Guidelines for Choosing RTP Control Protocol (RTCP) Canonical Names (CNAMEs)
RFC 6222
Revision differences
Document history
Date | Rev. | By | Action |
---|---|---|---|
2015-10-14
|
05 | (System) | Notify list changed from avt-chairs@ietf.org, draft-ietf-avt-rtp-cnames@ietf.org to (None) |
2012-08-22
|
05 | (System) | post-migration administrative database adjustment to the No Objection position for Sean Turner |
2012-08-22
|
05 | (System) | post-migration administrative database adjustment to the No Objection position for Stewart Bryant |
2012-08-22
|
05 | (System) | post-migration administrative database adjustment to the No Objection position for Peter Saint-Andre |
2012-08-22
|
05 | (System) | post-migration administrative database adjustment to the No Objection position for David Harrington |
2012-08-22
|
05 | (System) | post-migration administrative database adjustment to the No Objection position for Russ Housley |
2011-04-15
|
05 | Cindy Morgan | State changed to RFC Published from RFC Ed Queue. |
2011-04-15
|
05 | Cindy Morgan | [Note]: changed to 'RFC 6222' |
2011-04-14
|
05 | (System) | RFC published |
2011-01-26
|
05 | Amy Vezza | State changed to RFC Ed Queue from Approved-announcement sent. |
2011-01-26
|
05 | (System) | IANA Action state changed to No IC from In Progress |
2011-01-26
|
05 | (System) | IANA Action state changed to In Progress |
2011-01-26
|
05 | Cindy Morgan | IESG state changed to Approved-announcement sent |
2011-01-26
|
05 | Cindy Morgan | IESG has approved the document |
2011-01-26
|
05 | Cindy Morgan | Closed "Approve" ballot |
2011-01-26
|
05 | Cindy Morgan | Approval announcement text regenerated |
2011-01-26
|
05 | Russ Housley | [Ballot discuss] The Gen-ART Review by Suresh Krishnan on 2-Jan-2011 raised an issue that needs to be resolved before publication. Section 5, Step 2, … [Ballot discuss] The Gen-ART Review by Suresh Krishnan on 2-Jan-2011 raised an issue that needs to be resolved before publication. Section 5, Step 2, describes the use of an EUI-64 identifier and how to generate one if it does not exist. The procedure for the creation of the EUI-64 from a 48-bit MAC address is incorrect: RFC 4291 describes how to create a *modified* EUI-64 identifier (not a EUI-64 identifier) from a MAC address. A MAC address of xx:78:90:12:34:56 will be transformed to a modified EUI-64 of yy7890FFFE123456, where yy is the value of xx with the u/l bit (bit 6) flipped. The IEEE reference for creation of an EUI-64 from a 48-bit MAC address (http://standards.ieee.org/develop/regauth/tut/eui64.pdf) would result in an EUI-64 of xx7890FFFF123456 for the same MAC address. While I recognize that no interoperability issues will result from this difference, there may be issues with testing if this is not resolved. Therfore, I suggest using the term "modified EUI-64" instead of EUI-64 or changing the reference from RFC 4291 to the IEEE document. |
2011-01-26
|
05 | Russ Housley | [Ballot Position Update] Position for Russ Housley has been changed to No Objection from Discuss |
2011-01-26
|
05 | Stewart Bryant | [Ballot Position Update] Position for Stewart Bryant has been changed to No Objection from Discuss |
2011-01-25
|
05 | Sean Turner | [Ballot Position Update] Position for Sean Turner has been changed to No Objection from Discuss |
2011-01-25
|
05 | (System) | New version available: draft-ietf-avt-rtp-cnames-05.txt |
2011-01-24
|
05 | Peter Saint-Andre | [Ballot Position Update] Position for Peter Saint-Andre has been changed to No Objection from Discuss |
2011-01-22
|
05 | Sean Turner | [Ballot discuss] This is an updated discuss based on the -04 version. #1) (this might be nit picking) If you not looking for anything out … [Ballot discuss] This is an updated discuss based on the -04 version. #1) (this might be nit picking) If you not looking for anything out of the hash alg there's actually three properties that should be in this phrase from Section 6.1: OLD: collision-resistant or second-preimage resistant NEW: collision-resistant, preimage-resistant, or second-preimage resistant #2) addressed |
2011-01-10
|
05 | (System) | Sub state has been changed to AD Follow up from New Id Needed |
2011-01-10
|
04 | (System) | New version available: draft-ietf-avt-rtp-cnames-04.txt |
2011-01-07
|
05 | (System) | Removed from agenda for telechat - 2011-01-06 |
2011-01-06
|
05 | Cindy Morgan | State changed to IESG Evaluation::Revised ID Needed from IESG Evaluation. |
2011-01-06
|
05 | Jari Arkko | [Ballot Position Update] New position, No Objection, has been recorded by Jari Arkko |
2011-01-06
|
05 | Tim Polk | [Ballot Position Update] New position, No Objection, has been recorded |
2011-01-06
|
05 | Tim Polk | [Ballot comment] I support Sean's discuss: hard-coding SHA-1 is unnecessary and counterproductive. There is no reason that all clients need to use the same secure … [Ballot comment] I support Sean's discuss: hard-coding SHA-1 is unnecessary and counterproductive. There is no reason that all clients need to use the same secure hash algorithm, IMHO. (For example, two clients using SHA-256 and SHA-512 are no more likely to generate a collision than two clients using SHA-256.) I suggest "compute a message digest using a secure hash function (e.g., SHA-256)" would provide the right level of detail for section 5. A short paragraph should also be added to the security considerations section with appropriate references. (I think Sean's discuss has the right list.) I would also note that the algorithm in section 5 does not *guarantee* uniqueness. I think your odds of a collision are one in 2**48 (but check with a real mathematician!). I note this since the Requirements section states "It is believed that obtaining uniqueness is an important property ..." Section 4.2, third bullet: "After performing the procedure, the significant 96 bits are used ..." Please specify "most significant" or "least significant"; the latter would be consistent with the preceding bullet. |
2011-01-06
|
05 | Ralph Droms | [Ballot Position Update] New position, No Objection, has been recorded |
2011-01-06
|
05 | Sean Turner | [Ballot discuss] #2 was revised based on some side discussions. #1) Section 5: On the use of SHA-1: What properties are you looking from the … [Ballot discuss] #2 was revised based on some side discussions. #1) Section 5: On the use of SHA-1: What properties are you looking from the output? If you require no collisions then SHA-1 is probably a bad idea (see https://datatracker.ietf.org/doc/draft-turner-sha0-sha1-seccon/). It would be much better to use SHA-256 and truncate it. And, then point to https://datatracker.ietf.org/doc/draft-eastlake-sha2b/. Yes it is a dependency but it's in AD Evaluation. #2) Section 5: Algorithm agility would be really nice here. Locking yourself in to one hash algorithm isn't a good idea. If the client is the only entity that is ever going to generate this hash true algorithm agility might not be needed, but you could get it by picking a length you want and then saying that one of the algorithms x, y, or z MUST be used. That way the implementer can pick on that they're doing in their cipher suite. |
2011-01-05
|
05 | Peter Saint-Andre | [Ballot discuss] This is a fine document with the laudable goal of improving interoperability, but in one respect I think it is both overly specific … [Ballot discuss] This is a fine document with the laudable goal of improving interoperability, but in one respect I think it is both overly specific and unclear about the requirements it is working to meet. Section 4.1 states: An implementation that wishes to discourage this type of third-party monitoring can generate a unique RTCP CNAME for each RTP session.... However, a unique identifier does not necessarily discourage third-party monitoring, e.g., incrementing from UniqueID-1 UniqueID-2 might ensure uniqueness but not privacy. I suggest that we provide a reference to RFC 4086 here and recommend that those who desire privacy need to generate identifiers that are not only unique but also random. This issue is connected to Section 4.2, which mandates one algorithm for long-term identifiers and a different algorithm for short-term identifiers (with seemingly different security properties, since long-term identifiers are 36 octets in length whereas short-term identifiers are only 17 octets in length). Would an implementation that generates a UUID for short-term identifiers violate the spec? If so, why? As long as the short-term identifier is unique, the implementation has met the relevant requirement. (Perhaps there is a further requirement or desire to make the identifier random, as mentioned above, but that is a separate issue.) |
2011-01-05
|
05 | Peter Saint-Andre | [Ballot Position Update] New position, Discuss, has been recorded |
2011-01-05
|
05 | Sean Turner | [Ballot comment] Section 4: Need to add "NOT RECOMMENDED" to Section 2. It's used as a key word and the 2119 errata allow it, but … [Ballot comment] Section 4: Need to add "NOT RECOMMENDED" to Section 2. It's used as a key word and the 2119 errata allow it, but you need to include it as shown in the errata (http://www.rfc-editor.org/errata_search.php?rfc=2119). Any chance for an example per-session unique identifier? |
2011-01-05
|
05 | Sean Turner | [Ballot discuss] Section 5: On the use of SHA-1: What properties are you looking from the output? If you require no collisions then SHA-1 is … [Ballot discuss] Section 5: On the use of SHA-1: What properties are you looking from the output? If you require no collisions then SHA-1 is probably a bad idea (see https://datatracker.ietf.org/doc/draft-turner-sha0-sha1-seccon/). It would be much better to use SHA-256 and truncate it. And, then point to https://datatracker.ietf.org/doc/draft-eastlake-sha2b/. Yes it is a dependency but it's in AD Evaluation. Section 5: Algorithm agility would be really nice here. Locking yourself in to one hash algorithm isn't a good idea. |
2011-01-05
|
05 | Sean Turner | [Ballot discuss] Section 4: Need to add "NOT RECOMMENDED" to Section 2. It's used as a key word and the 2119 errata allow it, but … [Ballot discuss] Section 4: Need to add "NOT RECOMMENDED" to Section 2. It's used as a key word and the 2119 errata allow it, but you need to include it as shown in the errata (http://www.rfc-editor.org/errata_search.php?rfc=2119). Section 5: On the use of SHA-1: What properties are you looking from the output? If you require no collisions then SHA-1 is probably a bad idea (see https://datatracker.ietf.org/doc/draft-turner-sha0-sha1-seccon/). It would be much better to use SHA-256 and truncate it. And, then point to https://datatracker.ietf.org/doc/draft-eastlake-sha2b/. Yes it is a dependency but it's in AD Evaluation. Section 5: Algorithm agility would be really nice here. Locking yourself in to one hash algorithm isn't a good idea. |
2011-01-05
|
05 | Adrian Farrel | [Ballot comment] Support Stewart's Discuss since we have observed "clone" equipment with identical MAC addresses in the past. Also, I believe that some h/w exists … [Ballot comment] Support Stewart's Discuss since we have observed "clone" equipment with identical MAC addresses in the past. Also, I believe that some h/w exists with configurable MAC addresses. --- Abstract s/these/those/ |
2011-01-05
|
05 | Adrian Farrel | [Ballot Position Update] New position, No Objection, has been recorded |
2011-01-05
|
05 | Russ Housley | [Ballot discuss] The Gen-ART Review by Suresh Krishnan on 2-Jan-2011 raised an issue that needs to be resolved before publication. Section 5, Step 2, … [Ballot discuss] The Gen-ART Review by Suresh Krishnan on 2-Jan-2011 raised an issue that needs to be resolved before publication. Section 5, Step 2, describes the use of an EUI-64 identifier and how to generate one if it does not exist. The procedure for the creation of the EUI-64 from a 48-bit MAC address is incorrect: RFC 4291 describes how to create a *modified* EUI-64 identifier (not a EUI-64 identifier) from a MAC address. A MAC address of xx:78:90:12:34:56 will be transformed to a modified EUI-64 of yy7890FFFE123456, where yy is the value of xx with the u/l bit (bit 6) flipped. The IEEE reference for creation of an EUI-64 from a 48-bit MAC address (http://standards.ieee.org/develop/regauth/tut/eui64.pdf) would result in an EUI-64 of xx7890FFFF123456 for the same MAC address. While I recognize that no interoperability issues will result from this difference, there may be issues with testing if this is not resolved. Therfore, I suggest using the term "modified EUI-64" instead of EUI-64 or changing the reference from RFC 4291 to the IEEE document. |
2011-01-05
|
05 | Russ Housley | [Ballot Position Update] New position, Discuss, has been recorded |
2011-01-05
|
05 | Sean Turner | [Ballot comment] Any chance for an example per-session unique identifier? |
2011-01-05
|
05 | Sean Turner | [Ballot discuss] Section 4: Need to add "NOT RECOMMENDED" to Section 2. It's used as a key word and the 2119 errata allow it, but … [Ballot discuss] Section 4: Need to add "NOT RECOMMENDED" to Section 2. It's used as a key word and the 2119 errata allow it, but you need to include it as shown in the errata (http://www.rfc-editor.org/errata_search.php?rfc=2119). Section 5: On the use of SHA-1: What properties are you looking from the output? If you require no collisions then SHA-1 is probably a bad idea (see https://datatracker.ietf.org/doc/draft-turner-sha0-sha1-seccon/). It would be much better to use SHA-256 and truncate it. And, then point to https://datatracker.ietf.org/doc/draft-eastlake-sha2b/. Yes it is a dependency but it's in AD Evaluation. |
2011-01-05
|
05 | Sean Turner | [Ballot Position Update] New position, Discuss, has been recorded |
2011-01-05
|
05 | Stewart Bryant | [Ballot discuss] I think it would be helpful to the reader to briefly note that whilst the methods described in this document are good enough … [Ballot discuss] I think it would be helpful to the reader to briefly note that whilst the methods described in this document are good enough for most practical purposes they are not technically perfect. Whilst I can see no particular problem in the application described here, these methods may well be re-purposed as convenient general purpose UID mechanisms. Specifically when the method described in (5) does not use an EUI-64 there is a non-zero probability of collision, and the method in (4) that uses the MAC address is only as good as the quality procedures and ethics of the hardware manufacturer. |
2011-01-05
|
05 | Stewart Bryant | [Ballot Position Update] New position, Discuss, has been recorded |
2011-01-04
|
05 | Dan Romascanu | [Ballot comment] 1. > After obtaining a identifier by doing (a) or (b), the least significant 48 bits are converted to … [Ballot comment] 1. > After obtaining a identifier by doing (a) or (b), the least significant 48 bits are converted to the standard colon- separated hexadecimal format, e.g., "00:23:32:af:9b:aa", resulting in a 17-octet printable string representation. It would be good to provide a reference for this 'standard ... format'. RFC 5342 uses a different notation, so arguably there is more than one format used in RFCs. 2. Also from 5342 - here is a reference for EUI-64 which could be added (also answers the COMMENT from Alexey) [EUI-64] IEEE, "Guidelines for 64-bit Global Identifier (EUI-64) Registration Authority", , March 1997. |
2011-01-04
|
05 | Dan Romascanu | [Ballot Position Update] New position, No Objection, has been recorded |
2011-01-03
|
05 | David Harrington | [Ballot Position Update] Position for David Harrington has been changed to No Objection from Discuss |
2011-01-03
|
05 | David Harrington | [Ballot discuss] Please address the concerns raised in the TSVDIR review of this document (12/14/10 1:41 on the IETF Discussion list) |
2011-01-03
|
05 | David Harrington | [Ballot Position Update] New position, Discuss, has been recorded |
2011-01-03
|
05 | David Harrington | TSV DIR Review TSV-DIR Last Call review of "Guidelines for Chosing RTP Control Protocol (RTCP) Canonical Names (CNAMEs) I've reviewed this document as part of … TSV DIR Review TSV-DIR Last Call review of "Guidelines for Chosing RTP Control Protocol (RTCP) Canonical Names (CNAMEs) I've reviewed this document as part of the transport area directorate's ongoing effort to review key IETF documents. These comments were written primarily for the transport area directors, but are copied to the document's authors for their information and to allow them to address any issues raised. The authors should consider this review together with any other last-call comments they receive. Please always cc tsv-dir@ietf.org if you reply to or forward this review. Summary: This draft is on the right track, but has open issues described in the review. The review below gives my basis for three recommendations: 1. For long-term persistent CNAMEs, differentiate among the UUID "Versions" in RFC 4122 2. For short-term persistent CNAMEs, allow IPv4-only endpoints to generate a pseudo-random alternative to their MAC, if desired 3. For per-session CNAMEs, provide some guidance for the random value and the key, which are currently left underspecified. Section 3 sets up the major requirement to be met, which is better uniqueness properties than those of the CNAME generation in RFC 3550. There's a hint in the last sentence of the section about an additional requirement to afford privacy support. This sentence only mentions avoiding exposure of private addresses. Avoidance of linkage among RTP streams due to the use of fixed CNAMEs comes up later. Section 4 sets up the CNAME types, persistent versus per-session, and within persistent types, short-term IPv4-only, short-term IPv6-capable, and long-term. The methods of generating these CNAMEs are distinct and I understand from the WG mailing list discussion of their AD review that they are to be specified as mandatory. On December 2, Ali wrote to AVT that the next revision will change language in Section 4 from the existing: Other methods, beyond the three methods listed above, are not compliant with this specification and SHOULD NOT be used. To the following: It is believed that obtaining uniqueness is an important property that requires careful evaluation of the method. This document provides a number of methods, for which it is believed that at least one of them would meet all deployment scenarios. This document therefore does not provide for the implementor to define and select an alternative method. A future specification might define an alternative method for generating RTCP CNAMEs as long as the proposed method has appropriate uniqueness, and there is consistency between the methods used for multiple RTP sessions that are to be correlated. However, such a specification needs to be reviewed and approved before deployment. The second sentence of the first paragraph could be written better: This document provides a number of methods, at least one of which should be suitable for all deployment scenarios. My remaining discussion is about making this statement more true. First, all the methods should afford some access to privacy support, but as written, there is little or none for the long-term persistent and the IPv4-only short-term persistent CNAMEs. An implementation that wishes to discourage this type of third-party monitoring can generate a unique RTCP CNAME for each RTP session, or group of related RTP sessions, that it joins. Such a per-session RTCP CNAME cannot be used for traffic analysis, and so provides some limited form of privacy The above statement implies that a long-term persistent CNAME inherently cannot have privacy support. It's not necessarily so: if the CNAME doesn't embed identifying information, observers get connections among multiple streams but they only don't have a fixed host identity, only a pseudonym. Specific issues per CNAME method: 1) Long-term persistent CNAMEs are required to be generated by an adaptation of RFC 4122 UUIDs (the adaptation is to leave off the string "urn:uuid:"). The draft references Section 3 of RFC 4122. It should reference Section 4 instead because Section 3 does not detail the UUID components. Moreover, it would be good for the draft to advise on usage among the four different versions of UUID that RFC 4122 covers: + Version 1: generated from clock + MAC, or + MAC-format random number + Version 3: generated from namespace:name + Version 4: generated from "truly random or pseudo-random number" + Version 5: generated from hash of namespace:name There needs to be some guidance because the use of the UUID Versions 3/5, derived from namespace:name, has the same problem with non-uniqueness of FQDNs as the RFC 3550 FQDN-based CNAMEs. Perhaps this document should advise against using 3/5. In addition, right now the draft is silent on mitigating identity exposure, but it could offer some guidance towards using the variant of Version 1 that does not expose the MAC or towards using Version 4. 2) Short-term persistent CNAMEs are allowed to use a pseudo-randomly generated RFC 4941 IPv6 privacy address if the device is IPv6-capable, but are required to exposetheir MACs if the device is IPv4-only. Why not allow IPv4-only endpoints to to generate pseudo-random MACs using the specification of doing so provided for the Version 1 variant in RFC 4122? 3) Per-session CNAMEs are generated using SHA1-HMAC over the concatenation of the initially-used SSRC, the source and destination addresses and ports, and "a randomly generated value". RFC 4086 is given as a reference for the randomly generated value. I think an implementer would like to know how many bytes of randomly generated value should be used; this doesn't come out clearly from reading RFC 4086. Further, what are the requirements for the key for HMAC here? In reading RFC 2104, the reference for HMAC, I end up with some ideas about the key length, but not about how long/where I can use the same key or whether there are problematic keys - to mention two questions that come to mind. Keying would not normally be easy to under-specify this way because a security application would call for some keying details, but in this application there is no security use for the keys. Either it would be good to add some guidance or perhaps SHA1-HMAC could be replaced with an "insecure hash." Thoughts about this have arisen from re-reading EKR's SAAG talk from IETF 73: www.ietf.org/proceedings/08nov/slides/saag-0.pdf With best regards to all, Allison mankin@psg.com / allison.mankin@gmail.com / allison.mankin@jhuapl.edu |
2011-01-03
|
05 | Ron Bonica | [Ballot Position Update] New position, No Objection, has been recorded |
2010-12-31
|
05 | Gonzalo Camarillo | [Ballot Position Update] New position, No Objection, has been recorded |
2010-12-25
|
05 | Alexey Melnikov | [Ballot comment] 5. Procedure to Generate a Unique Identifier 2. Obtain an EUI-64 identifier from the system running this I think this needs an … [Ballot comment] 5. Procedure to Generate a Unique Identifier 2. Obtain an EUI-64 identifier from the system running this I think this needs an Informative reference to a document which explains what is EUI-64. algorithm. If an EUI-64 does not exist, one can be created from a 48-bit MAC address as specified in [RFC4291]. If an EUI-64 cannot be obtained or created, a suitably unique identifier, local to the node, should be used (e.g., system serial number). |
2010-12-25
|
05 | Alexey Melnikov | [Ballot Position Update] New position, No Objection, has been recorded |
2010-12-22
|
05 | Robert Sparks | State changed to IESG Evaluation from Waiting for AD Go-Ahead::AD Followup. |
2010-12-22
|
05 | Robert Sparks | [Ballot Position Update] New position, Yes, has been recorded for Robert Sparks |
2010-12-22
|
05 | Robert Sparks | Ballot has been issued |
2010-12-22
|
05 | Robert Sparks | Created "Approve" ballot |
2010-12-22
|
05 | (System) | Sub state has been changed to AD Follow up from New Id Needed |
2010-12-22
|
03 | (System) | New version available: draft-ietf-avt-rtp-cnames-03.txt |
2010-12-22
|
05 | Robert Sparks | State changed to Waiting for AD Go-Ahead::Revised ID Needed from Waiting for AD Go-Ahead. |
2010-12-16
|
05 | Samuel Weiler | Request for Last Call review by SECDIR Completed. Reviewer: Tobias Gondrom. |
2010-12-14
|
05 | David Harrington | Request for Early review by TSVDIR Completed. Reviewer: Allison Mankin. |
2010-12-14
|
05 | (System) | State changed to Waiting for AD Go-Ahead from In Last Call. |
2010-12-08
|
05 | David Harrington | Request for Early review by TSVDIR is assigned to Allison Mankin |
2010-12-08
|
05 | David Harrington | Request for Early review by TSVDIR is assigned to Allison Mankin |
2010-12-08
|
05 | Robert Sparks | Placed on agenda for telechat - 2011-01-06 |
2010-11-30
|
05 | Samuel Weiler | Request for Last Call review by SECDIR is assigned to Tobias Gondrom |
2010-11-30
|
05 | Samuel Weiler | Request for Last Call review by SECDIR is assigned to Tobias Gondrom |
2010-11-29
|
05 | Amanda Baber | We understand that this document does not require any IANA actions. |
2010-11-23
|
05 | Amy Vezza | Last call sent |
2010-11-23
|
05 | Amy Vezza | State changed to In Last Call from Last Call Requested. The following Last Call Announcement was sent out: From: The IESG To: IETF-Announce CC: Reply-To: … State changed to In Last Call from Last Call Requested. The following Last Call Announcement was sent out: From: The IESG To: IETF-Announce CC: Reply-To: ietf@ietf.org Subject: Last Call: (Guidelines for Choosing RTP Control Protocol (RTCP) Canonical Names (CNAMEs)) to Proposed Standard The IESG has received a request from the Audio/Video Transport WG (avt) to consider the following document: - 'Guidelines for Choosing RTP Control Protocol (RTCP) Canonical Names (CNAMEs)' as a Proposed Standard The IESG plans to make a decision in the next few weeks, and solicits final comments on this action. Please send substantive comments to the ietf@ietf.org mailing lists by 2010-12-14. Exceptionally, comments may be sent to iesg@ietf.org instead. In either case, please retain the beginning of the Subject line to allow automated sorting. The file can be obtained via http://datatracker.ietf.org/doc/draft-ietf-avt-rtp-cnames/ IESG discussion can be tracked via http://datatracker.ietf.org/doc/draft-ietf-avt-rtp-cnames/ |
2010-11-23
|
05 | Robert Sparks | Last Call was requested |
2010-11-23
|
05 | Robert Sparks | State changed to Last Call Requested from Publication Requested. |
2010-11-23
|
05 | Robert Sparks | Last Call text changed |
2010-11-23
|
05 | (System) | Ballot writeup text was added |
2010-11-23
|
05 | (System) | Last call text was added |
2010-11-23
|
05 | (System) | Ballot approval text was added |
2010-11-23
|
05 | Robert Sparks | Ballot writeup text changed |
2010-11-11
|
05 | Cindy Morgan | [Note]: 'Keith Drage (keith.drage@alcatel-lucent.com) is the document shepherd.' added by Cindy Morgan |
2010-11-11
|
05 | Cindy Morgan | Shepherd writeup for draft-ietf-avt-rtp-cnames-02 " Guidelines for Choosing RTP Control Protocol (RTCP) Canonical Names (CNAMEs)" as proposed standard. (1.a) Who is the Document Shepherd … Shepherd writeup for draft-ietf-avt-rtp-cnames-02 " Guidelines for Choosing RTP Control Protocol (RTCP) Canonical Names (CNAMEs)" as proposed standard. (1.a) Who is the Document Shepherd for this document? Has the Document Shepherd personally reviewed this version of the document and, in particular, does he or she believe this version is ready for forwarding to the IESG for publication? The document shepherd for this document is Keith Drage. The document shepherd has reviewed the document and believes it is ready for forwarding to the IESG for publication. Document history: - draft-begen-avt-rtp-cnames-00 was submitted 14th April 2010 and expires 16th October 2011; - draft-begen-avt-rtp-cnames-01 was submitted 5th May 2010 and expires 6th November 2011; - draft-begen-avt-rtp-cnames-02 was submitted 24th May 2010 and expires 25th November 2011; - draft-ietf-avt-rtp-cnames-00 was submitted 17th June 2010 and expires 19th December 2011; - draft-ietf-avt-rtp-cnames-01 was submitted 26th August 2010 and expires 27th February 2011; - draft-ietf-avt-rtp-cnames-01 was submitted 10th November 2010 and expires 14th May 2011; Call for adoption of baseline as WG item was made 4th June 2010 and acceptance declared 16th June 2010. Working group last call was initiated on -00 version on 4th August 2010 for completion 25th August 2010 as proposed standard. Reviews were received from Jonathan Lennox and Keith Drage. Prior to working group last call,.comments had been received from Qin Wu, Dan Wing, Colin Perkins, and Peter Musgrave. (1.b) Has the document had adequate review both from key WG members and from key non-WG members? Does the Document Shepherd have any concerns about the depth or breadth of the reviews that have been performed? The document has been adequately reviewed (see 1a above). This is a very simple document and numerous substantial comments would not be expected. (1.c) Does the Document Shepherd have concerns that the document needs more review from a particular or broader perspective, e.g., security, operational complexity, someone familiar with AAA, internationalization or XML? There are no such concerns from the document shepherd. (1.d) Does the Document Shepherd have any specific concerns or issues with this document that the Responsible Area Director and/or the IESG should be aware of? For example, perhaps he or she is uncomfortable with certain parts of the document, or has concerns whether there really is a need for it. In any event, if the WG has discussed those issues and has indicated that it still wishes to advance the document, detail those concerns here. Has an IPR disclosure related to this document been filed? If so, please include a reference to the disclosure and summarize the WG discussion and conclusion on this issue. There are no concerns from the document shepherd from this perspective with the document. No IPR disclosures have been made against this document. (1.e) How solid is the WG consensus behind this document? Does it represent the strong concurrence of a few individuals, with others being silent, or does the WG as a whole understand and agree with it? From a reviewing perspective, the interest in this specific document has been relatively small, but it forms an essential part of draft-ietf-avt-rapid- acquisition-for-rtp which has been well and substantially reviewed. It is assumed that the interested parties in that document have also reviewed this document. (1.f) Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarise the areas of conflict in separate email messages to the Responsible Area Director. (It should be in a separate email because this questionnaire is entered into the ID Tracker.) No appeals or areas of conflict or discontent have been identified. (1.g) Has the Document Shepherd personally verified that the document satisfies all ID nits? (See the Internet-Drafts Checklist and http://tools.ietf.org/tools/idnits/). Boilerplate checks are not enough; this check needs to be thorough. Has the document met all formal review criteria it needs to, such as the MIB Doctor, media type and URI type reviews? Version 2.12.05 of ID nits identifies no issues. No other formal reviews outside of the AVT working group are perceived as necessary for this document. (1.h) Has the document split its references into normative and informative? Are there normative references to documents that are not ready for advancement or are otherwise in an unclear state? If such normative references exist, what is the strategy for their completion? Are there normative references that are downward references, as described in [RFC3967]? If so, list these downward references to support the Area Director in the Last Call procedure for them [RFC3967]. The document does split normative and informative references. All the normative references have been reviewed and are correctly allocated as normative references. None of these normative references constitute a down reference. (1.i) Has the Document Shepherd verified that the document IANA consideration section exists and is consistent with the body of the document? If the document specifies protocol extensions, are reservations requested in appropriate IANA registries? Are the IANA registries clearly identified? If the document creates a new registry, does it define the proposed initial contents of the registry and an allocation procedure for future registrations? Does it suggest a reasonable name for the new registry? See [RFC5226]. If the document describes an Expert Review process has Shepherd conferred with the Responsible Area Director so that the IESG can appoint the needed Expert during the IESG Evaluation? There are no IANA considerations required in this document. It creates no new values of any parameter. (1.j) Has the Document Shepherd verified that sections of the document that are written in a formal language, such as XML code, BNF rules, MIB definitions, etc., validate correctly in an automated checker? There is no formal language in the document. (1.k) The IESG approval announcement includes a Document Announcement Write-Up. Please provide such a Document Announcement Write-Up? Recent examples can be found in the "Action" announcements for approved documents. The approval announcement contains the following sections: Technical Summary Relevant content can frequently be found in the abstract and/or introduction of the document. If not, this may be an indication that there are deficiencies in the abstract or introduction. Working Group Summary Was there anything in WG process that is worth noting? For example, was there controversy about particular points or were there decisions where the consensus was particularly rough? Document Quality Are there existing implementations of the protocol? Have a significant number of vendors indicated their plan to implement the specification? Are there any reviewers that merit special mention as having done a thorough review, e.g., one that resulted in important changes or a conclusion that the document had no substantive issues? If there was a MIB Doctor, Media Type or other expert review, what was its course (briefly)? In the case of a Media Type review, on what date was the request posted? The RTP Control Protocol (RTCP) Canonical Name (CNAME) is a persistent transport-level identifier for an RTP endpoint. While the Synchronization Source (SSRC) identifier of an RTP endpoint may change if a collision is detected, or when the RTP application is restarted, its RTCP CNAME is meant to stay unchanged, so that RTP endpoints can be uniquely identified and associated with their RTP media streams. For proper functionality, RTCP CNAMEs should be unique within the participants of an RTP session. However, the existing guidelines for choosing the RTCP CNAME provided in the RTP standard are insufficient to achieve this uniqueness. This memo updates these guidelines to allow endpoints to choose unique RTCP CNAMEs. The document achieved consensus in the AVT working group. |
2010-11-11
|
05 | Cindy Morgan | Draft Added by Cindy Morgan in state Publication Requested |
2010-11-11
|
02 | (System) | New version available: draft-ietf-avt-rtp-cnames-02.txt |
2010-08-26
|
01 | (System) | New version available: draft-ietf-avt-rtp-cnames-01.txt |
2010-06-17
|
00 | (System) | New version available: draft-ietf-avt-rtp-cnames-00.txt |