Management of Networks with Constrained Devices: Use Cases
draft-ietf-opsawg-coman-use-cases-05
Revision differences
Document history
Date | Rev. | By | Action |
---|---|---|---|
2015-05-12
|
05 | (System) | RFC Editor state changed to AUTH48-DONE from AUTH48 |
2015-04-30
|
05 | (System) | RFC Editor state changed to AUTH48 from RFC-EDITOR |
2015-04-28
|
05 | (System) | RFC Editor state changed to RFC-EDITOR from EDIT |
2015-03-03
|
05 | Amy Vezza | IESG state changed to RFC Ed Queue from Approved-announcement sent |
2015-03-02
|
05 | (System) | RFC Editor state changed to EDIT |
2015-03-02
|
05 | (System) | Announcement was received by RFC Editor |
2015-03-02
|
05 | (System) | IANA Action state changed to No IC from In Progress |
2015-03-02
|
05 | (System) | IANA Action state changed to In Progress |
2015-03-02
|
05 | Amy Vezza | IESG state changed to Approved-announcement sent from Approved-announcement to be sent |
2015-03-02
|
05 | Amy Vezza | IESG has approved the document |
2015-03-02
|
05 | Amy Vezza | Closed "Approve" ballot |
2015-03-02
|
05 | Amy Vezza | Ballot approval text was generated |
2015-03-01
|
05 | Joel Jaeggli | IESG state changed to Approved-announcement to be sent from Approved-announcement to be sent::AD Followup |
2015-03-01
|
05 | Joel Jaeggli | IESG state changed to Approved-announcement to be sent::AD Followup from IESG Evaluation::AD Followup |
2015-03-01
|
05 | Kathleen Moriarty | [Ballot comment] Thank you for adding in the text on safety and security considerations for the use cases. |
2015-03-01
|
05 | Kathleen Moriarty | [Ballot Position Update] Position for Kathleen Moriarty has been changed to No Objection from Discuss |
2015-03-01
|
05 | Anuj Sehgal | IANA Review state changed to Version Changed - Review Needed from IANA OK - No Actions Needed |
2015-03-01
|
05 | Anuj Sehgal | New version available: draft-ietf-opsawg-coman-use-cases-05.txt |
2015-02-19
|
04 | Cindy Morgan | IESG state changed to IESG Evaluation::AD Followup from IESG Evaluation |
2015-02-19
|
04 | Adrian Farrel | [Ballot Position Update] New position, No Objection, has been recorded for Adrian Farrel |
2015-02-19
|
04 | Ted Lemon | [Ballot comment] I'm dropping my DISCUSS since Kathleen raised the same point with a lot more detail than I did. FTR, I support Kathleen's DISCUSS. … [Ballot comment] I'm dropping my DISCUSS since Kathleen raised the same point with a lot more detail than I did. FTR, I support Kathleen's DISCUSS. Here is the text of my former DISCUSS: I was surprised to see no mention of the specific security requirements of the various use cases described here. E.g., the medical use case makes no mention at all of security. While in general security is required in all cases, I think there are differences in the level of security that is required for the various use cases described here, and I wonder if the authors considered this, and if so, why it wasn't mentioned. I don't necessarily want to delay the document's publication pending a resolution to this issue, but I'd like to have a quick discussion about it. |
2015-02-19
|
04 | Ted Lemon | [Ballot Position Update] Position for Ted Lemon has been changed to No Objection from Discuss |
2015-02-19
|
04 | Kathleen Moriarty | [Ballot discuss] Thanks for your work on this draft, I just have some security stuff I'd like to discuss that should be easy to resolve … [Ballot discuss] Thanks for your work on this draft, I just have some security stuff I'd like to discuss that should be easy to resolve as some text is provided. In section 4.5, it is critical to also include a statement on security in addition to privacy. Medical devices with network attachments could be used to kill someone. http://abcnews.go.com/Health/dick-cheneys-fear-heart-device-hacks-justified-experts/story?id=20633284 Suggest changing this text from: In both cases, however, it is crucial to protect the privacy of the people to which medical devices are attached. Even though the data collected by a heart beat monitor might be protected, the pure fact that someone carries such a device may need protection. As such, certain medical appliances may not want to participate in discovery and self-configuration protocols in order to remain invisible. To: In both cases, however, it is crucial to protect the safety and privacy of the people to which medical devices are attached. Security precautions to protect access (authentication, encryption, integrity protections, etc.) to such devices may be critical to protecting the safety of the individual. Even though the data collected by a heart beat monitor might be protected, the pure fact that someone carries such a device may need protection. As such, certain medical appliances may not want to participate in discovery and self-configuration protocols in order to remain invisible. General statement: Many of the other use case scenarios also have safety as a concern, requiring security protections (Confidentiality, Integrity, Availability). Sensors used to control environmental settings is another example where air regulation might include detection of harmful things in the air (carbon monoxide). I'm sure there are other safety concerns that motivate security protections in each of the use cases, it's not just privacy (which is important). What if a sensor was tampered with to report or not report something detected? That's not covered in the discussion on availability related problems in 4.6, but does represent another set of security considerations that could lead to safety issues. More text on access control considerations for NMS may help. |
2015-02-19
|
04 | Kathleen Moriarty | [Ballot Position Update] New position, Discuss, has been recorded for Kathleen Moriarty |
2015-02-19
|
04 | Ted Lemon | [Ballot discuss] I was surprised to see no mention of the specific security requirements of the various use cases described here. E.g., the medical use … [Ballot discuss] I was surprised to see no mention of the specific security requirements of the various use cases described here. E.g., the medical use case makes no mention at all of security. While in general security is required in all cases, I think there are differences in the level of security that is required for the various use cases described here, and I wonder if the authors considered this, and if so, why it wasn't mentioned. I don't necessarily want to delay the document's publication pending a resolution to this issue, but I'd like to have a quick discussion about it. |
2015-02-19
|
04 | Ted Lemon | [Ballot Position Update] New position, Discuss, has been recorded for Ted Lemon |
2015-02-19
|
04 | Jari Arkko | [Ballot Position Update] New position, No Objection, has been recorded for Jari Arkko |
2015-02-18
|
04 | Spencer Dawkins | [Ballot Position Update] New position, No Objection, has been recorded for Spencer Dawkins |
2015-02-17
|
04 | Martin Stiemerling | [Ballot comment] The write-up says something about additional reviews. Does this include reviews by an outside party of the IETF that, for instance, an entity … [Ballot comment] The write-up says something about additional reviews. Does this include reviews by an outside party of the IETF that, for instance, an entity that operates building automation systems? |
2015-02-17
|
04 | Martin Stiemerling | [Ballot Position Update] New position, No Objection, has been recorded for Martin Stiemerling |
2015-02-14
|
04 | Joel Jaeggli | note both coman documents are now on the same agenda |
2015-02-14
|
04 | Joel Jaeggli | Telechat date has been changed to 2015-02-19 from 2015-03-05 |
2015-02-14
|
04 | Joel Jaeggli | Placed on agenda for telechat - 2015-03-05 |
2015-01-26
|
04 | (System) | IANA Review state changed to IANA OK - No Actions Needed from Version Changed - Review Needed |
2015-01-26
|
04 | Joel Jaeggli | IESG state changed to IESG Evaluation from Waiting for Writeup |
2015-01-26
|
04 | Joel Jaeggli | Changed consensus to Yes from Unknown |
2015-01-26
|
04 | Joel Jaeggli | Ballot has been issued |
2015-01-26
|
04 | Joel Jaeggli | [Ballot Position Update] New position, Yes, has been recorded for Joel Jaeggli |
2015-01-26
|
04 | Joel Jaeggli | Created "Approve" ballot |
2015-01-26
|
04 | Joel Jaeggli | Ballot writeup was changed |
2015-01-20
|
04 | Gunter Van de Velde | Request for Last Call review by OPSDIR Completed: Has Issues. Reviewer: Linda Dunbar. |
2015-01-19
|
04 | Anuj Sehgal | IANA Review state changed to Version Changed - Review Needed from IANA OK - No Actions Needed |
2015-01-19
|
04 | Anuj Sehgal | New version available: draft-ietf-opsawg-coman-use-cases-04.txt |
2015-01-15
|
03 | Tero Kivinen | Request for Last Call review by SECDIR Completed: Has Nits. Reviewer: Matthew Miller. |
2015-01-14
|
03 | (System) | IESG state changed to Waiting for Writeup from In Last Call |
2015-01-12
|
03 | (System) | IANA Review state changed to IANA OK - No Actions Needed from IANA - Review Needed |
2015-01-12
|
03 | Pearl Liang | IESG/Authors/WG Chairs: IANA has reviewed draft-ietf-opsawg-coman-use-cases-03, which is currently in Last Call, and has the following comments: We understand that, upon approval of this … IESG/Authors/WG Chairs: IANA has reviewed draft-ietf-opsawg-coman-use-cases-03, which is currently in Last Call, and has the following comments: We understand that, upon approval of this document, there are no IANA Actions that need completion. While it is helpful for the IANA Considerations section of the document to remain in place upon publication, if the authors prefer to remove it, IANA doesn't object. If this assessment is not accurate, please respond as soon as possible. |
2015-01-04
|
03 | Gunter Van de Velde | Request for Last Call review by OPSDIR is assigned to Linda Dunbar |
2015-01-04
|
03 | Gunter Van de Velde | Request for Last Call review by OPSDIR is assigned to Linda Dunbar |
2015-01-02
|
03 | Martin Thomson | Request for Last Call review by GENART Completed: Ready. Reviewer: Martin Thomson. |
2015-01-02
|
03 | Jean Mahoney | Request for Last Call review by GENART is assigned to Martin Thomson |
2015-01-02
|
03 | Jean Mahoney | Request for Last Call review by GENART is assigned to Martin Thomson |
2015-01-02
|
03 | Tero Kivinen | Request for Last Call review by SECDIR is assigned to Matthew Miller |
2015-01-02
|
03 | Tero Kivinen | Request for Last Call review by SECDIR is assigned to Matthew Miller |
2014-12-31
|
03 | Amy Vezza | IANA Review state changed to IANA - Review Needed |
2014-12-31
|
03 | Amy Vezza | The following Last Call announcement was sent out: From: The IESG To: IETF-Announce CC: Reply-To: ietf@ietf.org Sender: Subject: Last Call: (Management of Networks with Constrained … The following Last Call announcement was sent out: From: The IESG To: IETF-Announce CC: Reply-To: ietf@ietf.org Sender: Subject: Last Call: (Management of Networks with Constrained Devices: Use Cases) to Informational RFC The IESG has received a request from the Operations and Management Area Working Group WG (opsawg) to consider the following document: - 'Management of Networks with Constrained Devices: Use Cases' as Informational RFC The IESG plans to make a decision in the next few weeks, and solicits final comments on this action. Please send substantive comments to the ietf@ietf.org mailing lists by 2015-01-14. Exceptionally, comments may be sent to iesg@ietf.org instead. In either case, please retain the beginning of the Subject line to allow automated sorting. Abstract This document discusses use cases concerning the management of networks, where constrained devices are involved. A problem statement, deployment options and the requirements on the networks with constrained devices can be found in the companion document on "Management of Networks with Constrained Devices: Problem Statement and Requirements". The file can be obtained via http://datatracker.ietf.org/doc/draft-ietf-opsawg-coman-use-cases/ IESG discussion can be tracked via http://datatracker.ietf.org/doc/draft-ietf-opsawg-coman-use-cases/ballot/ No IPR declarations have been submitted directly on this I-D. |
2014-12-31
|
03 | Amy Vezza | IESG state changed to In Last Call from Last Call Requested |
2014-12-31
|
03 | Joel Jaeggli | Last call was requested |
2014-12-31
|
03 | Joel Jaeggli | Last call announcement was generated |
2014-12-31
|
03 | Joel Jaeggli | Ballot approval text was generated |
2014-12-31
|
03 | Joel Jaeggli | Ballot writeup was generated |
2014-12-31
|
03 | Joel Jaeggli | IESG state changed to Last Call Requested from AD Evaluation |
2014-12-19
|
03 | Benoît Claise | Notification list changed to opsawg@ietf.org, warren@kumari.net, draft-ietf-opsawg-coman-use-cases.all@tools.ietf.org, opsawg-chairs@tools.ietf.org from "Warren Kumari" <warren@kumari.net> |
2014-12-12
|
03 | Joel Jaeggli | Shepherding AD changed to Joel Jaeggli |
2014-11-26
|
03 | Benoît Claise | IESG state changed to AD Evaluation from Publication Requested |
2014-11-24
|
03 | Warren Kumari | The shepherd would like to apologize for how long it took to submit this. |
2014-11-24
|
03 | Warren Kumari | Tag Revised I-D Needed - Issue raised by WG cleared. |
2014-11-24
|
03 | Warren Kumari | Document: draft-ietf-opsawg-coman-use-cases WG: OpsAWG. Shepherd: Warren Kumari This version of the writeup is dated 24 February 2012. [ Note: This document is a companion document … Document: draft-ietf-opsawg-coman-use-cases WG: OpsAWG. Shepherd: Warren Kumari This version of the writeup is dated 24 February 2012. [ Note: This document is a companion document to draft-ietf-opsawg-coman-probstate-reqs. They should probably progress together. The shepherd writeup is also very similar... (1)Informational - this document is an informational problem statement and requirements document. (2) The IESG approval announcement includes a Document Announcement Write-Up. Please provide such a Document Announcement Write-Up. Recent examples can be found in the "Action" announcements for approved documents. The approval announcement contains the following sections: Technical Summary: Constrained devices (limited CPU, memory, and power resources) can be connected to a network. This network may also be constrained or challenged (unreliable or lossy channels, wireless technologies with limited bandwidth and a dynamic topology). This may make traditional network management a poor fit for these networks. This document outlines use cases for a network with constrained devices. Document Quality: This document provides an overview and introduction to constrained networks / networks with constrained devices. It discusses where they are typically used, and some of the challenges in managing them. Special thanks to Thomas Watteyne and Pascal Thubert for arranging additional review. Personnel: Warren Kumari will be the document shepherd, Benoit Claise will be the AD. (3) Briefly describe the review of this document that was performed by the Document Shepherd: The DS followed the progression of the document through the working group process, and reviewed the document. (4) Does the document Shepherd have any concerns about the depth or breadth of the reviews that have been performed? Nope. During the Working Group Last Call the chairs of 6TiSCH and 6LO asked that the WGLC be extended to allow their WG participants to review the document, and so we extend it by a few weeks. The feedback from these WGs was positive, and we are counting it in the consensus. (5) Do portions of the document need review from a particular or from broader perspective? Nope. (6) Describe any specific concerns or issues that the Document Shepherd has with this document. None. (7) Has each author confirmed all appropriate IPR disclosures? Yes. (8) Has an IPR disclosure been filed that references this document? No. (9) How solid is the WG consensus behind this document? There is strong consensus from a small group, and good feedback from 6TiSCH and 6LO. (10) Has anyone threatened an appeal or otherwise indicated extreme discontent? Nope. Not at all. (11) Identify any ID nits the Document Shepherd has found in this document. No issues found here. (12) Describe how the document meets any required formal review criteria. No formal material in the document. (13) Have all references within this document been identified as either normative or informative? Yes. (14) Are there normative references to documents that are not ready for advancement? No normative references exist. (15) Are there downward normative references references? No normative references exist. (16) Will publication of this document change the status of any existing RFCs? Nope. (17) Describe the Document Shepherd's review of the IANA considerations section. No action required (clearly stated) (18) List any new IANA registries that require Expert Review for future allocations. None. (19) Describe reviews and automated checks performed by the Document Shepherd to validate sections of the document written in a formal language. None. |
2014-11-24
|
03 | Warren Kumari | Responsible AD changed to Benoit Claise |
2014-11-24
|
03 | Warren Kumari | IETF WG state changed to Submitted to IESG for Publication from Waiting for WG Chair Go-Ahead |
2014-11-24
|
03 | Warren Kumari | IESG state changed to Publication Requested |
2014-11-24
|
03 | Warren Kumari | IESG process started in state Publication Requested |
2014-11-24
|
03 | Warren Kumari | Changed document writeup |
2014-11-24
|
03 | Warren Kumari | Notification list changed to "Warren Kumari" <warren@kumari.net> |
2014-11-24
|
03 | Warren Kumari | Document shepherd changed to Warren Kumari |
2014-10-27
|
03 | Anuj Sehgal | New version available: draft-ietf-opsawg-coman-use-cases-03.txt |
2014-08-12
|
02 | Warren Kumari | Tag Revised I-D Needed - Issue raised by WG set. |
2014-08-12
|
02 | Warren Kumari | IETF WG state changed to Waiting for WG Chair Go-Ahead from In WG Last Call |
2014-07-09
|
02 | Warren Kumari | IETF WG state changed to In WG Last Call from WG Document |
2014-07-09
|
02 | Warren Kumari | Intended Status changed to Informational from None |
2014-07-04
|
02 | Mehmet Ersue | New version available: draft-ietf-opsawg-coman-use-cases-02.txt |
2014-02-14
|
01 | Mehmet Ersue | New version available: draft-ietf-opsawg-coman-use-cases-01.txt |
2014-01-20
|
00 | Mehmet Ersue | New version available: draft-ietf-opsawg-coman-use-cases-00.txt |