Skip to main content

NACK-Oriented Reliable Multicast (NORM) Transport Protocol
draft-ietf-rmt-pi-norm-revised-14

Revision differences

Document history

Date Rev. By Action
2012-08-22
14 (System) post-migration administrative database adjustment to the No Objection position for Jari Arkko
2012-08-22
14 (System) post-migration administrative database adjustment to the No Objection position for Tim Polk
2012-08-22
14 (System) post-migration administrative database adjustment to the No Objection position for Ralph Droms
2012-08-22
14 (System) post-migration administrative database adjustment to the No Objection position for Dan Romascanu
2012-08-22
14 (System) post-migration administrative database adjustment to the No Objection position for Adrian Farrel
2009-09-18
14 (System) IANA Action state changed to RFC-Ed-Ack from Waiting on RFC Editor
2009-09-18
14 (System) IANA Action state changed to Waiting on RFC Editor from In Progress
2009-09-18
14 (System) IANA Action state changed to In Progress from Waiting on Authors
2009-09-17
14 (System) IANA Action state changed to Waiting on Authors from In Progress
2009-09-14
14 Cindy Morgan State Changes to RFC Ed Queue from Approved-announcement sent by Cindy Morgan
2009-09-14
14 (System) IANA Action state changed to In Progress
2009-09-14
14 Amy Vezza IESG state changed to Approved-announcement sent
2009-09-14
14 Amy Vezza IESG has approved the document
2009-09-14
14 Amy Vezza Closed "Approve" ballot
2009-09-14
14 Amy Vezza State Changes to Approved-announcement to be sent from IESG Evaluation::AD Followup by Amy Vezza
2009-09-14
14 Jari Arkko [Ballot Position Update] Position for Jari Arkko has been changed to No Objection from Discuss by Jari Arkko
2009-09-11
14 Tim Polk [Ballot Position Update] Position for Tim Polk has been changed to No Objection from Undefined by Tim Polk
2009-09-11
14 Tim Polk [Ballot Position Update] Position for Tim Polk has been changed to Undefined from Discuss by Tim Polk
2009-09-11
14 (System) Sub state has been changed to AD Follow up from New Id Needed
2009-09-11
14 (System) New version available: draft-ietf-rmt-pi-norm-revised-14.txt
2009-07-23
14 Magnus Westerlund State Changes to IESG Evaluation::Revised ID Needed from IESG Evaluation::AD Followup by Magnus Westerlund
2009-06-25
14 Dan Romascanu [Ballot Position Update] Position for Dan Romascanu has been changed to No Objection from Discuss by Dan Romascanu
2009-06-18
14 Cindy Morgan State Changes to IESG Evaluation::AD Followup from IESG Evaluation by Cindy Morgan
2009-06-18
14 Ross Callon [Ballot Position Update] New position, No Objection, has been recorded by Ross Callon
2009-06-18
14 Pasi Eronen [Ballot Position Update] New position, No Objection, has been recorded by Pasi Eronen
2009-06-18
14 Tim Polk
[Ballot comment]
General comments:
1) the use of the word "authentication": Unfortunately, the IPsec docs use the word authentication for 2 separate types of security …
[Ballot comment]
General comments:
1) the use of the word "authentication": Unfortunately, the IPsec docs use the word authentication for 2 separate types of security protection: peer authentication and integrity-protection. This doc does also, and it's not always clear which type they're referring to.

2) The Authentication Header (AH) is referred to in the doc as "AF" instead of "AH".

3) Since NORM can be used with NAT, the doc should mention someplace that AH is not compatible with NAT.

4) The introduction states that NORM allows for "operation with minimal a priori coordination among senders and receivers" - IPsec would obviously impose additional requirements for communication/coordination beforehand. In addition, the doc allows for numerous alternative options (e.g., the EXT_AUTH vs. IPsec; numerous multicast key management protocols). Since the doc does not specify how the peers would agree on these choices, this represents additional "a priori" choices that would have to be agreed upon beforehand in some unspecified manner.

Section 7: Security Considerations

1) per-session keys: Do NORM sessions share IPsec SAs? If not, this shouldn't be a problem. If they do share SAs, who assigns and checks the "instance_id"? It's not a standard IPsec feature.

2) recommendations for app-level integrity-checking of data: This would normally be provided by IPsec, but NORM's non-standard use of SAs (keys shared by >2 peers) would negate this protection, necessitating app-level integrity checks.

Section 7.1.1: IPsec Approach

1) This section recommends use of the IPsec ESP SA "with the option for data origination." I assume they mean data origin authentication. This presents several challenges:

      a) In a transport-mode ESP SA, the sender address is not protected. If automated key management is used, this protection is indirectly provided, since the SA is established between 2 authenticated peers; use of the secret symmetric keys constitutes proof that the sender is the known peer. Manual establishment of keys with a transport-mode ESP SA would not provide data origin authentication.
     
      b) If keys are shared among >2 peers, data origin authentication is problematic, since any peer can masquerade as any other peer.

      c) How would NORM handle updating keys when members leave the group? This is not specificed anywhere. Allowing ex-members to possess keys would further compromise security, since you wouldn't even have the assurance that a sender was a current member of the group.

2) The SA used by receivers to send data to the sender is referred to a a unicast SA. However, as defined in this doc, it is not what IPsec normally refers to as a unicast SA. An IPsec unicast SA is between 2 peers, and can therefore provide replay protection, data origin authentication and integrity protection. The NORM "unicast" SA is a single SA that protects traffic sent by multiple receivers to the single sender. Replay protection is not possible, since you can't coordinate a replay counter among multiple senders. Also, all of the problems mentioned above for an SA with >2 parties would also apply here.

3) This section refers to an IPsec implementation that manages its replay protection on a per-source basis. I could be wrong, but this sounds like non-standard IPsec to me. I'm not sure such implementations exist, but even if they do, this could be an interop problem.

4) This section also suggests that NORM could maintain per-source sequence state. Once again, how would the peers know that this feature was enabled?

5) It is suggested that, for small groups, many-to-many IPsec protection would be possible. This should be further specified. Does this mean that each node would have 1 outbound multicast SA between it and all other nodes (the "sender" SA) and 1 inbound "unicast" SA from all other nodes to itself (the "receiver" SA)?

6) The last paragraph is this section mentions various alternative methods for retrieving or negotiating keys. Again, how would this be determined in an interoperable manner?

Section 7.1.2.3: Key Management

Since manual keying is allowed, somewhere in the Security Requirements it should mention that care is needed in selecting algorithms - some algorithms (e.g., counter-mode) are not suitable for use with manual keys.


Section 7.1.2.4: Security Policy

This section mentions encryption keys. This also applies to integrity-protection (a.k.a. authentication) keys.
2009-06-18
14 Tim Polk
[Ballot discuss]
Since this document has not been on a telechat yet, I decided it was acceptable (in my mind)
to move from No Objection …
[Ballot discuss]
Since this document has not been on a telechat yet, I decided it was acceptable (in my mind)
to move from No Objection to Discuss.

I do not believe the "Baseline Secure NORM Operation" described in section 7.1 is sufficient
for interoperable implementations.  The document does not indicate whether IPsec version
2 or 3 should be supported, or the appropriate version of IKE.  (The normative references
are for IPsec version 3, so perhaps the first decision has been made?)  Identifying three
automated key management schemes (GDOI, GSAKMP, and MIKEY) in 7.1.2.3 is helpful, but
an implementation is forced to support all three for interoperability.  Is there a reason that
we can't give more specific guidance?

I am also concerned that some of the changes could preclude use of off-the-shelf IPsec.
In particular, non-standard use of IPsec SAs may pose a problem.

I requested another review from an IETFer with more IPsec expertise.  My move to Discuss
was motivated by her response.  Her detailed review has been appended  as comments,
since I have not concluded which specific issues could be blocking.  I would like to see
feedback from the authors before I come to that conclusion.
--------
2009-06-18
14 Tim Polk [Ballot Position Update] Position for Tim Polk has been changed to Discuss from Undefined by Tim Polk
2009-06-18
14 Tim Polk [Ballot Position Update] Position for Tim Polk has been changed to Undefined from No Objection by Tim Polk
2009-06-18
14 Jari Arkko
[Ballot discuss]
I wanted to talk about this on the IESG call today before
we approve the document:

The recommendations for generating source_id values are …
[Ballot discuss]
I wanted to talk about this on the IESG call today before
we approve the document:

The recommendations for generating source_id values are fairly
unspecific. Is there a need to specify something which is mandatory
to implement, and is there a need to clearly say what to do with
IPv6 addresses as well?
2009-06-18
14 Jari Arkko [Ballot Position Update] New position, Discuss, has been recorded by Jari Arkko
2009-06-17
14 Cullen Jennings [Ballot Position Update] New position, No Objection, has been recorded by Cullen Jennings
2009-06-16
14 Tim Polk
[Ballot comment]
I am entering this as a Comment since I missed this on my first review, but I would have
strongly considered a DIscuss …
[Ballot comment]
I am entering this as a Comment since I missed this on my first review, but I would have
strongly considered a DIscuss if this was my initial review.

I do not believe the "Baseline Secure NORM Operation" described in section 7.1 is sufficient
for interoperable implementations.  The document does not indicate whether IPsec version
2 or 3 should be supported, or the appropriate version of IKE.  (The normative references
are for IPsec version 3, so perhaps the first decision has been made?)  Identifying three
automated key management schemes (GDOI, GSAKMP, and MIKEY) in 7.1.2.3 is helpful, but
an implementation is forced to support all three for interoperability.  Is there a reason that
we can't give more specific guidance?

BTW, I have requested another review from an IETFer with more IPsec expertise.  I will revise
my comment yet again if she identifies further interoperability problems...
add additional points
2009-06-16
14 Ron Bonica [Ballot Position Update] New position, No Objection, has been recorded by Ron Bonica
2009-06-16
14 (System) State Changes to IESG Evaluation from IESG Evaluation - Defer by system
2009-06-15
14 Robert Sparks [Ballot Position Update] New position, No Objection, has been recorded by Robert Sparks
2009-06-05
14 (System) Removed from agenda for telechat - 2009-06-04
2009-06-04
14 Tim Polk [Ballot Position Update] New position, No Objection, has been recorded by Tim Polk
2009-06-03
14 Adrian Farrel [Ballot Position Update] Position for Adrian Farrel has been changed to No Objection from Discuss by Adrian Farrel
2009-06-03
13 (System) New version available: draft-ietf-rmt-pi-norm-revised-13.txt
2009-06-03
14 Lisa Dusseault [Ballot Position Update] New position, No Objection, has been recorded by Lisa Dusseault
2009-06-03
14 Ron Bonica State Changes to IESG Evaluation - Defer from IESG Evaluation by Ron Bonica
2009-06-03
14 Lars Eggert [Ballot Position Update] New position, No Objection, has been recorded by Lars Eggert
2009-06-03
14 Ralph Droms [Ballot Position Update] Position for Ralph Droms has been changed to No Objection from Discuss by Ralph Droms
2009-06-02
14 Russ Housley
[Ballot comment]
Editorial from the Gen-ART Review by Vijay Gurbani:

  1) In S8, you may want to expand the acronym "DBS" (I think
  …
[Ballot comment]
Editorial from the Gen-ART Review by Vijay Gurbani:

  1) In S8, you may want to expand the acronym "DBS" (I think
    you mean Direct Broadcast Satellite, but I am not sure.)

  2) In S10, there is a phrase, "(and these are not Negative)" --
    is this a leftover from previous edit sessions?
2009-06-02
14 Russ Housley [Ballot Position Update] New position, No Objection, has been recorded by Russ Housley
2009-06-02
14 Ralph Droms
[Ballot discuss]
This DISCUSS is trivial and can be cleared quickly.

I'm confused about the tense used in the IANA requirements section.  http://www.iana.org/assignments/norm-parameters doesn't exist …
[Ballot discuss]
This DISCUSS is trivial and can be cleared quickly.

I'm confused about the tense used in the IANA requirements section.  http://www.iana.org/assignments/norm-parameters doesn't exist now.  Is the wording in IANA requirements the final wording to be published, after IANA has created the appropriate registries?
2009-06-02
14 Ralph Droms
[Ballot discuss]
I'm confused about the tense used in the IANA requirements section.  http://www.iana.org/assignments/norm-parameters doesn't exist now.  Is the wording in IANA requirements the final …
[Ballot discuss]
I'm confused about the tense used in the IANA requirements section.  http://www.iana.org/assignments/norm-parameters doesn't exist now.  Is the wording in IANA requirements the final wording to be published, after IANA has created the appropriate registries?
2009-06-02
14 Ralph Droms [Ballot Position Update] New position, Discuss, has been recorded by Ralph Droms
2009-06-01
14 Dan Romascanu
[Ballot discuss]
I am still reading this document which seems well written, but it is not easy reading. I do want however to ask two …
[Ballot discuss]
I am still reading this document which seems well written, but it is not easy reading. I do want however to ask two questions and in case these remain the only questions I plan to clear my DISCUSS at the meeting or when I get clarifying answers.

1. What are the conclusions of the experiment that led the WG decide that it is appropriate to advance this document from the Experimental Status of RFC 3940 to Proposed Standard? The list of changes from RFC 3940 does not provide enough information on this respect. How widely was the protocol deployed? what are the conclusions about its scalability and reliability?

2. How is this protocol and in general the technology defined in the RMT working group going to be managed? This is related somehow to the first question, I would expect that around a protocol that was at Experimental for a number of years and is now going to Proposed standard have some information  gathered about its operational model and impact, and about the management methods and proocols that would be suitable to be used for various management operations.
2009-06-01
14 Dan Romascanu
[Ballot discuss]
I am still reading this document which seems well written, but it is not easy reading. I do want however to ask two …
[Ballot discuss]
I am still reading this document which seems well written, but it is not easy reading. I do want however to ask two questions and in case these remain the only questions I plan to clear my DISCUSS at the meeting or when I get clarifying answers.

1. What are the conclusions of the experiment that led the WG decide that it is appropriate to advance this document from the Experimental Status of RFC 3940 to Proposed Standard? The list of changes from RFC 3940 does not provide enough information on this respect. How widely was the protocol deployed? what are the conclusions about its scalability and reliability?

2. How is this protocol and in general the technology defined in the RMT working group going to be managed? This is related somehow to the first question, I would expect that around a protocol that was at Experimental for a number of years and is now going to Proposed standard have some information  gathered about its operational model and impact, and about the management that would be suitable to be used for various management operations.
2009-06-01
14 Dan Romascanu [Ballot Position Update] New position, Discuss, has been recorded by Dan Romascanu
2009-05-31
14 Adrian Farrel
[Ballot discuss]
Pretty thorough and easy-to-read (shame it is so long :-)

Appreciate the authors and WG going along the Experimental track and then advancing …
[Ballot discuss]
Pretty thorough and easy-to-read (shame it is so long :-)

Appreciate the authors and WG going along the Experimental track and then advancing the work.

Discuss issues are relatively minor and should be simple to resolve.

---

The fact that the protocol specified is a *transport* protocol really
needs to be reflected in the document title. Viz:
        NACK-Oriented Reliable Multicast Transport Protocol
This may appear trivial (in which case, why not fix it? :-) but is, I
think criticial to disambiguate it from underlying multicast protocols.
(And, yes, I know that 3940 didn't say "transport" in the title.)

---

It would be nice if idnits was run cleanly before drafts are presented
for IESG review. In this case I see...
  == Using lowercase 'not' together with uppercase 'MUST', 'SHALL',
    'SHOULD', or 'RECOMMENDED' is not an accepted usage according to
    RFC 2119.  Please use uppercase 'NOT' together with RFC 2119
    keywords (if that is what you mean).
(which is easliy fixed) and
  ** Downref: Normative reference to an Experimental RFC: RFC 4654
which I see *was* called out in IETF last call, but is not mentioned
in the ballot write-up. What is the conclusion of the last call, and
why does the WG and sponsoring author consider that we should accept
this downref?

---

Section 4.1
Please include a definition of the hel field in the variable-length
NORM header extension. Words, bytes, bits? Include het and hel?

This might help explain why the hel is a reserved field for het >= 128
Although, I suspect that you could use hel = 1 for these cases and
slightly simplify the processing for the receiving node.

---

Please discuss...
Suppose a receiver is subverted (or mis-implemented) so that it sends
NACK messages. Could this damage receipt for other receivers (sender's
buffers get full, sender holds off transmitting to the tree until
errant receiver has caught up, etc.)?
If so, shoud the security section discuss the policy for alerting or
pruning such receivers?
2009-05-31
14 Adrian Farrel [Ballot Position Update] New position, Discuss, has been recorded by Adrian Farrel
2009-05-31
14 Adrian Farrel
[Ballot comment]
I find language like "is designed to" rather timid! If you want this
to be a standard you need to be a bit …
[Ballot comment]
I find language like "is designed to" rather timid! If you want this
to be a standard you need to be a bit more robust in your assertions.

---

The term NormNode is used in section 1.2 before its definition in
section 2.

---

Section 4.1
"source id"
s/the host IP/the host IPv4/

---

There are several uses of capitalised non-2119 language. No law against
this AFAIK, but may be helpful to convert to 2119. For example...
  *IMPORTANT NOTE: The "payload_len", "payload_msg_start" and
  "payload_offset" fields are present ONLY for objects of type
  "NORM_OBJECT_STREAM".
Could read
  *IMPORTANT NOTE: The "payload_len", "payload_msg_start" and
  "payload_offset" fields MUST NOT be present in any object except
  those of type "NORM_OBJECT_STREAM".

---

It would be really helpful if you collected together in a new section
all of the configurable elements of the protocol (timers, policies,
etc.).

---
2009-05-29
14 Magnus Westerlund Placed on agenda for telechat - 2009-06-04 by Magnus Westerlund
2009-05-29
14 Magnus Westerlund State Changes to IESG Evaluation from Waiting for AD Go-Ahead::AD Followup by Magnus Westerlund
2009-05-29
14 Magnus Westerlund [Note]: 'Document Shepherd: Lorenzo Vicisano <lorenzo@vicisano.net>' added by Magnus Westerlund
2009-05-29
14 Magnus Westerlund [Ballot Position Update] New position, Yes, has been recorded for Magnus Westerlund
2009-05-29
14 Magnus Westerlund Ballot has been issued by Magnus Westerlund
2009-05-29
14 Magnus Westerlund Created "Approve" ballot
2009-05-28
14 (System) Sub state has been changed to AD Follow up from New Id Needed
2009-05-28
12 (System) New version available: draft-ietf-rmt-pi-norm-revised-12.txt
2009-05-24
14 Samuel Weiler Request for Last Call review by SECDIR Completed. Reviewer: David Harrington.
2009-05-13
14 Magnus Westerlund State Changes to Waiting for AD Go-Ahead::Revised ID Needed from Waiting for AD Go-Ahead by Magnus Westerlund
2009-05-13
14 Magnus Westerlund Further secdir comments and IANA questions to be resolved.
2009-05-13
14 Magnus Westerlund Note field has been cleared by Magnus Westerlund
2009-05-11
14 (System) State has been changed to Waiting for AD Go-Ahead from In Last Call by system
2009-05-11
14 Amanda Baber
IANA questions/comments:

- Do you want/need a registry for NORM Message Types?

- Do you want/need a registry for NORM_DATA Flags?

- Do you want/need …
IANA questions/comments:

- Do you want/need a registry for NORM Message Types?

- Do you want/need a registry for NORM_DATA Flags?

- Do you want/need a registry for NORM_CMD(CC) Flags?

- Do you want/need a registry for NORM_CMD(REPAIR_ADV) Flags?

- Do you want/need a registry for NORM_ACK messages?

- Do you want/need a registry for NORM_NACK form field?

- Do you want/need a registry for NORM_NACK flags?


Action 1 (Section 7.1.1):

Upon approval of this document, IANA will create the following
registry at
located at http://www.iana.org/assignments/norm-parameters

Registry NameL NORM Header Extension Types
Registration Procedures: Specification Required
Initial contents of this sub-registry will be:

+-------+------------+------------------------------+
| Value | Name | Reference |
+-------+------------+------------------------------+
| 0 | Unassigned | |
| 1 | "EXT_AUTH" | [RFC-rmt-pi-norm-revised-11] |
| 2 | Unassigned | |
| 3 | "EXT_CC" | [RFC-rmt-pi-norm-revised-11] |
| 4-63 | Unassigned | |
| 64 | "EXT_FTI" | [RFC-rmt-pi-norm-revised-11] |
| 65-127| Unassigned | |
| 128 | "EXT_RATE" | [RFC-rmt-pi-norm-revised-11] |
|129-255| Unassigned | |
+-------+------------+------------------------------+


Action 2 (Section 7.1.2):

Upon approval of this document, IANA will create the following
registry at
located at http://www.iana.org/assignments/norm-parameters

Registry Name: NORM Stream Control Codes
Registration Procedures: Specification Required
Initial contents of this sub-registry will be:

+--------+-------------------+------------------------------+
| Value | Name | Reference |
+--------+-------------------+------------------------------+
| 0 | "NORM_STREAM_END" | [RFC-rmt-pi-norm-revised-11] |
|1-65535 | Unassigned | [RFC-rmt-pi-norm-revised-11] |
+--------+-------------------+------------------------------+


Action 3 (Section 7.1.3):

Upon approval of this document, IANA will create the following
registry at
located at http://www.iana.org/assignments/norm-parameters

Registry Name: NORM_CMD Message Sub-types
Registration Procedures: Specification Required
Initial contents of this sub-registry will be:

+-------+-------------------------+------------------------------+
| Value | Name | Reference |
+-------+-------------------------+------------------------------+
| 0 | Reserved | [RFC-rmt-pi-norm-revised-11] |
| 1 | "NORM_CMD(FLUSH)" | [RFC-rmt-pi-norm-revised-11] |
| 2 | "NORM_CMD(EOT)" | [RFC-rmt-pi-norm-revised-11] |
| 3 | "NORM_CMD(SQUELCH)" | [RFC-rmt-pi-norm-revised-11] |
| 4 | "NORM_CMD(CC)" | [RFC-rmt-pi-norm-revised-11] |
| 5 | "NORM_CMD(REPAIR_ADV)" | [RFC-rmt-pi-norm-revised-11] |
| 6 | "NORM_CMD(ACK_REQ)" | [RFC-rmt-pi-norm-revised-11] |
| 7 | "NORM_CMD(APPLICATION)" | [RFC-rmt-pi-norm-revised-11] |
| 8-255 | Unassigned
+-------+-------------------------+------------------------------+


We understand the above to be the only IANA Actions for this document.
2009-05-02
14 Samuel Weiler Request for Last Call review by SECDIR is assigned to David Harrington
2009-05-02
14 Samuel Weiler Request for Last Call review by SECDIR is assigned to David Harrington
2009-04-27
14 Amy Vezza Last call sent
2009-04-27
14 Amy Vezza State Changes to In Last Call from Last Call Requested by Amy Vezza
2009-04-27
14 Magnus Westerlund State Changes to Last Call Requested from Waiting for AD Go-Ahead::AD Followup by Magnus Westerlund
2009-04-27
14 Magnus Westerlund Last Call was requested by Magnus Westerlund
2009-04-24
14 (System) Sub state has been changed to AD Follow up from New Id Needed
2009-04-24
11 (System) New version available: draft-ietf-rmt-pi-norm-revised-11.txt
2009-04-21
14 Magnus Westerlund State Changes to Waiting for AD Go-Ahead::Revised ID Needed from Waiting for AD Go-Ahead::AD Followup by Magnus Westerlund
2009-04-21
14 Magnus Westerlund Needs a new IETF last call due to downref. In addition there are issues to fix.
2009-04-20
14 (System) Sub state has been changed to AD Follow up from New Id Needed
2009-04-20
10 (System) New version available: draft-ietf-rmt-pi-norm-revised-10.txt
2009-04-16
14 Samuel Weiler Request for Last Call review by SECDIR Completed. Reviewer: David Harrington.
2009-04-16
14 Magnus Westerlund State Changes to Waiting for AD Go-Ahead::Revised ID Needed from Waiting for AD Go-Ahead by Magnus Westerlund
2009-04-16
14 Magnus Westerlund Received Secdir and GENART comments that needs resolving
2009-03-31
14 (System) State has been changed to Waiting for AD Go-Ahead from In Last Call by system
2009-03-31
14 Amanda Baber
IANA comments/questions:

- Where is the registry where we need to define "ietf:rmt:norm"?

- Can you verify that value 0 is available for assignment?

- …
IANA comments/questions:

- Where is the registry where we need to define "ietf:rmt:norm"?

- Can you verify that value 0 is available for assignment?

- For extensibility purposes do you want to create registries for
your various NORM Commands and Command Messages?

- The EXT_AUTH extention is not mentioned until the Security
Considerations in Section 6 and never fully defined. Even though
that section says it's out of scope, it's probably not appropriate
to define it there.

Upon approval of this document, IANA will create the following registry at
http://www.iana.org/assignments/rmt-fec-parameters

Registry Name: NORM Header Extension Types
ietf:rmt:norm:extensions
Registration Procedures: Specification Required

Initial contents of this sub-registry will be:

+-------+------------+-----------------------------+
| Value | Name | Reference |
+-------+------------+-----------------------------+
| 0 | Available | [RFC-rmt-pi-norm-revised-09 |
| 1 | "EXT_AUTH" | [RFC-rmt-pi-norm-revised-09 |
| 2 | Available | [RFC-rmt-pi-norm-revised-09 |
| 3 | "EXT_CC" | [RFC-rmt-pi-norm-revised-09 |
| 4-63 | Available | [RFC-rmt-pi-norm-revised-09 |
| 64 | "EXT_FTI" | [RFC-rmt-pi-norm-revised-09 |
| 65-127| Available | [RFC-rmt-pi-norm-revised-09 |
| 128 | "EXT_RATE" | [RFC-rmt-pi-norm-revised-09 |
|129-255| Available | [RFC-rmt-pi-norm-revised-09 |
+-------+------------+-----------------------------+

We understand the above to be the only IANA Action for this document.
2009-03-13
14 Samuel Weiler Request for Last Call review by SECDIR is assigned to David Harrington
2009-03-13
14 Samuel Weiler Request for Last Call review by SECDIR is assigned to David Harrington
2009-03-10
14 Amy Vezza State Changes to In Last Call from Last Call Requested by Amy Vezza
2009-03-10
14 Magnus Westerlund State Changes to Last Call Requested from AD Evaluation::AD Followup by Magnus Westerlund
2009-03-10
14 Magnus Westerlund Last Call was requested by Magnus Westerlund
2009-03-10
14 (System) Ballot writeup text was added
2009-03-10
14 (System) Last call text was added
2009-03-10
14 (System) Ballot approval text was added
2009-03-09
14 (System) Sub state has been changed to AD Follow up from New Id Needed
2009-03-09
09 (System) New version available: draft-ietf-rmt-pi-norm-revised-09.txt
2009-02-27
14 Magnus Westerlund State Changes to AD Evaluation::Revised ID Needed from AD Evaluation by Magnus Westerlund
2009-01-26
14 Magnus Westerlund State Changes to AD Evaluation from Publication Requested by Magnus Westerlund
2008-12-17
08 (System) New version available: draft-ietf-rmt-pi-norm-revised-08.txt
2008-12-12
14 Cindy Morgan State Changes to Publication Requested from AD is watching by Cindy Morgan
2008-12-12
14 Cindy Morgan
Document Shepherd Write-Up for draft-ietf-rmt-pi-norm-revised-07
intended for publication in the "Proposed Standard" category.

This writeup complies with RFC 4858


  (1.a)  Who is the Document …
Document Shepherd Write-Up for draft-ietf-rmt-pi-norm-revised-07
intended for publication in the "Proposed Standard" category.

This writeup complies with RFC 4858


  (1.a)  Who is the Document Shepherd for this document?  Has the
          Document Shepherd personally reviewed this version of the
          document and, in particular, does he or she believe this
          version is ready for forwarding to the IESG for publication?

Document Shepherd is Lorenzo Vicisano, who has reviewed this  document and believes
it is ready for forwarding to the IESG for publication.

  (1.b)  Has the document had adequate review both from key WG members
          and from key non-WG members?  Does the Document Shepherd have
          any concerns about the depth or breadth of the reviews that
          have been performed?

The document had adequate review by key WG members.  The document has been reviewed by multiple WG members and has been updated to reflect their comments.  There are non unresolved issues.  The Experimental RFC3940 upon which this revision is based was thoroughly reviewed.  The differences between this revision and the original document are relatively minor.

  (1.c)  Does the Document Shepherd have concerns that the document
          needs more review from a particular or broader perspective,
          e.g., security, operational complexity, someone familiar with
          AAA, internationalization, or XML?

No additional reviews needed.

  (1.d)  Does the Document Shepherd have any specific concerns or
          issues with this document that the Responsible Area Director
          and/or the IESG should be aware of?  For example, perhaps he
          or she is uncomfortable with certain parts of the document, or
          has concerns whether there really is a need for it.  In any
          event, if the WG has discussed those issues and has indicated
          that it still wishes to advance the document, detail those
          concerns here.  Has an IPR disclosure related to this document
          been filed?  If so, please include a reference to the
          disclosure and summarize the WG discussion and conclusion on
          this issue.

No concerns.

  (1.e)  How solid is the WG consensus behind this document?  Does it
          represent the strong concurrence of a few individuals, with
          others being silent, or does the WG as a whole understand and
          agree with it?

This document represent a solid consensus of the RMT WG.

  (1.f)  Has anyone threatened an appeal or otherwise indicated extreme
          discontent?  If so, please summarize the areas of conflict in
          separate email messages to the Responsible Area Director.  (It
          should be in a separate email because this questionnaire is
          entered into the ID Tracker.)

No discontent of significant concern have been raised about this
document.

  (1.g)  Has the Document Shepherd personally verified that the
          document satisfies all ID nits?  (See
          http://www.ietf.org/ID-Checklist.html and
          http://tools.ietf.org/tools/idnits/.)  Boilerplate checks are
          not enough; this check needs to be thorough.  Has the document
          met all formal review criteria it needs to, such as the MIB
          Doctor, media type, and URI type reviews?  If the document
          does not already indicate its intended status at the top of
          the first page, please indicate the intended status here.

The document satisfies all ID nits.  The document indicates its intended status
to be published as a Proposed Standard RFC.

draft-ietf-rmt-pi-norm-revised-07 is intended for publication in the
"Proposed Standard" category.

  (1.h)  Has the document split its references into normative and
          informative?  Are there normative references to documents that
          are not ready for advancement or are otherwise in an unclear
          state?  If such normative references exist, what is the
          strategy for their completion?  Are there normative references
          that are downward references, as described in [RFC3967]?  If
          so, list these downward references to support the Area
          Director in the Last Call procedure for them [RFC3967].

The document splits its references into normative and informative. The
normative reference are in RFC published status. None of the normative
reference is a downward reference with the exception of the normative
reference to Experimental RFC 4654.  The RFC 4654 "building block" describes
the techniques and rationale for a "TCP-Friendly Multicast Congestion
Control" mechanism.  The NORM document cites a normative reference to this
document because it fully specifies, as part of its protocol specification,
a congestion control mechanism that applies the techniques described in RFC
4654
.  However, note that because the NORM document _fully_ specifies the
supporting congestion control messages and mechanisms, it is not strictly
dependent upon that document for specification purposes.  Although there  is
not a strict dependency, the  normative reference was maintained since RFC
4654
, as a building block document, contains considerable supporting
rationale for the mechanisms described.  It is important to note that
extensive simulation studies were conducted by the IRTF RMRG and subsequent
work leading to the RFC 4654 and NORM specifications.  Additionally,
significant experience with NORM protocol operation has occurred in the 3+
years of the NORM Experimental RFC 3940 existence and has shown that the
congestion control mechanism can be safely deployed on operating networks.
It is expected that RFC 4654 may be revised, but it is believed that the
complete specification that the NORM specification provides for congestion
control is sufficient.  For these reasons, it is  requested that an
exception be allowed for this particular downard reference.

  (1.i)  Has the Document Shepherd verified that the document's IANA
          Considerations section exists and is consistent with the body
          of the document?  If the document specifies protocol
          extensions, are reservations requested in appropriate IANA
          registries?  Are the IANA registries clearly identified?  If
          the document creates a new registry, does it define the
          proposed initial contents of the registry and an allocation
          procedure for future registrations?  Does it suggest a
          reasonable name for the new registry?  See [RFC2434].  If the
          document describes an Expert Review process, has the Document
          Shepherd conferred with the Responsible Area Director so that
          the IESG can appoint the needed Expert during IESG Evaluation?

The IANA consideration section exists.  IANA requirements are clearly
described and are consistent with the other documents requiring assignments
from the "ietf:rmt" name-space.  All assignment requests are in compliance
with RFC2434 and the appropriate IETF actions are specified.

  (1.j)  Has the Document Shepherd verified that sections of the
          document that are written in a formal language, such as XML
          code, BNF rules, MIB definitions, etc., validate correctly in
          an automated checker?

The documents contains no section written in formal language.

  (1.k)  The IESG approval announcement includes a Document
          Announcement Write-Up.  Please provide such a Document
          Announcement Write-Up.  Recent examples can be found in the
          "Action" announcements for approved documents.  The approval
          announcement contains the following sections:

          Technical Summary
            Relevant content can frequently be found in the abstract
            and/or introduction of the document.  If not, this may be
            an indication that there are deficiencies in the abstract
            or introduction.

          Working Group Summary
            Was there anything in the WG process that is worth noting?
            For example, was there controversy about particular points
            or were there decisions where the consensus was
            particularly rough?

          Document Quality
            Are there existing implementations of the protocol?  Have a
            significant number of vendors indicated their plan to
            implement the specification?  Are there any reviewers that
            merit special mention as having done a thorough review,
            e.g., one that resulted in important changes or a
            conclusion that the document had no substantive issues?  If
            there was a MIB Doctor, Media Type, or other Expert Review,
            what was its course (briefly)?  In the case of a Media Type
            Review, on what date was the request posted?

          Personnel
            Who is the Document Shepherd for this document?  Who is the
            Responsible Area Director?  If the document requires IANA
            experts(s), insert 'The IANA Expert(s) for the registries
            in this document are .'

Document Announcement Write-Up for draft-ietf-rmt-pi-norm-revised-07 follows.

Technical Summary

  This document is an RMT Protocol Instantiation that completely specifies
  data and procedures useful for building a reliable multicast transport
  protocol based on negative-acknowledgment (NACK) feedback.  The protocol
  uses the Forward Error Correction (FEC) techniques and building blocks
  specified by the RMT Working Group and fully specifies a congestion
  control mechanism that allows safe deployment of the protocol on
  networks along with TCP and other compatible transport protocols.  The
  document builds upon the NACK based reliability techniques described
  in another RMT WG document, draft-ietf-rmt-bb-norm-revised.
 
  draft-ietf-rmt-pi-norm-revised-07 also includes a description of
  security considerations and fully describes a baseline approach
  for using IPSec mechanisms to provide protocol security.  Header
  extensions are also defined to allow alternative security mechanisms
  to be deployed if needed.

Working Group Summary

    There is consensus in the WG to publish this documents.

Document Quality

    The document is of high quality and has been subject to extensive
    review in its Internet Draft and Experimental RFC forms.  The
    revised draft represents a small number of changes from the original
    Experimental RFC 3940.
   
    A public domain, open source implementation of this NORM protocol
    specification is available for use from the U.S. Naval Research
    Laboratory.  This implementation has been widely used in a number of
    applications, including military and commercial systems. The protocol has
    successfully operated on a wide variety of network types.  The INRIA
    organization has an implementation in progress.  The JPEG 2000 Digital
    Cinema group is considering specifying the NORM protocol  for some content
    distribution purposes.

    The content of this document was already reviewed and approved for
    publication as experimental RFC 3940. This document contains minor
    technical modifications.

Personnel

    Lorenzo Vicisano is the Document Shepherd.
    Magnus Westerlund is the Responsible Area Director.
2008-10-28
14 Cindy Morgan State Changes to AD is watching from Dead by Cindy Morgan
2008-10-25
07 (System) New version available: draft-ietf-rmt-pi-norm-revised-07.txt
2008-07-27
14 (System) State Changes to Dead from AD is watching by system
2008-07-27
14 (System) Document has expired
2008-01-16
14 (System) State Changes to AD is watching from Dead by system
2008-01-15
06 (System) New version available: draft-ietf-rmt-pi-norm-revised-06.txt
2008-01-11
14 (System) State Changes to Dead from AD is watching by system
2008-01-11
14 (System) Document has expired
2007-07-10
05 (System) New version available: draft-ietf-rmt-pi-norm-revised-05.txt
2007-03-08
04 (System) New version available: draft-ietf-rmt-pi-norm-revised-04.txt
2006-09-25
03 (System) New version available: draft-ietf-rmt-pi-norm-revised-03.txt
2006-06-29
02 (System) New version available: draft-ietf-rmt-pi-norm-revised-02.txt
2006-04-03
14 Magnus Westerlund Shepherding AD has been changed to Magnus Westerlund from Allison Mankin
2006-03-10
01 (System) New version available: draft-ietf-rmt-pi-norm-revised-01.txt
2006-03-04
14 Allison Mankin Draft Added by Allison Mankin in state AD is watching
2005-10-17
00 (System) New version available: draft-ietf-rmt-pi-norm-revised-00.txt