Specification of the IP Flow Information Export (IPFIX) Protocol for the Exchange of IP Traffic Flow Information
draft-ietf-ipfix-protocol-26
Revision differences
Document history
Date | Rev. | By | Action |
---|---|---|---|
2012-08-22
|
26 | (System) | post-migration administrative database adjustment to the No Objection position for Bill Fenner |
2012-08-22
|
26 | (System) | post-migration administrative database adjustment to the No Objection position for Jari Arkko |
2012-08-22
|
26 | (System) | post-migration administrative database adjustment to the Yes position for Dan Romascanu |
2012-08-22
|
26 | (System) | post-migration administrative database adjustment to the No Objection position for Sam Hartman |
2012-08-22
|
26 | (System) | post-migration administrative database adjustment to the No Objection position for Magnus Westerlund |
2012-08-22
|
26 | (System) | post-migration administrative database adjustment to the No Objection position for Russ Housley |
2007-11-12
|
26 | (System) | IANA Action state changed to RFC-Ed-Ack from Waiting on RFC Editor |
2007-11-09
|
26 | (System) | IANA Action state changed to Waiting on RFC Editor from In Progress |
2007-11-09
|
26 | (System) | IANA Action state changed to In Progress from Waiting on Authors |
2007-10-17
|
26 | (System) | IANA Action state changed to Waiting on Authors from In Progress |
2007-10-16
|
26 | Amy Vezza | State Changes to RFC Ed Queue from Approved-announcement sent by Amy Vezza |
2007-10-15
|
26 | (System) | IANA Action state changed to In Progress from RFC-Ed-Ack |
2007-10-15
|
26 | Amy Vezza | IESG state changed to Approved-announcement sent |
2007-10-15
|
26 | Amy Vezza | IESG has approved the document |
2007-10-15
|
26 | Amy Vezza | Closed "Approve" ballot |
2007-10-15
|
26 | Amy Vezza | State Changes to Approved-announcement to be sent from IESG Evaluation::AD Followup by Amy Vezza |
2007-10-11
|
26 | Russ Housley | [Ballot Position Update] Position for Russ Housley has been changed to No Objection from Discuss by Russ Housley |
2007-10-11
|
26 | Dan Romascanu | An updated Note to RFC Editor was added to the write-up to solve the concerns raised in the DISCUSS by Russ Housley. Note to RFC … An updated Note to RFC Editor was added to the write-up to solve the concerns raised in the DISCUSS by Russ Housley. Note to RFC Editor Please make the following changes: 1. Add at the end of the currect Section 11.3 the following paragraph: NEW: Internationalized domain names (IDN) in either the subjectAltName extension of type dNSName or the most specific Common Name field of the Subject field of the X.509 certificate MUST be encoded using Punycode [RFC3492] as described in Section 4, "Conversion Operations", of [RFC3490]. 2. Add to Section 14.1 the following two normative references: NEW: [RFC3490] Faltstrom, P., Hoffman, P., and A. Costello, "Internationalizing Domain Names in Applications (IDNA)", RFC 3490, March 2003. [RFC3492] Costello, A., "Punycode: A Bootstring encoding of Unicode for use with Internationalized Domain Names in Applications (IDNA)", RFC 3492, March 2003. |
2007-10-11
|
26 | Dan Romascanu | Note field has been cleared by Dan Romascanu |
2007-10-10
|
26 | Russ Housley | [Ballot discuss] In Section 11.3, the document says: > > The fully-qualified domain name used to identify an IPFIX Collecting > Process … [Ballot discuss] In Section 11.3, the document says: > > The fully-qualified domain name used to identify an IPFIX Collecting > Process or Exporting Process may be stored either in a subjectAltName > extension of type dNSName, or in the most specific Common Name field > of the Subject field of the X.509 certificate. If both are present, > the subjectAltName extension is given preference. > When the common name is used, how is the fully-qualified domain name encoded in the directory string? This is especially important to specify in order to support IDNs. I suspect that punycode will be needed. The expected resolution is a new paragraph 4 of section 11.3: Internationalized domain names (IDN) in either the subjectAltName extension of type dNSName or the most specific Common Name field of the Subject field of the X.509 certificate MUST be encoded using Punycode [RFC3492] as described in Section 4, "Conversion Operations", of [RFC3490]. with the following new normative references: [RFC3490] Faltstrom, P., Hoffman, P., and A. Costello, "Internationalizing Domain Names in Applications (IDNA)", RFC 3490, March 2003. [RFC3492] Costello, A., "Punycode: A Bootstring encoding of Unicode for use with Internationalized Domain Names in |
2007-10-05
|
26 | (System) | Removed from agenda for telechat - 2007-10-04 |
2007-10-04
|
26 | Amy Vezza | State Changes to IESG Evaluation::AD Followup from IESG Evaluation by Amy Vezza |
2007-10-04
|
26 | Chris Newman | [Ballot comment] Carrying forward Ted's position after review of only the deltas. |
2007-10-04
|
26 | Chris Newman | [Ballot Position Update] New position, No Objection, has been recorded by Chris Newman |
2007-10-03
|
26 | Russ Housley | [Ballot comment] In at least two places, the document says: > > The Exporting Process uses the Observation Domain ID to uniquely … [Ballot comment] In at least two places, the document says: > > The Exporting Process uses the Observation Domain ID to uniquely > identify to the Collecting Process the Observation Domain that > metered the Flows. It is RECOMMENDED that this identifier is also > unique per IPFIX Device. > The document offers no advice about the assignment of these identifiers to meet this recommendation. Is is provided in some other IPFIX document? If so, please reference it. In Section 11.1: s/man in the middle/man-in-the-middle/ |
2007-10-03
|
26 | Russ Housley | [Ballot discuss] In Section 11.3, the document says: > > The fully-qualified domain name used to identify an IPFIX Collecting > Process … [Ballot discuss] In Section 11.3, the document says: > > The fully-qualified domain name used to identify an IPFIX Collecting > Process or Exporting Process may be stored either in a subjectAltName > extension of type dNSName, or in the most specific Common Name field > of the Subject field of the X.509 certificate. If both are present, > the subjectAltName extension is given preference. > When the common name is used, how is the fully-qualified domain name encoded in the directory string? This is especially important to specify in order to support IDNs. I suspect that punycode will be needed. |
2007-10-03
|
26 | Russ Housley | [Ballot Position Update] New position, Discuss, has been recorded by Russ Housley |
2007-10-03
|
26 | David Ward | [Ballot Position Update] New position, No Objection, has been recorded by David Ward |
2007-10-02
|
26 | Tim Polk | [Ballot Position Update] New position, No Objection, has been recorded by Tim Polk |
2007-10-01
|
26 | Ron Bonica | [Ballot Position Update] New position, No Objection, has been recorded by Ron Bonica |
2007-10-01
|
26 | Ron Bonica | Created "Approve" ballot |
2007-09-25
|
26 | Dan Romascanu | [Note]: 'A previous version draft-ietf-ipfix-protocol-24.txt of this draft was already approved by the IESG. The IPFIX WG decided to make changes to that version of … [Note]: 'A previous version draft-ietf-ipfix-protocol-24.txt of this draft was already approved by the IESG. The IPFIX WG decided to make changes to that version of the document with the principal goal of removing the SCTP stream 0 restriction. Reviews should focus on the changes since draft-ietf-ipfix-protocol-24.txt which are mentioned in an editorial note currently placed after the Table of Contents. ' added by Dan Romascanu |
2007-09-23
|
26 | Dan Romascanu | State Changes to IESG Evaluation from Waiting for AD Go-Ahead by Dan Romascanu |
2007-09-23
|
26 | Dan Romascanu | Placed on agenda for telechat - 2007-10-04 by Dan Romascanu |
2007-09-23
|
26 | Dan Romascanu | [Note]: 'A previous version draft-ietf-ipfix-protocol-24.txt of this draft was already approved by the IESG. The IPFIX WG decided to make changes to that version of … [Note]: 'A previous version draft-ietf-ipfix-protocol-24.txt of this draft was already approved by the IESG. The IPFIX WG decided to make changes to that version of the document with the principal goal of removing the SCTP stream 0 restriction. Reviews should focus on the changes since draft-ietf-ipfix-protocol-26.txt which are mentioned in an editorial note currently placed after the Table of Contents. ' added by Dan Romascanu |
2007-09-20
|
26 | (System) | State has been changed to Waiting for AD Go-Ahead from In Last Call by system |
2007-09-19
|
26 | Amanda Baber | IANA Last Call comments: For draft-ietf-ipfix-protocol-24.txt, IANA created the following new registries and populated them with their initial assignments: - IPFIX Version Numbers - … IANA Last Call comments: For draft-ietf-ipfix-protocol-24.txt, IANA created the following new registries and populated them with their initial assignments: - IPFIX Version Numbers - IPFIX Set IDs Please see: http://www.iana.org/assignments/ipfix-parameters We understand the above to be the only IANA Actions for this document. |
2007-09-06
|
26 | Amy Vezza | Last call sent |
2007-09-06
|
26 | Amy Vezza | State Changes to In Last Call from Last Call Requested by Amy Vezza |
2007-09-06
|
26 | Dan Romascanu | State Changes to Last Call Requested from AD Evaluation::AD Followup by Dan Romascanu |
2007-09-06
|
26 | Dan Romascanu | Last Call was requested by Dan Romascanu |
2007-09-05
|
26 | (System) | New version available: draft-ietf-ipfix-protocol-26.txt |
2007-08-17
|
26 | (System) | Sub state has been changed to AD Follow up from New Id Needed |
2007-08-17
|
25 | (System) | New version available: draft-ietf-ipfix-protocol-25.txt |
2007-08-10
|
26 | Amy Vezza | State Changes to AD Evaluation::Revised ID Needed from RFC Ed Queue by Amy Vezza |
2007-08-10
|
26 | Amy Vezza | Dan Romascanu requested that this document be pulled from the RFC Editor Queue on August 7, 2007. |
2007-02-20
|
26 | (System) | IANA Action state changed to RFC-Ed-Ack from Waiting on RFC Editor |
2007-02-20
|
26 | (System) | IANA Action state changed to Waiting on RFC Editor from In Progress |
2007-02-12
|
26 | (System) | IANA Action state changed to In Progress from Waiting on Authors |
2007-01-29
|
26 | (System) | IANA Action state changed to Waiting on Authors from In Progress |
2007-01-29
|
26 | (System) | IANA Action state changed to In Progress from Waiting on Authors |
2007-01-24
|
26 | (System) | IANA Action state changed to Waiting on Authors from In Progress |
2007-01-24
|
26 | (System) | IANA Action state changed to In Progress from Waiting on Authors |
2007-01-22
|
26 | (System) | IANA Action state changed to Waiting on Authors from In Progress |
2007-01-03
|
(System) | Posted related IPR disclosure: Cisco's Statement about IPR claimed in draft-ietf-ipfix-protocol-24.txt | |
2006-11-27
|
26 | Amy Vezza | State Changes to RFC Ed Queue from Approved-announcement sent by Amy Vezza |
2006-11-17
|
26 | Amy Vezza | IESG state changed to Approved-announcement sent |
2006-11-17
|
26 | Amy Vezza | IESG has approved the document |
2006-11-17
|
26 | Amy Vezza | Closed "Approve" ballot |
2006-11-17
|
26 | Amy Vezza | State Changes to Approved-announcement to be sent from IESG Evaluation::AD Followup by Amy Vezza |
2006-11-15
|
26 | Dan Romascanu | [Ballot Position Update] Position for Dan Romascanu has been changed to Yes from Discuss by Dan Romascanu |
2006-11-12
|
26 | Cullen Jennings | [Ballot Position Update] Position for Cullen Jennings has been changed to Yes from No Objection by Cullen Jennings |
2006-11-12
|
26 | Cullen Jennings | [Ballot discuss] |
2006-11-12
|
26 | Cullen Jennings | [Ballot Position Update] Position for Cullen Jennings has been changed to No Objection from Discuss by Cullen Jennings |
2006-11-09
|
24 | (System) | New version available: draft-ietf-ipfix-protocol-24.txt |
2006-11-08
|
26 | (System) | Request for Early review by SECDIR Completed. Reviewer: Radia Perlman. |
2006-11-08
|
26 | (System) | Request for Early review by SECDIR is assigned to Jeffrey Schiller |
2006-11-08
|
26 | (System) | Request for Early review by SECDIR is assigned to Jeffrey Schiller |
2006-11-08
|
26 | Cullen Jennings | State Change Notice email list have been change to n.brownlee@auckland.ac.nz, fluffy@cisco.com, n.brownlee@auckland.ac.nz, plonka@doit.wisc.edu, bclaise@cisco.com from n.brownlee@auckland.ac.nz, n.brownlee@auckland.ac.nz, plonka@doit.wisc.edu, … State Change Notice email list have been change to n.brownlee@auckland.ac.nz, fluffy@cisco.com, n.brownlee@auckland.ac.nz, plonka@doit.wisc.edu, bclaise@cisco.com from n.brownlee@auckland.ac.nz, n.brownlee@auckland.ac.nz, plonka@doit.wisc.edu, bclaise@cisco.com |
2006-10-26
|
26 | Cullen Jennings | State Change Notice email list have been change to n.brownlee@auckland.ac.nz, n.brownlee@auckland.ac.nz, plonka@doit.wisc.edu, bclaise@cisco.com from n.brownlee@auckland.ac.nz, n.brownlee@auckland.ac.nz, plonka@doit.wisc.edu |
2006-10-26
|
26 | Dan Romascanu | [Ballot discuss] I am holding a DISCUSS on Bill Fenner's COMMENT about the down reference. |
2006-10-26
|
26 | Dan Romascanu | [Ballot Position Update] Position for Dan Romascanu has been changed to Discuss from Yes by Dan Romascanu |
2006-10-25
|
26 | Bill Fenner | [Ballot comment] Note: the reference to draft-ietf-ipfix-architecture is technically a downref (see RFC 3967) |
2006-10-23
|
26 | Cullen Jennings | [Ballot discuss] This rev did a great job of addressing everyone of the comments I had put in. Thank you. I think it the new … [Ballot discuss] This rev did a great job of addressing everyone of the comments I had put in. Thank you. I think it the new text has a few problems which are easily resolvable. In section 11.2 paragraph two it says that one MUST implement SCTP and SCTP-PR over DTLS as described in 4337. However, 4347 does not describe this and as written it is not implementable. I think there is a trivial fix for this - you need to say as described in the tuxen draft and put in a normative reference to that draft. I think the text in section 11.3 is still leaves too much undefined - for example - do you use CommonName of SubjectAltName. However, if Russ and Sam are ok with this as is, then it is fine by me. I think it would be good to have the security ADs just read this. Last point has to do with the ports. I like how you have defined the multiplexing using the ports. I note that the SCTP and TCP stuff in section 10 does not mention ports but should and that the where the ports are mentioned for UDP it does not mention the different port when using DTLS which adds to confusion. I note that 3 ports have been registered with IANA for this protocol - I think we should ask IANA to free the unused unless it is clear why we need to keep in reserved. I really don't know the answer to this but do we need to do anything in the IANA section of this document to move the port registration to be associated with this document instead of the private registration that someone when and did. |
2006-10-17
|
26 | Jari Arkko | [Ballot comment] I would suggest that Section 10.3.6, paragraph 2, be added default values for the rate and number of copies associated with template changes. |
2006-10-17
|
26 | Jari Arkko | [Ballot Position Update] Position for Jari Arkko has been changed to No Objection from Discuss by Jari Arkko |
2006-10-17
|
26 | Sam Hartman | [Ballot Position Update] Position for Sam Hartman has been changed to No Objection from Discuss by Sam Hartman |
2006-10-17
|
26 | Dan Romascanu | Placed on agenda for telechat - 2006-10-26 by Dan Romascanu |
2006-10-16
|
26 | Bill Fenner | [Ballot Position Update] Position for Bill Fenner has been changed to No Objection from Discuss by Bill Fenner |
2006-10-16
|
26 | Magnus Westerlund | [Ballot Position Update] Position for Magnus Westerlund has been changed to No Objection from Discuss by Magnus Westerlund |
2006-10-14
|
26 | (System) | IANA Action state changed to In Progress from RFC-Ed-Ack |
2006-10-13
|
26 | (System) | Sub state has been changed to AD Follow up from New Id Needed |
2006-10-13
|
23 | (System) | New version available: draft-ietf-ipfix-protocol-23.txt |
2006-10-09
|
26 | Cullen Jennings | Any ETA on a new rev of this - we talked about it at last IETF and I thought we had come up with good … Any ETA on a new rev of this - we talked about it at last IETF and I thought we had come up with good path to resolve all these? |
2006-07-07
|
26 | Jari Arkko | [Ballot discuss] > SCTP [RFC2960] and PR-SCTP [RFC3758] MUST be implemented by all > compliant implementations. UDP [UDP] MAY also be … [Ballot discuss] > SCTP [RFC2960] and PR-SCTP [RFC3758] MUST be implemented by all > compliant implementations. UDP [UDP] MAY also be implemented by > compliant implementations. TCP [TCP] MAY also be implemented by > compliant implementations. > > ... > > When IPFIX uses UDP as the transport protocol, Template Sets and > Option Template Sets MUST be re-sent at regular intervals. The > frequency of (Options) Template transmission MUST be configurable. > New Template Records SHOULD be transmitted as soon as they are > created, and SHOULD be transmitted before any associated Data Record > is transmitted. > > In the event of configuration changes, the Exporting Process SHOULD > send multiple copies of the new template definitions, in different > IPFIX Messages, at an accelerated rate. In such a case, it MAY > transmit the changed Template Record(s) and Options Template > Record(s), without any data, in advance to help ensure that the > Collector will have the correct template information before > receiving the first data. > ... > The Collecting Process could deduce the loss and reordering of IPFIX > Data Records by looking at the discontinuities in the IPFIX Message > sequence number. In the case of UDP, the IPFIX Message sequence > number contains the total number of IPFIX Data Records received for > the UDP association, prior to the receipt of this IPFIX Message, > modulo 2^32. IPFIX sequence number discontinuities SHOULD be logged. > > Templates sent from the Exporting Process to the Collecting > Process using UDP as a transport MUST be resent at regular > intervals in case previous copies were lost. Implementations > MAY send templates using a reliable transport protocol, and > send IPFIX Data Records using UDP as the transport protocol. > ... > Template Withdraw Messages SHOULD NOT be sent over UDP. > ... > Because UDP is not a connection oriented protocol, the Exporting > Process is unable to determine from the transport protocol that the > Collecting Process is no longer able to receive the IFPIX Messages. > Therefore, it can not invoke a failover mechanism. However, the > Exporting Process MAY duplicate the IPFIX Message to several > Collecting Processes. > > ... > > 8. Template Management > > This section describes Template management when using SCTP and PR- > SCTP as the transport protocol. Any necessary changes to Template > management specifically related to TCP or UDP transport protocols > are specified in section 10. The large set of transport options make me uneasy about real-world interoperability. In particular, I'm worried about the lack of guidelines and default values for re-sending, duplicate sending, whether sequence number tracking is required, and how and how often templates are sent. Please add such guidelines and default values. COMMENT part follows: Given that withdrawals need to use a reliable transport and SCTP is a MUST, one possible simplifying assumption would be to say that templates are always sent over a reliable transport. I'm also worried about implementation complexity. Was there really a requirement for all of these options? Is it likely that implementations follow the MUST requirement, or is the long list an indication that different groups intend to use different transports, making interoperability less likely? |
2006-07-06
|
26 | Amy Vezza | State Changes to IESG Evaluation::Revised ID Needed from IESG Evaluation by Amy Vezza |
2006-07-06
|
26 | (System) | [Ballot Position Update] New position, No Objection, has been recorded for Ross Callon by IESG Secretary |
2006-07-06
|
26 | Lisa Dusseault | [Ballot Position Update] New position, No Objection, has been recorded for Lisa Dusseault by Lisa Dusseault |
2006-07-06
|
26 | David Kessens | [Ballot comment] Comments from the DNS review team by Ólafur Guðmundsson: The IPFIX documents are impressive, in size and how well they are written, I … [Ballot comment] Comments from the DNS review team by Ólafur Guðmundsson: The IPFIX documents are impressive, in size and how well they are written, I did not have time to think through the protocol but from what I nothing was sticking out like a sore thumb. |
2006-07-06
|
26 | David Kessens | [Ballot Position Update] New position, No Objection, has been recorded for David Kessens by David Kessens |
2006-07-06
|
26 | Jon Peterson | [Ballot Position Update] New position, No Objection, has been recorded for Jon Peterson by Jon Peterson |
2006-07-06
|
26 | Cullen Jennings | [Ballot discuss] I considered deferring to give me a chance to talk to the authors - I suspect that many of these things may just … [Ballot discuss] I considered deferring to give me a chance to talk to the authors - I suspect that many of these things may just be my misunderstanding and can be easily cleared up. I decided to just stick them in and we can start a discussion to clear them up. I'm concerned about what is the recommended mode for using this. It seemed like it was secure with TLS and also for DOS reasons use SCTP-PR. But iI don't think you can do both of these at the same time. What is the recommended way to sue this protocol? I do not understand how the requirements in section 10.2 of the IPFIX-ARCH are achieved when using IPSEC. I do not understand the advantages of SCTP over having an TCP connection for each set of messages that would go on a single stream in SCTP. There is no advice on how to use SCTP streams (other than stream 0). DTLS seems like an obvious candidate to meet many of your requirements. Why not include it? Section 10.3.1 leaves me wondering if UDP is deprecated or not and when would it be ok to use it. This really needs clarification. I have no idea what a link is that runs UPD but where it is not possible to have congestion. Imagine I told this protocol to log all the packets that this protocol sent including a full copy of them. How does a collector listen for both TCP and TLS packets on the same port? I can imagine this is possible to demux but I think it is worth explaining. I think more advice is needed on checking the names in TLS certificates and checking the certificates are valid. |
2006-07-06
|
26 | Cullen Jennings | [Ballot discuss] I considered deferring to give me a chance to talk to the authors - I suspect that many of these things may just … [Ballot discuss] I considered deferring to give me a chance to talk to the authors - I suspect that many of these things may just be my misunderstanding and can be easily cleared up. I decided to just stick them in and we can start a discussion to clear them up. I'm concerned about what is the recommended mode for using this. It seemed like it was secure with TLS and also for DOS reasons use SCTP-PR. But iI don't think you can do both of these at the same time. What is the recommended way to sue this protocol? I do not understand how the requirements in section 10.2 of the IPFIX-ARCH are achieved when using IPSEC. I do not understand the advantages of SCTP over having an TCP connection for each set of messages that would go on a single stream in SCTP. There is no advice on how to use SCTP streams (other than stream 0). DTLS seems like an obvious candidate to meet many of your requirements. Why not include it? Section 10.3.1 leaves me wondering if UDP is deprecated or not and when would it be ok to use it. This really needs clarification. I have no idea what a link is that runs UPD but where it is not possible to have congestion. Imagine I told this protocol to log all the packets that this protocol sent including a full copy of them. How does a collector listen for both TCP and TLS packets on the same port? I can imagine this is possible to demux but I think it is worth explaining. I think more advice is needed on checking the names in TLS certificates and checking the certificates are valid. |
2006-07-06
|
26 | Cullen Jennings | [Ballot Position Update] Position for Cullen Jennings has been changed to Discuss from Undefined by Cullen Jennings |
2006-07-06
|
26 | Cullen Jennings | [Ballot comment] Section 6.1 seems to duplicate type specifications that are also defined in the normative IPFIX-INFO reference. Normative definitions of things in two documents … [Ballot comment] Section 6.1 seems to duplicate type specifications that are also defined in the normative IPFIX-INFO reference. Normative definitions of things in two documents seems like a receipt for disaster. I would have preferred to see the the IPFIX-INFO document and this document as a ballot set. Interoperability for UDP would be improved in you recommended a default time for retransmission of templates. There are many places in this protocol where they are several options - I imagine arguments were made for all of them but the allowing all of them results in this being a surprisingly complex protocol when clearly the early desires were for something very simple. I'm thinking of things like the transport options, the security options, the date times options, the reduced size options, Using dates based on 2^32 seconds since 1970 always makes me shutter. Might be nice to have advice on accuracy of any of the times and perhaps suggest NTP. I am very curios about the interoperability events. Any TLS implementations? Which transport? Any SCTP-PR implementations? How did people use streams? |
2006-07-06
|
26 | Cullen Jennings | [Ballot Position Update] New position, Undefined, has been recorded for Cullen Jennings by Cullen Jennings |
2006-07-05
|
26 | Bill Fenner | [Ballot discuss] Reference issues: [IPFIX-ARCH] is expired; I guess it got renamed from -arch to -architecture? [RFC1948] is informational, so is a downref. … [Ballot discuss] Reference issues: [IPFIX-ARCH] is expired; I guess it got renamed from -arch to -architecture? [RFC1948] is informational, so is a downref. I suspect it's not actually normative, from the context, but if it is this needs to be handled with the 3967 rules. |
2006-07-05
|
26 | Bill Fenner | [Ballot Position Update] Position for Bill Fenner has been changed to Discuss from No Objection by Bill Fenner |
2006-07-05
|
26 | Jari Arkko | [Ballot discuss] > SCTP [RFC2960] and PR-SCTP [RFC3758] MUST be implemented by all > compliant implementations. UDP [UDP] MAY also be … [Ballot discuss] > SCTP [RFC2960] and PR-SCTP [RFC3758] MUST be implemented by all > compliant implementations. UDP [UDP] MAY also be implemented by > compliant implementations. TCP [TCP] MAY also be implemented by > compliant implementations. > > ... > > When IPFIX uses UDP as the transport protocol, Template Sets and > Option Template Sets MUST be re-sent at regular intervals. The > frequency of (Options) Template transmission MUST be configurable. > New Template Records SHOULD be transmitted as soon as they are > created, and SHOULD be transmitted before any associated Data Record > is transmitted. > > In the event of configuration changes, the Exporting Process SHOULD > send multiple copies of the new template definitions, in different > IPFIX Messages, at an accelerated rate. In such a case, it MAY > transmit the changed Template Record(s) and Options Template > Record(s), without any data, in advance to help ensure that the > Collector will have the correct template information before > receiving the first data. > ... > The Collecting Process could deduce the loss and reordering of IPFIX > Data Records by looking at the discontinuities in the IPFIX Message > sequence number. In the case of UDP, the IPFIX Message sequence > number contains the total number of IPFIX Data Records received for > the UDP association, prior to the receipt of this IPFIX Message, > modulo 2^32. IPFIX sequence number discontinuities SHOULD be logged. > > Templates sent from the Exporting Process to the Collecting > Process using UDP as a transport MUST be resent at regular > intervals in case previous copies were lost. Implementations > MAY send templates using a reliable transport protocol, and > send IPFIX Data Records using UDP as the transport protocol. > ... > Template Withdraw Messages SHOULD NOT be sent over UDP. > ... > Because UDP is not a connection oriented protocol, the Exporting > Process is unable to determine from the transport protocol that the > Collecting Process is no longer able to receive the IFPIX Messages. > Therefore, it can not invoke a failover mechanism. However, the > Exporting Process MAY duplicate the IPFIX Message to several > Collecting Processes. > > ... > > 8. Template Management > > This section describes Template management when using SCTP and PR- > SCTP as the transport protocol. Any necessary changes to Template > management specifically related to TCP or UDP transport protocols > are specified in section 10. The large set of transport options make me uneasy about real-world interoperability In particular, I'm worried about the lack of guidelines and default values for re-sending, duplicate sending, whether sequence number tracking is required, and how and how often templates are sent. Given that withdrawals need to use a reliable transport and SCTP is a MUST, one possible simplifying assumption would be to say that templates are always sent over a reliable transport. COMMENT part follows: I'm also worried about implementation complexity. Was there really a requirement for all of these options? Is it likely that implementations follow the MUST requirement, or is the long list an indication that different groups intend to use different transports, making interoperability less likely? |
2006-07-05
|
26 | Bill Fenner | [Ballot Position Update] New position, No Objection, has been recorded for Bill Fenner by Bill Fenner |
2006-07-05
|
26 | Jari Arkko | [Ballot discuss] > SCTP [RFC2960] and PR-SCTP [RFC3758] MUST be implemented by all > compliant implementations. UDP [UDP] MAY also be … [Ballot discuss] > SCTP [RFC2960] and PR-SCTP [RFC3758] MUST be implemented by all > compliant implementations. UDP [UDP] MAY also be implemented by > compliant implementations. TCP [TCP] MAY also be implemented by > compliant implementations. > > ... > > When IPFIX uses UDP as the transport protocol, Template Sets and > Option Template Sets MUST be re-sent at regular intervals. The > frequency of (Options) Template transmission MUST be configurable. > New Template Records SHOULD be transmitted as soon as they are > created, and SHOULD be transmitted before any associated Data Record > is transmitted. > > In the event of configuration changes, the Exporting Process SHOULD > send multiple copies of the new template definitions, in different > IPFIX Messages, at an accelerated rate. In such a case, it MAY > transmit the changed Template Record(s) and Options Template > Record(s), without any data, in advance to help ensure that the > Collector will have the correct template information before > receiving the first data. > ... > The Collecting Process could deduce the loss and reordering of IPFIX > Data Records by looking at the discontinuities in the IPFIX Message > sequence number. In the case of UDP, the IPFIX Message sequence > number contains the total number of IPFIX Data Records received for > the UDP association, prior to the receipt of this IPFIX Message, > modulo 2^32. IPFIX sequence number discontinuities SHOULD be logged. > > Templates sent from the Exporting Process to the Collecting > Process using UDP as a transport MUST be resent at regular > intervals in case previous copies were lost. Implementations > MAY send templates using a reliable transport protocol, and > send IPFIX Data Records using UDP as the transport protocol. > ... > Template Withdraw Messages SHOULD NOT be sent over UDP. > ... > Because UDP is not a connection oriented protocol, the Exporting > Process is unable to determine from the transport protocol that the > Collecting Process is no longer able to receive the IFPIX Messages. > Therefore, it can not invoke a failover mechanism. However, the > Exporting Process MAY duplicate the IPFIX Message to several > Collecting Processes. > > ... > > 8. Template Management > > This section describes Template management when using SCTP and PR- > SCTP as the transport protocol. Any necessary changes to Template > management specifically related to TCP or UDP transport protocols > are specified in section 10. The large set of transport options make me uneasy about real-world interoperability and implementation complexity. Was there really a requirement for all of these options? Is it likely that implementations follow the MUST requirement, or is the long list an indication that different groups intend to use different transports, making interoperability less likely? (This part of my note is only a COMMENT.) In particular, I'm worried about the lack of guidelines and default values for re-sending, duplicate sending, whether sequence number tracking is required, and how and how often templates are sent. Given that withdrawals need to use a reliable transport and SCTP is a MUST, one possible simplifying assumption would be to say that templates are always sent over a reliable transport. |
2006-07-05
|
26 | Mark Townsley | [Ballot Position Update] New position, No Objection, has been recorded for Mark Townsley by Mark Townsley |
2006-07-05
|
26 | Jari Arkko | [Ballot Position Update] New position, Discuss, has been recorded for Jari Arkko by Jari Arkko |
2006-07-05
|
26 | Sam Hartman | [Ballot discuss] Based on a security review from Radia Perlman as well as my own comments. BCP 61 requires a mandatory to implement strong security … [Ballot discuss] Based on a security review from Radia Perlman as well as my own comments. BCP 61 requires a mandatory to implement strong security solution for this protocol. However Section 11.1.6 makes it clear that IPsec is not mandated and 11.2 does not mandate TLS. Section 11.4 does not provide adequate protection for the Internet threat model. DTLS and TLS are certainly easier to deploy, although writing the binding for SCTP (the mandatory transport) may be tricky. If you decide to make IPsec mandatory, then to make it reasonable to deploy, you will probably need to mandate that given some small set of configuration information (peer identities, local identities), an IPFIX implementation must be able to set up default SPD rules and other IPsec configuration. It's not sufficient to create a deployable solution to simply mandate IPsec and to tell administrators how to set up a complex set of IPsec configurations. BCP 107 provides a set of guidelines for automated key management. I believe under that analysis, automated key management is a requirement for this protocol. Radia indicated she could not determine how in the configuration where TCP and UDP are used together, the templates sent over TCP were linked to the data sent over UDP; with a quick look I could not determine this either. One significant problem with both TLS and IPsec in this document is that you don't describe how IPFIX entities are named. What identities are expected in a certificate? IPsec should use ESP (possibly with null encryption) rather than AH; ESP and AH together are definitely not the recommended way to get confidentiality and integrity. What do the rules in 11.1.1 and 11.1.4 mean in terms of SPD entries? 11.1.1 is possibly clear enough although an explicit example would be helpful. 11.1.4 needs to be more clear. Presumably this means a discard rule for any traffic on port 4739 after protect rules for designated peers. Unfortunately RFC 2401 does not seem to support SCTP port selectors, so this may need to depend on RFC 4301 and IKEV2. That may limit IPsec's value as a mandatory to implement security solution and encourage the WG to choose something else. Section 11.2 is not sufficient for interoperable implementations. How is TLS requested and signaled? |
2006-07-05
|
26 | Sam Hartman | [Ballot discuss] Based on a security review from Radia Perlman as well as my own comments. BCP 61 requires a mandatory to implement strong security … [Ballot discuss] Based on a security review from Radia Perlman as well as my own comments. BCP 61 requires a mandatory to implement strong security solution for this protocol. However Section 11.1.6 makes it clear that IPsec is not mandated and 11.2 does not mandate TLS. Section 11.4 does not provide adequate protection for the Internet threat model. DTLS and TLS are certainly easier to deploy, although writing the binding for SCTP (the mandatory transport) may be tricky. If you decide to make IPsec mandatory, then to make it reasonable to deploy, you will probably need to manadate that given some small set of configuration information (peer identities, local identities), an IPFIX implementation must be able to set up default SPD rules and other IPsec configuration. It's not sufficient to create a deployable solution to simply mandate IPsec and to tell administrators how to set up a complex set of IPsec configurations. BCP 107 provides a set of guidelines for automated key management. I believe under that analysis, automated key management is a requirement for this protocol. Radia indicated she could not determine how in the configuration where TCP and UDP are used together, the templates sent over TCP were linked to the data sent over UDP; with a quick look I could not determine this either. One significant problem with both TLS and IPsec in this document is that you don't describe how IPFIX entities are named. What identities are expected in a certificate? IPsec should use ESP (possibly with null encryption) rather than AH; ESP and AH together are definitely not the recommended way to get confidentiality and integrity. What do the rules in 11.1.1 and 11.1.4 mean in terms of SPD entries? 11.1.1 is possibly clear enough although an explicit example would be helpful. 11.1.4 needs to be more clear. Presumably this means a discard rule for any traffic on port 4739 after protect rules for designated peers. Unfortunately RFC 2401 does not seem to support SCTP port selectors, so this may need to depend on RFC 4301 and IKEV2. That may limit IPsec's value as a mandatory to implement security solution and encourage the WG to choose something else. Section 11.2 is not sufficient for interoperable implementations. How is TLS requested and signaled? |
2006-07-05
|
26 | Sam Hartman | [Ballot Position Update] New position, Discuss, has been recorded for Sam Hartman by Sam Hartman |
2006-07-05
|
26 | Brian Carpenter | [Ballot comment] "Specification of the IPFIX Protocol for the Exchange of IP Traffic Flow Information" would be a better title. Question: is IANA supposed to … [Ballot comment] "Specification of the IPFIX Protocol for the Exchange of IP Traffic Flow Information" would be a better title. Question: is IANA supposed to create a registry for IPFIX Version Number or IPFIX Set ID? |
2006-07-05
|
26 | Brian Carpenter | [Ballot Position Update] Position for Brian Carpenter has been changed to No Objection from Undefined by Brian Carpenter |
2006-07-03
|
26 | Ted Hardie | [Ballot Position Update] New position, No Objection, has been recorded for Ted Hardie by Ted Hardie |
2006-07-03
|
26 | Magnus Westerlund | [Ballot discuss] Page 13: Sequence Number Incremental sequence counter modulo 2^32 of all IPFIX Data … [Ballot discuss] Page 13: Sequence Number Incremental sequence counter modulo 2^32 of all IPFIX Data Records sent on this stream from the current Observation Domain by the Exporting Process. This value SHOULD be used by the Collecting Process to identify whether any IPFIX Data Records have been missed. Template and Options Template Records do not increase the Sequence Number. The term "stream" is not defined. This results in that there is not clear that one can implement this in an interoperable way. |
2006-07-03
|
26 | Magnus Westerlund | [Ballot Position Update] Position for Magnus Westerlund has been changed to Discuss from No Objection by Magnus Westerlund |
2006-07-03
|
26 | Magnus Westerlund | [Ballot Position Update] New position, No Objection, has been recorded for Magnus Westerlund by Magnus Westerlund |
2006-06-30
|
26 | Lars Eggert | [Ballot comment] Section 1.1, paragraph 1: > The IPFIX protocol provides network administrators with access to IP > flow information. The architecture for … [Ballot comment] Section 1.1, paragraph 1: > The IPFIX protocol provides network administrators with access to IP > flow information. The architecture for the export of measured IP > flow information out of an IPFIX exporting process to a collecting > process is defined in [IPFIX-ARCH], per the requirements defined in > [RFC3917]. This document specifies how IPFIX data record and Nit: s/record/records/ Section 2., paragraph 10: > 1. one or more packet header field (e.g. destination IP address), > transport header field (e.g. destination port number), or > application header field (e.g. RTP header fields [RFC1889]) Nit: s/field/fields/ everywhere in this paragraph Section 10., paragraph 1: > The IPFIX Protocol Specification has been designed to be transport > protocol independent. Note that the Exporter can export to multiple > Collecting Processes, using independent transport protocols. So why do Section 8 and Section 9 talk about specifics when SCTP is used? Are the mechanisms described in those sections different for other transports? Section 10.3.3, paragraph 1: > The maximum size of exported messages MUST be configured such that > the total packet size does not exceed the path MTU. I'd recommend adding: "If the path MTU is unknown, a maximum packet size of 512 octets SHOULD be used." Section 11., paragraph 4: > IPFIX Messages can be secured using IPsec. Alternatively if IPFIX > runs on top of SCTP or TCP, TLS [TLS] can be used. For UDP, DTLS could be used. Section 11.4, paragraph 3: > If IP address spoofing can not be prevented, some level of > protection against an insertion attack is required. With a modern > implementation of TCP with good ISN randomization [RFC1948] or SCTP > insertion such attacks are difficult without the ability to snoop > the packet Flow [RFC2960]. UDP is vulnerable to insertion attacks, > and SHOULD be protected by the use of the address restriction > mechanism described above. DTLS for UDP? Section 12., paragraph 2: > New assignments in either IPFIX Version Number or IPFIX Set ID > assignments require an Standards Action [RFC2434], i.e. they are to > be made via Standards Track RFCs approved by the IESG. Nit: s/an Standards Action/a Standards Action/ |
2006-06-30
|
26 | Lars Eggert | [Ballot comment] Section 1.1, paragraph 1: > The IPFIX protocol provides network administrators with access to IP > flow information. The architecture for … [Ballot comment] Section 1.1, paragraph 1: > The IPFIX protocol provides network administrators with access to IP > flow information. The architecture for the export of measured IP > flow information out of an IPFIX exporting process to a collecting > process is defined in [IPFIX-ARCH], per the requirements defined in > [RFC3917]. This document specifies how IPFIX data record and Nit: s/record/records/ Section 2., paragraph 10: > 1. one or more packet header field (e.g. destination IP address), > transport header field (e.g. destination port number), or > application header field (e.g. RTP header fields [RFC1889]) Nit: s/field/fields/ everywhere in this paragraph Section 10., paragraph 1: > The IPFIX Protocol Specification has been designed to be transport > protocol independent. Note that the Exporter can export to multiple > Collecting Processes, using independent transport protocols. So why do Section 8 and Section 9 talk about specifics when SCTP is used? Are the mechanisms described in those sections different for other transports? Section 11., paragraph 4: > IPFIX Messages can be secured using IPsec. Alternatively if IPFIX > runs on top of SCTP or TCP, TLS [TLS] can be used. For UDP, DTLS could be used. Section 11.4, paragraph 3: > If IP address spoofing can not be prevented, some level of > protection against an insertion attack is required. With a modern > implementation of TCP with good ISN randomization [RFC1948] or SCTP > insertion such attacks are difficult without the ability to snoop > the packet Flow [RFC2960]. UDP is vulnerable to insertion attacks, > and SHOULD be protected by the use of the address restriction > mechanism described above. DTLS for UDP? Section 12., paragraph 2: > New assignments in either IPFIX Version Number or IPFIX Set ID > assignments require an Standards Action [RFC2434], i.e. they are to > be made via Standards Track RFCs approved by the IESG. Nit: s/an Standards Action/a Standards Action/ |
2006-06-30
|
26 | Lars Eggert | [Ballot Position Update] New position, No Objection, has been recorded for Lars Eggert by Lars Eggert |
2006-06-30
|
26 | Brian Carpenter | [Ballot comment] "Specification of the IPFIX Protocol for the Exchange of IP Traffic Flow Information" would be a better title. |
2006-06-30
|
26 | Brian Carpenter | [Ballot Position Update] New position, Undefined, has been recorded for Brian Carpenter by Brian Carpenter |
2006-06-27
|
26 | Dan Romascanu | State Changes to IESG Evaluation from Waiting for Writeup by Dan Romascanu |
2006-06-27
|
26 | Dan Romascanu | Placed on agenda for telechat - 2006-07-06 by Dan Romascanu |
2006-06-27
|
26 | Dan Romascanu | [Ballot Position Update] New position, Yes, has been recorded for Dan Romascanu |
2006-06-27
|
26 | Dan Romascanu | Ballot has been issued by Dan Romascanu |
2006-06-27
|
26 | Dan Romascanu | Created "Approve" ballot |
2006-06-20
|
22 | (System) | New version available: draft-ietf-ipfix-protocol-22.txt |
2006-05-16
|
26 | (System) | State has been changed to Waiting for Writeup from In Last Call by system |
2006-05-08
|
26 | Yoshiko Fong | IANA Last Call Comments: In the first paragraph of the IANA Considerations section, "them" should be more explicit. What does the word "them" refer to? … IANA Last Call Comments: In the first paragraph of the IANA Considerations section, "them" should be more explicit. What does the word "them" refer to? We understand this document to create 2 new registries: IPFIX Version numbers IPFIX Set IDs Should the new registries be placed in a new separate location? For example a new location named ipfix-parameters? Or, should it be nested within an existing registry? The values that are described in section 12 (0, 1, 2 and 3) appear to be for Set IDs. Are there any initial values for version numbers? For the data set values, are these NOT assigned by IANA? Section 12 also describes how "changes" can be made to the registry. Does "changes" include both new registrations and modifications to existing registrations? Changes in either IPFIX Version Number or IPFIX Set ID assignments require an Standards Action [RFC 2434], i.e. they are to be made via Standards Track RFCs approved by the IESG. We understand Standards Action RFCs are needed to make changes to these registries. Please clarify our questions above. |
2006-05-07
|
26 | (System) | IANA Action state changed to In Progress |
2006-05-02
|
26 | Amy Vezza | State Changes to In Last Call from Last Call Requested by Amy Vezza |
2006-05-02
|
26 | Dan Romascanu | State Changes to Last Call Requested from AD Evaluation::AD Followup by Dan Romascanu |
2006-05-02
|
26 | Dan Romascanu | Last Call was requested by Dan Romascanu |
2006-05-02
|
26 | (System) | Ballot writeup text was added |
2006-05-02
|
26 | (System) | Last call text was added |
2006-05-02
|
26 | (System) | Ballot approval text was added |
2006-04-28
|
21 | (System) | New version available: draft-ietf-ipfix-protocol-21.txt |
2006-04-21
|
26 | (System) | Sub state has been changed to AD Follow up from New Id Needed |
2006-04-21
|
20 | (System) | New version available: draft-ietf-ipfix-protocol-20.txt |
2006-03-30
|
26 | Dan Romascanu | Shepherding AD has been changed to Dan Romascanu from Bert Wijnen |
2006-03-17
|
26 | Bert Wijnen | State Changes to AD Evaluation::Revised ID Needed from AD Evaluation by Bert Wijnen |
2006-03-15
|
26 | Bert Wijnen | AD review posted to WG list: -----Original Message----- From: majordomo listserver [mailto:majordomo@mil.doit.wisc.edu]On Behalf Of Wijnen, Bert (Bert) Sent: Wednesday, March 15, 2006 01:22 … AD review posted to WG list: -----Original Message----- From: majordomo listserver [mailto:majordomo@mil.doit.wisc.edu]On Behalf Of Wijnen, Bert (Bert) Sent: Wednesday, March 15, 2006 01:22 To: 'Ipfix Wg' (E-mail) (E-mail) Cc: David Kessens (E-mail); Dan Romascanu (E-mail) Subject: [ipfix] AD review for: draft-ietf-ipfix-protocol-19.txt Sorry for the long delay. WG chairs/editors, pls let me (us ADs) know if you want to respin a new rev first before we do IETF Last Call. - Sect 3. States that Template Sets MUST be sent periodically when UDP is used. What if TCP or or SCTP are used? Might want to state what expected behaviour is in those cases as well. - sect 3.1 under SOurce ID I do not understand the last sentence. WHat does it mean? pls clarify in text. - Page 16 under padding s/zero (0) octets/zero (0) valued octets/ or "octets with a value of zero (o)" ?? Last sentence under "padding" may need a period or semicolon in the middle of the sentence? - Sect 5/6 speak about ...DeltaUSeconds, but I cannot find that term in INFO spec. It talks about ...DeltaMicroSeconds. Is that what you mean? - sect 6.1.3 I'd like to see a reference to the IEEE spec for floats. - sect 6.1.5 I am not sure that by saying "it is expected that strings will be coded in UTF-8 format" will guanrantee interoiperability? Maybe better use MUST (RFC2119) language. Last sentence of 6.1.5 talks about "NUL" characters. That again seems to be ASCII language. Maybe better state "zero valued octets" . - sect 6.1.6 YOu might want to add a sentence how long this can serve us. I believ it is something like 146 years, - sect 6.2 speaks about signed64/unsigned64 and also for 32 and 16. Where are those types defined?? - one but last para on page 33 "sufficient time" should be defined/explained somewhat don't you think so? - Page 35. Should the "All Data Templates" be changed into "All Templates" ?? - I wonder if the one but last para of section 9 is a nice opening for DoS attacks? - Sect 10.1 and 10.2 seem inconsistent in the use of SCTP-PR and PR-SCTP - sect 10.2.6 Where/how is the treshold specified? Same for sect 10.4.1.1 - sect 10.3.7 It is unclear to me how/where the template lifetimes are specified, defined or configured. - sect 11.4 last para I guess that just depends of who/where the attacker is, no? WHat if it is an internal ISP employee? - sect 12.1 I do not think the IPfix version number is an IANA controlled thing. I also think you want that to be changebale only by an IETF standards action (as opposed to just IETF consensus). Afetr all you want this protocol to be stds track. - sect 12.2 seems to be IPFIX-INFO material and not protocol material?? - sect 12 You have already gotten ports for UDP, SCTP and TCP. Sect 10.2.4.1 however does not list the port number. You may want to list the port there, and maybe in the IANA considerations you want to say/state that Nevil has already got port numbers for TCP, UDP and SCTP assigned via IANA. - sect 12. Sect 11.1.1 talsk about IANA assigning Selectors. I guess this needs to be documented under IANA Considerations too. - Sect 12.1 The "IPFIX Set ID" starts (I think) a new registry. So you MUST describe under IANA considerations how to set it up and what the rules are for new assignements. You have that text (more or less) in sect 3.3.2, but you must spell it out here for IANA as well. Then you have a set of Set IDs that get assigned by this document and you should list them clearly for IANA so they can do the initial population of the registry. - It seems to me that sect 13 is more an APPENDIX and so non-normative? Might be good to then list it as appendix and state that it is non-normative. - Refrences. - is 1889 really normative? admin/nits/spelling - references/citation issues: !! Contains embedded space: P051 L048: by IANA, on a First Come First Served basis [RFC 2434], subject to !! Contains embedded space: P052 L005: Expert Review [RFC 2434], i.e. review by one of a group of experts !! Missing Reference for citation: [RFC768] P041 L036: [RFC768] !! Missing citation for Informative reference: P060 L046: [RFC3955] Leinen, S., "Evaluation of Candidate Protocols for IP Flow - add citation to RFC2119 first time you mention 2119. - sect 3.1 remove one of the two words "format" You migth also want to add a sentence to explain why the version field is 0x000a for this version. - sect 3.1 under SOurce ID remove one of the two "the combination" - sect 6.2 s/smaller type/smaller size/ ?? - sect 7 s/MUST/MUST be/ - page 33 s/Disused/Unused/ ?? - the last par of the "Interllectual Property Statement" on page 63 is normally not included in the RFC. So I would remove it. Bert |
2005-11-20
|
26 | Bert Wijnen | State Changes to AD Evaluation from Publication Requested by Bert Wijnen |
2005-11-09
|
26 | Bert Wijnen | Shepherding AD has been changed to Bert Wijnen from David Kessens |
2005-11-04
|
26 | Dinara Suleymanova | Draft Added by Dinara Suleymanova in state Publication Requested |
2005-09-06
|
19 | (System) | New version available: draft-ietf-ipfix-protocol-19.txt |
2005-08-08
|
18 | (System) | New version available: draft-ietf-ipfix-protocol-18.txt |
2005-07-15
|
17 | (System) | New version available: draft-ietf-ipfix-protocol-17.txt |
2005-06-21
|
16 | (System) | New version available: draft-ietf-ipfix-protocol-16.txt |
2005-05-31
|
15 | (System) | New version available: draft-ietf-ipfix-protocol-15.txt |
2005-05-13
|
14 | (System) | New version available: draft-ietf-ipfix-protocol-14.txt |
2005-05-02
|
13 | (System) | New version available: draft-ietf-ipfix-protocol-13.txt |
2005-04-19
|
12 | (System) | New version available: draft-ietf-ipfix-protocol-12.txt |
2005-04-04
|
11 | (System) | New version available: draft-ietf-ipfix-protocol-11.txt |
2005-03-21
|
10 | (System) | New version available: draft-ietf-ipfix-protocol-10.txt |
2005-03-08
|
09 | (System) | New version available: draft-ietf-ipfix-protocol-09.txt |
2005-02-22
|
08 | (System) | New version available: draft-ietf-ipfix-protocol-08.txt |
2004-12-09
|
07 | (System) | New version available: draft-ietf-ipfix-protocol-07.txt |
2004-10-22
|
06 | (System) | New version available: draft-ietf-ipfix-protocol-06.txt |
2004-08-13
|
05 | (System) | New version available: draft-ietf-ipfix-protocol-05.txt |
2004-07-21
|
04 | (System) | New version available: draft-ietf-ipfix-protocol-04.txt |
2004-02-16
|
03 | (System) | New version available: draft-ietf-ipfix-protocol-03.txt |
2004-01-21
|
02 | (System) | New version available: draft-ietf-ipfix-protocol-02.txt |
2003-11-11
|
(System) | Posted related IPR disclosure: Cisco's Statement about IPR Claimed in draft-ietf-ipfix-protocol | |
2003-10-28
|
01 | (System) | New version available: draft-ietf-ipfix-protocol-01.txt |
2003-06-19
|
00 | (System) | New version available: draft-ietf-ipfix-protocol-00.txt |