Analysis of Residual Threats and Possible Fixes for Multipath TCP (MPTCP)
draft-ietf-mptcp-attacks-04
Revision differences
Document history
Date | Rev. | By | Action |
---|---|---|---|
2015-07-21
|
04 | (System) | RFC Editor state changed to AUTH48-DONE from AUTH48 |
2015-07-02
|
04 | Jean Mahoney | Closed request for Last Call review by GENART with state 'No Response' |
2015-06-22
|
04 | (System) | RFC Editor state changed to AUTH48 from RFC-EDITOR |
2015-06-15
|
04 | (System) | RFC Editor state changed to RFC-EDITOR from AUTH |
2015-06-02
|
04 | (System) | RFC Editor state changed to AUTH from EDIT |
2015-04-22
|
04 | Cindy Morgan | IESG state changed to RFC Ed Queue from Approved-announcement sent |
2015-04-22
|
04 | (System) | RFC Editor state changed to EDIT |
2015-04-22
|
04 | (System) | Announcement was received by RFC Editor |
2015-04-21
|
04 | (System) | IANA Action state changed to No IC |
2015-04-21
|
04 | Cindy Morgan | IESG state changed to Approved-announcement sent from Approved-announcement to be sent |
2015-04-21
|
04 | Cindy Morgan | IESG has approved the document |
2015-04-21
|
04 | Cindy Morgan | Closed "Approve" ballot |
2015-04-21
|
04 | Cindy Morgan | Ballot approval text was generated |
2015-04-21
|
04 | Martin Stiemerling | Ballot writeup was changed |
2015-04-21
|
04 | Martin Stiemerling | IESG state changed to Approved-announcement to be sent from IESG Evaluation::External Party |
2015-03-27
|
04 | Benoît Claise | [Ballot comment] Thanks Stephen for taking care of my security related DISCUSS |
2015-03-27
|
04 | Benoît Claise | [Ballot Position Update] Position for Benoit Claise has been changed to No Objection from Discuss |
2015-03-27
|
04 | Stephen Farrell | [Ballot comment] Thanks for the DISCUSSion:-) -- OLD COMMENTS below, I think those have been handled by the authors - section 2 (and elsewhere): You … [Ballot comment] Thanks for the DISCUSSion:-) -- OLD COMMENTS below, I think those have been handled by the authors - section 2 (and elsewhere): You have a "Threat: Medium" here, but you don't say what you mean by "Threat." Given that you cannot estimate any probabilities I would guess you mean something like "impact" possibly modulated by the difficulty of mounting the attack. I'd say it'd be good to say what you do mean by threat, or perhaps even change to say in this case "Impact, Difficulty : Medium, Medium" or some such. And the same elsewhere. While there are a lot of different ways you can do this that are equally good, but "threat" is probably the wrong word, and whatever word(s) you do use probably need some definition. (Which could be via RFC4949 if you like, though that has some ambiguities.) - p5, s/the Linux implementation/the current Linux implementation/ would be more accurate (and don't they prefer GNU/Linux?) - section 5: I can't see how the threat here is low for any reasonable definition of threat. - section 6 assumes that "acceptable" == "low (threat)" That seems a bit self-serving though - is it fair really? - 5.1: There may be cases where there is the potential to (post-facto) detect, but not prevent, a MitM. Not sure that it'd work for MPTCP though, given NATs mean the endpoints can't be sure of the identifiers used, but if at least one subflow is not NATed and if there were a DH exchange, then it could be possible to post-facto detect a MitM and it could be that some use-cases might be such that the endpoints would prefer to fail the connection rather than allow for a connection with a possibly undetectable MitM. Or, if there are cases where it'd be hard for the potential MitM attacker to know if NAT had happened or not, then that might movitate the attacker to hold off in case they are later detected. There's lots of speculation there though, so I'm not recommending any particular action, but I do think it'd be worth considering and maybe documenting later on. Probably too speculative to be worth a mention here though. (And it does depend on a DH exchange.) - 7.1: Surely TCPINC deserves a mention here? - The secdir review [1] also made a couple of points that are worth a look, but hasn't gotten any response that I can see. [1] https://www.ietf.org/mail-archive/web/secdir/current/msg05162.html |
2015-03-27
|
04 | Stephen Farrell | [Ballot Position Update] Position for Stephen Farrell has been changed to No Objection from Discuss |
2015-03-27
|
04 | Marcelo Bagnulo | New version available: draft-ietf-mptcp-attacks-04.txt |
2015-03-26
|
03 | Martin Stiemerling | Double checking with the DISCUSS holders to see if the update -03 is addressing the open issues. |
2015-03-26
|
03 | Martin Stiemerling | IESG state changed to IESG Evaluation::External Party from IESG Evaluation::AD Followup |
2015-02-24
|
03 | (System) | Sub state has been changed to AD Followup from Revised ID Needed |
2015-02-24
|
03 | Marcelo Bagnulo | IANA Review state changed to Version Changed - Review Needed from IANA OK - No Actions Needed |
2015-02-24
|
03 | Marcelo Bagnulo | New version available: draft-ietf-mptcp-attacks-03.txt |
2015-02-10
|
02 | Barry Leiba | [Ballot comment] RFC 6824 has to be a normative reference, surely... doesn't it? Is it really possible to understand this document without it? [Authors accepted … [Ballot comment] RFC 6824 has to be a normative reference, surely... doesn't it? Is it really possible to understand this document without it? [Authors accepted this in discussion.] As I understand this document, it's basically updating RFC 6181 with additional threat information that has come out of the development of 6824. The complete MPTCP threat analysis is now 6181 plus this document, yes? So shouldn't this document be marked as "updates 6181"? [Authors don't think so; I'm happy to leave this to the authors and AD.] The third sentence of the Introduction has the phrase "during the design of" twice, giving it a muddied meaning. Can you please rephrase that sentence? [Authors accepted this.] |
2015-02-10
|
02 | Barry Leiba | [Ballot Position Update] Position for Barry Leiba has been changed to No Objection from Discuss |
2014-12-18
|
02 | Cindy Morgan | IESG state changed to IESG Evaluation::Revised I-D Needed from IESG Evaluation |
2014-12-18
|
02 | Alia Atlas | [Ballot comment] I support Stephen and Benoit's discusses. In particular, the idea that on-path eavesdroppers represent a low threat is simply not true. For the … [Ballot comment] I support Stephen and Benoit's discusses. In particular, the idea that on-path eavesdroppers represent a low threat is simply not true. For the text about spoofed source addresses not being handled by ingress filtering, this is true - but also ignores the cases where the attacker is located in, for instance, the same enterprise network site and therefore ingress filtering wouldn't be useful anyway, I believe. |
2014-12-18
|
02 | Alia Atlas | [Ballot Position Update] New position, No Objection, has been recorded for Alia Atlas |
2014-12-18
|
02 | Jari Arkko | [Ballot Position Update] New position, No Objection, has been recorded for Jari Arkko |
2014-12-18
|
02 | Benoît Claise | [Ballot discuss] Me filing a security-related DISCUSS, I'm surprised myself :-) Briefly chatting about the issue with Stephen Farrell, discovered by Stefan Winter part of … [Ballot discuss] Me filing a security-related DISCUSS, I'm surprised myself :-) Briefly chatting about the issue with Stephen Farrell, discovered by Stefan Winter part of his OPS-DIR review, he advised me to file a DISCUSS about this issue. I expect the Security ADs to follow up on this one. From an OPS-DIR perspective, the document is Ready with very minor nits. From a security perspective, IMHO not so. The following are comments from my individual perspective, which I hope can be considered even though being so late. The document readily admits that an attacker who can eavesdrop parts of the connection can hijack and MitM the connection to his liking. The document states in section 5 that: "This vulnerability was readily identified at the moment of the design of the MPTCP security solution and the threat was considered acceptable." I believe the design of MPTCP predates the IETF's "perpass" considerations and did not take into account that pervasive passive attacks are possible and are being conducted at large scale on the internet on a day-to-day basis. The -attacks document now provides an easy-to-follow recipe to mount the attack, with the only prerequisite being that TCP headers can be inspected by an attacker. MPTCP itself and its security implications need to be revisited (which is happening in the -bis document; I strongly hope that this is one of the parts which do get fixed). The suggested mitigations 1 and 2 in section 3.1 of the -attacks draft do not help in this scenario, because the additional information can be trivially eavesdropped. Mitigation 3 seems to prevent it, but is not the recommended one. In my understanding, none of the three are part of the actual protocol anyway. Does the mptcp-bis document go towards that mitigation 3, or did it find another way to prevent the described elevation from pervasive passive to off-path active MitM? From my understanding, the recommendation in section 7 does not point towards that (best) mitigation nr. 3, which I find unacceptable as a recommendation for a standards-track-to-be. The draft in its current state does not discuss perpass-style scenarios in the ADD_ADDR attack and their consequences in an adequate manner, and inappropriately classifies ADD_ADDR as a "medium" threat. From a security perspective, I would not find the document satisfactory and would like to see it revised. |
2014-12-18
|
02 | Benoît Claise | [Ballot comment] The following NITs are in the document: Section 3 --------- SYN-flod -> SYN-flood on-time attacker -> on-path attacker (?) Section 7 --------- The … [Ballot comment] The following NITs are in the document: Section 3 --------- SYN-flod -> SYN-flood on-time attacker -> on-path attacker (?) Section 7 --------- The caption of section 7 has a typo: Reccomendation -> Recommendation |
2014-12-18
|
02 | Benoît Claise | [Ballot Position Update] New position, Discuss, has been recorded for Benoit Claise |
2014-12-17
|
02 | Alissa Cooper | [Ballot comment] I am confused about the "Threat: Medium" and "Threat: Low" labels, and I don't think they really stand on their own without further … [Ballot comment] I am confused about the "Threat: Medium" and "Threat: Low" labels, and I don't think they really stand on their own without further explanation. It is unclear whether what they are intended to measure is the cost, likelihood, likely impact, or ease of mitigation of each threat. Perhaps all of those factors are relevant to discuss, but as of now they aren't discussed in a systematic way across the threats and the single label per threat provides very little information about how it was derived or what it means. I would suggest either removing the labels or expanding the explanation of what they mean. |
2014-12-17
|
02 | Alissa Cooper | [Ballot Position Update] New position, No Objection, has been recorded for Alissa Cooper |
2014-12-17
|
02 | Adrian Farrel | [Ballot Position Update] New position, No Objection, has been recorded for Adrian Farrel |
2014-12-17
|
02 | Stephen Farrell | [Ballot discuss] Generalising from the discuss text posted eariler: In what sense is the list of 5 attacks here complete? If this list is not … [Ballot discuss] Generalising from the discuss text posted eariler: In what sense is the list of 5 attacks here complete? If this list is not complete, then on what basis were these attacks selected? I think you need to say. There is a real danger that we only document (and mitigate) attacks that we find interesting or have a plan for mitigation, so I'd like to know how this list was arrived at. |
2014-12-17
|
02 | Stephen Farrell | [Ballot comment] - section 2 (and elsewhere): You have a "Threat: Medium" here, but you don't say what you mean by "Threat." Given that you … [Ballot comment] - section 2 (and elsewhere): You have a "Threat: Medium" here, but you don't say what you mean by "Threat." Given that you cannot estimate any probabilities I would guess you mean something like "impact" possibly modulated by the difficulty of mounting the attack. I'd say it'd be good to say what you do mean by threat, or perhaps even change to say in this case "Impact, Difficulty : Medium, Medium" or some such. And the same elsewhere. While there are a lot of different ways you can do this that are equally good, but "threat" is probably the wrong word, and whatever word(s) you do use probably need some definition. (Which could be via RFC4949 if you like, though that has some ambiguities.) - p5, s/the Linux implementation/the current Linux implementation/ would be more accurate (and don't they prefer GNU/Linux?) - section 5: I can't see how the threat here is low for any reasonable definition of threat. - section 6 assumes that "acceptable" == "low (threat)" That seems a bit self-serving though - is it fair really? - 5.1: There may be cases where there is the potential to (post-facto) detect, but not prevent, a MitM. Not sure that it'd work for MPTCP though, given NATs mean the endpoints can't be sure of the identifiers used, but if at least one subflow is not NATed and if there were a DH exchange, then it could be possible to post-facto detect a MitM and it could be that some use-cases might be such that the endpoints would prefer to fail the connection rather than allow for a connection with a possibly undetectable MitM. Or, if there are cases where it'd be hard for the potential MitM attacker to know if NAT had happened or not, then that might movitate the attacker to hold off in case they are later detected. There's lots of speculation there though, so I'm not recommending any particular action, but I do think it'd be worth considering and maybe documenting later on. Probably too speculative to be worth a mention here though. (And it does depend on a DH exchange.) - 7.1: Surely TCPINC deserves a mention here? - The secdir review [1] also made a couple of points that are worth a look, but hasn't gotten any response that I can see. [1] https://www.ietf.org/mail-archive/web/secdir/current/msg05162.html |
2014-12-17
|
02 | Stephen Farrell | Ballot comment and discuss text updated for Stephen Farrell |
2014-12-16
|
02 | Spencer Dawkins | [Ballot comment] I'm a Yes. I'm supporting Barry's small Discuss points, and assuming Barry will resolve them with the authors. |
2014-12-16
|
02 | Spencer Dawkins | [Ballot Position Update] New position, Yes, has been recorded for Spencer Dawkins |
2014-12-15
|
02 | Stephen Farrell | [Ballot discuss] This is an 'early' discuss - I've not finished reading the doc, but if the authors can respond quickly that might help us … [Ballot discuss] This is an 'early' discuss - I've not finished reading the doc, but if the authors can respond quickly that might help us all avoid doing unnecessary work:-) I'll update the ballot later in any case, but in the meantime... (1) intro, types of attacker: I don't get why an (on path) eavesdropper cannot delete or delay packets - it seems to me that this misses a specific kind of attacker who is passive crypto-wise, but who can in fact delete or delay packets. I think you need to specifically justify not factoring that specific type of attacker out in the analysis as one that is different from one that can only observe. Why is it ok for that to be missing and did the WG discuss that? |
2014-12-15
|
02 | Stephen Farrell | [Ballot Position Update] New position, Discuss, has been recorded for Stephen Farrell |
2014-12-01
|
02 | Gunter Van de Velde | Request for Last Call review by OPSDIR Completed: Has Nits. Reviewer: Stefan Winter. |
2014-11-22
|
02 | Barry Leiba | [Ballot discuss] I have two very simple points I'd like to discuss, please: 1. RFC 6824 has to be a normative reference, surely... doesn't it? … [Ballot discuss] I have two very simple points I'd like to discuss, please: 1. RFC 6824 has to be a normative reference, surely... doesn't it? Is it really possible to understand this document without it? 2. As I understand this document, it's basically updating RFC 6181 with additional threat information that has come out of the development of 6824. The complete MPTCP threat analysis is now 6181 plus this document, yes? So shouldn't this document be marked as "updates 6181"? |
2014-11-22
|
02 | Barry Leiba | [Ballot comment] The third sentence of the Introduction has the phrase "during the design of" twice, giving it a muddied meaning. Can you please rephrase … [Ballot comment] The third sentence of the Introduction has the phrase "during the design of" twice, giving it a muddied meaning. Can you please rephrase that sentence? |
2014-11-22
|
02 | Barry Leiba | [Ballot Position Update] New position, Discuss, has been recorded for Barry Leiba |
2014-11-20
|
02 | Martin Stiemerling | Placed on agenda for telechat - 2014-12-18 |
2014-11-20
|
02 | Martin Stiemerling | IESG state changed to IESG Evaluation from Waiting for AD Go-Ahead |
2014-11-20
|
02 | Martin Stiemerling | IESG state changed to Waiting for AD Go-Ahead from Waiting for Writeup |
2014-11-20
|
02 | Martin Stiemerling | Changed consensus to Yes from Unknown |
2014-11-20
|
02 | Martin Stiemerling | Ballot has been issued |
2014-11-20
|
02 | Martin Stiemerling | [Ballot Position Update] New position, Yes, has been recorded for Martin Stiemerling |
2014-11-20
|
02 | Martin Stiemerling | Created "Approve" ballot |
2014-11-20
|
02 | Martin Stiemerling | Ballot writeup was changed |
2014-10-30
|
02 | Tero Kivinen | Request for Last Call review by SECDIR Completed: Has Issues. Reviewer: Phillip Hallam-Baker. |
2014-10-27
|
02 | (System) | IESG state changed to Waiting for Writeup from In Last Call |
2014-10-24
|
02 | (System) | IANA Review state changed to IANA OK - No Actions Needed from IANA - Review Needed |
2014-10-24
|
02 | Pearl Liang | IESG/Authors/WG Chairs: IANA has reviewed draft-ietf-mptcp-attacks-02, which is currently in Last Call, and has the following comments: We understand that, upon approval of this … IESG/Authors/WG Chairs: IANA has reviewed draft-ietf-mptcp-attacks-02, which is currently in Last Call, and has the following comments: We understand that, upon approval of this document, there are no IANA Actions that need completion. While it is helpful for the IANA Considerations section of the document to remain in place upon publication, if the authors prefer to remove it, IANA doesn't object. If this assessment is not accurate, please respond as soon as possible. |
2014-10-16
|
02 | Jean Mahoney | Request for Last Call review by GENART is assigned to Roni Even |
2014-10-16
|
02 | Jean Mahoney | Request for Last Call review by GENART is assigned to Roni Even |
2014-10-16
|
02 | Gunter Van de Velde | Request for Last Call review by OPSDIR is assigned to Stefan Winter |
2014-10-16
|
02 | Gunter Van de Velde | Request for Last Call review by OPSDIR is assigned to Stefan Winter |
2014-10-16
|
02 | Tero Kivinen | Request for Last Call review by SECDIR is assigned to Phillip Hallam-Baker |
2014-10-16
|
02 | Tero Kivinen | Request for Last Call review by SECDIR is assigned to Phillip Hallam-Baker |
2014-10-13
|
02 | Cindy Morgan | IANA Review state changed to IANA - Review Needed |
2014-10-13
|
02 | Cindy Morgan | The following Last Call announcement was sent out: From: The IESG To: IETF-Announce CC: Reply-To: ietf@ietf.org Sender: Subject: Last Call: (Analysis of MPTCP residual threats … The following Last Call announcement was sent out: From: The IESG To: IETF-Announce CC: Reply-To: ietf@ietf.org Sender: Subject: Last Call: (Analysis of MPTCP residual threats and possible fixes) to Informational RFC The IESG has received a request from the Multipath TCP WG (mptcp) to consider the following document: - 'Analysis of MPTCP residual threats and possible fixes' as Informational RFC The IESG plans to make a decision in the next few weeks, and solicits final comments on this action. Please send substantive comments to the ietf@ietf.org mailing lists by 2014-10-27. Exceptionally, comments may be sent to iesg@ietf.org instead. In either case, please retain the beginning of the Subject line to allow automated sorting. Abstract This documents performs an analysis of the residual threats for MPTCP and explores possible solutions to them. The file can be obtained via http://datatracker.ietf.org/doc/draft-ietf-mptcp-attacks/ IESG discussion can be tracked via http://datatracker.ietf.org/doc/draft-ietf-mptcp-attacks/ballot/ No IPR declarations have been submitted directly on this I-D. |
2014-10-13
|
02 | Cindy Morgan | IESG state changed to In Last Call from Last Call Requested |
2014-10-13
|
02 | Martin Stiemerling | Last call was requested |
2014-10-13
|
02 | Martin Stiemerling | Ballot approval text was generated |
2014-10-13
|
02 | Martin Stiemerling | Ballot writeup was generated |
2014-10-13
|
02 | Martin Stiemerling | IESG state changed to Last Call Requested from AD Evaluation |
2014-10-13
|
02 | Martin Stiemerling | Last call announcement was generated |
2014-07-17
|
02 | Martin Stiemerling | IESG state changed to AD Evaluation from Publication Requested |
2014-07-10
|
02 | Yoshifumi Nishida | (1) What type of RFC is being requested (BCP, Proposed Standard, Internet Standard, Informational, Experimental, or Historic)? Why is this the proper type of RFC? … (1) What type of RFC is being requested (BCP, Proposed Standard, Internet Standard, Informational, Experimental, or Historic)? Why is this the proper type of RFC? Is this type of RFC indicated in the title page header? The intended status is Informational. This document provides information for possible security threats in MPTCP and provides some guidances for them. I believe Informational is appropriate status for the document. (2) The IESG approval announcement includes a Document Announcement Write-Up. Please provide such a Document Announcement Write-Up. Recent examples can be found in the "Action" announcements for approved documents. The approval announcement contains the following sections: Technical Summary: This document describes an analysis for residual security threats in MPTCP spec and provides some guidances for them. The information in the document is used for updating the current MPTCP spec and discussions for future direction of MPTCP developments. Working Group Summary: The analysis and guidances provided by this documents has been discussed in the WG. The problems in MPTCP pointed out by the document have already been addressed in RFC6824bis draft (draft-ietf-mptcp-rfc6824bis). The guidances in the document has also been used for discussions in the WG for future security enhancements of MPTCP. The consensus for this document was clear because of the usefulness of the document. Document Quality: The document has been reviewed and discussed by multiple participants in the WG. Personnel: Who is the Document Shepherd? Who is the Responsible Area Director? Yoshifumi Nishida is the Document Shepherd for this document. The Responsible Area Director is Martin Stiemerling (3) Briefly describe the review of this document that was performed by the Document Shepherd. If this version of the document is not ready for publication, please explain why the document is being forwarded to the IESG. I've reviewed the documents and made several editorial suggestions. I believe the quality of this draft is mature enough to be published. (4) Does the document Shepherd have any concerns about the depth or breadth of the reviews that have been performed? I have no concern about it. (5) Do portions of the document need review from a particular or from broader perspective, e.g., security, operational complexity, AAA, DNS, DHCP, XML, or internationalization? If so, describe the review that took place. There is no need for particular reviews. (6) Describe any specific concerns or issues that the Document Shepherd has with this document that the Responsible Area Director and/or the IESG should be aware of? For example, perhaps he or she is uncomfortable with certain parts of the document, or has concerns whether there really is a need for it. In any event, if the WG has discussed those issues and has indicated that it still wishes to advance the document, detail those concerns here. I have no concerns with the document. (7) Has each author confirmed that any and all appropriate IPR disclosures required for full conformance with the provisions of BCP 78 and BCP 79 have already been filed. If not, explain why? Yes. Each author has confirmed. (8) Has an IPR disclosure been filed that references this document? If so, summarize any WG discussion and conclusion regarding the IPR disclosures. No. (9) How solid is the WG consensus behind this document? Does it represent the strong concurrence of a few individuals, with others being silent, or does the WG as a whole understand and agree with it? The analysis and guidances in the document were supported in the WG meetings as well as the ML. The consensus was solid and clear. (10) Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarise the areas of conflict in separate email messages to the Responsible Area Director. (It should be in a separate email because this questionnaire is publicly available.) No one has indicated discontent. (11) Identify any ID nits the Document Shepherd has found in this document. (See http://www.ietf.org/tools/idnits/ and the Internet-Drafts Checklist). Boilerplate checks are not enough; this check needs to be thorough. No issue was found by idnits 2.13.01 (12) Describe how the document meets any required formal review criteria, such as the MIB Doctor, media type, and URI type reviews. I believe no formal review is needed. (13) Have all references within this document been identified as either normative or informative? Yes. (14) Are there normative references to documents that are not ready for advancement or are otherwise in an unclear state? If such normative references exist, what is the plan for their completion? No. (15) Are there downward normative references references (see RFC 3967)? If so, list these downward references to support the Area Director in the Last Call procedure. No. (16) Will publication of this document change the status of any existing RFCs? Are those RFCs listed on the title page header, listed in the abstract, and discussed in the introduction? If the RFCs are not listed in the Abstract and Introduction, explain why, and point to the part of the document where the relationship of this document to the other RFCs is discussed. If this information is not in the document, explain why the WG considers it unnecessary. No. (17) Describe the Document Shepherd's review of the IANA considerations section, especially with regard to its consistency with the body of the document. Confirm that all protocol extensions that the document makes are associated with the appropriate reservations in IANA registries. Confirm that any referenced IANA registries have been clearly identified. Confirm that newly created IANA registries include a detailed specification of the initial contents for the registry, that allocations procedures for future registrations are defined, and a reasonable name for the new registry has been suggested (see RFC 5226). The document does not involve any IANA considerations. (18) List any new IANA registries that require Expert Review for future allocations. Provide any public guidance that the IESG would find useful in selecting the IANA Experts for these new registries. There is no need to require expert review for future allocations. (19) Describe reviews and automated checks performed by the Document Shepherd to validate sections of the document written in a formal language, such as XML code, BNF rules, MIB definitions, etc. The document contains no formal language. |
2014-07-10
|
02 | Yoshifumi Nishida | State Change Notice email list changed to mptcp-chairs@tools.ietf.org, draft-ietf-mptcp-attacks@tools.ietf.org |
2014-07-10
|
02 | Yoshifumi Nishida | Responsible AD changed to Martin Stiemerling |
2014-07-10
|
02 | Yoshifumi Nishida | IETF WG state changed to Submitted to IESG for Publication from WG Document |
2014-07-10
|
02 | Yoshifumi Nishida | IESG state changed to Publication Requested |
2014-07-10
|
02 | Yoshifumi Nishida | IESG process started in state Publication Requested |
2014-07-10
|
02 | Yoshifumi Nishida | Changed document writeup |
2014-07-10
|
02 | Yoshifumi Nishida | Intended Status changed to Informational from None |
2014-07-10
|
02 | Yoshifumi Nishida | Document shepherd changed to Yoshifumi Nishida |
2014-07-03
|
02 | Marcelo Bagnulo | New version available: draft-ietf-mptcp-attacks-02.txt |
2014-06-23
|
01 | Marcelo Bagnulo | New version available: draft-ietf-mptcp-attacks-01.txt |
2014-01-31
|
00 | Marcelo Bagnulo | New version available: draft-ietf-mptcp-attacks-00.txt |