the document. Confirm that all protocol extensions that the document makes are associated with the appropriate reservations in IANA registries. Confirm that any referenced IANA registries have been clearly identified. Confirm that newly created IANA registries include a detailed specification of the initial contents for the registry, that allocations procedures for future registrations are defined, and a reasonable name for the new registry has been suggested (see RFC 5226). The IANA considerations section requests the allocation of a new bit in the TWAMP-modes registry. (18) List any new IANA registries that require Expert Review for future allocations. Provide any public guidance that the IESG would find useful in selecting the IANA Experts for these new registries. No new registries. (19) Describe reviews and automated checks performed by the Document Shepherd to validate sections of the document written in a formal language, such as XML code, BNF rules, MIB definitions, etc. No formal language content. |
2015-01-06
|
07 | Brian Trammell | State Change Notice email list changed to draft-ietf-ippm-ipsec.all@tools.ietf.org, ietf@trammell.ch, ippm-chairs@tools.ietf.org, ippm@ietf.org |
2015-01-06
|
07 | Brian Trammell | Responsible AD changed to Spencer Dawkins |
2015-01-06
|
07 | Brian Trammell | IETF WG state changed to Submitted to IESG for Publication from WG Consensus: Waiting for Write-Up |
2015-01-06
|
07 | Brian Trammell | IESG state changed to Publication Requested |
2015-01-06
|
07 | Brian Trammell | IESG process started in state Publication Requested |
2015-01-06
|
07 | Brian Trammell | Tag Revised I-D Needed - Issue raised by WGLC cleared. |
2015-01-06
|
07 | Brian Trammell | Changed document writeup |
2014-12-27
|
07 | Kostas Pentikousis | New version available: draft-ietf-ippm-ipsec-07.txt |
2014-12-07
|
06 | Brian Trammell | Need a new revision for IANA considerations section change found during shepherd review. |
2014-12-07
|
06 | Brian Trammell | Tag Revised I-D Needed - Issue raised by WGLC set. |
2014-12-07
|
06 | Brian Trammell | Changed document writeup |
2014-12-06
|
06 | Brian Trammell | Changed document writeup |
2014-12-06
|
06 | Brian Trammell | IETF WG state changed to WG Consensus: Waiting for Write-Up from In WG Last Call |
2014-12-06
|
06 | Brian Trammell | Intended Status changed to Proposed Standard from None |
2014-11-10
|
06 | Kostas Pentikousis | New version available: draft-ietf-ippm-ipsec-06.txt |
2014-10-15
|
05 | Bill Cerveny | Tag Revised I-D Needed - Issue raised by WGLC cleared. |
2014-09-19
|
05 | Kostas Pentikousis | New version available: draft-ietf-ippm-ipsec-05.txt |
2014-08-03
|
04 | Brian Trammell | Tag Revised I-D Needed - Issue raised by WGLC set. Tag Revised I-D Needed - Issue raised by WG cleared. |
2014-08-03
|
04 | Brian Trammell | Tag Revised I-D Needed - Issue raised by WG set. |
2014-07-22
|
04 | Kostas Pentikousis | New version available: draft-ietf-ippm-ipsec-04.txt |
2014-06-24
|
03 | Brian Trammell | IETF WG state changed to In WG Last Call from WG Document |
2014-06-05
|
03 | Kostas Pentikousis | New version available: draft-ietf-ippm-ipsec-03.txt |
2014-02-14
|
02 | Kostas Pentikousis | New version available: draft-ietf-ippm-ipsec-02.txt |
2014-01-24
|
01 | Brian Trammell | Document shepherd changed to Brian Trammell |
2013-11-06
|
01 | Brian Trammell | Set of documents this document replaces changed to draft-bi-ippm-ipsec from None |
2013-10-21
|
01 | Kostas Pentikousis | New version available: draft-ietf-ippm-ipsec-01.txt |
2013-07-05
|
00 | Kostas Pentikousis | New version available: draft-ietf-ippm-ipsec-00.txt |