Layer Two Tunneling Protocol - Version 3 (L2TPv3)
draft-ietf-l2tpext-l2tp-base-15
Revision differences
Document history
Date | Rev. | By | Action |
---|---|---|---|
2012-08-22
|
15 | (System) | post-migration administrative database adjustment to the No Objection position for Bert Wijnen |
2012-08-22
|
15 | (System) | post-migration administrative database adjustment to the No Objection position for Steven Bellovin |
2012-08-22
|
15 | (System) | post-migration administrative database adjustment to the No Objection position for Ted Hardie |
2004-12-02
|
15 | (System) | New version available: draft-ietf-l2tpext-l2tp-base-15.txt |
2004-07-15
|
15 | Amy Vezza | State Changes to RFC Ed Queue from Approved-announcement sent by Amy Vezza |
2004-07-15
|
15 | Amy Vezza | IESG state changed to Approved-announcement sent |
2004-07-15
|
15 | Amy Vezza | IESG has approved the document |
2004-07-15
|
15 | Amy Vezza | Closed "Approve" ballot |
2004-07-15
|
15 | Thomas Narten | [Note]: '2004-07-15: All outstanding issues have been cleared; document is ready to approve. ' added by Thomas Narten |
2004-07-15
|
15 | Thomas Narten | State Changes to Approved-announcement to be sent from IESG Evaluation::AD Followup by Thomas Narten |
2004-07-14
|
15 | Bert Wijnen | [Ballot Position Update] Position for Bert Wijnen has been changed to No Objection from Discuss by Bert Wijnen |
2004-07-01
|
15 | Ted Hardie | [Ballot Position Update] Position for Ted Hardie has been changed to No Objection from Discuss by Ted Hardie |
2004-07-01
|
15 | Thomas Narten | [Note]: '2004-07-01: Current rev should address all IESG comments; waiting for Bert to return from vacation so he can followup.' added by Thomas Narten |
2004-07-01
|
15 | Steven Bellovin | [Ballot Position Update] Position for Steve Bellovin has been changed to No Objection from Discuss by Steve Bellovin |
2004-06-09
|
15 | (System) | Sub state has been changed to AD Follow up from New Id Needed |
2004-06-09
|
14 | (System) | New version available: draft-ietf-l2tpext-l2tp-base-14.txt |
2004-05-14
|
15 | Bert Wijnen | [Ballot discuss] 1.Page 30 states: vendor's extensions or future IETF extensions. Note that there are 16 bits allocated for the Vendor … [Ballot discuss] 1.Page 30 states: vendor's extensions or future IETF extensions. Note that there are 16 bits allocated for the Vendor ID, thus limiting this feature to the first 65,535 enterprises. Currently we already have 20.418 values assigned. New assignments occur at a rate of 275-300 a month, so say over 3000 a year. Most other protocols use a 32bit (or at least 24 bit) field for the Vendor-Id. 2.Bottom of page 39: with the condition. Human-readable text in all error messages MUST be provided in the UTF-8 charset using the Default Language [RFC2277]. I think the doc needs a normative reference to RFC3629 because of this UTF-8 encoding on the wire. 3. Page 41: choose. If the L2TP data channel runs over IPv4, then this would be a comma-separated list of IP addresses in the canonical dotted-decimal format (e.g. "10.0.0.1, 10.0.0.2, 10.0.0.3") in the UTF-8 charset using the Default Language [RFC2277]. If there are (again the "UTF-8 charset" seems wrong). But also the IP addresses used in the example should be from the 192.0.2.0/24 range (as per RFC3330) I think. 4. Pages 42 and 43... talk about a hostname and a vendor-name as being ASCII. Is that acceptable? Sect 9 explains why. But I want to hear if that is indeed OK. |
2004-05-14
|
15 | Thomas Narten | [Note]: '2004-05-13: IESG comments need to be addressed, revised ID needed.' added by Thomas Narten |
2004-05-14
|
15 | (System) | Removed from agenda for telechat - 2004-05-13 |
2004-05-13
|
15 | Amy Vezza | State Changes to IESG Evaluation::Revised ID Needed from IESG Evaluation by Amy Vezza |
2004-05-13
|
15 | Amy Vezza | [Ballot Position Update] New position, No Objection, has been recorded for Margaret Wasserman by Amy Vezza |
2004-05-13
|
15 | Alex Zinin | [Ballot Position Update] New position, No Objection, has been recorded for Alex Zinin by Alex Zinin |
2004-05-13
|
15 | Allison Mankin | [Ballot comment] Did the PWE3 folks review the PWE3 capabilities additions? I reviewed the control message reliability and congestion control: it would be even better … [Ballot comment] Did the PWE3 folks review the PWE3 capabilities additions? I reviewed the control message reliability and congestion control: it would be even better if it was not optional, but it's an acceptable spec. |
2004-05-13
|
15 | Allison Mankin | [Ballot comment] Did the PWE3 folks review the PWE3 capabilities additions? |
2004-05-13
|
15 | Allison Mankin | [Ballot Position Update] New position, No Objection, has been recorded for Allison Mankin by Allison Mankin |
2004-05-13
|
15 | Bill Fenner | [Ballot Position Update] New position, No Objection, has been recorded for Bill Fenner by Bill Fenner |
2004-05-13
|
15 | Steven Bellovin | [Ballot discuss] 5.3: State that a node MUST NOT reuse a Random Value for protecting (via Hidden) two or more instances of the Attribute Number … [Ballot discuss] 5.3: State that a node MUST NOT reuse a Random Value for protecting (via Hidden) two or more instances of the Attribute Number unless the values in the two AVPs identical. 5.4.4: For the connect speed field, 32 bits is too small; there are faster links in use today. |
2004-05-13
|
15 | Harald Alvestrand | [Ballot comment] Reviewed by Lucy Lynch, Gen-ART I agree that requiring non-use of UDP checksums is nonsensical and should be dropped, but "no further objection". |
2004-05-13
|
15 | Harald Alvestrand | [Ballot Position Update] New position, No Objection, has been recorded for Harald Alvestrand by Harald Alvestrand |
2004-05-12
|
15 | Jon Peterson | [Ballot Position Update] New position, No Objection, has been recorded for Jon Peterson by Jon Peterson |
2004-05-12
|
15 | David Kessens | [Ballot comment] Comments from the ops directorate (Pekka Savola) Tx/Rx Connect speed is in bit/s and is a 32 bit value. While is this sufficient … [Ballot comment] Comments from the ops directorate (Pekka Savola) Tx/Rx Connect speed is in bit/s and is a 32 bit value. While is this sufficient at the moment, and immediate future, this could become a problem later on. Is there a reason for using a 32 bit value ? Otherwise, you might want to define the field as kb/s or make it a 64bit value. Section 4.1.4 discusses fragmentation. You might want to split this section in a part that discusses fragmentation for ipv4 and one for ipv6 due to differences in fragmentation handling in ipv4 and ipv6. Nits: - has normative references to two Informational documents RFC1958, RFC2072; this is not allowed. Move to informational references. - there are some cases of bogus use of upper-case keywords for non-implementation purposes, for example in: Protecting the L2TP packet stream with IPsec does, in turn, also protect the data within the tunneled session packets while transported from one LCCE to the other. Such protection MUST NOT be considered a substitution for end-to-end security between communicating hosts or applications. (This should obviously be in lower-case -- please review the use of the keywords.) |
2004-05-12
|
15 | David Kessens | [Ballot Position Update] New position, No Objection, has been recorded for David Kessens by David Kessens |
2004-05-12
|
15 | Bert Wijnen | [Ballot discuss] 1.Page 30 states: vendor's extensions or future IETF extensions. Note that there are 16 bits allocated for the Vendor … [Ballot discuss] 1.Page 30 states: vendor's extensions or future IETF extensions. Note that there are 16 bits allocated for the Vendor ID, thus limiting this feature to the first 65,535 enterprises. Currently we already have 20.418 values assigned. New assignments occur at a rate of 275-300 a month, so say over 3000 a year. Most other protocols use a 32bit (or at least 24 bit) field for the Vendor-Id. 2.Bottom of page 39: with the condition. Human-readable text in all error messages MUST be provided in the UTF-8 charset using the Default Language [RFC2277]. Mmm... I thought UTF-8 is an encoding. The charset that is meant is probably UCS or ISO/IEC 10646-1. But then... RFC2277 talks about the UTF-8 charset too, so I am not sure. Maybe it is OK. In any event, I think the doc needs a normative reference to RFC3629 because of this UTF-8 encoding on the wire. 3. Page 41: choose. If the L2TP data channel runs over IPv4, then this would be a comma-separated list of IP addresses in the canonical dotted-decimal format (e.g. "10.0.0.1, 10.0.0.2, 10.0.0.3") in the UTF-8 charset using the Default Language [RFC2277]. If there are (again the "UTF-8 charset" seems wrong). But also the IP addresses used in the example should be from the 192.0.2.0/24 range (as per RFC3330) I think. 4. Pages 42 and 43... talk about a hostname and a vendor-name as being ASCII. Is that acceptable? Sect 9 explains why. But I want to hear if that is indeed OK. |
2004-05-12
|
15 | Bert Wijnen | [Ballot Position Update] Position for Bert Wijnen has been changed to Discuss from Undefined by Bert Wijnen |
2004-05-12
|
15 | Bert Wijnen | [Ballot comment] $ idnits-v1.27 --nitcount <drafts/draft-ietf-l2tpext-l2tp-base-13.txt idnits 1.27, (09 May 2004) Checking conformance with RFC 2026 boilerplate... There are 14 instances of too … [Ballot comment] $ idnits-v1.27 --nitcount <drafts/draft-ietf-l2tpext-l2tp-base-13.txt idnits 1.27, (09 May 2004) Checking conformance with RFC 2026 boilerplate... There are 14 instances of too long lines in the document, -- the longest one being 4 characters in excess of 72. Warnings: The document seems to lack an RFC 2026 Section 10.4(B) IPR Disclosure Invitation The document has an RFC 2026 Section 10.4(D) IPR Notice There are 10 instances of lines with hyphenated line breaks in the document. Line 3169 has weird spacing: '...eptable conn...' Line 3175 has weird spacing: '...breaker los...' Line 3180 has weird spacing: '...ol-conn est...' Line 3190 has weird spacing: '...ol-conn est...' Line 3260 has weird spacing: '...e local wai...' ... |
2004-05-12
|
15 | Bert Wijnen | [Ballot Position Update] New position, Undefined, has been recorded for Bert Wijnen by Bert Wijnen |
2004-05-11
|
15 | Ted Hardie | [Ballot discuss] The application code AVP concerns me. The current text says: The Application Code is a 2 octet value used to identify a … [Ballot discuss] The application code AVP concerns me. The current text says: The Application Code is a 2 octet value used to identify a specific application for an L2TP session, perhaps causing certain values within AVPs defined in this document to be interpreted or acted upon in a different manner dictated by the Application Code. For example, a given Application Code could instruct an LCCE to perform a specific directory lookup on the Hostname and/or Router ID AVP information associated with this session (perhaps even encoding the destination address of the given directory server). This seems to allow the code to change the meanings of AVPs which are mandatory in this spec. Is this much rope necessary? If this is required, I agree with the IANA consideration that IETF Consensus would be required to register a Application Code, and I would expect it to be pretty hard to get that consensus. If this were more limited (by, for example, using it to imply the presence of specific AVPs and/or values), a less restrictive IANA consideration might be appropriate. Note that the draft defines Application Code, but appears to use "application ID" in some references; if these are the same, they need to be collapsed to a single name. If they aren't, then a definition of application id is needed. The draft also refers to language tags, but does not have a reference to RFC 3066 or the update, draft-phillips-langtags-xx.txt. It should probably reference one or the other. |
2004-05-11
|
15 | Ted Hardie | [Ballot Position Update] Position for Ted Hardie has been changed to Discuss from Undefined by Ted Hardie |
2004-05-11
|
15 | Ted Hardie | [Ballot comment] In section 4.1, the draft says: The optional Cookie field contains a variable length (maximum 64 bits) … [Ballot comment] In section 4.1, the draft says: The optional Cookie field contains a variable length (maximum 64 bits) value used to check the association of a received data message with the session identified by the Session ID. The Cookie MUST be set to the configured or signaled random value for this session utilizing all bits in the field. If this is a variable length value, what does "utilizing all bits in the field" mean here--that there is padding to the maximum 64 bits? If so, how is it padded? If it means something else, can this be clarified. In section 4.1.2.2, the draft says: A NAT device that can pass TFTP traffic with variant UDP ports should be able to pass L2TP UDP traffic since both protocols employ similar policies with regard to UDP port selection. RFC 3617's applicability statement discourages its use, so the selection of a different example protocol is probably in order. |
2004-05-11
|
15 | Ted Hardie | [Ballot Position Update] New position, Undefined, has been recorded for Ted Hardie by Ted Hardie |
2004-05-11
|
15 | Russ Housley | [Ballot Position Update] New position, No Objection, has been recorded for Russ Housley by Russ Housley |
2004-05-11
|
15 | Steven Bellovin | [Ballot comment] Why does the new version permit directly layering on top of IP? That seems like a step backwards. Where does the cookie's length … [Ballot comment] Why does the new version permit directly layering on top of IP? That seems like a step backwards. Where does the cookie's length come from? It's not explicit in the packet. Is the receiver supposed to know what it should be, based on what it assigned? 4.1.3: State that the proposed IPsec solution takes away the ability to verify ports numbers based on cryptographic identity. 5.1: It's usually better to ignore reserved bits, rather than verify that they're zero. 7.1: The text implies that a node SHOULD ignore malformed AVPs, but it's stated as MUST. As the text notes, it's not always possible to ignore such an error. |
2004-05-11
|
15 | Steven Bellovin | [Ballot discuss] 4.1.2.3 discourages UDP checksums. This is a bad idea. 5.3: State that a node MUST NOT reuse a Random Value with the same … [Ballot discuss] 4.1.2.3 discourages UDP checksums. This is a bad idea. 5.3: State that a node MUST NOT reuse a Random Value with the same Attribute Number unless the value is identical. 5.4.1: A replay of the SCCRQ message is possible. Is that a a problem? 5.4.4: For the connect speed field, 32 bits is too small; there are faster links in use today. |
2004-05-11
|
15 | Steven Bellovin | [Ballot Position Update] New position, Discuss, has been recorded for Steve Bellovin by Steve Bellovin |
2004-05-06
|
15 | Scott Hollenbeck | [Ballot Position Update] New position, No Objection, has been recorded for Scott Hollenbeck by Scott Hollenbeck |
2004-05-06
|
15 | Thomas Narten | Placed on agenda for telechat - 2004-05-13 by Thomas Narten |
2004-05-06
|
15 | Thomas Narten | State Changes to IESG Evaluation from Waiting for Writeup by Thomas Narten |
2004-05-06
|
15 | Thomas Narten | [Ballot Position Update] New position, Yes, has been recorded for Thomas Narten |
2004-05-06
|
15 | Thomas Narten | Ballot has been issued by Thomas Narten |
2004-05-06
|
15 | Thomas Narten | Created "Approve" ballot |
2004-04-27
|
13 | (System) | New version available: draft-ietf-l2tpext-l2tp-base-13.txt |
2004-03-26
|
12 | (System) | New version available: draft-ietf-l2tpext-l2tp-base-12.txt |
2003-11-25
|
15 | (System) | State has been changed to Waiting for Writeup from In Last Call by system |
2003-11-04
|
15 | Amy Vezza | Last call sent |
2003-11-04
|
15 | Amy Vezza | State Changes to In Last Call from Last Call Requested by Amy Vezza |
2003-11-04
|
15 | Thomas Narten | [Note]: '2003-09-10: Second WG LC completed, mark says ready for IESG again' has been cleared by Thomas Narten |
2003-11-04
|
15 | Thomas Narten | Last Call was requested by Thomas Narten |
2003-11-04
|
15 | (System) | Ballot writeup text was added |
2003-11-04
|
15 | (System) | Last call text was added |
2003-11-04
|
15 | (System) | Ballot approval text was added |
2003-11-04
|
15 | Thomas Narten | State Changes to Last Call Requested from Publication Requested by Thomas Narten |
2003-10-28
|
11 | (System) | New version available: draft-ietf-l2tpext-l2tp-base-11.txt |
2003-09-10
|
15 | Thomas Narten | State Changes to Publication Requested from AD Evaluation::Revised ID Needed by Thomas Narten |
2003-09-10
|
15 | Thomas Narten | Second WG LC completed, mark says ready for IESG again. |
2003-08-15
|
10 | (System) | New version available: draft-ietf-l2tpext-l2tp-base-10.txt |
2003-07-24
|
09 | (System) | New version available: draft-ietf-l2tpext-l2tp-base-09.txt |
2003-06-30
|
08 | (System) | New version available: draft-ietf-l2tpext-l2tp-base-08.txt |
2003-04-22
|
15 | Thomas Narten | 2003-04-22: detailed comments sent to list; revised ID likely needed |
2003-04-22
|
15 | Thomas Narten | State Changes to AD Evaluation :: Revised ID Needed from Publication Requested by Narten, Thomas |
2003-02-28
|
07 | (System) | New version available: draft-ietf-l2tpext-l2tp-base-07.txt |
2003-02-06
|
15 | Stephen Coya | Draft Added by Coya, Steve |
2003-01-31
|
06 | (System) | New version available: draft-ietf-l2tpext-l2tp-base-06.txt |
2003-01-13
|
05 | (System) | New version available: draft-ietf-l2tpext-l2tp-base-05.txt |
2002-11-08
|
04 | (System) | New version available: draft-ietf-l2tpext-l2tp-base-04.txt |
2002-07-03
|
03 | (System) | New version available: draft-ietf-l2tpext-l2tp-base-03.txt |
2002-03-05
|
02 | (System) | New version available: draft-ietf-l2tpext-l2tp-base-02.txt |
2001-10-19
|
01 | (System) | New version available: draft-ietf-l2tpext-l2tp-base-01.txt |
2001-07-18
|
00 | (System) | New version available: draft-ietf-l2tpext-l2tp-base-00.txt |