Skip to main content

UDP Transport Layer (UDPTL) over Datagram Transport Layer Security (DTLS)
draft-ietf-mmusic-udptl-dtls-10

Revision differences

Document history

Date Rev. By Action
2014-08-19
10 (System) RFC Editor state changed to AUTH48-DONE from AUTH48
2014-08-01
10 (System) RFC Editor state changed to AUTH48 from RFC-EDITOR
2014-07-30
10 (System) RFC Editor state changed to RFC-EDITOR from EDIT
2014-06-24
10 Gunter Van de Velde Closed request for Last Call review by OPSDIR with state 'No Response'
2014-06-24
10 Amy Vezza IESG state changed to RFC Ed Queue from Approved-announcement sent
2014-06-24
10 (System) IANA Action state changed to RFC-Ed-Ack from Waiting on RFC Editor
2014-06-23
10 (System) RFC Editor state changed to EDIT
2014-06-23
10 (System) Announcement was received by RFC Editor
2014-06-23
10 (System) IANA Action state changed to Waiting on RFC Editor from Waiting on Authors
2014-06-23
10 (System) IANA Action state changed to Waiting on Authors from In Progress
2014-06-23
10 (System) IANA Action state changed to In Progress
2014-06-23
10 Amy Vezza IESG state changed to Approved-announcement sent from Approved-announcement to be sent
2014-06-23
10 Amy Vezza IESG has approved the document
2014-06-23
10 Amy Vezza Closed "Approve" ballot
2014-06-23
10 Amy Vezza Ballot approval text was generated
2014-06-23
10 Amy Vezza IESG state changed to Approved-announcement to be sent from IESG Evaluation::AD Followup
2014-06-20
10 Christer Holmberg New version available: draft-ietf-mmusic-udptl-dtls-10.txt
2014-06-19
09 Tero Kivinen Closed request for Last Call review by SECDIR with state 'No Response'
2014-06-16
09 Christer Holmberg New version available: draft-ietf-mmusic-udptl-dtls-09.txt
2014-06-14
08 Stephen Farrell [Ballot comment]

Thanks for adding the crypto alg detail.
2014-06-14
08 Stephen Farrell [Ballot Position Update] Position for Stephen Farrell has been changed to No Objection from Discuss
2014-06-14
08 (System) Sub state has been changed to AD Followup from Revised ID Needed
2014-06-14
08 Christer Holmberg IANA Review state changed to Version Changed - Review Needed from IANA OK - Actions Needed
2014-06-14
08 Christer Holmberg New version available: draft-ietf-mmusic-udptl-dtls-08.txt
2014-06-12
07 Kathleen Moriarty [Ballot comment]
Thank you very much for the updated introduction.  This helps a lot to clarify the purpose of the work.
2014-06-12
07 Kathleen Moriarty [Ballot Position Update] Position for Kathleen Moriarty has been changed to No Objection from Discuss
2014-06-12
07 Cindy Morgan IESG state changed to IESG Evaluation::Revised I-D Needed from Waiting for AD Go-Ahead
2014-06-12
07 Stephen Farrell
[Ballot discuss]


Apologies for the brief review, (I'm a bit short of time;-)
but I have the following questions:

(1) Don't you need to mandate …
[Ballot discuss]


Apologies for the brief review, (I'm a bit short of time;-)
but I have the following questions:

(1) Don't you need to mandate sha-256 as MTI for the rfc4572 fingerprint ?

(2) What DTLS ciphersuites are MTI?

(MTI = mandatory to implement, just in case:-)
2014-06-12
07 Stephen Farrell [Ballot Position Update] New position, Discuss, has been recorded for Stephen Farrell
2014-06-12
07 Benoît Claise [Ballot Position Update] New position, No Objection, has been recorded for Benoit Claise
2014-06-12
07 Barry Leiba
[Ballot comment]
UPDATE:
I asked Dave Crocker for a review, as he chaired the fax working group, way back when.  One comment that he made, …
[Ballot comment]
UPDATE:
I asked Dave Crocker for a review, as he chaired the fax working group, way back when.  One comment that he made, which I agree with and want to pass on, is this:

<< When the technical details of a reference are so fundamental to a new specification, I prefer the citation to it to be as precise as possible, to save the reader from having to do searching.  Hence I suggest that the initial reference to UDPTL should explicitly cite "Section 9" of the t38.2010 doc. >>

-----

Christer has responded to all my earlier comments; I leave the responses here for the record.  Thanks!

-- Section 4.2 --

  The offerer SHOULD assign the SDP "setup" attribute with a value of
  "actpass".  Alternatively, the offerer MAY assign the SDP "setup"
  attribute with a value of "active" or "passive".  The offerer MUST
  NOT assign an SDP "setup" attribute with a "holdconn" value.

Standard SHOULD/MAY problem: MAY is not an alternative to SHOULD; MAY is entirely optional.

In order to resolve this, let me first ask *why* the offerer SHOULD set "setup" to "actpass", under what conditions might the offerer need to use "active" or "passive" instead, and what are the consequences of doing that?

-------------------------

RESPONSE:
Setting the value to "actpass" allows the terminating endpoint to determine the TLS role, ie which endpoint will send ClientHello.

"active" or "passive" is used if the offerer, for whatever reason, insists on being either the sender (TLS client) or receiver (TLS server) of the ClientHello.

In order to solve the SHOULD/MAY problem, I suggest the following modified text:

        The offerer SHOULD assign the SDP "setup" attribute with a value of
        "actpass", unless it insists on being either the sender or receiver of the
        DTLS ClientHello message, in which case it can use either a value of
        "active" (sender of ClientHello) or "passive" (receiver of ClientHello).

---------------------------------------------------

-- Section 5.2.2 --

  The UA MUST demultiplex packets arriving on the IP address and port
  associated with the DTLS association, e.g. as follows:

I'm not sure what the "e.g. as follows" is saying.  Are the two bullets meant to be one example how how one might demultiplex the packets, and there are also other ways one might do it?  Are the two bullets a suggested way, or just an example?  Or is there some other sense that I'm not seeing? 

-------------------------

RESPONSE:
The idea is to mandate support of the mechanism described in the document, but to not prevent usage of alternative future mechanisms.

I agree that the current text is a little confusing, so I suggest the following modified text:

        "The UA MUST support the following mechanism for
        demultiplexing packets arriving on the IP address and
        port associated with the DTLS association:"

        o  If the value of the first byte of the packet is 0 or 1, then the
        packet is STUN.
        o  If the value of the first byte of the packet is between 20 and 63
        (inclusive), the packet is DTLS."

---------------------------------------------------

Very, very small, tiny point, which you can completely ignore if you like: "SHALL" and "MUST" mean exactly the same thing, and I always find it preferable to use one or the other, consistently.  You mostly use "MUST", but in Sections 3, 5.1, and 5.2.2 you have one instance each of "SHALL".  I mildly, mildly suggest that you change those three to "MUST", to be consistent.

-------------------------

RESPONSE:
I agree with you, and I am happy to replace SHALL with MUST.

---------------------------------------------------

-- Section 4.4 --

  When the offerer receives an SDP answer and, if the offerer ends up
  being active it MUST initiate a DTLS handshake by sending a DTLS
  ClientHello message on the negotiated media stream, towards the IP
  address and port of the answerer.

That reads oddly to me, mostly, I think, because of the "and, if" bit.  Maybe you just need to delete the comma and the "if".  Alternatively, you could delete "and".

-------------------------

RESPONSE:
I suggest to remove "and".

        "When the offerer receives an SDP answer, if the offerer ends up
        being active it MUST initiate a DTLS handshake by sending a DTLS
        ClientHello message on the negotiated media stream, towards the IP
        address and port of the answerer."

---------------------------------------------------

-- Section 5.3 --

  After the DTLS handshake caused by rekeying has completed, because of
  possible packet reordering on the wire, packets protected by the
  previous set of keys can arrive.

That sentence seems awkward because things come in an odd order -- kind of backward.  May I suggest this?:

NEW
  During rekeying, packets protected by the previous set of keys can
  arrive after the DTLS handshake caused by rekeying has completed,
  because packets can be reordered on the wire.
END

-------------------------

RESPONSE:
Looks good. I'll update as suggested.

---------------------------------------------------

-- Section 6 --

  The standard DTLS strategy for authenticating the communicating
  parties is to give the server (and optionally the client) a PKIX
  [RFC5280] certificate.  The client then verifies the certificate and
  checks that the name in the certificate matches the server's domain
  name.  This works because there are a relatively small number of
  servers with well-defined names; a situation that does not usually
  occur in the VoIP context.

I don't follow the last sentence.  I don't understand why there are relatively few servers that have well defined names.  I don't see why that's important with respect to how authentication by cert validation works.  And I don't get how this relates to VoIP.  Can you explain, please?

-------------------------

RESPONSE:
We borrowed the text from RFC 5763.

However, I agree that the VoIP text is confusing, and suggest the following modified text:

        "The standard DTLS strategy for authenticating the communicating
        parties is to give the server (and optionally the client) a PKIX
        [RFC5280] certificate.  The client then verifies the certificate and
        checks that the name in the certificate matches the server's domain
        name.  This works because there are a relatively small number of
        servers and the cost for issuing and deploying PKIX certificates can
        be justified. Issuing and deploying PKIX certificates to all clients is
        not realistic in most deployment scenarios."

---------------------------------------------------
2014-06-12
07 Barry Leiba Ballot comment text updated for Barry Leiba
2014-06-11
07 Joel Jaeggli [Ballot Position Update] New position, No Objection, has been recorded for Joel Jaeggli
2014-06-11
07 Richard Barnes [Ballot Position Update] New position, No Objection, has been recorded for Richard Barnes
2014-06-11
07 Adrian Farrel [Ballot Position Update] New position, No Objection, has been recorded for Adrian Farrel
2014-06-11
07 Kathleen Moriarty
[Ballot discuss]
Thanks to Pete for raising questions on the introduction.  From the discussion so far, I think this will be easy to resolve, but …
[Ballot discuss]
Thanks to Pete for raising questions on the introduction.  From the discussion so far, I think this will be easy to resolve, but would like to make sure that happens for clarity in the document, so I am using this Discuss as a placeholder for that.

From Pete's comment, the introduction is not clear as to why this solution is needed.  When you dig deeper, (and it takes a bit of researching), you can see that a solution is needed for secure IP transport.  I'd like to see the introduction expanded to better explain the problem and existing gap.  The transition to IP from telephony protocols (T.30) makes sense as a major motivation.  An issue that comes up for someone new to this is that the T.30 document explains the solution as an application layer approach that applies to any protocol, so there must be a gap here that the experts are aware of and can explain. 
With the current text on existing solutions, the reader has to know a lot more to understand T.38 RTP and UDPTL.  The listed solutions talk about T.30 and RTP, so unless the reader knows they are competing solutions (doesn't say that in the introduction, just puts them both in the T.38 document for reference), they won't know why this doesn't fit the bill.

If you start searching around, RFC4612 section 3 must have been written before UDPTL tool off and gained the market share.  I am including all of this so you might see where someone new to this work would need additional information in the introduction to better set the understanding for the reader.

I had suspected when I read it yesterday that the main reason was that traditional faxing is going away and integration with applications is needed for how people work, but that is not said anywhere.  Regulatory requirements also drive this with the need for transport encryption (no need to name the many ones as they will change and evolve).
2014-06-11
07 Kathleen Moriarty [Ballot Position Update] New position, Discuss, has been recorded for Kathleen Moriarty
2014-06-11
07 Martin Stiemerling [Ballot Position Update] New position, No Objection, has been recorded for Martin Stiemerling
2014-06-10
07 Pete Resnick
[Ballot comment]
I will simply ask this as a question; I have no intention of DISCUSSing it. If the SEC ADs are interested, they are …
[Ballot comment]
I will simply ask this as a question; I have no intention of DISCUSSing it. If the SEC ADs are interested, they are in a much better position to DISCUSS:

Given that there's confidentiality/integrity protection available at the application layer, I was left to wonder why 3GPP wanted to do it at the transport layer. I'm worried that the reason they want to do this is in order to more easily *violate* confidentiality: Doing it at the transport layer means that intermediaries can peek at the contents of the FAX, whereas doing it at the application layer prevents everybody but the end users from being able to peek. Is that what's going on here? If so, and if this is considered a reasonable thing to want to do, that should probably be called out as a potential vulnerability in the security considerations (or perhaps a new privacy considerations) section.

Sorry for thinking nefarious thoughts, but I've got to ask.
2014-06-10
07 Pete Resnick [Ballot Position Update] New position, No Objection, has been recorded for Pete Resnick
2014-06-10
07 Alia Atlas [Ballot Position Update] New position, No Objection, has been recorded for Alia Atlas
2014-06-10
07 Jari Arkko [Ballot Position Update] New position, No Objection, has been recorded for Jari Arkko
2014-06-10
07 (System) IESG state changed to Waiting for AD Go-Ahead from In Last Call
2014-06-09
07 Spencer Dawkins [Ballot comment]
Thank you for producing this document. If I was more familiar with the details, I'd have balloted "yes".
2014-06-09
07 Spencer Dawkins [Ballot Position Update] New position, No Objection, has been recorded for Spencer Dawkins
2014-06-09
07 Brian Haberman [Ballot Position Update] New position, No Objection, has been recorded for Brian Haberman
2014-06-09
07 Barry Leiba
[Ballot comment]
Christer has responded to all my comments; I leave the responses here for the record.  Thanks!

-- Section 4.2 --

  The offerer …
[Ballot comment]
Christer has responded to all my comments; I leave the responses here for the record.  Thanks!

-- Section 4.2 --

  The offerer SHOULD assign the SDP "setup" attribute with a value of
  "actpass".  Alternatively, the offerer MAY assign the SDP "setup"
  attribute with a value of "active" or "passive".  The offerer MUST
  NOT assign an SDP "setup" attribute with a "holdconn" value.

Standard SHOULD/MAY problem: MAY is not an alternative to SHOULD; MAY is entirely optional.

In order to resolve this, let me first ask *why* the offerer SHOULD set "setup" to "actpass", under what conditions might the offerer need to use "active" or "passive" instead, and what are the consequences of doing that?

-------------------------

RESPONSE:
Setting the value to "actpass" allows the terminating endpoint to determine the TLS role, ie which endpoint will send ClientHello.

"active" or "passive" is used if the offerer, for whatever reason, insists on being either the sender (TLS client) or receiver (TLS server) of the ClientHello.

In order to solve the SHOULD/MAY problem, I suggest the following modified text:

        The offerer SHOULD assign the SDP "setup" attribute with a value of
        "actpass", unless it insists on being either the sender or receiver of the
        DTLS ClientHello message, in which case it can use either a value of
        "active" (sender of ClientHello) or "passive" (receiver of ClientHello).

---------------------------------------------------

-- Section 5.2.2 --

  The UA MUST demultiplex packets arriving on the IP address and port
  associated with the DTLS association, e.g. as follows:

I'm not sure what the "e.g. as follows" is saying.  Are the two bullets meant to be one example how how one might demultiplex the packets, and there are also other ways one might do it?  Are the two bullets a suggested way, or just an example?  Or is there some other sense that I'm not seeing? 

-------------------------

RESPONSE:
The idea is to mandate support of the mechanism described in the document, but to not prevent usage of alternative future mechanisms.

I agree that the current text is a little confusing, so I suggest the following modified text:

        "The UA MUST support the following mechanism for
        demultiplexing packets arriving on the IP address and
        port associated with the DTLS association:"

        o  If the value of the first byte of the packet is 0 or 1, then the
        packet is STUN.
        o  If the value of the first byte of the packet is between 20 and 63
        (inclusive), the packet is DTLS."

---------------------------------------------------

Very, very small, tiny point, which you can completely ignore if you like: "SHALL" and "MUST" mean exactly the same thing, and I always find it preferable to use one or the other, consistently.  You mostly use "MUST", but in Sections 3, 5.1, and 5.2.2 you have one instance each of "SHALL".  I mildly, mildly suggest that you change those three to "MUST", to be consistent.

-------------------------

RESPONSE:
I agree with you, and I am happy to replace SHALL with MUST.

---------------------------------------------------

-- Section 4.4 --

  When the offerer receives an SDP answer and, if the offerer ends up
  being active it MUST initiate a DTLS handshake by sending a DTLS
  ClientHello message on the negotiated media stream, towards the IP
  address and port of the answerer.

That reads oddly to me, mostly, I think, because of the "and, if" bit.  Maybe you just need to delete the comma and the "if".  Alternatively, you could delete "and".

-------------------------

RESPONSE:
I suggest to remove "and".

        "When the offerer receives an SDP answer, if the offerer ends up
        being active it MUST initiate a DTLS handshake by sending a DTLS
        ClientHello message on the negotiated media stream, towards the IP
        address and port of the answerer."

---------------------------------------------------

-- Section 5.3 --

  After the DTLS handshake caused by rekeying has completed, because of
  possible packet reordering on the wire, packets protected by the
  previous set of keys can arrive.

That sentence seems awkward because things come in an odd order -- kind of backward.  May I suggest this?:

NEW
  During rekeying, packets protected by the previous set of keys can
  arrive after the DTLS handshake caused by rekeying has completed,
  because packets can be reordered on the wire.
END

-------------------------

RESPONSE:
Looks good. I'll update as suggested.

---------------------------------------------------

-- Section 6 --

  The standard DTLS strategy for authenticating the communicating
  parties is to give the server (and optionally the client) a PKIX
  [RFC5280] certificate.  The client then verifies the certificate and
  checks that the name in the certificate matches the server's domain
  name.  This works because there are a relatively small number of
  servers with well-defined names; a situation that does not usually
  occur in the VoIP context.

I don't follow the last sentence.  I don't understand why there are relatively few servers that have well defined names.  I don't see why that's important with respect to how authentication by cert validation works.  And I don't get how this relates to VoIP.  Can you explain, please?

-------------------------

RESPONSE:
We borrowed the text from RFC 5763.

However, I agree that the VoIP text is confusing, and suggest the following modified text:

        "The standard DTLS strategy for authenticating the communicating
        parties is to give the server (and optionally the client) a PKIX
        [RFC5280] certificate.  The client then verifies the certificate and
        checks that the name in the certificate matches the server's domain
        name.  This works because there are a relatively small number of
        servers and the cost for issuing and deploying PKIX certificates can
        be justified. Issuing and deploying PKIX certificates to all clients is
        not realistic in most deployment scenarios."

---------------------------------------------------
2014-06-09
07 Barry Leiba [Ballot Position Update] Position for Barry Leiba has been changed to No Objection from Discuss
2014-06-06
07 Barry Leiba
[Ballot discuss]
I have two small things I'd like to discuss, which should be easy to sort out:

-- Section 4.2 --

  The offerer …
[Ballot discuss]
I have two small things I'd like to discuss, which should be easy to sort out:

-- Section 4.2 --

  The offerer SHOULD assign the SDP "setup" attribute with a value of
  "actpass".  Alternatively, the offerer MAY assign the SDP "setup"
  attribute with a value of "active" or "passive".  The offerer MUST
  NOT assign an SDP "setup" attribute with a "holdconn" value.

Standard SHOULD/MAY problem: MAY is not an alternative to SHOULD; MAY is entirely optional.

In order to resolve this, let me first ask *why* the offerer SHOULD set "setup" to "actpass", under what conditions might the offerer need to use "active" or "passive" instead, and what are the consequences of doing that?

-- Section 5.2.2 --

  The UA MUST demultiplex packets arriving on the IP address and port
  associated with the DTLS association, e.g. as follows:

I'm not sure what the "e.g. as follows" is saying.  Are the two bullets meant to be one example how how one might demultiplex the packets, and there are also other ways one might do it?  Are the two bullets a suggested way, or just an example?  Or is there some other sense that I'm not seeing?  (And what if the first byte of the packet is between 2 and 19?)
2014-06-06
07 Barry Leiba
[Ballot comment]
Very, very small, tiny point, which you can completely ignore if you like: "SHALL" and "MUST" mean exactly the same thing, and I …
[Ballot comment]
Very, very small, tiny point, which you can completely ignore if you like: "SHALL" and "MUST" mean exactly the same thing, and I always find it preferable to use one or the other, consistently.  You mostly use "MUST", but in Sections 3, 5.1, and 5.2.2 you have one instance each of "SHALL".  I mildly, mildly suggest that you change those three to "MUST", to be consistent.

-- Section 4.4 --

  When the offerer receives an SDP answer and, if the offerer ends up
  being active it MUST initiate a DTLS handshake by sending a DTLS
  ClientHello message on the negotiated media stream, towards the IP
  address and port of the answerer.

That reads oddly to me, mostly, I think, because of the "and, if" bit.  Maybe you just need to delete the comma and the "if".  Alternatively, you could delete "and".

-- Section 5.3 --

  After the DTLS handshake caused by rekeying has completed, because of
  possible packet reordering on the wire, packets protected by the
  previous set of keys can arrive.

That sentence seems awkward because things come in an odd order -- kind of backward.  May I suggest this?:

NEW
  During rekeying, packets protected by the previous set of keys can
  arrive after the DTLS handshake caused by rekeying has completed,
  because packets can be reordered on the wire.
END

-- Section 6 --

  The standard DTLS strategy for authenticating the communicating
  parties is to give the server (and optionally the client) a PKIX
  [RFC5280] certificate.  The client then verifies the certificate and
  checks that the name in the certificate matches the server's domain
  name.  This works because there are a relatively small number of
  servers with well-defined names; a situation that does not usually
  occur in the VoIP context.

I don't follow the last sentence.  I don't understand why there are relatively few servers that have well defined names.  I don't see why that's important with respect to how authentication by cert validation works.  And I don't get how this relates to VoIP.  Can you explain, please?
2014-06-06
07 Barry Leiba [Ballot Position Update] New position, Discuss, has been recorded for Barry Leiba
2014-06-03
07 Alissa Cooper Placed on agenda for telechat - 2014-06-12
2014-06-03
07 Scott Brim Request for Last Call review by GENART Completed: Ready. Reviewer: Scott Brim.
2014-06-02
07 (System) IANA Review state changed to IANA OK - Actions Needed from IANA - Review Needed
2014-06-02
07 Amanda Baber
IESG/Authors/WG Chairs:

IANA has reviewed draft-ietf-mmusic-udptl-dtls-07.  Authors should review the comments and/or questions below.  Please report any inaccuracies and respond to any questions as soon …
IESG/Authors/WG Chairs:

IANA has reviewed draft-ietf-mmusic-udptl-dtls-07.  Authors should review the comments and/or questions below.  Please report any inaccuracies and respond to any questions as soon as possible.

IANA's reviewer has the following comments/questions:

IANA understands that, upon approval of this document, there is a single action which IANA must complete.

in the proto subregistry of the Session Description Protocol (SDP) Parameters registry at

http://www.iana.org/assignments/sdp-parameters/

a single new value is to be added as follows:

Type: proto
SDP Name: UDP/TLS/UDPTL
Reference: [ RFC-to-be ]

IANA understands that this is the only action required to be completed upon approval of this document.

Note:  The actions requested in this document will not be completed until the document has been approved for publication as an RFC. This message is only to confirm what actions will be performed.
2014-06-02
07 Gunter Van de Velde Request for Last Call review by OPSDIR is assigned to Juergen Quittek
2014-06-02
07 Gunter Van de Velde Request for Last Call review by OPSDIR is assigned to Juergen Quittek
2014-05-30
07 Tero Kivinen Request for Last Call review by SECDIR is assigned to Dorothy Gellert
2014-05-30
07 Tero Kivinen Request for Last Call review by SECDIR is assigned to Dorothy Gellert
2014-05-28
07 Jean Mahoney Request for Last Call review by GENART is assigned to Scott Brim
2014-05-28
07 Jean Mahoney Request for Last Call review by GENART is assigned to Scott Brim
2014-05-27
07 Amy Vezza IANA Review state changed to IANA - Review Needed
2014-05-27
07 Amy Vezza
The following Last Call announcement was sent out:

From: The IESG
To: IETF-Announce
CC:
Reply-To: ietf@ietf.org
Sender:
Subject: Last Call:  (UDP Transport Layer (UDPTL) over …
The following Last Call announcement was sent out:

From: The IESG
To: IETF-Announce
CC:
Reply-To: ietf@ietf.org
Sender:
Subject: Last Call:  (UDP Transport Layer (UDPTL) over Datagram Transport Layer Security (DTLS)) to Proposed Standard


The IESG has received a request from the Multiparty Multimedia Session
Control WG (mmusic) to consider the following document:
- 'UDP Transport Layer (UDPTL) over Datagram Transport Layer Security
  (DTLS)'
  as Proposed Standard

The IESG plans to make a decision in the next few weeks, and solicits
final comments on this action. Please send substantive comments to the
ietf@ietf.org mailing lists by 2014-06-10. Exceptionally, comments may be
sent to iesg@ietf.org instead. In either case, please retain the
beginning of the Subject line to allow automated sorting.

Abstract


  This document specifies how the UDP Transport Layer (UDPTL) protocol,
  the predominant transport protocol for T.38 fax, can be transported
  over the Datagram Transport Layer Security (DTLS) protocol, how the
  usage of UDPTL over DTLS is indicated in the Session Description
  Protocol (SDP), and how UDPTL over DTLS is negotiated in a session
  established using the Session Initiation Protocol (SIP).




The file can be obtained via
http://datatracker.ietf.org/doc/draft-ietf-mmusic-udptl-dtls/

IESG discussion can be tracked via
http://datatracker.ietf.org/doc/draft-ietf-mmusic-udptl-dtls/ballot/


No IPR declarations have been submitted directly on this I-D.


2014-05-27
07 Amy Vezza IESG state changed to In Last Call from Last Call Requested
2014-05-27
07 Alissa Cooper Last call was requested
2014-05-27
07 Alissa Cooper Last call announcement was generated
2014-05-27
07 Alissa Cooper IESG state changed to Last Call Requested from AD Evaluation
2014-05-27
07 Alissa Cooper Ballot has been issued
2014-05-27
07 Alissa Cooper Ballot approval text was generated
2014-05-27
07 Alissa Cooper [Ballot Position Update] New position, Yes, has been recorded for Alissa Cooper
2014-05-27
07 Alissa Cooper Created "Approve" ballot
2014-05-27
07 Alissa Cooper Ballot writeup was changed
2014-05-27
07 Alissa Cooper Ballot writeup was changed
2014-05-27
07 Alissa Cooper Ballot writeup was generated
2014-05-27
07 Alissa Cooper IESG state changed to AD Evaluation from Publication Requested
2014-04-28
07 Flemming Andreasen
As required by RFC 4858, this is the current template for the Document
Shepherd Write-Up.

Changes are expected over time. This version is dated …
As required by RFC 4858, this is the current template for the Document
Shepherd Write-Up.

Changes are expected over time. This version is dated 24 February 2012.

(1) What type of RFC is being requested (BCP, Proposed Standard,
Internet Standard, Informational, Experimental, or Historic)?  Why
is this the proper type of RFC?  Is this type of RFC indicated in the
title page header?

Proposed Standard. The Intended Status is shown as "Standards Track" on the front page.  The document defines a new transport protocol for SDP, and per RFC 4566, this should be done by a Standards Track RFC.


(2) The IESG approval announcement includes a Document Announcement
Write-Up. Please provide such a Document Announcement Write-Up. Recent
examples can be found in the "Action" announcements for approved
documents. The approval announcement contains the following sections:

Technical Summary

  Relevant content can frequently be found in the abstract
  and/or introduction of the document. If not, this may be
  an indication that there are deficiencies in the abstract
  or introduction.


The document specifies how the UDP Transport Layer (UDPTL) protocol,
the predominant transport protocol for T.38 fax, can be transported
over the Datagram Transport Layer Security (DTLS) protocol, how the
usage of UDPTL over DTLS is indicated in the Session Description
Protocol (SDP), and how UDPTL over DTLS is negotiated in a session
established using the Session Initiation Protocol (SIP).


Working Group Summary

  Was there anything in WG process that is worth noting? For
  example, was there controversy about particular points or
  were there decisions where the consensus was particularly
  rough?


There has been no controversy on the document. On the contrary in fact with both quick WG interest and adoption as well as review and finalization.


Document Quality

  Are there existing implementations of the protocol? Have a
  significant number of vendors indicated their plan to
  implement the specification? Are there any reviewers that
  merit special mention as having done a thorough review,
  e.g., one that resulted in important changes or a
  conclusion that the document had no substantive issues? If
  there was a MIB Doctor, Media Type or other expert review,
  what was its course (briefly)? In the case of a Media Type
  review, on what date was the request posted?

There are no known implementations of the protocol, however it has been adopted by 3GPP. There are no new Media Types, MIBs, etc. and hence no special reviews.



Personnel

  Who is the Document Shepherd? Who is the Responsible Area
  Director?


Flemming Andreasen is the Document Shepherd
Alissa Cooper is the Responsible AD




(3) Briefly describe the review of this document that was performed by
the Document Shepherd.  If this version of the document is not ready
for publication, please explain why the document is being forwarded to
the IESG.

The Document Shepherd has reviewed the last 3 versions of the document in detail. The document is considered of good quality at this point.


(4) Does the document Shepherd have any concerns about the depth or
breadth of the reviews that have been performed? 

No such concerns.

(5) Do portions of the document need review from a particular or from
broader perspective, e.g., security, operational complexity, AAA, DNS,
DHCP, XML, or internationalization? If so, describe the review that
took place.

No such review is needed.


(6) Describe any specific concerns or issues that the Document Shepherd
has with this document that the Responsible Area Director and/or the
IESG should be aware of? For example, perhaps he or she is uncomfortable
with certain parts of the document, or has concerns whether there really
is a need for it. In any event, if the WG has discussed those issues and
has indicated that it still wishes to advance the document, detail those
concerns here.

No specific concerns or issues.

(7) Has each author confirmed that any and all appropriate IPR
disclosures required for full conformance with the provisions of BCP 78
and BCP 79 have already been filed. If not, explain why.

There are no IPR disclosures for the document and all 3 document authors have confirmed they are not aware of any IPR.


(8) Has an IPR disclosure been filed that references this document?
If so, summarize any WG discussion and conclusion regarding the IPR
disclosures.

No IPR disclosure.


(9) How solid is the WG consensus behind this document? Does it
represent the strong concurrence of a few individuals, with others
being silent, or does the WG as a whole understand and agree with it? 

Several people have indicated support for the document and several people have reviewed it.



(10) Has anyone threatened an appeal or otherwise indicated extreme
discontent? If so, please summarise the areas of conflict in separate
email messages to the Responsible Area Director. (It should be in a
separate email because this questionnaire is publicly available.)

No threats of appeal or discontent.


(11) Identify any ID nits the Document Shepherd has found in this
document. (See http://www.ietf.org/tools/idnits/ and the Internet-Drafts
Checklist). Boilerplate checks are not enough; this check needs to be
thorough.

The document has been checked and no nits found.


(12) Describe how the document meets any required formal review
criteria, such as the MIB Doctor, media type, and URI type reviews.

Does not apply.


(13) Have all references within this document been identified as
either normative or informative?

Yes.

(14) Are there normative references to documents that are not ready for
advancement or are otherwise in an unclear state? If such normative
references exist, what is the plan for their completion?

There are no such references


(15) Are there downward normative references references (see RFC 3967)?
If so, list these downward references to support the Area Director in
the Last Call procedure.

No.

(16) Will publication of this document change the status of any
existing RFCs? Are those RFCs listed on the title page header, listed
in the abstract, and discussed in the introduction? If the RFCs are not
listed in the Abstract and Introduction, explain why, and point to the
part of the document where the relationship of this document to the
other RFCs is discussed. If this information is not in the document,
explain why the WG considers it unnecessary.

No change to existing RFCs

(17) Describe the Document Shepherd's review of the IANA considerations
section, especially with regard to its consistency with the body of the
document. Confirm that all protocol extensions that the document makes
are associated with the appropriate reservations in IANA registries.
Confirm that any referenced IANA registries have been clearly
identified. Confirm that newly created IANA registries include a
detailed specification of the initial contents for the registry, that
allocations procedures for future registrations are defined, and a
reasonable name for the new registry has been suggested (see RFC 5226).

The IANA considerations have been reviewed for consistency and compliance with the requirements in SDP (RFC 4566).


(18) List any new IANA registries that require Expert Review for future
allocations. Provide any public guidance that the IESG would find
useful in selecting the IANA Experts for these new registries.

There are no new registries

(19) Describe reviews and automated checks performed by the Document
Shepherd to validate sections of the document written in a formal
language, such as XML code, BNF rules, MIB definitions, etc.


There is no formal language in the document.

2014-04-28
07 Flemming Andreasen State Change Notice email list changed to mmusic-chairs@tools.ietf.org, draft-ietf-mmusic-udptl-dtls@tools.ietf.org
2014-04-28
07 Flemming Andreasen Responsible AD changed to Alissa Cooper
2014-04-28
07 Flemming Andreasen IETF WG state changed to Submitted to IESG for Publication from WG Consensus: Waiting for Write-Up
2014-04-28
07 Flemming Andreasen IESG state changed to Publication Requested
2014-04-28
07 Flemming Andreasen IESG process started in state Publication Requested
2014-04-28
07 Flemming Andreasen Intended Status changed to Proposed Standard from None
2014-04-28
07 Flemming Andreasen Changed document writeup
2014-04-21
07 Flemming Andreasen IETF WG state changed to WG Consensus: Waiting for Write-Up from WG Document
2014-04-16
07 Christer Holmberg New version available: draft-ietf-mmusic-udptl-dtls-07.txt
2014-03-25
06 Christer Holmberg New version available: draft-ietf-mmusic-udptl-dtls-06.txt
2014-02-13
05 Christer Holmberg New version available: draft-ietf-mmusic-udptl-dtls-05.txt
2014-02-01
04 Christer Holmberg New version available: draft-ietf-mmusic-udptl-dtls-04.txt
2014-01-17
03 Christer Holmberg New version available: draft-ietf-mmusic-udptl-dtls-03.txt
2013-12-13
02 Flemming Andreasen Document shepherd changed to Flemming Andreasen
2013-12-05
02 Christer Holmberg New version available: draft-ietf-mmusic-udptl-dtls-02.txt
2013-11-21
01 Christer Holmberg New version available: draft-ietf-mmusic-udptl-dtls-01.txt
2013-11-07
00 Ari Keränen Set of documents this document replaces changed to draft-holmberg-mmusic-udptl-dtls, draft-holmberg-dispatch-udptl-dtls from None
2013-10-18
00 Christer Holmberg New version available: draft-ietf-mmusic-udptl-dtls-00.txt