IPv6 Enterprise Network Analysis - IP Layer 3 Focus
draft-ietf-v6ops-ent-analysis-07
Revision differences
Document history
Date | Rev. | By | Action |
---|---|---|---|
2012-08-22
|
07 | (System) | post-migration administrative database adjustment to the No Objection position for Jari Arkko |
2012-08-22
|
07 | (System) | post-migration administrative database adjustment to the No Objection position for Dan Romascanu |
2012-08-22
|
07 | (System) | post-migration administrative database adjustment to the No Objection position for Mark Townsley |
2012-08-22
|
07 | (System) | post-migration administrative database adjustment to the Abstain position for Russ Housley |
2007-02-05
|
07 | Amy Vezza | State Changes to RFC Ed Queue from Approved-announcement sent by Amy Vezza |
2007-01-31
|
07 | (System) | IANA Action state changed to No IC from In Progress |
2007-01-31
|
07 | (System) | IANA Action state changed to In Progress |
2007-01-31
|
07 | Amy Vezza | IESG state changed to Approved-announcement sent |
2007-01-31
|
07 | Amy Vezza | IESG has approved the document |
2007-01-31
|
07 | Amy Vezza | Closed "Approve" ballot |
2007-01-31
|
07 | David Kessens | State Changes to Approved-announcement to be sent from IESG Evaluation::AD Followup by David Kessens |
2007-01-30
|
07 | Dan Romascanu | [Ballot Position Update] Position for Dan Romascanu has been changed to No Objection from Undefined by Dan Romascanu |
2007-01-30
|
07 | Dan Romascanu | [Ballot Position Update] Position for Dan Romascanu has been changed to Undefined from Discuss by Dan Romascanu |
2006-12-14
|
07 | Mark Townsley | [Ballot Position Update] Position for Mark Townsley has been changed to No Objection from Discuss by Mark Townsley |
2006-12-11
|
07 | Russ Housley | [Ballot comment] The response to my DISCUSS position was much lighter than I had hoped. I do not think the point is worth further … [Ballot comment] The response to my DISCUSS position was much lighter than I had hoped. I do not think the point is worth further delay. I have changed my position to ABSTAIN. |
2006-12-11
|
07 | Russ Housley | [Ballot Position Update] Position for Russ Housley has been changed to Abstain from Discuss by Russ Housley |
2006-12-11
|
07 | (System) | Sub state has been changed to AD Follow up from New Id Needed |
2006-12-11
|
07 | (System) | New version available: draft-ietf-v6ops-ent-analysis-07.txt |
2006-11-08
|
07 | (System) | Request for Early review by SECDIR Completed. Reviewer: Bernard Aboba. |
2006-10-27
|
07 | Jari Arkko | [Ballot Position Update] Position for Jari Arkko has been changed to No Objection from Discuss by Jari Arkko |
2006-09-20
|
07 | Mark Townsley | State Change Notice email list have been change to v6ops-chairs@tools.ietf.org, fred@cisco.com, sklynsma@mitre.org, green@commandinformation.com, tjc@ecs.soton.ac.uk, jim.bound@hp.com, Yanick.pouffary@hp.com, townsley@cisco.com from … State Change Notice email list have been change to v6ops-chairs@tools.ietf.org, fred@cisco.com, sklynsma@mitre.org, green@commandinformation.com, tjc@ecs.soton.ac.uk, jim.bound@hp.com, Yanick.pouffary@hp.com, townsley@cisco.com from v6ops-chairs@tools.ietf.org, fred@cisco.com, sklynsma@mitre.org, green@commandinformation.com, tjc@ecs.soton.ac.uk, jim.bound@hp.com, Yanick.pouffary@hp.com |
2006-06-22
|
07 | Amy Vezza | State Changes to IESG Evaluation::Revised ID Needed from IESG Evaluation by Amy Vezza |
2006-06-22
|
07 | Cullen Jennings | State Change Notice email list have been change to v6ops-chairs@tools.ietf.org, fred@cisco.com, sklynsma@mitre.org, green@commandinformation.com, tjc@ecs.soton.ac.uk, jim.bound@hp.com, Yanick.pouffary@hp.com from v6ops-chairs@tools.ietf.org |
2006-06-22
|
07 | Lisa Dusseault | [Ballot Position Update] Position for Lisa Dusseault has been changed to No Objection from Undefined by Lisa Dusseault |
2006-06-22
|
07 | Jari Arkko | [Ballot discuss] > For secure autoconfiguration, the IPsec [IPSEC] or SEND method > [SEND] can be used. I would not like to recommend the use … [Ballot discuss] > For secure autoconfiguration, the IPsec [IPSEC] or SEND method > [SEND] can be used. I would not like to recommend the use IPsec for securing autoconfiguration. Most of the time autoconfiguration is not secured beyond possible link layer protection. But when you need to secure it, the use of IPsec is not really a viable option. People that tried to do that (as the original ND RFCs recommended) found significant issues, including chicken-and-egg problems, inability to protect multicast in the proper way, no way to authorize ND decisions, etc. It is true that in some very limited scenarios you can actually configure static keys (as RFC 2461bis describes), but its not clear that this is any better than employing link layer protection for all communications. Suggested text replacement: Where support for secure autoconfiguration is required, SEND [SEND] can be used. Comment-only part: First, I agree with Mark that the softwire work should be referenced along with 6to4. Also, there does not appear to be any DSTM draft in existence any more (that I can find at least). I wonder if its wise to reference work that is not even pursued anymore, given that we have alternative mechanisms too. > one location may lead (or lag) the IPv6-compability of its peer (or Typo. |
2006-06-22
|
07 | Jari Arkko | [Ballot discuss] > For secure autoconfiguration, the IPsec [IPSEC] or SEND method > [SEND] can be used. I would not like to recommend the use … [Ballot discuss] > For secure autoconfiguration, the IPsec [IPSEC] or SEND method > [SEND] can be used. I would not like to recommend the use IPsec for securing autoconfiguration. Most of the time autoconfiguration is not secured beyond possible link layer protection. But when you need to secure it, the use of IPsec is not really a viable option. People that tried to do that (as the original ND RFCs recommended) found significant issues, including chicken-and-egg problems, inability to protect multicast in the proper way, no way to authorize ND decisions, etc. It is true that in some very limited scenarios you can actually configure static keys (as RFC 2461bis describes), but its not clear that this is any better than employing link layer protection for all communications. Suggested text replacement: Where support for secure autoconfiguration is required, SEND [SEND] can be used. Comment-only part: > one location may lead (or lag) the IPv6-compability of its peer (or Typo. |
2006-06-22
|
07 | Jari Arkko | [Ballot Position Update] New position, Discuss, has been recorded for Jari Arkko by Jari Arkko |
2006-06-22
|
07 | Dan Romascanu | [Ballot discuss] This document excludes a lot of layers and functions to be considered a 'IPv6 Enterprise Network Analysis' as the title claims. Designed as … [Ballot discuss] This document excludes a lot of layers and functions to be considered a 'IPv6 Enterprise Network Analysis' as the title claims. Designed as a continuation in a series of operational requirements and deployment documents for IPv6 in the enterprise open by RFC 4057, it declares out of scope and leaves for future consideration key operational and fucntional aspects like network management, mobile IP, multicast and other. I could live with this, and I still believe that there is enough useful stuff in this document, but at least the title needs to be changed to reflect what the declared focus of this document really is - IP Layer 3 deployment of IPv6 in the enterprise. |
2006-06-22
|
07 | Dan Romascanu | [Ballot Position Update] New position, Discuss, has been recorded for Dan Romascanu by Dan Romascanu |
2006-06-21
|
07 | Cullen Jennings | [Ballot Position Update] Position for Cullen Jennings has been changed to Abstain from Undefined by Cullen Jennings |
2006-06-21
|
07 | Cullen Jennings | [Ballot comment] I think this document fails to meet many of it's goals. I don't think it will help an enterprise figure out how to … [Ballot comment] I think this document fails to meet many of it's goals. I don't think it will help an enterprise figure out how to transition to v6 - there is so many critical things it does not mention, like applications that run on hosts. I have a hard time imagining any easy way to fix it. |
2006-06-21
|
07 | Cullen Jennings | [Ballot Position Update] New position, Undefined, has been recorded for Cullen Jennings by Cullen Jennings |
2006-06-21
|
07 | Russ Housley | [Ballot discuss] From the SecDir review by Bernard Aboba: Section 7.4.5 does not talk about host-based security measures. This will be quite important … [Ballot discuss] From the SecDir review by Bernard Aboba: Section 7.4.5 does not talk about host-based security measures. This will be quite important because IPv6 vulnerabilities are less well understood, and therefore the intrusion detection and firewall software may be less mature, so that a "belt and suspenders" approach is probably required. Also, dual stack systems are prized by hackers so that root kit detection is probably a good idea as well. |
2006-06-21
|
07 | Russ Housley | [Ballot Position Update] New position, Discuss, has been recorded for Russ Housley by Russ Housley |
2006-06-21
|
07 | Mark Townsley | [Ballot discuss] It would seem that in the sections on tunneling an informative reference to the work in the softwire WG would be appropriate. |
2006-06-21
|
07 | Mark Townsley | [Ballot discuss] It would seem that in the sections on tunneling an informative reference to the work in the softwire WG would be appropriate. |
2006-06-21
|
07 | Mark Townsley | [Ballot Position Update] New position, Discuss, has been recorded for Mark Townsley by Mark Townsley |
2006-06-21
|
07 | Lars Eggert | [Ballot Position Update] New position, No Objection, has been recorded for Lars Eggert by Lars Eggert |
2006-06-19
|
07 | David Kessens | State Changes to IESG Evaluation from Publication Requested by David Kessens |
2006-06-19
|
07 | David Kessens | State Changes to Publication Requested from Publication Requested::AD Followup by David Kessens |
2006-06-19
|
07 | David Kessens | Jim Bound has fixed all the reference issues. |
2006-06-19
|
07 | David Kessens | Telechat date was changed to 2006-06-22 from 2006-06-08 by David Kessens |
2006-06-19
|
07 | David Kessens | Jim Bound has fixed all the reference issues. |
2006-06-19
|
07 | David Kessens | Placed on agenda for telechat - 2006-06-22 by David Kessens |
2006-06-13
|
07 | (System) | Sub state has been changed to AD Follow up from New Id Needed |
2006-06-13
|
06 | (System) | New version available: draft-ietf-v6ops-ent-analysis-06.txt |
2006-06-07
|
07 | David Kessens | State Changes to Publication Requested::Revised ID Needed from IESG Evaluation by David Kessens |
2006-06-07
|
07 | David Kessens | Pulled from the agenda due to reference issues that need to be resolved first: Lisa Dusseault found the following: This draft is missing substantial references. … Pulled from the agenda due to reference issues that need to be resolved first: Lisa Dusseault found the following: This draft is missing substantial references. I can't find what documents are meant by [V6DEF], [DNSV6REC], [NIS], [DHCPv4], [ADDRCONF], [IPSEC] or [PRIVv6]. [NAP], [V6SEC], [DNSv6] and [DSTM] do show up in the references section but there are no URLs or draft names which makes a reader have to go hunting and guess. It makes it rather hard to evaluate the advice in the document when the references are in such bad state. Would you consider asking the authors to fix this before we continue evaluating? - Missing Reference: [VLAN] is mentioned on line 549, but not defined - Missing Reference: [V6DEF] is mentioned on line 581, but not defined - Missing Reference: [DNSV6REC] is mentioned on line 799, but not defined - Missing Reference: [NIS] is mentioned on line 823, but not defined - Missing Reference: [ADDRCONF] is mentioned on line 827, but not defined - Missing Reference: [IPSEC] is mentioned on line 830, but not defined - Missing Reference: [SEND] is mentioned on line 833, but not defined - Missing Reference: [V6TUN] is mentioned on line 996, but not defined - Unused Reference: [CONF] is defined on line 1054, but not referenced - Unused Reference: [DHCPF] is defined on line 1057, but not referenced - Unused Reference: [DHCPL] is defined on line 1061, but not referenced - Unused Reference: [6TO4] is defined on line 1065, but not referenced - Unused Reference: [NATPT] is defined on line 1087, but not referenced - Unused Reference: [UMAN] is defined on line 1091, but not referenced - Unused Reference: [ISPA] is defined on line 1095, but not referenced - Unused Reference: [3GPA] is defined on line 1099, but not referenced - Unused Reference: [SEC1] is defined on line 1126, but not referenced - Unused Reference: [TSPB] is defined on line 1143, but not referenced - Unused Reference: [NATDE] is defined on line 1146, but not referenced |
2006-06-07
|
07 | David Kessens | Removed from agenda for telechat - 2006-06-08 by David Kessens |
2006-06-06
|
07 | Sam Hartman | [Ballot comment] This document rules so many important things out of scope--nat used for V4, firewalls, application issues--that it is useless in my mind. The … [Ballot comment] This document rules so many important things out of scope--nat used for V4, firewalls, application issues--that it is useless in my mind. The best I can say is that I don't think it will do any harm. |
2006-06-06
|
07 | Sam Hartman | [Ballot Position Update] New position, Abstain, has been recorded for Sam Hartman by Sam Hartman |
2006-06-05
|
07 | Lisa Dusseault | [Ballot comment] The reference [V6DEF] is not filled in (referenced in section 5), nor is [DNSV6REC], [NIS], [DHCPv4], [ADDRCONF], [IPSEC] or [PRIVv6]. I wish the … [Ballot comment] The reference [V6DEF] is not filled in (referenced in section 5), nor is [DNSV6REC], [NIS], [DHCPv4], [ADDRCONF], [IPSEC] or [PRIVv6]. I wish the "works in progress" references had pointers (like [DNSV6]), are they not Internet Drafts? "At the time of writing, best practice in IPv6 site address planning is restricted due to limited wide-scale deployments." Does this mean "At the time of writing, solid details on best practice in IPv6 address planning is restricted..."? I am pretty sure it doesn't mean that the applicability of best practice is limited... |
2006-06-05
|
07 | Lisa Dusseault | [Ballot Position Update] New position, Undefined, has been recorded for Lisa Dusseault by Lisa Dusseault |
2006-06-02
|
07 | Magnus Westerlund | [Ballot Position Update] New position, No Objection, has been recorded for Magnus Westerlund by Magnus Westerlund |
2006-05-31
|
07 | David Kessens | [Ballot Position Update] New position, Yes, has been recorded for David Kessens |
2006-05-31
|
07 | David Kessens | Ballot has been issued by David Kessens |
2006-05-31
|
07 | David Kessens | Created "Approve" ballot |
2006-05-31
|
07 | (System) | Ballot writeup text was added |
2006-05-31
|
07 | (System) | Last call text was added |
2006-05-31
|
07 | (System) | Ballot approval text was added |
2006-05-31
|
07 | David Kessens | State Changes to IESG Evaluation from Publication Requested by David Kessens |
2006-05-31
|
07 | David Kessens | Placed on agenda for telechat - 2006-06-08 by David Kessens |
2006-05-31
|
07 | David Kessens | [Note]: 'PROTO Shepherd: Fred Baker' added by David Kessens |
2006-05-16
|
07 | Dinara Suleymanova | PROTO Write-up > 1.a) Have the chairs personally reviewed this version of the > Internet Draft (ID), and in particular, do they believe this ID … PROTO Write-up > 1.a) Have the chairs personally reviewed this version of the > Internet Draft (ID), and in particular, do they believe this ID is > ready to forward to the IESG for publication? Which chair is the > WG Chair Shepherd for this document? Yes, I believe that it is ready for publication. I will be the proto- shepherd. > 1.b) Has the document had adequate review from both key WG members > and key non-WG members? Do you have any concerns about the depth > or breadth of the reviews that have been performed? This document has had significant and at times contentious review in the working group. I believe that the recommendations it makes are sound and have been accepted by the working group. > 1.c) Do you have concerns that the document needs more review from > a particular (broader) perspective (e.g., security, operational > complexity, someone familiar with AAA, internationalization, XML, > etc.)? I could imagine interest in the Internet area. It is essentially operational, so issues that the security area or others might come up with are more comments on IPv6 than they are on these points. > 1.d) Do you have any specific concerns/issues with this document > that you believe the ADs and/or IESG should be aware of? For > example, perhaps you are uncomfortable with certain parts of the > document, or have concerns whether there really is a need for it. > In any event, if your issues have been discussed in the WG and the > WG has indicated it that it still wishes to advance the document, > detail those concerns in the write-up There has been significant discussion in the WG regarding the document. At this point, I believe that the document is appropriate and makes appropriate statements. > 1.e) How solid is the WG consensus behind this document? Does it > represent the strong concurrence of a few individuals, with others > being silent, or does the WG as a whole understand and agree with it? One could describe v6ops as a set of groups of people intimately worried about specific topics among a crowd of people who mostly want to stay in touch with what happens. As such, it is a pretty quiet group. However, consensus exists behind this document to the extent it can be measured. > 1.f) Has anyone threatened an appeal or otherwise indicated extreme > discontent? If so, please summarise the areas of conflict in > separate email to the Responsible Area Director. (It should be > separate email because this questionnaire will be entered into the > tracker). not to my knowledge. > 1.g) Have the chairs verified that the document checks out against > all the ID nits? (see http://www.ietf.org/ID-Checklist.html). > Boilerplate checks are not enough; this check needs to be thorough. Yes. > 1.h) Has the document split its references into normative and > informative? Yes. > Are there normative references to IDs, where the IDs are not also > ready for advancement or are otherwise in an unclear state? There are several references to internet drafts. All are non-normative. > The RFC Editor will not publish an RFC with normative references to > IDs (will delay the publication until all such IDs are also ready > for RFC publicatioin). If the normative references are behind, > what is the strategy for their completion? On a related matter, > are there normative references that are downward references, as > described in BCP 97, RFC 3967 RFC 3967 [RFC3967]? Listing these > supports the Area Director in the Last Call downref procedure > specified in RFC 3967. This has been addressed. > 1.i) For Standards Track and BCP documents, the IESG approval > announcement includes a write-up section with the following sections: > > * Technical Summary This document analyzes the transition to IPv6 in enterprise networks. These networks are characterized as a network that has multiple internal links, one or more router connections, to one or more Providers, and is managed by a network operations entity. The analysis focuses on a base set of transition notational networks and requirements expanded from a previous Enterprise Scenarios document. Discussion is provided on a focused set of transition analysis required for the enterprise to transition to IPv6, assuming a Dual-IP layer (IPv4 and IPv6) network and node environment, within the enterprise. Then a set of transition mechanisms are recommended for each notational network. > * Working Group Summary This has been discussed in detail in the working group. > * Protocol Quality This does not specify a protocol. |
2006-05-16
|
07 | Dinara Suleymanova | Draft Added by Dinara Suleymanova in state Publication Requested |
2006-05-08
|
05 | (System) | New version available: draft-ietf-v6ops-ent-analysis-05.txt |
2006-02-15
|
04 | (System) | New version available: draft-ietf-v6ops-ent-analysis-04.txt |
2005-07-11
|
03 | (System) | New version available: draft-ietf-v6ops-ent-analysis-03.txt |
2005-05-19
|
02 | (System) | New version available: draft-ietf-v6ops-ent-analysis-02.txt |
2005-01-10
|
01 | (System) | New version available: draft-ietf-v6ops-ent-analysis-01.txt |
2004-09-16
|
00 | (System) | New version available: draft-ietf-v6ops-ent-analysis-00.txt |