Operational Considerations and Issues with IPv6 DNS
draft-ietf-dnsop-ipv6-dns-issues-12
Revision differences
Document history
Date | Rev. | By | Action |
---|---|---|---|
2012-08-22
|
12 | (System) | post-migration administrative database adjustment to the No Objection position for Margaret Wasserman |
2012-08-22
|
12 | (System) | post-migration administrative database adjustment to the No Objection position for Steven Bellovin |
2006-01-20
|
12 | Amy Vezza | State Changes to RFC Ed Queue from Approved-announcement sent by Amy Vezza |
2006-01-13
|
12 | Amy Vezza | IESG state changed to Approved-announcement sent |
2006-01-13
|
12 | Amy Vezza | IESG has approved the document |
2006-01-13
|
12 | Amy Vezza | Closed "Approve" ballot |
2006-01-11
|
12 | David Kessens | State Changes to Approved-announcement to be sent from IESG Evaluation::AD Followup by David Kessens |
2006-01-05
|
12 | Margaret Cullen | [Ballot Position Update] Position for Margaret Wasserman has been changed to No Objection from Discuss by Margaret Wasserman |
2005-12-16
|
12 | (System) | Removed from agenda for telechat - 2005-12-15 |
2005-12-15
|
12 | Amy Vezza | State Changes to IESG Evaluation::AD Followup from IESG Evaluation::Revised ID Needed by Amy Vezza |
2005-12-08
|
12 | David Kessens | Placed on agenda for telechat - 2005-12-15 by David Kessens |
2005-12-08
|
12 | David Kessens | [Note]: 'To check (for the third time) on the status of the resolution of Thomas Narten/Margaret Wasserman''s DISCUSS. ' added by David Kessens |
2005-12-01
|
12 | Amy Vezza | State Changes to IESG Evaluation::Revised ID Needed from IESG Evaluation by Amy Vezza |
2005-12-01
|
12 | Mark Townsley | [Ballot Position Update] New position, No Objection, has been recorded for Mark Townsley by Mark Townsley |
2005-11-30
|
12 | Margaret Cullen | [Ballot discuss] Most of the problems listed in the last discuss have been fixed, but the following issues have not yet been addressed: > … [Ballot discuss] Most of the problems listed in the last discuss have been fixed, but the following issues have not yet been addressed: > If the implementation decides to keep as much data (whether > "critical" or "courtesy") as possible in the UDP responses, it might The "whether" adds confusion. You always need to keep the critical data -- that's not an implementaion choice... > That is, leaving in some intelligently selected critical additional > data is a tradeoff between creating an optimization for those > resolvers which ignore the "should discard" recommendation, and a > causing a protocol problem by propagating inconsistent information > about "critical" records in the caches. I don't understand this (or the context). With critical data, one must include it all, or one sets the TC. Why talk about selectively omitting critical data? > If an implementation would look at the transport used for the query, > it is worth remembering that often the host using the records is ...snip... > is not feasible, return no misleading information but rather leave it > to the client to query again. A big premise of all of section 4.4 seemed to (originally) be that there were times when "inconsisent" data could be in some caches, leading to "correctness" problems. I believe we are in agreement that this premise is false. Right? The above text still seems to be written from the older perspective. I.e., I'm not sure what point the above is trying to make or why it needs making. > Additionally, to avoid the case where an application would not get an > address at all due to some of "courtesy" additional ... ...snip... >... specific records > of the desired protocol, not just rely on getting all the required > RRsets in the additional section. This text suggests a "fix" for a "problem", but that problem could only result from broken implementations. But the wording isn't written that way. Is it in fact known that there are broken implementations in this regard? And are such broken implementation only a probly for IPv6? |
2005-11-30
|
12 | David Kessens | State Changes to IESG Evaluation from IESG Evaluation::AD Followup by David Kessens |
2005-11-18
|
12 | David Kessens | Placed on agenda for telechat - 2005-12-01 by David Kessens |
2005-11-18
|
12 | David Kessens | [Note]: 'To check (for the second time) on the status of the resolution of Thomas Narten/Margaret Wasserman''s DISCUSS. ' added by David Kessens |
2005-10-20
|
12 | (System) | New version available: draft-ietf-dnsop-ipv6-dns-issues-12.txt |
2005-07-19
|
11 | (System) | New version available: draft-ietf-dnsop-ipv6-dns-issues-11.txt |
2005-06-21
|
12 | David Kessens | Removed from agenda for telechat - 2005-06-23 by David Kessens |
2005-06-21
|
12 | Margaret Cullen | [Ballot discuss] I am holding a discuss for the issues that Thomas Narten raised in his original discuss (see comment log). Thomas was asked if … [Ballot discuss] I am holding a discuss for the issues that Thomas Narten raised in his original discuss (see comment log). Thomas was asked if his discuss was addressed and sent the message below on 6/13 indicating that they had not all been resolved. There hasn't been any response to Thomas' message (as of 6/21). To: Pekka Savola cc: Rob Austein Subject: Re-review of draft-ietf-dnsop-ipv6-dns-issues-10.txt From: Thomas Narten Looking at the current draft, I have the following comments on the revised text. > conjunction of MX records is shown in Section 4.5; an example of the s/is shown/as shown/ > An example of the "courtesy" additional data is A/AAAA records in > conjunction of MX records is shown in Section 4.5; an ... ...snip... >... IN NS ns.child.example.com. > ns.child.example.com. IN A 192.0.2.1 > ns.child.example.com. IN AAAA 2001:db8::1 Better wording: an example of the "critical" additional data is shown below (where getting both the A and AAAA RRsets is critical w.r.t. to the NS RR): > Failing to discard the response with TC bit set leads to a protocol > problem. Omitting only some of the RRsets if all would not fit leads > to a performance problem. These are discussed in Section 4.4.3. not being clear above in terms of what is critical and what is not. The middle sentence is only true in the context of noncritical data. > 4.4.2 Which Additional Data to Keep, If Any? Is this section now (only) about "courtesy" data? If so, better to say so. > If the implementation decides to keep as much data (whether > "critical" or "courtesy") as possible in the UDP responses, it might seems the "whether" adds confusion. You always need to keep the critical data -- that's not an implemenation choice... > complete. Removing all the RRsets if some would not fit obviates a > performance problem, which would require the users to issue second > queries to obtain consistent information. wording could be better... perhaps: Omitting all the RRsets (when removing only some would suffice) may create a performance penalty, whereby the client may be need to issue one or more additional queries to obtain necessary information. > 4.4.2 Which Additional Data to Keep, If Any? shouldn't this be focused solely on courtesy data? > That is, leaving in some intelligently selected critical additional > data is a tradeoff between creating an optimization for those > resolvers which ignore the "should discard" recommendation, and a > causing a protocol problem by propagating inconsistent information > about "critical" records in the caches. don't understand this (or the context). With critical data, one must include it all, or one sets the TC. Why talk about selectively omitting critical data? > 4.4.3 Discussion of the Problems > > > As noted above, the temptation for omitting only some of the > additional data based on the transport of the query could be > problematic. In particular, there appears to be little justification > for doing so in the case of "courtesy" data. Don't understand the first sentence. Even second one is suspect. > If an implementation would look at the transport used for the query, > it is worth remembering that often the host using the records is ...snip... > is not feasible, return no misleading information but rather leave it > to the client to query again. A big premise of all of section 4.4 seemed to (originally) be that there were times when "inconsisent" data could be in some caches, leading to "correctness" problems. I believe we are in agreement that this premise is false. Right? The above text still seems to be written from the older perspective. I.e., I'm not sure what point the above is trying to make or why it needs making. > Additionally, to avoid the case where an application would not get an > address at all due to some of "courtesy" additional ... ...snip... >... specific records > of the desired protocol, not just rely on getting all the required > RRsets in the additional section. This text is also bogus, IMO. It suggests a "fix" for a "problem", but that problem could only result from broken implementations. But the wording isn't written that way. Is it in fact known that there are broken implementations in this regard? And are such broken implementation only a probly for IPv6? > 4.5 The Use of TTL for IPv4 and IPv6 RRs I had comments on this from previous reviews. Rereading this section, I don't know that it ha schanged. I'm not at all sure what the point of this section is. having different TTLs on different RRsets poses no correctness problems. Indeed, in general, one doesn't know what a caching servers' reclaimation policy is. So, one can always run into situations where a server discards one RRset but not another, leading to the described problem. So, this "problem" is not fixiable anyway. Good, since its not really an actual problem AFAIK. And yeah, sure if applications don't query the DNS for RRs they are supposed to (e.g, by the definition of the MX record), that will lead to problems. But if implementors don't follow the specs, they get what they deserve. If all section 4.5 says is the above, I'm not sure why this section is needed. I have only re-reviewed section 4.4 and 4.5. |
2005-06-20
|
12 | Russ Housley | [Ballot Position Update] New position, No Objection, has been recorded for Russ Housley by Russ Housley |
2005-06-09
|
12 | Amy Vezza | State Changes to IESG Evaluation::AD Followup from IESG Evaluation by Amy Vezza |
2005-06-09
|
12 | Margaret Cullen | [Ballot discuss] Holding a discuss to determine if Thomas' discuss has been properly addressed. (See comment log for details of Thomas' discuss) |
2005-06-09
|
12 | Margaret Cullen | [Ballot Position Update] New position, Discuss, has been recorded for Margaret Wasserman by Margaret Wasserman |
2005-06-09
|
12 | Bert Wijnen | [Ballot Position Update] New position, No Objection, has been recorded for Bert Wijnen by Bert Wijnen |
2005-06-08
|
12 | Michelle Cotton | IANA Comments: No IANA Considerations section. We understand this document to have NO IANA Actions. |
2005-06-07
|
12 | Brian Carpenter | [Ballot comment] Michael Patton notes: My major concern is with the number of references that are still ID. Are these IDs really close enough to … [Ballot comment] Michael Patton notes: My major concern is with the number of references that are still ID. Are these IDs really close enough to completion? Actually, in the process of doing the review I had reason to want to refer to several of the IDs for further info and crosschecking, all the ones that I tried to look up were expired. It's probably of enough importance to get this draft out as an RFC that holding it up for another draft still being revised would be unfortunate. But even some of the informative references are fairly important, so I'm not sure where to go on this... |
2005-06-07
|
12 | Brian Carpenter | [Ballot Position Update] New position, No Objection, has been recorded for Brian Carpenter by Brian Carpenter |
2005-06-01
|
12 | David Kessens | State Changes to IESG Evaluation from IESG Evaluation::AD Followup by David Kessens |
2005-06-01
|
12 | David Kessens | Placed on agenda for telechat - 2005-06-09 by David Kessens |
2005-06-01
|
12 | David Kessens | [Note]: 'To check on the status of the resolution of Thomas DISCUSS.' added by David Kessens |
2004-10-26
|
10 | (System) | New version available: draft-ietf-dnsop-ipv6-dns-issues-10.txt |
2004-08-09
|
09 | (System) | New version available: draft-ietf-dnsop-ipv6-dns-issues-09.txt |
2004-07-23
|
12 | Steven Bellovin | [Ballot Position Update] Position for Steve Bellovin has been changed to No Objection from Discuss by Steve Bellovin |
2004-07-19
|
12 | (System) | Sub state has been changed to AD Follow up from New Id Needed |
2004-07-19
|
08 | (System) | New version available: draft-ietf-dnsop-ipv6-dns-issues-08.txt |
2004-06-18
|
12 | Thomas Narten | [Ballot discuss] Overall, there is some useful stuff in this document, but it seems overly long, and not very crisp in what it is trying … [Ballot discuss] Overall, there is some useful stuff in this document, but it seems overly long, and not very crisp in what it is trying to say. > over IPv4, and A records over IPv6. The DNS servers must not make > any assumptions about what data to return for Answer and Authority > sections. add "based on the underlying transport used in a query". Actually, after having read the entire document, I wonder about his must; is should good enough? As I point out later, the document has not made a compelling case that the above is required for protocol correctness, vs. just as an optimization. And I might add, if the DNS server has to discard some additional section stuff because the packet will be too big, using the transport as a hint might be better than just flipping a coin... > Temporary addresses defined in RFC3041 [10] (sometimes called > "privacy addresses") use a random number as the interface identifier. > Publishing DNS records relating to such addresses would defeat the > purpose of the mechanism and is not recommended. If absolutely > necessary, a mapping could be made to some non-identifiable name, as > described in [10]." Actually, registering names of the form "ipv6 address in hex" would be just fine, as it would provide no new information. > Note that it does not seem feasible to provide reverse DNS with the > other automatic tunneling mechanism, Teredo [12]; this is because the Please don't refer to Teredo as "the other ... mechanism", as it makes it sound like there are only two. Surely, there are many possible. > [14] Bush, R. and J. Damas, "Delegation of 2.0.0.2.ip6.arpa", > draft-ymbk-6to4-arpa-delegation-00 (work in progress), February > 2003. > Hmm. what is status of this? ID tracker says dead... > 4.1 Use of Service Names instead of Node Names > > > When a node includes multiple services, one should keep them > logically separate in the DNS. This can be done by the use of > service names instead of node names (or, "hostnames"). This > operational technique is not specific to IPv6, but required to > understand the considerations described in Section 4.2 and Section > 4.3. This document should not be making such a general recommendation. Especially not without some context about when/why one might do this. I just asserts "one should". "should" is completely misplaced and lacks context. > 4.2 Separate vs the Same Service Names for IPv4 and IPv6 > > > The service naming can be achieved in basically two ways: when a > service is named "service.example.com" for IPv4, the IPv6-enabled > service could be either added to "service.example.com", or added > separately to a sub-domain, like, "service.ipv6.example.com". Requirment is to use a different name. NOt sure why a subdomain should be the (only) example. At least make clear that the requirment is to use a different name. But this also means that IPv6 vs. IPv4 is not transparent to applications/users, which is a disadvantage. Oh, maybe you want to use a subdomain so you can use a search path??? This seems like a narrow solution, not a general one. > 4.4 Behaviour of Additional Data in IPv4/IPv6 Environments > > > Consider the case where the query name is so long, the number of the > additional records is so high, or for other reasons that the entire > response would not fit in a single UDP packet. In some cases, the > responder truncates the response with the TC bit being set (leading > to a retry with TCP), in order for the querier to get the entire > response later. does one set the T bit if one can't include the additional sections? or if critical info was truncated? > 2. "courtesy" additional data; this could be sent in full, with only > a few RRsets, or with no RRsets, and can be fetched separately as > well but could lead to non-optimal results. better: "... as well, but at the cost of additional queries". > This temptation would have significant problems in multiple areas. this needs to be justified. It is not clear to me what the "significant problem" is. Indeed, is it just poor performance, or incorrectness of result? Please be very clear on this point! Section 4.4 could be more clear that when it starts talking about problems, it is only talking about data in the additional section. Presumably the answer section contains a correct answer. Section distinguishes between "critical" and "courtesy" data (which is good), but then later when talking about problems doesn't make clear which of these two cause problems. Omitting "courtesy" data by definition is never a problem (from a corrrectness perspective). > In the case of too much additional data (whether courtesy or > critical), it might be tempting to not return the AAAA records if the > transport for DNS query was IPv4, or not return the A records, if the > transport was IPv6. However, this breaks the model of independence > of DNS transport and resource records, as noted in Section 1.2. > At this point, the doc is not clear about whether the above problem ocurrs only with critical data. Also, using the transport as a hint seems like it might be better than just flipping a coin... > This temptation would have significant problems in multiple areas. > Remember that often the end-node, which will be using the records, is > not the same one as the node requesting them from the authoritative > DNS server (or even a caching resolver). So, whichever version the > requestor ("the middleman") uses makes no difference to the ultimate > user of the records. This might result in e.g., inappropriately > returning A records to an IPv6-only node, going through a > translation, or opening up another IP-level session (e.g., a PDP > context [20]). Don't follow. For non-critical Additional Section, one can delete whatever. That shouldn't impact correctness (just performance). Also, don't follow the last part of second paragraph. > The problem of too much additional data seems to be an operational > one: the zone administrator entering too many records which will be > returned either truncated or missing some RRsets to the users. A > protocol fix for this is using EDNS0 [40] to signal the capacity for The operator configures what gets put into additional section? Is this really the case? > Additionally, to avoid the case where an application would not get an > address at all due to non-critical additional data being omitted, the > applications should be able to query the specific records of the > desired protocol, not just rely on getting all the required RRsets in > the additional section. This section has not explained clearly how not including "non-critical" (please use the term you defined earlier, actually) can cause an actual correctness problem. > 4.5 The Use of TTL for IPv4 and IPv6 RRs > > > In the previous section, we discussed a danger with queries, > potentially leading to omitting RRsets from the additional section; > this could happen to both critical and "courtesy" additional data. The above is again really unclear. Is the above a protocol issue, or an implementation issue? > 1. We get back no A or AAAA RRsets: this is the simplest case, > because then we have to query which information is required > explicitly, guaranteeing that we get all the information we're > interested in. Don't know if this is true. If I do an MX query, and don't get back either A or AAAA records, a subsequent query (by the application) may only ask for A records. Thus, at the end of the day, you can't guarantee that both A and AAAA will be in the cache at the same time. > 2. We get back all the RRsets: this is an optimization as there is > no need to perform more queries, causing lower latency. However, > it is impossible to guarantee that in fact we would always get > back all the records (the only way to ensure that is to send a > AAAA query for the name after getting the cached reply); however, > one could try to work in the direction to try to ensure it as far > as possible. Again, not true. The only way to ensure you got all the RRsets is to separately query for both A and AAAA (not just AAAA). > 3. We only get back A or AAAA RRsets even if both existed: this is > indistinguishable from the previous case, and problematic as > described in the previous section. I haven't been entirely convinced by the previous section, actually. > After 100 seconds, the AAAA record is removed from the cache(s) > because its TTL expired. It would be useful for the caching > resolvers to discard the A record when the shorter TTL (in this case, > for the AAAA record) expires; this would avoid the situation where > there would be a window of 200 seconds when incomplete information is > returned from the cache. However, this is not mandated or mentioned > by the specification(s). This recommendation seems broken. I also don't understand what the problem is. > Thus, applications that use the response should not rely on a > particular TTL configuration. For example, even if an application > gets a response that only has the A record in the example described > above, it should not assume there is no AAAA record for > "foo.example.com". Instead, the application should try to fetch the > missing records by itself if it needs the record. the above seems to make assumptions about what applications do. Yet those assumptions directly contradict correct DNS behavior. Is this in fact a real problem (i.e, that apps don't implement the spec correctly in this context)? > The problems are serious because when looking up a DNS name, typical > getaddrinfo() implementations, with AF_UNSPEC hint given, first try provide reference? > configuration. The only (minor) twist is that with SLAAC, the DNS > server cannot tie the authentication of the user to the IP address, > and stronger mechanisms must be used [32]. As relying on IP > Don't understand this sentence. > Dynamic DNS with SLAAC simpler than forward DNS updates in some > regard, while being more difficult in another. s/simpler/is simpler/?? actuall, I don't understand what this sentence is trying to say... > The address space administrator decides whether the hosts are trusted > to update their reverse DNS records or not. If they are, a simple > address-based authorization is typically sufficient (i.e., check that > the DNS update is done from the same IP address as the record being > updated); stronger security can also be used [32]. If they aren't > allowed to update the reverses, no update can occur. I am surprised to see this recommended, given the ease of address spoofing attacks. > However, it is worth noting that in particular with Dynamic DNS > Updates, security models based on the source address validation are > very weak and cannot be recommended. On the other hand, it should be Actually, earlier text seemed to say this was OK in some circumstances... Which is it? > To re-emphasize which was already stated, reverse DNS checks provide > very weak security at best, and the only (questionable) > security-related use for them may be in conjunction with other > mechanisms when authenticating a user. Actually, this document hasn't done a very good job of defining just what the "reverse DNS check" is. There are several variants, and I thought the one that is actually used in practice is the one in BSD that requires both a reverse and forward lookup, with the _forward_ lookup providing the "security", whereas the revers lookup only provides the name to be used in the forward lookup and is by itself meaningless. > 11. References There are a lot of references to IDs here. Even though many are "informative", I suspect that this document would be most useful if it were not published until a good number of those IDs are RFCs (so they can be referenced). It would be good to think hard about which references are like that and whether those documents are ever going to be published. |
2004-06-10
|
12 | Amy Vezza | State Changes to IESG Evaluation::Revised ID Needed from IESG Evaluation by Amy Vezza |
2004-06-10
|
12 | Steven Bellovin | [Ballot discuss] 4.1 advocates service names in the DNS. Is this our official position, as opposed to SRV records? I thought we wanted to discourage … [Ballot discuss] 4.1 advocates service names in the DNS. Is this our official position, as opposed to SRV records? I thought we wanted to discourage such things. If SRV records are meant, this should be clarified. (This is similar to one of my comments on draft-ietf-v6ops-application-transition, and should be resolved in the same way.) |
2004-06-10
|
12 | Steven Bellovin | [Ballot Position Update] Position for Steve Bellovin has been changed to Discuss from No Objection by Steve Bellovin |
2004-06-10
|
12 | Thomas Narten | [Ballot discuss] Placeholder: details to follow. |
2004-06-10
|
12 | Thomas Narten | [Ballot Position Update] New position, Discuss, has been recorded for Thomas Narten by Thomas Narten |
2004-06-10
|
12 | Scott Hollenbeck | [Ballot Position Update] New position, No Objection, has been recorded for Scott Hollenbeck by Scott Hollenbeck |
2004-06-10
|
12 | David Kessens | [Ballot Position Update] New position, Yes, has been recorded for David Kessens by David Kessens |
2004-06-10
|
12 | Alex Zinin | [Ballot comment] Feedback from gen-art (Spencer and Brian): generally useful document; would benefit mentioning that not all transition mechanisms considered by v6ops or generally possible … [Ballot comment] Feedback from gen-art (Spencer and Brian): generally useful document; would benefit mentioning that not all transition mechanisms considered by v6ops or generally possible are under consideration and why. An editing pass would help eliminate things like: Dynamic DNS with SLAAC simpler than forward DNS updates in some regard, while being more difficult in another. |
2004-06-10
|
12 | Alex Zinin | [Ballot Position Update] New position, No Objection, has been recorded for Alex Zinin by Alex Zinin |
2004-06-10
|
12 | Bill Fenner | [Ballot Position Update] New position, No Objection, has been recorded for Bill Fenner by Bill Fenner |
2004-06-09
|
12 | Steven Bellovin | [Ballot Position Update] New position, No Objection, has been recorded for Steve Bellovin by Steve Bellovin |
2004-06-09
|
12 | Ted Hardie | [Ballot Position Update] Position for Ted Hardie has been changed to No Objection from Undefined by Ted Hardie |
2004-06-09
|
12 | Ted Hardie | [Ballot comment] In 3.1, the draft says: The solution is to fix or retire those misbehaving implementations, but that is likely not going to … [Ballot comment] In 3.1, the draft says: The solution is to fix or retire those misbehaving implementations, but that is likely not going to be effective. There are some possible ways to mitigate the problem, e.g. by performing the lookups somewhat in parallel and reducing the timeout as long as at least one answer has been received; but such methods remain to be investigated; slightly more on this is included in Section 5. I note that in the recent MARID interim folks who use DNS lookups as part of related spam abatement procedures talked about using parallel lookups for a variety of RRs (including A and AAAA) as though it were common practice for them. In particular,they seem to use a set of mechanisms for information sharing between query threads that may be more generally useful. The loosely parallel mechanism looks like an attempt to game a race condition, and that seems like it is unlikely to give consistent results. |
2004-06-09
|
12 | Ted Hardie | [Ballot Position Update] New position, Undefined, has been recorded for Ted Hardie by Ted Hardie |
2004-06-09
|
12 | Amy Vezza | Ballot has been issued by Amy Vezza |
2004-06-09
|
12 | Amy Vezza | Created "Approve" ballot |
2004-06-09
|
12 | (System) | Ballot writeup text was added |
2004-06-09
|
12 | (System) | Last call text was added |
2004-06-09
|
12 | (System) | Ballot approval text was added |
2004-06-03
|
12 | David Kessens | Placed on agenda for telechat - 2004-06-10 by David Kessens |
2004-06-03
|
12 | David Kessens | State Changes to IESG Evaluation from AD Evaluation by David Kessens |
2004-05-26
|
12 | David Kessens | State Changes to AD Evaluation from Publication Requested by David Kessens |
2004-05-21
|
12 | Dinara Suleymanova | State Changes to Publication Requested from AD is watching by Dinara Suleymanova |
2004-05-21
|
12 | Dinara Suleymanova | Intended Status has been changed to Informational from None |
2004-05-21
|
12 | Dinara Suleymanova | [Note]: 'Participant in PROTO Team pilot: Workgroup Chair Followup of AD Evaluation Comments http://www.ietf.org/internet-drafts/draft-ietf-proto-ad-comments-pilot-00.txt' added by Dinara Suleymanova |
2004-05-13
|
07 | (System) | New version available: draft-ietf-dnsop-ipv6-dns-issues-07.txt |
2004-05-01
|
12 | Margaret Cullen | Draft Added by Margaret Wasserman |
2004-05-01
|
12 | Margaret Cullen | [Note]: 'Participant in PROTO Team pilot: Workgroup Chair Followup of AD Evaluation Comments http://www.ietf.org/internet-drafts/draft-ietf-proto-ad-comments-pilot-00.txt' added by Margaret Wasserman |
2004-04-28
|
06 | (System) | New version available: draft-ietf-dnsop-ipv6-dns-issues-06.txt |
2004-04-20
|
05 | (System) | New version available: draft-ietf-dnsop-ipv6-dns-issues-05.txt |
2004-01-27
|
04 | (System) | New version available: draft-ietf-dnsop-ipv6-dns-issues-04.txt |
2003-12-04
|
03 | (System) | New version available: draft-ietf-dnsop-ipv6-dns-issues-03.txt |
2003-03-07
|
02 | (System) | New version available: draft-ietf-dnsop-ipv6-dns-issues-02.txt |
2003-03-05
|
01 | (System) | New version available: draft-ietf-dnsop-ipv6-dns-issues-01.txt |
2002-11-04
|
00 | (System) | New version available: draft-ietf-dnsop-ipv6-dns-issues-00.txt |