Skip to main content

Peer-to-Peer Streaming Tracker Protocol (PPSTP)
RFC 7846

Revision differences

Document history

Date Rev. By Action
2017-05-16
12 (System)
Changed document authors from "Rui Cruz, Mario Nunes, Jinwei Xia, Joao Taveira, Gu Yingjie, Deng Lingli, Rachel Huang" to "Rui Cruz, Mario Nunes, Jinwei Xia, …
Changed document authors from "Rui Cruz, Mario Nunes, Jinwei Xia, Joao Taveira, Gu Yingjie, Deng Lingli, Rachel Huang" to "Rui Cruz, Mario Nunes, Jinwei Xia, Joao Taveira, Deng Lingli, Rachel Huang"
2016-06-01
12 (System) IANA registries were updated to include RFC7846
2016-05-31
12 (System) RFC published
2016-05-25
12 (System) RFC Editor state changed to AUTH48-DONE from AUTH48
2016-04-15
12 (System) RFC Editor state changed to AUTH48 from RFC-EDITOR
2016-04-05
12 (System) RFC Editor state changed to RFC-EDITOR from AUTH
2016-03-23
12 (System) RFC Editor state changed to AUTH from EDIT
2016-01-29
12 (System) IANA Action state changed to RFC-Ed-Ack from Waiting on RFC Editor
2016-01-26
12 (System) IANA Action state changed to Waiting on RFC Editor from Waiting on Authors
2016-01-14
12 (System) IANA Action state changed to Waiting on Authors
2016-01-12
12 (System) RFC Editor state changed to EDIT
2016-01-12
12 (System) IESG state changed to RFC Ed Queue from Approved-announcement sent
2016-01-12
12 (System) Announcement was received by RFC Editor
2016-01-12
12 Amy Vezza IESG state changed to Approved-announcement sent from Approved-announcement to be sent
2016-01-12
12 Amy Vezza IESG has approved the document
2016-01-12
12 Amy Vezza Closed "Approve" ballot
2016-01-12
12 Amy Vezza Ballot approval text was generated
2016-01-12
12 Amy Vezza IESG state changed to Approved-announcement to be sent from IESG Evaluation::AD Followup
2016-01-12
12 Martin Stiemerling Ballot writeup was changed
2016-01-10
12 Stephen Farrell [Ballot Position Update] Position for Stephen Farrell has been changed to No Objection from Discuss
2016-01-07
12 Barry Leiba
[Ballot comment]
Version -12 addresses my DISCUSS points and almost all of my comments.  Thanks very much for the work on this.

Two non-critical things …
[Ballot comment]
Version -12 addresses my DISCUSS points and almost all of my comments.  Thanks very much for the work on this.

Two non-critical things remain, if you don't mind another minor update:

In Section 4, I would prefer that you add the section reference for
Content-Type, like this:

OLD
the Content-Type field in HTTP/1.1 [RFC7231],
NEW
the Content-Type field in HTTP/1.1 (Section 3.1.1.5 of [RFC7231]),
END

But that's not critical, and the HTTP references are OK now.

I also still prefer that you change the title of Section 8.1 to "Media
Type Registration" ... but also not critical.
2016-01-07
12 Barry Leiba [Ballot Position Update] Position for Barry Leiba has been changed to No Objection from Discuss
2015-12-30
12 Rachel Huang New version available: draft-ietf-ppsp-base-tracker-protocol-12.txt
2015-12-14
11 Kathleen Moriarty
[Ballot comment]
1. Section 5.2.7
Please make mention and reference to security provisions for SNMP and Syslog.  RFC5424 is just for syslog, so a pointer …
[Ballot comment]
1. Section 5.2.7
Please make mention and reference to security provisions for SNMP and Syslog.  RFC5424 is just for syslog, so a pointer for SNMP security considerations should be added in this section as well.  They use a boilerplate for the text and add considerations specific to a draft.  Benoit - do you have a good reference for them to use?  A more generic SNMP draft might not be up-to-date with the latest boilerplate text.  If that's the case, the recent changes are small and could be stated with a pointer to an RFC with the older boilerplate text.

- Thanks for adding an SNMP reference.  I would think there is a better, more recent one that could be used.  Moving to a comment for your AD to help you with and not hold up on this one.


2. Are there any considerations for the statistics collected, can they be used in a malicious way?  I would think so and that this would be an important security consideration.  Mentioning possible issues would be helpful to the reader.

- Thanks for adding in text about this one!

3. Section 6
Reference to RFC2616 isn't enough for the security considerations of HTTP since that's a really old RFC.  If you want authentication options, you could point to the HTTPAuth documents, which include updated versions of HTTP basic (RFC7616) and digest (RFC7617).  While there are still lots of security issues with these options, the RFCs spell out what the actual considerations are, which are helpful to the reader.  This raises the need for TLS 1.2 as well to provide session protection for the session (passive and active attacks) as well as for the authentication used.

You mention HTTPAuth's digest in 6.1, but there's no reference.  This is a little better, so I am moving this to a comment from discuss.

4. Section 6.1
Why isn't TLS a must here to protect the session data?
If you are relying on OAuth Bearer tokens, they offer no security protection without TLS, so to rely on this, I'd say TLS really should be a MUST.  The authentication types to get a bearer token (at least in RFC documentation and in the registry) are all pretty weak and require TLS protection to have any level of security.

With the TLS MUST, we are recommending TLS 1.2 as the minimum in drafts.  It would be good to see a mention of TLS 1.2 as a minimum recommendation and a reference to the BCP for TLS 1.2 configurations RFC7525 (it even includes cipher suite recommendations).

- Thanks for adding in the MUST for TLS and the reference to RFC7525.

5. Privacy
I would have expected some discussion on the protection of the 2 ID types and the tracker capabilities and that session encryption (TLS) ought to be used when this is a consideration.  Is there a reason this isn't covered?  If it's not a concern, I'd like to understand why.

-Thanks for adding in a privacy section!
2015-12-14
11 Kathleen Moriarty [Ballot Position Update] Position for Kathleen Moriarty has been changed to No Objection from Discuss
2015-12-12
11 (System) Sub state has been changed to AD Followup from Revised ID Needed
2015-12-12
11 Rachel Huang IANA Review state changed to Version Changed - Review Needed from IANA OK - Actions Needed
2015-12-12
11 Rachel Huang New version available: draft-ietf-ppsp-base-tracker-protocol-11.txt
2015-11-13
10 Ben Campbell
[Ballot comment]
Thanks for addressing my discuss point in email discussion. I'm clearing the discuss under the assumption the proposed text will make it into …
[Ballot comment]
Thanks for addressing my discuss point in email discussion. I'm clearing the discuss under the assumption the proposed text will make it into the next revision.

- 1.1, definitions of "LEECH" and "SEEDER"

These don't seem to match the  use of the terms elsewhere in the document. In particular, these seems to describe transient states, while the protocol requires the peer to declare itself to be a leech or seed when it joins a swarm. Additionally, these definitions don't seem to consider a peer that may have received part but not all of some content, but still makes the chunks it has available.

- 1.1, LIVE STREAMING:

Is there an expectation of syncing reception between receivers?

- 1.1, VIDEO-ON-DEMAND
Aren't the main points that different audiences can watch the same part at different times, or different parts at the same time?

- 1.2, 2nd to last paragraph:

Wouldn't a distributed tracker have implications for discover and connection management? It also seems worth some discussion in the operations section.

- 1.2.2, first paragraph:

Aren't there at least some implied requirements for peer-ids? E.g. uniqueness requirements? Requirements for elements to treat them as opaque strings?

-2.1: "The messaging model of PPSP-TP aligns with HTTP protocol..."

Is that the same as saying it uses HTTP as a substrate? (If so, the references to HTTP need to be normative.)

- 2.2, 3rd paragraph: "Requests are sent, and responses returned to these requests."
The use of passive voice obscures the actors. What does each of these things?

- Figure 5: Is there a matching peer state machine (i.e. that models the internal state of a peer?)

- 2.3.2, general:

The section is inconsistent in specifying result codes. Also, it's not clear whether these are HTTP result codes, or PPSP-TP result codes.

-2.3.2: "Peers MUST NOT generate protocol elements that are invalid."

That's an odd use of "MUST NOT".

ability_nat: What's the use case for one peer caring what the NAT status of other peers might be, as long as it gets addresses that it can reach?

- 3.2.4: "connection":
That list will continuously become obsolete. I suggest some classification that describes the attributes you care about, rather than the current-as-of-now set of network technologies.

- table 3:

How is "priority" encoded and interpreted?

-3.3.4:

"Normally, swarm action result
  elements SHOULD be set and error_code MUST be set to 0 when
  response_type is 0x00."

What does it mean for swarm action results element to be set? Since that's a structure, I assume you don't mean set as in "true", or set to zero like the error_code. Do you mean they should be _included_ or _present_?

"A swarm action result element is the result information for a peer to
  request the tracker to have some actions towards the swarm."

I'm a bit confused about the causality here. This is the result of a request that has already happened? An indication that the pier should request something? A reciprocal request and the result of the previous request?

-4, general:

The protocol specification sections are inconsistent in the way they use 2119 keywords. It seems somewhat random whether any given protocol requirement uses 2119 keywords or not. I suggest the authors re-review this section for 2119 consistency. In general, you don't need 2119 words to describe every detail of the the basic flow of the protocol; rather they are more useful when there's a decision to make, or a place where an implementor is likely to get things wrong.

-4, 2nd paragraph:

Can you offer any guidance on when one should actually _use_ HTTPS? (See DISCUSS comment)

-4, paragraph 4:

This seems to be describing the general working of HTTP. I'm not sure why you need to restated it here, especially with 2119 words.

-4.1.1, paragraph 4:

Since the mentioned elements are "optional", is there any guidance for the tracker? For example, can the peer assume that the tracker (or other peers) will never require these elements to operate properly? Or if they may be required by the tracker (or other peers), how would the peer know it needed to include them?

- 4.1.1, paragraph 6:

"... MAY... start by pre-processing the peer authentication information" needs elaboration. I assume the "MAY" relates to the previously mentioned "preferred" use of TLS client certificate authentication?

-4.1.1., 3 paragraphs from end:

Can you elaborate on "STUN-like function"? I gather the tracker can reflect back the observed source address/port of the peer in the response? If so, I'm not sure readers will understand that from "STUN-like function".

-4.1.1.1:

I'd love to see the example use HTTPS, just to set a good example.

In the example of a peer leaving one swarm and joining another, second swarm_action:

s/@peer_mode/peer_mode

-4.3, 1st paragraph:

Why would the peer fail to read the response? Because the response is invalid? Not received? This all runs over TCP right?

-4.3, 3rd paragraph:

Why only a should? What are the consequences of not being prepared?

I assume the errors in this section are PPSP-TP errors, not HTTP result codes. I think the choice of 4XX codes will confuse people into thinking these match the HTTP 4XX client-error result codes. Especially since many seem to have similar meanings--but rearranged.

-6.1:

It would probably be worth mentioning the need for an enrollment service in the operations section.

The 3rd paragraph would work better in the previous paragraph where you mention the HTTP security considerations, and perhaps cast in terms of HTTPS. Also, please consider a reference to RFC 7525.


OAuth might should've been mentioned back when you discussed digest authentication and HTTPS client certificates

-6.2:

This seems to mean that the peers in a swarm must agree on an integrity protection mechanism. Can you reference something? On the other hand isn't this an issue for the actual transport protocol rather than the tracker protocol?

-7:

The 3rd paragraph seems to forbid adding new elements, as described in the next section.

The 2119 words in the 4th paragraph are questionable. It's hard to put MUST level requirements on people, and the MAY is a statement of fact.

In the last two paragraphs:

Internet-Drafts are not appropriate places to document things, other than ephemerally on their ways to become RFCs. I-Ds expire.

Saying extensions MAY be documented in RFCs doesn't add anything; anything may be documented in RFCs. I assume therefore you mean at least SHOULD. If so, what kind(s) of RFCs would be appropriate?

The suggestion that private extensions need not be documented in RFCs can be harmful to long-term interoperability. So-called private extensions have a way of migrating to public networks.

-7.2:

Wouldn't non-backward compatible extensions require a new version number? Doesn't this violate the requirements in the parent section?

-8:

I am surprised not to see registries for methods and result codes, especially with the considerable text about extensibility. Do you expect them to be extended?

10.2:
The references to 2616, 2818,  and 5246 probably need to be normative. Also, 2616 is obsolete.

Editorial and nits:
-------------------

- IDNits points out a number of citations without matching references

-1.1: VIDEO-ON-DEMAND and LIVE-STREAMING

I suggest changing "It refers to" to "VIDEO-ON-DEMAND refers to..." and "LIVE-STREAMING refers to..."

- 2.2, definition of CONNECT: "... Peer
      registers in the Tracker (or if already registered) to notify it..."

What is the antecedent of "it"? (peer or tracker?)

- 2.3.1, 4):
s/"is responded with"/ "is responded to with" (Or even better, "The tracker responds to the request with...")

- 3.1 : "... turning the definitions for
  JSON objects extensible."

I don't understand the phrase. Do you mean "making the definitions...extensible"?

- 3.2.2, 1st paragraph:

Paragraph seems out of place, and seems redundant with the rest of the section. The placement here makes it look like NAT status selection is the primary use, and I don't think that's the intent.

s/"inform the tracker on the preferred type"/"inform the tracker of the preferred type"

- 3.2.5, first paragraph:

s/can be related with/can be related to

-3.3.4, response element:

s/ppsp_tp_interger_t/ppsp_tp_integer_t

- 4.1.1, 3rd paragraph after table 6

The first sentence is convoluted and hard to parse. I suggest breaking it into simpler sentences.


-4.1.2, 4th paragraph, "... with regard to the possibility of
  connecting with other IETF efforts such as ALTO [RFC7285]."

I don't understand the intent of this phrase.

-4.1.2, 5th paragraph:

The structure of the sentence is confusing. Do you mean to say that included elements MUST include public addresses?

-4.1.2, 3rd to last paragraph:

The paragraph seems redundant to the previous paragraph.

-6, first paragraph:

s/"impersonating to be another valid participant"/"impersonate a valid participant"

-7.2, security issues: "Being security an important component of any
      protocol..."

I don't understand this phrase.
2015-11-13
10 Ben Campbell [Ballot Position Update] Position for Ben Campbell has been changed to No Objection from Discuss
2015-10-19
10 Gunter Van de Velde Request for Last Call review by OPSDIR Completed: Serious Issues. Reviewer: Nevil Brownlee.
2015-10-15
10 Vijay Gurbani Request for Last Call review by GENART Completed: Ready. Reviewer: Vijay Gurbani.
2015-10-15
10 Cindy Morgan IESG state changed to IESG Evaluation::Revised I-D Needed from Waiting for AD Go-Ahead
2015-10-15
10 Tero Kivinen Request for Last Call review by SECDIR Completed: Ready. Reviewer: Chris Lonvick.
2015-10-15
10 Benoît Claise [Ballot Position Update] New position, No Objection, has been recorded for Benoit Claise
2015-10-15
10 Brian Haberman [Ballot comment]
I support the DISCUSSes raised by Barry, Ben, Kathleen, and Stephen.
2015-10-15
10 Brian Haberman [Ballot Position Update] New position, No Objection, has been recorded for Brian Haberman
2015-10-14
10 Barry Leiba
[Ballot discuss]
You use RFC 2616 as a reference for HTTP 1.1, but that's obsolete, and the current reference should be RFC 7230 for the …
[Ballot discuss]
You use RFC 2616 as a reference for HTTP 1.1, but that's obsolete, and the current reference should be RFC 7230 for the general references and RFC 7231, Section 3.1.1.5 for Content-Type (the citation in Section 4 here).  The Security Considerations section should cite both 7230 and 7231.

-- Section 3.1 --

  A JSON object consists of name/value pairs.  The JSON names of the
  pairs are indicated with "".

I don't find the meaning of the second sentence to understandable at all.  What are you trying to say?

-- Subsections of 3.2 --
Where are the semantics of the string values, such as "HIGH", "NORMAL", and "LOW", defined?

-- Section 4 --

  For deployment scenarios where Peer (Client) authentication is
  desired at the Tracker, HTTP Digest Authentication MUST be supported,
  with TLS Client Authentication as the preferred mechanism, if
  available.

You need a normative reference to RFC 7616 for HTTP Digest Authentication, and a citation here.

-- Section 4.1.1.1 --
Please re-check your examples carefully, and pass them through a JSON validator.  In the first example, for instance, the Content-Length value is wrong and the "transaction_id" member is missing its ":".  The third example uses "TransactionID" instead of "transaction_id" for the member name.

Be careful during AUTH48 that you re-check this, including making sure that any Content-Length values are still correct after all the editing.
2015-10-14
10 Barry Leiba
[Ballot comment]
Is the definition give for "LEECH" sufficient?:

  LEECH:  A Peer that has not yet completed the transfer of all Chunks
  of …
[Ballot comment]
Is the definition give for "LEECH" sufficient?:

  LEECH:  A Peer that has not yet completed the transfer of all Chunks
  of the media content.

I don't think "completed the transfer" is clear enough, and "transfer" can be outbound or inbound.  Would something like "A Peer that has not yet received all chunks of the media content, and therefore can't be used to share the content," be better?  And isn't it possible for a peer to share the chunks that it has, even if it doesn't have all of the chunks?

You do seem inconsistent with capitalization of terms ("SEEDER" and "Seeder", "LEECH" and "Leech", "SWARM and "Swarm" and "swarm").  You should fix that -- readers often find it confusing, and the RFC Editor will ask you about it during AUTH48.

-- Section 1.2.1 --
I don't understand the meaning of "[Peer Protocol]" in front of list items 3, 4, and 5.  Why's it there?  And if you're going to leave it there, I think you might do better to find notation that doesn't look like how we write reference citations.

-- Section 2.2 --

  Requests are sent, and responses returned to these requests.  A
  single request generates a single response (neglecting fragmentation
  of messages in transport).

The word "neglecting" can make this ambiguous -- it can be taken to mean that fragmentation can't happen.  It might be better to say it this way:

NEW
  Requests are sent, and responses returned to these requests.  A
  single request generates a single response (though both requests
  and responses can be subject to fragmentation of messages in
  transport).
END

-- Section 4.3 --

  If the peer fails to read the tracker response, the same Request with
  identical content, including the same transaction_id, SHOULD be
  repeated, if the condition is transient.

...and...

  The tracker SHOULD be prepared to receive a Request with a repeated
  transaction_id.

Given the first paragraph, why isn't the SHOULD in the second one a MUST?

In the list of error responses, why are some of them MUST and others SHOULD?

-- Section 4.4 --
There are no JSON things called "fields".  Objects have "members" and arrays have "elements".  I think you mean to use "members" in this section.

-- Section 7 --

  Additionally, a designer MUST remember that extensions themselves MAY
  also be extensible.

The "MAY" shouldn't be a 2119 key word, and should be changed to lower case.

-- Section 8.1 --
This is not defining a registry; it's making a registration in the media types registry.  We no longer use the term "MIME type", so please change the title to "Media type registration", and change the first paragraph:

OLD
  This document defines registry for application/ppsp-tracker+json
  media types.
NEW
  This document registers the application/ppsp-tracker+json
  media type.
END

You also use "MIME type" in the "File extension" information (you can actually just change that to "n/a").  And you haven't updated the registration template to the latest one specified in RFC 6838 -- there's a new "Fragment identifier considerations" item (which can just be "n/a" also, but please add it).

-- Section 10 --
Some of your informative references are for required functions, and should be normative.  In particular, RFC 2616 needs to be changed to 7230 and 7231 (see above) and needs to be normative.  2818 and 5246 should be normative.  3986 and 5952 tell you how to encode IP addresses, and should be normative.
2015-10-14
10 Barry Leiba [Ballot Position Update] New position, Discuss, has been recorded for Barry Leiba
2015-10-14
10 Amanda Baber IANA Review state changed to IANA OK - Actions Needed from IANA - Not OK
2015-10-14
10 Alia Atlas [Ballot Position Update] New position, No Objection, has been recorded for Alia Atlas
2015-10-14
10 (System) Notify list changed from ppsp-chairs@ietf.org, draft-ietf-ppsp-base-tracker-protocol@ietf.org, "Ning Zong"  to (None)
2015-10-14
10 Deborah Brungard [Ballot Position Update] New position, No Objection, has been recorded for Deborah Brungard
2015-10-14
10 Stephen Farrell
[Ballot discuss]

6.2 - can you explain to me how the overall protection
against pollution works? I'm not quite following it and am
concerned that …
[Ballot discuss]

6.2 - can you explain to me how the overall protection
against pollution works? I'm not quite following it and am
concerned that it may be lacking. But that may just be me
forgetting how this ties together with rfc7574.
2015-10-14
10 Stephen Farrell
[Ballot comment]
- I-D nits notes a bunch of missing reference entries, e.g.
for RFC6972 as well as 6 others. Probably some xml2rfc
issue.

- …
[Ballot comment]
- I-D nits notes a bunch of missing reference entries, e.g.
for RFC6972 as well as 6 others. Probably some xml2rfc
issue.

- intro: last para (just before 1.1) puzzles me. Not sure
why it''s there.

- intro: why is there no mention of Bit Torrent? This seems
to be the same design for the same purpose, and BT is in
widespread use so not explaining the relationship seems a
bit odd. 5.1.2 seems to be plain silly in that light, while
BT is not a "standard" that is irrelevant - it has been
widely deploy and migration from BT to this, or
co-existence, would seem critical to the success of this
effort.

- RFC2616 is obsoleted.

- 6.1: I agree with Katheen's discuss, a MUST use TLS is
needed here really and just reflects reality and is not an
additioanl consideration. It is needed for clarity though.

- 6.2: Given the history of spoofing in BT I wondered why
there is no object level origin auth defined here.

- I also agree with Ben's discuss.
2015-10-14
10 Stephen Farrell [Ballot Position Update] New position, Discuss, has been recorded for Stephen Farrell
2015-10-13
10 Ben Campbell
[Ballot discuss]
I think this draft needs privacy considerations. The protocol carries sensitive information in the form of IP addresses and location. If I understand …
[Ballot discuss]
I think this draft needs privacy considerations. The protocol carries sensitive information in the form of IP addresses and location. If I understand correctly it may also identify transferred content, which can be highly sensitive under some circumstances. Encryption is optional.  It think it needs stronger guidance on privacy implications and the use of HTTPS.
2015-10-13
10 Ben Campbell Ballot discuss text updated for Ben Campbell
2015-10-13
10 Ben Campbell
[Ballot discuss]
I think this draft needs privacy considerations. The protocol sensitive information in the form of IP addresses and location. If I understand correctly …
[Ballot discuss]
I think this draft needs privacy considerations. The protocol sensitive information in the form of IP addresses and location. If I understand correctly it may also identify transferred content, which can be highly sensitive under some circumstances. Encryption is optional.  It think it needs stronger guidance on privacy implications and the use of HTTPS.
2015-10-13
10 Ben Campbell
[Ballot comment]
- 1.1, definitions of "LEECH" and "SEEDER"

These don't seem to match the  use of the terms elsewhere in the document. In particular, …
[Ballot comment]
- 1.1, definitions of "LEECH" and "SEEDER"

These don't seem to match the  use of the terms elsewhere in the document. In particular, these seems to describe transient states, while the protocol requires the peer to declare itself to be a leech or seed when it joins a swarm. Additionally, these definitions don't seem to consider a peer that may have received part but not all of some content, but still makes the chunks it has available.

- 1.1, LIVE STREAMING:

Is there an expectation of syncing reception between receivers?

- 1.1, VIDEO-ON-DEMAND
Aren't the main points that different audiences can watch the same part at different times, or different parts at the same time?

- 1.2, 2nd to last paragraph:

Wouldn't a distributed tracker have implications for discover and connection management? It also seems worth some discussion in the operations section.

- 1.2.2, first paragraph:

Aren't there at least some implied requirements for peer-ids? E.g. uniqueness requirements? Requirements for elements to treat them as opaque strings?

-2.1: "The messaging model of PPSP-TP aligns with HTTP protocol..."

Is that the same as saying it uses HTTP as a substrate? (If so, the references to HTTP need to be normative.)

- 2.2, 3rd paragraph: "Requests are sent, and responses returned to these requests."
The use of passive voice obscures the actors. What does each of these things?

- Figure 5: Is there a matching peer state machine (i.e. that models the internal state of a peer?)

- 2.3.2, general:

The section is inconsistent in specifying result codes. Also, it's not clear whether these are HTTP result codes, or PPSP-TP result codes.

-2.3.2: "Peers MUST NOT generate protocol elements that are invalid."

That's an odd use of "MUST NOT".

ability_nat: What's the use case for one peer caring what the NAT status of other peers might be, as long as it gets addresses that it can reach?

- 3.2.4: "connection":
That list will continuously become obsolete. I suggest some classification that describes the attributes you care about, rather than the current-as-of-now set of network technologies.

- table 3:

How is "priority" encoded and interpreted?

-3.3.4:

"Normally, swarm action result
  elements SHOULD be set and error_code MUST be set to 0 when
  response_type is 0x00."

What does it mean for swarm action results element to be set? Since that's a structure, I assume you don't mean set as in "true", or set to zero like the error_code. Do you mean they should be _included_ or _present_?

"A swarm action result element is the result information for a peer to
  request the tracker to have some actions towards the swarm."

I'm a bit confused about the causality here. This is the result of a request that has already happened? An indication that the pier should request something? A reciprocal request and the result of the previous request?

-4, general:

The protocol specification sections are inconsistent in the way they use 2119 keywords. It seems somewhat random whether any given protocol requirement uses 2119 keywords or not. I suggest the authors re-review this section for 2119 consistency. In general, you don't need 2119 words to describe every detail of the the basic flow of the protocol; rather they are more useful when there's a decision to make, or a place where an implementor is likely to get things wrong.

-4, 2nd paragraph:

Can you offer any guidance on when one should actually _use_ HTTPS? (See DISCUSS comment)

-4, paragraph 4:

This seems to be describing the general working of HTTP. I'm not sure why you need to restated it here, especially with 2119 words.

-4.1.1, paragraph 4:

Since the mentioned elements are "optional", is there any guidance for the tracker? For example, can the peer assume that the tracker (or other peers) will never require these elements to operate properly? Or if they may be required by the tracker (or other peers), how would the peer know it needed to include them?

- 4.1.1, paragraph 6:

"... MAY... start by pre-processing the peer authentication information" needs elaboration. I assume the "MAY" relates to the previously mentioned "preferred" use of TLS client certificate authentication?

-4.1.1., 3 paragraphs from end:

Can you elaborate on "STUN-like function"? I gather the tracker can reflect back the observed source address/port of the peer in the response? If so, I'm not sure readers will understand that from "STUN-like function".

-4.1.1.1:

I'd love to see the example use HTTPS, just to set a good example.

In the example of a peer leaving one swarm and joining another, second swarm_action:

s/@peer_mode/peer_mode

-4.3, 1st paragraph:

Why would the peer fail to read the response? Because the response is invalid? Not received? This all runs over TCP right?

-4.3, 3rd paragraph:

Why only a should? What are the consequences of not being prepared?

I assume the errors in this section are PPSP-TP errors, not HTTP result codes. I think the choice of 4XX codes will confuse people into thinking these match the HTTP 4XX client-error result codes. Especially since many seem to have similar meanings--but rearranged.

-6.1:

It would probably be worth mentioning the need for an enrollment service in the operations section.

The 3rd paragraph would work better in the previous paragraph where you mention the HTTP security considerations, and perhaps cast in terms of HTTPS. Also, please consider a reference to RFC 7525.


OAuth might should've been mentioned back when you discussed digest authentication and HTTPS client certificates

-6.2:

This seems to mean that the peers in a swarm must agree on an integrity protection mechanism. Can you reference something? On the other hand isn't this an issue for the actual transport protocol rather than the tracker protocol?

-7:

The 3rd paragraph seems to forbid adding new elements, as described in the next section.

The 2119 words in the 4th paragraph are questionable. It's hard to put MUST level requirements on people, and the MAY is a statement of fact.

In the last two paragraphs:

Internet-Drafts are not appropriate places to document things, other than ephemerally on their ways to become RFCs. I-Ds expire.

Saying extensions MAY be documented in RFCs doesn't add anything; anything may be documented in RFCs. I assume therefore you mean at least SHOULD. If so, what kind(s) of RFCs would be appropriate?

The suggestion that private extensions need not be documented in RFCs can be harmful to long-term interoperability. So-called private extensions have a way of migrating to public networks.

-7.2:

Wouldn't non-backward compatible extensions require a new version number? Doesn't this violate the requirements in the parent section?

-8:

I am surprised not to see registries for methods and result codes, especially with the considerable text about extensibility. Do you expect them to be extended?

10.2:
The references to 2616, 2818,  and 5246 probably need to be normative. Also, 2616 is obsolete.

Editorial and nits:
-------------------

- IDNits points out a number of citations without matching references

-1.1: VIDEO-ON-DEMAND and LIVE-STREAMING

I suggest changing "It refers to" to "VIDEO-ON-DEMAND refers to..." and "LIVE-STREAMING refers to..."

- 2.2, definition of CONNECT: "... Peer
      registers in the Tracker (or if already registered) to notify it..."

What is the antecedent of "it"? (peer or tracker?)

- 2.3.1, 4):
s/"is responded with"/ "is responded to with" (Or even better, "The tracker responds to the request with...")

- 3.1 : "... turning the definitions for
  JSON objects extensible."

I don't understand the phrase. Do you mean "making the definitions...extensible"?

- 3.2.2, 1st paragraph:

Paragraph seems out of place, and seems redundant with the rest of the section. The placement here makes it look like NAT status selection is the primary use, and I don't think that's the intent.

s/"inform the tracker on the preferred type"/"inform the tracker of the preferred type"

- 3.2.5, first paragraph:

s/can be related with/can be related to

-3.3.4, response element:

s/ppsp_tp_interger_t/ppsp_tp_integer_t

- 4.1.1, 3rd paragraph after table 6

The first sentence is convoluted and hard to parse. I suggest breaking it into simpler sentences.


-4.1.2, 4th paragraph, "... with regard to the possibility of
  connecting with other IETF efforts such as ALTO [RFC7285]."

I don't understand the intent of this phrase.

-4.1.2, 5th paragraph:

The structure of the sentence is confusing. Do you mean to say that included elements MUST include public addresses?

-4.1.2, 3rd to last paragraph:

The paragraph seems redundant to the previous paragraph.

-6, first paragraph:

s/"impersonating to be another valid participant"/"impersonate a valid participant"

-7.2, security issues: "Being security an important component of any
      protocol..."

I don't understand this phrase.
2015-10-13
10 Ben Campbell [Ballot Position Update] New position, Discuss, has been recorded for Ben Campbell
2015-10-13
10 Kathleen Moriarty
[Ballot discuss]
Thanks for your work on this draft, I have a few things I'd like to discuss that we should be able to resolve …
[Ballot discuss]
Thanks for your work on this draft, I have a few things I'd like to discuss that we should be able to resolve quickly.  I'll try where possible to offer suggestions, but please do let me know if there is a good reason why they don't make sense.

1. Section 5.2.7
Please make mention and reference to security provisions for SNMP and Syslog.  RFC5424 is just for syslog, so a pointer for SNMP security considerations should be added in this section as well.  They use a boilerplate for the text and add considerations specific to a draft.  Benoit - do you have a good reference for them to use?  A more generic SNMP draft might not be up-to-date with the latest boilerplate text.  If that's the case, the recent changes are small and could be stated with a pointer to an RFC with the older boilerplate text.

2. Are there any considerations for the statistics collected, can they be used in a malicious way?  I would think so and that this would be an important security consideration.  Mentioning possible issues would be helpful to the reader.

Section 6
Reference to RFC2616 isn't enough for the security considerations of HTTP since that's a really old RFC.  If you want authentication options, you could point to the HTTPAuth documents, which include updated versions of HTTP basic (RFC7616) and digest (RFC7617).  While there are still lots of security issues with these options, the RFCs spell out what the actual considerations are, which are helpful to the reader.  This raises the need for TLS 1.2 as well to provide session protection for the session (passive and active attacks) as well as for the authentication used.

Section 6.1
Why isn't TLS a must here to protect the session data?
If you are relying on OAuth Bearer tokens, they offer no security protection without TLS, so to rely on this, I'd say TLS really should be a MUST.  The authentication types to get a bearer token (at least in RFC documentation and in the registry) are all pretty weak and require TLS protection to have any level of security.

With the TLS MUST, we are recommending TLS 1.2 as the minimum in drafts.  It would be good to see a mention of TLS 1.2 as a minimum recommendation and a reference to the BCP for TLS 1.2 configurations RFC7525 (it even includes cipher suite recommendations).

Privacy
I would have expected some discussion on the protection of the 2 ID types and the tracker capabilities and that session encryption (TLS) ought to be used when this is a consideration.  Is there a reason this isn't covered?  If it's not a concern, I'd like to understand why.
2015-10-13
10 Kathleen Moriarty [Ballot Position Update] New position, Discuss, has been recorded for Kathleen Moriarty
2015-10-13
10 Alvaro Retana [Ballot Position Update] New position, No Objection, has been recorded for Alvaro Retana
2015-10-12
10 Joel Jaeggli
[Ballot comment]
Neville Brownlee performed the opsdir review


Hi all:

I have performed an Operations Directorate review of
  draft-ietf-ppsp-base-tracker-protocol-10

  "This document specifies the …
[Ballot comment]
Neville Brownlee performed the opsdir review


Hi all:

I have performed an Operations Directorate review of
  draft-ietf-ppsp-base-tracker-protocol-10

  "This document specifies the base Peer-to-Peer Streaming Protocol-
  Tracker Protocol (PPSP-TP/1.0), an application-layer control
  (signaling) protocol for the exchange of meta information between
  trackers and peers.  The specification outlines the architecture of
  the protocol and its functionality, and describes message flows,
  message processing instructions, message formats, formal syntax and
  semantics."

- - - -

This is a long document describing in detail a protocol that can be
used to form a network of co-operating peers, supporting swarms for
particular content streams, and distributing that content to all peers
that are members of the stream.

The formal presentation of the protocol uses a C-style notation, and
encodes its requests and responses using JSON.  It seems to me that
there has been at least one implementation to date, therefore the
Object definitions are taken from that implementation's source code.
Reading them, I believe that the protocol is described clearly enough
to allow other independent implementations.

Having said that, there are several items which are not covered, for
example in section 1.2.2 "The specification of the format of the Peer
ID is not in the scope of this document."  I'm sure there's a good
reason for leaving that out, but implementors will need to make sure
that Peer IDs are always treated as strings (as specified in section
3.2.4).

Section 5.1, Operational Considerations, seems carefully considered;
it provides a checklist of things a service provider will need to
consider when they deploy PPSP-TP.  In particular section 5.2
(Management Considerations) points out that Management Information,
including that for Fault, Configuration, Accounting, Performance and
Security Management all expect to use other existing techniques.
That's reasonable, of course, but providers will need to plan
carefully for all that.

Section 6, Security Consideration, seems thorough, pointing out that
peers will need to cope with various kinds of other - potentially
malicious - peers.

Last, section 7 provides some guidelines for extending PPSP-TP.
This is certainly interesting, clearly the authors view PPSP-TP
as an ongoing development activity!

Overall, this document seems sound, i.e. ready for publication
as an RFC.

A few typos:
  s1    s/peers able to communicate/peers that are able to communicate/
        s/different order of the/different order to that of the/
  s1.2  s/here, as not in the scope/here, as it is not in the scope/
          /swarms corresponding each swarm to the group of peers/
            what does this mean?
  s2.2.3 s/On normal operation/In normal operation/
  s2.3.1 s/respectively responded with/respectively responded to with/
        s/responded with/responded to with/
  s2.3.2 s/transition to TERMINATE/transitions to TERMINATE/
  s3.2.5 s/peer is actively involved./peer is actively involved with./
  s4    s/The section describes/This section describes/
  s4.1.2 s/include peer_group element/include a peer_group element/
  s4.1.3 s/concurrent_links and etc./concurrent_links etc./
  s4.3  s/due to unexpected/due to an unexpected/
  s4.4  s/set a upper/set an upper/
  s7.2  s/Being security an important/Because security is an important/

Cheers, Nevil
Co-chair, SUPA WG
2015-10-12
10 Joel Jaeggli [Ballot Position Update] New position, No Objection, has been recorded for Joel Jaeggli
2015-10-12
10 Spencer Dawkins [Ballot Position Update] New position, No Objection, has been recorded for Spencer Dawkins
2015-10-12
10 Martin Stiemerling Ballot has been issued
2015-10-12
10 Martin Stiemerling [Ballot Position Update] New position, Yes, has been recorded for Martin Stiemerling
2015-10-12
10 Martin Stiemerling Created "Approve" ballot
2015-10-12
10 Martin Stiemerling Ballot writeup was changed
2015-10-12
10 Martin Stiemerling Changed consensus to Yes from Unknown
2015-10-12
10 Martin Stiemerling IESG state changed to Waiting for AD Go-Ahead from Waiting for Writeup
2015-10-08
10 (System) IESG state changed to Waiting for Writeup from In Last Call
2015-10-01
10 Tero Kivinen Request for Last Call review by SECDIR is assigned to Chris Lonvick
2015-10-01
10 Tero Kivinen Request for Last Call review by SECDIR is assigned to Chris Lonvick
2015-10-01
10 Martin Stiemerling Placed on agenda for telechat - 2015-10-15
2015-09-30
10 Gunter Van de Velde Request for Last Call review by OPSDIR is assigned to Nevil Brownlee
2015-09-30
10 Gunter Van de Velde Request for Last Call review by OPSDIR is assigned to Nevil Brownlee
2015-09-25
10 (System) IANA Review state changed to IANA - Not OK from IANA - Review Needed
2015-09-25
10 Amanda Baber
(Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs:

IANA has completed its review of draft-ietf-ppsp-base-tracker-protocol-10. If any part of this review is inaccurate, please let us know.

IANA …
(Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs:

IANA has completed its review of draft-ietf-ppsp-base-tracker-protocol-10. If any part of this review is inaccurate, please let us know.

IANA has questions about the actions requested by this document.

IANA believes that this document is requesting two actions, but it may be asking for a third.

First, IANA will register the following media type at http://www.iana.org/assignments/media-types, using the template provided in Section 8.1:

application/ppsp-tracker+json  [RFC-ietf-ppsp-base-tracker-protocol-10]

QUESTION: The first sentence of Section 8.1 says, "This document defines registry for application/ppsp-tracker+json media types."

Should "registry" be replaced with "registration"? Or is this sentence referring to the registry in Section 8.2? If neither of these, this section is missing registry creation instructions.

Second, IANA will create the following registry at a location to be determined:

Registry Name: PPSP Tracker Protocol Version Number Registry
Registration Procedure: ?
Reference: this document

ppsp_tp_version_t  Description    Reference
----------------------------------------------------------+
0                |  Reserved                            |  this document
1                |  Protocol specified in this document |  this document
2-255        |  Unassigned

QUESTION: What's the registration procedure for this registry? For examples, see Section 4.1 of RFC 5226.

QUESTIONS FOR THE CHAIRS: Should this registry be placed at http://www.iana.org/assignments/ppspp?

If not, 1) should the registry be created at a new URL, and 2) would an existing category at http://www.iana.org/protocols be appropriate, or should we create a new one?

Note:  The actions requested in this document will not be completed until the document has been approved for publication as an RFC. This message is only to confirm what actions will be performed.
2015-09-24
10 Jean Mahoney Request for Last Call review by GENART is assigned to Vijay Gurbani
2015-09-24
10 Jean Mahoney Request for Last Call review by GENART is assigned to Vijay Gurbani
2015-09-24
10 Amy Vezza IANA Review state changed to IANA - Review Needed
2015-09-24
10 Amy Vezza
The following Last Call announcement was sent out:

From: The IESG
To: IETF-Announce
CC:
Reply-To: ietf@ietf.org
Sender:
Subject: Last Call:  (PPSP Tracker Protocol-Base Protocol (PPSP-TP/1.0)) …
The following Last Call announcement was sent out:

From: The IESG
To: IETF-Announce
CC:
Reply-To: ietf@ietf.org
Sender:
Subject: Last Call:  (PPSP Tracker Protocol-Base Protocol (PPSP-TP/1.0)) to Proposed Standard


The IESG has received a request from the Peer to Peer Streaming Protocol
WG (ppsp) to consider the following document:
- 'PPSP Tracker Protocol-Base Protocol (PPSP-TP/1.0)'
  as Proposed Standard

The IESG plans to make a decision in the next few weeks, and solicits
final comments on this action. Please send substantive comments to the
ietf@ietf.org mailing lists by 2015-10-08. Exceptionally, comments may be
sent to iesg@ietf.org instead. In either case, please retain the
beginning of the Subject line to allow automated sorting.

Abstract


  This document specifies the base Peer-to-Peer Streaming Protocol-
  Tracker Protocol (PPSP-TP/1.0), an application-layer control
  (signaling) protocol for the exchange of meta information between
  trackers and peers.  The specification outlines the architecture of
  the protocol and its functionality, and describes message flows,
  message processing instructions, message formats, formal syntax and
  semantics.  The PPSP Tracker Protocol enables cooperating peers to
  form content streaming overlay networks to support near real-time
  Structured Media content delivery (audio, video, associated timed
  text and metadata), such as adaptive multi-rate, layered (scalable)
  and multi-view (3D) videos, in live, time-shifted and on-demand
  modes.




The file can be obtained via
https://datatracker.ietf.org/doc/draft-ietf-ppsp-base-tracker-protocol/

IESG discussion can be tracked via
https://datatracker.ietf.org/doc/draft-ietf-ppsp-base-tracker-protocol/ballot/


No IPR declarations have been submitted directly on this I-D.


2015-09-24
10 Amy Vezza IESG state changed to In Last Call from Last Call Requested
2015-09-24
10 Martin Stiemerling Last call was requested
2015-09-24
10 Martin Stiemerling Ballot approval text was generated
2015-09-24
10 Martin Stiemerling Ballot writeup was generated
2015-09-24
10 Martin Stiemerling IESG state changed to Last Call Requested from AD Evaluation
2015-09-24
10 Martin Stiemerling Last call announcement was generated
2015-09-23
10 Rachel Huang New version available: draft-ietf-ppsp-base-tracker-protocol-10.txt
2015-04-29
09 Martin Stiemerling IESG state changed to AD Evaluation from Publication Requested
2015-04-28
09 Ning Zong
As required by RFC 4858, this is the current template for the Document
Shepherd Write-Up.

Changes are expected over time. This version is dated …
As required by RFC 4858, this is the current template for the Document
Shepherd Write-Up.

Changes are expected over time. This version is dated 24 February 2012.

(1) What type of RFC is being requested (BCP, Proposed Standard,
Internet Standard, Informational, Experimental, or Historic)?  Why
is this the proper type of RFC?  Is this type of RFC indicated in the
title page header?

This document describes protocol specification. So it is Proposed Standard, as indicated in the front page.

(2) The IESG approval announcement includes a Document Announcement
Write-Up. Please provide such a Document Announcement Write-Up. Recent
examples can be found in the "Action" announcements for approved
documents. The approval announcement contains the following sections:

Technical Summary

This document specifies the Peer-to-Peer Streaming Protocol Tracker Protocol (PPSP-TP), an application-layer control (signaling) protocol for the exchange of meta information between trackers and peers. The specification outlines the architecture of the protocol and its functionality, and describes message flows, message processing instructions, message formats, formal syntax and semantics.  The PPSP-TP enables cooperating peers to form content streaming overlay networks to support near real-time Structured Media content delivery (audio, video, associated timed text and metadata).

Working Group Summary

There was debate on the encoding of the protocol messages, particularly on text-based versus binary-based. Rough consensus was finally made that using text-based encoding as mandatory encoding scheme.

Document Quality

There is at least one implementation of PPSP-TP, as described in another PPSP Usage I-D. The document itself should have good quality, based on several rounds of expertise review conducted within PPSP group.

Personnel

Document shepherd is Ning Zong. Responsible AD is Martin Stiemerling

(3) Briefly describe the review of this document that was performed by
the Document Shepherd.  If this version of the document is not ready
for publication, please explain why the document is being forwarded to
the IESG.

The document should be ready for publication, after several rounds of expertise review conducted within PPSP group.

(4) Does the document Shepherd have any concerns about the depth or
breadth of the reviews that have been performed?

No concern.

(5) Do portions of the document need review from a particular or from
broader perspective, e.g., security, operational complexity, AAA, DNS,
DHCP, XML, or internationalization? If so, describe the review that
took place.

Some JSON encoding examples may need broader review from JSON experts.

(6) Describe any specific concerns or issues that the Document Shepherd
has with this document that the Responsible Area Director and/or the
IESG should be aware of? For example, perhaps he or she is uncomfortable
with certain parts of the document, or has concerns whether there really
is a need for it. In any event, if the WG has discussed those issues and
has indicated that it still wishes to advance the document, detail those
concerns here.

No concern.

(7) Has each author confirmed that any and all appropriate IPR
disclosures required for full conformance with the provisions of BCP 78
and BCP 79 have already been filed. If not, explain why.

No IPR disclosure yet.

(8) Has an IPR disclosure been filed that references this document?
If so, summarize any WG discussion and conclusion regarding the IPR
disclosures.

No IPR disclosure yet.

(9) How solid is the WG consensus behind this document? Does it
represent the strong concurrence of a few individuals, with others
being silent, or does the WG as a whole understand and agree with it? 

WG consensus represents a strong agreement among a few individuals.

(10) Has anyone threatened an appeal or otherwise indicated extreme
discontent? If so, please summarise the areas of conflict in separate
email messages to the Responsible Area Director. (It should be in a
separate email because this questionnaire is publicly available.)

No.

(11) Identify any ID nits the Document Shepherd has found in this
document. (See http://www.ietf.org/tools/idnits/ and the Internet-Drafts
Checklist). Boilerplate checks are not enough; this check needs to be
thorough.

Checked, and no error found.

(12) Describe how the document meets any required formal review
criteria, such as the MIB Doctor, media type, and URI type reviews.

No such review required.

(13) Have all references within this document been identified as
either normative or informative?

Yes.

(14) Are there normative references to documents that are not ready for
advancement or are otherwise in an unclear state? If such normative
references exist, what is the plan for their completion?

No such normative reference.

(15) Are there downward normative references references (see RFC 3967)?
If so, list these downward references to support the Area Director in
the Last Call procedure.

No such normative reference.

(16) Will publication of this document change the status of any
existing RFCs? Are those RFCs listed on the title page header, listed
in the abstract, and discussed in the introduction? If the RFCs are not
listed in the Abstract and Introduction, explain why, and point to the
part of the document where the relationship of this document to the
other RFCs is discussed. If this information is not in the document,
explain why the WG considers it unnecessary.

No change to existing RFCs.

(17) Describe the Document Shepherd's review of the IANA considerations
section, especially with regard to its consistency with the body of the
document. Confirm that all protocol extensions that the document makes
are associated with the appropriate reservations in IANA registries.
Confirm that any referenced IANA registries have been clearly
identified. Confirm that newly created IANA registries include a
detailed specification of the initial contents for the registry, that
allocations procedures for future registrations are defined, and a
reasonable name for the new registry has been suggested (see RFC 5226).

New registry for media type in HTTP/1.1 header is proposed, as part of PPSP-TP encoding scheme.

(18) List any new IANA registries that require Expert Review for future
allocations. Provide any public guidance that the IESG would find
useful in selecting the IANA Experts for these new registries.

No.

(19) Describe reviews and automated checks performed by the Document
Shepherd to validate sections of the document written in a formal
language, such as XML code, BNF rules, MIB definitions, etc.

2015-04-28
09 Ning Zong IETF WG state changed to Submitted to IESG for Publication from WG Document
2015-04-28
09 Ning Zong IESG state changed to Publication Requested from AD is watching
2015-04-28
09 Ning Zong
As required by RFC 4858, this is the current template for the Document
Shepherd Write-Up.

Changes are expected over time. This version is dated …
As required by RFC 4858, this is the current template for the Document
Shepherd Write-Up.

Changes are expected over time. This version is dated 24 February 2012.

(1) What type of RFC is being requested (BCP, Proposed Standard,
Internet Standard, Informational, Experimental, or Historic)?  Why
is this the proper type of RFC?  Is this type of RFC indicated in the
title page header?

This document describes protocol specification. So it is Proposed Standard, as indicated in the front page.

(2) The IESG approval announcement includes a Document Announcement
Write-Up. Please provide such a Document Announcement Write-Up. Recent
examples can be found in the "Action" announcements for approved
documents. The approval announcement contains the following sections:

Technical Summary

This document specifies the Peer-to-Peer Streaming Protocol Tracker Protocol (PPSP-TP), an application-layer control (signaling) protocol for the exchange of meta information between trackers and peers. The specification outlines the architecture of the protocol and its functionality, and describes message flows, message processing instructions, message formats, formal syntax and semantics.  The PPSP-TP enables cooperating peers to form content streaming overlay networks to support near real-time Structured Media content delivery (audio, video, associated timed text and metadata).

Working Group Summary

There was debate on the encoding of the protocol messages, particularly on text-based versus binary-based. Rough consensus was finally made that using text-based encoding as mandatory encoding scheme.

Document Quality

There is at least one implementation of PPSP-TP, as described in another PPSP Usage I-D. The document itself should have good quality, based on several rounds of expertise review conducted within PPSP group.

Personnel

Document shepherd is Ning Zong. Responsible AD is Martin Stiemerling

(3) Briefly describe the review of this document that was performed by
the Document Shepherd.  If this version of the document is not ready
for publication, please explain why the document is being forwarded to
the IESG.

The document should be ready for publication, after several rounds of expertise review conducted within PPSP group.

(4) Does the document Shepherd have any concerns about the depth or
breadth of the reviews that have been performed?

No concern.

(5) Do portions of the document need review from a particular or from
broader perspective, e.g., security, operational complexity, AAA, DNS,
DHCP, XML, or internationalization? If so, describe the review that
took place.

Some JSON encoding examples may need broader review from JSON experts.

(6) Describe any specific concerns or issues that the Document Shepherd
has with this document that the Responsible Area Director and/or the
IESG should be aware of? For example, perhaps he or she is uncomfortable
with certain parts of the document, or has concerns whether there really
is a need for it. In any event, if the WG has discussed those issues and
has indicated that it still wishes to advance the document, detail those
concerns here.

No concern.

(7) Has each author confirmed that any and all appropriate IPR
disclosures required for full conformance with the provisions of BCP 78
and BCP 79 have already been filed. If not, explain why.

No IPR disclosure yet.

(8) Has an IPR disclosure been filed that references this document?
If so, summarize any WG discussion and conclusion regarding the IPR
disclosures.

No IPR disclosure yet.

(9) How solid is the WG consensus behind this document? Does it
represent the strong concurrence of a few individuals, with others
being silent, or does the WG as a whole understand and agree with it? 

WG consensus represents a strong agreement among a few individuals.

(10) Has anyone threatened an appeal or otherwise indicated extreme
discontent? If so, please summarise the areas of conflict in separate
email messages to the Responsible Area Director. (It should be in a
separate email because this questionnaire is publicly available.)

No.

(11) Identify any ID nits the Document Shepherd has found in this
document. (See http://www.ietf.org/tools/idnits/ and the Internet-Drafts
Checklist). Boilerplate checks are not enough; this check needs to be
thorough.

Checked, and no error found.

(12) Describe how the document meets any required formal review
criteria, such as the MIB Doctor, media type, and URI type reviews.

No such review required.

(13) Have all references within this document been identified as
either normative or informative?

Yes.

(14) Are there normative references to documents that are not ready for
advancement or are otherwise in an unclear state? If such normative
references exist, what is the plan for their completion?

No such normative reference.

(15) Are there downward normative references references (see RFC 3967)?
If so, list these downward references to support the Area Director in
the Last Call procedure.

No such normative reference.

(16) Will publication of this document change the status of any
existing RFCs? Are those RFCs listed on the title page header, listed
in the abstract, and discussed in the introduction? If the RFCs are not
listed in the Abstract and Introduction, explain why, and point to the
part of the document where the relationship of this document to the
other RFCs is discussed. If this information is not in the document,
explain why the WG considers it unnecessary.

No change to existing RFCs.

(17) Describe the Document Shepherd's review of the IANA considerations
section, especially with regard to its consistency with the body of the
document. Confirm that all protocol extensions that the document makes
are associated with the appropriate reservations in IANA registries.
Confirm that any referenced IANA registries have been clearly
identified. Confirm that newly created IANA registries include a
detailed specification of the initial contents for the registry, that
allocations procedures for future registrations are defined, and a
reasonable name for the new registry has been suggested (see RFC 5226).

New registry for media type in HTTP/1.1 header is proposed, as part of PPSP-TP encoding scheme.

(18) List any new IANA registries that require Expert Review for future
allocations. Provide any public guidance that the IESG would find
useful in selecting the IANA Experts for these new registries.

No.

(19) Describe reviews and automated checks performed by the Document
Shepherd to validate sections of the document written in a formal
language, such as XML code, BNF rules, MIB definitions, etc.

2015-04-28
09 Ning Zong Notification list changed to ppsp-chairs@ietf.org, draft-ietf-ppsp-base-tracker-protocol@ietf.org, "Ning Zong" <zongning@huawei.com> from ppsp-chairs@ietf.org, draft-ietf-ppsp-base-tracker-protocol@ietf.org
2015-04-28
09 Ning Zong Document shepherd changed to Ning Zong
2015-03-26
09 Rachel Huang New version available: draft-ietf-ppsp-base-tracker-protocol-09.txt
2015-01-11
08 Rachel Huang New version available: draft-ietf-ppsp-base-tracker-protocol-08.txt
2014-12-11
07 Rui Cruz New version available: draft-ietf-ppsp-base-tracker-protocol-07.txt
2014-10-27
06 Jinwei Xia New version available: draft-ietf-ppsp-base-tracker-protocol-06.txt
2014-07-25
05 Martin Stiemerling IESG state changed to AD is watching from Dead
2014-07-03
05 Rui Cruz New version available: draft-ietf-ppsp-base-tracker-protocol-05.txt
2014-07-03
04 Rui Cruz New version available: draft-ietf-ppsp-base-tracker-protocol-04.txt
2014-07-03
03 (System) Document has expired
2014-07-03
03 (System) IESG state changed to Dead from AD is watching
2013-12-30
03 Jinwei Xia New version available: draft-ietf-ppsp-base-tracker-protocol-03.txt
2013-10-21
02 Rui Cruz New version available: draft-ietf-ppsp-base-tracker-protocol-02.txt
2013-08-27
01 Martin Stiemerling Intended Status changed to Proposed Standard
2013-08-27
01 Martin Stiemerling IESG process started in state AD is watching
2013-07-11
01 Rui Cruz New version available: draft-ietf-ppsp-base-tracker-protocol-01.txt
2013-02-14
00 Rui Cruz New version available: draft-ietf-ppsp-base-tracker-protocol-00.txt