Skip to main content

Terminology for Benchmarking IPsec Devices
draft-ietf-bmwg-ipsec-term-12

Revision differences

Document history

Date Rev. By Action
2024-12-18
12 (System) IESG state changed to I-D Exists from Dead
2024-12-18
12 (System) IESG Dead state was set due only to document expiry - changing IESG state to ID-Exists
2015-10-14
12 (System) Notify list changed from bmwg-chairs@ietf.org, draft-ietf-bmwg-ipsec-term@ietf.org to (None)
2010-07-08
12 (System) State Changes to Dead from AD is watching by system
2010-07-08
12 (System) Document has expired
2010-07-07
12 Ron Bonica State Changes to AD is watching from IESG Evaluation::Revised ID Needed by Ron Bonica
2010-03-31
12 Sean Turner
[Ballot comment]
- Section 3.1.2: "public key cryptography" should be "public key
encryption" (that's the term used in RFC 2409, and digital
signatures are …
[Ballot comment]
- Section 3.1.2: "public key cryptography" should be "public key
encryption" (that's the term used in RFC 2409, and digital
signatures are also a form of public key cryptography).
2010-03-31
12 Sean Turner
[Ballot discuss]
I am picking up Pasi's DISCUSS on this document.  Some were moved to COMMENT status, but the authors should also consult Pasi's COMMENT …
[Ballot discuss]
I am picking up Pasi's DISCUSS on this document.  Some were moved to COMMENT status, but the authors should also consult Pasi's COMMENT positions (if any).

I have reviewed draft-ietf-bmwg-ipsec-term-12, and have couple of
concerns about the terminology. For any other document, these
would be just editorial nits, but this is a terminology document,
after all:

- The text in Section 3.1.1 and 7.4 seems to apply only to IPsec
(ESP/AH) SAs, but not IKE SAs?

- Section 3.1.2: I would strongly suggest avoiding the term
"nonrepudiation" -- it's so overloaded that it's hard to know what it
means (if anything). This part of the text doesn't seem very relevant
to benchmarking anyway, so it probably could be just deleted.

- Section 7.3.1: This text seems to confuse the inputs to IKE Phase 1
(information configured before Phase 1 is run), the actual Phase 1 of
the protocol, and the output of that phase (Phase 1 SA or ISAKMP/IKE
SA).

- Section 7.3.1: "SPI information" probably should be "IPsec SA
information" or something like that.

- Section 7.3.2: This text seems to confuse the Phase 2 of the IKE
protocol, and its output (IPsec SA(s)).

- Section 7.6.1/7.6.2/7.6.3/7.6.4: This text seems to conflate the
"Phase 1 initiator" and "phase 2 initiator". While it's common to have
an "IPsec client" that only acts as "Phase 1 Initiator", the client
will also act as "Phase 2 Responder", since either end can initiate
phase 2 exchanges.

- Section 7.6.1/7.7.1/7.7.3/7.13/10.4.4/10.5.1/10.5.3/and several
other sections: There's no such thing as "IKE Phase 2 SA"; these are
not IKE SAs, but IPsec SAs.

- Section 7.7.1: I found this term really confusing, especially
considering the rest of the document seems to use it also in cases
where more than one IPsec SA pair exists. For example, Section 7.13
talks about "IKE Phase 1 SA to IKE Phase 2 SA ratio" for the IPsec
tunnels -- but according to this definition, the ratio can't be
anything else than 1 (otherwise it's not an "IPsec tunnel")!  And
Section 10.1.2 talks about establishing several Tunnels with a single
IKE SA, which isn't consistent with this definition.

- Section 7.8.2: The figure here is really confusing: you can't use
transport mode SAs this way...? (unless you do something like RFC
3884
)

- Section 7.9.1: MD5-HMAC should be spelled "HMAC-MD5"; likewise,
"HMAC-SHA1" instead of "HMAC-SHA"; and there's no such thing as
AES-HMAC.

- Section 7.9: The text should also cover combined mode algorithms,
like CCM and GCM (or explicitly state they're not covered by
this document).

- Section 10.2.2 and 10.2.3: I'm not quite sure what "The end points
(i.e. hosts, subnets) should NOT see any fragments at ANY time.  Only
on the IPsec link, fragments MAY occur." means.  Is this text trying
to say that when you're doing benchmarking, the devices under test
should be configured to do post-encryption fragmentation?  Or that the
endpoints generating the plaintext benchmarking fraffic should be
configured to use small enough packets that fragmentation see
fragments?

- Section 10.3.1: the terms "initiator" and "responder" don't seem
applicable here; perhaps sender/receiver?

- Section 10.4.1: the definition seems to cover only packet losses
before encryption or after decryption, but not between these two
points. Is this intentional? (it seems measuring this would be
challenging, since it the endpoints can only see how many frames were
dropped, but not where exactly)

- Section 10.8.2: it seems this should be "IPsec integrity check DoS
resiliency rate" or something -- it's not about IKE Phase 2.

- Section 10.8.3: likewise, this is not about Phase 2, so perhaps
"IPsec replay attack DoS resiliency rate"?
2010-03-31
12 Sean Turner [Ballot Position Update] New position, Discuss, has been recorded by Sean Turner
2009-11-19
12 Cindy Morgan State Changes to IESG Evaluation::Revised ID Needed from IESG Evaluation by Cindy Morgan
2009-11-19
12 Cullen Jennings [Ballot Position Update] Position for Cullen Jennings has been changed to Undefined from Abstain by Cullen Jennings
2009-11-19
12 Magnus Westerlund [Ballot Position Update] New position, No Objection, has been recorded by Magnus Westerlund
2009-11-19
12 Dan Romascanu [Ballot Position Update] New position, No Objection, has been recorded by Dan Romascanu
2009-11-18
12 Ross Callon [Ballot Position Update] New position, No Objection, has been recorded by Ross Callon
2009-11-18
12 Cullen Jennings [Ballot comment]
see comments on draft-ietf-bmwg-ipsec-meth
2009-11-18
12 Cullen Jennings [Ballot comment]
see comments on draft-ietf-bmwg-ipsec-meth
2009-11-18
12 Cullen Jennings [Ballot Position Update] New position, Abstain, has been recorded by Cullen Jennings
2009-11-16
12 Russ Housley
[Ballot comment]
The Gen-ART Review by Joel Halpern on 16-Oct-2009 raised some editorial
  concerns.

  The document is missing the IANA considerations placeholder.

  …
[Ballot comment]
The Gen-ART Review by Joel Halpern on 16-Oct-2009 raised some editorial
  concerns.

  The document is missing the IANA considerations placeholder.

  There seem to be a number of references that are missing.  RFC1962
  is an example of the problem.

  The "Issue" in section 7.5 looks like a reasonable issue, but it
  appears to have nothing to do with selectors, the subject of 7.5.

  The definitions in section 7.7.3 and 7.7.4 define the terms
  "Established Tunnel" and "Active Tunnel" and defines them as "An
  IPsec device ...".  The other tunnel definitions are in terms of the
  association.  It is quite jarring to see a device referred to as a
  tunnel.  Are these terms supposed to be Tunnel Endpoints?

  The definition of 7.10.1 describes the properties of AH, but does not
  actually say what it is.  Instead of starting "Provides", it probably
  should start something like "A protocol header which provides".  A
  similar comment applies to 7.10.2 on ESP.
2009-11-16
12 Russ Housley
[Ballot discuss]
The Gen-ART Review by Joel Halpern on 16-Oct-2009 raised two issues
  that need to be resolved.

  First, in section 3.1.1, where …
[Ballot discuss]
The Gen-ART Review by Joel Halpern on 16-Oct-2009 raised two issues
  that need to be resolved.

  First, in section 3.1.1, where Security Association is introduced, the
  text reads:

    "An SA is a relationship between two or more entities ..."

  But, section 7.4 formally defines Security Association as:

    "It is a negotation agreement between two IPsec devices ..."

  Is it always two?  If so, please remove "or more" in section 3.1.1.
  Also, is it always a negotiation agreement?  Earlier text talked about
  manual provisioning of Security Associations.

  Second, in section 10.2, the throughput measurement is defined in terms
  of packets per second.  This is probably the dominant factor.  However,
  some implementations may well be limited by cryptographic processing,
  and therefore have different packet processing performance for different
  ranges of packet sizes.  Section 10.2 should say something about the
  assumptions or requirements relative to packet size.  This seems to be
  important enough that it should not be assumed that readers will
  understand it from the reference to RFC 1242.
2009-11-16
12 Russ Housley [Ballot Position Update] New position, Discuss, has been recorded by Russ Housley
2009-11-16
12 Amy Vezza State Changes to IESG Evaluation from IESG Evaluation - Defer by Amy Vezza
2009-10-23
12 (System) Removed from agenda for telechat - 2009-10-22
2009-10-22
12 Cullen Jennings State Changes to IESG Evaluation - Defer from IESG Evaluation by Cullen Jennings
2009-10-22
12 Pasi Eronen
[Ballot comment]
- Sections 3 and 7.1: It might be worth clarifying that other
protocols than IKE can be used for key exchange (although benchmarking …
[Ballot comment]
- Sections 3 and 7.1: It might be worth clarifying that other
protocols than IKE can be used for key exchange (although benchmarking
them is beyond the scope of this document) in IPsec; in IETF, we have
specified at least Photuris, KINK, and HIP (and perhaps others I don't
recall right now).

- Sections 3, 3.1.2, 7.3: I think the text about historical origins
of IKE (hybrid of ISAKMP, Oakley, SKEME) is very unlikely to be
helpful to the readers (and probably mostly confusing).
2009-10-22
12 Pasi Eronen
[Ballot discuss]
I have reviewed draft-ietf-bmwg-ipsec-term-12, and have couple of
concerns about the terminology. For any other document, these
would be just editorial nits, …
[Ballot discuss]
I have reviewed draft-ietf-bmwg-ipsec-term-12, and have couple of
concerns about the terminology. For any other document, these
would be just editorial nits, but this is a terminology document,
after all:

- The text in Section 3.1.1 and 7.4 seems to apply only to IPsec
(ESP/AH) SAs, but not IKE SAs?

- Section 3.1.2: "public key cryptography" should be "public key
encryption" (that's the term used in RFC 2409, and digital
signatures are also a form of public key cryptography).

- Section 3.1.2: I would strongly suggest avoiding the term
"nonrepudiation" -- it's so overloaded that it's hard to know what it
means (if anything). This part of the text doesn't seem very relevant
to benchmarking anyway, so it probably could be just deleted.

- Section 7.3.1: This text seems to confuse the inputs to IKE Phase 1
(information configured before Phase 1 is run), the actual Phase 1 of
the protocol, and the output of that phase (Phase 1 SA or ISAKMP/IKE
SA).

- Section 7.3.1: "SPI information" probably should be "IPsec SA
information" or something like that.

- Section 7.3.2: This text seems to confuse the Phase 2 of the IKE
protocol, and its output (IPsec SA(s)).

- Section 7.6.1/7.6.2/7.6.3/7.6.4: This text seems to conflate the
"Phase 1 initiator" and "phase 2 initiator". While it's common to have
an "IPsec client" that only acts as "Phase 1 Initiator", the client
will also act as "Phase 2 Responder", since either end can initiate
phase 2 exchanges.

- Section 7.6.1/7.7.1/7.7.3/7.13/10.4.4/10.5.1/10.5.3/and several
other sections: There's no such thing as "IKE Phase 2 SA"; these are
not IKE SAs, but IPsec SAs.

- Section 7.7.1: I found this term really confusing, especially
considering the rest of the document seems to use it also in cases
where more than one IPsec SA pair exists. For example, Section 7.13
talks about "IKE Phase 1 SA to IKE Phase 2 SA ratio" for the IPsec
tunnels -- but according to this definition, the ratio can't be
anything else than 1 (otherwise it's not an "IPsec tunnel")!  And
Section 10.1.2 talks about establishing several Tunnels with a single
IKE SA, which isn't consistent with this definition.

- Section 7.8.2: The figure here is really confusing: you can't use
transport mode SAs this way...? (unless you do something like RFC
3884
)

- Section 7.9.1: MD5-HMAC should be spelled "HMAC-MD5"; likewise,
"HMAC-SHA1" instead of "HMAC-SHA"; and there's no such thing as
AES-HMAC.

- Section 7.9: The text should also cover combined mode algorithms,
like CCM and GCM (or explicitly state they're not covered by
this document).

- Section 10.2.2 and 10.2.3: I'm not quite sure what "The end points
(i.e. hosts, subnets) should NOT see any fragments at ANY time.  Only
on the IPsec link, fragments MAY occur." means.  Is this text trying
to say that when you're doing benchmarking, the devices under test
should be configured to do post-encryption fragmentation?  Or that the
endpoints generating the plaintext benchmarking fraffic should be
configured to use small enough packets that fragmentation see
fragments?

- Section 10.3.1: the terms "initiator" and "responder" don't seem
applicable here; perhaps sender/receiver?

- Section 10.4.1: the definition seems to cover only packet losses
before encryption or after decryption, but not between these two
points. Is this intentional? (it seems measuring this would be
challenging, since it the endpoints can only see how many frames were
dropped, but not where exactly)

- Section 10.8.2: it seems this should be "IPsec integrity check DoS
resiliency rate" or something -- it's not about IKE Phase 2.

- Section 10.8.3: likewise, this is not about Phase 2, so perhaps
"IPsec replay attack DoS resiliency rate"?
2009-10-22
12 Pasi Eronen [Ballot Position Update] New position, Discuss, has been recorded by Pasi Eronen
2009-10-21
12 Amanda Baber IANA comments:

We understand this document to require NO IANA Actions.
2009-10-21
12 Adrian Farrel
[Ballot comment]
I think the RFC Editor will require you to remove citations from your
Abstract.

---

In the Abstract...
  This document seeks to …
[Ballot comment]
I think the RFC Editor will require you to remove citations from your
Abstract.

---

In the Abstract...
  This document seeks to extend               
  these efforts specific to the IPsec paradigm.
Is there any chance you could be a little more positive?

---

Abstract
  The BMWG produces two
  major classes of documents: Benchmarking Terminology documents and
  Benchmarking Methodology documents.  The Terminology documents
  present the benchmarks and other related terms.  The Methodology
  documents define the procedures required to collect the benchmarks
  cited in the corresponding Terminology documents.

Very interesting, and completely true. But not material to include in
this Abstract

---

Section 2

  A seperate document will be written specifically to address
  testing using the updated IKEv2 specification.

Pedantic, but...
The IKEv2 specification was not updated. Perhaps just strike "updated"?

---

Section 4

  The definition format utilized by this document is described in
  [RFC1242], Section 2.

Well...
Why do you then redefine the format in this section? That seems counter-
productive. You should probably cut this section down to only the
sentence I quoted.
2009-10-21
12 Adrian Farrel
[Ballot discuss]
I think this is a very useful document with a lot of material. The volume of work is reflected in the number of …
[Ballot discuss]
I think this is a very useful document with a lot of material. The volume of work is reflected in the number of (relatively small) discussion points that I have.

Section 1

  To appropriately define the parameters and scope of this document,
  this section will give a brief overview of the IPsec standard.

Is there text missing? Should you be pointing forward to Section 3?

---

Section 2

  The terminology
  specified in this document is constrained to meet the requirements of
  the Methodology for Benchmarking IPsec Devices documented test
  methodologies.

This looks like the name of a document. Is a reference missing?

The text in the subsequent paragraphs appears to have been lifted from,
and to refer to, this other document.

---

Section 5

The use of RFC 2119 language seems eratic and maybe out of place.
You should decide whether you really want to use it, and if so, make its
use consistent.
At the very least you need to fix "WILL NOT" in section 7.7.1 as this
is not part of the RFC 2119 vocabulary.

---

Section 7.1

Since this section "defines" IPsec, it must include references to the
RFCs that define the protocol suite.

But I am not sure how this definition is intended to differ from that
in section 7.10.

---

Sections 8.1 and 8.2 include...


  See Also:  [...] Layer2 Clear Framesize, Layer2 Encrypted Framesize.

But these terms are not defined.

---

Sections 9.1 and 9.3

You should clarify the definition of "tunnel setup"?

One of the major issues in this type of work is comparing apples with
apples! This definition will be necessary to ensure that the metric
described in 10.5 has meaning.

Note also that in section 9.3 you have

  Issues:  If the TAPS increases, the TPS usually decreases, due to
      burdening of the DUT with the DOS attack traffic.

This might be true of a node under some form of load, and so applies to
the maxima in section 10.5, but it does not apply to the raw definitions
in this section. Not least to note is that TAPS includes all of the
successful setup attempts so an increase in TAPS may be a direct match
for an increase in TPS.

---

Section 10.2 offers symmetry for encryption and decryption at the DUT,
but does not seem to match this for send and receive. Thus, section
10.2.1 is ambiguous about "throughput" (as is RFC 1242) with respect to
a bidirectional flow.
2009-10-21
12 Adrian Farrel [Ballot Position Update] New position, Discuss, has been recorded by Adrian Farrel
2009-10-20
12 Ralph Droms [Ballot Position Update] New position, No Objection, has been recorded by Ralph Droms
2009-10-16
12 Sam Weiler Request for Telechat review by SECDIR is assigned to Stefan Santesson
2009-10-16
12 Sam Weiler Request for Telechat review by SECDIR is assigned to Stefan Santesson
2009-10-15
12 Ron Bonica [Ballot Position Update] New position, Yes, has been recorded for Ronald Bonica
2009-10-15
12 Ron Bonica Ballot has been issued by Ron Bonica
2009-10-15
12 Ron Bonica Created "Approve" ballot
2009-10-15
12 (System) Ballot writeup text was added
2009-10-15
12 (System) Last call text was added
2009-10-15
12 (System) Ballot approval text was added
2009-10-15
12 Ron Bonica State Changes to IESG Evaluation from Waiting for Writeup by Ron Bonica
2009-10-15
12 Ron Bonica Placed on agenda for telechat - 2009-10-22 by Ron Bonica
2009-10-14
12 Ron Bonica State Changes to Waiting for Writeup from AD Evaluation::External Party by Ron Bonica
2009-10-13
12 Ron Bonica State Changes to AD Evaluation::External Party from Publication Requested by Ron Bonica
2009-07-30
12 Cindy Morgan
    (1.a) Who is the Document Shepherd for this document? Has the
          Document Shepherd personally reviewed this version of …
    (1.a) Who is the Document Shepherd for this document? Has the
          Document Shepherd personally reviewed this version of the
          document and, in particular, does he or she believe this
          version is ready for forwarding to the IESG for publication?
Al Morton, chair of BMWG, has personally reviewed the documents and will
be the document shepherd. Editorial and nit-compliance changes requested
by Al were implemented in these versions. The documents are ready for
publication (several minor nits have been fixed in these versions).

    (1.b) Has the document had adequate review both from key WG members
          and from key non-WG members? Does the Document Shepherd have
          any concerns about the depth or breadth of the reviews that
          have been performed?
Yes, these documents have developed more or less continuously over the last
6 years, with good working group and external reviewer comments offered
and addressed.  The recent WGLC went quietly, indicating that the BMWG is
now satisfied with the documents (term-11 and meth-04).

    (1.c) Does the Document Shepherd have concerns that the document
          needs more review from a particular or broader perspective,
          e.g., security, operational complexity, someone familiar with
          AAA, internationalization or XML?
No, except that IESG review will be a good final check, of course.
As a side note, XML formatting problems held-up progress on these drafts
for a while, but there are no specifications involving XML.

    (1.d) Does the Document Shepherd have any specific concerns or
          issues with this document that the Responsible Area Director
          and/or the IESG should be aware of? For example, perhaps he
          or she is uncomfortable with certain parts of the document, or
          has concerns whether there really is a need for it. In any
          event, if the WG has discussed those issues and has indicated
          that it still wishes to advance the document, detail those
          concerns here. Has an IPR disclosure related to this document
          been filed? If so, please include a reference to the
          disclosure and summarize the WG discussion and conclusion on
          this issue.
One of the more controversial issues was whether these drafts should be
expanded to cover IKEv2.  The WG reached consensus to retain the IKEv1
scope, and a follow-up effort would address IKEv2.  This decision was
supported by events - it was reported at the IETF-74 BMWG session that
all known testing of implementations involves IKEv1 only.

    (1.e) How solid is the WG consensus behind this document? Does it
          represent the strong concurrence of a few individuals, with
          others being silent, or does the WG as a whole understand and
          agree with it?
It's fair to say that WG consensus involves key individuals rather than the
entire working group, but that's a byproduct of BMWG membership make-up
with diverse work areas. I believe that the entire WG has contributed to
discussion on aspects of these drafts, such as the exclusion of "IMIX"
traffic patterns (because of limited relevance to benchmarks, and lack
of consensus on the specifics - despite widespread use of the concept).

    (1.f) Has anyone threatened an appeal or otherwise indicated extreme
          discontent? If so, please summarise the areas of conflict in
          separate email messages to the Responsible Area Director. (It
          should be in a separate email because this questionnaire is
          entered into the ID Tracker.)
No.

    (1.g) Has the Document Shepherd personally verified that the
          document satisfies all ID nits? (See
          http://www.ietf.org/ID-Checklist.html and
          http://tools.ietf.org/tools/idnits/). Boilerplate checks are
          not enough; this check needs to be thorough. Has the document
          met all formal review criteria it needs to, such as the MIB
          Doctor, media type and URI type reviews?
Yes and Yes (but see below).

    (1.h) Has the document split its references into normative and
          informative? Are there normative references to documents that
          are not ready for advancement or are otherwise in an unclear
          state? If such normative references exist, what is the
          strategy for their completion? Are there normative references
          that are downward references, as described in [RFC3967]? If
          so, list these downward references to support the Area
          Director in the Last Call procedure for them [RFC3967].

The reference sections are split in both drafts, and these are Informational
Status drafts - so down-refs are not possible.

The terminology has normative references to several Obsolete RFCs:

  ** Obsolete normative reference: RFC 2393 (Obsoleted by RFC 3173)

  ** Obsolete normative reference: RFC 2401 (Obsoleted by RFC 4301)

  ** Obsolete normative reference: RFC 2402 (Obsoleted by RFC 4302, RFC 4305)

  ** Obsolete normative reference: RFC 2406 (Obsoleted by RFC 4303, RFC 4305)

  ** Obsolete normative reference: RFC 2407 (Obsoleted by RFC 4306)

  ** Obsolete normative reference: RFC 2408 (Obsoleted by RFC 4306)

  ** Obsolete normative reference: RFC 2409 (Obsoleted by RFC 4306)

  ** Obsolete normative reference: RFC 2547 (Obsoleted by RFC 4364)


The Methodology has a normative reference to:
    [I-D.ietf-ipsec-properties]
              Krywaniuk, A., "Security Properties of the IPsec Protocol
              Suite", draft-ietf-ipsec-properties-02 (work in progress),
              July 2002.
this needs to be dealt with, possibly by making it informative, or by deletion?

    (1.i) Has the Document Shepherd verified that the document IANA
          consideration section exists and is consistent with the body
          of the document? If the document specifies protocol
          extensions, are reservations requested in appropriate IANA
          registries? Are the IANA registries clearly identified? If
          the document creates a new registry, does it define the
          proposed initial contents of the registry and an allocation
          procedure for future registrations? Does it suggest a
          reasonable name for the new registry? See [RFC5226]. If the
          document describes an Expert Review process has Shepherd
          conferred with the Responsible Area Director so that the IESG
          can appoint the needed Expert during the IESG Evaluation?
Neither draft has an IANA section.  However, this should be simple to add,
since neither document makes a request of IANA (as is typical of BMWG memos,
the request for IPv6 address space last year is an exception).

    (1.j) Has the Document Shepherd verified that sections of the
          document that are written in a formal language, such as XML
          code, BNF rules, MIB definitions, etc., validate correctly in
          an automated checker?
N/A

    (1.k) The IESG approval announcement includes a Document
          Announcement Write-Up. Please provide such a Document
          Announcement Write-Up? Recent examples can be found in the
          "Action" announcements for approved documents. The approval
          announcement contains the following sections:

          Technical Summary
    The BMWG produces two major classes of documents:
    Benchmarking Terminology documents and Methodology documents.
    The Terminology documents present the benchmarks and other related terms.
    The Methodology documents define the procedures required to collect the
    benchmarks cited in the corresponding Terminology documents.

    This purpose of these documents is to define terms and methods for
    benchmarking the performance of IPsec devices.  It builds upon the
    tenets set forth in [RFC1242], [RFC2544], [RFC2285] and other IETF
    Benchmarking Methodology Working Group (BMWG) documents (used for
    benchmarking routers and switches).  This document seeks to extend
    these efforts specific to the IPsec paradigm.

          Working Group Summary
    Although there were some controversial points during development, all
    were resolved, and these drafts represent the consensus of the BMWG.

          Document Quality
    The Acknowledgements sections list many of the experts who reviewed
    thses drafts.
2009-07-30
12 Cindy Morgan Draft Added by Cindy Morgan in state Publication Requested
2009-07-30
12 Cindy Morgan [Note]: 'Al Morton (acmorton@att.com) is the document shepherd.' added by Cindy Morgan
2009-07-28
12 (System) New version available: draft-ietf-bmwg-ipsec-term-12.txt
2009-04-03
11 (System) New version available: draft-ietf-bmwg-ipsec-term-11.txt
2008-02-25
10 (System) New version available: draft-ietf-bmwg-ipsec-term-10.txt
2007-07-11
09 (System) New version available: draft-ietf-bmwg-ipsec-term-09.txt
2006-03-06
08 (System) New version available: draft-ietf-bmwg-ipsec-term-08.txt
2005-10-18
07 (System) New version available: draft-ietf-bmwg-ipsec-term-07.txt
2005-07-21
06 (System) New version available: draft-ietf-bmwg-ipsec-term-06.txt
2005-02-21
05 (System) New version available: draft-ietf-bmwg-ipsec-term-05.txt
2004-07-20
04 (System) New version available: draft-ietf-bmwg-ipsec-term-04.txt
2004-02-16
03 (System) New version available: draft-ietf-bmwg-ipsec-term-03.txt
2003-10-24
02 (System) New version available: draft-ietf-bmwg-ipsec-term-02.txt
2003-06-30
01 (System) New version available: draft-ietf-bmwg-ipsec-term-01.txt
2003-03-06
00 (System) New version available: draft-ietf-bmwg-ipsec-term-00.txt