TCP Fast Open
draft-ietf-tcpm-fastopen-10
Revision differences
Document history
Date | Rev. | By | Action |
---|---|---|---|
2014-12-15
|
10 | (System) | RFC Editor state changed to AUTH48-DONE from AUTH48 |
2014-11-17
|
10 | (System) | RFC Editor state changed to AUTH48 from AUTH48-DONE |
2014-11-11
|
10 | (System) | RFC Editor state changed to AUTH48-DONE from AUTH48 |
2014-11-03
|
10 | (System) | RFC Editor state changed to AUTH48 from RFC-EDITOR |
2014-10-22
|
10 | (System) | RFC Editor state changed to RFC-EDITOR from AUTH |
2014-10-16
|
10 | (System) | RFC Editor state changed to AUTH from EDIT |
2014-10-15
|
10 | (System) | IANA Action state changed to RFC-Ed-Ack from Waiting on RFC Editor |
2014-10-14
|
10 | (System) | IANA Action state changed to Waiting on RFC Editor from Waiting on Authors |
2014-10-01
|
10 | Amy Vezza | IESG state changed to RFC Ed Queue from Approved-announcement sent |
2014-10-01
|
10 | (System) | RFC Editor state changed to EDIT |
2014-10-01
|
10 | (System) | Announcement was received by RFC Editor |
2014-09-30
|
10 | (System) | IANA Action state changed to Waiting on Authors from In Progress |
2014-09-30
|
10 | (System) | IANA Action state changed to In Progress |
2014-09-30
|
10 | Amy Vezza | IESG state changed to Approved-announcement sent from Approved-announcement to be sent |
2014-09-30
|
10 | Amy Vezza | IESG has approved the document |
2014-09-30
|
10 | Amy Vezza | Closed "Approve" ballot |
2014-09-30
|
10 | Amy Vezza | Ballot approval text was generated |
2014-09-30
|
10 | Amy Vezza | Ballot writeup was changed |
2014-09-30
|
10 | Martin Stiemerling | Changed consensus to Yes from Unknown |
2014-09-30
|
10 | Martin Stiemerling | Changed consensus to Unknown from Unknown |
2014-09-30
|
10 | Martin Stiemerling | Ballot writeup was changed |
2014-09-30
|
10 | Martin Stiemerling | all set, ready to go. |
2014-09-30
|
10 | Martin Stiemerling | IESG state changed to Approved-announcement to be sent from Approved-announcement to be sent::Point Raised - writeup needed |
2014-09-29
|
10 | Yuchung Cheng | IANA Review state changed to Version Changed - Review Needed from IANA OK - Actions Needed |
2014-09-29
|
10 | Yuchung Cheng | New version available: draft-ietf-tcpm-fastopen-10.txt |
2014-08-29
|
09 | Meral Shirazipour | Request for Telechat review by GENART Completed: Ready. Reviewer: Meral Shirazipour. |
2014-08-25
|
09 | Gunter Van de Velde | Closed request for Last Call review by OPSDIR with state 'No Response' |
2014-08-21
|
09 | Cindy Morgan | IESG state changed to Approved-announcement to be sent::Point Raised - writeup needed from IESG Evaluation |
2014-08-21
|
09 | Ted Lemon | [Ballot Position Update] New position, No Objection, has been recorded for Ted Lemon |
2014-08-20
|
09 | Alissa Cooper | [Ballot comment] Glad this has been documented. |
2014-08-20
|
09 | Alissa Cooper | [Ballot Position Update] New position, No Objection, has been recorded for Alissa Cooper |
2014-08-20
|
09 | Kathleen Moriarty | [Ballot Position Update] New position, No Objection, has been recorded for Kathleen Moriarty |
2014-08-20
|
09 | Richard Barnes | [Ballot comment] It may be worth noting for completeness that a server could implement a scheme where cookie values are entirely random, with state stored … [Ballot comment] It may be worth noting for completeness that a server could implement a scheme where cookie values are entirely random, with state stored on the server. And also worth noting the (many) reasons that this is a bad idea. In section 4.1.2, I would expand the second property to note that this implies that the cookie must be generated with a cryptographic operation using a secret key specific to the server, such as encryption, MAC, or signature. |
2014-08-20
|
09 | Richard Barnes | [Ballot Position Update] New position, No Objection, has been recorded for Richard Barnes |
2014-08-20
|
09 | Joel Jaeggli | [Ballot Position Update] New position, No Objection, has been recorded for Joel Jaeggli |
2014-08-20
|
09 | Adrian Farrel | [Ballot comment] Thanks for bringing this forward as Experimental. Thanks also for Section 7 which is really helpful. |
2014-08-20
|
09 | Adrian Farrel | [Ballot Position Update] New position, No Objection, has been recorded for Adrian Farrel |
2014-08-20
|
09 | Jari Arkko | [Ballot Position Update] New position, No Objection, has been recorded for Jari Arkko |
2014-08-18
|
09 | Spencer Dawkins | [Ballot comment] Please do consider Barry's questions - I'm not repeating them, but I had several of them myself. For Martin: this specification points out … [Ballot comment] Please do consider Barry's questions - I'm not repeating them, but I had several of them myself. For Martin: this specification points out that TFO can be used to speed up TLS (piggybacking on the SYN exchange). Is it obvious whether TCPINC could also use TFO? |
2014-08-18
|
09 | Spencer Dawkins | [Ballot Position Update] New position, No Objection, has been recorded for Spencer Dawkins |
2014-08-18
|
09 | Stephen Farrell | [Ballot comment] general: would this work with CGAs? I guess, only for a short while, but that's probably ok for consenting peers, right? Presumably not … [Ballot comment] general: would this work with CGAs? I guess, only for a short while, but that's probably ok for consenting peers, right? Presumably not worth a mention. possible new security consideration: if an application supports TFO and might include sensitive data in the SYN (think cookies) then this seems to provide a new and slightly more efficient way to steal that sensitive data. I don't think this is worth noting to be honest, but raise it just in case you do. I think the bad actor here has to write less code maybe compared to the situation without TFO. 6.3.4 - I wondered how TFO would affect page load times if all links are accessed via TLS. Any info on that? The author affiliations on page 1 don't quite match those at the end. The secdir review [1] noted some nits and was ack'd but I think the nits are maybe still there (one anyway). [1] https://www.ietf.org/mail-archive/web/secdir/current/msg04708.html |
2014-08-18
|
09 | Stephen Farrell | [Ballot Position Update] New position, No Objection, has been recorded for Stephen Farrell |
2014-08-18
|
09 | Brian Haberman | [Ballot comment] I agree with Barry that this a useful experimental document. I have a few things for the authors/WG to consider as a part … [Ballot comment] I agree with Barry that this a useful experimental document. I have a few things for the authors/WG to consider as a part of this experimentation. 1. How does this functionality work in the presence of an anycast IP address for the server? 2. Are there functional changes needed to work with load balancers? |
2014-08-18
|
09 | Brian Haberman | [Ballot Position Update] New position, No Objection, has been recorded for Brian Haberman |
2014-08-14
|
09 | Jean Mahoney | Request for Telechat review by GENART is assigned to Meral Shirazipour |
2014-08-14
|
09 | Jean Mahoney | Request for Telechat review by GENART is assigned to Meral Shirazipour |
2014-08-13
|
09 | Barry Leiba | [Ballot comment] I think this is a Truly Fine thing to experiment with, and I'm very eager to see more deployment of it. I have … [Ballot comment] I think this is a Truly Fine thing to experiment with, and I'm very eager to see more deployment of it. I have a number of comments about the document. None of these are blocking, but some of them are quite significant and I urge you to consider them and to chat with me about them if it will help. Thanks. To the document shepherd: thanks especially for the detailed answer to question 9 in the shepherd writeup. -- Section 4.1.1 -- You talk about two options (Fast Open Cookie and Fast Open Cookie Request), but they're really the same option, so that's a little confusing. To make it more confusing, the document at least once refers just to a "Fast Open option". I suggest that you consistently refer to this as the "Fast Open Option" throughout the document, and say that a Fast Open request is made using a Fast Open Option with a length of 2, and a Fast Open cookie is sent using a Fast Open Option with a length greater than 2. I think this will make things much more consistent, and clearer. -- Section 4.1.2 -- The server is in charge of cookie generation and authentication. The cookie SHOULD be a message authentication code tag with the following properties: Why "SHOULD"? What might be a reason for a server not to do this? -- Section 4.1.3 -- Please expand "MSS" on first use. The "RECOMMEND" in the second paragraph doesn't appear to be a protocol requirement, and should probaby be lower case, not a 2119 key word. In particular it's known an IPv4 receiver advertised MSS less than 536 bytes would result in transmission of an unexpected large segment. I can't parse that. Can you rephrase, please? In general, this section has quite a number of English problems that would benefit from a quick editing pass by a native speaker. -- Section 4.2.1 -- Is the double "SHOULD" in bullet 2 really what you want? It seems to me that what this means to say, 2119-wise, is that when the server responds with a SYN-ACK, the SYN-ACK SHOULD [be set up as specified]. The last two paragraphs seem out of place here. I suggest putting them into a new Section 4.2.1.1, clearly labelled as an alternative solution that could be explored if problems develop with this one. Or perhaps even put this into the "related work" section (currently Section 8, but see my comment below). -- Section 4.2.2 -- 5. Send the SYN-ACK packet. The packet MAY include a Fast Open Option. Doesn't that MAY conflict with the SHOULD that I complain about above, in Section 4.2.1 ? -- Section 6 -- I think the "i.e." here is not correct, and that you mean "e.g." (This is one reason I recommend that people avoid using these Latin abbreviations.) -- Section 6.3.1 -- Although not all GET requests are idem-potent Really? According to RFC 7231, Sections 4.2.2 and 4.2.1, GET is an idempotent method. RFC 7231, Section 4.2.2: Of the request methods defined by this specification, PUT, DELETE, and safe request methods are idempotent. RFC 7231, Section 4.2.1: Of the request methods defined by this specification, the GET, HEAD, OPTIONS, and TRACE methods are defined to be safe. And "idempotent" is one word, not hyphenated; please fix that here and in Section 6.3.3. -- Section 6.3.2 -- What does this section have to do with this spec? -- Section 7.1 -- Further study is required to evaluate the performance impact of these malicious drop behaviors. It may work against this protocol, but is there actually evidence that there's malicious intent here? If not, I would avoid describing it as "malicious". Dropping the word (if not the packets) seems like the right thing. Another interesting study is the (loss of) TFO performance benefit behind certain carrier-grade NAT. Why the parentheses? Shouldn't it just be "the loss of TFO performance benefit", without the parens? -- Section 7.2 -- The implementation can provide an experimental feature to allow zero length, or null, cookies as opposed to the minimum 4 bytes cookies. Thus the server may return a null cookie and the client will send data in SYN with it subsequently. Haven't you cut yourself off here by using a zero-length cookie to mean a cookie request? How would this work? -- Section 8 -- A very small point: I would make this an Appendix, rather than a mainline section. |
2014-08-13
|
09 | Barry Leiba | [Ballot Position Update] New position, Yes, has been recorded for Barry Leiba |
2014-07-25
|
09 | Meral Shirazipour | Request for Last Call review by GENART Completed: Ready with Nits. Reviewer: Meral Shirazipour. |
2014-07-25
|
09 | Martin Stiemerling | Placed on agenda for telechat - 2014-08-21 |
2014-07-25
|
09 | Martin Stiemerling | IESG state changed to IESG Evaluation from Waiting for Writeup |
2014-07-25
|
09 | Martin Stiemerling | Ballot has been issued |
2014-07-25
|
09 | Martin Stiemerling | [Ballot Position Update] New position, Yes, has been recorded for Martin Stiemerling |
2014-07-25
|
09 | Martin Stiemerling | Created "Approve" ballot |
2014-07-25
|
09 | Martin Stiemerling | Ballot writeup was changed |
2014-07-23
|
09 | (System) | IESG state changed to Waiting for Writeup from In Last Call |
2014-07-17
|
09 | (System) | IANA Review state changed to IANA OK - Actions Needed from IANA - Review Needed |
2014-07-17
|
09 | Amanda Baber | IESG/Authors/WG Chairs: IANA has reviewed draft-ietf-tcpm-fastopen-09. Authors should review the comments and/or questions below. Please report any inaccuracies and respond to any questions as soon … IESG/Authors/WG Chairs: IANA has reviewed draft-ietf-tcpm-fastopen-09. Authors should review the comments and/or questions below. Please report any inaccuracies and respond to any questions as soon as possible. IANA's reviewer has the following comments/questions: IANA understands that, upon approval of this document, there is a single action which IANA must complete. In the TCP Option Kind Numbers registry in Transmission Control Protocol (TCP) Parameters at http://www.iana.org/assignments/tcp-parameters/ a new option kind number is to be registered as follows: Kind: [ TBD-at-registration ] Length: variable Meaning: TCP Fast Open Cookie Reference: [ RFC-to-be ] IANA understands that this is the only action required to be completed upon approval of this document. Note: The actions requested in this document will not be completed until the document has been approved for publication as an RFC. This message is only to confirm what actions will be performed. |
2014-07-14
|
09 | Gunter Van de Velde | Request for Last Call review by OPSDIR is assigned to Peter Schoenmaker |
2014-07-14
|
09 | Gunter Van de Velde | Request for Last Call review by OPSDIR is assigned to Peter Schoenmaker |
2014-07-10
|
09 | Jean Mahoney | Request for Last Call review by GENART is assigned to Meral Shirazipour |
2014-07-10
|
09 | Jean Mahoney | Request for Last Call review by GENART is assigned to Meral Shirazipour |
2014-07-09
|
09 | Amy Vezza | IANA Review state changed to IANA - Review Needed |
2014-07-09
|
09 | Amy Vezza | The following Last Call announcement was sent out: From: The IESG To: IETF-Announce CC: Reply-To: ietf@ietf.org Sender: Subject: Last Call: (TCP Fast Open) to Experimental … The following Last Call announcement was sent out: From: The IESG To: IETF-Announce CC: Reply-To: ietf@ietf.org Sender: Subject: Last Call: (TCP Fast Open) to Experimental RFC The IESG has received a request from the TCP Maintenance and Minor Extensions WG (tcpm) to consider the following document: - 'TCP Fast Open' as Experimental RFC The IESG plans to make a decision in the next few weeks, and solicits final comments on this action. Please send substantive comments to the ietf@ietf.org mailing lists by 2014-07-23. Exceptionally, comments may be sent to iesg@ietf.org instead. In either case, please retain the beginning of the Subject line to allow automated sorting. Abstract This document describes an experimental TCP mechanism TCP Fast Open (TFO). TFO allows data to be carried in the SYN and SYN-ACK packets and consumed by the receiving end during the initial connection handshake, thus saving up to one full round trip time (RTT) compared to the standard TCP, which requires a three-way handshake (3WHS) to complete before data can be exchanged. However TFO deviates from the standard TCP semantics since the data in the SYN could be replayed to an application in some rare circumstances. Applications should not use TFO unless they can tolerate this issue detailed in the Applicability section. The file can be obtained via http://datatracker.ietf.org/doc/draft-ietf-tcpm-fastopen/ IESG discussion can be tracked via http://datatracker.ietf.org/doc/draft-ietf-tcpm-fastopen/ballot/ No IPR declarations have been submitted directly on this I-D. |
2014-07-09
|
09 | Amy Vezza | IESG state changed to In Last Call from Last Call Requested |
2014-07-09
|
09 | Martin Stiemerling | Last call was requested |
2014-07-09
|
09 | Martin Stiemerling | Ballot approval text was generated |
2014-07-09
|
09 | Martin Stiemerling | Ballot writeup was generated |
2014-07-09
|
09 | Martin Stiemerling | IESG state changed to Last Call Requested from AD Evaluation::AD Followup |
2014-07-09
|
09 | Martin Stiemerling | Last call announcement was generated |
2014-07-01
|
09 | (System) | Sub state has been changed to AD Followup from Revised ID Needed |
2014-07-01
|
09 | Yuchung Cheng | New version available: draft-ietf-tcpm-fastopen-09.txt |
2014-06-18
|
08 | Michael Scharf | (1) What type of RFC is being requested (BCP, Proposed Standard, Internet Standard, Informational, Experimental, or Historic)? Why is this the proper type of RFC? … (1) What type of RFC is being requested (BCP, Proposed Standard, Internet Standard, Informational, Experimental, or Historic)? Why is this the proper type of RFC? Is this type of RFC indicated in the title page header? The intended status is Experimental, as indicated on the title page header. It is consensus of the TCPM working group that this document should be published as experimental RFC, given that it describes a TCP extension that deviates from the standard TCP semantics in certain corner cases. Because of the same reason, this extension is not recommended for being used by default. The document explicitly lists certain areas of further experimentation in Section 7. (2) The IESG approval announcement includes a Document Announcement Write-Up. Please provide such a Document Announcement Write-Up. Recent examples can be found in the "Action" announcements for approved documents. The approval announcement contains the following sections: Technical Summary: This document describes an experimental TCP mechanism TCP Fast Open (TFO). TFO allows data to be carried in the SYN and SYN-ACK packets and consumed by the receiving end during the initial connection handshake, thus saving up to one full round trip time (RTT) compared to the standard TCP, which requires a three-way handshake (3WHS) to complete before data can be exchanged. However TFO deviates from the standard TCP semantics since the data in the SYN could be replayed to an application in some rare circumstances. Applications should not use TFO unless they can tolerate this issue detailed in the Applicability section. Working Group Summary: This document was extensively discussed and reviewed by the TCPM working group and there is strong support to publish the document. While being an experimental document, the TCPM working group decided to ask IESG for approving an IANA allocation of a new TCP option codepoint. Document Quality: The protocol extension described in this document is implemented and deployed in the Linux TCP/IP stack, and it is supported by the Chrome Web browser and all Google servers. Experimental results have been discussed in the TCPM working group. An early SECDIR review concluded that the document had no substantive issues. Personnel: The Document Shepherd is Michael Scharf . The Responsible Area Director is Martin Stiemerling . (3) Briefly describe the review of this document that was performed by the Document Shepherd. If this version of the document is not ready for publication, please explain why the document is being forwarded to the IESG. The Document Shepherd read the document and he reviewed all discussions during WGLC and follow-up discussions after WGLC. The document is considered ready for publication. (4) Does the document Shepherd have any concerns about the depth or breadth of the reviews that have been performed? No. This document was extensively reviewed by the TCPM working group. The protocol extension described in this document is implemented and deployed in the Linux TCP/IP stack, and it is supported by the Chrome Web browser and all Google servers. (5) Do portions of the document need review from a particular or from broader perspective, e.g., security, operational complexity, AAA, DNS, DHCP, XML, or internationalization? If so, describe the review that took place. Given the security implications of this TCP extension, the Document Shepherd decided to ask for an early SECDIR review. The review was performed by Shawn M. Emery with the conclusion that "the various risks associated with this protocol are outlined in the draft and provides sufficient techniques for mitigating against such attacks". The review only identified two editorial nits. (6) Describe any specific concerns or issues that the Document Shepherd has with this document that the Responsible Area Director and/or the IESG should be aware of? For example, perhaps he or she is uncomfortable with certain parts of the document, or has concerns whether there really is a need for it. In any event, if the WG has discussed those issues and has indicated that it still wishes to advance the document, detail those concerns here. There are no such issues. (7) Has each author confirmed that any and all appropriate IPR disclosures required for full conformance with the provisions of BCP 78 and BCP 79 have already been filed. If not, explain why? All authors have confirmed that the appropriate IPR disclusures have been filed. (8) Has an IPR disclosure been filed that references this document? If so, summarize any WG discussion and conclusion regarding the IPR disclosures. There are no IPR disclosures. (9) How solid is the WG consensus behind this document? Does it represent the strong concurrence of a few individuals, with others being silent, or does the WG as a whole understand and agree with it? This document has been extensively discussed in the TCPM working group, both on the mailing list and in several face-to-face meetings. It has been reviewed in detail by several contributors. It can be assumed that TCPM working group as a whole understands the mechanism. There have been several discussions on the implications on TCP congestion control, in particular if this document is being used in combination with RFC 6928 ("IW10"), since this document allows a server to send an initial window of data before completing the three-way TCP handshake. As an outcome of these discussion, the document mandates in Section 4.2.2 "the server MUST follow [RFC5681] (based on [RFC3390]) to set the initial congestion window for sending more data packets" and lists this topic as an areas for further experimentation in Section 7.3. These statements are considered sufficient by the vast majority of the TCPM WG participants. Two issues have been raised during WGLC: * Regarding allocation of a dedicated TCP option code point for a non-standards-track protocol, one contributor disagreed. However, there is clear and strong consensus in the TCPM working group that in this specific case it seems worthwile to allocate a TCP option number (see below). * The have been concerns concern regarding the rigorousness of the protocol specification, in particular if a further specification of the client caching behavior is needed. Yet, the consensus in the WG is that these heuristics are implementation details that do not affect interoperability. In summary, there is strong consensus in TCPM to publish the document. (10) Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarise the areas of conflict in separate email messages to the Responsible Area Director. (It should be in a separate email because this questionnaire is publicly available.) There is no known extreme discontent. (11) Identify any ID nits the Document Shepherd has found in this document. (See http://www.ietf.org/tools/idnits/ and the Internet-Drafts Checklist). Boilerplate checks are not enough; this check needs to be thorough. The document passes IDnits with one editorial error ("There is 1 instance of lines with control characters in the document"). (12) Describe how the document meets any required formal review criteria, such as the MIB Doctor, media type, and URI type reviews. Such review is not required. (13) Have all references within this document been identified as either normative or informative? Yes (14) Are there normative references to documents that are not ready for advancement or are otherwise in an unclear state? If such normative references exist, what is the plan for their completion? There are no such normative references. (15) Are there downward normative references references (see RFC 3967)? If so, list these downward references to support the Area Director in the Last Call procedure. Not applicable (16) Will publication of this document change the status of any existing RFCs? Are those RFCs listed on the title page header, listed in the abstract, and discussed in the introduction? If the RFCs are not listed in the Abstract and Introduction, explain why, and point to the part of the document where the relationship of this document to the other RFCs is discussed. If this information is not in the document, explain why the WG considers it unnecessary. The document does not change the status of any RFC. (17) Describe the Document Shepherd's review of the IANA considerations section, especially with regard to its consistency with the body of the document. Confirm that all protocol extensions that the document makes are associated with the appropriate reservations in IANA registries. Confirm that any referenced IANA registries have been clearly identified. Confirm that newly created IANA registries include a detailed specification of the initial contents for the registry, that allocations procedures for future registrations are defined, and a reasonable name for the new registry has been suggested (see RFC 5226). The TCPM working group decided with strong consensus to ask for IANA allocation of a TCP option number for this experimental document. Reasoning: The protocol has always followed the guidelines of RFC 6994 and it currently uses an experimental TCP option number in combination with a registered experimental identifier (0xF989). This consumes two bytes of very scarce 40B option space in TCP SYN segments, which could thus prevent other, future TCP extensions. Right now, there is no significant shortage of IANA-assigned TCP option codepoints for users following the IETF process: Out of 256 codepoints, IANA has only 14 codepoints assigned to an non-obsoleted RFC, 6 other registrations (legacy), 9 obsoleted codepoints, and of the order of 10-15 known unauthorized uses. Given the benefits and the deployment of this protocol on the one hand side, and the large number of unallocated and available TCP option codepoints on the other hand, use of a dedicated option codepoint is considered to be the right trade-off. The TCPM working group therefore asks the IESG for approving a TCP option codepoint allocation for this experimental document. (18) List any new IANA registries that require Expert Review for future allocations. Provide any public guidance that the IESG would find useful in selecting the IANA Experts for these new registries. Not applicable (19) Describe reviews and automated checks performed by the Document Shepherd to validate sections of the document written in a formal language, such as XML code, BNF rules, MIB definitions, etc. Not applicable |
2014-06-18
|
08 | Michael Scharf | (1) What type of RFC is being requested (BCP, Proposed Standard, Internet Standard, Informational, Experimental, or Historic)? Why is this the proper type of RFC? … (1) What type of RFC is being requested (BCP, Proposed Standard, Internet Standard, Informational, Experimental, or Historic)? Why is this the proper type of RFC? Is this type of RFC indicated in the title page header? The intended status is Experimental, as indicated on the title page header. It is consensus of the TCPM working group that this document should be published as experimental RFC, given that it describes a TCP extension that deviates from the standard TCP semantics in certain corner cases. Because of the same reason, this extension is not recommended for being used by default. The document explicitly lists certain areas of further experimentation in Section 7. (2) The IESG approval announcement includes a Document Announcement Write-Up. Please provide such a Document Announcement Write-Up. Recent examples can be found in the "Action" announcements for approved documents. The approval announcement contains the following sections: Technical Summary: This document describes an experimental TCP mechanism TCP Fast Open (TFO). TFO allows data to be carried in the SYN and SYN-ACK packets and consumed by the receiving end during the initial connection handshake, thus saving up to one full round trip time (RTT) compared to the standard TCP, which requires a three-way handshake (3WHS) to complete before data can be exchanged. However TFO deviates from the standard TCP semantics since the data in the SYN could be replayed to an application in some rare circumstances. Applications should not use TFO unless they can tolerate this issue detailed in the Applicability section. Working Group Summary: This document was extensively discussed and reviewed by the TCPM working group and there is strong support to publish the document. While being an experimental document, the TCPM working group decided to ask IESG for approving an IANA allocation of a new TCP option codepoint. Document Quality: This protocol extension is implemented and deployed in the Linux TCP/IP stack, and experimental results have been discussed in the TCPM working group. An early SECDIR concluded that the document had no substantive issues. Personnel: The Document Shepherd is Michael Scharf . The Responsible Area Director is Martin Stiemerling . (3) Briefly describe the review of this document that was performed by the Document Shepherd. If this version of the document is not ready for publication, please explain why the document is being forwarded to the IESG. The Document Shepherd read the document and he reviewed all discussions during WGLC and follow-up discussions after WGLC. The document is considered ready for publication. (4) Does the document Shepherd have any concerns about the depth or breadth of the reviews that have been performed? No. This document was extensively reviewed by the TCPM working group. The protocol extension described in this document is implemented and deployed in the Linux TCP/IP stack, and it is supported by the Chrome Web browser and all Google servers. (5) Do portions of the document need review from a particular or from broader perspective, e.g., security, operational complexity, AAA, DNS, DHCP, XML, or internationalization? If so, describe the review that took place. Given the security implications of this TCP extension, the Document Shepherd decided to ask for an early SECDIR review. The review was performed by Shawn M. Emery with the conclusion that "the various risks associated with this protocol are outlined in the draft and provides sufficient techniques for mitigating against such attacks". The review only identified two editorial nits. (6) Describe any specific concerns or issues that the Document Shepherd has with this document that the Responsible Area Director and/or the IESG should be aware of? For example, perhaps he or she is uncomfortable with certain parts of the document, or has concerns whether there really is a need for it. In any event, if the WG has discussed those issues and has indicated that it still wishes to advance the document, detail those concerns here. There are no such issues. (7) Has each author confirmed that any and all appropriate IPR disclosures required for full conformance with the provisions of BCP 78 and BCP 79 have already been filed. If not, explain why? All authors have confirmed that the appropriate IPR disclusures have been filed. (8) Has an IPR disclosure been filed that references this document? If so, summarize any WG discussion and conclusion regarding the IPR disclosures. There are no IPR disclosures. (9) How solid is the WG consensus behind this document? Does it represent the strong concurrence of a few individuals, with others being silent, or does the WG as a whole understand and agree with it? This document has been extensively discussed in the TCPM working group, both on the mailing list and in several face-to-face meetings. It has been reviewed in detail by several contributors. It can be assumed that TCPM working group as a whole understands the mechanism. There have been several discussions on the implications on TCP congestion control, in particular if this document is being used in combination with RFC 6928 ("IW10"), since this document allows a server to send an initial window of data before completing the three-way TCP handshake. As an outcome of these discussion, the document mandates in Section 4.2.2 "the server MUST follow [RFC5681] (based on [RFC3390]) to set the initial congestion window for sending more data packets" and lists this topic as an areas for further experimentation in Section 7.3. These statements are considered sufficient by the vast majority of the TCPM WG participants. Two issues have been raised during WGLC: * Regarding allocation of a dedicated TCP option code point for a non-standards-track protocol, one contributor disagreed. However, there is clear and strong consensus in the TCPM working group that in this specific case it seems worthwile to allocate a TCP option number (see below). * The have been concerns concern regarding the rigorousness of the protocol specification, in particular if a further specification of the client caching behavior is needed. Yet, the consensus in the WG is that these heuristics are implementation details that do not affect interoperability. In summary, there is strong consensus in TCPM to publish the document. (10) Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarise the areas of conflict in separate email messages to the Responsible Area Director. (It should be in a separate email because this questionnaire is publicly available.) There is no known extreme discontent. (11) Identify any ID nits the Document Shepherd has found in this document. (See http://www.ietf.org/tools/idnits/ and the Internet-Drafts Checklist). Boilerplate checks are not enough; this check needs to be thorough. The document passes IDnits with one editorial error ("There is 1 instance of lines with control characters in the document"). (12) Describe how the document meets any required formal review criteria, such as the MIB Doctor, media type, and URI type reviews. Such review is not required. (13) Have all references within this document been identified as either normative or informative? Yes (14) Are there normative references to documents that are not ready for advancement or are otherwise in an unclear state? If such normative references exist, what is the plan for their completion? There are no such normative references. (15) Are there downward normative references references (see RFC 3967)? If so, list these downward references to support the Area Director in the Last Call procedure. Not applicable (16) Will publication of this document change the status of any existing RFCs? Are those RFCs listed on the title page header, listed in the abstract, and discussed in the introduction? If the RFCs are not listed in the Abstract and Introduction, explain why, and point to the part of the document where the relationship of this document to the other RFCs is discussed. If this information is not in the document, explain why the WG considers it unnecessary. The document does not change the status of any RFC. (17) Describe the Document Shepherd's review of the IANA considerations section, especially with regard to its consistency with the body of the document. Confirm that all protocol extensions that the document makes are associated with the appropriate reservations in IANA registries. Confirm that any referenced IANA registries have been clearly identified. Confirm that newly created IANA registries include a detailed specification of the initial contents for the registry, that allocations procedures for future registrations are defined, and a reasonable name for the new registry has been suggested (see RFC 5226). The TCPM working group decided with strong consensus to ask for IANA allocation of a TCP option number for this experimental document. Reasoning: The protocol has always followed the guidelines of RFC 6994 and it currently uses an experimental TCP option number in combination with a registered experimental identifier (0xF989). This consumes two bytes of very scarce 40B option space in TCP SYN segments, which could thus prevent other, future TCP extensions. Right now, there is no significant shortage of IANA-assigned TCP option codepoints for users following the IETF process: Out of 256 codepoints, IANA has only 14 codepoints assigned to an non-obsoleted RFC, 6 other registrations (legacy), 9 obsoleted codepoints, and of the order of 10-15 known unauthorized uses. Given the benefits and the deployment of this protocol on the one hand side, and the large number of unallocated and available TCP option codepoints on the other hand, use of a dedicated option codepoint is considered to be the right trade-off. The TCPM working group therefore asks the IESG for approving a TCP option codepoint allocation for this experimental document. (18) List any new IANA registries that require Expert Review for future allocations. Provide any public guidance that the IESG would find useful in selecting the IANA Experts for these new registries. Not applicable (19) Describe reviews and automated checks performed by the Document Shepherd to validate sections of the document written in a formal language, such as XML code, BNF rules, MIB definitions, etc. Not applicable |
2014-06-16
|
08 | Martin Stiemerling | The shepherd write-up is silent about any existing implementation of this. I know about Google's implementation and it would be really good to mention this, … The shepherd write-up is silent about any existing implementation of this. I know about Google's implementation and it would be really good to mention this, and potentially also in which Operating Systems this has been implemented and deployed. The review: In general, I do not see any issues with the document, but please address the issues below and submit an updated version of the draft. Blocking issues: * Instructions for IANA: The current instructions for IANA are not precis enough to let IANA know what the intention is. Please update these two parts of the document: - in Section 4.1.1. "TCP Options": OLD-1 Kind 1 byte: constant TBD (assigned by IANA) NEW-1 Kind 1 byte: constant-TBD (to be assigned by IANA) OLD-2 Kind 1 byte: same as the Fast Open Cookie option NEW-2 Kind 1 byte: constant-TBD (same value as the Fast Open Cookie option above) - in Section 9. "IANA Considerations" OLD The Fast Open Cookie Option and Fast Open Cookie Request Option define no new namespace. The options require IANA to allocate one value from the TCP option Kind namespace. NEW IANA is requested to allocate one value from the TCP Option Kind Numbers: The constant-TBD in Section Section 4.1.1 has to be replaced with the newly assigned value. The length of the new TCP option Kind is variable and the Meaning should be set to "TCP Fast Open Cookie". * Section 4.2.2, page 12: "1. Update the cookie cache if the SYN-ACK has a Fast Open Cookie" Update with what? I guess the received cookie out of the Fast Open Cookie. This sounds pendatic, but clear language helps to avoid misunderstandings. Editorials: - Section 1, 2nd paragraph: Please add a reference to the Chome browser, just for completeness. - Section 1.1, 1st paragrahp: Please make "TFO refers to TCP Fast..." an new paragraph just to separate it from the RFC 2119 language. - In multiple places: You always talk about encryption of IP addresses for the cookies, but I believe you are talking about hashing them. However, I am not going to die about this, as the security reviewer apparently didn't yell at you about this. - Section 4.1.2 and other places, about the server generating a new cookie and how does the client find this out. To my understanding, the client is always using the latest cookie from the SYN-ACK sent by the server and stores this. However, this is not explicitly mentioned in the draft. Please add this to make this clear or let me know if I got this wrong. - Section 4.1.2, at the end of page 8: Please add a reference to AES_128, just for completeness. - Section 4.1.3, first paragraph: remember your non-native folks (including but not limited to me ;) and make sentences easier to read :) OLD For a multi-homed client, the cookies are both client and server IP dependent. NEW For a multi-homed client, the cookies are dependent on the client IP address and server IP address. - Section 4.1.3, first paragraph: Please separate this sentences from the first paragraph and merge it with the 2nd paragraph: "Beside the cookie we RECOMMEND that the client caches the MSS to the server to enhance performance." - Section 4.2: "The server keeps two variables per listening port:" I am not sure that this sentences is correct. An implementation can maintain such variables on a per socket basis (port+IP) or per port (independent of the IP address). How about adding "or listening socket (IP address & port). - Section 4.2.1, page 11, 1st paragraph: OLD Next Section describes NEW The next Section describes - Section 6.1, 2nd paragraph: The cited measurement supports your argument that duplicated SYNs are not a big deal, but there is a number of networks where this might be big deal, e.g., not so well dimesioned networks in developing countries. I woud add something along these lines "Further investigation is needed to judge about the probability of receiving duplicated SYN or SYN-ACK with data in non-Tier 1 networks." |
2014-06-16
|
08 | Martin Stiemerling | IESG state changed to AD Evaluation::Revised I-D Needed from AD Evaluation |
2014-04-30
|
08 | Martin Stiemerling | IESG state changed to AD Evaluation from Publication Requested |
2014-04-29
|
08 | Michael Scharf | (1) What type of RFC is being requested (BCP, Proposed Standard, Internet Standard, Informational, Experimental, or Historic)? Why is this the proper type of RFC? … (1) What type of RFC is being requested (BCP, Proposed Standard, Internet Standard, Informational, Experimental, or Historic)? Why is this the proper type of RFC? Is this type of RFC indicated in the title page header? The intended status is Experimental, as indicated on the title page header. It is consensus of the TCPM working group that this document should be published as experimental RFC, given that it describes a TCP extension that deviates from the standard TCP semantics in certain corner cases. Because of the same reason, this extension is not recommended for being used by default. The document explicitly lists certain areas of further experimentation in Section 7. (2) The IESG approval announcement includes a Document Announcement Write-Up. Please provide such a Document Announcement Write-Up. Recent examples can be found in the "Action" announcements for approved documents. The approval announcement contains the following sections: Technical Summary: This document describes an experimental TCP mechanism TCP Fast Open (TFO). TFO allows data to be carried in the SYN and SYN-ACK packets and consumed by the receiving end during the initial connection handshake, thus saving up to one full round trip time (RTT) compared to the standard TCP, which requires a three-way handshake (3WHS) to complete before data can be exchanged. However TFO deviates from the standard TCP semantics since the data in the SYN could be replayed to an application in some rare circumstances. Applications should not use TFO unless they can tolerate this issue detailed in the Applicability section. Working Group Summary: This document was extensively discussed and reviewed by the TCPM working group and there is strong support to publish the document. While being an experimental document, the TCPM working group decided to ask IESG for approving an IANA allocation of a new TCP option codepoint. Document Quality: This protocol extension is implemented and deployed in the Linux TCP/IP stack, and experimental results have been discussed in the TCPM working group. An early SECDIR concluded that the document had no substantive issues. Personnel: The Document Shepherd is Michael Scharf . The Responsible Area Director is Martin Stiemerling . (3) Briefly describe the review of this document that was performed by the Document Shepherd. If this version of the document is not ready for publication, please explain why the document is being forwarded to the IESG. The Document Shepherd read the document and he reviewed all discussions during WGLC and follow-up discussions after WGLC. The document is considered ready for publication. (4) Does the document Shepherd have any concerns about the depth or breadth of the reviews that have been performed? No. This document was extensively reviewed by the TCPM working group. (5) Do portions of the document need review from a particular or from broader perspective, e.g., security, operational complexity, AAA, DNS, DHCP, XML, or internationalization? If so, describe the review that took place. Given the security implications of this TCP extension, the Document Shepherd decided to ask for an early SECDIR review. The review was performed by Shawn M. Emery with the conclusion that "the various risks associated with this protocol are outlined in the draft and provides sufficient techniques for mitigating against such attacks". The review only identified two editorial nits. (6) Describe any specific concerns or issues that the Document Shepherd has with this document that the Responsible Area Director and/or the IESG should be aware of? For example, perhaps he or she is uncomfortable with certain parts of the document, or has concerns whether there really is a need for it. In any event, if the WG has discussed those issues and has indicated that it still wishes to advance the document, detail those concerns here. There are no such issues. (7) Has each author confirmed that any and all appropriate IPR disclosures required for full conformance with the provisions of BCP 78 and BCP 79 have already been filed. If not, explain why? All authors have confirmed that the appropriate IPR disclusures have been filed. (8) Has an IPR disclosure been filed that references this document? If so, summarize any WG discussion and conclusion regarding the IPR disclosures. There are no IPR disclosures. (9) How solid is the WG consensus behind this document? Does it represent the strong concurrence of a few individuals, with others being silent, or does the WG as a whole understand and agree with it? This document has been extensively discussed in the TCPM working group, both on the mailing list and in several face-to-face meetings. It has been reviewed in detail by several contributors. It can be assumed that TCPM working group as a whole understands the mechanism. There have been several discussions on the implications on TCP congestion control, in particular if this document is being used in combination with RFC 6928 ("IW10"), since this document allows a server to send an initial window of data before completing the three-way TCP handshake. As an outcome of these discussion, the document mandates in Section 4.2.2 "the server MUST follow [RFC5681] (based on [RFC3390]) to set the initial congestion window for sending more data packets" and lists this topic as an areas for further experimentation in Section 7.3. These statements are considered sufficient by the vast majority of the TCPM WG participants. Two issues have been raised during WGLC: * Regarding allocation of a dedicated TCP option code point for a non-standards-track protocol, one contributor disagreed. However, there is clear and strong consensus in the TCPM working group that in this specific case it seems worthwile to allocate a TCP option number (see below). * The have been concerns concern regarding the rigorousness of the protocol specification, in particular if a further specification of the client caching behavior is needed. Yet, the consensus in the WG is that these heuristics are implementation details that do not affect interoperability. In summary, there is strong consensus in TCPM to publish the document. (10) Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarise the areas of conflict in separate email messages to the Responsible Area Director. (It should be in a separate email because this questionnaire is publicly available.) There is no known extreme discontent. (11) Identify any ID nits the Document Shepherd has found in this document. (See http://www.ietf.org/tools/idnits/ and the Internet-Drafts Checklist). Boilerplate checks are not enough; this check needs to be thorough. The document passes IDnits with one editorial error ("There is 1 instance of lines with control characters in the document"). (12) Describe how the document meets any required formal review criteria, such as the MIB Doctor, media type, and URI type reviews. Such review is not required. (13) Have all references within this document been identified as either normative or informative? Yes (14) Are there normative references to documents that are not ready for advancement or are otherwise in an unclear state? If such normative references exist, what is the plan for their completion? There are no such normative references. (15) Are there downward normative references references (see RFC 3967)? If so, list these downward references to support the Area Director in the Last Call procedure. Not applicable (16) Will publication of this document change the status of any existing RFCs? Are those RFCs listed on the title page header, listed in the abstract, and discussed in the introduction? If the RFCs are not listed in the Abstract and Introduction, explain why, and point to the part of the document where the relationship of this document to the other RFCs is discussed. If this information is not in the document, explain why the WG considers it unnecessary. The document does not change the status of any RFC. (17) Describe the Document Shepherd's review of the IANA considerations section, especially with regard to its consistency with the body of the document. Confirm that all protocol extensions that the document makes are associated with the appropriate reservations in IANA registries. Confirm that any referenced IANA registries have been clearly identified. Confirm that newly created IANA registries include a detailed specification of the initial contents for the registry, that allocations procedures for future registrations are defined, and a reasonable name for the new registry has been suggested (see RFC 5226). The TCPM working group decided with strong consensus to ask for IANA allocation of a TCP option number for this experimental document. Reasoning: The protocol has always followed the guidelines of RFC 6994 and it currently uses an experimental TCP option number in combination with a registered experimental identifier (0xF989). This consumes two bytes of very scarce 40B option space in TCP SYN segments, which could thus prevent other, future TCP extensions. Right now, there is no significant shortage of IANA-assigned TCP option codepoints for users following the IETF process: Out of 256 codepoints, IANA has only 14 codepoints assigned to an non-obsoleted RFC, 6 other registrations (legacy), 9 obsoleted codepoints, and of the order of 10-15 known unauthorized uses. Given the benefits and the deployment of this protocol on the one hand side, and the large number of unallocated and available TCP option codepoints on the other hand, use of a dedicated option codepoint is considered to be the right trade-off. The TCPM working group therefore asks the IESG for approving a TCP option codepoint allocation for this experimental document. (18) List any new IANA registries that require Expert Review for future allocations. Provide any public guidance that the IESG would find useful in selecting the IANA Experts for these new registries. Not applicable (19) Describe reviews and automated checks performed by the Document Shepherd to validate sections of the document written in a formal language, such as XML code, BNF rules, MIB definitions, etc. Not applicable |
2014-04-29
|
08 | Michael Scharf | IETF WG state changed to Submitted to IESG for Publication from WG Consensus: Waiting for Write-Up |
2014-04-29
|
08 | Michael Scharf | IESG state changed to Publication Requested from AD is watching |
2014-04-29
|
08 | Michael Scharf | (1) What type of RFC is being requested (BCP, Proposed Standard, Internet Standard, Informational, Experimental, or Historic)? Why is this the proper type of RFC? … (1) What type of RFC is being requested (BCP, Proposed Standard, Internet Standard, Informational, Experimental, or Historic)? Why is this the proper type of RFC? Is this type of RFC indicated in the title page header? The intended status is Experimental, as indicated on the title page header. It is consensus of the TCPM working group that this document should be published as experimental RFC, given that it describes a TCP extension that deviates from the standard TCP semantics in certain corner cases. Because of the same reason, this extension is not recommended for being used by default. The document explicitly lists certain areas of further experimentation in Section 7. (2) The IESG approval announcement includes a Document Announcement Write-Up. Please provide such a Document Announcement Write-Up. Recent examples can be found in the "Action" announcements for approved documents. The approval announcement contains the following sections: Technical Summary: This document describes an experimental TCP mechanism TCP Fast Open (TFO). TFO allows data to be carried in the SYN and SYN-ACK packets and consumed by the receiving end during the initial connection handshake, thus saving up to one full round trip time (RTT) compared to the standard TCP, which requires a three-way handshake (3WHS) to complete before data can be exchanged. However TFO deviates from the standard TCP semantics since the data in the SYN could be replayed to an application in some rare circumstances. Applications should not use TFO unless they can tolerate this issue detailed in the Applicability section. Working Group Summary: This document was extensively discussed and reviewed by the TCPM working group and there is strong support to publish the document. While being an experimental document, the TCPM working group decided to ask IESG for approving an IANA allocation of a new TCP option codepoint. Document Quality: This protocol extension is implemented and deployed in the Linux TCP/IP stack, and experimental results have been discussed in the TCPM working group. An early SECDIR concluded that the document had no substantive issues. Personnel: The Document Shepherd is Michael Scharf . The Responsible Area Director is Martin Stiemerling . (3) Briefly describe the review of this document that was performed by the Document Shepherd. If this version of the document is not ready for publication, please explain why the document is being forwarded to the IESG. The Document Shepherd read the document and he reviewed all discussions during WGLC and follow-up discussions after WGLC. The document is considered ready for publication. (4) Does the document Shepherd have any concerns about the depth or breadth of the reviews that have been performed? No. This document was extensively reviewed by the TCPM working group. (5) Do portions of the document need review from a particular or from broader perspective, e.g., security, operational complexity, AAA, DNS, DHCP, XML, or internationalization? If so, describe the review that took place. Given the security implications of this TCP extension, the Document Shepherd decided to ask for an early SECDIR review. The review was performed by Shawn M. Emery with the conclusion that "the various risks associated with this protocol are outlined in the draft and provides sufficient techniques for mitigating against such attacks". The review only identified two editorial nits. (6) Describe any specific concerns or issues that the Document Shepherd has with this document that the Responsible Area Director and/or the IESG should be aware of? For example, perhaps he or she is uncomfortable with certain parts of the document, or has concerns whether there really is a need for it. In any event, if the WG has discussed those issues and has indicated that it still wishes to advance the document, detail those concerns here. There are no such issues. (7) Has each author confirmed that any and all appropriate IPR disclosures required for full conformance with the provisions of BCP 78 and BCP 79 have already been filed. If not, explain why? All authors have confirmed that the appropriate IPR disclusures have been filed. (8) Has an IPR disclosure been filed that references this document? If so, summarize any WG discussion and conclusion regarding the IPR disclosures. There are no IPR disclosures. (9) How solid is the WG consensus behind this document? Does it represent the strong concurrence of a few individuals, with others being silent, or does the WG as a whole understand and agree with it? This document has been extensively discussed in the TCPM working group, both on the mailing list and in several face-to-face meetings. It has been reviewed in detail by several contributors. It can be assumed that TCPM working group as a whole understands the mechanism. There have been several discussions on the implications on TCP congestion control, in particular if this document is being used in combination with RFC 6928 ("IW10"), since this document allows a server to send an initial window of data before completing the three-way TCP handshake. As an outcome of these discussion, the document mandates in Section 4.2.2 "the server MUST follow [RFC5681] (based on [RFC3390]) to set the initial congestion window for sending more data packets" and lists this topic as an areas for further experimentation in Section 7.3. These statements are considered sufficient by the vast majority of the TCPM WG participants. Two issues have been raised during WGLC: * Regarding allocation of a dedicated TCP option code point for a non-standards-track protocol, one contributor disagreed. However, there is clear and strong consensus in the TCPM working group that in this specific case it seems worthwile to allocate a TCP option number (see below). * The have been concerns concern regarding the rigorousness of the protocol specification, in particular if a further specification of the client caching behavior is needed. Yet, the consensus in the WG is that these heuristics are implementation details that do not affect interoperability. In summary, there is strong consensus in TCPM to publish the document. (10) Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarise the areas of conflict in separate email messages to the Responsible Area Director. (It should be in a separate email because this questionnaire is publicly available.) There is no known extreme discontent. (11) Identify any ID nits the Document Shepherd has found in this document. (See http://www.ietf.org/tools/idnits/ and the Internet-Drafts Checklist). Boilerplate checks are not enough; this check needs to be thorough. The document passes IDnits with one editorial error ("There is 1 instance of lines with control characters in the document"). (12) Describe how the document meets any required formal review criteria, such as the MIB Doctor, media type, and URI type reviews. Such review is not required. (13) Have all references within this document been identified as either normative or informative? Yes (14) Are there normative references to documents that are not ready for advancement or are otherwise in an unclear state? If such normative references exist, what is the plan for their completion? There are no such normative references. (15) Are there downward normative references references (see RFC 3967)? If so, list these downward references to support the Area Director in the Last Call procedure. Not applicable (16) Will publication of this document change the status of any existing RFCs? Are those RFCs listed on the title page header, listed in the abstract, and discussed in the introduction? If the RFCs are not listed in the Abstract and Introduction, explain why, and point to the part of the document where the relationship of this document to the other RFCs is discussed. If this information is not in the document, explain why the WG considers it unnecessary. The document does not change the status of any RFC. (17) Describe the Document Shepherd's review of the IANA considerations section, especially with regard to its consistency with the body of the document. Confirm that all protocol extensions that the document makes are associated with the appropriate reservations in IANA registries. Confirm that any referenced IANA registries have been clearly identified. Confirm that newly created IANA registries include a detailed specification of the initial contents for the registry, that allocations procedures for future registrations are defined, and a reasonable name for the new registry has been suggested (see RFC 5226). The TCPM working group decided with strong consensus to ask for IANA allocation of a TCP option number for this experimental document. Reasoning: The protocol has always followed the guidelines of RFC 6994 and it currently uses an experimental TCP option number in combination with a registered experimental identifier (0xF989). This consumes two bytes of very scarce 40B option space in TCP SYN segments, which could thus prevent other, future TCP extensions. Right now, there is no significant shortage of IANA-assigned TCP option codepoints for users following the IETF process: Out of 256 codepoints, IANA has only 14 codepoints assigned to an non-obsoleted RFC, 6 other registrations (legacy), 9 obsoleted codepoints, and of the order of 10-15 known unauthorized uses. Given the benefits and the deployment of this protocol on the one hand side, and the large number of unallocated and available TCP option codepoints on the other hand, use of a dedicated option codepoint is considered to be the right trade-off. The TCPM working group therefore asks the IESG for approving a TCP option codepoint allocation for this experimental document. (18) List any new IANA registries that require Expert Review for future allocations. Provide any public guidance that the IESG would find useful in selecting the IANA Experts for these new registries. Not applicable (19) Describe reviews and automated checks performed by the Document Shepherd to validate sections of the document written in a formal language, such as XML code, BNF rules, MIB definitions, etc. Not applicable |
2014-04-29
|
08 | Michael Scharf | (1) What type of RFC is being requested (BCP, Proposed Standard, Internet Standard, Informational, Experimental, or Historic)? Why is this the proper type of RFC? … (1) What type of RFC is being requested (BCP, Proposed Standard, Internet Standard, Informational, Experimental, or Historic)? Why is this the proper type of RFC? Is this type of RFC indicated in the title page header? The intended status is Experimental, as indicated on the title page header. It is consensus of the TCPM working group that this document should be published as experimental RFC, given that it describes a TCP extension that deviates from the standard TCP semantics in certain corner cases. Because of the same reason, this extension is not recommended for being used by default. The document explicitly lists certain areas of further experimentation in Section 7. (2) The IESG approval announcement includes a Document Announcement Write-Up. Please provide such a Document Announcement Write-Up. Recent examples can be found in the "Action" announcements for approved documents. The approval announcement contains the following sections: Technical Summary: This document describes an experimental TCP mechanism TCP Fast Open (TFO). TFO allows data to be carried in the SYN and SYN-ACK packets and consumed by the receiving end during the initial connection handshake, thus saving up to one full round trip time (RTT) compared to the standard TCP, which requires a three-way handshake (3WHS) to complete before data can be exchanged. However TFO deviates from the standard TCP semantics since the data in the SYN could be replayed to an application in some rare circumstances. Applications should not use TFO unless they can tolerate this issue detailed in the Applicability section. Working Group Summary: This document was extensively discussed and reviewed by the TCPM working group and there is strong support to publish the document. While being an experimental document, the TCPM working group decided to ask IESG for approving an IANA allocation of a new TCP option codepoint. Document Quality: This protocol extension is implemented and deployed in the Linux TCP/IP stack, and experimental results have been discussed in the TCPM working group. An early SECDIR concluded that the document had no substantive issues. Personnel: The Document Shepherd is Michael Scharf . The Responsible Area Director is Martin Stiemerling . (3) Briefly describe the review of this document that was performed by the Document Shepherd. If this version of the document is not ready for publication, please explain why the document is being forwarded to the IESG. The Document Shepherd read the document and he reviewed all discussions during WGLC and follow-up discussions after WGLC. The document is considered ready for publication. (4) Does the document Shepherd have any concerns about the depth or breadth of the reviews that have been performed? No. This document was extensively reviewed by the TCPM working group. (5) Do portions of the document need review from a particular or from broader perspective, e.g., security, operational complexity, AAA, DNS, DHCP, XML, or internationalization? If so, describe the review that took place. Given the security implications of this TCP extension, the Document Shepherd decided to ask for an early SECDIR review. The review was performed by Shawn M. Emery with the conclusion that "the various risks associated with this protocol are outlined in the draft and provides sufficient techniques for mitigating against such attacks". The review only identified two editorial nits. (6) Describe any specific concerns or issues that the Document Shepherd has with this document that the Responsible Area Director and/or the IESG should be aware of? For example, perhaps he or she is uncomfortable with certain parts of the document, or has concerns whether there really is a need for it. In any event, if the WG has discussed those issues and has indicated that it still wishes to advance the document, detail those concerns here. There are no such issues. (7) Has each author confirmed that any and all appropriate IPR disclosures required for full conformance with the provisions of BCP 78 and BCP 79 have already been filed. If not, explain why? All authors have confirmed that the appropriate IPR disclusures have been filed. (8) Has an IPR disclosure been filed that references this document? If so, summarize any WG discussion and conclusion regarding the IPR disclosures. There are no IPR disclosures. (9) How solid is the WG consensus behind this document? Does it represent the strong concurrence of a few individuals, with others being silent, or does the WG as a whole understand and agree with it? This document has been extensively discussed in the TCPM working group, both on the mailing list and in several face-to-face meetings. It has been reviewed in detail by several contributors. It can be assumed that TCPM working group as a whole understands the mechanism. There have been several discussions on the implications on TCP congestion control, in particular if this document is being used in combination with RFC 6928 ("IW10"), since this document allows a server to send an initial window of data before completing the three-way TCP handshake. As an outcome of these discussion, the document mandates in Section 4.2.2 "the server MUST follow [RFC5681] (based on [RFC3390]) to set the initial congestion window for sending more data packets" and lists this topic as an areas for further experimentation in Section 7.3. These statements are considered sufficient by the vast majority of the TCPM WG participants. Two issues have been raised during WGLC: * Regarding allocation of a dedicated TCP option code point for a non-standards-track protocol, one contributor disagreed. However, there is clear and strong consensus in the TCPM working group that in this specific case it seems worthwile to allocate a TCP option number (see below). * The have been concerns concern regarding the rigorousness of the protocol specification, in particular if a further specification of the client caching behavior is needed. Yet, the consensus in the WG is that these heuristics are implementation details that do not affect interoperability. In summary, there is strong consensus in TCPM to publish the document. (10) Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarise the areas of conflict in separate email messages to the Responsible Area Director. (It should be in a separate email because this questionnaire is publicly available.) There is no known extreme discontent. (11) Identify any ID nits the Document Shepherd has found in this document. (See http://www.ietf.org/tools/idnits/ and the Internet-Drafts Checklist). Boilerplate checks are not enough; this check needs to be thorough. The document passes IDnits with one editorial error ("There is 1 instance of lines with control characters in the document"). (12) Describe how the document meets any required formal review criteria, such as the MIB Doctor, media type, and URI type reviews. Such review is not required. (13) Have all references within this document been identified as either normative or informative? Yes (14) Are there normative references to documents that are not ready for advancement or are otherwise in an unclear state? If such normative references exist, what is the plan for their completion? There are no such normative references. (15) Are there downward normative references references (see RFC 3967)? If so, list these downward references to support the Area Director in the Last Call procedure. Not applicable (16) Will publication of this document change the status of any existing RFCs? Are those RFCs listed on the title page header, listed in the abstract, and discussed in the introduction? If the RFCs are not listed in the Abstract and Introduction, explain why, and point to the part of the document where the relationship of this document to the other RFCs is discussed. If this information is not in the document, explain why the WG considers it unnecessary. The document does not change the status of any RFC. (17) Describe the Document Shepherd's review of the IANA considerations section, especially with regard to its consistency with the body of the document. Confirm that all protocol extensions that the document makes are associated with the appropriate reservations in IANA registries. Confirm that any referenced IANA registries have been clearly identified. Confirm that newly created IANA registries include a detailed specification of the initial contents for the registry, that allocations procedures for future registrations are defined, and a reasonable name for the new registry has been suggested (see RFC 5226). The TCPM working group decided with strong consensus to ask for IANA allocation of a TCP option number for this experimental document. Reasoning: The protocol has always followed the guidelines of RFC 6994 and it currently uses an experimental TCP option number in combination with a registered experimental identifier (0xF989). This consumes two bytes of very scarce 40B option space in TCP SYN segments, which could thus prevent other, future TCP extensions. Right now, there is no significant shortage of IANA-assigned TCP option codepoints for users following the IETF process: Out of 256 codepoints, IANA has only 14 codepoints assigned to an non-obsoleted RFC, 6 other registrations (legacy), 9 obsoleted codepoints, and of the order of 10-15 known unauthorized uses. Given the benefits and the deployment of this protocol on the one hand side, and the large number of unallocated and available TCP option codepoints on the other hand, use of a dedicated option codepoint is considered to be the right trade-off. The TCPM working group therefore asks the IESG for approving a TCP option codepoint allocation for this experimental document. (18) List any new IANA registries that require Expert Review for future allocations. Provide any public guidance that the IESG would find useful in selecting the IANA Experts for these new registries. Not applicable (19) Describe reviews and automated checks performed by the Document Shepherd to validate sections of the document written in a formal language, such as XML code, BNF rules, MIB definitions, etc. Not applicable |
2014-04-29
|
08 | Michael Scharf | (1) What type of RFC is being requested (BCP, Proposed Standard, Internet Standard, Informational, Experimental, or Historic)? Why is this the proper type of RFC? … (1) What type of RFC is being requested (BCP, Proposed Standard, Internet Standard, Informational, Experimental, or Historic)? Why is this the proper type of RFC? Is this type of RFC indicated in the title page header? The intended status is Experimental, as indicated on the title page header. It is consensus of the TCPM working group that this document should be published as experimental RFC, given that it describes a TCP extension that deviates from the standard TCP semantics in certain corner cases. Because of the same reason, this extension is not recommended for being used by default. The document explicitly lists certain areas of further experimentation in Section 7. (2) The IESG approval announcement includes a Document Announcement Write-Up. Please provide such a Document Announcement Write-Up. Recent examples can be found in the "Action" announcements for approved documents. The approval announcement contains the following sections: Technical Summary: This document describes an experimental TCP mechanism TCP Fast Open (TFO). TFO allows data to be carried in the SYN and SYN-ACK packets and consumed by the receiving end during the initial connection handshake, thus saving up to one full round trip time (RTT) compared to the standard TCP, which requires a three-way handshake (3WHS) to complete before data can be exchanged. However TFO deviates from the standard TCP semantics since the data in the SYN could be replayed to an application in some rare circumstances. Applications should not use TFO unless they can tolerate this issue detailed in the Applicability section. Working Group Summary: This document was extensively discussed and reviewed by the TCPM working group and there is strong support to publish the document. While being an experimental document, the TCPM working group decided to ask IESG for approving an IANA allocation of a new TCP option codepoint. Document Quality: This protocol extension is implemented and deployed in the Linux TCP/IP stack, and experimental results have been discussed in the TCPM working group. An early SECDIR concluded that the document had no substantive issues. Personnel: The Document Shepherd is Michael Scharf . The Responsible Area Director is Martin Stiemerling . (3) Briefly describe the review of this document that was performed by the Document Shepherd. If this version of the document is not ready for publication, please explain why the document is being forwarded to the IESG. The Document Shepherd read the document and he reviewed all discussions during WGLC and follow-up discussions after WGLC. The document is considered ready for publication. (4) Does the document Shepherd have any concerns about the depth or breadth of the reviews that have been performed? No. This document was extensively reviewed by the TCPM working group. (5) Do portions of the document need review from a particular or from broader perspective, e.g., security, operational complexity, AAA, DNS, DHCP, XML, or internationalization? If so, describe the review that took place. Given the security implications of this TCP extension, the Document Shepherd decided to ask for an early SECDIR review. The review was performed by Shawn M. Emery with the conclusion that "the various risks associated with this protocol are outlined in the draft and provides sufficient techniques for mitigating against such attacks". The review only identified two editorial nits. (6) Describe any specific concerns or issues that the Document Shepherd has with this document that the Responsible Area Director and/or the IESG should be aware of? For example, perhaps he or she is uncomfortable with certain parts of the document, or has concerns whether there really is a need for it. In any event, if the WG has discussed those issues and has indicated that it still wishes to advance the document, detail those concerns here. There are no such issues. (7) Has each author confirmed that any and all appropriate IPR disclosures required for full conformance with the provisions of BCP 78 and BCP 79 have already been filed. If not, explain why? All authors have confirmed that the appropriate IPR disclusures have been filed. (8) Has an IPR disclosure been filed that references this document? If so, summarize any WG discussion and conclusion regarding the IPR disclosures. There are no IPR disclosures. (9) How solid is the WG consensus behind this document? Does it represent the strong concurrence of a few individuals, with others being silent, or does the WG as a whole understand and agree with it? This document has been extensively discussed in the TCPM working group, both on the mailing list and in several face-to-face meetings. It has been reviewed in detail by several contributors. It can be assumed that TCPM working group as a whole understands the mechanism. There have been several discussions on the implications on TCP congestion control, in particular if this document is being used in combination with RFC 6928 ("IW10"), since this document allows a server to send an initial window of data before completing the three-way TCP handshake. As an outcome of these discussion, the document mandates in Section 4.2.2 "the server MUST follow [RFC5681] (based on [RFC3390]) to set the initial congestion window for sending more data packets" and lists this topic as an areas for further experimentation in Section 7.3. These statements are considered sufficient by the vast majority of the TCPM WG participants. Two issues have been raised during WGLC: * Regarding allocation of a dedicated TCP option code point for a non-standards-track protocol, one contributor disagreed. However, there is clear and strong consensus in the TCPM working group that in this specific case it seems worthwile to allocate a TCP option number (see below). * The have been concerns concern regarding the rigorousness of the protocol specification, in particular if a further specification of the client caching behavior is needed. Yet, the consensus in the WG is that these heuristics are implementation details that do not affect interoperability. In summary, there is strong consensus in TCPM to publish the document. (10) Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarise the areas of conflict in separate email messages to the Responsible Area Director. (It should be in a separate email because this questionnaire is publicly available.) There is no known extreme discontent. (11) Identify any ID nits the Document Shepherd has found in this document. (See http://www.ietf.org/tools/idnits/ and the Internet-Drafts Checklist). Boilerplate checks are not enough; this check needs to be thorough. The document passes IDnits with one editorial error ("There is 1 instance of lines with control characters in the document"). (12) Describe how the document meets any required formal review criteria, such as the MIB Doctor, media type, and URI type reviews. Such review is not required. (13) Have all references within this document been identified as either normative or informative? Yes (14) Are there normative references to documents that are not ready for advancement or are otherwise in an unclear state? If such normative references exist, what is the plan for their completion? There are no such normative references. (15) Are there downward normative references references (see RFC 3967)? If so, list these downward references to support the Area Director in the Last Call procedure. Not applicable (16) Will publication of this document change the status of any existing RFCs? Are those RFCs listed on the title page header, listed in the abstract, and discussed in the introduction? If the RFCs are not listed in the Abstract and Introduction, explain why, and point to the part of the document where the relationship of this document to the other RFCs is discussed. If this information is not in the document, explain why the WG considers it unnecessary. The document does not change the status of any RFC. (17) Describe the Document Shepherd's review of the IANA considerations section, especially with regard to its consistency with the body of the document. Confirm that all protocol extensions that the document makes are associated with the appropriate reservations in IANA registries. Confirm that any referenced IANA registries have been clearly identified. Confirm that newly created IANA registries include a detailed specification of the initial contents for the registry, that allocations procedures for future registrations are defined, and a reasonable name for the new registry has been suggested (see RFC 5226). The TCPM working group decided with strong consensus to ask for IANA allocation of a TCP option number for this experimental document. Reasoning: The protocol has always followed the guidelines of RFC 6994 and it currently uses an experimental TCP option number in combination with a registered experimental identifier (0xF989). This consumes two bytes of very scarce 40B option space in TCP SYN segments, which could thus prevent other, future TCP extensions. Right now, there is no significant shortage of IANA-assigned TCP option codepoints for users following the IETF process: Out of 256 codepoints, IANA has only 14 codepoints assigned to an non-obsoleted RFC, 6 other registrations (legacy), 9 obsoleted codepoints, and of the order of 10-15 known unauthorized uses. Given the benefits and the deployment of this protocol on the one hand side, and the large number of unallocated and available TCP option codepoints on the other hand, use of a dedicated option codepoint is considered to be the right trade-off. The TCPM working group therefore asks the IESG for approving a TCP option codepoint allocation for this experimental document. (18) List any new IANA registries that require Expert Review for future allocations. Provide any public guidance that the IESG would find useful in selecting the IANA Experts for these new registries. Not applicable (19) Describe reviews and automated checks performed by the Document Shepherd to validate sections of the document written in a formal language, such as XML code, BNF rules, MIB definitions, etc. Not applicable |
2014-04-29
|
08 | Michael Scharf | (1) What type of RFC is being requested (BCP, Proposed Standard, Internet Standard, Informational, Experimental, or Historic)? Why is this the proper type of RFC? … (1) What type of RFC is being requested (BCP, Proposed Standard, Internet Standard, Informational, Experimental, or Historic)? Why is this the proper type of RFC? Is this type of RFC indicated in the title page header? The intended status is Experimental, as indicated on the title page header. It is consensus of the TCPM working group that this document should be published as experimental RFC, given that it describes a TCP extension that deviates from the standard TCP semantics in certain corner cases. Because of the same reason, this extension is not recommended for being used by default. The document explicitly lists certain areas of further experimentation in Section 7. (2) The IESG approval announcement includes a Document Announcement Write-Up. Please provide such a Document Announcement Write-Up. Recent examples can be found in the "Action" announcements for approved documents. The approval announcement contains the following sections: Technical Summary: This document describes an experimental TCP mechanism TCP Fast Open (TFO). TFO allows data to be carried in the SYN and SYN-ACK packets and consumed by the receiving end during the initial connection handshake, thus saving up to one full round trip time (RTT) compared to the standard TCP, which requires a three-way handshake (3WHS) to complete before data can be exchanged. However TFO deviates from the standard TCP semantics since the data in the SYN could be replayed to an application in some rare circumstances. Applications should not use TFO unless they can tolerate this issue detailed in the Applicability section. Working Group Summary: This document was extensively discussed and reviewed by the TCPM working group and there is strong support to publish the document. While being an experimental document, the TCPM working group decided to ask IESG for approving an IANA allocation of a new TCP option codepoint. Document Quality: This protocol extension is implemented and deployed in the Linux TCP/IP stack, and experimental results have been discussed in the TCPM working group. An early SECDIR concluded that the document had no substantive issues. Personnel: The Document Shepherd is Michael Scharf . The Responsible Area Director is Martin Stiemerling . (3) Briefly describe the review of this document that was performed by the Document Shepherd. If this version of the document is not ready for publication, please explain why the document is being forwarded to the IESG. The Document Shepherd read the document and he reviewed all discussions during WGLC and follow-up discussions after WGLC. The document is considered ready for publication. (4) Does the document Shepherd have any concerns about the depth or breadth of the reviews that have been performed? No. This document was extensively reviewed by the TCPM working group. (5) Do portions of the document need review from a particular or from broader perspective, e.g., security, operational complexity, AAA, DNS, DHCP, XML, or internationalization? If so, describe the review that took place. Given the security implications of this TCP extension, the Document Shepherd decided to ask for an early SECDIR review. The review was performed by Shawn M. Emery with the conclusion that "the various risks associated with this protocol are outlined in the draft and provides sufficient techniques for mitigating against such attacks". The review only identified two editorial nits. (6) Describe any specific concerns or issues that the Document Shepherd has with this document that the Responsible Area Director and/or the IESG should be aware of? For example, perhaps he or she is uncomfortable with certain parts of the document, or has concerns whether there really is a need for it. In any event, if the WG has discussed those issues and has indicated that it still wishes to advance the document, detail those concerns here. There are no such issues. (7) Has each author confirmed that any and all appropriate IPR disclosures required for full conformance with the provisions of BCP 78 and BCP 79 have already been filed. If not, explain why? All authors have confirmed that the appropriate IPR disclusures have been filed. (8) Has an IPR disclosure been filed that references this document? If so, summarize any WG discussion and conclusion regarding the IPR disclosures. There are no IPR disclosures. (9) How solid is the WG consensus behind this document? Does it represent the strong concurrence of a few individuals, with others being silent, or does the WG as a whole understand and agree with it? This document has been extensively discussed in the TCPM working group, both on the mailing list and in several face-to-face meetings. It has been reviewed in detail by several contributors. It can be assumed that TCPM working group as a whole understands the mechanism. There have been several discussions on the implications on TCP congestion control, in particular if this document is being used in combination with RFC 6928 ("IW10"), since this document allows a server to send an initial window of data before completing the three-way TCP handshake. As an outcome of these discussion, the document mandates in Section 4.2.2 "the server MUST follow [RFC5681] (based on [RFC3390]) to set the initial congestion window for sending more data packets" and lists this topic as an areas for further experimentation in Section 7.3. These statements are considered sufficient by the vast majority of the TCPM WG participants. Two issues have been raised during WGLC: * Regarding allocation of a dedicated TCP option code point for a non-standards-track protocol, one contributor disagreed. However, there is clear and strong consensus in the TCPM working group that in this specific case it seems worthwile to allocate a TCP option number (see below). * The have been concerns concern regarding the rigorousness of the protocol specification, in particular if a further specification of the client caching behavior is needed. Yet, the consensus in the WG is that these heuristics are implementation details that do not affect interoperability. In summary, there is strong consensus in TCPM to publish the document. (10) Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarise the areas of conflict in separate email messages to the Responsible Area Director. (It should be in a separate email because this questionnaire is publicly available.) There is no known extreme discontent. (11) Identify any ID nits the Document Shepherd has found in this document. (See http://www.ietf.org/tools/idnits/ and the Internet-Drafts Checklist). Boilerplate checks are not enough; this check needs to be thorough. The document passes IDnits with one editorial error ("There is 1 instance of lines with control characters in the document"). (12) Describe how the document meets any required formal review criteria, such as the MIB Doctor, media type, and URI type reviews. Such review is not required. (13) Have all references within this document been identified as either normative or informative? Yes (14) Are there normative references to documents that are not ready for advancement or are otherwise in an unclear state? If such normative references exist, what is the plan for their completion? There are no such normative references. (15) Are there downward normative references references (see RFC 3967)? If so, list these downward references to support the Area Director in the Last Call procedure. Not applicable (16) Will publication of this document change the status of any existing RFCs? Are those RFCs listed on the title page header, listed in the abstract, and discussed in the introduction? If the RFCs are not listed in the Abstract and Introduction, explain why, and point to the part of the document where the relationship of this document to the other RFCs is discussed. If this information is not in the document, explain why the WG considers it unnecessary. The document does not change the status of any RFC. (17) Describe the Document Shepherd's review of the IANA considerations section, especially with regard to its consistency with the body of the document. Confirm that all protocol extensions that the document makes are associated with the appropriate reservations in IANA registries. Confirm that any referenced IANA registries have been clearly identified. Confirm that newly created IANA registries include a detailed specification of the initial contents for the registry, that allocations procedures for future registrations are defined, and a reasonable name for the new registry has been suggested (see RFC 5226). The TCPM working group decided with strong consensus to ask for IANA allocation of a TCP option number for this experimental document. Reasoning: The protocol has always followed the guidelines of RFC 6994 and it currently uses an experimental TCP option number in combination with a registered experimental identifier (0xF989). This consumes two bytes of very scarce 40B option space in TCP SYN segments, which could thus prevent other, future TCP extensions. Right now, there is no significant shortage of IANA-assigned TCP option codepoints for users following the IETF process: Out of 256 codepoints, IANA has only 14 codepoints assigned to an non-obsoleted RFC, 6 other registrations (legacy), 9 obsoleted codepoints, and of the order of 10-15 known unauthorized uses. Given the benefits and the deployment of this protocol on the one hand side, and the large number of unallocated and available TCP option codepoints on the other hand, use of a dedicated option codepoint is considered to be the right trade-off. The TCPM working group therefore asks the IESG for approving a TCP option codepoint allocation for this experimental document. (18) List any new IANA registries that require Expert Review for future allocations. Provide any public guidance that the IESG would find useful in selecting the IANA Experts for these new registries. Not applicable (19) Describe reviews and automated checks performed by the Document Shepherd to validate sections of the document written in a formal language, such as XML code, BNF rules, MIB definitions, etc. Not applicable |
2014-04-03
|
08 | Tero Kivinen | Request for Early review by SECDIR Completed: Has Nits. Reviewer: Shawn Emery. |
2014-03-13
|
08 | Tero Kivinen | Request for Early review by SECDIR is assigned to Shawn Emery |
2014-03-13
|
08 | Tero Kivinen | Request for Early review by SECDIR is assigned to Shawn Emery |
2014-03-12
|
08 | Michael Scharf | Tag Revised I-D Needed - Issue raised by WGLC cleared. |
2014-03-12
|
08 | Michael Scharf | IETF WG state changed to WG Consensus: Waiting for Write-Up from Waiting for WG Chair Go-Ahead |
2014-03-11
|
08 | Yuchung Cheng | New version available: draft-ietf-tcpm-fastopen-08.txt |
2014-02-14
|
07 | Yuchung Cheng | New version available: draft-ietf-tcpm-fastopen-07.txt |
2014-01-26
|
06 | Yuchung Cheng | New version available: draft-ietf-tcpm-fastopen-06.txt |
2013-11-13
|
05 | Michael Scharf | IETF WG state changed to Waiting for WG Chair Go-Ahead from In WG Last Call |
2013-11-13
|
05 | Michael Scharf | Annotation tag Revised I-D Needed - Issue raised by WGLC set. |
2013-11-02
|
05 | Pasi Sarolahti | IETF WG state changed to In WG Last Call from WG Document |
2013-10-25
|
05 | Michael Scharf | Document shepherd changed to Michael Scharf |
2013-10-14
|
05 | Yuchung Cheng | New version available: draft-ietf-tcpm-fastopen-05.txt |
2013-07-15
|
04 | Yuchung Cheng | New version available: draft-ietf-tcpm-fastopen-04.txt |
2013-03-13
|
03 | Martin Stiemerling | Shepherding AD changed to Martin Stiemerling |
2013-02-25
|
03 | Yuchung Cheng | New version available: draft-ietf-tcpm-fastopen-03.txt |
2012-10-22
|
02 | Yuchung Cheng | New version available: draft-ietf-tcpm-fastopen-02.txt |
2012-07-16
|
01 | Yuchung Cheng | New version available: draft-ietf-tcpm-fastopen-01.txt |
2012-03-07
|
00 | Wesley Eddy | accidentally added in Publication Requested; correcting to AD is Watching |
2012-03-07
|
00 | Wesley Eddy | State changed to AD is watching from Publication Requested |
2012-03-07
|
00 | Wesley Eddy | Intended Status changed to Experimental |
2012-03-07
|
00 | Wesley Eddy | IESG process started in state Publication Requested |
2012-02-17
|
00 | (System) | New version available: draft-ietf-tcpm-fastopen-00.txt |