Skip to main content

Stream Control Transmission Protocol
draft-ietf-tsvwg-2960bis-05

Revision differences

Document history

Date Rev. By Action
2012-08-22
05 (System) post-migration administrative database adjustment to the No Objection position for Tim Polk
2012-08-22
05 (System) post-migration administrative database adjustment to the No Objection position for Sam Hartman
2012-08-22
05 (System) post-migration administrative database adjustment to the Yes position for Lars Eggert
2012-08-22
05 (System) post-migration administrative database adjustment to the No Objection position for Russ Housley
2007-09-12
05 (System) IANA Action state changed to RFC-Ed-Ack from Waiting on RFC Editor
2007-09-12
05 (System) IANA Action state changed to Waiting on RFC Editor from In Progress
2007-09-12
05 (System) IANA Action state changed to In Progress from Waiting on Authors
2007-09-12
05 (System) IANA Action state changed to Waiting on Authors from In Progress
2007-09-11
05 (System) IANA Action state changed to In Progress from Waiting on ADs
2007-08-01
05 (System) IANA Action state changed to Waiting on ADs from In Progress
2007-07-25
05 (System) IANA Action state changed to In Progress from Waiting on ADs
2007-06-28
05 (System) IANA Action state changed to Waiting on ADs from In Progress
2007-06-27
05 (System) IANA Action state changed to In Progress from Waiting on Authors
2007-06-26
05 (System) IANA Action state changed to Waiting on Authors from In Progress
2007-06-25
05 Amy Vezza State Changes to RFC Ed Queue from Approved-announcement sent by Amy Vezza
2007-06-17
05 (System) IANA Action state changed to In Progress
2007-06-15
05 Amy Vezza IESG state changed to Approved-announcement sent
2007-06-15
05 Amy Vezza IESG has approved the document
2007-06-15
05 Amy Vezza Closed "Approve" ballot
2007-06-15
05 Lars Eggert State Changes to Approved-announcement to be sent from IESG Evaluation by Lars Eggert
2007-06-13
05 Lars Eggert State Changes to IESG Evaluation from IESG Evaluation::AD Followup by Lars Eggert
2007-06-13
05 Lars Eggert Waiting for the final OK from the authors before going to Approved.
2007-06-13
05 Tim Polk [Ballot Position Update] Position for Tim Polk has been changed to No Objection from Discuss by Tim Polk
2007-06-12
05 Sam Hartman [Ballot Position Update] Position for Sam Hartman has been changed to No Objection from Discuss by Sam Hartman
2007-06-12
05 Russ Housley [Ballot Position Update] Position for Russ Housley has been changed to No Objection from Discuss by Russ Housley
2007-06-12
05 (System) Sub state has been changed to AD Follow up from New Id Needed
2007-06-12
05 (System) New version available: draft-ietf-tsvwg-2960bis-05.txt
2007-06-04
05 Lars Eggert [Ballot Position Update] Position for Lars Eggert has been changed to Yes from Discuss by Lars Eggert
2007-05-25
05 (System) Removed from agenda for telechat - 2007-05-24
2007-05-24
05 Amy Vezza State Changes to IESG Evaluation::Revised ID Needed from IESG Evaluation by Amy Vezza
2007-05-24
05 Lisa Dusseault [Ballot Position Update] New position, No Objection, has been recorded by Lisa Dusseault
2007-05-24
05 Tim Polk
[Ballot discuss]
[Note: I understand that the editors were constrained by the contents of RFC 4460, so this may
be out of scope.  However...] …
[Ballot discuss]
[Note: I understand that the editors were constrained by the contents of RFC 4460, so this may
be out of scope.  However...]

Section 10.2.2 (Security Considerations/Protecting Against Data Corruption In The Network)
specifies that the Authentication Header SHOULD be used when stronger integrity protection
is required.  AH is certainly one solution, but ESP-NULL with IKEv2 provides an alternative
solution.  Given that the current IPsec architecture requires support for ESP and makes AH
optional, has the WG considered use of ESP-NULL?

In addition, Sandy Murphy's secdir review of tsvwg-addip includes the following comments on
2960bis.  Please ensure they are considered as Last Call comments on this document:


I did not review this document completely, but I did note a few things
relevant to the security of the new addip feature of
draft-ietf-tsvwg-addip-sctp-20.txt.  The threats draft notes that the
HEARTBEAT feature prevents an attacker from "bombing" a victim address
by adding its address to the association and then ensuring that that
address becomes primary in the midst of a large data transfer.  The
HEARTBEAT feature is supposed to verify the path by doing a
challenge/response.  However, if the challenge of the HEARTBEAT is
predictable, then the attacker can spoof the response in a HEARTBEAT
ACK.  The HEARTBEAT is said to be a 64-bit random nonce in some places,
but in the description of the HEARTBEAT packet in Section 3.3.5 it says:

      The Sender-specific Heartbeat Info field should normally include
      information about the sender's current time when this HEARTBEAT
      chunk is sent and the destination transport address to which this
      HEARTBEAT is sent (see Section 8.3).


A sender's current time might not be unpredictable enough to prevent the
attacker from constructing a spoofed HEARTBEAT-ACK.

The Security Considerations section is nicely done.  It mentions using
AH and ESP to protect authenticity and confidentiality, although it
doesn't distinguish tunnel mode from transport mode.  It says to use
IKEv2 is using ESP, but as I mentioned earlier, using these protocols
between a number of different, changing endpoints is at least difficult.
How they could be used should be mentioned.
2007-05-24
05 Cullen Jennings [Ballot Position Update] New position, No Objection, has been recorded by Cullen Jennings
2007-05-24
05 Chris Newman [Ballot Position Update] New position, No Objection, has been recorded by Chris Newman
2007-05-24
05 Jari Arkko [Ballot Position Update] New position, No Objection, has been recorded by Jari Arkko
2007-05-24
05 Jon Peterson [Ballot Position Update] New position, No Objection, has been recorded by Jon Peterson
2007-05-23
05 Ross Callon [Ballot Position Update] New position, No Objection, has been recorded by Ross Callon
2007-05-23
05 Sam Hartman
[Ballot comment]
Section 11.3 on fraud seems to have no place in this document.  I
don't think it adds to the document and found it …
[Ballot comment]
Section 11.3 on fraud seems to have no place in this document.  I
don't think it adds to the document and found it long-winded.  As an
individual I recommend removing it.
2007-05-23
05 Sam Hartman
[Ballot discuss]
Section 11.2.2 recommends that AH be used for replay protection and integrity protection.
I thought there was an SCTP-specific authentication option.
Isn't that …
[Ballot discuss]
Section 11.2.2 recommends that AH be used for replay protection and integrity protection.
I thought there was an SCTP-specific authentication option.
Isn't that a better fit?

If you are going to recommend IPsec please recommend ESP with no
confidentiality rather than AH.  PER RFC 4301 AH is no longer mandatory
to implement.


The security considerations need to discuss how SCTP interacts with
the SPD when IPsec is used to protect it.  In particular, it seems
like you can get some really unfortunate situations when some of the
addresses in a security association are covered by different SPD rules
than others.  If you are going to recommend use of IPsec this is
particularly concerning, and if you are going to recommend IPsec be
used, I think you need to give implementation advice on how an SCTP or
IPsec implementation can avoid these problems.

Noting that there is a BSD sockets API to request AH is problematic.
First, that API doesn't really work with RFC 2401 or 4301; it's not
clear how such a request interacts with the SPD.  You might choose to
ignore this nice people don't really implement 2401 or 4301 and do
implement such an API and I can see how you might argue that running
code trumps long documents.  However it's also misleading in that in
order for such an option to be useful you have to somehow have the
security negotiation work.  I.E. shared keys, IKE configuration, etc.
2007-05-23
05 Sam Hartman [Ballot Position Update] New position, Discuss, has been recorded by Sam Hartman
2007-05-23
05 Ron Bonica [Ballot Position Update] New position, No Objection, has been recorded by Ron Bonica
2007-05-22
05 Tim Polk
[Ballot discuss]
[Note: I understand that the editors were constrained by the contents of RFC 4460, so this may
be out of scope.  However...] …
[Ballot discuss]
[Note: I understand that the editors were constrained by the contents of RFC 4460, so this may
be out of scope.  However...]

Section 10.2.2 (Security Considerations/Protecting Against Data Corruption In The Network)
specifies that the Authentication Header SHOULD be used when stronger integrity protection
is required.  AH is certainly one solution, but ESP-NULL with IKEv2 provides an alternative
solution.  Given that the current IPsec architecture requires support for ESP and makes AH
optional, has the WG considered use of ESP-NULL?
2007-05-22
05 Tim Polk
[Ballot discuss]
[Note: I understand that the editors were constrained by the contents of RFC 4460, so this may be out of scope.  However...] …
[Ballot discuss]
[Note: I understand that the editors were constrained by the contents of RFC 4460, so this may be out of scope.  However...]

Section 10.2.2 (Security Considerations/Protecting Against Data Corruption In The Network) specifies that the Authentication Header SHOULD be used when stronger integrity protection is required.  AH is certainly one solution, but ESP-NULL with IKEv2 provides an alternative solution. 
Given that the current IPsec architecture requires support for ESP and makes AH optional, has the WG considered use of ESP-NULL?
2007-05-22
05 Tim Polk
[Ballot discuss]
[Note: I understand that the editors were constrained by the contents of RFC 4460, so this may be out of scope.  However...] …
[Ballot discuss]
[Note: I understand that the editors were constrained by the contents of RFC 4460, so this may be out of scope.  However...]

Section 10.2.2 (Security Considerations/Protecting Against Data Corruption In The Network) specifies that the Authentication Header SHOULD be used when stronger integrity protection is required.  AH is certainly one solution, but ESP-NULL with IKEv2 provides an alternative solution. 
Given that the current IPsec architecture requires support for ESP and makes AH optional, has the WG considered use of ESP-NULL?
2007-05-22
05 Tim Polk [Ballot Position Update] New position, Discuss, has been recorded by Tim Polk
2007-05-22
05 Magnus Westerlund [Ballot Position Update] New position, Yes, has been recorded by Magnus Westerlund
2007-05-21
05 Dan Romascanu [Ballot Position Update] New position, No Objection, has been recorded by Dan Romascanu
2007-05-21
05 Lars Eggert This needs to go into "Revised ID Needed" after the telechat to roll in reviewer comments.
2007-05-21
05 Lars Eggert State Changes to IESG Evaluation from Waiting for AD Go-Ahead by Lars Eggert
2007-05-19
05 Russ Housley
[Ballot comment]
The suggested SCTP protocol parameter values defined in Section 15.
  Please add a forward pointer to Section 15 on the first occurrence …
[Ballot comment]
The suggested SCTP protocol parameter values defined in Section 15.
  Please add a forward pointer to Section 15 on the first occurrence
  of the use of a protocol parameter defined there.  It will help
  the reader find the default values for these parameters.

  Based on Gen-ART Review by Vijay K. Gurbani:

  In Section 1.3.1 consider replacing "against security attacks" with
  "against synchronization attacks".  The term "security" is too broad,
  and I believe that you are trying to prevent the likelihood of TCP SYN
  attacks in SCTP.

  Please consider putting Section 1.5 somewhere in the beginning.  Since
  the sub-sections that preceeded Section 1.5 use the abbreciations
  quite a bit, introducing the reader to the abbreviations early should
  help readability.
 
  In section 3.3.5, second paragraph, the text says that the parameter
  field contains an opaque data structure understood only by the sender.
  I think it will add more clarity to insert the following text at the
  end of the last paragraph in the section:

  OLD:
  The Sender-specific Heartbeat Info field should normally include
  information about the sender's current time when this HEARTBEAT
  chunk is sent and the destination transport address to which this
  HEARTBEAT is sent (see Section 8.3).

  NEW:
  The Sender-specific Heartbeat Info field should normally include
  information about the sender's current time when this HEARTBEAT
  chunk is sent and the destination transport address to which this
  HEARTBEAT is sent (see Section 8.3).  This information is simply
  reflected back by the receiver in the HEARTBEAT ACK message (see
  Section 3.3.6).

  In Section 11.2.2, it is stated that "A widely implemented BSD
  Sockets API extension exists for applications to request IP security
  services...".  Please provide a reference or drop the clause.

  Nit: S3, page 16: s/Section 6.10for/Section 6.10 for/

  Nit: S3.3.2.1, under the IPv6 address parameter figure:
  s/128 bit/128 bits/

  Nit: S4: s/description of all special cases should be found in the text/
  /description of all special cases are found in the text/

  Nit: S7.1, first bullet: s/layer otherwise/layer to do otherwise/
2007-05-19
05 Russ Housley [Ballot discuss]
The Title page header needs to include: Obsoletes: 2960 (if approved)
2007-05-19
05 Russ Housley [Ballot Position Update] New position, Discuss, has been recorded by Russ Housley
2007-05-17
05 (System) State has been changed to Waiting for AD Go-Ahead from In Last Call by system
2007-05-17
05 Samuel Weiler Request for Last Call review by SECDIR Completed. Reviewer: Catherine Meadows.
2007-05-17
05 Dan Romascanu
[Ballot comment]
1. The header of the document on the front page should mention that this document obsoletes RFC 2960 and RFC 4460 when approved. …
[Ballot comment]
1. The header of the document on the front page should mention that this document obsoletes RFC 2960 and RFC 4460 when approved.

2. The Network Management Considerations section says:

  A MIB for SCTP is defined in [RFC3873].

As this document succeeds in time RFC3873 it would be useful replace this statment with:

The MIB module for SCTP defined in [RFC3873] applies for the version of the protocol specified in this document.
2007-05-16
05 Lars Eggert [Ballot discuss]
Holding a DISCUSS for IANA.
2007-05-16
05 Lars Eggert [Ballot Position Update] Position for Lars Eggert has been changed to Discuss from Yes by Lars Eggert
2007-05-15
05 Yoshiko Fong
IANA Last Call Comments:

*** IANA has Questions.

Upon Approval of this document the IANA will take the
following Actions.

Action 1: Section 14 says: …
IANA Last Call Comments:

*** IANA has Questions.

Upon Approval of this document the IANA will take the
following Actions.

Action 1: Section 14 says:

This protocol will require port reservation like TCP for
the use of "well known" servers within the Internet. All
current TCP ports shall be automatically reserved in the
SCTP port address space. New requests should follow
IANA's current mechanisms for TCP.

This appears to be a request to modify the "PORT
NUMBERS" Registry

at http://www.iana.org/assignments/port-numbers

*** Does this mean you want to block off all SCTP
port numbers as reserved? Does it mean you want to
block off all the existing TCP-assigned port numbers
as reserved for SCTP?
Or do you want to copy every TCP port assignment
and make an SCTP port assignment for each port?
*****

Action 2: Section 14.1 (refers back to section 3.2)

Upon approval of this document, the IANA will make the
following changes in "Stream Control Transmission
Protocol (SCTP) Parameters" registry located at

http://www.iana.org/assignments/sctp-parameters

sub-registry "CHUNK TYPES"

****
[ Note: the contents of section 3.2 do not contain the
additional assignments already made by IANA. However
there are no conflicts so the RFC2960 references are
upgraded to RFC-tsvwg-2960bis-04 ]
****

OLD:
ID Value Chunk Type Reference
----- ---------- ---------
0 - Payload Data (DATA) [RFC2960]
1 - Initiation (INIT) [RFC2960]
2 - Initiation Acknowledgement (INIT ACK) [RFC2960]
3 - Selective Acknowledgement (SACK) [RFC2960]
4 - Heartbeat Request (HEARTBEAT) [RFC2960]
5 - Heartbeat Acknowledgement (HEARTBEAT ACK) [RFC2960]
6 - Abort (ABORT) [RFC2960]
7 - Shutdown (SHUTDOWN) [RFC2960]
8 - Shutdown Acknowledgement (SHUTDOWN ACK) [RFC2960]
9 - Operation Error (ERROR) [RFC2960]
10 - State Cookie (COOKIE ECHO) [RFC2960]
11 - Cookie Acknowledgement (COOKIE ACK) [RFC2960]
12 - Reserved for Explicit Congestion Notification [RFC2960]
Echo (ECNE)
13 - Reserved for Congestion Window Reduced (CWR) [RFC2960]
14 - Shutdown Complete (SHUTDOWN COMPLETE) [RFC2960]
15 - Authentication Chunk (AUTH) [RFC-ietf-tsvwg-sctp-auth-08.txt]
16 to 62 - reserved by IETF
63 - IETF-defined Chunk Extensions
64 to 126 - reserved by IETF
127 - IETF-defined Chunk Extensions
128 to 131 - reserved by IETF
132 - Padding Chunk (PAD) [RFC4820]
133 to 190 - reserved by IETF
191 - IETF-defined Chunk Extensions
192 - Forward TSN [RFC3758]
193 to 254 - reserved by IETF
255 - IETF-defined Chunk Extensions

NEW:
ID Value Chunk Type Reference
----- ---------- ---------
0 - Payload Data (DATA) [RFC-tsvwg-2960bis-04]
1 - Initiation (INIT) [RFC-tsvwg-2960bis-04]
2 - Initiation Acknowledgement (INIT ACK) [RFC-tsvwg-2960bis-04]
3 - Selective Acknowledgement (SACK)
[RFC-tsvwg-2960bis-04]
4 - Heartbeat Request (HEARTBEAT) [RFC-tsvwg-2960bis-04]
5 - Heartbeat Acknowledgement (HEARTBEAT ACK) [RFC-tsvwg-2960bis-04]
6 - Abort (ABORT) [RFC-tsvwg-2960bis-04]
7 - Shutdown (SHUTDOWN) [RFC-tsvwg-2960bis-04]
8 - Shutdown Acknowledgement (SHUTDOWN ACK) [RFC-tsvwg-2960bis-04]
9 - Operation Error (ERROR) [RFC-tsvwg-2960bis-04]
10 - State Cookie (COOKIE ECHO) [RFC-tsvwg-2960bis-04]
11 - Cookie Acknowledgement (COOKIE ACK) [RFC-tsvwg-2960bis-04]
12 - Reserved for Explicit Congestion Notification [RFC-tsvwg-2960bis-04]
Echo (ECNE)
13 - Reserved for Congestion Window Reduced (CWR) [RFC-tsvwg-2960bis-04]
14 - Shutdown Complete (SHUTDOWN COMPLETE) [RFC-tsvwg-2960bis-04]
15 - Authentication Chunk (AUTH) [RFC-ietf-tsvwg-sctp-auth-08.txt]
16 to 62 - reserved by IETF
63 - IETF-defined Chunk Extensions
64 to 126 - reserved by IETF
127 - IETF-defined Chunk Extensions
128 to 131 - reserved by IETF
132 - Padding Chunk (PAD) [RFC4820]
133 to 190 - reserved by IETF
191 - IETF-defined Chunk Extensions
192 - Forward TSN [RFC3758]
193 to 254 - reserved by IETF
255 - IETF-defined Chunk Extensions


Action 3: Section 14.2 (refers back to section 3.2.1)
Section 3.2.1 then refers back to section 14.2 for contents.

****
There appear to be no assignments in this section.
Is this correct?
****

Action 4: Section 14.3 (refers back to section 3.3.10)

The Cause Code table in section 3.3.10 conflicts with the current
registry "Stream Control Transmission Protocol (SCTP) Parameters"
located at http://www.iana.org/assignments/sctp-parameters
sub-registry "CAUSE CODES"

****
In particular, section 3.3.10 tries to assign cause-code 11 to
"Restart of an Association with New Addresses" whereas the IANA
registry already assigned this cause code to "Unsupported HMAC
Identifier".

How do the authors want IANA to handle this conflict?
****

Action 4: Section 14.4

Upon approval of this document, the IANA will make the
following assignments in the "Stream Control Transmission
Protocol (SCTP) Parameters" registry located at

http://www.iana.org/assignments/sctp-parameters


sub-registry "SCTP Payload Protocol Identifiers"

SCTP Payload Protocol Identifiers REFERENCE
--------------------------------- ---------
0 - Reserved by SCTP [RFC-tsvwg-2960bis-04]
2007-05-11
05 Samuel Weiler Request for Last Call review by SECDIR is assigned to Catherine Meadows
2007-05-11
05 Samuel Weiler Request for Last Call review by SECDIR is assigned to Catherine Meadows
2007-05-07
05 Lars Eggert [Ballot Position Update] New position, Yes, has been recorded for Lars Eggert
2007-05-07
05 Lars Eggert Ballot has been issued by Lars Eggert
2007-05-07
05 Lars Eggert Created "Approve" ballot
2007-05-03
05 Lars Eggert Tentatively putting this on the agenda for May 24, 2007.
2007-05-03
05 Lars Eggert Placed on agenda for telechat - 2007-05-24 by Lars Eggert
2007-05-03
05 Amy Vezza Last call sent
2007-05-03
05 Amy Vezza State Changes to In Last Call from Last Call Requested by Amy Vezza
2007-05-03
05 Lars Eggert [Note]: 'Document Shepherd: James Polk (jmpolk@cisco.com)' added by Lars Eggert
2007-05-03
05 Lars Eggert State Change Notice email list have been change to tsvwg-chairs@tools.ietf.org, rrs@cisco.com from tsvwg-chairs@tools.ietf.org
2007-05-03
05 Lars Eggert Last Call was requested by Lars Eggert
2007-05-03
05 Lars Eggert State Changes to Last Call Requested from Publication Requested by Lars Eggert
2007-05-03
05 (System) Ballot writeup text was added
2007-05-03
05 (System) Last call text was added
2007-05-03
05 (System) Ballot approval text was added
2007-05-03
05 Dinara Suleymanova
PROTO Write-up

(1.a) Who is the Document Shepherd for this document? Has the
Document Shepherd personally reviewed this version of the
document and, in particular, …
PROTO Write-up

(1.a) Who is the Document Shepherd for this document? Has the
Document Shepherd personally reviewed this version of the
document and, in particular, does he or she believe this
version is ready for forwarding to the IESG for publication?

James Polk is the Document Shepherd. I have reviewed this version of
the document, and believe this is ready to forward to the IESG for publication.

(1.b) Has the document had adequate review both from key WG members
and from key non-WG members? Does the Document Shepherd have
any concerns about the depth or breadth of the reviews that
have been performed?

Yes, key members of the WG of the WG have reviewed this document.
There are no concerns

(1.c) Does the Document Shepherd have concerns that the document
needs more review from a particular or broader perspective,
e.g., security, operational complexity, someone familiar with
AAA, internationalization or XML?

No concerns.

(1.d) Does the Document Shepherd have any specific concerns or
issues with this document that the Responsible Area Director
and/or the IESG should be aware of? For example, perhaps he
or she is uncomfortable with certain parts of the document, or
has concerns whether there really is a need for it. In any
event, if the WG has discussed those issues and has indicated
that it still wishes to advance the document, detail those
concerns here. Has an IPR disclosure related to this document
been filed? If so, please include a reference to the
disclosure and summarize the WG discussion and conclusion on
this issue.

No, there are no additional concerns. There is no IPR wrt this document.

(1.e) How solid is the WG consensus behind this document? Does it
represent the strong concurrence of a few individuals, with
others being silent, or does the WG as a whole understand and
agree with it?

There solid WG consensus behind this document - of those within TSVWG
that are interested in SCTP, with others being silent.

(1.f) Has anyone threatened an appeal or otherwise indicated extreme
discontent? If so, please summarize the areas of conflict in
separate email messages to the Responsible Area Director. (It
should be in a separate email because this questionnaire is
entered into the ID Tracker.)

No appeals have been threatened on this document's publication.

(1.g) Has the Document Shepherd personally verified that the
document satisfies all ID nits? (See
http://www.ietf.org/ID-Checklist.html and
http://tools.ietf.org/tools/idnits/). Boilerplate checks are
not enough; this check needs to be thorough. Has the document
met all formal review criteria it needs to, such as the MIB
Doctor, media type and URI type reviews?

Yes, I have. There are no errors, 6 warnings (all wrong) and 5
comments (all wrong) reported in this document.

(1.h) Has the document split its references into normative and
informative? Are there normative references to documents that
are not ready for advancement or are otherwise in an unclear
state? If such normative references exist, what is the
strategy for their completion? Are there normative references
that are downward references, as described in [RFC3967]? If
so, list these downward references to support the Area
Director in the Last Call procedure for them [RFC3967].

The references are split. There are no downward references in this
version of the document.

(1.i) Has the Document Shepherd verified that the document IANA
consideration section exists and is consistent with the body
of the document? If the document specifies protocol
extensions, are reservations requested in appropriate IANA
registries? Are the IANA registries clearly identified? If
the document creates a new registry, does it define the
proposed initial contents of the registry and an allocation
procedure for future registrations? Does it suggest a
reasonable name for the new registry? See [RFC2434]. If the
document describes an Expert Review process has Shepherd
conferred with the Responsible Area Director so that the IESG
can appoint the needed Expert during the IESG Evaluation?

The IANA considerations section exists and is consistent with the
body of the document. The appropriate reservations within the IANA
registries have been requested. The IANA registries are clearly
identified. There are several new registries being requested

-- through definition of additional chunk types,
-- through definition of additional parameter types, or
-- through definition of additional cause codes within ERROR chunks

All are appropriately written.

(1.j) Has the Document Shepherd verified that sections of the
document that are written in a formal language, such as XML
code, BNF rules, MIB definitions, etc., validate correctly in
an automated checker?

There is no formal language in this document, such as XML code, BNF
rules, MIB definitions, etc.

(1.k) The IESG approval announcement includes a Document
Announcement Write-Up. Please provide such a Document
Announcement Write-Up? Recent examples can be found in the
"Action" announcements for approved documents. The approval
announcement contains the following sections:

* Technical Summary
Relevant content can frequently be found in the abstract
and/or introduction of the document. If not, this may be
an indication that there are deficiencies in the abstract
or introduction.

This document obsoletes RFC2960 [RFC2960] and describes the Stream
Control Transmission Protocol (SCTP). SCTP is designed to transport
PSTN signaling messages over IP networks, but is capable of broader
applications.

SCTP is a reliable transport protocol operating on top of a
connectionless packet network such as IP. It offers the following
services to its users:

-- acknowledged error-free non-duplicated transfer of user data,
-- data fragmentation to conform to discovered path MTU size,
-- sequenced delivery of user messages within multiple streams, with
an option for order-of-arrival delivery of individual user
messages,
-- optional bundling of multiple user messages into a single SCTP
packet, and
-- network-level fault tolerance through supporting of multi- homing
at either or both ends of an association.

The design of SCTP includes appropriate congestion avoidance behavior
and resistance to flooding and masquerade attacks.

* Working Group Summary
Was there anything in WG process that is worth noting? For
example, was there controversy about particular points or
were there decisions where the consensus was particularly
rough?

There is strong consensus in the WG to publish this document among
those within TSVWG that are interested in SCTP. It has been reviewed
by several people in the WG last call. Comments raised has been addressed.

* Document Quality
Are there existing implementations of the protocol? Have a
significant number of vendors indicated their plan to
implement the specification? Are there any reviewers that
merit special mention as having done a thorough review,
e.g., one that resulted in important changes or a
conclusion that the document had no substantive issues? If
there was a MIB Doctor, Media Type or other expert review,
what was its course (briefly)? In the case of a Media Type
review, on what date was the request posted?

There are existing implementations of this protocol revision. Several
vendors appear to be ready to implement this protocol, if they have
not done so already.

* Personnel
Who is the Document Shepherd for this document? Who is the
Responsible Area Director?

James Polk is the document Shepherd. Lars Eggert or Magnus Westerlund
is the responsible Area Director.
2007-05-03
05 Dinara Suleymanova State Changes to Publication Requested from AD is watching by Dinara Suleymanova
2007-05-03
05 Dinara Suleymanova Intended Status has been changed to Proposed Standard from None
2007-04-30
04 (System) New version available: draft-ietf-tsvwg-2960bis-04.txt
2007-03-23
05 (System) State Changes to AD is watching from Dead by system
2007-03-22
03 (System) New version available: draft-ietf-tsvwg-2960bis-03.txt
2006-12-10
05 (System) State Changes to Dead from AD is watching by system
2006-12-10
05 (System) Document has expired
2006-06-12
05 Lars Eggert Draft Added by Lars Eggert in state AD is watching
2006-06-08
02 (System) New version available: draft-ietf-tsvwg-2960bis-02.txt
2006-05-09
01 (System) New version available: draft-ietf-tsvwg-2960bis-01.txt
2006-02-17
00 (System) New version available: draft-ietf-tsvwg-2960bis-00.txt