Skip to main content

IP Fragmentation Considered Fragile
draft-ietf-intarea-frag-fragile-17

Revision differences

Document history

Date Rev. By Action
2020-09-04
17 (System) RFC Editor state changed to AUTH48-DONE from AUTH48
2020-08-20
17 (System) RFC Editor state changed to AUTH48 from RFC-EDITOR
2020-06-23
17 (System) RFC Editor state changed to RFC-EDITOR from EDIT
2020-06-10
17 (System) RFC Editor state changed to EDIT from MISSREF
2019-10-10
17 (System) RFC Editor state changed to MISSREF
2019-10-10
17 (System) IESG state changed to RFC Ed Queue from Approved-announcement sent
2019-10-10
17 (System) Announcement was received by RFC Editor
2019-10-10
17 (System) IANA Action state changed to No IANA Actions from In Progress
2019-10-10
17 (System) IANA Action state changed to In Progress
2019-10-10
17 Amy Vezza IESG state changed to Approved-announcement sent from Approved-announcement to be sent
2019-10-10
17 Amy Vezza IESG has approved the document
2019-10-10
17 Amy Vezza Closed "Approve" ballot
2019-10-10
17 Amy Vezza Ballot approval text was generated
2019-10-10
17 Suresh Krishnan IESG state changed to Approved-announcement to be sent from IESG Evaluation::AD Followup
2019-09-30
17 Bob Hinden New version available: draft-ietf-intarea-frag-fragile-17.txt
2019-09-30
17 (System) New version accepted (logged-in submitter: Bob Hinden)
2019-09-30
17 Bob Hinden Uploaded new revision
2019-09-03
16 Alissa Cooper [Ballot comment]
Thanks for addressing my DISCUSS.
2019-09-03
16 Alissa Cooper [Ballot Position Update] Position for Alissa Cooper has been changed to No Objection from Discuss
2019-08-30
16 (System) Sub state has been changed to AD Followup from Revised ID Needed
2019-08-30
16 (System) IANA Review state changed to Version Changed - Review Needed from IANA OK - No Actions Needed
2019-08-30
16 Bob Hinden New version available: draft-ietf-intarea-frag-fragile-16.txt
2019-08-30
16 (System) New version approved
2019-08-30
16 (System)
Request for posting confirmation emailed to previous authors: Ron Bonica , Ole Troan , Fernando Gont , Robert Hinden , intarea-chairs@ietf.org, Geoff Huston , …
Request for posting confirmation emailed to previous authors: Ron Bonica , Ole Troan , Fernando Gont , Robert Hinden , intarea-chairs@ietf.org, Geoff Huston , Fred Baker
2019-08-30
16 Bob Hinden Uploaded new revision
2019-08-22
15 Zitao Wang Request for Last Call review by OPSDIR Completed: Ready. Reviewer: Zitao Wang. Sent review to list.
2019-08-13
15 Tero Kivinen Assignment of request for Last Call review by SECDIR to Matthew Miller was rejected
2019-08-08
15 Benjamin Kaduk
[Ballot comment]
Thank you for this document.  Among other helpful things, it includes
the most clear and memorable description of the distinction between
PMTUD and …
[Ballot comment]
Thank you for this document.  Among other helpful things, it includes
the most clear and memorable description of the distinction between
PMTUD and PLPMTUD that I've heard yet, which I expect I will even be
able to remember for the next time I need it.

Section 2.1

  Each link is constrained by the number of bytes that it can convey in
  a single IP packet.  This constraint is called the link Maximum
  Transmission Unit (MTU).  Whlie the end-to-end Path MTU is the size
  of a single IPv4 header, IPv4 [RFC0791] requires every link to
  support at least a specified MTU (see NOTE 1).  IPv6 [RFC8200]

I don't understand what "the end-to-end Path MTU is the size of a single
IPv4 header" means
nit: s/Whlie/While/

Section 3.2

It might be worth another sentence to codify that sending the fragments
of a message to different next hops will end poorly.

Section 3.8.1

  The effect of rate limiting may be severe, as RFC 4443 recommends
  strict rate limiting of IPv6 traffic.

nit: s/IP/ICMP/

Section 4.1

nit: s/User Data Protocol/User Datagram Protocol/

Section 4.2

nit: s/is sufficiently small is sufficiently small/is sufficiently
small/
2019-08-08
15 Benjamin Kaduk [Ballot Position Update] New position, Yes, has been recorded for Benjamin Kaduk
2019-08-08
15 Cindy Morgan IESG state changed to IESG Evaluation::Revised I-D Needed from IESG Evaluation
2019-08-08
15 Ignas Bagdonas [Ballot Position Update] New position, No Objection, has been recorded for Ignas Bagdonas
2019-08-07
15 Barry Leiba [Ballot comment]
I also support Alissa’s DISCUSS.
2019-08-07
15 Barry Leiba [Ballot Position Update] New position, Yes, has been recorded for Barry Leiba
2019-08-07
15 Roman Danyliw
[Ballot comment]
** I support Alissa Cooper's discuss item

** Section 3.7.  Per the discussion about NIDS, evasion using fragments also arose when stateless pattern …
[Ballot comment]
** I support Alissa Cooper's discuss item

** Section 3.7.  Per the discussion about NIDS, evasion using fragments also arose when stateless pattern matching occurred. 

** Section 3.7.  Related to NIDS, naïve flow-based anomaly detection systems/analytics have also been known to introduce false positives, if IP packet counts are confused with IP fragment counts.

** Editorial
-- Section 1.  Per “but the designer should to be aware that fragmented packets may result in blackholes”, the reference to a “blackholes” seems imprecise.

-- Section 2.1.  Typo.  s/Whlie/While/

-- Section 3.8.2.  Recommend adding a sentence at the end of the first paragraph to suggest this is just an example.  I’ve seen even worst default ICMP policies in consumer routers.

-- Section 3.8.2.  Typo.  s/a incorrect/an incorrect/

-- Section 5.1. Typo. s/signalling/signaling/
2019-08-07
15 Roman Danyliw [Ballot Position Update] New position, No Objection, has been recorded for Roman Danyliw
2019-08-07
15 Warren Kumari
[Ballot comment]
It's very seldom that I ballot Yes on a document for which I'm not the Responsible AD, but this is important enough that …
[Ballot comment]
It's very seldom that I ballot Yes on a document for which I'm not the Responsible AD, but this is important enough that I'm doing so; unfortunately there are are some bits which make me uncomfortable though, and so I spent a while in the unusual situation of trying to decide between DISCUSS and YES - after looking at the author list and responsible AD I'm sure that my comments will be considered, and so I'm balloting Yes.


1: "Legacy protocols that depend upon IP fragmentation SHOULD be updated to remove that dependency."
I really don't like the  SHOULD here -- while I fully agree that legacy protocols should be update, the RFC2119 usage feels weird - it's unclear exactly who it is aimed at (everyone? the people who wrote the legacy protocols? some mythical cleanup author?)

2: I'm unclear why IP-in-IP tunnels are called out at the top / in the Introduction. There is a whole section (Packet-in-Packet Encapsulations) where I think it would go better -- I see no harm in having people have to read down to there to note this.

3: "NOTE 2: A non-fragmentable packet can be fragmented at its source. However, it cannot be fragmented by a downstream node.  An IPv4 packet whose DF-bit is set to 0 is fragmentable.  An IPv4 packet whose DF-bit is set to 1 is non-fragmentable.  All IPv6 packets are also non-fragmentable."
I have a few issues with this:
3.1: I'm not really sure a non-fragmentable packet can be fragmented at its source -- the packet *can* be fragmented but I'd say that that is before it has become non-fragmentable. It's entirely possible that I'm missing something obvious here, but a skim of 791 didn't show me what....
3.2: This may be a corner case, but some tunneling gear seems happy to ignore the DF bit when it is doing reassembly on the far side of the tunnel -- the logic seems to be that as long as what goes into the tunnel matches what comes out it doesn't matter what actually happens *inside* the tunnel.
3.3: Related  to this - most tunneling gear (and many firewalls) allow you to clear the DF bit in packets -- for example, cisco has the 'crypto ipsec df-bit clear' command, Junos allows you to do 'services ipsec-vpn rule myvpn term stomp_on_df then clear-dont-fragment-bit;', iptables lets you 'iptables -t mangle -A POSTROUTING -j DF --clear'
3.2 and 3.3 are common enough that I think that they deserve mention.

4: What do you mean by middle box in section 6.3?
Yes, I know what is commonly called a middlebox, but I don't know of a good reference -- as an example, I've got some honkin' big routers which do stateless firewall filtering -- these are covered by 3.7, but are they also middleboxes, and if not, why not?! (Note, my personal belief is that they aren't, but I cannot really point to why, other than "I know a middlebox when I see one".
There is a discussion on some of this in "Why Operators Filter Fragments and What It Implies" (draft-taylor-v6ops-fragdrop-02), but this also uses the term middlebox without defining it.

Nits:
A: Whlie -- While
2019-08-07
15 Warren Kumari [Ballot Position Update] New position, Yes, has been recorded for Warren Kumari
2019-08-07
15 Martin Vigoureux [Ballot Position Update] New position, No Objection, has been recorded for Martin Vigoureux
2019-08-07
15 Alvaro Retana [Ballot comment]
I support Alissa's DISCUSS.

[nit] s/OSPFv3 [RFC2328][RFC5340]/OSPFv3 [RFC5340]
2019-08-07
15 Alvaro Retana [Ballot Position Update] New position, No Objection, has been recorded for Alvaro Retana
2019-08-06
15 Alissa Cooper
[Ballot discuss]
Thanks for writing this document.

Section 6.1 says:

"Developers MAY develop new protocols or applications that rely on IP
  fragmentation if the …
[Ballot discuss]
Thanks for writing this document.

Section 6.1 says:

"Developers MAY develop new protocols or applications that rely on IP
  fragmentation if the protocol or application is to be run only in
  environments where IP fragmentation is known to be supported."

I'm wondering if there should be a bit more nuance here to make the recommendation clearer. Do we think there is a case where an application protocol developed in the IETF will be known to only run in environments where fragmentation is supported? If we don't think developing such a protocol would be in scope for the IETF, then I'm wondering if that case should be called out explicitly with a stronger normative requirement.
2019-08-06
15 Alissa Cooper
[Ballot comment]
Section 3.8.2: If there is any chance we think this situation might improve before this RFC-to-be gets obsoleted one day, I might suggest: …
[Ballot comment]
Section 3.8.2: If there is any chance we think this situation might improve before this RFC-to-be gets obsoleted one day, I might suggest:

s/The security policy described above is implemented incorrectly on
  many consumer CPE routers./The security policy described above has been implemented incorrectly on many consumer CPE routers./
 
Section 3.9: s/Another recent study/Another study/
2019-08-06
15 Alissa Cooper [Ballot Position Update] New position, Discuss, has been recorded for Alissa Cooper
2019-08-06
15 Alexey Melnikov [Ballot comment]
I enjoyed reading this document.
2019-08-06
15 Alexey Melnikov [Ballot Position Update] New position, No Objection, has been recorded for Alexey Melnikov
2019-08-05
15 Mirja Kühlewind
[Ballot comment]
Thanks for writing this document! I think this will be a very useful reference also for us ADs!

Also thanks for addressing all …
[Ballot comment]
Thanks for writing this document! I think this will be a very useful reference also for us ADs!

Also thanks for addressing all the comments of TSVART early review (and thanks for Gorry for this really good and detailed review!). I'm not certain if the following comment from that review was finally resolved. Can you maybe double-check with Gorry:

From Gorry's mail on May 29
">> Section 4.6
>> You may find it useful to check and refer to the following IPv4 specs that relate to the use of fragments:
>> - Please note the recommendation to check details and cite RFC6864 on IPv4 Fragment ID.
>> - Please note the recommendation to check and cite RFC 4787 on NAT handling of IP fragments.
> I'm hard pressed to say what changes you would suggest, or what section you want to see a reference in. To be very honest, a two minute timeout makes a
> lot of sense in an Internet in which a packet requires a significant portion of a second to transmit; in a megabit-to-gigabit Internet, the corresponding
> interval is probably measured in seconds or, at most, tens of seconds. In any event, I would want to see data supporting the recommendation.
>
> Please be more specific.

RFC 6864 is in the references - which I think is good. Perhaps a way to resolve my comment would be for section 2.1 to mention IPID and then cite RFC6864. I'd be happy to see more text on this topic, but I suspect it is sufficient to simply ensure the reader is aware that these RFCs impact fragmentation. I was imagining something like this:

The set of IPn fragments comprising a complete IPv4 datagram all carry the same non-zero value in the IPID field. RFC 6848 describes issues relating to the handling of the IPv4 ID field in middleboxes. Section 10 and 11 of RFC 4787 describes best current practice for handling fragmentation in network devices performing Network Address Translation (NAT)."

And one more minor comment:
Se 6.1: "In these cases, the protocol will continue to
  rely on IP fragmentation but should only be used in environments
  where IP fragmentation is known to be supported."
Should this "should" be a "SHOULD"?
2019-08-05
15 Mirja Kühlewind [Ballot Position Update] New position, Yes, has been recorded for Mirja Kühlewind
2019-08-05
15 Deborah Brungard [Ballot Position Update] New position, No Objection, has been recorded for Deborah Brungard
2019-07-21
15 Min Ye Request for Last Call review by RTGDIR Completed: Ready. Reviewer: Stig Venaas.
2019-07-16
15 (System) IANA Review state changed to IANA OK - No Actions Needed from Version Changed - Review Needed
2019-07-12
15 Éric Vyncke
[Ballot comment]
Thank you for the work put into this document, a real problem in the real Internet

I have a couple of COMMENTs below …
[Ballot comment]
Thank you for the work put into this document, a real problem in the real Internet

I have a couple of COMMENTs below in the hope to improve the quality of the document.

Regards,

-éric

== COMMENTS ==


-- Section 2.1 --

"An Internet path connects a source node to a destination node", what about multicast? If the document is for unicast, then it should be stated early in the document.

s/If a link fails,/If a link or a router fail,/

A reference to "see NOTE 1" (using xref/target in XML) would be easier for the reader. Same for "NOTE 2" of course.


-- Section 2.2 --

"In IPv4, the upper-layer header usually appears in the first fragment" perhaps the right place to mention RFC 3128 (informational) ?

-- Section 2.3 --

Perhaps explicitly mention that PLPMTUD is therefore more reliable than ICMP-based PMTUD but not applicable to all traffic?

-- Section 3.1 --

Please add reference to A+P (or better MAP ?) and CGN ? (done only in section 3.3)

More generally, it is not clear for the reader why virtual reassembly increases the fragility.

-- Section 3.3 --

"NOTE 1" is it the same as in section 2.1? Also add xref/target for the reader's convenience.

-- Section 3.4 --

Suggest to replace "trailing fragments" by "non-initial fragments" as it is more accurate.

-- Section 3.6 --

The section title refers to "data rate" while it is rather "fragment generation rate" (which will of course increase the data rate as a consequence). BTW, I never thought about that ;-)

-- Section 3.7 --

Is it still the case that "Many implementations set the Identification field to a predictable value" ? Would it be possible to have some data backing this statement?

-- Section 3.8 --

AFAIK, RFC 4890 is only applicable to IPv6 ICMP and not to IPv4 ICMP messages... please rewrite this part.

-- Section 3.8.1 --

s/ICMP rate limiting/ICMP generation rate limiting/

Also RFC4442 is IPv6 specific. Add some text for IPv4 ?

-- Section 3.8.2 --

Unsure what the "zone-based" has to do with the content of this section.

-- Section 3.8.3 --

It may be worth adding that the paths TO and FROM the anycast DNS server can be different, hence, causing the described problem.

-- Section 3.8.4 --

While actually correct, this would also mean that BCP38 is not implement in this network.

-- Section 6.3 --

"that behavior MUST be clearly documented" unsure whether a "MUST" can be used for a non protocol action.

-- Section 6.5 --

"MAY rate limit ICMP messages" please state "MAY rate limit the generation ICMP messages"

Unsure how "Network operators SHOULD NOT filter IP fragments " can be implemented as non-initial fragments have no UDP/TCP ports... Doing statefull filtering is probably undoable. Even with a SHOULD this is probably too restrictive.


== NITS ==

-- Section 2.1 --

s/Whlie/While/
2019-07-12
15 Éric Vyncke [Ballot Position Update] New position, No Objection, has been recorded for Éric Vyncke
2019-07-11
15 Suresh Krishnan IESG state changed to IESG Evaluation from Waiting for Writeup
2019-07-11
15 Cindy Morgan Placed on agenda for telechat - 2019-08-08
2019-07-11
15 Suresh Krishnan Ballot writeup was changed
2019-07-11
15 Suresh Krishnan Ballot has been issued
2019-07-11
15 Suresh Krishnan [Ballot Position Update] New position, Yes, has been recorded for Suresh Krishnan
2019-07-11
15 Suresh Krishnan Created "Approve" ballot
2019-07-11
15 Suresh Krishnan Ballot writeup was changed
2019-07-09
15 Joel Halpern
1. Summary

    The document Shepherd is Joel Halpern.  The responsible Area Director is Suresh Krishnan.
    This document is intended for publication …
1. Summary

    The document Shepherd is Joel Halpern.  The responsible Area Director is Suresh Krishnan.
    This document is intended for publication as a Best Current Practice.  It describes the current
    understanding of issues with IP Fragmentation and ways of coping with those issues.  As the
    abstract puts it:

  This document describes IP fragmentation and explains how it
  introduces fragility to Internet communication.

  This document also proposes alternatives to IP fragmentation and
  provides recommendations for developers and network operators.

2. Review and Consensus

  The document has been reviewed thoroughly in the intarea working group.  While some issues were raised, all have been addressed.  A Gen-art review has been received, and suggestions acted upon.  There were early intdir and tsvart reviews.  Issues raised there were also addressed.  There are a number of other review team requests outstanding and overdue.
    There were no specific expert reviews.

3. Intellectual Property
    All authors have confirmed that all known IPR has been disclosed.  There is no filed IPR against the document.

4. Other Points
    There are six authors on the front page of the document.  The authors and working group chairs have informed the shepherd that all six contributed significant text to the document.  As such, the shepherd recommends publication with 6 front page authors.
2019-07-07
15 Min Ye Request for Last Call review by RTGDIR is assigned to Stig Venaas
2019-07-07
15 Min Ye Request for Last Call review by RTGDIR is assigned to Stig Venaas
2019-07-07
15 Min Ye Assignment of request for Last Call review by RTGDIR to John Scudder was marked no-response
2019-07-06
15 Fred Baker New version available: draft-ietf-intarea-frag-fragile-15.txt
2019-07-06
15 (System) New version approved
2019-07-06
15 (System)
Request for posting confirmation emailed to previous authors: Ron Bonica , Ole Troan , Fernando Gont , Robert Hinden , intarea-chairs@ietf.org, Geoff Huston , …
Request for posting confirmation emailed to previous authors: Ron Bonica , Ole Troan , Fernando Gont , Robert Hinden , intarea-chairs@ietf.org, Geoff Huston , Fred Baker
2019-07-06
15 Fred Baker Uploaded new revision
2019-07-05
14 (System) IANA Review state changed to Version Changed - Review Needed from IANA OK - No Actions Needed
2019-07-05
14 Fred Baker New version available: draft-ietf-intarea-frag-fragile-14.txt
2019-07-05
14 (System) New version approved
2019-07-05
14 (System)
Request for posting confirmation emailed to previous authors: Ron Bonica , Ole Troan , Fernando Gont , Robert Hinden , intarea-chairs@ietf.org, Geoff Huston , …
Request for posting confirmation emailed to previous authors: Ron Bonica , Ole Troan , Fernando Gont , Robert Hinden , intarea-chairs@ietf.org, Geoff Huston , Fred Baker
2019-07-05
14 Fred Baker Uploaded new revision
2019-07-04
13 Pete Resnick Request for Last Call review by GENART Completed: Ready with Nits. Reviewer: Pete Resnick. Sent review to list.
2019-07-04
13 Juan-Carlos Zúñiga Notification list changed to Joel Halpern <joel.halpern@ericsson.com>, Joel Halpern <jmh@joelhalpern.com> from Joel Halpern <joel.halpern@ericsson.com>
2019-07-04
13 Juan-Carlos Zúñiga Document shepherd changed to Joel M. Halpern
2019-07-04
13 Juan-Carlos Zúñiga Notification list changed to Joel Halpern <joel.halpern@ericsson.com>
2019-07-04
13 Juan-Carlos Zúñiga Document shepherd changed to Joel M. Halpern
2019-07-04
13 Sabrina Tanamal IANA Review state changed to IANA OK - No Actions Needed from IANA - Review Needed
2019-07-04
13 Sabrina Tanamal
(Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs:

The IANA Functions Operator has reviewed draft-ietf-intarea-frag-fragile-12, which is currently in Last Call, and has the following comments:

We …
(Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs:

The IANA Functions Operator has reviewed draft-ietf-intarea-frag-fragile-12, which is currently in Last Call, and has the following comments:

We understand that this document doesn't require any registry actions.

While it's often helpful for a document's IANA Considerations section to remain in place upon publication even if there are no actions, if the authors strongly prefer to remove it, we do not object.

If this assessment is not accurate, please respond as soon as possible.

Thank you,

Sabrina Tanamal
Senior IANA Services Specialist
2019-07-04
13 (System) IESG state changed to Waiting for Writeup from In Last Call
2019-06-28
13 Min Ye Request for Last Call review by RTGDIR is assigned to John Scudder
2019-06-28
13 Min Ye Request for Last Call review by RTGDIR is assigned to John Scudder
2019-06-28
13 Min Ye Assignment of request for Last Call review by RTGDIR to Jon Mitchell was marked no-response
2019-06-25
13 Gunter Van de Velde Request for Last Call review by OPSDIR is assigned to Zitao Wang
2019-06-25
13 Gunter Van de Velde Request for Last Call review by OPSDIR is assigned to Zitao Wang
2019-06-24
13 Fred Baker New version available: draft-ietf-intarea-frag-fragile-13.txt
2019-06-24
13 (System) New version approved
2019-06-24
13 (System)
Request for posting confirmation emailed to previous authors: Ron Bonica , Ole Troan , Fernando Gont , Robert Hinden , intarea-chairs@ietf.org, Geoff Huston , …
Request for posting confirmation emailed to previous authors: Ron Bonica , Ole Troan , Fernando Gont , Robert Hinden , intarea-chairs@ietf.org, Geoff Huston , Fred Baker
2019-06-24
13 Fred Baker Uploaded new revision
2019-06-22
12 Tero Kivinen Request for Last Call review by SECDIR is assigned to Matthew Miller
2019-06-22
12 Tero Kivinen Request for Last Call review by SECDIR is assigned to Matthew Miller
2019-06-21
12 Luc André Burdet Request for Last Call review by RTGDIR is assigned to Jon Mitchell
2019-06-21
12 Luc André Burdet Request for Last Call review by RTGDIR is assigned to Jon Mitchell
2019-06-21
12 Alvaro Retana Requested Last Call review by RTGDIR
2019-06-20
12 Jean Mahoney Request for Last Call review by GENART is assigned to Pete Resnick
2019-06-20
12 Jean Mahoney Request for Last Call review by GENART is assigned to Pete Resnick
2019-06-20
12 Cindy Morgan IANA Review state changed to IANA - Review Needed
2019-06-20
12 Cindy Morgan
The following Last Call announcement was sent out (ends 2019-07-04):

From: The IESG
To: IETF-Announce
CC: draft-ietf-intarea-frag-fragile@ietf.org, int-area@ietf.org, suresh@kaloom.com, intarea-chairs@ietf.org
Reply-To: ietf@ietf.org …
The following Last Call announcement was sent out (ends 2019-07-04):

From: The IESG
To: IETF-Announce
CC: draft-ietf-intarea-frag-fragile@ietf.org, int-area@ietf.org, suresh@kaloom.com, intarea-chairs@ietf.org
Reply-To: ietf@ietf.org
Sender:
Subject: Last Call:  (IP Fragmentation Considered Fragile) to Best Current Practice


The IESG has received a request from the Internet Area Working Group WG
(intarea) to consider the following document: - 'IP Fragmentation Considered
Fragile'
  as Best Current Practice

The IESG plans to make a decision in the next few weeks, and solicits final
comments on this action. Please send substantive comments to the
ietf@ietf.org mailing lists by 2019-07-04. Exceptionally, comments may be
sent to iesg@ietf.org instead. In either case, please retain the beginning of
the Subject line to allow automated sorting.

Abstract


  This document describes IP fragmentation and explains how it
  introduces fragility to Internet communication.

  This document also proposes alternatives to IP fragmentation and
  provides recommendations for developers and network operators.




The file can be obtained via
https://datatracker.ietf.org/doc/draft-ietf-intarea-frag-fragile/

IESG discussion can be tracked via
https://datatracker.ietf.org/doc/draft-ietf-intarea-frag-fragile/ballot/


No IPR declarations have been submitted directly on this I-D.


The document contains these normative downward references.
See RFC 3967 for additional information:
    rfc1191: Path MTU discovery (Draft Standard - Legacy stream)
    rfc4821: Packetization Layer Path MTU Discovery (Proposed Standard - IETF stream)
    draft-ietf-tsvwg-datagram-plpmtud: Packetization Layer Path MTU Discovery for Datagram Transports (None - IETF stream)
    rfc6438: Using the IPv6 Flow Label for Equal Cost Multipath Routing and Link Aggregation in Tunnels (Proposed Standard - IETF stream)
    rfc6437: IPv6 Flow Label Specification (Proposed Standard - IETF stream)



2019-06-20
12 Cindy Morgan IESG state changed to In Last Call from Last Call Requested
2019-06-20
12 Suresh Krishnan Last call was requested
2019-06-20
12 Suresh Krishnan Last call announcement was generated
2019-06-20
12 Suresh Krishnan Ballot approval text was generated
2019-06-20
12 Suresh Krishnan Ballot writeup was generated
2019-06-20
12 Suresh Krishnan IESG state changed to Last Call Requested from AD Evaluation::AD Followup
2019-06-19
12 Fred Baker New version available: draft-ietf-intarea-frag-fragile-12.txt
2019-06-19
12 (System) New version approved
2019-06-19
12 (System)
Request for posting confirmation emailed to previous authors: Ron Bonica , Ole Troan , Fernando Gont , Robert Hinden , intarea-chairs@ietf.org, Geoff Huston , …
Request for posting confirmation emailed to previous authors: Ron Bonica , Ole Troan , Fernando Gont , Robert Hinden , intarea-chairs@ietf.org, Geoff Huston , Fred Baker
2019-06-19
12 Fred Baker Uploaded new revision
2019-06-14
11 Jenny Bui New version available: draft-ietf-intarea-frag-fragile-11.txt
2019-06-14
11 (System) Forced post of submission
2019-06-14
11 (System) Request for posting confirmation emailed to previous authors: Ron Bonica , Ole Troan , Fernando Gont , Robert Hinden , Geoff Huston , Fred Baker
2019-06-14
11 Jenny Bui Uploaded new revision
2019-05-15
10 Tim Chown Request for Early review by INTDIR Completed: Ready with Nits. Reviewer: Tim Chown. Sent review to list.
2019-05-14
10 (System) Sub state has been changed to AD Followup from Revised ID Needed
2019-05-14
10 Ron Bonica New version available: draft-ietf-intarea-frag-fragile-10.txt
2019-05-14
10 (System) New version approved
2019-05-14
10 (System)
Request for posting confirmation emailed to previous authors: Ron Bonica , Ole Troan , Fernando Gont , Robert Hinden , intarea-chairs@ietf.org, Geoff Huston , …
Request for posting confirmation emailed to previous authors: Ron Bonica , Ole Troan , Fernando Gont , Robert Hinden , intarea-chairs@ietf.org, Geoff Huston , Fred Baker
2019-05-14
10 Ron Bonica Uploaded new revision
2019-04-24
09 Suresh Krishnan The TSV directorate review by Gorry needs to be addressed with text changes that will require a new version of the draft.
2019-04-24
09 Suresh Krishnan IESG state changed to AD Evaluation::Revised I-D Needed from AD Evaluation
2019-04-16
09 Gorry Fairhurst Request for Early review by TSVART Completed: Almost Ready. Reviewer: Gorry Fairhurst. Sent review to list.
2019-04-01
09 Wesley Eddy Request for Early review by TSVART is assigned to Gorry Fairhurst
2019-04-01
09 Wesley Eddy Request for Early review by TSVART is assigned to Gorry Fairhurst
2019-03-29
09 Carlos Jesús Bernardos Request for Early review by INTDIR is assigned to Tim Chown
2019-03-29
09 Carlos Jesús Bernardos Request for Early review by INTDIR is assigned to Tim Chown
2019-03-28
09 Suresh Krishnan Requested Early review by TSVART
2019-03-28
09 Suresh Krishnan Requested Early review by INTDIR
2019-02-19
09 Suresh Krishnan IESG state changed to AD Evaluation from Publication Requested
2019-02-12
09 Ron Bonica New version available: draft-ietf-intarea-frag-fragile-09.txt
2019-02-12
09 (System) New version approved
2019-02-12
09 (System)
Request for posting confirmation emailed to previous authors: Ron Bonica , Ole Troan , Fernando Gont , Robert Hinden , intarea-chairs@ietf.org, Geoff Huston , …
Request for posting confirmation emailed to previous authors: Ron Bonica , Ole Troan , Fernando Gont , Robert Hinden , intarea-chairs@ietf.org, Geoff Huston , Fred Baker
2019-02-12
09 Ron Bonica Uploaded new revision
2019-02-11
08 Wassim Haddad Responsible AD changed to Suresh Krishnan
2019-02-11
08 Wassim Haddad IETF WG state changed to Submitted to IESG for Publication from WG Document
2019-02-11
08 Wassim Haddad IESG state changed to Publication Requested from I-D Exists
2019-02-11
08 Wassim Haddad IESG process started in state Publication Requested
2019-02-11
08 Wassim Haddad Changed consensus to Yes from Unknown
2019-02-11
08 Wassim Haddad Intended Status changed to Best Current Practice from None
2019-01-30
08 Ron Bonica New version available: draft-ietf-intarea-frag-fragile-08.txt
2019-01-30
08 (System) New version approved
2019-01-30
08 (System)
Request for posting confirmation emailed to previous authors: Ron Bonica , Ole Troan , Fernando Gont , Robert Hinden , intarea-chairs@ietf.org, Geoff Huston , …
Request for posting confirmation emailed to previous authors: Ron Bonica , Ole Troan , Fernando Gont , Robert Hinden , intarea-chairs@ietf.org, Geoff Huston , Fred Baker
2019-01-30
08 Ron Bonica Uploaded new revision
2019-01-30
07 Ron Bonica New version available: draft-ietf-intarea-frag-fragile-07.txt
2019-01-30
07 (System) New version approved
2019-01-30
07 (System)
Request for posting confirmation emailed to previous authors: Ron Bonica , Ole Troan , Fernando Gont , Robert Hinden , intarea-chairs@ietf.org, Geoff Huston , …
Request for posting confirmation emailed to previous authors: Ron Bonica , Ole Troan , Fernando Gont , Robert Hinden , intarea-chairs@ietf.org, Geoff Huston , Fred Baker
2019-01-30
07 Ron Bonica Uploaded new revision
2019-01-29
06 Ron Bonica New version available: draft-ietf-intarea-frag-fragile-06.txt
2019-01-29
06 (System) New version approved
2019-01-29
06 (System)
Request for posting confirmation emailed to previous authors: Ron Bonica , Ole Troan , Fernando Gont , Robert Hinden , intarea-chairs@ietf.org, Geoff Huston , …
Request for posting confirmation emailed to previous authors: Ron Bonica , Ole Troan , Fernando Gont , Robert Hinden , intarea-chairs@ietf.org, Geoff Huston , Fred Baker
2019-01-29
06 Ron Bonica Uploaded new revision
2019-01-11
05 Ron Bonica New version available: draft-ietf-intarea-frag-fragile-05.txt
2019-01-11
05 (System) New version approved
2019-01-11
05 (System)
Request for posting confirmation emailed to previous authors: Ron Bonica , Ole Troan , Fernando Gont , Robert Hinden , intarea-chairs@ietf.org, Geoff Huston , …
Request for posting confirmation emailed to previous authors: Ron Bonica , Ole Troan , Fernando Gont , Robert Hinden , intarea-chairs@ietf.org, Geoff Huston , Fred Baker
2019-01-11
05 Ron Bonica Uploaded new revision
2018-11-27
04 Ron Bonica New version available: draft-ietf-intarea-frag-fragile-04.txt
2018-11-27
04 (System) New version approved
2018-11-27
04 (System)
Request for posting confirmation emailed to previous authors: Ron Bonica , Ole Troan , Fernando Gont , Robert Hinden , intarea-chairs@ietf.org, Geoff Huston , …
Request for posting confirmation emailed to previous authors: Ron Bonica , Ole Troan , Fernando Gont , Robert Hinden , intarea-chairs@ietf.org, Geoff Huston , Fred Baker
2018-11-27
04 Ron Bonica Uploaded new revision
2018-11-21
03 Ron Bonica New version available: draft-ietf-intarea-frag-fragile-03.txt
2018-11-21
03 (System) New version approved
2018-11-21
03 (System)
Request for posting confirmation emailed to previous authors: Ron Bonica , Ole Troan , Fernando Gont , Robert Hinden , intarea-chairs@ietf.org, Geoff Huston , …
Request for posting confirmation emailed to previous authors: Ron Bonica , Ole Troan , Fernando Gont , Robert Hinden , intarea-chairs@ietf.org, Geoff Huston , Fred Baker
2018-11-21
03 Ron Bonica Uploaded new revision
2018-10-18
02 Ron Bonica New version available: draft-ietf-intarea-frag-fragile-02.txt
2018-10-18
02 (System) New version approved
2018-10-18
02 (System)
Request for posting confirmation emailed to previous authors: Ron Bonica , Ole Troan , Fernando Gont , Robert Hinden , intarea-chairs@ietf.org, Geoff Huston , …
Request for posting confirmation emailed to previous authors: Ron Bonica , Ole Troan , Fernando Gont , Robert Hinden , intarea-chairs@ietf.org, Geoff Huston , Fred Baker
2018-10-18
02 Ron Bonica Uploaded new revision
2018-10-10
01 Ron Bonica New version available: draft-ietf-intarea-frag-fragile-01.txt
2018-10-10
01 (System) New version approved
2018-10-10
01 (System)
Request for posting confirmation emailed to previous authors: Ron Bonica , Ole Troan , Fernando Gont , Robert Hinden , intarea-chairs@ietf.org, Geoff Huston , …
Request for posting confirmation emailed to previous authors: Ron Bonica , Ole Troan , Fernando Gont , Robert Hinden , intarea-chairs@ietf.org, Geoff Huston , Fred Baker
2018-10-10
01 Ron Bonica Uploaded new revision
2018-08-15
00 Jenny Bui This document now replaces draft-bonica-intarea-frag-fragile instead of None
2018-08-15
00 Ron Bonica New version available: draft-ietf-intarea-frag-fragile-00.txt
2018-08-15
00 (System) Posted submission manually
2018-08-15
00 Ron Bonica Uploaded new revision