Skip to main content

Traversal Using Relays around NAT (TURN) Server Auto Discovery
draft-ietf-tram-turn-server-discovery-12

Revision differences

Document history

Date Rev. By Action
2017-04-17
12 (System) RFC Editor state changed to AUTH48-DONE from AUTH48
2017-04-10
12 (System) RFC Editor state changed to AUTH48 from RFC-EDITOR
2017-04-04
12 (System) RFC Editor state changed to RFC-EDITOR from EDIT
2017-02-28
12 (System) IANA Action state changed to RFC-Ed-Ack from Waiting on RFC Editor
2017-02-24
12 (System) IANA Action state changed to Waiting on RFC Editor from Waiting on Authors
2017-02-23
12 (System) IANA Action state changed to Waiting on Authors from In Progress
2017-02-21
12 (System) IANA Action state changed to In Progress from Waiting on Authors
2017-02-21
12 (System) IANA Action state changed to Waiting on Authors from In Progress
2017-02-16
12 (System) RFC Editor state changed to EDIT
2017-02-16
12 (System) IESG state changed to RFC Ed Queue from Approved-announcement sent
2017-02-16
12 (System) Announcement was received by RFC Editor
2017-02-15
12 (System) IANA Action state changed to In Progress
2017-02-15
12 Amy Vezza IESG state changed to Approved-announcement sent from Approved-announcement to be sent
2017-02-15
12 Amy Vezza IESG has approved the document
2017-02-15
12 Amy Vezza Closed "Approve" ballot
2017-02-15
12 Amy Vezza Ballot writeup was changed
2017-02-15
12 Amy Vezza IESG state changed to Approved-announcement to be sent from IESG Evaluation::AD Followup
2017-02-13
12 Spencer Dawkins RFC Editor Note was changed
2017-02-13
12 Spencer Dawkins RFC Editor Note for ballot was generated
2017-02-13
12 Spencer Dawkins RFC Editor Note for ballot was generated
2017-02-13
12 Spencer Dawkins Ballot approval text was generated
2017-02-08
12 Terry Manderson [Ballot comment]
Thank you for the fix.
2017-02-08
12 Terry Manderson [Ballot Position Update] Position for Terry Manderson has been changed to No Objection from Discuss
2017-02-06
Jasmine Magallanes Posted related IPR disclosure: IPalive AB, Sweden (assigned to by inventor Karl Erik Ståhl)'s Statement about IPR related to draft-ietf-tram-turn-server-discovery
2017-01-12
12 Tirumaleswar Reddy.K New version available: draft-ietf-tram-turn-server-discovery-12.txt
2017-01-12
12 (System) New version approved
2017-01-12
12 (System) Request for posting confirmation emailed to previous authors: "Prashanth Patil" , "Tirumaleswar Reddy" , "Dan Wing"
2017-01-12
12 Tirumaleswar Reddy.K Uploaded new revision
2016-12-14
11 Tirumaleswar Reddy.K New version available: draft-ietf-tram-turn-server-discovery-11.txt
2016-12-14
11 (System) New version approved
2016-12-14
11 (System) Request for posting confirmation emailed to previous authors: "Prashanth Patil" , "Tirumaleswar Reddy" , "Dan Wing"
2016-12-14
11 Tirumaleswar Reddy.K Uploaded new revision
2016-10-11
10 Ben Campbell
[Ballot comment]
Thanks, this version helps, and I am clearing my DISCUSS. (I assume Spencer will figure out the Right Thing to do to make …
[Ballot comment]
Thanks, this version helps, and I am clearing my DISCUSS. (I assume Spencer will figure out the Right Thing to do to make sure the update to 5766 gets the right review.)

I have a few minor comments on the resulting text. None of these are showstoppers:

- Absrtact: Please mention that this draft updates 5766 to relax the requirement for authentication in certain cases in the abstract.

- 9, 2nd paragraph, "Making STUN authentication OPTIONAL ..."

Since  you already used a 2119 MAY in the previous paragraph, there's no need for the 2119 OPTIONAL here. (In general, 2119 keywords should be used to state requirements, not talk about existing requirements)

-9, third paragraph:
I saw a comment on my DISCUSS email thread from Karl Stahl, stating that DTLS could not be mandated. Has that input been considered? (I don't have an opinion; I just want to make sure people noticed the comment.)

-9, 9th paragraph: "Instead, with an explicit administrator choice, a TURN client SHOULD fall-back to encryption-only (D)TLS when (D)TLS authentication is not available."
I’m not sure what SHOULD means after adding the explicit choice part. Does that means the administrator SHOULD make that choice? Is the point that you can fall back, but MUST NOT do so without explicit choice?

-9, 10th paragraph:
-- The first sentence is now redundant with the previous paragraph.
-- is the point of the first part of the second sentence that you MUST NOT fall back without explicit choice? (similar to for server authentication?)
2016-10-11
10 Ben Campbell [Ballot Position Update] Position for Ben Campbell has been changed to No Objection from Discuss
2016-10-07
10 Kathleen Moriarty
[Ballot comment]
Thank you for adding in the text on restricting access to the turn server to address my prior discuss.  I think this is …
[Ballot comment]
Thank you for adding in the text on restricting access to the turn server to address my prior discuss.  I think this is helpful.
2016-10-07
10 Kathleen Moriarty [Ballot Position Update] Position for Kathleen Moriarty has been changed to No Objection from Discuss
2016-10-07
10 Alexey Melnikov [Ballot comment]
Thank you for addressing my DISCUSS.
2016-10-07
10 Alexey Melnikov [Ballot Position Update] Position for Alexey Melnikov has been changed to No Objection from Discuss
2016-10-05
10 Suresh Krishnan [Ballot comment]
Thanks for addressing my DISCUSS points on version 09.
2016-10-05
10 Suresh Krishnan [Ballot Position Update] Position for Suresh Krishnan has been changed to No Objection from Discuss
2016-10-05
10 (System) Sub state has been changed to AD Followup from Revised ID Needed
2016-10-05
10 (System) IANA Review state changed to Version Changed - Review Needed from IANA OK - Actions Needed
2016-10-05
10 Prashanth Patil New version available: draft-ietf-tram-turn-server-discovery-10.txt
2016-10-05
10 (System) New version approved
2016-10-05
09 (System) Request for posting confirmation emailed to previous authors: tram-chairs@ietf.org, "Dan Wing" , "Tirumaleswar Reddy" , "Prashanth Patil"
2016-10-05
09 Prashanth Patil Uploaded new revision
2016-09-28
09 Ralph Droms Request for Telechat review by GENART Completed: Almost Ready. Reviewer: Ralph Droms.
2016-09-01
09 Cindy Morgan IESG state changed to IESG Evaluation::Revised I-D Needed from IESG Evaluation
2016-09-01
09 Stephen Farrell
[Ballot comment]

- 5.1: s/chance/change/

- I think section 9 covers all the bases in terms of what
might be done, but probably has to …
[Ballot comment]

- 5.1: s/chance/change/

- I think section 9 covers all the bases in terms of what
might be done, but probably has to be a bit vague about what's
best to do and the consequences that follow. (For example,
with the reference to how RFC7250 "could be used.") I think it
might be a good idea to admit that we don't really yet know
the security implications of this mechanism, if widely
deployed.  However, I also admit that I'm unsure about this
since it's just very hard to know the security properties of
discovery of this kind ahead of time, so I'm not sure what
kind of text to suggest that'd be useful.
2016-09-01
09 Stephen Farrell [Ballot Position Update] New position, No Objection, has been recorded for Stephen Farrell
2016-09-01
09 Jari Arkko [Ballot Position Update] New position, No Objection, has been recorded for Jari Arkko
2016-08-31
09 Amanda Baber IANA Review state changed to IANA OK - Actions Needed from IANA - Not OK
2016-08-31
09 Joel Jaeggli [Ballot Position Update] New position, No Objection, has been recorded for Joel Jaeggli
2016-08-31
09 Suresh Krishnan
[Ballot discuss]
* Section 4.1.1.

The DHCP procedure is underspecified. I think this can be easily fixed but it requires some work.

Please describe what …
[Ballot discuss]
* Section 4.1.1.

The DHCP procedure is underspecified. I think this can be easily fixed but it requires some work.

Please describe what sort of messages you would be using. i.e. are you going for a stateful exchange to piggy pack with other address and config information or are you going for a stateless Information-request based exchange(Most likely). Is there an ORO? If so, what options are requested in the ORO? Are there multiple request-response round trips as implied by the text?
2016-08-31
09 Suresh Krishnan [Ballot Position Update] New position, Discuss, has been recorded for Suresh Krishnan
2016-08-31
09 Ben Campbell
[Ballot discuss]
-9, first paragraph says:

"Use of Session Traversal Utilities for NAT (STUN) [RFC5389]
  authentication is OPTIONAL for TURN servers provided …
[Ballot discuss]
-9, first paragraph says:

"Use of Session Traversal Utilities for NAT (STUN) [RFC5389]
  authentication is OPTIONAL for TURN servers provided by the local
  network or by the access network.  A network provided TURN server MAY
  be configured to accept Allocation requests without STUN
  authentication, and a TURN client MAY be configured to accept
  Allocation success responses without STUN authentication from a
  network provided TURN server. "

This seems to relax the MUST level requirement in RFC 5766 that says TURN MUST use STUN long-term credential authentication, or use some other equally strong mechanism. From a purely process perpective, this would either require an update to 5766, or it would require an argument that the local/access network is somehow equally protected. I think the latter would only be true if the access network has some sort of protection beyond just being the access network (e.g. a vpn, ipsec, or physical isolation.)  I don't recall seeing text that suggested any of those.

But in any case, I think relaxing that requirement needs some discussion about how the server or client can be sure that all communication is in fact constrained to the local network.
2016-08-31
09 Ben Campbell
[Ballot comment]
Substantive:

- general: I agree with the DISCUSS positions from Terry, Alexey, and Kathleen.

-3, paragraph 1: Are the MUST and MAY in …
[Ballot comment]
Substantive:

- general: I agree with the DISCUSS positions from Terry, Alexey, and Kathleen.

-3, paragraph 1: Are the MUST and MAY in this paragraph _new_ requirements, or just statements of fact about previously existing requirements? If the latter, they should not use 2119 keywords.

-4.1.2, first paragraph: It would be helpful to have a discussion about clients that may support multiple users, potentially with different domains, or for a single user to use different domains for different services.

-4.2, general: Do I correctly understand that most of this section describes the results of applying RFC 5928 procedures to the extracted domain name? If so, is it not enough reference 5928 and leave it at that?

-4.2, last paragraph, last sentence: Is this requirement new to this draft, or something from 5928? If the latter, please use descriptive language.

-9, paragraph 5: "Any discovered TURN server outside the criteria is considered untrusted and is not used for privacy sensitive communication."

It seems like this needs stronger guidance, maybe even "MUST NOT be used..."

- Informational References:
I-D.ietf-rtcweb-return and RFC 6125 are cited as part of normative requirements, which makes them by definition need to be normative references. I-D.ietf-tram-turn-mobility, RFC6024, and RFC7250 are borderline; I think one could make an argument that one needs to read them to fully understand this draft.

Editorial:

-3, last paragraph: "MAY optionally" is redundant.

-5.1, first paragraph, first sentence: I got lost in the nested “or”s. Please consider breaking this up into a few simpler sentences.

- Figure 1: Why merge the query and reply for the A/AAAA query but not the other queries?

-6, first paragraph, last sentence: I'm not sure what that sentence means.
2016-08-31
09 Ben Campbell [Ballot Position Update] New position, Discuss, has been recorded for Ben Campbell
2016-08-31
09 Mirja Kühlewind [Ballot Position Update] New position, No Objection, has been recorded for Mirja Kühlewind
2016-08-31
09 Alvaro Retana [Ballot Position Update] New position, No Objection, has been recorded for Alvaro Retana
2016-08-31
09 Alexey Melnikov
[Ballot discuss]
In Section 9:

o  For certificate-based authentication, a pre-populated trust anchor
      store [RFC6024] allows a TURN client to …
[Ballot discuss]
In Section 9:

o  For certificate-based authentication, a pre-populated trust anchor
      store [RFC6024] allows a TURN client to perform path validation
      for the server certificate obtained during the (D)TLS handshake.

      If the client used a domain name to discover the TURN server, that
      domain name also provides a mechanism for validation of the TURN
      server.  The client MUST use the rules and guidelines given in
      section 6 of [RFC6125] to validate the TURN server identity.

I am glad that you are referencing RFC 6125, but unfortunately you don't provide enough details. Please add details as specified in Section 3 of RFC 6125 to your document.
2016-08-31
09 Alexey Melnikov [Ballot Position Update] New position, Discuss, has been recorded for Alexey Melnikov
2016-08-31
09 Alissa Cooper
[Ballot comment]
= Section 6 =

"Using the TURN
  anycast address, the only two things that need to be deployed in the
  network …
[Ballot comment]
= Section 6 =

"Using the TURN
  anycast address, the only two things that need to be deployed in the
  network are the two things that actually use TURN."

This is a bit opaque. I would suggest adding the qualifier "for discovery" somewhere in this sentence.

= Section 7.2 =

"WebRTC endpoints SHOULD treat any TURN server discovered through the mechanisms described in this specification as an enterprise/gateway server, in accordance with Recursively Encapsulated TURN [I-D.ietf-rtcweb-return]."

I think this needs to be re-phrased to include auto-discovery of a TURN server hosted by any access network, not just an enterprise network.

= Section 9 =

"Any discovered TURN server
  outside the criteria is considered untrusted and is not used for
  privacy sensitive communication."
 
This is stated as a fact, but I would have thought it's more of a recommendation to implementers, e.g., servers outside the criteria ought to be considered untrusted and therefore not used.
2016-08-31
09 Alissa Cooper [Ballot Position Update] New position, No Objection, has been recorded for Alissa Cooper
2016-08-30
09 Terry Manderson
[Ballot discuss]
in requesting special use assignments, please read the registries and provide guidance on the scope of the allocations i.e.

  o  Source - …
[Ballot discuss]
in requesting special use assignments, please read the registries and provide guidance on the scope of the allocations i.e.

  o  Source - A boolean value indicating whether an address from the
      allocated special-purpose address block is valid when used as the
      source address of an IP datagram that transits two devices.

  o  Destination - A boolean value indicating whether an address from
      the allocated special-purpose address block is valid when used as
      the destination address of an IP datagram that transits two
      devices.

  o  Forwardable - A boolean value indicating whether a router may
      forward an IP datagram whose destination address is drawn from the
      allocated special-purpose address block between external
      interfaces.

  o  Global - A boolean value indicating whether an IP datagram whose
      destination address is drawn from the allocated special-purpose
      address block is forwardable beyond a specified administrative
      domain.
2016-08-30
09 Terry Manderson [Ballot Position Update] New position, Discuss, has been recorded for Terry Manderson
2016-08-30
09 (System) IANA Review state changed to IANA - Not OK from Version Changed - Review Needed
2016-08-30
09 Deborah Brungard [Ballot Position Update] New position, No Objection, has been recorded for Deborah Brungard
2016-08-29
09 Kathleen Moriarty
[Ballot discuss]
This should be easy to resolve.  In reading the draft, it doesn't cover any mechanism for the TURN server to limit what clients …
[Ballot discuss]
This should be easy to resolve.  In reading the draft, it doesn't cover any mechanism for the TURN server to limit what clients can discover it.  For the second and third method, it seems like there are possible ways to do this.  Could these be added to the security considerations?  You'd need to state that this isn't possible with the first method.  If there is a reason why it is always okay to discover a TURN server, please let me know why this is not appropriate to add.  Thanks.
2016-08-29
09 Kathleen Moriarty [Ballot Position Update] New position, Discuss, has been recorded for Kathleen Moriarty
2016-08-25
09 Jean Mahoney Request for Telechat review by GENART is assigned to Ralph Droms
2016-08-25
09 Jean Mahoney Request for Telechat review by GENART is assigned to Ralph Droms
2016-08-24
09 Gunter Van de Velde Request for Last Call review by OPSDIR Completed: Has Nits. Reviewer: Susan Hares.
2016-08-23
09 Spencer Dawkins Placed on agenda for telechat - 2016-09-01
2016-08-23
09 Spencer Dawkins IESG state changed to IESG Evaluation from Waiting for Writeup
2016-08-23
09 Spencer Dawkins Ballot has been issued
2016-08-23
09 Spencer Dawkins [Ballot Position Update] New position, Yes, has been recorded for Spencer Dawkins
2016-08-23
09 Spencer Dawkins Created "Approve" ballot
2016-08-23
09 Spencer Dawkins Ballot writeup was changed
2016-08-23
09 Spencer Dawkins Ballot writeup was changed
2016-08-23
09 Tirumaleswar Reddy.K IANA Review state changed to Version Changed - Review Needed from IANA OK - Actions Needed
2016-08-23
09 Tirumaleswar Reddy.K New version available: draft-ietf-tram-turn-server-discovery-09.txt
2016-08-19
08 Tero Kivinen Request for Last Call review by SECDIR Completed: Has Nits. Reviewer: Brian Weis.
2016-08-11
08 (System) IESG state changed to Waiting for Writeup from In Last Call
2016-08-10
08 (System) IANA Review state changed to IANA OK - Actions Needed from IANA - Review Needed
2016-08-10
08 Sabrina Tanamal
(Via drafts-lastcall-comment@iana.org): IESG/Authors/WG Chairs:

IANA has completed its review of draft-ietf-tram-turn-server-discovery-08.txt. If any part of this review is inaccurate, please let us know.

IANA …
(Via drafts-lastcall-comment@iana.org): IESG/Authors/WG Chairs:

IANA has completed its review of draft-ietf-tram-turn-server-discovery-08.txt. If any part of this review is inaccurate, please let us know.

IANA understands that, upon approval of this document, there is a single action which IANA must complete.

IANA has assigned TBD1 from the IPv4 special address registry (located at: https://www.iana.org/assignments/iana-ipv4-special-registry/ ) and TBD2 from the IPv6 special address registry (located at: https://www.iana.org/assignments/iana-ipv6-special-registry/iana-ipv6-special-registry.xhtml#iana-ipv6-special-registry-1 ).

The authors also need to include what should be in all the columns for each registry.

For example:
Source Destination Forwardable Global Reserved-by-Protocol

IANA understands that this is the only action required to be completed upon approval of this document.

Note:  The actions requested in this document will not be completed until the document has been approved for publication as an RFC. This message is only to confirm what actions will be performed. 

Thank you,

Sabrina Tanamal
IANA Specialist
ICANN
2016-08-10
08 Ralph Droms Request for Last Call review by GENART Completed: Ready with Issues. Reviewer: Ralph Droms.
2016-08-04
08 Tero Kivinen Request for Last Call review by SECDIR is assigned to Brian Weis
2016-08-04
08 Tero Kivinen Request for Last Call review by SECDIR is assigned to Brian Weis
2016-08-01
08 Gunter Van de Velde Request for Last Call review by OPSDIR is assigned to Susan Hares
2016-08-01
08 Gunter Van de Velde Request for Last Call review by OPSDIR is assigned to Susan Hares
2016-07-28
08 Jean Mahoney Request for Last Call review by GENART is assigned to Ralph Droms
2016-07-28
08 Jean Mahoney Request for Last Call review by GENART is assigned to Ralph Droms
2016-07-28
08 Amy Vezza IANA Review state changed to IANA - Review Needed
2016-07-28
08 Amy Vezza
The following Last Call announcement was sent out:

From: The IESG
To: "IETF-Announce"
CC: tram-chairs@ietf.org, "Simon Perreault" , draft-ietf-tram-turn-server-discovery@ietf.org, sperreault@jive.com, spencerdawkins.ietf@gmail.com, …
The following Last Call announcement was sent out:

From: The IESG
To: "IETF-Announce"
CC: tram-chairs@ietf.org, "Simon Perreault" , draft-ietf-tram-turn-server-discovery@ietf.org, sperreault@jive.com, spencerdawkins.ietf@gmail.com, tram@ietf.org
Reply-To: ietf@ietf.org
Sender:
Subject: Last Call:  (TURN Server Auto Discovery) to Proposed Standard


The IESG has received a request from the TURN Revised and Modernized WG
(tram) to consider the following document:
- 'TURN Server Auto Discovery'
  as Proposed Standard

The IESG plans to make a decision in the next few weeks, and solicits
final comments on this action. Please send substantive comments to the
ietf@ietf.org mailing lists by 2016-08-11. Exceptionally, comments may be
sent to iesg@ietf.org instead. In either case, please retain the
beginning of the Subject line to allow automated sorting.

Abstract


  Current Traversal Using Relays around NAT (TURN) server discovery
  mechanisms are relatively static and limited to explicit
  configuration.  These are usually under the administrative control of
  the application or TURN service provider, and not the enterprise,
  ISP, or the network in which the client is located.  Enterprises and
  ISPs wishing to provide their own TURN servers need auto discovery
  mechanisms that a TURN client could use with no or minimal
  configuration.  This document describes three such mechanisms for
  TURN server discovery.




The file can be obtained via
https://datatracker.ietf.org/doc/draft-ietf-tram-turn-server-discovery/

IESG discussion can be tracked via
https://datatracker.ietf.org/doc/draft-ietf-tram-turn-server-discovery/ballot/


No IPR declarations have been submitted directly on this I-D.




2016-07-28
08 Amy Vezza IESG state changed to In Last Call from Last Call Requested
2016-07-28
08 Spencer Dawkins Last call was requested
2016-07-28
08 Spencer Dawkins Ballot approval text was generated
2016-07-28
08 Spencer Dawkins Ballot writeup was generated
2016-07-28
08 Spencer Dawkins IESG state changed to Last Call Requested from AD Evaluation
2016-07-28
08 Spencer Dawkins Last call announcement was generated
2016-07-26
08 Prashanth Patil New version available: draft-ietf-tram-turn-server-discovery-08.txt
2016-07-13
07 Spencer Dawkins IESG state changed to AD Evaluation from Publication Requested
2016-07-13
07 Simon Perreault
1. Summary

Document shepherd: Simon Perreault
Responsible Area Director: Spencer Dawkins

The intent of this document is to define a procedure for TURN clients to …
1. Summary

Document shepherd: Simon Perreault
Responsible Area Director: Spencer Dawkins

The intent of this document is to define a procedure for TURN clients to
discover servers available to them. In a nutshell the procedure tries, in order,
local configuration, S-NAPTR lookup of the client's domain name (obtained
from either DHCP or the application-layer identity), DNS-SD, and then a
well-known anycast address as last resort.

The requested publication type is Proposed Standard because it defines new
behaviour for TURN clients of which WebRTC is an immediate customer.


2. Review and Consensus

The document was heavily discussed and reviewed, both in TRAM and externally in
RTCWEB, by many participants. Much of the discussion revolved around security
considerations. The resulting text represents consensus of all participants.

Initial requirements for this work included discovery of network-provided
servers in both enterprise and ISP settings. DHCP and DNS-SD are targeted at the
enterprise setting while anycast is targeted at the ISP setting. DNS-SD was
suggested by a browser maker as an alternative mechanism that is typically more
easily usable than DHCP from a user-space application such as a web browser.

It is expected that WebRTC browsers will implement this specification. However,
although RETURN and TURN-bis contain informative references pointing to this
spec, it is not mandatory-to-implement for WebRTC.


3. Intellectual Property

Each author has stated that their direct, personal knowledge of any IPR related
to this document has already been disclosed, in conformance with BCPs 78 and 79.
There was no IPR disclosure.


4. Other Points

This document registers new well-known anycast IP address ranges, and that
requires IETF Review.
2016-07-13
07 Simon Perreault Responsible AD changed to Spencer Dawkins
2016-07-13
07 Simon Perreault IETF WG state changed to Submitted to IESG for Publication from WG Consensus: Waiting for Write-Up
2016-07-13
07 Simon Perreault IESG state changed to Publication Requested
2016-07-13
07 Simon Perreault IESG process started in state Publication Requested
2016-07-13
07 Simon Perreault Changed document writeup
2016-04-18
07 Prashanth Patil New version available: draft-ietf-tram-turn-server-discovery-07.txt
2016-01-14
06 Simon Perreault Changed consensus to Yes from Unknown
2016-01-14
06 Simon Perreault Intended Status changed to Proposed Standard from None
2016-01-14
06 Simon Perreault Notification list changed to "Simon Perreault" <sperreault@jive.com>
2016-01-14
06 Simon Perreault Document shepherd changed to Simon Perreault
2016-01-07
06 Simon Perreault Tag Revised I-D Needed - Issue raised by WG cleared.
2016-01-07
06 Simon Perreault IETF WG state changed to WG Consensus: Waiting for Write-Up from Waiting for WG Chair Go-Ahead
2016-01-06
06 Prashanth Patil New version available: draft-ietf-tram-turn-server-discovery-06.txt
2015-10-08
05 Prashanth Patil New version available: draft-ietf-tram-turn-server-discovery-05.txt
2015-07-20
04 Prashanth Patil New version available: draft-ietf-tram-turn-server-discovery-04.txt
2015-07-20
03 Simon Perreault Ted Hardie had comments during WGLC that need to be addressed.
2015-07-20
03 Simon Perreault Tag Revised I-D Needed - Issue raised by WG set.
2015-07-20
03 Simon Perreault IETF WG state changed to Waiting for WG Chair Go-Ahead from In WG Last Call
2015-06-05
03 Simon Perreault IETF WG state changed to In WG Last Call from WG Document
2015-05-20
03 Tirumaleswar Reddy.K New version available: draft-ietf-tram-turn-server-discovery-03.txt
2015-05-13
02 Prashanth Patil New version available: draft-ietf-tram-turn-server-discovery-02.txt
2015-01-22
01 Tirumaleswar Reddy.K New version available: draft-ietf-tram-turn-server-discovery-01.txt
2014-07-24
00 Prashanth Patil New version available: draft-ietf-tram-turn-server-discovery-00.txt