Guidelines for Choosing RTP Control Protocol (RTCP) Canonical Names (CNAMEs)
draft-ietf-avtcore-6222bis-06
Revision differences
Document history
Date | Rev. | By | Action |
---|---|---|---|
2013-08-29
|
06 | (System) | RFC Editor state changed to AUTH48-DONE from AUTH48 |
2013-08-13
|
06 | Magnus Westerlund | Waiting for some authors to complete AUTH48. |
2013-08-13
|
06 | Magnus Westerlund | Annotation tag Other - see Comment Log set. |
2013-08-05
|
06 | (System) | RFC Editor state changed to AUTH48 from RFC-EDITOR |
2013-08-05
|
06 | (System) | RFC Editor state changed to RFC-EDITOR from EDIT |
2013-07-17
|
06 | (System) | IANA Action state changed to No IC from In Progress |
2013-07-17
|
06 | (System) | IANA Action state changed to In Progress |
2013-07-17
|
06 | Amy Vezza | State changed to RFC Ed Queue from Approved-announcement sent |
2013-07-17
|
06 | (System) | RFC Editor state changed to EDIT |
2013-07-17
|
06 | (System) | Announcement was received by RFC Editor |
2013-07-17
|
06 | Amy Vezza | State changed to Approved-announcement sent from Approved-announcement to be sent |
2013-07-17
|
06 | Amy Vezza | IESG has approved the document |
2013-07-17
|
06 | Amy Vezza | Closed "Approve" ballot |
2013-07-17
|
06 | Amy Vezza | Ballot approval text was generated |
2013-07-17
|
06 | Amy Vezza | State changed to Approved-announcement to be sent from IESG Evaluation::AD Followup |
2013-07-17
|
06 | Amy Vezza | Ballot writeup was changed |
2013-07-14
|
06 | Ali Begen | New version available: draft-ietf-avtcore-6222bis-06.txt |
2013-07-08
|
05 | Ali Begen | IANA Review state changed to Version Changed - Review Needed from IANA OK - No Actions Needed |
2013-07-08
|
05 | Ali Begen | New version available: draft-ietf-avtcore-6222bis-05.txt |
2013-06-27
|
04 | Ted Lemon | [Ballot comment] The discussion of third-party monitoring in 4.1 is uncomfortable. It seems to be encouraging application developers to add hooks to make third-party monitoring … [Ballot comment] The discussion of third-party monitoring in 4.1 is uncomfortable. It seems to be encouraging application developers to add hooks to make third-party monitoring easier, which would be great if we thought that this was only going to be used for performance measurement. But of course it can also be used for tracking endpoints through a firewall, or in the presence of temporary IP addresses. It's hard to see how this text adds value. What was the working group's motivation for including this text? In 4.2, regarding short-term persistent RTCP names, the document says "In either case, the procedure is performed once per initialization of the software," which contradicts the point made in 4.1 about the purpose of these short-term persistent identifiers and the advice that they are not needed for unrelated streams. It seems to me that you could make this better by saying "at least once" to allow for the possibility that they would cycle more frequently. The following was a DISCUSS. Based on Dan Wing's agreement to remove the recommendation to use MAC addresses (see email), I am clearing the DISCUSS. The above comments have not, as far as I know, been addressed, but were not intended to be blocking. Using the MAC address of the device for short-term persistent identifiers seems like a privacy problem. 6.2 speaks to this point, but the proposed mitigation assumes that the problem is that an eavesdropper would gain information about the identity of the endpoint using the persistent identifier. In fact, the more likely problem is that the other endpoint would gain that information. I am not the IESG expert on privacy, so I may be making more out of this than is warranted, but I'd really like to see some additional review of the privacy implications of this before it goes out. I assume such review has not occurred because I see no mention of this issue in the security considerations section. Please let me know if I am mistaken. You could clear this DISCUSS either by not using the MAC address, by explaining the working group's rationale for why this isn't a problem in a way that is convincing, or by getting someone with more expertise on the subject than I to review it and explain why it isn't an issue, or by implementing whatever mitigation they suggest. To be honest, given the set of names I see as authors of this document, I assume I am missing something, so please don't hesitate to point out what that is. |
2013-06-27
|
04 | Ted Lemon | [Ballot Position Update] Position for Ted Lemon has been changed to No Objection from Discuss |
2013-06-27
|
04 | Cindy Morgan | State changed to IESG Evaluation::AD Followup from IESG Evaluation |
2013-06-27
|
04 | Benoît Claise | [Ballot comment] Let me double-check something regarding the CNAME length "To locally produce a unique identifier, we simply generate a cryptographically pseudorandom value … [Ballot comment] Let me double-check something regarding the CNAME length "To locally produce a unique identifier, we simply generate a cryptographically pseudorandom value as described in [RFC4086]. This value MUST be at least 96 bits but MAY be longer." What is the max length? While quickly browsing through RFC 3550, I could not find it. Why is this important? For management: if we need to access the information via a MIB, NETCONF, IPFIX, ... we need the max length. I was unable to tell 1. what is the max CNAME length? 2. if the CNAME max length changed compared to RFC 3550 btw, "we" in IETF specifications is not ideal. Editorial: In Section 6.5.1 of the RTP specification, [RFC3550], there are a number of recommendations for choosing a unique RTCP CNAME for an RTP endpoint. The first link "Section 6.5.1" is wrong. It goes to RFC 6222 |
2013-06-27
|
04 | Benoît Claise | [Ballot Position Update] New position, No Objection, has been recorded for Benoit Claise |
2013-06-27
|
04 | Gonzalo Camarillo | [Ballot Position Update] New position, No Objection, has been recorded for Gonzalo Camarillo |
2013-06-26
|
04 | Ted Lemon | [Ballot discuss] Using the MAC address of the device for short-term persistent identifiers seems like a privacy problem. 6.2 speaks to this point, but the … [Ballot discuss] Using the MAC address of the device for short-term persistent identifiers seems like a privacy problem. 6.2 speaks to this point, but the proposed mitigation assumes that the problem is that an eavesdropper would gain information about the identity of the endpoint using the persistent identifier. In fact, the more likely problem is that the other endpoint would gain that information. I am not the IESG expert on privacy, so I may be making more out of this than is warranted, but I'd really like to see some additional review of the privacy implications of this before it goes out. I assume such review has not occurred because I see no mention of this issue in the security considerations section. Please let me know if I am mistaken. You could clear this DISCUSS either by not using the MAC address, by explaining the working group's rationale for why this isn't a problem in a way that is convincing, or by getting someone with more expertise on the subject than I to review it and explain why it isn't an issue, or by implementing whatever mitigation they suggest. To be honest, given the set of names I see as authors of this document, I assume I am missing something, so please don't hesitate to point out what that is. |
2013-06-26
|
04 | Ted Lemon | [Ballot comment] The discussion of third-party monitoring in 4.1 is uncomfortable. It seems to be encouraging application developers to add hooks to make third-party monitoring … [Ballot comment] The discussion of third-party monitoring in 4.1 is uncomfortable. It seems to be encouraging application developers to add hooks to make third-party monitoring easier, which would be great if we thought that this was only going to be used for performance measurement. But of course it can also be used for tracking endpoints through a firewall, or in the presence of temporary IP addresses. It's hard to see how this text adds value. What was the working group's motivation for including this text? In 4.2, regarding short-term persistent RTCP names, the document says "In either case, the procedure is performed once per initialization of the software," which contradicts the point made in 4.1 about the purpose of these short-term persistent identifiers and the advice that they are not needed for unrelated streams. It seems to me that you could make this better by saying "at least once" to allow for the possibility that they would cycle more frequently. |
2013-06-26
|
04 | Ted Lemon | [Ballot Position Update] New position, Discuss, has been recorded for Ted Lemon |
2013-06-26
|
04 | Adrian Farrel | [Ballot comment] Like Stewart, I am a little surprised that the algorithm described here is probablistic given that the failure of a previous solution to … [Ballot comment] Like Stewart, I am a little surprised that the algorithm described here is probablistic given that the failure of a previous solution to guarantee uniqueness is cited as a major motivation for this work. Given the contradiction implicit in "probably unique", I think that this document should refresh the readers' minds (even if only by reference) about the consequences of non-unique choice and how such situations are resolved. For example, if the consequence is that there is an extra protocol exchange to force resolution, then that is one thing. But if the protocol will completely fail to work, that is something quite different. But I have no objection to the publication of this document. |
2013-06-26
|
04 | Adrian Farrel | [Ballot Position Update] New position, No Objection, has been recorded for Adrian Farrel |
2013-06-25
|
04 | Pete Resnick | [Ballot Position Update] New position, No Objection, has been recorded for Pete Resnick |
2013-06-25
|
04 | Sean Turner | [Ballot Position Update] New position, No Objection, has been recorded for Sean Turner |
2013-06-25
|
04 | Martin Stiemerling | [Ballot Position Update] New position, No Objection, has been recorded for Martin Stiemerling |
2013-06-25
|
04 | Jari Arkko | [Ballot Position Update] New position, No Objection, has been recorded for Jari Arkko |
2013-06-24
|
04 | Stewart Bryant | [Ballot comment] I have no objection to this being published, but I am slightly disappointed that the proposal is for a probabilistic scheme rather than … [Ballot comment] I have no objection to this being published, but I am slightly disappointed that the proposal is for a probabilistic scheme rather than a deterministic scheme, which surely must be feasible. |
2013-06-24
|
04 | Stewart Bryant | [Ballot Position Update] New position, No Objection, has been recorded for Stewart Bryant |
2013-06-23
|
04 | Stephen Farrell | [Ballot comment] - 6552 updates 3550, does this also? I'm just wondering if the "updated by" metadata for 3550 will be preserved or mucked up … [Ballot comment] - 6552 updates 3550, does this also? I'm just wondering if the "updated by" metadata for 3550 will be preserved or mucked up or what. (Others may know all this, but I don't:-) - 4.2, 2nd bullet: just a query - is there any need to consider base64url encoding here? If so it'd be good to mention since its often a bit of a mess if discovered later. (I've no idea if these names might be sent in URLs or web forms.) - CNAME is a DNS term of art, and the DNS term is perhaps the more widely known. I think it'd be good to distinguish those if that's not already done elsewhere. - For privacy reasons, changing CNAMEs is a fine plan. However, an equally fine plan might be to chose a CNAME from a small set so that transport problems are unlikely but the identifying precision of the value is minimial. Was this option considered? (To make it concerete just to help answer the question, say if N unique values were enough to ensure the probability of a transport problem could be ignored then why not just pick a random number between 1 and N, for the smallest acceptable N?) |
2013-06-23
|
04 | Stephen Farrell | [Ballot Position Update] New position, No Objection, has been recorded for Stephen Farrell |
2013-06-21
|
04 | Cindy Morgan | Note field has been cleared |
2013-06-21
|
04 | Spencer Dawkins | [Ballot comment] I'm a Yes, but did have a couple of comments for the authors. Please consider them, along with other comments you may receive. … [Ballot comment] I'm a Yes, but did have a couple of comments for the authors. Please consider them, along with other comments you may receive. For those oi us who aren't wizards at security but might still end up implementing this revised algorithm ... in 1. Introduction For a discussion on the linkability of RTCP CNAMES produced by [RFC6222], refer to [I-D.rescorla-avtcore-random-cname]. I thought that reference to the draft was pretty important, but https://datatracker.ietf.org/doc/draft-rescorla-avtcore-random-cname/ is currently expired. I know the reference is listed as Informational, so you won't be stuck in REF-HOLD, but I found the discussion of the linking problem to be short, clear and compelling (where "compelling" means you can tell your boss "If we don't update our implementation, people may die"). If the referenced draft really is stalled, perhaps you could include something like the referenced draft's section 2.1 text (with attribution)? In 3. Deficiencies with Earlier Guidelines for Choosing an RTCP CNAME This document replaces the use of FQDN as an RTCP CNAME by alternative mechanisms. Not to be pedantic, but the same text is in RFC 6222 :-) Perhaps it needs to be updated for the current draft, to point to RFC 6222? |
2013-06-21
|
04 | Spencer Dawkins | [Ballot Position Update] New position, Yes, has been recorded for Spencer Dawkins |
2013-06-21
|
04 | Barry Leiba | [Ballot Position Update] New position, No Objection, has been recorded for Barry Leiba |
2013-06-21
|
04 | Barry Leiba | Changed document writeup |
2013-06-21
|
04 | (System) | IANA Review state changed to IANA OK - No Actions Needed from Version Changed - Review Needed |
2013-06-21
|
04 | (System) | IANA Review state changed to Version Changed - Review Needed from IANA OK - No Actions Needed |
2013-06-21
|
04 | Richard Barnes | State changed to IESG Evaluation from Waiting for AD Go-Ahead |
2013-06-21
|
04 | Richard Barnes | Ballot has been issued |
2013-06-21
|
04 | Richard Barnes | [Ballot Position Update] New position, Yes, has been recorded for Richard Barnes |
2013-06-21
|
04 | Richard Barnes | Created "Approve" ballot |
2013-06-21
|
04 | Richard Barnes | Placed on agenda for telechat - 2013-06-27 |
2013-06-21
|
04 | Richard Barnes | Ballot writeup was changed |
2013-06-19
|
04 | Ali Begen | IANA Review state changed to Version Changed - Review Needed from IANA OK - No Actions Needed |
2013-06-19
|
04 | Ali Begen | New version available: draft-ietf-avtcore-6222bis-04.txt |
2013-06-13
|
03 | Tero Kivinen | Request for Last Call review by SECDIR Completed: Has Nits. Reviewer: Magnus Nystrom. |
2013-06-12
|
03 | Christer Holmberg | Request for Last Call review by GENART Completed: Ready. Reviewer: Christer Holmberg. |
2013-06-11
|
03 | (System) | State changed to Waiting for AD Go-Ahead from In Last Call |
2013-05-30
|
03 | Jean Mahoney | Request for Last Call review by GENART is assigned to Christer Holmberg |
2013-05-30
|
03 | Jean Mahoney | Request for Last Call review by GENART is assigned to Christer Holmberg |
2013-05-30
|
03 | Tero Kivinen | Request for Last Call review by SECDIR is assigned to Magnus Nystrom |
2013-05-30
|
03 | Tero Kivinen | Request for Last Call review by SECDIR is assigned to Magnus Nystrom |
2013-05-29
|
03 | (System) | IANA Review state changed to IANA OK - No Actions Needed from IANA - Review Needed |
2013-05-29
|
03 | Amanda Baber | IESG/Authors/WG Chairs: IANA has reviewed draft-ietf-avtcore-6222bis-03, which is currently in Last Call, and has the following comments: We understand that this document doesn't require … IESG/Authors/WG Chairs: IANA has reviewed draft-ietf-avtcore-6222bis-03, which is currently in Last Call, and has the following comments: We understand that this document doesn't require any IANA actions. If this assessment is not accurate, please respond as soon as possible. |
2013-05-28
|
03 | Amy Vezza | IANA Review state changed to IANA - Review Needed |
2013-05-28
|
03 | Amy Vezza | The following Last Call announcement was sent out: From: The IESG To: IETF-Announce CC: Reply-To: ietf@ietf.org Sender: Subject: Last Call: (Guidelines for Choosing RTP Control … The following Last Call announcement was sent out: From: The IESG To: IETF-Announce CC: Reply-To: ietf@ietf.org Sender: Subject: Last Call: (Guidelines for Choosing RTP Control Protocol (RTCP) Canonical Names (CNAMEs)) to Proposed Standard The IESG has received a request from the Audio/Video Transport Core Maintenance WG (avtcore) to consider the following document: - 'Guidelines for Choosing RTP Control Protocol (RTCP) Canonical Names (CNAMEs)' as Proposed Standard The IESG plans to make a decision in the next few weeks, and solicits final comments on this action. Please send substantive comments to the ietf@ietf.org mailing lists by 2013-06-11. Exceptionally, comments may be sent to iesg@ietf.org instead. In either case, please retain the beginning of the Subject line to allow automated sorting. Abstract The RTP Control Protocol (RTCP) Canonical Name (CNAME) is a persistent transport-level identifier for an RTP endpoint. While the Synchronization Source (SSRC) identifier of an RTP endpoint may change if a collision is detected or when the RTP application is restarted, its RTCP CNAME is meant to stay unchanged, so that RTP endpoints can be uniquely identified and associated with their RTP media streams. For proper functionality, RTCP CNAMEs should be unique within the participants of an RTP session. However, the existing guidelines for choosing the RTCP CNAME provided in the RTP standard are insufficient to achieve this uniqueness. RFC 6222 was published to update those guidelines to allow endpoints to choose unique RTCP CNAMEs. Unfortunately, later investigations showed that some parts of the new algorithms were unnecessarily complicated and/or ineffective. This document addresses these concerns and replaces RFC 6222. The file can be obtained via http://datatracker.ietf.org/doc/draft-ietf-avtcore-6222bis/ IESG discussion can be tracked via http://datatracker.ietf.org/doc/draft-ietf-avtcore-6222bis/ballot/ No IPR declarations have been submitted directly on this I-D. |
2013-05-28
|
03 | Amy Vezza | State changed to In Last Call from Last Call Requested |
2013-05-28
|
03 | Richard Barnes | Last call was requested |
2013-05-28
|
03 | Richard Barnes | Ballot approval text was generated |
2013-05-28
|
03 | Richard Barnes | State changed to Last Call Requested from Publication Requested |
2013-05-28
|
03 | Richard Barnes | Last call announcement was generated |
2013-05-28
|
03 | Richard Barnes | Last call announcement was generated |
2013-05-28
|
03 | Richard Barnes | Ballot writeup was generated |
2013-05-07
|
03 | Cindy Morgan | Writeup for draft-ietf-avtcore-6222bis-03 (1) What type of RFC is being requested (BCP, Proposed Standard, Internet Standard, Informational, Experimental, or Historic)? Why is this the proper … Writeup for draft-ietf-avtcore-6222bis-03 (1) What type of RFC is being requested (BCP, Proposed Standard, Internet Standard, Informational, Experimental, or Historic)? Why is this the proper type of RFC? Is this type of RFC indicated in the title page header? This is request to be published as a proposed standard. This is the appropriate type as it replaces the existing proposed standard in RFC 6222. Which also was appropriate as this specifies a protocol functionality. (2) The IESG approval announcement includes a Document Announcement Write-Up. Please provide such a Document Announcement Write-Up. Recent examples can be found in the "Action" announcements for approved documents. The approval announcement contains the following sections: Technical Summary The RTP Control Protocol (RTCP) Canonical Name (CNAME) is a persistent transport-level identifier for an RTP endpoint. While the Synchronization Source (SSRC) identifier of an RTP endpoint may change if a collision is detected or when the RTP application is restarted, its RTCP CNAME is meant to stay unchanged, so that RTP endpoints can be uniquely identified and associated with their RTP media streams. For proper functionality, RTCP CNAMEs should be unique within the participants of an RTP session. However, the existing guidelines for choosing the RTCP CNAME provided in the RTP standard are insufficient to achieve this uniqueness. RFC 6222 was published to update those guidelines to allow endpoints to choose unique RTCP CNAMEs. Unfortunately, later investigations showed that some parts of the new algorithms were unnecessarily complicated and/or ineffective. This document addresses these concerns and replaces RFC 6222. Working Group Summary The requirements for this replacement of RFC 6222 came from RTCWEB WG, which identified the linkability and privacy issue of the previous random method. There was strong WG consensus to address this issue. The method of addressing it, using a cryptographic random number generator, was obvious. The main concern in WG last call has been around the clarity of the motivation for the update. Document Quality The Shepherd assumes that this will see significant implementation, especially initially in any WebRTC implementations. The document has gotten a fair amount of reviews in the WG last call. Personnel Magnus Westerlund is the Document Shepherd. Richard Barnes is the Responsible Area Director. (3) Briefly describe the review of this document that was performed by the Document Shepherd. If this version of the document is not ready for publication, please explain why the document is being forwarded to the IESG. The Shepherd has reviewed the document in WG last call and tracked the changes afterwards. For the writeup the chair has reviewed the draft again for each item in the I-D checklist. (4) Does the document Shepherd have any concerns about the depth or breadth of the reviews that have been performed? At the originally stated WG last call dead-line the number of reviews where less than minimal. After some prodding a bit more reviews where received. Sufficient to make the shepherd comfortable with publishing this replacement. (5) Do portions of the document need review from a particular or from broader perspective, e.g., security, operational complexity, AAA, DNS, DHCP, XML, or internationalization? If so, describe the review that took place. No, if anything it would be to verify that the security goals has been meet. That appears clear from the shepherd's point of view so no additional review has been requeted. The Shepherd assumes a sec-dir review will happen to further verify that nothing obvious has been missed. (6) Describe any specific concerns or issues that the Document Shepherd has with this document that the Responsible Area Director and/or the IESG should be aware of? For example, perhaps he or she is uncomfortable with certain parts of the document, or has concerns whether there really is a need for it. In any event, if the WG has discussed those issues and has indicated that it still wishes to advance the document, detail those concerns here. No concerns. (7) Has each author confirmed that any and all appropriate IPR disclosures required for full conformance with the provisions of BCP 78 and BCP 79 have already been filed. If not, explain why. All authors have confirmed that they are in conformance. (8) Has an IPR disclosure been filed that references this document? If so, summarize any WG discussion and conclusion regarding the IPR disclosures. No IPR disclosure was present in the database on the 2013-04-24. (9) How solid is the WG consensus behind this document? Does it represent the strong concurrence of a few individuals, with others being silent, or does the WG as a whole understand and agree with it? Their is a fairly wide agreement on doing this update. The people who reviewed or contributed to the details are much more some few individuals. (10) Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarise the areas of conflict in separate email messages to the Responsible Area Director. (It should be in a separate email because this questionnaire is publicly available.) No. (11) Identify any ID nits the Document Shepherd has found in this document. (See http://www.ietf.org/tools/idnits/ and the Internet-Drafts Checklist). Boilerplate checks are not enough; this check needs to be thorough. No ID nits found. (12) Describe how the document meets any required formal review criteria, such as the MIB Doctor, media type, and URI type reviews. No such review has been deemed necessary. (13) Have all references within this document been identified as either normative or informative? Yes. One of the informative references [I-D.rescorla-avtcore-random-cname] was a motivation for doing this work, and is not intended to be published. (14) Are there normative references to documents that are not ready for advancement or are otherwise in an unclear state? If such normative references exist, what is the plan for their completion? No. (15) Are there downward normative references references (see RFC 3967)? If so, list these downward references to support the Area Director in the Last Call procedure. No. (16) Will publication of this document change the status of any existing RFCs? Are those RFCs listed on the title page header, listed in the abstract, and discussed in the introduction? If the RFCs are not listed in the Abstract and Introduction, explain why, and point to the part of the document where the relationship of this document to the other RFCs is discussed. If this information is not in the document, explain why the WG considers it unnecessary. Yes, this will obsolete RFC 6222. That is noted in header, abstract and introduction. (17) Describe the Document Shepherd's review of the IANA considerations section, especially with regard to its consistency with the body of the document. Confirm that all protocol extensions that the document makes are associated with the appropriate reservations in IANA registries. Confirm that any referenced IANA registries have been clearly identified. Confirm that newly created IANA registries include a detailed specification of the initial contents for the registry, that allocations procedures for future registrations are defined, and a reasonable name for the new registry has been suggested (see RFC 5226). This document updates possible ways of generating CNAMES. As they are source only options and opaque strings for any receiver their are no need to register them. Thus no IANA action necesary as noted by IANA consideration section. (18) List any new IANA registries that require Expert Review for future allocations. Provide any public guidance that the IESG would find useful in selecting the IANA Experts for these new registries. No entries. (19) Describe reviews and automated checks performed by the Document Shepherd to validate sections of the document written in a formal language, such as XML code, BNF rules, MIB definitions, etc. ID-Nits, but no ther formal languages present. |
2013-05-07
|
03 | Cindy Morgan | Note added 'Magnus Westerlund (magnus.westerlund@ericsson.com) is the Document Shepherd. ' |
2013-05-07
|
03 | Cindy Morgan | Intended Status changed to Proposed Standard |
2013-05-07
|
03 | Cindy Morgan | IESG process started in state Publication Requested |
2013-05-07
|
03 | (System) | Earlier history may be found in the Comment Log for draft-rescorla-avtcore-6222bis |
2013-05-07
|
03 | Magnus Westerlund | IETF WG state changed to Submitted to IESG for Publication from WG Consensus: Waiting for Write-Up |
2013-05-07
|
03 | Magnus Westerlund | Annotation tag Revised I-D Needed - Issue raised by WGLC cleared. |
2013-05-07
|
03 | Magnus Westerlund | Changed document writeup |
2013-04-23
|
03 | Magnus Westerlund | Writeup done. Document updated. Thus time to request publication. This will be emailed now. |
2013-04-23
|
03 | Ali Begen | New version available: draft-ietf-avtcore-6222bis-03.txt |
2013-04-23
|
02 | Magnus Westerlund | Annotation tag Revised I-D Needed - Issue raised by WGLC set. |
2013-04-23
|
02 | Magnus Westerlund | IETF WG state changed to WG Consensus: Waiting for Write-Up from In WG Last Call |
2013-04-13
|
02 | Magnus Westerlund | The last issues raised in WG last call needs a revised draft before publication request. |
2013-04-13
|
02 | Ali Begen | New version available: draft-ietf-avtcore-6222bis-02.txt |
2013-03-12
|
01 | Magnus Westerlund | IETF WG state changed to In WG Last Call from WG Document |
2013-03-12
|
01 | Magnus Westerlund | Started WG last call with due date of 31st of March |
2013-03-12
|
01 | Magnus Westerlund | Changed shepherd to Magnus Westerlund |
2013-03-10
|
01 | Ali Begen | New version available: draft-ietf-avtcore-6222bis-01.txt |
2012-12-18
|
00 | Ali Begen | New version available: draft-ietf-avtcore-6222bis-00.txt |