IEEE 802.11 Medium Access Control (MAC) Profile for Control and Provisioning of Wireless Access Points (CAPWAP)
draft-ietf-opsawg-capwap-hybridmac-08
Revision differences
Document history
Date | Rev. | By | Action |
---|---|---|---|
2015-04-13
|
08 | (System) | RFC Editor state changed to AUTH48-DONE from AUTH48 |
2015-03-31
|
08 | (System) | RFC Editor state changed to AUTH48 from RFC-EDITOR |
2015-03-18
|
08 | (System) | RFC Editor state changed to RFC-EDITOR from EDIT |
2015-02-18
|
08 | (System) | IANA Action state changed to RFC-Ed-Ack from Waiting on RFC Editor |
2015-02-18
|
08 | (System) | IANA Action state changed to Waiting on RFC Editor from Waiting on Authors |
2015-02-17
|
08 | (System) | IANA Action state changed to Waiting on Authors from In Progress |
2015-02-17
|
08 | Cindy Morgan | IESG state changed to RFC Ed Queue from Approved-announcement sent |
2015-02-17
|
08 | (System) | RFC Editor state changed to EDIT |
2015-02-17
|
08 | (System) | Announcement was received by RFC Editor |
2015-02-16
|
08 | (System) | IANA Action state changed to In Progress |
2015-02-16
|
08 | Amy Vezza | IESG state changed to Approved-announcement sent from Approved-announcement to be sent::Revised I-D Needed |
2015-02-16
|
08 | Amy Vezza | IESG has approved the document |
2015-02-16
|
08 | Amy Vezza | Closed "Approve" ballot |
2015-02-16
|
08 | Amy Vezza | Ballot approval text was generated |
2015-02-16
|
08 | Amy Vezza | Ballot writeup was changed |
2014-12-29
|
08 | Meral Shirazipour | Request for Telechat review by GENART Completed: Ready. Reviewer: Meral Shirazipour. |
2014-12-19
|
08 | Benoît Claise | Notification list changed to opsawg@ietf.org, warren@kumari.net, draft-ietf-opsawg-capwap-hybridmac.all@tools.ietf.org, opsawg-chairs@tools.ietf.org from opsawg-chairs@tools.ietf.org, draft-ietf-opsawg-capwap-hybridmac@tools.ietf.org |
2014-12-18
|
08 | Cindy Morgan | IESG state changed to Approved-announcement to be sent::Revised I-D Needed from IESG Evaluation |
2014-12-18
|
08 | Rajesh Pazhyannur | IANA Review state changed to Version Changed - Review Needed from IANA - Not OK |
2014-12-18
|
08 | Rajesh Pazhyannur | New version available: draft-ietf-opsawg-capwap-hybridmac-08.txt |
2014-12-18
|
07 | Richard Barnes | [Ballot Position Update] New position, No Objection, has been recorded for Richard Barnes |
2014-12-18
|
07 | Jari Arkko | [Ballot Position Update] New position, No Objection, has been recorded for Jari Arkko |
2014-12-18
|
07 | Joel Jaeggli | [Ballot Position Update] New position, No Objection, has been recorded for Joel Jaeggli |
2014-12-17
|
07 | Alia Atlas | [Ballot Position Update] New position, No Objection, has been recorded for Alia Atlas |
2014-12-17
|
07 | Martin Stiemerling | [Ballot Position Update] New position, No Objection, has been recorded for Martin Stiemerling |
2014-12-16
|
07 | Spencer Dawkins | [Ballot Position Update] New position, No Objection, has been recorded for Spencer Dawkins |
2014-12-16
|
07 | Alissa Cooper | [Ballot Position Update] New position, No Objection, has been recorded for Alissa Cooper |
2014-12-16
|
07 | Ted Lemon | [Ballot comment] Does the abstract really need to be as long as it is? Wouldn't it be sufficient to say something like this? The … [Ballot comment] Does the abstract really need to be as long as it is? Wouldn't it be sufficient to say something like this? The CAPWAP protocol binding for IEEE 802.11 defines two MAC modes for IEEE 802.11 WTP: Split and Local MAC. In the Split MAC mode, the partitioning of encryption/decryption functions are not clearly defined. This leads to interoperability issues, especially when the Access Controller (AC) and Wireless Transmission Point (WTP) come from different vendors. To prevent interoperability issues, this specification defines an IEEE 802.11 MAC profile message element in which each profile specifies an unambiguous division of encryption functionality between the WTP and AC. I think this is sufficient information for people to figure out what the purpose of the document is, and then people who are interested in the stated problem will read the document. The other information in the abstract seems unnecessary, and increases the workload of the reader who is deciding whether or not the document is something they need to read based on the abstract. |
2014-12-16
|
07 | Ted Lemon | Ballot comment text updated for Ted Lemon |
2014-12-16
|
07 | Ted Lemon | [Ballot comment] Does the abstract really need to be as long as it is? Wouldn't it be sufficient to say something like this? The … [Ballot comment] Does the abstract really need to be as long as it is? Wouldn't it be sufficient to say something like this? The CAPWAP protocol binding for IEEE 802.11 defines two MAC modes for IEEE 802.11 WTP: Split and Local MAC. In the Split MAC mode, the partitioning of encryption/decryption functions are not clearly defined. This leads to interoperability issues, especially when the Access Controller (AC) and Wireless Transmission Point (WTP) come from different vendors. To prevent interoperability issues, this specification defines an IEEE 802.11 MAC profile message element in which each profile specifies an unambiguous division of encryption functionality between the WTP and AC. I think this is sufficient information for people to figure out what the purpose of the document is, and then people who are interested in the stated problem will read the document. The other information in the abstract really isn't needed, and is better expressed in the body of the document. |
2014-12-16
|
07 | Ted Lemon | Ballot comment text updated for Ted Lemon |
2014-12-16
|
07 | Ted Lemon | [Ballot comment] Does the abstract really need to be as long as it is? Wouldn't it be sufficient to say something like this? The … [Ballot comment] Does the abstract really need to be as long as it is? Wouldn't it be sufficient to say something like this? The CAPWAP protocol binding for IEEE 802.11 defines two MAC modes for IEEE 802.11 WTP: Split and Local MAC. In the Split MAC mode, the partitioning of encryption/decryption functions are not clearly defined. This leads to interoperability issues, especially when the Access Controller (AC) and Wireless Transmission Point (WTP) come from different vendors. To prevent interoperability issues, this specification defines an IEEE 802.11 MAC profile message element in which each profile specifies an unambiguous division of encryption functionality between the WTP and AC. I think this is sufficient information for people to figure out what the purpose of the document is, and then people who are interested in the stated problem will read the document. The other information in the abstract really isn't needed, and is better expressed in the body of the document. |
2014-12-16
|
07 | Ted Lemon | [Ballot Position Update] New position, No Objection, has been recorded for Ted Lemon |
2014-12-16
|
07 | Brian Haberman | [Ballot Position Update] New position, No Objection, has been recorded for Brian Haberman |
2014-12-15
|
07 | Adrian Farrel | [Ballot Position Update] New position, No Objection, has been recorded for Adrian Farrel |
2014-12-15
|
07 | Stephen Farrell | [Ballot comment] - intro, last para: Figure 1's last row says "WTP" in the Local MAC column, but the text here implies that it should … [Ballot comment] - intro, last para: Figure 1's last row says "WTP" in the Local MAC column, but the text here implies that it should say AC - what am I getting wrong? - sec cons. saying WAP and AC messages "is encrypted" is not quite what you want - I think you need to say that those messages have origin authentication and data integrity (which they should have if "encrypted" properly, and if they're not that not this doc's fault). |
2014-12-15
|
07 | Stephen Farrell | [Ballot Position Update] New position, No Objection, has been recorded for Stephen Farrell |
2014-12-13
|
07 | Pete Resnick | [Ballot Position Update] New position, No Objection, has been recorded for Pete Resnick |
2014-12-12
|
07 | Benoît Claise | IESG state changed to IESG Evaluation from Waiting for AD Go-Ahead |
2014-12-12
|
07 | Benoît Claise | IESG state changed to Waiting for AD Go-Ahead from Waiting for Writeup |
2014-12-11
|
07 | Jean Mahoney | Request for Telechat review by GENART is assigned to Meral Shirazipour |
2014-12-11
|
07 | Jean Mahoney | Request for Telechat review by GENART is assigned to Meral Shirazipour |
2014-12-10
|
07 | Kathleen Moriarty | [Ballot comment] Thank you for addressing the SecDir review: https://www.ietf.org/mail-archive/web/secdir/current/msg05260.html |
2014-12-10
|
07 | Kathleen Moriarty | [Ballot Position Update] Position for Kathleen Moriarty has been changed to No Objection from Discuss |
2014-12-10
|
07 | Kathleen Moriarty | [Ballot discuss] You may not have seen the SecDir review, some helpful security consideration suggestions were provided and I'd like to see if you can … [Ballot discuss] You may not have seen the SecDir review, some helpful security consideration suggestions were provided and I'd like to see if you can work them into the draft, if appropriate. Here is a link to the full review: https://www.ietf.org/mail-archive/web/secdir/current/msg05260.html Here are the specific suggestions: The Security Considerations Section says that this document does not introduce any new security risks compared to RFC5416, and that the security considerations described in RFC5416 apply here as well. I believe that a document that addresses the placement of encryption functionality should say something more, in particular *why* it introduces no new security risks. In the case of negotiation, the main security risk is that an attacker could interfere with the negotiation so that a less secure alternative is chosen even when a more secure one is available. In the security considerations section of RFC5416 it is noted that there is a possibility of a replay attack if encryption resides at the WTP. The risk is slight, and the only way of closing the security gap is expensive, so the authors of RFC5416 decide to let the risk stand. However, this presents a conceivable attack in which an attacker could cause an AC to believe that a WTP only supports encryption functionality at the WTP, and the AC would choose the less secure mode. Although the risk this introduces is also slight, I believe that this should be mentioned. Also, would I be correct in assuming that a WTP that supports encryption at the WTP but not at the AC is unlikely? If that is so, it might be possible to close the security gap by having the ATP reject advertisements (request a retransmit?) that only support encryption at the WTP, and if so you should mention that too. Thank you. |
2014-12-10
|
07 | Kathleen Moriarty | [Ballot Position Update] New position, Discuss, has been recorded for Kathleen Moriarty |
2014-12-05
|
07 | Barry Leiba | [Ballot Position Update] New position, No Objection, has been recorded for Barry Leiba |
2014-12-05
|
07 | (System) | IANA Review state changed to IANA - Not OK from Version Changed - Review Needed |
2014-12-05
|
07 | Benoît Claise | Placed on agenda for telechat - 2014-12-18 |
2014-12-05
|
07 | Benoît Claise | Changed consensus to Yes from Unknown |
2014-12-05
|
07 | Benoît Claise | Ballot has been issued |
2014-12-05
|
07 | Benoît Claise | [Ballot Position Update] New position, Yes, has been recorded for Benoit Claise |
2014-12-05
|
07 | Benoît Claise | Created "Approve" ballot |
2014-12-05
|
07 | Benoît Claise | Ballot writeup was changed |
2014-12-04
|
07 | Tero Kivinen | Request for Last Call review by SECDIR Completed: Has Issues. Reviewer: Catherine Meadows. |
2014-12-03
|
07 | Rajesh Pazhyannur | IANA Review state changed to Version Changed - Review Needed from IANA - Not OK |
2014-12-03
|
07 | Rajesh Pazhyannur | New version available: draft-ietf-opsawg-capwap-hybridmac-07.txt |
2014-11-21
|
06 | Gunter Van de Velde | Request for Last Call review by OPSDIR Completed: Ready. Reviewer: Nevil Brownlee. |
2014-11-10
|
06 | Meral Shirazipour | Request for Last Call review by GENART Completed: Ready with Nits. Reviewer: Meral Shirazipour. |
2014-11-10
|
06 | (System) | IESG state changed to Waiting for Writeup from In Last Call |
2014-11-07
|
06 | (System) | IANA Review state changed to IANA - Not OK from IANA - Review Needed |
2014-11-07
|
06 | Pearl Liang | IESG/Authors/WG Chairs: IANA has reviewed [draft-enter-here]. Authors should review the comments and/or questions below. Please report any inaccuracies and respond to any questions as soon … IESG/Authors/WG Chairs: IANA has reviewed [draft-enter-here]. Authors should review the comments and/or questions below. Please report any inaccuracies and respond to any questions as soon as possible. We received the following comments/questions from the IANA's reviewer: IANA has questions about the actions requested in the IANA Considerations section of this document. IANA understands that, upon approval of this document, there are two actions which IANA must complete. First, in the CAPWAP Message Element Type subregistry of the Control And Provisioning of Wireless Access Points (CAPWAP) Parameters registry located at: https://www.iana.org/assignments/capwap-parameters/ two new protocol message elements are to be registered as follows: CAPWAP Message Element: IEEE 802.11 Supported MAC Profiles Type Value: [ TBD-at-registration ] Reference: [ RFC-to-be ] CAPWAP Message Element: IEEE 802.11 MAC Profile Type Value: [ TBD-at-registration ] Reference: [ RFC-to-be ] IANA understands that RFC5415 requires that these values be in the range 1024-2047. As this document requests registrations in an Expert Review (see RFC 5226) registry, we will initiate the required Expert Review via a separate request. Expert review will need to be completed before your document can be approved for publication as an RFC. Second, IANA will create a new registry called the CAPWAP IEEE 802.11 Split MAC Profile registry. This new registry will consist of a Profile name, a type value and a reference. IANA understands that the new registry wil be managed via Expert Review as defined in RFC 5226. IANA QUESTION -> Where should this new registry be located? Is it a néw standalone registry on the IANA Matrix or is it a subregistry of an existing registry? If it is a subregistry of an existing registry, in which registry will it be contained? For example, should this a new subregistry be added to the registry "Control And Provisioning of Wireless Access Points (CAPWAP) Parameters" located at: https://www.iana.org/assignments/capwap-parameters/ ? There are initial registrations in the new registry as follows: Registry name: CAPWAP IEEE 802.11 Split MAC Profile Registration procedure: Expert Review Type Profile Value Reference ----------------------------------------+---------------+-------------------- Split MAC with WTP encryption 0 [ RFC-to-be ] Split MAC with AC encryption 1 [ RFC-to-be ] Unassigned 2-255 IANA understands these two actions to be the only ones required to be completed upon approval of this document. Note: The actions requested in this document will not be completed until the document has been approved for publication as an RFC. This message is only to confirm what actions will be performed. Please note that IANA cannot reserve specific values. However, early allocation is available for some types of registrations. For more information, please see RFC 7120. |
2014-11-03
|
06 | Gunter Van de Velde | Request for Last Call review by OPSDIR is assigned to Nevil Brownlee |
2014-11-03
|
06 | Gunter Van de Velde | Request for Last Call review by OPSDIR is assigned to Nevil Brownlee |
2014-11-03
|
06 | Gunter Van de Velde | Assignment of request for Last Call review by OPSDIR to David Black was rejected |
2014-10-30
|
06 | Jean Mahoney | Request for Last Call review by GENART is assigned to Meral Shirazipour |
2014-10-30
|
06 | Jean Mahoney | Request for Last Call review by GENART is assigned to Meral Shirazipour |
2014-10-30
|
06 | Tero Kivinen | Request for Last Call review by SECDIR is assigned to Catherine Meadows |
2014-10-30
|
06 | Tero Kivinen | Request for Last Call review by SECDIR is assigned to Catherine Meadows |
2014-10-30
|
06 | Gunter Van de Velde | Request for Last Call review by OPSDIR is assigned to David Black |
2014-10-30
|
06 | Gunter Van de Velde | Request for Last Call review by OPSDIR is assigned to David Black |
2014-10-27
|
06 | Cindy Morgan | IANA Review state changed to IANA - Review Needed |
2014-10-27
|
06 | Cindy Morgan | The following Last Call announcement was sent out: From: The IESG To: IETF-Announce CC: Reply-To: ietf@ietf.org Sender: Subject: Last Call: (IEEE 802.11 MAC Profile for … The following Last Call announcement was sent out: From: The IESG To: IETF-Announce CC: Reply-To: ietf@ietf.org Sender: Subject: Last Call: (IEEE 802.11 MAC Profile for CAPWAP) to Proposed Standard The IESG has received a request from the Operations and Management Area Working Group WG (opsawg) to consider the following document: - 'IEEE 802.11 MAC Profile for CAPWAP' as Proposed Standard The IESG plans to make a decision in the next few weeks, and solicits final comments on this action. Please send substantive comments to the ietf@ietf.org mailing lists by 2014-11-10. Exceptionally, comments may be sent to iesg@ietf.org instead. In either case, please retain the beginning of the Subject line to allow automated sorting. Abstract The CAPWAP protocol defines two entities: a Wireless Transmission Point (WTP) and an Access Controller (AC). The CAPWAP protocol binding for IEEE 802.11 defines two MAC (Medium Access Control) modes for IEEE 802.11 WTP: Split and Local MAC, and describes the required functionality split between the WTP and AC for each mode. However, in the split MAC mode, the partitioning of encryption/decryption functions are not been clearly clearly defined. In the Split MAC mode description, IEEE 802.11 encryption is specified as located in either at the AC or the WTP, with no clear way for the AC to inform the WTP of where the encryption functionality should be located. This lack of specification leads to interoperability issues, especially when the AC and WTP come from different vendors. To prevent interoperability issues, this specification defines an IEEE 802.11 MAC profile message element in which each profile specifies an unambiguous division of encryption functionality between the WTP and AC. The IEEE 802.11 MAC profile is used as follows: the WTP informs the AC of the supported profiles during the discovery or join process and the AC configures the WTP with one of the supported profiles when configuring the WLAN. The file can be obtained via http://datatracker.ietf.org/doc/draft-ietf-opsawg-capwap-hybridmac/ IESG discussion can be tracked via http://datatracker.ietf.org/doc/draft-ietf-opsawg-capwap-hybridmac/ballot/ No IPR declarations have been submitted directly on this I-D. |
2014-10-27
|
06 | Cindy Morgan | IESG state changed to In Last Call from Last Call Requested |
2014-10-27
|
06 | Benoît Claise | Last call was requested |
2014-10-27
|
06 | Benoît Claise | Last call announcement was generated |
2014-10-27
|
06 | Benoît Claise | Ballot approval text was generated |
2014-10-27
|
06 | Benoît Claise | Ballot writeup was generated |
2014-10-27
|
06 | Benoît Claise | IESG state changed to Last Call Requested from AD Evaluation |
2014-09-04
|
06 | Benoît Claise | IESG state changed to AD Evaluation from Publication Requested |
2014-08-12
|
06 | Cindy Morgan | IESG state changed to Publication Requested from Publication Requested::AD Followup |
2014-08-12
|
06 | Warren Kumari | Shepherd Template: 24 February 2012. (1) What type of RFC is being requested: Intended status: Standards Track. (2) Document Announcement Write-Up: Technical Summary: This document … Shepherd Template: 24 February 2012. (1) What type of RFC is being requested: Intended status: Standards Track. (2) Document Announcement Write-Up: Technical Summary: This document defines an IEEE 802.11 MAC profile which specifies the division of encryption functionality between the Wireless Transmission Point (WTP) and the Access Controller (AC). This is to alleviate interoperability issues, especially when the AC and WTP come from different vendors. Working Group Summary: There was no drama in the WG related to this document. OpsAWG provides a home for the CAPWAP work within the IETF, but CAPWAP is not the primary focus of the WG. This means that only a small number of participants had an opinion on the work, but those who did were supportive. We also received a comment from the IEEE 802.11 Working Group Chair, stating that: "The IEEE 802.11 Working Group has also reviewed this document and has no comments on its content." Document Quality: This document is well written, clear and concise. Personnel: Warren Kumari is the Document Shepherd. Benoit Claise is the Responsible Area Director. (3) Briefly describe the review of this document that was performed by the Document Shepherd. The document shepherd is not very familiar with CAPWAP, and so has relied on the opinions of those within the WG who know are familiar with CAPWAP for technical evaluation. The shepherd did review the document, and it is easily understandable by those not steeped in the CAPWAP arcana. (4) Does the document Shepherd have any concerns about the depth or breadth of the reviews that have been performed? The OpsAWG group is somewhat of a catch-all for documents that don't fit very well in other working groups. This means that we do not have a set of dedicated participants who are passionate about the topics / documents. The IETF works on the CAPWAP stuff together with the IEEE. All this means that we do not have a huge set of folk with experience in this area. That said, the participants who *do* know this stuff, and care about it all seem to believe that the work is needed, useful and clear. The IEEE 802.11 Working Group also reviewed this document and has no comments on its content ( https://datatracker.ietf.org/liaison/1325/ ) (5) Do portions of the document need review from a particular or from broader perspective? No. (6) Describe any specific concerns or issues that the Document Shepherd has with this document that the Responsible Area Director and/or the IESG should be aware of? None. (7) Has each author confirmed that any and all appropriate IPR disclosures required for full conformance with the provisions of BCP 78 and BCP 79 have already been filed. If not, explain why? Each author has confirmed. (8) Has an IPR disclosure been filed that references this document? Nope. (9) How solid is the WG consensus behind this document? Does it represent the strong concurrence of a few individuals, with others being silent, or does the WG as a whole understand and agree with it? The WG is not very active and only a minority of the WG participants follow CAPWAP, so the huge majority of the WG was silent. Those who do care were very supportive. The work was also presented in meetings, and discussion was supportive. (10) Has anyone threatened an appeal or otherwise indicated extreme discontent? Nope! (11) Identify any ID nits the Document Shepherd has found in this document. None (all nits found have been addressed in the latest version). (12) Describe how the document meets any required formal review criteria. None needed. (13) Have all references within this document been identified as either normative or informative? Yes. There are only 2 references, both normative. (14) Are there normative references to documents that are not ready for advancement? No. Both references are to published RFCs. (15) Are there downward normative references references (see RFC 3967)? Nope. (16) Will publication of this document change the status of any existing RFCs? Nope. (17) Describe the Document Shepherd's review of the IANA considerations section, especially with regard to its consistency with the body of the document. The IANA considerations section was a little sparse, the shepherd provided feedback to the authors and it has now been fleshed out. It appears acceptable now. The actions requested of the IANA align with the document contents. (18) List any new IANA registries that require Expert Review for future allocations. CAPWAP IEEE 802.11 Split MAC Profile. (19) Describe checks to validate formal language. No formal language exists. |
2014-08-12
|
06 | Warren Kumari | State Change Notice email list changed to opsawg-chairs@tools.ietf.org, draft-ietf-opsawg-capwap-hybridmac@tools.ietf.org |
2014-08-12
|
06 | Warren Kumari | Responsible AD changed to Benoit Claise |
2014-08-12
|
06 | Warren Kumari | IETF WG state changed to Submitted to IESG for Publication from WG Consensus: Waiting for Write-Up |
2014-08-12
|
06 | Warren Kumari | IESG state changed to Publication Requested |
2014-08-12
|
06 | Warren Kumari | IESG process started in state Publication Requested |
2014-08-12
|
06 | Warren Kumari | Intended Status changed to Proposed Standard from None |
2014-08-12
|
06 | Warren Kumari | Changed document writeup |
2014-08-12
|
06 | Warren Kumari | Document shepherd changed to Warren Kumari |
2014-08-11
|
06 | Rajesh Pazhyannur | New version available: draft-ietf-opsawg-capwap-hybridmac-06.txt |
2014-07-16
|
05 | (System) | Sub state has been changed to AD Followup from Revised ID Needed |
2014-07-16
|
05 | Cindy Morgan | New revision available |
2014-05-13
|
04 | Melinda Shore | Document shepherd changed to (None) |
2014-05-12
|
04 | Melinda Shore | Document shepherd changed to Melinda Shore |
2014-05-05
|
04 | Rajesh Pazhyannur | New version available: draft-ietf-opsawg-capwap-hybridmac-04.txt |
2014-05-05
|
03 | Rajesh Pazhyannur | New version available: draft-ietf-opsawg-capwap-hybridmac-03.txt |
2014-04-22
|
02 | Warren Kumari | Need revised ID with a few nits fixed, and then someone needs to shepherd! |
2014-04-22
|
02 | Warren Kumari | Tag Revised I-D Needed - Issue raised by WGLC set. |
2014-04-22
|
02 | Warren Kumari | IETF WG state changed to WG Consensus: Waiting for Write-Up from In WG Last Call |
2014-04-07
|
02 | Warren Kumari | IETF WG state changed to In WG Last Call from WG Document |
2014-02-14
|
02 | Rajesh Pazhyannur | New version available: draft-ietf-opsawg-capwap-hybridmac-02.txt |
2013-10-11
|
01 | Rajesh Pazhyannur | New version available: draft-ietf-opsawg-capwap-hybridmac-01.txt |
2013-05-08
|
00 | Hui Deng | New version available: draft-ietf-opsawg-capwap-hybridmac-00.txt |