A Quick Crash Detection Method for the Internet Key Exchange Protocol (IKE)
draft-ietf-ipsecme-failure-detection-08
Revision differences
Document history
Date | Rev. | By | Action |
---|---|---|---|
2012-08-22
|
08 | (System) | post-migration administrative database adjustment to the Yes position for Jari Arkko |
2012-08-22
|
08 | (System) | post-migration administrative database adjustment to the No Objection position for Dan Romascanu |
2011-04-06
|
08 | (System) | IANA Action state changed to RFC-Ed-Ack from Waiting on RFC Editor |
2011-04-06
|
08 | (System) | IANA Action state changed to Waiting on RFC Editor from Waiting on Authors |
2011-04-05
|
08 | (System) | IANA Action state changed to Waiting on Authors from In Progress |
2011-04-05
|
08 | (System) | IANA Action state changed to In Progress |
2011-04-04
|
08 | Amy Vezza | State changed to RFC Ed Queue from Approved-announcement sent. |
2011-04-01
|
08 | Amy Vezza | IESG state changed to Approved-announcement sent |
2011-04-01
|
08 | Amy Vezza | IESG has approved the document |
2011-04-01
|
08 | Amy Vezza | Closed "Approve" ballot |
2011-04-01
|
08 | Amy Vezza | Approval announcement text regenerated |
2011-04-01
|
08 | Amy Vezza | Ballot writeup text changed |
2011-04-01
|
08 | (System) | New version available: draft-ietf-ipsecme-failure-detection-08.txt |
2011-04-01
|
08 | Jari Arkko | [Ballot comment] Expecting a new version still though per agreement in e-mail on April 1st, 2011. |
2011-04-01
|
08 | Jari Arkko | [Ballot Position Update] Position for Jari Arkko has been changed to Yes from Discuss |
2011-03-28
|
08 | Dan Romascanu | [Ballot Position Update] Position for Dan Romascanu has been changed to No Objection from Discuss |
2011-03-28
|
08 | (System) | Sub state has been changed to AD Follow up from New Id Needed |
2011-03-28
|
07 | (System) | New version available: draft-ietf-ipsecme-failure-detection-07.txt |
2011-03-17
|
08 | Cindy Morgan | Removed from agenda for telechat |
2011-03-17
|
08 | Cindy Morgan | State changed to IESG Evaluation::Revised ID Needed from IESG Evaluation. |
2011-03-17
|
08 | Jari Arkko | [Ballot discuss] This is a very good specification, and I would have voted Yes if it weren't for one technical issue: I do not understand … [Ballot discuss] This is a very good specification, and I would have voted Yes if it weren't for one technical issue: I do not understand how Section 5.2 mechanism: TOKEN_SECRET_DATA = HASH(QCD_SECRET | SPI-I | SPI-R | IPaddr-T) works in an implementation that supports multihoming (e.g., RFC 4555). Can you clarify? I would expect that the document at least has to be clearer about this, or perhaps the Section 5.2 mechanism needs to be changed or removed to accommodate for multihoming. |
2011-03-17
|
08 | Jari Arkko | [Ballot Position Update] New position, Discuss, has been recorded |
2011-03-17
|
08 | Tim Polk | [Ballot Position Update] New position, No Objection, has been recorded |
2011-03-16
|
08 | Ralph Droms | [Ballot Position Update] New position, No Objection, has been recorded |
2011-03-16
|
08 | Peter Saint-Andre | [Ballot Position Update] New position, No Objection, has been recorded |
2011-03-16
|
08 | Ron Bonica | [Ballot Position Update] New position, No Objection, has been recorded |
2011-03-16
|
08 | Adrian Farrel | [Ballot comment] Please expand acronyms on first use (such as "SA" in the Abstract) |
2011-03-16
|
08 | Adrian Farrel | [Ballot Position Update] New position, No Objection, has been recorded |
2011-03-16
|
08 | Dan Romascanu | [Ballot comment] 1. An abbreviation sub-section would have been very useful 2. Section 9.1 "QCD Token Generation and Handling", first paragraph, second sentence: Replace 'she' … [Ballot comment] 1. An abbreviation sub-section would have been very useful 2. Section 9.1 "QCD Token Generation and Handling", first paragraph, second sentence: Replace 'she' with 'they' OLD because if an attacker can guess the token associated with an IKE SA, she can tear down SUGGESTED because if an attacker can guess the token associated with an IKE SA, they can tear down 3. Section 9.2 "QCD Token Transmission" 3rd paragraph last sentence: Replace 'it' with 'this' OLD One way to do it is to synchronize SUGGESTED One way to do this is to synchronize |
2011-03-16
|
08 | Dan Romascanu | [Ballot discuss] The DISCUSS and COMMENT is based in part on the OPS-DIR review performed by Menachem Dodge. This is a well written and useful … [Ballot discuss] The DISCUSS and COMMENT is based in part on the OPS-DIR review performed by Menachem Dodge. This is a well written and useful document and I will support its approval after the following two issues are discussed and fixed if agreed: 1. I would have expected that the Operational Considerations section include some information about configuration. It looks at a minimum the activation of the QCD method should be configurable, and the capability to shitch it off in networks where it involves a security risk should be provided. 2. In Section 9.2 last paragraph, it is not completely clear as to what method should be implemented in the case of a load-sharing cluster when the load balancer cannot guarantee that all "IKE packets from the same source IP address always go to the same cluster". Should QCD Token Transmission not be implemented in such a situation? |
2011-03-16
|
08 | Dan Romascanu | [Ballot Position Update] New position, Discuss, has been recorded |
2011-03-15
|
08 | Russ Housley | [Ballot Position Update] New position, No Objection, has been recorded |
2011-03-15
|
08 | Robert Sparks | [Ballot Position Update] New position, Yes, has been recorded |
2011-03-15
|
08 | Stewart Bryant | [Ballot Position Update] New position, No Objection, has been recorded |
2011-03-13
|
08 | Alexey Melnikov | [Ballot Position Update] New position, No Objection, has been recorded |
2011-03-11
|
08 | Samuel Weiler | Request for Last Call review by SECDIR Completed. Reviewer: Magnus Nystrom. |
2011-03-10
|
08 | Wesley Eddy | Request for Last Call review by TSVDIR Completed. Reviewer: Mark Allman. |
2011-03-10
|
06 | (System) | New version available: draft-ietf-ipsecme-failure-detection-06.txt |
2011-03-10
|
08 | Sean Turner | [Ballot Position Update] New position, Yes, has been recorded for Sean Turner |
2011-03-10
|
08 | Sean Turner | Ballot has been issued |
2011-03-10
|
08 | Sean Turner | Created "Approve" ballot |
2011-03-10
|
08 | Sean Turner | State changed to IESG Evaluation from Waiting for AD Go-Ahead. |
2011-03-10
|
08 | Sean Turner | Ballot writeup text changed |
2011-03-10
|
08 | (System) | State changed to Waiting for AD Go-Ahead from In Last Call. |
2011-03-04
|
08 | Amanda Baber | Upon approval of this document, IANA will make the following registration in the 16406-40959 range of the IKEv2 Notify Message Types registry at http://www.iana.org/assignments/ikev2-parameters TBD … Upon approval of this document, IANA will make the following registration in the 16406-40959 range of the IKEv2 Notify Message Types registry at http://www.iana.org/assignments/ikev2-parameters TBD QUICK_CRASH_DETECTION [RFC-to-be] |
2011-02-26
|
08 | Samuel Weiler | Request for Last Call review by SECDIR is assigned to Magnus Nystrom |
2011-02-26
|
08 | Samuel Weiler | Request for Last Call review by SECDIR is assigned to Magnus Nystrom |
2011-02-24
|
08 | David Harrington | Request for Last Call review by TSVDIR is assigned to Mark Allman |
2011-02-24
|
08 | David Harrington | Request for Last Call review by TSVDIR is assigned to Mark Allman |
2011-02-24
|
08 | Sean Turner | Placed on agenda for telechat - 2011-03-17 |
2011-02-24
|
08 | Sean Turner | Status Date has been changed to 2011-02-24 from None |
2011-02-24
|
08 | Cindy Morgan | Last call sent |
2011-02-24
|
08 | Cindy Morgan | State changed to In Last Call from Last Call Requested. The following Last Call Announcement was sent out: From: The IESG To: IETF-Announce CC: Reply-To: … State changed to In Last Call from Last Call Requested. The following Last Call Announcement was sent out: From: The IESG To: IETF-Announce CC: Reply-To: ietf@ietf.org Subject: Last Call: (A Quick Crash Detection Method for IKE) to Proposed Standard The IESG has received a request from the IP Security Maintenance and Extensions WG (ipsecme) to consider the following document: - 'A Quick Crash Detection Method for IKE' as a Proposed Standard The IESG plans to make a decision in the next few weeks, and solicits final comments on this action. Please send substantive comments to the ietf@ietf.org mailing lists by 2011-03-10. Exceptionally, comments may be sent to iesg@ietf.org instead. In either case, please retain the beginning of the Subject line to allow automated sorting. The file can be obtained via http://datatracker.ietf.org/doc/draft-ietf-ipsecme-failure-detection/ IESG discussion can be tracked via http://datatracker.ietf.org/doc/draft-ietf-ipsecme-failure-detection/ |
2011-02-24
|
08 | Sean Turner | Last Call was requested |
2011-02-24
|
08 | Sean Turner | State changed to Last Call Requested from Publication Requested. |
2011-02-24
|
08 | Sean Turner | Last Call text changed |
2011-02-24
|
08 | (System) | Ballot writeup text was added |
2011-02-24
|
08 | (System) | Last call text was added |
2011-02-24
|
08 | (System) | Ballot approval text was added |
2011-02-24
|
08 | Cindy Morgan | (1.a) Who is the Document Shepherd for this document? Has the Document Shepherd personally reviewed this version of the document and, in particular, does he … (1.a) Who is the Document Shepherd for this document? Has the Document Shepherd personally reviewed this version of the document and, in particular, does he or she believe this version is ready for forwarding to the IESG for publication? Paul Hoffman, co-chair of IPsecME WG. Yes. Yes. (1.b) Has the document had adequate review both from key WG members and from key non-WG members? Does the Document Shepherd have any concerns about the depth or breadth of the reviews that have been performed? Yes. It recently went through a WG LC. There were not a lot of comments on the document, but at least a few people who are not the document authors commented. (1.c) Does the Document Shepherd have concerns that the document needs more review from a particular or broader perspective, e.g., security, operational complexity, someone familiar with AAA, internationalization or XML? No concerns. (1.d) Does the Document Shepherd have any specific concerns or issues with this document that the Responsible Area Director and/or the IESG should be aware of? For example, perhaps he or she is uncomfortable with certain parts of the document, or has concerns whether there really is a need for it. In any event, if the WG has discussed those issues and has indicated that it still wishes to advance the document, detail those concerns here. Has an IPR disclosure related to this document been filed? If so, please include a reference to the disclosure and summarize the WG discussion and conclusion on this issue. No concerns. (1.e) How solid is the WG consensus behind this document? Does it represent the strong concurrence of a few individuals, with others being silent, or does the WG as a whole understand and agree with it? The WG has run out of steam, but I believe that there is rough consensus both in the utility of this new protocol and in the protocol's design. (1.f) Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarise the areas of conflict in separate email messages to the Responsible Area Director. (It should be in a separate email because this questionnaire is entered into the ID Tracker.) No threats. (1.g) Has the Document Shepherd personally verified that the document satisfies all ID nits? (See the Internet-Drafts Checklist and http://tools.ietf.org/tools/idnits/). Boilerplate checks are not enough; this check needs to be thorough. Has the document met all formal review criteria it needs to, such as the MIB Doctor, media type and URI type reviews? All ID nits satisfied. (1.h) Has the document split its references into normative and informative? Are there normative references to documents that are not ready for advancement or are otherwise in an unclear state? If such normative references exist, what is the strategy for their completion? Are there normative references that are downward references, as described in [RFC3967]? If so, list these downward references to support the Area Director in the Last Call procedure for them [RFC3967]. Yes, and I agree with the split. (I just noticed that one of the informative references is now an RFC and the other is expired, but we can deal with those after IETF LC.) (1.i) Has the Document Shepherd verified that the document IANA consideration section exists and is consistent with the body of the document? If the document specifies protocol extensions, are reservations requested in appropriate IANA registries? Are the IANA registries clearly identified? If the document creates a new registry, does it define the proposed initial contents of the registry and an allocation procedure for future registrations? Does it suggest a reasonable name for the new registry? See [RFC5226]. If the document describes an Expert Review process has Shepherd conferred with the Responsible Area Director so that the IESG can appoint the needed Expert during the IESG Evaluation? There is one IANA request, and it is properly formed. (1.j) Has the Document Shepherd verified that sections of the document that are written in a formal language, such as XML code, BNF rules, MIB definitions, etc., validate correctly in an automated checker? No formal language used. Technical Summary When an IPsec tunnel between two IKEv2 peers is disconnected due to a restart of one peer, it can take as much as several minutes for the other peer to discover that the reboot has occurred. This delays the recovery of the tunnel. This document describes an IKEv2 extension that allows discovery of the reboot almost immediately after the rebooted system is active again. Working Group Summary There was consensus both that this is a problem that needs to be solved and for the proposed solution. Document Quality Some vendors expressed interest in implementing this in their IPsec gateways. |
2011-02-24
|
08 | Cindy Morgan | Draft added in state Publication Requested |
2011-02-24
|
08 | Cindy Morgan | [Note]: 'Paul Hoffman (paul.hoffman@vpnc.org) is the document shepherd.' added |
2011-02-18
|
05 | (System) | New version available: draft-ietf-ipsecme-failure-detection-05.txt |
2011-02-11
|
04 | (System) | New version available: draft-ietf-ipsecme-failure-detection-04.txt |
2011-01-10
|
03 | (System) | New version available: draft-ietf-ipsecme-failure-detection-03.txt |
2010-10-25
|
02 | (System) | New version available: draft-ietf-ipsecme-failure-detection-02.txt |
2010-10-10
|
01 | (System) | New version available: draft-ietf-ipsecme-failure-detection-01.txt |
2010-09-02
|
00 | (System) | New version available: draft-ietf-ipsecme-failure-detection-00.txt |