IETF conflict review for draft-touch-tcp-ao-nat
conflict-review-touch-tcp-ao-nat-00
Document history
Date | Rev. | By | Action |
---|---|---|---|
2013-05-20
|
00 | Amy Vezza | The following approval message was sent From: The IESG To: "Nevil Brownlee" , draft-touch-tcp-ao-nat@tools.ietf.org Cc: The IESG , , Subject: Results of IETF-conflict review for … The following approval message was sent From: The IESG To: "Nevil Brownlee" , draft-touch-tcp-ao-nat@tools.ietf.org Cc: The IESG , , Subject: Results of IETF-conflict review for draft-touch-tcp-ao-nat-04 The IESG has completed a review of draft-touch-tcp-ao-nat-04 consistent with RFC5742. The IESG has no problem with the publication of 'A TCP Authentication Option NAT Extension' as an Experimental RFC. The IESG has concluded that this work is related to IETF work done in WG TCPM, but this relationship does not prevent publishing. The IESG would also like the RFC-Editor to review the comments in the datatracker related to this document and determine whether or not they merit incorporation into the document. Comments may exist in both the ballot and the history log. The IESG review is documented at: http://datatracker.ietf.org/doc/conflict-review-touch-tcp-ao-nat/ A URL of the reviewed Internet Draft is: http://datatracker.ietf.org/doc/draft-touch-tcp-ao-nat/ The process for such documents is described at http://www.rfc-editor.org/indsubs.html Thank you, The IESG Secretary |
2013-05-20
|
00 | Amy Vezza | IESG has approved the conflict review response |
2013-05-20
|
00 | Amy Vezza | Closed "Approve" ballot |
2013-05-20
|
00 | Amy Vezza | State changed to Approved No Problem - announcement sent from Approved No Problem - announcement to be sent |
2013-05-16
|
00 | Cindy Morgan | State changed to Approved No Problem - announcement to be sent from IESG Evaluation |
2013-05-16
|
00 | Gonzalo Camarillo | [Ballot Position Update] New position, No Objection, has been recorded for Gonzalo Camarillo |
2013-05-15
|
00 | Spencer Dawkins | [Ballot comment] This is the lamest comment in the history of conflict reviews, but I found the title, "A TCP Authentication Option NAT Extension", confusing … [Ballot comment] This is the lamest comment in the history of conflict reviews, but I found the title, "A TCP Authentication Option NAT Extension", confusing (we're extending TCP-AO, not NATs). The abstract is much clearer: This document describes an extension to the TCP Authentication Option (TCP-AO) to support its use over connections that pass through network address and/or port translators (NATs/NAPTs). Not a big deal, but perhaps this could be considered as the document moves through the process. |
2013-05-15
|
00 | Spencer Dawkins | [Ballot Position Update] New position, No Objection, has been recorded for Spencer Dawkins |
2013-05-15
|
00 | Richard Barnes | [Ballot Position Update] New position, No Objection, has been recorded for Richard Barnes |
2013-05-13
|
00 | Stewart Bryant | [Ballot comment] I checked with the IDR and SIDR WGs and no concerns were raised. I have hence cleared my Discuss. There was one technical … [Ballot comment] I checked with the IDR and SIDR WGs and no concerns were raised. I have hence cleared my Discuss. There was one technical comment which I pass to the author for his consideration: >> TCP-AO-NAT SHOULD NOT be used with both flags set in IPv4, however, as the result would rely entirely on the ISNs alone. The preceding paragraph says that the ISNs alone provide most of the randomness ("KDF input randomness is thus expected to be dominated by that of the ISNs") so the justification for the sentence quoted above isn't obvious. - RFC5389 is all very well, and broadly related to the topic. But the citation is provided without context, or more accurately, it's cited out-of-context. I was expecting to go look at RFC5389 to find out something useful about localNAT and remoteNAT, but no. |
2013-05-13
|
00 | Stewart Bryant | [Ballot Position Update] Position for Stewart Bryant has been changed to No Objection from Discuss |
2013-04-25
|
00 | Cindy Morgan | Telechat date has been changed to 2013-05-16 from 2013-04-25 |
2013-04-25
|
00 | Stewart Bryant | [Ballot discuss] I am sorry for the late Discuss. I would like to check with the SIDR and IDR WGs to see if this has … [Ballot discuss] I am sorry for the late Discuss. I would like to check with the SIDR and IDR WGs to see if this has any implications for their protocols. |
2013-04-25
|
00 | Stewart Bryant | [Ballot Position Update] Position for Stewart Bryant has been changed to Discuss from No Objection |
2013-04-25
|
00 | Joel Jaeggli | [Ballot Position Update] New position, No Objection, has been recorded for Joel Jaeggli |
2013-04-25
|
00 | Benoît Claise | [Ballot Position Update] New position, No Objection, has been recorded for Benoit Claise |
2013-04-25
|
00 | Stephen Farrell | [Ballot comment] I wondered if it'd be worth adding some security consideration text about possible attacks that might be enabled by this if e.g. there's … [Ballot comment] I wondered if it'd be worth adding some security consideration text about possible attacks that might be enabled by this if e.g. there's a load balancer on the NAT'd end with different devices behind the NAT having the same master key - presumably a bad actor might be able to re-direct or replay some traffic even if there's a low probability that that'd not be detected unless a large amount of traffic is re-directed or replayed. Not sure if the attack is practical though, I guess it'd need a sequence number collision. |
2013-04-25
|
00 | Stephen Farrell | [Ballot Position Update] New position, No Objection, has been recorded for Stephen Farrell |
2013-04-25
|
00 | Ted Lemon | [Ballot Position Update] New position, No Objection, has been recorded for Ted Lemon |
2013-04-25
|
00 | Sean Turner | [Ballot comment] No objection to the draft, but I am curious whether the clients will know they're behind a NAT or whether all clients will … [Ballot comment] No objection to the draft, but I am curious whether the clients will know they're behind a NAT or whether all clients will end up setting this all the time. |
2013-04-25
|
00 | Sean Turner | [Ballot Position Update] New position, No Objection, has been recorded for Sean Turner |
2013-04-24
|
00 | Martin Stiemerling | Removed telechat returning item indication |
2013-04-24
|
00 | Jari Arkko | [Ballot Position Update] New position, No Objection, has been recorded for Jari Arkko |
2013-04-24
|
00 | Barry Leiba | [Ballot Position Update] New position, No Objection, has been recorded for Barry Leiba |
2013-04-24
|
00 | Pete Resnick | [Ballot Position Update] New position, No Objection, has been recorded for Pete Resnick |
2013-04-24
|
00 | Stewart Bryant | [Ballot Position Update] New position, No Objection, has been recorded for Stewart Bryant |
2013-04-23
|
00 | Adrian Farrel | [Ballot Position Update] New position, No Objection, has been recorded for Adrian Farrel |
2013-04-23
|
00 | Martin Stiemerling | [Ballot Position Update] New position, Yes, has been recorded for Martin Stiemerling |
2013-04-23
|
00 | Martin Stiemerling | Created "Approve" ballot |
2013-04-23
|
00 | Martin Stiemerling | State changed to IESG Evaluation from AD Review |
2013-04-23
|
00 | Martin Stiemerling | New version available: conflict-review-touch-tcp-ao-nat-00.txt |
2013-04-11
|
00 | Jari Arkko | Telechat date has been changed to 2013-04-25 from 2013-04-11 |
2013-04-11
|
00 | Jari Arkko | State changed to AD Review from Needs Shepherd |
2013-04-11
|
00 | Jari Arkko | Martin has agreed to take on this document. |
2013-04-11
|
00 | Jari Arkko | Shepherding AD changed to Martin Stiemerling |
2013-04-10
|
00 | Cindy Morgan | The draft draft-touch-tcp-ao-nat-04 is ready for publication from the Independent Stream. Please ask IESG to review it, as set out in RFC 5742. The … The draft draft-touch-tcp-ao-nat-04 is ready for publication from the Independent Stream. Please ask IESG to review it, as set out in RFC 5742. The following is some background for this draft, please forward it to IESG along with this request ... It's abstract says: This document describes an extension to the TCP Authentication Option (TCP-AO) to support its use over connections that pass through network address and/or port translators (NATs/NAPTs). This extension changes the data used to compute traffic keys, but does not alter TCP-AO's packet processing or key generation algorithms. It was reviewed by Brian Carpenter, its author (Joe Touch) published this -04 version, which has addressed the issuies Brian raised. Thanks, Nevil (ISE) -- Nevil Brownlee (ISE), rfc-ise@rfc-editor.org |
2013-04-10
|
00 | Cindy Morgan | Placed on agenda for telechat - 2013-04-11 |
2013-04-10
|
00 | Cindy Morgan | IETF conflict review requested |