PANA Enabling IPsec based Access Control
draft-ietf-pana-ipsec-07
Revision differences
Document history
Date | Rev. | By | Action |
---|---|---|---|
2015-10-14
|
07 | (System) | Notify list changed from basavaraj.patil@nokia.com, alper.yegin@samsung.com to (None) |
2010-01-25
|
07 | (System) | Ballot writeup text was added |
2010-01-25
|
07 | (System) | Last call text was added |
2010-01-25
|
07 | (System) | Ballot approval text was added |
2010-01-25
|
07 | (System) | Document has expired |
2010-01-24
|
07 | Jari Arkko | State Changes to Dead from AD Evaluation::Revised ID Needed by Jari Arkko |
2010-01-24
|
07 | Jari Arkko | I do not think we will revive this draft. Not enough interest. |
2009-06-03
|
07 | Jari Arkko | Reminder sent to the WG. |
2008-06-10
|
07 | Mark Townsley | Responsible AD has been changed to Jari Arkko from Mark Townsley |
2006-11-08
|
07 | (System) | Request for Early review by SECDIR Completed. Reviewer: Ran Canetti. |
2006-11-08
|
07 | (System) | Request for Early review by SECDIR Completed. Reviewer: Lakshminath Dondeti. |
2006-10-31
|
07 | Mark Townsley | Status date has been changed to 2006-12-01 from |
2006-06-15
|
07 | Mark Townsley | State Changes to AD Evaluation::Revised ID Needed from AD Evaluation::External Party by Mark Townsley |
2006-06-15
|
07 | Mark Townsley | [Note]: 'New version needed based on security area review. WG also discussing where ipsec should fit in with respect to the base document.' added by … [Note]: 'New version needed based on security area review. WG also discussing where ipsec should fit in with respect to the base document.' added by Mark Townsley |
2006-03-17
|
07 | Mark Townsley | State Changes to AD Evaluation::External Party from AD Evaluation by Mark Townsley |
2006-03-17
|
07 | Mark Townsley | [Note]: 'Requested a security area review.' added by Mark Townsley |
2006-03-17
|
07 | Mark Townsley | PROTO Questionairre Hello, The PANA WG has completed working group last call on the following I-D: PANA Enabling IPsec based Access Control Revision 7 of … PROTO Questionairre Hello, The PANA WG has completed working group last call on the following I-D: PANA Enabling IPsec based Access Control Revision 7 of the I-D incorporates all the changes that resulted from reviews by the WG and chairs. The I-D is ready for IESG review and publication. Status sought for the I-D: Standards track 1) Have the chairs personally reviewed this version of the ID and do they believe this ID is sufficiently baked to forward to the IESG for publication? Yes. This I-D has been discussed extensively at WG meetings previously as well. 2) Has the document had adequate review from both key WG members and key non-WG members? Do you have any concerns about the depth or breadth of the reviews that have been performed? Yes. Chairs have sought I-D review from selected IETF people with expertise in the area of security and other areas. A number of WG members have also reviewed the draft. We are satisfied with the depth of the review on this I-D. 3) Do you have concerns that the document needs more review from a particular (broader) perspective (e.g., security, operational complexity, someone familiar with AAA, etc.)? No. The document has had sufficient cross-area review and no further reviews from other areas are essential at this time. 4) Do you have any specific concerns/issues with this document that you believe the ADs and/or IESG should be aware of? For example, perhaps you are uncomfortable with certain parts of the document, or whether there really is a need for it, etc., but at the same time these issues have been discussed in the WG and the WG has indicated it wishes to advance the document anyway. No issues of concerns with the I-D. It is ready for IESG review. 5) How solid is the WG consensus behind this document? Does it represent the strong concurrence of a few individuals, with others being silent, or does the WG as a whole understand and agree with it? Strong WG consensus exists behind this document. There has never been any dispute about the need for this I-D and solution in the scope of PANA. It is an integral part of the PANA protocol. 6) Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarize what are they upset about. No. 7) Have the chairs verified that the document adheres to _all_ of the ID nits? (see http://www.ietf.org/ID-nits.html). Chairs have verified for nits and ensured that it complies. 8) Does the document a) split references into normative/informative, and b) are there normative references to IDs, where the IDs are not also ready for advancement or are otherwise in an unclear state? (Note: the RFC editor will not publish an RFC with normative references to IDs, it will delay publication until all such IDs are also ready for publication as RFCs.) The document does split references into normative and informative. All references are valid and there are no invalid pointers at this time. 9) For Standards Track and BCP documents, the IESG approval announcement includes a writeup section with the following sections: - Technical Summary PANA is a protocol for authenticating clients to the access network using IP based protocols. The PANA protocol authenticates the client and also establishes a PANA security association between the PANA client and PANA authentication agent at the end of a successful authentication. This document discusses the details for establishing an IPsec security association using the PANA security association for enabling IPsec based access control. - Working Group Summary The document has been presented at several IETF WG meetings and been discussed extensively on the mailing list as well. The document has been reviewed by a number of experts selected by the chairs and comprise people from different areas. The working group last call resulted in a few comments that have been addressed in the current version of the I-D. There is strong consensus in the WG to publish this I-D as a proposed standard. - Protocol Quality The document does not specify a new protocol. It specifies how IPsec can be applied within the scope of PANA for securing the link between the PaC and the PAA or access router. The I-D specifies the method by which an IPsec SA is established that is used for securing the traffic between the host (PaC) and the access network. No known implementations of this protocol exist at this time. -Chairs |
2006-03-17
|
07 | Mark Townsley | PROTO Questionairre Hello, The PANA WG has completed working group last call on the following I-D: PANA Enabling IPsec based Access Control Revision 7 of … PROTO Questionairre Hello, The PANA WG has completed working group last call on the following I-D: PANA Enabling IPsec based Access Control Revision 7 of the I-D incorporates all the changes that resulted from reviews by the WG and chairs. The I-D is ready for IESG review and publication. Status sought for the I-D: Standards track 1) Have the chairs personally reviewed this version of the ID and do they believe this ID is sufficiently baked to forward to the IESG for publication? Yes. This I-D has been discussed extensively at WG meetings previously as well. 2) Has the document had adequate review from both key WG members and key non-WG members? Do you have any concerns about the depth or breadth of the reviews that have been performed? Yes. Chairs have sought I-D review from selected IETF people with expertise in the area of security and other areas. A number of WG members have also reviewed the draft. We are satisfied with the depth of the review on this I-D. 3) Do you have concerns that the document needs more review from a particular (broader) perspective (e.g., security, operational complexity, someone familiar with AAA, etc.)? No. The document has had sufficient cross-area review and no further reviews from other areas are essential at this time. 4) Do you have any specific concerns/issues with this document that you believe the ADs and/or IESG should be aware of? For example, perhaps you are uncomfortable with certain parts of the document, or whether there really is a need for it, etc., but at the same time these issues have been discussed in the WG and the WG has indicated it wishes to advance the document anyway. No issues of concerns with the I-D. It is ready for IESG review. 5) How solid is the WG consensus behind this document? Does it represent the strong concurrence of a few individuals, with others being silent, or does the WG as a whole understand and agree with it? Strong WG consensus exists behind this document. There has never been any dispute about the need for this I-D and solution in the scope of PANA. It is an integral part of the PANA protocol. 6) Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarize what are they upset about. No. 7) Have the chairs verified that the document adheres to _all_ of the ID nits? (see http://www.ietf.org/ID-nits.html). Chairs have verified for nits and ensured that it complies. 8) Does the document a) split references into normative/informative, and b) are there normative references to IDs, where the IDs are not also ready for advancement or are otherwise in an unclear state? (Note: the RFC editor will not publish an RFC with normative references to IDs, it will delay publication until all such IDs are also ready for publication as RFCs.) The document does split references into normative and informative. All references are valid and there are no invalid pointers at this time. 9) For Standards Track and BCP documents, the IESG approval announcement includes a writeup section with the following sections: - Technical Summary PANA is a protocol for authenticating clients to the access network using IP based protocols. The PANA protocol authenticates the client and also establishes a PANA security association between the PANA client and PANA authentication agent at the end of a successful authentication. This document discusses the details for establishing an IPsec security association using the PANA security association for enabling IPsec based access control. - Working Group Summary The document has been presented at several IETF WG meetings and been discussed extensively on the mailing list as well. The document has been reviewed by a number of experts selected by the chairs and comprise people from different areas. The working group last call resulted in a few comments that have been addressed in the current version of the I-D. There is strong consensus in the WG to publish this I-D as a proposed standard. - Protocol Quality The document does not specify a new protocol. It specifies how IPsec can be applied within the scope of PANA for securing the link between the PaC and the PAA or access router. The I-D specifies the method by which an IPsec SA is established that is used for securing the traffic between the host (PaC) and the access network. No known implementations of this protocol exist at this time. -Chairs |
2006-01-30
|
07 | Mark Townsley | [Note]: 'Waiting on Mark to review.' added by Mark Townsley |
2005-07-28
|
07 | Mark Townsley | State Changes to AD Evaluation from Publication Requested by Mark Townsley |
2005-07-27
|
07 | Dinara Suleymanova | Draft Added by Dinara Suleymanova in state Publication Requested |
2005-07-13
|
07 | (System) | New version available: draft-ietf-pana-ipsec-07.txt |
2005-05-16
|
06 | (System) | New version available: draft-ietf-pana-ipsec-06.txt |
2004-12-21
|
05 | (System) | New version available: draft-ietf-pana-ipsec-05.txt |
2004-09-15
|
04 | (System) | New version available: draft-ietf-pana-ipsec-04.txt |
2004-05-06
|
03 | (System) | New version available: draft-ietf-pana-ipsec-03.txt |
2004-03-17
|
02 | (System) | New version available: draft-ietf-pana-ipsec-02.txt |
2004-01-13
|
01 | (System) | New version available: draft-ietf-pana-ipsec-01.txt |
2003-10-02
|
00 | (System) | New version available: draft-ietf-pana-ipsec-00.txt |