Skip to main content

IETF conflict review for draft-williams-exp-tcp-host-id-opt
conflict-review-williams-exp-tcp-host-id-opt-02

Revision differences

Document history

Date Rev. By Action
2016-01-25
02 Amy Vezza
The following approval message was sent
From: The IESG
To: draft-williams-exp-tcp-host-id-opt@ietf.org,
    rfc-ise@rfc-editor.org,
    "Nevil Brownlee"
Cc: "The IESG" ,
  …
The following approval message was sent
From: The IESG
To: draft-williams-exp-tcp-host-id-opt@ietf.org,
    rfc-ise@rfc-editor.org,
    "Nevil Brownlee"
Cc: "The IESG" ,
    iana@iana.org,
    "IETF-Announce"
Subject: Results of IETF-conflict review for draft-williams-exp-tcp-host-id-opt-07

The IESG has completed a review of draft-williams-exp-tcp-host-id-opt-07
consistent with RFC5742.


The IESG recommends that 'Experimental Option for TCP Host
Identification'  NOT be
published as an Experimental RFC.


The IESG has concluded that this document violates IETF procedures about
pervasive monitoring (RFC 7258) and should therefore not be published
without IETF review and IESG approval. This work is related to IETF work
done in the INTAREA WG.

The IESG would also like the Independent Submissions Editor to review the
comments in the datatracker related to this document and determine
whether or not they merit incorporation into the document. Comments may
exist in both the ballot and the history log.

The IESG review is documented at:
https://datatracker.ietf.org/doc/conflict-review-williams-exp-tcp-host-id-opt/

A URL of the reviewed Internet Draft is:
https://datatracker.ietf.org/doc/draft-williams-exp-tcp-host-id-opt/

The process for such documents is described at
https://www.rfc-editor.org/indsubs.html

Thank you,

The IESG Secretary



2016-01-25
02 Amy Vezza IESG has approved the conflict review response
2016-01-25
02 Amy Vezza Closed "Approve" ballot
2016-01-25
02 Amy Vezza Conflict Review State changed to Approved Request to Not Publish - announcement sent from Approved Request to Not Publish - announcement to be sent
2016-01-21
02 Cindy Morgan Conflict Review State changed to Approved Request to Not Publish - announcement to be sent from IESG Evaluation
2016-01-21
02 Jari Arkko [Ballot Position Update] New position, Yes, has been recorded for Jari Arkko
2016-01-20
02 Ben Campbell [Ballot Position Update] New position, Yes, has been recorded for Ben Campbell
2016-01-20
02 Deborah Brungard [Ballot Position Update] New position, Yes, has been recorded for Deborah Brungard
2016-01-19
02 Terry Manderson [Ballot Position Update] New position, Yes, has been recorded for Terry Manderson
2016-01-19
02 Alia Atlas [Ballot Position Update] New position, Yes, has been recorded for Alia Atlas
2016-01-19
02 Alissa Cooper [Ballot Position Update] New position, Yes, has been recorded for Alissa Cooper
2016-01-19
02 Brian Haberman [Ballot Position Update] New position, Yes, has been recorded for Brian Haberman
2016-01-19
02 Spencer Dawkins [Ballot Position Update] New position, No Objection, has been recorded for Spencer Dawkins
2016-01-19
02 Martin Stiemerling Telechat date has been changed to 2016-01-21 from 2016-01-07
2016-01-18
02 Benoît Claise [Ballot Position Update] New position, No Objection, has been recorded for Benoit Claise
2016-01-18
02 Barry Leiba [Ballot Position Update] New position, Yes, has been recorded for Barry Leiba
2016-01-18
02 Alvaro Retana [Ballot Position Update] New position, Yes, has been recorded for Alvaro Retana
2016-01-18
02 Stephen Farrell [Ballot comment]

I fully agree that the IESG ought return the exact same response as the last time
this was before us.
2016-01-18
02 Stephen Farrell [Ballot Position Update] New position, Yes, has been recorded for Stephen Farrell
2016-01-18
02 Martin Stiemerling [Ballot Position Update] New position, Yes, has been recorded for Martin Stiemerling
2016-01-18
02 Martin Stiemerling New version available: conflict-review-williams-exp-tcp-host-id-opt-02.txt
2016-01-07
01 Cindy Morgan Created "Approve" ballot
2016-01-07
01 Cindy Morgan Closed "Approve" ballot
2016-01-07
01 Alia Atlas [Ballot Position Update] Position for Alia Atlas has been changed to Abstain from No Objection
2016-01-07
01 Brian Haberman [Ballot comment]
I am with Alissa and Stephen that this should be a Do Not Publish response.
2016-01-07
01 Brian Haberman [Ballot Position Update] New position, No Objection, has been recorded for Brian Haberman
2016-01-07
01 Joel Jaeggli [Ballot Position Update] New position, Abstain, has been recorded for Joel Jaeggli
2016-01-06
01 Ben Campbell
[Ballot comment]
Update: I find Alissa's and Stephen's DISCUSS positions convincing.

I'd prefer the abstract to read less like an IETF endorsement of identifying hosts …
[Ballot comment]
Update: I find Alissa's and Stephen's DISCUSS positions convincing.

I'd prefer the abstract to read less like an IETF endorsement of identifying hosts behind NATs. (But not so strongly to block things, given the updates.)
2016-01-06
01 Ben Campbell Ballot comment text updated for Ben Campbell
2016-01-06
01 Alvaro Retana [Ballot Position Update] New position, No Objection, has been recorded for Alvaro Retana
2015-12-10
01 Martin Stiemerling Telechat date has been changed to 2016-01-07 from 2015-12-17
2015-12-03
01 Cindy Morgan Telechat date has been changed to 2015-12-17 from 2015-12-03
2015-12-03
01 Alissa Cooper
[Ballot discuss]
I think the previous conflict review response was correct, not the current one.

I think the way that this spec justifies the design …
[Ballot discuss]
I think the previous conflict review response was correct, not the current one.

I think the way that this spec justifies the design decisions that may allow the HOST_ID option to be used for pervasive monitoring can be summarized as: the option merely puts back in host identification information that a middlebox otherwise would have stripped out. I don't think this is really satisfactory. RFC 7258 doesn't say that we will work to ensure that pervasive monitoring remains only as easy or hard as it was before the deployment of CGNs or application proxies. It says that we will work to mitigate pervasive monitoring. So from the perspective of mitigating PM, the loss of unique host identification on the egress side of address-sharing devices is a virtue.

Of course, the motivations for re-introducing host uniqueness are well-documented. But this draft doesn't link the specification of the option to those motivations in a way that provides the justification that RFC 7258 requires, IMO. In particular, the document allows for the HOST_ID to contain an IP address or subnet, optionally together with a TCP port number. Under some circumstances using the option in these ways leaks information that allows for correlating the activities of the host more broadly than if the option were not used -- e.g., if an application proxy uses the option in this way, then the host traffic on the egress side of the proxy can be newly correlated with the host's traffic that does not pass through the proxy. If instead the proxy used a random, locally unique ID in the option, this type of correlation would not be re-introduced. So why should the option support embedding an IP address and TCP port, if all it needs to provide is local uniqueness for the hosts sharing the public address? Doesn't an opaque locally unique ID suffice for the three use cases listed in the document?
2015-12-03
01 Alissa Cooper Ballot discuss text updated for Alissa Cooper
2015-12-03
01 Jari Arkko
[Ballot comment]
First, I agree with Alissa, Stephen, and Ben.

Secondly, I do not consider this specific design to be an improvement in the Internet, …
[Ballot comment]
First, I agree with Alissa, Stephen, and Ben.

Secondly, I do not consider this specific design to be an improvement in the Internet, and that is the reason why I am balloting an Abstain in this case. The Abstain has no significance in the case of this type of a document going through the RFC Editor, but I wanted to be on record in disagreeing with this document.

Overall, I understand the need to protect against denial-of-service attacks and other issues, without causing collateral damage for other users behind the same IP address. But, I do not believe we should be increasing the attack surface against the Internet users at large. The potential for privacy violations from criminals, entities involved in collecting far too much information from web users, and illegally operating surveillance organisations is just too great.

One additional note: If you want to publish a good document, there might be some other designs, such as the random ID variant that have smaller worries than the current design. I am not saying those designs would be good, or that I would change my position, but those other designs would certainly be a marked improvement over the current document.
2015-12-03
01 Jari Arkko [Ballot Position Update] New position, Abstain, has been recorded for Jari Arkko
2015-12-03
01 Spencer Dawkins [Ballot Position Update] New position, No Objection, has been recorded for Spencer Dawkins
2015-12-03
01 Stephen Farrell
[Ballot discuss]

I'd also like to discuss this one some more. So far, I've looked quickly
at the diff between the last one we reviewed …
[Ballot discuss]

I'd also like to discuss this one some more. So far, I've looked quickly
at the diff between the last one we reviewed and the latest version.
That's [1].

That diff absolutely does not convince me that the draft is now only
describing something already deployed. For example the latest one
still says "...intended to allow broad deployment of the mechanism
on the public Internet." That remains entirely inconsistent with
IETF BCPs and so I believe we should revert to the previous DNP
response to the ISE.

If we reach consensus on that, then I'm not sure if we should try
to identify all the "badness" in -07 or if we should just say "please
DNP, no material change from our POV." I think the latter is more
appropriate but maybe this is something we ought discuss with
Nevil - what's the right/best kind of IESG response in such a
situation. Which leads me on to...

Also - from the ballot it's not possible for an AD to determine
anything about why the ISE has returned this item. I think that
is also something about which it'd be good to chat with Nevil,
from a possible tooling POV but also from a transparency and
accountability perspective. I think when/if the ISE is interacting
with the IESG in cases like this, it would seem fairly obviously
beneficial if the ISE's perspective on what's changed was part
of the record. (Or perhaps the ISE's editorial board, I don't even
know which applies.)

The history of this overall set of documents and their authors'
doggedness in attempting to achieve publication as an RFC
(which is an entirely reasonable thing for authors to do) would
seem to indicate that we ought carefully consider if we're
collectively (IETF+ISE+RFCed) sending a message that all one
has to do is keep asking and you can get any bad idea out as
an RFC. I think we do not want that perception to spread.

    [1] https://www.ietf.org/rfcdiff?url1=draft-williams-exp-tcp-host-id-opt-05&url2=draft-williams-exp-tcp-host-id-opt-07
2015-12-03
01 Stephen Farrell [Ballot Position Update] New position, Discuss, has been recorded for Stephen Farrell
2015-12-02
01 Alissa Cooper
[Ballot discuss]
I'm not really sure how this is supposed to work when we change conflict review responses, so forgive me if I've balloted incorrectly …
[Ballot discuss]
I'm not really sure how this is supposed to work when we change conflict review responses, so forgive me if I've balloted incorrectly given my comments below. Basically I don't think the document has fully resolved the issues raised in the previous conflict review. But I'm not arguing that the document conflicts with work in TCPM.

I think the way that this spec justifies the design decisions that may allow the HOST_ID option to be used for pervasive monitoring can be summarized as: the option merely puts back in host identification information that a middlebox otherwise would have stripped out. I don't think this is really satisfactory. RFC 7258 doesn't say that we will work to ensure that pervasive monitoring remains only as easy or hard as it was before the deployment of CGNs or application proxies. It says that we will work to mitigate pervasive monitoring. So from the perspective of mitigating PM, the loss of unique host identification on the egress side of address-sharing devices is a virtue.

Of course, the motivations for re-introducing host uniqueness are well-documented. But this draft doesn't link the specification of the option to those motivations in a way that provides the justification that RFC 7258 requires, IMO. In particular, the document allows for the HOST_ID to contain an IP address or subnet, optionally together with a TCP port number. Under some circumstances using the option in these ways leaks information that allows for correlating the activities of the host more broadly than if the option were not used -- e.g., if an application proxy uses the option in this way, then the host traffic on the egress side of the proxy can be newly correlated with the host's traffic that does not pass through the proxy. If instead the proxy used a random, locally unique ID in the option, this type of correlation would not be re-introduced. So why should the option support embedding an IP address and TCP port, if all it needs to provide is local uniqueness for the hosts sharing the public address? Doesn't an opaque locally unique ID suffice for the three use cases listed in the document?
2015-12-02
01 Alissa Cooper [Ballot Position Update] New position, Discuss, has been recorded for Alissa Cooper
2015-12-02
01 Terry Manderson [Ballot Position Update] New position, No Objection, has been recorded for Terry Manderson
2015-12-02
01 Alia Atlas
[Ballot comment]
I strongly agree with both Ben and Kathleen.
The abstract reads as if the IETF has reached a consensus position,
which is not …
[Ballot comment]
I strongly agree with both Ben and Kathleen.
The abstract reads as if the IETF has reached a consensus position,
which is not appropriate for an ISE document.
2015-12-02
01 Alia Atlas [Ballot Position Update] New position, No Objection, has been recorded for Alia Atlas
2015-12-02
01 Kathleen Moriarty
[Ballot comment]
I agree with Ben's point, especially in light of the described use cases.  Although this is just documenting what happens, it would be …
[Ballot comment]
I agree with Ben's point, especially in light of the described use cases.  Although this is just documenting what happens, it would be best if this does not sound like an endorsement of these practices.
2015-12-02
01 Kathleen Moriarty [Ballot Position Update] New position, No Objection, has been recorded for Kathleen Moriarty
2015-12-02
01 Ben Campbell
[Ballot comment]
I'd prefer the abstract to read less like an IETF endorsement of identifying hosts behind NATs. (But not so strongly to block things, …
[Ballot comment]
I'd prefer the abstract to read less like an IETF endorsement of identifying hosts behind NATs. (But not so strongly to block things, given the updates.)
2015-12-02
01 Ben Campbell [Ballot Position Update] New position, No Objection, has been recorded for Ben Campbell
2015-12-02
01 Deborah Brungard [Ballot Position Update] New position, No Objection, has been recorded for Deborah Brungard
2015-12-02
01 Benoît Claise [Ballot Position Update] New position, No Objection, has been recorded for Benoit Claise
2015-12-01
01 Barry Leiba [Ballot Position Update] New position, No Objection, has been recorded for Barry Leiba
2015-12-01
01 Martin Stiemerling
[Ballot comment]
The authors have added text in Section 8.  Pervasive Monitoring Considerations that addresses aspects of RFC 7258. Plus added statements about what …
[Ballot comment]
The authors have added text in Section 8.  Pervasive Monitoring Considerations that addresses aspects of RFC 7258. Plus added statements about what of what not should be used in the HOST_ID part.
2015-12-01
01 Martin Stiemerling Ballot comment text updated for Martin Stiemerling
2015-12-01
01 Martin Stiemerling
[Ballot comment]
The authors have added text in Section 8.  Pervasive Monitoring Considerations that addresses RFC 7258. Plus added statements about what of what …
[Ballot comment]
The authors have added text in Section 8.  Pervasive Monitoring Considerations that addresses RFC 7258. Plus added statements about what of what not should be used in the HOST_ID part.
2015-12-01
01 Martin Stiemerling [Ballot Position Update] New position, Yes, has been recorded for Martin Stiemerling
2015-12-01
01 Martin Stiemerling New version available: conflict-review-williams-exp-tcp-host-id-opt-01.txt
2015-12-01
00 Cindy Morgan Created "Approve" ballot
2015-12-01
00 Cindy Morgan Conflict Review State changed to IESG Evaluation from AD Review
2015-11-17
00 Martin Stiemerling Telechat date has been changed to 2015-12-03 from 2015-11-19
2015-11-17
00 Martin Stiemerling Conflict Review State changed to AD Review from Needs Shepherd
2015-11-12
00 Cindy Morgan Telechat date has been changed to 2015-11-19 from 2015-05-28
2015-11-12
00 Cindy Morgan Conflict Review State changed to Needs Shepherd from Approved Request to Not Publish - announcement sent
2015-11-12
00 Cindy Morgan
Hi IESG folk:

This draft had its 5742 conflict review a while back, it raised
concerns for IESG. With that feedback, it's authors have revised …
Hi IESG folk:

This draft had its 5742 conflict review a while back, it raised
concerns for IESG. With that feedback, it's authors have revised
it to address those concerns, so now I'd like IESG to take another
look at it, please.

Cheers, Nevil

--
Nevil Brownlee (ISE), rfc-ise@rfc-editor.org
2015-06-01
00 Amy Vezza
The following approval message was sent
From: The IESG
To: "Nevil Brownlee" , draft-williams-exp-tcp-host-id-opt@ietf.org
Cc: The IESG , , 
Subject: Results of IETF-conflict review for …
The following approval message was sent
From: The IESG
To: "Nevil Brownlee" , draft-williams-exp-tcp-host-id-opt@ietf.org
Cc: The IESG , , 
Subject: Results of IETF-conflict review for draft-williams-exp-tcp-host-id-opt-05

The IESG has completed a review of draft-williams-exp-tcp-host-id-opt-05
consistent with RFC5742.


The IESG recommends that 'Experimental Option for TCP Host
Identification'  NOT be
published as an Experimental RFC.


The IESG has concluded that this document violates IETF procedures about
pervasive monitoring (RFC 7258) and should therefore not be published
without IETF review and IESG approval. This work is related to IETF work
done in the INTAREA WG.


The IESG would also like the RFC-Editor to review the comments in the
datatracker related to this document and determine whether or not they
merit incorporation into the document. Comments may exist in both the
ballot and the history log.

The IESG review is documented at:
https://datatracker.ietf.org/doc/conflict-review-williams-exp-tcp-host-id-opt/

A URL of the reviewed Internet Draft is:
https://datatracker.ietf.org/doc/draft-williams-exp-tcp-host-id-opt/

The process for such documents is described at
https://www.rfc-editor.org/indsubs.html

Thank you,

The IESG Secretary



2015-06-01
00 Amy Vezza IESG has approved the conflict review response
2015-06-01
00 Amy Vezza Closed "Approve" ballot
2015-06-01
00 Amy Vezza Conflict Review State changed to Approved Request to Not Publish - announcement sent from Approved Request to Not Publish - announcement to be sent
2015-05-28
00 Amy Vezza Conflict Review State changed to Approved Request to Not Publish - announcement to be sent from IESG Evaluation
2015-05-28
00 Benoît Claise [Ballot Position Update] New position, No Objection, has been recorded for Benoit Claise
2015-05-28
00 Alia Atlas [Ballot Position Update] New position, Yes, has been recorded for Alia Atlas
2015-05-28
00 Kathleen Moriarty [Ballot Position Update] New position, Yes, has been recorded for Kathleen Moriarty
2015-05-28
00 Spencer Dawkins [Ballot Position Update] New position, No Objection, has been recorded for Spencer Dawkins
2015-05-28
00 Jari Arkko [Ballot Position Update] New position, No Objection, has been recorded for Jari Arkko
2015-05-27
00 Alvaro Retana [Ballot Position Update] New position, Yes, has been recorded for Alvaro Retana
2015-05-27
00 Ben Campbell [Ballot Position Update] New position, Yes, has been recorded for Ben Campbell
2015-05-27
00 Barry Leiba
[Ballot comment]
I absolutely agree that a protocol -- even an experimental one -- that facilitates identification of individual hosts behind a NAT should go …
[Ballot comment]
I absolutely agree that a protocol -- even an experimental one -- that facilitates identification of individual hosts behind a NAT should go through the IETF consensus process.
2015-05-27
00 Barry Leiba [Ballot Position Update] New position, Yes, has been recorded for Barry Leiba
2015-05-27
00 Deborah Brungard [Ballot Position Update] New position, No Objection, has been recorded for Deborah Brungard
2015-05-27
00 Brian Haberman [Ballot Position Update] New position, Yes, has been recorded for Brian Haberman
2015-05-27
00 Martin Stiemerling
[Ballot comment]
Here are comments for the ISE to consider:

- The abstract says it in the first sentence:
"Recent IETF proposals have identified benefits …
[Ballot comment]
Here are comments for the ISE to consider:

- The abstract says it in the first sentence:
"Recent IETF proposals have identified benefits to more distinctly"

This sentence is trying to make a statement into the direction that the IETF is endorsing host identification. This is not true and therefore this sentence must be removed or changed in wording. Probably the authors mean: "Recent  proposals  discussed in the IETF have identified benefits to more distinctly..."

- Further, this draft is arguing in favor of letting middleboxes adding the proposed TCP option. This is problematic for multiple issues, such as adding a TCP option will very likely cause packets to grow beyond the path MTU and TCP option space is limited and extensively used already by TCP options added by the end hosts. The draft acknowledges both issues and discusses them briefly.
However, it is clear by now that the TCP option space is almost used by modern TCP implementations to signal the properties of a TCP connection (especially with MPTCP). Adding another option will be potentially not possible, unless such a middlebox is going to remove an option that has been added by an end host.

- Section 4.2.2 is discussing problematic issues when persistent TCP connections are used which are used by multiple application sessions at the same time. The text gives recommendations, but the recommendations will end up in a very complex, error prone setup, where potentially user traffic is being miss-classified. E.g. in the case the middlebox is sending nonetheless traffic of multiple users over the same TCP connection.

- Section 4.3, page 10, limits the use of host_ids to middlebox only. The mechanism 1 (stripping off others host_id) options will not let arbitrary TCP end points to use this option for their own use. This falls in the same category as usually discussed that adding options in the data path will end up with removing options inserted by end hosts.

- Section 4.4 disucsses that the order of multiple HOST_IDs cannot be guaranteed in the transit. However, it makes the recommendation to just concatenate any appearance of multiple HOST_IDs and use the concatenated value as the HOST_ID. How does this ensure that there are no two HOST_ID by different TCP connections that collide? It basically does not ensure this.

- Section 7:
- NATs do not provide any form of privacy, as there so many other mechanisms to determine the user of a data flow.
- This section is not discussing the real security impacts, e.g., what is the result if any device is forging the information in the HOST_ID? Or can this be used to breach privacy of users, because a stable identifier is used across TCP sessions and applications?
2015-05-27
00 Martin Stiemerling Ballot comment text updated for Martin Stiemerling
2015-05-27
00 Stephen Farrell [Ballot comment]
Fully agree with the DNP response and Martin's comments.
2015-05-27
00 Stephen Farrell Ballot comment text updated for Stephen Farrell
2015-05-27
00 Stephen Farrell [Ballot Position Update] New position, Yes, has been recorded for Stephen Farrell
2015-05-26
00 Martin Stiemerling
[Ballot comment]
Here are comments for the ISE to consider:

- The abstract says it in the first sentence:
"Recent IETF proposals have identified benefits …
[Ballot comment]
Here are comments for the ISE to consider:

- The abstract says it in the first sentence:
"Recent IETF proposals have identified benefits to more distinctly"

This sentence is trying to make a statement into the direction that the IETF is endorsing host identification. This is not true and therefore this sentence must be removed or changed in wording. Probably the authors mean: "Recent  proposals  discussed in the IETF have identified benefits to more distinctly..."

- Further, this draft is arguing in favor of letting middleboxes adding the proposed TCP option. This is problematic for multiple issues, such as adding a TCP option will very likely cause packets to grow beyond the path MTU and TCP option space is limited and extensively used already by TCP options added by the end hosts. The draft acknowledges both issues and discusses them briefly.
However, it is clear by now that the TCP option space is almost used by modern TCP implementations to signal the properties of a TCP connection (especially with MPTCP). Adding another option will be potentially not possible, unless such a middlebox is going to remove an option that has been added by an end host.

- Section 4.2.2 is discussing a problematic issues when persistent TCP connections are used which are used by multiple application sessions at the same time. The text gives recommendations, but the recommendations will end up in a very complex, error prone setup, where potentially user traffic is being miss-classified. E.g. in the case the middlebox is sending nonetheless traffic of multiple users over the same TCP connection.

- Section 4.3, page 10, limits the use of host_ids to middlebox only. The mechanism 1 (stripping off others host_id) options will not let arbitrary TCP end points to use this option for their own use. This falls in the same category as usually discussed that adding options in the data path will end up with removing options inserted by end hosts.

- Section 4.4 disucsses that the order of multiple HOST_IDs cannot be guaranteed in the transit. However, it makes the recommendation to just concatenate any appearance of multiple HOST_IDs and use the concatenated value as the HOST_ID. How does this ensure that there are no two HOST_ID by different TCP connections that collide? It basically does not ensure this.

- Section 7:
- NATs do not provide any form of privacy, as there so many other mechanisms to determine the user of a data flow.
- This section is not discussing the real security impacts, e.g., what is the result if any device is forging the information in the HOST_ID? Or can this be used to breach privacy of users, because a stable identifier is used across TCP sessions and applications?
2015-05-26
00 Martin Stiemerling Ballot comment text updated for Martin Stiemerling
2015-05-26
00 Martin Stiemerling [Ballot Position Update] New position, Yes, has been recorded for Martin Stiemerling
2015-05-26
00 Martin Stiemerling Created "Approve" ballot
2015-05-26
00 Martin Stiemerling Conflict Review State changed to IESG Evaluation from AD Review
2015-05-26
00 Martin Stiemerling New version available: conflict-review-williams-exp-tcp-host-id-opt-00.txt
2015-05-06
00 Martin Stiemerling Telechat date has been changed to 2015-05-28 from 2015-05-14
2015-05-06
00 Martin Stiemerling Conflict Review State changed to AD Review from Needs Shepherd
2015-05-06
00 Martin Stiemerling Shepherding AD changed to Martin Stiemerling
2015-05-04
00 Cindy Morgan Placed on agenda for telechat - 2015-05-14
2015-05-04
00 Nevil Brownlee IETF conflict review requested