Recommendations on Filtering of IPv4 Packets Containing IPv4 Options
draft-ietf-opsec-ip-options-filtering-07
Revision differences
Document history
Date | Rev. | By | Action |
---|---|---|---|
2014-02-04
|
07 | (System) | RFC Editor state changed to AUTH48-DONE from AUTH48 |
2014-01-27
|
07 | (System) | RFC Editor state changed to AUTH48 from RFC-EDITOR |
2014-01-27
|
07 | (System) | RFC Editor state changed to RFC-EDITOR from EDIT |
2013-12-17
|
07 | Amy Vezza | State changed to RFC Ed Queue from Approved-announcement sent |
2013-12-16
|
07 | (System) | RFC Editor state changed to EDIT |
2013-12-16
|
07 | (System) | Announcement was received by RFC Editor |
2013-12-16
|
07 | (System) | IANA Action state changed to No IC from In Progress |
2013-12-16
|
07 | (System) | IANA Action state changed to In Progress |
2013-12-16
|
07 | Cindy Morgan | State changed to Approved-announcement sent from Approved-announcement to be sent |
2013-12-16
|
07 | Cindy Morgan | IESG has approved the document |
2013-12-16
|
07 | Cindy Morgan | Closed "Approve" ballot |
2013-12-16
|
07 | Cindy Morgan | Ballot approval text was generated |
2013-12-14
|
07 | Joel Jaeggli | 07 addressed outstanding lc comments with some minor text changes. I have personally reviewed them and do not believe that the iesg does not need … 07 addressed outstanding lc comments with some minor text changes. I have personally reviewed them and do not believe that the iesg does not need to revist them. |
2013-12-14
|
07 | Joel Jaeggli | State changed to Approved-announcement to be sent from IESG Evaluation::AD Followup |
2013-12-09
|
07 | Carlos Pignataro | New version available: draft-ietf-opsec-ip-options-filtering-07.txt |
2013-12-03
|
06 | Suresh Krishnan | Request for Last Call review by GENART Completed: Almost Ready. Reviewer: Suresh Krishnan. |
2013-12-01
|
06 | Joel Jaeggli | looks good, waiting for loop to be closed with last call review. |
2013-11-28
|
06 | Gunter Van de Velde | Closed request for Telechat review by OPSDIR with state 'No Response' |
2013-11-28
|
06 | Tero Kivinen | Closed request for Telechat review by SECDIR with state 'No Response' |
2013-11-22
|
06 | Stephen Farrell | [Ballot comment] Thanks for handling my discuss and educating me on IPv4 options! |
2013-11-22
|
06 | Stephen Farrell | [Ballot Position Update] Position for Stephen Farrell has been changed to No Objection from Discuss |
2013-11-22
|
06 | (System) | Sub state has been changed to AD Followup from Revised ID Needed |
2013-11-22
|
06 | Carlos Pignataro | IANA Review state changed to Version Changed - Review Needed from IANA OK - No Actions Needed |
2013-11-22
|
06 | Carlos Pignataro | New version available: draft-ietf-opsec-ip-options-filtering-06.txt |
2013-11-21
|
05 | Cindy Morgan | State changed to IESG Evaluation::Revised I-D Needed from IESG Evaluation |
2013-11-21
|
05 | Martin Stiemerling | [Ballot Position Update] New position, No Objection, has been recorded for Martin Stiemerling |
2013-11-21
|
05 | Gonzalo Camarillo | [Ballot Position Update] New position, No Objection, has been recorded for Gonzalo Camarillo |
2013-11-21
|
05 | Spencer Dawkins | [Ballot comment] I wish we produced docs like this more often. Thanks for working on it. I agree with Pete that the 2119 language seems … [Ballot comment] I wish we produced docs like this more often. Thanks for working on it. I agree with Pete that the 2119 language seems odd, but whatever works for him will work for me. |
2013-11-21
|
05 | Spencer Dawkins | [Ballot Position Update] New position, Yes, has been recorded for Spencer Dawkins |
2013-11-21
|
05 | Stewart Bryant | [Ballot comment] From a purely historical point of view I think that the following is a little late: "From about 1995 onwards, a growing number … [Ballot comment] From a purely historical point of view I think that the following is a little late: "From about 1995 onwards, a growing number of IP routers have incorporated specialized IP packet processing silicon (i.e., FPGA, ASIC), " The processing split that you are concerned about happened much earlier that this. For example Cisco launched the AGS+ using this forwarding model in1989, and thereafter it was pretty much the only way to design a high-speed router. The person that knows most about the history is Scott Bradner who provided the definitive router bench tests in those days and thus tracked the architectural changes in some detail. ============== However, at present, the particular architectural and engineering details of the particular IP router being considered are important to understand when evaluating the operational security risks associated with a particular IP packet type or IP option type. "important" or "not important"? ============== I am surprised that the advice for new implementations is not MUST drop the obsolete (and maybe experimental) options. There surely cannot be any of them in deployment by now. At the least it should surely be MUST default to drop. ============== |
2013-11-21
|
05 | Stewart Bryant | [Ballot Position Update] New position, No Objection, has been recorded for Stewart Bryant |
2013-11-21
|
05 | Jari Arkko | [Ballot Position Update] New position, No Objection, has been recorded for Jari Arkko |
2013-11-21
|
05 | Benoît Claise | [Ballot comment] We also note that while this document provides advice on dropping packets on a "per IP option type", not all devices … [Ballot comment] We also note that while this document provides advice on dropping packets on a "per IP option type", not all devices may provide this capability with such granularity. Additionally, even in cases in which such functionality is provided, the operator might want to specify a dropping policy with a coarser granularity (rather than on a "per IP option type" granularity), as indicated above. Finally, in scenarios in which processing of IP options by intermediate systems is not required, a widespread approach is to simply ignore IP options, and process the corresponding packets as if they do not contain any IP options. The first paragraph speaks of device, while the second speaks of intermediate systems. So what's a device? I guess you only mean an intermediate system and not an end host, correct? I see later, for ex. in section 4.1.5 that you have advice for Routers, security gateways, and firewalls. Please expand in the intro what you have in mind with "device". For example: the advice in this document focus on routers, security gateways, firewalls As I conclude from ongoing discussions, this document targets operators and "routers, security gateways, firewalls" vendors. I also see that you want to add this paragraph below. Fine, but s/implementers/routers, security gateways, firewalls implementers + Finally, in addition to advice to operators, this document also + provides advice to implementers in terms of providing the capability + to filter packets with different granularities: both on a "per IP + option type" granularity (to maximize flexibility) as well as more + coarse filters (to minimize configuration complexity). - Section 4.6.5 Routers, security gateways, and firewalls SHOULD drop IP packets containing a Stream Identifier option. This option is obsolete. Either it's a MUST, or if you keep a SHOULD, then you should log the event if you see this option. We could debate what to do with "SHOULD drop" advice when the option is not obsolete (4.9.5, 4,11.5, and maybe others) but IMHO, the event must be logged. So the Routers, security gateways, and firewalls MUST provide the ability to log the event. Potentially a generic requirement - This option probably has more deployment now than when the IESG removed this option from the IETF standards-track. Can you please expand on this counter-intuitive observation. |
2013-11-21
|
05 | Benoît Claise | [Ballot Position Update] New position, No Objection, has been recorded for Benoit Claise |
2013-11-20
|
05 | Ted Lemon | [Ballot comment] This is a great document. Thanks for working on it! |
2013-11-20
|
05 | Ted Lemon | [Ballot Position Update] New position, No Objection, has been recorded for Ted Lemon |
2013-11-20
|
05 | Stephen Farrell | [Ballot discuss] So I'm not sure if this really needs fixing but 4.23.1 notes that RFCs 1122 and 1812 say you MUST ignore unknown options, … [Ballot discuss] So I'm not sure if this really needs fixing but 4.23.1 notes that RFCs 1122 and 1812 say you MUST ignore unknown options, but 4.23.4 here says that you SHOULD have a configuration knob with a "drop & log" setting. If that knob is set to "drop & log" then that node would seem to no longer be compliant with 1122 or 1812. Yet this document doesn't update those, nor say why that's ok. Why is that ok? If even a small percentage of nodes turn that knob to "drop & log" wouldn't that mean that no new IPv4 option with very broad impact could ever be introduced in future? |
2013-11-20
|
05 | Stephen Farrell | [Ballot comment] - 4.12 and 4.13 seem to have a lot of duplicated text so it wasn't clear to me how they differed if at … [Ballot comment] - 4.12 and 4.13 seem to have a lot of duplicated text so it wasn't clear to me how they differed if at all. |
2013-11-20
|
05 | Stephen Farrell | [Ballot Position Update] New position, Discuss, has been recorded for Stephen Farrell |
2013-11-19
|
05 | Adrian Farrel | [Ballot comment] Thanks for this document. I support its publication. --- I agree with Pete that the value of using RFC 2119 language in the … [Ballot comment] Thanks for this document. I support its publication. --- I agree with Pete that the value of using RFC 2119 language in the "Advice" sections is questionable. For me it just disrupts the flow of the text and is somewhat ambiguous - what does it mean to advise that you MUST do something? But this is just my opinion. --- It is possible that some of your Informational references are really normative. For example, 6398 is used to define some terms that you use and also to describe some environments that you reference. This is not very important, but perhaps you could take a quick look at your references to see how you feel about them. |
2013-11-19
|
05 | Adrian Farrel | [Ballot Position Update] New position, Yes, has been recorded for Adrian Farrel |
2013-11-19
|
05 | Richard Barnes | [Ballot Position Update] New position, No Objection, has been recorded for Richard Barnes |
2013-11-18
|
05 | Pete Resnick | [Ballot comment] A question: Are router vendors already adopting these recommendations? If not, are we sure they're going to? That is, is this document aspirational … [Ballot comment] A question: Are router vendors already adopting these recommendations? If not, are we sure they're going to? That is, is this document aspirational or is the actual ops community on board with this? Overall editorial comment: It might have been nice if the "Advice" sections got reduced to one or two keywords. You could have defined up at the top of the document "DROP", "FORWARD", "CONFIGURABLE", "DEFAULT DROP", "DEFAULT FORWARD", "LOG", and then just used those terms. You could have even made a handy-dandy table of options and advice and saved people the read if they just wanted to take the advice without caring why. Also, I think the 2119 use in this document is unnecessary. You're only using "SHOULD" and "SHOULD NOT" throughout, and in all those cases you really mean "This is the best plan" or "This is not the best plan", not really what 2119 says. But it's up to the WG whether either of those editorial issues are worth addressing. |
2013-11-18
|
05 | Pete Resnick | [Ballot Position Update] New position, No Objection, has been recorded for Pete Resnick |
2013-11-18
|
05 | Brian Haberman | [Ballot comment] This is a useful piece of work. I only have two nit-like comments that you can take or leave... 1. The end of … [Ballot comment] This is a useful piece of work. I only have two nit-like comments that you can take or leave... 1. The end of section 3 suggests that operators should take a device's IP options filtering capabilities into account when making deployment decisions. Should a similar statement be made that this document is focused on recommendations for vendors to provide filtering support/capabilities for IP options? 2. A little pedantic, but if an option is obsolete wouldn't its presence in a packet indicate a possible covert channel? If that is the case, options like the one described in 4.6 should have a covert channel listed as a possible threat. |
2013-11-18
|
05 | Brian Haberman | [Ballot Position Update] New position, No Objection, has been recorded for Brian Haberman |
2013-11-15
|
05 | Barry Leiba | [Ballot comment] One small editorial comment: -- Section 4.3 -- RFC 791 states that this option should appear, at most, once in a … [Ballot comment] One small editorial comment: -- Section 4.3 -- RFC 791 states that this option should appear, at most, once in a given packet. Both commas are spurious, and should be removed. |
2013-11-15
|
05 | Barry Leiba | [Ballot Position Update] New position, No Objection, has been recorded for Barry Leiba |
2013-11-15
|
05 | Gunter Van de Velde | Request for Telechat review by OPSDIR is assigned to Benson Schliesser |
2013-11-15
|
05 | Gunter Van de Velde | Request for Telechat review by OPSDIR is assigned to Benson Schliesser |
2013-11-03
|
05 | Joel Jaeggli | Placed on agenda for telechat - 2013-11-21 |
2013-10-31
|
05 | Tero Kivinen | Request for Telechat review by SECDIR is assigned to David Waltermire |
2013-10-31
|
05 | Tero Kivinen | Request for Telechat review by SECDIR is assigned to David Waltermire |
2013-10-25
|
05 | Tero Kivinen | Assignment of request for Last Call review by SECDIR to Sam Weiler was rejected |
2013-10-05
|
05 | Joel Jaeggli | State changed to IESG Evaluation from Waiting for Writeup |
2013-10-03
|
05 | Joel Jaeggli | Ballot has been issued |
2013-10-03
|
05 | Joel Jaeggli | [Ballot Position Update] New position, Yes, has been recorded for Joel Jaeggli |
2013-10-03
|
05 | Joel Jaeggli | Created "Approve" ballot |
2013-10-03
|
05 | Joel Jaeggli | Ballot writeup was changed |
2013-09-30
|
05 | (System) | State changed to Waiting for Writeup from In Last Call (ends 2013-09-30) |
2013-09-24
|
05 | (System) | IANA Review state changed to IANA OK - No Actions Needed from IANA - Review Needed |
2013-09-24
|
05 | Amanda Baber | IESG/Authors/WG Chairs: IANA has reviewed draft-ietf-opsec-ip-options-filtering-05, which is currently in Last Call, and has the following comments: We understand that this document doesn't require … IESG/Authors/WG Chairs: IANA has reviewed draft-ietf-opsec-ip-options-filtering-05, which is currently in Last Call, and has the following comments: We understand that this document doesn't require any IANA actions. IANA requests that the IANA Considerations section of the document remain in place upon publication. If this assessment is not accurate, please respond as soon as possible. |
2013-09-19
|
05 | Jean Mahoney | Request for Last Call review by GENART is assigned to Suresh Krishnan |
2013-09-19
|
05 | Jean Mahoney | Request for Last Call review by GENART is assigned to Suresh Krishnan |
2013-09-19
|
05 | Tero Kivinen | Request for Last Call review by SECDIR is assigned to Sam Weiler |
2013-09-19
|
05 | Tero Kivinen | Request for Last Call review by SECDIR is assigned to Sam Weiler |
2013-09-16
|
05 | Amy Vezza | IANA Review state changed to IANA - Review Needed |
2013-09-16
|
05 | Amy Vezza | The following Last Call announcement was sent out: From: The IESG To: IETF-Announce CC: Reply-To: ietf@ietf.org Sender: Subject: Last Call: (Recommendations on filtering of IPv4 … The following Last Call announcement was sent out: From: The IESG To: IETF-Announce CC: Reply-To: ietf@ietf.org Sender: Subject: Last Call: (Recommendations on filtering of IPv4 packets containing IPv4 options.) to Best Current Practice The IESG has received a request from the Operational Security Capabilities for IP Network Infrastructure WG (opsec) to consider the following document: - 'Recommendations on filtering of IPv4 packets containing IPv4 options.' as Best Current Practice The IESG plans to make a decision in the next few weeks, and solicits final comments on this action. Please send substantive comments to the ietf@ietf.org mailing lists by 2013-09-30. Exceptionally, comments may be sent to iesg@ietf.org instead. In either case, please retain the beginning of the Subject line to allow automated sorting. Abstract This document provides advice on the filtering of IPv4 packets based on the IPv4 options they contain. Additionally, it discusses the operational and interoperability implications of dropping packets based on the IP options they contain. The file can be obtained via http://datatracker.ietf.org/doc/draft-ietf-opsec-ip-options-filtering/ IESG discussion can be tracked via http://datatracker.ietf.org/doc/draft-ietf-opsec-ip-options-filtering/ballot/ No IPR declarations have been submitted directly on this I-D. |
2013-09-16
|
05 | Amy Vezza | State changed to In Last Call from Last Call Requested |
2013-09-16
|
05 | Joel Jaeggli | Last call was requested |
2013-09-16
|
05 | Joel Jaeggli | Last call announcement was generated |
2013-09-16
|
05 | Joel Jaeggli | Ballot approval text was generated |
2013-09-16
|
05 | Joel Jaeggli | Ballot writeup was generated |
2013-09-16
|
05 | Joel Jaeggli | reviewed revised draft. |
2013-09-16
|
05 | Joel Jaeggli | State changed to Last Call Requested from AD Evaluation::AD Followup |
2013-09-16
|
05 | Carlos Pignataro | New version available: draft-ietf-opsec-ip-options-filtering-05.txt |
2013-09-03
|
04 | Joel Jaeggli | some thoughts from my review. 1. I'm not sure sure we should be getting all the alarms from the NITs on the table in 4.23.1I … some thoughts from my review. 1. I'm not sure sure we should be getting all the alarms from the NITs on the table in 4.23.1I leave it you you to device how to reformat that or site them. 2. obsoleted refences to documents where both the current and obsoleted version are cited e.g. 4.12.2. Option Specification It is specified by RFC 1108 [RFC1108]], which obsoleted RFC 1038 [RFC1038] (which in turn obsoleted the Security Option defined in RFC 791 [RFC0791]). could probably reference the current version only without causing confusion. 3. Third citatations of current implementations of something found in IRIX seem a little silly. 6.5.30 was the last release and that was something like 8 years ago, the hardware that shipped with it went EOS in 2006. |
2013-09-03
|
04 | Joel Jaeggli | State changed to AD Evaluation::AD Followup from AD Evaluation |
2013-09-03
|
04 | Joel Jaeggli | State changed to AD Evaluation from Publication Requested |
2013-08-22
|
04 | Cindy Morgan | (1) What type of RFC is being requested (BCP, Proposed Standard, Internet Standard, Informational, Experimental, or Historic)? Why is this the proper type of RFC? … (1) What type of RFC is being requested (BCP, Proposed Standard, Internet Standard, Informational, Experimental, or Historic)? Why is this the proper type of RFC? Is this type of RFC indicated in the title page header? This document captures the current thinking on operational and interoperability implications of filtering IPv4 packets based upon the IPv6 options that they contain, including guidance to operators on the best way to achieve this filtering. For this reason, we believe that BCP is the correct track. (2) The IESG approval announcement includes a Document Announcement Write-Up. Please provide such a Document Announcement Write-Up. Recent examples can be found in the "Action" announcements for approved documents. The approval announcement contains the following sections: Technical Summary: This document discusses the operational and interoperability implications of filtering IPv4 packets based on the IPv4 options they contain. It also provides advice to operators who wish to do such filtering. Working Group Summary: This document received in-depth review from some key WG members. The WGLC concluded that this is useful information that is presented in an easy to read format. Document Quality: This documents evaluates, in detail, every IPv4 option that has been specified so far and provides the following analysis: 1) The use case for each option 2) Specific threats that have been identified with said option 3) Operational implications of blocking said option 4) Very specific advice to operators on how to deal with said option The format in which the information is provided makes this document very easy to read. This is very useful information for operators of Internet Service Provider and Enterprise networks. Personnel: Kiran Kumar Chittimaneni (KK) is the Document Shepherd. Joel Jaeggli is the Area Director. (3) Briefly describe the review of this document that was performed by the Document Shepherd. The Document Shepherd (also a WG chair) has followed the progression of the draft through revisions and the WG. (4) Does the document Shepherd have any concerns about the depth or breadth of the reviews that have been performed? A WGLC was initiated, and then extended to get additional review from key WG members. The Shepherd believes that there is now sufficient review, both in terms of volume, and expertise. (5) Do portions of the document need review from a particular or from broader perspective? No. (6) Describe any specific concerns or issues that the Document Shepherd has with this document that the Responsible Area Director and/or the IESG should be aware of? None. (7) Has each author confirmed that any and all appropriate IPR disclosures required for full conformance with the provisions of BCP 78 and BCP 79 have already been filed. If not, explain why? Yes. (8) Has an IPR disclosure been filed that references this document? No IPR disclosures have been filed. (9) How solid is the WG consensus behind this document? The most involved / active WG participants did respond and their comments were supportive. We also requested a thorough review from three key members of the WG. We believe there is general consensus in the WG. (10) Has anyone threatened an appeal or otherwise indicated extreme discontent? Not at all. (11) Identify any ID nits the Document Shepherd has found in this document. -- Obsolete informational reference: RFC 2407 (Obsoleted by RFC 4306) -- Outdated reference: A later version (-03) exists of draft-stoica-diffserv-dps-02 -- The ID Nits tool spat out a few missing references (people) == Missing Reference: 'ZSu' is mentioned on line 1239, but not defined == Missing Reference: 'Finn' is mentioned on line 1240, but not defined == Missing Reference: 'VerSteeg' is mentioned on line 1241, but not defined == Missing Reference: 'Lee' is mentioned on line 1242, but not defined (12) Describe how the document meets any required formal review criteria, such as the MIB Doctor, media type, and URI type reviews. N/A. (13) Have all references within this document been identified as either normative or informative? Yes. (14) Are there normative references to documents that are not ready for advancement or are otherwise in an unclear state? No - all normative references are to RFCs. (15) Are there downward normative references references (see RFC 3967)? If so, list these downward references to support the Area Director in the Last Call procedure. None. (16) Will publication of this document change the status of any existing RFCs? No / N/A. (17) Describe the Document Shepherd's review of the IANA considerations section. No IANA action requested or required. This matches the text of the document. (18) List any new IANA registries that require Expert Review for future allocations. None. (19) Describe reviews and automated checks performed by the Document Shepherd to validate sections of the document written in a formal language, such as XML code, BNF rules, MIB definitions, etc. None / N/A. |
2013-08-22
|
04 | Cindy Morgan | Changed document writeup |
2013-08-22
|
04 | Joel Jaeggli | Intended Status changed to Best Current Practice |
2013-08-22
|
04 | Joel Jaeggli | IESG process started in state Publication Requested |
2013-08-22
|
04 | (System) | Earlier history may be found in the Comment Log for /doc/draft-gont-opsec-ip-options-filtering/ |
2013-08-22
|
04 | Chittimaneni Kk | Document shepherd changed to KK Chittimaneni |
2013-08-22
|
04 | Chittimaneni Kk | Changed consensus to Yes from Unknown |
2013-08-22
|
04 | Chittimaneni Kk | (1) What type of RFC is being requested (BCP, Proposed Standard, Internet Standard, Informational, Experimental, or Historic)? Why is this the proper type of RFC? … (1) What type of RFC is being requested (BCP, Proposed Standard, Internet Standard, Informational, Experimental, or Historic)? Why is this the proper type of RFC? Is this type of RFC indicated in the title page header? This document captures the current thinking on operational and interoperability implications of filtering IPv4 packets based upon the IPv6 options that they contain, including guidance to operators on the best way to achieve this filtering. For this reason, we believe that BCP is the correct track. (2) The IESG approval announcement includes a Document Announcement Write-Up. Please provide such a Document Announcement Write-Up. Recent examples can be found in the "Action" announcements for approved documents. The approval announcement contains the following sections: Technical Summary: This document discusses the operational and interoperability implications of filtering IPv4 packets based on the IPv4 options they contain. It also provides advice to operators who wish to do such filtering. Working Group Summary: This document received in-depth review from some key WG members. The WGLC concluded that this is useful information that is presented in an easy to read format. Document Quality: This documents evaluates, in detail, every IPv4 option that has been specified so far and provides the following analysis: 1) The use case for each option 2) Specific threats that have been identified with said option 3) Operational implications of blocking said option 4) Very specific advice to operators on how to deal with said option The format in which the information is provided makes this document very easy to read. This is very useful information for operators of Internet Service Provider and Enterprise networks. Personnel: Kiran Kumar Chittimaneni (KK) is the Document Shepherd. Joel Jaeggli is the Area Director. (3) Briefly describe the review of this document that was performed by the Document Shepherd. The Document Shepherd (also a WG chair) has followed the progression of the draft through revisions and the WG. (4) Does the document Shepherd have any concerns about the depth or breadth of the reviews that have been performed? A WGLC was initiated, and then extended to get additional review from key WG members. The Shepherd believes that there is now sufficient review, both in terms of volume, and expertise. (5) Do portions of the document need review from a particular or from broader perspective? No. (6) Describe any specific concerns or issues that the Document Shepherd has with this document that the Responsible Area Director and/or the IESG should be aware of? None. (7) Has each author confirmed that any and all appropriate IPR disclosures required for full conformance with the provisions of BCP 78 and BCP 79 have already been filed. If not, explain why? Yes. (8) Has an IPR disclosure been filed that references this document? No IPR disclosures have been filed. (9) How solid is the WG consensus behind this document? The most involved / active WG participants did respond and their comments were supportive. We also requested a thorough review from three key members of the WG. We believe there is general consensus in the WG. (10) Has anyone threatened an appeal or otherwise indicated extreme discontent? Not at all. (11) Identify any ID nits the Document Shepherd has found in this document. -- Obsolete informational reference: RFC 2407 (Obsoleted by RFC 4306) -- Outdated reference: A later version (-03) exists of draft-stoica-diffserv-dps-02 -- The ID Nits tool spat out a few missing references (people) == Missing Reference: 'ZSu' is mentioned on line 1239, but not defined == Missing Reference: 'Finn' is mentioned on line 1240, but not defined == Missing Reference: 'VerSteeg' is mentioned on line 1241, but not defined == Missing Reference: 'Lee' is mentioned on line 1242, but not defined (12) Describe how the document meets any required formal review criteria, such as the MIB Doctor, media type, and URI type reviews. N/A. (13) Have all references within this document been identified as either normative or informative? Yes. (14) Are there normative references to documents that are not ready for advancement or are otherwise in an unclear state? No - all normative references are to RFCs. (15) Are there downward normative references references (see RFC 3967)? If so, list these downward references to support the Area Director in the Last Call procedure. None. (16) Will publication of this document change the status of any existing RFCs? No / N/A. (17) Describe the Document Shepherd's review of the IANA considerations section. No IANA action requested or required. This matches the text of the document. (18) List any new IANA registries that require Expert Review for future allocations. None. (19) Describe reviews and automated checks performed by the Document Shepherd to validate sections of the document written in a formal language, such as XML code, BNF rules, MIB definitions, etc. None / N/A. |
2013-08-22
|
04 | Chittimaneni Kk | IETF WG state changed to Submitted to IESG for Publication from WG Consensus: Waiting for Write-Up |
2013-07-14
|
04 | Warren Kumari | IETF WG state changed to WG Consensus: Waiting for Write-Up from In WG Last Call |
2013-07-11
|
04 | Carlos Pignataro | New version available: draft-ietf-opsec-ip-options-filtering-04.txt |
2013-07-09
|
03 | Carlos Pignataro | New version available: draft-ietf-opsec-ip-options-filtering-03.txt |
2013-02-18
|
02 | Warren Kumari | IETF state changed to In WG Last Call from WG Document |
2013-01-26
|
02 | Fernando Gont | New version available: draft-ietf-opsec-ip-options-filtering-02.txt |
2012-12-13
|
01 | Fernando Gont | New version available: draft-ietf-opsec-ip-options-filtering-01.txt |
2012-06-11
|
00 | Fernando Gont | New version available: draft-ietf-opsec-ip-options-filtering-00.txt |