Traversal Using Relays around NAT (TURN): Relay Extensions to Session Traversal Utilities for NAT (STUN)
draft-ietf-behave-turn-16
Revision differences
Document history
Date | Rev. | By | Action |
---|---|---|---|
2012-08-22
|
16 | (System) | post-migration administrative database adjustment to the No Objection position for Cullen Jennings |
2012-08-22
|
16 | (System) | post-migration administrative database adjustment to the No Objection position for Robert Sparks |
2012-08-22
|
16 | (System) | post-migration administrative database adjustment to the No Objection position for Tim Polk |
2012-08-22
|
16 | (System) | post-migration administrative database adjustment to the No Objection position for Lars Eggert |
2012-08-22
|
16 | (System) | post-migration administrative database adjustment to the No Objection position for Russ Housley |
2009-10-28
|
16 | (System) | IANA Action state changed to RFC-Ed-Ack from Waiting on RFC Editor |
2009-10-28
|
16 | (System) | IANA Action state changed to Waiting on RFC Editor from In Progress |
2009-10-28
|
16 | (System) | IANA Action state changed to In Progress from Waiting on Authors |
2009-10-27
|
16 | (System) | IANA Action state changed to Waiting on Authors from In Progress |
2009-10-27
|
16 | (System) | IANA Action state changed to In Progress from Waiting on Authors |
2009-10-23
|
16 | (System) | IANA Action state changed to Waiting on Authors from In Progress |
2009-10-23
|
16 | (System) | IANA Action state changed to In Progress from Waiting on ADs |
2009-10-22
|
16 | (System) | IANA Action state changed to Waiting on ADs from In Progress |
2009-10-22
|
16 | (System) | IANA Action state changed to In Progress from Waiting on Authors |
2009-10-21
|
16 | (System) | IANA Action state changed to Waiting on Authors from In Progress |
2009-10-16
|
16 | Amy Vezza | State Changes to RFC Ed Queue from Approved-announcement sent by Amy Vezza |
2009-10-16
|
16 | (System) | IANA Action state changed to In Progress |
2009-10-16
|
16 | Amy Vezza | IESG state changed to Approved-announcement sent |
2009-10-16
|
16 | Amy Vezza | IESG has approved the document |
2009-10-16
|
16 | Amy Vezza | Closed "Approve" ballot |
2009-10-15
|
16 | Cullen Jennings | [Ballot Position Update] Position for Cullen Jennings has been changed to No Objection from Discuss by Cullen Jennings |
2009-10-15
|
16 | Tim Polk | [Ballot Position Update] Position for Tim Polk has been changed to No Objection from Undefined by Tim Polk |
2009-10-15
|
16 | Tim Polk | [Ballot Position Update] Position for Tim Polk has been changed to Undefined from Discuss by Tim Polk |
2009-07-03
|
16 | (System) | Sub state has been changed to AD Follow up from New Id Needed |
2009-07-03
|
16 | (System) | New version available: draft-ietf-behave-turn-16.txt |
2009-06-26
|
16 | Magnus Westerlund | State Changes to IESG Evaluation::Revised ID Needed from IESG Evaluation by Magnus Westerlund |
2009-06-26
|
16 | Magnus Westerlund | Note field has been cleared by Magnus Westerlund |
2009-06-24
|
16 | Cullen Jennings | [Ballot comment] Seems weird that we can negotiate lifetimes of allocations but not permissions or channels bindings. Why? Padding up the Channel Data messages over … [Ballot comment] Seems weird that we can negotiate lifetimes of allocations but not permissions or channels bindings. Why? Padding up the Channel Data messages over TCP is a waste of bandwidth - why is it needed? |
2009-06-24
|
16 | Cullen Jennings | [Ballot discuss] Refresh's, allocations, permission, and channel bindings request MUST be authenticated to meet the security requirements. The changes made from previous version don't fix … [Ballot discuss] Refresh's, allocations, permission, and channel bindings request MUST be authenticated to meet the security requirements. The changes made from previous version don't fix this and seem to be what the Philip had always argued for in the WG and not what the WG agreed to. The lack of authentication on the redirect response makes it trivial to DDOS any set of clients trying to use a STUN server by just redirecting them to a server that does not work. Section 10.3 needs to say the server MUST discard the packet if there is no permission to meet the security requirements. petithug@acm.org pointed out there is no guidance on what transports need to be implemented. |
2009-06-13
|
16 | Lars Eggert | State Changes to IESG Evaluation from IESG Evaluation::AD Followup by Lars Eggert |
2009-06-13
|
16 | Lars Eggert | Discuss holders need to check the new version. |
2009-06-10
|
16 | (System) | Sub state has been changed to AD Follow up from New Id Needed |
2009-06-10
|
15 | (System) | New version available: draft-ietf-behave-turn-15.txt |
2009-05-19
|
16 | Cullen Jennings | [Ballot discuss] Refresh's, allocations, permission, and channel bindings request MUST be authenticated to meet the security requirements. The lack of authentication on the redirect response … [Ballot discuss] Refresh's, allocations, permission, and channel bindings request MUST be authenticated to meet the security requirements. The lack of authentication on the redirect response makes it trivial to DDOS any set of clients trying to use a STUN server by just redirecting them to a server that does not work. Section 10.3 needs to say the server MUST discard the packet if there is no permission to meet the security requirements. petithug@acm.org pointed out there is no guidance on what transports need to be implemented. |
2009-05-05
|
16 | Magnus Westerlund | State Changes to IESG Evaluation::Revised ID Needed from IESG Evaluation::AD Followup by Magnus Westerlund |
2009-04-14
|
16 | Robert Sparks | [Ballot comment] There are several invariant times called out in this document without motivation (default lifetimes MUST be 300 seconds, clients SHOULD wait at least … [Ballot comment] There are several invariant times called out in this document without motivation (default lifetimes MUST be 300 seconds, clients SHOULD wait at least one minute before doing some things and MUST wait 5 minutes before doing others). It would be nice to let the implementors know, if possible, why these values were chosen. The text in the NOTE on page 25 will not age well after this is published as an RFC (Comment to version -14): I think it's likely that a client implementer will miss noticing that the client needs to set a separate timer for refreshing the permission and the channelbind when a channelbind request succeeds. You could help avoid some interop problems by explicitly calling this out in the "processing channelbind responses" section. |
2009-04-14
|
16 | Robert Sparks | [Ballot Position Update] Position for Robert Sparks has been changed to No Objection from Discuss by Robert Sparks |
2009-04-14
|
16 | Lars Eggert | [Ballot Position Update] Position for Lars Eggert has been changed to No Objection from Discuss by Lars Eggert |
2009-04-13
|
16 | Russ Housley | [Ballot Position Update] Position for Russ Housley has been changed to No Objection from Discuss by Russ Housley |
2009-04-12
|
16 | (System) | Sub state has been changed to AD Follow up from New Id Needed |
2009-04-12
|
14 | (System) | New version available: draft-ietf-behave-turn-14.txt |
2009-04-10
|
16 | Amy Vezza | State Changes to IESG Evaluation::Revised ID Needed from IESG Evaluation - Defer by Amy Vezza |
2009-04-09
|
16 | Lars Eggert | [Ballot discuss] Because TURN doesn't translate the ICMP messages necessary for PMTU discovery, persistent fragmentation can occur. When we discussed this in the WG, I … [Ballot discuss] Because TURN doesn't translate the ICMP messages necessary for PMTU discovery, persistent fragmentation can occur. When we discussed this in the WG, I thought we had come to an agreement that the document should say that TURN is NOT RECOMMENDED for applications that frequently exchange UDP packets larger than the minimum PMTU (500-odd bytes), unless they implement RFC4821. |
2009-04-09
|
16 | Alexey Melnikov | [Ballot comment] In Section 6.2: 5. The server checks if the request contains an EVEN-PORT attribute. If yes, then the server … [Ballot comment] In Section 6.2: 5. The server checks if the request contains an EVEN-PORT attribute. If yes, then the server checks that it satisfy the request. Missing word: ... that it *can* satisfy ... I am also agreeing with Russ' DISCUSS. |
2009-04-08
|
16 | Ross Callon | [Ballot Position Update] New position, No Objection, has been recorded by Ross Callon |
2009-04-08
|
16 | Cullen Jennings | [Ballot discuss] Refresh's, allocations, permission, and channel bindings request MUST be authenticated to meet the security requirements. The lack of authentication on the redirect response … [Ballot discuss] Refresh's, allocations, permission, and channel bindings request MUST be authenticated to meet the security requirements. The lack of authentication on the redirect response makes it trivial to DDOS any set of clients trying to use a STUN server by just redirecting them to a server that does not work. Section 10.3 needs to say the server MUST discard the packet if there is no permission to meet the security requirements. |
2009-04-08
|
16 | Cullen Jennings | [Ballot comment] Seems weird that we can negotiate lifetimes of allocations but not permissions or channels bindings. Why? Padding up the Channel Data messages over … [Ballot comment] Seems weird that we can negotiate lifetimes of allocations but not permissions or channels bindings. Why? Padding up the Channel Data messages over TCP is a waste of bandwidth - why is it needed? |
2009-04-08
|
16 | Cullen Jennings | [Ballot Position Update] New position, Discuss, has been recorded by Cullen Jennings |
2009-04-08
|
16 | Pasi Eronen | [Ballot Position Update] New position, No Objection, has been recorded by Pasi Eronen |
2009-04-07
|
16 | Tim Polk | [Ballot discuss] As I understand it, this specification mandates client support for STUN authentication, but this is not a MUST implement for TURN servers. The … [Ballot discuss] As I understand it, this specification mandates client support for STUN authentication, but this is not a MUST implement for TURN servers. The specification provides good reasons to include that support in servers (section 2.2, "since relaying data may require lots of bandwidth..."), the protocol *requires* authentication to install or refresh permissions (section 2), and authentication is identified as the solution for several threats in the security considerations. This makes me wonder if STUN authentication shouldn't be a MUST implement for servers. Are there significant deployment scenarios where a TURN server could be deployed safely, and meet all the operational requirements without supporting authentication? If not, I would suggest making authentication a MUST implement for servers. (If significant scenarios exist where authentication would not be used, then I would leave things as is...) |
2009-04-07
|
16 | Ron Bonica | [Ballot comment] supporting Lars' and Russ's DISCUSSES |
2009-04-07
|
16 | Ron Bonica | [Ballot Position Update] New position, No Objection, has been recorded by Ron Bonica |
2009-04-07
|
16 | Tim Polk | [Ballot discuss] As I understand it, this specification mandates client support for STUN authentication, but this is not a MUST implement for TURN servers. The … [Ballot discuss] As I understand it, this specification mandates client support for STUN authentication, but this is not a MUST implement for TURN servers. The specification provides good reasons to include that support in servers (section 2.2, "since relaying data may require lots of bandwidth...") and *requires* authentication to install or refresh permissions (section 2), and is identified as the solution for several threats in the security considerations. This makes me wonder if STUN authentication shouldn't be a MUST implement for servers. Are there significant deployment scenarios where a TURN server could be deployed safely, and meet all the operational requirements without supporting authentication? If not, I would suggest making authentication a MUST implement for servers. |
2009-04-07
|
16 | Tim Polk | [Ballot Position Update] New position, Discuss, has been recorded by Tim Polk |
2009-04-07
|
16 | Tim Polk | [Ballot comment] section 2, next-to-last paragraph s/to application data/to send application data/ section 2.4, para 3: s/an XOR-PEER-ADDRESS attribute specify/an XOR-PEER-ADDRESS attribute specifying/ |
2009-04-07
|
16 | Cullen Jennings | [Ballot comment] please ignore this - showing robert something |
2009-04-07
|
16 | Lars Eggert | [Ballot discuss] Because TURN doesn't translate the ICMP messages necessary for PMTU discovery, persistent fragmentation can occur. When we discussed this in the WG, I … [Ballot discuss] Because TURN doesn't translate the ICMP messages necessary for PMTU discovery, persistent fragmentation can occur. When we discussed this in the WG, I thought we had come to an agreement that the document should say that TURN is NOT RECOMMENDED for applications that exchange UDP packets larger than the minimum PMTU (500-odd bytes), unless they implement RFC4821. |
2009-04-07
|
16 | Lars Eggert | [Ballot Position Update] New position, Discuss, has been recorded by Lars Eggert |
2009-04-06
|
16 | Robert Sparks | [Ballot discuss] In section 11.2, I'm not finding where it's explicitly specified what the lifetime of a Permission established by a ChannelBind is. I think … [Ballot discuss] In section 11.2, I'm not finding where it's explicitly specified what the lifetime of a Permission established by a ChannelBind is. I think both the server and client are expected to use the lifetime of the ChannelBind as the lifetime of the Permission, but this should be explicitly stated. ---- The text defining how the lifetimes of permissions and allocations are established say to use either the value requested by the client, or the default lifetime (see the bottom of page 25, top of page 26 for example). The example shows the server choosing a value (20 minutes) between those. Was the intent of the normative text to allow the server to choose any value between the default and requested value, or only the endpoints? ---- I think there is an unintended problem in the way the processing for Allocate requests is spelled out on pages 23 and 24. As written, a request that contains both a RESERVATION-TOKEN and an EVEN-PORT attribute that the server couldn't satisfy, step 5 will cause a 508 error (which will lead to the client trying the same request again). The intended check to reject this with a 400 doesn't occur until step 6. ---- Should the text in 17.2.3 say that the TURN server will never accept traffic from a peer which the client has not installed a permission for, rather than which the client has not yet contacted? |
2009-04-06
|
16 | Robert Sparks | [Ballot comment] There are several invariant times called out in this document without motivation (default lifetimes MUST be 300 seconds, clients SHOULD wait at least … [Ballot comment] There are several invariant times called out in this document without motivation (default lifetimes MUST be 300 seconds, clients SHOULD wait at least one minute before doing some things and MUST wait 5 minutes before doing others). It would be nice to let the implementors know, if possible, why these values were chosen. The text in the NOTE on page 25 will not age well after this is published as an RFC |
2009-04-06
|
16 | Robert Sparks | [Ballot discuss] In section 11.2, I'm not finding where it's explicitly specified what the lifetime of a Permission established by a ChannelBind is. I think … [Ballot discuss] In section 11.2, I'm not finding where it's explicitly specified what the lifetime of a Permission established by a ChannelBind is. I think both the server and client are expected to use the lifetime of the ChannelBind as the lifetime of the Permission, but this should be explicitly stated. ---- The text defining how the lifetimes of permissions and allocations are established say to use either the value requested by the client, or the default lifetime (see the bottom of page 25, top of page 26 for example). The example shows the server choosing a value (20 minutes) between those. Was the intent of the normative text to allow the server to choose any value between the default and requested value, or only the endpoints? ---- I think there is an unintended problem in the way the processing for Allocate requests is spelled out on pages 23 and 24. As written, a request that contains both a RESERVATION-TOKEN and an EVEN-PORT attribute that the server couldn't satisfy, step 5 will cause a 508 error (which will lead to the client trying the same request again). The intended check to reject this with a 400 doesn't occur until step 6. ---- Should the text in 17.2.3 say that the TURN server will never accept traffic from a peer which the client has not installed a permission for, rather than which the client has not yet contacted? |
2009-04-06
|
16 | Robert Sparks | [Ballot discuss] In section 11.2, I'm not finding where it's explicitly specified what the lifetime of a Permission established by a ChannelBind is. I think … [Ballot discuss] In section 11.2, I'm not finding where it's explicitly specified what the lifetime of a Permission established by a ChannelBind is. I think both the server and client are expected to use the lifetime of the ChannelBind as the lifetime of the Permission, but this should be explicitly stated. |
2009-04-06
|
16 | Robert Sparks | [Ballot Position Update] New position, Discuss, has been recorded by Robert Sparks |
2009-04-04
|
16 | Russ Housley | [Ballot discuss] The IAB Considerations in RFC 3424 have not been changed, and it is clear to me that TURN has an indefinite lifetime. … [Ballot discuss] The IAB Considerations in RFC 3424 have not been changed, and it is clear to me that TURN has an indefinite lifetime. So, the first two IAB UNSAF criteria cannot realistically be satisfied. I do not want to delay the document, but I do think it should include a recognition of this conflict. I'm happy with an IESG note or text in the body of the document. |
2009-04-04
|
16 | Russ Housley | [Ballot Position Update] New position, Discuss, has been recorded by Russ Housley |
2009-04-02
|
16 | Adrian Farrel | [Ballot Position Update] New position, No Objection, has been recorded by Adrian Farrel |
2009-04-02
|
16 | Adrian Farrel | [Ballot comment] I understand that other-then-UDP mechanisms for server-peer communications will follow, but I find it confusing that the Introduction discusses client-server TCP and TLS … [Ballot comment] I understand that other-then-UDP mechanisms for server-peer communications will follow, but I find it confusing that the Introduction discusses client-server TCP and TLS services since the client is presumably actually interested in client-peer delivery. Also that Figure 1 shows a peer behind a NAT and the text comments that some firewalls block UDP entirely. Would it be helpful to draw out more clearly what deployments and service functions are not possible with the UDP-only variety of TURN? (There is some discussion in section 2.4 of the security of the server-peer data being the protected through encryption or similar.) |
2009-03-28
|
16 | Alexey Melnikov | [Ballot comment] In Section 6.2: 5. The server checks if the request contains an EVEN-PORT attribute. If yes, then the server … [Ballot comment] In Section 6.2: 5. The server checks if the request contains an EVEN-PORT attribute. If yes, then the server checks that it satisfy the request. Missing word: ... that it *can* satisfy ... |
2009-03-28
|
16 | Alexey Melnikov | [Ballot Position Update] New position, No Objection, has been recorded by Alexey Melnikov |
2009-03-13
|
16 | Samuel Weiler | Request for Last Call review by SECDIR Completed. Reviewer: Paul Hoffman. |
2009-03-13
|
16 | (System) | Removed from agenda for telechat - 2009-03-12 |
2009-03-11
|
16 | Ron Bonica | State Changes to IESG Evaluation - Defer from IESG Evaluation by Ron Bonica |
2009-03-10
|
16 | Lisa Dusseault | [Ballot Position Update] New position, No Objection, has been recorded by Lisa Dusseault |
2009-02-25
|
16 | Magnus Westerlund | [Ballot Position Update] New position, Yes, has been recorded for Magnus Westerlund |
2009-02-25
|
16 | Magnus Westerlund | Ballot has been issued by Magnus Westerlund |
2009-02-25
|
16 | Magnus Westerlund | Created "Approve" ballot |
2009-02-25
|
16 | Magnus Westerlund | Placed on agenda for telechat - 2009-03-12 by Magnus Westerlund |
2009-02-25
|
16 | Magnus Westerlund | State Changes to IESG Evaluation from Waiting for AD Go-Ahead::AD Followup by Magnus Westerlund |
2009-02-24
|
16 | (System) | Sub state has been changed to AD Follow up from New Id Needed |
2009-02-24
|
13 | (System) | New version available: draft-ietf-behave-turn-13.txt |
2009-01-28
|
16 | Magnus Westerlund | State Changes to Waiting for AD Go-Ahead::Revised ID Needed from Waiting for AD Go-Ahead by Magnus Westerlund |
2009-01-27
|
16 | Amanda Baber | IANA questions/comments: - In sections 11.4-11.6 you define a ChannelData message, but nowhere do you register it. Do you need to register the ChannelData in … IANA questions/comments: - In sections 11.4-11.6 you define a ChannelData message, but nowhere do you register it. Do you need to register the ChannelData in some registry? Action 1: Upon approval of this document, IANA will make the following assignments in the "STUN Methods" registry at http://www.iana.org/assignments/stun-parameters/stun-parameters.xhtml Value Name Reference ----- ----- --------- 0x003 Allocate [RFC-behave-turn-12] 0x004 Refresh [RFC-behave-turn-12] 0x006 Send [RFC-behave-turn-12] 0x007 Data [RFC-behave-turn-12] 0x008 CreatePermission [RFC-behave-turn-12] 0x009 ChannelBind [RFC-behave-turn-12] Action 2: Upon approval of this document, IANA will make the following assignments in the "STUN Attributes" registry at http://www.iana.org/assignments/stun-parameters/stun-parameters.xhtml Value Name Reference ----- ----- --------- 0x000C CHANNEL-NUMBER [RFC-behave-turn-12] 0x000D LIFETIME [RFC-behave-turn-12] 0x0010 Reserved (was BANDWIDTH) [RFC-behave-turn-12] 0x0012 XOR-PEER-ADDRESS [RFC-behave-turn-12] 0x0013 DATA [RFC-behave-turn-12] 0x0016 XOR-RELAYED-ADDRESS [RFC-behave-turn-12] 0x0018 EVEN-PORT [RFC-behave-turn-12] 0x0019 REQUESTED-TRANSPORT [RFC-behave-turn-12] 0x001A DONT-FRAGMENT [RFC-behave-turn-12] 0x0021 Reserved (was TIMER-VAL) [RFC-behave-turn-12] 0x0022 RESERVATION-TOKEN [RFC-behave-turn-12] Action 3: Upon approval of this document, IANA will make the following assignments in the "STUN Error Codes" registry at http://www.iana.org/assignments/stun-parameters/stun-parameters.xhtml Value Name Reference ----- ----- --------- 437 Allocation Mismatch [RFC-behave-turn-12] 441 Wrong Credentials [RFC-behave-turn-12] 442 Unsupported Transport Protocol [RFC-behave-turn-12] 486 Allocation Quota Reached [RFC-behave-turn-12] 508 Insufficient Capacity [RFC-behave-turn-12] We understand the above to be the only IANA Actions for this document. |
2009-01-27
|
16 | (System) | State has been changed to Waiting for AD Go-Ahead from In Last Call by system |
2009-01-15
|
16 | Samuel Weiler | Request for Last Call review by SECDIR is assigned to Paul Hoffman |
2009-01-15
|
16 | Samuel Weiler | Request for Last Call review by SECDIR is assigned to Paul Hoffman |
2009-01-13
|
16 | Amy Vezza | Last call sent |
2009-01-13
|
16 | Amy Vezza | State Changes to In Last Call from Last Call Requested by Amy Vezza |
2009-01-13
|
16 | Magnus Westerlund | State Changes to Last Call Requested from AD Evaluation by Magnus Westerlund |
2009-01-13
|
16 | Magnus Westerlund | Last Call was requested by Magnus Westerlund |
2009-01-13
|
16 | (System) | Ballot writeup text was added |
2009-01-13
|
16 | (System) | Last call text was added |
2009-01-13
|
16 | (System) | Ballot approval text was added |
2009-01-12
|
16 | Magnus Westerlund | State Changes to AD Evaluation from Publication Requested by Magnus Westerlund |
2008-12-19
|
16 | Cindy Morgan | State Changes to Publication Requested from AD is watching by Cindy Morgan |
2008-12-19
|
16 | Cindy Morgan | (1.a) Who is the Document Shepherd for this document? draft-ietf-behave-turn-12.txt Dan Wing, dwing@cisco.com Has the … (1.a) Who is the Document Shepherd for this document? draft-ietf-behave-turn-12.txt Dan Wing, dwing@cisco.com Has the Document Shepherd personally reviewed this version of the document and, in particular, does he or she believe this version is ready for forwarding to the IESG for publication? Yes. (1.b) Has the document had adequate review both from key WG members and from key non-WG members? Does the Document Shepherd have any concerns about the depth or breadth of the reviews that have been performed? This document has received significant review from the community, and there are several implementations using this specification. (1.c) Does the Document Shepherd have concerns that the document needs more review from a particular or broader perspective, e.g., security, operational complexity, someone familiar with AAA, internationalization, or XML? No concerns. (1.d) Does the Document Shepherd have any specific concerns or issues with this document that the Responsible Area Director and/or the IESG should be aware of? For example, perhaps he or she is uncomfortable with certain parts of the document, or has concerns whether there really is a need for it. In any event, if the WG has discussed those issues and has indicated that it still wishes to advance the document, detail those concerns here. No concerns. Has an IPR disclosure related to this document been filed? If so, please include a reference to the disclosure and summarize the WG discussion and conclusion on this issue. Yes, "Nortel Networks Statement about IPR claimed in draft-rosenberg-midcom-turn-06", https://datatracker.ietf.org/ipr/505/ http://www.ietf.org/ietf/IPR/nortel-ipr-draft-rosenberg-midcom-turn.txt There has been no significant working group discussion of this IPR disclosure. (1.e) How solid is the WG consensus behind this document? Very solid. Does it represent the strong concurrence of a few individuals, with others being silent, or does the WG as a whole understand and agree with it? The WG has a good understanding of, and agreement with, this document. (1.f) Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarize the areas of conflict in separate email messages to the Responsible Area Director. (It should be in a separate email because this questionnaire is entered into the ID Tracker.) No such threats or appeals. (1.g) Has the Document Shepherd personally verified that the document satisfies all ID nits? (See http://www.ietf.org/ID-Checklist.html and http://tools.ietf.org/tools/idnits/.) Yes. Boilerplate checks are not enough; this check needs to be thorough. Has the document met all formal review criteria it needs to, such as the MIB Doctor, media type, and URI type reviews? The document does not specify a MIB, media type, or URI, and thus does not need to meet those review criteria. If the document does not already indicate its intended status at the top of the first page, please indicate the intended status here. Intended Status: Proposed Standard (1.h) Has the document split its references into normative and informative? Yes. Are there normative references to documents that are not ready for advancement or are otherwise in an unclear state? If such normative references exist, what is the strategy for their completion? Are there normative references that are downward references, as described in [RFC3967]? If so, list these downward references to support the Area Director in the Last Call procedure for them [RFC3967]. All normative references are upward references, and all are RFCs. (1.i) Has the Document Shepherd verified that the document's IANA Considerations section exists and is consistent with the body of the document? Yes. If the document specifies protocol extensions, are reservations requested in appropriate IANA registries? Yes. Are the IANA registries clearly identified? Yes. If the document creates a new registry, does it define the proposed initial contents of the registry and an allocation procedure for future registrations? The document does not create a new IANA registry. Does it suggest a reasonable name for the new registry? See [RFC2434]. If the document describes an Expert Review process, has the Document Shepherd conferred with the Responsible Area Director so that the IESG can appoint the needed Expert during IESG Evaluation? (1.j) Has the Document Shepherd verified that sections of the document that are written in a formal language, such as XML code, BNF rules, MIB definitions, etc., validate correctly in an automated checker? The document contains no such formal language. (1.k) The IESG approval announcement includes a Document Announcement Write-Up. Please provide such a Document Announcement Write-Up. Recent examples can be found in the "Action" announcements for approved documents. The approval announcement contains the following sections: Technical Summary Relevant content can frequently be found in the abstract and/or introduction of the document. If not, this may be an indication that there are deficiencies in the abstract or introduction. This specification defines a protocol that allows the host to control the operation of a relay and to exchange packets with its peers using the relay. TURN differs from some other relay control protocols in that it allows a client to communicate with multiple peers using a single relay address. The TURN protocol was designed to be used as part of the ICE (Interactive Connectivity Establishment) approach to NAT traversal, though it can be also used without ICE. Working Group Summary Was there anything in the WG process that is worth noting? For example, was there controversy about particular points or were there decisions where the consensus was particularly rough? No. Document Quality Are there existing implementations of the protocol? Yes. Have a significant number of vendors indicated their plan to implement the specification? Yes. Are there any reviewers that merit special mention as having done a thorough review, e.g., one that resulted in important changes or a conclusion that the document had no substantive issues? They are listed in the document's acknowledgement section If there was a MIB Doctor, Media Type, or other Expert Review, what was its course (briefly)? In the case of a Media Type Review, on what date was the request posted? No such reviews were necessary. Personnel Who is the Document Shepherd for this document? Dan Wing, dwing@cisco.com Who is the Responsible Area Director? Magnus Westerlund, magnus.westerlund@ericsson.com If the document requires IANA experts(s), insert 'The IANA Expert(s) for the registries in this document are .' The document doesn't require IANA experts. |
2008-11-30
|
12 | (System) | New version available: draft-ietf-behave-turn-12.txt |
2008-10-29
|
11 | (System) | New version available: draft-ietf-behave-turn-11.txt |
2008-09-29
|
10 | (System) | New version available: draft-ietf-behave-turn-10.txt |
2008-07-12
|
09 | (System) | New version available: draft-ietf-behave-turn-09.txt |
2008-06-24
|
08 | (System) | New version available: draft-ietf-behave-turn-08.txt |
2008-02-25
|
07 | (System) | New version available: draft-ietf-behave-turn-07.txt |
2008-01-22
|
06 | (System) | New version available: draft-ietf-behave-turn-06.txt |
2007-11-17
|
05 | (System) | New version available: draft-ietf-behave-turn-05.txt |
2007-07-12
|
04 | (System) | New version available: draft-ietf-behave-turn-04.txt |
2007-03-07
|
03 | (System) | New version available: draft-ietf-behave-turn-03.txt |
2006-11-14
|
16 | Cullen Jennings | State Change Notice email list have been change to behave-chairs@tools.ietf.org, philip_matthews@magma.ca, fluffy@cisco.om from behave-chairs@tools.ietf.org |
2006-11-14
|
16 | Magnus Westerlund | State Changes to AD is watching from Publication Requested by Magnus Westerlund |
2006-11-14
|
16 | Magnus Westerlund | Draft Added by Magnus Westerlund in state Publication Requested |
2006-11-14
|
16 | Magnus Westerlund | Earlier history may be found in the Comment Log for draft-rosenberg-midcom-turn. |
2006-10-09
|
02 | (System) | New version available: draft-ietf-behave-turn-02.txt |
2006-06-28
|
01 | (System) | New version available: draft-ietf-behave-turn-01.txt |
2006-03-01
|
00 | (System) | New version available: draft-ietf-behave-turn-00.txt |