Security Threats for the Neighborhood Discovery Protocol (NHDP)
draft-ietf-manet-nhdp-sec-threats-06
Revision differences
Document history
Date | Rev. | By | Action |
---|---|---|---|
2014-03-24
|
06 | (System) | RFC Editor state changed to AUTH48-DONE from AUTH48 |
2014-03-19
|
06 | (System) | RFC Editor state changed to AUTH48 from RFC-EDITOR |
2014-02-26
|
06 | (System) | RFC Editor state changed to RFC-EDITOR from REF |
2013-12-02
|
06 | (System) | RFC Editor state changed to REF from EDIT |
2013-12-02
|
06 | (System) | RFC Editor state changed to EDIT from MISSREF |
2013-08-23
|
06 | (System) | RFC Editor state changed to MISSREF from AUTH48 |
2013-08-19
|
06 | (System) | RFC Editor state changed to AUTH48 from RFC-EDITOR |
2013-08-12
|
06 | (System) | RFC Editor state changed to RFC-EDITOR from AUTH |
2013-08-08
|
06 | (System) | RFC Editor state changed to AUTH from EDIT |
2013-07-22
|
06 | (System) | RFC Editor state changed to EDIT from IESG |
2013-06-24
|
06 | (System) | RFC Editor state changed to IESG from EDIT |
2013-06-18
|
06 | Cindy Morgan | State changed to RFC Ed Queue from Approved-announcement sent |
2013-06-18
|
06 | (System) | RFC Editor state changed to EDIT |
2013-06-18
|
06 | (System) | Announcement was received by RFC Editor |
2013-06-18
|
06 | (System) | IANA Action state changed to No IC from In Progress |
2013-06-18
|
06 | (System) | IANA Action state changed to In Progress |
2013-06-18
|
06 | Cindy Morgan | State changed to Approved-announcement sent from Approved-announcement to be sent |
2013-06-18
|
06 | Cindy Morgan | IESG has approved the document |
2013-06-18
|
06 | Cindy Morgan | Closed "Approve" ballot |
2013-06-18
|
06 | Cindy Morgan | Ballot approval text was generated |
2013-06-18
|
06 | Adrian Farrel | State changed to Approved-announcement to be sent from IESG Evaluation::AD Followup |
2013-06-18
|
06 | Adrian Farrel | Ballot approval text was generated |
2013-06-18
|
06 | Adrian Farrel | Ballot writeup was changed |
2013-06-17
|
06 | Sean Turner | [Ballot Position Update] Position for Sean Turner has been changed to Yes from Discuss |
2013-06-17
|
06 | Jiazi Yi | IANA Review state changed to Version Changed - Review Needed from IANA OK - No Actions Needed |
2013-06-17
|
06 | Jiazi Yi | New version available: draft-ietf-manet-nhdp-sec-threats-06.txt |
2013-06-16
|
05 | Sean Turner | [Ballot discuss] Thanks for this well written draft. Just want to discuss a couple of things: 0) In s3, it seems like the scope is … [Ballot discuss] Thanks for this well written draft. Just want to discuss a couple of things: 0) In s3, it seems like the scope is set to just an attacker using NHDP messages to cause havoc. Is there a concern about deliberate exposure? That is an attacker gains control of a device and just starts blasting the routing information off to its friends? If so/not I think maybe just a sentence in s3 could address this. 1) cleared 2) Any concerns about traffic analysis (i.e., who is talking to who)? Or, is that lumped in with eavesdropping? The two are slightly different in that for traffic analysis the attacker can deduce information even if encryption is applied. |
2013-06-16
|
05 | Sean Turner | Ballot discuss text updated for Sean Turner |
2013-06-13
|
05 | Cindy Morgan | State changed to IESG Evaluation::AD Followup from IESG Evaluation |
2013-06-13
|
05 | Tero Kivinen | Request for Early review by SECDIR Completed: Has Nits. Reviewer: Matt Lepinski. |
2013-06-13
|
05 | Joel Jaeggli | [Ballot Position Update] New position, No Objection, has been recorded for Joel Jaeggli |
2013-06-13
|
05 | Gonzalo Camarillo | [Ballot Position Update] New position, No Objection, has been recorded for Gonzalo Camarillo |
2013-06-13
|
05 | Benoît Claise | [Ballot comment] thanks for addressing my DISCUSS |
2013-06-13
|
05 | Benoît Claise | [Ballot Position Update] Position for Benoit Claise has been changed to No Objection from Discuss |
2013-06-13
|
05 | Adrian Farrel | Ballot writeup was changed |
2013-06-13
|
05 | Amanda Baber | IANA Review state changed to IANA OK - No Actions Needed from Version Changed - Review Needed |
2013-06-12
|
05 | Pete Resnick | [Ballot Position Update] New position, No Objection, has been recorded for Pete Resnick |
2013-06-12
|
05 | Jari Arkko | [Ballot Position Update] New position, Yes, has been recorded for Jari Arkko |
2013-06-12
|
05 | Benoît Claise | [Ballot discuss] An easy-to-fix DISCUSS. Please insert two references to the NHDP MIB. 1. To the Security Considerations, https://tools.ietf.org/html/rfc6779#section-8, which contains extra security threats. … [Ballot discuss] An easy-to-fix DISCUSS. Please insert two references to the NHDP MIB. 1. To the Security Considerations, https://tools.ietf.org/html/rfc6779#section-8, which contains extra security threats. Sometimes the threat could come from the NMS. No need to repeat the information. A since pointer is enough. 2. To the MIB module specified in [RFC 6779], which would help monitoring some of those security attacks with the 3 notifications and with OID polling. An single sentence, similar to the following one, would be enough: [I-D.ietf-manet-nhdp-olsrv2-sec] provides further information on how to enable integrity protection to NHDP, which can help mitigating the threats described related to identity spoofing. Note that, there are some more constraints in a MANET network (the NMS might not be available to receive those SNMP notifications), so you might have to also include a reference to https://datatracker.ietf.org/doc/draft-nguyen-manet-management/ that contains some more considerations. |
2013-06-12
|
05 | Benoît Claise | [Ballot Position Update] New position, Discuss, has been recorded for Benoit Claise |
2013-06-12
|
05 | Sean Turner | [Ballot discuss] Thanks for this well written draft. Just want to discuss a couple of things: 0) In s3, it seems like the scope is … [Ballot discuss] Thanks for this well written draft. Just want to discuss a couple of things: 0) In s3, it seems like the scope is set to just an attacker using NHDP messages to cause havoc. Is there a concern about deliberate exposure? That is an attacker gains control of a device and just starts blasting the routing information off to its friends? If so/not I think maybe just a sentence in s3 could address this. 1) In s4.4, identity and link spoofing is discussed. Is there any concern that the spoofers will somehow inject themselves in order to redirect traffic so that they can then eavesdrop? I see there's something in s4.5 about recording the traffic and then having another replay it but it's not quite the same thing. 2) Any concerns about traffic analysis (i.e., who is talking to who)? Or, is that lumped in with eavesdropping? The two are slightly different in that for traffic analysis the attacker can deduce information even if encryption is applied. |
2013-06-12
|
05 | Sean Turner | [Ballot comment] And now for some comments: 0) I always go back to RFC 4593. Curious if the routing community does? Not asking for … [Ballot comment] And now for some comments: 0) I always go back to RFC 4593. Curious if the routing community does? Not asking for wholesale changes just a nod or two to 4593: a) s4.1, s4.2, s4.7: I hope I'm not splitting too fine a hair here (i.e., tell me if you think so) but aren't Jamming and DoS Attacks when not carried out to their fullest both forms of Interference? When carried out of their fullest aren't Jamming and DoS Attacks as well as Indirect Channel Overloading forms of Overloading? -s4.1: Jamming, depending on how jammed the link, is a form of Interference and Overload with threat consequences of Disruption [RFC4593]. -s4.2: DoS Attacks are a form of Interference and Overload with threat consequences of Disruption [RFC4593]. -s4.7: Indirect Channel Overloading is a form of Interference and Overload with threat consequences of Disruption [RFC4593]. b) s4.2: At the end of the first paragraph: , so called byzantine routers [RFC4593]. c) s4.3: At the end of the section: [RFC4593] would categorize the threat consequence as Disclosure. d) s4.4.1: At the end of the section: [RFC4593] would categorize the threat consequence as Disclosure and Deception. e) s4.4.2: Often times spoofing is done for other reasons. I think s4.4.1 does a good job explaining the impersonation issue, but s4.4.2 seems to be about falsification, i.e., overclaiming. misclaiming, and misstatements (see s4.5 of RFC 4593). Maybe adding the following to 1st sentence: , sometimes referred to as Falsification [RFC4593]. And then at the end: [RFC4593] would categorize the threat consequence as Usurpation, Deception, and Disruption. f) s4.5: At the end of the section: [RFC4593] would categorize this as a Falsification and Interference threat with a threat consequence of Usurpation, Deception, and Disruption. g) 4.6.1/4.6.2: At the end of the section: [RFC4593] would categorize the threat consequence as Usurpation. 1) s4.1: r/between them/between themselves 2) s4.2: I'd add battery to the last paragraph. 3) s4.3: sniffing is kind of synonymous so maybe: Eavesdropping, sometimes referred to as sniffing, is a common ... |
2013-06-12
|
05 | Sean Turner | Ballot comment and discuss text updated for Sean Turner |
2013-06-12
|
05 | Sean Turner | [Ballot comment] And now for some comments: 1. I always go back to RFC 4593. Curious if the routing community does? Not asking for … [Ballot comment] And now for some comments: 1. I always go back to RFC 4593. Curious if the routing community does? Not asking for wholesale changes just a nod or two to 4593: a) s4.1, s4.2, s4.7: I hope I'm not splitting too fine a hair here (i.e., tell me if you think so) but aren't Jamming and DoS Attacks when not carried out to their fullest both forms of Interference? When carried out of their fullest aren't Jamming and DoS Attacks as well as Indirect Channel Overloading forms of Overloading? -s4.1: Jamming, depending on how jammed the link, is a form of Interference and Overload with threat consequences of Disruption [RFC4593]. -s4.2: DoS Attacks are a form of Interference and Overload with threat consequences of Disruption [RFC4593]. -s4.7: Indirect Channel Overloading is a form of Interference and Overload with threat consequences of Disruption [RFC4593]. b) s4.2: At the end of the first paragraph: , so called byzantine routers [RFC4593]. c) s4.3: At the end of the section: [RFC4593] would categorize the threat consequence as Disclosure. d) s4.4.1: At the end of the section: [RFC4593] would categorize the threat consequence as Disclosure and Deception. e) s4.4.2: Often times spoofing is done for other reasons. I think s4.4.1 does a good job explaining the impersonation issue, but s4.4.2 seems to be about falsification, i.e., overclaiming. misclaiming, and misstatements (see s4.5 of RFC 4593). Maybe adding the following to 1st sentence: , sometimes referred to as Falsification [RFC4593]. And then at the end: [RFC4593] would categorize the threat consequence as Usurpation, Deception, and Disruption. f) s4.5: At the end of the section: [RFC4593] would categorize this as a Falsification and Interference threat with a threat consequence of Usurpation, Deception, and Disruption. g) 4.6.1/4.6.2: At the end of the section: [RFC4593] would categorize the threat consequence as Usurpation. 2) s4.1: r/between them/between themselves 3) s4.2: I'd add battery to the last paragraph. 4) s4.3: sniffing is kind of synonymous so maybe: Eavesdropping, sometimes referred to as sniffing, is a common ... |
2013-06-12
|
05 | Sean Turner | Ballot comment text updated for Sean Turner |
2013-06-12
|
05 | Sean Turner | [Ballot discuss] Thanks for this well written draft. Just want to discuss a couple of things: 0) In s3, it seems like the scope is … [Ballot discuss] Thanks for this well written draft. Just want to discuss a couple of things: 0) In s3, it seems like the scope is set to just an attacker using NHDP messages to cause havoc. Is there a concern about deliberate exposure? That is an attacker gains control of a device and just starts blasting the routing information off to its friends? If so/not I think maybe just a sentence in s3 could address this. 2) In s4.4, identity and link spoofing is discussed. Is there any concern that the spoofers will somehow inject themselves in order to redirect traffic so that they can then eavesdrop? I see there's something in s4.5 about recording the traffic and then having another replay it but it's not quite the same thing. 3) Any concerns about traffic analysis (i.e., who is talking to who)? Or, is that lumped in with eavesdropping? The two are slightly different in that for traffic analysis the attacker can deduce information even if encryption is applied. |
2013-06-12
|
05 | Sean Turner | [Ballot comment] And now for some comments: 1. I always go back to RFC 4593. Curious if the routing community does? Not asking for … [Ballot comment] And now for some comments: 1. I always go back to RFC 4593. Curious if the routing community does? Not asking for wholesale changes just a nod or two to 4593: a) s4.1, s4.2, s4.7: I hope I'm not splitting too fine a hair here (i.e., tell me if you think so) but aren't Jamming and DoS Attacks when not carried out to their fullest both forms of Interference? When carried out of their fullest aren't Jamming and DoS Attacks as well as Indirect Channel Overloading forms of Overloading? -s4.1: Jamming, depending on how jammed the link, is a form of Interference and Overload with threat consequences of Disruption [RFC4593]. -s4.2: DoS Attacks are a form of Interference and Overload with threat consequences of Disruption [RFC4593]. -s4.7: Indirect Channel Overloading is a form of Interference and Overload with threat consequences of Disruption [RFC4593]. b) s4.2: At the end of the first paragraph: , so called byzantine routers [RFC4593]. c) s4.3: At the end of the section: [RFC4593] would categorize the threat consequence as Disclosure. d) s4.4.1: At the end of the section: [RFC4593] would categorize the threat consequence as Disclosure and Deception. |
2013-06-12
|
05 | Sean Turner | [Ballot Position Update] New position, Discuss, has been recorded for Sean Turner |
2013-06-12
|
05 | Martin Stiemerling | [Ballot Position Update] New position, No Objection, has been recorded for Martin Stiemerling |
2013-06-11
|
05 | Richard Barnes | [Ballot Position Update] New position, No Objection, has been recorded for Richard Barnes |
2013-06-11
|
05 | Stephen Farrell | [Ballot comment] I like that you've done this and have just a few comments and some nits: - "Attacker" definition - are you excluding nodes … [Ballot comment] I like that you've done this and have just a few comments and some nits: - "Attacker" definition - are you excluding nodes that are on the Internet when the MANET is conncected to the Internet? If so, I think you need to say so. And that might be fine, but did you think about attacks from the Internet? If you didn't think about those, why is that ok? (I assume when you say "present in the network" you mean "in the MANET" btw.) - (A related question that demonstrates my ignorance of multicast:-) is there any way to inject traffic from outside into a MANET that will then appear to be NHDP messages sent to a link local multicast address? E.g. if some PIM service or something were also being run on the MANET? (I've no clue myself, but if there were then that'd be a new attack vector that some MANETs ought worry about I think.) - section 5: isn't causing lots of traffic to be directed to a battery powered device so as to drain its battery an attack here? I'd say that's worth a mention somewhere. (Actually the word "power" doesn't occur at all, and that seems wrong.) Most of the rest are just nits, but here they are anyway: - section 1, 2nd para: The last sentence seems to be missing something - who or what is suggesting that "this" (what this?) be addressed? I don't get it anyway. - s1, last para: "attacks on and mis-configurations of NHDP" would be better (if that's what you mean which I think it is). - A compromised NHDP router could send malformed packets in an attempt to get a buffer overrun or other similar attack. I don't know if there are any NHDP packets such that implementations are likely to have problems like this, but if there were then maybe a warning would be good. - References: I know there's a good bit of academic literature on MANET security so I wondered if some more pointers to good papers would be a worthwhile addition. (I'm sure the authors know far better than I do what'd be good to include.) - The authors suggested a couple of changes [1] based on the secdir review that look worthwhile. [1] http://www.ietf.org/mail-archive/web/secdir/current/msg04007.html |
2013-06-11
|
05 | Stephen Farrell | [Ballot Position Update] New position, No Objection, has been recorded for Stephen Farrell |
2013-06-10
|
05 | Ulrich Herberg | IANA Review state changed to Version Changed - Review Needed from IANA OK - No Actions Needed |
2013-06-10
|
05 | Ulrich Herberg | New version available: draft-ietf-manet-nhdp-sec-threats-05.txt |
2013-06-10
|
04 | Brian Haberman | [Ballot Position Update] New position, No Objection, has been recorded for Brian Haberman |
2013-06-10
|
04 | Stewart Bryant | [Ballot comment] It would be helpful to the RFCeditor to do an unexpanded abbreviation scrub before the draft is sent to them. |
2013-06-10
|
04 | Stewart Bryant | [Ballot Position Update] New position, Yes, has been recorded for Stewart Bryant |
2013-06-08
|
04 | Barry Leiba | [Ballot comment] This seems to be a fine document, thanks. I have just one, small comment: there's an RFC 2119 reference, and 2119 boilerplate in … [Ballot comment] This seems to be a fine document, thanks. I have just one, small comment: there's an RFC 2119 reference, and 2119 boilerplate in Section 2. But there are no 2119 key words in the document. You should remove the boilerplate and reference. |
2013-06-08
|
04 | Barry Leiba | [Ballot Position Update] New position, No Objection, has been recorded for Barry Leiba |
2013-06-07
|
04 | Spencer Dawkins | [Ballot comment] I did have one comment, for your consideration. I'm not an expert on MANET, of course, but most of the threat descriptions were … [Ballot comment] I did have one comment, for your consideration. I'm not an expert on MANET, of course, but most of the threat descriptions were clear enough that I could explain them to someone else if necessary. In 5.1. MPR Calculation MPR selection (as used in e.g., [I-D.ietf-manet-olsrv2] and [RFC6621]) uses information about a router's 1-hop and 2-hop neighborhood, assuming that (i) this information is accurate, and (ii) all 1-hop neighbors are apt to act as as MPR, depending on the willingness they report. Thus, a Compromised NHDP router will seek to manipulate the 1-hop and 2-hop neighborhood information in a router such as to cause the MPR selection to fail, leading to a flooding disruption of TC messages. I didn't understand the threat except in the most general terms, and I think the problem is that "manipulate the information so that MPR selection fails" wasn't helpful for me. If it's possible to give an example ("if the Compromised NHDP router doesn't propagate the framitz field"), I suspect this section would be as clear as the rest of the very readable draft. |
2013-06-07
|
04 | Spencer Dawkins | [Ballot Position Update] New position, No Objection, has been recorded for Spencer Dawkins |
2013-06-06
|
04 | Jean Mahoney | Request for Telechat review by GENART is assigned to Wassim Haddad |
2013-06-06
|
04 | Jean Mahoney | Request for Telechat review by GENART is assigned to Wassim Haddad |
2013-06-06
|
04 | (System) | IANA Review state changed to IANA OK - No Actions Needed from Version Changed - Review Needed |
2013-06-06
|
04 | (System) | IANA Review state changed to Version Changed - Review Needed from IANA OK - No Actions Needed |
2013-06-06
|
04 | Adrian Farrel | State changed to IESG Evaluation from Waiting for AD Go-Ahead |
2013-06-06
|
04 | Adrian Farrel | Ballot has been issued |
2013-06-06
|
04 | Adrian Farrel | [Ballot Position Update] New position, Yes, has been recorded for Adrian Farrel |
2013-06-06
|
04 | Adrian Farrel | Created "Approve" ballot |
2013-06-06
|
04 | Adrian Farrel | Placed on agenda for telechat - 2013-06-13 |
2013-06-06
|
04 | Adrian Farrel | Changed consensus to Yes from Unknown |
2013-06-06
|
04 | Ulrich Herberg | IANA Review state changed to Version Changed - Review Needed from IANA OK - No Actions Needed |
2013-06-06
|
04 | Ulrich Herberg | New version available: draft-ietf-manet-nhdp-sec-threats-04.txt |
2013-06-06
|
03 | (System) | State changed to Waiting for AD Go-Ahead from In Last Call |
2013-05-30
|
03 | Jean Mahoney | Request for Last Call review by GENART is assigned to Wassim Haddad |
2013-05-30
|
03 | Jean Mahoney | Request for Last Call review by GENART is assigned to Wassim Haddad |
2013-05-30
|
03 | (System) | IANA Review state changed to IANA OK - No Actions Needed from IANA - Review Needed |
2013-05-30
|
03 | Pearl Liang | IESG/Authors/WG Chairs: IANA has reviewed draft-ietf-manet-nhdp-sec-threats-03, which is currently in Last Call, and has the following comments: We understand that, upon approval of this … IESG/Authors/WG Chairs: IANA has reviewed draft-ietf-manet-nhdp-sec-threats-03, which is currently in Last Call, and has the following comments: We understand that, upon approval of this document, there are no IANA Actions that need completion. If this assessment is not accurate, please respond as soon as possible. |
2013-05-23
|
03 | Amy Vezza | IANA Review state changed to IANA - Review Needed |
2013-05-23
|
03 | Amy Vezza | The following Last Call announcement was sent out: From: The IESG To: IETF-Announce CC: Reply-To: ietf@ietf.org Sender: Subject: Last Call: (Security Threats for NHDP) to … The following Last Call announcement was sent out: From: The IESG To: IETF-Announce CC: Reply-To: ietf@ietf.org Sender: Subject: Last Call: (Security Threats for NHDP) to Informational RFC The IESG has received a request from the Mobile Ad-hoc Networks WG (manet) to consider the following document: - 'Security Threats for NHDP' as Informational RFC The IESG plans to make a decision in the next few weeks, and solicits final comments on this action. Please send substantive comments to the ietf@ietf.org mailing lists by 2013-06-06. Exceptionally, comments may be sent to iesg@ietf.org instead. In either case, please retain the beginning of the Subject line to allow automated sorting. Abstract This document analyses common security threats of the Neighborhood Discovery Protocol (NHDP), and describes their potential impacts on MANET routing protocols using NHDP. The file can be obtained via http://datatracker.ietf.org/doc/draft-ietf-manet-nhdp-sec-threats/ IESG discussion can be tracked via http://datatracker.ietf.org/doc/draft-ietf-manet-nhdp-sec-threats/ballot/ No IPR declarations have been submitted directly on this I-D. |
2013-05-23
|
03 | Amy Vezza | State changed to In Last Call from Last Call Requested |
2013-05-23
|
03 | Adrian Farrel | Last call was requested |
2013-05-23
|
03 | Adrian Farrel | Ballot approval text was generated |
2013-05-23
|
03 | Adrian Farrel | State changed to Last Call Requested from AD Evaluation |
2013-05-23
|
03 | Adrian Farrel | Last call announcement was changed |
2013-05-23
|
03 | Adrian Farrel | Last call announcement was generated |
2013-05-23
|
03 | Adrian Farrel | AD review === Hi, Thanks for this document which I found readable and comprehensible. I have done my usual AD review to find issues and … AD review === Hi, Thanks for this document which I found readable and comprehensible. I have done my usual AD review to find issues and concerns that I think should be resolved before the document advances to IETF last call and IESG review. Since I am not a security weenie^H^H^H^H expert, my comments are sparse. Therefore I am kicking off IETF last call at once. Please handle my comments as part of the last call. (I have also sent a heads-up to the Security ADs that this document definitely needs attention from the Security Directorate.) Thanks for the work, Adrian --- I know it is not the intent of this document to propose solutions or mitigations to any of the threats described. However, I think two things would be useful: 1. Please add a statement of exactly this point to the Abstract and to the end of the Introduction. 2. Please consider adding a short section that may drive new work by suggesting which threats need to be addressed in new protocol work, which in deployment, and which by applications. --- The assumption stated in the Introduction... This document is based on the assumption that no additional security mechanism (such as IPsec) is used in the IP layer. ...is perfectly fine. You might add a note to explain why this is a reasonable assumption (i.e., it is particularly hard to configure security associations in this type of network) and you might also add a note about whether none, some, or all of the threats would go away if this problem could be resolved. |
2013-05-23
|
03 | Adrian Farrel | Ballot writeup was changed |
2013-05-23
|
03 | Adrian Farrel | Ballot writeup was generated |
2013-05-23
|
03 | Adrian Farrel | Updated Shepherd Write-up to reflow long lines |
2013-05-23
|
03 | Adrian Farrel | Changed document writeup |
2013-05-23
|
03 | Adrian Farrel | State changed to AD Evaluation from Publication Requested |
2013-05-23
|
03 | Tero Kivinen | Request for Early review by SECDIR is assigned to Matt Lepinski |
2013-05-23
|
03 | Tero Kivinen | Request for Early review by SECDIR is assigned to Matt Lepinski |
2013-05-20
|
03 | Amy Vezza | As required by RFC 4858, this is the current template for the Document Shepherd Write-Up. Changes are expected over time. This version is dated … As required by RFC 4858, this is the current template for the Document Shepherd Write-Up. Changes are expected over time. This version is dated 24 February 2012. (1) What type of RFC is being requested (BCP, Proposed Standard, Internet Standard, Informational, Experimental, or Historic)? Why is this the proper type of RFC? Is this type of RFC indicated in the title page header? The type of document is Informational. It provides discussion and analyses useful for the internet and represents working group consensus. The document indicates "Information" (2) The IESG approval announcement includes a Document Announcement Write-Up. Please provide such a Document Announcement Write-Up. Recent examples can be found in the "Action" announcements for approved documents. The approval announcement contains the following sections: Technical Summary: This document analyzes common security threats of the Neighborhood Discovery Protocol (NHDP), and describes their potential impacts on MANET routing protocols using NHDP. Working Group Summary: The process for reaching working group consensus on this was smooth; no controversy existed. Working group consensus behind the document is solid. Document Quality This document does not specify a protocol, therefore no implementations are available. There are several NHDP implementations existing, and the WG has a thorough understanding of the protocol and its security considerations. Personnel Joseph Macker (joseph.macker@nrl.navy.mil) is the document shepherd for this document. Adrian Farrel (adrian@olddog.co.uk) is the responsible AD. (3) Briefly describe the review of this document that was performed by the Document Shepherd. If this version of the document is not ready for publication, please explain why the document is being forwarded to the IESG. The shepherd has personally reviewed the document, and believes it is ready for forwarding to the IESG for publication. The shepherd has also run the id-nits tools. (4) Does the document Shepherd have any concerns about the depth or breadth of the reviews that have been performed? The document has had adequate review from both key working group members and from key non-WG members. The shepherd does not have any concerns about the depth or breadth of the reviews that have been performed. (5) Do portions of the document need review from a particular or from broader perspective, e.g., security, operational complexity, AAA, DNS, DHCP, XML, or internationalization? If so, describe the review that took place. The shepherd does not have any concerns about the document needing additional review. (6) Describe any specific concerns or issues that the Document Shepherd has with this document that the Responsible Area Director and/or the IESG should be aware of? For example, perhaps he or she is uncomfortable with certain parts of the document, or has concerns whether there really is a need for it. In any event, if the WG has discussed those issues and has indicated that it still wishes to advance the document, detail those concerns here. No concerns. (7) Has each author confirmed that any and all appropriate IPR disclosures required for full conformance with the provisions of BCP 78 and BCP 79 have already been filed. If not, explain why. Yes. (8) Has an IPR disclosure been filed that references this document? If so, summarize any WG discussion and conclusion regarding the IPR disclosures. IPR disclosures were not necessary, therefore, none have been filed. (9) How solid is the WG consensus behind this document? Does it represent the strong concurrence of a few individuals, with others being silent, or does the WG as a whole understand and agree with it? Working group consensus behind this document is solid. The document represents rough consensus of the working group as a whole, the document passed WGLC with minimal comments and consensus to move forward with publication. (10) Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarise the areas of conflict in separate email messages to the Responsible Area Director. (It should be in a separate email because this questionnaire is publicly available.) Working group consensus behind this document is solid. There have a few minor complaints that we do not believe represent consensus opinion. (11) Identify any ID nits the Document Shepherd has found in this document. (See http://www.ietf.org/tools/idnits/ and the Internet-Drafts Checklist). Boilerplate checks are not enough; this check needs to be thorough. None. (12) Describe how the document meets any required formal review criteria, such as the MIB Doctor, media type, and URI type reviews. None required. (13) Have all references within this document been identified as either normative or informative? The document has split its references into normative and informative (14) Are there normative references to documents that are not ready for advancement or are otherwise in an unclear state? If such normative references exist, what is the plan for their completion? No. (15) Are there downward normative references references (see RFC 3967)? If so, list these downward references to support the Area Director in the Last Call procedure. No. (16) Will publication of this document change the status of any existing RFCs? Are those RFCs listed on the title page header, listed in the abstract, and discussed in the introduction? If the RFCs are not listed in the Abstract and Introduction, explain why, and point to the part of the document where the relationship of this document to the other RFCs is discussed. If this information is not in the document, explain why the WG considers it unnecessary. No. (17) Describe the Document Shepherd's review of the IANA considerations section, especially with regard to its consistency with the body of the document. Confirm that all protocol extensions that the document makes are associated with the appropriate reservations in IANA registries. Confirm that any referenced IANA registries have been clearly identified. Confirm that newly created IANA registries include a detailed specification of the initial contents for the registry, that allocations procedures for future registrations are defined, and a reasonable name for the new registry has been suggested (see RFC 5226). The shepherd has verified that document IANA consideration section exists, and is consistent with the body of the document. No actions for IANA have been requested. (18) List any new IANA registries that require Expert Review for future allocations. Provide any public guidance that the IESG would find useful in selecting the IANA Experts for these new registries. None required. (19) Describe reviews and automated checks performed by the Document Shepherd to validate sections of the document written in a formal language, such as XML code, BNF rules, MIB definitions, etc. None required. |
2013-05-19
|
03 | Adrian Farrel | Document shepherd changed to Joseph P. Macker |
2013-05-19
|
03 | Adrian Farrel | Document shepherd changed to (None) |
2013-05-19
|
03 | Adrian Farrel | Note added 'Joe Macker is the document shepherd' |
2013-05-19
|
03 | Adrian Farrel | Intended Status changed to Informational |
2013-05-19
|
03 | Adrian Farrel | IESG process started in state Publication Requested |
2013-05-18
|
03 | Joseph Macker | IETF WG state changed to Submitted to IESG for Publication from Submitted to IESG for Publication |
2013-05-18
|
03 | Joseph Macker | IETF WG state changed to Submitted to IESG for Publication from WG Consensus: Waiting for Write-Up |
2013-05-18
|
03 | Joseph Macker | Changed document writeup |
2013-05-18
|
03 | Joseph Macker | Changed document writeup |
2013-04-10
|
03 | Stan Ratliff | IETF WG state changed to WG Consensus: Waiting for Write-Up from In WG Last Call |
2013-04-10
|
03 | Jiazi Yi | New version available: draft-ietf-manet-nhdp-sec-threats-03.txt |
2013-03-25
|
02 | Stan Ratliff | IETF WG state changed to In WG Last Call from In WG Last Call |
2013-03-25
|
02 | Stan Ratliff | IETF WG state changed to In WG Last Call from In WG Last Call |
2013-03-20
|
02 | Stan Ratliff | Re-issue WGLC due to new revision. |
2013-03-20
|
02 | Jiazi Yi | New version available: draft-ietf-manet-nhdp-sec-threats-02.txt |
2013-02-28
|
01 | Joseph Macker | IETF WG state changed to In WG Last Call from WG Document |
2012-10-22
|
01 | Joseph Macker | The WGLC was announced to the WG list on Feb 22, 2013. The WG chairs announce a WG Last Call for the nhdp-sec-threats document. Its … The WGLC was announced to the WG list on Feb 22, 2013. The WG chairs announce a WG Last Call for the nhdp-sec-threats document. Its intended status is INFORMATIONAL. The WG Last Call will last two weeks from today until Friday, Mar 8, 2013 |
2012-10-22
|
01 | Jiazi Yi | New version available: draft-ietf-manet-nhdp-sec-threats-01.txt |
2012-04-09
|
00 | Ulrich Herberg | New version available: draft-ietf-manet-nhdp-sec-threats-00.txt |