Skip to main content

Interactive Connectivity Establishment (ICE): A Protocol for Network Address Translator (NAT) Traversal for Offer/Answer Protocols
draft-ietf-mmusic-ice-19

Revision differences

Document history

Date Rev. By Action
2012-08-22
19 (System) post-migration administrative database adjustment to the Yes position for Jari Arkko
2012-08-22
19 (System) post-migration administrative database adjustment to the No Objection position for Dan Romascanu
2012-08-22
19 (System) post-migration administrative database adjustment to the No Objection position for Sam Hartman
2012-08-22
19 (System) post-migration administrative database adjustment to the No Objection position for Lars Eggert
2008-09-16
19 (System) IANA Action state changed to RFC-Ed-Ack from Waiting on RFC Editor
2008-09-16
19 (System) IANA Action state changed to Waiting on RFC Editor from In Progress
2008-09-16
19 (System) IANA Action state changed to In Progress from Waiting on Authors
2008-09-09
19 (System) IANA Action state changed to Waiting on Authors from In Progress
2008-09-09
19 (System) IANA Action state changed to In Progress from On Hold
2008-08-11
19 (System) IANA Action state changed to On Hold from In Progress
2008-08-08
19 (System) IANA Action state changed to In Progress from On Hold
2007-11-01
19 Amy Vezza State Changes to RFC Ed Queue from Approved-announcement sent by Amy Vezza
2007-10-31
19 (System) IANA Action state changed to On Hold from Waiting on Authors
2007-10-30
19 (System) IANA Action state changed to Waiting on Authors from In Progress
2007-10-30
19 Amy Vezza IESG state changed to Approved-announcement sent
2007-10-30
19 Amy Vezza IESG has approved the document
2007-10-30
19 Amy Vezza Closed "Approve" ballot
2007-10-30
19 Amy Vezza State Changes to Approved-announcement to be sent from IESG Evaluation::AD Followup by Amy Vezza
2007-10-30
19 (System) IANA Action state changed to In Progress
2007-10-30
19 Lars Eggert [Ballot Position Update] Position for Lars Eggert has been changed to No Objection from Discuss by Lars Eggert
2007-10-29
19 Jari Arkko [Ballot Position Update] Position for Jari Arkko has been changed to Yes from Discuss by Jari Arkko
2007-10-29
19 (System) Sub state has been changed to AD Follow up from New Id Needed
2007-10-29
19 (System) New version available: draft-ietf-mmusic-ice-19.txt
2007-10-15
19 Cullen Jennings State Changes to IESG Evaluation::Revised ID Needed from IESG Evaluation::AD Followup by Cullen Jennings
2007-10-13
19 Jari Arkko
[Ballot discuss]
This is a great document and a much needed function.
While the protocol is complex, the specification is
well written and solid.

I …
[Ballot discuss]
This is a great document and a much needed function.
While the protocol is complex, the specification is
well written and solid.

I do have a few issues or question marks, however:

1. (Resolved)

2. (Resolved)

3. I worry about the 18.5.2 amplification attack. 100 tests limit
  and no mandatory limit on number of candidates worries me.
  Is there a possibility to make this stricter? What data
  are the suggested numbers based on?

  The new text in -18 is much better, thanks. However,
  I would prefer making the ability to
  configure this a mandatory feature. I.e., s/SHOULD/MUST/.
  I don't care so much what the value is, as long as we can go
  in later and change the values if this turns out to be a real
  attack vector.
2007-09-13
19 Dan Romascanu [Ballot Position Update] Position for Dan Romascanu has been changed to No Objection from Discuss by Dan Romascanu
2007-09-13
19 (System) Sub state has been changed to AD Follow up from New Id Needed
2007-09-13
18 (System) New version available: draft-ietf-mmusic-ice-18.txt
2007-08-24
19 (System) Removed from agenda for telechat - 2007-08-23
2007-08-23
19 Amy Vezza State Changes to IESG Evaluation::Revised ID Needed from IESG Evaluation by Amy Vezza
2007-08-23
19 Amy Vezza [Ballot Position Update] Position for Sam Hartman has been changed to No Objection from Discuss by Amy Vezza
2007-08-23
19 Dan Romascanu
[Ballot discuss]
I have cleared the first part of my initial DISCUSS and left with this:

The document is missing information related to operational considerations …
[Ballot discuss]
I have cleared the first part of my initial DISCUSS and left with this:

The document is missing information related to operational considerations and manageability. Specifically I could not find information about:
- strategy of deployment - how an installation should be started, are there any NAT configurations that should be avoided, are there any recommended default configuration parameters, any information on scalability?
- Are mixes of ICE and ICE-lite expected to work, what are the limitations?
- impact on the network traffic level - how much bandwidth would the keep-alive message for each session consume? any limits and default settings to be considered at installation?
- observability - how does a network manager know that discovery is completed and his ICE deployment works? Any hooks in the protocol to help debug a situation when something goes wrong?
- Section 16 - when saying Ta and ST0 should be configurable - is this implying there needs to be some out-of-band configuration interface, or is this all automatic computation performed by agents?
2007-08-23
19 Jari Arkko
[Ballot discuss]
This is a great document and a much needed function.
While the protocol is complex, the specification is
well written and solid.

I …
[Ballot discuss]
This is a great document and a much needed function.
While the protocol is complex, the specification is
well written and solid.

I do have a few issues or question marks, however:

1. Why does Section 4.2 (lite) mention RF 3484, but
  Section 4.1 (full) does not? Wouldn't RFC 3484 algorithms
  be appropriate input for the prioritization of address pairs?
  (or inappropriate to not take the input?)

2. There are several places in the document with an apparent
  assumption that interface = address. It does not hold when
  you are dual-stack, and does not even hold for IPv6 as
  you may have multiple addresses and multiple types of
  addresses. Some places:

    Section 2.1: "If an agent is multihomed, it obtains a
    candidate from each interface."

    Section 4.1.1.1: "If an agent is using both RTP and RTCP,
    it would end up with 2*K host candidates if an agent has
    K interfaces."

3. I worry about the 18.5.2 amplification attack. 100 tests limit
  and no mandatory limit on number of candidates worries me.
  Is there a possibility to make this stricter? What data
  are the suggested numbers based on?
2007-08-23
19 Lars Eggert
[Ballot comment]
There were some bug fixes to -17 by Adam Fisk and others on the MMUSIC list that JDR said he'd include - is …
[Ballot comment]
There were some bug fixes to -17 by Adam Fisk and others on the MMUSIC list that JDR said he'd include - is an RFC Editor Note with those missing? Is the plan to have this go to "revised ID needed" to incorporate these?


There was a comment on the MMUSIC list about the length of username fields: "I am not sure 1023 character long username are that great really. For a start, after concatenation (2047 characters), you'll get connectivity checks that exceed the typical Internet MTU." Has that been resolved? (What is the max. size of connectivity check packets, anyway?)


Should something be said about how ICE interacts with standard source address selection (RFC1122, RFC3484) for the media flows? Doesn't using ICE circumvent those standards?


Section 4.1.1.1., paragraph 1:
>    protocol.  Procedures are specified here for UDP.

  Does "here" mean "the remainder of this document?"
  If so, please state this much more prominently.


Finally, with ICE now being pushed as a more general middlebox traversal scheme (cf. the discussion of using ICE for HIP), it would have been good to refactor this specification, extracting the media-, SIP- and RTP-specific pieces into a different document. The current description of ICE is so intermingled with RAI-specific stuff that it is not obvious as to which mechanisms need to be extracted to use ICE outside that application area. (I do understand that another major rewrite is the last thing the authors want to do at this point - but I fully expect one to be required before non-RAI folks can easily adapt ICE for their purposes.)
2007-08-23
19 Lars Eggert
[Ballot comment]
There were some bug fixes to -17 by Adam Fisk and others on the MMUSIC list that JDR said he'd include - is …
[Ballot comment]
There were some bug fixes to -17 by Adam Fisk and others on the MMUSIC list that JDR said he'd include - is an RFC Editor Note with those missing? Is the plan to have this go to "revised ID needed" to incorporate these?


Should something be said about how ICE interacts with standard source address selection (RFC1122, RFC3484) for the media flows? Doesn't using ICE circumvent those standards?


Section 4.1.1.1., paragraph 1:
>    protocol.  Procedures are specified here for UDP.

  Does "here" mean "the remainder of this document?"
  If so, please state this much more prominently.


Finally, with ICE now being pushed as a more general middlebox traversal scheme (cf. the discussion of using ICE for HIP), it would have been good to refactor this specification, extracting the media-, SIP- and RTP-specific pieces into a different document. The current description of ICE is so intermingled with RAI-specific stuff that it is not obvious as to which mechanisms need to be extracted to use ICE outside that application area. (I do understand that another major rewrite is the last thing the authors want to do at this point - but I fully expect one to be required before non-RAI folks can easily adapt ICE for their purposes.)
2007-08-23
19 Jari Arkko
[Ballot discuss]
This is a great document and much needed function. While the protocol is complex, the specification is well written and solid.

I do …
[Ballot discuss]
This is a great document and much needed function. While the protocol is complex, the specification is well written and solid.

I do have a few issues or question marks, however:

1. Why does Section 4.2 (lite) mention RF 3484, but
  Section 4.1 (full) does not? Wouldn't RFC 3484 algorithms
  be appropriate input for the prioritization of address pairs?
  (or inappropriate to not take the input?)

2. There are several places in the document with an apparent
  assumption that interface = address. It does not hold when
  you are dual-stack, and does not even hold for IPv6 as
  you may have multiple addresses and multiple types of
  addresses. Some places:

    Section 2.1: "If an agent is multihomed, it obtains a
    candidate from each interface."

    Section 4.1.1.1: "If an agent is using both RTP and RTCP,
    it would end up with 2*K host candidates if an agent has
    K interfaces."

3. I worry about 18.5.2 amplification attack. 100 tests limt
  and no mandatory limit on number of candidates worries me.
  Is there a possibility to make this stricter? What data
  are the suggested numbers based on?
2007-08-23
19 Jari Arkko
[Ballot discuss]
This is a great document and much needed function. While the protocol is complex, the specification is well written and solid.

I do …
[Ballot discuss]
This is a great document and much needed function. While the protocol is complex, the specification is well written and solid.

I do have a few issues or question marks, however:

1. Why does Section 4.2 (lite) mention RF 3484, but
  Section 4.1 (full) does not? Wouldn't RFC 3484 algorithms
  be appropriate input for the prioritization of address pairs?
  (or inappropriate to not take the input?)

2. There are several places in the document with an apparent
  assumption that interface = address. It does not hold when
  you are dual-stack, and does not even hold for IPv6 as
  you may have multiple addresses and multiple types of
  addresses. Some places:

    Section 2.1: "If an agent is multihomed, it obtains a
    candidate from each interface."

    Section 4.1.1.1: "If an agent is using both RTP and RTCP,
    it would end up with 2*K host candidates if an agent has
    K interfaces."
2007-08-23
19 Jari Arkko [Ballot Position Update] New position, Discuss, has been recorded by Jari Arkko
2007-08-23
19 Lars Eggert
[Ballot discuss]
ICE aims at supporting multiple transport protocols (cf. draft-ietf-mmusic-ice-tcp) and not just UDP. Some inconsistencies exist around that feature. Section 2 seems …
[Ballot discuss]
ICE aims at supporting multiple transport protocols (cf. draft-ietf-mmusic-ice-tcp) and not just UDP. Some inconsistencies exist around that feature. Section 2 seems to want to give a high-level overview of the ICE architecture - including support of multiple transport protocols - whereas the detailed specification in the remaining sections focuses exclusively on ICE with UDP. (At least that's how it came across )

However, Section 2 is inconsistent in how it defines and then uses the terms "transport address" and "candidate". Some definitions say that a transport address is "a combination of IP address and port for a particular transport protocol", i.e., a 3-tuple , whereas other uses of the terms say something like "combination of IP address and port", i.e., a pair . The former seems to be correct, because a protocol number is useless without the context of a particular transport protocol. This needs to be clarified both in the text and in the diagrams/examples, which use the X:x notation to denote IP address and port while omitting the transport protocol.

Also, something should be said in Section 2 about how ICE decides which transport protocol(s) to gather candidates for. Different applications support different kinds of transports, e.g., RTP runs over UDP, TCP and DCCP, whereas HTTP is limited to TCP, etc. It's unclear how ICE interacts with that.

(As an alternative to all the above, it could be made clear that this entire draft is just about ICE with UDP. But that would also require some text changes, and having a comprehensive description of the architecture with support for multiple transports is beneficial, because it'd be needed for draft-ietf-mmusic-ice-tcp anyway.)

Section 10., paragraph 2:
>    If there has been no packet sent on the candidate pair ICE is using
>    for a media component for Tr seconds (where packets include those
>    defined for the component (RTP or RTCP) and previous keepalives), an
>    agent MUST generate a keepalive on that pair.  Tr SHOULD be
>    configurable and SHOULD have a default of 15 seconds.

  15 seconds are short, but we've discussed this offline and I can
  grudgingly live with it. However, please add that (1) Tr MUST NOT be
  configured to less than 15 seconds and that (2) folks deploying ICE in
  more controlled networking environments SHOULD set Tr to the longest
  duration possible in their environment.


Section 16:
> 16.  Setting Ta and RTO

This section proposes to shape the ICE probes such that they consume bandwidth in a way that is similar to the media flows for which ICE is being executed. That's a neat idea, but I don't see how this can fly in general. STUN doesn't depend on ICE, and ICE doesn't depend on RTP, meaning that using RTP parameters for this calculation isn't generally possible. (And even if it were, that'd be a pretty ugly layering violation.) The result is that folks will probably simply use the 100ms for RTO and 20ms for Ta, which is too aggressive. (I know of an open-source implementation that did that, and found that the behavior sucked over DSL links. They went to 300ms for RTO and something larger for Ta, too.) I agree that RFC2988's 3 seconds for the RTO are problematic, but SIP and GIST use 500ms, for example, and that'd be a much safer value.

(I should have caught this earlier, when the idea of shaping the ICE probes to use bandwidth similar to the media stream was proposed - I apologize that I didn't.)
2007-08-23
19 Chris Newman [Ballot Position Update] New position, No Objection, has been recorded by Chris Newman
2007-08-22
19 Jon Peterson [Ballot Position Update] New position, Yes, has been recorded by Jon Peterson
2007-08-22
19 Cullen Jennings
2007-08-22
19 Lars Eggert
[Ballot comment]
Should something be said about how ICE interacts with standard source address selection (RFC1122, RFC3484) for the media flows? Doesn't …
[Ballot comment]
Should something be said about how ICE interacts with standard source address selection (RFC1122, RFC3484) for the media flows? Doesn't using ICE circumvent those standards?


Section 4.1.1.1., paragraph 1:
>    protocol.  Procedures are specified here for UDP.

  Does "here" mean "the remainder of this document?"
  If so, please state this much more prominently.


Finally, with ICE now being pushed as a more general middlebox traversal scheme (cf. the discussion of using ICE for HIP), it would have been good to refactor this specification, extracting the media-, SIP- and RTP-specific pieces into a different document. The current description of ICE is so intermingled with RAI-specific stuff that it is not obvious as to which mechanisms need to be extracted to use ICE outside that application area. (I do understand that another major rewrite is the last thing the authors want to do at this point - but I fully expect one to be required before non-RAI folks can easily adapt ICE for their purposes.)
2007-08-22
19 Lars Eggert
[Ballot discuss]
ICE aims at supporting multiple transport protocols (cf. draft-ietf-mmusic-ice-tcp) and not just UDP. Some inconsistencies exist around that feature. Section 2 seems …
[Ballot discuss]
ICE aims at supporting multiple transport protocols (cf. draft-ietf-mmusic-ice-tcp) and not just UDP. Some inconsistencies exist around that feature. Section 2 seems to want to give a high-level overview of the ICE architecture - including support of multiple transport protocols - whereas the detailed specification in the remaining sections focuses exclusively on ICE with UDP. (At least that's how it came across )

However, Section 2 is inconsistent in how it defines and then uses the terms "transport address" and "candidate". Some definitions say that a transport address is "a combination of IP address and port for a particular transport protocol", i.e., a 3-tuple , whereas other uses of the terms say something like "combination of IP address and port", i.e., a pair . The former seems to be correct, because a protocol number is useless without the context of a particular transport protocol. This needs to be clarified both in the text and in the diagrams/examples, which use the X:x notation to denote IP address and port while omitting the transport protocol.

Also, something should be said in Section 2 about how ICE decides which transport protocol(s) to gather candidates for. Different applications support different kinds of transports, e.g., RTP runs over UDP, TCP and DCCP, whereas HTTP is limited to TCP, etc. It's unclear how ICE interacts with that.

(As an alternative to all the above, it could be made clear that this entire draft is just about ICE with UDP. But that would also require some text changes, and having a comprehensive description of the architecture with support for multiple transports is beneficial, because it'd be needed for draft-ietf-mmusic-ice-tcp anyway.)

Section 10., paragraph 2:
>    If there has been no packet sent on the candidate pair ICE is using
>    for a media component for Tr seconds (where packets include those
>    defined for the component (RTP or RTCP) and previous keepalives), an
>    agent MUST generate a keepalive on that pair.  Tr SHOULD be
>    configurable and SHOULD have a default of 15 seconds.

  15 seconds are short, but we've discussed this offline and I can
  grudgingly live with it. However, please add that (1) Tr MUST NOT be
  configured to less than 15 seconds and that (2) folks deploying ICE in
  more controlled networking environments SHOULD set Tr to the longest
  duration possible in their environment.
2007-08-22
19 Lars Eggert
[Ballot comment]
Should something be said about how ICE interacts with standard source address selection (RFC1122, RFC3484) for the media flows? Doesn't …
[Ballot comment]
Should something be said about how ICE interacts with standard source address selection (RFC1122, RFC3484) for the media flows? Doesn't using ICE circumvent those standards?

Finally, with ICE now being pushed as a more general middlebox traversal scheme (cf. the discussion of using ICE for HIP), it would have been good to refactor this specification, extracting the media-, SIP- and RTP-specific pieces into a different document. The current description of ICE is so intermingled with RAI-specific stuff that it is not obvious as to which mechanisms need to be extracted to use ICE outside that application area. (I do understand that another major rewrite is the last thing the authors want to do at this point - but I fully expect one to be required before non-RAI folks can easily adapt ICE for their purposes.)
2007-08-22
19 Lars Eggert
[Ballot discuss]
ICE aims at supporting multiple transport protocols (cf. draft-ietf-mmusic-ice-tcp) and not just UDP. Some inconsistencies exist around that feature. Section 2 seems …
[Ballot discuss]
ICE aims at supporting multiple transport protocols (cf. draft-ietf-mmusic-ice-tcp) and not just UDP. Some inconsistencies exist around that feature. Section 2 seems to want to give a high-level overview of the ICE architecture - including support of multiple transport protocols - whereas the detailed specification in the remaining sections focuses exclusively on ICE with UDP. (At least that's how it came across )

However, Section 2 is inconsistent in how it defines and then uses the terms "transport address" and "candidate". Some definitions say that a transport address is "a combination of IP address and port for a particular transport protocol", i.e., a 3-tuple , whereas other uses of the terms say something like "combination of IP address and port", i.e., a pair . The former seems to be correct, because a protocol number is useless without the context of a particular transport protocol. This needs to be clarified both in the text and in the diagrams/examples, which use the X:x notation to denote IP address and port while omitting the transport protocol.

Also, something should be said in Section 2 about how ICE decides which transport protocol(s) to gather candidates for. Different applications support different kinds of transports, e.g., RTP runs over UDP, TCP and DCCP, whereas HTTP is limited to TCP, etc. It's unclear how ICE interacts with that.

(As an alternative to all the above, it could be made clear that this entire draft is just about ICE with UDP. But that would also require some text changes, and having a comprehensive description of the architecture with support for multiple transports is beneficial, because it'd be needed for draft-ietf-mmusic-ice-tcp anyway.)
2007-08-22
19 Lars Eggert [Ballot Position Update] New position, Discuss, has been recorded by Lars Eggert
2007-08-21
19 Lisa Dusseault [Ballot Position Update] New position, Yes, has been recorded by Lisa Dusseault
2007-08-21
19 Sam Hartman
[Ballot discuss]
I'm happy to move this to the Turn document when that comes to the
IESG.  I'm bringing up the issue now, but I …
[Ballot discuss]
I'm happy to move this to the Turn document when that comes to the
IESG.  I'm bringing up the issue now, but I suspect no one including
me will want to hold this document for it.  I want to discuss with the
IESG to see where we are though.

This document suggests that clients should be statically provisioned
with a long-term secret to use with Turn servers.  I suspect that
after doing the RFC 4107 analysis we'll find that we need mandatory
key management for Turn. I suspect that by the time all is said and
done, that will be inappropriate advice.  How do we want to manage
this?
2007-08-21
19 Sam Hartman [Ballot Position Update] New position, Discuss, has been recorded by Sam Hartman
2007-08-20
19 Magnus Westerlund [Ballot Position Update] New position, Yes, has been recorded by Magnus Westerlund
2007-08-20
19 Ron Bonica [Ballot Position Update] New position, No Objection, has been recorded by Ron Bonica
2007-08-20
19 David Ward [Ballot Position Update] New position, No Objection, has been recorded by David Ward
2007-08-19
19 Dan Romascanu
[Ballot discuss]
This may be a discuss DISCUSS. The first issue relates to questions that were raised in the Working Group discussions. The second is …
[Ballot discuss]
This may be a discuss DISCUSS. The first issue relates to questions that were raised in the Working Group discussions. The second is related to operational and manageability considerations information. In the absence of a dedicated section the information may be distributed within the document, I found some, but I am still missing many pieces. (it's a big document, you know)

1. Status of the document - prior and during Chicago there have been intense discussions on the list whether the appropriate status of this document is Proposed or Experimental. Some questions were asked about the (lack of) deployment experience with the later versions. Are we sure about the level of consensus reached by the Working Group and the IETF regarding this version of the document?

2. The document is missing information related to operational considerations and manageability. Specifically I could not find information about:
- strategy of deployment - how an installation should be started, are there any NAT configurations that should be avoided, are there any recommended default configuration parameters, any information on scalability?
- Are mixes of ICE and ICE-lite expected to work, what are the limitations?
- impact on the network traffic level - how much bandwidth would the keep-alive message for each session consume? any limits and default settings to be considered at installation?
- observability - how does a network manager know that discovery is completed and his ICE deployment works? Any hooks in the protocol to help debug a situation when something goes wrong?
- Section 16 - when saying Ta and ST0 should be configurable - is this implying there needs to be some out-of-band configuration interface, or is this all automatic computation performed by agents?
2007-08-19
19 Dan Romascanu [Ballot Position Update] New position, Discuss, has been recorded by Dan Romascanu
2007-08-16
19 Cullen Jennings Placed on agenda for telechat - 2007-08-23 by Cullen Jennings
2007-08-16
19 Ron Bonica Removed from agenda for telechat - 2007-08-23 by Ron Bonica
2007-08-16
19 Russ Housley
[Ballot comment]
From the Gen-ART Review by Christian Vogt

  Section 2.6, 1st paragraph:
  >
  > ... However, it is possible that packet …
[Ballot comment]
From the Gen-ART Review by Christian Vogt

  Section 2.6, 1st paragraph:
  >
  > ... However, it is possible that packet losses will cause a higher
  > priority check to take longer to complete.  In that case, allowing
  > ICE to run a little longer might produce better results.
  >
  Saying "a packet loss" rather than "packet losses" could avoid
  confusion.  A reader might otherwise wonder why running "a little
  longer might produce better results" if it would mean that a
  high-packet-loss path gets eventually chosen.

  In Security Considerations, Section 18.5.2, "STUN Amplification
  Attack", explains that ICE candidate probes could be used for
  amplified flooding:
  >
  > It is impossible to eliminate the amplification, but the volume can
  > be reduced through a variety of heuristics.  [...]
  >
  A reader might at first glance wonder why the amplification could not
  be avoided by requiring the initiator to send a separate request per
  response.  For example, this is done in Mobile IPv6 route optimization
  where a mobile host sends out two initialization messages that each
  prompt the peer to send a single response message.

  It might be valuable to note in section 18.5.2 that a "balancing"
  of the number of request and response messages is not possible in the
  case of ICE because the initiator does not know the number of
  responses at the time it sends the request.  In ICE, the number of
  responses depends on both the initiator's and the responder's set of
  IP addresses.

  Section 2.1, 1st paragraph:
  >
  > ...  In all cases, such a network interface appears to the agent as
  > a local interface from which ports (and thus a candidate) can be
  > allocated.
  >
  s/ports (and thus a candidate)/a port (and thus a candidate)/
  ... or plural in both cases.

  Section 2.1, 2nd paragraph on page 11:  It seems that "local
  interface Y" should be "local IP address Y" because only the IP
  address is relevant for connectivity, not the interface. And, an
  interface may have multiple IP addresses, of course.
2007-08-16
19 Russ Housley [Ballot Position Update] New position, No Objection, has been recorded by Russ Housley
2007-08-14
19 Ross Callon [Ballot Position Update] New position, No Objection, has been recorded by Ross Callon
2007-08-14
19 Yoshiko Fong
IANA Last Call Comment:

*** NOTE ***
Note: Actions 1,2 and 3 can be performed as soon as
this document is approved. Actions 4 and …
IANA Last Call Comment:

*** NOTE ***
Note: Actions 1,2 and 3 can be performed as soon as
this document is approved. Actions 4 and 5 depend on [draft-ietf-behave-rfc3489bis] and this document must
be put on hold until that one is approved.
*********


Action #1: Sections 20.1.1, 20.1.2
Upon approval of this document, the IANA will make
the following assignments in the "Session Description
Protocol (SDP) Parameters - per [RFC4566]"
registry located at

http://www.iana.org/assignments/sdp-parameters

sub-registry "att-field (media level only)"

Type SDP Name Reference
---- ------------------ ---------
candidate [RFC-mmusic-ice-17]
remote-candidates [RFC-mmusic-ice-17]


Action #2: 20.1.3, 20.1.4, 20.1.7
Upon approval of this document, the IANA will make
the following assignments in the "Session Description
Protocol (SDP) Parameters - per [RFC4566]"
registry located at

http://www.iana.org/assignments/sdp-parameters

sub-registry "att-field (session level)"

Type SDP Name Reference
---- ------------------ ---------
ice-lite [RFC-mmusic-ice-17]
ice-mismatch [RFC-mmusic-ice-17]
ice-options [RFC-mmusic-ice-17]

Action #3: 20.1.5, 20.1.6
Upon approval of this document, the IANA will make
the following assignments in the "Session Description
Protocol (SDP) Parameters - per [RFC4566]"
registry located at

http://www.iana.org/assignments/sdp-parameters

sub-registry "att-field (both session and media level):

Type SDP Name Reference
---- ------------------ ---------
ice-pwd [RFC-mmusic-ice-17]
ice-ufrag [RFC-mmusic-ice-17]


Action #4: Section 20.2
Depends on [draft-ietf-behave-rfc3489bis] to be
processed first which is still in working group.
Once that one is processed add following
registrations to the "STUN attribtues" sub-registry
[draft-ietf-behave-rfc3489bis] creates

0x0024 PRIORITY [RFC-mmusic-ice-17]
0x0025 USE-CANDIDATE [RFC-mmusic-ice-17]
0x8029 ICE-CONTROLLED [RFC-mmusic-ice-17]
0x802a ICE-CONTROLLING [RFC-mmusic-ice-17]


Action #5: Section 20.3
Depends on [draft-ietf-behave-rfc3489bis] to be
processed first which is still in working group.
Once that one is processed add following registrations
to the "STUN Error Responses" sub-registry created by
[draft-ietf-behave-rfc3489bis].


487 Role Conflict: The client asserted an ICE role
[RFC-mmusic-ice-17] (controlling or controlled) that
is in conflict with the role of the server.


We understand the above to be the only IANA Actions
for this document.
2007-08-14
19 Cullen Jennings State Changes to IESG Evaluation from Waiting for AD Go-Ahead by Cullen Jennings
2007-08-14
19 Cullen Jennings [Ballot Position Update] New position, Yes, has been recorded for Cullen Jennings
2007-08-14
19 Cullen Jennings Ballot has been issued by Cullen Jennings
2007-08-14
19 Tim Polk [Ballot Position Update] New position, No Objection, has been recorded by Tim Polk
2007-08-14
19 Tim Polk Created "Approve" ballot
2007-08-13
19 (System) State has been changed to Waiting for AD Go-Ahead from In Last Call by system
2007-08-02
19 Samuel Weiler Request for Last Call review by SECDIR Completed. Reviewer: Jürgen Schönwälder.
2007-07-31
19 Samuel Weiler Request for Last Call review by SECDIR is assigned to Jürgen Schönwälder
2007-07-31
19 Samuel Weiler Request for Last Call review by SECDIR is assigned to Jürgen Schönwälder
2007-07-25
19 Amy Vezza Last call sent
2007-07-25
19 Amy Vezza State Changes to In Last Call from Last Call Requested by Amy Vezza
2007-07-25
19 Cullen Jennings Placed on agenda for telechat - 2007-08-23 by Cullen Jennings
2007-07-25
19 Cullen Jennings State Changes to Last Call Requested from AD Evaluation by Cullen Jennings
2007-07-25
19 Cullen Jennings Last Call was requested by Cullen Jennings
2007-07-25
19 (System) Ballot writeup text was added
2007-07-25
19 (System) Last call text was added
2007-07-25
19 (System) Ballot approval text was added
2007-07-25
19 Cullen Jennings State Changes to AD Evaluation from Publication Requested by Cullen Jennings
2007-07-25
19 Cullen Jennings
2007-07-25
19 Cullen Jennings State Changes to Publication Requested from AD is watching by Cullen Jennings
2007-07-25
19 Cullen Jennings [Note]: 'Proto Shepherd is Jean-Francois Mule' added by Cullen Jennings
2007-07-25
19 Cullen Jennings

--- Document Shepherd Write-Up for:
---          draft-ietf-mmusic-ice-17.txt

The procedures described in RFC 4858 (a.k.a. the PROTO process) are
being used for …

--- Document Shepherd Write-Up for:
---          draft-ietf-mmusic-ice-17.txt

The procedures described in RFC 4858 (a.k.a. the PROTO process) are
being used for the MMUSIC Internet-Draft titled "Interactive
Connectivity Establishment (ICE): A Protocol for Network Address
Translator (NAT) Traversal for Offer/Answer Protocols",
draft-ietf-mmusic-ice-17,
http://tools.ietf.org/html/draft-ietf-mmusic-ice-17

Requested Publication Status: Proposed Standard
Document Shepherd: Jean-Francois Mule (jf.mule@cablelabs.com)

--------------------------------------------------------------------
--- (1.a)
    Who is the Document Shepherd for this document?  Has the
    Document Shepherd personally reviewed this version of the
    document and, in particular, does he or she believe this
    version is ready for forwarding to the IESG for publication?

Jean-Francois Mule, MMUSIC co-chair (jf.mule@cablelabs.com) is the
Document Shepherd. He has personally reviewed this version of the
Internet-Draft.
Based on the WG discussion and Document Shepherd review, I believe this
version is ready for forwarding to the IESG for publication.


--- (1.b)
    Has the document had adequate review both from key WG members
    and from key non-WG members?  Does the Document Shepherd have
    any concerns about the depth or breadth of the reviews that
    have been performed?

Yes, ICE has received numerous reviews from participants and
subject-matter experts that are WG members, implementers or IAB members
who provided valuable comments to improve the quality of the protocol.
The Document Shepherd has no concerns about the depth of the reviews
that have been performed.

--- (1.c)
    Does the Document Shepherd have concerns that the document
    needs more review from a particular or broader perspective,
    e.g., security, operational complexity, someone familiar with
    AAA, internationalization, or XML?

This Internet-Draft has been the subject of IETF-wide tutorials and
topics related to ICE have been presented or discussed on various lists
outside MMUSIC including SIP, sipping, behave, and v6ops.
I have no particular concerns re: more reviews. Additional reviews from
folks outside the RAI area is certainly welcome, for e.g. in the
Transport area (in particular behave and midcom), and in the Operations
and Management area (in particular v6ops for ICE usage in dual-stack and
multihomed hosts).

--- (1.d)

    Does the Document Shepherd have any specific concerns or
    issues with this document that the Responsible Area Director
    and/or the IESG should be aware of?  For example, perhaps he
    or she is uncomfortable with certain parts of the document, or
    has concerns whether there really is a need for it.  In any
    event, if the WG has discussed those issues and has indicated
    that it still wishes to advance the document, detail those
    concerns here. 
No concerns given the 3 week WGLC and the additional extended WGLC
(2-week period after all the WGLC comments had been addressed).

    Has an IPR disclosure related to this document
    been filed?  If so, please include a reference to the
    disclosure and summarize the WG discussion and conclusion on
    this issue.

Yes. IPR disclosures have been filed and announced to the list by the wg
chairs. More details can be found at:
https://datatracker.ietf.org/ipr/search/?option=document_search&id_docum
ent_tag=11119


--- (1.e) 
    How solid is the WG consensus behind this document?  Does it
    represent the strong concurrence of a few individuals, with
    others being silent, or does the WG as a whole understand and
    agree with it?

There is solid consensus.

--- (1.f)
    Has anyone threatened an appeal or otherwise indicated extreme
    discontent?  If so, please summarize the areas of conflict in
    separate email messages to the Responsible Area Director.  (It
    should be in a separate email because this questionnaire is
    entered into the ID Tracker.)

No.

--- (1.g)
    Has the Document Shepherd personally verified that the
    document satisfies all ID nits?  (See
    http://www.ietf.org/ID-Checklist.html and
    http://tools.ietf.org/tools/idnits/).  Boilerplate checks are
    not enough; this check needs to be thorough.  Has the
    document met all formal review criteria it needs to, such as
    the MIB Doctor, media type and URI type reviews?


Yes, draft-17 was checked against idnits 2.04.12.
The document uses IPv4 addresses from the RFC1918 private address space
in examples and I believe this is fine given its applicability to
environments in presence of NAT. While IDnits produces warning, the use
of the net10 address space seems appropriate: warnings can be ignored.
The rest of the IDnits are minor and can be fixed in a future revision.

The idnits check (version 2.04.09) with the verbose setting yielded the
following output:

idnits 2.04.12

tmp/draft-ietf-mmusic-ice-17.txt:
tmp/draft-ietf-mmusic-ice-17.txt(1516): Found possible IPv4 address
'10.0.1.1' in position 44; this doesn't match RFC3330's suggested
192.0.2.0/24 address range.
tmp/draft-ietf-mmusic-ice-17.txt(1526): Found possible IPv4 address
'10.0.1.1' in position 39; this doesn't match RFC3330's suggested
192.0.2.0/24 address range.
tmp/draft-ietf-mmusic-ice-17.txt(1528): Found possible IPv4 address
'10.0.1.1' in position 4; this doesn't match RFC3330's suggested
192.0.2.0/24 address range.
tmp/draft-ietf-mmusic-ice-17.txt(4245): Found possible IPv4 address
'10.0.1.1' in position 19; this doesn't match RFC3330's suggested
192.0.2.0/24 address range.
tmp/draft-ietf-mmusic-ice-17.txt(4435): Found possible IPv4 address
'10.0.1.1' in position 44; this doesn't match RFC3330's suggested
192.0.2.0/24 address range.
tmp/draft-ietf-mmusic-ice-17.txt(4445): Found possible IPv4 address
'10.0.1.1' in position 39; this doesn't match RFC3330's suggested
192.0.2.0/24 address range.
tmp/draft-ietf-mmusic-ice-17.txt(4447): Found possible IPv4 address
'10.0.1.1' in position 4; this doesn't match RFC3330's suggested
192.0.2.0/24 address range.
tmp/draft-ietf-mmusic-ice-17.txt(5161): Line is too long: the offending
characters are 'or'
tmp/draft-ietf-mmusic-ice-17.txt(5307): Unexpected reference format:
'...ed NA[P]Ts an...'
tmp/draft-ietf-mmusic-ice-17.txt(5747): Found possible IPv4 address
'10.0.1.101' in position 45; this doesn't match RFC3330's suggested
192.0.2.0/24 address range.
tmp/draft-ietf-mmusic-ice-17.txt(5756): Found possible IPv4 address
'10.0.1.100' in position 4; this doesn't match RFC3330's suggested
192.0.2.0/24 address range.
tmp/draft-ietf-mmusic-ice-17.txt(5759): Found possible IPv4 address
'192.168.1.100' in position 4; this doesn't match RFC3330's suggested
192.0.2.0/24 address range.
tmp/draft-ietf-mmusic-ice-17.txt(5774): Found possible IPv4 address
'192.168.1.100' in position 21; this doesn't match RFC3330's suggested
192.0.2.0/24 address range.
tmp/draft-ietf-mmusic-ice-17.txt(5775): Found possible IPv4 address
'10.0.1.100' in position 45; this doesn't match RFC3330's suggested
192.0.2.0/24 address range.
tmp/draft-ietf-mmusic-ice-17.txt(5779): Found possible IPv4 address
'192.168.1.100' in position 49; this doesn't match RFC3330's suggested
192.0.2.0/24 address range.
tmp/draft-ietf-mmusic-ice-17.txt(5780): Found possible IPv4 address
'10.0.1.100' in position 37; this doesn't match RFC3330's suggested
192.0.2.0/24 address range.
tmp/draft-ietf-mmusic-ice-17.txt(5828): Found possible IPv4 address
'10.0.0.0' in position 19; this doesn't match RFC3330's suggested
192.0.2.0/24 address range.
tmp/draft-ietf-mmusic-ice-17.txt(5829): Found possible IPv4 address
'10.0.0.0' in position 18; this doesn't match RFC3330's suggested
192.0.2.0/24 address range.
tmp/draft-ietf-mmusic-ice-17.txt(5830): Found possible IPv4 address
'10.0.1.1' in position 12; this doesn't match RFC3330's suggested
192.0.2.0/24 address range.
tmp/draft-ietf-mmusic-ice-17.txt(5832): Found possible IPv4 address
'10.0.1.1' in position 4; this doesn't match RFC3330's suggested
192.0.2.0/24 address range.
tmp/draft-ietf-mmusic-ice-17.txt(5833): Found possible IPv4 address
'10.0.1.1' in position 41; this doesn't match RFC3330's suggested
192.0.2.0/24 address range.
tmp/draft-ietf-mmusic-ice-17.txt(5836): Found possible IPv4 address
'10.0.1.1' in position 4; this doesn't match RFC3330's suggested
192.0.2.0/24 address range.


  Checking boilerplate required by RFC 3978 and 3979, updated by RFC
4748
:

------------------------------------------------------------------------
----

    No issues found here.

  Checking nits according to
http://www.ietf.org/ietf/1id-guidelines.txt:

------------------------------------------------------------------------
----

    No issues found here.

  Checking nits according to http://www.ietf.org/ID-Checklist.html:

------------------------------------------------------------------------
----

  ** There is 1 instance of too long lines in the document, the longest
one
    being 2 characters in excess of 72.

  == There are 20 instances of lines with private range IPv4 addresses
in the
    document.  If these are generic example addresses, they should be
changed
    to use the 192.0.2.x range defined in RFC 3330.


  Miscellaneous warnings:

------------------------------------------------------------------------
----

    No issues found here.

  Checking references for intended status: Proposed Standard

------------------------------------------------------------------------
----

    (See RFC 3967 for information about using normative references to
    lower-maturity documents in RFCs)
  == Unused Reference: 'RFC3556' is defined on line 4472, but no
explicit
    reference was found in the text
    '[RFC3556]  Casner, S., "Session Description Protocol (SDP)
Bandwidth...'

  == Outdated reference: A later version (-04) exists of
    draft-ietf-behave-turn-03

  == Outdated reference: A later version (-10) exists of
    draft-ietf-sip-outbound-09


    Summary: 1 error (**), 4 warnings (==), 0 comments (--).

------------------------------------------------------------------------
--------


--- (1.h)
    Has the document split its references into normative and
    informative? 
Yes.

    Are there normative references to documents that
    are not ready for advancement or are otherwise in an unclear
    state?  If such normative references exist, what is the
    strategy for their completion? 
There are 3 normative references to IETF Internet-Drafts; see the
comments below & inline for the strategy for their completion.

  [I-D.ietf-behave-rfc3489bis]
              Rosenberg, J., "Session Traversal Utilities for (NAT)
              (STUN)", draft-ietf-behave-rfc3489bis-06 (work in
              progress), March 2007.
This document is active in the BEHAVE working group and a 2-week WGLC is
expected to complete in August 2007.

  [I-D.ietf-behave-turn]
              Rosenberg, J., "Obtaining Relay Addresses from Simple
              Traversal Underneath NAT (STUN)",
              draft-ietf-behave-turn-03 (work in progress), March 2007.
This document is active but is not yet ready for WGLC. Expected WGLC in
the fall of 2007.


  [I-D.ietf-sip-ice-option-tag]
              Rosenberg, J., "Indicating Support for Interactive
              Connectivity Establishment (ICE) in the Session
              Initiation Protocol (SIP)",
              draft-ietf-sip-ice-option-tag-02 (work in progress),
              June 2007.
This document has passed WGLC and a publication request as a Proposed
Standard has been submitted.

    Are there normative references
    that are downward references, as described in [RFC3967]?  If
    so, list these downward references to support the Area
    Director in the Last Call procedure for them [RFC3967].
No.

--- (1.i)
    Has the Document Shepherd verified that the document's IANA
    Considerations section exists and is consistent with the body
    of the document? 
Yes.

    If the document specifies protocol
    extensions, are reservations requested in appropriate IANA
    registries?
Yes.
    Are the IANA registries clearly identified?
Yes; a dependency exists on the creation the STUN registry per
I-D.ietf-behave-rfc3489bis.

    If the document creates a new registry, does it define the
    proposed initial contents of the registry and an allocation
    procedure for future registrations?  Does it suggest a
    reasonable name for the new registry?  See [RFC2434].  If the
    document describes an Expert Review process, has the Document
    Shepherd conferred with the Responsible Area Director so that
    the IESG can appoint the needed Expert during IESG Evaluation?
This document does not create a new registry but proposes new values be
registered in the existing SDP registry and in the to-be-created STUN
one. For SDP, the document registers new attribute names and follows the
requirements defined in RFC 4566 Section 8.2.4. ("Specification
Required" policy per RFC 2434 and all the required information is
provided).
For STUN, the document registers STUN attributes and one error code
(20.2 and 20.3) and it is compliant with the rules defined by
http://tools.ietf.org/html/draft-ietf-behave-rfc3489bis Sections 17.2
and 17.3.

--- (1.j)
    Has the Document Shepherd verified that sections of the
    document that are written in a formal language, such as XML
    code, BNF rules, MIB definitions, etc., validate correctly in
    an automated checker?

Yes, checked aBNF with http://www.apps.ietf.org/abnf.html. Results
included undefined and unreferenced rules (to be expected) but no
errors.


--- (1.k)
    The IESG approval announcement includes a Document
    Announcement Write-Up.  Please provide such a Document
    Announcement Write-Up.  Recent examples can be found in the
    "Action" announcements for approved documents.  The approval
    announcement contains the following sections:
    Technical Summary
        Relevant content can frequently be found in the abstract
        and/or introduction of the document.  If not, this may be
        an indication that there are deficiencies in the abstract
        or introduction.

    Working Group Summary
        Was there anything in the WG process that is worth noting?
        For example, was there controversy about particular points
        or were there decisions where the consensus was
        particularly rough?
    Document Quality
        Are there existing implementations of the protocol?  Have a
        significant number of vendors indicated their plan to
        implement the specification?  Are there any reviewers that
        merit special mention as having done a thorough review,
        e.g., one that resulted in important changes or a
        conclusion that the document had no substantive issues?  If
        there was a MIB Doctor, Media Type, or other Expert Review,
        what was its course (briefly)?  In the case of a Media Type
        Review, on what date was the request posted?

    Personnel
        Who is the Document Shepherd for this document?  Who is the
        Responsible Area Director?  If the document requires IANA
        experts(s), insert 'The IANA Expert(s) for the registries
        in this document are .'


Here is the proposed Document Announcement Write-Up:

        Technical Summary
This document defines a protocol for Network Address Translator (NAT)
traversal for multimedia sessions established with the offer/answer
model.  This protocol is called Interactive Connectivity Establishment
(ICE).  ICE makes use of the Session Traversal Utilities for NAT (STUN)
protocol and its extension, Traversal Using Relay NAT (TURN).  ICE can
be used by any protocol utilizing the offer/answer model, such as the
Session Initiation Protocol (SIP).

          Working Group Summary
The MMUSIC Working Group has consensus to publish this document as a
Proposed Standard.

          Document Quality
Previous versions of this protocol have been implemented. A number of
implementers have indicated plans to support this protocol once
published.

      Personnel
The Document Shepherd is Jean-Francois Mule, and the Responsible Area
Director is Cullen Jennings.
2007-07-12
17 (System) New version available: draft-ietf-mmusic-ice-17.txt
2007-06-12
16 (System) New version available: draft-ietf-mmusic-ice-16.txt
2007-04-13
(System) Posted related IPR disclosure: Tandberg Telecom AS's statement about IPR claimed in draft-ietf-mmusic-ice-15.txt
2007-04-03
(System) Posted related IPR disclosure: Tandberg Telecom AS's statement about IPR claimed in draft-ietf-mmusic-ice-15.txt
2007-03-28
15 (System) New version available: draft-ietf-mmusic-ice-15.txt
2007-03-07
14 (System) New version available: draft-ietf-mmusic-ice-14.txt
2007-01-22
(System) Posted related IPR disclosure: Cisco's Statement about IPR claimed in draft-ietf-mmusic-ice-13
2007-01-17
13 (System) New version available: draft-ietf-mmusic-ice-13.txt
2006-11-14
19 Cullen Jennings State Change Notice email list have been change to mmusic-chairs@tools.ietf.org, behave-chairs@tools.ietf.org, philip_matthews@magma.ca, fluffy@cisco.om from mmusic-chairs@tools.ietf.org
2006-11-14
19 Cullen Jennings Draft Added by Cullen Jennings in state AD is watching
2006-10-26
12 (System) New version available: draft-ietf-mmusic-ice-12.txt
2006-10-09
11 (System) New version available: draft-ietf-mmusic-ice-11.txt
2006-08-31
10 (System) New version available: draft-ietf-mmusic-ice-10.txt
2006-06-29
09 (System) New version available: draft-ietf-mmusic-ice-09.txt
2006-06-25
(System) Posted related IPR disclosure: Tandberg Telecom AS's statement about IPR claimed in draft-ietf-mmusic-ice-08.txt
2006-03-30
08 (System) New version available: draft-ietf-mmusic-ice-08.txt
2006-03-09
07 (System) New version available: draft-ietf-mmusic-ice-07.txt
2005-12-09
(System) Posted related IPR disclosure: Tandberg Telecom AS's statement about IPR claimed in draft-ietf-mmusic-ice-06.txt
2005-12-06
(System) Posted related IPR disclosure: Tandberg Telecom AS's statement about IPR claimed in draft-ietf-mmusic-ice-06.txt
2005-10-21
06 (System) New version available: draft-ietf-mmusic-ice-06.txt
2005-07-20
05 (System) New version available: draft-ietf-mmusic-ice-05.txt
2005-02-23
04 (System) New version available: draft-ietf-mmusic-ice-04.txt
2004-10-27
03 (System) New version available: draft-ietf-mmusic-ice-03.txt
2004-07-22
02 (System) New version available: draft-ietf-mmusic-ice-02.txt
2004-02-17
01 (System) New version available: draft-ietf-mmusic-ice-01.txt
2003-10-29
00 (System) New version available: draft-ietf-mmusic-ice-00.txt