Using Only Link-Local Addressing inside an IPv6 Network
draft-ietf-opsec-lla-only-11
Revision differences
Document history
Date | Rev. | By | Action |
---|---|---|---|
2014-11-10
|
11 | (System) | RFC Editor state changed to AUTH48-DONE from AUTH48 |
2014-11-05
|
11 | (System) | RFC Editor state changed to AUTH48 from RFC-EDITOR |
2014-10-28
|
11 | (System) | RFC Editor state changed to RFC-EDITOR from EDIT |
2014-09-29
|
11 | Cindy Morgan | IESG state changed to RFC Ed Queue from Approved-announcement sent |
2014-09-29
|
11 | (System) | RFC Editor state changed to EDIT |
2014-09-29
|
11 | (System) | Announcement was received by RFC Editor |
2014-09-29
|
11 | (System) | IANA Action state changed to No IC from In Progress |
2014-09-29
|
11 | (System) | IANA Action state changed to In Progress |
2014-09-29
|
11 | Cindy Morgan | IESG state changed to Approved-announcement sent from Approved-announcement to be sent |
2014-09-29
|
11 | Cindy Morgan | IESG has approved the document |
2014-09-29
|
11 | Cindy Morgan | Closed "Approve" ballot |
2014-09-29
|
11 | Cindy Morgan | Ballot approval text was generated |
2014-09-28
|
11 | Joel Jaeggli | IESG state changed to Approved-announcement to be sent from IESG Evaluation::AD Followup |
2014-09-25
|
11 | Brian Haberman | [Ballot comment] Thanks for addressing my DISCUSS. |
2014-09-25
|
11 | Brian Haberman | [Ballot Position Update] Position for Brian Haberman has been changed to No Objection from Discuss |
2014-09-25
|
11 | Michael Behringer | IANA Review state changed to Version Changed - Review Needed from IANA OK - No Actions Needed |
2014-09-25
|
11 | Michael Behringer | New version available: draft-ietf-opsec-lla-only-11.txt |
2014-08-24
|
10 | Peter Yee | Request for Telechat review by GENART Completed: Ready with Issues. Reviewer: Peter Yee. |
2014-08-21
|
10 | Cindy Morgan | IESG state changed to IESG Evaluation::AD Followup from IESG Evaluation |
2014-08-21
|
10 | Ted Lemon | [Ballot comment] I promised to drop my DISCUSS at the end of the telechat. There was rather overwhelming advice from operators who actually have large … [Ballot comment] I promised to drop my DISCUSS at the end of the telechat. There was rather overwhelming advice from operators who actually have large deployments in the field that this was a bad idea, and I think that should be reflected in the document, but I'm not going to actively block the document because the text doesn't currently reflect that message. That said, I would like to see the text updated to clearly say that some experienced operators consider this a bad idea, and that operators who are considering deploying this method should bear that in mind and not take the fact that this document has been published by the IETF as an indication that this is a preferred method of deployment. |
2014-08-21
|
10 | Ted Lemon | [Ballot Position Update] Position for Ted Lemon has been changed to Abstain from Discuss |
2014-08-21
|
10 | Ted Lemon | [Ballot discuss] I'm raising this as a DISCUSS for the meeting today because I don't know what the outcome of the discussion we had about … [Ballot discuss] I'm raising this as a DISCUSS for the meeting today because I don't know what the outcome of the discussion we had about this back in April/May was. It looks like this text is the result of that discussion (it appears to be the only change since the discussion): During WG and IETF last call the technical correctness of the document has been reviewed, however debate exists as to whether to recommend this technique. The deployment of this technique is appropriate where it is found to be necessary. This doesn't seem to entirely capture the opinions that were stated during IETF last call. Do we feel that the last call comments have been adequately addressed? I don't have a strong opinion on this either way; I just want to make sure we actually talk about it on the telechat, given our recent penchant for brevity. Regardless of the outcome of that discussion, I will drop the DISCUSS after the telechat is done. |
2014-08-21
|
10 | Ted Lemon | [Ballot Position Update] New position, Discuss, has been recorded for Ted Lemon |
2014-08-21
|
10 | Jari Arkko | [Ballot comment] I have not seen a response to Peter Yee's Gen-ART review, although some of the suggested issues have been corrected. FWIW, I still … [Ballot comment] I have not seen a response to Peter Yee's Gen-ART review, although some of the suggested issues have been corrected. FWIW, I still think Peter was right in these two items that have not been changed: Page 4, 5th paragraph, 2nd sentence: SSH brute force password attacks aren't really reduced unless the reduction is simply not being able to attack a single router over multiple interfaces in parallel. A better scheme for reducing SSH brute force password attacks might be to limit the rate of responses to SSH login attempts in the face of repeated failures. Considering dropping this marginal example. Page 6, 1st partial paragraph: the argument is made that "more work" is required to discover all of an IXPs loopback interface addresses before a generic attack can be mounted. This wouldn't seem to be a lot of upfront work and once it has been done, the advantage is negated. I don't find the argument particularly persuasive. |
2014-08-21
|
10 | Jari Arkko | [Ballot Position Update] New position, No Objection, has been recorded for Jari Arkko |
2014-08-21
|
10 | Pete Resnick | [Ballot comment] During WG and IETF last call the technical correctness of the document has been reviewed, however debate exists as to whether … [Ballot comment] During WG and IETF last call the technical correctness of the document has been reviewed, however debate exists as to whether to recommend this technique. The deployment of this technique is appropriate where it is found to be necessary. Wow. The above (especially the second sentence), along with the shepherd writeup, does make one wonder whether the WG really wanted to publish this document. I'm not about to stand in the way, but to say that the "technique is appropriate where it is found to be necessary" is not a very meaningful claim. |
2014-08-21
|
10 | Pete Resnick | [Ballot Position Update] New position, No Objection, has been recorded for Pete Resnick |
2014-08-20
|
10 | Stephen Farrell | [Ballot comment] nitty nits only: section 1: "attack horizon" isn't the usual phrase, "attack surface" is I think more common (and is used later for … [Ballot comment] nitty nits only: section 1: "attack horizon" isn't the usual phrase, "attack surface" is I think more common (and is used later for this). section 1: "The deployment of this technique is appropriate where it is found to be necessary" seems to be a tautology. 2.4: I think uRPF and PTMUd are used without expansion. (And why the small 'd' in PMTUd, don't recall that before.) |
2014-08-20
|
10 | Stephen Farrell | Ballot comment text updated for Stephen Farrell |
2014-08-20
|
10 | Stephen Farrell | [Ballot comment] section 1: "attack horizon" isn't the usual phrase, "attack surface" is I think more common (and is used later for this). section 1: … [Ballot comment] section 1: "attack horizon" isn't the usual phrase, "attack surface" is I think more common (and is used later for this). section 1: "The deployment of this technique is appropriate where it is found to be necessary" seems to be a tautology. 2.4: I think uRPF and PTMUd are used without expansion. (And why the small 'd' in PMTUd, don't recall that before.) |
2014-08-20
|
10 | Stephen Farrell | [Ballot Position Update] New position, No Objection, has been recorded for Stephen Farrell |
2014-08-20
|
10 | Kathleen Moriarty | [Ballot comment] Overall, I think this is a well written draft and think the security benefits could be very positive. In section 2.2, could you … [Ballot comment] Overall, I think this is a well written draft and think the security benefits could be very positive. In section 2.2, could you move up the reference to RFC6752 and then you can avoid the last sentence in this section. I think it makes it cleaner and leads you right to the detailed description for iACL. Suggest change from: "This may ease protection measures, such as infrastructure access control lists (iACL)." To: "This may ease protection measures, such as infrastructure access control lists (iACL). [RFC6752]" I agree with the point made in this paragraph and think another advantage is that you can define ACLs for the pass through traffic at this point that is 'invisible' for direct attacks. Some firewalls operate in what they call bridge mode for that purpose. Please see the recommendation in the SecDir review to include references to security considerations sections in previously mentioned RFCs in the draft. Here's a link in case you didn't see it. https://www.ietf.org/mail-archive/web/secdir/current/msg04709.html |
2014-08-20
|
10 | Kathleen Moriarty | [Ballot Position Update] New position, No Objection, has been recorded for Kathleen Moriarty |
2014-08-20
|
10 | Alissa Cooper | [Ballot comment] = Section 2.3 = If it seems reasonable, might it be possible to say "LLAs have usually been EUI-64 based" rather than "LLAs … [Ballot comment] = Section 2.3 = If it seems reasonable, might it be possible to say "LLAs have usually been EUI-64 based" rather than "LLAs are usually EUI-64 based" given that there is some movement away from embedding hardware addresses in IIDs (e.g., draft-ietf-6man-default-iids)? |
2014-08-20
|
10 | Alissa Cooper | [Ballot Position Update] New position, No Objection, has been recorded for Alissa Cooper |
2014-08-20
|
10 | Richard Barnes | [Ballot Position Update] New position, No Objection, has been recorded for Richard Barnes |
2014-08-18
|
10 | Adrian Farrel | [Ballot comment] I have no strong objection to the publication of this document although there is to me a faint whiff of what a sceptic … [Ballot comment] I have no strong objection to the publication of this document although there is to me a faint whiff of what a sceptic might call snake oil. Some of that arises from an imbalance of language ("advantages" against "caveats" rather than "opportunities" against "disadvantages") and some of it could have been dispelled by answering the shepherd write-up question on implementation by describing the existing deployments that use this technique. Anyway, here are two editorial issues for you to consider... Are the last two paragraphs of 2.2 in the right section? They do not appear to describe "advantages" of the proposed scheme. The text "using only link-local addresses on infrastructure links" is lumpy to read, but does convey exactly what you mean. There is a temptation to read it as "using link-local addresses only on infrastructure links" and you will need to watch the RFC Editor to make sure that bug doesn't creep in. And you will need to fix Section 3 where you have Using LLAs only on infrastructure links reduces the attack surface of a router |
2014-08-18
|
10 | Adrian Farrel | [Ballot Position Update] New position, No Objection, has been recorded for Adrian Farrel |
2014-08-18
|
10 | Spencer Dawkins | [Ballot comment] Thank you for documenting what many folk (including me) partially understand! |
2014-08-18
|
10 | Spencer Dawkins | [Ballot Position Update] New position, Yes, has been recorded for Spencer Dawkins |
2014-08-18
|
10 | Brian Haberman | [Ballot discuss] I believe there is an additional that should be discussed in this document, but I want to get the authors' opinions on it. … [Ballot discuss] I believe there is an additional that should be discussed in this document, but I want to get the authors' opinions on it. The document makes the claim that using LLAs between infrastructure devices reduces the attack surface of the network. However, I think there is an adverse side effect that needs to be discussed. If every device in a network follows this advice and only uses a globally-scoped address on its loopback interface, it seems easier to map the topology of the network. Since all responses to pings/traceroutes from a single router will have the same global address, an attacker can map adjacent devices by probing from different points outside the network. In the non-LLA case, responses to pings/traceroutes typically use the interface addresses, which would vary in the same type of probing. By reducing the number of addresses that can be used in ping/traceroute responses, the LLA-only network is more vulnerable to network mapping. |
2014-08-18
|
10 | Brian Haberman | [Ballot comment] - It would be useful if the document actually defined "infrastructure link" as a network link with no endpoints/hosts. |
2014-08-18
|
10 | Brian Haberman | [Ballot Position Update] New position, Discuss, has been recorded for Brian Haberman |
2014-08-15
|
10 | Martin Stiemerling | [Ballot Position Update] New position, No Objection, has been recorded for Martin Stiemerling |
2014-08-14
|
10 | Jean Mahoney | Request for Telechat review by GENART is assigned to Peter Yee |
2014-08-14
|
10 | Jean Mahoney | Request for Telechat review by GENART is assigned to Peter Yee |
2014-08-03
|
10 | (System) | IANA Review state changed to IANA OK - No Actions Needed from Version Changed - Review Needed |
2014-08-02
|
10 | Joel Jaeggli | Ballot has been issued |
2014-08-02
|
10 | Joel Jaeggli | [Ballot Position Update] New position, Yes, has been recorded for Joel Jaeggli |
2014-08-02
|
10 | Joel Jaeggli | Created "Approve" ballot |
2014-08-02
|
10 | Joel Jaeggli | Ballot writeup was changed |
2014-08-02
|
10 | Joel Jaeggli | Placed on agenda for telechat - 2014-08-21 |
2014-08-02
|
10 | Joel Jaeggli | IESG state changed to IESG Evaluation from Waiting for AD Go-Ahead::AD Followup |
2014-07-28
|
10 | Michael Behringer | New version available: draft-ietf-opsec-lla-only-10.txt |
2014-07-23
|
09 | Michael Behringer | New version available: draft-ietf-opsec-lla-only-09.txt |
2014-05-15
|
08 | Éric Vyncke | IANA Review state changed to Version Changed - Review Needed from IANA OK - No Actions Needed |
2014-05-15
|
08 | Éric Vyncke | New version available: draft-ietf-opsec-lla-only-08.txt |
2014-04-14
|
07 | Peter Yee | Request for Last Call review by GENART Completed: Ready with Issues. Reviewer: Peter Yee. |
2014-04-13
|
07 | Joel Jaeggli | IESG state changed to Waiting for AD Go-Ahead::AD Followup from Waiting for Writeup |
2014-04-07
|
07 | (System) | IESG state changed to Waiting for Writeup from In Last Call |
2014-04-03
|
07 | Gunter Van de Velde | Request for Last Call review by OPSDIR Completed: Has Issues. Reviewer: Suzanne Woolf. |
2014-04-03
|
07 | Tero Kivinen | Request for Last Call review by SECDIR Completed: Has Nits. Reviewer: Christopher Inacio. |
2014-04-02
|
07 | (System) | IANA Review state changed to IANA OK - No Actions Needed from IANA - Review Needed |
2014-04-02
|
07 | Pearl Liang | IESG/Authors/WG Chairs: IANA has reviewed draft-ietf-opsec-lla-only-07, which is currently in Last Call, and has the following comments: We understand that, upon approval of this … IESG/Authors/WG Chairs: IANA has reviewed draft-ietf-opsec-lla-only-07, which is currently in Last Call, and has the following comments: We understand that, upon approval of this document, there are no IANA Actions that need completion. While it is helpful for the IANA Considerations section of the document to remain in place upon publication, if the authors prefer to remove it, IANA doesn't object. If this assessment is not accurate, please respond as soon as possible. |
2014-03-28
|
07 | Tina Tsou | Request for Last Call review by OPSDIR is assigned to Suzanne Woolf |
2014-03-28
|
07 | Tina Tsou | Request for Last Call review by OPSDIR is assigned to Suzanne Woolf |
2014-03-27
|
07 | Jean Mahoney | Request for Last Call review by GENART is assigned to Peter Yee |
2014-03-27
|
07 | Jean Mahoney | Request for Last Call review by GENART is assigned to Peter Yee |
2014-03-27
|
07 | Tero Kivinen | Request for Last Call review by SECDIR is assigned to Christopher Inacio |
2014-03-27
|
07 | Tero Kivinen | Request for Last Call review by SECDIR is assigned to Christopher Inacio |
2014-03-24
|
07 | Amy Vezza | IANA Review state changed to IANA - Review Needed |
2014-03-24
|
07 | Amy Vezza | The following Last Call announcement was sent out: From: The IESG To: IETF-Announce CC: Reply-To: ietf@ietf.org Sender: Subject: Last Call: (Using Only Link-Local Addressing Inside … The following Last Call announcement was sent out: From: The IESG To: IETF-Announce CC: Reply-To: ietf@ietf.org Sender: Subject: Last Call: (Using Only Link-Local Addressing Inside an IPv6 Network) to Informational RFC The IESG has received a request from the Operational Security Capabilities for IP Network Infrastructure WG (opsec) to consider the following document: - 'Using Only Link-Local Addressing Inside an IPv6 Network' as Informational RFC The IESG plans to make a decision in the next few weeks, and solicits final comments on this action. Please send substantive comments to the ietf@ietf.org mailing lists by 2014-04-07. Exceptionally, comments may be sent to iesg@ietf.org instead. In either case, please retain the beginning of the Subject line to allow automated sorting. Abstract In an IPv6 network it is possible to use only link-local addresses on infrastructure links between routers. This document discusses the advantages and disadvantages of this approach to help the decision process for a given network. The file can be obtained via http://datatracker.ietf.org/doc/draft-ietf-opsec-lla-only/ IESG discussion can be tracked via http://datatracker.ietf.org/doc/draft-ietf-opsec-lla-only/ballot/ No IPR declarations have been submitted directly on this I-D. |
2014-03-24
|
07 | Amy Vezza | IESG state changed to In Last Call from Last Call Requested |
2014-03-24
|
07 | Amy Vezza | Last call announcement was changed |
2014-03-23
|
07 | Joel Jaeggli | Last call was requested |
2014-03-23
|
07 | Joel Jaeggli | Last call announcement was generated |
2014-03-23
|
07 | Joel Jaeggli | Ballot approval text was generated |
2014-03-23
|
07 | Joel Jaeggli | Ballot writeup was generated |
2014-03-23
|
07 | Joel Jaeggli | IESG state changed to Last Call Requested from AD Evaluation |
2014-03-23
|
07 | Joel Jaeggli | IESG state changed to AD Evaluation from Publication Requested |
2014-03-13
|
07 | Gunter Van de Velde | Document Shepherd Write-Up As required by RFC 4858, this is the current template for the Document Shepherd Write-Up. Changes are expected over time. This … Document Shepherd Write-Up As required by RFC 4858, this is the current template for the Document Shepherd Write-Up. Changes are expected over time. This version is dated 24 February 2012. (1) What type of RFC is being requested (BCP, Proposed Standard, Internet Standard, Informational, Experimental, or Historic)? Why is this the proper type of RFC? Is this type of RFC indicated in the title page header? Type of RFC Requested: Informational Why: This document provides information to the operator community regarding the advantages and disadvantages of exclusively using LLA addresses on infrastructure links in a network. This document neither prescribes a preferred method of deployment nor makes any changes to protocols. (2) The IESG approval announcement includes a Document Announcement Write-Up. Please provide such a Document Announcement Write-Up. Recent examples can be found in the "Action" announcements for approved documents. The approval announcement contains the following sections: Technical Summary Relevant content can frequently be found in the abstract and/or introduction of the document. If not, this may be an indication that there are deficiencies in the abstract or introduction. Working Group Summary Was there anything in WG process that is worth noting? For example, was there controversy about particular points or were there decisions where the consensus was particularly rough? Document Quality Are there existing implementations of the protocol? Have a significant number of vendors indicated their plan to implement the specification? Are there any reviewers that merit special mention as having done a thorough review, e.g., one that resulted in important changes or a conclusion that the document had no substantive issues? If there was a MIB Doctor, Media Type or other expert review, what was its course (briefly)? In the case of a Media Type review, on what date was the request posted? Personnel Who is the Document Shepherd? Who is the Responsible Area Director? Technical Summary In an IPv6 network it is possible to use only link-local addresses on infrastructure links between routers. This document discusses the advantages and disadvantages of this approach to help the decision process for a given network. Working Group Summary This document had a bumpy ride within the working group. There is rough consensus that the document provides valuable insight into advantages and disadvantages of the network Link-Local approach and that the content it includes is technically correct. The bumps for this document have been driven by the believe that running a network based upon this approach is a general bad idea, and that even existence of this document provides perception it is an IETF supported approach. Document Quality The document is technically correct as seen by many reviews on the WG email list. The document does not discuss a new protocol or implementation of a new protocol. The document provides advantages and disadvantages of using IPv6 Link-Local Addresses within an IPv6 Network. It has had thorough review by WG reviewers, with discussions inside the WG email list Personnel Area Director: Joel Jaeggli Shepherd: Gunter Van de Velde (3) Briefly describe the review of this document that was performed by the Document Shepherd. If this version of the document is not ready for publication, please explain why the document is being forwarded to the IESG. Document is ready for IESG review (4) Does the document Shepherd have any concerns about the depth or breadth of the reviews that have been performed? The document has been sufficiently reviewed by knowledgeable reviewers of the OPSEC WG community (5) Do portions of the document need review from a particular or from broader perspective, e.g., security, operational complexity, AAA, DNS, DHCP, XML, or internationalization? If so, describe the review that took place. No special additional review required (6) Describe any specific concerns or issues that the Document Shepherd has with this document that the Responsible Area Director and/or the IESG should be aware of? For example, perhaps he or she is uncomfortable with certain parts of the document, or has concerns whether there really is a need for it. In any event, if the WG has discussed those issues and has indicated that it still wishes to advance the document, detail those concerns here. In the OPSEC WG people have stated that eventhough they do not like the LLA approach, that here is value and support in publication of the advantages and disadvantages, because proper addressing is a key network architecture question. As Shepherd I see a need for documenting this in an IETF document as it is a question when architecting a Network. (7) Has each author confirmed that any and all appropriate IPR disclosures required for full conformance with the provisions of BCP 78 and BCP 79 have already been filed. If not, explain why. IPR reminder sent out on 11 February. Authors confirmed to not be aware of IPR attached to the document. (8) Has an IPR disclosure been filed that references this document? If so, summarize any WG discussion and conclusion regarding the IPR disclosures. None (9) How solid is the WG consensus behind this document? Does it represent the strong concurrence of a few individuals, with others being silent, or does the WG as a whole understand and agree with it? I believe there is strong consensus that it is good to have a repository of advantages and disadvantages. There is agreement that the LLA draft should for sure not recommend the addressing approach discussed. (10) Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarise the areas of conflict in separate email messages to the Responsible Area Director. (It should be in a separate email because this questionnaire is publicly available.) No threatening of appeal, or extreme discontent (some discontent is seen, but of not extreme level) (11) Identify any ID nits the Document Shepherd has found in this document. (See http://www.ietf.org/tools/idnits/ and the Internet-Drafts Checklist). Boilerplate checks are not enough; this check needs to be thorough. -06 has few idnits of informational reference matter idnits 2.13.01 tmp/draft-ietf-opsec-lla-only-06.txt: Attempted to download rfc0495 state... Failure fetching the file, proceeding without it. Attempted to download rfc0792 state... Failure fetching the file, proceeding without it. Checking boilerplate required by RFC 5378 and the IETF Trust (see http://trustee.ietf.org/license-info): ---------------------------------------------------------------------------- No issues found here. Checking nits according to http://www.ietf.org/id-info/1id-guidelines.txt: ---------------------------------------------------------------------------- No issues found here. Checking nits according to http://www.ietf.org/id-info/checklist : ---------------------------------------------------------------------------- No issues found here. Miscellaneous warnings: ---------------------------------------------------------------------------- -- The document date (January 6, 2014) is 36 days in the past. Is this intentional? Checking references for intended status: Informational ---------------------------------------------------------------------------- == Unused Reference: 'RFC0792' is defined on line 353, but no explicit reference was found in the text == Outdated reference: A later version (-02) exists of draft-ietf-opsec-bgp-security-01 Summary: 0 errors (**), 0 flaws (~~), 2 warnings (==), 1 comment (--). Run idnits with the --verbose option for more detailed information about the items above. (12) Describe how the document meets any required formal review criteria, such as the MIB Doctor, media type, and URI type reviews. This document is purely informational, no new protocol design/architecture, mibs, etc discussed. (13) Have all references within this document been identified as either normative or informative? yes (14) Are there normative references to documents that are not ready for advancement or are otherwise in an unclear state? If such normative references exist, what is the plan for their completion? No normative references (15) Are there downward normative references references (see RFC 3967)? If so, list these downward references to support the Area Director in the Last Call procedure. There are no normative references (16) Will publication of this document change the status of any existing RFCs? Are those RFCs listed on the title page header, listed in the abstract, and discussed in the introduction? If the RFCs are not listed in the Abstract and Introduction, explain why, and point to the part of the document where the relationship of this document to the other RFCs is discussed. If this information is not in the document, explain why the WG considers it unnecessary. No, the publication will not change any existing RFCs (17) Describe the Document Shepherd's review of the IANA considerations section, especially with regard to its consistency with the body of the document. Confirm that all protocol extensions that the document makes are associated with the appropriate reservations in IANA registries. Confirm that any referenced IANA registries have been clearly identified. Confirm that newly created IANA registries include a detailed specification of the initial contents for the registry, that allocations procedures for future registrations are defined, and a reasonable name for the new registry has been suggested (see RFC 5226). No IANA considerations within the document (18) List any new IANA registries that require Expert Review for future allocations. Provide any public guidance that the IESG would find useful in selecting the IANA Experts for these new registries. No IANA considerations within the document (19) Describe reviews and automated checks performed by the Document Shepherd to validate sections of the document written in a formal language, such as XML code, BNF rules, MIB definitions, etc. Informational document using traditional English. |
2014-03-13
|
07 | Gunter Van de Velde | State Change Notice email list changed to opsec-chairs@tools.ietf.org, draft-ietf-opsec-lla-only@tools.ietf.org |
2014-03-13
|
07 | Gunter Van de Velde | Responsible AD changed to Joel Jaeggli |
2014-03-13
|
07 | Gunter Van de Velde | IETF WG state changed to Submitted to IESG for Publication from WG Document |
2014-03-13
|
07 | Gunter Van de Velde | IESG state changed to Publication Requested |
2014-03-13
|
07 | Gunter Van de Velde | IESG process started in state Publication Requested |
2014-03-13
|
07 | Gunter Van de Velde | Changed consensus to Yes from Unknown |
2014-03-13
|
07 | Gunter Van de Velde | Changed document writeup |
2014-02-13
|
07 | Éric Vyncke | New version available: draft-ietf-opsec-lla-only-07.txt |
2014-02-11
|
06 | Gunter Van de Velde | Target IETF status for the draft |
2014-02-11
|
06 | Gunter Van de Velde | Intended Status changed to Informational from None |
2014-02-11
|
06 | Gunter Van de Velde | Document shepherd changed to Gunter Van de Velde |
2014-01-06
|
06 | Michael Behringer | New version available: draft-ietf-opsec-lla-only-06.txt |
2013-12-02
|
05 | Michael Behringer | New version available: draft-ietf-opsec-lla-only-05.txt |
2013-10-19
|
04 | Éric Vyncke | New version available: draft-ietf-opsec-lla-only-04.txt |
2013-02-15
|
03 | Éric Vyncke | New version available: draft-ietf-opsec-lla-only-03.txt |
2012-10-22
|
02 | Michael Behringer | New version available: draft-ietf-opsec-lla-only-02.txt |
2012-09-21
|
01 | Éric Vyncke | New version available: draft-ietf-opsec-lla-only-01.txt |
2012-08-17
|
00 | Michael Behringer | New version available: draft-ietf-opsec-lla-only-00.txt |