Skip to main content

Security Threats to Network-Based Localized Mobility Management (NETLMM)
draft-ietf-netlmm-threats-04

Revision differences

Document history

Date Rev. By Action
2006-11-27
04 Amy Vezza State Changes to RFC Ed Queue from Approved-announcement sent by Amy Vezza
2006-11-20
04 Amy Vezza IESG state changed to Approved-announcement sent
2006-11-20
04 Amy Vezza IESG has approved the document
2006-11-20
04 Amy Vezza Closed "Approve" ballot
2006-11-17
04 (System) Removed from agenda for telechat - 2006-11-16
2006-11-16
04 Amy Vezza State Changes to Approved-announcement to be sent from IESG Evaluation by Amy Vezza
2006-11-16
04 Magnus Westerlund [Ballot Position Update] New position, No Objection, has been recorded by Magnus Westerlund
2006-11-16
04 Ross Callon [Ballot Position Update] New position, No Objection, has been recorded by Ross Callon
2006-11-16
04 Mark Townsley [Ballot Position Update] New position, No Objection, has been recorded by Mark Townsley
2006-11-16
04 David Kessens [Ballot Position Update] New position, No Objection, has been recorded by David Kessens
2006-11-16
04 Brian Carpenter
[Ballot comment]
Grammar nits from Gen-ART review by  Francis Dupont:
Section 3.1 page 8:

- can to trick -> can trick
- a variety of …
[Ballot comment]
Grammar nits from Gen-ART review by  Francis Dupont:
Section 3.1 page 8:

- can to trick -> can trick
- a variety of ... which make mouting -> makes? mounting
                                              ^    ^
  (if someone finds the answer for the grammar point in the web,
    can (s)he give a pointer? I've based my comment on French,
    perhaps English is different. BTW "a large number of" is plural
    without question).

[BC - I believe I could parse this text either way.
As written, "which" refers to "barriers"; if it was
"makes", then "which" would refer to "variety. Anyway,let's
leave it to the Editor.]

- both on-link and off-link -> either on-link or off-link?
2006-11-16
04 Brian Carpenter [Ballot Position Update] New position, No Objection, has been recorded by Brian Carpenter
2006-11-15
04 Russ Housley
[Ballot comment]
From the SecDire Review by Charles Clancy:
  >
  > Overall, I think the draft provides an exhaustive list of possible
  …
[Ballot comment]
From the SecDire Review by Charles Clancy:
  >
  > Overall, I think the draft provides an exhaustive list of possible
  > security threats at every link in the chain.
  >
  > My biggest complaint with security analysis drafts of this nature is
  > that they don't put the threats into context of actual attacker goals.
  > In general, attackers don't want to inject traffic into some secured
  > link for the sake of doing it.  They do it because it facilitates some
  > larger goal, to include theft of network access, denial of access to
  > others, or compromise of confidential data.  Perhaps it's just a matter
  > of organization.  But, I think it would be useful to add a description
  > of some of these higher-level attacker goals, and how all the
  > already-described, very specific attacks can facilitate these larger
  > attacker goals.
2006-11-15
04 Russ Housley [Ballot Position Update] New position, No Objection, has been recorded by Russ Housley
2006-11-15
04 Sam Hartman [Ballot Position Update] New position, No Objection, has been recorded by Sam Hartman
2006-11-14
04 Dan Romascanu [Ballot Position Update] New position, No Objection, has been recorded by Dan Romascanu
2006-11-14
04 Cullen Jennings [Ballot Position Update] New position, No Objection, has been recorded by Cullen Jennings
2006-11-14
04 Yoshiko Fong IANA Evaluation Comments:

As described in the IANA Considerations section, we understand this
document to have no IANA Actions
2006-11-13
04 Jari Arkko [Ballot Position Update] New position, Yes, has been recorded for Jari Arkko
2006-11-13
04 Jari Arkko Ballot has been issued by Jari Arkko
2006-11-13
04 Jari Arkko Created "Approve" ballot
2006-11-13
04 (System) Ballot writeup text was added
2006-11-13
04 (System) Last call text was added
2006-11-13
04 (System) Ballot approval text was added
2006-11-08
04 Samuel Weiler Request for Telechat review by SECDIR Completed. Reviewer: Charles Clancy.
2006-11-08
04 (System) Request for Telechat review by SECDIR is assigned to Charles Clancy
2006-11-08
04 (System) Request for Telechat review by SECDIR is assigned to Charles Clancy
2006-10-29
04 Jari Arkko Placed on agenda for telechat - 2006-11-16 by Jari Arkko
2006-10-29
04 Jari Arkko State Changes to IESG Evaluation from AD Evaluation by Jari Arkko
2006-10-29
04 Jari Arkko
AD review posted to the list:

I reviewed this draft and I found out that it
was well written, to the point, and as far …
AD review posted to the list:

I reviewed this draft and I found out that it
was well written, to the point, and as far as
I could see, complete. And free of idnits
problems.

Thanks.

The draft moves now forward.
2006-10-29
04 Jari Arkko State Change Notice email list have been change to netlmm-chairs@tools.ietf.org,chvogt@tm.uka.de from netlmm-chairs@tools.ietf.org
2006-09-25
04 Jari Arkko
WG chair's questionnaire:

1) Have the chairs personally reviewed this version of the ID and do
  they believe this ID is sufficiently baked to …
WG chair's questionnaire:

1) Have the chairs personally reviewed this version of the ID and do
  they believe this ID is sufficiently baked to forward to the IESG
  for publication?

James Kempf and Phil Roberts have reviewed the document, and believe it is ready for publication

2) Has the document had adequate review from both key WG members and
  key non-WG members? Do you have any concerns about the depth or
  breadth of the reviews that have been performed?

We obtained two solicited reviews: Lakshimnath Dondeti and Vijay Devrapalli. The reviews were quite detailed. We had a few other short comments by WG members.

3) Do you have concerns that the document needs more review from a
  particular (broader) perspective (e.g., security, operational
  complexity, someone familiar with AAA, etc.)?

The document should have SAAG review because it is a security document. The IESG has expressed a desire to have this document submitted together with draft-ietf-netlmm-nohost-req, so that both the protocol requirements and security threats are reviewed together.
 
4) Do you have any specific concerns/issues with this document that
  you believe the ADs and/or IESG should be aware of? For example,
  perhaps you are uncomfortable with certain parts of the document,
  or whether there really is a need for it, etc., but at the same
  time these issues have been discussed in the WG and the WG has
  indicated it wishes to advance the document anyway.

No.
 
5) How solid is the WG consensus behind this document?  Does it
  represent the strong concurrence of a few individuals, with others
  being silent, or does the WG as a whole understand and agree with
  it?

We did not receive as much comment on this document as the others but that may be because it is a security document and fewer people have the interest or feel they have the expertiese to express an opinion. That said, the people in the WG who are security-knowledgable did express their opinions and their feedback has been incorporated into the document.

6) Has anyone threatened an appeal or otherwise indicated extreme
  discontent?  If so, please summarize what are they upset about.

No.
 
7) Have the chairs verified that the document adheres to _all_ of the
  ID nits?  (see http://www.ietf.org/ID-nits.html).

I ran it through the tools.ietf.org nits checker. It checked OK.

8) For Standards Track and BCP documents, the IESG approval
  announcement includes a writeup section with the following
  sections:

  - Technical Summary
  - Working Group Summary
  - Protocol Quality

  Please provide such a writeup. (We will hopefully use it as is, but
  may make some changes.) For recent examples, have a look at the
  "protocol action" announcements for approved documents.

  Note:

  - When doing the technical summary, one would expect that the
    relevant information is in the abstract and/or introduction of
    the document. It turns out that the step of producing the writeup
    sometimes points out deficiencies in the introduction/abstract
    that are also worthy of rectifying.

  - For the Working Group Summary, was there anything in WG process
    that is worth noting? (E.g., controversy about particular points,
    decisions where concensus was particularly rough, etc.)

  - For the protocol quality, useful information could include:

    - is the protocol already being implemented?

    - have a significant number of vendors indicated they plan to
      implement the spec?
 
    - are there any reviewers (during the end stages) that merit
      explicit mention as having done a thorough review that resulted
      in important changes or a conclusion that the document was fine
      (except for maybe some nits?)

This is not a standards track document.
2006-09-25
04 Jari Arkko Draft Added by Jari Arkko in state AD Evaluation
2006-09-13
04 (System) New version available: draft-ietf-netlmm-threats-04.txt
2006-08-21
03 (System) New version available: draft-ietf-netlmm-threats-03.txt
2006-07-24
02 (System) New version available: draft-ietf-netlmm-threats-02.txt
2006-06-26
01 (System) New version available: draft-ietf-netlmm-threats-01.txt
2006-04-27
00 (System) New version available: draft-ietf-netlmm-threats-00.txt