Skip to main content

Transport Options for UDP
draft-ietf-tsvwg-udp-options-45

Revision differences

Document history

Date Rev. By Action
2025-10-07
(System)
Received changes through RFC Editor sync (changed state to RFC, created became rfc relationship between draft-ietf-tsvwg-udp-options and RFC 9868, changed IESG state to RFC …
Received changes through RFC Editor sync (changed state to RFC, created became rfc relationship between draft-ietf-tsvwg-udp-options and RFC 9868, changed IESG state to RFC Published)
2025-10-01
45 (System) RFC Editor state changed to AUTH48-DONE from AUTH48
2025-09-11
45 (System) RFC Editor state changed to AUTH48
2025-08-12
45 (System) RFC Editor state changed to RFC-EDITOR from EDIT
2025-04-10
45 Bo Wu Closed request for IETF Last Call review by OPSDIR with state 'Overtaken by Events'
2025-04-10
45 Bo Wu Assignment of request for IETF Last Call review by OPSDIR to Victor Kuarsingh was marked no-response
2025-03-26
45 Barry Leiba Closed request for Last Call review by ARTART with state 'Overtaken by Events': Document has finished IESG processing
2025-03-26
45 Barry Leiba Assignment of request for Last Call review by ARTART to Cullen Jennings was marked no-response
2025-03-26
45 (System) IANA Action state changed to RFC-Ed-Ack from Waiting on RFC Editor
2025-03-26
45 (System) IANA Action state changed to Waiting on RFC Editor from In Progress
2025-03-26
45 (System) IANA Action state changed to In Progress from Waiting on Authors
2025-03-25
45 (System) IANA Action state changed to Waiting on Authors from In Progress
2025-03-20
45 Tero Kivinen Closed request for Last Call review by SECDIR with state 'Overtaken by Events'
2025-03-20
45 Tero Kivinen Assignment of request for Last Call review by SECDIR to Akira Tsukamoto was marked no-response
2025-03-20
45 (System) RFC Editor state changed to EDIT from MISSREF
2025-03-17
45 (System) RFC Editor state changed to MISSREF
2025-03-17
45 (System) IESG state changed to RFC Ed Queue from Approved-announcement sent
2025-03-17
45 (System) Announcement was received by RFC Editor
2025-03-17
45 (System) IANA Action state changed to In Progress
2025-03-17
45 Jenny Bui IESG state changed to Approved-announcement sent from Approved-announcement to be sent
2025-03-17
45 Jenny Bui IESG has approved the document
2025-03-17
45 Jenny Bui Closed "Approve" ballot
2025-03-17
45 Jenny Bui Ballot approval text was generated
2025-03-16
45 (System) Removed all action holders (IESG state changed)
2025-03-16
45 Zaheduzzaman Sarker IESG state changed to Approved-announcement to be sent from IESG Evaluation::AD Followup
2025-03-16
45 Joseph Touch New version available: draft-ietf-tsvwg-udp-options-45.txt
2025-03-16
45 (System) New version approved
2025-03-16
45 (System) Request for posting confirmation emailed to previous authors: "C. Heard" , Joseph Touch
2025-03-16
45 Joseph Touch Uploaded new revision
2025-03-16
44 Joseph Touch New version available: draft-ietf-tsvwg-udp-options-44.txt
2025-03-16
44 (System) New version approved
2025-03-16
44 (System) Request for posting confirmation emailed to previous authors: "C. Heard" , Joseph Touch
2025-03-16
44 Joseph Touch Uploaded new revision
2025-03-15
43 John Scudder [Ballot comment]
I reviewed version 43 and that's enough to clear my DISCUSS; thanks. I hope you'll consider my remaining COMMENTs, https://mailarchive.ietf.org/arch/msg/tsvwg/DRPlVGhdK-SpruVoWeh2afHxiwU/
2025-03-15
43 John Scudder [Ballot Position Update] Position for John Scudder has been changed to No Objection from Discuss
2025-03-15
43 Éric Vyncke
[Ballot comment]
Thanks for quickly addressing my previous DISCUSS. I have kept my previous comments below for archiving purpose only.
See also: https://mailarchive.ietf.org/arch/msg/tsvwg/-VPfuPWFvj5HHtZF67eq9OLzG2w/

This is …
[Ballot comment]
Thanks for quickly addressing my previous DISCUSS. I have kept my previous comments below for archiving purpose only.
See also: https://mailarchive.ietf.org/arch/msg/tsvwg/-VPfuPWFvj5HHtZF67eq9OLzG2w/

This is a simple and brilliant technique

-éric

## Previous DISCUSS (for archiving)

As noted in https://www.ietf.org/blog/handling-iesg-ballot-positions/, a DISCUSS ballot is just a request to have a discussion on the following topics:

### Section 7

`UDP_Length = IPv4_Total_Length - IPv4_IHL * 4` this formula is incorrect in the presence of IPsec (ESH/AH) in transport mode or IPcomp.

### Section 8

`Option area bytes used for alignment before the OCS MUST be zero` What is the expected receiver behaviour when these octets are not zero ?

### Interaction with RFC 9298

I was expected some text about RFC 9298 "Proxying UDP in HTTP" as it may affect UDP options; i.e., at least some words about this RFC should appear in this document.

## Previous COMMENTS (for archiving only)

### Abstract

s/end of the IP length/end of the IP datagram length/ ?

### Section 3

s/IP header and an IP payload area/IP header, IP extension headers (if any), and an IP payload area/ ?

s/that all implementations are required to support/that all implementations MUS to support/ ?

About the SAFE options, should there already be some words about the middleboxes ?

### Section 4

To my non-English reader's eyes "Internet historians suggest a number of reasons why UDP includes this field" would read easier than `There are a number of reasons why Internet historians suggest that UDP includes this field`

Wow Teredo is still worth referring to... (ignore this comment of course)

### Section 5

I was about to ballot a DISCUSS on this text
```
  They
  enable capabilities available in other transport protocols, such as
  fragmentation and reassembly, that enable UDP frames larger than the
  IP MTU to traverse devices that rely on transport ports, e.g., NATs.
```

As both TCP & UDP messages can be fragmented by IPv6/IPv4 layer in several IPv6/IPv4 fragments without the need of anything at layer-4. Of course, this requires stateful NAT/NAT64 devices to handle this correctly.

So, either the text is unclear (i.e., I misread it) or is plain wrong. This sentence *SHOULD* really be rewritten, e.g., by including "stateless middleboxes".

Should there be a reference for `UDP was originally intended to assume such capabilities` ?

### Section 9

What are `errant middleboxes` ?

### Section 10

Is there any reason why the field is "Kind" rather than the usual "Type" as in TLV?

Even if obvious, please state the unit of the Length field.

Suggest adding some leading text between figure 6 and the indented specification paragraphs.

s/Option lengths MUST NOT exceed the IP length /The sum of all option lengths MUST NOT exceed the IP length / ?

### Section 11.1

`Bytes after EOL in the surplus area or the options area of a UDP fragment MAY be checked as being zero on receipt, ` should this rather be a MUST to avoid the side channel? I.e., the receiver will be made aware of something wrong happening.

### Section 11.3

Should there be informal reference to `including iSCSI` ?

`UDP packets with incorrect APC checksums SHOULD be passed to the application, e.g., with a flag indicating APC failure` unsure whether 'e.g.,' is safe here, mandating an CRC violation signal to the application seems mandatory to me.

### Section 11.4

This is probably the section that is the most contentious from my view... Fragmentation is done in layer-3 usually (for the better or the worse) so having *TWO* fragmentation layers seems useless (beside stateless NAT), redundant, and possibly having side effects related to path MTU discovery.


Notably, because TCP and its options do not have a similar mechanism and nobody has every complained (I can be wrong though).
At the bare minimum, add "stateless NAT" in
```
  FRAG includes
  a copy of the same UDP transport ports in each fragment, enabling
  them to traverse Network Address (and port) Translation (NAT)
  devices, in contrast to the behavior of IP fragments [RFC4787].
```

Is there any implementation of HW acceleration as in
```
  When present, placing FRAG first can simplify some implementations,
  notably those using hardware acceleration that assume a fixed
  location for the FRAG option.
```
?

### Sections 11.5 and 11.6

Should there be some text about the usefulness of these options in the case of a unidirectional UDP flow ?

### Section 11.8

No need to reply, but this section seems to be an attempt to have a TCP-like transport above UDP. Anyway, it does not hurt...


### Section 18

A blast from the past `Windows Cygwin` ;-) (no need to reply)


## NITS (non-blocking / cosmetic)

### Use of SVG graphics

To make a much nicer HTML rendering, suggest using the aasvg too to generate SVG graphics. It is worth a try especially when using Markdown format ;-)
2025-03-15
43 Éric Vyncke [Ballot Position Update] Position for Éric Vyncke has been changed to Yes from Discuss
2025-03-15
43 (System) Changed action holders to Zaheduzzaman Sarker (IESG state changed)
2025-03-15
43 (System) Sub state has been changed to AD Followup from Revised I-D Needed
2025-03-15
43 (System) IANA Review state changed to Version Changed - Review Needed from IANA OK - Actions Needed
2025-03-15
43 Joseph Touch New version available: draft-ietf-tsvwg-udp-options-43.txt
2025-03-15
43 (System) New version approved
2025-03-15
43 (System) Request for posting confirmation emailed to previous authors: "C. Heard" , Joseph Touch
2025-03-15
43 Joseph Touch Uploaded new revision
2025-03-10
42 Roman Danyliw [Ballot comment]
Thank you to Robert Sparks for the GENART review.

Thank you for addressing my feedback.
2025-03-10
42 Roman Danyliw [Ballot Position Update] Position for Roman Danyliw has been changed to No Objection from Discuss
2025-03-06
42 (System) Changed action holders to Joseph Touch, C. Heard (IESG state changed)
2025-03-06
42 Cindy Morgan IESG state changed to IESG Evaluation::Revised I-D Needed from IESG Evaluation
2025-03-06
42 Éric Vyncke
[Ballot discuss]

# Éric Vyncke, INT AD, comments for draft-ietf-tsvwg-udp-options-42
CC @evyncke

Thank you for the work put into this document. I do not often …
[Ballot discuss]

# Éric Vyncke, INT AD, comments for draft-ietf-tsvwg-udp-options-42
CC @evyncke

Thank you for the work put into this document. I do not often review a -42 revision of a document started in 2015 ;-) it is also the first RFC to update RFC 768 :-O

Even if I am balloting a DISCUSS, this idea behind this I-D is simple and brilliant.

Please find below some blocking DISCUSS points (easy to address), some non-blocking COMMENT points (but replies would be appreciated even if only for my own education), and one nit.

Special thanks to Gorry Fairhurst for the shepherd's detailed write-up including the WG consensus and the justification of the intended status.

Other thanks to Antoine Fressancourt, the Internet directorate reviewer (at my request), please consider this int-dir review:
https://datatracker.ietf.org/doc/review-ietf-tsvwg-udp-options-38-intdir-telechat-fressancourt-2025-02-27/ (and I have read Mike's reply)

Other thanks to David Blacka, the DNS directorate reviewer, please consider this dns-dir review:
https://datatracker.ietf.org/doc/review-ietf-tsvwg-udp-options-40-dnsdir-telechat-blacka-2025-02-27/ (and I have read Joe's reply)

I hope that this review helps to improve the document,

Regards,

-éric


## DISCUSS (blocking)

As noted in https://www.ietf.org/blog/handling-iesg-ballot-positions/, a DISCUSS ballot is just a request to have a discussion on the following topics:

### Section 7

`UDP_Length = IPv4_Total_Length - IPv4_IHL * 4` this formula is incorrect in the presence of IPsec (ESH/AH) in transport mode or IPcomp.

### Section 8

`Option area bytes used for alignment before the OCS MUST be zero` What is the expected receiver behaviour when these octets are not zero ?

### Interaction with RFC 9298

I was expected some text about RFC 9298 "Proxying UDP in HTTP" as it may affect UDP options; i.e., at least some words about this RFC should appear in this document.
2025-03-06
42 Éric Vyncke
[Ballot comment]

## COMMENTS (non-blocking)

### Abstract

s/end of the IP length/end of the IP datagram length/ ?

### Section 3

s/IP header and an …
[Ballot comment]

## COMMENTS (non-blocking)

### Abstract

s/end of the IP length/end of the IP datagram length/ ?

### Section 3

s/IP header and an IP payload area/IP header, IP extension headers (if any), and an IP payload area/ ?

s/that all implementations are required to support/that all implementations MUS to support/ ?

About the SAFE options, should there already be some words about the middleboxes ?

### Section 4

To my non-English reader's eyes "Internet historians suggest a number of reasons why UDP includes this field" would read easier than `There are a number of reasons why Internet historians suggest that UDP includes this field`

Wow Teredo is still worth referring to... (ignore this comment of course)

### Section 5

I was about to ballot a DISCUSS on this text
```
  They
  enable capabilities available in other transport protocols, such as
  fragmentation and reassembly, that enable UDP frames larger than the
  IP MTU to traverse devices that rely on transport ports, e.g., NATs.
```

As both TCP & UDP messages can be fragmented by IPv6/IPv4 layer in several IPv6/IPv4 fragments without the need of anything at layer-4. Of course, this requires stateful NAT/NAT64 devices to handle this correctly.

So, either the text is unclear (i.e., I misread it) or is plain wrong. This sentence *SHOULD* really be rewritten, e.g., by including "stateless middleboxes".

Should there be a reference for `UDP was originally intended to assume such capabilities` ?

### Section 9

What are `errant middleboxes` ?

### Section 10

Is there any reason why the field is "Kind" rather than the usual "Type" as in TLV?

Even if obvious, please state the unit of the Length field.

Suggest adding some leading text between figure 6 and the indented specification paragraphs.

s/Option lengths MUST NOT exceed the IP length /The sum of all option lengths MUST NOT exceed the IP length / ?

### Section 11.1

`Bytes after EOL in the surplus area or the options area of a UDP fragment MAY be checked as being zero on receipt, ` should this rather be a MUST to avoid the side channel? I.e., the receiver will be made aware of something wrong happening.

### Section 11.3

Should there be informal reference to `including iSCSI` ?

`UDP packets with incorrect APC checksums SHOULD be passed to the application, e.g., with a flag indicating APC failure` unsure whether 'e.g.,' is safe here, mandating an CRC violation signal to the application seems mandatory to me.

### Section 11.4

This is probably the section that is the most contentious from my view... Fragmentation is done in layer-3 usually (for the better or the worse) so having *TWO* fragmentation layers seems useless (beside stateless NAT), redundant, and possibly having side effects related to path MTU discovery.


Notably, because TCP and its options do not have a similar mechanism and nobody has every complained (I can be wrong though).
At the bare minimum, add "stateless NAT" in
```
  FRAG includes
  a copy of the same UDP transport ports in each fragment, enabling
  them to traverse Network Address (and port) Translation (NAT)
  devices, in contrast to the behavior of IP fragments [RFC4787].
```

Is there any implementation of HW acceleration as in
```
  When present, placing FRAG first can simplify some implementations,
  notably those using hardware acceleration that assume a fixed
  location for the FRAG option.
```
?

### Sections 11.5 and 11.6

Should there be some text about the usefulness of these options in the case of a unidirectional UDP flow ?

### Section 11.8

No need to reply, but this section seems to be an attempt to have a TCP-like transport above UDP. Anyway, it does not hurt...


### Section 18

A blast from the past `Windows Cygwin` ;-) (no need to reply)


## NITS (non-blocking / cosmetic)

### Use of SVG graphics

To make a much nicer HTML rendering, suggest using the aasvg too to generate SVG graphics. It is worth a try especially when using Markdown format ;-)
2025-03-06
42 Éric Vyncke [Ballot Position Update] New position, Discuss, has been recorded for Éric Vyncke
2025-03-06
42 Geoff Huston
Closed request for Telechat review by DNSDIR with state 'Team Will not Review Version': giving the review team just 2 days to review a 50 …
Closed request for Telechat review by DNSDIR with state 'Team Will not Review Version': giving the review team just 2 days to review a 50 page document is insane - the answer is NO!
2025-03-06
42 Geoff Huston Assignment of request for Telechat review by DNSDIR to Vladimír Čunát was withdrawn
2025-03-05
42 Murray Kucherawy [Ballot Position Update] New position, No Objection, has been recorded for Murray Kucherawy
2025-03-05
42 Paul Wouters [Ballot comment]
Thanks to Paul Wouters for the early SecDir review :-)

These items were discussed at the time, see https://mailarchive.ietf.org/arch/msg/secdir/bysSyp7Ana5IPHc6F8KGl41XxSg/
2025-03-05
42 Paul Wouters [Ballot Position Update] New position, No Objection, has been recorded for Paul Wouters
2025-03-05
42 John Scudder
[Ballot discuss]
Thanks for this document. I found it interesting and for the most part, solidly written. I have a few comments about spots I …
[Ballot discuss]
Thanks for this document. I found it interesting and for the most part, solidly written. I have a few comments about spots I found rough, and one discuss point.

## DISCUSS

### Section 11.8, TIME isn't time

I was bamboozled by this section until I followed the breadcrumb you kindly left pointing to RFC 7323, and learned that 7323 defines the clock "without any connection to time" (I am not making this up, it's RFC 7323 Section 5.4). Ergo, TIME has no connection to time. What a world.

I assume you are inheriting this definition; with that assumption, this section makes sense, without it, it doesn't. If that's what you are doing, I think you have to either provide the necessary definitions here, or (probably better) reference RFC 7232 normatively and state what definition(s) you're inheriting, instead of casually saying "serves a similar purpose".

(I appreciate that to people who live in this world, this was probably too obvious to bother writing down. I'm here to remind you that to the casual punter, it's not obvious.)
2025-03-05
42 John Scudder
[Ballot comment]
## COMMENT

### Section 10, isn't this part of the base spec?

This section is about UDP Options, but includes the paragraph,

  …
[Ballot comment]
## COMMENT

### Section 10, isn't this part of the base spec?

This section is about UDP Options, but includes the paragraph,

  >> The UDP length MUST be at least as large as the UDP header (8)
  and no larger than the IP transport payload. Datagrams with length
  values outside this range MUST be silently dropped as invalid and
  logged.

Isn't that a requirement of the base UDP transport and independent of options? Why is it specified here?

### Section 10, language about lengths is muddled

I have a few problems understanding this paragraph:

  >> Receivers supporting UDP options MUST silently ignore unknown
  SAFE options (i.e., in the same way a legacy receiver would ignore
  all UDP options). That includes options whose length does not
  indicate the specified value(s), as long as the length is not
  inherently invalid (i.e., smaller than 2 for the default and 4 for
  the extended formats). Note: a FRAG option with an unknown length
  field SHALL be treated as an unsupported UNSAFE option.

First, what does "whose length does not indicate the specified value(s)" mean? Specifically, what do you mean by "indicate", how does a length "indicate" a value? My best guess is that you mean for a given type code (oh sorry, "kind"), there will be some specified structure, for which only certain lengths might apply, e.g. 10 and 12 for FRAG. Do you mean that, again using FRAG as our example, a length of 11 wouldn't "indicate" something-or-other? (I devolve to "something-or-other" because I realized I also don't know what you mean by "the specified values" -- I guess maybe "the specified values" would be 10 and 12.)

If that's what you mean, I think a less opaque way to say it would be something like, "... options whose length is inconsistent with the values permitted by the specification of that option".

Later, we have "a FRAG option with an unknown length field". What does it even *mean* for the length *field* to be "unknown"? My best guess is you mean something like "a FRAG option whose length is inconsistent with the values permitted by this specification, see Section 11.4".

### Section 10, is this just a roundabout way of saying "drop it"?

  >> Receivers supporting UDP options that receive unsupported options
  in the UNSAFE range MUST terminate all option processing and MUST
  silently drop all UDP options in that datagram. See Section 12 for
  further discussion of UNSAFE options.

OK, we are just dropping the options. But in the previous paragraph, you told me that any UNSAFE option implies there is no user data in the normal place:

  >> When UNSAFE options are present, the UDP user data MUST be empty,
  and any transport payload MUST be contained in a FRAG option (see

When I put these two things together, what I come away with is that if I get an UNSAFE option I will deliver no data to the user. This seems like a bit of a roundabout way to tell me that. Maybe it's important to use these phrasings, but even if so, it would be nice to mention to the casual reader what the implication is.

### Section 10, wut

This made my brain hurt:

                                                This does not prohibit
  future uses of the entire surplus area; space that would have
  occurred after the EOL can be used as a UDP option instead, i.e.,
  rather than using the EOL option and trying to define meaning beyond
  it, define a new option that uses the remaining surplus area as an
  option itself, in conjunction with an assigned UDP option codepoint
  and length to unambiguously indicate the meaning of that area. This
  also does not prohibit options that modify later options (in order
  of appearance within a packet), such as would typically be the case
  for compression (UCMP).

After I read it a few times, I decided (a) I kind of halfway get what you're saying, but only halfway, (b) it's non-normative anyway, just some notes toward possible extensions so it's not worth giving myself a migraine over.

Anyway, be aware that to at least this reader, the quoted text doesn't do an effective job of communicating. I'm sorry I can't suggest a rewrite.

### Section 10, "impossible"

  >> Impossible lengths SHOULD be treated as an indication of a
  malformed surplus area and all options SHOULD silently be discarded.
  This includes lengths that imply a physical impossibility, e.g.,
  smaller than two for conventional options and four for extended
  length options. Lengths other than those expected result in safe
  options being ignored and skipped over, as with any other unknown
  safe option.

First you mention "impossible lengths", which is interestingly vague.

Then you say these impossible lengths include (which implies "but not limited to") underruns. I guess the other impossible length would be an overrun (but then you specify that as a separate case, see later comment). Are there any other categories you'd lump under "impossible"? Is it... possible... to use more precise language than "impossible" here?

I guess the final sentence excludes lengths that are inconsistent with the type code^H^H^H^H kind's specification as being "impossible", these are treated by ignoring them, not giving up completely. Isn't this sentence redundant with (though clearer than!) the paragraph I complained about above? ("language about lengths is muddled")

### Section 10, is this also "impossible"?

  >> Option lengths MUST NOT exceed the IP length of the overall IP
  datagram. A receiver MUST drop all options in such a malformed
  packet and the event MAY be logged for diagnostics.

Either this falls under the "impossible" umbrella I just complained about and is redundant, or I misunderstand "impossible" even worse than I feared.

### Section 11.4, partially reassembled

                                                              UDP
  options that apply to the reassembled datagram are contained in the
  partially reassembled surplus area, as indicated by RDOS.
 
What's "partially reassembled" mean? I would have thought this should say something like,

  UDP options that apply to the reassembled datagram are contained in
  the surplus area of the reassembled datagram, as indicated by RDOS.
 
which is a bit of an unlovely sentence (too much "reassembled datagram") but anyway, I can make sense of it and I think it says what I understand you to mean.

### Section 11.4, I don't get it

I don't understand this:

  >> Users MAY also select the FRAG option to provide limited support
  for UDP options in systems that have access to only the initial
  portion of the data in incoming or outgoing packets
 
Can't make head or tail of it. Sorry. :-(

### Section 11.5, known path MTU

  >> MDS does not indicate a known path MTU and thus MUST NOT be used
  to limit transmissions.

That sounds wrong to me. Surely it represents an upper bound on the PMTU and thus is of some use in limiting transmissions?

## NITS

### Section 25.1

I suggest,

OLD
  Note that any user application that considers UDP options to affect

NEW
  Note that any user application that considers UDP options to adversely
  affect
2025-03-05
42 John Scudder [Ballot Position Update] New position, Discuss, has been recorded for John Scudder
2025-03-05
42 Deb Cooley
[Ballot comment]
Thanks to Paul Wouters for their secdir review (circa 2023)!!!

I found this draft to be easy to read.  Thanks to the authors …
[Ballot comment]
Thanks to Paul Wouters for their secdir review (circa 2023)!!!

I found this draft to be easy to read.  Thanks to the authors and working group for that effort.
2025-03-05
42 Deb Cooley [Ballot Position Update] New position, No Objection, has been recorded for Deb Cooley
2025-03-04
42 Mahesh Jethanandani
[Ballot comment]
I too enjoyed reading the document and the design to address any issues the addition of the header may cause in existing deployment. …
[Ballot comment]
I too enjoyed reading the document and the design to address any issues the addition of the header may cause in existing deployment.

Section 24, paragraph 0
> 24. Network Management Considerations
>    IP Flow Information Export Information Elements for UDP options have
>    been defined in [Bo24].

Thank you for adding a section on management considerations. From a monitoring perspective, I can imagine that if someone wanted to write a YANG model, they could look at what is being exported via IPFIX.

Does it mean there is no configuration required to enable/disable this feature? If so, a statement to that effect would provide clarity.

-------------------------------------------------------------------------------
NIT
-------------------------------------------------------------------------------

All comments below are about very minor potential issues that you may choose to
address in some way - or ignore - as you see fit. Some were flagged by
automated tools (via https://github.com/larseggert/ietf-reviewtool), so there
will likely be some false positives. There is no need to let me know what you
did with these suggestions.

Section 6, paragraph 1
> hat of the UDP packet itself. Past experience confirms that static length li
>                              ^^^^^^^^^^^^^^^
Consider using "experience".

Section 8, paragraph 4
>  the surplus area from errors in a similar way that the UDP checksum protect
>                              ^^^^^^^^^^^^^^^^
Consider replacing this phrase with the adverb "similarly" to avoid wordiness.

Section 10, paragraph 18
> gram. If an option other than these four occurs more than once, a receiver MU
>                              ^^^^^^^^^^^^^^^^^
The verb "occurs" is singular. Did you mean: "these four occur"?

Section 10, paragraph 33
>  used as padding, e.g., to align multi-byte options along 16-bit, 32-bit, or
>                                  ^^^^^^^^^^
This word is normally spelled as one.

Section 11.4, paragraph 51
> ed per-fragment, the reported value is be the minimum of the MRDS values rece
>                                    ^^^^^
Consider using either the present participle "is being" here.

Section 11.4, paragraph 52
> ons provides UDP packet-level acknowledgements as a capability for use by up
>                              ^^^^^^^^^^^^^^^^
Do not mix variants of the same word ("acknowledgement" and "acknowledgment")
within a single text.

Section 11.6, paragraph 1
>  Echo Reply (TSecr) are used in a similar manner to the TCP TS option [RFC732
>                              ^^^^^^^^^^^^^^^^^^^
Consider replacing this phrase with the adverb

Section 11.7, paragraph 2
> uting the check), the latter in a similar manner as per TCP-AO NAT traversal
>                              ^^^^^^^^^^^^^^^^^^^
Consider replacing this phrase with the adverb "similarly" to avoid wordiness.

Section 11.8, paragraph 14
> r, in sequence) UDP options, in a similar manner as TCP-AO-ENC [To18]. 12.3.
>                              ^^^^^^^^^^^^^^^^^^^
Consider replacing this phrase with the adverb "similarly" to avoid wordiness.

Section 25.2, paragraph 2
>  ExIDs) are intended for use in a similar manner as TCP ExIDs [RFC6994]. Both
>                              ^^^^^^^^^^^^^^^^^^^
Consider replacing this phrase with the adverb "similarly" to avoid wordiness.

Section 27.1, paragraph 6
> bugging purposes, and is not intended be enabled otherwise. System variables
>                                      ^^
It seems that "to" is missing before the verb.
2025-03-04
42 Mahesh Jethanandani [Ballot Position Update] New position, No Objection, has been recorded for Mahesh Jethanandani
2025-03-03
42 (System) IANA Review state changed to IANA OK - Actions Needed from Version Changed - Review Needed
2025-03-03
42 Geoff Huston Request for Telechat review by DNSDIR is assigned to Vladimír Čunát
2025-03-03
42 Jim Guichard [Ballot Position Update] New position, No Objection, has been recorded for Jim Guichard
2025-03-03
42 Gunter Van de Velde [Ballot Position Update] New position, No Objection, has been recorded for Gunter Van de Velde
2025-03-02
42 Joseph Touch New version available: draft-ietf-tsvwg-udp-options-42.txt
2025-03-02
42 Joseph Touch New version accepted (logged-in submitter: Joseph Touch)
2025-03-02
42 Joseph Touch Uploaded new revision
2025-03-02
41 Erik Kline
[Ballot comment]
# Internet AD comments for draft-ietf-tsvwg-udp-options-39
CC @ekline

* comment syntax:
  - https://github.com/mnot/ietf-comments/blob/main/format.md

* "Handling Ballot Positions":
  - https://ietf.org/about/groups/iesg/statements/handling-ballot-positions/

## Comments …
[Ballot comment]
# Internet AD comments for draft-ietf-tsvwg-udp-options-39
CC @ekline

* comment syntax:
  - https://github.com/mnot/ietf-comments/blob/main/format.md

* "Handling Ballot Positions":
  - https://ietf.org/about/groups/iesg/statements/handling-ballot-positions/

## Comments

### Appendix A

* Out of curiosity, what happens (or is supposed to happen) if UDP_JUNK is
  enabled?

## Nits

### S6

* "A mechanism that requires bidirectionally" ->
  "A mechanism that requires bidirectionality"?

### S10

* "trying to defining meaning" ->
  "trying to define meaning"

### S11.3

* "embedded ports numbers" ->
  "embedded port numbers"

### S11.4

* "no larger no larger" ->
  "no larger"

### S11.7

* "in which case and REQ/RES" ->
  "in which case REQ/RES"
2025-03-02
41 Erik Kline [Ballot Position Update] New position, Yes, has been recorded for Erik Kline
2025-03-01
41 Joseph Touch New version available: draft-ietf-tsvwg-udp-options-41.txt
2025-03-01
41 Joseph Touch New version accepted (logged-in submitter: Joseph Touch)
2025-03-01
41 Joseph Touch Uploaded new revision
2025-03-01
40 Orie Steele [Ballot Position Update] New position, No Objection, has been recorded for Orie Steele
2025-02-27
40 David Blacka Request for Telechat review by DNSDIR Completed: Ready with Nits. Reviewer: David Blacka. Sent review to list.
2025-02-27
40 Geoff Huston Request for Telechat review by DNSDIR is assigned to David Blacka
2025-02-27
40 Antoine Fressancourt Request for Telechat review by INTDIR Completed: Ready with Nits. Reviewer: Antoine Fressancourt. Sent review to list.
2025-02-26
40 Joseph Touch New version available: draft-ietf-tsvwg-udp-options-40.txt
2025-02-26
40 Joseph Touch New version accepted (logged-in submitter: Joseph Touch)
2025-02-26
40 Joseph Touch Uploaded new revision
2025-02-25
39 Roman Danyliw
[Ballot discuss]
Question from IANA -->

==[ snip ]==
Third, the existing TCP Experimental Option Experiment Identifiers (TCP ExIDs) in the Transmission Control Protocol (TCP) …
[Ballot discuss]
Question from IANA -->

==[ snip ]==
Third, the existing TCP Experimental Option Experiment Identifiers (TCP ExIDs) in the Transmission Control Protocol (TCP) Parameters registry group located at:

https://www.iana.org/assignments/tcp-parameters/

is to be renamed to Unified TCP/UDP Option Experiment Identifiers and [ RFC-to-be ] will be added to the existing reference.

Is this registry to remain in place, or is the registry to be moved to the new registry group created by the first action?
==[ snip ]==
2025-02-25
39 Roman Danyliw
[Ballot comment]
Thank you to Robert Sparks for the GENART review.

** Section 26.
  Initial values of the UDP Option Kind registry are as …
[Ballot comment]
Thank you to Robert Sparks for the GENART review.

** Section 26.
  Initial values of the UDP Option Kind registry are as listed in
  Section 10, including those both assigned and reserved.

-- Should the table in Section 10 being converted into this new “UDP Option Kind” registry also have a reference column?  Otherwise, how would one know where to look for newly registered options?

** Section 26.
  >> Although option nicknames are not used in-band, new UNSAFE option
  names SHOULD commence with the capital letter "U" and avoid either
  uppercase or lowercase "U" as commencing safe options.

When is it ok to violate this naming convention as it isn’t mandatory.
2025-02-25
39 Roman Danyliw [Ballot Position Update] New position, Discuss, has been recorded for Roman Danyliw
2025-02-23
39 Zaheduzzaman Sarker Ballot has been issued
2025-02-23
39 Zaheduzzaman Sarker [Ballot Position Update] New position, Yes, has been recorded for Zaheduzzaman Sarker
2025-02-23
39 Zaheduzzaman Sarker Created "Approve" ballot
2025-02-23
39 Zaheduzzaman Sarker IESG state changed to IESG Evaluation from Waiting for AD Go-Ahead
2025-02-23
39 Zaheduzzaman Sarker Ballot writeup was changed
2025-02-15
39 David Blacka Request for Last Call review by DNSDIR Completed: Ready. Reviewer: David Blacka. Sent review to list.
2025-02-13
39 (System) IANA Review state changed to Version Changed - Review Needed from IANA - Not OK
2025-02-13
39 Joseph Touch New version available: draft-ietf-tsvwg-udp-options-39.txt
2025-02-13
39 Joseph Touch New version accepted (logged-in submitter: Joseph Touch)
2025-02-13
39 Joseph Touch Uploaded new revision
2025-02-13
38 Carlos Jesús Bernardos Request for Telechat review by INTDIR is assigned to Antoine Fressancourt
2025-02-12
38 Bob Halley Assignment of request for Telechat review by INTDIR to Bob Halley was rejected
2025-02-10
38 (System) IESG state changed to Waiting for AD Go-Ahead from In Last Call
2025-02-09
38 Robert Sparks Request for Last Call review by GENART Completed: Ready with Nits. Reviewer: Robert Sparks. Sent review to list.
2025-02-08
38 Carlos Jesús Bernardos Request for Telechat review by INTDIR is assigned to Bob Halley
2025-02-07
38 Carlos Pignataro Assignment of request for Telechat review by INTDIR to Carlos Pignataro was rejected
2025-02-07
38 David Dong
IESG/Authors/WG Chairs:

IANA has completed its review of draft-ietf-tsvwg-udp-options-38. If any part of this review is inaccurate, please let us know.

IANA has a question …
IESG/Authors/WG Chairs:

IANA has completed its review of draft-ietf-tsvwg-udp-options-38. If any part of this review is inaccurate, please let us know.

IANA has a question about one of the actions requested in the IANA Considerations section of this document.

IANA understands that, upon approval of this document, there are four actions which we must complete.

First, a new registry group will be created on the IANA Matrix located at:

https://www.iana.org/protocols

The new registry group will be called UDP Options and have a reference of [ RFC-to-be ].

Second, a new registry is to be created called the UDP Option Kind numbers registry. The new registry is to be located on the new registry group created in action one above. The new registry is to be managed via IESG Approval of Standards Action as defined by [RFC8126].

There are initial registrations in the new registry as follows:

Kind Length Meaning
------------------------------------------
0 - End of Options List (EOL)
1 - No operation (NOP)
2 6 Additional payload checksum (APC)
3 10/12 Fragmentation (FRAG)
4 4 Maximum datagram size (MDS)
5 5 Maximum reassembled datagram size (MRDS)
6 6 Request (REQ)
7 6 Response (RES)
8 10 Timestamps (TIME)
9 (varies) RESERVED for Authentication (AUTH)
10-126 (varies) UNASSIGNED
127 (varies) RFC 3692-style experiments (EXP)
128-191 RESERVED
192 (varies) RESERVED for Compression (UCMP)
193 (varies) RESERVED for Encryption (UENC)
194-253 UNASSIGNED-UNSAFE
254 (varies) RFC 3692-style experiments (UEXP)
255 RESERVED-UNSAFE

All of the initial registrations above will have a reference of [ RFC-to-be ].

Third, the existing TCP Experimental Option Experiment Identifiers (TCP ExIDs) in the Transmission Control Protocol (TCP) Parameters registry group located at:

https://www.iana.org/assignments/tcp-parameters/

is to be renamed to Unified TCP/UDP Option Experiment Identifiers and [ RFC-to-be ] will be added to the existing reference.

IANA Question --> Is this registry to remain in place, or is the registry to be moved to the new registry group created by the first action?

A note will be added to this registry as follows:

16-bit ExIDs can be used with either TCP or UDP; 32-bit ExIDs can be used with TCP or their first 16 bits can be used with UDP.

IANA Question --> Section 26 of the current draft requests IANA to establish "a link from the UDP protocol parameters area to this unified TCP/UDP ExID registry." Specifically what UDP protocol parameters area is being referenced here and where should we place this link?

Fourth, in the newly renamed Unified TCP/UDP Option Experiment Identifiers registry, the existing registry will have a field added which indicates whether the identifier is for UDP or TCP. The existing registrations which were for TCP will be marked as TCP in this field and future registrations will be for UDP and/or TCP.

The registration policy for the newly renamed registry will remain First Come, First Served as defined by [ RFC-to-be ].

We understand that these are the only actions required to be completed upon approval of this document.

NOTE: The actions requested in this document will not be completed until the document has been approved for publication as an RFC. This message is meant only to confirm the list of actions that will be performed.

For definitions of IANA review states, please see:

https://datatracker.ietf.org/help/state/draft/iana-review

Thank you,

David Dong
IANA Services Sr. Specialist
2025-02-07
38 (System) IANA Review state changed to IANA - Not OK from IANA - Review Needed
2025-02-07
38 Carlos Pignataro Request for Last Call review by OPSDIR is assigned to Victor Kuarsingh
2025-02-05
38 Carlos Jesús Bernardos Request for Telechat review by INTDIR is assigned to Carlos Pignataro
2025-02-04
38 Éric Vyncke Requested Telechat review by INTDIR
2025-01-30
38 Cindy Morgan Placed on agenda for telechat - 2025-03-06
2025-01-29
38 Jim Reid Request for Last Call review by DNSDIR is assigned to David Blacka
2025-01-28
38 Jean Mahoney Request for Last Call review by GENART is assigned to Robert Sparks
2025-01-28
38 Tero Kivinen Request for Last Call review by SECDIR is assigned to Akira Tsukamoto
2025-01-27
38 Barry Leiba Request for Last Call review by ARTART is assigned to Cullen Jennings
2025-01-27
38 Jenny Bui IANA Review state changed to IANA - Review Needed
2025-01-27
38 Jenny Bui
The following Last Call announcement was sent out (ends 2025-02-10):

From: The IESG
To: IETF-Announce
CC: Gorry Fairhurst , draft-ietf-tsvwg-udp-options@ietf.org, gorry@erg.abdn.ac.uk, tsvwg-chairs@ietf.org, …
The following Last Call announcement was sent out (ends 2025-02-10):

From: The IESG
To: IETF-Announce
CC: Gorry Fairhurst , draft-ietf-tsvwg-udp-options@ietf.org, gorry@erg.abdn.ac.uk, tsvwg-chairs@ietf.org, tsvwg@ietf.org, zahed.sarker.ietf@gmail.com
Reply-To: last-call@ietf.org
Sender:
Subject: Last Call:  (Transport Options for UDP) to Proposed Standard


The IESG has received a request from the Transport and Services Working Group
WG (tsvwg) to consider the following document: - 'Transport Options for UDP'
  as Proposed Standard

The IESG plans to make a decision in the next few weeks, and solicits final
comments on this action. Please send substantive comments to the
last-call@ietf.org mailing lists by 2025-02-10. Exceptionally, comments may
be sent to iesg@ietf.org instead. In either case, please retain the beginning
of the Subject line to allow automated sorting.

Abstract


  Transport protocols are extended through the use of transport header
  options. This document updates RFC 768 (UDP) by indicating the
  location, syntax, and semantics for UDP transport layer options
  within the surplus area after the end of the UDP user data but
  before the end of the IP length.




The file can be obtained via
https://datatracker.ietf.org/doc/draft-ietf-tsvwg-udp-options/


The following IPR Declarations may be related to this I-D:

  https://datatracker.ietf.org/ipr/2673/





2025-01-27
38 Jenny Bui IESG state changed to In Last Call from Last Call Requested
2025-01-27
38 Jenny Bui Last call announcement was generated
2025-01-27
38 Zaheduzzaman Sarker Last call was requested
2025-01-27
38 Zaheduzzaman Sarker Ballot approval text was generated
2025-01-27
38 Zaheduzzaman Sarker Ballot writeup was generated
2025-01-27
38 Zaheduzzaman Sarker IESG state changed to Last Call Requested from Publication Requested
2025-01-27
38 Zaheduzzaman Sarker Last call announcement was generated
2024-11-03
38 Joseph Touch New version available: draft-ietf-tsvwg-udp-options-38.txt
2024-11-03
38 (System) New version approved
2024-11-03
38 (System) Request for posting confirmation emailed to previous authors: "C. Heard" , Joseph Touch
2024-11-03
38 Joseph Touch Uploaded new revision
2024-10-29
37 Zaheduzzaman Sarker
There has been request to process udp-options and udp-options-dplpmtud together. Hence I will hold on the AD review till I have received publication request for …
There has been request to process udp-options and udp-options-dplpmtud together. Hence I will hold on the AD review till I have received publication request for udp-options-dplpmtud.
2024-10-16
37 Gorry Fairhurst
UDP Options (draft-ietf-tsvwg-udp-options)

# Document Shepherd Write-Up for Group Documents

*This version is dated 4 July 2022.*

## Document History

1. Does the …
UDP Options (draft-ietf-tsvwg-udp-options)

# Document Shepherd Write-Up for Group Documents

*This version is dated 4 July 2022.*

## Document History

1. Does the working group (WG) consensus represent the strong concurrence of a
  few individuals, with others being silent, or did it reach broad agreement?

The TSVWG working group has worked on this document since adopting this in 2017. It has been discussed extensively and has been stable in recent revisions. The document introduces an options format for UDP, for which ether was support from the WG. From the start it was clear that use of this format is optional, it was understood that many protocols layered over UDP already support options (SCTP, RTP, QUIC, DCCP, etc) and could be more appropriately extended using their own options space. A key addition offered by the set of options is support for methods to offer fragmentation at the UDP layer.

The first complete revision of the specification was reviewed by the WG. There was an invited protocol technical review from Colin Perkins (on draft-ietf-tsvwg-udp-options-19) in 2023 and it was updated. An issue tracker was used and all open issues from invited technical reviews and the WGLCs have been resolved. Each time the document was discussed and reviewed.

The WG decided to separate the procedures for using DPLPMTUD with the RES/REQ option into a separate draft.  The WG also decided the procedures for using the AUTH and Encryption options ought to be in separate I-Ds (currently an individual I-D exist for AUTH). The base document describes a process where receivers are allowed to ignore the AUTH option and accept the packet without verifying the authentication, or when there is no policy to do this.

A registry is described. If needed, the specification can be further extended.  The document retains the support of the TSVWG working group, and there is consensus (rough) to publish this version.

2. Was there controversy about particular points, or were there decisions where
  the consensus was particularly rough?

2.1 Timestamp: There were some additional requests from a small number of people for changes to the timestamp format.  The design was not changed, and this was confirmed on the list.

2.2 Network devices on the network path: UDP options can by default be read by network devices on the network path, in the same way that devices can read IP extensions/options and are often able to read tunnel headers. An explicit consensus call in May 2024, prior to WGLC confirmed that:
1. Routers ought to forward packets with UDP Options without modification, i.e.: "UDP Options MUST NOT be modified in transit".
2. the WG was content that “"UDP options are intended for use only by the transport  endpoints. They are no more (or less) appropriate to be modified  in-transit than any other portion of the transport datagram."
3. UDP Options does not by itself provide any mechanism for a device to authenticate the format or contents of the options data, or to detect if the surplus area has been removed from a packet.

2.3 Authentication and Encryption: UDP options defines the option format and rules for parsing of the UDP headers, but not the procedures for using the option information. The procedures in any additional I-Ds might describe how to establish a security context and procedures for how this is used to validate and forward authenticated data. This design in the latest rev was confirmed on the list (see 3).

3. Has anyone threatened an appeal or otherwise indicated extreme discontent? If
  so, please summarize the areas of conflict in separate email messages to the
  responsible Area Director. (It should be in a separate email because this
  questionnaire is publicly available.)

No, but when this design decision was confirmed on list, two people disagreed with this design. It was asserted that the AUTH option is not sufficiently specified or implemented to make a sufficient evaluation of its security characteristics, and that they think that inability to successfully process an AUTH option within UDP options needs to result in discard of a datagram. The Comments were received that helped to refine the proposed text. The editors proposed to retain the process for parsing the option, because this could then describe how the option related to the processing of other options, e.g. for fragmentation, but the text was amended to identify how the option ought to be configured when used.

4. For protocol documents, are there existing implementations of the contents of
  the document? Have a significant number of potential implementers indicated
  plans to implement? Are any existing implementations reported somewhere,
  either in the document itself (as [RFC 7942][3] recommends) or elsewhere
  (where)?

Results were presented to the WG for tests using the option format across a range of Internet paths to explore traversal (whether an option is passed or modified by devices on path); and the method has been updated to reflect this experience. Significant inputs were provided on approaches to implementation, a pilot integration into a fork of BSD provided input; as did consideration of the requirements for offload;  and exploration of the complexity of the various proposed fragmentation methods. It is therefore expected that the protocol is implementable. The shepherd is not aware of an implementation or the proposed transport API that supports the final specification. 

## Additional Reviews

5. Do the contents of this document closely interact with technologies in other
  IETF working groups or external organizations, and would it therefore benefit
  from their review? Have those reviews occurred? If yes, describe which
  reviews took place.

No.

6. Describe how the document meets any required formal expert review criteria,
  such as the MIB Doctor, YANG Doctor, media type, and URI type reviews.

No.

7. If the document contains a YANG module, has the final version of the module
  been checked with any of the [recommended validation tools][4] for syntax and
  formatting validation? If there are any resulting errors or warnings, what is
  the justification for not fixing them at this time? Does the YANG module
  comply with the Network Management Datastore Architecture (NMDA) as specified
  in [RFC 8342][5]?

N/A.

8. Describe reviews and automated checks performed to validate sections of the
  final version of the document written in a formal language, such as XML code,
  BNF rules, MIB definitions, CBOR's CDDL, etc.

None.

## Document Shepherd Checks

9. Based on the shepherd's review of the document, is it their opinion that this
  document is needed, clearly written, complete, correctly designed, and ready
  to be handed off to the responsible Area Director?

Yes.

10. Several IETF Areas have assembled [lists of common issues that their
    reviewers encounter][6]. For which areas have such issues been identified
    and addressed? For which does this still need to happen in subsequent
    reviews?

N/A.

11. What type of RFC publication is being requested on the IETF stream ([Best
    Current Practice][12], [Proposed Standard, Internet Standard][13],
    [Informational, Experimental or Historic][14])? Why is this the proper type
    of RFC? Do all Datatracker state attributes correctly reflect this intent?

This is a Standards Track update to an existing Standards Track specification.

12. Have reasonable efforts been made to remind all authors of the intellectual
    property rights (IPR) disclosure obligations described in [BCP 79][7]? To
    the best of your knowledge, have all required disclosures been filed? If
    not, explain why. If yes, summarize any relevant discussion, including links
    to publicly-available messages when applicable.

Yes. There is one related IPR disclosure:  Cisco's Statement about IPR related to draft-touch-tsvwg-udp-options. The WG was aware of this disclosure.

Both Editors have confirmed their obligations described in BCP 79.

13. Has each author, editor, and contributor shown their willingness to be
    listed as such? If the total number of authors and editors on the front page
    is greater than five, please provide a justification.

Yes.

14. Document any remaining I-D nits in this document. Simply running the [idnits
    tool][8] is not enough; please review the ["Content Guidelines" on
    authors.ietf.org][15]. (Also note that the current idnits tool generates
    some incorrect warnings; a rewrite is underway.)

This draft intentionally includes an obsolete informational reference is intentional for: RFC  793 (Obsoleted by RFC 9293).

15. Should any informative references be normative or vice-versa? See the [IESG
    Statement on Normative and Informative References][16].

Checked.

16. List any normative references that are not freely available to anyone. Did
    the community have sufficient access to review any such normative
    references?

None.

17. Are there any normative downward references (see [RFC 3967][9] and [BCP
    97
][10]) that are not already listed in the [DOWNREF registry][17]? If so,
    list them.

No.

18. Are there normative references to documents that are not ready to be
    submitted to the IESG for publication or are otherwise in an unclear state?
    If so, what is the plan for their completion?

The WG decided to separate the procedures for using DPLPMTUD with the RES/REQ option into a separate draft (draft-ietf-tsvwg-udp-options-dplpmtud). This is requested to be co-published with this I-D. A normative reference is included.

19. Will publication of this document change the status of any existing RFCs? If
    so, does the Datatracker metadata correctly reflect this and are those RFCs
    listed on the title page, in the abstract, and discussed in the
    introduction? If not, explain why and point to the part of the document
    where the relationship of this document to these other RFCs is discussed.

This will update a core IETF Spec, RFC 768.

20. Describe the document shepherd's review of the IANA considerations section,
    especially with regard to its consistency with the body of the document.
    Confirm that all aspects of the document requiring IANA assignments are
    associated with the appropriate reservations in IANA registries. Confirm
    that any referenced IANA registries have been clearly identified. Confirm
    that each newly created IANA registry specifies its initial contents,
    allocations procedures, and a reasonable name (see [RFC 8126][11]).

This was revised. A new registry is defined.

21. List any new IANA registries that require Designated Expert Review for
    future allocations. Are the instructions to the Designated Expert clear?
    Please include suggestions of designated experts, if appropriate.

Upon publication, IANA is hereby requested to create a new registry
group for UDP Options. The two suggested experts are:

Joe Touch
Mike Heard.

[1]: https://www.ietf.org/about/groups/iesg/
[2]: https://www.rfc-editor.org/rfc/rfc4858.html
[3]: https://www.rfc-editor.org/rfc/rfc7942.html
[4]: https://wiki.ietf.org/group/ops/yang-review-tools
[5]: https://www.rfc-editor.org/rfc/rfc8342.html
[6]: https://wiki.ietf.org/group/iesg/ExpertTopics
[7]: https://www.rfc-editor.org/info/bcp79
[8]: https://www.ietf.org/tools/idnits/
[9]: https://www.rfc-editor.org/rfc/rfc3967.html
[10]: https://www.rfc-editor.org/info/bcp97
[11]: https://www.rfc-editor.org/rfc/rfc8126.html
[12]: https://www.rfc-editor.org/rfc/rfc2026.html#section-5
[13]: https://www.rfc-editor.org/rfc/rfc2026.html#section-4.1
[14]: https://www.rfc-editor.org/rfc/rfc2026.html#section-4.2
[15]: https://authors.ietf.org/en/content-guidelines-overview
[16]: https://www.ietf.org/about/groups/iesg/statements/normative-informative-references/
[17]: https://datatracker.ietf.org/doc/downref/
2024-10-14
37 Gorry Fairhurst
UDP Options (draft-ietf-tsvwg-udp-options)

# Document Shepherd Write-Up for Group Documents

*This version is dated 4 July 2022.*

## Document History

1. Does the …
UDP Options (draft-ietf-tsvwg-udp-options)

# Document Shepherd Write-Up for Group Documents

*This version is dated 4 July 2022.*

## Document History

1. Does the working group (WG) consensus represent the strong concurrence of a
  few individuals, with others being silent, or did it reach broad agreement?

The TSVWG working group has worked on this document since adopting this in 2017. It has been discussed extensively and has been stable in recent revisions. The document introduces an options format for UDP, for which ether was support from the WG. From the start it was clear that use of this format is optional, it was understood that many protocols layered over UDP already support options (SCTP, RTP, QUIC, DCCP, etc) and could be more appropriately extended using their own options space. A key addition offered by the set of options is support for methods to offer fragmentation at the UDP layer.

The first complete revision of the specification was reviewed by the WG. There was an invited protocol technical review from Colin Perkins (on draft-ietf-tsvwg-udp-options-19) in 2023 and it was updated. An issue tracker was used and all open issues from invited technical reviews and the WGLCs have been resolved. Each time the document was discussed and reviewed.

The WG decided to separate the procedures for using DPLPMTUD with the RES/REQ option into a separate draft.  The WG also decided the procedures for using the AUTH and Encryption options ought to be in separate I-Ds (currently an individual I-D exist for AUTH). The base document describes a process where receivers are allowed to ignore the AUTH option and accept the packet without verifying the authentication, or when there is no policy to do this.

A registry is described. If needed, the specification can be further extended.  The document retains the support of the TSVWG working group, and there is consensus (rough) to publish this version.

2. Was there controversy about particular points, or were there decisions where
  the consensus was particularly rough?

2.1 Timestamp: There were some additional requests from a small number of people for changes to the timestamp format.  The design was not changed, and this was confirmed on the list.

2.2 Network devices on the network path: UDP options can by default be read by network devices on the network path, in the same way that devices can read IP extensions/options and are often able to read tunnel headers. An explicit consensus call in May 2024, prior to WGLC confirmed that:
1. Routers ought to forward packets with UDP Options without modification, i.e.: "UDP Options MUST NOT be modified in transit".
2. the WG was content that “"UDP options are intended for use only by the transport  endpoints. They are no more (or less) appropriate to be modified  in-transit than any other portion of the transport datagram."
3. UDP Options does not by itself provide any mechanism for a device to authenticate the format or contents of the options data, or to detect if the surplus area has been removed from a packet.

2.3 Authentication and Encryption: UDP options defines the option format and rules for parsing of the UDP headers, but not the procedures for using the option information. The procedures in any additional I-Ds might describe how to establish a security context and procedures for how this is used to validate and forward authenticated data. This design in the latest rev was confirmed on the list (see 3).

3. Has anyone threatened an appeal or otherwise indicated extreme discontent? If
  so, please summarize the areas of conflict in separate email messages to the
  responsible Area Director. (It should be in a separate email because this
  questionnaire is publicly available.)

No, but when this design decision was confirmed on list, two people disagreed with this design.  It was asserted that the AUTH option is not sufficiently specified or implemented to make a sufficient evaluation of its security characteristics, comments were received that helped to refine the proposed text. The editors proposed to retain the process for parsing the option, because this could then describe how the option related to the processing of other options, e.g. for fragmentation, but the text was amended to identify how the option ought to be configured when used.

4. For protocol documents, are there existing implementations of the contents of
  the document? Have a significant number of potential implementers indicated
  plans to implement? Are any existing implementations reported somewhere,
  either in the document itself (as [RFC 7942][3] recommends) or elsewhere
  (where)?

Results were presented to the WG for tests using the option format across a range of Internet paths to explore traversal (whether an option is passed or modified by devices on path); and the method has been updated to reflect this experience. Significant inputs were provided on approaches to implementation, a pilot integration into a fork of BSD provided input; as did consideration of the requirements for offload;  and exploration of the complexity of the various proposed fragmentation methods. It is therefore expected that the protocol is implementable. The shepherd is not aware of an implementation or the proposed transport API that supports the final specification. 

## Additional Reviews

5. Do the contents of this document closely interact with technologies in other
  IETF working groups or external organizations, and would it therefore benefit
  from their review? Have those reviews occurred? If yes, describe which
  reviews took place.

No.

6. Describe how the document meets any required formal expert review criteria,
  such as the MIB Doctor, YANG Doctor, media type, and URI type reviews.

No.

7. If the document contains a YANG module, has the final version of the module
  been checked with any of the [recommended validation tools][4] for syntax and
  formatting validation? If there are any resulting errors or warnings, what is
  the justification for not fixing them at this time? Does the YANG module
  comply with the Network Management Datastore Architecture (NMDA) as specified
  in [RFC 8342][5]?

N/A.

8. Describe reviews and automated checks performed to validate sections of the
  final version of the document written in a formal language, such as XML code,
  BNF rules, MIB definitions, CBOR's CDDL, etc.

None.

## Document Shepherd Checks

9. Based on the shepherd's review of the document, is it their opinion that this
  document is needed, clearly written, complete, correctly designed, and ready
  to be handed off to the responsible Area Director?

Yes.

10. Several IETF Areas have assembled [lists of common issues that their
    reviewers encounter][6]. For which areas have such issues been identified
    and addressed? For which does this still need to happen in subsequent
    reviews?

N/A.

11. What type of RFC publication is being requested on the IETF stream ([Best
    Current Practice][12], [Proposed Standard, Internet Standard][13],
    [Informational, Experimental or Historic][14])? Why is this the proper type
    of RFC? Do all Datatracker state attributes correctly reflect this intent?

This is a Standards Track update to an existing Standards Track specification.

12. Have reasonable efforts been made to remind all authors of the intellectual
    property rights (IPR) disclosure obligations described in [BCP 79][7]? To
    the best of your knowledge, have all required disclosures been filed? If
    not, explain why. If yes, summarize any relevant discussion, including links
    to publicly-available messages when applicable.

Yes. There is one related IPR disclosure:  Cisco's Statement about IPR related to draft-touch-tsvwg-udp-options. The WG was aware of this disclosure.

Both Editors have confirmed their obligations described in BCP 79.

13. Has each author, editor, and contributor shown their willingness to be
    listed as such? If the total number of authors and editors on the front page
    is greater than five, please provide a justification.

Yes.

14. Document any remaining I-D nits in this document. Simply running the [idnits
    tool][8] is not enough; please review the ["Content Guidelines" on
    authors.ietf.org][15]. (Also note that the current idnits tool generates
    some incorrect warnings; a rewrite is underway.)

This draft intentionally includes an obsolete informational reference is intentional for: RFC  793 (Obsoleted by RFC 9293).

15. Should any informative references be normative or vice-versa? See the [IESG
    Statement on Normative and Informative References][16].

Checked.

16. List any normative references that are not freely available to anyone. Did
    the community have sufficient access to review any such normative
    references?

None.

17. Are there any normative downward references (see [RFC 3967][9] and [BCP
    97
][10]) that are not already listed in the [DOWNREF registry][17]? If so,
    list them.

No.

18. Are there normative references to documents that are not ready to be
    submitted to the IESG for publication or are otherwise in an unclear state?
    If so, what is the plan for their completion?

The WG decided to separate the procedures for using DPLPMTUD with the RES/REQ option into a separate draft (draft-ietf-tsvwg-udp-options-dplpmtud). This is requested to be co-published with this I-D. A normative reference is included.

19. Will publication of this document change the status of any existing RFCs? If
    so, does the Datatracker metadata correctly reflect this and are those RFCs
    listed on the title page, in the abstract, and discussed in the
    introduction? If not, explain why and point to the part of the document
    where the relationship of this document to these other RFCs is discussed.

This will update a core IETF Spec, RFC 768.

20. Describe the document shepherd's review of the IANA considerations section,
    especially with regard to its consistency with the body of the document.
    Confirm that all aspects of the document requiring IANA assignments are
    associated with the appropriate reservations in IANA registries. Confirm
    that any referenced IANA registries have been clearly identified. Confirm
    that each newly created IANA registry specifies its initial contents,
    allocations procedures, and a reasonable name (see [RFC 8126][11]).

This was revised. A new registry is defined.

21. List any new IANA registries that require Designated Expert Review for
    future allocations. Are the instructions to the Designated Expert clear?
    Please include suggestions of designated experts, if appropriate.

Upon publication, IANA is hereby requested to create a new registry
group for UDP Options. The two suggested experts are:

Joe Touch
Mike Heard.

[1]: https://www.ietf.org/about/groups/iesg/
[2]: https://www.rfc-editor.org/rfc/rfc4858.html
[3]: https://www.rfc-editor.org/rfc/rfc7942.html
[4]: https://wiki.ietf.org/group/ops/yang-review-tools
[5]: https://www.rfc-editor.org/rfc/rfc8342.html
[6]: https://wiki.ietf.org/group/iesg/ExpertTopics
[7]: https://www.rfc-editor.org/info/bcp79
[8]: https://www.ietf.org/tools/idnits/
[9]: https://www.rfc-editor.org/rfc/rfc3967.html
[10]: https://www.rfc-editor.org/info/bcp97
[11]: https://www.rfc-editor.org/rfc/rfc8126.html
[12]: https://www.rfc-editor.org/rfc/rfc2026.html#section-5
[13]: https://www.rfc-editor.org/rfc/rfc2026.html#section-4.1
[14]: https://www.rfc-editor.org/rfc/rfc2026.html#section-4.2
[15]: https://authors.ietf.org/en/content-guidelines-overview
[16]: https://www.ietf.org/about/groups/iesg/statements/normative-informative-references/
[17]: https://datatracker.ietf.org/doc/downref/
2024-10-14
37 Gorry Fairhurst IETF WG state changed to Submitted to IESG for Publication from WG Consensus: Waiting for Write-Up
2024-10-14
37 Gorry Fairhurst IESG state changed to Publication Requested from I-D Exists
2024-10-14
37 (System) Changed action holders to Zaheduzzaman Sarker (IESG state changed)
2024-10-14
37 Gorry Fairhurst Responsible AD changed to Zaheduzzaman Sarker
2024-10-14
37 Gorry Fairhurst Document is now in IESG state Publication Requested
2024-10-14
37 Gorry Fairhurst Rev draft-ietf-tsvwg-udp-options-37 responded to shepherd feedback, there are no pending issues raised by the document shepherd.
2024-10-14
37 Gorry Fairhurst Tags Revised I-D Needed - Issue raised by WG, Doc Shepherd Follow-up Underway cleared.
2024-10-14
37 Gorry Fairhurst IETF WG state changed to WG Consensus: Waiting for Write-Up from Waiting for WG Chair Go-Ahead
2024-10-14
37 Gorry Fairhurst
UDP Options (draft-ietf-tsvwg-udp-options)

# Document Shepherd Write-Up for Group Documents

*This version is dated 4 July 2022.*

## Document History

1. Does the …
UDP Options (draft-ietf-tsvwg-udp-options)

# Document Shepherd Write-Up for Group Documents

*This version is dated 4 July 2022.*

## Document History

1. Does the working group (WG) consensus represent the strong concurrence of a
  few individuals, with others being silent, or did it reach broad agreement?

The TSVWG working group has worked on this document since adopting this in 2017. It has been discussed extensively and has been stable in recent revisions. The document introduces an options format for UDP, for which ether was support from the WG. From the start it was clear that use of this format is optional, it was understood that many protocols layered over UDP already support options (SCTP, RTP, QUIC, DCCP, etc) and could be more appropriately extended using their own options space. A key addition offered by the set of options is support for methods to offer fragmentation at the UDP layer.

The first complete revision of the specification was reviewed by the WG. There was an invited protocol technical review from Colin Perkins (on draft-ietf-tsvwg-udp-options-19) in 2023 and it was updated. An issue tracker was used and all open issues from invited technical reviews and the WGLCs have been resolved. Each time the document was discussed and reviewed.

The WG decided to separate the procedures for using DPLPMTUD with the RES/REQ option into a separate draft.  The WG also decided the procedures for using the AUTH and Encryption options ought to be in separate I-Ds (currently an individual I-D exist for AUTH). The base document describes a process where receivers are allowed to ignore the AUTH option and accept the packet without verifying the authentication, or when there is no policy to do this.

A registry is described. If needed, the specification can be further extended.  The document retains the support of the TSVWG working group, and there is consensus (rough) to publish this version.

2. Was there controversy about particular points, or were there decisions where
  the consensus was particularly rough?

2.1 Timestamp: There were some additional requests from a small number of people for changes to the timestamp format.  The design was not changed, and this was confirmed on the list.

2.2 Network devices on the network path: UDP options can by default be read by network devices on the network path, in the same way that devices can read IP extensions/options and are often able to read tunnel headers. An explicit consensus call in May 2024, prior to WGLC confirmed that:
1. Routers ought to forward packets with UDP Options without modification, i.e.: "UDP Options MUST NOT be modified in transit".
2. the WG was content that “"UDP options are intended for use only by the transport  endpoints. They are no more (or less) appropriate to be modified  in-transit than any other portion of the transport datagram."
3. UDP Options does not by itself provide any mechanism for a device to authenticate the format or contents of the options data, or to detect if the surplus area has been removed from a packet.

2.3 Authentication and Encryption: UDP options defines the option format and rules for parsing of the UDP headers, but not the procedures for using the option information. The procedures in any additional I-Ds might describe how to establish a security context and procedures for how this is used to validate and forward authenticated data. This design in the latest rev was confirmed on the list (see 3).

3. Has anyone threatened an appeal or otherwise indicated extreme discontent? If
  so, please summarize the areas of conflict in separate email messages to the
  responsible Area Director. (It should be in a separate email because this
  questionnaire is publicly available.)

No, but when this design decision was confirmed on list, two people disagreed with this design.  It was asserted that the AUTH option is not sufficiently specified or implemented to make a sufficient evaluation of its security characteristics, comments were received that helped to refine the proposed text. The editors proposed to retain the process for parsing the option, because this could then describe how the option related to the processing of other options, e.g. for fragmentation, but the text was amended to identify how the option ought to be configured when used.

4. For protocol documents, are there existing implementations of the contents of
  the document? Have a significant number of potential implementers indicated
  plans to implement? Are any existing implementations reported somewhere,
  either in the document itself (as [RFC 7942][3] recommends) or elsewhere
  (where)?

Results were presented to the WG for tests using the option format across a range of Internet paths to explore traversal (whether an option is passed or modified by devices on path); and the method has been updated to reflect this experience. Significant inputs were provided on approaches to implementation, a pilot integration into a fork of BSD provided input; as did consideration of the requirements for offload;  and exploration of the complexity of the various proposed fragmentation methods. It is therefore expected that the protocol is implementable. The shepherd is not aware of an implementation or the proposed transport API that supports the final specification. 

## Additional Reviews

5. Do the contents of this document closely interact with technologies in other
  IETF working groups or external organizations, and would it therefore benefit
  from their review? Have those reviews occurred? If yes, describe which
  reviews took place.

No.

6. Describe how the document meets any required formal expert review criteria,
  such as the MIB Doctor, YANG Doctor, media type, and URI type reviews.

No.

7. If the document contains a YANG module, has the final version of the module
  been checked with any of the [recommended validation tools][4] for syntax and
  formatting validation? If there are any resulting errors or warnings, what is
  the justification for not fixing them at this time? Does the YANG module
  comply with the Network Management Datastore Architecture (NMDA) as specified
  in [RFC 8342][5]?

N/A.

8. Describe reviews and automated checks performed to validate sections of the
  final version of the document written in a formal language, such as XML code,
  BNF rules, MIB definitions, CBOR's CDDL, etc.

None.

## Document Shepherd Checks

9. Based on the shepherd's review of the document, is it their opinion that this
  document is needed, clearly written, complete, correctly designed, and ready
  to be handed off to the responsible Area Director?

Yes.

10. Several IETF Areas have assembled [lists of common issues that their
    reviewers encounter][6]. For which areas have such issues been identified
    and addressed? For which does this still need to happen in subsequent
    reviews?

N/A.

11. What type of RFC publication is being requested on the IETF stream ([Best
    Current Practice][12], [Proposed Standard, Internet Standard][13],
    [Informational, Experimental or Historic][14])? Why is this the proper type
    of RFC? Do all Datatracker state attributes correctly reflect this intent?

This is a Standards Track update to an existing Standards Track specification.

12. Have reasonable efforts been made to remind all authors of the intellectual
    property rights (IPR) disclosure obligations described in [BCP 79][7]? To
    the best of your knowledge, have all required disclosures been filed? If
    not, explain why. If yes, summarize any relevant discussion, including links
    to publicly-available messages when applicable.

Yes. There is one related IPR disclosure:  Cisco's Statement about IPR related to draft-touch-tsvwg-udp-options. The WG was aware of this disclosure.

Both Editors have confirmed their obligations described in BCP 79.

13. Has each author, editor, and contributor shown their willingness to be
    listed as such? If the total number of authors and editors on the front page
    is greater than five, please provide a justification.

Yes.

14. Document any remaining I-D nits in this document. Simply running the [idnits
    tool][8] is not enough; please review the ["Content Guidelines" on
    authors.ietf.org][15]. (Also note that the current idnits tool generates
    some incorrect warnings; a rewrite is underway.)

This draft intentionally includes an obsolete informational reference is intentional for: RFC  793 (Obsoleted by RFC 9293).

15. Should any informative references be normative or vice-versa? See the [IESG
    Statement on Normative and Informative References][16].

Checked.

16. List any normative references that are not freely available to anyone. Did
    the community have sufficient access to review any such normative
    references?

None.

17. Are there any normative downward references (see [RFC 3967][9] and [BCP
    97
][10]) that are not already listed in the [DOWNREF registry][17]? If so,
    list them.

No.

18. Are there normative references to documents that are not ready to be
    submitted to the IESG for publication or are otherwise in an unclear state?
    If so, what is the plan for their completion?

The WG decided to separate the procedures for using DPLPMTUD with the RES/REQ option into a separate draft (draft-ietf-tsvwg-udp-options-dplpmtud). This is requested to be co-published with this I-D. A normative reference is included.

19. Will publication of this document change the status of any existing RFCs? If
    so, does the Datatracker metadata correctly reflect this and are those RFCs
    listed on the title page, in the abstract, and discussed in the
    introduction? If not, explain why and point to the part of the document
    where the relationship of this document to these other RFCs is discussed.

This will update a core IETF Spec, RFC 768.

20. Describe the document shepherd's review of the IANA considerations section,
    especially with regard to its consistency with the body of the document.
    Confirm that all aspects of the document requiring IANA assignments are
    associated with the appropriate reservations in IANA registries. Confirm
    that any referenced IANA registries have been clearly identified. Confirm
    that each newly created IANA registry specifies its initial contents,
    allocations procedures, and a reasonable name (see [RFC 8126][11]).

This was revised. A new registry is defined.

21. List any new IANA registries that require Designated Expert Review for
    future allocations. Are the instructions to the Designated Expert clear?
    Please include suggestions of designated experts, if appropriate.

Upon publication, IANA is hereby requested to create a new registry
group for UDP Options. The two suggested experts are:

Joe Touch
Mike Heard.

[1]: https://www.ietf.org/about/groups/iesg/
[2]: https://www.rfc-editor.org/rfc/rfc4858.html
[3]: https://www.rfc-editor.org/rfc/rfc7942.html
[4]: https://wiki.ietf.org/group/ops/yang-review-tools
[5]: https://www.rfc-editor.org/rfc/rfc8342.html
[6]: https://wiki.ietf.org/group/iesg/ExpertTopics
[7]: https://www.rfc-editor.org/info/bcp79
[8]: https://www.ietf.org/tools/idnits/
[9]: https://www.rfc-editor.org/rfc/rfc3967.html
[10]: https://www.rfc-editor.org/info/bcp97
[11]: https://www.rfc-editor.org/rfc/rfc8126.html
[12]: https://www.rfc-editor.org/rfc/rfc2026.html#section-5
[13]: https://www.rfc-editor.org/rfc/rfc2026.html#section-4.1
[14]: https://www.rfc-editor.org/rfc/rfc2026.html#section-4.2
[15]: https://authors.ietf.org/en/content-guidelines-overview
[16]: https://www.ietf.org/about/groups/iesg/statements/normative-informative-references/
[17]: https://datatracker.ietf.org/doc/downref/
2024-10-13
37 Joseph Touch New version available: draft-ietf-tsvwg-udp-options-37.txt
2024-10-13
37 (System) New version approved
2024-10-13
37 (System) Request for posting confirmation emailed to previous authors: "C. Heard" , Joseph Touch
2024-10-13
37 Joseph Touch Uploaded new revision
2024-10-01
36 Gorry Fairhurst Shepherd comments sent to list 27th Sept.
Editors to prepare a revised I-D.
2024-10-01
36 Gorry Fairhurst Tags Doc Shepherd Follow-up Underway, Revised I-D Needed - Issue raised by WG set. Tag Other - see Comment Log cleared.
2024-10-01
36 Gorry Fairhurst
One person has disagreed with this design, suggesting that this is a security liability. It  has been noted that this behavior in the draft deviates …
One person has disagreed with this design, suggesting that this is a security liability. It  has been noted that this behavior in the draft deviates from the behavior of other similar IETF authentication protocols including IPv6 AH and TCP-AO.  It has also been stated that the AUTH option is not sufficiently specified or implemented to make a sufficient evaluation of its security characteristics.

We would like to hear of any people who disagree with publishing the current AUTH text. Unless the chairs hear additional reasoned opposition by 4th October 2024, we will declare consensus on the current text and move to request publication for the next revision of the UDP Options I-D. If we do, we plan for the publication request to note this concern as being in the rough.
2024-10-01
36 Gorry Fairhurst Tag Other - see Comment Log set.
2024-09-26
36 Gorry Fairhurst Changed consensus to Yes from Unknown
2024-09-26
36 Gorry Fairhurst Intended Status changed to Proposed Standard from None
2024-09-22
36 Joseph Touch New version available: draft-ietf-tsvwg-udp-options-36.txt
2024-09-22
36 Joseph Touch New version accepted (logged-in submitter: Joseph Touch)
2024-09-22
36 Joseph Touch Uploaded new revision
2024-09-21
35 Gorry Fairhurst Revised I-D was submitted to address WGLC. This document appears to be ready to proceed, and will now be reviewed by the document shepherd.
2024-09-21
35 Gorry Fairhurst Tag Revised I-D Needed - Issue raised by WGLC cleared.
2024-09-20
35 Joseph Touch New version available: draft-ietf-tsvwg-udp-options-35.txt
2024-09-20
35 Joseph Touch New version accepted (logged-in submitter: Joseph Touch)
2024-09-20
35 Joseph Touch Uploaded new revision
2024-09-16
34 Joseph Touch New version available: draft-ietf-tsvwg-udp-options-34.txt
2024-09-16
34 Joseph Touch New version accepted (logged-in submitter: Joseph Touch)
2024-09-16
34 Joseph Touch Uploaded new revision
2024-09-04
33 Joseph Touch New version available: draft-ietf-tsvwg-udp-options-33.txt
2024-09-04
33 Joseph Touch New version accepted (logged-in submitter: Joseph Touch)
2024-09-04
33 Joseph Touch Uploaded new revision
2024-06-11
32 Gorry Fairhurst Tag Revised I-D Needed - Issue raised by WGLC set. Tag Revised I-D Needed - Issue raised by WG cleared.
2024-05-15
32 Gorry Fairhurst
Thanks to all who participated in this WGLC. This document has now successfully concluded the WGLC.

A revised ID is needed to respond to WGLC …
Thanks to all who participated in this WGLC. This document has now successfully concluded the WGLC.

A revised ID is needed to respond to WGLC comments. Editor(s), please revise to address all comments you are able, and propose new text on-list for any issues where there is no obvious way forward. Once all issues have been closed, and a new ID is available, the chairs will prepare a wrietup requesting publication.
2024-05-15
32 Gorry Fairhurst Tag Revised I-D Needed - Issue raised by WG set.
2024-05-15
32 Gorry Fairhurst IETF WG state changed to Waiting for WG Chair Go-Ahead from In WG Last Call
2024-04-10
32 Gorry Fairhurst Start of list WGLC 10th April, to end 1st May 2024.
2024-03-25
32 Gorry Fairhurst
This starts a 3 week WG Last Call call to determine if the following TSVWG IDs are ready to publish:


https://datatracker.ietf.org/doc/draft-ietf-tsvwg-udp-options/

https://datatracker.ietf.org/doc/draft-ietf-tsvwg-udp-options-dplpmtud/

These documents target …
This starts a 3 week WG Last Call call to determine if the following TSVWG IDs are ready to publish:


https://datatracker.ietf.org/doc/draft-ietf-tsvwg-udp-options/

https://datatracker.ietf.org/doc/draft-ietf-tsvwg-udp-options-dplpmtud/

These documents target PROPOSED STANDARD.

The document shepherd  for the UDP Options will be: Gorry Fairhurst.

The document shepherd  for DPLPMTUD with UDP Options will be:  Marten Seemann.

The WGLC will end at midnight UTC on 10th April 2024. 

Please do read the drafts, and send any comments/concerns to the TSVWG mailing list, including notes on whether these are ready to publish (or send an email directly to the chairs ).

Best wishes,

Gorry and Marten

(tsvwg co-chairs)



The IETF WG Last Call process is described in RFC 6174.
2024-03-25
32 Gorry Fairhurst IETF WG state changed to In WG Last Call from WG Document
2024-03-21
32 Joseph Touch New version available: draft-ietf-tsvwg-udp-options-32.txt
2024-03-21
32 Joseph Touch New version accepted (logged-in submitter: Joseph Touch)
2024-03-21
32 Joseph Touch Uploaded new revision
2024-03-09
31 Gorry Fairhurst Added to session: IETF-119: tsvwg  Mon-0730
2024-03-04
31 Joseph Touch New version available: draft-ietf-tsvwg-udp-options-31.txt
2024-03-04
31 (System) New version approved
2024-03-04
31 (System) Request for posting confirmation emailed to previous authors: Joseph Touch
2024-03-04
31 Joseph Touch Uploaded new revision
2024-03-04
30 Joseph Touch New version available: draft-ietf-tsvwg-udp-options-30.txt
2024-03-04
30 (System) New version approved
2024-03-04
30 (System) Request for posting confirmation emailed to previous authors: Joseph Touch
2024-03-04
30 Joseph Touch Uploaded new revision
2024-03-03
29 Joseph Touch New version available: draft-ietf-tsvwg-udp-options-29.txt
2024-03-03
29 (System) New version approved
2024-03-03
29 (System) Request for posting confirmation emailed to previous authors: Joseph Touch
2024-03-03
29 Joseph Touch Uploaded new revision
2023-11-17
28 Joseph Touch New version available: draft-ietf-tsvwg-udp-options-28.txt
2023-11-17
28 Joseph Touch New version accepted (logged-in submitter: Joseph Touch)
2023-11-17
28 Joseph Touch Uploaded new revision
2023-11-14
27 Joseph Touch New version available: draft-ietf-tsvwg-udp-options-27.txt
2023-11-14
27 Joseph Touch New version accepted (logged-in submitter: Joseph Touch)
2023-11-14
27 Joseph Touch Uploaded new revision
2023-11-12
26 Joseph Touch New version available: draft-ietf-tsvwg-udp-options-26.txt
2023-11-12
26 Joseph Touch New version accepted (logged-in submitter: Joseph Touch)
2023-11-12
26 Joseph Touch Uploaded new revision
2023-11-12
25 Joseph Touch New version available: draft-ietf-tsvwg-udp-options-25.txt
2023-11-12
25 Joseph Touch New version accepted (logged-in submitter: Joseph Touch)
2023-11-12
25 Joseph Touch Uploaded new revision
2023-11-06
24 Joseph Touch New version available: draft-ietf-tsvwg-udp-options-24.txt
2023-11-06
24 Joseph Touch New version accepted (logged-in submitter: Joseph Touch)
2023-11-06
24 Joseph Touch Uploaded new revision
2023-09-15
23 Joseph Touch New version available: draft-ietf-tsvwg-udp-options-23.txt
2023-09-15
23 (System) New version approved
2023-09-15
23 (System) Request for posting confirmation emailed to previous authors: Joseph Touch
2023-09-15
23 Joseph Touch Uploaded new revision
2023-09-13
22 Gorry Fairhurst Added to session: interim-2023-tsvwg-01
2023-07-22
22 Paul Wouters Request for Early review by SECDIR Completed: Ready. Reviewer: Paul Wouters. Sent review to list.
2023-07-22
22 Tero Kivinen Request for Early review by SECDIR is assigned to Paul Wouters
2023-07-20
22 Martin Duke Changed document external resources from: None to:

github_repo https://github.com/tsvwg/draft-ietf-tsvwg-udp-options
2023-07-19
22 Paul Wouters Requested Early review by SECDIR
2023-07-14
22 Gorry Fairhurst Added to session: IETF-117: tsvwg  Wed-0000
2023-07-14
22 Gorry Fairhurst Removed from session: IETF-117: tsvwg  Thu-1630
2023-07-14
22 Gorry Fairhurst Added to session: IETF-117: tsvwg  Thu-1630
2023-07-04
22 Gorry Fairhurst This document is being developed at a first WGLC and is expected to require a final WGLC prior to publication.
2023-07-04
22 Gorry Fairhurst Tag Revised I-D Needed - Issue raised by WG cleared.
2023-07-04
22 Gorry Fairhurst IETF WG state changed to WG Document from Waiting for WG Chair Go-Ahead
2023-06-09
22 Joseph Touch New version available: draft-ietf-tsvwg-udp-options-22.txt
2023-06-09
22 (System) New version approved
2023-06-09
22 (System) Request for posting confirmation emailed to previous authors: Joseph Touch
2023-06-09
22 Joseph Touch Uploaded new revision
2023-06-08
21 Joseph Touch New version available: draft-ietf-tsvwg-udp-options-21.txt
2023-06-08
21 (System) New version approved
2023-06-08
21 (System) Request for posting confirmation emailed to previous authors: Joseph Touch
2023-06-08
21 Joseph Touch Uploaded new revision
2023-03-27
20 Joseph Touch New version available: draft-ietf-tsvwg-udp-options-20.txt
2023-03-27
20 Joseph Touch New version accepted (logged-in submitter: Joseph Touch)
2023-03-27
20 Joseph Touch Uploaded new revision
2023-03-14
19 Gorry Fairhurst Added to session: IETF-116: tsvwg  Tue-0030
2023-02-15
19 Gorry Fairhurst IETF WG state changed to Waiting for WG Chair Go-Ahead from In WG Last Call
2023-02-09
19 Carlos Pignataro Request for Early review by INTDIR Completed: Ready with Issues. Reviewer: Carlos Pignataro.
2023-02-09
19 Carlos Pignataro Request for Early review by INTDIR Completed: Ready with Issues. Reviewer: Carlos Pignataro. Sent review to list. Submission of review completed at an earlier date.
2023-02-07
19 Gorry Fairhurst Extended until 10th Feb.
2023-02-07
19 Gorry Fairhurst Tag Revised I-D Needed - Issue raised by WG set.
2023-01-11
19 Carlos Jesús Bernardos Request for Early review by INTDIR is assigned to Carlos Pignataro
2023-01-10
19 Gorry Fairhurst This email starts a 3 week WG Last Call call to determine if the following TSVWG IDs are ready to publish:
   
https://datatracker.ietf.org/doc/draft-ietf-tsvwg-udp-options/
https://datatracker.ietf.org/doc/draft-ietf-tsvwg-udp-options-dplpmtud/
2023-01-10
19 Gorry Fairhurst IETF WG state changed to In WG Last Call from WG Document
2023-01-10
19 Gorry Fairhurst Requested Early review by INTDIR
2022-12-27
19 Joseph Touch New version available: draft-ietf-tsvwg-udp-options-19.txt
2022-12-27
19 (System) New version approved
2022-12-27
19 (System) Request for posting confirmation emailed to previous authors: Joseph Touch
2022-12-27
19 Joseph Touch Uploaded new revision
2022-09-27
18 (System) Document has expired
2022-03-26
18 Joseph Touch New version available: draft-ietf-tsvwg-udp-options-18.txt
2022-03-26
18 (System) New version accepted (logged-in submitter: Joseph Touch)
2022-03-26
18 Joseph Touch Uploaded new revision
2022-03-24
17 Joseph Touch New version available: draft-ietf-tsvwg-udp-options-17.txt
2022-03-24
17 (System) New version accepted (logged-in submitter: Joseph Touch)
2022-03-24
17 Joseph Touch Uploaded new revision
2022-03-22
16 Gorry Fairhurst Added to session: IETF-113: tsvwg  Fri-1000
2022-03-19
16 Joseph Touch New version available: draft-ietf-tsvwg-udp-options-16.txt
2022-03-19
16 (System) New version approved
2022-03-19
16 (System) Request for posting confirmation emailed to previous authors: Joseph Touch
2022-03-19
16 Joseph Touch Uploaded new revision
2022-03-03
15 Joseph Touch New version available: draft-ietf-tsvwg-udp-options-15.txt
2022-03-03
15 (System) New version approved
2022-03-03
15 (System) Request for posting confirmation emailed to previous authors: Joseph Touch
2022-03-03
15 Joseph Touch Uploaded new revision
2022-03-01
14 Joseph Touch New version available: draft-ietf-tsvwg-udp-options-14.txt
2022-03-01
14 (System) New version approved
2022-03-01
14 (System) Request for posting confirmation emailed to previous authors: Joseph Touch
2022-03-01
14 Joseph Touch Uploaded new revision
2021-12-29
13 Bernie Volz Closed request for Early review by INTDIR with state 'Team Will not Review Version'
2021-12-21
13 (System) Document has expired
2021-11-01
13 Gorry Fairhurst Added to session: IETF-112: tsvwg  Fri-1600
2021-10-13
13 Carlos Jesús Bernardos Assignment of request for Early review by INTDIR to Tatuya Jinmei was marked no-response
2021-08-11
13 Gorry Fairhurst Added to session: interim-2021-tsvwg-02
2021-06-19
13 Joseph Touch New version available: draft-ietf-tsvwg-udp-options-13.txt
2021-06-19
13 (System) New version approved
2021-06-19
13 (System) Request for posting confirmation emailed to previous authors: Joseph Touch
2021-06-19
13 Joseph Touch Uploaded new revision
2021-05-18
12 Bernie Volz Request for Early review by INTDIR is assigned to Tatuya Jinmei
2021-05-18
12 Bernie Volz Request for Early review by INTDIR is assigned to Tatuya Jinmei
2021-05-18
12 Martin Duke Closed request for Early review by INTDIR with state 'Withdrawn': Duplicate
2021-05-18
12 Gorry Fairhurst Requested Early review by INTDIR
2021-05-13
12 Gorry Fairhurst Requested Early review by INTDIR
2021-05-02
12 Joseph Touch New version available: draft-ietf-tsvwg-udp-options-12.txt
2021-05-02
12 (System) New version approved
2021-05-02
12 (System) Request for posting confirmation emailed to previous authors: Joseph Touch
2021-05-02
12 Joseph Touch Uploaded new revision
2021-05-02
11 Joseph Touch New version available: draft-ietf-tsvwg-udp-options-11.txt
2021-05-02
11 (System) New version approved
2021-05-02
11 (System) Request for posting confirmation emailed to previous authors: Joseph Touch
2021-05-02
11 Joseph Touch Uploaded new revision
2021-05-01
10 Joseph Touch New version available: draft-ietf-tsvwg-udp-options-10.txt
2021-05-01
10 (System) New version approved
2021-05-01
10 (System) Request for posting confirmation emailed to previous authors: Joseph Touch
2021-05-01
10 Joseph Touch Uploaded new revision
2021-03-07
09 Gorry Fairhurst Added to session: IETF-110: tsvwg  Mon-1700
2020-11-25
09 Joseph Touch New version available: draft-ietf-tsvwg-udp-options-09.txt
2020-11-25
09 (System) New version approved
2020-11-25
09 (System) Request for posting confirmation emailed to previous authors: Joseph Touch
2020-11-25
09 Joseph Touch Uploaded new revision
2020-03-15
08 (System) Document has expired
2019-09-12
08 Joseph Touch New version available: draft-ietf-tsvwg-udp-options-08.txt
2019-09-12
08 (System) New version approved
2019-09-12
08 (System) Request for posting confirmation emailed to previous authors: Joseph Touch
2019-09-12
08 Joseph Touch Uploaded new revision
2019-09-09
07 (System) Document has expired
2019-03-08
07 Joseph Touch New version available: draft-ietf-tsvwg-udp-options-07.txt
2019-03-08
07 (System) New version approved
2019-03-08
07 (System) Request for posting confirmation emailed to previous authors: Joseph Touch
2019-03-08
07 Joseph Touch Uploaded new revision
2019-03-05
06 Joseph Touch New version available: draft-ietf-tsvwg-udp-options-06.txt
2019-03-05
06 (System) New version approved
2019-03-05
06 (System) Request for posting confirmation emailed to previous authors: Joseph Touch
2019-03-05
06 Joseph Touch Uploaded new revision
2019-01-20
05 (System) Document has expired
2018-07-19
05 Joseph Touch New version available: draft-ietf-tsvwg-udp-options-05.txt
2018-07-19
05 (System) New version approved
2018-07-19
05 (System) Request for posting confirmation emailed to previous authors: Joseph Touch
2018-07-19
05 Joseph Touch Uploaded new revision
2018-07-19
04 David Black Added to session: IETF-102: tsvwg  Thu-1810
2018-07-19
04 David Black Removed from session: IETF-102: tsvwg  Thu-1550
2018-07-19
04 David Black Added to session: IETF-102: tsvwg  Thu-1550
2018-07-01
04 Joseph Touch New version available: draft-ietf-tsvwg-udp-options-04.txt
2018-07-01
04 (System) New version approved
2018-07-01
04 (System) Request for posting confirmation emailed to previous authors: Joseph Touch
2018-07-01
04 Joseph Touch Uploaded new revision
2018-07-01
03 Joseph Touch New version available: draft-ietf-tsvwg-udp-options-03.txt
2018-07-01
03 (System) New version approved
2018-07-01
03 (System) Request for posting confirmation emailed to previous authors: Joseph Touch
2018-07-01
03 Joseph Touch Uploaded new revision
2018-03-21
02 Gorry Fairhurst Added to session: IETF-101: tsvwg  Thu-1810
2018-01-19
02 Joseph Touch New version available: draft-ietf-tsvwg-udp-options-02.txt
2018-01-19
02 (System) New version approved
2018-01-19
02 (System) Request for posting confirmation emailed to previous authors: Joseph Touch , tsvwg-chairs@ietf.org
2018-01-19
02 Joseph Touch Uploaded new revision
2017-12-29
01 (System) Document has expired
2017-07-20
01 David Black Notification list changed to Gorry Fairhurst <gorry@erg.abdn.ac.uk>
2017-07-20
01 David Black Document shepherd changed to Gorry Fairhurst
2017-07-18
01 David Black Added to session: IETF-99: tsvwg  Tue-1330
2017-06-27
01 Joseph Touch New version available: draft-ietf-tsvwg-udp-options-01.txt
2017-06-27
01 (System) New version approved
2017-06-27
01 (System) Request for posting confirmation emailed to previous authors: Joseph Touch
2017-06-27
01 Joseph Touch Uploaded new revision
2017-06-09
00 Gorry Fairhurst This document now replaces draft-touch-tsvwg-udp-options instead of draft-touch-tsvwg-udp-options
2017-06-09
00 Joseph Touch New version available: draft-ietf-tsvwg-udp-options-00.txt
2017-06-09
00 (System) WG -00 approved
2017-06-09
00 Gorry Fairhurst This document now replaces draft-touch-tsvwg-udp-options instead of None
2017-06-09
00 Joseph Touch New version available: draft-ietf-tsvwg-udp-options-00.txt
2017-06-09
00 (System) WG -00 approved
2017-06-08
00 Joseph Touch Set submitter to "Joe Touch ", replaces to draft-touch-tsvwg-udp-options and sent approval email to group chairs: tsvwg-chairs@ietf.org
2017-06-08
00 Joseph Touch Set submitter to "Joe Touch ", replaces to draft-touch-tsvwg-udp-options and sent approval email to group chairs: tsvwg-chairs@ietf.org
2017-06-08
00 Joseph Touch Uploaded new revision
2017-06-08
00 Joseph Touch Uploaded new revision