IESG Narrative Minutes, 2009-10-08

Narrative Minutes of the IESG Teleconference on 2009-10-08. These are not an official record of the meeting.

Narrative scribe: John Leslie (The scribe was sometimes uncertain who was speaking.)

Corrections from:

1 Administrivia

  1. Roll Call 1133 EDT Amy:
  2. Bash the Agenda
  3. Approval of the Minutes of the past telechat
  4. Review of Action Items from last Telechat

2 Protocol Actions

2.1 WG Submissions

2.1.1 New Item

  1. Improving TCP's Robustness to Blind In-Window Attacks (Proposed Standard)
    draft-ietf-tcpm-tcpsecure-12
    Token: Lars Eggert
    Note: IESG: Please read the Document Shepherd Writeup, we need to discuss the "Updates: 793" issue.
    IPR: Cisco's Statement about IPR Claimed in draft-ietf-tcpm-tcpsecure
    Discusses/comments (from ballot 2024):
    1. Ron Bonica: Comment [2009-10-06]:
      I don't think that UPDATES is required because...
    2. Ralph Droms: Comment [2009-10-07]:
      Whether or not this document updates RFC 793 depends...
    3. Lars Eggert: Discuss [2009-04-02]:
      we would like the IESG to voice an opinion on whether or not it would be appropriate to add "Updates: 793" to this document.
    4. Cullen Jennings: Discuss [2009-10-07]:
      ... The reset seq # is within the window but not exact. S sends and ACK, but will the firewall forward the ACK to C or just silently drop it?

    Telechat:

  2. Lightweight IGMPv3 and MLDv2 Protocols (BCP)
    draft-ietf-mboned-lightweight-igmpv3-mldv2-05
    Token: Ron Bonica
    Discusses/comments (from ballot 3121):
    1. Ron Bonica: Comment [2009-09-03]:
      This document describes lightweight IGMPv3 and MLDv2 protocols...
    2. Ralph Droms: Comment [2009-10-06]:
      INCLUDE and EXCLUDE filter-modes "are introduced" by IGMPv3 and/or MLDv2, or ???
    3. Lars Eggert: Discuss [2009-10-07]:
      Why is this a BCP and not PS?
      ... if they send an EXCLUDE to a lightweight peer they better be prepared for it to be ignored.
    4. Russ Housley: Comment [2009-10-06]:
      The Gen-ART Review by Brian Carpenter on 2009-09-01 raises a question...
    5. Cullen Jennings: Discuss [2009-10-07]:
      A document that creates a subset profile of a protocol should not be a BCP.
    6. Robert Sparks: Discuss [2009-10-07]:
      This should be PS instead of BCP...

    Telechat:

  3. IKEv2 Session Resumption (Proposed Standard)
    draft-ietf-ipsecme-ikev2-resumption-08
    Token: Pasi Eronen
    Note: Paul Hoffman (paul.hoffman@vpnc.org) is the document shepherd.
    Discusses/comments (from ballot 3144):
    1. Jari Arkko: Discuss [2009-10-08]:
      I thought I saw a few small errors and I wanted to talk to you to see if we can determine if these really are errors and whether we need to correct them.
      1. The document says: "Specifically, the SK_xx values are required to protect the IKE_AUTH payloads."
      At this point in the text, SK_xx has not been defined..., or even any specific SK value mentioned. This came out of the blue for me at least. Please clarify what you meant.
      Also, "AUTH = prf(SK_px, <message octets>) Each of the initiator and responder uses its own SK_p value, taken from the newly generated IKE SA, Section 5.1."
      SK_px does not appear in the document, what is it?
      2. The document says: "When passing a ticket by value to the client, the ticket content MUST be integrity protected and encrypted. A ticket by reference does not need to be encrypted, as it does not contain any sensitive material, such as keying material"
      There are multiple levels of crypto here, perhaps you want to be more explicit here.
      3. The document says: "A man-in-the-middle may try to eavesdrop on an exchange to obtain a ticket by value..."
      This text does not explain the issue that I brought up in item 3. I would like to see that the half-created state problem is mentioned in the security considerations text.
    2. Ralph Droms: Comment [2009-10-06]:
      What is the condition to be checked by "if so" and what is to be included based on that condition?
    3. Lars Eggert: Comment [2009-10-07]:
      Abstract Is long, and overlaps with the introduction a lot.
    4. Adrian Farrel: Comment [2009-10-08]:
      I'm assuming that the malicious corrpution or deletion of stored tickets has only a small disruptive affect on session recovery...
    5. Alexey Melnikov: Comment [2009-10-04]:
      4.3.1. Prologue... Isn't this a recipe for DoS attacks?
      7.1. TICKET_LT_OPAQUE Notify Payload... I suggest saying that the Lifetime is encoded in network byte order.
    6. Tim Polk: Discuss [2009-10-07]:
      When an IKEv2 responder decides to provide a ticket for session resumption to an IKEv2 initiator, they are implicitly trusting the initiator to manage this ticket to ensure that new sessions are not created for a different user...
    7. Dan Romascanu: Comment [2009-10-08]:
      Michael Sneed notes in his OPS-DIR review the following: Section 9.1 of the "Security Considerations"could use some clarification...

    Telechat:

  4. SIP End-to-End Performance Metrics (Proposed Standard)
    draft-ietf-pmol-sip-perf-metrics-04
    Token: Dan Romascanu
    Note: Vijay Gurbani is the PROTO-shepherd
    Discusses/comments (from ballot 3179):
    1. Lisa Dusseault: Discuss [2009-10-05]:
      I would like to talk about the competitive or anti-competitive nature of metrics as well as the meaning of putting these on the Standards Track.
      First, note that this draft by itself does not allow interoperability unless there's a standard performance monitoring protocol to transport the standardized metrics.
      Second, comparing industry implementations on this basis is not necessarily the best way to compare.
      I don't see how we have enough confidence to call this a Proposed Standard at this point; Informational would make much more sense to me
    2. Lars Eggert: Discuss [2009-10-07]:
      [GR-512] Telcordia, "LSSGR: Reliability, Section 12", GR-512- CORE Issue 2, January 1998.
      Is this a standard by another SDO? (In any event, I believe it can be made in Informative reference...)
    3. Cullen Jennings: Discuss [2009-10-07]:
      On some of these, it seems like there were multiple metrics that ended up with same name but were actually different...
      Several metrics seem like they would be messed up by HERFP and forking...
      Overall, I think that if we backed up to the 10,000 foot level and asked what problem are we going to solve with metrics and what metrics do we need, it would be much clearer how to evaluate if these metrics worked or not.
    4. Cullen Jennings: Comment [2009-10-07]:
      Meta Comment: We are still in the experimentation mode of how to bring together the operational and metrics experience of the OPS area with the SIP expertise of the RAI area. I think the ADs have some work to do to see if what improvements can be made
    5. Tim Polk: Comment [2009-10-07]:
      I support Lisa's and Robert's discusses
    6. Robert Sparks: Discuss [2009-10-06]:
      I have several concerns with this document that are captured in the message went to the PMOL list

    Telechat:

  5. Updated IANA Considerations for Diameter Command Code Allocations (Proposed Standard)
    draft-ietf-dime-diameter-cmd-iana-01
    Token: Ron Bonica
    Note: Victor Fajardo (vfajardo@research.telcordia.com) is the document shepherd.
    Discusses/comments (from ballot 3182):
    1. Lars Eggert: Comment [2009-10-07]:
      ABSTRACT: The first paragraph is unusual for an abstract (and it's repeated in the introduction), and the second paragraph needs to say that this updates RFC3588.
      Section 4., paragraph 1: I'm guessing you want to instruct IANA to start applying these as soon as this document is approved?
    2. Pasi Eronen: Comment [2009-10-05]:
      Section 3 seems to say that IETF produces better quality specifications than other organizations, and others are more likely to screw up security. I find this a bit negative and arrogant...
    3. Russ Housley: Comment [2009-10-06]:
      In the Gen-ART Review by Scott Brim on 2009-09-21:
      Not a big issue but: if you do revise it, consider putting in a little more about the motivation.
    4. Tim Polk: Comment [2009-10-06]:
      Like Pasi, I would favor rewording the Security Considerations section.
      Carl Wallace had some editorial suggestions in his secdir review...

    Telechat:

  6. Preliminary Evaluation of RFC 1652 for Advancement to Full Standard (Standard)
    draft-ietf-yam-rfc1652bis-pre-evaluation-00
    Token: Alexey Melnikov
    Note: This draft contains the list of changes planned by the YAM WG to move RFC 1652 to Full Standard. There is no intention to publish this document as an RFC, so IESG should vote on this document as if RFC 1652 is advancing to Full Standard.
    S Moonesamy <sm+ietf@elandsys.com> has agreed to serve as the document shepherd, but note that there is no shepherding write-up for this document.
    Discusses/comments (from ballot 3211):
    1. Ron Bonica: Discuss [2009-10-06]:
      Agree with Adrian. This seems more like a communication with the IESG than something that needs to be store in the RFC series for perpetuity.
    2. Ralph Droms: Comment [2009-10-06]:
      procedurally, how will we prepare an IESG response? Do we need to respond to the yam WG uncontionally or only if we think RFC 1652 will not be advanced according to the criteria set out in this doc or otherwise; e.g., Lisa's concern about security?
    3. Lisa Dusseault: Discuss [2009-10-05]:
      One of the big questions discussed about whether older email standards could go to Full Standard was whether the security provisions were sufficient... this pre-eval document doesn't address that or or make the IESG think about that.
    4. Pasi Eronen: Comment [2009-10-05]:
      the eventual advancement of RFC 1652 to Full Standard will naturally go through IETF Last Call (this draft did not go through IETF Last Call), where the community has an opportunity to provide more input.
    5. Adrian Farrel: Discuss [2009-09-29]:
      This seems like a really weird way to communicate with the IESG... I think it a shame that community resource has been burnt (e.g. SecDir review) evaluating this document as a potential RFC...
    6. Adrian Farrel: Comment [2009-09-29]:
      Section 2: "The universal deployment of this feature is well-known"
      I suspect this may be an exageration.
    7. Russ Housley: Discuss [2009-10-02]:
      This document is not a candidate for standard, which is what one would expect from the this agenda item entry...
      This document should be moved to the 'Dead' state in the tracker.
    8. Cullen Jennings: Discuss [2009-10-07]:
      I think we are beating a dead horse on a draft like this is not the best way to get input from IESG - lets find a better way in the future.
      ...Are the changes proposed in this draft the complete set of changes the WG wants to make to the above RFCs?
    9. Tim Polk: Discuss [2009-10-07]:
      I also want to discuss the implications of moving a document with known security limitations to full standard.
    10. Tim Polk: Comment [2009-10-07]:
      My personal responses wrt to the questions in section 3... could be changed during IETF Last Call for 1652bis.
    11. Robert Sparks: Comment [2009-10-07]:
      using the balloting/evaluation process this way is a poor fit to the tool and I strongly discourage taking this path again.

    Telechat:

  7. Requirements for OAM in MPLS Transport Networks (Proposed Standard)
    draft-ietf-mpls-tp-oam-requirements-03
    Token: Adrian Farrel
    Note: Loa Andersson (loa@pi.nu) is the document shepherd.
    Note that this document is a requirement document, for reasons that have
    to do with referencibility by ITU-T we have opted to put it on the standards track. The same decision applies to all MPLS-TP requirement
    documents.
    Discusses/comments (from ballot 3217):
    1. Ron Bonica: Discuss [2009-10-06]:
      In Section 2.1.3 you say: "In some environments (e.g., MPLS-TP environments), IP routing and forwarding capabilities may not necessarily be present in the data plane."
      If solutions MAY be deployed in non-IP environments, they MUST NOT rely on IP. This is a very strange position to take in the IETF.
      Also, in Section 2.2.12, you say: "The MPLS-TP OAM toolset MUST provide a function to enable the quantification of the one-way, and if appropriate, the two-way, delay of a PW, LSP or Section."
      It may be very difficult to measure one-way delay without very well-synchronized clocks.
    2. Lars Eggert: Discuss [2009-10-07]:
      Section 2.2.11., paragraph 2: "The number of user packets not delivered is the difference between the number of user packets transmitted by an End Point and the number of user packets received at an End Point."
      DISCUSS: Both the IETF and the ITU-T have detailed packet loss metrics, and they are even aligned between the two bodies [RFC2680]. I don't think this document should in passing come up with its own definitions here.
    3. Lars Eggert: Comment [2009-10-07]:
      Section 2.2.12., paragraph 1: Both the IETF and the ITU-T have detailed delay metrics, and they are even aligned between the two bodies [RFC2679][RFC2681]. Should we refer to these here?
      Section 3., paragraph 1: Rate limiting only works in conjunciton with reserved PSN capacity for OAM (limit the rate to at most the reserved capacity.)
    4. Tim Polk: Discuss [2009-10-07]:
      discuss-discuss; Is there a reason that the authentication, authorization, and confidentiality were not specified as OAM requirements?I would think that these mechanisms could be "MUST implement, SHOULD use".

    Telechat:

  8. MPLS TP Network Management Requirements (Proposed Standard)
    draft-ietf-mpls-tp-nm-req-05
    Token: Adrian Farrel
    Note: Loa Andersson (loa@pi.nu) is the Document Shepherd.
    Note that this document is a requirement document. For reasons that
    have to do with how the ITU-T can reference RFCs we have opted to put
    it on the Standards Track.
    Discusses/comments (from ballot 3219):
    1. Ron Bonica: Comment [2009-10-08]:
      In section 2 I strongly recommend to used the conbination NETCONF/YANG as an example rather anything else. But Dan holds that point as part of his DISCUSS.
    2. Lars Eggert: Discuss [2009-10-07]:
      I hate to play downref police... If the document had been shepherded according to PROTO, the shepherd would have had to check for downrefs and they could have been handled during IETF LC...
    3. Lars Eggert: Comment [2009-10-07]:
      Section 7., paragraph 0: Should this section refer to IETF or ITU-T metrics or is it OK to leave this open?
    4. Russ Housley: Discuss [2009-10-06]:
      In the Gen-ART Review by Joel Halpern on 25-Sept-2009, asks some questions that ought to be answered before the document is approved.
    5. Russ Housley: Discuss [2009-10-06]:
      In the Gen-ART Review by Joel Halpern on 25-Sept-2009, asks some questions that ought to be answered before the document is approved.
      Is it reasonable for the references in the following sentence to be informational? Can one read this document and correctly understand it without reading these other documents?
      Will this document will be cited in other (solution or architecture) documents, which are explaining how they meet these requirements?
    6. Dan Romascanu: Discuss [2009-10-08]:
      1. Some text is missing concerning the operating model.
      2. There is no discussion about the scalability of the management solutions.
      3. In section 2 I strongly recommend to used the conbination NETCONF/YANG as an example rather than NETCONF/XML.
      4. Section 5.3.1 - I suggest that (also) RFC 3877 is mentioned as a reference for alarms severities
      5. It is not clear to me what pro-active and on-demand modes refer to when it comes to performance monitoring.
    7. Dan Romascanu: Comment [2009-10-08]:
      In the second paragraph of section 2 - the capitalization of the keywords is inconsistent.

    Telechat:

2.1.2 Returning Item

2.2 Individual Submissions

2.2.1 New Item

2.2.2 Returning Item

3. Document Actions

3.1 WG Submissions

3.1.1 New Item

  1. Presence Interdomain Scaling Analysis for SIP/SIMPLE (Informational)
    draft-ietf-simple-interdomain-scaling-analysis-08
    Token: Robert Sparks
    Note: Ben Campbell is document shepherd
    Discusses/comments (from ballot 2925):
    1. Ralph Droms: Comment [2009-10-07]:
      Is there a specific reason not to include the total number of registered users in each scenario in section 2?
    2. Adrian Farrel: Discuss [2009-09-23]:
      The Security Considerations section seems light on two counts.
      Firstly, the very scaling problems that are described constitute a security issue since they will gum up the network, CPU, and memory.
      Secondly, it is worth examining the impact on all of the scaling that is introduced by applying security to the messages that are exchanged.
    3. Adrian Farrel: Comment [2009-09-23]:
      I love the new standard unit "dozens of gigabytes of presence traffic per day"
    4. Tim Polk: Comment [2009-09-24]:
      I support Adrian's discuss.
    5. Dan Romascanu: Comment [2009-09-24]:
      I would have liked to see also some mention of the impact and scalability aspects of the management systems and operator tools. Although that impact is not direct and as easy measurable, it is a serious concern for operators when dealing with succesful protocols.

    Telechat:

  2. SPEERMINT Requirements for SIP-based Session Peering (Informational)
    draft-ietf-speermint-requirements-07
    Token: Cullen Jennings
    Discusses/comments (from ballot 2947):
    1. Ralph Droms: Comment [2009-10-06]:
      Minor editorial nit.
    2. Lars Eggert: Comment [2009-10-07]:
      WGs are ephemeral - continously refering to the originating SPEERMINT WG in the title and body of the document will read strangely in a few years.
    3. Alexey Melnikov: Discuss [2009-10-07]:
      1). DISCUSS DISCUSS:
      draft-ietf-speermint-voip-consolidated-usecases-14.txt shows use of DNS queries...
      draft-ietf-speermint-requirements-07.txt specifies MUST level requirements...
      A). Would these requirements disqualify use of DNS for the final solution?
      B). If yes, doesn't this mean that draft-ietf-speermint-voip-consolidated-usecases-14.txt becomes inaccurate/misleading the moment this document is published?
      2). I've solicited an additional review of the section 4 from Peter Saint-Andre. He wrote:
      I am concerned about the use of the capitalized keyword MUST in these requirements, because it could be taken to override local policies or user-level privacy settings...
    4. Alexey Melnikov: Comment [2009-10-07]:
      (six items)
    5. Robert Sparks: Discuss [2009-10-07]:
      The question "Is DNS the right place for putting data that varies based on who asks?" is out of place in this document... Please either document that argument or remove the sentence.
      The Presence and Instant Messaging requirements don't fit cleanly with the other requirements in this document...
    6. Robert Sparks: Comment [2009-10-07]:
      Nit: typo

    Telechat:

  3. VoIP SIP Peering Use Cases (Informational)
    draft-ietf-speermint-voip-consolidated-usecases-14
    Token: Cullen Jennings
    Discusses/comments (from ballot 2971):
    1. Ralph Droms: Comment [2009-10-06]:
      Is there a specific intended purpose for these use cases: requirements development, guidance to developers/deployers, ???
      "Attempts to capture" probably isn't a useful result. How about "describes important Voice over IP (VoIP) use cases, as determined by the SPEERMINT working group, ..."
    2. Alexey Melnikov: Comment [2009-10-03]:
      RFC 4366 is not referenced in the text, so it should be deleted.
    3. Robert Sparks: Discuss [2009-10-07]:
      It's not clear whether the call-flows used to depict some of the use-cases in this document are intended to be one way the use case could be realized or _the_ way...
      Why does the B2BUA in section 5.2 reset Max-Forwards rather than continuing to decrement it in step 7?
      At step 9 of section 5.2, the T-SBE jumps straight to an A lookup. Why isn't this going through full RFC3263 resolution?
      There is at least one instance of a missing semicolon between header field parameters...

    Telechat:

  4. Home Automation Routing Requirements in Low Power and Lossy Networks (Informational)
    draft-ietf-roll-home-routing-reqs-08
    Token: Adrian Farrel
    Note: JP Vasseur (jvasseur@cisco.com) is the document shepherd
    Discusses/comments (from ballot 2972):
    1. Jari Arkko: Discuss [2009-10-08]:
      I realize what the charter of the ROLL WG is, but the biggest problem this document has is its high focus on the routing tools. This document goes too far in my opinion as positioning routing protocols as the solution for some of the problems. Application layer mechanisms for instance may be far more appropriate for some things...
    2. Jari Arkko: Comment [2009-10-08]:
      "Unlike other categories of Personal Area Networks (PANs), the connected home area is very much consumer-oriented."
      Surely this is not true. I think most sports performance measurement gear, phone & music player, etc. applications are very consumer oriented.
      "One event may cause many actuators to be activated at the same time..."
      I am wondering what value this paragraph adds. This may be a well known problem, but it is certainly one of poor implementation and/or choice of L2. I have a very hard time seeing this being a problem due to routing...
      "If assignment of unique addresses is performed by a central controller, it must be possible to route the inclusion request from the joining node to the central controller before the joining node has been included in the network."
      While this requirement is logical, I wonder to what extent it assumes that we somehow have to redo many of the basic building blocks and concepts that we have in IP networks.
      "In contrast to other applications, e.g. industrial sensors, where data would mainly be originated by a sensor to a sink and vice versa, this scenario implicates a direct inter-device communication between ROLL devices.
      I'm not convinced that the home network is any more peer-to-peer driven than other environments. Most equipment that we have today is still centrally controlled, even if running on top of IP.
    3. Lars Eggert: Discuss [2009-10-07]:
      Section 3.4., paragraph 3: DISCUSS: I may be misunderstanding something, but why is reliable delivery of healthcare *application* data something that the *routing* protocol needs to do?
    4. Lars Eggert: Comment [2009-10-07]:
      Section 3.2., paragraph 4: There's an unstated assumption here regarding the size/diameter of the network. You might want to point to Section 3.5 here.
      Section 3.8., paragraph 1: At least to me, the second paragraph isn't talking about the same thing as the first paragraph. The first one says "never use", the second says "not prefer."
    5. Pasi Eronen: Discuss [2009-10-06]:
      The last paragraph of Section 3.4 seems to suggest that the routing protocol could deliver acknowledgements to applications about whether an IP packet was delivered or not (but this is more forwarding than routing thing anyway)...
      Sections 3.7 and 5 seem to have conflicting requirements about security and zero-configuration (adding a new node to the network without any human intervention is pretty hard to combine with the requirement to keep unwanted nodes out).
      It looks like [I-D.Hui-HeaderCompression] should be an informative reference, not normative.
    6. Cullen Jennings: Discuss [2009-10-07]:
      I have no problem with two (or more) levels of QoS where one has a better change of being delivered than the others but if this is going to specify enough to support safety critical messages, it needs to be crisp about the requirements that entails.
      Could you put more about the requirements around security and zero configuration of adding new elements. It must be secure, but new elements can automatically add themselves and disrupt routing seems contradictory.
    7. Cullen Jennings: Comment [2009-10-07]:
      What's the requirement to use V6 on a network with 250 devices? The message with a 5 byte payload will take substantial longer and more power to transmit than if one used v4. I realize the HC is designed to solve that problem but it seems like it is layer complexity on top of complexity.
    8. Alexey Melnikov: Comment [2009-10-06]:
      I am supporting Pasi's DISCUSS about conflict of zero-configuration with security.
      3.5. Scalability: ..."The routing protocol MUST support 250 devices in the network." Should this be "... MUST support at least 250 devices ...". And to use Chris Newman's trick: why not say 257?
    9. Robert Sparks: Discuss [2009-10-07]:
      I support Lars' discuss regarding requirements on applications vs requirements on the routing protocol.
      There are several constants presented as requirements without motivation...
      What is section 4 informing?...
      The paragraph motivating "MUST support 250 devices" is not persuasive (plugs and switches are not inherently going to be low-power nodes)...
    10. Robert Sparks: Comment [2009-10-07]:
      The prose frequently assumes radio-based wireless. The charter for the group calls out other technologies...
      Has the group begun to explore the conflict between the authentication requirements in the security consideration section and the zero-configuration for access requirements earlier in the document?

    Telechat:

  5. Use of TESLA in the ALC and NORM Protocols (Experimental)
    draft-ietf-msec-tesla-for-alc-norm-08
    Token: Tim Polk
    Discusses/comments (from ballot 3103):
    1. Russ Housley: Discuss [2009-10-06]:
      The Gen-ART Review by Pete McCann raised some points for discussion. However the discussion has not taken place.
    2. Alexey Melnikov: Discuss [2009-10-07]:
      I believe the following reference must be normative: [RFC1305]...

    Telechat:

  6. A Framework for Loop-free Convergence (Informational)
    draft-ietf-rtgwg-lf-conv-frmwk-06
    Token: Ross Callon
    Discusses/comments (from ballot 3134):
    1. Lars Eggert: Comment [2009-10-07]:
      Section 6.5., paragraph 5: "This could, for example, be achieved by allocating a Type of Service bit..."
      There is no "ToS byte" anymore since DiffServ was published. Using a DSCP for that purpose is also not really in tune with the DiffServ architecture...
    2. Adrian Farrel: Comment [2009-10-08]:
      Echo the point on the the ToS byte. Suggest to completely remove the sentence.
      I think it is unfortunate that section 12 is so skinny. I presume that if I am able to induce micro loops (perhaps by flapping a resource) I could cause considerable network disruption and so using loop prevention or mitigation is a protection.

    Telechat:

  7. IP Fast Reroute Framework (Informational)
    draft-ietf-rtgwg-ipfrr-framework-12
    Token: Ross Callon
    Discusses/comments (from ballot 3135):
    1. Ralph Droms: Comment [2009-10-06]:
      How does section 4.2.2 explain the percentages given for various failure modes in section 4.2?
      Section 4.3 piqued my curiosity; it would be useful (but certainly not necessary) to say more...
    2. Lars Eggert: Discuss [2009-10-07]:
      Section 4.1., paragraph 0: DISCUSS: Some of these fast failure detection techniques (the ones based on observing packet loss) can lead to false positives when used with very aggressive detection intervals, because losses caused by transient congestion appear as a failure...
    3. Lars Eggert: Comment [2009-10-07]:
      Section 2., paragraph 2: It'd be fair to point out that although fast reroute can significantly improve behavior under failures for such applications, it is no panacea.
    4. Adrian Farrel: Discuss [2009-10-08]:
      Section 1 Distance_opt(A,B): "The distance of the shortest path from A to B." We seem to lack a definition of "distance".
    5. Adrian Farrel: Comment [2009-10-08]:
      Section 1: The definition of "E" uses the term "primary next-hop neighbor" but your terminology defines the term "primary neighbor".
      It is a slight editorial concern that some sections have multiple numbered bullet lists using the same ordinals. Could you consider using letters for second lists so there is no confusion between lists?

    Telechat:

  8. IPv6 Configuration in IKEv2 (Experimental)
    draft-ietf-ipsecme-ikev2-ipv6-config-02
    Token: Tim Polk
    Note: Paul Hoffman (paul.hoffman@vpnc.org) is the document shepherd.
    Discusses/comments (from ballot 3176):
    1. Russ Housley: Discuss [2009-10-06]:
      The Gen-ART Review by Avshalom Houri on 2009-09-24 raised a concern about authentication and re-authentication...
    2. Russ Housley: Comment [2009-10-06]:
      The Gen-ART Review by Avshalom Houri on 2009-09-24 suggested a section describing how the requirements in section 3 are being addressed by the solution.

    Telechat:

  9. Displaying Downgraded Messages for Email Address Internationalization (Experimental)
    draft-ietf-eai-downgraded-display-02
    Token: Alexey Melnikov
    Note: Harald Alvestrand agreed to shepherd the document
    Discusses/comments (from ballot 3204):
    1. Pasi Eronen: Discuss [2009-10-06]:
      I found the algorithm in Section 4 extremely difficult to understand.
      Section 5 says hiding the information from the actual header fields isn't a problem if the comparison done in step 4 succeeds. But this step applies only to address header fields, right?

    Telechat:

3.1.2 Returning Item

3.2 Individual Submissions Via AD

3.2.1 New Item

  1. EAP Authentication Using Only A Password (Informational)
    draft-harkins-emu-eap-pwd-10
    Token: Russ Housley
    Discusses/comments (from ballot 3160):
    1. Pasi Eronen: Discuss [2009-09-25]:
      The document doesn't seem to specify how e.g. the password and peer-ID entered by the user (character strings) are converted to byte strings before hashing.
      The document should specify at least one mandatory-to-implement algorithm (for DH group/random function/prf/password preprocessing method) to ensure interoperability.
      RFC 3079 doesn't actually specify how to calculate NtPasswdHash, but just points to RFC 2759. Probably this document should point to RFC 2759, too.
      References RFC 4634, RFC 5226, and RFC 3079/2759 look normative rather than informative.
    2. Cullen Jennings: Discuss [2009-10-07]:
      I don't see how negotiation of PRF happens. If one side supports PRF, A B C D, and the other side supports C, D, E, F, how do they figure out which one to use?
    3. Alexey Melnikov: Discuss [2009-10-08]:
      2.6.2. Passwords: "Microsoft: The input password string SHALL be processed to produce the output PasswordHashHash, as defined in [RFC2759]."
      Neither RFC 2759, nor this document specify how the input password is encoded. RFC 2759 says that it is in Unicode, but Unicode has multiple encodings, which would result in different hashes.
    4. Tim Polk: Comment [2009-10-07]:
      I do not have the level of confidence in the cryptographic mechanisms that would be required to support standards track publication, but I am comfortable with publishing as Informational.

    Telechat:

  2. IPv4 Address Blocks Reserved for Documentation (Informational)
    draft-iana-ipv4-examples-02
    Token: Russ Housley
    Discusses/comments (from ballot 3194):
    1. (none)

    Telechat:

3.2.2 Returning Item

3.3 Independent Submissions Via RFC Editor

3.3.1 New Item

  1. X.509 Key and Signature Encoding for the KeyNote Trust Management System (Informational)
    draft-keromytis-keynote-x509-02
    Token: Tim Polk
    Discusses/comments (from ballot 3214):
    1. Lars Eggert: Discuss [2009-10-07]:
      The draft header says "Intended Status: Proposed". This should be Informational.
      Section 7., paragraph 1: Does this registry exist or does this draft intend to remind IANA that this registry should still be created?
    2. Alexey Melnikov: Comment [2009-10-02]:
      Some minor editorial suggestions...
    3. Tim Polk: Discuss [2009-09-18]:
      This document is an example where there is no conflict and no need to clarify the relationship with IETF specifications. While I have proposed a standard 3932 IESG note in the tracker, I am advocating publication without any IESG note whatsoever.

    Telechat:

3.3.2 Returning Item

  1. Routing and Addressing in Next-Generation EnteRprises (RANGER) (Informational)
    draft-templin-ranger-08
    Token: Jari Arkko
    Discusses/comments (from ballot 3212):
    1. (none)

    Telechat:

  2. Multicast Mobility in MIPv6: Problem Statement and Brief Survey (Informational)
    draft-irtf-mobopts-mmcastv6-ps-08
    Token: Jari Arkko
    Note: Rajeev Koodli (rajeev.koodli@gmail.com) is the document shepherd.
    Discusses/comments (from ballot 3216):
    1. (none)

    Telechat:

1423 EDT break scheduled

Russ: no break

4 Working Group Actions

4.1 WG Creation

4.1.1 Proposed for IETF Review

  1. Internet Area Working Group (intareawg)
    Token: Jari

    Telechat:

4.1.2 Proposed for Approval

  1. Multipath TCP (mptcp)
    Token: Magnus

    Telechat:

4.2 WG Rechartering

4.2.1 Under evaluation for IETF Review

  1. (none)

4.2.2 Proposed for Approval

  1. Behavior Engineering for Hindrance Avoidance (behave)
    Token: Magnus

    Telechat:

  2. Access Node Control Protocol (ancp)
    Token: Ralph

    Telechat:

5. IAB News We can use

  1. Dave: last IAB meeting = tech chat, secure routing, a few joint IAB/IESG action items, we will track, especially how to encourage deployment
  2. Dave: "harmful" draft interaction vis CODEC BoF, please participate in discussion
  3. Cullen: are you going forward with IAB draft as is
  4. Dave: yes; not sure whether it's in RFCed queue, if not it's very close
  5. Russ: went into RFCed queue October 1
  6. Russ: in mgmt item 6.3, we should decide whether to schedule during joint breakfast in Hiroshima
  7. Dave: suggest sub-groups should work on this
  8. Russ: will invite IAB folks to informal telechat on mgmt item 6.3 and this
  9. Cullen: not able to do that next week
  10. Russ: otherwise we'll spend an hour just framing the question
  11. Dave: need to level-set before CODEC BoF in Hiroshima
  12. Russ: is October 29 too late?
  13. Dave: earlier is better, not sure we'll have any more input by 29th
  14. Cullen: October 15th would be a problem for me
  15. Dave: can we come up with joint IAB/IESG on what in "harmful" draft conflicts
  16. Cullen: community consensus is more important than what we think
  17. Russ: both are important; both need to happen in parallel

6. Management Issues

  1. Link Relations Request [IANA #259813] (Lisa Dusseault)

    Telechat:

  2. Review of application/3gpp-ims+xml Media Type (Alexey Melnikov)

    Telechat:

  3. SDO Turf Wars and Cooperation Projects (Adrian Farrel)

    Telechat:

  4. Smart Grid (Tim Polk)

    Telechat:

7. Agenda Working Group News

1406 EDT Adjourned



Appendix: Snapshot of discusses/comments

draft-ietf-tcpm-tcpsecure

  1. Ron Bonica: Comment [2009-10-06]:
    I don't think that UPDATES is required because an implementer can produce a
    perfectly compliant implementation without ever reading this document.
  2. Ralph Droms: Comment [2009-10-07]:
    This document is well written and clearly explains, without needing to flip back
    to RFC 793 and other docs, the attacks and the mitigations.
    
    Whether or not this document updates RFC 793 depends, in my mind, on the meaning
    of SHOULD in text like this snippet from section 4.2:
    
       Instead, the handling of the SYN in the synchronized state SHOULD be
       performed as follows:
    
       1) If the SYN bit is set, irrespective of the sequence number, TCP
          MUST send an ACK (also referred to as challenge ACK) to the remote
          peer:
    
          <SEQ=SND.NXT><ACK=RCV.NXT><CTL=ACK>
    
          After sending the acknowledgment, TCP MUST drop the unacceptable
          segment and stop processing further.
    
    Does the SHOULD imply a change in TCP as defined by RFC 793 or does it apply in
    the sense of "if the stack implemements the mitigations described in this
    document, the handling of SYN ..."
    
    I infer from this text in the "Applicability Statement" (section 1.1), that RFC
    2119 text is all conditional on "if the stack implements these mitigations":
    
       The mitigations suggested in this draft
       SHOULD be implemented in devices that regularly need to maintain TCP
       connections of the kind most vulnerable to the attacks described in
       this document.
    
    While this may seem like an editorial nit, I think the doc would be clarified
    and the issue of updating RFC 793 resolved with an explicit statement about the
    RFC 2119 text in the Terminology section.
    ---
    In section 5.1, what is the "ACK
    value of [a] data segment"?
    ---
    This text at the beginning of section 5.2
    doesn't seem to appear anywhere in sections 3 or 4:
    
    5.2.  Mitigation
    
       All TCP stacks MAY implement the following mitigation.
    
    Is there something different about the mitigation in section 5 that is different
    from the other mitigations?
    
    I see section 6 clarifies the issue I was getting at:
    
    6.  Suggested Mitigation strengths
    
       As described in the above sections, recommendation levels for RST,
       SYN and DATA are tagged as SHOULD, SHOULD and MAY respectively.
    
    At the risk of fussiness over an editorial nit, I suggest a clear sentence at
    the beginning of sections 3.2 and 4.2 like the one in section 5.2 explicitly
    describing the recommendation levels for those mitigations.
  3. Lars Eggert: Discuss [2009-04-02]:
        [I am adding this so we don't forget to discuss it - Lars]
    
    This document has:
    "Updates: 793 (if approved)"
    
    There was a lot of discussion about this in the WG.  The authors want
    it in, because they want implementors of 793 to also look at this document.
    
    The arguments against having this in the header relate to the fact
    that currently only one RFC has "Updates: 793" in its header: RFC 3168,
    "The Addition of Explicit Congestion Notification (ECN) to IP".  In
    addition, this is an optional RFC, this is not a new requirement for
    RFC 793/1122 implementations.  You may see the discussion in the
    TCPM mailing list, with the subject:
    [tcpm] another review of draft-ietf-tcpm-tcpsecure[-10]
    
    As a WG chair, on the mailing list I stated:
    
      Wes and I discussed this, and we agree with Lars. "Updates" is
      generally for things that are now required if you implement the
      cited spec. Tcpsecure doesn't fit that criteria, so the "Updates 793"
      doesn't belong on this document. As Lars said, this is less than
      perfect, but it is what we currently have.
    
    The larger issue is what does "Updates:" mean in an RFC, and what
    should be the criteria for making that decision?  We (the WG chairs)
    felt that we were getting into a discussion that was well outside
    of the scope of the TCPM WG.
    
    So, we would like the IESG to voice an opinion on whether or not
    it would be appropriate to add "Updates: 793" to this document.  If
    the answer is yes, then there are other draft documents in the works
    that this would probably affect. 
        
  4. Cullen Jennings: Discuss [2009-10-07]:
        
    I have a question about the applicability of this that I'd like to understand
    the answer to before trying to answer the "updates" question Lars raised.
    Imagine we have a client C, talking from the "inside" of a firewall that tracks
    TCP state, to a server S on the "outside" of the firewall. If C sends a RST, the
    firewall forwards it and clears state, but when the RST arrives at S. The reset
    seq # is within the window but not exact. S sends and ACK, but (this is my
    question), will the firewall forward the ACK to C or just silently drop it?
    
    I know some firewalls might have the timers to forward traffic for some time
    after the RST but do they all and is it long enough? Is there something I am
    just not understanding here that would cause this to work? I'm worried that
    servers with lots of clients connecting to them not being able to recover TCP
    connection in a timely matter might cause more harm that attacks that tear down
    TCP connections.
    
    This is a Discuss because I want to talk to the IESG & authors about it before
    deciding an opinion on this draft.
    
    Thanks, Cullen 
        
  5. Cullen Jennings: Comment [2009-10-07]:
    
      

draft-ietf-mboned-lightweight-igmpv3-mldv2

  1. Ron Bonica: Comment [2009-09-03]:
    Technical Summary
    
        This document describes lightweight IGMPv3 and MLDv2 protocols (LW-
        IGMPv3 and LW-MLDv2), which simplify the standard (full) versions of
        IGMPv3 and MLDv2.  The interoperability with the full versions and
        the previous versions of IGMP and MLD is also taken into account.
    
    Working Group Summary
    
        This draft has received strong support within the working group and
        no major controversies were noted.
    
    Document Quality
    
        Multiple implementations of this specification exist.  A number of
        other vendors have indicated interest/plans to support this
        specification.  Bharat Joshi provided the most extensive comments
        and questions for the document.  Authors addressed the questions and
        concerns in the document.  Otherwise, mailing list traffic regarding
        this specification has been minimal.  There has been extensive
        comments on this proposal during the working group meetings.
    
    Personnel
    
        Lenny Giuliano is the Document Shepherd, Ron Bonica is the
        Responsible Area Director.
  2. Ralph Droms: Comment [2009-10-06]:
    From the second para of the Introduction:
    
       INCLUDE and EXCLUDE filter-modes are introduced to support the source
       filtering function.
    
    "are introduced" by IGMPv3 and/or MLDv2, or ???
  3. Lars Eggert: Discuss [2009-10-07]:
        Why is this a BCP and not PS?
    
    Section 1., paragraph 5:
    >    Since LW-IGMPv3 and LW-MLDv2 are fully compatible with the full
    >    version of these protocols (i.e., the standard IGMPv3 and MLDv2),
    >    hosts or routers that have implemented the full version do not need
    >    to implement or modify anything to cooperate with LW-IGMPv3/LW-MLDv2
    >    hosts or routers.
    
      DISCUSS: They may not need to implement anything, but if they send an
      EXCLUDE to a lightweight peer they better be prepared for it to be
      ignored. On the call, I'd like to discuss how that affects
      interoperability. Is this something that's permitted in the full version? 
        
  4. Lars Eggert: Comment [2009-10-07]:
    
        
  5. Russ Housley: Comment [2009-10-06]:
      The Gen-ART Review by Brian Carpenter on 2009-09-01 raises a question
      about this text:
    
      > 1.  Introduction
      ...
      >   Since LW-IGMPv3 and LW-MLDv2 are fully compatible with the full
      >   version of these protocols (i.e., the standard IGMPv3 and MLDv2),
      >   hosts or routers that have implemented the full version do not need
      >   to implement or modify anything to cooperate with LW-IGMPv3/LW-MLDv2
      >   hosts or routers.
      
      I assume this also means that LW-IGMPv3 and LW-MLDv2 are strict subsets
      of IGMPv3 and MLDv2. If so, it would be useful to say so explicitly.
  6. Cullen Jennings: Discuss [2009-10-07]:
        A document that creates a subset profile of a protocol should not be a BCP. 
        
  7. Cullen Jennings: Comment [2009-10-07]:
    
        
  8. Robert Sparks: Discuss [2009-10-07]:
        This should be PS instead of BCP.
    
    This is slightly more than a simple profiling of the parameters of another
    protocol - there appears to be additional logic that an implementation will have
    to perform correctly. It also doesn't appear to be recommending "full and
    immediate instantiation". Rather, it seems to be a good candidate for the normal
    PS->DS->S progression. 
        
  9. Robert Sparks: Comment [2009-10-07]:
    
      

draft-ietf-ipsecme-ikev2-resumption

  1. Jari Arkko: Discuss [2009-10-08]:
        This is a well written specification and I was about to vote Yes on it.
    However, I thought I saw a few small errors and I wanted to talk to you
    to see if we can determine if these really are errors and whether we
    need to correct them. 
    
    1. The document says:
    
    > Specifically, the SK_xx values are required to
    > protect the IKE_AUTH payloads.
    
    At this point in the text, SK_xx has not been defined (I suppose you mean
    "any shared key values established by IKEv2"), or even any specific
    SK value mentioned. This came out of the blue for me at least. Please
    clarify what you meant.
    
    Also,
    
    > AUTH = prf(SK_px, <message octets>)
    >
    > Each of the initiator and responder uses its own SK_p value, taken
    > from the newly generated IKE SA, Section 5.1.
    
    SK_px does not appear in the document, what is it? Neither SK_px or
    SK_xx have been used in RFC 4306 either. What about SK_p, do you mean
    SK_pr and SK_pi? Again, please be specific in what you actually mean.
    Listing which SK values you actually mean here along with their
    references might be helpful.
    
    2. The document says:
    
    > When passing a ticket by value to the client, the ticket content MUST
    > be integrity protected and encrypted.
    >
    > A ticket by reference does not need to be encrypted, as it does not
    > contain any sensitive material, such as keying material
    
    There are multiple levels of crypto here, perhaps you want to be more
    explicit here. You mean that the encryption above is for the ticket
    content, but for sure the IKE exchange where you receive the ticket
    has to be encrypted, because otherwise it would be easier to
    open up a DoS attack where you can create half-ready resumption IKE
    SAs if you saw a ticket fly by. The document did say this earlier:
    
       Although the IKE SA is not fully valid until the completion of the
       IKE_AUTH exchange, the peers must create much of the SA state
       (Section 5) now.  Specifically, the SK_xx values are required to
       protect the IKE_AUTH payloads.
    
    3. The document says:
    
    > A man-in-the-middle may try to eavesdrop on an exchange to obtain a
    > ticket by value and use it to establish a session with the IKEv2
    > responder.  Since all exchanges where the client obtains a ticket are
    > encrypted, this is only possible by listening in on a client's use of
    > the ticket to resume a session.  However, since the ticket's contents
    > are encrypted and the attacker does not know the corresponding secret
    > key, a stolen ticket cannot be used by an attacker to successfully
    > resume a session.  An IKEv2 responder MUST use strong encryption and
    > integrity protection of the ticket to prevent an attacker from
    > obtaining the ticket's contents, e.g., by using a brute force attack.
    >
    > A ticket by reference does not need to be encrypted.  When an
    > adversary is able to eavesdrop on a resumption attempt, as described
    > in the previous paragraph, then the ticket by reference may be
    > obtained.  A ticket by reference cannot be used by an attacker to
    > successfully resume a session, for the same reasons as for a ticket
    > by value.  Moreover, the adversary MUST NOT be able to resolve the
    > ticket via the reference, i.e., access control MUST be enforced to
    > ensure disclosure only to authorized entities.
    
    This text does not explain the issue that I brought up in item 3.
    I would like to see that the half-created state problem is mentioned
    in the security considerations text. 
        
  2. Jari Arkko: Comment [2009-10-08]:
    
        
  3. Ralph Droms: Comment [2009-10-06]:
    Well-written and understandable doc.  I have one small editorial comment:
    
    From section 5:
    
       Note 1:  The authenticated peer identity used for policy lookups may
                not be the same as the IDi payload (see Sec. 3.5 of
                [RFC4718]), and if so, MUST be included in the ticket.  Note
                that the client may not have access to this value.
    
    What is the condition to be checked by "if so" and what is to be included based
    on that condition?  It would be clearer to include text that explicitly
    describes the condition and what is to be included.
  4. Lars Eggert: Comment [2009-10-07]:
    INTRODUCTION, paragraph 13:
    > Abstract
    
      Is long, and overlaps with the introduction a lot.
  5. Adrian Farrel: Comment [2009-10-08]:
    I'm assuming that the malicious corrpution or deletion of stored tickets has
    only a small disruptive affect on session recovery. That is, an attempt will be
    made to recover the ticket before dropping abck to the current processing rules
    (pre-this-draft).
    ---
    The use of ! rather than | in protocol object figures is
    unusual, but not illegal.
    ---
    Section 7 identifies the different notification
    messages by "notification numbers" but the subsequent subsections (7.1 etc.) use
    the term "Notify Message Type". According to the IANA section and the registry,
    the latter term is correct.
  6. Alexey Melnikov: Comment [2009-10-04]:
    This is a useful document.
    Some minor comments/questions below:
    
    4.3.1.  Prologue
    
       Tickets are intended for one-time use, i.e. a client MUST NOT reuse a
       ticket.  A reused ticket SHOULD be rejected by a gateway.  Note that
       a ticket is considered as used only when an IKE SA has been
       established successfully with it.
    
    Isn't this a recipe for DoS attacks?
    
    
    7.1.  TICKET_LT_OPAQUE Notify Payload
    
       The data for the TICKET_LT_OPAQUE Notify payload consists of the
       Notify message header, a Lifetime field and the ticket itself.  The
       four octet Lifetime field contains a relative time value, the number
       of seconds until the ticket expires (encoded as an unsigned integer).
    
    I suggest saying that the Lifetime is encoded in network byte order.
  7. Tim Polk: Discuss [2009-10-07]:
        This is a good document, and I support its publication.  There is one issue that
    I would
    suggest addressing - probably in the security considerations - before
    publication, though.
    
    When an IKEv2 responder decides to provide a ticket for session resumption to an
    IKEv2 
    initiator, they are implicitly trusting the initiator to manage this
    ticket to ensure that new
    sessions are not created for a different user.
    Specifically, Section 6.2 states that "when
    credentials associated with the IKE
    SA are invalidated (e.g. when a user logs out), the ticket
    MUST be deleted."
    This requirement can only be enforced by the responder, so a rogue
    IKEv2
    responder could misuse the ticket without user knowledge.
    
    It seems the IKEv2 responder is extending greater trust to the initiator when
    providing
    a ticket than when they accept the initial connection.  I have no
    problem with that, but
    suspect it should be highlighted somewhere. 
        
  8. Tim Polk: Comment [2009-10-07]:
    
        
  9. Dan Romascanu: Comment [2009-10-08]:
    Michael Sneed notes in his OPS-DIR review the following: 
    
    Section 9.1 of the "Security Considerations"  could use some clarification: the
    inability of an attacker to use a stolen unencrypted "ticket by reference" is
    explained as "for the same reasons as for a ticket by value", but for a "ticket
    by value" the explanation is that the ticket is encrypted.

draft-ietf-pmol-sip-perf-metrics

  1. Lisa Dusseault: Discuss [2009-10-05]:
        I would like to talk about the competitive or anti-competitive nature of metrics
    as well as the meaning of putting these on the Standards Track.
    
    In the Abstract the draft says: 
       "The purpose of
       this document is to combine a standard set of common metrics,
       allowing interoperable performance measurements, easing the
       comparison of industry implementations."
    
    Later on the draft also says
    
        "These metrics will likely be utilized in
       production SIP environments for providing input regarding Key
       Performance Indicators (KPI) and Service Level Agreement (SLA)
       indications; however, they may also be used for testing end-to-end
       SIP-based service environments.
    
    First, note that this draft by itself does not allow interoperability unless
    there's a standard performance monitoring protocol to transport the standardized
    metrics.  By itself, this draft allows comparison.
    
    Second, comparing industry implementations on this basis is not necessarily the
    best way to compare.  We don't even know if it's a good way to compare.  Which
    metrics are most important to user experience?  Aren't there some thresholds on
    some measures which are "good enough" and improving beyond those thresholds
    offers no noticeable improvement?
    
    I don't see how we have enough confidence to call this a Proposed Standard at
    this point; Informational would make much more sense to me -- I would read that
    as "here is a set of metrics defined a certain way, and the definitions are for
    your information if you choose to use the same metrics."
    
    What is the likely harm of implementations optimizing for these metrics instead
    of for a more holistic user experience? 
        
  2. Lisa Dusseault: Comment [2009-10-05]:
    
        
  3. Lars Eggert: Discuss [2009-10-07]:
        Section 12.1., paragraph 3:
    >    [GR-512]   Telcordia, "LSSGR: Reliability, Section 12", GR-512-
    >               CORE Issue 2, January 1998.
    
      DISCUSS: Is this a standard by another SDO? (In any event, I believe
      it can be made in Informative reference, because it simply points to
      the source from where a metric/test was borrowed.) 
        
  4. Lars Eggert: Comment [2009-10-07]:
    
        
  5. Cullen Jennings: Discuss [2009-10-07]:
        On some of these, it seems like there were multiple metrics that ended up with
    same name but were actually different - for example, SRD in the failure case and
    SRD in the success case.
    
    Several metrics seem like they would be messed up by HERFP and forking. By
    messed up I mean not useful for anything. In general I think on all the metrics
    I would have liked to have a better idea of how they can be used not just
    collected.
    
    As far as I understand 4.4.2, it measures timer F which is compiled into the
    code so seems pretty useless to measure.
    
    In the second example in 4.4.2, when UA2 sends a BYE, UA2 is the UAC not the
    UAS.
    
    SDT seems undefined when answer sends the BYE. Need to consider things like Bye
    ALSO, reinvites, REFERS and more.
    
    HpR. I don't think this approach has worked out well on operational networks. I
    see more people doing VIA counting at the UAS. One of the many problems with the
    approach is, well you have to be at both ends, and if the UAC starts with say 30
    (fairly common) and then some B2BUA in the middle resets to 70 (insane but
    common and what a strict read of 3261 might say you SHOULD do) you are going to
    probably end up with a negative hop count.
    
    SER. This looks very wrong. On a interface where all invites are challenged
    (very common for anything offering long distance) this is going to be under 50%.
    
    SEER - the way this is defined you end up with a divide by zero on interfaces
    that are redirecting.
    
    SDF - I really have no idea how to implement this in an way that gets consistent
    numbers. It not clear what I look for in the Reason to decide I increment the
    SDF counter or not.
    
    SCR - I did not understand why this one needed a proxy. I suspect I don't
    understand what is being counted.
    
    The SSR does not seem right. If you had lots of 503s, it seems like the the SSR
    could go negative.
    
    Section 6.3. totally agree forking SHOULD be considered. In fact I think forking
    MUST be considered but we the spec needs to help the implementors know what to
    do. Take for example a case where an invite forks to 3 phones that all start
    ringing then one of the is answered. From a dialog point of view, 1/3 of the
    dialogs worked and the others failed to have a call. From a user point of view
    the call was a success. Treating this like a transit ISDN network is not going
    to get the metrics that are useful for a SLA.
    
    Overall, I think that if we backed up to the 10,000 foot level and asked what
    problem are we going to solve with metrics and what metrics do we need, it would
    be much clearer how to evaluate if these metrics worked or not. 
        
  6. Cullen Jennings: Comment [2009-10-07]:
    Meta Comment: We are still in the experimentation mode of how to bring together
    the operational and metrics experience of the OPS area with the SIP expertise of
    the RAI area. I think the ADs have some work to do to see if what improvements
    can be made
  7. Tim Polk: Comment [2009-10-07]:
    I support Lisa's and Robert's discusses...
    
    I believe that publication as Informational would be a reasonable path forward,
    especially
    if supported by additional text describing the scope and origins of
    the metrics.
  8. Robert Sparks: Discuss [2009-10-06]:
        I have several concerns with this document that are captured in the message went
    to the PMOL list at
    <http://www.ietf.org/mail-
    archive/web/pmol/current/msg00206.html> 
        
  9. Robert Sparks: Comment [2009-10-06]:
    
      

draft-ietf-dime-diameter-cmd-iana

  1. Lars Eggert: Comment [2009-10-07]:
    ABSTRACT:
    >    The Diameter Base specification, described in RFC 3588, provides a
    >    number of ways to extend Diameter, with new Diameter commands, i.e.
    ...
    >    This document aligns the extensibility rules of Diameter application
    >    with the Diameter commands offering ways to delegate work on Diameter
    >    to other SDOs to extend Diameter in a way that does not lead to poor
    >    design choices.
    
      The first paragraph is unusual for an abstract (and it's repeated in
      the introduction), and the second paragraph needs to say that this
      updates RFC3588.
    
    
    Section 4., paragraph 1:
    >    This section describes changes to the IANA consideration sections
    >    outlined in RFC 3588 regarding the allocation of Command Codes by
    >    IANA.
    
      And I'm guessing you want to instruct IANA to start applying these as
      soon as this document is approved?
  2. Pasi Eronen: Comment [2009-10-05]:
    Currently, Section 3 seems to say that IETF produces better quality
    specifications than other organizations, and others are more likely to
    screw up security. I find this a bit negative and arrogant -- when
    defining a new Diameter application for a system developed in some
    other organization FOO, I think it's much more likely that FOO 
    understands their system, and its security requirements, better than
    IETF does.
  3. Russ Housley: Comment [2009-10-06]:
      In the Gen-ART Review by Scott Brim on 2009-09-21:
    
      Not a big issue but: if you do revise it, consider putting in a
      little more about the motivation.  Without naming names, what were
      the "questionable design decisions" and why were they an issue?
  4. Tim Polk: Comment [2009-10-06]:
    Like Pasi, I would favor rewording the Security Considerations section.
    
    Carl Wallace had some editorial suggestions in his secdir review:
    
    - The first sentence of the abstract (and introduction) is difficult to
    parse. 
    - In the Introduction, change "the conditions, which" to "the conditions
    that" and change "were causes" to "were caused".
    - The document states that it "aligns the extensibility rules for
    Diameter command codes with those defined for Diameter application
    identifiers".  Since the values are not aligned and there's no mention
    of "extensibility rules" elsewhere in this document nor in 3588, I
    suggest something like: "This document changes the allocation rules for
    Diameter command codes to support usage of vendor specific command
    codes, similar to the allocation of vendor specific application
    identifiers."

draft-ietf-yam-rfc1652bis-pre-evaluation

  1. Ron Bonica: Discuss [2009-10-06]:
        Agree with Adrian. This seems more like a communication with the IESG than
    something that needs to be store in the RFC series for perpetuity. 
        
  2. Ron Bonica: Comment [2009-10-06]:
    
        
  3. Ralph Droms: Comment [2009-10-06]:
    One additional item for our discussion of this doc - procedurally, how will we
    prepare an IESG response?  Do we need to respond to the yam WG uncontionally or
    only if we think RFC 1652 will not be advanced according to the criteria set out
    in this doc or otherwise; e.g., Lisa's concern about security?
  4. Lisa Dusseault: Discuss [2009-10-05]:
        One of the big questions discussed about whether older email standards could go
    to Full Standard was whether the security provisions were sufficient -- whether
    authentication and privacy met our modern requirements, or if not, whether Full
    Standard was acceptable anyway because of historical considerations.
    
    If that is in fact going to be an issue, then this pre-eval document doesn't
    address that or or make the IESG think about that.  Future pre-eval documents,
    if we stick with this WG model, could reasonably compare the standard's security
    to modern requirements.  This DISCUSS position is so that we can talk about
    these issues on the call. 
        
  5. Lisa Dusseault: Comment [2009-10-05]:
    
        
  6. Pasi Eronen: Comment [2009-10-05]:
    My "No Objection" vote means the following answers to the questions in
    Section 3: Yes, I think the proposed changes are suitable. No, I don't
    think any other changes are necessary. Yes, I consider the downward
    references acceptable.
    
    However, the eventual advancement of RFC 1652 to Full Standard will
    naturally go through IETF Last Call (this draft did not go through
    IETF Last Call), where the community has an opportunity to provide 
    more input. My "No Objection" vote here is not a guarantee that 
    I can't change my mind after considering the community input.
  7. Adrian Farrel: Discuss [2009-09-29]:
        
    This seems like a really weird way to communicate with the IESG, and
    I assume we are not supposed to evaluate the draft for publication
    as an RFC as I see...
    
    
    Abstract
       THIS INTERNET DRAFT IS WRITTEN TO FACILITATE PROCESSING WITHIN THE
       IESG.  IT IS NOT MEANT TO BE PUBLISHED AS AN RFC.
    
    1.1.  Note to RFC Editor
    
       This Internet-Draft is not meant to be published as an RFC.  It is
       written to facilitate processing within the IESG.
    
    I think it a shame that community resource has been burnt (e.g. SecDir
    review) evaluating this document as a potential RFC.
    
    ---
    
    In answer to the questions in Section 3
    
       o  Does the IESG believe the proposed changes are suitable during a
          move from Draft to Full Standard?
    
    Yes
    
       o  Does the IESG believe any other proposed changes are necessary to
          satisfy IESG requirements to advance to Full Standard?
    
    I believe that the it is necessary to satisfy any requirements that
    arise from community evaluation of the protocol and from the
    implementation reports.
    
       o  Does the IESG consider the downward references acceptable for a
          Full Standard?
    
    I would prefer that we moved the entire collection forward together,
    but would tolerate the downrefs if the community approves them.
    
    ----
    
    What about draft-dusseault-impl-reports? Not an RFC yet, but good guidance. 
        
  8. Adrian Farrel: Comment [2009-09-29]:
    Section 2
          The universal deployment of this feature is well-known
    
    I suspect this may be an exageration.
  9. Russ Housley: Discuss [2009-10-02]:
        
      This document is not a candidate for standard, which is what one would
      expect from the this agenda item entry.  The document is a reasonable
      way to capture the questions at hand, but an agenda entry that indicates
      the document is moving to standard is misleading and confusing.
    
      This document should be moved to the 'Dead' state in the tracker. 
        
  10. Russ Housley: Comment [2009-10-02]:
    
        
  11. Cullen Jennings: Discuss [2009-10-07]:
        
    I think we are beating a dead horse on a draft like this is not the best way to
    get input from IESG - lets find a better way in the future. So ignoring that,
    I'd like to get on with what advice the IESG might be able to offer to the WG.
    
    The charter says the WG is going to form a list of proposed changes to 
    
    RFC 1652 8BITMIME
    RFC 1864 Content-MD5
    RFC 2045, 2046, 2047, 2049 MIME base specs
    RFC 3282 Content-language
    RFC 3461 DSNs
    RFC 3462 Multipart/Report
    RFC 3463 Enhanced Status Codes
    RFC 3464 Message Format for DSNs
    RFC 3798 Message Disposition Notification
    RFC 4409 Message Submission
    RFC 5321 SMTP
    RFC 5322 Internet Message Format
    
    then consult with IESG. Are the changes proposed in this draft the complete set
    of changes the WG wants to make to the above RFCs? 
        
  12. Cullen Jennings: Comment [2009-10-07]:
    
        
  13. Tim Polk: Discuss [2009-10-07]:
        I also want to discuss the implications of moving a document with known security
    limitations
    to full standard. 
        
  14. Tim Polk: Comment [2009-10-07]:
    My personal responses wrt to the questions in section 3:
    (1) I have no issues with the changes proposed.
    (2) I have not made my mind up whether other changes are needed.
    (3) I have no issues with the downrefs.
    
    Any of those answers could be changed during IETF Last Call for 1652bis.
  15. Robert Sparks: Comment [2009-10-07]:
    I find using a draft to drive discussions like this a very useful technique.
    However, using the balloting/evaluation process this way is a poor fit to the
    tool and I strongly discourage taking this path again.
    
    I currently think the changes proposed are suitable.
    I don't have a problem with the downward references.

draft-ietf-mpls-tp-oam-requirements

  1. Ron Bonica: Discuss [2009-10-06]:
        In Section  2.1.3 you say:
    
    The OAM functionality may be deployed in various environments.
    
       o  In some environments (e.g., IP/MPLS environments), IP routing and
          forwarding capabilities are inherently present in the data plane.
    
       o  In some environments (e.g., MPLS-TP environments), IP routing and
          forwarding capabilities may not necessarily be present in the data
          plane.
    
    The second bullet point is problematic. If solutions MAY be deployed in non-IP
    environments, they MUST NOT rely on IP. This is a very strange position to take
    in the IETF.
    
    Also, in Section 2.2.12, you say:
    
    The MPLS-TP OAM toolset MUST provide a function to enable the
       quantification of the one-way, and if appropriate, the two-way, delay
       of a PW, LSP or Section.
    
       o  One-way delay is the time elapsed from the start of transmission
          of the first bit of a packet by an End Point until the reception
          of the last bit of that packet by the other End Point.
    
    It may be very difficult to measure one-way delay without very well-synchronized
    clocks. 
        
  2. Ron Bonica: Comment [2009-10-06]:
    
        
  3. Lars Eggert: Discuss [2009-10-07]:
        Section 2.2.11., paragraph 2:
    >    Note that packet loss ratio is the ratio of the user packets not
    >    delivered to the total number of user packets transmitted during a
    >    defined time interval.  The number of user packets not delivered is
    >    the difference between the number of user packets transmitted by an
    >    End Point and the number of user packets received at an End Point.
    
      DISCUSS: Both the IETF and the ITU-T have detailed packet loss
      metrics, and they are even aligned between the two bodies [RFC2680]. I
      don't think this document should in passing come up with its own
      definitions here. 
        
  4. Lars Eggert: Comment [2009-10-07]:
    Section 2.2.12., paragraph 1:
    >    The MPLS-TP OAM toolset MUST provide a function to enable the
    >    quantification of the one-way, and if appropriate, the two-way, delay
    >    of a PW, LSP or Section.
    
      Both the IETF and the ITU-T have detailed delay metrics, and they are
      even aligned between the two bodies [RFC2679][RFC2681]. Should we
      refer to these here?
    
    
    Section 3., paragraph 1:
    >    A mechanism (e.g., rate limiting) MUST be provided to prevent OAM
    >    packets from causing congestion in the Packet Switched Network.
    
      Rate limiting only works in conjunciton with reserved PSN capacity for
      OAM (limit the rate to at most the reserved capacity.)
    
    
    Section 2.1.1., paragraph 1:
    >    point associated bidirectional LSPs, point-to-point undirectional
    
      Nit: s/undirectional/unidirectional/
  5. Tim Polk: Discuss [2009-10-07]:
        This is a discuss-discuss; I will clear on the call after discussion.
    
    Is there a reason that the authentication, authorization, and confidentiality
    were not specified
    as OAM requirements?  I would think that these mechanisms
    could be "MUST implement,
    SHOULD use".
    
    Currently, there is only text in the security considerations, and that text is
    fairly weak: 
    "suggests having some form of authentication, authorization, and
    encryption"; "mechanisms
    SHOULD be provided"; and "messages MAY be
    authenticated". 
        
  6. Tim Polk: Comment [2009-10-07]:
    
        
  7. Dan Romascanu:

draft-ietf-mpls-tp-nm-req

  1. Ron Bonica: Comment [2009-10-08]:
    In section 2 I strongly recommend to used the conbination NETCONF/YANG as an
    example rather anything else. But Dan holds that point as part of his DISCUSS.
  2. Lars Eggert: Discuss [2009-10-07]:
        I hate to play downref police, however:
    
    Section 12.1., paragraph 2:
    >    [2]   Nadeau, T., et al, "Operations and Management (OAM)
    >          Requirements for Multi-Protocol Label Switched (MPLS)
    >          Networks", RFC 4377, February 2006.
    
      DISCUSS:  ** Downref: Normative reference to an Informational RFC: RFC
      4377 (ref. '2')
    
    
    Section 12.1., paragraph 4:
    >    [4]   Jones, G., "Operational Security Requirements for Large
    >          Internet Service Provider (ISP) IP Network
    >          Infrastructure", RFC 3871, September 2004.
    
      DISCUSS:  ** Downref: Normative reference to an Informational RFC: RFC
      3871 (ref. '4')
    
    If the document had been shepherded according to PROTO, the shepherd would have
    had to check for downrefs and they could have been handled during IETF LC... 
        
  3. Lars Eggert: Comment [2009-10-07]:
    Section 7., paragraph 0:
    > 7. Performance Management Requirements
    
      Should this section refer to IETF or ITU-T metrics or is it OK to
      leave this open?
  4. Russ Housley: Discuss [2009-10-06]:
        
      In the Gen-ART Review by Joel Halpern on 25-Sept-2009, asks some
      questions that ought to be answered before the document is approved.
    
      Is it reasonable for the references in the following sentence to be
      informational?  Can one read this document and correctly understand
      it without reading these other documents?
      
         In writing this document, the authors assume the reader is
         familiar with references [12] and [15].
    
      Will this document will be cited in other (solution or architecture)
      documents, which are explaining how they meet these requirements?
      If so, there are two loosely related issues:
    
      1) There is some descriptive text which may be intended to also be
         providing requirements.
    
      2) The actual requirements are not named or numbered, so it will be
         difficult for any other document to say "we provide A-Q, but we
         do not provide R for this reason ..." 
        
  5. Russ Housley: Comment [2009-10-06]:
    
        
  6. Dan Romascanu: Discuss [2009-10-08]:
        It's a well written document, with requirements expressed in a clear manner,
    with a good usage of solid references.
    
    The following comments if fixed would improved the document and dissipate a few
    unclarities:
    
    1. Some text is missing concerning the operating model. An assumption is made
    about centralized management from a NMS (probably in a NOC) which has direct and
    indirect access to all NEs, this should be clearly articulated. It is less clear
    whether the assumption is made about what happens with the faults - are they
    logged locally, are alerts generated and sent to the NMS using some kinds of
    notification system, etc. ?
    
    2. There is no discussion about the scalability of the management solutions. We
    are dealing with large scale deployments, with remote access required to all
    nodes, what are the requirements on this respect?
    
    3. In section 2 I strongly recommend to used the conbination NETCONF/YANG as an
    example rather than NETCONF/XML.
    
    4. Section 5.3.1 - I suggest that (also) RFC 3877 is mentioned as a reference
    for alarms severities
    
    5. It is not clear to me what pro-active and on-demand modes refer to when it
    comes to performance monitoring. If pro-active mneans permanent reporting of
    performance information I do not see how this scales. 
        
  7. Dan Romascanu: Comment [2009-10-08]:
    In the second paragraph of section 2 - the capitalization of the keywords is
    inconsistent.

draft-ietf-simple-interdomain-scaling-analysis

  1. Ralph Droms: Comment [2009-10-07]:
    Is there a specific reason not to include the total number of registered users
    in each scenario in section 2?  The enterprise scenario includes:
    
       o  About half of the registered users were online at peak time.
    
    but that doesn't seem useful unless the number of registered users is provided.
  2. Adrian Farrel: Discuss [2009-09-23]:
        
    A good and thorough job. Thank you.
    
    The Security Considerations section seems light on two counts.
    
    Firstly, the very scaling problems that are described constitute a 
    security issue since they will gum up the network, CPU, and memory. To
    what extent is a system at risk for the uncontrolled use of presence
    subscriptions? Can an attack be mounted by simulating a larger number 
    of subscriptions?
    
    Secondly, it is worth examining the impact on all of the scaling that 
    is introduced by applying security to the messages that are exchanged.
    Of course, it should be noted that disabling security to achieve 
    better scaling is not recommended, but there may be choices and 
    implictions.
    
    Fix this with a couple of new paragraphs in an RFC Editor note. 
        
  3. Adrian Farrel: Comment [2009-09-23]:
    I love the new standard unit
    "dozens of gigabytes of presence traffic per day"
  4. Tim Polk: Comment [2009-09-24]:
    I support Adrian's discuss.
  5. Dan Romascanu: Comment [2009-09-24]:
    I like the document and I salute this work - it's one of the first I see
    anaysing impact of a succesful protocol or application on the Internet load and
    CPU losd of the hosts and servers. I would have liked to see also some mention
    of the impact and scalability aspects of the management systems and operator
    tools. Although that impact is not direct and as easy measurable, it is a
    serious concern for operators when dealing with succesful protocols.

draft-ietf-speermint-requirements

  1. Ralph Droms: Comment [2009-10-06]:
    Minor editorial nit.  In section A.1, this sentence doesn't parse:
    
       o  IP Network Connectivity:
          Session peers should define how the IP network connectivity
          between their respective SBEs and DBEs.
  2. Lars Eggert: Comment [2009-10-07]:
      WGs are ephemeral - continously refering to the originating SPEERMINT
      WG in the title and body of the document will read strangely in a few
      years.
  3. Alexey Melnikov: Discuss [2009-10-07]:
        1). DISCUSS DISCUSS, i.e. I intent to clear this part during/after the IESG
    telechat:
    
    draft-ietf-speermint-voip-consolidated-usecases-14.txt shows use of DNS queries
    for Look-Up Function (LUF) and Location Routing Function (LRF).
    Section 5.1 of
    draft-ietf-speermint-requirements-07.txt specifies MUST level requirements on
    the protocol used for LUF/LRF that include mutual authentication, data integrity
    and confidentiality. So I have 2 questions in relationship to this:
    
    A). Would these requirements disqualify use of DNS for the final solution?
    B).
    If the answer to question A) is yes, doesn't this mean that draft-ietf-
    speermint-voip-consolidated-usecases-14.txt becomes inaccurate/misleading the
    moment this document is published?
    
    2). I've solicited an additional review of the section 4 from Peter Saint-Andre.
    He wrote:
    
    In general, I am concerned about the use of the capitalized keyword MUST
    in these requirements, because it could be taken to override local
    policies or user-level privacy settings. For example, if we say that an
    entity absolutely MUST be allowed to subscribe to the presence of users
    in another SSP then operators might take that as saying that a user or a
    service-wide admin cannot block an entity from another SSP (or all
    entities from another SSP) from subscribing to the user's presence. I
    don't think this is what we mean here, but we need to make that clear.
    
    (In particular this applies to the requirement #10)
    
    Requirement #10
    
          The mechanisms recommended for the exchange of presence
          information between SSPs MUST allow a user of one SSP's presence
          community to subscribe presentities served by another SSP via its
          local community, including subscriptions to a single presentity, a
          personal, public or ad-hoc group list of presentities.
    
    The phrase "to subscribe presentities" is missing some words. I think
    "to subscribe to presentities" is meant. However, I think it is better
    to say "to send a presence subscription request to presentities" because
    presumably the presentity needs to control who can and cannot see its
    presence information via some explicit approval mechanism. 
        
  4. Alexey Melnikov: Comment [2009-10-07]:
    In Section 4:
    
       o  Requirement #14: Mappings
          Early deployments of SIP based presence and IM gateways are done
          in front of legacy proprietary systems that use different names
          for different properties that exist in PIDF.  For example "Do Not
          Disturb" may be translated to "Busy" in another system.  In order
          to make sure that the meaning of the status is preserved, there is
          a need that either each system will translate its internal
          statuses to standard PIDF based statuses of a translation table of
    
    I think the first "of" should be "or".
    
          proprietary statuses to standard based PIDF statuses will be
          provided from one system to the other.
    
    While this is a useful requirement, is it actually in scope for the WG?
    
    
    5.3.  End-to-End Media Security
    
       It should also be noted that media can be carried in numerous
       protocols other than RTP such as SIP (SIP MESSAGE method), MSRP,
       XMPP, etc., over TCP ([RFC4571]), and that it can be encrypted over
       secure connection-oriented transport sessions over TLS ([RFC4572]).
    
    I think MSRP, XMPP, etc. need informative references.
    
    
    From review of Section 4 by Peter Saint-Andre:
    
    Requirement #11
    
          The mechanisms recommended for Instant Messaging message exchanges
          between SSPs MUST allow a user of one SSP's community to
          communicate with users of the other SSP community via their local
          community using various methods.  Such methods include sending a
          one-time IM message, initiating a SIP session for transporting
          sessions of messages, participating in n-way chats using chat
          rooms with users from the peer SSPs, sending a file or sharing a
          document.
    
    Use cases such as sending a file and sharing a document are not IM use
    cases. Furthermore, the text seems to imply that an SSP cannot exercise
    any granular control over which of the "various methods" are allowed.
    
    
    Requirement #12
    
          In order to enable sending less notifications between communities,
    
    Usage: "less ... notifications" ==> "fewer ... notifications".
    
          there should be a mechanism that will enable sharing privacy
          information of users between the communities.  This will enable
          sending a single notification per presentity that will be sent to
          the appropriate watchers on the other community according to the
          presentity's privacy information.
          The privacy sharing mechanism must be done in a way that will
          enable getting the consent of the user whose privacy will be sent
          to the other community prior to sending the privacy information.
          if user consent is not give, it should not be possible to this
          optimization.  In addition to getting the consent of users
          regarding privacy sharing, the privacy data must be sent only via
          secure channels between communities.
    
    The phrase "secure channels" is not defined. Does this mean SIP
    signalling over TLS-encrypted TCP? It would be good to specify what's
    meant, or to point to the security considerations.
    
    Requirement #13
    
          It should be possible to send a presence document with a list of
          watchers on the other community that should receive the presence
          document notification.  This will enable sending less presence
          document notifications between the communities while avoiding the
          need to share privacy information of presentities from one
          community to the other.
    
    Usage: "less ... notifications" ==> "fewer ... notifications".
    
    This requirement says nothing about security. Presumably, information
    about the recipients of a given notification might also be private and
    therefore worthy of protection, just as under Requirement #12.
    
    Requirement #14
    
          Early deployments of SIP based presence and IM gateways are done
          in front of legacy proprietary systems that use different names
          for different properties that exist in PIDF.  For example "Do Not
          Disturb" may be translated to "Busy" in another system.  In order
          to make sure that the meaning of the status is preserved, there is
          a need that either each system will translate its internal
          statuses to standard PIDF based statuses of a translation table of
          proprietary statuses to standard based PIDF statuses will be
          provided from one system to the other.
    
    The final sentence is a bit confusing and its directive to SSPs is not
    clear, even if we correct "of" to "or" in the middle. I might reword it
    as follows:
    
          To make sure that the meaning of the status is preserved, an SSP
          should translate its internal statuses to standard PIDF statuses.
    
    I don't think we want to recommend that SSPs exchange translation
    tables, because the maintenance issues are significant and there is no
    need to do this given that we have PIDF.
  5. Robert Sparks: Discuss [2009-10-07]:
        
    The question "Is DNS the right place for putting data that varies based
    on who asks?" is out of place in this document.  The document doesn't
    capture enough of the argument that led to it being included to be
    useful to future readers.  Please either document that argument or
    remove the sentence. Alternatively, find requirements that capture the
    concern and state those. (Btw - this language assumes a particular
    mechanism for using DNS. Alternates that avoid that question exist -
    you can give the different askers different names to ask for, for
    example).
    
    The Presence and Instant Messaging requirements don't fit cleanly withthe other
    requirements in this document.  Requirement 13, in
    particular, is a mechanism
    stated as a requirement. The realrequirement is to allow policy for more than
    one potential recipient to
    be passed with a presence document.  The last
    sentence in Requirement14 is incomplete, which makes it unclear.  I suggest
    breaking it into
    simpler phrases. 
        
  6. Robert Sparks: Comment [2009-10-07]:
    Nit: typo: "if user consent is not give,": give should be given

draft-ietf-speermint-voip-consolidated-usecases

  1. Ralph Droms: Comment [2009-10-06]:
    Is there a specific intended purpose for these use cases: requirements
    development, guidance to developers/deployers, ???
    
    Sorry for the minor rant, but the phrase "attempts to 'do something useful'" is
    a hot button for me.  So, I'm going to indulge my inner pedant here.
    
    In the Introduction:
    
       This document attempts to capture Voice over IP (VoIP) use cases for
       Session Initiation Protocol (SIP) [RFC3261] based peering.
    
    "Attempts to capture" probably isn't a useful result.  How about "describes
    important Voice over IP (VoIP) use cases, as determined by the SPEERMINT working
    group, ..."
    
    And, s/SPEERMING/SPEERMINT" in the header...
  2. Alexey Melnikov: Comment [2009-10-03]:
    RFC 4366 is not referenced in the text, so it should be deleted.
  3. Robert Sparks: Discuss [2009-10-07]:
        
    Its not clear whether the call-flows used to depict some of the
    use-cases in this document are intended to be one way the use case
    could be realized or _the_ way the group is planning to realize the use
    case. If it is the latter, the document is bordering on being normative
    rather than just informative.  Could you add a short explanation
    scoping the applicability of the examples early in the document?
    
    Why does the B2BUA in section 5.2 reset Max-Forwards rather than
    continuing to decrement it in step 7?
    
    At step 9 of section 5.2, the T-SBE jumps straight to an A lookup. Why
    isn't this going through full RFC3263 resolution?
    
    There is at least one instance of a missing semicolon between
    header field parameters when the header field is folded (see Contact in
    message 8 on page 17). There are other places where there are spurious
    ;'s (the first Via at the top of page 10). I suggest a careful check,
    if not automated review, of the syntax in the examples. 
        
  4. Robert Sparks: Comment [2009-10-07]:
    
      

draft-ietf-roll-home-routing-reqs

  1. Jari Arkko: Discuss [2009-10-08]:
        This is an important area and a document in this space is very welcome.
    That being said, I'm not sure what to think of this document. If I had
    written a document on this topic, it would probably say very different
    things. I realize what the charter of the ROLL WG is, but the biggest
    problem this document has is its high focus on the routing tools. There
    are plenty of issues in building home networks like this, and one has
    to find the right architecture and right tools to solve the issues.
    This document goes too far in my opinion as positioning routing protocols
    as the solution for some of the problems. Application layer mechanisms
    for instance may be far more appropriate for some things. 
    
    This is not to say that there are no routing related requirements
    in wireless ad hoc home networks. But the requirements seems relatively
    easy:
    
    - must support self-organized routing setup for a few dozen
      networks and few hundred devices
    - must support QoS based routing and forwarding
    - must support capability/constraint based routing
    
    So I would suggest that the document be shortened to address my Discuss.
    Some specific comments below.
    
    > The routing protocol MUST provide mobility with convergence time
    > below 0.5 second if only the sender has moved.
    >
    > The routing protocol MUST provide mobility with convergence time
    > below 4 seconds if the receiver has moved.
    
    This presumes a particular solution to mobility, i.e., doing it at the
    routing layer. It is not clear that this would be the right solution.
    I would probably personally employ a BAN and a cellular/WLAN uplink
    from my phone which would solve the problem at L2, or an application
    layer solution that would require nothing from the routing layer
    and would work well in any existing network.
    
    > A controller sending commands to a sleeping actuator
    > node via ROLL devices will have no problems delivering the packet
    > to the nearest powered router, but that router may experience a
    > delay until the next wake-up time before the command can be
    > delivered.
    >
    > Sleeping nodes may appear to be non-responsive. The routing
    > protocol MUST take into account the delivery time to a sleeping
    > target node.
    
    Hmm. I wonder what the real effect to the routing protocol is.
    I am absolutely certain that application, transport, layer 2, and even
    IP forwarding/queuing techniques change dramatically because of this.
    But as far as I can tell, doesn't routing stay unaffected?
    
    > The routing protocol SHOULD support acknowledged transmission. If
    > the routing protocol does not support acknowledged transmission,
    > some higher-layer transport protocol or application MUST ensure
    > delivery of such messages.
    
    Maybe I am misreading the first sentence, but I hope we are not
    somehow changing the IP model or forwarding because of ROLL
    requirements. IP should deliver packets, unreliably. Routing
    should find out what the best and most reliable path is.
    Link layers that are inherently very unreliable may increase
    their reliability by proper MAC design (and e.g., L2 acknowledgements).
    But I'm not sure what all this has to do with routing... 
        
  2. Jari Arkko: Comment [2009-10-08]:
    > Unlike other categories of Personal Area Networks (PANs), the
    > connected home area is very much consumer-oriented.
    
    Surely this is not true. I think most sports performance measurement
    gear, phone & music player, etc. applications are very consumer
    oriented. Perhaps you meant to say that other ROLL areas (like
    industrial plant monitoring) are less consumer oriented than home
    and PAN areas.
    
    > One event may cause many actuators to be activated at the same
    > time.
    > Using the direct analogy to an electronic car key, a house owner
    > may activate the "leaving home" function from an electronic house
    > key, mobile phone, etc. For the sake of visual impression, all
    > lights should turn off at the same time. At least, it should
    > appear to happen at the same time. A well-known problem in
    > wireless home automation is the "popcorn effect": Lamps are turned
    > on one at a time, at a rate so slow that it is clearly visible.
    
    I am wondering what value this paragraph adds. This may be a well
    known problem, but it is certainly one of poor implementation
    and/or choice of L2. I have a very hard time seeing this being
    a problem due to routing, or even being a problem in a well
    design network. In particular when home networks are naturally
    quite limited in physical size, unlike factories or commercial
    buildings.
    
    > If assignment of unique addresses is performed by a central
    > controller, it must be possible to route the inclusion request
    > from the joining node to the central controller before the joining
    > node has been included in the network.
    
    While this requirement is logical, I wonder to what extent it assumes
    that we somehow have to redo many of the basic building blocks and 
    concepts that we have in IP networks. Does ROLL require something
    AUTOCONF-like? I would certainly hope that we can still have
    subnets and the basics of IP addressing stay the same, and that
    things like DHCP and DHCP relays work.
    
    > In contrast to other applications, e.g. industrial sensors, where
    > data would mainly be originated by a sensor to a sink and vice
    > versa, this scenario implicates a direct inter-device
    > communication between ROLL devices.
    
    I'm not convinced that the home network is any more peer-to-peer
    driven than other environments. Most equipment that we have today
    is still centrally controlled, even if running on top of IP.
  3. Lars Eggert: Discuss [2009-10-07]:
        Section 3.4., paragraph 3:
    >    If possible at all, the routing protocol MUST deliver a health-
    >    care related message. It is NOT a requirement that such message is
    >    delivered in less than a second.
    >    The routing protocol SHOULD support acknowledged transmission. If
    >    the routing protocol does not support acknowledged transmission,
    >    some higher-layer transport protocol or application MUST ensure
    >    delivery of such messages.
    
      DISCUSS: I may be misunderstanding something, but why is reliable
      delivery of healthcare *application* data something that the *routing*
      protocol needs to do? If end-to-end reliability is required, the app
      or app protocol needs to be involved anyway. Clearly routing can aid
      this by providing paths to such apps that are more stable, but that's
      about it, no? 
        
  4. Lars Eggert: Comment [2009-10-07]:
    Section 3.2., paragraph 4:
    >    The routing protocol MUST provide mobility with convergence time
    >    below 0.5 second if only the sender has moved.
    
      There's an unstated assumption here regarding the size/diameter of the
      network. You might want to point to Section 3.5 here.
    
    
    Section 3.8., paragraph 1:
    >    The routing protocol MUST support the ability to isolate a
    >    misbehaving node thus preserving the correct operation of the
    >    overall network.
    >    In other words, if a node is found to fail often compared to the
    >    rest of the network, this node should not be the first choice for
    >    routing of traffic.
    
      At least to me, the second paragraph isn't talking about the same
      thing as the first paragraph. The first one says "never use", the
      second says "not prefer."
    
    
    Section 2.1., paragraph 3:
    >    acknowledged singlecast messages to each device.
    
      Nit: s/singlecast/unicast/ (?)
  5. Pasi Eronen: Discuss [2009-10-06]:
        
    I have reviewed draft-ietf-roll-home-routing-reqs-08, and have couple
    of questions/concerns that I'd like to discuss before recommending
    approval of the document:
    
    - The last paragraph of Section 3.4 seems to suggest that the routing
    protocol could deliver acknowledgements to applications about whether
    an IP packet was delivered or not (but this is more forwarding
    than routing thing anyway). I think I'm probably misunderstanding 
    this text, and the intent was to say something else. But what exactly?
    
    - Sections 3.7 and 5 seem to have conflicting requirements about
    security and zero-configuration (adding a new node to the network
    without any human intervention is pretty hard to combine with the
    requirement to keep unwanted nodes out).
    
    - It looks like [I-D.Hui-HeaderCompression] should be an informative
    reference, not normative. 
        
  6. Pasi Eronen: Comment [2009-10-06]:
    
        
  7. Cullen Jennings: Discuss [2009-10-07]:
        
    Glad to see this doc - I'm very keen on this work and look forward to being
    able to use it. Few issues that if we can resolve them now as requirements, I
    think will help get the protocol work done faster.
    
    
    I'm not comfortable with the discussion of Health Care messages and
    specifically:
    
       If possible at all, the routing protocol MUST deliver a health-
       care
    related message.
     
    I would like the requirements to make it clear if the
    requirement is to support safety critical messages or not. I have no problem
    with two (or more) levels of QoS where one has a better change of being
    delivered than the others but if this is going to specify enough to support
    safety critical messages, it needs to be crisp about the requirements that
    entails.
    
    I don't think I understand what you mean by the following requirement.  
    
       The routing protocol SHOULD support acknowledged transmission.
    
    The way I read this, I would say that IP does not provide that, but an
    application on top could. And SHOULD in requirements are pretty confusing to
    start with. Can you rephrase this requirement to be more concrete as a
    requirement and less of a solution?
    
    
    Could you put more about the requirements around security and zero
    configuration of adding new elements. It must be secure, but new elements can
    automatically add themselves and disrupt routing seems contradictory. I also
    wonder about about how message integrity and zero conf enrollment will work.  I
    think it is possible to come up with a set of requirements that represent a
    reasonable balance here. Making it really easy to add or replace devices to the
    network, while still maintaining security, seems to be the key part of this
    system but seems both underspecified in the draft while at the same time being
    over constrained. Surely the alarm system case must impose some security
    requirements. 
        
  8. Cullen Jennings: Comment [2009-10-07]:
    What's the requirement to use V6 on a network with 250 devices? The message
    with a 5 byte payload will take substantial longer and more power to transmit
    than if one used v4. I realize the HC is designed to solve that problem but it
    seems like it is layer complexity on top of complexity.
    
    I suspect you have the wrong "Status of memo boilerplate". You want the one that
    has "This document may contain material
       from IETF Documents or IETF
    Contributions published or made publicly
       available before November 10, 2008."
  9. Alexey Melnikov: Comment [2009-10-06]:
    I am supporting Pasi's DISCUSS about conflict of zero-configuration with
    security.
    
    3.5. Scalability
    
       Looking at the number of wall switches, power outlets, sensors of
       various nature, video equipment and so on in a modern house, it
       seems quite realistic that hundreds of low power devices may form
       a home automation network in a fully populated "smart" home.
       Moving towards professional building automation, the number of
       such devices may be in the order of several thousands.
    
       The routing protocol MUST support 250 devices in the network.
    
    Should this be "... MUST support at least 250 devices ...".
    And to use Chris Newman's trick: why not say 257?
  10. Robert Sparks: Discuss [2009-10-07]:
        DISCUSS
    
    I support Lars' discuss regarding requirements on applications vs requirements
    on the routing protocol.
    
    There are several constants presented as requirements without
    motivation. Where did the .5 second, 2 second, and 4 second
    convergence times come from? Why is the receiver-moved-only
    requirement in 3.2 separated in the text from the sender-moved-only
    requirement in 3.6?
    
    What is section 4 informing? If it is truly necessary, then many of the
    claims (frequency of switch/remote use, frequency of sensor reporting)
    needs to point to some reference for authority. The end of that section
    also makes some claims about mechanism ("typically as UDP" for
    example) that are out of place. Can the section be deleted?
    
    The paragraph motivating "MUST support 250 devices" is not persuasive
    (plugs and switches are not inherently going to be low-power nodes).
    What led to the choice of this particular constant? 
        
  11. Robert Sparks: Comment [2009-10-07]:
    The prose frequently assumes radio-based wireless.  The charter for the
    group calls out other technologies.  Is it possible that some
    requirements motivated by those other technologies have been missed?
    
    You might want to consider devices like robot-vacuum cleaners as nodes
    that can be both transmitters and receivers that will be highly
    portable.
    
    (Pasi captured this better in his discuss, but this was already written so I'm
    leaving it here to inform that conversation).
    Has the group begun to explore the
    conflict between the authentication
    requirements in the security consideration
    section and the
    zero-configuration for access requirements earlier in the
    document? If
    so, capturing some of that discussion would be helpful. If not,
    there
    may be related requirements that the group hasn't uncovered yet.

draft-ietf-msec-tesla-for-alc-norm

  1. Russ Housley: Discuss [2009-10-06]:
        
      The Gen-ART Review by Pete McCann raised some points for discussion.
      However the discussion has not taken place.  Suggestions are made,
      and without the discussion it is impossible to tell if these are
      good suggestions or not.
    
      > I'd suggest a more prominent reference to RFC 4082, especially to
      > section 3.1 that describes the basic idea behind TESLA.  You do have
      > a reference just before Section 1.1, but perhaps you could add some
      > explanatory text here to make it clear that the an overview of the
      > use of hash chains to efficiently authenticate a long stream of
      > packets is described in RFC 4082. 
    
      > Section 2.4.2.2 says:
      > 
      >    The sender and receivers use the direct
      >    time synchronization scheme to synchronize with the various time 
      >    references.
      >
      > Should this say "indirect time synchronization scheme"? 
        
  2. Russ Housley: Comment [2009-10-06]:
    
        
  3. Alexey Melnikov: Discuss [2009-10-07]:
        I believe the following reference must be normative:
    
       [RFC1305]  Mills, D., "Network Time Protocol (Version 3)
                  Specification, Implementation", RFC 1305, March 1992.
    
    as this document describes NTP timestamp format used in various places in the
    document. 
        
  4. Alexey Melnikov: Comment [2009-10-07]:
    
      

draft-ietf-rtgwg-lf-conv-frmwk

  1. Lars Eggert: Comment [2009-10-07]:
    Very nice document overall!
    
    Section 6.5., paragraph 5:
    >    This
    >    could, for example, be achieved by allocating a Type of Service bit
    >    to the task[RFC0791].  This mechanism works identically for both
    >    "bad-news" and "good-news" events.  It also works identically for
    >    SRLG failure.  There are three problems with this solution:
    
      There is no "ToS byte" anymore since DiffServ was published. Using a
      DSCP for that purpose is also not really in tune with the DiffServ
      architecture. Suggest to remove this example or point out in the list
      following this paragraph that that's also a drawback.
  2. Adrian Farrel: Comment [2009-10-08]:
    Section 3 has
    
       Throughout this document we use the term SRLG to describe
       the procedure to be followed when multiple failures have occurred
       whether or not they are members of an explicit SRLG.
    
    s/to describe/when describing/
    
    ---
    
    Echo the point on the the ToS byte.
    Suggest to completely remove the sentence.
    
    ---
    
    I think it is unfortunate that section 12 is so skinny. I presume that
    if I am able to induce micro loops (perhaps by flapping a resource) I
    could cause considerable network disruption and so using loop prevention
    or mitigation is a protection.

draft-ietf-rtgwg-ipfrr-framework

  1. Ralph Droms: Comment [2009-10-06]:
    How does section 4.2.2 explain the percentages given for various failure modes
    in section 4.2?  I see how section 4.2.2 describes how an analysis could be
    performed, but I don't see the specific analysis that gives the percentages in
    section 4.2.
    
    Section 4.3 piqued my curiosity; it would be useful (but certainly not
    necessary) to say more:
    
    4.3.  Local Area Networks
    
       Protection against partial or complete failure of LANs is more
       complex than the point to point case.  In general there is a trade-
       off between the simplicity of the repair and the ability to provide
       complete and optimal repair coverage.
  2. Lars Eggert: Discuss [2009-10-07]:
        
    Section 4.1., paragraph 0:
    >  4.1.  Mechanisms for fast failure detection
    
      DISCUSS: Some of these fast failure detection techniques (the ones
      based on observing packet loss) can lead to false positives when used
      with very aggressive detection intervals, because losses caused by
      transient congestion appear as a failure. I believe it's important to
      point out somewhere in this document (maybe in this section) that any
      technique used for fast failure detection MUST avoid being confused by
      transient congestion. Otherwise, route flapping can occur, with all
      the bad effects that has on transport connections & the network in
      general. 
        
  3. Lars Eggert: Comment [2009-10-07]:
    Section 2., paragraph 2:
    >    Recent advances in routers have reduced this interval to under a
    >    second for carefully configured networks using link state IGPs.
    >    However, new Internet services are emerging which may be sensitive to
    >    periods of traffic loss which are orders of magnitude shorter than
    >    this.
    
      It'd be fair to point out that although fast reroute can significantly
      improve behavior under failures for such applications, it is no
      panacea. When the characteristics of the backup path are different
      from the primary path (less available capacity, but also even longer
      delay), some of those services will still experience some issues.
  4. Adrian Farrel: Discuss [2009-10-08]:
        
    I like this document and I only have a small Discuss.
    
    Section 1
       Distance_opt(A,B)   The distance of the shortest path from A to B.
    
    We seem to lack a definition of "distance". I know this is used in RFC
    2328, but it is (IMHO) too close to implying hop-count, which is not 
    what you mean. Maybe "cost" is a better word, but you would still do
    well to include a definition such as:
    
       cost    The sum of the link metrics for the links in a path. 
        
  5. Adrian Farrel: Comment [2009-10-08]:
    Section 1
    
    The definition of "E" uses the term "primary next-hop neighbor" but your
    terminology defines the term "primary neighbor".
    
    ---
    
    Section 1
    Upstream forwarding loop defintion
    s/none of which are/none of which is/
    
    ---
    
    It is a slight editorial concern that some sections have multiple
    numbered bullet lists using the same ordinals. Could you consider using
    letters for second lists so there is no confusion between lists?

draft-ietf-ipsecme-ikev2-ipv6-config

  1. Russ Housley: Discuss [2009-10-06]:
        
      The Gen-ART Review by Avshalom Houri on 2009-09-24 raised a concern
      about authentication and re-authentication.  In particular, I think
      that a bit more discussion of this paragraph is needed:
    
       The gateway uses the Link ID to look up relevant local state,
       verifies that the authenticated peer identity associated with
       the link is correct, and continues the handshake as usual. 
        
  2. Russ Housley: Comment [2009-10-06]:
      The Gen-ART Review by Avshalom Houri on 2009-09-24 suggested a
      section describing how the requirements in section 3 are being 
      addressed by the solution.

draft-ietf-eai-downgraded-display

  1. Pasi Eronen: Discuss [2009-10-06]:
        I have reviewed draft-ietf-eai-downgraded-display-02, and have couple
    of questions/concerns that I'd like to discuss before recommending
    approval of the document:
    
    - I found the algorithm in Section 4 extremely difficult to
    understand.  For example, in Step 2 one could assume the generated
    header fields are added to the "edit space" -- but the example later
    suggests that's probably not the case. And it's very unclear why Step
    6 applies also to "Address Header Fields' Preservation Header Fields",
    or what it does for them (I thought those are already processed by
    steps 1...5). I'd suggest some rewriting here to add clarity.
    
    - Section 5 says hiding the information from the actual header fields
    isn't a problem if the comparison done in step 4 succeeds. But this
    step applies only to address header fields, right? What about 
    non-address header fields? 
        
  2. Pasi Eronen: Comment [2009-10-06]:
    
      

draft-harkins-emu-eap-pwd

  1. Pasi Eronen: Discuss [2009-09-25]:
        I have reviewed draft-harkins-emu-eap-pwd-08, and have couple of minor
    questions/concerns that I'd like to discuss before recommending
    approval of the document:
    
    - The document doesn't seem to specify how e.g. the password and
    peer-ID entered by the user (character strings) are converted to byte
    strings before hashing. (SASLprep processing followed by UTF-8 encoding
    would be one obvious choice, but not the only one.)
    
    - The document should specify at least one mandatory-to-implement
    algorithm (for DH group/random function/prf/password preprocessing
    method) to ensure interoperability.
    
    - RFC 3079 doesn't actually specify how to calculate NtPasswdHash, but
    just points to RFC 2759. Probably this document should point to
    RFC 2759, too.
    
    - References RFC 4634, RFC 5226, and RFC 3079/2759 look normative
    rather than informative. 
        
  2. Pasi Eronen: Comment [2009-09-25]:
    
        
  3. Cullen Jennings: Discuss [2009-10-07]:
        
    I imagine the draft is fine and I am just not understanding it. I don't see how
    negotiation of PRF happens. If one side supports PRF, A B C D, and the other
    side supports C, D, E, F, how do they figure out which one to use? If there is
    no way to negotiate this I don't understand how forward compatibility works to
    add new PRF later. I see how the server tells the peer which PRF to use but I
    don't see how the server finds out what PRFs the peer supports. Can you point me
    at what I am missing here. 
        
  4. Cullen Jennings: Comment [2009-10-07]:
    
        
  5. Alexey Melnikov: Discuss [2009-10-08]:
        This is a well written document with good Security considerations.
    I have one minor comment/question in relationship to revision 10:
    
    2.6.2.  Passwords
    
       o   Microsoft: The input password string SHALL be processed to
           produce the output PasswordHashHash, as defined in [RFC2759].
    
    Neither RFC 2759, nor this document specify how the input password
    is encoded. RFC 2759 says that it is in Unicode, but Unicode has multiple
    encodings, which would result in different hashes.
    
           This technique is useful when the server does not have access to
           the plaintext password. 
        
  6. Alexey Melnikov: Comment [2009-10-08]:
    
        
  7. Tim Polk: Comment [2009-10-07]:
    I do not have the level of confidence in the cryptographic mechanisms that would
    be required
    to support standards track publication, but I am comfortable with
    publishing as Informational.

draft-iana-ipv4-examples

  1. (none)

draft-keromytis-keynote-x509

  1. Lars Eggert: Discuss [2009-10-07]:
        [edited]
    
    The draft header says "Intended Status: Proposed". This should be Informational.
    
    Section 7., paragraph 1:
    >    Per [KEYNOTE], IANA should provide a registry of reserved algorithm
    >    identifiers.  The following identifiers are reserved by this document
    >    as public key identifier encodings:
    
      Does this registry exist or does this draft intend to remind IANA that
      this registry should still be created? If the latter, and assuming
      that IANA wants to do this for a non-IETF protocol, there is
      information missing here (and from [KEYNOTE]) as to what the
      allocation policies are. 
        
  2. Lars Eggert: Comment [2009-10-07]:
    
        
  3. Alexey Melnikov: Comment [2009-10-02]:
    Some minor editorial suggestions:
    
    1). RFC 3280 --> RFC 5280
    2). Add a reference for base64 - RFC 4648
  4. Tim Polk: Discuss [2009-09-18]:
        This document is an example where there is no conflict and no need to clarify
    the relationship
    with IETF specifications.  While I have proposed a standard
    3932 IESG note in the tracker, I am
    advocating publication without any IESG note
    whatsoever. 
        
  5. Tim Polk: Comment [2009-09-18]:
    
      

draft-templin-ranger

  1. (none)

draft-irtf-mobopts-mmcastv6-ps

  1. (none)