IESG Narrative Minutes
Narrative Minutes of the IESG Teleconference on 2008-07-17. These are not an official record of the meeting.
Narrative scribe: John Leslie (The scribe was often uncertain who was speaking.)
Corrections from: Russ, Dan, Tim, Magnus
1 Administrivia
- Roll Call 1134 EDT Amy:
- Loa Andersson---y
- Jari Arkko---y
- Marc Blanchet---
- Ron Bonica---y
- Ross Callon---y
- Michelle Cotton---y
- Spencer Dawkins---
- Lisa Dusseault---y
- Lars Eggert---y
- Pasi Eronen---y
- Marshall Eubanks---
- Sandy Ginoza---y
- Russ Housley---y
- Cullen Jennings---y
- Olaf Kolkman---on vacation
- John Leslie---y
- Cindy Morgan---y
- Chris Newman---y
- Ray Pelletier---
- Jon Peterson---y
- Tim Polk---y
- Dan Romascanu---y
- Mark Townsley---y
- Amy Vezza---y
- Dave Ward---expected late
- Magnus Westerlund---y
- Bash the Agenda
- Approval of the Minutes of the past telechat
- July 3 minutes--- no obj
- July 3 narrative minutes--- no obj
- Review of Action Items from last Telechat
- Magnus Westerlund to draft an IESG Statement on BCP 32. still in progress
2 Protocol Actions
2.1 WG submission
2.1.1 - New Items
- Management Event Management Information Base (MIB) for PacketCable- and IPCablecom-Compliant Devices (Proposed Standard)
draft-ietf-ipcdn-pktc-eventmess-13.txt
Token: Dan Romascanu Note: Richard Woundy [Richard_Woundy@cable.comcast.com] is the PROTO shepherd of this document.
Extracted from Balloting:
- Lars Eggert: Discuss [2008-07-13]: The default for pktcEventSyslogTransport is syslog transport over TLS, but port 514 is only reserved for syslog over UDP. 514 should be changed to the port number allocated by IANA for draft-ietf-syslog-transport-tls, which is currently with the RFC Editor.
Comment [2008-07-11]: Section 6., paragraph 32: Please define what exactly is meant by non-routable addresses.
- Pasi Eronen: Discuss [2008-07-17]: Spelling of SyslogSeverityMask labels should be aligned with SyslogSeverity labels. Also affects DESCRIPTION text of pktcEventClassSeverity and pktcEventReporting.
- Cullen Jennings: Comment [2008-07-16]: This was one of the most easy to understand MIBs I have read. Thanks.
Telechat:
- Amy: couple of open
Jari: no pos
Chris: no pos
- Dan: no need to discuss today; AD followup
- A Two-way Active Measurement Protocol (TWAMP)
(deleted from agenda by mistake)
draft-ietf-ippm-twamp-08.txt
Token: Lars Eggert Note: Document Shepherd: Henk Uijterwaal (henk@ripe.net)
Extracted from Balloting:
- Magnus Westerlund: Comment [2008-07-15]: Section 4.2.1: "with the implication that the later two modes will not fit in a single ATM cell"
Is this comment at all relevant as there will be an IP and UDP header on the packet also, making the smallest packet size become 28+41? Or is the intention to allow the format to be used with other encapsulations than IP/UDP? Then I would expect a clearer description of this fact and recommendation on what is necessary for that usage.
Telechat:
- Amy: item put back on agenda that was deferred this morning; turns out that's against the rules
- (great confusion)
- Amy: need at least one more ballot even if Tim goes no-obj, Ron, Lisa, Pasi... all no-obj; AD followup; on agenda Aug 14
- Carrying Location Objects in RADIUS and Diameter (Proposed Standard)
draft-ietf-geopriv-radius-lo-19.txt
Token: Cullen Jennings
Extracted from Balloting:
- Lars Eggert: Discuss [2008-07-11]:
Section 4.7., paragraph 8: why is it useful to allow an out-of-band agreement to override protocol semantics?
Section 8.1., paragraph 6: It is up to the IESG to appoint designated experts
Section 11.2., paragraph 5: should this be a normative ref?
Comment [2008-07-11]:
Section 4.1., paragraph 17: Suggest to move this example down to the description of the REALM namespace
Section 4.2., paragraph 2: Why is this a SHOULD and not a MUST?
Section 4.4., paragraph 19: The APP ADs should look at this.
Section 4.4., paragraph 21: Are there any protocol or encoding mechanisms in place to prevent this sharing, or do we simply trust the other end to conform to our wishes? (Same issue applies to "retention-expires".)
Section 4.6., paragraph 1: Why is this a SHOULD NOT? When is it permissible to challenge?
Section 6., paragraph 2: (don't abbreviate RFC2119 terms)
Section 8.1., paragraph 3: The ADs are at ops-ads@ietf.org.
Section 8.2., paragraph 6: It's usually much safer to deprecate registry entries or to make them historic, compared to simply removing them.
Section 9., paragraph 1: It's a bit unusual to thank a co-author, but hey :-)
- Russ Housley: Discuss [2008-07-12]: There was a dialogue between Glen Zorn and Bernard Aboba during IETF Last Call. I expected the dialogue to result in changes to the document... Yet, the document has not been updated and there are not notes to the RFC Editor to resolve this issue.
- Tim Polk: Discuss [2008-07-17]: This is a Discuss Discuss. I will either move to No Object or revise to make this actionable after the call.
This specification permits multiple Location-Information and Location-Data attribute pairs. Are there issues with respect to inconsistency between the civic and geospatial locations?
Are there good reasons to request (or supply) both locations? I could imagine scenarios where both locations are known with sighting times, or wildly different granularities and this could result in
conflicting authorization decisions or billing results. Should the spec provide any guidance?
- Dan Romascanu: Discuss [2008-07-17]: The content for this DISCUSS includes comments from AAA-Doctor David Nelson
based in IETF Last Call comments that seem not to have been resolved: This document needs at the very least an IESG Note calling attention to the fact that certain of the RADIUS attributes fail to meet either the letter or spirit of the RADIUS Design Guidelines as to what may properly constitute an "opaque" attribute. Opaque attributes are those that are carried in RADIUS, but not parsed or directly acted upon by a RADIUS server.
This issue was discussed with the authors and in comments upon various early versions of the draft on the RADEXT WG mailing list (some CC'ed to the GEOPRIV WG mailing list).
In fairness, some improvement in attribute design has occurred with successive versions. Still, there are several attributes that define sub-fields within
them, contrary to the guidance of the RADIUS Design Guidelines. The most recent discussion of these issues occurred during IETF Last Call on the draft.
There are good reasons for the guidelines. One of the design principles is to allow RADIUS servers to "enroll" new attributes by means of additions of a data dictionary. A second issue is whether RADIUS servers are expected to be able to parse and act upon these various defined "string" data sets. In the IETF Last Call discussion, these seemed to be some confusion as to whether this document required RADIUS servers (at least those implementing these attributes) to be "location aware" i.e. to be able to parse and act intelligently upon the content of the location information.
Another RADIUS design / documentation principle is that one does not define the functionality of a *service* in a RADIUS document. If the GEOPRIV Location Information attributes require the complex, structured attribute values, as present in the current draft, then use of RADIUS Extended Attributes, which provide a formalized mechanism for structuring and grouping, is the recommended design practice.
It looks that the least that is required of this document is to point out the inconsistencies with the RADIUS Design Guidelines, and warn readers of the document not to consider it a precedent for new design work, but rather steer them to the RADIUS Design Guidelines document for design guidance.
Comment [2008-07-17]: In the table in Section 8.1 please change s/ops-chairs@ietf.org/ops-ads@ietf.org/
Telechat:
- Open, Ron, Lisa, Pasi, Chris, Jon, Mark, all no-pos
- Cullen: should discuss, apologize for not reading email this morning
- Dan: second part of Discuss, design guidelines still in WG, RADIUS extension definition; could go with Category-1 type of solution, noting inconsistency; don't wish to block document.
- Cullen: help me fix that; the rest of the discusses, I think we can work out; your IESG note has nothing to do with RAI, give WG choice IESG note vs. substantial revision
- Jari: I agree with alternative-1
- Cullen: at some level I can ignore rules in document not yet done, but the issues are real and should be considered.
- Tim: conflicting Civil & geospatial locations issue
- Cullen: case we discussed was client choosing which to send; this case is more likely to send both; people will request one or other;
- Tim: I'll clear
- Cullen: Think everyone knew the issue and will accept ending up this way; AD followup
- Extensible Markup Language (XML) Format Extension for Representing Copy Control Attributes in Resource Lists (Proposed Standard)
draft-ietf-sipping-capacity-attribute-06.txt
Token: Jon Peterson
Extracted from Balloting:
- Lars Eggert: Comment [2008-07-11]: Miguel's affiliation and email address have recently changed.
Telechat:
- Amy: one Discuss
- Jon: have authors replied? I want to hear their opinion
- Chris: think there's something missing (re bcc)
- Jon: AD followup
- Ethernet Pseudowire (PW) Management Information Base (MIB) (Proposed Standard)
draft-ietf-pwe3-enet-mib-13.txt
Token: Mark Townsley
Extracted from Balloting:
- Russ Housley: Comment [2008-07-12]: Please remove "Comments should be made directly to the PWE3 mailing list"
- Dan Romascanu: Comment [2008-07-16]: [typos, mostly]
--- Conformance description... Normally (as listed in RFC4181) we order then with Compliances first and then Groups.
In the Security Considerations section: - the security threat resulting from intentional or unintentional mis-configuration of the obects in the pwEnetTable should be explicitly stated
Telechat:
- Amy: no open, no discuss, hearing no obj, approved; no notes
- Pseudowire (PW) over MPLS PSN Management Information Base (MIB) (Proposed Standard)
draft-ietf-pwe3-pw-mpls-mib-14.txt
Token: Mark Townsley
Extracted from Balloting:
- Pasi Eronen: Comment [2008-07-01]: Editorial nits from Stephen Hanna's SecDir review:
- Russ Housley: Comment [2008-07-12]: Please remove "Comments should be made directly to the PWE3 mailing list"; Please expand "PSN" the first time it is used.
- Dan Romascanu: Comment [2008-07-16]: The comments are partiallybased on the MIB Doctor review performed by Orly Niklass
In the Security Considerations section: - the security threat resulting from intentional or unintentional mis-configuration of the obects in the pwEnetTable should be explicitly stated
--- Conformance description... Normally (as listed in RFC4181) we order then with Compliances first and then Groups.
Telechat:
- Amy: no open, no discuss, hearing no obj, approved; no notes
- OSPF Extensions in Support of Inter-AS Multiprotocol Label Switching (MPLS) and Generalized MPLS (GMPLS) Traffic Engineering (Proposed Standard)
draft-ietf-ccamp-ospf-interas-te-extension-05.txt
Token: Ross Callon
Extracted from Balloting:
- Russ Housley: Comment [2008-07-16]: Based on the Gen-ART Review by Joel Halpern: The last sentence of the Abstract is not clear.
Please add a note to the introductory material in section 3 that provides the rationale for this extension
- Tim Polk: Discuss [2008-07-17]: The last sentence in the security considerations merits expansion: "Note, further, that if BGP is used to exchange TE information as described in Section 4.1, the inter-AS BGP session will need to be fully secured." Are we talking about authenticating the origin of the information (which corresponds to the scope of 4.1) or is confidentiality required as well?
- David Ward: Discuss [2008-07-16]:
Section 2.2 needs proper referencing of path msg, ero, etc
section 3: runon sentence:
3.x: It is infinitely easier to understand the bit placement and definition if the LSAs are actually diagrammed.
3.2.1 Is this expected to be a common practice: "Note that it is possible to include the IPv6-Remote-ASBR-ID sub-TLV in the Link TLV of the Inter-AS-TE-v2 LSA, and to include the IPv4-Remote-ASBR-ID sub-TLV in the Link TLV of the Inter-AS-TE-v3 LSA because the sub-TLVs refer to ASBRs that are in a different addressing scope (that is, a different AS) from that where the OSPF LSA is used." Seems like a great way to fubar yourself.
3.3.1 What happens during a transition from 2 byte to 4 byte AS? can this be done seemlessly by refloding the LSAs? What about a transition of ASN?
Section 5: Should there be a MUST check if this is the case: "It is worth noting that in the scenario we are considering a Border Gateway Protocol (BGP) peering may
exist between the two ASBRs and this could be used to detect inconsistencies in configuration. For example, if a different remote AS number is received in a BGP OPEN [BGP] from that locally configured into OSPF-TE, as we describe here, then something is amiss. Note, further, that if BGP is used to exchange TE information as described in Section 4.1, the inter-AS BGP session will need to be fully secured." vs "something is amiss?"
General question: -- If the link to another AS is on a bcast media shared w/ connectivity to other AS', what should TE values should be flooded? What happens if a peering link is flapping?
Telechat:
- Amy: a few open: Jari (no response), Chris, no pos
- Ross: think we'll need revised-ID, discuss off-line
- Extensions to the Path Computation Element Communication Protocol (PCEP) for Route Exclusions (Proposed Standard)
draft-ietf-pce-pcep-xro-05.txt
Token: Ross Callon
Extracted from Balloting:
- Tim Polk: Comment [2008-07-17]: In security considerations section, the phrase "increases the risk" begs the question "what risk?" After reviewing pce-pcep-12, I would hazard a guess that the increases in risk are limited to PCEP Privacy (section 10.2 of pce-pcep) and possibly the DOS attacks described under Request Input Shaping/Policing (section 10.3.2 of pce-pcep). If my analysis is correct, it would be nice to expand on "risk" and explicitly identify the concerns. If other risks are impacted by this specification, that would be very helpful as well.
- Dan Romascanu: Comment [2008-07-15]: The Manageability Consideration section includes a reference to a PCEP MIB document... Actually right now there is no PCEP MIB in works. If a PCEP MIB will be the object of future work the text needs to be changed accordingly to avoid confusion.
- David Ward: Discuss [2008-07-16]: Need 4 byte ASN support.
I'd beef up the security section w/ more from 3.1.1 but, I get both sections as is.
Telechat:
- Amy: number of open: no Jari, Ron (no pos), Chris (no pos), Magnus (no obj)
- Ross: very short sentence of Dave's discuss will require revised-ID
2.1.2 Returning Items
- GIST: General Internet Signalling Transport (Proposed Standard)
draft-ietf-nsis-ntlp-16.txt
Token: Magnus Westerlund WG Shepherd: Martin Stimerling. Note: Please re-evaluate your abstains
Extracted from Balloting:
- Ross Callon: Comment [2007-04-03]: I changed my vote to "abstain" because I still feel that this should be "experimental"... To me this appears to have very substantial implications on routers, hosts, and
other devices as well.
- Brian Carpenter: Comment [2007-03-16]: [Yes, these Comments really _are_ that old!]
I'm very doubtful about the real deployability of GIST; these extracts say why:
1.1. Restrictions on Scope: the path taken by a single flow in the network may not be well defined. If this is the case, GIST cannot route signaling meaningfully.
2007-03-16: This text has disappeared in version -11, but elsewhere in the document I find: "This specification does not define mechanisms for GIST to manage multiple parallel routes or an unstable route."
Legacy NATs: GIST messages will generally pass through NATs, but unless the NAT is GIST-aware, any addressing data carried in the payload will not be handled correctly.
2007-03-16: This text has disappeared in version -11, and section 7.2.1 has been added. That is good, but it does document that in some NAT scenarios, GIST will simply fail.
Is it certain that flow splitting can't be handled by an extension to the route change mechanism?
- Bill Fenner: Comment [2006-09-27]: No Further Objection. My concerns are adequately covered by several other DISCUSSes.
- Cullen Jennings: Comment [2008-04-03]: Both the routing AD have abstained on this because they do not believe it is appropriate for internet routing. I have heard their arguments, believe they are
sound, and support their position.
- Chris Newman: Comment [2007-04-12]: This document is so long and complex that I consider it highly unlikely it will deploy. As a result I am not concerned it will cause harm to the infrastructure. Because the WG delivered on its charter item I will vote no objection. Were this an individual submission, I would probably abstain.
- Tim Polk: Comment [2008-03-27]: I have a vaguely uneasy feeling on this document... the complexity seems to be substantial. I am joining the ABSTAINs for now, I could change my position if convinced this is both implementable and not dangerous to the Internet. If I do change my position, I would move to DISCUSS to address the following issue.
Support for TLS is required, but different modes may be selected (e.g., different ciphersuites and authentication mechanisms). These changes significantly impact the security provided (and as a result, the degree to which the requirements in 4081 are met.) The security considerations section should elaborate on the impact of server-only vs. mutually authenticated TLS, as well as alternative authentication procedures, with respect to the various requirements.
Telechat:
- Amy: one open, Pasi said no-pos
- Magnus: we asked folks to revisit their Abstain: we fixed the main issue everyone was complaining about
- Russ: should wait for Dave's input
- Magnus: we had a way forward, why can't it work
- Ross?: I see the same problem that router-alert had. Problem is having to pull traffic from forwarding to control plane
- Mark: I get very uneasy when we ask router to snoop something, know we've done it before, we can't just say no
- Magnus: come back to this when Dave available
(later in Telechat):
- Dave Ward joined
- Amy: can we go back to routing
- Magnus: thought we had a reasonable resolution
- Dave: we're working on a router-alert-dangerous document; will require filtering between access and core. Recommends that all protocol must be able to fall back to filtering on tuple.
- Magnus: Ron said tuple filtering will affect the control plane in the routers
- Dave: if you are not configured to process, you are required to drop it. If using GIST, you can fubar yourself
- Ron: any core router trying to do this has same problems as router-alert. How about an IESG note saying routers in the core are expected not to do this snooping.
- Magnus: NSIS is an opt-in mechanism, and I don't expect core routers to be NSIS aware. So I don't see a problem with this.
- Dave: I thought you were going to add text saying this would only be turned on only in special cases.
- Russ: Once Ron and Dave change from Abstain to no-obj, will we have enough approve the document?
- Tim: I just moved to No Object; you need three more
- Cullen: I'll strongly consider
- Amy: AD followup
2.2 Individual Submissions
2.2.1 New Items
- Ogg Media Types (Proposed Standard)
draft-goncalves-rfc3534bis-07.txt
Token: Magnus Westerlund Note: Intended for AD sponsoring
Extracted from Balloting:
- (none)
Telechat:
- Amy: couple open: Jari (no pos), Dave (not here), no discuss; hearing no obj, approved; RFCed note is correct.
- Using Authenticated Encryption Algorithms with the Encrypted Payload of the Internet Key Exchange version 2 (IKEv2) Protocol (Proposed Standard)
draft-black-ipsec-ikev2-aead-modes-01.txt
Token: Tim Polk Note: pseudo Last Call on ipsec@ietf.org
Extracted from Balloting:
- Pasi Eronen: Comment [2008-07-17]:
Section 12: the numeric identifiers should be "TBD-BY-IANA"
Section 1, "The current version of ESP is version 2, ESPv2 [RFC4303]": its version 3 (v1 was RFC 1827; and the draft that became RFC4303 was also named draft-ietf-ipsec-esp-v3).
Telechat:
- Amy: no open, no discuss, hearing no obj, approved; RFCed notes OK?
- Tim: may be one more change
- Amy: approved, point raised
2.2.2 Returning Items
- (none)
3 Document Actions
3.1 WG Submissions
3.1.1 New Items
- A Framework for Packet Selection and Reporting (Informational)
draft-ietf-psamp-framework-13.txt
Token: Dan Romascanu
Extracted from Balloting:
- (none)
Telechat:
- Amy: no discuss, hearing no obj, approved, no notes
- TCP's Reaction to Soft Errors (Informational)
draft-ietf-tcpm-tcp-soft-errors-08.txt
Token: Lars Eggert
Extracted from Balloting:
- Jari Arkko: Discuss [2008-07-17]: This is a welcome document, and a very useful spec to publish. I have a few issues with the document, however.
First, I was unable to find any evidence of review from the 6MAN or V6OPS communities. Has there been such review, and if not, can we ensure it happens now?
Section 2.1 says: When receiving an ICMP error message that indicates a hard error condition, TCP will simply abort the corresponding connection, regardless of the connection state.
Question. ICMP errors can be due to denial-of-service
Section 3.2 [soft errors]: Clarity. This is somewhat misleading. When the node has no default routers it also has no prefixes, no global addresses and it will not even try to use IPv6 towards other global addresses. That is not a soft error situation as described by this document.
- Russ Housley: Discuss [2008-07-16]: I have not seen a response to the comments in the SecDir Review
Telechat:
- Amy: couple of discusses
- Lars: checking whether I've seen them all. per Jari, know some guys in Japan looked at this
- Jari: think we simply have to call for better review: critical for IPv6 deployment
- Lars: author won't be in Dublin; AD followup, we'll see if we can schedule something in Dublin
- Jari: two other issues, one easy, other concerns believing DoS
- Lars: Sequence Number check works reasonably well; ICMP doesn't guarantee anything about delay (may be out of window by the time you get it). AD followup
- Analysis of Inter-domain Label Switched Path (LSP) Recovery (Informational)
draft-ietf-ccamp-inter-domain-recovery-analysis-05.txt
Token: Ross Callon
Extracted from Balloting:
- (none)
Telechat:
- Amy: no discuss, any objection
- Ross: is there a GenArt review started?
- Russ: No, we missed the window. So, did quality review happen?
- Ross: A lot of review in a very active WG
- Amy: approved, no notes
- Inter-AS Requirements for the Path Computation Element Communication Protocol (PCEP) (Informational)
draft-ietf-pce-interas-pcecp-reqs-06.txt
Token: Ross Callon
Extracted from Balloting:
- (none)
Telechat:
- Russ: much the same; much more concerned about this one; tempted to hit defer button
- Ross: don't remember discussion settling on protocol design
- Russ: Requirement docs sometimes come so late that review would be meaningless
- Ross: give me a few minutes
- Russ: -- come back to this at the end of Section 4
(later in Telechat):
- Ross: I think requirements are likely to influence the work: thus a LastCall may be appropriate; If we decide to LastCall, do I just change the state to LastCall requested?
- Amy: LastCall requested, regular LC text
- Loa: what about downref problem?
- Ross: that should be part of LastCall comments
- AAA Goals for Mobile IPv6 (Informational)
draft-ietf-mext-aaa-ha-goals-01.txt
Token: Jari Arkko
Extracted from Balloting:
- Russ Housley: Discuss [2008-07-12]: Eric Gray posted a Gen-ART Review of during IETF Last Call, but it has not received a response.
- Tim Polk: Comment [2008-07-17]: In section 4.2, Integrated Scenario, the acronym AAAH is introduced without any explanation. I finally found it in RFC 4285. That was painful, and could have been avoided by either noting that some terms are extracted from [5] in section 2, Terminology, or expanding it on first use.
Nits: Section 4.1, 4.2
Telechat:
- Amy: discuss in tracker
- Jari: chairs and authors working on response, AD followup
3.1.2 Returning Items
- (none)
3.2 Individual Submissions via AD
3.2.1 New Items
- (none)
3.2.2 Returning Items
- (none)
3.3 Independent Submissions via RFC Editor
3.3.1 New Items
- Cisco Systems' Private VLANs: Scalable Security in a Multi-Client Environment (Informational)
draft-sanjib-private-vlan-09.txt
Token: Mark Townsley Note: This is an independent submission, going on telechat for RFC3932 check.
Extracted from Balloting:
- Jari Arkko: Comment [2008-07-17]: I support Lars's Discuss.
In addition, in my quick review I came to the conclusion that its hard to classify this as anything else than RFC 3932 response 1. No protocol is extended, this is merely a way to use bridges and set up subnets.
Having said that, I have real concerns about the document. For instance, the document does not contain the words "multicast" or "IPv6" and explain what its arrangement does for those. The document does not explain what, if anything, breaks when you do this. I suspect something does. Also, I would be very interested in understanding the role of this document vs. deployment models in DSL. If this is something that DSL Forum would be relying on, for instance, we should rather review this in the IETF so that some of the above issues could be checked. Or is this purely a vendor spec?
- Lars Eggert: Discuss [2008-07-11]: Mark, which RFC3932 response are you proposing for this document? (Putting this in as a discuss so it doesn't slip through.)
Telechat:
- Amy: couple of discusses
- Mark: didn't get IESG note in there; I'll try to sort it out while we move to something else
- (interrupted for resumed discussion of draft-ietf-nsis-ntlp-16.txt and draft-ietf-pce-interas-pcecp-reqs-06.txt)
- Mark: IESG note #2; also not found any conflict
- Jari: concerned about conflicts vs. DSL forum
- Mark: as far as I know this work isn't being considered in DSL forum
- Cullen: I've cleared
- Amy: Cullen and Lars cleared, approved with existing note
3.3.2 Returning Items
- (none)
3.3.3 For Action
- ECC Brainpool Standard Curves and Curve Generation (Informational)
draft-lochter-pkix-brainpool-ecc-01.txt
Token: Tim Polk
(No Balloting link)
Telechat:
- Amy: usually to assign AD
- Russ: assigned to Tim; we're good
1257 EDT break
Cullen: don't expect I'll be back, I've no problem with Management items.
130 EDT back
- Loa Andersson---y
- Jari Arkko---
- Marc Blanchet---
- Ron Bonica---y
- Ross Callon---y
- Michelle Cotton---y
- Spencer Dawkins---
- Lisa Dusseault---y
- Lars Eggert---y
- Pasi Eronen---y
- Marshall Eubanks---
- Sandy Ginoza---y
- Russ Housley---y
- Cullen Jennings---
- Olaf Kolkman---
- John Leslie---y
- Cindy Morgan---y
- Chris Newman---y
- Ray Pelletier---
- Jon Peterson---y
- Tim Polk---y
- Dan Romascanu---y
- Mark Townsley---y
- Amy Vezza---y
- Dave Ward---y
- Magnus Westerlund---y
4 Working Group Actions
4.1 WG Creation
4.1.1 Proposed for IETF Review
- (none)
4.1.2 Proposed for Approval
- (none)
4.2 WG Rechartering
4.2.1 Under evaluation for IETF Review
- Sieve Mail Filtering Language (sieve)
Token: Lisa
Telechat:
- Amy: any obj
- Lisa: just next revision of a few (Draft Std); things actually getting adoption
- Amy: to external review, come back Aug 14
4.2.2 Proposed for Approval
- Common Control and Measurement Plane (ccamp)
Token: Ross
Telechat:
- Amy: any obj, hearing none, approved
- Multiprotocol Label Switching (mpls)
Token: Ross
Telechat:
- Amy: any obj, hearing none, approved
- Network-based Localized Mobility Management (netlmm)
Token: Jari
Telechat:
- Amy: any obj, note to check
- Jari: three types of comments came in, talk about third: what is in future? one item not now in charter: heartbeat for 3GPP, I tend to agree; didn't get high level of support earlier, but think we have enough workers now
- Russ: do you want to add it now, or start another recharter cycle?
- Jari: would it help to post that proposal to IETF list? If no objections there, I'll add it; otherwise approve without it.
- Amy: point-raised, expect edits from Jari
- Benchmarking Methodology (bmwg)
Token: Ron
Telechat:
- Amy: any obj, hearing none, approved
5. IAB News We can use
- Loa: wasn't at yesterday's meeting.
- Russ: Alcatel speaker may not be able to reschedule Wed vs. Thurs
- Mark: IAB working on NomCom stuff
6. Management Issues
- Friday Meetings in Minneapolis (Russ Housley)
Telechat:
- Russ: some discussion of Friday afternoon slots at Minneapolis, recommend we try, ask here first
- Dan: is this one-time or experiment we can extend
- Russ: yes, experiment, may be delay before we can do at future meeting; would try for contracts that accomodate it
- Ross: think it's a good idea; need to be clear when it ends; scheduling Friday afternoon would make Friday morning more real
- Russ: probably end at 3:15; do we ask community now or at Dublin
- Dan: prefer now, open mike at Dublin available
- Russ: will draft a note before Sunday
- [IANA #177572] (Michelle Cotton)
Telechat:
- Michelle, designate Expert for RFC-ietf-netlmm-proxymip6-18.txt, Jari has name to propose, any objection, approved
- Jari: he has agreed to serve.
- Approval of registration procedures for bgp-well-known-communities [IANA #178310] (Michelle Cotton)
Telechat:
- Michelle: Think Dave Ward sent something to IDR WG
- Dave: verify intent is to split last 65k to have half as first-come-first-served
- Ross: if IDR is happy, no need to come back to us
- Move L3VPN WG from INT area to RTG area (Mark Townsley)
Telechat:
- Mark: work is more related to routing, all four ADs agree
- Russ: just record that it was done, approved, done, move charter to Routing area, Ross as responsible AD, no "routing advisor"
- Statement on Errata (Cullen Jennings)
Telechat:
- (Cullen had left)
- Russ: Does anyone have concerns with text Cullen posted to IESG list? If not, let's send it to RFCed
- Amy: minutes to show: discussed
- Proposed update to ID-Checklist (Russ Housley)
Telechat:
- Russ: Bert agreed to remain editor of ID-checklist, will clarify "SHOULD"; will post that new version for further discussion
- Amy: approved; "community comments on unchanged portions will be addressed in next version"
7. Agenda Working Group News
- Jari Arkko (Internet)--- pass
- Ron Bonica (O & M)--- pass
- Ross Callon (Routing)--- pass
- Lisa Dusseault (Applications)--- at APPAREA, plan to talk about 1123 (alphabetic, is it requirement? e.g. 3COM); DNS work in APPS is OK with me.
Japan/China desire for native-script; indiv-submission seems wrong, considering possible WG, limited overlap with IDNA. Intended as advice to registrars after IDNA publishes.
2821bis discussion ongoing with John Klensin; he proposes text warning implementors not to use these examples, they're only to improve clarity; will email actual text.
re JFC Morfin MLDNS discussion, I intend to uphold WGC that IDNABIS is not the appropriate place.
- Lars Eggert (Transport)--- 2 new TCPM chairs
- Pasi Eronen (Security)--- pass
- Russ Housley (General)--- IETF trust has proposal for license stuffed into RFCs, posted for public commment, changes, one more round at Dublin.
- Cullen Jennings (RAI)--- left
- Chris Newman (Applications)--- pass
- Jon Peterson (RAI)--- pass
- Tim Polk (Security)--- pass
- Dan Romascanu (O & M)--- pass
- Mark Townsley (Internet)--- pass
- Dave Ward (Routing)--- pass
- Magnus Westerlund (Transport)--- pass
1351 EDT Adjourned