Skip to main content

Guidelines for Choosing RTP Control Protocol (RTCP) Canonical Names (CNAMEs)
draft-ietf-avtcore-6222bis-06

Revision differences

Document history

Date Rev. By Action
2013-08-29
06 (System) RFC Editor state changed to AUTH48-DONE from AUTH48
2013-08-13
06 Magnus Westerlund Waiting for some authors to complete AUTH48.
2013-08-13
06 Magnus Westerlund Annotation tag Other - see Comment Log set.
2013-08-05
06 (System) RFC Editor state changed to AUTH48 from RFC-EDITOR
2013-08-05
06 (System) RFC Editor state changed to RFC-EDITOR from EDIT
2013-07-17
06 (System) IANA Action state changed to No IC from In Progress
2013-07-17
06 (System) IANA Action state changed to In Progress
2013-07-17
06 Amy Vezza State changed to RFC Ed Queue from Approved-announcement sent
2013-07-17
06 (System) RFC Editor state changed to EDIT
2013-07-17
06 (System) Announcement was received by RFC Editor
2013-07-17
06 Amy Vezza State changed to Approved-announcement sent from Approved-announcement to be sent
2013-07-17
06 Amy Vezza IESG has approved the document
2013-07-17
06 Amy Vezza Closed "Approve" ballot
2013-07-17
06 Amy Vezza Ballot approval text was generated
2013-07-17
06 Amy Vezza State changed to Approved-announcement to be sent from IESG Evaluation::AD Followup
2013-07-17
06 Amy Vezza Ballot writeup was changed
2013-07-14
06 Ali Begen New version available: draft-ietf-avtcore-6222bis-06.txt
2013-07-08
05 Ali Begen IANA Review state changed to Version Changed - Review Needed from IANA OK - No Actions Needed
2013-07-08
05 Ali Begen New version available: draft-ietf-avtcore-6222bis-05.txt
2013-06-27
04 Ted Lemon
[Ballot comment]
The discussion of third-party monitoring in 4.1 is uncomfortable. It seems to be encouraging application developers to add hooks to make third-party monitoring …
[Ballot comment]
The discussion of third-party monitoring in 4.1 is uncomfortable. It seems to be encouraging application developers to add hooks to make third-party monitoring easier, which would be great if we thought that this was only going to be used for performance measurement. But of course it can also be used for tracking endpoints through a firewall, or in the presence of temporary IP addresses.

It's hard to see how this text adds value. What was the working group's motivation for including this text?

In 4.2, regarding short-term persistent RTCP names, the document says "In either case, the procedure is performed once per initialization of the software," which contradicts the point made in 4.1 about the purpose of these short-term persistent identifiers and the advice that they are not needed for unrelated streams. It seems to me that you could make this better by saying "at least once" to allow for the possibility that they would cycle more frequently.

The following was a DISCUSS.  Based on Dan Wing's agreement to remove the recommendation to use MAC addresses (see email), I am clearing the DISCUSS.  The above comments have not, as far as I know, been addressed, but were not intended to be blocking.

Using the MAC address of the device for short-term persistent identifiers seems like a privacy problem.

6.2 speaks to this point, but the proposed mitigation assumes that the problem is that an eavesdropper would gain information about the identity of the endpoint using the persistent identifier. In fact, the more likely problem is that the other endpoint would gain that information.

I am not the IESG expert on privacy, so I may be making more out of this than is warranted, but I'd really like to see some additional review of the privacy implications of this before it goes out. I assume such review has not occurred because I see no mention of this issue in the security considerations section. Please let me know if I am mistaken.

You could clear this DISCUSS either by not using the MAC address, by explaining the working group's rationale for why this isn't a problem in a way that is convincing, or by getting someone with more expertise on the subject than I to review it and explain why it isn't an issue, or by implementing whatever mitigation they suggest. To be honest, given the set of names I see as authors of this document, I assume I am missing something, so please don't hesitate to point out what that is.
2013-06-27
04 Ted Lemon [Ballot Position Update] Position for Ted Lemon has been changed to No Objection from Discuss
2013-06-27
04 Cindy Morgan State changed to IESG Evaluation::AD Followup from IESG Evaluation
2013-06-27
04 Benoît Claise
[Ballot comment]
Let me double-check something regarding the CNAME length
  "To locally produce a unique identifier, we simply generate a
  cryptographically pseudorandom value …
[Ballot comment]
Let me double-check something regarding the CNAME length
  "To locally produce a unique identifier, we simply generate a
  cryptographically pseudorandom value as described in [RFC4086].  This
  value MUST be at least 96 bits but MAY be longer."
What is the max length? While quickly browsing through RFC 3550, I could not find it.
Why is this important? For management: if we need to access the information via a MIB, NETCONF, IPFIX, ... we need the max length.
I was unable to tell
1. what is the max CNAME length?
2. if the CNAME max length changed compared to RFC 3550

btw, "we" in IETF specifications is not ideal.

Editorial:
  In Section 6.5.1 of the RTP specification, [RFC3550], there are a
  number of recommendations for choosing a unique RTCP CNAME for an RTP
  endpoint. 

The first link "Section 6.5.1" is wrong. It goes to RFC 6222
2013-06-27
04 Benoît Claise [Ballot Position Update] New position, No Objection, has been recorded for Benoit Claise
2013-06-27
04 Gonzalo Camarillo [Ballot Position Update] New position, No Objection, has been recorded for Gonzalo Camarillo
2013-06-26
04 Ted Lemon
[Ballot discuss]
Using the MAC address of the device for short-term persistent identifiers seems like a privacy problem.

6.2 speaks to this point, but the …
[Ballot discuss]
Using the MAC address of the device for short-term persistent identifiers seems like a privacy problem.

6.2 speaks to this point, but the proposed mitigation assumes that the problem is that an eavesdropper would gain information about the identity of the endpoint using the persistent identifier. In fact, the more likely problem is that the other endpoint would gain that information.

I am not the IESG expert on privacy, so I may be making more out of this than is warranted, but I'd really like to see some additional review of the privacy implications of this before it goes out. I assume such review has not occurred because I see no mention of this issue in the security considerations section. Please let me know if I am mistaken.

You could clear this DISCUSS either by not using the MAC address, by explaining the working group's rationale for why this isn't a problem in a way that is convincing, or by getting someone with more expertise on the subject than I to review it and explain why it isn't an issue, or by implementing whatever mitigation they suggest. To be honest, given the set of names I see as authors of this document, I assume I am missing something, so please don't hesitate to point out what that is.
2013-06-26
04 Ted Lemon
[Ballot comment]
The discussion of third-party monitoring in 4.1 is uncomfortable. It seems to be encouraging application developers to add hooks to make third-party monitoring …
[Ballot comment]
The discussion of third-party monitoring in 4.1 is uncomfortable. It seems to be encouraging application developers to add hooks to make third-party monitoring easier, which would be great if we thought that this was only going to be used for performance measurement. But of course it can also be used for tracking endpoints through a firewall, or in the presence of temporary IP addresses.

It's hard to see how this text adds value. What was the working group's motivation for including this text?

In 4.2, regarding short-term persistent RTCP names, the document says "In either case, the procedure is performed once per initialization of the software," which contradicts the point made in 4.1 about the purpose of these short-term persistent identifiers and the advice that they are not needed for unrelated streams. It seems to me that you could make this better by saying "at least once" to allow for the possibility that they would cycle more frequently.
2013-06-26
04 Ted Lemon [Ballot Position Update] New position, Discuss, has been recorded for Ted Lemon
2013-06-26
04 Adrian Farrel
[Ballot comment]
Like Stewart, I am a little surprised that the algorithm described here
is probablistic given that the failure of a previous solution to …
[Ballot comment]
Like Stewart, I am a little surprised that the algorithm described here
is probablistic given that the failure of a previous solution to
guarantee uniqueness is cited as a major motivation for this work.

Given the contradiction implicit in "probably unique", I think that this
document should refresh the readers' minds (even if only by reference)
about the consequences of non-unique choice and how such situations are
resolved.  For example, if the consequence is that there is an extra
protocol exchange to force resolution, then that is one thing.  But if
the protocol will completely fail to work, that is something quite
different.

But I have no objection to the publication of this document.
2013-06-26
04 Adrian Farrel [Ballot Position Update] New position, No Objection, has been recorded for Adrian Farrel
2013-06-25
04 Pete Resnick [Ballot Position Update] New position, No Objection, has been recorded for Pete Resnick
2013-06-25
04 Sean Turner [Ballot Position Update] New position, No Objection, has been recorded for Sean Turner
2013-06-25
04 Martin Stiemerling [Ballot Position Update] New position, No Objection, has been recorded for Martin Stiemerling
2013-06-25
04 Jari Arkko [Ballot Position Update] New position, No Objection, has been recorded for Jari Arkko
2013-06-24
04 Stewart Bryant
[Ballot comment]
I have no objection to this being published, but I am slightly disappointed that the proposal is for a probabilistic scheme rather  than …
[Ballot comment]
I have no objection to this being published, but I am slightly disappointed that the proposal is for a probabilistic scheme rather  than a deterministic scheme, which surely must be feasible.
2013-06-24
04 Stewart Bryant [Ballot Position Update] New position, No Objection, has been recorded for Stewart Bryant
2013-06-23
04 Stephen Farrell
[Ballot comment]

- 6552 updates 3550, does this also? I'm just wondering
if the "updated by" metadata for 3550 will be preserved
or mucked up …
[Ballot comment]

- 6552 updates 3550, does this also? I'm just wondering
if the "updated by" metadata for 3550 will be preserved
or mucked up or what. (Others may know all this, but
I don't:-)

- 4.2, 2nd bullet: just a query - is there any need to
consider base64url encoding here? If so it'd be good to
mention since its often a bit of a mess if discovered
later. (I've no idea if these names might be sent in
URLs or web forms.)

- CNAME is a DNS term of art, and the DNS term is
perhaps the more widely known. I think it'd be good to
distinguish those if that's not already done elsewhere.

- For privacy reasons, changing CNAMEs is a fine plan.
However, an equally fine plan might be to chose a CNAME
from a small set so that transport problems are unlikely
but the identifying precision of the value is minimial.
Was this option considered? (To make it concerete just
to help answer the question, say if N unique values were
enough to ensure the probability of a transport problem
could be ignored then why not just pick a random number
between 1 and N, for the smallest acceptable N?)
2013-06-23
04 Stephen Farrell [Ballot Position Update] New position, No Objection, has been recorded for Stephen Farrell
2013-06-21
04 Cindy Morgan Note field has been cleared
2013-06-21
04 Spencer Dawkins
[Ballot comment]
I'm a Yes, but did have a couple of comments for the authors. Please consider them, along with other comments you may receive. …
[Ballot comment]
I'm a Yes, but did have a couple of comments for the authors. Please consider them, along with other comments you may receive.

For those oi us who aren't wizards at security but might still end up implementing this revised algorithm ... in 1.  Introduction

  For a discussion on the linkability of RTCP CNAMES produced by
  [RFC6222], refer to [I-D.rescorla-avtcore-random-cname].

I thought that reference to the draft was pretty important, but https://datatracker.ietf.org/doc/draft-rescorla-avtcore-random-cname/ is currently expired. I know the reference is listed as Informational, so you won't be stuck in REF-HOLD, but I found the discussion of the linking problem to be short, clear and compelling (where "compelling" means you can tell your boss "If we don't update our implementation, people may die").

If the referenced draft really is stalled, perhaps you could include something like the referenced draft's section 2.1 text (with attribution)?

In 3.  Deficiencies with Earlier Guidelines for Choosing an RTCP CNAME

  This document replaces the use of FQDN as an RTCP
  CNAME by alternative mechanisms.

Not to be pedantic, but the same text is in RFC 6222 :-)

Perhaps it needs to be updated for the current draft, to point to RFC 6222?
2013-06-21
04 Spencer Dawkins [Ballot Position Update] New position, Yes, has been recorded for Spencer Dawkins
2013-06-21
04 Barry Leiba [Ballot Position Update] New position, No Objection, has been recorded for Barry Leiba
2013-06-21
04 Barry Leiba Changed document writeup
2013-06-21
04 (System) IANA Review state changed to IANA OK - No Actions Needed from Version Changed - Review Needed
2013-06-21
04 (System) IANA Review state changed to Version Changed - Review Needed from IANA OK - No Actions Needed
2013-06-21
04 Richard Barnes State changed to IESG Evaluation from Waiting for AD Go-Ahead
2013-06-21
04 Richard Barnes Ballot has been issued
2013-06-21
04 Richard Barnes [Ballot Position Update] New position, Yes, has been recorded for Richard Barnes
2013-06-21
04 Richard Barnes Created "Approve" ballot
2013-06-21
04 Richard Barnes Placed on agenda for telechat - 2013-06-27
2013-06-21
04 Richard Barnes Ballot writeup was changed
2013-06-19
04 Ali Begen IANA Review state changed to Version Changed - Review Needed from IANA OK - No Actions Needed
2013-06-19
04 Ali Begen New version available: draft-ietf-avtcore-6222bis-04.txt
2013-06-13
03 Tero Kivinen Request for Last Call review by SECDIR Completed: Has Nits. Reviewer: Magnus Nystrom.
2013-06-12
03 Christer Holmberg Request for Last Call review by GENART Completed: Ready. Reviewer: Christer Holmberg.
2013-06-11
03 (System) State changed to Waiting for AD Go-Ahead from In Last Call
2013-05-30
03 Jean Mahoney Request for Last Call review by GENART is assigned to Christer Holmberg
2013-05-30
03 Jean Mahoney Request for Last Call review by GENART is assigned to Christer Holmberg
2013-05-30
03 Tero Kivinen Request for Last Call review by SECDIR is assigned to Magnus Nystrom
2013-05-30
03 Tero Kivinen Request for Last Call review by SECDIR is assigned to Magnus Nystrom
2013-05-29
03 (System) IANA Review state changed to IANA OK - No Actions Needed from IANA - Review Needed
2013-05-29
03 Amanda Baber
IESG/Authors/WG Chairs:

IANA has reviewed draft-ietf-avtcore-6222bis-03, which is currently in Last Call, and has the following comments:

We understand that this document doesn't require …
IESG/Authors/WG Chairs:

IANA has reviewed draft-ietf-avtcore-6222bis-03, which is currently in Last Call, and has the following comments:

We understand that this document doesn't require any IANA actions.

If this assessment is not accurate, please respond as soon as possible.
2013-05-28
03 Amy Vezza IANA Review state changed to IANA - Review Needed
2013-05-28
03 Amy Vezza
The following Last Call announcement was sent out:

From: The IESG
To: IETF-Announce
CC:
Reply-To: ietf@ietf.org
Sender:
Subject: Last Call:  (Guidelines for Choosing RTP Control …
The following Last Call announcement was sent out:

From: The IESG
To: IETF-Announce
CC:
Reply-To: ietf@ietf.org
Sender:
Subject: Last Call:  (Guidelines for Choosing RTP Control Protocol (RTCP) Canonical Names (CNAMEs)) to Proposed Standard


The IESG has received a request from the Audio/Video Transport Core
Maintenance WG (avtcore) to consider the following document:
- 'Guidelines for Choosing RTP Control Protocol (RTCP) Canonical Names
  (CNAMEs)'
  as Proposed Standard

The IESG plans to make a decision in the next few weeks, and solicits
final comments on this action. Please send substantive comments to the
ietf@ietf.org mailing lists by 2013-06-11. Exceptionally, comments may be
sent to iesg@ietf.org instead. In either case, please retain the
beginning of the Subject line to allow automated sorting.

Abstract


  The RTP Control Protocol (RTCP) Canonical Name (CNAME) is a
  persistent transport-level identifier for an RTP endpoint.  While the
  Synchronization Source (SSRC) identifier of an RTP endpoint may
  change if a collision is detected or when the RTP application is
  restarted, its RTCP CNAME is meant to stay unchanged, so that RTP
  endpoints can be uniquely identified and associated with their RTP
  media streams.

  For proper functionality, RTCP CNAMEs should be unique within the
  participants of an RTP session.  However, the existing guidelines for
  choosing the RTCP CNAME provided in the RTP standard are insufficient
  to achieve this uniqueness.  RFC 6222 was published to update those
  guidelines to allow endpoints to choose unique RTCP CNAMEs.
  Unfortunately, later investigations showed that some parts of the new
  algorithms were unnecessarily complicated and/or ineffective.  This
  document addresses these concerns and replaces RFC 6222.




The file can be obtained via
http://datatracker.ietf.org/doc/draft-ietf-avtcore-6222bis/

IESG discussion can be tracked via
http://datatracker.ietf.org/doc/draft-ietf-avtcore-6222bis/ballot/


No IPR declarations have been submitted directly on this I-D.


2013-05-28
03 Amy Vezza State changed to In Last Call from Last Call Requested
2013-05-28
03 Richard Barnes Last call was requested
2013-05-28
03 Richard Barnes Ballot approval text was generated
2013-05-28
03 Richard Barnes State changed to Last Call Requested from Publication Requested
2013-05-28
03 Richard Barnes Last call announcement was generated
2013-05-28
03 Richard Barnes Last call announcement was generated
2013-05-28
03 Richard Barnes Ballot writeup was generated
2013-05-07
03 Cindy Morgan
Writeup for draft-ietf-avtcore-6222bis-03

(1) What type of RFC is being requested (BCP, Proposed Standard,
Internet Standard, Informational, Experimental, or Historic)?  Why
is this the proper …
Writeup for draft-ietf-avtcore-6222bis-03

(1) What type of RFC is being requested (BCP, Proposed Standard,
Internet Standard, Informational, Experimental, or Historic)?  Why
is this the proper type of RFC?  Is this type of RFC indicated in the
title page header?

This is request to be published as a proposed standard.

This is the appropriate type as it replaces the existing proposed standard in RFC 6222. Which also was appropriate as this specifies a protocol functionality.


(2) The IESG approval announcement includes a Document Announcement
Write-Up. Please provide such a Document Announcement Write-Up. Recent
examples can be found in the "Action" announcements for approved
documents. The approval announcement contains the following sections:

Technical Summary

  The RTP Control Protocol (RTCP) Canonical Name (CNAME) is a
  persistent transport-level identifier for an RTP endpoint.  While the
  Synchronization Source (SSRC) identifier of an RTP endpoint may
  change if a collision is detected or when the RTP application is
  restarted, its RTCP CNAME is meant to stay unchanged, so that RTP
  endpoints can be uniquely identified and associated with their RTP
  media streams.

  For proper functionality, RTCP CNAMEs should be unique within the
  participants of an RTP session.  However, the existing guidelines for
  choosing the RTCP CNAME provided in the RTP standard are insufficient
  to achieve this uniqueness.  RFC 6222 was published to update those
  guidelines to allow endpoints to choose unique RTCP CNAMEs.
  Unfortunately, later investigations showed that some parts of the new
  algorithms were unnecessarily complicated and/or ineffective.  This
  document addresses these concerns and replaces RFC 6222.
 
Working Group Summary

The requirements for this replacement of RFC 6222 came from RTCWEB WG, which identified the linkability and privacy issue of the previous random method. There was strong WG consensus to address this issue. The method of addressing it, using a cryptographic random number generator, was obvious. The main concern in WG last call has been around the clarity of the motivation for the update.


Document Quality

The Shepherd assumes that this will see significant implementation, especially initially in any WebRTC implementations. The document has gotten a fair amount of reviews in the WG last call.

Personnel

  Magnus Westerlund is the Document Shepherd.
  Richard Barnes is the Responsible Area Director.


(3) Briefly describe the review of this document that was performed by
the Document Shepherd.  If this version of the document is not ready
for publication, please explain why the document is being forwarded to
the IESG.

The Shepherd has reviewed the document in WG last call and tracked the changes afterwards. For the writeup the chair has reviewed the draft again for each item in the I-D checklist.


(4) Does the document Shepherd have any concerns about the depth or
breadth of the reviews that have been performed? 

At the originally stated WG last call dead-line the number of reviews where less than minimal. After some prodding a bit more reviews where received. Sufficient to make the shepherd comfortable with publishing this replacement.


(5) Do portions of the document need review from a particular or from
broader perspective, e.g., security, operational complexity, AAA, DNS,
DHCP, XML, or internationalization? If so, describe the review that
took place.

No, if anything it would be to verify that the security goals has been meet. That appears clear from the shepherd's point of view so no additional review has been requeted. The Shepherd assumes a sec-dir review will happen to further verify that nothing obvious has been missed.


(6) Describe any specific concerns or issues that the Document Shepherd
has with this document that the Responsible Area Director and/or the
IESG should be aware of? For example, perhaps he or she is uncomfortable
with certain parts of the document, or has concerns whether there really
is a need for it. In any event, if the WG has discussed those issues and
has indicated that it still wishes to advance the document, detail those
concerns here.

No concerns.


(7) Has each author confirmed that any and all appropriate IPR
disclosures required for full conformance with the provisions of BCP 78
and BCP 79 have already been filed. If not, explain why.

All authors have confirmed that they are in conformance.


(8) Has an IPR disclosure been filed that references this document?
If so, summarize any WG discussion and conclusion regarding the IPR
disclosures.

No IPR disclosure was present in the database on the 2013-04-24.


(9) How solid is the WG consensus behind this document? Does it
represent the strong concurrence of a few individuals, with others
being silent, or does the WG as a whole understand and agree with it? 

Their is a fairly wide agreement on doing this update. The people who reviewed or contributed to the details are much more some few individuals.

(10) Has anyone threatened an appeal or otherwise indicated extreme
discontent? If so, please summarise the areas of conflict in separate
email messages to the Responsible Area Director. (It should be in a
separate email because this questionnaire is publicly available.)

No.

(11) Identify any ID nits the Document Shepherd has found in this
document. (See http://www.ietf.org/tools/idnits/ and the Internet-Drafts
Checklist). Boilerplate checks are not enough; this check needs to be
thorough.

No ID nits found.


(12) Describe how the document meets any required formal review
criteria, such as the MIB Doctor, media type, and URI type reviews.

No such review has been deemed necessary.

(13) Have all references within this document been identified as
either normative or informative?

Yes.

One of the informative references [I-D.rescorla-avtcore-random-cname] was a motivation for doing this work, and is not intended to be published.

(14) Are there normative references to documents that are not ready for
advancement or are otherwise in an unclear state? If such normative
references exist, what is the plan for their completion?

No.

(15) Are there downward normative references references (see RFC 3967)?
If so, list these downward references to support the Area Director in
the Last Call procedure.

No.


(16) Will publication of this document change the status of any
existing RFCs? Are those RFCs listed on the title page header, listed
in the abstract, and discussed in the introduction? If the RFCs are not
listed in the Abstract and Introduction, explain why, and point to the
part of the document where the relationship of this document to the
other RFCs is discussed. If this information is not in the document,
explain why the WG considers it unnecessary.

Yes, this will obsolete RFC 6222. That is noted in header, abstract and introduction.


(17) Describe the Document Shepherd's review of the IANA considerations
section, especially with regard to its consistency with the body of the
document. Confirm that all protocol extensions that the document makes
are associated with the appropriate reservations in IANA registries.
Confirm that any referenced IANA registries have been clearly
identified. Confirm that newly created IANA registries include a
detailed specification of the initial contents for the registry, that
allocations procedures for future registrations are defined, and a
reasonable name for the new registry has been suggested (see RFC 5226).

This document updates possible ways of generating CNAMES. As they are source only options and opaque strings for any receiver their are no
need to register them. Thus no IANA action necesary as noted by IANA consideration section.

(18) List any new IANA registries that require Expert Review for future
allocations. Provide any public guidance that the IESG would find
useful in selecting the IANA Experts for these new registries.

No entries.

(19) Describe reviews and automated checks performed by the Document
Shepherd to validate sections of the document written in a formal
language, such as XML code, BNF rules, MIB definitions, etc.

ID-Nits, but no ther formal languages present.
2013-05-07
03 Cindy Morgan Note added 'Magnus Westerlund (magnus.westerlund@ericsson.com) is the Document Shepherd. '
2013-05-07
03 Cindy Morgan Intended Status changed to Proposed Standard
2013-05-07
03 Cindy Morgan IESG process started in state Publication Requested
2013-05-07
03 (System) Earlier history may be found in the Comment Log for draft-rescorla-avtcore-6222bis
2013-05-07
03 Magnus Westerlund IETF WG state changed to Submitted to IESG for Publication from WG Consensus: Waiting for Write-Up
2013-05-07
03 Magnus Westerlund Annotation tag Revised I-D Needed - Issue raised by WGLC cleared.
2013-05-07
03 Magnus Westerlund Changed document writeup
2013-04-23
03 Magnus Westerlund Writeup done. Document updated. Thus time to request publication. This will be emailed now.
2013-04-23
03 Ali Begen New version available: draft-ietf-avtcore-6222bis-03.txt
2013-04-23
02 Magnus Westerlund Annotation tag Revised I-D Needed - Issue raised by WGLC set.
2013-04-23
02 Magnus Westerlund IETF WG state changed to WG Consensus: Waiting for Write-Up from In WG Last Call
2013-04-13
02 Magnus Westerlund The last issues raised in WG last call needs a revised draft before publication request.
2013-04-13
02 Ali Begen New version available: draft-ietf-avtcore-6222bis-02.txt
2013-03-12
01 Magnus Westerlund IETF WG state changed to In WG Last Call from WG Document
2013-03-12
01 Magnus Westerlund Started WG last call with due date of 31st of March
2013-03-12
01 Magnus Westerlund Changed shepherd to Magnus Westerlund
2013-03-10
01 Ali Begen New version available: draft-ietf-avtcore-6222bis-01.txt
2012-12-18
00 Ali Begen New version available: draft-ietf-avtcore-6222bis-00.txt