Skip to main content

IPv6 Performance and Diagnostic Metrics Version 2 (PDMv2) Destination Option
draft-ietf-ippm-encrypted-pdmv2-09

Revision differences

Document history

Date Rev. By Action
2024-10-28
09 Peter Yee Request for Last Call review by GENART Completed: Almost Ready. Reviewer: Peter Yee. Sent review to list. Submission of review completed at an earlier date.
2024-10-28
09 Peter Yee Request for Last Call review by GENART Completed: Almost Ready. Reviewer: Peter Yee.
2024-10-24
09 Murray Kucherawy
[Ballot comment]
I'm uneasy about the SHOULDs in Section 5.2.  What are we trying to say here differently than the "should" instances elsewhere in this …
[Ballot comment]
I'm uneasy about the SHOULDs in Section 5.2.  What are we trying to say here differently than the "should" instances elsewhere in this section?
2024-10-24
09 Murray Kucherawy Ballot comment text updated for Murray Kucherawy
2024-10-24
09 (System) Changed action holders to Nalini Elkins, mackermann, Ameya Deshpande, Adnan Rashid, Tommaso Pecorella (IESG state changed)
2024-10-24
09 Jenny Bui IESG state changed to IESG Evaluation::Revised I-D Needed from IESG Evaluation
2024-10-24
09 Murray Kucherawy
[Ballot discuss]
In Section 5.2, you have:

  The server and client implementations SHOULD support PDM, unencrypted
  PDMv2, and encrypted PDMv2.

As I parse …
[Ballot discuss]
In Section 5.2, you have:

  The server and client implementations SHOULD support PDM, unencrypted
  PDMv2, and encrypted PDMv2.

As I parse this, it makes it possible that an implementation does none of these.  Is that okay?  Or if a client supports only PDM and the server only supports unencrypted PDMv2, both are compliant, but they will fail to interoperate.  Is that okay?  Do we need at least a common minimum?

This is reminiscent of SPF's original specification, which had a similar problem.
2024-10-24
09 Murray Kucherawy
[Ballot comment]
I support I'm uneasy about the SHOULDs in Section 5.2.  What are we trying to say here differently than the "should" instances elsewhere …
[Ballot comment]
I support I'm uneasy about the SHOULDs in Section 5.2.  What are we trying to say here differently than the "should" instances elsewhere in this section?
2024-10-24
09 Murray Kucherawy [Ballot Position Update] Position for Murray Kucherawy has been changed to Discuss from No Record
2024-10-24
09 Murray Kucherawy
[Ballot comment]
I'm uneasy about the SHOULDs in Section 5.2.  What are we trying to say here differently than the "should" instances elsewhere in this …
[Ballot comment]
I'm uneasy about the SHOULDs in Section 5.2.  What are we trying to say here differently than the "should" instances elsewhere in this section?
2024-10-24
09 Murray Kucherawy Ballot comment text updated for Murray Kucherawy
2024-10-24
09 Paul Wouters
[Ballot discuss]
This document is not ready and needs to justify its use cases and implementation
choices much better. When it folds in encryption schemes, …
[Ballot discuss]
This document is not ready and needs to justify its use cases and implementation
choices much better. When it folds in encryption schemes, it needs to document
exactly what bytes go over the wire for establishing the security contexts between peers.

Details follow below.



        Inferring from the PDM data, the attack can launch a timing attack.
        For example, if a cryptographic protocol is used, a timing attack may
        be launched against the keying material to obtain the secret.
       
Can't the attacker already infer these from the packet stream, even without PDM data?

        PDM metrics may also help the attacker find out about the network
        speed or capabilities of the network path.  For example, are there
        delays or blockages?  Are there alternate or multiple paths?
       
Similarly here, doesn't the attacker already infer this based on timing of the packets?

       
In fact, RFC 8250 in The Security Considerations says this too:

        Let us discuss fingerprinting of the end host first.  It is possible
        that seeing the pattern of deltas or the absolute values could give
        some information as to the speed of the end host -- that is, if it is
        a very fast system or an older, slow device.  This may be useful to
        the attacker.  However, if the attacker has access to PDM, the
        attacker also has access to the entire packet and could make such a
        deduction based merely on the time frames elapsed between packets
        WITHOUT PDM.


The remaining part of 8250's Security Considerations mostly talk about
revealing the application, which the port reveals as well, so now this
concern would apply only to v6 IPsec packets?

Second, wouldn't adding encryption of data significantly modify the timings so
that performing the measurements would invalidate the measurements ?

Section 3

The encryption is not specified. How is this done? Which kind of key exchange
is used? If so, how would this key exchange affect the measurements? Also, if
doing a key exchange anyway (eg tls or ike) why not just use ike/ipsec or tls
and protect the entire stream data. This would also hide the port, which also
fingerprints the application used?


Section 3.3

I don't understand how the unencrypted and encrypted length can be the same size?
Unless something like a one time pad is used.

Section 5

Why use HPKE together with another key exchange to prove identities? If you use
TLS or IKE, you already basically end up with a shared key. This can be used
with a simple KDF to create keying material. I don't understand why the setup
with yet another private/public key with HPKE is needed. Key Exchanges are
very expensive, far more than encryption/decryption or hashing/KDF operations.

        Alternatively, the network administrator might choose to create a
        policy that prohibits the use of PDM or unencrypted PDMv2 on their
        network.  The implementation SHOULD provide a way for the network
        administrator to enforce such a policy.

If 8250 does not provide a method for this (and I don't see it does),
this SHOULD does a lot of work.  It basically Updates: 8250 but without
providing a specification on how it actually modifies the IPPM protocol.

        If a client sends a packet with a PDM option which does not match the
        network policy, then the PDM option MUST be ignored and processing
        continue normally.

How does the server know this network policy?

Section 6:

        As discussed in the introduction, PDM data can represent a serious
        data leakage in presence of a malicious actor.

I don't think it did show "serious data leakage". In fact, 8250 considers it
not serious. See my reasoning above.


        An implementation SHOULD attempt to detect if PDM data is forged or
        modified by a malicious entity.

How could it do this? Can you describe this in steps that an implementer could
use to detect this?


        An unauthorized party MUST NOT be able to send PDM data and MUST NOT
        be able to authorize another entity to do so.

How could it do this? Can you describe this in steps that an implementer could
use to detect this?

Section 6.4

I believe it is misunderstood when HPKE should be used, and when regular key
exchanges which authenticate and setup an encryption key should be used. The
use case for HPKE has a lot more to do with creating groups of participants
that share a symmetric key, and is not used for 1-on-1 peer exchanges.

Section 7

I don't think this section is written properly. It should be about the security
considerations of the specification. Instead if seems to be clarying the use
case for the specification, something it already did in the introduction.

        attackers with the ability to intercept packets can conduct passive attacks

"intercept" is an unclear word to use for a passive capability. Intercept can mean
"prevent delivery" as well as "see while in transit".

        In these cases it is suggested to use IPSec ESP [RFC4303]
        in tunnel mode (in which case the PDMv2 can be used unencrypted).

Indeed, this also protects the protocol and port numbers. The case for encrypted PDMv2
is therefor very weak.


        A direct consequence of modifying the performance data could be,
        for example, to hide an ongoing QoS violation, or to create
        a fake QoS violation, with consequences on the violation of
        Service Level Agreements.

If you have an attacker in your network that can modify packets, the cited
issues are the least of your concern? In fact, your authorized endusers
can do the exact same thing as these attackers.

If an attacker can insert or delete packets on your network, again performance
measuring seems to be the least of your concern. Note that dropping or inserting
packets would also disrupt TCP streams and UDP applications that use their own
sequence numbers to detect packet loss or duplicates.

IANA Considerations

I would expect an encrypted version of PDM to use a new option in the
"Destination Options and Hop-by-Hop Options" registry, and not re-use
the 0x0F value for unencrypted PDM. Why was it decided not to make this
clear distinction?
2024-10-24
09 Paul Wouters [Ballot Position Update] New position, Discuss, has been recorded for Paul Wouters
2024-10-24
09 Jim Guichard [Ballot Position Update] New position, No Objection, has been recorded for Jim Guichard
2024-10-24
09 Deb Cooley
[Ballot discuss]
This is interesting work, but it currently reads as if it is a guidance (informational) draft.  There are many missing details and significant …
[Ballot discuss]
This is interesting work, but it currently reads as if it is a guidance (informational) draft.  There are many missing details and significant issues with the crypt parts of the draft:

Section 3.3, encrypted PDMv2 header:  If AES GCM is used, then there will be data expansion for the IV and integrity mechanisms.  The encrypted PDM Data cannot possibly be the same size as the unencrypted header.

Section 5.1:  Please reference a normative source for how this should be done.  Using the TLS handshake is a good option.  Referencing it would take care of many missing details.  Currently, there are not enough details here to make it possible to implement securely.

Section 6.4:  Again recommend a normative reference that will handle all of these details.  Currently this section is not sufficient for implementation.
2024-10-24
09 Deb Cooley
[Ballot comment]
Section 3.3, Epoch:  please state that this value starts at 0, and is incremented every time a new SessionTemporaryKey is updated.

Section 3.3, …
[Ballot comment]
Section 3.3, Epoch:  please state that this value starts at 0, and is incremented every time a new SessionTemporaryKey is updated.

Section 3.3, Global Pointer:  Agree w/ John Scudder's comment on this (including the privacy section comment).  It is not a pointer.  If the name isn't entrenched, it should be changed.

Section 3.3, reserved bits:  Classically, these should be verified to be correct (i.e. all 0) and then ignored.  Given this is inside the encrypted header, it should not cause a DOS.  Please add the 'verify to be all 0' requirement.

Section 5.2:  Why is this so far down in the draft?  Recommend moving it up closer to the top of the draft.
2024-10-24
09 Deb Cooley [Ballot Position Update] New position, Discuss, has been recorded for Deb Cooley
2024-10-23
09 Éric Vyncke
[Ballot discuss]

# Éric Vyncke, INT AD, comments for draft-ietf-ippm-encrypted-pdmv2-09

Thank you for the work put into this document.

Please find below some blocking DISCUSS …
[Ballot discuss]

# Éric Vyncke, INT AD, comments for draft-ietf-ippm-encrypted-pdmv2-09

Thank you for the work put into this document.

Please find below some blocking DISCUSS points (easy to address), some non-blocking COMMENT points (but replies would be appreciated even if only for my own education), and some nits.

Special thanks to Tommy Pauly for the shepherd's detailed write-up including the WG consensus and the justification of the intended status.

Other thanks to Carlos Bernardos, the Internet directorate reviewer (at my request), please consider this int-dir review:
https://datatracker.ietf.org/doc/review-ietf-ippm-encrypted-pdmv2-09-intdir-telechat-bernardos-2024-10-21/ (and I have not seen any reply to Carlos' review)

I hope that this review helps to improve the document,

Regards,

-éric


# DISCUSS (blocking)

As noted in https://www.ietf.org/blog/handling-iesg-ballot-positions/, a DISCUSS ballot is just a request to have a discussion on the following topics:

## Section 3.2

Does the "global pointer" also count packets without PDMv2 ?

## Section 3.3

`The nonce MUST NOT be reused in different sessions.` what is a session in this context?

## Section 5.1

As noted in the comment part of this ballot, not all communications (e.g., ESP tunnel) have layer-4 ports. So, what are the value of SrcPort & DstPort in the HPKE inputs ? (text saying 0 in this case perhaps ?) The text in section 3.4 of RFC 8250 is not sufficient here.

## Section 5.2

Should there be mention that not only the authentication is out of scope but also the choice of crypto algorithms even if some are recommended ?
2024-10-23
09 Éric Vyncke
[Ballot comment]

# COMMENTS (non-blocking)

## IPv6 reviews ?

Was there an explicit ask to review this I-D by 6MAN ?

Especially since the basis …
[Ballot comment]

# COMMENTS (non-blocking)

## IPv6 reviews ?

Was there an explicit ask to review this I-D by 6MAN ?

Especially since the basis RFC 8250 is unclear about where to Destination Options header with PDM is located in the presence of a Routing Header. I.e., clarifications would be welcome for this I-D updating RFC 8250.

## PDM ?

Should "PDMv1" be used everywhere for the legacy PDM?

## Section 3

I find the location of the packet format weird in the flow, let's first describe terminology?

## Section 3.2

Unsure how to parse `The existing PDM fields are identified with respect to the identifying information called a "5-tuple"` Does it mean that the fields are per 5-tuple ?

What are the values of the port fields when there are no layer-4 ports ? E.g., for an ESP tunnel.

Should "(including ULA)" be added to the global SADDR address types ?

Like John Scudder, I find the term "global pointer" not appropriate, should rather be "aggregated packet counter", I am also quite skeptical about its usefulness as it is per IPv6 address (not counting IPv4, LLDP, ...) and we all know that there are several IPv6 addresses per node, moreover, in the case of a loopback address, then it is not even related to a specific interface. Anyway, it does not hurt.

## Section 3.3

The HTML rendering of the encrypted packet format has twice the top line.

Suggest using aasvg for better rendering of the packet layout.

The whole part describing the fields is badly rendered in HTML, it is really mixed up.

Please ensure that the "Vrsn" field name is used in the description (no need for the reader to guess).

Suggest to have a 3rd figure with "PDM data" to make it clear that both types carry the same information, or repeat the fields in encrypted packet with a vertical bar indicated encrypted.

## Section 4

What about protocols having no concept of "ports", e.g., an ESP tunnel.

"Session" should be defined.

As "pkx" and "skx" are used twice in the text, including once for their definition, unsure whether these are useful acronyms.

## Section 5.2

Should it rather be "Operational Considerations", esp with the mention of RFC 9288 ?

## Section 5.2.1

s/continue processing the header/continue processing the extension headers chain/

## Section 6

Title: s/Security Goals/Security Properties/ in the hope that this is not an aspirational goal but an actual property.

## Section 7.1.1

A glimpse from my past "FDDI" ;-)

## Appendixes

The appendix A is rather empty, suggest removing it (as well as the clearly empty appendixes B & C).

# NITS (non-blocking / cosmetic)

## Abstract

s/Destination Option/Destination Options/ (per RFC 8200) (and no need to define the "DO" acronym as it does not seem to be used in the document)

## Section 4

`A A temporary key` ?
2024-10-23
09 Éric Vyncke [Ballot Position Update] New position, Discuss, has been recorded for Éric Vyncke
2024-10-23
09 Orie Steele
[Ballot discuss]
Thanks to Marc Blanchet for the ARTART review.

I agree with his comments.

I think the appendix section A.2 should probably be removed. …
[Ballot discuss]
Thanks to Marc Blanchet for the ARTART review.

I agree with his comments.

I think the appendix section A.2 should probably be removed.

If it is necessary to specify the details of HPKE more concretely, that should be done in the body of the document.

I also agree with Roman's DISCUSS on mandatory to implement algorithms and HPKE.

### Discuss

HPKE has a PSK Mode (and AuthKEM Mode), but this document does not mention which modes of HPKE are supported.

It was not obvious to me how the salt and nonce values are used.

Typically HPKE supports auxiliary application information using info and aad:

https://datatracker.ietf.org/doc/html/rfc9180#name-auxiliary-authenticated-app

I see this sentence:

Encrypted PDMv2 has most of the metadata fields encrypted except for PSNTP which is also used as a nonce in HPKE AEAD.

I would suggest explaining exactly what you are setting the value of "info" and "aad" too, and perhaps include some test vectors.
2024-10-23
09 Orie Steele [Ballot Position Update] Position for Orie Steele has been changed to Discuss from No Objection
2024-10-23
09 Orie Steele
[Ballot comment]
Thanks to Marc Blanchet for the ARTART review.

I agree with his comments.

I think the appendix section A.2 should probably be removed. …
[Ballot comment]
Thanks to Marc Blanchet for the ARTART review.

I agree with his comments.

I think the appendix section A.2 should probably be removed.

If it is necessary to specify the details of HPKE more concretely, that should be done in the body of the document.

I also agree with Roman's DISCUSS on mandatory to implement algorithms and HPKE.

HPKE has a PSK Mode (and AuthKEM Mode), but this document does not mention which modes of HPKE are supported.

It was not obvious to me how the salt is used.

Typically HPKE supports auxiliary application information using info and aad:

https://datatracker.ietf.org/doc/html/rfc9180#name-auxiliary-authenticated-app

I would suggest explaining exactly what you are setting the value of "info" too, and perhaps include some test vectors.
2024-10-23
09 Orie Steele [Ballot Position Update] New position, No Objection, has been recorded for Orie Steele
2024-10-23
09 Roman Danyliw
[Ballot discuss]
** Section 6.4
  It is RECOMMENDED to use the HPKE framework that incorporates key
  encapsulation mechanism (KEM), key derivation function (KDF) …
[Ballot discuss]
** Section 6.4
  It is RECOMMENDED to use the HPKE framework that incorporates key
  encapsulation mechanism (KEM), key derivation function (KDF) and
  authenticated encryption with associated data (AEAD).  These multiple
  schemes are more robust and significantly more efficient than other
  schemes.  While the schemes may be negotiated between communicating
  parties, it is RECOMMENDED to use default encryption algorithm for
  HPKE AEAD as AES-128-GCM.

Is there a reason why there is not a mandatory-to-implement algorithm?  How is interoperability between independent implementations expected if no mandatory algorithm is specified?
2024-10-23
09 Roman Danyliw
[Ballot comment]
** Thanks for the detailed analysis in Section 7.

** Section 6.2
  An implementation SHOULD attempt to detect if PDM data is …
[Ballot comment]
** Thanks for the detailed analysis in Section 7.

** Section 6.2
  An implementation SHOULD attempt to detect if PDM data is forged or
  modified by a malicious entity.

-- When should implementations ignore that the data is forged or modified?

-- What does “SHOULD attempt” mean in terms of implementation guidance?

** Section 6.4
  It is RECOMMENDED to use the HPKE framework that incorporates key
  encapsulation mechanism (KEM), key derivation function (KDF) and
  authenticated encryption with associated data (AEAD).

Please make RFC9180 a normative reference.
2024-10-23
09 Roman Danyliw [Ballot Position Update] New position, Discuss, has been recorded for Roman Danyliw
2024-10-23
09 Francesca Palombini [Ballot Position Update] New position, No Objection, has been recorded for Francesca Palombini
2024-10-22
09 Mahesh Jethanandani
[Ballot comment]
Section 4, paragraph 3
>    *  Server: An Endpoint Node which has a listening port and sends PDM
>      data …
[Ballot comment]
Section 4, paragraph 3
>    *  Server: An Endpoint Node which has a listening port and sends PDM
>      data to another Endpoint Node.

Would it not be better to say "sends PDM data to the Client"? Or are you saying that the Server can send data to another Endpoint Node at the behest of the Client that requested the data?

Section 5.1, paragraph 1
>    The two entities exchange a set of data to ensure the respective
>    identities.  This could be done via a TLS or other session.  The
>    exact nature of the identity verification is out-of-scope for this
>    document.

Does HPKE support mutual authentication? If not, is there another method other than what TLS does with certificates that is defined today to do mutual authentication?

Section 6.2, paragraph 1
>    An implementation SHOULD attempt to detect if PDM data is forged or
>    modified by a malicious entity.  In other terms, the implementation
>    should attempt to detect if a malicious entity has generated a valid
>    PDM header impersonating an endpoint or modified a valid PDM header.

Is it just the headers, or can a malicious user not change the PDM data and cause integrity issues?

Section 7.1.1, paragraph 2
>    a.  Being on the same LAN: The simplest way for an attacker to launch
>        a passive attack is to be on the same Local Area Network (LAN) as
>        the victim.  Many LAN configurations, such as Ethernet, 802.3,
>        and FDDI, allow any machine on the network to read all traffic
>        destined for any other machine on the same LAN.  This means that
>        if PDM packets are sent over the LAN, the attacker can capture
>        them.


Is this true? In today's switched networks, you have to either mirror the traffic from the port where the client and server are connected, or you have to be on that port. What you say is true for a bridge, but not for a switched network.

Section 7.1.1, paragraph 2
>    b.  Control of a Host in the Communication Path: If the attacker has
>        control over a host that lies in the communication path between
>        two victim machines, they can intercept PDM packets as they pass
>        through this compromised host.  This allows the attacker to
>        collect metadata without being on the same LAN as the victim.

This is the first time the concept of a "Host in the Communication Path" has been introduced. Till now there were Endpoint Nodes, Clients and Servers. Can this concept be introduced and explained before citing it here? For example, under what circumstances would there be such a Host?

Found terminology that should be reviewed for inclusivity; see
https://www.rfc-editor.org/part2/#inclusive_language for background and more
guidance:

* Terms "his" and "her"; alternatives might be "they", "them", "their"

-------------------------------------------------------------------------------
NIT
-------------------------------------------------------------------------------

All comments below are about very minor potential issues that you may choose to
address in some way - or ignore - as you see fit. Some were flagged by
automated tools (via https://github.com/larseggert/ietf-reviewtool), so there
will likely be some false positives. There is no need to let me know what you
did with these suggestions.

Section 4, paragraph 7
>    *  SessionTemporaryKey: A A temporary key used to secure data for
>      only the current session

s/A A/A/

Found non-HTTP URLs in the document:

* iiesoc.in

These URLs in the document did not return content:

* https://ameyand.github.io/PDMv2/draft-elkins-ippm-encrypted-pdmv2.html
* iiesoc.in

Section 3.3, paragraph 5
>  unsigned number. This field is initialized at a random number and is increm
>                                ^^^^^^^^^^^
Do not mix variants of the same word ("initialize" and "initialise") within a
single text.

Section 3.3, paragraph 5
> igned number. Global Pointer is initialized to 1 for the different source ad
>                                ^^^^^^^^^^^
Do not mix variants of the same word ("initialize" and "initialise") within a
single text.

Section 3.3, paragraph 43
> e data for only the current session s/A A/A/ 5. Protocol Flow The protocol w
>                                      ^^^
Possible typo: you repeated a word.

Section 4, paragraph 6
> * An Epoch. The Epoch SHOULD be initialized to zero. A change in the Epoch in
>                                ^^^^^^^^^^^
Do not mix variants of the same word ("initialize" and "initialise") within a
single text.

Section 5.1, paragraph 8
> RFC8200. The Option Type identifiers is coded to skip over this option and co
>                                      ^^
The verb form "is" does not seem to match the subject "identifiers".
2024-10-22
09 Mahesh Jethanandani [Ballot Position Update] New position, No Objection, has been recorded for Mahesh Jethanandani
2024-10-21
09 John Scudder
[Ballot discuss]
Thanks for this document. I have one point I'd like to have a discussion about:

## DISCUSS

I was surprised not to see …
[Ballot discuss]
Thanks for this document. I have one point I'd like to have a discussion about:

## DISCUSS

I was surprised not to see any discussion of the global pointer in the privacy considerations. I didn’t see any helpful discussion of deployment assumptions in the present document, but RFC 8250 says,

  Advantages include:

  2. Ability to span organizational boundaries with consistent
      instrumentation.

That implies to me that a given server might simultaneously be providing instrumentation to clients within different organizations. A reasonable default assumption is that it’s inappropriate to leak information about one of these clients to another. One might argue that even the metrics RFC 8250 exposes can leak some information to a savvy endpoint, but the global pointer does so explicitly and by design: one client now gets to find out what the aggregate packet rate to other clients is.

It seems as though this deserves explicit treatment in the security and/or privacy considerations. Or of course if I’ve missed something (e.g. this kind of data exposure between clients was always the expectation and everyone but me knows this) please help me see that.
2024-10-21
09 John Scudder
[Ballot comment]
## COMMENT

### Global Pointer naming

I found the name “Global Pointer” curiously opaque. It’s not a pointer in any conventional sense. I’m …
[Ballot comment]
## COMMENT

### Global Pointer naming

I found the name “Global Pointer” curiously opaque. It’s not a pointer in any conventional sense. I’m sure there’s some perfectly sensible historical reason for this nomenclature, but if I were picking a name ab initio that wouldn’t be it. “Global Packet Count” seems more descriptive, for instance.

### Section 6.4

      The basic mechanism is to encrypt the
  symmetric key with the public key by joining both yields.

I don’t understand what this means. In particular, “by joining both yields” doesn’t make sense to me. If I remove those four words, the sentence scans fine. Would it be reasonable to do that deletion?
2024-10-21
09 John Scudder [Ballot Position Update] New position, Discuss, has been recorded for John Scudder
2024-10-21
09 Gorry Fairhurst Request for Last Call review by TSVART Completed: Almost Ready. Reviewer: Gorry Fairhurst. Sent review to list.
2024-10-21
09 Carlos Jesús Bernardos Request for Telechat review by INTDIR Completed: Ready with Nits. Reviewer: Carlos Jesús Bernardos. Sent review to list.
2024-10-21
09 Carlos Jesús Bernardos Request for Telechat review by INTDIR is assigned to Carlos Jesús Bernardos
2024-10-19
09 Erik Kline
[Ballot discuss]
# Internet AD comments for draft-ietf-ippm-encrypted-pdmv2-09
CC @ekline

* comment syntax:
  - https://github.com/mnot/ietf-comments/blob/main/format.md

* "Handling Ballot Positions":
  - https://ietf.org/about/groups/iesg/statements/handling-ballot-positions/

## Discuss …
[Ballot discuss]
# Internet AD comments for draft-ietf-ippm-encrypted-pdmv2-09
CC @ekline

* comment syntax:
  - https://github.com/mnot/ietf-comments/blob/main/format.md

* "Handling Ballot Positions":
  - https://ietf.org/about/groups/iesg/statements/handling-ballot-positions/

## Discuss

### S3.3

* The draft says "difference between the two types of headers is determined
  from the Options Length value" but then shows two diagrams each with
  22 bytes post-"Option Length"-field contents and also:

  Option Length

      0x22: Unencrypted PDM
      0x22: Encrypted PDM


  which would seem to amount to 34 bytes.

  Possibly I'm just missing something obvious, or I've completely misread
  diagrams and/or the text, but how does an implementation distinguish
  between these two formats?
2024-10-19
09 Erik Kline
[Ballot comment]

# Internet AD comments for draft-ietf-ippm-encrypted-pdmv2-09
CC @ekline

* comment syntax:
  - https://github.com/mnot/ietf-comments/blob/main/format.md

* "Handling Ballot Positions":
  - https://ietf.org/about/groups/iesg/statements/handling-ballot-positions/

## Comments …
[Ballot comment]

# Internet AD comments for draft-ietf-ippm-encrypted-pdmv2-09
CC @ekline

* comment syntax:
  - https://github.com/mnot/ietf-comments/blob/main/format.md

* "Handling Ballot Positions":
  - https://ietf.org/about/groups/iesg/statements/handling-ballot-positions/

## Comments

### S5.1

* If I understand this correctly a new SessionTemporaryKey MUST be
  renegotiated every 2^32 packets.  Can you include a calculation to show
  approximately how often this turns out to be?

  I've probably done my math wrong, but assuming 1500 byte packets, a
  1 Gpbs link, and host sending at line rate I'd estimate a rollover
  about every 14 hours. If the packets are smaller the rollover is even
  faster
2024-10-19
09 Erik Kline [Ballot Position Update] New position, Discuss, has been recorded for Erik Kline
2024-10-18
09 Carlos Pignataro Closed request for Last Call review by OPSDIR with state 'Team Will not Review Document'
2024-10-18
09 Carlos Pignataro Assignment of request for Last Call review by OPSDIR to Jouni Korhonen was marked no-response
2024-10-17
09 Éric Vyncke Requested Telechat review by INTDIR
2024-10-16
09 Cindy Morgan Placed on agenda for telechat - 2024-10-24
2024-10-16
09 Warren Kumari Ballot has been issued
2024-10-16
09 Warren Kumari [Ballot Position Update] New position, Yes, has been recorded for Warren Kumari
2024-10-16
09 Warren Kumari Created "Approve" ballot
2024-10-16
09 Warren Kumari IESG state changed to IESG Evaluation from Waiting for AD Go-Ahead
2024-10-16
09 Warren Kumari Ballot writeup was changed
2024-10-15
09 (System) IESG state changed to Waiting for AD Go-Ahead from In Last Call
2024-10-14
09 David Dong
IESG/Authors/WG Chairs:

IANA has completed its review of draft-ietf-ippm-encrypted-pdmv2-09, which is currently in Last Call, and has the following comments:

We understand that this …
IESG/Authors/WG Chairs:

IANA has completed its review of draft-ietf-ippm-encrypted-pdmv2-09, which is currently in Last Call, and has the following comments:

We understand that this document doesn't require any registry actions.

While it's often helpful for a document's IANA Considerations section to remain in place upon publication even if there are no actions, if the authors strongly prefer to remove it, we do not object.

If this assessment is not accurate, please respond as soon as possible.

For definitions of IANA review states, please see:

https://datatracker.ietf.org/help/state/draft/iana-review

Thank you,

David Dong
IANA Services Sr. Specialist
2024-10-14
09 (System) IANA Review state changed to IANA OK - No Actions Needed from IANA - Review Needed
2024-10-10
09 Magnus Westerlund Request for Last Call review by TSVART is assigned to Gorry Fairhurst
2024-10-10
09 Carlos Pignataro Request for Last Call review by OPSDIR is assigned to Jouni Korhonen
2024-10-05
09 Nalini Elkins New version available: draft-ietf-ippm-encrypted-pdmv2-09.txt
2024-10-05
09 (System) New version approved
2024-10-05
09 (System) Request for posting confirmation emailed to previous authors: Adnan Rashid , Ameya Deshpande , Nalini Elkins , Tommaso Pecorella , michael ackermann
2024-10-05
09 Nalini Elkins Uploaded new revision
2024-10-04
08 Marc Blanchet Request for Last Call review by ARTART Completed: Ready. Reviewer: Marc Blanchet. Sent review to list.
2024-10-04
08 Barry Leiba Request for Last Call review by ARTART is assigned to Marc Blanchet
2024-10-02
08 Jean Mahoney Request for Last Call review by GENART is assigned to Peter Yee
2024-10-01
08 Jenny Bui IANA Review state changed to IANA - Review Needed
2024-10-01
08 Jenny Bui
The following Last Call announcement was sent out (ends 2024-10-15):

From: The IESG
To: IETF-Announce
CC: draft-ietf-ippm-encrypted-pdmv2@ietf.org, ippm-chairs@ietf.org, ippm@ietf.org, tpauly@apple.com, warren@kumari.net …
The following Last Call announcement was sent out (ends 2024-10-15):

From: The IESG
To: IETF-Announce
CC: draft-ietf-ippm-encrypted-pdmv2@ietf.org, ippm-chairs@ietf.org, ippm@ietf.org, tpauly@apple.com, warren@kumari.net
Reply-To: last-call@ietf.org
Sender:
Subject: Last Call:  (IPv6 Performance and Diagnostic Metrics Version 2 (PDMv2) Destination Option) to Proposed Standard


The IESG has received a request from the IP Performance Measurement WG (ippm)
to consider the following document: - 'IPv6 Performance and Diagnostic
Metrics Version 2 (PDMv2) Destination
  Option'
  as Proposed Standard

The IESG plans to make a decision in the next few weeks, and solicits final
comments on this action. Please send substantive comments to the
last-call@ietf.org mailing lists by 2024-10-15. Exceptionally, comments may
be sent to iesg@ietf.org instead. In either case, please retain the beginning
of the Subject line to allow automated sorting.

Abstract


  RFC8250 describes an optional Destination Option (DO) header embedded
  in each packet to provide sequence numbers and timing information as
  a basis for measurements.  As this data is sent in clear-text, this
  may create an opportunity for malicious actors to get information for
  subsequent attacks.  This document defines PDMv2 which has a
  lightweight handshake (registration procedure) and encryption to
  secure this data.  Additional performance metrics which may be of use
  are also defined.




The file can be obtained via
https://datatracker.ietf.org/doc/draft-ietf-ippm-encrypted-pdmv2/



No IPR declarations have been submitted directly on this I-D.




2024-10-01
08 Jenny Bui IESG state changed to In Last Call from Last Call Requested
2024-10-01
08 Jenny Bui Last call announcement was generated
2024-10-01
08 Warren Kumari Last call was requested
2024-10-01
08 Warren Kumari Last call announcement was generated
2024-10-01
08 Warren Kumari Ballot approval text was generated
2024-10-01
08 Warren Kumari Changes have been made to address my AD review, please see: https://mailarchive.ietf.org/arch/msg/ippm/2VZal7FCXYLI4yQEj3YlenOX5Dc/ for confirmation.
2024-10-01
08 Warren Kumari IESG state changed to Last Call Requested from AD Evaluation
2024-10-01
08 Warren Kumari Ballot writeup was changed
2024-09-13
08 Nalini Elkins New version available: draft-ietf-ippm-encrypted-pdmv2-08.txt
2024-09-13
08 Nalini Elkins New version accepted (logged-in submitter: Nalini Elkins)
2024-09-13
08 Nalini Elkins Uploaded new revision
2024-06-19
07 Nalini Elkins New version available: draft-ietf-ippm-encrypted-pdmv2-07.txt
2024-06-19
07 (System) New version approved
2024-06-19
07 (System) Request for posting confirmation emailed to previous authors: Adnan Rashid , Ameya Deshpande , Nalini Elkins , Tommaso Pecorella , michael ackermann
2024-06-19
07 Nalini Elkins Uploaded new revision
2024-05-28
06 Warren Kumari IESG state changed to AD Evaluation from Publication Requested
2024-05-21
06 Tommy Pauly
# Document Shepherd Write-Up for Group Documents

*This version is dated 4 July 2022.*

Thank you for your service as a document shepherd. Among the …
# Document Shepherd Write-Up for Group Documents

*This version is dated 4 July 2022.*

Thank you for your service as a document shepherd. Among the responsibilities is
answering the questions in this write-up to give helpful context to Last Call
and Internet Engineering Steering Group ([IESG][1]) reviewers, and your
diligence in completing it is appreciated. The full role of the shepherd is
further described in [RFC 4858][2]. You will need the cooperation of the authors
and editors to complete these checks.

Note that some numbered items contain multiple related questions; please be sure
to answer all of them.

## Document History

1. Does the working group (WG) consensus represent the strong concurrence of a
  few individuals, with others being silent, or did it reach broad agreement?

This document received support and reviews from the WG as a whole, although
the primary reviewers and commenters were a slightly different subset from
the normally most active IPPM members. This is due to the fact that IPPM
has several different "tracks" of participation, where subsets of the community
are more focused on their own topics. However, the consensus and support
of those who did comment was pretty clear.

2. Was there controversy about particular points, or were there decisions where
  the consensus was particularly rough?

No particular controversies. Much of the development and iteration on the draft
was in trying to refine the security aspects, and going back and forth with SECDIR
reviewers.

3. Has anyone threatened an appeal or otherwise indicated extreme discontent? If
  so, please summarize the areas of conflict in separate email messages to the
  responsible Area Director. (It should be in a separate email because this
  questionnaire is publicly available.)

No discontent has been epxressed.

4. For protocol documents, are there existing implementations of the contents of
  the document? Have a significant number of potential implementers indicated
  plans to implement? Are any existing implementations reported somewhere,
  either in the document itself (as [RFC 7942][3] recommends) or elsewhere
  (where)?

Yes, implementations have been tested at hackathons with results presented
at WG meetings.

## Additional Reviews

5. Do the contents of this document closely interact with technologies in other
  IETF working groups or external organizations, and would it therefore benefit
  from their review? Have those reviews occurred? If yes, describe which
  reviews took place.

This document is a new version of a protocol previously developed in IPPM, and
is primarily focused within the group.

6. Describe how the document meets any required formal expert review criteria,
  such as the MIB Doctor, YANG Doctor, media type, and URI type reviews.

No formal reviews like these required.

7. If the document contains a YANG module, has the final version of the module
  been checked with any of the [recommended validation tools][4] for syntax and
  formatting validation? If there are any resulting errors or warnings, what is
  the justification for not fixing them at this time? Does the YANG module
  comply with the Network Management Datastore Architecture (NMDA) as specified
  in [RFC 8342][5]?

No YANG module.

8. Describe reviews and automated checks performed to validate sections of the
  final version of the document written in a formal language, such as XML code,
  BNF rules, MIB definitions, CBOR's CDDL, etc.

No formal validation.

## Document Shepherd Checks

9. Based on the shepherd's review of the document, is it their opinion that this
  document is needed, clearly written, complete, correctly designed, and ready
  to be handed off to the responsible Area Director?

I think the document is clearly written and ready for Area Director review.

10. Several IETF Areas have assembled [lists of common issues that their
    reviewers encounter][6]. For which areas have such issues been identified
    and addressed? For which does this still need to happen in subsequent
    reviews?

The document went through three rounds of SECDIR review, which helped refine
the document and address many issues. I believe this was the primary area that
needed to provide input, since this document was mainly about adding
encryption support.

11. What type of RFC publication is being requested on the IETF stream ([Best
    Current Practice][12], [Proposed Standard, Internet Standard][13],
    [Informational, Experimental or Historic][14])? Why is this the proper type
    of RFC? Do all Datatracker state attributes correctly reflect this intent?

This is requesting Proposed Standard, which is appropriate as a new protocol
version of a standards track RFC (RFC 8250). The datatracker does reflect this.

12. Have reasonable efforts been made to remind all authors of the intellectual
    property rights (IPR) disclosure obligations described in [BCP 79][7]? To
    the best of your knowledge, have all required disclosures been filed? If
    not, explain why. If yes, summarize any relevant discussion, including links
    to publicly-available messages when applicable.

All authors have confirmed that they are not aware of any IPR related to this
document, and no other WG members have brought up any IPR.

13. Has each author, editor, and contributor shown their willingness to be
    listed as such? If the total number of authors and editors on the front page
    is greater than five, please provide a justification.

Yes, all authors have confirmed their willingness to author.

14. Document any remaining I-D nits in this document. Simply running the [idnits
    tool][8] is not enough; please review the ["Content Guidelines" on
    authors.ietf.org][15]. (Also note that the current idnits tool generates
    some incorrect warnings; a rewrite is underway.)

No nits found.

15. Should any informative references be normative or vice-versa? See the [IESG
    Statement on Normative and Informative References][16].

There are two informative references that could be considered as normative:
- RFC4303 for IPsec ESP, which is mentioned as an option for encapsulation
- RFC9180 for HPKE; this is an informational IRTF document, but has been normatively referenced in other RFCs, like RFC9458

16. List any normative references that are not freely available to anyone. Did
    the community have sufficient access to review any such normative
    references?

No such normative references.

17. Are there any normative downward references (see [RFC 3967][9] and [BCP
    97
][10]) that are not already listed in the [DOWNREF registry][17]? If so,
    list them.

No, but it may be good to promote RFC9180 to a normative downref.

18. Are there normative references to documents that are not ready to be
    submitted to the IESG for publication or are otherwise in an unclear state?
    If so, what is the plan for their completion?

No such references.

19. Will publication of this document change the status of any existing RFCs? If
    so, does the Datatracker metadata correctly reflect this and are those RFCs
    listed on the title page, in the abstract, and discussed in the
    introduction? If not, explain why and point to the part of the document
    where the relationship of this document to these other RFCs is discussed.

This document does not change the state of any other RFC, although it could be considered
to have it update or obsolete the older PDM (v1) RFC8250. I don't think this is
necessary, but could be done if the IESG finds it to be clearer.

20. Describe the document shepherd's review of the IANA considerations section,
    especially with regard to its consistency with the body of the document.
    Confirm that all aspects of the document requiring IANA assignments are
    associated with the appropriate reservations in IANA registries. Confirm
    that any referenced IANA registries have been clearly identified. Confirm
    that each newly created IANA registry specifies its initial contents,
    allocations procedures, and a reasonable name (see [RFC 8126][11]).

The IANA Considerations section is empty, as this document relies on the registration
of an IPv6 destination option from RFC8250. If this document were to update or obsolete
RFC8250, then the IANA Considerations could update the reference.

21. List any new IANA registries that require Designated Expert Review for
    future allocations. Are the instructions to the Designated Expert clear?
    Please include suggestions of designated experts, if appropriate.

No new registries.

[1]: https://www.ietf.org/about/groups/iesg/
[2]: https://www.rfc-editor.org/rfc/rfc4858.html
[3]: https://www.rfc-editor.org/rfc/rfc7942.html
[4]: https://wiki.ietf.org/group/ops/yang-review-tools
[5]: https://www.rfc-editor.org/rfc/rfc8342.html
[6]: https://wiki.ietf.org/group/iesg/ExpertTopics
[7]: https://www.rfc-editor.org/info/bcp79
[8]: https://www.ietf.org/tools/idnits/
[9]: https://www.rfc-editor.org/rfc/rfc3967.html
[10]: https://www.rfc-editor.org/info/bcp97
[11]: https://www.rfc-editor.org/rfc/rfc8126.html
[12]: https://www.rfc-editor.org/rfc/rfc2026.html#section-5
[13]: https://www.rfc-editor.org/rfc/rfc2026.html#section-4.1
[14]: https://www.rfc-editor.org/rfc/rfc2026.html#section-4.2
[15]: https://authors.ietf.org/en/content-guidelines-overview
[16]: https://www.ietf.org/about/groups/iesg/statements/normative-informative-references/
[17]: https://datatracker.ietf.org/doc/downref/

2024-05-21
06 Tommy Pauly IETF WG state changed to Submitted to IESG for Publication from WG Consensus: Waiting for Write-Up
2024-05-21
06 Tommy Pauly IESG state changed to Publication Requested from I-D Exists
2024-05-21
06 (System) Changed action holders to Warren Kumari (IESG state changed)
2024-05-21
06 Tommy Pauly Responsible AD changed to Warren Kumari
2024-05-21
06 Tommy Pauly Document is now in IESG state Publication Requested
2024-05-21
06 Tommy Pauly Tag Doc Shepherd Follow-up Underway cleared.
2024-05-21
06 Tommy Pauly
# Document Shepherd Write-Up for Group Documents

*This version is dated 4 July 2022.*

Thank you for your service as a document shepherd. Among the …
# Document Shepherd Write-Up for Group Documents

*This version is dated 4 July 2022.*

Thank you for your service as a document shepherd. Among the responsibilities is
answering the questions in this write-up to give helpful context to Last Call
and Internet Engineering Steering Group ([IESG][1]) reviewers, and your
diligence in completing it is appreciated. The full role of the shepherd is
further described in [RFC 4858][2]. You will need the cooperation of the authors
and editors to complete these checks.

Note that some numbered items contain multiple related questions; please be sure
to answer all of them.

## Document History

1. Does the working group (WG) consensus represent the strong concurrence of a
  few individuals, with others being silent, or did it reach broad agreement?

This document received support and reviews from the WG as a whole, although
the primary reviewers and commenters were a slightly different subset from
the normally most active IPPM members. This is due to the fact that IPPM
has several different "tracks" of participation, where subsets of the community
are more focused on their own topics. However, the consensus and support
of those who did comment was pretty clear.

2. Was there controversy about particular points, or were there decisions where
  the consensus was particularly rough?

No particular controversies. Much of the development and iteration on the draft
was in trying to refine the security aspects, and going back and forth with SECDIR
reviewers.

3. Has anyone threatened an appeal or otherwise indicated extreme discontent? If
  so, please summarize the areas of conflict in separate email messages to the
  responsible Area Director. (It should be in a separate email because this
  questionnaire is publicly available.)

No discontent has been epxressed.

4. For protocol documents, are there existing implementations of the contents of
  the document? Have a significant number of potential implementers indicated
  plans to implement? Are any existing implementations reported somewhere,
  either in the document itself (as [RFC 7942][3] recommends) or elsewhere
  (where)?

Yes, implementations have been tested at hackathons with results presented
at WG meetings.

## Additional Reviews

5. Do the contents of this document closely interact with technologies in other
  IETF working groups or external organizations, and would it therefore benefit
  from their review? Have those reviews occurred? If yes, describe which
  reviews took place.

This document is a new version of a protocol previously developed in IPPM, and
is primarily focused within the group.

6. Describe how the document meets any required formal expert review criteria,
  such as the MIB Doctor, YANG Doctor, media type, and URI type reviews.

No formal reviews like these required.

7. If the document contains a YANG module, has the final version of the module
  been checked with any of the [recommended validation tools][4] for syntax and
  formatting validation? If there are any resulting errors or warnings, what is
  the justification for not fixing them at this time? Does the YANG module
  comply with the Network Management Datastore Architecture (NMDA) as specified
  in [RFC 8342][5]?

No YANG module.

8. Describe reviews and automated checks performed to validate sections of the
  final version of the document written in a formal language, such as XML code,
  BNF rules, MIB definitions, CBOR's CDDL, etc.

No formal validation.

## Document Shepherd Checks

9. Based on the shepherd's review of the document, is it their opinion that this
  document is needed, clearly written, complete, correctly designed, and ready
  to be handed off to the responsible Area Director?

I think the document is clearly written and ready for Area Director review.

10. Several IETF Areas have assembled [lists of common issues that their
    reviewers encounter][6]. For which areas have such issues been identified
    and addressed? For which does this still need to happen in subsequent
    reviews?

The document went through three rounds of SECDIR review, which helped refine
the document and address many issues. I believe this was the primary area that
needed to provide input, since this document was mainly about adding
encryption support.

11. What type of RFC publication is being requested on the IETF stream ([Best
    Current Practice][12], [Proposed Standard, Internet Standard][13],
    [Informational, Experimental or Historic][14])? Why is this the proper type
    of RFC? Do all Datatracker state attributes correctly reflect this intent?

This is requesting Proposed Standard, which is appropriate as a new protocol
version of a standards track RFC (RFC 8250). The datatracker does reflect this.

12. Have reasonable efforts been made to remind all authors of the intellectual
    property rights (IPR) disclosure obligations described in [BCP 79][7]? To
    the best of your knowledge, have all required disclosures been filed? If
    not, explain why. If yes, summarize any relevant discussion, including links
    to publicly-available messages when applicable.

All authors have confirmed that they are not aware of any IPR related to this
document, and no other WG members have brought up any IPR.

13. Has each author, editor, and contributor shown their willingness to be
    listed as such? If the total number of authors and editors on the front page
    is greater than five, please provide a justification.

Yes, all authors have confirmed their willingness to author.

14. Document any remaining I-D nits in this document. Simply running the [idnits
    tool][8] is not enough; please review the ["Content Guidelines" on
    authors.ietf.org][15]. (Also note that the current idnits tool generates
    some incorrect warnings; a rewrite is underway.)

No nits found.

15. Should any informative references be normative or vice-versa? See the [IESG
    Statement on Normative and Informative References][16].

There are two informative references that could be considered as normative:
- RFC4303 for IPsec ESP, which is mentioned as an option for encapsulation
- RFC9180 for HPKE; this is an informational IRTF document, but has been normatively referenced in other RFCs, like RFC9458

16. List any normative references that are not freely available to anyone. Did
    the community have sufficient access to review any such normative
    references?

No such normative references.

17. Are there any normative downward references (see [RFC 3967][9] and [BCP
    97
][10]) that are not already listed in the [DOWNREF registry][17]? If so,
    list them.

No, but it may be good to promote RFC9180 to a normative downref.

18. Are there normative references to documents that are not ready to be
    submitted to the IESG for publication or are otherwise in an unclear state?
    If so, what is the plan for their completion?

No such references.

19. Will publication of this document change the status of any existing RFCs? If
    so, does the Datatracker metadata correctly reflect this and are those RFCs
    listed on the title page, in the abstract, and discussed in the
    introduction? If not, explain why and point to the part of the document
    where the relationship of this document to these other RFCs is discussed.

This document does not change the state of any other RFC, although it could be considered
to have it update or obsolete the older PDM (v1) RFC8250. I don't think this is
necessary, but could be done if the IESG finds it to be clearer.

20. Describe the document shepherd's review of the IANA considerations section,
    especially with regard to its consistency with the body of the document.
    Confirm that all aspects of the document requiring IANA assignments are
    associated with the appropriate reservations in IANA registries. Confirm
    that any referenced IANA registries have been clearly identified. Confirm
    that each newly created IANA registry specifies its initial contents,
    allocations procedures, and a reasonable name (see [RFC 8126][11]).

The IANA Considerations section is empty, as this document relies on the registration
of an IPv6 destination option from RFC8250. If this document were to update or obsolete
RFC8250, then the IANA Considerations could update the reference.

21. List any new IANA registries that require Designated Expert Review for
    future allocations. Are the instructions to the Designated Expert clear?
    Please include suggestions of designated experts, if appropriate.

No new registries.

[1]: https://www.ietf.org/about/groups/iesg/
[2]: https://www.rfc-editor.org/rfc/rfc4858.html
[3]: https://www.rfc-editor.org/rfc/rfc7942.html
[4]: https://wiki.ietf.org/group/ops/yang-review-tools
[5]: https://www.rfc-editor.org/rfc/rfc8342.html
[6]: https://wiki.ietf.org/group/iesg/ExpertTopics
[7]: https://www.rfc-editor.org/info/bcp79
[8]: https://www.ietf.org/tools/idnits/
[9]: https://www.rfc-editor.org/rfc/rfc3967.html
[10]: https://www.rfc-editor.org/info/bcp97
[11]: https://www.rfc-editor.org/rfc/rfc8126.html
[12]: https://www.rfc-editor.org/rfc/rfc2026.html#section-5
[13]: https://www.rfc-editor.org/rfc/rfc2026.html#section-4.1
[14]: https://www.rfc-editor.org/rfc/rfc2026.html#section-4.2
[15]: https://authors.ietf.org/en/content-guidelines-overview
[16]: https://www.ietf.org/about/groups/iesg/statements/normative-informative-references/
[17]: https://datatracker.ietf.org/doc/downref/

2024-04-09
06 Tommy Pauly Notification list changed to tpauly@apple.com because the document shepherd was set
2024-04-09
06 Tommy Pauly Document shepherd changed to Tommy Pauly
2024-04-09
06 Tommy Pauly Tag Doc Shepherd Follow-up Underway set. Tag Revised I-D Needed - Issue raised by WGLC cleared.
2024-04-09
06 Tommy Pauly IETF WG state changed to WG Consensus: Waiting for Write-Up from Waiting for WG Chair Go-Ahead
2024-02-25
06 Nalini Elkins New version available: draft-ietf-ippm-encrypted-pdmv2-06.txt
2024-02-25
06 Nalini Elkins New version accepted (logged-in submitter: Nalini Elkins)
2024-02-25
06 Nalini Elkins Uploaded new revision
2024-01-30
05 Tommy Pauly Tag Revised I-D Needed - Issue raised by WGLC set.
2024-01-30
05 Tommy Pauly IETF WG state changed to Waiting for WG Chair Go-Ahead from In WG Last Call
2024-01-15
05 Chris Lonvick Request for Last Call review by SECDIR Completed: Ready. Reviewer: Chris Lonvick. Sent review to list.
2024-01-12
05 Tero Kivinen Request for Last Call review by SECDIR is assigned to Chris Lonvick
2024-01-09
05 Tommy Pauly Requested Last Call review by SECDIR
2024-01-09
05 Tommy Pauly IETF WG state changed to In WG Last Call from WG Document
2023-10-22
05 Nalini Elkins New version available: draft-ietf-ippm-encrypted-pdmv2-05.txt
2023-10-22
05 (System) New version approved
2023-10-22
05 (System) Request for posting confirmation emailed to previous authors: Adnan Rashid , Ameya Deshpande , Nalini Elkins , Tommaso Pecorella , michael ackermann
2023-10-22
05 Nalini Elkins Uploaded new revision
2023-08-12
04 Chris Lonvick Request for Early review by SECDIR Completed: Not Ready. Reviewer: Chris Lonvick. Sent review to list.
2023-08-03
04 Tero Kivinen Request for Early review by SECDIR is assigned to Chris Lonvick
2023-07-29
04 Adam Montville Assignment of request for Early review by SECDIR to Adam Montville was rejected
2023-07-27
04 Tero Kivinen Request for Early review by SECDIR is assigned to Adam Montville
2023-07-24
04 Marcus Ihlar Requested Early review by SECDIR
2023-06-27
04 Nalini Elkins New version available: draft-ietf-ippm-encrypted-pdmv2-04.txt
2023-06-27
04 (System) New version approved
2023-06-27
04 (System) Request for posting confirmation emailed to previous authors: Adnan Rashid , Ameya Deshpande , Nalini Elkins , Tommaso Pecorella , michael ackermann
2023-06-27
04 Nalini Elkins Uploaded new revision
2023-03-26
03 Nalini Elkins New version available: draft-ietf-ippm-encrypted-pdmv2-03.txt
2023-03-26
03 (System) New version approved
2023-03-26
03 (System) Request for posting confirmation emailed to previous authors: Adnan Rashid , Ameya Deshpande , Nalini Elkins , Tommaso Pecorella , ippm-chairs@ietf.org, michael ackermann
2023-03-26
03 Nalini Elkins Uploaded new revision
2022-09-26
02 Nalini Elkins New version available: draft-ietf-ippm-encrypted-pdmv2-02.txt
2022-09-26
02 (System) New version approved
2022-09-26
02 (System) Request for posting confirmation emailed to previous authors: "mackermann@bcbsm.com" , Adnan Rashid , Ameya Deshpande , Nalini Elkins , Tommaso Pecorella
2022-09-26
02 Nalini Elkins Uploaded new revision
2022-07-19
01 Marcus Ihlar Added to session: IETF-114: ippm  Fri-1230
2022-06-28
01 Adam Montville Request for Early review by SECDIR Completed: Not Ready. Reviewer: Adam Montville. Sent review to list.
2022-06-20
01 Nalini Elkins New version available: draft-ietf-ippm-encrypted-pdmv2-01.txt
2022-06-20
01 (System) New version approved
2022-06-20
01 (System) Request for posting confirmation emailed to previous authors: "mackermann@bcbsm.com" , Adnan Rashid , Ameya Deshpande , Nalini Elkins , Tommaso Pecorella
2022-06-20
01 Nalini Elkins Uploaded new revision
2022-06-20
01 (System) Request for posting confirmation emailed to previous authors: "mackermann@bcbsm.com" , Adnan Rashid , Ameya Deshpande , Nalini Elkins , Tommaso Pecorella
2022-06-20
01 Nalini Elkins Uploaded new revision
2022-05-27
00 Tero Kivinen Request for Early review by SECDIR is assigned to Adam Montville
2022-05-27
00 Tero Kivinen Request for Early review by SECDIR is assigned to Adam Montville
2022-05-24
00 Tommy Pauly Requested Early review by SECDIR
2022-05-24
00 Tommy Pauly Changed consensus to Yes from Unknown
2022-05-24
00 Tommy Pauly Intended Status changed to Proposed Standard from None
2022-04-18
00 Tommy Pauly This document now replaces draft-elkins-ippm-encrypted-pdmv2 instead of None
2022-04-12
00 Nalini Elkins New version available: draft-ietf-ippm-encrypted-pdmv2-00.txt
2022-04-12
00 (System) WG -00 approved
2022-04-12
00 Nalini Elkins Set submitter to "Nalini Elkins ", replaces to (none) and sent approval email to group chairs: ippm-chairs@ietf.org
2022-04-12
00 Nalini Elkins Uploaded new revision