Skip to main content

Layer Two Tunneling Protocol - Version 3 (L2TPv3)
draft-ietf-l2tpext-l2tp-base-15

Yes

(Thomas Narten)

No Objection

(Alex Zinin)
(Bill Fenner)
(Jon Peterson)
(Margaret Cullen)
(Russ Housley)
(Scott Hollenbeck)

Note: This ballot was opened for revision 15 and is now closed.

Thomas Narten Former IESG member
Yes
Yes () Unknown

                            
Alex Zinin Former IESG member
No Objection
No Objection () Unknown

                            
Allison Mankin Former IESG member
No Objection
No Objection (2004-05-13) Unknown
Did the PWE3 folks review the PWE3 capabilities additions?

I reviewed the control message reliability and congestion control:  it would be
even better if it was not optional, but it's an acceptable spec.
Bert Wijnen Former IESG member
(was Discuss) No Objection
No Objection (2004-05-12) Unknown
$ idnits-v1.27 --nitcount <drafts/draft-ietf-l2tpext-l2tp-base-13.txt
idnits 1.27, (09 May 2004)

  Checking conformance with RFC 2026 boilerplate...
  There are 14 instances of too long lines in the document,
  -- the longest one being 4 characters in excess of 72.

  Warnings:
    The document seems to lack an RFC 2026 Section 10.4(B) IPR Disclosure Invitation
    The document has an RFC 2026 Section 10.4(D) IPR Notice
    There are 10 instances of lines with hyphenated line breaks in the document.

    Line 3169 has weird spacing: '...eptable   conn...'
    Line 3175 has weird spacing: '...breaker    los...'
    Line 3180 has weird spacing: '...ol-conn    est...'
    Line 3190 has weird spacing: '...ol-conn    est...'
    Line 3260 has weird spacing: '...e local    wai...'
      ...
Bill Fenner Former IESG member
No Objection
No Objection () Unknown

                            
David Kessens Former IESG member
No Objection
No Objection (2004-05-12) Unknown
Comments from the ops directorate (Pekka Savola)

Tx/Rx Connect speed is in bit/s and is a 32 bit value.
While is this sufficient at the moment, and immediate future,
this could become a problem later on. Is there a reason for 
using a 32 bit value ? Otherwise, you might want to
define the field as kb/s or make it a 64bit value.

Section 4.1.4 discusses fragmentation. You might want to split
this section in a part that discusses fragmentation for
ipv4 and one for ipv6 due to differences in fragmentation
handling in ipv4 and ipv6.

Nits:

- has normative references to two Informational documents RFC1958,
  RFC2072; this is not allowed.  Move to informational references.

- there are some cases of bogus use of upper-case keywords for
  non-implementation purposes, for example in:

   Protecting the L2TP packet stream with IPsec does, in turn, also
   protect the data within the tunneled session packets while
   transported from one LCCE to the other.  Such protection MUST NOT be
   considered a substitution for end-to-end security between
   communicating hosts or applications.

(This should obviously be in lower-case -- please review the use of
the keywords.)
Harald Alvestrand Former IESG member
No Objection
No Objection (2004-05-13) Unknown
Reviewed by Lucy Lynch, Gen-ART

I agree that requiring non-use of UDP checksums is nonsensical and should be dropped, but "no further objection".
Jon Peterson Former IESG member
No Objection
No Objection () Unknown

                            
Margaret Cullen Former IESG member
No Objection
No Objection () Unknown

                            
Russ Housley Former IESG member
No Objection
No Objection () Unknown

                            
Scott Hollenbeck Former IESG member
No Objection
No Objection () Unknown

                            
Steven Bellovin Former IESG member
(was Discuss) No Objection
No Objection (2004-05-11) Unknown
Why does the new version permit directly layering on top of IP? That seems like a step backwards.

Where does the cookie's length come from?  It's not explicit in the packet.  Is the receiver supposed to know what it should be, based on what it assigned?

4.1.3: State that the proposed IPsec solution takes away the ability to verify ports numbers based on cryptographic identity.

5.1: It's usually better to ignore reserved bits, rather than verify that they're zero.

7.1: The text implies that a node SHOULD ignore malformed AVPs, but it's stated as MUST.  As the text notes, it's not always possible to ignore such an error.
Ted Hardie Former IESG member
(was Discuss) No Objection
No Objection (2004-05-11) Unknown
In section 4.1, the draft says:

      The optional Cookie field contains a variable length (maximum 64
      bits) value used to check the association of a received data
      message with the session identified by the Session ID.  The Cookie
      MUST be set to the configured or signaled random value for this
      session utilizing all bits in the field.

If this is a variable length value, what does "utilizing all bits in the field" mean
here--that there is padding to the maximum 64 bits?  If so, how is it padded?
If it means something else, can this be clarified.

In section 4.1.2.2, the draft says:


  A NAT device that can pass TFTP
   traffic with variant UDP ports should be able to pass L2TP UDP
   traffic since both protocols employ similar policies with regard to
   UDP port selection.

RFC 3617's applicability statement discourages its use, so the selection
of a different example protocol is probably in order.