The Subnetwork Encapsulation and Adaptation Layer (SEAL)
draft-templin-intarea-seal-68
Revision differences
Document history
Date | Rev. | By | Action |
---|---|---|---|
2015-10-14
|
68 | (System) | Notify list changed from fltemplin@acm.org, draft-templin-intarea-seal@ietf.org to (None) |
2014-07-21
|
68 | (System) | Document has expired |
2014-01-03
|
68 | Fred Templin | New version available: draft-templin-intarea-seal-68.txt |
2013-12-20
|
67 | Fred Templin | New version available: draft-templin-intarea-seal-67.txt |
2013-12-19
|
66 | Fred Templin | New version available: draft-templin-intarea-seal-66.txt |
2013-10-21
|
65 | Fred Templin | New version available: draft-templin-intarea-seal-65.txt |
2013-10-18
|
64 | Fred Templin | New version available: draft-templin-intarea-seal-64.txt |
2013-10-14
|
63 | Fred Templin | New version available: draft-templin-intarea-seal-63.txt |
2013-08-20
|
62 | Fred Templin | New version available: draft-templin-intarea-seal-62.txt |
2013-08-02
|
61 | Fred Templin | New version available: draft-templin-intarea-seal-61.txt |
2013-07-15
|
60 | Fred Templin | New version available: draft-templin-intarea-seal-60.txt |
2013-07-02
|
59 | Fred Templin | New version available: draft-templin-intarea-seal-59.txt |
2013-06-27
|
58 | Fred Templin | New version available: draft-templin-intarea-seal-58.txt |
2013-06-12
|
57 | Fred Templin | New version available: draft-templin-intarea-seal-57.txt |
2013-06-12
|
56 | Fred Templin | New version available: draft-templin-intarea-seal-56.txt |
2013-05-03
|
55 | Fred Templin | New version available: draft-templin-intarea-seal-55.txt |
2013-04-19
|
54 | Pete Resnick | Removed from agenda for telechat |
2013-04-19
|
54 | Pete Resnick | Document moved to ISE stream, but it's IESG state was never updated and therefore folks were still getting new version notifications. Hopefully this fixes that. |
2013-04-19
|
54 | Pete Resnick | State changed to Dead from AD is watching |
2013-04-19
|
54 | Fred Templin | New version available: draft-templin-intarea-seal-54.txt |
2013-04-18
|
53 | Fred Templin | New version available: draft-templin-intarea-seal-53.txt |
2013-03-19
|
52 | Nevil Brownlee | ISE state changed to In ISE Review from None |
2013-03-18
|
52 | Fred Templin | New version available: draft-templin-intarea-seal-52.txt |
2013-03-12
|
51 | Cindy Morgan | Changed field(s): group,review_by_rfc_editor,abstract |
2013-02-26
|
51 | Amy Vezza | Stream changed to ISE from IETF |
2013-02-21
|
51 | Tero Kivinen | Request for Last Call review by SECDIR Completed: Has Issues. Reviewer: David Harrington. |
2013-02-21
|
51 | Cindy Morgan | State changed to AD is watching from Waiting for AD Go-Ahead |
2013-02-21
|
51 | Martin Stiemerling | [Ballot comment] Balloting no objection, but I support Brian's discuss and share the other IESG reviews. |
2013-02-21
|
51 | Martin Stiemerling | [Ballot Position Update] New position, No Objection, has been recorded for Martin Stiemerling |
2013-02-20
|
51 | Wesley Eddy | [Ballot Position Update] New position, No Objection, has been recorded for Wesley Eddy |
2013-02-20
|
51 | Benoît Claise | [Ballot discuss] While I believe there is some value in publishing this specification, I agree with Brian: If the author insists on maintaining … [Ballot discuss] While I believe there is some value in publishing this specification, I agree with Brian: If the author insists on maintaining the Informational status, I would suggest a title change to indicate that this is description of Boeing-developed protocol. Otherwise, I suggest moving it Experimental like the RFC it is obsoleting. Existing examples: RFC 3176, RFC 3954, RFC 6812 |
2013-02-20
|
51 | Benoît Claise | Ballot discuss text updated for Benoit Claise |
2013-02-20
|
51 | Benoît Claise | [Ballot discuss] While I believe there is some value in publishing this specification, I agree with Brian: If the author insists on maintaining … [Ballot discuss] While I believe there is some value in publishing this specification, I agree with Brian: If the author insists on maintaining the Informational status, I would suggest a title change to indicate that this is description of Boeing-developed protocol. Otherwise, I suggest moving it Experimental like the RFC it is obsoleting. Existing examples: RFC 3176, RFC 3954, RFC 6812 |
2013-02-20
|
51 | Benoît Claise | [Ballot Position Update] New position, Discuss, has been recorded for Benoit Claise |
2013-02-20
|
51 | Pete Resnick | [Ballot comment] I agree with the DISCUSS positions. I'm willing to have the DISUCSSion, but at the end of the day I think we need … [Ballot comment] I agree with the DISCUSS positions. I'm willing to have the DISUCSSion, but at the end of the day I think we need to say "No thanks" to having this in the IETF stream. The fact is that there is no indication of any consensus in the IETF to move forward with this experimentally; there is no indication that anyone will participate in the experiment. It sounds to me like this work needs to garner a constituency, and it sounds like we would have to figure out where it fits with other protocols (i.e., if it's competing with the or complementary to them). That requires a BOF, not an IETF Last Call and IESG Evaluation. I don't think we should be in the business of publishing things in the IETF stream *in order to* garner interest. It sounds from other comments like this is interesting work. It seems a shame not to have the IETF do work on this. But until there is demonstrated interest, I don't think this belongs in the IETF stream. Having the ISE publish as Experimental again seems reasonable, and I don't think that the fact the this potentially competes with LISP should preclude that. |
2013-02-20
|
51 | Pete Resnick | [Ballot Position Update] New position, Abstain, has been recorded for Pete Resnick |
2013-02-20
|
51 | Stewart Bryant | [Ballot discuss] This is a discuss for discussion with the IESG. I anticipate clearing on the call. I agree with the other IESG review comments … [Ballot discuss] This is a discuss for discussion with the IESG. I anticipate clearing on the call. I agree with the other IESG review comments and support Brian's discuss. I addition, this work seems to have a lot of overlap with LISP which is an IETG WG project. I think that the least it should do is to discuss LISP, but I am wondering whether the IESG should consider this as an end-run of IETF work. |
2013-02-20
|
51 | Stewart Bryant | [Ballot Position Update] New position, Discuss, has been recorded for Stewart Bryant |
2013-02-20
|
51 | Ralph Droms | Changed 2013-2-20 to reflect feedback from IESG and Directorate reviews. |
2013-02-20
|
51 | Ralph Droms | Intended Status changed to Experimental from Informational |
2013-02-20
|
51 | Adrian Farrel | [Ballot comment] I agree with Brian's Discuss. If this is Informational then it needs to be shaped as a description of a particular company's protocol. … [Ballot comment] I agree with Brian's Discuss. If this is Informational then it needs to be shaped as a description of a particular company's protocol. It would then be published to allow others to implement and interoperate if they want. If this moves to Experimental (which seems better to me) it should describe the parameters of the experiment. |
2013-02-20
|
51 | Adrian Farrel | [Ballot Position Update] New position, No Objection, has been recorded for Adrian Farrel |
2013-02-20
|
51 | (System) | State changed to Waiting for AD Go-Ahead from In Last Call |
2013-02-19
|
51 | Gonzalo Camarillo | [Ballot Position Update] New position, No Objection, has been recorded for Gonzalo Camarillo |
2013-02-19
|
51 | Ron Bonica | [Ballot comment] I agree with Brian's discuss, but am abstaining because I don't want to leave the DISCUSS with my successor. |
2013-02-19
|
51 | Ron Bonica | [Ballot Position Update] New position, Abstain, has been recorded for Ronald Bonica |
2013-02-19
|
51 | Brian Haberman | [Ballot discuss] I have no objections to the *concepts* developed in this draft, but I have a major concern with the way it is specified. … [Ballot discuss] I have no objections to the *concepts* developed in this draft, but I have a major concern with the way it is specified. So color me as wanting to discuss the following issues: 1) At this point, I believe it is not in the best interest of the Internet at-large to allocate an IP protocol number to what appears to be an experimental mechanism used only within the confines of a single enterprise. The author has made many attempts to drum up support for this concept over the years, but it is apparent that vendors are not interested in building this technology into their products. The current implementation leverages one of the experimental IP protocol numbers available for such use. 2) If the author insists on maintaining the Informational status, I would suggest a title change to indicate that this is description of Boeing-developed protocol. Otherwise, I suggest moving it Experimental like the RFC it is obsoleting. |
2013-02-19
|
51 | Brian Haberman | [Ballot comment] 1) I agree with Stephen's points on the lack of clarity around the security mechanisms described in this draft. 2) Some of the … [Ballot comment] 1) I agree with Stephen's points on the lack of clarity around the security mechanisms described in this draft. 2) Some of the ICMP processing approaches are good advice for protocol stack developers & operators and could be broken out of this document and published as recommendations for vanilla ICMP. |
2013-02-19
|
51 | Brian Haberman | [Ballot Position Update] New position, Discuss, has been recorded for Brian Haberman |
2013-02-19
|
51 | Christer Holmberg | Assignment of request for Last Call review by GENART to Christer Holmberg was rejected |
2013-02-19
|
51 | Russ Housley | [Ballot Position Update] New position, No Objection, has been recorded for Russ Housley |
2013-02-18
|
51 | Stephen Farrell | [Ballot discuss] I read this fairly quickly so I may have gotten some of this wrong, in which case, apologies;-) (1) I don't see anywhere … [Ballot discuss] I read this fairly quickly so I may have gotten some of this wrong, in which case, apologies;-) (1) I don't see anywhere that the ICV algorithm is defined, nor where any automated key management is discussed, and I think the AKM is needed given the 32 bit ICV. What am I missing? I think that needs to be fixed and is simple to fix properly by selecting an HMAC-SHA-x at some reasonable length (96 bits) and maybe picking either TLS or IPsec as being needed for setting up ITE/ETE security associations, but with a 96 bit ICV you're probably ok for an informational/experimental draft without AKM. To be honest, that lack sends me a big signal that this isn't ready even after 51 revisions if it doesn't include those are by now pretty basic things. (2) Should we really burn an IP protocol number on this? I've no strong opinion but they are >50% gone and this seems tenuous and I'm not even sure the IP protocol number is really needed if TCP and UDP can be used as outer encapsulations. I'll readily clear this though if someone explains to me that this draft is par for the course in terms of getting an IP protocol number. |
2013-02-18
|
51 | Stephen Farrell | [Ballot comment] - Informational obsoleting experimental RFC eh. Works for me;-) But I'm puzzled its not experimental. Does that relate to the last call duration? … [Ballot comment] - Informational obsoleting experimental RFC eh. Works for me;-) But I'm puzzled its not experimental. Does that relate to the last call duration? That could be a concern, given that this wasn't afaik dicsussed on a list. - 51 revisions, wow. - p10, the data origin authentication service does not cover all the payload data so I think calling it that is misleading. Truth in advertising would suggest calling it 32-bit-weak-128-byte-header-data-origin-authentication or something. - p11, savi is only chartered to deal with LANs which seems very different from what's called a subnetwork here or for protection of an ITE against source spoofing. I think the reference is inappropriate as it stands. - p13, if going to all this trouble, wouldn't an MTU of more than 1500 be useful to offer as a minimum to the outside world? - p13, where's the ICV algorithm or key ID? - p14, I don't get why a max of 32 seal paths to an ETE is sensible. (I don't need to know, but the document would be better if this and similar hardcoded numbers were better explained.) - p16, how are ICV secrets updated if they're used for too much data? (A 32 bit MAC has to mean a small limit here.) - p17, how do intermediate routers on the path send PTB messages? do all routers need to be SEAL aware? Its also not clear to me why an ETE would send a PTB when the packet is clearly not so big that it didn't get to the ETE. - p20, I was surprised by the TCP/UDP outer encapsulation, you probably should introduce that earlier, maybe even in the abstract. (Wouldn't the TCP handshake and slow start be an issue if the application is e.g. RTP? And with UDP encapsulation, how's congestion handled?) - p21, does SEAL have an IP protocol number? If RFC5320 had no version field and this is incompatible don't you need to deprecate the use of 5320 with that IP protocol number? I guess that's ok for this since there's no real installed base, right? If there were, it wouldn't be ok. |
2013-02-18
|
51 | Stephen Farrell | [Ballot Position Update] New position, Discuss, has been recorded for Stephen Farrell |
2013-02-15
|
51 | Pearl Liang | IESG/Authors/WG Chairs: IANA has reviewed draft-templin-intarea-seal-51. Authors should review the comments and/or questions below. Please report any inaccuracies and respond to any questions as soon … IESG/Authors/WG Chairs: IANA has reviewed draft-templin-intarea-seal-51. Authors should review the comments and/or questions below. Please report any inaccuracies and respond to any questions as soon as possible. We have a question about one of the actions requested of IANA in this document. We understands that, upon approval of this document, there are two actions which we must complete. First, in the Service Name and Transport Protocol Port Number Registry located at: http://www.iana.org/assignments/service-names-port-numbers/service-names-port-numbers.xml a new user port for both tcp and udp is requested. Question -> should 'The Subnetwork Encapsulation and Adaptation Layer' be the description for the user port 'seal'? Note: We have initiated a request and sent this to the designated expert for review according to RFC6335 as stated in section 8.1.1: "IANA MAY accept early assignment [RFC4020 ] requests (known as "early allocation" therein) from IETF working groups that reference a sufficiently stable Internet-Draft instead of a published Standards-Track RFC." Second, in the Assigned Internet Protocol Numbers registry located at: http://www.iana.org/assignments/protocol-numbers/protocol-numbers.xml a new protocol number is requested. Question -> what are the keyword and protocol name to be assigned to the new protocol number? We understand that these two actions are the only ones required upon approval of this document. Note: The actions requested in this document will not be completed until the document has been approved for publication as an RFC. This message is only to confirm what actions will be performed. |
2013-02-14
|
51 | Jean Mahoney | Request for Last Call review by GENART is assigned to Christer Holmberg |
2013-02-14
|
51 | Jean Mahoney | Request for Last Call review by GENART is assigned to Christer Holmberg |
2013-02-12
|
51 | Barry Leiba | [Ballot Position Update] New position, No Objection, has been recorded for Barry Leiba |
2013-02-08
|
51 | Jean Mahoney | Request for Last Call review by GENART is assigned to Christer Holmberg |
2013-02-08
|
51 | Jean Mahoney | Request for Last Call review by GENART is assigned to Christer Holmberg |
2013-02-07
|
51 | Tero Kivinen | Request for Last Call review by SECDIR is assigned to David Harrington |
2013-02-07
|
51 | Tero Kivinen | Request for Last Call review by SECDIR is assigned to David Harrington |
2013-02-04
|
51 | Amy Vezza | The following Last Call announcement was sent out: From: The IESG To: IETF-Announce Reply-To: ietf@ietf.org Subject: Last Call: (The Subnetwork Encapsulation and Adaptation Layer (SEAL)) … The following Last Call announcement was sent out: From: The IESG To: IETF-Announce Reply-To: ietf@ietf.org Subject: Last Call: (The Subnetwork Encapsulation and Adaptation Layer (SEAL)) to Informational RFC The IESG has received a request from an individual submitter to consider the following document: - 'The Subnetwork Encapsulation and Adaptation Layer (SEAL)' as Informational RFC The IESG plans to make a decision in the next few weeks, and solicits final comments on this action. Please send substantive comments to the ietf@ietf.org mailing lists by 2013-02-20. Exceptionally, comments may be sent to iesg@ietf.org instead. In either case, please retain the beginning of the Subject line to allow automated sorting. Abstract For the purpose of this document, a subnetwork is defined as a virtual topology configured over a connected IP network routing region and bounded by encapsulating border nodes. These virtual topologies are manifested by tunnels that may span multiple IP and/or sub-IP layer forwarding hops, where they may incur packet duplication, packet reordering, source address spoofing and traversal of links with diverse Maximum Transmission Units (MTUs). This document specifies a Subnetwork Encapsulation and Adaptation Layer (SEAL) that addresses these issues. The file can be obtained via http://datatracker.ietf.org/doc/draft-templin-intarea-seal/ IESG discussion can be tracked via http://datatracker.ietf.org/doc/draft-templin-intarea-seal/ballot/ No IPR declarations have been submitted directly on this I-D. |
2013-02-04
|
51 | Amy Vezza | State changed to In Last Call from Last Call Requested |
2013-02-04
|
51 | Amy Vezza | The following is my document write-up for draft-templin-intarea-seal, in my role as document shepherd. (1) What type of RFC is being requested (BCP, Proposed … The following is my document write-up for draft-templin-intarea-seal, in my role as document shepherd. (1) What type of RFC is being requested (BCP, Proposed Standard, Internet Standard, Informational, Experimental, or Historic)? Informational Why is this the proper type of RFC? This document updates the Experimental RFC 5320: The Subnetwork Encapsulation and Adaptation Layer (SEAL) The described mecchanism is more mature and no longer intended as experimental, but is not being proposed as standards-track. Is this type of RFC indicated in the title page header? Yes. (2) The IESG approval announcement includes a Document Announcement Write-Up. Please provide such a Document Announcement Write-Up. Recent examples can be found in the "Action" announcements for approvedes documents. The approval announcement contains the following sections: Technical Summary: SEAL is a tunnel mechanism that includes ingress encapsulation, egress decapsulation, and signalling between the ingress and egress. It overcomes the limitations of implementing tunnels using IP headers alone by introducing an adaptation layer with features to address fragmentation/reassembly, source address spoofing, and path MTU issues. Working Group Summary: Was the document considered in any WG, and if so, why was it not adopted as a work item there? The original SEAL RFC 5320 came out in Feb 2010. This update is AD Sponsored, but was not the product of a WG. SEAL has been taken to the INTAREA WG for consideration multiple times, including its previous experimental version, but there has been insufficient interest to accept this as a WG item. I have been tracking this work since its beginnings, and consider it to be a complete and thorough example of a correct way to do tunneling. It addresses many of the weaknesses of existing tunnel mechanisms, while focusing solely on only the features needed to support tunneling. Was there controversy about particular points that caused the WG to not adopt the document? There seems to be general appreciation for the work, but a hesitation to either adopt or recognize it as a preferred solution. I believe this is due to a lack of appreciation for the significance of its contribution. At various stages - both in the past version and this update - the WG interacted and provided constructive feedback and suggestions for improvement. To my knowledge, all such suggestions are included and/or addressed sufficiently. Document Quality: Are there existing implementations of the protocol? A pre-RFC5320 implementation is available here: http://isatap.com/seal There is no implementation of the currently proposed version that this document describes. Have a significant number of vendors indicated their plan to implement the specification? There is no current implementation, and no plans for vendor implementations has been presented or discussed. Are there any reviewers that merit special mention as having done a thorough review, e.g., one that resulted in important changes or a conclusion that the document had no substantive issues? I have provided substantial feedback on this document, notably on the relationship of SEAL reassembly IDs and IPv4 and IPv6 IDs, which have been addressed. This includes a very thorough review completed Oct. 1, 2012 of -49 updated with a "differences from experimental SEAL" discussion. I provided extensive feedback which was addressed in -50. Substantial input has been provided by others also listed in the Acknowledgements section, including Joel Halpern and Brian Carpenter. The differences between this version and the previous Experimental version of RFC 5320 are noted in detail in Section 1.3. If there was a MIB Doctor, Media Type or other expert review, what was its course (briefly)? Not applicable. In the case of a Media Type review, on what date was the request posted? Not applicable. Personnel: Who is the Document Shepherd? Joe Touch Who is the Responsible Area Director? Ralph Droms (3) Briefly describe the review of this document that was performed by the Document Shepherd. If this version of the document is not ready for publication, please explain why the document is being forwarded to the IESG. I have reviewed this document in its entirety. It is very well written, and is ready for publication. (4) Does the document Shepherd have any concerns about the depth or breadth of the reviews that have been performed? I am the only known reviewer to provide feedback on the document in its entirety. I'm not sure whether that is sufficient as an AD-sponsored document. I would prefer if at least one other complete review could be provided, but appreciate that if the rules to not require it, it's OK to proceed with this version. (5) Do portions of the document need review from a particular or from broader perspective, e.g., security, operational complexity, AAA, DNS, DHCP, XML, or internationalization? If so, describe the review that took place. There are no areas of this document that need such specialized review. (6) Describe any specific concerns or issues that the Document Shepherd has with this document that the Responsible Area Director and/or the IESG should be aware of? For example, perhaps he or she is uncomfortable with certain parts of the document, or has concerns whether there really is a need for it. In any event, if the WG has discussed those issues and has indicated that it still wishes to advance the document, detail those concerns here. I have no concerns regarding this document. (7) Has each author confirmed that any and all appropriate IPR disclosures required for full conformance with the provisions of BCP 78 and BCP 79 have already been filed. If not, explain why? Yes. (8) Has an IPR disclosure been filed that references this document? If so, summarize any WG discussion and conclusion regarding the IPR disclosures. Not to my knowledge. (9) How solid is the WG consensus behind this document? Does it represent the strong concurrence of a few individuals, with others being silent, or does the WG as a whole understand and agree with it? This document is being submitted indivudally because it was not adopted as a WG item, as noted above. The reasons, suggested above, do not represent objections of any WG members to this work. (10) Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarise the areas of conflict in separate email messages to the Responsible Area Director. (It should be in a separate email because this questionnaire is publicly available.) Not to my knowledge. (11) Identify any ID nits the Document Shepherd has found in this document. (See http://www.ietf.org/tools/idnits/ and the Internet-Drafts Checklist). Boilerplate checks are not enough; this check needs to be thorough. I have reviewed the id-nits output for -50. The following issues pass: - boilerplate - ID guidelines check There are some warnings that should to be fixed upon final publication: - the "Obsoletes" header line needs to be corrected - unused references should be cited or removed - RFC 1063 should be replaced with RFC 1191 - RFC 1146 should be replaced with RFC 6247 There are no errors, 16 warnings, and 2 comments. The complete output of this id-nits test is appended to this summary. (12) Describe how the document meets any required formal review criteria, such as the MIB Doctor, media type, and URI type reviews. None required. (13) Have all references within this document been identified as either normative or informative? Yes. (14) Are there normative references to documents that are not ready for advancement or are otherwise in an unclear state? If such normative references exist, what is the plan for their completion? No such normative references are in this document. (15) Are there downward normative references references (see RFC 3967)? If so, list these downward references to support the Area Director in the Last Call procedure. No such downward normative references are in this document. (16) Will publication of this document change the status of any existing RFCs? Yes; this document is intended to Obsolete RFC 5320. Are those RFCs listed on the title page header, listed in the abstract, and discussed in the introduction? Yes. If the RFCs are not listed in the Abstract and Introduction, explain why, and point to the part of the document where the relationship of this document to the other RFCs is discussed. If this information is not in the document, explain why the WG considers it unnecessary. RFC 5320 is listed in the introduction, header, abstract, and introduction, as expected. (17) Describe the Document Shepherd's review of the IANA considerations section, especially with regard to its consistency with the body of the document. Confirm that all protocol extensions that the document makes are associated with the appropriate reservations in IANA registries. Confirm that any referenced IANA registries have been clearly identified. Confirm that newly created IANA registries include a detailed specification of the initial contents for the registry, that allocations procedures for future registrations are defined, and a reasonable name for the new registry has been suggested (see RFC 5226). The IANA Considerations section is consistent with the document and appropriate. All requests are from existing registries. (18) List any new IANA registries that require Expert Review for future allocations. Provide any public guidance that the IESG would find useful in selecting the IANA Experts for these new registries. The document does not request the creation of any new IESG registries. (19) Describe reviews and automated checks performed by the Document Shepherd to validate sections of the document written in a formal language, such as XML code, BNF rules, MIB definitions, etc. No such reviews or automated checks are applicable. |
2013-02-04
|
51 | Amy Vezza | Note added 'Joe Touch (touch@isi.edu) is the document shepherd.' |
2013-02-02
|
51 | Ralph Droms | Placed on agenda for telechat - 2013-02-21 |
2013-02-02
|
51 | Ralph Droms | Last call was requested |
2013-02-02
|
51 | Ralph Droms | State changed to Last Call Requested from AD Evaluation |
2013-02-02
|
51 | Ralph Droms | Last call announcement was changed |
2013-02-02
|
51 | Ralph Droms | Last call announcement was generated |
2013-02-02
|
51 | Ralph Droms | Ballot writeup was changed |
2013-02-02
|
51 | Ralph Droms | Ballot approval text was generated |
2012-10-22
|
51 | Fred Templin | New version available: draft-templin-intarea-seal-51.txt |
2012-10-09
|
50 | Fred Templin | New version available: draft-templin-intarea-seal-50.txt |
2012-07-16
|
49 | Fred Templin | New version available: draft-templin-intarea-seal-49.txt |
2012-07-09
|
48 | Fred Templin | New version available: draft-templin-intarea-seal-48.txt |
2012-07-05
|
47 | Fred Templin | New version available: draft-templin-intarea-seal-47.txt |
2012-07-04
|
46 | Fred Templin | New version available: draft-templin-intarea-seal-46.txt |
2012-06-25
|
45 | Pearl Liang | IANA OK. IANA has reviewed draft-templin-intarea-seal and has the following comments: IANA understands that, upon approval of this document, there are two actions which IANA … IANA OK. IANA has reviewed draft-templin-intarea-seal and has the following comments: IANA understands that, upon approval of this document, there are two actions which IANA must complete. First, the authors request a port assignment, for TCP, UDP, DCCP, and SCTP, for SEAL. The authors should submit a template for early allocation and put the Internet Draft as a reference according to RFC6335 as stated in section 8.1.1: IANA MAY accept early assignment [RFC4020 ] requests (known as "early allocation" therein) from IETF working groups that reference a sufficiently stable Internet-Draft instead of a published Standards-Track RFC. Second, in the Assigned Internet Protocol Numbers subregistry located in the Protocol Numbers registry located at: http://www.iana.org/assignments/protocol-numbers/protocol-numbers.xml a new Protocol Number will be registered as follows: Decimal: [ tbd ] Keyword: SEAL Protocol: Subnetwork Encapsulation and Adaptation Layer Reference: [ RFC-to-be ] IANA understands that these are the only actions required upon approval of this document. Note: The actions requested in this document will not be completed until the document has been approved for publication as an RFC. This message is only to confirm what actions will be performed. |
2012-06-25
|
45 | Fred Templin | New version available: draft-templin-intarea-seal-45.txt |
2012-06-23
|
44 | Fred Templin | New version available: draft-templin-intarea-seal-44.txt |
2012-06-15
|
43 | Fred Templin | New version available: draft-templin-intarea-seal-43.txt |
2012-05-17
|
42 | Ralph Droms | Assigned to Internet Area |
2012-05-17
|
42 | Ralph Droms | Stream changed to IETF from ISE |
2012-05-17
|
42 | Ralph Droms | Ballot writeup was changed |
2012-05-17
|
42 | Ralph Droms | No longer assigned to any area |
2012-05-17
|
42 | Ralph Droms | Stream changed to ISE from IETF |
2012-05-17
|
42 | Ralph Droms | Intended Status changed to Informational from Proposed Standard |
2012-05-17
|
42 | Ralph Droms | Ballot has been issued |
2012-05-17
|
42 | Ralph Droms | Ballot approval text was generated |
2012-05-17
|
42 | Ralph Droms | [Ballot Position Update] New position, Yes, has been recorded for Ralph Droms |
2012-05-17
|
42 | Ralph Droms | Ballot writeup was changed |
2012-05-17
|
42 | Ralph Droms | Created "Approve" ballot |
2012-05-17
|
42 | Ralph Droms | Ballot writeup was changed |
2012-05-17
|
42 | Ralph Droms | Ballot writeup was changed |
2012-05-17
|
42 | Ralph Droms | Ballot writeup was generated |
2012-03-16
|
42 | Ralph Droms | State changed to AD Evaluation from Publication Requested |
2011-12-19
|
42 | (System) | New version available: draft-templin-intarea-seal-42.txt |
2011-12-08
|
42 | Cindy Morgan | State changed to Publication Requested from AD Evaluation. |
2011-11-30
|
41 | (System) | New version available: draft-templin-intarea-seal-41.txt |
2011-11-30
|
40 | (System) | New version available: draft-templin-intarea-seal-40.txt |
2011-11-18
|
39 | (System) | New version available: draft-templin-intarea-seal-39.txt |
2011-11-17
|
38 | (System) | New version available: draft-templin-intarea-seal-38.txt |
2011-11-14
|
37 | (System) | New version available: draft-templin-intarea-seal-37.txt |
2011-10-31
|
36 | (System) | New version available: draft-templin-intarea-seal-36.txt |
2011-10-28
|
35 | (System) | New version available: draft-templin-intarea-seal-35.txt |
2011-10-24
|
34 | (System) | New version available: draft-templin-intarea-seal-34.txt |
2011-10-19
|
33 | (System) | New version available: draft-templin-intarea-seal-33.txt |
2011-10-18
|
32 | (System) | New version available: draft-templin-intarea-seal-32.txt |
2011-09-19
|
31 | (System) | New version available: draft-templin-intarea-seal-31.txt |
2011-08-30
|
30 | (System) | New version available: draft-templin-intarea-seal-30.txt |
2011-03-14
|
29 | (System) | New version available: draft-templin-intarea-seal-29.txt |
2011-02-08
|
28 | (System) | New version available: draft-templin-intarea-seal-28.txt |
2011-01-24
|
27 | (System) | New version available: draft-templin-intarea-seal-27.txt |
2011-01-10
|
26 | (System) | New version available: draft-templin-intarea-seal-26.txt |
2010-12-14
|
25 | (System) | New version available: draft-templin-intarea-seal-25.txt |
2010-11-29
|
24 | (System) | New version available: draft-templin-intarea-seal-24.txt |
2010-10-21
|
23 | (System) | New version available: draft-templin-intarea-seal-23.txt |
2010-10-15
|
22 | (System) | New version available: draft-templin-intarea-seal-22.txt |
2010-10-15
|
21 | (System) | New version available: draft-templin-intarea-seal-21.txt |
2010-09-30
|
20 | (System) | New version available: draft-templin-intarea-seal-20.txt |
2010-09-30
|
19 | (System) | New version available: draft-templin-intarea-seal-19.txt |
2010-09-29
|
18 | (System) | New version available: draft-templin-intarea-seal-18.txt |
2010-09-02
|
17 | (System) | New version available: draft-templin-intarea-seal-17.txt |
2010-07-09
|
16 | (System) | New version available: draft-templin-intarea-seal-16.txt |
2010-06-07
|
15 | (System) | New version available: draft-templin-intarea-seal-15.txt |
2010-06-02
|
14 | (System) | New version available: draft-templin-intarea-seal-14.txt |
2010-03-05
|
13 | (System) | New version available: draft-templin-intarea-seal-13.txt |
2010-03-05
|
12 | (System) | New version available: draft-templin-intarea-seal-12.txt |
2010-02-22
|
11 | (System) | New version available: draft-templin-intarea-seal-11.txt |
2010-02-17
|
10 | (System) | New version available: draft-templin-intarea-seal-10.txt |
2010-02-12
|
09 | (System) | New version available: draft-templin-intarea-seal-09.txt |
2010-01-08
|
08 | (System) | New version available: draft-templin-intarea-seal-08.txt |
2009-10-07
|
07 | (System) | New version available: draft-templin-intarea-seal-07.txt |
2009-09-28
|
06 | (System) | New version available: draft-templin-intarea-seal-06.txt |
2009-07-15
|
42 | Ralph Droms | State Changes to AD Evaluation from Publication Requested by Ralph Droms |
2009-07-15
|
42 | Ralph Droms | Note field has been cleared by Ralph Droms |
2009-07-02
|
05 | (System) | New version available: draft-templin-intarea-seal-05.txt |
2009-06-30
|
42 | Cindy Morgan | Intended Status has been changed to Proposed Standard from None |
2009-06-30
|
42 | Cindy Morgan | Draft Added by Cindy Morgan in state Publication Requested |
2009-06-19
|
04 | (System) | New version available: draft-templin-intarea-seal-04.txt |
2009-06-19
|
03 | (System) | New version available: draft-templin-intarea-seal-03.txt |
2009-06-17
|
02 | (System) | New version available: draft-templin-intarea-seal-02.txt |
2009-06-17
|
01 | (System) | New version available: draft-templin-intarea-seal-01.txt |
2009-06-12
|
00 | (System) | New version available: draft-templin-intarea-seal-00.txt |