[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Agenda and Package for June 26, 2003 Telechat




        INTERNET ENGINEERING STEERING GROUP (IESG)
      Agenda for the June 26, 2003 IESG Teleconference
                                                                                
1. Administrivia
                                                                                
  o Roll Call

Harald Alvestrand---Will call in
Rob Austein---Will call in 
Steve Bellovin---Will call in
Randy Bush---Will call in
Michelle Cotton---Will call in
Leslie Daigle---Will call in
Dinara Suleymanova---Will call in
Bill Fenner---Will call in
Ned Freed---Will call in 
Barbara Fuller---Will call in* 
Ted Hardie---Will call in
Jacqueline Hargest---Will call in*
Russ Housley---Will call in
Allison Mankin---Will call in
Thomas Narten---Will call in
Erik Nordmark---Call at +33-4-76-99-84-29
Jon Peterson---Will call in
Joyce K. Reynolds---Will call in
Bert Wijnen---Will call in
Alex Zinin---Will call in

Participants inside the U.S. should dial 
888-315-1685.

If you have requested operator assistance, 
an operator will call you and connect 
you to the call.

All participant should enter the passcode 
235467 when prompted to do so.

Participants outside the U.S. should use 
either one of the toll-free numbers listed 
below, or the direct-dial number 703-788-0617. 
Participants using the direct-dial number 
will pay their own long distance charges 
through their own carriers. Participants 
dialing the toll-free number will not pay 
any charges for the conference as all 
charges, including long distance, will be 
included on the invoice sent to the company 
hosting the call. In some cases, participants 
from certain international countries may only 
use a direct-dial number.

The first person on the call will not hear 
anything until joined by other participants. 
A tone will sound as others join the conference.
****************************************
TOLL-FREE NUMBERS
ARGENTINA---0800-666-0375
AUSTRALIA---1800-001-906
BRAZIL---000-817-200-5360
CHINA---10800-1300398
FINLAND---08001-10966
FRANCE---0800-91-1452
GERMANY---0800-181-7632
HONG KONG---800-96-3907
HUNGARY---06-800-15083
ISRAEL---18009300182
JAPAN---00531-13-0415
MEXICO---001-866-857-1855
NORWAY---800-10-074
SWEDEN---020-791386
UNITED KINGDOM---0800-904-7969
SOUTH KOREA---00308-131103
NETHERLANDS---0800-023-2726

PARTICIPANTS FROM ALL OTHER COUNTRIES MUST USE 
THE DIRECT DIAL NUMBER AND THUS INCUR CHARGES 
FROM THEIR OWN CARRIER.



  o Bash the Agenda











  o Approval of the Minutes
    - June 12, 2003
  o Review of Action Items

OUTSTANDING TASKS
	Last updated: June 20, 2003
	
IP  	o Allison to review draft-agrawal-sip-h323-interworking-reqs
      	  and send decision to IESG.
IP  	o Erik to document process of how the IESG goes about asking architectural
      	  questions of the IAB
IP  	o Thomas to write (or cause to be written) a draft on "how to get to Draft".
IP  	o Thomas to contact Cablelabs to discuss formal relationship with IAB
IP  	o Allison and Thomas will email Secretariat note to send to RFC Editor
      	  about 3GPP RFC Editor documents.
IP  	o Ned to write an IESG note for draft-tegen-smqp (Informational)
IP  	o Steve to write RFC re: TCP MD5 option
IP  	o Randy and Ned to finish ID on Clarifying when Standards Track Documents may
      	  Refer Normatively to Documents at a Lower Level
IP  	o Alex to send proposal and justification for interim document review.
IP  	o Steve to generate a summary of IESG views of the "problem"
IP  	o Steve to propose a different document classification than the current
      	  info/proposed/etc.
IP      o Next Steps in Signaling (nsis)
          Allison Mankin to submit a Revised Charter to the Secretariat. Secretariat
          to send a WG Review Announcement with copy to new-work@ietf.org.
IP	o Harald Alvestrand to talk to RFC Editor about independent submissions.
IP	o Alex Zinin to phrase a question to RTG and OPS Area Directoriats and IAB 
	  on PPVPN issue. Alex to summarize the results as a proposed IESG consensus 
	  regarding the PPVPN issue to be given to the PPVPN working group. 
IP	o Secretariat to include teleconference bridge/call-in details in telechat 
	  packages going forward.

                                                                                
2. Protocol Actions

2.1 WG Submissions
2.1.1 New Item
o SDP: Session Description Protocol (Proposed Standard) 
<draft-ietf-mmusic-sdp-new-13.txt>
Token: Peterson, Jon

2.1.2 Returning Item
o The Secure Real-time Transport Protocol (Proposed Standard) 
<draft-ietf-avt-srtp-08.txt>
Token: Mankin, Allison
Note: Ready for IESG review - last call comments found a few concerns with 
the treatment of padding and index and these were corrected in a new rev. 
o Mapping of of Integrated Services Digital Network (ISUP) Overlap Signalling 
to the Session Initiation Protocol (Proposed Standard) 
<draft-ietf-sipping-overlap-04.txt>
Token: Mankin, Allison
Note: New version needs review by the Discussants.  One past revision was 
unclear, but this revision looks good.. 


2.2 Individual Submissions
2.2.1 New Item
 NONE
2.2.2 Returning Item
o Generating One-Time Passwords with SHA-256, SHA-384, and SHA-512 (Proposed 
Standard) 
<draft-nesser-otp-sha-256-384-512-02.txt>
Token: Housley, Russ



3. Document Actions

3.1 WG Submissions
3.1.1 New Item
o Requirements for Distributed Control of ASR, SI/SV and TTS Resources 
(Informational) 
<draft-ietf-speechsc-reqts-04.txt>
Token: Peterson, Jon
o Applicability Statement for Restart Mechanisms for the Label Distribution 
Protocol (Informational) 
<draft-ietf-mpls-ldp-restart-applic-01.txt>
Token: Zinin, Alex
Note: Responsible: WG chairs 
o Compact Forward Error Correction (FEC) Schemes (Experimental) 
<draft-ietf-rmt-bb-fec-supp-compact-01.txt>
Token: Mankin, Allison
o Cross Registry Internet Service Protocol (CRISP) Requirements 
(Informational) 
<draft-ietf-crisp-requirements-05.txt>
Token: Freed, Ned
Note: Asked to be added to IESG agenda 
o Unmanaged Networks IPv6 Transition Scenarios (Informational) 
<draft-ietf-v6ops-unman-scenarios-02.txt>
Token: Bush, Randy

3.1.2 Returning Item
o Goals for IPv6 Site-Multihoming Architectures (Informational) 
<draft-ietf-multi6-multihoming-requirements-07.txt>
Token: Bush, Randy
o Requirements of a QoS Solution for Mobile IP (Informational) 
<draft-ietf-nsis-qos-requirements-01.txt>
Token: Mankin, Allison
Note: This document is a renaming of 
draft-ietf-mobileip-qos-requirements-03.txt (expired). That document was 
reviewed by IESG already and was given a go, except for lacking a Security 
Consideration section, which it now has (2003-06-19). 


3.2 Indiviual Submissions Via AD
3.2.1 New Item
o URI Scheme for the TFTP Protocol (Informational) 
<draft-lear-tftp-uri-06.txt>
Token: Hardie, Ted

3.2.2 Returning Item
 NONE

3.3 Indiviual Submissions Via RFC Editor
3.3.1 New Item
o The Media Gateway Control Protocol (MGCP) Bulk Audit Package 
(Informational) 
<draft-foster-mgcp-bulkaudits-09.txt>
Token: Peterson, Jon
o .sex Considered Dangerous (Informational) 
<draft-eastlake-xxx-06.txt>
Token: Alvestrand, Harald

3.3.2 Returning Item
 NONE


4. Working Group Actions
4.1 WG Creation
4.1.1 Proposed for IETF Review
          NONE
4.1.2 Proposed for Approval
o Layer 3 Virtual Private Networks
Token: Thomas
o Path Maximum Transmission Unit Discovery
o Layer 2 Virtual Private Networks
Token: Thomas
4.2 WG Rechartering
4.2.1 Under evaluation for IETF Review
          NONE
4.2.2 Proposed for Approval
          NONE

5. Working Group News We Can Use

                                                                                
6. IAB News We Can Use
                                                                                
7. Management Issues
          NONE

        DRAFT * DRAFT * DRAFT * DRAFT * DRAFT * DRAFT * DRAFT
          INTERNET ENGINEERING STEERING GROUP (IESG) MINUTES
                June 12, 2003 IESG Teleconference



Reported by: Jacqueline Hargest, IETF Secretariat


ATTENDEES
-----------------
Harald Alvestrand / Cisco
Rob Austein / IAB Liaison
Randy Bush / IIJ
Michelle Cotton / ICANN
Leslie Daigle / Verisign (IAB)
Bill Fenner / AT&T
Ned Freed / Sun Microsystems
Barbara Fuller / IETF Secretariat
Ted Hardie / Qualcomm, Inc.
Jacqueline Hargest / IETF Secretariat
Russ Housley / Vigil Security, LLC
Allison Mankin / Bell Labs, Lucent
Erik Nordmark / Sun
Jon Peterson / NeuStar, Inc.
Joyce K. Reynolds / ISI (RFC Editor)
Dinara Suleymanova / IETF Secretariat
Bert Wijnen / Lucent
Alex Zinin / Alcatel



REGRETS
------------
Steve Bellovin / AT&T Labs
Thomas Narten / IBM


Minutes
--------
1. The minutes of the May 29, 2003 teleconference were approved. 
   The Secretariat to place in public archives.


2. Review Action Items


DONE TASKS:

o Ted to write straw working group procedures for handling consensus-                 
blocked decisions
o Printer Finishing MIB (Informational) <draft-ietf-printmib-
finishing-16.txt> RFC Editor's Note to be prepared by Ned Freed.  
Secretariat to send Document Action Announcement including RFC Editor's Note.
o Secretariat to include the following statement (line) before the 
draft approval announcement that is part of a ballot.
---- following is a DRAFT of message to be sent AFTER approval ---
             To: IETF-Announce:;
             Dcc: *******
o IESG to review IANA matrix data.



OUTSTANDING TASKS:

o Allison to review draft-agrawal-sip-h323-interworking-reqs
  and send decision to IESG.
o Erik to document process of how the IESG goes about asking 
  architectural questions of the IAB
o Thomas to write (or cause to be written) a draft on "how to get to Draft".
o Thomas to contact Cablelabs to discuss formal relationship with IAB
o Allison and Thomas will email Secretariat note to send to RFC Editor
  about 3GPP RFC Editor documents.
o Ned to write an IESG note for draft-tegen-smqp (Informational)
o Steve to write RFC re: TCP MD5 option
o Randy and Ned to finish ID on Clarifying when Standards Track Documents 
  may Refer Normatively to Documents at a Lower Level
o Alex to send proposal and justification for interim document review.
o Steve to generate a summary of IESG views of the "problem"
o Steve to propose a different document classification than the current
  info/proposed/etc.
o Next Steps in Signaling (nsis)
  Allison Mankin to submit a Revised Charter to the Secretariat. Secretariat 
  to send a WG Review Announcement with copy to new-work@ietf.org.
o Harald Alvestrand to talk to RFC Editor about independent submissions.
o Alex Zinin to phrase a question to RTG and OPS Area Directoriats and IAB 
  on PPVPN issue. Alex to summarize the results as a proposed IESG consensus  
  regarding the PPVPN issue to be given to the PPVPN working group. 


NEW TASK:

o Secretariat to include teleconference bridge/call-in details in telechat 
  packages going forward.


2. Protocol Actions
 
2.1 WG Submissions
 2.1.1 New Item
        o Securing X.400 Content with S/MIME (Proposed Standard) 
        <draft-ietf-smime-x400wrap-06.tx> 
        Under Discussion by Steve Bellovin - IESG Review - AD Follow Up


        o Mobility Support in IPv6 (Proposed Standard) 
        <draft-ietf-mobileip-ipv6-22.txt> 
        Under Discussion by Steve, Erik


        o Definitions of Managed Objects for the Ethernet-like 
        Interface Types (Proposed Standard) 
        <draft-ietf-hubmib-etherif-mib-v3-03.tx> 
        Approved - Secretariat to announce, and include note 
        that as a result of this approval, RFC1643 has been 
        re-classified to Historic Status.


        o Multi Protocol Label Switching Label Distribution Protocol 
        Query Message Description (Proposed Standard) 
        <draft-ietf-mpls-lsp-query-07.txt> 
        Under discussion by Harald, Steve and Russ


        o The Secure Real-time Transport Protocol (Proposed Standard)  
        <draft-ietf-avt-srtp-08.tx> 
        Deferred to next telechat by Russ Housley, Jon Peterson
        Discuss comments by Steve Bellovin


        o An Extension to the Session Initiation Protocol (SIP) for 
        Symmetric Response Routing (Proposed Standard) 
                <draft-ietf-sip-symmetric-response-00.txt> 
        Under discussion by Ted, Erik


        o Coexistence between Version 1, Version 2, and Version 3 of 
        the Internet-standard Network Management Framework (BCP)  
        <draft-ietf-snmpv3-coex-v2-04.txt> 
        Approved - Point Raised 
        Secretariat to announce pending RFC Editor Note from Bert.


        o PacketCable Security Ticket Control Sub-option for the 
        CableLabs Client Configuration Option (Proposed Standard)       
        <draft-ietf-dhc-pktc-kerb-tckt-02.txt> 
        Under Discussion - Point Raised by Harald


        o Remote Network Monitoring MIB Protocol Identifier Reference 
        (Draft Standard) 
        <rfc2895.txt> 
        Under Discussion by Steve


2.1.2 Returning Item 
        o Using IPsec to Protect Mobile IPv6 Signaling between Mobile Nodes 
        and Home Agents (Proposed Standard) 
        <draft-ietf-mobileip-mipv6-ha-ipsec-05.txt> 
        Under Discussion by Steve, Randy and Russ


2.2 Individual Submissions
2.2.1 New Item
        o Generating One-Time Passwords with SHA-256, SHA-384, and 
        SHA-512 (Proposed Standard) 
        <draft-nesser-otp-sha-256-384-512-02.txt> 
        Under Discussion by Harald, Steve, Randy and Russ


        o Registration procedures for message header fields (BCP)
        <draft-klyne-msghdr-registry-06.txt>
        Under Discussion by Allison, Jon 


3. Document Actions


 3.1 WG Submissions
 3.1.1 New Item 
        o OSPF Refresh and Flooding Reduction in Stable Topologies 
        (Informational)
        <draft-pillay-esnault-ospf-flooding-06.txt>
        Removed per Bill Fenner


        o Introduction to the Remote Monitoring (RMON) Family of MIB 
        Modules (Informational) 
        <draft-ietf-rmonmib-framework-05.txt> 
        Approved - Secretariat to announce


        o Transition Scenarios for 3GPP Networks (Informational) 
        <draft-ietf-v6ops-3gpp-cases-03.txt> 
        Approved - Secretariat to announce


        o Guidelines for Extending the Extensible Provisioning Protocol Informational) 
        <draft-ietf-provreg-epp-ext-03.txt> 
        Approved pending RFC Editor Note - Secretariat to announce


        o Border Gateway Multicast Protocol (BGMP): Protocol 
        Specification (Informational) 
        <draft-ietf-bgmp-spec-05.txt> 
        Under discussion by Randy


3.1.2 Returning Item
        o SDPng Transition (Informational) 
        <draft-ietf-mmusic-sdpng-trans-04.txt> 
        Approved - Point raised - Pending RFC Editor Note, Secretariat to announce


3.2 Indivdiual Submissions Via AD
3.2.1 New Item 
        o The QCP File Format and Associated Media Types (Informational) 
        <draft-gellens-qcp-01.txt> 
        Approved - Secretariat to announce 
        Note: IESG may request expedited publication.


3.3 Indiviual Submissions Via RFC Editor
 3.3.1 New Item 
        o Backtrace Messages for Label Switched Paths (Informational) 
        <draft-kishan-lsp-btrace-04.txt> 
        Secretariat to send DNP message to RFC Editor per AlexÆs note.


        o Guidelines for MPLS Load Balancing (Informational) 
        <draft-allan-mpls-loadbal-04.txt> 
        Secretariat to send DNP message to RFC Editor per AlexÆs note.


3.3.2 Returning Item
        o Basic MGCP Packages (Informational) 
        <draft-foster-mgcp-basic-packages-10.txt>
        Approved - Point Raised.  Secretariat to announce, incorporating 
        IESG note from Allison Mankin.


4. Working Group Actions
 4.1 WG Creation
 4.1.1 Proposed for IETF Review
        o Layer 2 Virtual Private Networks 
                Token: Thomas
                After Alex and Allison agree on Item 6, Alex will notify 
                Secretariat.  Secretariat to send Working Group Review 
                Message to IETF and new-work simultaneously with L3VPN message.


        o Path Maximum Transmission Unit Discovery 
                Token: Allison
                Secretariat to send Working Group Review message to IETF 
                and new-work.


        o Layer 3 Virtual Private Networks
                Token: Thomas   
                After Alex and Allison agree on wording of Layer 2 Virtual 
                Private Networks, Alex will notify Secretariat.  Secretariat 
                to send Working Group Review Message to IETF and new-work 
                simultaneously with L2VPN message.


Management Issues


        o Review the mechanism for call-in  Ted Hardie
        (discussed)
        NOTE: Going forward, it was agreed that IESG members need only 
        notify Secretariat if he/she is either unavailable for the 
        upcoming telechat, or there is a change in how he/she will 
        connect to the call.  Otherwise it will be assumed that he or 
        she plans to join.

To: Internet Engineering Steering Group <iesg@ietf.org>
From: IESG Secretary <iesg-secretary@ietf.org>
Reply-To: IESG Secretary <iesg-secretary@ietf.org>
Subject: Evaluation: draft-ietf-mmusic-sdp-new - SDP: Session 
	   Description Protocol to Proposed Standard
--------

Last Call to expire on: July 12, 2002

	Please return the full line with your position.

                    Yes    No-Objection  Discuss *  Abstain  


Harald Alvestrand   [   ]     [   ]       [   ]      [   ] 
Steve Bellovin      [   ]     [   ]       [   ]      [   ] 
Randy Bush          [   ]     [   ]       [   ]      [   ] 
Bill Fenner         [   ]     [   ]       [   ]      [   ] 
Ned Freed           [   ]     [   ]       [   ]      [   ] 
Ted Hardie          [   ]     [   ]       [   ]      [   ] 
Russ Housley        [   ]     [   ]       [   ]      [   ] 
Allison Mankin      [   ]     [   ]       [   ]      [   ] 
Thomas Narten       [   ]     [   ]       [   ]      [   ] 
Erik Nordmark       [ X ]     [   ]       [   ]      [   ]
Jon Peterson        [   ]     [   ]       [   ]      [   ] 
Bert Wijnen         [   ]     [   ]       [   ]      [   ]
Alex Zinin          [   ]     [   ]       [   ]      [   ] 


 2/3 (9) Yes or No-Objection opinions needed to pass. 
 
 * Indicate reason if 'Discuss'.
 
^L
To: IETF-Announce:;
Dcc: *******
Cc: RFC Editor <rfc-editor@isi.edu>,
 Internet Architecture Board <iab@iab.org>, mmusic@ietf.org
From: The IESG <iesg-secretary@ietf.org>
Subject: Protocol Action: SDP: Session Description Protocol to 
	   Proposed Standard
-------------


The IESG has approved the Internet-Draft 'SDP: Session Description 
Protocol' <draft-ietf-mmusic-sdp-new-10.txt> as a Proposed Standard.
This document is the product of the Multiparty Multimedia Session 
Control Working Group. The IESG contact persons are Jon Peterson and 
Allison Mankin.
 
 
Technical Summary
 
 (What does this protocol do and why does the community need it?)
 
Working Group Summary
 
 (Was there any significant dissent? Was the choice obvious?)
 
Protocol Quality
 
 (Who has reviewed the spec for the IESG? Are there implementations?)



To: Internet Engineering Steering Group <iesg@ietf.org>
From: IESG Secretary <iesg-secretary@ietf.org>
Reply-To: IESG Secretary <iesg-secretary@ietf.org>
Subject: Evaluation: draft-ietf-avt-srtp - The Secure Real-time 
	   Transport Protocol to Proposed Standard
--------

Last Call to expire on: 2003-5-22

	Please return the full line with your position.

                    Yes    No-Objection  Discuss *  Abstain  


Harald Alvestrand   [   ]     [ X ]       [   ]      [   ] 
Steve Bellovin      [   ]     [ XX]       [ X ]      [   ] 
Randy Bush          [   ]     [   ]       [   ]      [   ] 
Bill Fenner         [   ]     [   ]       [   ]      [   ] 
Ned Freed           [   ]     [ X ]       [   ]      [   ] 
Ted Hardie          [   ]     [ X ]       [   ]      [   ] 
Russ Housley        [   ]     [   ]       [   ]      [ D ] 
Allison Mankin      [ X ]     [   ]       [   ]      [   ] 
Thomas Narten       [   ]     [   ]       [   ]      [   ] 
Erik Nordmark       [   ]     [ X ]       [   ]      [   ]
Jon Peterson        [   ]     [   ]       [   ]      [ D ] 
Bert Wijnen         [   ]     [ X ]       [   ]      [   ]
Alex Zinin          [   ]     [   ]       [   ]      [   ] 


 2/3 (9) Yes or No-Objection opinions needed to pass. 
 
 * Indicate reason if 'Discuss'.
 
Discuss:
=======
Steve:
SSRC should be expanded in the text the first time it's used.

The IV definition in 4.1.1 has me a bit nervous. Right now, it's
(k_s << 16) ^ (ssrc << 64) ^ (i << 16), where k_s is the session key,
ssrc is the 32-bit synchronization source, and i is the 48-bit packet
index. The low-order 16 bits are for the block number within the
packet, which is fine.

The problem I have is that given the mandated 0-padding, the high-order
32 bits of the IV are from k_s, unmodified by anything else. Furthermore
ssrc and i are known to the attacker, and the block count is obvious.
This means that the IV is a trivial function of most of the session key.
I don't *think* that that's a problem, but any extra use of keys makes me
nervous.

^L
To: IETF-Announce:;
Dcc: *******
Cc: RFC Editor <rfc-editor@isi.edu>,
 Internet Architecture Board <iab@iab.org>, avt@ietf.org
From: The IESG <iesg-secretary@ietf.org>
Subject: Protocol Action: The Secure Real-time Transport Protocol to 
	   Proposed Standard
-------------

The IESG has approved the Internet-Draft 'The Secure Real-time
Transport Protocol' <draft-ietf-avt-srtp-08.txt> as a Proposed
Standard. This document is the product of the Audio/Video Transport
Working Group. The IESG contact persons are Allison Mankin and Jon
Peterson.


Technical Summary

This specification defines a profile for the Real-time Transport Protocol
(RTP) and Real-time Transport Control Protocol (RTCP) called the Secure
Real-time Transport Protocol (SRTP).

The security goals for SRTP are to ensure:
       
      * the confidentiality of the RTP and RTCP payloads, and
       
      * the integrity of the entire RTP and RTCP packets, together with
          protection against replayed packets.
       
      These security services are optional and independent from each
      other, except that SRTCP integrity protection is mandatory
      (malicious or erroneous alteration of RTCP messages could disrupt
      the processing of the RTP stream).
       
      Other, functional, goals for the protocol are:
       
      * a framework that permits upgrading with new cryptographic
          transforms,
       
      * low bandwidth cost, i.e., a framework preserving RTP header
          compression efficiency,
       
    The provision of integrity is strongly recommended for most applications
    of SRTP. The mandatory to implement transform for this profile is AES
    counter mode, and there are risks associated with not using cryptographic
    integrity with it (see Section 9.5).

Working Group Summary

    The initial drafts had a default in which integrity services were not
    the norm and in which SRTCP did not have mandatory integrity protection.
    There was a lengthy security review to ensure that the authentication tag
    is recommended to most RTP recommendations.

Protocol Quality

  The specification was reviewed for the IESG by Eric Rescorla and Allison
  Mankin. Implementations that tested the specification were discussed by
  the working group.





To: Internet Engineering Steering Group <iesg@ietf.org>
From: IESG Secretary <iesg-secretary@ietf.org>
Reply-To: IESG Secretary <iesg-secretary@ietf.org>
Subject: Evaluation: draft-nesser-otp-sha-256-384-512 - AES Companion 
         Hash Definitions (SHA256, SHA384, SHA512) for OTP to Proposed 
         Standard
--------

Last Call to expire on: 2003-1-30

	Please return the full line with your position.

                    Yes    No-Objection  Discuss *  Abstain  


Harald Alvestrand   [   ]     [   ]       [ X ]      [   ] 
Steve Bellovin      [   ]     [   ]       [ X ]      [   ] 
Randy Bush          [   ]     [   ]       [ X ]      [   ] 
Bill Fenner         [   ]     [ X ]       [   ]      [   ] 
Ned Freed           [   ]     [ X ]       [   ]      [   ] 
Ted Hardie          [   ]     [ X ]       [   ]      [   ] 
Russ Housley        [ X ]     [   ]       [   ]      [   ] 
Allison Mankin      [   ]     [   ]       [ X ]      [   ] 
Thomas Narten       [   ]     [   ]       [   ]      [   ] 
Erik Nordmark       [   ]     [ X ]       [   ]      [   ]
Jon Peterson        [   ]     [ X ]       [   ]      [   ] 
Bert Wijnen         [   ]     [ X ]       [   ]      [   ]
Alex Zinin          [   ]     [   ]       [   ]      [   ] 


 2/3 (9) Yes or No-Objection opinions needed to pass. 
 
 * Indicate reason if 'Discuss'.

DISCUSS:
========

Allison:
Perhaps a bad idea to have the set of home-grown definitions of MAY, SHOULD,
MUST, rather than citing RFC 2119. The definitions aren't bad, but it's not
a great precedent?

Steve:
 I do not believe it's correct to refer to the new hash functions as 
 "AES hashes".

 I have doubts about whether or nor this should be a Proposed standard. 
 I don't really see the need, and the document itself expresses 
 concerns. A longer hash is useful if more of the output is being used, 
 but that's not the case here.

Randy:
ops-dir comment

 > 2.2 Individual Submissions
 > 2.2.1 New Item
 > ** o Generating One-Time Passwords with SHA-256, SHA-384, and 
 > SHA-512 (Proposed Standard) 
 > <draft-nesser-otp-sha-256-384-512-02.txt>
 > Token: Housley, Russ

 ==> doesn't have the IPR considerations section

 1.0 ABSTRACT

 ==> abstract is numbered.

 Although the SHA-256, SHA-384 and SHA-512 alogrithms are still in their

 ==> s/alog/algo/

 8.0 Neccessity of Implementation

 ==> s/cc/c/

 9.0 SECURITY CONSIDERATIONS

 ==> some sections appear to be all-uppercase, while some are not

 3.0 REQUIREMENTS TERMINOLOGY


 ==> any particular reason not to use RFC2119 terminology?

 12.0 REFERENCES

 [FIPS 180-2] Secure Hash Standard: A Revision of FIPS 180-1, August 2002

 ==> not split to normative/informative
 ==> should have a normative reference to RFC2289, at the very least!
 
^L
To: IETF-Announce:;
Dcc: *******
Cc: RFC Editor <rfc-editor@isi.edu>,
 Internet Architecture Board <iab@iab.org>, 
From: The IESG <iesg-secretary@ietf.org>
Subject: Protocol Action: AES Companion Hash Definitions (SHA256, 
	   SHA384, SHA512) for OTP to Proposed Standard
-------------


      The IESG has approved the Internet-Draft 'Generating One-Time
      Passwords with SHA-256, SHA-384, and SHA-512' <draft-nesser-otp-
      sha-256-384-512-02.txt> as a Proposed Standard. The IESG contact
      persons are Russell Housley and Steven Bellovin.

Technical Summary

      This document describes the use of the new SHA-256, SHA-384 and
      SHA-512 hash alogrithms, for use with the One Time Password (OTP)
      system, as defined by RFC 2289.

Working Group Summary

      This was not a the product of any IETF working group. No issues were
      raised during the IETF Last Call.

Protocol Quality

      This document was reviewed by Russell Housley for the IESG.




Layer 3 Virtual Private Networks (l3vpn)
-----------------------------------------

 Charter
 Last Modified: 2003-06-12

 Current Status: Proposed Working Group

 Chair(s): 
       <under discussion>

 Area Director(s):
       Thomas Narten <narten@us.ibm.com>
       Erik Nordmark <nordmark@sun.com>

 Area Advisor:
       Thomas Narten <narten@us.ibm.com>

 Technical Advisor:
       Alex Zinin <zinin@psg.com>

 Mailing Lists:

 General Discussion: l3vpn@ietf.org
 To Subscribe: https://www1.ietf.org/mailman/listinfo/l3vpn
 Archive: https://www1.ietf.org/mail-archive/working-groups/l3vpn/current/maillist.html
       
 Description of Working Group:

 Alex is the routing advisor.

 This working group is responsible for defining and specifying a
 limited number of solutions for supporting provider-provisioned 
 Layer-3 (routed) Virtual Private Networks (L3VPNs).

 The WG is responsible for standardization of the following solutions:

       1. BGP/MPLS IP VPNs (based on RFC 2547)
       2. IP VPNs using Virtual Routers
       3. CE-based VPNs using IPSEC

 The following VPN deployment scenarios will be considered by the WG:

       1. Internet-wide: VPN sites attached to arbitratry points in
             the Internet

       2. Single SP/single AS: VPN sites attached to the network of a
             single provider within the scope of a single AS

       3. Single SP/multiple AS'es: VPN sites attached to the network
             of a single provider consisting of multiple AS'es

       4. Cooperating SPs: VPN sites attached to networks of different
             providers that cooperate with each other to provide VPN service

 As part of this effort the WG will work on the following tasks
 (additional work items will require rechartering):

       1. Requirements and framework for Layer 3 VPNs
       2. Solution documents for each approach listed above (including
             applicability statements)
       3. MIB definitions for each approach
       4. Security mechanisms for each approach

 As a general rule, the WG will not create new protocols, but will provide 
 functional requirements for extensions of the existing protocols that will 
 be discussed in the protocol-specific WGs. L3VPN WG will review proposed 
 protocol extensions for L3VPNs before they are recommended to appropriate 
 protocol-specific WGs.

 Multicast and QoS support are excluded from the charter at this time. 
 They may be considered for inclusion in an updated charter 
 at a later time. Future work items may also include OAM support.

 WG Milestones (optimistic):

 Dec 2002 Submit L3 VPN Requirements Document to IESG for publication as Info
                     (completed)
 Dec 2002 Submit Generic Requirements Document to IESG for publication as Info
                     (completed)
 Dec 2002 Submit L3 VPN Framework Document to IESG for publication as Info
                     (completed)

 Dec 2003 Submit VPN Security Analysis to IESG for publication as Info
                     (draft-fang-ppvpn-security-framework-00)
 Dec 2003 Submit BGP/MPLS VPNs specification and AS to IESG for 
                     publication as PS
                   (draft-ietf-ppvpn-rfc2547bis-03, draft-ietf-ppvpn-as2547-01)
 Dec 2003 Submit CE-based specification and AS to IESG for publication as PS
                   (draft-ietf-ppvpn-ce-based-03)
                   (draft-declercq-ppvpn-ce-based-sol-00)
                   (draft-declercq-ppvpn-ce-based-as-01)
 Dec 2003 Submit Virtual Router specification and AS to IESG for publication as PS
                   (draft-ietf-ppvpn-vpn-vr-03, draft-ietf-ppvpn-as-vr-01)

 Jan 2004 Submit VPN MIB Textual Conventions to IESG for publication as PS
                   (draft-ietf-ppvpn-tc-mib-02)
 Jan 2004 Submit MPLS/BGP VPN MIB to IESG for publication as PS
                   (draft-ietf-ppvpn-mpls-vpn-mib-05)
 Jan 2004 Submit VR MIB to IESG for publication as PS
                   (draft-ietf-ppvpn-vr-mib-04)
 Jan 2004 Submit BGP as an Auto-Discovery Mechanism for publication as PS.
                   (draft-ietf-ppvpn-bgpvpn-auto-05.txt)

 March 2004 Submit specification of using IPSEC for PE-PE encapsulation in BGP/MPLS VPNs to IESG
                   for publication as PS
                   (draft-ietf-ppvpn-ipsec-2547-03)
 March 2004 Submit specification of using GRE for PE-PE encapsulation in BGP/MPLS VPNs to IESG
                   for publication as PS
                   (draft-ietf-ppvpn-gre-ip-2547-02)
 March 2004 Submit specification of BGP-MPLS VPN extension for IPv6 VPN to IESG for publication as PS
                           (draft-ietf-ppvpn-bgp-ipv6-vpn-03)


Path Maximum Transmission Unit Discovery (pmtud)
------------------------------------------------

 Charter
 Last Modified: 2003-06-06

 Current Status: Proposed Working Group

 Chair(s):

 Matt Mathis <mathis@psc.edu>
 TBD

 Transport Area Directors(s):

 Allison Mankin <mankin@psg.com>
 Jon Peterson <jon.peterson@neustar.biz>

 Transport Area Advisor:

 Allison Mankin <mankin@psg.com>

 Mailing List (temporary):

 General Discussion: mtu@psc.edu
 Subscribe: majordomo@psc.edu with "subscribe mtu" in the body
 Archive: http://www.psc.edu/~mathis/MTU/mbox.txt

 (This is to be moved to the IETF as soon as chartered).

 Description of Working Group: 

 The goal of the PMTUD working group is to specify a robust method for
 determining the IP Maximum Transmission Unit supported over an
 end-to-end path. This new method is expected to update most uses of
 RFC1191 and RFC1981, the current standards track protocols for this
 purpose. Various weakness in the current methods are documented in
 RFC2923, and have proven to be a chronic impediment to the deployment
 of new technologies that alter the path MTU, such as tunnels and new
 types of link layers.

 The proposed new method does not rely on ICMP or other messages from
 the network. It finds the proper MTU by starting a connection using
 relatively small packets (e.g. TCP segments) and searching upwards by
 probing with progressively larger test packets (containing application
 data). If a probe packet is successfully delivered, then the path MTU
 is raised. The isolated loss of a probe packet (with or without an
 ICMP can't fragment message) is treated as an indication of a MTU
 limit, and not a congestion indicator.

 The working group will specify the method for use in TCP, SCTP, and
 will outline what is necessary to support the method in transports
 such as DCCP. It will particularly describe the precise conditions
 under which lost packets are not treated as congestion indications.
 The work will pay particular attention to details that affect
 robustness and security.

 Path MTU discovery has the potential to interact with many other parts
 of the Internet, including all link, transport, encapsulation and
 tunnel protocols. Thereforethis working group will particularly
 encourage input from a wide cross section of the IETF to help to
 maximize the robustness of path MTU discovery in the presence of
 pathological behaviors from other components.

 Input draft: 

                 Packetization Layer Path MTU Discovery
                 draft-mathis-plpmtud-00.txt

 Goals and Milestones:

 Jul 03 Reorganized Internet-Draft. Solicit implementation and field experience.

 Dec 03 Update Internet-Draft incorporating implementers experience,
               actively solicit input from stakeholders - all communities that might
               be affected by changing PMTUD.

 Feb 04 Submit completed Internet-draft and a PMTUD MIB draft for 
               Proposed Standard.




Layer 2 Virtual Private Networks (l2vpn)
-----------------------------------------

 Charter
 Last Modified: 2003-06-17

 Current Status: Proposed Working Group

 Chairs: <under discussion>

 Area Director(s):
       Thomas Narten <narten@us.ibm.com>
       Erik Nordmark <nordmark@sun.com>

 Area Advisor:
       Thomas Narten <narten@us.ibm.com>

 Technical Advisor:
       Alex Zinin <zinin@psg.com>
       Russ Housley <housley@vigilsec.com>

 Mailing Lists:

       General Discussion: l2vpn@ietf.org
       To Subscribe: https://www1.ietf.org/mailman/listinfo/l2vpn
       Archive: https://www1.ietf.org/mail-archive/working-groups/l2vpn/current/maillist.html

 Description of Working Group:

 Alex is the routing advisor.
 Russ is the security advisor.

 This working group is responsible for defining and specifying a
 limited number of solutions for supporting provider-provisioned
 layer-2 virtual private networks (L2VPNs).

 The WG is responsible for standardization of the following solutions:

 1. Virtual Private LAN Service (VPLS)--L2 service that emulates LAN
       across an IP and an MPLS-enabled IP network, allowing standard
       Ethernet devices communicate with each other as if they were
       connected to a common LAN segment.
   
 2. Virtual Private Wire Service (VPWS)--L2 service that provides L2
       point-to-point connectivity (e.g. Frame Relay DLCI, ATM VPI/VCI,
       point-to-point Ethernet) across an IP and an MPLS-enabled IP network.

 3. IP-only L2 VPNs--L2 service across an IP and an MPLS-enabled
       IP network, allowing standard IP devices to communicate with each
       other as if they were connected to a common LAN segment or a point-
       to-point circuit.

 The WG will address intra-AS scenarios only at this point (other
 scenarios will be considered for inclusion in the updated charter when 
 the current one is completed.)
       
 As a general rule, the WG will not create new protocols, but will 
 provide functional requirements for extensions of the existing 
 protocols that will be discussed in the protocol-specific WGs.
 As a specific example, this WG will not define new encapsulation
 mechanism, but will use those defined in the PWE3 WG.
 L2VPN WG will review proposed protocol extensions for L2VPNs before 
 they are recommended to appropriate protocol-specific WGs.

 The WG will work on the following items. Adding new work items 
 will require rechartering.

 1. Discovery of PEs participating in L2 service, and
       topology of required connectivity

 2. Signaling of l2vpn related information for the purpose of 
       setup and maintenance of l2vpn circuits. As much as possible
       PWE3 signaling procedures should be used

 3. Solution documents (providing the framework for a specific
       solution, should include info on how discovery, signaling,
       and encaps work together, include security, AS as a separate
       document)

 4. MIBs
       
 5. L2VPN-specific OAM extensions--extensions to existing OAM
       solutions for VPLS, VPWS, and IP-only L2VPNs.

 Where necessary, the WG will coordinate its activities with IEEE 802.1
       
 Milestones (optimistic):

 JUL 2003 Submit L2 requirements to IESG for publication as Informational RFC
 JUL 2003 Submit L2 framework to IESG for publication as Informational RFC
 JUL 2003 Identify VPLS and VPWS solutions for the WG
 AUG 2003 Submit an I-D describing MIB for VPLS
 AUG 2003 Submit an I-D describing MIB for VPWS
 AUG 2003 Submit an I-D on OAM for VPLS
 AUG 2003 Submit an I-D on OAM for VPWS
 DEC 2003 Submit VPLS solution documents to IESG
 DEC 2003 Submit VPWS solution documents to IESG
 JAN 2004 Submit IP-only L2VPN solution documents to IESG
 FEB 2004 Submit MIB for VPLS to IESG
 MAR 2004 Submit OAM for VPWS to IESG
 APR 2004 Submit OAM for IP L2VPN to IESG