Skip to main content

Internet Key Exchange Protocol Version 2 (IKEv2) Configuration for Encrypted DNS
draft-ietf-ipsecme-add-ike-14

Revision differences

Document history

Date Rev. By Action
2024-01-26
14 Gunter Van de Velde Request closed, assignment withdrawn: Jouni Korhonen Telechat OPSDIR review
2024-01-26
14 Gunter Van de Velde Closed request for Telechat review by OPSDIR with state 'Overtaken by Events': Cleaning up stale OPSDIR queue
2023-09-25
14 (System) RFC Editor state changed to AUTH48-DONE from AUTH48
2023-09-11
14 (System) RFC Editor state changed to AUTH48
2023-07-28
14 (System) RFC Editor state changed to RFC-EDITOR from EDIT
2023-05-22
14 Barry Leiba Closed request for Last Call review by ARTART with state 'Overtaken by Events': Document has finished IESG processing
2023-05-22
14 Barry Leiba Assignment of request for Last Call review by ARTART to Bernard Aboba was marked no-response
2023-05-15
14 (System) IANA Action state changed to Waiting on RFC Editor from In Progress
2023-05-15
14 (System) IANA Action state changed to In Progress from Waiting on Authors
2023-05-12
14 (System) IANA Action state changed to Waiting on Authors from In Progress
2023-05-11
14 Tero Kivinen Closed request for Last Call review by SECDIR with state 'Overtaken by Events'
2023-05-11
14 Tero Kivinen Assignment of request for Last Call review by SECDIR to Richard Barnes was marked no-response
2023-05-10
14 (System) RFC Editor state changed to EDIT
2023-05-10
14 (System) IESG state changed to RFC Ed Queue from Approved-announcement sent
2023-05-10
14 (System) Announcement was received by RFC Editor
2023-05-10
14 (System) IANA Action state changed to In Progress
2023-05-10
14 Amy Vezza IESG state changed to Approved-announcement sent from Approved-announcement to be sent
2023-05-10
14 Amy Vezza IESG has approved the document
2023-05-10
14 Amy Vezza Closed "Approve" ballot
2023-05-10
14 Amy Vezza Ballot approval text was generated
2023-05-10
14 (System) Removed all action holders (IESG state changed)
2023-05-10
14 Roman Danyliw IESG state changed to Approved-announcement to be sent from IESG Evaluation::AD Followup
2023-05-10
14 Mohamed Boucadair New version available: draft-ietf-ipsecme-add-ike-14.txt
2023-05-10
14 Mohamed Boucadair New version accepted (logged-in submitter: Mohamed Boucadair)
2023-05-10
14 Mohamed Boucadair Uploaded new revision
2023-05-10
13 Paul Wouters [Ballot comment]
Thanks for the discussion and the resulting changes. It addresses my concerns.
2023-05-10
13 Paul Wouters [Ballot Position Update] Position for Paul Wouters has been changed to No Objection from Discuss
2023-04-28
13 Zaheduzzaman Sarker [Ballot comment]
Thanks for addressing my discuss comments.. the -13 looks good to me.
2023-04-28
13 Zaheduzzaman Sarker [Ballot Position Update] Position for Zaheduzzaman Sarker has been changed to Yes from Discuss
2023-04-28
13 Mohamed Boucadair New version available: draft-ietf-ipsecme-add-ike-13.txt
2023-04-28
13 Mohamed Boucadair New version accepted (logged-in submitter: Mohamed Boucadair)
2023-04-28
13 Mohamed Boucadair Uploaded new revision
2023-04-28
12 (System) Changed action holders to Roman Danyliw (IESG state changed)
2023-04-28
12 (System) Sub state has been changed to AD Followup from Revised I-D Needed
2023-04-28
12 (System) IANA Review state changed to Version Changed - Review Needed from IANA OK - Actions Needed
2023-04-28
12 Mohamed Boucadair New version available: draft-ietf-ipsecme-add-ike-12.txt
2023-04-28
12 Mohamed Boucadair New version accepted (logged-in submitter: Mohamed Boucadair)
2023-04-28
12 Mohamed Boucadair Uploaded new revision
2023-04-27
11 (System) Changed action holders to Mohamed Boucadair, Tirumaleswar Reddy.K, Dan Wing, Valery Smyslov, Roman Danyliw (IESG state changed)
2023-04-27
11 Cindy Morgan IESG state changed to IESG Evaluation::Revised I-D Needed from IESG Evaluation
2023-04-27
11 Robert Wilton
[Ballot comment]
Clearing discuss based on proposed resolution text.


Minor level comments:

(2) p 0, sec

  This document specifies new Internet Key Exchange Protocol …
[Ballot comment]
Clearing discuss based on proposed resolution text.


Minor level comments:

(2) p 0, sec

  This document specifies new Internet Key Exchange Protocol Version 2
  (IKEv2) Configuration Payload Attribute Types to assign DNS resolvers
  that support encrypted DNS protocols, such as DNS-over-HTTPS (DoH),
  DNS-over-TLS (DoT), and DNS-over-QUIC (DoQ).

Are there any updates needed to RFC 9061 needed to cover manageability aspects/updates of the attributes defined in this draft?  Note, I'm not requesting that they be added to this draft, but instead, I want to check if there is any need or plan to address them.


(3) p 2, sec 2.  Terminology

  Do53:  refers to unencrypted DNS.

This term only turns up a few (3 times) in this doc, and its not clear to me that it improves its readability.  I didn't know what it meant, possibly just referencing to "Unencrypted DNS" would be better for the wider audience?


(4) p 3, sec 3.1.  ENCDNS_IP* Configuration Payload Attributes

      -  0 if the Configuration payload has types CFG_REQUEST (if no
        specific DNS resolver is requested) or CFG_ACK.  If the
        'Length' field is set to 0, then later fields shown in Figure 1
        are not present.

I found this text unclear & confusing when combined with the following two paragraphs.  I would suggest rewording the first sentence to something like:

  0, if the Configuration payload has (i) type CFG_REQUEST and no
  specific DNS resolver is requested or (ii) type CFG_ACK.


(5) p 13, sec Appendix A.  Sample Deployment Scenarios

Readability may be slightly improved by adding a sentence here to explain what the purpose of this section is.


(6) p 14, sec Appendix A.  Sample Deployment Scenarios

  Enterprise networks are susceptible to internal and external attacks.
  To minimize that risk all enterprise traffic is encrypted
  (Section 2.1 of [I-D.arkko-farrell-arch-model-t]).

Would "SHOULD be encrypted" be better than "is encrypted"? Or, alternatively, "Encrypting all internal enterprise traffic minimizes the risks of attacks (Section 2.1 of [I-D.arkko-farrell-arch-model-t]).


(7) p 14, sec Appendix B.  Examples

I would suggest putting each of the two examples into its own subsection.



Nit level comments:

(8) p 4, sec 3.1.  ENCDNS_IP* Configuration Payload Attributes

      -  0 if the Configuration payload has types CFG_REQUEST (if no
        specific DNS resolver is requested) or CFG_ACK.  If the
        'Length' field is set to 0, then later fields shown in Figure 1
        are not present.
      -  (4 + Length of the ADN + N * 4 + Length of SvcParams) for
        ENCDNS_IP4 attributes if the Configuration payload has types
        CFG_REQUEST or CFG_REPLY or CFG_SET; N being the number of
        included IPv4 addresses ('Num addresses').

Possibly "(4 + 'Length of the ADN' + (N * 4) + Length of SvcParams)", and similarly for IPv6, would be more explicit.


(9) p 5, sec 3.2.  ENCDNS_DIGEST_INFO Configuration Payload Attribute

  *  Length (2 octets, unsigned integer) - Length of the enclosed data
      in octets.  This field MUST be set to "2 + 2 * number of included
      hash algorithm identifiers".

For clarity, I suggest: "2 + (2 * 'number of included
      hash algorithm identifiers')"


(10) p 6, sec 3.2.  ENCDNS_DIGEST_INFO Configuration Payload Attribute

  *  Length (2 octets, unsigned integer) - Length of the enclosed data
      in octets.  This field MUST be set to "2 + 2 * number of included
      hash algorithm identifiers".
  *  Num Hash Algs (1 octet) - Indicates the number of included hash
      algorithm identifiers.  This field MUST be set to "(Length -
      2)/2".

I suggest, included 'hash algorithm identifiers'.

Regards,
Rob
2023-04-27
11 Robert Wilton [Ballot Position Update] Position for Robert Wilton has been changed to No Objection from Discuss
2023-04-27
11 Andrew Alston [Ballot Position Update] New position, No Objection, has been recorded for Andrew Alston
2023-04-27
11 Robert Wilton
[Ballot discuss]
Hi,

Thanks for this document.

This should be a trivial discuss to resolve, and only flagging it as a discuss because I think …
[Ballot discuss]
Hi,

Thanks for this document.

This should be a trivial discuss to resolve, and only flagging it as a discuss because I think that it makes the spec unclear (or wrong):

(1) p 4, sec 3.1.  ENCDNS_IP* Configuration Payload Attributes

  *  IP Address(es) (variable) - Includes one or more IP addresses that
      can be used to reach the encrypted DNS resolver identified by the
      Authentication Domain Name.  For ENCDNS_IP4 this field contains
      one or more 4-octet IPv4 addresses, and for ENCDNS_IP6 this field
      contains one or more 16-octet IPv6 addresses.

Shouldn't this be zero or more IP addresses?  Otherwise, the example that only contains a domain and no IP address appears to be invalid.
2023-04-27
11 Robert Wilton
[Ballot comment]
Minor level comments:

(2) p 0, sec

  This document specifies new Internet Key Exchange Protocol Version 2
  (IKEv2) Configuration Payload Attribute …
[Ballot comment]
Minor level comments:

(2) p 0, sec

  This document specifies new Internet Key Exchange Protocol Version 2
  (IKEv2) Configuration Payload Attribute Types to assign DNS resolvers
  that support encrypted DNS protocols, such as DNS-over-HTTPS (DoH),
  DNS-over-TLS (DoT), and DNS-over-QUIC (DoQ).

Are there any updates needed to RFC 9061 needed to cover manageability aspects/updates of the attributes defined in this draft?  Note, I'm not requesting that they be added to this draft, but instead, I want to check if there is any need or plan to address them.


(3) p 2, sec 2.  Terminology

  Do53:  refers to unencrypted DNS.

This term only turns up a few (3 times) in this doc, and its not clear to me that it improves its readability.  I didn't know what it meant, possibly just referencing to "Unencrypted DNS" would be better for the wider audience?


(4) p 3, sec 3.1.  ENCDNS_IP* Configuration Payload Attributes

      -  0 if the Configuration payload has types CFG_REQUEST (if no
        specific DNS resolver is requested) or CFG_ACK.  If the
        'Length' field is set to 0, then later fields shown in Figure 1
        are not present.

I found this text unclear & confusing when combined with the following two paragraphs.  I would suggest rewording the first sentence to something like:

  0, if the Configuration payload has (i) type CFG_REQUEST and no
  specific DNS resolver is requested or (ii) type CFG_ACK.


(5) p 13, sec Appendix A.  Sample Deployment Scenarios

Readability may be slightly improved by adding a sentence here to explain what the purpose of this section is.


(6) p 14, sec Appendix A.  Sample Deployment Scenarios

  Enterprise networks are susceptible to internal and external attacks.
  To minimize that risk all enterprise traffic is encrypted
  (Section 2.1 of [I-D.arkko-farrell-arch-model-t]).

Would "SHOULD be encrypted" be better than "is encrypted"? Or, alternatively, "Encrypting all internal enterprise traffic minimizes the risks of attacks (Section 2.1 of [I-D.arkko-farrell-arch-model-t]).


(7) p 14, sec Appendix B.  Examples

I would suggest putting each of the two examples into its own subsection.



Nit level comments:

(8) p 4, sec 3.1.  ENCDNS_IP* Configuration Payload Attributes

      -  0 if the Configuration payload has types CFG_REQUEST (if no
        specific DNS resolver is requested) or CFG_ACK.  If the
        'Length' field is set to 0, then later fields shown in Figure 1
        are not present.
      -  (4 + Length of the ADN + N * 4 + Length of SvcParams) for
        ENCDNS_IP4 attributes if the Configuration payload has types
        CFG_REQUEST or CFG_REPLY or CFG_SET; N being the number of
        included IPv4 addresses ('Num addresses').

Possibly "(4 + 'Length of the ADN' + (N * 4) + Length of SvcParams)", and similarly for IPv6, would be more explicit.


(9) p 5, sec 3.2.  ENCDNS_DIGEST_INFO Configuration Payload Attribute

  *  Length (2 octets, unsigned integer) - Length of the enclosed data
      in octets.  This field MUST be set to "2 + 2 * number of included
      hash algorithm identifiers".

For clarity, I suggest: "2 + (2 * 'number of included
      hash algorithm identifiers')"


(10) p 6, sec 3.2.  ENCDNS_DIGEST_INFO Configuration Payload Attribute

  *  Length (2 octets, unsigned integer) - Length of the enclosed data
      in octets.  This field MUST be set to "2 + 2 * number of included
      hash algorithm identifiers".
  *  Num Hash Algs (1 octet) - Indicates the number of included hash
      algorithm identifiers.  This field MUST be set to "(Length -
      2)/2".

I suggest, included 'hash algorithm identifiers'.

Regards,
Rob
2023-04-27
11 Robert Wilton [Ballot Position Update] New position, Discuss, has been recorded for Robert Wilton
2023-04-26
11 Éric Vyncke
[Ballot comment]
Thank you for the work put into this document. It really helps to achieve the goals of the ADD WG :-) (only regret …
[Ballot comment]
Thank you for the work put into this document. It really helps to achieve the goals of the ADD WG :-) (only regret is that the IPSECME WGLC was not formally extended to the ADD WG, a little more of cross-WG collaboration is always welcome even if authors are also very active in ADD).

Please find below some non-blocking COMMENT points (but replies would be appreciated even if only for my own education), and one nit.

Special thanks to Tero Kivinen for the shepherd's detailed write-up including the WG consensus and the justification of the intended status.

Other thanks to Patrick Mevzek, the DNS directorate reviewer, please consider this dns-dir review:
https://datatracker.ietf.org/doc/review-ietf-ipsecme-add-ike-11-dnsdir-telechat-mevzek-2023-04-04/ (and I have read Med's reply so all it good)
and the previous https://datatracker.ietf.org/doc/review-ietf-ipsecme-add-ike-09-dnsdir-lc-mevzek-2023-03-16/ (and the authors/chairs have also replied)

I hope that this review helps to improve the document,

Regards,

-éric

# COMMENTS (non-blocking)

I second Paul Wouters' DISCUSS point #2 and Zahed's one (even if this may be the IPSECME WG usual process, it is not the IETF process).

## Section 1

In the discussion about private CA / address for the DNS resolver, one more sentence stating the obvious (when using a private CA then the client may use the digest info payload) would be welcome. Alternatively, moving this paragraph before the reference to the appendix will make it clearer the link with ENCDNS_DIGEST_INFO.

## Section 2

Should RFC 8499 be normative (note RFC 7296 is normative and used in the same way)?

## Section 3.2

What is the responder behaviour when receiving a CFG_REQUEST with "ADN Length" different from 0 ? Symmetrical case for the initiator when "Num Hash Algs" is not 1 in a CFG_SET. If the generic behaviour described in section 4 (`As a reminder, badly formatted attributes or unacceptable fields are handled as per Section 2.21 of [RFC7296].`), then why other fields (notably "R") have specific text ? The reminder of section 4 should rather be in section 3 (but this is a matter of taste).

`Note that SHA2-256 is mandatory to implement` does this mean that SHA2-256 identifier *MUST* always be in the list or is it implicit and does not have to be in the list ?

# NITS (non-blocking / cosmetic)

## Appendix A.1

No need to expand VPN as it is both well-known and used before without expansion ;)
2023-04-26
11 Éric Vyncke [Ballot Position Update] New position, Yes, has been recorded for Éric Vyncke
2023-04-26
11 Erik Kline [Ballot Position Update] New position, No Objection, has been recorded for Erik Kline
2023-04-26
11 John Scudder [Ballot Position Update] New position, No Objection, has been recorded for John Scudder
2023-04-26
11 Zaheduzzaman Sarker
[Ballot discuss]
Thanks for working on this specification.

I don't have transport related issues on this specification.

However, this specification relaxes constrains imposed by RFC8598 …
[Ballot discuss]
Thanks for working on this specification.

I don't have transport related issues on this specification.

However, this specification relaxes constrains imposed by RFC8598 but references it informatively. I think it should reference RFC8598 as normative reference and also should clearly indicate that in the document header and abstract. I am assuming this is an oversight but want to discuss it.
2023-04-26
11 Zaheduzzaman Sarker [Ballot Position Update] New position, Discuss, has been recorded for Zaheduzzaman Sarker
2023-04-24
11 Paul Wouters
[Ballot discuss]
I have a few important items I believe needs fixing, but I believe those are still fairly easy to address.

#1 payload format …
[Ballot discuss]
I have a few important items I believe needs fixing, but I believe those are still fairly easy to address.

#1 payload format of ENCDNS_DIGEST_INFO

I believe the proposed syntax for ENCDNS_DIGEST_INFO in this document
should not be specified this way. Depending on the use of this payload,
it has a different field construction. That is, we have two different
kinds of ENCDNS_DIGEST_INFO, which would make defining this field (eg in
C headers or in a class object) impossible without splitting it into two
different names and definitions. Either all the fields must be identical,
with optional 0 lengths field omitted, or the draft should define
ENCDNS_DIGEST_INFO_REQUEST and ENCDNS_DIGEST_INFO_RESPONSE with their different
field types. This can be further seen by the difficulty to read the examples
in the appendici with the ENCDNS_DIGEST_INFO() syntax.

If one ENCDNS_DIGEST_INFO type is used, I think the syntax for both request
and response should be:

0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-----------------------------+-------------------------------+
|R|        Attribute Type      |            Length            |
+-+-----------------------------+---------------+---------------+
| Num Hash Algs |  ADN Length  |                              |
+---------------+---------------+                              +
~                Authentication Domain Name                    ~
+-------------------------------+-------------------------------+
| Digest Hash Alg Identifier    |                              ~
+-------------------------------+                              +
~                    Certificate Digest                        ~
+-------------------------------+-------------------------------+

(eg as the current "response" version)

And Num Hash Algs, ADN Length and Digest Hash Alg Identifier
are mandatory fields in both the request and the response. I would
also always list these 3 fields in the presentation format of
ENCDNS_DIGEST_INFO() as used in the appendici examples.

I would rename "Hash Alg Identifier" to "Digest Hash Alg Identifier"
to make it more obvious that is what the hash algorithm is for.

#2 Updates RFC 8598

        Note: [RFC8598] requires INTERNAL_IP6_DNS (or INTERNAL_IP4_DNS)
        attribute to be mandatory present when INTERNAL_DNS_DOMAIN is
        included. This specification relaxes that constraint

This clearly updates RFC8598, but the document is lacking an Update: clause.
Please add the Update clause and mention the update in the abstract/introduction.

#3 Security Considerations

        The initiator may trust the encrypted DNS resolvers supplied by
        means of IKEv2 from a trusted responder more than the locally
        provided DNS resolvers, especially in the case of connecting
        to unknown or untrusted networks (e.g., coffee shops or hotel
        networks).

This does not seem to be a "Security Consideration".
Also, before this draft, receiving an (unencrypted) DNS server supplied
by IKEv2 would also be more trusted. In general, VPN clients trust the
"VPN provided nameserver" more than the local network one, irrespective
of transport encryption. Perhaps this sentence can just be deleted?

#4 Appendix A.2 and A.3

        Legacy VPN service providers usually preserve end-users' data
        confidentiality by sending all communication traffic through an
        encrypted tunnel.

What is "legacy" about this? I do not understand the point that A.2 is
trying to make?

Similarly, I don't understand Appendix A.3. The VPN service is not involved
in "allowing" an application to send traffic through the tunnel. It is the
VPN client that decided whether or not to send its traffic through the tunnel
or not. Also VPNs typically are configured to be either split-tunnel or not.
This can be, be hardly ever is, dynamic. I don't understand what A.3 is trying
to convey as example use related to the encrypted dns capability of the document.
2023-04-24
11 Paul Wouters
[Ballot comment]
Appendix A and B are marked as "example". This is confusing. I would rename
Appendix B to "Configuration Payload examples".

The Figure 5 …
[Ballot comment]
Appendix A and B are marked as "example". This is confusing. I would rename
Appendix B to "Configuration Payload examples".

The Figure 5 text should add the line:

        * Its Service Priority is 1

Which explains one of the number "1"s in the Figure which is otherwise
unreferenced.

The placement of "AliasMode" confuses me. It appears as part of the
Service Priority as a field name, but it is not a mode or value of
that. Perhaps the text should be moved somewhat down, after the
listing od fields? (It is also somewhat confusing in the reference
document I-D.ietf-dnsop-svcb-https.


        Note that, for many years, typical designs have often considered
        that the DNS resolver was usually located inside the protected
        domain, but could be located outside of it. With encrypted DNS,
        the latter option becomes plausible.

Note that, VPN clients might have code that specifically prohibits the
use of DNS servers on IP addresses that are not covered by the VPN tunnel.

I also have some concern with the word plausible, as that seems to only take
encryption into account and not redirection or privacy concerns towards
the encrypted DNS server, or what could be monitored from an adversary
seeing the encrypted DNS stream not protected by the VPN to a DNS server.
(eg an adversay sees an encrypted DNS packet to 192.1.2.1, and then sees
a plaintext query to the root server for ohnoos.org from IP 192.1.2.1).
Note that based on this reasoning, perhaps a consideration for this should
be added to the Privacy Considerations section.

I would remove this note or rewrite it as a caution note instead, eg:

        Note that existing VPN client implementations might not expect
        the new use case of an obtained DNS server IP being outside of
        the covered IP ranges of the VPN tunnel.



This example does not make it clear if the encrypted DNS resolver can be
used for all DNS or not. It appears to say there is a limitation to only
use it for internal-only domain names. I do not think such a protocol
limitation should be implied by this example?

        Enterprise networks are susceptible to internal and external
        attacks. To minimize that risk all enterprise traffic is encrypted
        (Section 2.1 of [I-D.arkko-farrell-arch-model-t]).

I'm not sure if this sentence is relevant to the document in question? Or
actually, if all enterprise network is encrypted anyway, why cant one just
send "unencrypted DNS", encrypted over the VPN to the VPN server? The VPN
server would then encrypt that traffic to the target internal DNS server
using its regular "all enterprise traffic is encrypted" model. I suggest
to just remove this sentence.


        Hosting encrypted DNS resolvers even in case of split-VPN
        configuration minimizes the attack vector (e.g., a compromised
        network device cannot monitor/modify DNS traffic).

I think "minimizes" should be changed to "can minimize". For example, if the
encrypted DNS is hosted on the VPN server itself, the above claim is not true.


        In this example, the initiator uses the ENCDNS_DIGEST_INFO
        attribute to indicate that the encrypted DNS client supports
        SHA2-256 (2), SHA2-384 (3), and SHA2-512 (4) hash algorithms.

Can we add "for certificate digests" to this sentence. I was a bit confused
when I read this and saw support for hash algorithms and wondered what
the list of hash algorithms was for again.


        In this example, no ADN is included ...

Because this sentence is between two examples, it is really confusing as to which
example it belongs to. how about:

        In the following example, no ADN is included ...
2023-04-24
11 Paul Wouters [Ballot Position Update] New position, Discuss, has been recorded for Paul Wouters
2023-04-24
11 Jim Guichard [Ballot Position Update] New position, No Objection, has been recorded for Jim Guichard
2023-04-24
11 Lars Eggert
[Ballot comment]
# GEN AD review of draft-ietf-ipsecme-add-ike-11

CC @larseggert

Thanks to Stewart Bryant for the General Area Review Team (Gen-ART) review
(https://mailarchive.ietf.org/arch/msg/gen-art/4W1GbLLH-dUSHMRjawTAsl7Zp38). …
[Ballot comment]
# GEN AD review of draft-ietf-ipsecme-add-ike-11

CC @larseggert

Thanks to Stewart Bryant for the General Area Review Team (Gen-ART) review
(https://mailarchive.ietf.org/arch/msg/gen-art/4W1GbLLH-dUSHMRjawTAsl7Zp38).

## Notes

This review is in the ["IETF Comments" Markdown format][ICMF], You can use the
[`ietf-comments` tool][ICT] to automatically convert this review into
individual GitHub issues. Review generated by the [`ietf-reviewtool`][IRT].

[ICMF]: https://github.com/mnot/ietf-comments/blob/main/format.md
[ICT]: https://github.com/mnot/ietf-comments
[IRT]: https://github.com/larseggert/ietf-reviewtool
2023-04-24
11 Lars Eggert [Ballot Position Update] New position, No Objection, has been recorded for Lars Eggert
2023-04-20
11 Amanda Baber IANA Review state changed to IANA OK - Actions Needed from Version Changed - Review Needed
2023-04-12
11 Gunter Van de Velde Request for Telechat review by OPSDIR is assigned to Jouni Korhonen
2023-04-04
11 Patrick Mevzek Request for Telechat review by DNSDIR Completed: Ready. Reviewer: Patrick Mevzek. Sent review to list.
2023-04-04
11 Jim Reid Request for Telechat review by DNSDIR is assigned to Patrick Mevzek
2023-04-04
11 Mohamed Boucadair New version available: draft-ietf-ipsecme-add-ike-11.txt
2023-04-04
11 Mohamed Boucadair New version accepted (logged-in submitter: Mohamed Boucadair)
2023-04-04
11 Mohamed Boucadair Uploaded new revision
2023-04-03
10 Patrick Mevzek Request for Telechat review by DNSDIR Completed: Ready. Reviewer: Patrick Mevzek. Sent review to list.
2023-03-29
10 Jim Reid Request for Telechat review by DNSDIR is assigned to Patrick Mevzek
2023-03-28
10 Roman Danyliw Placed on agenda for telechat - 2023-04-27
2023-03-28
10 Roman Danyliw Ballot has been issued
2023-03-28
10 Roman Danyliw [Ballot Position Update] New position, Yes, has been recorded for Roman Danyliw
2023-03-28
10 Roman Danyliw Created "Approve" ballot
2023-03-28
10 Roman Danyliw IESG state changed to IESG Evaluation from Waiting for Writeup::AD Followup
2023-03-28
10 Roman Danyliw Ballot writeup was changed
2023-03-28
10 Yoav Nir Added to session: IETF-116: ipsecme  Wed-0630
2023-03-26
10 (System) Changed action holders to Roman Danyliw (IESG state changed)
2023-03-26
10 (System) Sub state has been changed to AD Followup from Revised I-D Needed
2023-03-26
10 (System) IANA Review state changed to Version Changed - Review Needed from IANA OK - Actions Needed
2023-03-26
10 Mohamed Boucadair New version available: draft-ietf-ipsecme-add-ike-10.txt
2023-03-26
10 Mohamed Boucadair New version accepted (logged-in submitter: Mohamed Boucadair)
2023-03-26
10 Mohamed Boucadair Uploaded new revision
2023-03-16
09 Patrick Mevzek Request for Last Call review by DNSDIR Completed: Ready with Nits. Reviewer: Patrick Mevzek. Sent review to list.
2023-03-16
09 Roman Danyliw Please address the IETF LC OPSDIR review feedback.
2023-03-16
09 (System) Changed action holders to Dan Wing, Valery Smyslov, Roman Danyliw, Mohamed Boucadair, Tirumaleswar Reddy.K (IESG state changed)
2023-03-16
09 Roman Danyliw IESG state changed to Waiting for Writeup::Revised I-D Needed from Waiting for AD Go-Ahead
2023-03-16
09 (System) IESG state changed to Waiting for AD Go-Ahead from In Last Call
2023-03-13
09 Dhruv Dhody Request for Last Call review by OPSDIR Completed: Has Issues. Reviewer: Dhruv Dhody. Sent review to list.
2023-03-10
09 Gunter Van de Velde Request for Last Call review by OPSDIR is assigned to Dhruv Dhody
2023-03-09
09 (System) IANA Review state changed to IANA OK - Actions Needed from IANA - Not OK
2023-03-09
09 David Dong IANA Experts State changed to Expert Reviews OK from Reviews assigned
2023-03-09
09 Stewart Bryant Request for Last Call review by GENART Completed: Ready. Reviewer: Stewart Bryant. Sent review to list.
2023-03-09
09 Tero Kivinen Request for Last Call review by SECDIR is assigned to Richard Barnes
2023-03-06
09 David Dong IANA Experts State changed to Reviews assigned
2023-03-06
09 (System) IANA Review state changed to IANA - Not OK from IANA - Review Needed
2023-03-06
09 David Dong
(Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs:

The IANA Functions Operator has completed its review of draft-ietf-ipsecme-add-ike-09. If any part of this review is inaccurate, please let …
(Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs:

The IANA Functions Operator has completed its review of draft-ietf-ipsecme-add-ike-09. If any part of this review is inaccurate, please let us know.

The IANA Functions Operator understands that, upon approval of this document, there is a single action which we must complete.

In the IKEv2 Configuration Payload Attribute Types registry on the Internet Key Exchange Version 2 (IKEv2) Parameters registry page located at:

https://www.iana.org/assignments/ikev2-parameters/

three, new attribute types are to be registered as follows:

Value: [ TBD-at-Registration ]
Attribute Type: ENCDNS_IP4
Multi-valued: YES
Length: 0 or more
Reference: [ RFC-to-be ]

Value: [ TBD-at-Registration ]
Attribute Type: ENCDNS_IP6
Multi-valued: YES
Length: 0 or more
Reference: [ RFC-to-be ]

Value: [ TBD-at-Registration ]
Attribute Type: ENCDNS_DIGEST_INFO
Multi-valued: YES
Length: 0 or more
Reference: [ RFC-to-be ]

As this document requests registrations in an Expert Review or Specification Required (see RFC 8126) registry, we will initiate the required Expert Review via a separate request. This review must be completed before the document's IANA state can be changed to "IANA OK."

The IANA Functions Operator understands that this is the only action required to be completed upon approval of this document.

Note:  The actions requested in this document will not be completed until the document has been approved for publication as an RFC. This message is meant only to confirm the list of actions that will be performed.

For definitions of IANA review states, please see:

https://datatracker.ietf.org/help/state/draft/iana-review

Thank you,

David Dong
IANA Services Specialist
2023-03-03
09 Barry Leiba Request for Last Call review by ARTART is assigned to Bernard Aboba
2023-03-02
09 Jim Reid Request for Last Call review by DNSDIR is assigned to Patrick Mevzek
2023-03-02
09 Jean Mahoney Request for Last Call review by GENART is assigned to Stewart Bryant
2023-03-02
09 Cindy Morgan IANA Review state changed to IANA - Review Needed
2023-03-02
09 Cindy Morgan
The following Last Call announcement was sent out (ends 2023-03-16):

From: The IESG
To: IETF-Announce
CC: draft-ietf-ipsecme-add-ike@ietf.org, ipsec@ietf.org, ipsecme-chairs@ietf.org, kivinen@iki.fi, rdd@cert.org …
The following Last Call announcement was sent out (ends 2023-03-16):

From: The IESG
To: IETF-Announce
CC: draft-ietf-ipsecme-add-ike@ietf.org, ipsec@ietf.org, ipsecme-chairs@ietf.org, kivinen@iki.fi, rdd@cert.org
Reply-To: last-call@ietf.org
Sender:
Subject: Last Call:  (Internet Key Exchange Protocol Version 2 (IKEv2) Configuration for Encrypted DNS) to Proposed Standard


The IESG has received a request from the IP Security Maintenance and
Extensions WG (ipsecme) to consider the following document: - 'Internet Key
Exchange Protocol Version 2 (IKEv2) Configuration for
  Encrypted DNS'
  as Proposed Standard

The IESG plans to make a decision in the next few weeks, and solicits final
comments on this action. Please send substantive comments to the
last-call@ietf.org mailing lists by 2023-03-16. Exceptionally, comments may
be sent to iesg@ietf.org instead. In either case, please retain the beginning
of the Subject line to allow automated sorting.

Abstract


  This document specifies new Internet Key Exchange Protocol Version 2
  (IKEv2) Configuration Payload Attribute Types to assign DNS resolvers
  that support encrypted DNS protocols, such as DNS-over-HTTPS (DoH),
  DNS-over-TLS (DoT), and DNS-over-QUIC (DoQ).




The file can be obtained via
https://datatracker.ietf.org/doc/draft-ietf-ipsecme-add-ike/



No IPR declarations have been submitted directly on this I-D.




2023-03-02
09 Cindy Morgan IESG state changed to In Last Call from Last Call Requested
2023-03-02
09 Roman Danyliw Last call was requested
2023-03-02
09 Roman Danyliw Last call announcement was generated
2023-03-02
09 Roman Danyliw Ballot approval text was generated
2023-03-02
09 Roman Danyliw Ballot writeup was generated
2023-03-02
09 Roman Danyliw IESG state changed to Last Call Requested from AD Evaluation::AD Followup
2023-02-27
09 (System) Changed action holders to Roman Danyliw (IESG state changed)
2023-02-27
09 (System) Sub state has been changed to AD Followup from Revised I-D Needed
2023-02-27
09 Mohamed Boucadair New version available: draft-ietf-ipsecme-add-ike-09.txt
2023-02-27
09 Mohamed Boucadair New version accepted (logged-in submitter: Mohamed Boucadair)
2023-02-27
09 Mohamed Boucadair Uploaded new revision
2023-02-17
08 Roman Danyliw AD Review: https://mailarchive.ietf.org/arch/msg/ipsec/XDFgoLu9ZZLAR2pOzkSMnMek_Fw/
2023-02-17
08 (System) Changed action holders to Dan Wing, Valery Smyslov, Roman Danyliw, Mohamed Boucadair, Tirumaleswar Reddy.K (IESG state changed)
2023-02-17
08 Roman Danyliw IESG state changed to AD Evaluation::Revised I-D Needed from Publication Requested
2023-01-31
08 Mohamed Boucadair New version available: draft-ietf-ipsecme-add-ike-08.txt
2023-01-31
08 Mohamed Boucadair New version accepted (logged-in submitter: Mohamed Boucadair)
2023-01-31
08 Mohamed Boucadair Uploaded new revision
2023-01-31
07 Tero Kivinen
# Document Shepherd Write-Up for Group Documents

*This version is dated 4 July 2022.*

Thank you for your service as a document shepherd. Among the …
# Document Shepherd Write-Up for Group Documents

*This version is dated 4 July 2022.*

Thank you for your service as a document shepherd. Among the responsibilities is
answering the questions in this write-up to give helpful context to Last Call
and Internet Engineering Steering Group ([IESG][1]) reviewers, and your
diligence in completing it is appreciated. The full role of the shepherd is
further described in [RFC 4858][2]. You will need the cooperation of the authors
and editors to complete these checks.

Note that some numbered items contain multiple related questions; please be sure
to answer all of them.

## Document History

1. Does the working group (WG) consensus represent the strong concurrence of a
  few individuals, with others being silent, or did it reach broad agreement?

There is a broad agreement to adopt and progress this work within IPsecME.

2. Was there controversy about particular points, or were there decisions where
  the consensus was particularly rough?

No controversy is to be reported for the draft. The authors were responsive in
dealing with the comments raised by reviewers during all the document' development phases.

3. Has anyone threatened an appeal or otherwise indicated extreme discontent? If
  so, please summarize the areas of conflict in separate email messages to the
  responsible Area Director. (It should be in a separate email because this
  questionnaire is publicly available.)

No.

4. For protocol documents, are there existing implementations of the contents of
  the document? Have a significant number of potential implementers indicated
  plans to implement? Are any existing implementations reported somewhere,
  either in the document itself (as [RFC 7942][3] recommends) or elsewhere
  (where)?

No implementation was reported to the WG.

## Additional Reviews

5. Do the contents of this document closely interact with technologies in other
  IETF working groups or external organizations, and would it therefore benefit
  from their review? Have those reviews occurred? If yes, describe which
  reviews took place.

Yes, the document follows the design guidelines set by the ADD WG for the discovery
of encrypted DNS resolvers. This is acknowledged in the current specification.

6. Describe how the document meets any required formal expert review criteria,
  such as the MIB Doctor, YANG Doctor, media type, and URI type reviews.

No formal review is required other than the review required to perform the IANA
actions.

7. If the document contains a YANG module, has the final version of the module
  been checked with any of the [recommended validation tools][4] for syntax and
  formatting validation? If there are any resulting errors or warnings, what is
  the justification for not fixing them at this time? Does the YANG module
  comply with the Network Management Datastore Architecture (NMDA) as specified
  in [RFC 8342][5]?

N/A.

8. Describe reviews and automated checks performed to validate sections of the
  final version of the document written in a formal language, such as XML code,
  BNF rules, MIB definitions, CBOR's CDDL, etc.

N/A.

## Document Shepherd Checks

9. Based on the shepherd's review of the document, is it their opinion that this
  document is needed, clearly written, complete, correctly designed, and ready
  to be handed off to the responsible Area Director?

Yes.

10. Several IETF Areas have assembled [lists of common issues that their
    reviewers encounter][6]. For which areas have such issues been identified
    and addressed? For which does this still need to happen in subsequent
    reviews?

Yes, intarea/ADD WG.

11. What type of RFC publication is being requested on the IETF stream ([Best
    Current Practice][12], [Proposed Standard, Internet Standard][13],
    [Informational, Experimental or Historic][14])? Why is this the proper type
    of RFC? Do all Datatracker state attributes correctly reflect this intent?

This document requests publication as a Proposed Standard RFC. That
is indicated on the header page. The intended status is justified
given that the document specifies new IKE attributes with a set of normative
behavior to ensure interoperability.

12. Have reasonable efforts been made to remind all authors of the intellectual
    property rights (IPR) disclosure obligations described in [BCP 79][7]? To
    the best of your knowledge, have all required disclosures been filed? If
    not, explain why. If yes, summarize any relevant discussion, including links
    to publicly-available messages when applicable.

Yes, see https://mailarchive.ietf.org/arch/msg/ipsec/QMbmRZRI6Wk20JXxnz2lOMAWF18/

13. Has each author, editor, and contributor shown their willingness to be
    listed as such? If the total number of authors and editors on the front page
    is greater than five, please provide a justification.

Yes.

14. Document any remaining I-D nits in this document. Simply running the [idnits
    tool][8] is not enough; please review the ["Content Guidelines" on
    authors.ietf.org][15]. (Also note that the current idnits tool generates
    some incorrect warnings; a rewrite is underway.)

None to report for this version.

15. Should any informative references be normative or vice-versa? See the [IESG
    Statement on Normative and Informative References][16].

No.

16. List any normative references that are not freely available to anyone. Did
    the community have sufficient access to review any such normative
    references?

None.

17. Are there any normative downward references (see [RFC 3967][9] and [BCP
    97
][10]) that are not already listed in the [DOWNREF registry][17]? If so,
    list them.

None.

18. Are there normative references to documents that are not ready to be
    submitted to the IESG for publication or are otherwise in an unclear state?
    If so, what is the plan for their completion?

The document has a normative dependency on I-D.ietf-dnsop-svcb-https, which is
in the RFC Editor Queue.

19. Will publication of this document change the status of any existing RFCs? If
    so, does the Datatracker metadata correctly reflect this and are those RFCs
    listed on the title page, in the abstract, and discussed in the
    introduction? If not, explain why and point to the part of the document
    where the relationship of this document to these other RFCs is discussed.

No.

20. Describe the document shepherd's review of the IANA considerations section,
    especially with regard to its consistency with the body of the document.
    Confirm that all aspects of the document requiring IANA assignments are
    associated with the appropriate reservations in IANA registries. Confirm
    that any referenced IANA registries have been clearly identified. Confirm
    that each newly created IANA registry specifies its initial contents,
    allocations procedures, and a reasonable name (see [RFC 8126][11]).

All requested actions are clearly documented, with adequate pointers to the target
IANA registry. The shepherd is one of the IANA experts for the registries to be
modified, and one of the authors is the another IANA expert, so all IANA experts
of the registries should be familiar with the registrations.

21. List any new IANA registries that require Designated Expert Review for
    future allocations. Are the instructions to the Designated Expert clear?
    Please include suggestions of designated experts, if appropriate.

N/A.

[1]: https://www.ietf.org/about/groups/iesg/
[2]: https://www.rfc-editor.org/rfc/rfc4858.html
[3]: https://www.rfc-editor.org/rfc/rfc7942.html
[4]: https://trac.ietf.org/trac/ops/wiki/yang-review-tools
[5]: https://www.rfc-editor.org/rfc/rfc8342.html
[6]: https://trac.ietf.org/trac/iesg/wiki/ExpertTopics
[7]: https://www.rfc-editor.org/info/bcp79
[8]: https://www.ietf.org/tools/idnits/
[9]: https://www.rfc-editor.org/rfc/rfc3967.html
[10]: https://www.rfc-editor.org/info/bcp97
[11]: https://www.rfc-editor.org/rfc/rfc8126.html
[12]: https://www.rfc-editor.org/rfc/rfc2026.html#section-5
[13]: https://www.rfc-editor.org/rfc/rfc2026.html#section-4.1
[14]: https://www.rfc-editor.org/rfc/rfc2026.html#section-4.2
[15]: https://authors.ietf.org/en/content-guidelines-overview
[16]: https://www.ietf.org/about/groups/iesg/statements/normative-informative-references/
[17]: https://datatracker.ietf.org/doc/downref/

2023-01-31
07 Tero Kivinen Responsible AD changed to Roman Danyliw
2023-01-31
07 Tero Kivinen IETF WG state changed to Submitted to IESG for Publication from WG Consensus: Waiting for Write-Up
2023-01-31
07 Tero Kivinen IESG state changed to Publication Requested from I-D Exists
2023-01-31
07 Tero Kivinen Document is now in IESG state Publication Requested
2023-01-31
07 Tero Kivinen Changed consensus to Yes from Unknown
2023-01-31
07 Tero Kivinen Intended Status changed to Proposed Standard from None
2023-01-31
07 Mohamed Boucadair New version available: draft-ietf-ipsecme-add-ike-07.txt
2023-01-31
07 Mohamed Boucadair New version accepted (logged-in submitter: Mohamed Boucadair)
2023-01-31
07 Mohamed Boucadair Uploaded new revision
2023-01-30
06 Tero Kivinen
# Document Shepherd Write-Up for Group Documents

*This version is dated 4 July 2022.*

Thank you for your service as a document shepherd. Among the …
# Document Shepherd Write-Up for Group Documents

*This version is dated 4 July 2022.*

Thank you for your service as a document shepherd. Among the responsibilities is
answering the questions in this write-up to give helpful context to Last Call
and Internet Engineering Steering Group ([IESG][1]) reviewers, and your
diligence in completing it is appreciated. The full role of the shepherd is
further described in [RFC 4858][2]. You will need the cooperation of the authors
and editors to complete these checks.

Note that some numbered items contain multiple related questions; please be sure
to answer all of them.

## Document History

1. Does the working group (WG) consensus represent the strong concurrence of a
  few individuals, with others being silent, or did it reach broad agreement?

There is a broad agreement to adopt and progress this work within IPsecME.

2. Was there controversy about particular points, or were there decisions where
  the consensus was particularly rough?

No controversy is to be reported for the draft. The authors were responsive in
dealing with the comments raised by reviewers during all the document' development phases.

3. Has anyone threatened an appeal or otherwise indicated extreme discontent? If
  so, please summarize the areas of conflict in separate email messages to the
  responsible Area Director. (It should be in a separate email because this
  questionnaire is publicly available.)

No.

4. For protocol documents, are there existing implementations of the contents of
  the document? Have a significant number of potential implementers indicated
  plans to implement? Are any existing implementations reported somewhere,
  either in the document itself (as [RFC 7942][3] recommends) or elsewhere
  (where)?

No implementation was reported to the WG.

## Additional Reviews

5. Do the contents of this document closely interact with technologies in other
  IETF working groups or external organizations, and would it therefore benefit
  from their review? Have those reviews occurred? If yes, describe which
  reviews took place.

Yes, the document follows the design guidelines set by the ADD WG for the discovery
of encrypted DNS resolvers. This is acknowledged in the current specification.

6. Describe how the document meets any required formal expert review criteria,
  such as the MIB Doctor, YANG Doctor, media type, and URI type reviews.

No formal review is required other than the review required to perform the IANA
actions.

7. If the document contains a YANG module, has the final version of the module
  been checked with any of the [recommended validation tools][4] for syntax and
  formatting validation? If there are any resulting errors or warnings, what is
  the justification for not fixing them at this time? Does the YANG module
  comply with the Network Management Datastore Architecture (NMDA) as specified
  in [RFC 8342][5]?

N/A.

8. Describe reviews and automated checks performed to validate sections of the
  final version of the document written in a formal language, such as XML code,
  BNF rules, MIB definitions, CBOR's CDDL, etc.

N/A.

## Document Shepherd Checks

9. Based on the shepherd's review of the document, is it their opinion that this
  document is needed, clearly written, complete, correctly designed, and ready
  to be handed off to the responsible Area Director?

Yes.

10. Several IETF Areas have assembled [lists of common issues that their
    reviewers encounter][6]. For which areas have such issues been identified
    and addressed? For which does this still need to happen in subsequent
    reviews?

Yes, intarea/ADD WG.

11. What type of RFC publication is being requested on the IETF stream ([Best
    Current Practice][12], [Proposed Standard, Internet Standard][13],
    [Informational, Experimental or Historic][14])? Why is this the proper type
    of RFC? Do all Datatracker state attributes correctly reflect this intent?

This document requests publication as a Proposed Standard RFC. That
is indicated on the header page. The intended status is justified
given that the document specifies new IKE attributes with a set of normative
behavior to ensure interoperability.

12. Have reasonable efforts been made to remind all authors of the intellectual
    property rights (IPR) disclosure obligations described in [BCP 79][7]? To
    the best of your knowledge, have all required disclosures been filed? If
    not, explain why. If yes, summarize any relevant discussion, including links
    to publicly-available messages when applicable.

Yes, see https://mailarchive.ietf.org/arch/msg/ipsec/QMbmRZRI6Wk20JXxnz2lOMAWF18/

13. Has each author, editor, and contributor shown their willingness to be
    listed as such? If the total number of authors and editors on the front page
    is greater than five, please provide a justification.

Yes.

14. Document any remaining I-D nits in this document. Simply running the [idnits
    tool][8] is not enough; please review the ["Content Guidelines" on
    authors.ietf.org][15]. (Also note that the current idnits tool generates
    some incorrect warnings; a rewrite is underway.)

None to report for this version.

15. Should any informative references be normative or vice-versa? See the [IESG
    Statement on Normative and Informative References][16].

No.

16. List any normative references that are not freely available to anyone. Did
    the community have sufficient access to review any such normative
    references?

None.

17. Are there any normative downward references (see [RFC 3967][9] and [BCP
    97
][10]) that are not already listed in the [DOWNREF registry][17]? If so,
    list them.

None.

18. Are there normative references to documents that are not ready to be
    submitted to the IESG for publication or are otherwise in an unclear state?
    If so, what is the plan for their completion?

The document has a normative dependency on I-D.ietf-dnsop-svcb-https, which is
in the RFC Editor Queue.

19. Will publication of this document change the status of any existing RFCs? If
    so, does the Datatracker metadata correctly reflect this and are those RFCs
    listed on the title page, in the abstract, and discussed in the
    introduction? If not, explain why and point to the part of the document
    where the relationship of this document to these other RFCs is discussed.

No.

20. Describe the document shepherd's review of the IANA considerations section,
    especially with regard to its consistency with the body of the document.
    Confirm that all aspects of the document requiring IANA assignments are
    associated with the appropriate reservations in IANA registries. Confirm
    that any referenced IANA registries have been clearly identified. Confirm
    that each newly created IANA registry specifies its initial contents,
    allocations procedures, and a reasonable name (see [RFC 8126][11]).

All requested actions are clearly documented, with adequate pointers to the target
IANA registry. The shepherd is one of the IANA experts for the registries to be
modified, and one of the authors is the another IANA expert, so all IANA experts
of the registries should be familiar with the registrations.

21. List any new IANA registries that require Designated Expert Review for
    future allocations. Are the instructions to the Designated Expert clear?
    Please include suggestions of designated experts, if appropriate.

N/A.

[1]: https://www.ietf.org/about/groups/iesg/
[2]: https://www.rfc-editor.org/rfc/rfc4858.html
[3]: https://www.rfc-editor.org/rfc/rfc7942.html
[4]: https://trac.ietf.org/trac/ops/wiki/yang-review-tools
[5]: https://www.rfc-editor.org/rfc/rfc8342.html
[6]: https://trac.ietf.org/trac/iesg/wiki/ExpertTopics
[7]: https://www.rfc-editor.org/info/bcp79
[8]: https://www.ietf.org/tools/idnits/
[9]: https://www.rfc-editor.org/rfc/rfc3967.html
[10]: https://www.rfc-editor.org/info/bcp97
[11]: https://www.rfc-editor.org/rfc/rfc8126.html
[12]: https://www.rfc-editor.org/rfc/rfc2026.html#section-5
[13]: https://www.rfc-editor.org/rfc/rfc2026.html#section-4.1
[14]: https://www.rfc-editor.org/rfc/rfc2026.html#section-4.2
[15]: https://authors.ietf.org/en/content-guidelines-overview
[16]: https://www.ietf.org/about/groups/iesg/statements/normative-informative-references/
[17]: https://datatracker.ietf.org/doc/downref/

2023-01-29
06 Tero Kivinen Notification list changed to kivinen@iki.fi because the document shepherd was set
2023-01-29
06 Tero Kivinen Document shepherd changed to Tero Kivinen
2022-11-09
06 Tero Kivinen IETF WG state changed to WG Consensus: Waiting for Write-Up from In WG Last Call
2022-09-12
06 Mohamed Boucadair New version available: draft-ietf-ipsecme-add-ike-06.txt
2022-09-12
06 Mohamed Boucadair New version accepted (logged-in submitter: Mohamed Boucadair)
2022-09-12
06 Mohamed Boucadair Uploaded new revision
2022-09-09
05 Mohamed Boucadair New version available: draft-ietf-ipsecme-add-ike-05.txt
2022-09-09
05 Mohamed Boucadair New version accepted (logged-in submitter: Mohamed Boucadair)
2022-09-09
05 Mohamed Boucadair Uploaded new revision
2022-08-30
04 Mohamed Boucadair New version available: draft-ietf-ipsecme-add-ike-04.txt
2022-08-30
04 Mohamed Boucadair New version accepted (logged-in submitter: Mohamed Boucadair)
2022-08-30
04 Mohamed Boucadair Uploaded new revision
2022-08-09
03 Tero Kivinen IETF WG state changed to In WG Last Call from WG Document
2022-07-24
03 Mohamed Boucadair New version available: draft-ietf-ipsecme-add-ike-03.txt
2022-07-24
03 Mohamed Boucadair New version accepted (logged-in submitter: Mohamed Boucadair)
2022-07-24
03 Mohamed Boucadair Uploaded new revision
2022-04-26
02 Mohamed Boucadair New version available: draft-ietf-ipsecme-add-ike-02.txt
2022-04-26
02 Mohamed Boucadair New version accepted (logged-in submitter: Mohamed Boucadair)
2022-04-26
02 Mohamed Boucadair Uploaded new revision
2022-03-22
01 Mohamed Boucadair New version available: draft-ietf-ipsecme-add-ike-01.txt
2022-03-22
01 (System) New version accepted (logged-in submitter: Mohamed Boucadair)
2022-03-22
01 Mohamed Boucadair Uploaded new revision
2021-12-17
00 Tero Kivinen Changed document external resources from: None to:

github_repo https://github.com/boucadair/draft-ietf-ipsecme-add-ike
2021-12-17
00 Tero Kivinen This document now replaces draft-btw-add-ipsecme-ike instead of None
2021-12-17
00 Mohamed Boucadair New version available: draft-ietf-ipsecme-add-ike-00.txt
2021-12-17
00 (System) WG -00 approved
2021-12-16
00 Mohamed Boucadair Set submitter to "Mohamed Boucadair ", replaces to draft-btw-add-ipsecme-ike and sent approval email to group chairs: ipsecme-chairs@ietf.org
2021-12-16
00 Mohamed Boucadair Uploaded new revision