Zero Checksum for the Stream Control Transmission Protocol
draft-ietf-tsvwg-sctp-zero-checksum-11
Revision differences
Document history
Date | Rev. | By | Action |
---|---|---|---|
2024-09-27
|
(System) | Received changes through RFC Editor sync (changed state to RFC, created became rfc relationship between draft-ietf-tsvwg-sctp-zero-checksum and RFC 9653, changed IESG state to RFC … Received changes through RFC Editor sync (changed state to RFC, created became rfc relationship between draft-ietf-tsvwg-sctp-zero-checksum and RFC 9653, changed IESG state to RFC Published) |
|
2024-09-25
|
11 | (System) | RFC Editor state changed to AUTH48-DONE from AUTH48 |
2024-09-05
|
11 | (System) | RFC Editor state changed to AUTH48 |
2024-09-04
|
11 | (System) | RFC Editor state changed to RFC-EDITOR from EDIT |
2024-08-02
|
11 | (System) | RFC Editor state changed to EDIT |
2024-08-02
|
11 | (System) | IESG state changed to RFC Ed Queue from Approved-announcement sent |
2024-08-02
|
11 | (System) | Announcement was received by RFC Editor |
2024-07-30
|
11 | (System) | IANA Action state changed to RFC-Ed-Ack from Waiting on RFC Editor |
2024-07-29
|
11 | (System) | IANA Action state changed to Waiting on RFC Editor from In Progress |
2024-07-29
|
11 | (System) | IANA Action state changed to In Progress from Waiting on Authors |
2024-07-26
|
11 | (System) | IANA Action state changed to Waiting on Authors from In Progress |
2024-07-22
|
11 | (System) | IANA Action state changed to In Progress |
2024-07-22
|
11 | Cindy Morgan | IESG state changed to Approved-announcement sent from Approved-announcement to be sent |
2024-07-22
|
11 | Cindy Morgan | IESG has approved the document |
2024-07-22
|
11 | Cindy Morgan | Closed "Approve" ballot |
2024-07-22
|
11 | Cindy Morgan | Ballot approval text was generated |
2024-07-22
|
11 | (System) | Removed all action holders (IESG state changed) |
2024-07-22
|
11 | Zaheduzzaman Sarker | IESG state changed to Approved-announcement to be sent from IESG Evaluation::AD Followup |
2024-06-22
|
11 | Victor Kuarsingh | Request for Last Call review by OPSDIR Completed: Ready. Reviewer: Victor Kuarsingh. Sent review to list. |
2024-06-20
|
11 | Tero Kivinen | Request for Telechat review by SECDIR Completed: Ready. Reviewer: Charlie Kaufman. Submission of review completed at an earlier date. |
2024-06-19
|
11 | Deb Cooley | [Ballot comment] Thank you for addressing my concerns. I have cleared my discuss. |
2024-06-19
|
11 | Deb Cooley | [Ballot Position Update] Position for Deb Cooley has been changed to No Objection from Discuss |
2024-06-19
|
11 | Paul Wouters | [Ballot comment] Thanks for the discussion on biddown attacks. I have updated my ballot to 'No Objection' |
2024-06-19
|
11 | Paul Wouters | [Ballot Position Update] Position for Paul Wouters has been changed to No Objection from Discuss |
2024-06-18
|
11 | (System) | Changed action holders to Zaheduzzaman Sarker (IESG state changed) |
2024-06-18
|
11 | (System) | Sub state has been changed to AD Followup from Revised I-D Needed |
2024-06-18
|
11 | (System) | IANA Review state changed to Version Changed - Review Needed from IANA OK - Actions Needed |
2024-06-18
|
11 | Michael Tüxen | New version available: draft-ietf-tsvwg-sctp-zero-checksum-11.txt |
2024-06-18
|
11 | Michael Tüxen | New version accepted (logged-in submitter: Michael Tüxen) |
2024-06-18
|
11 | Michael Tüxen | Uploaded new revision |
2024-06-14
|
11 | Tero Kivinen | Request for Telechat review by SECDIR Completed: Ready. Reviewer: Charlie Kaufman. |
2024-06-13
|
10 | (System) | Changed action holders to Michael Tüxen, Randell Jesup, Florent Castelli, Victor Boivie (IESG state changed) |
2024-06-13
|
10 | Cindy Morgan | IESG state changed to IESG Evaluation::Revised I-D Needed from IESG Evaluation |
2024-06-13
|
10 | Murray Kucherawy | [Ballot Position Update] New position, No Objection, has been recorded for Murray Kucherawy |
2024-06-12
|
10 | John Scudder | [Ballot Position Update] New position, No Objection, has been recorded for John Scudder |
2024-06-12
|
10 | Mahesh Jethanandani | [Ballot comment] I support Deb's and Paul's DISCUSS. No reference entries found for these items, which were mentioned in the text: [RFCXXXX]. Perhaps a note … [Ballot comment] I support Deb's and Paul's DISCUSS. No reference entries found for these items, which were mentioned in the text: [RFCXXXX]. Perhaps a note to the RFC Editor is needed to replace XXXX with the assigned RFC number. ------------------------------------------------------------------------------- NIT ------------------------------------------------------------------------------- All comments below are about very minor potential issues that you may choose to address in some way - or ignore - as you see fit. Some were flagged by automated tools (via https://github.com/larseggert/ietf-reviewtool), so there will likely be some false positives. There is no need to let me know what you did with these suggestions. Section 8, paragraph 11 > r points have been addressed in an appropriate way. 9. Security Consideratio > ^^^^^^^^^^^^^^^^^^^^^ Consider replacing this phrase with the adverb "appropriately" to avoid wordiness. |
2024-06-12
|
10 | Mahesh Jethanandani | [Ballot Position Update] New position, No Objection, has been recorded for Mahesh Jethanandani |
2024-06-12
|
10 | Paul Wouters | [Ballot discuss] Should there be a short discussion in the Security Considerations on what to do when DTLS fails? This could be a bid-down attack … [Ballot discuss] Should there be a short discussion in the Security Considerations on what to do when DTLS fails? This could be a bid-down attack from DTLS to crc32. Perhaps some text that states if DTLS is configured, that if DTLS fails to establish, this should be a hard fail and not a soft fail to crc32 'protected' clear text? |
2024-06-12
|
10 | Paul Wouters | [Ballot comment] NITS: A Virtual Network (VN) is a network provided by a service provider to a … [Ballot comment] NITS: A Virtual Network (VN) is a network provided by a service provider to a customer for the customer to use in any way it wants. I think "any way" is a bit too strong? Service providers have a lot of AUP and fine print. being being received -> being received |
2024-06-12
|
10 | Paul Wouters | [Ballot Position Update] New position, Discuss, has been recorded for Paul Wouters |
2024-06-11
|
10 | (System) | IANA Review state changed to IANA OK - Actions Needed from Version Changed - Review Needed |
2024-06-11
|
10 | Éric Vyncke | [Ballot comment] # Éric Vyncke, INT AD, comments for draft-ietf-tsvwg-sctp-zero-checksum-10 Thank you for the work put into this document. Please find below some non-blocking COMMENT … [Ballot comment] # Éric Vyncke, INT AD, comments for draft-ietf-tsvwg-sctp-zero-checksum-10 Thank you for the work put into this document. Please find below some non-blocking COMMENT points (but replies would be appreciated even if only for my own education). Special thanks to Marten Seemann for the shepherd's detailed write-up including the WG consensus _and_ the justification of the intended status. I hope that this review helps to improve the document, Regards, -éric # COMMENTS (non-blocking) ## Section 1 Is CRC32c really a checksum ? I guess it includes a polynomial function, i.e., a little more than a simple checksum. I note that SCTP uses a field named 'checksum' but using "CRC32c integrity check" would probably be more suitable. s/use SCTP encapsulated in DTLS/use SCTP over DTLS/ ? I.e., "encapsulate" is more often used when one payload is completely contained in another payload and especially applicable to "tunnels". Mostly a nit though. ## Section 3 ``` When using such alternate error detection methods, the SCTP common header containing the 32-bit checksum field might or might not be visible to middleboxes on the paths between the two endpoints. ``` While I fail to understand the sentence above, I really wonder why a "middlebox" (where is such a term defined ?) should care about the checksum field is visible or not ? ## Section 4 `All transported integer numbers are in "network byte order" a.k.a., Big Endian.` isn't it implicit in all IETF I-Ds ? Again mostly a nit. ## Section 6 `IANA is requested to assign the Error Detection Method Identifier of 1 for this method.` should this rather appear in the IANA considerations ? Or at least having a not to the RFC editor to replace this paragraph by "IANA has assigned 1 ....". |
2024-06-11
|
10 | Éric Vyncke | [Ballot Position Update] New position, No Objection, has been recorded for Éric Vyncke |
2024-06-11
|
10 | Jim Guichard | [Ballot Position Update] New position, No Objection, has been recorded for Jim Guichard |
2024-06-09
|
10 | Roman Danyliw | [Ballot comment] Thank you to Meral Shirazipour for the GENART review. I support Deb Cooley's DISCUSS position. |
2024-06-09
|
10 | Roman Danyliw | [Ballot Position Update] New position, No Objection, has been recorded for Roman Danyliw |
2024-06-07
|
10 | Deb Cooley | [Ballot discuss] Currently Section 9 says roughly that there are no changes to the Security Considerations to RFC 9260. I have two comments: 1. … [Ballot discuss] Currently Section 9 says roughly that there are no changes to the Security Considerations to RFC 9260. I have two comments: 1. Since this draft is proposing to remove an integrity mechanism in SCTP, there should be an update to the paragraph in RFC9260 Security Considerations, specifically 12.2.2. Protecting against Data Corruption in the Network. Please explain how the data is protected from corruption in the situation where the SCTP checksum is not utilized. 2. There should be a statement here about the requirement to choose an appropriate cryptographic tunnel protocol. It can be general, but there is a security risk to data integrity if a substandard protocol is chosen. Maybe as simple as 'A secure cryptographic tunnel protocol MUST be used to prevent increasing the risk to data integrity'. Or words to that effect. |
2024-06-07
|
10 | Deb Cooley | [Ballot comment] Thanks to Charlie Kaufman for his Last Call review. |
2024-06-07
|
10 | Deb Cooley | [Ballot Position Update] New position, Discuss, has been recorded for Deb Cooley |
2024-06-05
|
10 | Gunter Van de Velde | [Ballot comment] # Gunter Van de Velde, RTG AD, comments for draft-ietf-tsvwg-sctp-zero-checksum-10 Please find https://www.ietf.org/blog/handling-iesg-ballot-positions/ documenting the handling of ballots. In the draft is written: … [Ballot comment] # Gunter Van de Velde, RTG AD, comments for draft-ietf-tsvwg-sctp-zero-checksum-10 Please find https://www.ietf.org/blog/handling-iesg-ballot-positions/ documenting the handling of ballots. In the draft is written: If an endpoint not supporting the extension described in this document receives this parameter in an INIT or INIT ACK chunk, it is REQUIRED to skip this parameter and continue to process further parameters in the chunk. This behavior is specified by [RFC9260] because the highest-order two bits of the Type are '10'. Would this procedure result that even when the CRC32c checksum is anything else as zero it is accepted and valid? G/ |
2024-06-05
|
10 | Gunter Van de Velde | [Ballot Position Update] New position, No Objection, has been recorded for Gunter Van de Velde |
2024-06-04
|
10 | Francesca Palombini | [Ballot Position Update] New position, No Objection, has been recorded for Francesca Palombini |
2024-06-03
|
10 | Orie Steele | [Ballot comment] Thanks to Bernard Aboba for the ARTART review, and to the authors for addressing his comments. |
2024-06-03
|
10 | Orie Steele | [Ballot Position Update] New position, No Objection, has been recorded for Orie Steele |
2024-06-02
|
10 | Erik Kline | [Ballot comment] # Internet AD comments for draft-ietf-tsvwg-sctp-zero-checksum-10 CC @ekline * comment syntax: - https://github.com/mnot/ietf-comments/blob/main/format.md * "Handling Ballot Positions": - https://ietf.org/about/groups/iesg/statements/handling-ballot-positions/ ## Comments … [Ballot comment] # Internet AD comments for draft-ietf-tsvwg-sctp-zero-checksum-10 CC @ekline * comment syntax: - https://github.com/mnot/ietf-comments/blob/main/format.md * "Handling Ballot Positions": - https://ietf.org/about/groups/iesg/statements/handling-ballot-positions/ ## Comments ### S7 * Should (SHOULD?) there be a section about considerations for the TAPS API? ### S9 * Is a DoS attack possible via a downgrade attack style mechanism? I.e., if a sender does not include this option but an on-path attacker is able to inject it, I suppose the worst that happens is that incorrectly zero-valued checksum packets are dropped all over the place. Nevertheless, is such a thing possible? |
2024-06-02
|
10 | Erik Kline | [Ballot Position Update] New position, No Objection, has been recorded for Erik Kline |
2024-06-02
|
10 | Bernard Aboba | Request for Telechat review by ARTART Completed: Ready. Reviewer: Bernard Aboba. Sent review to list. |
2024-06-02
|
10 | Barry Leiba | Request for Telechat review by ARTART is assigned to Bernard Aboba |
2024-05-30
|
10 | Tero Kivinen | Request for Telechat review by SECDIR is assigned to Charlie Kaufman |
2024-05-29
|
10 | Jenny Bui | Placed on agenda for telechat - 2024-06-13 |
2024-05-29
|
10 | Zaheduzzaman Sarker | Ballot has been issued |
2024-05-29
|
10 | Zaheduzzaman Sarker | [Ballot Position Update] New position, Yes, has been recorded for Zaheduzzaman Sarker |
2024-05-29
|
10 | Zaheduzzaman Sarker | Created "Approve" ballot |
2024-05-29
|
10 | Zaheduzzaman Sarker | IESG state changed to IESG Evaluation from Waiting for AD Go-Ahead |
2024-05-29
|
10 | Zaheduzzaman Sarker | Ballot writeup was changed |
2024-05-18
|
10 | (System) | IANA Review state changed to Version Changed - Review Needed from IANA OK - Actions Needed |
2024-05-18
|
10 | Michael Tüxen | New version available: draft-ietf-tsvwg-sctp-zero-checksum-10.txt |
2024-05-18
|
10 | Michael Tüxen | New version accepted (logged-in submitter: Michael Tüxen) |
2024-05-18
|
10 | Michael Tüxen | Uploaded new revision |
2024-05-18
|
09 | Tero Kivinen | Request for Last Call review by SECDIR Completed: Has Issues. Reviewer: Charlie Kaufman. Submission of review completed at an earlier date. |
2024-05-16
|
09 | (System) | IESG state changed to Waiting for AD Go-Ahead from In Last Call |
2024-05-15
|
09 | (System) | IANA Review state changed to IANA OK - Actions Needed from IANA - Review Needed |
2024-05-15
|
09 | David Dong | (Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs: IANA has completed its review of draft-ietf-tsvwg-sctp-zero-checksum-09. If any part of this review is inaccurate, please let us know. IANA … (Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs: IANA has completed its review of draft-ietf-tsvwg-sctp-zero-checksum-09. If any part of this review is inaccurate, please let us know. IANA has a question about one of the actions requested in the IANA Considerations section of this document. IANA understands that, upon approval of this document, there are two actions which we must complete. First, in the Chunk Parameter Types registry in the Stream Control Transmission Protocol (SCTP) Parameters registry group located at: https://www.iana.org/assignments/sctp-parameters/ a single new registration is to be made as follows: ID Value: [ TBD-at-Registration ] Chunk Parameter Type: Zero Checksum Acceptable Reference: [ RFC-to-be ] IANA notes that the authors have suggested an ID Value of 32769 and that the Type be Zero Checksum Acceptable (0x8001). Second, a new registry is to be created called the Error Detection Method registry. IANA Question --> Where should this new registry be located? Should it be added to an existing registry group? If it needs a new registry group, does it also need a new category at http://www.iana.org/protocols (and if so, should the page and the category have the same name)? The new registry will be maintained via Specification Required as defined in RFC8126. There are two initial registrations in the new registry as follows: ID Value: 0 Error Detection Method: Reserved Reference: [ RFC-to-be ] ID Value: 1 Error Detection Method: SCTP over DTLS Reference: [ RFC-to-be ] ID Values 2 - 4294967295 are unassigned. We understand that these are the only actions required to be completed upon approval of this document. NOTE: The actions requested in this document will not be completed until the document has been approved for publication as an RFC. This message is meant only to confirm the list of actions that will be performed. For definitions of IANA review states, please see: https://datatracker.ietf.org/help/state/draft/iana-review Thank you, David Dong IANA Services Sr. Specialist |
2024-05-13
|
09 | Carlos Pignataro | Request for Last Call review by OPSDIR is assigned to Victor Kuarsingh |
2024-05-12
|
09 | Tero Kivinen | Request for Last Call review by SECDIR Completed: Has Issues. Reviewer: Charlie Kaufman. |
2024-05-10
|
09 | Meral Shirazipour | Request for Last Call review by GENART Completed: Ready with Nits. Reviewer: Meral Shirazipour. Sent review to list. Submission of review completed at an earlier … Request for Last Call review by GENART Completed: Ready with Nits. Reviewer: Meral Shirazipour. Sent review to list. Submission of review completed at an earlier date. |
2024-05-10
|
09 | Meral Shirazipour | Request for Last Call review by GENART Completed: Ready with Nits. Reviewer: Meral Shirazipour. |
2024-05-09
|
09 | Jean Mahoney | Request for Last Call review by GENART is assigned to Meral Shirazipour |
2024-05-03
|
09 | Tero Kivinen | Request for Last Call review by SECDIR is assigned to Charlie Kaufman |
2024-05-02
|
09 | Bernard Aboba | Request for Last Call review by ARTART Completed: Ready with Issues. Reviewer: Bernard Aboba. Sent review to list. Submission of review completed at an earlier … Request for Last Call review by ARTART Completed: Ready with Issues. Reviewer: Bernard Aboba. Sent review to list. Submission of review completed at an earlier date. |
2024-05-02
|
09 | Bernard Aboba | Request for Last Call review by ARTART Completed: Ready with Issues. Reviewer: Bernard Aboba. |
2024-05-02
|
09 | Barry Leiba | Request for Last Call review by ARTART is assigned to Bernard Aboba |
2024-05-02
|
09 | Liz Flynn | IANA Review state changed to IANA - Review Needed |
2024-05-02
|
09 | Liz Flynn | The following Last Call announcement was sent out (ends 2024-05-16): From: The IESG To: IETF-Announce CC: draft-ietf-tsvwg-sctp-zero-checksum@ietf.org, martenseemann@gmail.com, tsvwg-chairs@ietf.org, tsvwg@ietf.org, zahed.sarker.ietf@gmail.com … The following Last Call announcement was sent out (ends 2024-05-16): From: The IESG To: IETF-Announce CC: draft-ietf-tsvwg-sctp-zero-checksum@ietf.org, martenseemann@gmail.com, tsvwg-chairs@ietf.org, tsvwg@ietf.org, zahed.sarker.ietf@gmail.com Reply-To: last-call@ietf.org Sender: Subject: Last Call: (Zero Checksum for the Stream Control Transmission Protocol) to Proposed Standard The IESG has received a request from the Transport and Services Working Group WG (tsvwg) to consider the following document: - 'Zero Checksum for the Stream Control Transmission Protocol' as Proposed Standard The IESG plans to make a decision in the next few weeks, and solicits final comments on this action. Please send substantive comments to the last-call@ietf.org mailing lists by 2024-05-16. Exceptionally, comments may be sent to iesg@ietf.org instead. In either case, please retain the beginning of the Subject line to allow automated sorting. Abstract The Stream Control Transmission Protocol (SCTP) uses a 32-bit checksum in the common header of each packet to provide some level of data integrity. If another method used by SCTP already provides the same or a higher level of data integrity, computing this checksum does not provide any additional protection, but does consume computing resources. This document provides a simple extension allowing SCTP to save these computing resources by using zero as the checksum in a backwards compatible way. It also defines how this feature can be used when SCTP packets are encapsulated in Datagram Transport Layer Security (DTLS) packets. The file can be obtained via https://datatracker.ietf.org/doc/draft-ietf-tsvwg-sctp-zero-checksum/ No IPR declarations have been submitted directly on this I-D. |
2024-05-02
|
09 | Liz Flynn | IESG state changed to In Last Call from Last Call Requested |
2024-05-02
|
09 | Zaheduzzaman Sarker | Last call was requested |
2024-05-02
|
09 | Zaheduzzaman Sarker | Ballot approval text was generated |
2024-05-02
|
09 | Zaheduzzaman Sarker | Ballot writeup was generated |
2024-05-02
|
09 | Zaheduzzaman Sarker | IESG state changed to Last Call Requested from AD Evaluation::AD Followup |
2024-05-02
|
09 | Zaheduzzaman Sarker | Last call announcement was generated |
2024-03-28
|
09 | (System) | Changed action holders to Zaheduzzaman Sarker (IESG state changed) |
2024-03-28
|
09 | (System) | Sub state has been changed to AD Followup from Revised I-D Needed |
2024-03-28
|
09 | Michael Tüxen | New version available: draft-ietf-tsvwg-sctp-zero-checksum-09.txt |
2024-03-28
|
09 | Michael Tüxen | New version accepted (logged-in submitter: Michael Tüxen) |
2024-03-28
|
09 | Michael Tüxen | Uploaded new revision |
2024-03-28
|
09 | (System) | Request for posting confirmation emailed to previous authors: Florent Castelli , Michael Tuexen , Randell Jesup , Victor Boivie |
2024-03-28
|
09 | Michael Tüxen | Uploaded new revision |
2024-03-20
|
08 | Liz Flynn | Shepherding AD changed to Zaheduzzaman Sarker |
2024-03-12
|
08 | (System) | Changed action holders to Michael Tüxen, Victor Boivie, Florent Castelli, Randell Jesup (IESG state changed) |
2024-03-12
|
08 | Martin Duke | IESG state changed to AD Evaluation::Revised I-D Needed from AD Evaluation |
2024-03-12
|
08 | Martin Duke | IESG state changed to AD Evaluation from Publication Requested |
2024-03-07
|
08 | Marten Seemann | Shepherd Review - SCTP Zero Checksum Document History Was the document considered in any WG, and if so, why was it not adopted as a … Shepherd Review - SCTP Zero Checksum Document History Was the document considered in any WG, and if so, why was it not adopted as a work item there? The document was only considered in TSVWG. Was there controversy about particular points that caused the WG to not adopt the document? No. Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarize the areas of conflict in separate email messages to the responsible Area Director. (It should be in a separate email because this questionnaire is publicly available.) No. For protocol documents, are there existing implementations of the contents of the document? Have a significant number of potential implementers indicated plans to implement? Are any existing implementations reported somewhere, either in the document itself (as RFC 7942 recommends) or elsewhere (where)? There are a number of implementations I'm aware of: FreeBSD SCTP kernel stack: https://cgit.freebsd.org/src/tree/. This shares the SCTP code with (2) usrsctp userland stack: https://github.com/sctplab/usrsct. This shares the SCTP code with (1). Userland SCTP implementation of Google: https://webrtc.googlesource.com/src/+/refs/heads/main/net/dcsctp. Please note that this is an implementation for https://www.ietf.org/archive/id/draft-ietf-tsvwg-sctp-zero-checksum-00.html. Victor is working on updating the code to the latest draft version. Userland SCTP implementation in go: https://github.com/pion/sctp/pull/284. There needs to be some changes in the API. Support in Wireshark: https://gitlab.com/wireshark/wireshark Support in the SCTP capable fork of packetdrill: https://github.com/nplab/packetdrill Testcases for packetdrill: https://github.com/tsvwg/zero-checksum/tree/main/zero-checksum-tests Michael is working on adding support for zero checksum to the SCTP Test Tool: https://github.com/nplab/stt. He's planning to port of the testcases in (7) to stt to be able to use the tests for testing (4). Additional Reviews Do the contents of this document closely interact with technologies in other IETF working groups or external organizations, and would it therefore benefit from their review? Have those reviews occurred? If yes, describe which reviews took place. No. Describe how the document meets any required formal expert review criteria, such as the MIB Doctor, YANG Doctor, media type, and URI type reviews. There are no parameters that need review. If the document contains a YANG module, has the final version of the module been checked with any of the recommended validation tools for syntax and formatting validation? If there are any resulting errors or warnings, what is the justification for not fixing them at this time? Does the YANG module comply with the Network Management Datastore Architecture (NMDA) as specified in RFC 8342? The document doesn't contain a YANG module. Describe reviews and automated checks performed to validate sections of the final version of the document written in a formal language, such as XML code, BNF rules, MIB definitions, CBOR's CDDL, etc. There are no parameters that need validation. Document Shepherd Checks Based on the shepherd's review of the document, is it their opinion that this document is needed, clearly written, complete, correctly designed, and ready to be handed off to the responsible Area Director? Yes, the document is needed, clearly written, complete, correctly designed, and ready to be handed off to the responsible Area Director. As in other SCTP specifications in the RFC-series, this document includes a section with considerations for the SCTP API. Several IETF Areas have assembled lists of common issues that their reviewers encounter. For which areas have such issues been identified and addressed? For which does this still need to happen in subsequent reviews? No common issues were identified or need to be addressed. What type of RFC publication is being requested on the IETF stream (Best Current Practice, Proposed Standard, Internet Standard, Informational, Experimental or Historic)? Why is this the proper type of RFC? Do all Datatracker state attributes correctly reflect this intent? The document is requested to be published as Proposed Standard. This is the proper type for this document since it is generally stable, has resolved known design choices, is believed to be well-understood, has received significant community review, and appears to enjoy enough community interest to be considered valuable. The datatracker state correctly reflects this request. Have reasonable efforts been made to remind all authors of the intellectual property rights (IPR) disclosure obligations described in BCP 79? To the best of your knowledge, have all required disclosures been filed? If not, explain why. If yes, summarize any relevant discussion, including links to publicly-available messages when applicable. The authors were emailed in February 2024, and every one of them confirmed that they're not aware of any IPR. Has each author, editor, and contributor shown their willingness to be listed as such? If the total number of authors and editors on the front page is greater than five, please provide a justification. All authors have agreed to be listed as such. Document any remaining I-D nits in this document. Simply running the idnits tool is not enough; please review the "Content Guidelines" on authors.ietf.org. (Also note that the current idnits tool generates some incorrect warnings; a rewrite is underway.) Document looks good. Should any informative references be normative or vice-versa? See the IESG Statement on Normative and Informative References. Both informative and normative references look correct to me. List any normative references that are not freely available to anyone. Did the community have sufficient access to review any such normative references? All normative references are freely available. Are there any normative downward references (see RFC 3967 and BCP 97) that are not already listed in the DOWNREF registry? If so, list them. The document doesn't have any downward references. Are there normative references to documents that are not ready to be submitted to the IESG for publication or are otherwise in an unclear state? If so, what is the plan for their completion? There are only normative references to already published RFCs. Will publication of this document change the status of any existing RFCs? If so, does the Datatracker metadata correctly reflect this and are those RFCs listed on the title page, in the abstract, and discussed in the introduction? If not, explain why and point to the part of the document where the relationship of this document to these other RFCs is discussed. The document doesn't change the status of any existing RFC. Describe the document shepherd's review of the IANA considerations section, especially with regard to its consistency with the body of the document. Confirm that all aspects of the document requiring IANA assignments are associated with the appropriate reservations in IANA registries. Confirm that any referenced IANA registries have been clearly identified. Confirm that each newly created IANA registry specifies its initial contents, allocations procedures, and a reasonable name (see RFC 8126). The document defines the Zero Checksum Acceptable Chunk Parameter. The description of the parameter is consistent with the rest of the document. The document establishes a new IANA registry for the "Error Correction Method", including the initial contents. The name seems reasonable. List any new IANA registries that require Designated Expert Review for future allocations. Are the instructions to the Designated Expert clear? Please include suggestions of designated experts, if appropriate. Designated Expert Review is required for the newly established registry. The instructions are clear. Suggestion for designated export: Michael Tüxen |
2024-03-07
|
08 | Marten Seemann | IETF WG state changed to Submitted to IESG for Publication from WG Consensus: Waiting for Write-Up |
2024-03-07
|
08 | Marten Seemann | IESG state changed to Publication Requested from I-D Exists |
2024-03-07
|
08 | (System) | Changed action holders to Martin Duke (IESG state changed) |
2024-03-07
|
08 | Marten Seemann | Responsible AD changed to Martin Duke |
2024-03-07
|
08 | Marten Seemann | Document is now in IESG state Publication Requested |
2024-03-07
|
08 | Marten Seemann | Shepherd Review - SCTP Zero Checksum Document History Was the document considered in any WG, and if so, why was it not adopted as a … Shepherd Review - SCTP Zero Checksum Document History Was the document considered in any WG, and if so, why was it not adopted as a work item there? The document was only considered in TSVWG. Was there controversy about particular points that caused the WG to not adopt the document? No. Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarize the areas of conflict in separate email messages to the responsible Area Director. (It should be in a separate email because this questionnaire is publicly available.) No. For protocol documents, are there existing implementations of the contents of the document? Have a significant number of potential implementers indicated plans to implement? Are any existing implementations reported somewhere, either in the document itself (as RFC 7942 recommends) or elsewhere (where)? There are a number of implementations I'm aware of: FreeBSD SCTP kernel stack: https://cgit.freebsd.org/src/tree/. This shares the SCTP code with (2) usrsctp userland stack: https://github.com/sctplab/usrsct. This shares the SCTP code with (1). Userland SCTP implementation of Google: https://webrtc.googlesource.com/src/+/refs/heads/main/net/dcsctp. Please note that this is an implementation for https://www.ietf.org/archive/id/draft-ietf-tsvwg-sctp-zero-checksum-00.html. Victor is working on updating the code to the latest draft version. Userland SCTP implementation in go: https://github.com/pion/sctp/pull/284. There needs to be some changes in the API. Support in Wireshark: https://gitlab.com/wireshark/wireshark Support in the SCTP capable fork of packetdrill: https://github.com/nplab/packetdrill Testcases for packetdrill: https://github.com/tsvwg/zero-checksum/tree/main/zero-checksum-tests Michael is working on adding support for zero checksum to the SCTP Test Tool: https://github.com/nplab/stt. He's planning to port of the testcases in (7) to stt to be able to use the tests for testing (4). Additional Reviews Do the contents of this document closely interact with technologies in other IETF working groups or external organizations, and would it therefore benefit from their review? Have those reviews occurred? If yes, describe which reviews took place. No. Describe how the document meets any required formal expert review criteria, such as the MIB Doctor, YANG Doctor, media type, and URI type reviews. There are no parameters that need review. If the document contains a YANG module, has the final version of the module been checked with any of the recommended validation tools for syntax and formatting validation? If there are any resulting errors or warnings, what is the justification for not fixing them at this time? Does the YANG module comply with the Network Management Datastore Architecture (NMDA) as specified in RFC 8342? The document doesn't contain a YANG module. Describe reviews and automated checks performed to validate sections of the final version of the document written in a formal language, such as XML code, BNF rules, MIB definitions, CBOR's CDDL, etc. There are no parameters that need validation. Document Shepherd Checks Based on the shepherd's review of the document, is it their opinion that this document is needed, clearly written, complete, correctly designed, and ready to be handed off to the responsible Area Director? Yes, the document is needed, clearly written, complete, correctly designed, and ready to be handed off to the responsible Area Director. As in other SCTP specifications in the RFC-series, this document includes a section with considerations for the SCTP API. Several IETF Areas have assembled lists of common issues that their reviewers encounter. For which areas have such issues been identified and addressed? For which does this still need to happen in subsequent reviews? No common issues were identified or need to be addressed. What type of RFC publication is being requested on the IETF stream (Best Current Practice, Proposed Standard, Internet Standard, Informational, Experimental or Historic)? Why is this the proper type of RFC? Do all Datatracker state attributes correctly reflect this intent? The document is requested to be published as Proposed Standard. This is the proper type for this document since it is generally stable, has resolved known design choices, is believed to be well-understood, has received significant community review, and appears to enjoy enough community interest to be considered valuable. The datatracker state correctly reflects this request. Have reasonable efforts been made to remind all authors of the intellectual property rights (IPR) disclosure obligations described in BCP 79? To the best of your knowledge, have all required disclosures been filed? If not, explain why. If yes, summarize any relevant discussion, including links to publicly-available messages when applicable. The authors were emailed in February 2024, and every one of them confirmed that they're not aware of any IPR. Has each author, editor, and contributor shown their willingness to be listed as such? If the total number of authors and editors on the front page is greater than five, please provide a justification. All authors have agreed to be listed as such. Document any remaining I-D nits in this document. Simply running the idnits tool is not enough; please review the "Content Guidelines" on authors.ietf.org. (Also note that the current idnits tool generates some incorrect warnings; a rewrite is underway.) Document looks good. Should any informative references be normative or vice-versa? See the IESG Statement on Normative and Informative References. Both informative and normative references look correct to me. List any normative references that are not freely available to anyone. Did the community have sufficient access to review any such normative references? All normative references are freely available. Are there any normative downward references (see RFC 3967 and BCP 97) that are not already listed in the DOWNREF registry? If so, list them. The document doesn't have any downward references. Are there normative references to documents that are not ready to be submitted to the IESG for publication or are otherwise in an unclear state? If so, what is the plan for their completion? There are only normative references to already published RFCs. Will publication of this document change the status of any existing RFCs? If so, does the Datatracker metadata correctly reflect this and are those RFCs listed on the title page, in the abstract, and discussed in the introduction? If not, explain why and point to the part of the document where the relationship of this document to these other RFCs is discussed. The document doesn't change the status of any existing RFC. Describe the document shepherd's review of the IANA considerations section, especially with regard to its consistency with the body of the document. Confirm that all aspects of the document requiring IANA assignments are associated with the appropriate reservations in IANA registries. Confirm that any referenced IANA registries have been clearly identified. Confirm that each newly created IANA registry specifies its initial contents, allocations procedures, and a reasonable name (see RFC 8126). The document defines the Zero Checksum Acceptable Chunk Parameter. The description of the parameter is consistent with the rest of the document. The document establishes a new IANA registry for the "Error Correction Method", including the initial contents. The name seems reasonable. List any new IANA registries that require Designated Expert Review for future allocations. Are the instructions to the Designated Expert clear? Please include suggestions of designated experts, if appropriate. Designated Expert Review is required for the newly established registry. The instructions are clear. Suggestion for designated export: Michael Tüxen |
2024-03-01
|
08 | Gorry Fairhurst | Tag Doc Shepherd Follow-up Underway cleared. |
2024-03-01
|
08 | Gorry Fairhurst | IETF WG state changed to WG Consensus: Waiting for Write-Up from Waiting for WG Chair Go-Ahead |
2024-02-20
|
08 | Michael Tüxen | New version available: draft-ietf-tsvwg-sctp-zero-checksum-08.txt |
2024-02-20
|
08 | Michael Tüxen | New version accepted (logged-in submitter: Michael Tüxen) |
2024-02-20
|
08 | Michael Tüxen | Uploaded new revision |
2024-02-19
|
07 | Michael Tüxen | New version available: draft-ietf-tsvwg-sctp-zero-checksum-07.txt |
2024-02-19
|
07 | Michael Tüxen | New version accepted (logged-in submitter: Michael Tüxen) |
2024-02-19
|
07 | Michael Tüxen | Uploaded new revision |
2024-01-21
|
06 | Marten Seemann | Notification list changed to martenseemann@gmail.com because the document shepherd was set |
2024-01-21
|
06 | Marten Seemann | Document shepherd changed to Marten Seemann |
2024-01-21
|
06 | Marten Seemann | Changed consensus to Yes from Unknown |
2024-01-21
|
06 | Marten Seemann | Intended Status changed to Proposed Standard from None |
2023-12-19
|
06 | Gorry Fairhurst | Changed document external resources from: None to: github_repo https://github.com/tsvwg/zero-checksum |
2023-11-27
|
06 | Michael Tüxen | New version available: draft-ietf-tsvwg-sctp-zero-checksum-06.txt |
2023-11-27
|
06 | Michael Tüxen | New version accepted (logged-in submitter: Michael Tüxen) |
2023-11-27
|
06 | Michael Tüxen | Uploaded new revision |
2023-11-11
|
05 | Gorry Fairhurst | The formal WGLC has now concluded, as note din IETF-118. |
2023-11-11
|
05 | Gorry Fairhurst | Tag Doc Shepherd Follow-up Underway set. |
2023-11-11
|
05 | Gorry Fairhurst | IETF WG state changed to Waiting for WG Chair Go-Ahead from In WG Last Call |
2023-11-08
|
05 | Michael Tüxen | New version available: draft-ietf-tsvwg-sctp-zero-checksum-05.txt |
2023-11-08
|
05 | Michael Tüxen | New version accepted (logged-in submitter: Michael Tüxen) |
2023-11-08
|
05 | Michael Tüxen | Uploaded new revision |
2023-10-10
|
04 | Gorry Fairhurst | This email starts a WGLC for draft-ietf-tsvwg-sctp-zero-checksum to progress as a Standards-Track document: https://datatracker.ietf.org/doc/draft-ietf-tsvwg-sctp-zero-checksum People are asked to send experience of implementing the draft; notes … This email starts a WGLC for draft-ietf-tsvwg-sctp-zero-checksum to progress as a Standards-Track document: https://datatracker.ietf.org/doc/draft-ietf-tsvwg-sctp-zero-checksum People are asked to send experience of implementing the draft; notes of support for publication as an RFC; queries on the content; or any other comments to the tsvwg list. This call for WG last comments is set to end on 27th October 2023. Best wishes, Gorry & Marten TSVWG Co-Chairs |
2023-10-10
|
04 | Gorry Fairhurst | IETF WG state changed to In WG Last Call from WG Document |
2023-10-10
|
04 | Gorry Fairhurst | Accepting feedback from the WG and a Chair review. |
2023-10-10
|
04 | Gorry Fairhurst | Tag Revised I-D Needed - Issue raised by WG cleared. |
2023-10-03
|
04 | Michael Tüxen | New version available: draft-ietf-tsvwg-sctp-zero-checksum-04.txt |
2023-10-03
|
04 | Michael Tüxen | New version accepted (logged-in submitter: Michael Tüxen) |
2023-10-03
|
04 | Michael Tüxen | Uploaded new revision |
2023-09-29
|
03 | Gorry Fairhurst | Tag Revised I-D Needed - Issue raised by WG set. |
2023-07-27
|
03 | Michael Tüxen | New version available: draft-ietf-tsvwg-sctp-zero-checksum-03.txt |
2023-07-27
|
03 | Michael Tüxen | New version accepted (logged-in submitter: Michael Tüxen) |
2023-07-27
|
03 | Michael Tüxen | Uploaded new revision |
2023-07-27
|
02 | Michael Tüxen | New version available: draft-ietf-tsvwg-sctp-zero-checksum-02.txt |
2023-07-27
|
02 | Michael Tüxen | New version accepted (logged-in submitter: Michael Tüxen) |
2023-07-27
|
02 | Michael Tüxen | Uploaded new revision |
2023-07-10
|
01 | Michael Tüxen | New version available: draft-ietf-tsvwg-sctp-zero-checksum-01.txt |
2023-07-10
|
01 | Michael Tüxen | New version accepted (logged-in submitter: Michael Tüxen) |
2023-07-10
|
01 | Michael Tüxen | Uploaded new revision |
2023-05-11
|
00 | Gorry Fairhurst | This document now replaces draft-tuexen-tsvwg-sctp-zero-checksum instead of None |
2023-05-11
|
00 | Michael Tüxen | New version available: draft-ietf-tsvwg-sctp-zero-checksum-00.txt |
2023-05-11
|
00 | Gorry Fairhurst | WG -00 approved |
2023-05-10
|
00 | Michael Tüxen | Set submitter to "Michael Tüxen", replaces to draft-tuexen-tsvwg-sctp-zero-checksum and sent approval email to group chairs: tsvwg-chairs@ietf.org |
2023-05-10
|
00 | Michael Tüxen | Uploaded new revision |