[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Agenda and Package for October 2, 2003 Telechat



          INTERNET ENGINEERING STEERING GROUP (IESG)
Summarized Agenda for the October 2, 2003 IESG Teleconference

This agenda was generated at 16:3:4 EDT, September 26, 2003
                                                                                
1. Administrivia
                                                                                
  o Roll Call
  o Bash the Agenda
  o Approval of the Minutes
  o Review of Action Items
                                                                                
2. Protocol Actions

2.1 WG Submissions
2.1.1 New Item
  o draft-ietf-disman-conditionmib-10.txt
    Alarm Reporting Control MIB (Proposed Standard) - 1 of 9 
    Note: IESG evaluation 
    Token: Bert Wijnen
  o draft-ietf-rmonmib-apm-mib-11.txt
    Application Performance Measurement MIB (Proposed Standard) - 2 of 9 
    Note: Ready for IESG Evaluation.. No IETF Last Call comments received. 
    Token: Bert Wijnen
  o draft-ietf-ipsec-rfc2402bis-05.txt
    IP Authentication Header (Proposed Standard) - 3 of 9 
    Token: Russ Housley
  o draft-ietf-ipsec-esn-addendum-02.txt
    Extended Sequence Number Addendum to IPsec DOI for ISAKMP (Proposed 
    Standard) - 4 of 9 
    Token: Russ Housley
  o draft-ietf-ipsec-esp-v3-06.txt
    IP Encapsulating Security Payload (ESP) (Proposed Standard) - 5 of 9 
    Token: Russ Housley
  o draft-ietf-dnsext-keyrr-key-signing-flag-09.txt
    KEY RR Secure Entry Point Flag (Proposed Standard) - 6 of 9 
    Note: Some editorial nits, can be folded in with IESG review. 
    Token: Thomas Narten
  o draft-ietf-ldup-lcup-06.txt
    LDAP Client Update Protocol (Proposed Standard) - 7 of 9 
    Token: Ted Hardie
  o draft-ietf-nomcom-rfc2727bis-07.txt
    IAB and IESG Selection, Confirmation, and Recall Process: Operation of 
    the Nominating and Recall Committees (BCP) - 8 of 9 
    Token: Harald Alvestrand
  o draft-ietf-dhc-suboptions-kdc-serveraddress-04.txt
    KDC Server Address Sub-option (Proposed Standard) - 9 of 9 
    Token: Margaret Wasserman

2.1.2 Returning Item
  o draft-ietf-ftpext-mlst-16.txt
    Extensions to FTP (Proposed Standard) - 1 of 3 
    Token: Ted Hardie
  o draft-ietf-dhc-isnsoption-10.txt
    The IPv4 DHCP Options for the Internet Storage Name Service (Proposed 
    Standard) - 2 of 3 
    Note: Note: new version (-10) should address outstanding discusses. 
    Token: Thomas Narten
  o draft-ietf-avt-mpeg4-simple-08.txt
    RTP Payload Format for Transport of MPEG-4 Elementary Streams (Proposed 
    Standard) - 3 of 3 
    Note: On agenda again to check if mods from MPEG4 group to language 
    about ECMAscript risks are ok for clearing SMB's Discuss - there was 
    agreed language during Vienna but it needed a little modification. 
    Token: Allison Mankin

2.2 Individual Submissions
2.2.1 New Item
  o draft-zeilenga-ldap-rfc2596-04.txt
    Language Tags and Ranges in LDAP (Proposed Standard) - 1 of 1 
    Token: Ted Hardie

2.2.2 Returning Item
NONE
3. Document Actions

3.1 WG Submissions
3.1.1 New Item
  o draft-ietf-isis-igp-p2p-over-lan-03.txt
    Point-to-point operation over LAN in link-state routing protocols 
    (Informational) - 1 of 2 
    Note: On agenda for 2003-10-02 telechat 
    Token: Bill Fenner
  o draft-ietf-magma-msf-api-05.txt
    Socket Interface Extensions for Multicast Source Filters 
    (Informational) - 2 of 2 
    Token: Margaret Wasserman

3.1.2 Returning Item
NONE
3.2 Individual Submissions Via AD
3.2.1 New Item
  o draft-newton-ldap-whois-04.txt
    Whois Domain Data using the Lightweight Directory Access Protocol 
    (LDAP) (Experimental) - 1 of 2 
    Token: Ted Hardie
  o draft-gill-gtsh-01.txt
    The Generalized TTL Security Mechanism (GTSM) (Experimental) - 2 of 2 
    Token: Alex Zinin

3.2.2 Returning Item
NONE
3.3 Individual Submissions Via RFC Editor
3.3.1 New Item
NONE
3.3.2 Returning Item
NONE

4. Working Group Actions
4.1 WG Creation
4.1.1 Proposed for IETF Review
  o Long-Term Archive and Notary Services (ltans) - 1 of 1
    Token: Russ
4.1.2 Proposed for Approval
  o Centralized Conferencing (xcon) - 1 of 1
    Token: Description
4.2 WG Rechartering
4.2.1 Under evaluation for IETF Review
  o Audio/Video Transport (avt) - 1 of 4
    Token: Allison
  o DNS Extensions (dnsext) - 2 of 4
    Token: Thomas
  o Common Control and Measurement Plane (ccamp) - 3 of 4
    Token: Alex
  o Ethernet Interfaces and Hub MIB (hubmib) - 4 of 4
    Token: Bert
4.2.2 Proposed for Approval
    NONE

5. Agenda Working Group News

6. IAB News We can use

7. Management Issue

 7.1 Appropriate Methods for getting Meeting Minutes from Chairs (Harald Alvestrand)

 7.2 Interoperability Testing at IETF Meetings (Harald Alvestrand)

 7.3 Referral of draft-klensin-name-filters-03.txt to the IAB (Ted Hardie)


------------------------------------------------------------------------------


        INTERNET ENGINEERING STEERING GROUP (IESG)
      Agenda for the October 2, 2003 IESG Teleconference

This package was generated at 16:3:5 EDT, September 26, 2003.
                                                                                
1. Administrivia
                                                                                
  1.1  Roll Call
Dear IESG Members:

The next IESG teleconference will take place on Thursday, October 2,
2003 from 11:30-14:00 US-ET. If you are *unable* to participate in the
teleconference, or if you wish to change your usual procedures for
connecting to the call (as indicated in the list below), then please reply
to this message as follows:

o If you are unable to participate, then please write "Regrets" after your
name.
o If you normally call in, but will require operator assistance for this
teleconference, then please provide the telephone number where you can be
reached.
o If you are normally connected to the teleconference by an operator, but
will call in for this teleconference, then please write "Will call in"
next to your name in place of the telephone number.

Harald Alvestrand---Will call in
Rob Austein---Will call in
Steve Bellovin---Will call in
Randy Bush--- Will call in
Michelle Cotton---Will call in
Leslie Daigle---Will call in
Bill Fenner---Will call in
Ned Freed---Will call in
Barbara Fuller---Will call in
Ted Hardie---Will call in
Russ Housley---Will call in
Allison Mankin---Will call in
Thomas Narten--- Will call in
Jon Peterson---Will call in
Joyce K. Reynolds---Regrets
Dinara Suleymanova--- Will call in
Amy Vezza---Will call in
Margaret Wasserman---Will call in
Bert Wijnen---Will call in
Alex Zinin---Will call in

To join the teleconference, please call the appropriate dial-in number
(see below) at 11:30 AM ET. If you have requested operator assistance,
then an operator will call you and connect you to the call. Participants
inside the U.S. should use the toll-free number 888-315-1685.

Participants outside the U.S. should use either one of the toll-free
numbers listed at the end of this message, or the direct-dial number
703-788-0617. Participants using the direct-dial number will pay their own
long distance charges through their own carriers. Participants dialing the
toll-free number will not pay any charges for the conference, as all
charges, including long distance, will be included on the invoice sent to
the company hosting the call. In some cases, participants from certain
international countries may only use a direct-dial number.

All participants should enter the passcode 235467 when prompted to do so.

The first person on the call will not hear anything until joined by other
participants. A tone will sound as others join the conference.

****************************************
TOLL-FREE NUMBERS

ARGENTINA---0800-666-0375
AUSTRALIA---1800-001-906
BRAZIL---000-817-200-5360
CHINA---10800-1300398
FINLAND---08001-10966
FRANCE---0800-91-1452
GERMANY---0800-181-7632
HONG KONG---800-96-3907
HUNGARY---06-800-15083
ISRAEL---18009300182
JAPAN---00531-13-0415
MEXICO---001-866-857-1855
NORWAY---800-10-074
SWEDEN---020-791386
UNITED KINGDOM---0800-904-7969
SOUTH KOREA---00308-131103
NETHERLANDS---0800-023-2726

PARTICIPANTS FROM ALL OTHER COUNTRIES MUST USE THE DIRECT DIAL NUMBER AND
THUS INCUR CHARGES FROM THEIR OWN CARRIER.


  1.2 Bash the Agenda


  1.3 Approval of the Minutes
DRAFT*DRAFT*DRAFT*DRAFT*DRAFT*DRAFT 
INTERNET ENGINEERING STEERING GROUP (IESG) 
Minutes of the September 18, 2003 IESG Teleconference 
 
Reported by: Amy Vezza, IETF Secretariat 
 
ATTENDEES 
------------------ 
Harald Alvestrand / Cisco 
Rob Austein / IAB Liaison 
Steve Bellovin / AT&T 
Michelle Cotton / ICANN 
Leslie Daigle / Verisign (IAB) 
Bill Fenner / AT&T 
Ned Freed / Sun Microsystems 
Barbara Fuller / IETF Secretariat 
Ted Hardie / Qualcomm, Inc. 
Russ Housley / Vigil Security, LLC 
Allison Mankin / Bell Labs, Lucent 
Thomas Narten / IBM 
Jon Peterson / NeuStar, Inc. 
Joyce K. Reynolds / ISI (RFC Editor)
Jennifer Rodriguez / ICANN 
Dinara Suleymanova / IETF Secretariat 
Amy Vezza / IETF Secretariat 
Margaret Wasserman / Wind River 
Bert Wijnen / Lucent 
Alex Zinin / Alcatel 
 
REGRETS 
------------ 
Randy Bush / IIJ 

 
MINUTES 
--------------- 
 
1. Administrivia 
1.1 Approval of the Minutes 
 
The minutes of the September 4, 2003 Teleconference were approved.  
The Secretariat will place the minutes in the public archives. 
 
1.2 Review of Action Items 

DONE: 
 
o Thomas Narten will send his comments on Creating, Rechartering  
and Closing a Working Group to the IESG mailing list. 
o Harald Alvestrand will send a proposed authentication method for 
Liaison Statement submission to the Secretariat. 
o Steve Bellovin will draft a message to the RFC Editor regarding  
the early assignment of an RFC number for draft-housley-ccm-mode.  
 
DELETED: 
 
o Steve Bellovin to propose a different document classification  
than the current info/proposed/etc.  
 
IN PROGRESS: 
 
o Jon Peterson to review draft-agrawal-sip-h323-interworking-reqs  
and send decision to IESG.  
o Thomas Narten to write (or cause to be written) a draft on "how  
to get to Draft".  
o Thomas Narten to contact Cablelabs to discuss formal relationship 
with IAB. 
o Steve Bellovin to write RFC re: TCP MD5 option.  
o Randy Bush and Ned Freed to finish ID on Clarifying when  
Standards Track Documents may Refer Normatively to Documents at  
a Lower Level. 
o Alex Zinin to send proposal and justification for interim  
document review.  
o Alex Zinin to phrase a question to RTG and OPS Area. Directoriats 
and IAB on PPVPN issue. Alex to summarize the results as a proposed 
IESG consensus regarding the PPVPN issue to be given to the PPVPN  
working group.   
  
 
NEW:
o Bill Fenner, Ted Hardie, and Thomas Narten to work out acceptable 
text to resolve ABNF and SRV issues.  
o Harald Alvestrand to consult with Randy Bush and make sure a policy 
is generated regarding interoperability testing at IETF Meetings.
 	

2. Protocol Actions
2.1 WG Submissions
2.1.1 New Item

o draft-ietf-iptel-trip-mib-08.txt - 1 of 6	
Management Information Base for Telephony Routing over IP (TRIP) (Proposed Standard)
Token: Jon Peterson

The document remains under discussion by the IESG in order to resolve
points raised by Margaret Wasserman.*

o Two-document ballot:  - 2 of 6	
- draft-ietf-sacred-framework-06.txt 
Securely Available Credentials - Credential Server Framework (Informational) 
- draft-ietf-sacred-protocol-bss-08.txt 
Securely Available Credentials Protocol (Proposed Standard) 
Token: Steve Bellovin

The documents remain under discussion by the IESG in order to resolve
points raised by Russ Housley.*

o draft-ietf-mobileip-aaa-nai-06.txt - 3 of 6	
AAA NAI for Mobile IPv4 Extension (Proposed Standard)
Token: Thomas Narten

The document remains under discussion by the IESG in order to resolve
points raised by Steve Bellovin and Ted Hardie.*

o draft-ietf-pkix-logotypes-11.txt - 4 of 6	
Internet X.509 Public Key Infrastructure: Logotypes in X.509 certificates (Proposed Standard)
Token: Steve Bellovin

The document remains under discussion by the IESG in order to resolve
points raised by Harald Alvestrand, Ned Freed, Ted Hardie, Margaret 
Wasserman, and Bert Wijnen.*

o draft-iab-isocbot-00.txt - 5 of 6	
IETF ISOC Board of Trustee Appointment Procedures (BCP)
Token: Harald Alvestrand

The document remains under discussion by the IESG in order to resolve
points raised by Thomas Narten.*

o Three-document ballot:  - 6 of 6	
- draft-ietf-mpls-ldp-mib-13.txt 
Definitions of Managed Objects for the Multiprotocol Label Switching, 
Label Distribution Protocol (LDP) (Proposed Standard) 
- draft-ietf-mpls-ftn-mib-08.txt 
Multiprotocol Label Switching (MPLS) Forwarding Equivalence Class To Next 
Hop Label Forwarding Entry (FEC-To-NHLFE)Management Information Base (Proposed Standard) 
- draft-ietf-mpls-te-mib-12.txt 
Multiprotocol Label Switching (MPLS) Traffic Engineering Management 
Information Base (Proposed Standard) 
Token: Alex Zinin

The documents remain under discussion by the IESG in order to resolve
points raised by Bert Wijnen.*

2.1.2 Returning Item

o Five-document ballot:  - 1 of 2	
- draft-ietf-impp-cpim-msgfmt-08.txt 
Common Presence and Instant Messaging: Message Format (Proposed Standard) 
- draft-ietf-impp-cpim-pidf-08.txt 
Presence Information Data Format (PIDF) (Proposed Standard) 
- draft-ietf-impp-pres-03.txt 
Common Profile for Presence (CPP) (Proposed Standard) 
- draft-ietf-impp-im-03.txt 
Common Profile for Instant Messaging (CPIM) (Proposed Standard) 
- draft-ietf-impp-srv-03.txt 
Address Resolution for Instant Messaging and Presence (Proposed Standard) 
Token: Ted Hardie

The documents remain under discussion by the IESG in order to resolve
points raised by Bill Fenner and Thomas Narten.*

o draft-ietf-webdav-ordering-protocol-10.txt - 2 of 2	
WebDAV Ordered Collections Protocol (Proposed Standard)
Token: Ted Hardie

The document was approved by the IESG.  The Secretariat will send a 
working group submission Protocol Action Announcement.


2.2 Individual Submissions
2.2.1 New Item

o draft-mrose-ietf-posting-03.txt - 1 of 1	
A Practice for Revoking Posting Rights to IETF mailing lists (BCP)
Token: Steve Bellovin

The document remains under discussion by the IESG in order to resolve
points raised by Russ Housley and Thomas Narten.*

2.2.2 Returning Item

o draft-zeilenga-ldap-user-schema-mr-00.txt - 1 of 1	
LDAP: Additional Matching Rules (Proposed Standard)
Token: Ted Hardie

The document was approved by the IESG pending an RFC Editor Note to be 
prepared by Ted Hardie. The Secretariat will send an individual submission 
Protocol Action Announcement that includes the RFC Editor Note.

3. Document Actions
3.1 WG Submissions
3.1.1 New Item

o draft-ietf-send-psreq-03.txt - 1 of 5	
IPv6 Neighbor Discovery trust models and threats (Informational)
Token: Margaret Wasserman

The document remains under discussion by the IESG.*

o draft-ietf-ieprep-ets-telephony-06.txt - 2 of 5	
IP Telephony Requirements for Emergency Telecommunication Service (Informational)
Token: Jon Peterson

The document remains under discussion by the IESG.*

o draft-iesg-charter-03.txt - 3 of 5	
An IESG charter (Informational)
Token: Steve Bellovin

The document remains under discussion by the IESG.*

o draft-ietf-pkix-warranty-extn-03.txt - 4 of 5	
Internet X.509 Public Key Infrastructure Warranty Certificate Extension (Informational)
Token: Steve Bellovin

The document was approved by the IESG pending an RFC Editor Note to
be prepared by Steve Bellovin. The Secretariat will send a working group 
submission Document Action Announcement that includes the RFC Editor Note.

o draft-ietf-tsvwg-highspeed-01.txt - 5 of 5	
HighSpeed TCP for Large Congestion Windows (Experimental)
Token: Jon Peterson

The document was approved by the IESG. The Secretariat will send
a working group submission Document Action Announcement.
	
3.1.2 Returning Item

NONE	

3.2 Individual Submissions Via AD
3.2.1 New Item

o draft-rfc-editor-rfc2223bis-07.txt - 1 of 2	
Instructions to Request for Comments (RFC) Authors (Informational)
Token: Harald Alvestrand

The document remains under discussion by the IESG.*

o draft-mealling-liberty-urn-00.txt - 2 of 2	
A URN Namespace For The Liberty Alliance Project (Informational)
Token: Ted Hardie

The document was approved by the IESG. The Secretariat will send an 
individual submission Document Action Announcement.

3.2.2 Returning Item

o draft-siemborski-mupdate-04.txt - 1 of 1	
The MUPDATE Distributed Mailbox Database Protocol (Experimental)
Token: Ned Freed

The document was approved by the IESG pending an RFC Editor Note to
be prepared by Ned Freed. The Secretariat will send an individual 
submission Document Action Announcement that includes the 
RFC Editor Note.

3.2.3 To be assigned
o draft-baker-soap-media-reg-03.txt	
The 'application/soap+xml' media type (Informational)

The document was assigned to Ned Freed.
 
3.3 Individual Submissions Via RFC Editor
3.3.1 New Item

o draft-fleming-ldap-printer-schema-02.txt - 1 of 2	
Lightweight Directory Access Protocol (LDAP):Schema for Printer Services (Informational)
Token: Ted Hardie

The IESG has no problem with the RFC Editor publishing this document.
The Secretariat will send a standard "no problem" message to the RFC
Editor.

o draft-touch-ipsec-vpn-05.txt - 2 of 2	
Use of IPsec Transport Mode for Dynamic Routing (Informational)
Token: Russ Housley

The document remains under discussion by the IESG.*

3.3.2 Returning Item

NONE	

3.3.3 To be Assigned
o draft-klensin-name-filters-03.txt - 1 of 2
User Interface Evaluation and Filtering of Internet Addresses and 
Locators -or- Syntaxes for Common Namespaces (Informational)

The document was assigned to Ted Hardie.

o draft-foster-mgcp-redirect-05.txt - 2 of 2
Media Gateway Control Protocol (MGCP) Redirect and Reset Package (Informational)

The document was assigned to Jon Peterson.

4. Working Group Actions
4.1 WG Creation
4.1.1 Proposed for IETF Review

o MIPv6 Signaling and Handoff Optimization - 1 of 2	
Token: Thomas Narten

The WG remains under discussion by the IESG.  Thomas Narten will 
prepare a revised charter for further IESG review.

o Storage Transport - 2 of 2	
Token: Margaret Wasserman

The IESG approved the draft charter for IETF review pending submission of 
an updated version of the charter, provided by Margaret Wasserman that reflects
a name change to IP over Fiberchannel (ipofc).  The Secretariat will send a 
WG Review announcement, with a copy to new-work@ietf.org and place the WG 
on the agenda for the next IESG teleconference. 

4.1.2 Proposed for Approval
NONE 	

4.2 WG Rechartering
4.2.1 Under evaluation for IETF Review

o Common Control and Measurement Plane - 1 of 1	
Token: Alex Zinin

The IESG decided to proceed with IETF review of the revised charter pending an 
updated charter provided by Alex Zinin. The Secretariat will send a WG Review: 
Recharter announcement, with copies to new-work@ietf.org and to the WG Chairs. 
The Secretariat will place the WG on the agenda for the next IESG teleconference.

4.2.2 Proposed for Approval	
NONE 

5. Working Group News We Can Use 	

6. IAB News We Can Use 	

7. Management Issues 	

7.1 Appropriate Methods for getting Meeting Minutes from Chairs (Harald Alvestrand)
This management issue was postponed until the next IESG teleconference by Harald 
Alvestrand.

7.2 Interoperability Testing at IETF Meetings (Harald Alvestrand)
This management issue was discussed, and Harald Alvestrand requested that it 
be placed on the agenda for the next IESG teleconference.

7.3 Nomcom - List of open positions and appoint a Liaison (Harald Alvestrand)
This management issue was discussed.  Bill Fenner agreed to serve as the IESG 
liaison to the Nomcom.

7.4 Tony Hain Appeal (Harald Alvestrand)

This management issue was discussed.  Rob Austein, Michelle Cotton, Leslie 
Daigle, Thomas Narten, Joyce Reynolds, and Margaret Wasserman left the teleconference 
prior to the discussion.  The IESG has made a decision on the appeal, and the 
decision will disclosed in a message to the IETF Announcement list. 

7.5 Todd Glassey Appeal (Bert Wijnen)
This management issue was discussed.  Harald Alvestrand, Rob Austein, Steve 
Bellovin, Michelle Cotton, Leslie Daigle, and Joyce Reynolds left the teleconference 
prior to the discussion.  Thomas Narten and Margaret Wasserman rejoined the 
teleconference for discussion of this issue.  The IESG has made a decision on 
the appeal, and the decision will be disclosed in a message to the IETF Announcement 
list.




----------------------------------------
* Please see the ID Tracker 
(https://datatracker.ietf.org/public/pidtracker.cgi) for details 
on documents that are under discussion by the IESG.



1. Administrivia 
  1.4 Review of Action Items
OUTSTANDING TASKS
	Last updated: September 23, 2003
	
IP  	o Jon Peterson to review draft-agrawal-sip-h323-interworking-reqs
        and send decision to IESG.
IP  	o Thomas Narten to write (or cause to be written) a draft on "how to get to Draft".
IP  	o Thomas Narten to contact Cablelabs to discuss formal relationship with IAB
IP  	o Steve Bellovin to write RFC re: TCP MD5 option
IP  	o Randy Bush and Ned Freed to finish ID on Clarifying when Standards Track Documents may
        Refer Normatively to Documents at a Lower Level
IP  	o Alex Zinin to send proposal and justification for interim document review.
IP	o Alex Zinin to phrase a question to RTG and OPS Area Directoriats and IAB 
	  on PPVPN issue. Alex to summarize the results as a proposed IESG consensus 
	  regarding the PPVPN issue to be given to the PPVPN working group. 
IP    o Bill Fenner, Ted Hardie, and Thomas Narten to work out acceptable 
        text to resolve ABNF and SRV issues.  
IP    o Harald Alvestrand to consult with Randy Bush and make sure a policy 
        is generated regarding interoperability testing at IETF Meetings.



2. Protocol Actions 
2.1 WG Submissions 
2.1.1 New Item  - 1 of 9 

  o draft-ietf-disman-conditionmib-10.txt
    Alarm Reporting Control MIB (Proposed Standard) 
    Note: IESG evaluation 
    Token: Bert Wijnen

To: Internet Engineering Steering Group <iesg@ietf.org>
From: IESG Secretary <iesg-secretary@ietf.org>
Reply-To: IESG Secretary <iesg-secretary@ietf.org>
Subject: Evaluation: draft-ietf-disman-conditionmib -
        Alarm Reporting Control MIB
--------

Last Call to expire on: 2003-09-17

        Please return the full line with your position.

                      Yes  No-Objection  Discuss  Abstain
Harald Alvestrand    [   ]     [   ]     [   ]     [   ]
Steve Bellovin       [   ]     [   ]     [   ]     [   ]
Randy Bush           [   ]     [   ]     [   ]     [   ]
Bill Fenner          [   ]     [   ]     [   ]     [   ]
Ned Freed            [   ]     [   ]     [   ]     [   ]
Ted Hardie           [   ]     [   ]     [   ]     [   ]
Russ Housley         [   ]     [   ]     [   ]     [   ]
Allison Mankin       [   ]     [   ]     [   ]     [   ]
Thomas Narten        [   ]     [   ]     [   ]     [   ]
Jon Peterson         [   ]     [   ]     [   ]     [   ]
Margaret Wasserman   [   ]     [   ]     [   ]     [   ]
Bert Wijnen          [ X ]     [   ]     [   ]     [   ]
Alex Zinin           [   ]     [   ]     [   ]     [   ]

2/3 (9) Yes or No-Objection opinions needed to pass.

DISCUSSES AND COMMENTS:
======================



^L 
---- following is a DRAFT of message to be sent AFTER approval ---
From: The IESG <iesg-secretary@ietf.org>
To: IETF-Announce:;
Cc: Internet Architecture Board <iab@iab.org>,
    RFC Editor <rfc-editor@rfc-editor.org>, <disman@ietf.org>
Subject: Protocol Action: 'Alarm Reporting Control MIB' to 
         Proposed Standard 

The IESG has approved following document:

- 'Alarm Reporting Control MIB '
   <draft-ietf-disman-conditionmib-10.txt> as a Proposed Standard

This document is the product of the Distributed Management Working Group. 

The IESG contact persons are Bert Wijnen and Randy Bush.

Technical Summary

  This memo defines a portion of the Management Information Base (MIB)
  for use with network management protocols in TCP/IP-based internets.
  In particular, it defines objects for controlling the reporting of
  alarm conditions.

Working Group Summary

  The Working Group reached consensus to request publication of this
  document as a Proposed Standard. Input from ITU-T and DMTF has been 
  considered during development of this document and the concerns
  raised have been accommodated.

Protocol Quality

  This document has been reviewed for the IESG by Bert Wijnen






 
2. Protocol Actions 
2.1 WG Submissions 
2.1.1 New Item  - 2 of 9 

  o draft-ietf-rmonmib-apm-mib-11.txt
    Application Performance Measurement MIB (Proposed Standard) 
    Note: Ready for IESG Evaluation.. No IETF Last Call comments received. 
    Token: Bert Wijnen

To: Internet Engineering Steering Group <iesg@ietf.org>
From: IESG Secretary <iesg-secretary@ietf.org>
Reply-To: IESG Secretary <iesg-secretary@ietf.org>
Subject: Evaluation: draft-ietf-rmonmib-apm-mib -
        Application Performance Measurement MIB
--------

Last Call to expire on: 2003-09-16

        Please return the full line with your position.

                      Yes  No-Objection  Discuss  Abstain
Harald Alvestrand    [   ]     [   ]     [   ]     [   ]
Steve Bellovin       [   ]     [   ]     [   ]     [   ]
Randy Bush           [   ]     [   ]     [   ]     [   ]
Bill Fenner          [   ]     [   ]     [   ]     [   ]
Ned Freed            [   ]     [   ]     [   ]     [   ]
Ted Hardie           [   ]     [   ]     [   ]     [   ]
Russ Housley         [   ]     [   ]     [   ]     [   ]
Allison Mankin       [   ]     [   ]     [   ]     [   ]
Thomas Narten        [   ]     [   ]     [   ]     [   ]
Jon Peterson         [   ]     [   ]     [   ]     [   ]
Margaret Wasserman   [   ]     [   ]     [   ]     [   ]
Bert Wijnen          [ X ]     [   ]     [   ]     [   ]
Alex Zinin           [   ]     [   ]     [   ]     [   ]

2/3 (9) Yes or No-Objection opinions needed to pass.

DISCUSSES AND COMMENTS:
======================



^L 
---- following is a DRAFT of message to be sent AFTER approval ---
From: The IESG <iesg-secretary@ietf.org>
To: IETF-Announce:;
Cc: Internet Architecture Board <iab@iab.org>,
    RFC Editor <rfc-editor@rfc-editor.org>, <rmonmib@ietf.org>
Subject: Protocol Action: 'Application Performance Measurement 
         MIB' to Proposed Standard 

The IESG has approved following document:

- 'Application Performance Measurement MIB'
   <draft-ietf-rmonmib-apm-mib-11.txt> as a Proposed Standard

This document is the product of the Remote Network Monitoring Working 
Group. 

The IESG contact persons are Bert Wijnen and Randy Bush.

Technical Summary
 
 This memo defines a portion of the Management Information Base (MIB)
 for use with network management protocols in TCP/IP-based internets.
 In particular, it defines objects for measuring the application
 performance as experienced by end-user.

Working Group Summary
 
 The Working Group has consensus to publish this document as a 
 Proposed Standard 

Protocol Quality
 
 The document has been reviewed for the IESG by Bert Wijnen.






 
2. Protocol Actions 
2.1 WG Submissions 
2.1.1 New Item  - 3 of 9 

  o draft-ietf-ipsec-rfc2402bis-05.txt
    IP Authentication Header (Proposed Standard) 
    Token: Russ Housley
 
2. Protocol Actions 
2.1 WG Submissions 
2.1.1 New Item  - 4 of 9 

  o draft-ietf-ipsec-esn-addendum-02.txt
    Extended Sequence Number Addendum to IPsec DOI for ISAKMP (Proposed 
    Standard) 
    Token: Russ Housley
 
2. Protocol Actions 
2.1 WG Submissions 
2.1.1 New Item  - 5 of 9 

  o draft-ietf-ipsec-esp-v3-06.txt
    IP Encapsulating Security Payload (ESP) (Proposed Standard) 
    Token: Russ Housley
 
2. Protocol Actions 
2.1 WG Submissions 
2.1.1 New Item  - 6 of 9 

  o draft-ietf-dnsext-keyrr-key-signing-flag-09.txt
    KEY RR Secure Entry Point Flag (Proposed Standard) 
    Note: Some editorial nits, can be folded in with IESG review. 
    Token: Thomas Narten

To: Internet Engineering Steering Group <iesg@ietf.org>
From: IESG Secretary <iesg-secretary@ietf.org>
Reply-To: IESG Secretary <iesg-secretary@ietf.org>
Subject: Evaluation: draft-ietf-dnsext-keyrr-key-signing-flag -
        KEY RR Secure Entry Point Flag
--------

Last Call to expire on: 2003-09-08

        Please return the full line with your position.

                      Yes  No-Objection  Discuss  Abstain
Harald Alvestrand    [   ]     [ X ]     [   ]     [   ]
Steve Bellovin       [   ]     [   ]     [   ]     [   ]
Randy Bush           [   ]     [   ]     [   ]     [   ]
Bill Fenner          [   ]     [   ]     [   ]     [   ]
Ned Freed            [   ]     [   ]     [   ]     [   ]
Ted Hardie           [   ]     [   ]     [   ]     [   ]
Russ Housley         [   ]     [   ]     [   ]     [   ]
Allison Mankin       [   ]     [   ]     [   ]     [   ]
Thomas Narten        [ X ]     [   ]     [   ]     [   ]
Jon Peterson         [   ]     [   ]     [   ]     [   ]
Margaret Wasserman   [   ]     [   ]     [   ]     [   ]
Bert Wijnen          [   ]     [   ]     [   ]     [   ]
Alex Zinin           [   ]     [   ]     [   ]     [   ]

2/3 (9) Yes or No-Objection opinions needed to pass.

DISCUSSES AND COMMENTS:
======================



^L 
---- following is a DRAFT of message to be sent AFTER approval ---
From: The IESG <iesg-secretary@ietf.org>
To: IETF-Announce:;
Cc: Internet Architecture Board <iab@iab.org>,
    RFC Editor <rfc-editor@rfc-editor.org>, <namedroppers@ops.ietf.org>
Subject: Protocol Action: 'KEY RR Secure Entry Point Flag' to 
         Proposed Standard 

The IESG has approved following document:

- 'KEY RR Secure Entry Point Flag '
   <draft-ietf-dnsext-keyrr-key-signing-flag-09.txt> as a Proposed Standard

This document is the product of the DNS Extensions Working Group. 

The IESG contact persons are Thomas Narten and Margaret Wasserman.

The Delegation Signer (DS) resource record introduced the concept of a
key acting as a secure entry point into a delegation. During
DNS-related key exchanges between the child and parent zone, there is
a need to differentiate secure entry point keys from other keys in the
KEY resource record set. This differentiation is not for the DNS
protocols per se, but to help in determining what types of keys need
to be generated (e.g., for a DS RR) and how to automate their generation.

This document defines a flag bit in the KEY RR to indicate KEY RRs
that are used as a secure entry point. The flag bit is intended to
assist in oprational procedures to correctly generate DS resource
records, or to indicate what keys are intended for static
configuration. The flag bit has no semantics in the DNS protocols and
its value results in no special processing by the DNS protocols when
operating on KEY RRs.  This document updates RFC 2535 and RFC 3445.

Working Group Summary

The dnsext Working Group came to consensus on this document.

Protocol Quality

This document was reviewed by Thomas Narten for the IESG.






 
2. Protocol Actions 
2.1 WG Submissions 
2.1.1 New Item  - 7 of 9 

  o draft-ietf-ldup-lcup-06.txt
    LDAP Client Update Protocol (Proposed Standard) 
    Token: Ted Hardie

To: Internet Engineering Steering Group <iesg@ietf.org>
From: IESG Secretary <iesg-secretary@ietf.org>
Reply-To: IESG Secretary <iesg-secretary@ietf.org>
Subject: Evaluation: draft-ietf-ldup-lcup -
        LDAP Client Update Protocol
--------

Last Call to expire on: 2003-09-23

        Please return the full line with your position.

                      Yes  No-Objection  Discuss  Abstain
Harald Alvestrand    [   ]     [   ]     [   ]     [   ]
Steve Bellovin       [   ]     [   ]     [   ]     [   ]
Randy Bush           [   ]     [   ]     [   ]     [   ]
Bill Fenner          [   ]     [   ]     [   ]     [   ]
Ned Freed            [   ]     [   ]     [   ]     [   ]
Ted Hardie           [ X ]     [   ]     [   ]     [   ]
Russ Housley         [   ]     [   ]     [   ]     [   ]
Allison Mankin       [   ]     [   ]     [   ]     [   ]
Thomas Narten        [   ]     [   ]     [   ]     [   ]
Jon Peterson         [   ]     [   ]     [   ]     [   ]
Margaret Wasserman   [   ]     [   ]     [   ]     [   ]
Bert Wijnen          [   ]     [   ]     [   ]     [   ]
Alex Zinin           [   ]     [   ]     [   ]     [   ]

2/3 (9) Yes or No-Objection opinions needed to pass.

DISCUSSES AND COMMENTS:
======================



^L 
---- following is a DRAFT of message to be sent AFTER approval ---
From: The IESG <iesg-secretary@ietf.org>
To: IETF-Announce:;
Cc: Internet Architecture Board <iab@iab.org>,
    RFC Editor <rfc-editor@rfc-editor.org>, <ietf-ldup@imc.org>
Subject: Protocol Action: 'LDAP Client Update Protocol' to 
         Proposed Standard 

The IESG has approved following document:

- 'LDAP Client Update Protocol'
   <draft-ietf-ldup-lcup-06.txt> as a Proposed Standard

This document is the product of the LDAP Duplication/Replication/Update Protocols Working Group. 

The IESG contact persons are Ted Hardie and Ned Freed.

Technical Summary
 
The LCUP protocol allows LDAP clients to synchronize 
with the content stored by LDAP servers; it does not
 address server to server synchronization.  It has three
main proposed use cases:  limited clients that need to
maintain read-only copies of directory data for use while
off-line; applications synchronizing local data with multiple
data stores to create a different view of the data (e.g. a
meta directory); and clients which perform automated tasks
based on directory information triggers (e.g. a client that
creates new mailboxes when a new directory entry is created).

Working Group Summary
 
The group achieved rough consensus after significant debate.
A minority view that this protocol represented the wrong engineering
choice in the face of common implementations was discussed extensively
on the mailing list and the issues raised again during last call.  The
key point of contention was how the balance between server state
and on-the-wire traffic should be struck.  The draft's applicability statement
indicates that some level of server state would be required to
avoid full synchronization (and its implied cost in traffic and
processing), and there was debate over the relative costs for
current and furture implementations.  After a focused period
of discussion, the working group came to rough consensus
that the protocol contained sufficient mechanisms to handle cases
where incremental update was sub-optimal and the document
clear enough in its applicability statement to prevent misunderstanding.

 
Protocol Quality
 
Ted Hardie reviewed this document for the IESG.






 
2. Protocol Actions 
2.1 WG Submissions 
2.1.1 New Item  - 8 of 9 

  o draft-ietf-nomcom-rfc2727bis-07.txt
    IAB and IESG Selection, Confirmation, and Recall Process: Operation of 
    the Nominating and Recall Committees (BCP) 
    Token: Harald Alvestrand

To: Internet Engineering Steering Group <iesg@ietf.org>
From: IESG Secretary <iesg-secretary@ietf.org>
Reply-To: IESG Secretary <iesg-secretary@ietf.org>
Subject: Evaluation: draft-ietf-nomcom-rfc2727bis -
        IAB and IESG Selection, Confirmation, and Recall Process: Operation of the Nominating and Recall Committees
--------

Last Call to expire on: 2003-09-12

        Please return the full line with your position.

                      Yes  No-Objection  Discuss  Abstain
Harald Alvestrand    [ X ]     [   ]     [   ]     [   ]
Steve Bellovin       [   ]     [   ]     [   ]     [   ]
Randy Bush           [   ]     [   ]     [   ]     [   ]
Bill Fenner          [   ]     [   ]     [   ]     [   ]
Ned Freed            [   ]     [   ]     [   ]     [   ]
Ted Hardie           [   ]     [   ]     [   ]     [   ]
Russ Housley         [   ]     [   ]     [   ]     [   ]
Allison Mankin       [   ]     [   ]     [   ]     [   ]
Thomas Narten        [   ]     [   ]     [   ]     [   ]
Jon Peterson         [   ]     [   ]     [   ]     [   ]
Margaret Wasserman   [   ]     [   ]     [   ]     [   ]
Bert Wijnen          [   ]     [   ]     [   ]     [   ]
Alex Zinin           [   ]     [   ]     [   ]     [   ]

2/3 (9) Yes or No-Objection opinions needed to pass.

DISCUSSES AND COMMENTS:
======================



^L 
---- following is a DRAFT of message to be sent AFTER approval ---
From: The IESG <iesg-secretary@ietf.org>
To: IETF-Announce:;
Cc: Internet Architecture Board <iab@iab.org>,
    RFC Editor <rfc-editor@rfc-editor.org>, <ietf-nomcom@lists.elistx.com>
Subject: Protocol Action: 'IAB and IESG Selection, Confirmation, 
         and Recall Process: Operation of the Nominating and Recall 
         Committees' to BCP 

The IESG has approved the Internet-Draft 'IAB and IESG Selection, 
Confirmation, and Recall Process: Operation of the Nominating and Recall 
Committees' <draft-ietf-nomcom-rfc2727bis-07.txt> as a BCP. This document 
is the product of the Operation of the IESG/IAB Nominating and Recall 
Committees Working Group. 

The IESG contact person is Harald Alvestrand.

Technical Summary
 
 This document describes the operation of the IETF NomCom.
 This version updates the rules by which the Nomcom process is governed.
 In many cases, ambiguities that had been found in 2727 were resolved.
 In other cases, situations that had been left to the discretion of the
 participants were codified.
 
Working Group Summary
 
 On a lot of issues, there was smooth consensus in the working group.
 On some issues, there was significant controversy, but rough consensus.
 In one case (publication of names of nominees) consensus was not reached,
 and the text remained unchanged from 2727.
 
Protocol Quality
 
 The document has been reviewed for the IESG by Harald Alvestrand.






 
2. Protocol Actions 
2.1 WG Submissions 
2.1.1 New Item  - 9 of 9 

  o draft-ietf-dhc-suboptions-kdc-serveraddress-04.txt
    KDC Server Address Sub-option (Proposed Standard) 
    Token: Margaret Wasserman

To: Internet Engineering Steering Group <iesg@ietf.org>
From: IESG Secretary <iesg-secretary@ietf.org>
Reply-To: IESG Secretary <iesg-secretary@ietf.org>
Subject: Evaluation: draft-ietf-dhc-suboptions-kdc-serveraddress -
        KDC Server Address Sub-option
--------

Last Call to expire on: 2003-09-30

        Please return the full line with your position.

                      Yes  No-Objection  Discuss  Abstain
Harald Alvestrand    [   ]     [   ]     [   ]     [   ]
Steve Bellovin       [   ]     [ X ]     [   ]     [   ]
Randy Bush           [   ]     [   ]     [   ]     [   ]
Bill Fenner          [   ]     [   ]     [   ]     [   ]
Ned Freed            [   ]     [ X ]     [   ]     [   ]
Ted Hardie           [   ]     [   ]     [   ]     [   ]
Russ Housley         [   ]     [   ]     [   ]     [   ]
Allison Mankin       [   ]     [   ]     [   ]     [   ]
Thomas Narten        [   ]     [   ]     [   ]     [   ]
Jon Peterson         [   ]     [   ]     [   ]     [   ]
Margaret Wasserman   [ X ]     [   ]     [   ]     [   ]
Bert Wijnen          [   ]     [   ]     [   ]     [   ]
Alex Zinin           [   ]     [   ]     [   ]     [   ]

2/3 (9) Yes or No-Objection opinions needed to pass.

DISCUSSES AND COMMENTS:
======================
Ned Freed:

Comment:
This seems, well, highly vendor-specific. I guess this is OK...




^L 
---- following is a DRAFT of message to be sent AFTER approval ---
From: The IESG <iesg-secretary@ietf.org>
To: IETF-Announce:;
Cc: Internet Architecture Board <iab@iab.org>,
    RFC Editor <rfc-editor@rfc-editor.org>, <dhcwg@ietf.org>
Subject: Protocol Action: 'KDC Server Address Sub-option' to 
         Proposed Standard 

The IESG has approved following document:

- 'KDC Server Address Sub-option '
   <draft-ietf-dhc-suboptions-kdc-serveraddress-04.txt> as a Proposed Standard

This document is the product of the Dynamic Host Configuration Working 
Group. 

The IESG contact persons are Margaret Wasserman and Thomas Narten.

Technical Summary
 
This document describes a sub-option of the "DHCP Option for CableLabs
Client Configuration", RFC 3495. A certain class of CableHome devices
require the configuration of a "Key Distribution Center" server as an IP
address rather than as a domain name.  The new sub-option provides KDC
configuration as an IPv4 address.

Working Group Summary
 
The -04 revision of the draft addresses comments received during the WG last
call.  Note that there were few responses to the WG last call; all of these
response supported acceptance of the doc and a couple of responses suggested
edits.  The important changes in the -04 rev are additional text in the
Security Considerations section and a new reference to the CableHome 1.1
specification.

Protocol Quality
 
This document has been reviewed for the IESG by Margaret Wasserman.






 

2. Protocol Actions 
2.1 WG Submissions 
2.1.2 Returning Item  - 1 of 3 

  o draft-ietf-ftpext-mlst-16.txt
    Extensions to FTP (Proposed Standard) 
    Token: Ted Hardie

Evaluation: draft-ietf-ftpext-mlst - Extensions to FTP to
	 Proposed Standard
--------

Last Call to expire on: December 17, 2001

	Please return the full line with your position.

                    Yes    No-Objection  Discuss *  Abstain  

Harald Alvestrand   [   ]     [ X ]       [   ]      [   ] 
Steve Bellovin      [   ]     [XX ]       [ X ]      [   ] 
Randy Bush          [   ]     [   ]       [   ]      [   ] 
Bill Fenner         [   ]     [ XX]       [ X ]      [   ] 
Ned Freed           [   ]     [   ]       [ X ]      [   ] 
Ted Hardie          [   ]     [   ]       [   ]      [   ]
Russ Housley        [   ]     [   ]       [   ]      [   ]
Allison Mankin      [   ]     [ X ]       [   ]      [   ] 
Thomas Narten       [   ]     [ X ]       [   ]      [   ]
Jon Peterson        [   ]     [   ]       [   ]      [   ] 
Margaret Wasserman  [   ]     [   ]       [   ]      [   ]
Bert Wijnen         [   ]     [ X ]       [   ]      [   ]
Alex Zinin          [   ]     [   ]       [   ]      [   ] 

Scott Bradner       [   ]     [ X ]       [   ]      [   ] 
Patrik Faltstrom    [ X ]     [   ]       [   ]      [   ] 
Erik Nordmark       [   ]     [ X ]       [   ]      [   ] 
Jeff Schiller       [   ]     [ X ]       [   ]      [   ] 

 
 2/3 (9) Yes or No-Objection opinions needed to pass. 
 
 * Indicate reason if 'Discuss'.

RFC EDITOR:
   The Abstract section does not meet with RFC Editor style guidelines.
   The Abstract section reads more as an introduction than a brief
   summary of the document. (note: version 13)

Comment:
Scott: note: should this doc (and writeup) say that it updates STD 9
see sec 8

DISCUSS
=======
Ned: The second paragraph of section 2.2 says, in part:

  Implementations are advised against converting a UTF-8 pathname to a local
  encoding, and then attempting to invert the encoding later.

I think this incorrectly confuses encodings with charsets. In particular,
I don't want an implementation that uses UTF-16 internally to refrain
from converting UTF-16 to UTF-8 on the wire. I do want, however to
discourage _charset_ conversions. I suggest this be changed to read:

  Implementations are advised against converting a UTF-8 pathname to a local
  charset, and then attempting to invert the transformation later.

I also note that even with the changed wording this is slightly in
conflct with the recommendations in section 7.5.9, but I guess this is OK.


===========
Bill: Several suggestions, all relatively minor:

--

Should the reference to RFC 2119 follow the form suggested in RFC 2119?

--

Section 3.4 starts:

      If we assume the existence of three files, A B and C, and a directory
      D, and no other files at all

but later it assumes the existence of files named "file6" and
"19990929043300 File6".

--

Section 7.1:

            For these purposes, the contents of a directory are whatever
      file names (not pathnames) the server-PI will allow to be referenced
      when the current working directory is the directory named, and which
      the server-PI desires to reveal to the user-PI.

Earlier text refers to both "file names" and "directory names", implying
that they are seperate things, so this text seems to preclude including
directory names in MLSx responses. Should this say "file or directory names"?

--

In the last paragraph of 7.2:

        Facts
      should be provided in each output line only if they both provide
      relevant information about the file named on the same line, and they
      are in the set requested by the user-PI.

Should this refer to section 7.9, since this is a forward reference
to the fact that the set is requestable?

--

Section 7.5.1:

...
                file -- a file entry
...

                type-val = "File" / "cdir" / "pdir" / "dir" /
                                                    os-type

Fact values are case-sensitive, right, so the ABNF should probably
use "file".

--

Relevant to section 7.5.1.2 and 7.5.1.4:

All the examples in section 7.7 show listings where, if present,
"type=cdir" and "type=pdir" are at the beginning, despite the warnings
that they may be anywhere. Even if it means modifying an example from
what was actually returned by an implementation, I think it'd be worth
having an example that has these entries elsewhere, since examples are
commonly heavily used during implementation.

--

Section 7.7.9:

This server seems to use uppercase when fully-qualifying the type=cdir
entry on MLSD responses, and lowercase when fully-qualifying responses
to MSLT. This is a little confusing, so although the explanation does
mention that it is a case-independent NVFS, perhaps it could explicitly
say "and that's why it uses different case for the fully-qualified path
in different responses".

--

The last example in section 7.8.1:

  S> MLST Type*;Size*;Modify*;Perm;Unique*;

      ... All of the facts supported by
      this server are enabled by default.

In the example response, Perm is not enabled by default.

Steve:
Section 3 talks about comparing the server's file modification time to
the client's. But 2.3 says that the times aren't synchronized.

(How many FTP clients and servers implement Block and Compressed?)

7 says that all 256 octet values are permitted. Must telnet NVT
characters be escaped here? Clarify.

Servers should ensure that the unique identifier fact is not security
sensitive, e.g., it should not be the NFS handle for the file.

And I don't think I particularly want to discuss the copyright notice...



^L
---- following is a DRAFT of message to be sent AFTER approval ---
To: IETF-Announce:;
Dcc: *******
Cc: RFC Editor <rfc-editor@isi.edu>,
 Internet Architecture Board <iab@iab.org>,ftp-wg@hethmon.com
From: The IESG <iesg-secretary@ietf.org>
Subject: Protocol Action: Extensions to FTP to Proposed Standard
-------------


The IESG has approved the Internet-Draft 'Extensions to FTP'
<draft-ietf-ftpext-mlst-16.txt> as a Proposed Standard.  This document
is the product of the Extensions to FTP Working Group.  The IESG
contact persons are Ned Freed and Patrik Faltstrom.


Technical Summary

This document specifies new FTP commands to obtain listings of remote
directories in a defined format, and to permit restarts of interrupted data
transfers in STREAM mode. It allows character sets other than US-ASCII,
and also defines an optional virtual file storage structure,

 
Working Group Summary
 
There was consensus in the working group for this document. Version 14 of
the Internet-Draft reflects comments during last call.
 
Protocol Quality
 
The protocol was reviewed for the IESG by Patrik Faltstrom.

 
2. Protocol Actions 
2.1 WG Submissions 
2.1.2 Returning Item  - 2 of 3 

  o draft-ietf-dhc-isnsoption-10.txt
    The IPv4 DHCP Options for the Internet Storage Name Service (Proposed 
    Standard) 
    Note: Note: new version (-10) should address outstanding discusses. 
    Token: Thomas Narten

To: Internet Engineering Steering Group <iesg@ietf.org>
From: IESG Secretary <iesg-secretary@ietf.org>
Reply-To: IESG Secretary <iesg-secretary@ietf.org>
Subject: Evaluation: draft-ietf-dhc-isnsoption -
        The IPv4 DHCP Options for the Internet Storage Name Service
--------

Last Call to expire on: 2003-07-22

        Please return the full line with your position.

                      Yes  No-Objection  Discuss  Abstain
Harald Alvestrand    [   ]     [ X ]     [   ]     [   ]
Steve Bellovin       [   ]     [   ]     [ X ]     [   ]
Randy Bush           [   ]     [   ]     [   ]     [   ]
Bill Fenner          [   ]     [ X ]     [   ]     [   ]
Ned Freed            [   ]     [   ]     [   ]     [   ]
Ted Hardie           [   ]     [ X ]     [   ]     [   ]
Russ Housley         [   ]     [   ]     [   ]     [   ]
Allison Mankin       [   ]     [   ]     [   ]     [   ]
Thomas Narten        [ X ]     [   ]     [   ]     [   ]
Jon Peterson         [   ]     [ X ]     [   ]     [   ]
Margaret Wasserman   [   ]     [ X ]     [   ]     [   ]
Bert Wijnen          [   ]     [ X ]     [   ]     [   ]
Alex Zinin           [   ]     [   ]     [ X ]     [   ]

2/3 (9) Yes or No-Objection opinions needed to pass.

DISCUSSES AND COMMENTS:
======================

Steve Bellovin (Discuss):
Is 3118 mandatory-to-implement or not? I have a hard time
understanding why it should be optional.

What are the semantics if both "Main Mode" and "Aggressive Mode" have
the same value? "Transport Mode" and "Tunnel Mode"? If IKE/IPsec is
disabled, what security should be used? Any? None?

The IANA Considerations section is inadequate. First, it should state
what registry the option code should be taken from. Second, it should
state what what procedure (per 2434) should be used to assign new
values to the assorted bit fields in this option.

Alex Zinin (Discuss):

[iSNS] is listed as non-normative. How's that possible if the opinion
is supposedly specific for iSNS and doesn't make sense outside of iSNS
context, i.e., iSNS needs to exist for the option to make sense.


^L 
---- following is a DRAFT of message to be sent AFTER approval ---
From: The IESG <iesg-secretary@ietf.org>
To: IETF-Announce:;
Cc: Internet Architecture Board <iab@iab.org>,
    RFC Editor <rfc-editor@isi.edu>, <dhcwg@ietf.org>
Subject: Protocol Action: 'The IPv4 DHCP Options for the Internet 
         Storage Name Service' to Proposed Standard 

The IESG has approved the Internet-Draft 'The IPv4 DHCP Options for the 
Internet Storage Name Service' <draft-ietf-dhc-isnsoption-08.txt> as a 
Proposed Standard. This document is the product of the Dynamic Host 
Configuration Working Group. The IESG contact persons are Thomas Narten and 
Margaret Wasserman.

Technical Summary

This document describes the DHCP option to allow Internet Storage Name
Service (iSNS) clients to automatically discover the location of the
iSNS server through the use of DHCP for IPv4.
               
Working Group Summary
 
There was support in both the DHC and IPS WGs for this option.
 
Protocol Quality
 
This document has been reviewed for the IESG by Thomas Narten.






 
2. Protocol Actions 
2.1 WG Submissions 
2.1.2 Returning Item  - 3 of 3 

  o draft-ietf-avt-mpeg4-simple-08.txt
    RTP Payload Format for Transport of MPEG-4 Elementary Streams (Proposed 
    Standard) 
    Note: On agenda again to check if mods from MPEG4 group to language 
    about ECMAscript risks are ok for clearing SMB's Discuss - there was 
    agreed language during Vienna but it needed a little modification. 
    Token: Allison Mankin

To: Internet Engineering Steering Group <iesg@ietf.org>
From: IESG Secretary <iesg-secretary@ietf.org>
Reply-To: IESG Secretary <iesg-secretary@ietf.org>
Subject: Evaluation: draft-ietf-avt-mpeg4-simple - RTP Payload Format for 
         Transport of MPEG-4 Elementary Streams to Proposed Standard
--------

Last Call to expire on: 2003-6-16

	Please return the full line with your position.

                    Yes    No-Objection  Discuss *  Abstain


Harald Alvestrand   [   ]     [ X ]       [   ]      [   ]
Steve Bellovin      [   ]     [   ]       [ X ]      [   ]
Randy Bush          [   ]     [   ]       [   ]      [   ]
Bill Fenner         [   ]     [ X ]       [   ]      [   ]
Ned Freed           [   ]     [ X ]       [   ]      [   ]
Ted Hardie          [   ]     [ X ]       [   ]      [   ]
Russ Housley        [   ]     [ X ]       [   ]      [   ]
Allison Mankin      [ X ]     [   ]       [   ]      [   ]
Thomas Narten       [   ]     [ X ]       [   ]      [   ]
Jon Peterson        [   ]     [ X ]       [   ]      [   ]
Margaret Wasserman  [   ]     [   ]       [   ]      [   ]
Bert Wijnen         [   ]     [   ]       [   ]      [   ]
Alex Zinin          [   ]     [ X ]       [   ]      [   ]

Erik Nordmark       [   ]     [ X ]       [   ]      [   ]

 2/3 (9) Yes or No-Objection opinions needed to pass.

 * Indicate reason if 'Discuss'.

DISCUSS:
=======
Steve:
2.4: Why is this form of application-level fragmentation better than
IP fragmentation?

Where is the security model defined for ECMAScript in this context?
(Problems with the model have been part of the Javascript security
problem for Web browsers.)

COMMENT:
=======
Russ Housley:
It is strange to have more than one section labeled 
"Introduction." Please pick a new label for section 2.1.

^L
---- following is a DRAFT of message to be sent AFTER approval ---
To: IETF-Announce:;
Dcc: *******
Cc: RFC Editor <rfc-editor@isi.edu>,
 Internet Architecture Board <iab@iab.org>, avt@ietf.org
From: The IESG <iesg-secretary@ietf.org>
Subject: Protocol Action: RTP Payload Format for Transport of MPEG-4 
         Elementary Streams to Proposed Standard
-------------


The IESG has approved the Internet-Draft 'The RTP Payload Format for Transport
of MPEG-4 Elementary Streams <draft-ietf-avt-mpeg4-simple-07.txt> as a
Proposed Standard. This document is the product of the Audio Video Transport
Working Group. The IESG contact persons are Allison Mankin and Jon Peterson.

Technical Summary

The MPEG-4 standard specifies compression of audio-visual data into
for example an audio or video elementary stream. In the MPEG-4
standard, these streams take the form of audio-visual objects that may
be arranged into an audio-visual scene by means of a scene
description. Each MPEG-4 elementary stream consists of a sequence of
Access Units; examples of an Access Unit (AU) are an audio frame and a
video picture.

This specification defines a general and configurable payload
structure to transport non-multiplexed MPEG-4 elementary streams, in
particular MPEG-4 audio (including speech) streams, MPEG-4 video
streams and also MPEG-4 systems streams, such as BIFS (BInary Format
for Scenes), OCI (Object Content Information), OD (Object Descriptor)
and IPMP (Intellectual Property Management and Protection) streams.
The RTP payload defined in this document is simple to implement and
reasonably efficient. It allows for optional interleaving of Access
Units (such as audio frames) to increase error resiliency in packet
loss.

This payload format is largely compatible with the video part
of RFC 3016, the RTP Payload Format for MPEG-4 Audio/Visual Streams, and
extends that format to effectively support other classes of media and also
MPEG-4 Systems streams.

The specification registers the MIME sub-types audio/mpeg4-generic,
video/mpeg4-generic and application/mpeg4-generic.

MPEG-4 Systems supports stream types including commands that are
executed on the terminal like OD commands, BIFS commands, etc. and
programmatic content like MPEG-J (Java(TM) Byte Code) and
CMAScript. The Security Considerations discuss risks associated with
these capabilities and ways to mitigate these risks.

Working Group Summary

This was a strenuous effort by the AVT Working group.
This payload format has been under development since the 39th IETF meeting
in Munich, August 1997. It is the result of collaboration between AVT, the
MPEG committee and the Internet Streaming Media Alliance. When the
consensus designs were achieved, there was a thorough Last Call review and
strong support for advancement.

Protocol Quality

The specification was reviewed for the IESG by Allison Mankin.



 


2. Protocol Actions 
2.2 Individual Submissions 
2.2.1 New Item  - 1 of 1 

  o draft-zeilenga-ldap-rfc2596-04.txt
    Language Tags and Ranges in LDAP (Proposed Standard) 
    Token: Ted Hardie

To: Internet Engineering Steering Group <iesg@ietf.org>
From: IESG Secretary <iesg-secretary@ietf.org>
Reply-To: IESG Secretary <iesg-secretary@ietf.org>
Subject: Evaluation: draft-zeilenga-ldap-rfc2596 -
        Language Tags and Ranges in LDAP
--------

Last Call to expire on: 2003-09-23

        Please return the full line with your position.

                      Yes  No-Objection  Discuss  Abstain
Harald Alvestrand    [   ]     [   ]     [   ]     [   ]
Steve Bellovin       [   ]     [   ]     [   ]     [   ]
Randy Bush           [   ]     [   ]     [   ]     [   ]
Bill Fenner          [   ]     [   ]     [   ]     [   ]
Ned Freed            [   ]     [   ]     [   ]     [   ]
Ted Hardie           [ X ]     [   ]     [   ]     [   ]
Russ Housley         [   ]     [   ]     [   ]     [   ]
Allison Mankin       [   ]     [   ]     [   ]     [   ]
Thomas Narten        [   ]     [   ]     [   ]     [   ]
Jon Peterson         [   ]     [   ]     [   ]     [   ]
Margaret Wasserman   [   ]     [   ]     [   ]     [   ]
Bert Wijnen          [   ]     [   ]     [   ]     [   ]
Alex Zinin           [   ]     [   ]     [   ]     [   ]

2/3 (9) Yes or No-Objection opinions needed to pass.

DISCUSSES AND COMMENTS:
======================



^L 
---- following is a DRAFT of message to be sent AFTER approval ---
To: IETF-Announce:;
Cc: "RFC Editor" <rfc-editor@isi.edu>,"Internet Architecture Board"
<iab@iab.org>
Subject: Protocol Action: Language Tags and Ranges in LDAP to Proposed Standard
------------------------

The IESG has approved the Internet-Draft 'Language Tags and Ranges in LDAP' <draft-zeilenga-ldap-rfc2596-04.txt> as a Proposed Standard. This has been reviewed in the IETF but is not the product of an IETF Working Group. 
The IESG contact person is Harald Alvestrand

Technical Summary

This document describes how language tags and ranges  are
carried in LDAP and are to be interpreted by LDAP implementations.
It replaces RFC 2596, and it contains signficant changes:
it adds support for language ranges; provides a mechanism
for discovery of  whether a server supports language
tags and ranges;  and it clarifies how attributes with multiple language
tags are to be treated.  The approach described is signficantly
different from the approach in X.500; the document summarizes
those differences in a non-normative appendix.
 

Working Group Summary
 
This document is not the product of a working group, but it do go
through IETF Last Call; no objections were received.

 
Protocol Quality
 
This document was reviewed by Ted Hardie for the IESG.






 
2.2.2 Returning Item
  NONE



3. Document Actions 
3.1 WG Submissions 
3.1.1 New Item  - 1 of 2 

  o draft-ietf-isis-igp-p2p-over-lan-03.txt
    Point-to-point operation over LAN in link-state routing protocols 
    (Informational) 
    Note: On agenda for 2003-10-02 telechat 
    Token: Bill Fenner
 
3. Document Actions 
3.1 WG Submissions 
3.1.1 New Item  - 2 of 2 

  o draft-ietf-magma-msf-api-05.txt
    Socket Interface Extensions for Multicast Source Filters 
    (Informational) 
    Token: Margaret Wasserman
 
3.1.2 Returning Item
  NONE


3. Document Actions 
3.2 Individual Submissions Via AD 
3.2.1 New Item  - 1 of 2 

  o draft-newton-ldap-whois-04.txt
    Whois Domain Data using the Lightweight Directory Access Protocol 
    (LDAP) (Experimental) 
    Token: Ted Hardie
 
3. Document Actions 
3.2 Individual Submissions Via AD 
3.2.1 New Item  - 2 of 2 

  o draft-gill-gtsh-01.txt
    The Generalized TTL Security Mechanism (GTSM) (Experimental) 
    Token: Alex Zinin
 
3.2.2 Returning Item
  NONE

3.3.1 New Item
  NONE
3.3.2 Returning Item
  NONE



4. Working Group Actions
4.1 WG Creation
4.1.1 Proposed for IETF Review
  o Long-Term Archive and Notary Services (ltans) - 1 of 1
    Token: Russ

Long-Term Archive and Notary Services (ltans)
---------------------------------------------

 Last Modified: 2003-9-25

 Current Status: Proposed Working Group 

 CHAIR(S):
 Tobias Gondrom <tobias.gondrom@ixos.de>
 Carl Wallace <cwallace@orionsec.com>

 SECURITY AREA DIRECTORS:
 Russ Housley <housley@vigilsec.com>
 Steve Bellovin <smb@research.att.com>

 SECURITY AREA ADVISOR:
 Russ Housley <housley@vigilsec.com>

 MAILING LIST:
 General Discussion: ietf-ltans@imc.org
 To Subscribe: subscribe-ietf-ltans@imc.org
 In Body: subscribe
 To Unsubscribe: unsubscribe-ietf-ltans@imc.org
 Archive: http://www.imc.org/ietf-ltans

 DESCRIPTION OF WORKING GROUP:
 In many scenarios, users need to be able to ensure and prove the existence
 and validity of data, especially digitally signed data, in a common and
 reproducible way over a long and possibly undetermined period of time.
 Cryptographic means are useful, but they do not provide the whole solution.
 For example, digital signatures (generated with a particular key size) might
 become weak over time due to improved computational capabilities, new
 cryptanalytic attacks might "break" a digital signature algorithm, public
 key certificates might be revoked or expire, and so on. Complementary
 methods covering potential weaknesses are necessary.

 Long-term non-repudiation of digitally signed data is an important aspect
 of PKI-related standards. Standard mechanisms are needed to handle routine
 events, such as expiry of signer's public key certificate and expiry of
 trusted time stamp authority certificate. A single timestamp is not
 sufficient for this purpose. Additionally, the reliable preservation of
 content across change of formats, application of electronic notarizations,
 and subsequent notary services require standard solutions.

 The objective of the LTANS working group is to define requirements, data
 structures and protocols for the secure usage of the necessary archive and
 notary services. First, the requirements for the long-term archive will be
 collected. Based on that information we will develop a protocol to access
 archive services supplying long-term non-repudiation for signed documents
 and define common data structures and formats. Upon completion of the
 archive-related specifications, we will address 'notary services' in a
 similar way. The term 'notary services' is not clearly defined. The working
 group will determine which functions need standards, including transformation
 of documents from one format to another without losing the value of evidence,
 electronic notarization, and further verification of legal validity of signed
 documents. We will determine the needs via the requirements paper and act
 upon the results accordingly.

 Work done by the IETF Working Groups PKIX, S/MIME and XMLDSIG will be used as
 the basis to define those structures and protocols. For example, the
 Internet-Drafts "Archive Time-Stamps Syntax (ATS)" and "Trusted Archive
 Protocol (TAP)" and RFC 3029, "Data Validation and Certificate Server
 Protocols (DVCS)", contain applicable concepts.

 GOALS AND MILESTONES
 Nov 03 Initial requirements for long-term archive I-D
 Dec 03 Revised requirements for long-term archive I-D
 Dec 03 Initial data structures for long-term archive I-D
 Dec 03 Initial protocol for long-term archive I-D
 Feb 04 Last call requirements for long-term archive I-D
 Mar 04 Submit requirements for long-term archive to IESG as informational
 Mar 04 Revised data structures for long-term archive I-D
 Mar 04 Revised protocol for long-term archive I-D
 Apr 04 Last call data structures for long-term archive I-D
 Apr 04 Last call protocol for long-term archive I-D
 May 04 Submit data structures for long-term archive to IESG as proposed standard
 May 04 Submit protocol for long-term archive to IESG as proposed standard
 Jul 04 Initial requirements for notary services I-D
 Sep 04 Revised requirements for notary services I-D
 Nov 04 Last call requirements for notary services I-D
 Dec 04 Submit requirements for notary services to IESG as proposed standard



4. Working Group Actions
4.1 WG Creation
4.1.2 Proposed for Approval
  o Centralized Conferencing (xcon) - 1 of 1
    Token: Description

Centralized Conferencing (xcon)
---------------------------------

       Last Modified: 2003-09-25

       Current Status: Proposed Working Group

       Current Status: Proposed Working Group

       CHAIRS: Alan Johnston (alan.johnston@mci.com)
                       Adam Roach (adam@dynamicsoft.com)

       Mailing list: <http://www.softarmor.com/mailman/listinfo/xcon>
       List-Archive: <http://www.softarmor.com/pipermail/xcon>

       Transport Area

       Responsible Area Director: Allison Mankin

       Description of Working Group

       The focus of this working group is to develop a standardized suite of
       protocols for tightly-coupled multimedia conferences, where strong
       security and authorization requirements are integral to the solution.
       Tightly-coupled conferences have a central point of control and
       authorization (known as a focus) so they can enforce specific media and
       membership relationships, and provide an accurate roster of participants.
       The media mixing or combining function of a tightly-coupled conference
       need not be performed centrally, however.

       The scope of this effort is intentionally more narrow than previous
       attempts to standardize conferencing (e.g. centralized control), and is
       intended to enable interoperability in a commercial environment which
       already has a number of non-standard implementations using some of the
       protocols.

       Privacy, security, and authorization mechanisms are integral to the
       solution generated by the working group. This includes allowing
       participants to be invisible to all but the conference owner, or to be
       visible but participate anonymously with respect to some or all of
       the other participants.

       Authorization rules allow for participants and non-participants
       to have roles (ex: speaker, moderator, owner), and to be otherwise
       authorized to perform membership and media manipulation for or on
       behalf of other participants. In order to preserve these properties,
       the protocols used will require implementation of channel security
       and authentication services.

       Due to the centralized architecture of the WG, XCON's mechanisms will place
       requirements on the signaling protocol used between the focus and the
       participants. At a high level, the signaling protocol must be able to
       establish, tear down, modify, and perform call control operations on
       multimedia streams, including voice, video, and instant messaging, in both a
       centralized and distributed mixing architecture. SIP will be the 
       reference session signaling protocol used for examples; however, none of the XCON 
       solutions themselves will be signaling protocols, nor will XCON extend existing 
       signaling protocols. Other signaling protocols than SIP may be used between the focus
       and participants, including non-IETF protocols, but the requirements and
       possible extensions needed for other signaling protocols to utilize the 
       full functionality of the XCON architecture is outside the scope of XCON.

       The deliverables for the group will be:
       - A mechanism for membership and authorization control
       - A mechanism to manipulate and describe media "mixing" or "topology" for
           multiple media types (audio, video, text)
       - A mechanism for notification of conference related events/changes (for
           example a floor change)
       - A basic floor control protocol

       The initial set of protocols will be developed for use in unicast media
       conferences. The working group will perform a second round of work to
       enhance the set of protocols as necessary for use with multicast media
       after their initial publication.

       The following items are specifically out-of-scope:
       - Voting
       - Fully distributed conferences
       - Loosely-coupled conferences (no central point of control)
       - Far-end device control
       - Protocol used between the conference controller and the mixer(s)
       - Capabilities negotiation of the mixer(s)
       - Master-slave cascaded conferences

       The working group will coordinate closely with the SIPPING and
       MMUSIC working groups. In addition the working group will cooperate
       with other groups as needed, including SIP, MSEC, AVT, and the W3C
       SMIL working groups. In addition, the working group will consider
       a number of existing drafts as input to the working group.

       Proposed Milestones

       Oct 2003 Submit Requirements for Membership Manipulation for
                         publication as Informational

       Oct 2003 Submit Requirements for Basic Floor Control for
                         publication as Informational

       Nov 2003 Submit Conferencing Scenarios document for publication
                         as Informational

       Nov 2003 Submit Use Cases for Media Topology Control for publication
                         as Informational

       Dec 2003 Submit Requirements for Media Topology Control for
                         publication as Informational

       Feb 2004 Submit Basic Floor Control Protocol for publication as PS

       Mar 2004 Submit Notification Event package extension for conference
                         related events for publication as PS

       May 2004 Submit Membership Manipulation Protocol for publication
                         as PS

       Jul 2004 Submit Protocol for Media Topology Control for publication







4. Working Group Actions
4.2 WG Rechartering
4.2.1 Under evaluation for IETF Review
  o Audio/Video Transport (avt) - 1 of 4
    Token: Allison

Audio/Video Transport (avt)
---------------------------

Last Modified: 2003-9-25

Current Status: Active Working Group

Chair(s):
Colin Perkins <csp@csperkins.org>
Magnus Westerlund <magnus.westerlund@ericsson.com>

Transport Area Director(s):
Allison Mankin <mankin@psg.com>
Jon Peterson <jon.peterson@neustar.biz>

Transport Area Advisor:
Allison Mankin <mankin@psg.com>

Mailing Lists:
General Discussion: avt@ietf.org
To Subscribe: avt-request@ietf.org
Archive: www.ietf.org/mail-archive/working-groups/avt/current/maillist.html

The Audio/Video Transport Working Group was formed to specify a
protocol for real-time transmission of audio and video over unicast
and multicast UDP/IP. This is the Real-time Transport Protocol, RTP,
together with its associated profiles and payload formats. The 
current aims of the working group are:     

 - to advance the main RTP specification and RTP Profile 
   for Audio and Video Conferences with Minimal Control 
   for publication as full Internet Standards

 - to review and revise existing payload formats to advance those
   which are useful to Draft Standard, and to declare others
   as Historic. Milestones will be established as a champion for 
   each payload format is identified.

 - to develop payload formats for new media codecs, and to
   document best-current practices in payload format design. 
   The group continues to be precluded from work on codecs 
   themselves because of overlap with the other standards 
   bodies, and because the IETF does not have the ability 
   to effectively review new codecs. An exception was made 
   for the freeware iLBC codec on a highly experimental basis, 
   but acceptance of new codec work is unexpected and subject 
   to rechartering.

 - to complete the forward error correction work in the ULP and
   UXP payload formats

 - to extend RTP to work with Source-Specific Multicast sessions
   with unicast feedback

 - to provide a framing mechanism for RTP over TCP and TLS

 - to review the applicability of Compressed RTP operation on
   MPLS networks, developing extensions as necessary

 - to develop a new RTP profile as the combination of the SRTP
   profile and the Extended RTP Profile for RTCP-based Feedback
   (RTP/SAVPF)

The group will also coordinate with the DCCP working group to
ensure that RTP can be efficiently transported over DCCP.

The longer term goals of the working group are to advance the 
SRTP Profile, the Extended RTP Profile for RTCP-based Feedback,
the Compressed RTP framework, and the RTP MIB to Draft Standard. 

The group has no plans to develop new RTP profiles beyond those
listed above, but will consider rechartering to produce profile
level extensions if appropriate.            

Milestones:

Oct 2003  Review DCCP including prototypes and API; feedback to DCCP WG
Nov 2003  Initial draft requirements for ECRTP over MPLS; discuss with MPLS WG
Dec 2003  Submit UXP Payload Format for Proposed Standard              
Dec 2003  Submit ULP Payload Format for Proposed Standard 
Dec 2003  Submit RTCP/SSM draft for Proposed Standard
Dec 2003  Submit iLBC codec specification for Experimental
Dec 2003  Submit iLBC payload format for Proposed Standard
Jan 2004  Advance RTP specification and A/V profile to Full Standard
Mar 2004  Submit Framing of RTP for TCP and TLS for Proposed Standard
Mar 2004  Identify payload formats to classify as Historic
Mar 2004  Finish requirements for ECRTP over MPLS; recharter for subsequent work
Jul 2004  Submit RTP/SAVPF profile for Proposed Standard
Jul 2004  Begin update of SRTP profile for Draft Standard RFC
Jul 2004  Begin update of RTP/AVPF profile for Draft Standard RFC
Aug 2004  Consider update of RTP MIB
Nov 2004  Collect SRTP implementation reports
Nov 2004  Collect RTP/AVPF implementation reports
Mar 2005  Submit SRTP for Draft Standard
Mar 2005  Submit RTP/AVPF for Draft Standard


4. Working Group Actions
4.2 WG Rechartering
4.2.1 Under evaluation for IETF Review
  o DNS Extensions (dnsext) - 2 of 4
    Token: Thomas

DNS Extensions (dnsext)
-----------------------

     Last Modified: 16-September-2003

     Current Status: Active Working Group 

     Chair(s):
             Olafur Gudmundsson <ogud@ogud.com>
             Olaf Kolkman <olaf@ripe.net>

     Internet Area Director(s):
             Thomas Narten <narten@us.ibm.com>
             Margret Wasserman <mrw@windriver.com>

     Internet Area Advisor:
             Thomas Narten <narten@us.ibm.com>

     Mailing Lists:
             General Discussion: namedroppers@ops.ietf.org
             To Subscribe: namedroppers-request@ops.ietf.org
             Archive: <http://ops.ietf.org/lists/namedroppers/>

             The DNSEXT Working Group actually uses an additional mailing
             list:
             DNS Security: dnssec@cafax.se
             To Subscribe: dnssec-request@cafax.se
             Archive: http://www.cafax.se/dnssec/ and ftp://ftp.cafax.se/pub/archives/dnssec.list

 Description of Working Group:

   DNS was originally specified in RFC's 1034 and 1035, with subsequent
   updates. Within the scope of this WG are DNS protocol issues,
   including the specification of message formats, message handling, and
   data formats used for DNS client-server and server-server
   communication.

   This WG is focused on advancing the zone transfer, update and notify
   documents to Draft standard and on the rewrite of the DNSSEC proposed
   standard.

   Issues surrounding the operation of DNS, recommendations concerning
   the configuration of DNS servers, and other issues with the use of
   the protocol are out of this Working Group's charter. These issues
   are considered in other venues, such as the DNS Operations Working
   Group.

 Specific work items are:

               o Protocol clarifications and corrections for DNSSEC, initially
                   these clarifications will be done as separate RFCs that will
                   later be folded into a document that we refer to as the RFC
                   2535bis document standard. These include changes that
                   simplify the operation of DNSSEC.

               o Generate new specification documents of DNSSEC (the RFC
                   2535bis document set) that includes all changes to RFC2535.
                   This includes the following RFCs 2931, 3007, 3008, 3090 and
                   3226 and a number of Internet Drafts including DS,
                   AD-is-secure, Key Signing Flag, etc. Advance this document
                   set through the standards process.

               o Clarification of RFC1034/1035 relating to DNSEXT ongoing work.
                   + Clarification of wildcard processing rules.
                   + Case Insensitivity Clarification.

               o After the work items above have been completed the working
                   group will continue on reviewing the following existing
                   proposed standard and examine if there is a possibility to
                   progress them on the standards track.

                   + RFC1995 (IXFR) to Draft standard.
                   + RFC1996 (Notify) to Draft standard.
                   + RFC2136bis (Dynamic Update) to Draft Standard.
                   + RFC2181 (Clarify) to IESG for advancement to Draft Standard.
                   + RFC2308 (Neg Caching) to Draft Standard.
                   + RFC2671 (EDNS0) to Draft Standard.
                   + RFC2845 (TSIG)to Draft standard.
                   + RFC2930 (TKEY) to Draft standard.
                   + RFC3007 (Secure Update) to Draft standard.
                   + RFC3??? AXFR clarify to Draft Standard.
                   + RFC3??? GSS/TSIG to Draft Standard 

               o Foster the development of Link Local Multicast Name
                   Resolution (LLMNR) standard. The WG has taken up this work
                   since LLMNR it is very similar to the DNS protocol. LLMNR is
                   targeted as proposed standard.

   The lifetime of the group is set by the work items above but while
   these are ongoing the working group has additional tasks:

               o Reviewing and providing recommendations about the specification,
                   by other working groups, of RR types that do not require any
                   special processing and that do not require any special naming
                   conventions.

 Goals and Milestones:

     Sep 03 Update boilerplate text on OPT-IN 
     Oct 03 Forward LLMNR to IESG for Proposed Standard.
     Oct 03 WG last call on the DNSSEC document set(RFC2535-bis).
     Oct 03 Forward Wildcard clarification to IESG for proposed standard
     Nov 03 Submit KEY algorithm documents RFC253[69d] and RFC3110 to IESG for proposed standard.
     Sep/Oct 03 Forward RFC2535-bis to IESG for proposed standard.
     Feb 04 Submit to IESG RFC2845 (TSIG)to Draft standard.
     Feb 04 Submit to IESG RFC2930 (TKEY) to Draft standard.
     Nov 03 Start of process of reviewing the following RFCs and to move them to PS status.
     Feb 04 RFC1982 (Serial Number Arithmetic)
     Feb 04 RFC2782 (SRV RR) to Draft Standard
     Feb 04 RFC2538 (CERT RR) to Draft Standard.
     May 04 RFC1995 (IXFR) to Draft standard
     May 04 RFC1996 (Notify) to Draft Standard.
     May 04 RFC2136 (Dynamic Update) to Draft Standard.
     May 04 RFC3007 (Secure Update) to Draft standard.
     Aug 04 RFC2181 (Clarify) to Draft Standard.
     Aug 04 RFC2671 (EDNS0) to Draft Standard.
     Aug 04 RFC2308 (Neg Caching) to Draft Standard.
     Nov 04 RFC3090 (TKEY) to Draft Standard.
     Nov 04 FRC2539 (DH Key RR) to Draft Standard.
     Nov 04 RFC3226 (Message Size) to Draft Standard


4. Working Group Actions
4.2 WG Rechartering
4.2.1 Under evaluation for IETF Review
  o Common Control and Measurement Plane (ccamp) - 3 of 4
    Token: Alex

Common Control and Measurement Plane (ccamp)
--------------------------------------------

 Last Modified: 2003-9-22 

 Current Status: Active Working Group
 
 Chair(s):
       Ronald Bonica <ronald.p.bonica@mci.com>
       Kireeti Kompella <kireeti@juniper.net>
       
   Routing Area Director(s):
       Bill Fenner <fenner@research.att.com>
       Alex Zinin <zinin@psg.com>
       
   Routing Area Advisor:
       Alex Zinin <zinin@psg.com>

   Mailing Lists:
   General Discussion: ccamp@ops.ietf.org
   To Subscribe: majordomo@ops.ietf.org
   In Body: subscribe ccamp
   Archive: http://ops.ietf.org/lists/ccamp

   Description of Working Group:

   Organizational Overview

   The CCAMP working group coordinates the work within the IETF defining
   a common control plane and a separate common measurement plane for
   physical path and core tunneling technologies of Internet and telecom
   service providers (ISPs and SPs), e.g. O-O and O-E-O optical
   switches, ATM and Frame Relay switches, MPLS, GRE, in cooperation
   with the MPLS WG. In this context, measurement refers to the
   acquisition and distribution of attributes relevant to the setting up
   of tunnels and paths.

   CCAMP WG work scope includes:

   - Definition of protocol-independent metrics and parameters
       (measurement attributes) for describing links and paths that are
       required for routing and signaling. These will be developed in
       conjunction with requests and requirements from other WGs (e.g.
       TEWG) to insure overall usefulness.

   - Definition of protocol(s) and extensions to them required for
       link and path attribute measurement. Link Management Protocol (LMP)
       is included here.

   - Functional specification of extensions for routing (OSPF, ISIS) and
       signalling (RSVP-TE) required for path establishment. Protocol formats
       and procedures that embody these extensions will be done jointly with
       the WGs supervising those protocols.

   - Definition of the mechanisms required to determine the route and
       properties of an established path (tunnel tracing).

   - Definition of MIB modules relevant to the protocols and extensions
       specified within the WG.

   CCAMP WG currently works on the following tasks:
           
   - Define how the properties of network resources gathered by a
       measurement protocol can be distributed in existing routing
       protocols, such as OSPF and IS-IS. CCAMP defines the generic
       description of the properties and how they are distributed in OSPF.
       The specifics of distribution within IS-IS are being addressed in
       the ISIS WG.

   - Define signaling and routing mechanisms to make possible the creation
       of paths that span multiple IGP areas, multiple ASes, and multiple
       providers, including techniques for crankback.

   - Define abstract link and path properties needed for link and path
       protection. Specify signalling mechanisms for path protection,
       diverse routing and fast path restoration. Ensure that multi-layer
       path protection and restoration functions are achievable using the
       defined signalling, routing, and measurement protocols, either
       separately or in combination.

   - Identify requirements for signaling and routing for ASON not currently
       met; based on these, define mechanisms to address these requirements.

   - Define a protocol that can determine the actual route and other
       properties of paths set up by CCAMP signaling protocols, as well
       as other types of tunnels (tunnel tracing).

   In doing this work, the WG will work closely with at least the following
   other WGs: TEWG, MPLS, ISIS, OSPF. The WG will also cooperate with
   ITU-T.

   Goals and Milestones:
   Done Post strawman WG goals and charter
   Done Identify and document a limited set of candidate solutions for signalling 
             and for measurement. Among candidate control solutions to be considered are the
             existing GMPLS drafts
   Done Build appropriate design teams
   Done Submit WG document defining path setup portions of common control plane protocol
   Done Submit WG document defining common measurement plane protocol
   Nov 03 Submit LMP MIB to IESG
   Dec 03 Submit GMPLS MIBs to IESG
   Dec 03 Submit protection & restoration documents to IESG
   Dec 03 Submit ASON signaling requirements doc to IESG
   Jan 04 Produce CCAMP WG document for multi-area/AS signaling and routing
   Jan 04 Produce CCAMP WG document for generic tunnel tracing protocol
   Feb 04 Submit ASON routing requirements doc to IESG
   Mar 04 Submit revised charter and milestones to IESG for IESG consideration of more 
                 detailed deliverables and determination of usefulness of continuation of WG


4. Working Group Actions
4.2 WG Rechartering
4.2.1 Under evaluation for IETF Review
  o Ethernet Interfaces and Hub MIB (hubmib) - 4 of 4
    Token: Bert

Ethernet Interfaces and Hub MIB (hubmib)
----------------------------------------

     Last Modified: 2003-9-24

     Current Status: Active Working Group

     Chair(s):
         Dan Romascanu <dromasca@avaya.com>

     Operations and Management Area Director(s):
         Randy Bush <randy@psg.com>
         Bert Wijnen <bwijnen@lucent.com>

     Operations and Management Area Advisor:
         Bert Wijnen <bwijnen@lucent.com>

     Mailing Lists:
         General Discussion: hubmib@ietf.org
         To Subscribe: hubmib-request@ietf.org
         In Body: subscribe your_email_address
         Archive: www.ietf.org/mail-archive/working-groups/hubmib/current/maillist

     Description of Working Group:

     The Ethernet Interfaces and Hub MIB WG is Chartered to define
     a set of managed objects that instrument devices, MAUs and
     interfaces that conform to the IEEE 802.3 standard for Ethernet.
     This set of objects should be largely compliant with, and even
     draw from IEEE 802.3, although there is no requirement that any
     specific object be present or absent.

     Close coordination with hardware standards development in
     IEEE 802.3 will be followed. The WG chair will support the
     communication with IEEE 802.3. When objects are added that
     require hardware support, IEEE 802.3 shall be informed,
     so that they consider to add them to their draft/standard.

     The MIB object definitions produced will be for use by SNMP and
     will be adequately consistent with other SNMP objects, standards
     and conventions.

     The working group will work on the following MIB modules 
     for the IEEE 802.3ah (Ethernet First Mile) interfaces and
     devices:

     - Ethernet First Mile (EFM) MIB 
         common attributes, OAM operations and statistics

     - Copper EFM MIB

     - Ethernet Passive Optical Networks (EPON) MIB

     The base for the definition of the managed objects in these
     MIB modules will be the management-related clauses in IEEE
     802.3ah specification. The working group will also take
     into consideration management objects defined by other
     Working Groups in the IETF (ADSL MIB for example), or other
     standard bodies (G.983.2), will avoid work duplication,
     and describe the relationship with these specifications.

     Goals and Milstones

     < keep complete list of DONE work items for archival reasons >

     Oct 2003 - Individual submissions for the EFM MIB modules

     Dec 2003 - First round of WG Internet-Drafts for the
                           EFM MIB modules

     Apr 2004 - Working Group Last Call

     Jun 2004 - Submit the Internet-Drafts to the IESG for
                           consideration as Proposed Standards


4. Working Group Actions
4.2 WG Rechartering
4.2.2 Proposed for Approval

    NONE

5. Working Group News We Can Use
                                                                                       
Harald Alvestrand
Steve Bellovin
Randy Bush
Bill Fenner
Ned Freed
Ted Hardie
Russ Housley
Allison Mankin
Thomas Narten
Jon Peterson
Margaret Wasserman
Bert Wijnen
Alex Zinin


6. IAB News We Can Use

7. Management Issues
7.1 Appropriate Methods for getting Meeting Minutes from Chairs (Harald Alvestrand)


7.2 Interoperability Testing at IETF Meetings (Harald Alvestrand)
------------------------------------------------------------
Message #1 From Michael Richardson (in its entirety)

Subject: [57crew] IETF anchored interop testing
Date: Monday 28 July 2003 11:53
From: Michael Richardson <mcr@sandelman.ottawa.on.ca>
To: ietf-secretariat@ietf.org, Brett Thorson <bthorson@ietf.org>
Cc: hugh@xisp.net, martin.steimerling@ccrle.nec.de, Edward Lewis
<edlewis@arin.net>, Bill Manning <bmanning@ISI.EDU>, paul.hoffman@vpnc.org,
57crew@ietf.org, Sabine.Beauvois@etsi.org, Andrew McGregor
<andrew@indranet.co.nz>
-----BEGIN PGP SIGNED MESSAGE-----

Hi,

various WGs have attempted to organize interop/plug testing either before or after IETF sessions. Sometimes during. I am aware of IPsec, HIP, DNSSEC, and DHCPv6 tests that have occured or been attempted in the past year.

I wanted to arrange a manner in which we might organize this kind of thing in a more organized, less ad-hoc manner. I wanted to propose that a mailing list be set up that included someone from the secretariat, as well as interested parties.

Primarily, I am interesting in reducing the lead time for getting things organized - in great part so that the cost to the participants of attending such a plugtest is reduced into the noise level compared to IETF itself.

If we can do this @ietf.org, that would be great. If not, let me know,
and I will create a list elsewhere.

I will save conversation about my thoughts about logistics for the list itself.
------------------------------------------------------------
Message #2 From Bill Manning (excerpt)

(NOTE:  In his message, Bill forwarded Message #1 from Michael Richardson, and added one sentence.  The excerpt contains the additional sentence.)

Envelope-to: bfuller@foretec.com
From: Bill Manning <bmanning@ISI.EDU>
Subject: Re: IETF anchored interop testing
To: mcr@sandelman.ottawa.on.ca (Michael Richardson)
Date: Thu, 4 Sep 2003 02:59:28 -0700 (PDT)
Cc: ietf-secretariat@ietf.org, bthorson@ietf.org, hugh@xisp.net,
martin.steimerling@ccrle.nec.de, edlewis@arin.net, bmanning@ISI.EDU,
paul.hoffman@vpnc.org, 57crew@ietf.org, Sabine.Beauvois@etsi.org,
andrew@indranet.co.nz, bmanning@ep.net
X-Mailer: ELM [version 2.4ME+ PL39 (25)]

There are some rumblings of doing another series of
testing in Korea prior to the IETF next spring.

--bill
------------------------------------------------------------
Message #3 From Kevin Almeroth (in its entirety, but without headers)

(NOTE: This message was forwarded to me by Brett Thorson who originally received it.  Kevin Almeroth is the head of the multicast group at the University of Oregon that provides multicast support at the IETF meetings.)

On Tue, 26 Aug 2003, Kevin C. Almeroth wrote:
Brett, don't know if I have the right email for Jim, but I think I do. Okay...

So, we are planning a pretty interesting/aggressive project for the Minn IETF and we wanted to get your feedback.

First, the "we" is me, Elizabeth Belding-Royer (a faculty member here who is active with Charlie Perkins in the Ad hoc area), and our usual group of students.

Second, we are building (soon to be "have built") a plug-in that allows a laptop to run in true ad hoc mode. The idea is to use other such laptops to build a "real" ad hoc network. My personal idea is to be able to use these ad hoc nodes to extend connectivity into the upper floors of the hotel. A better idea would be if there is an area that could use wireless access, but for some reason (money, AP access, etc.) there won't be. Based on what ya'll know about the layout, do you have any idea on whether Minn will have this?

Third, we want to conduct a parallel experiment to start doing a better job tracking and collecting stats about what is happening on the wireless network. I wanted to do this in Vienna but the goobers couldn't figure out how to do what I wanted. Basically, I'd like to periodically dump a variety of SNMP data from the APs. The problems in Vienna seemed to be that they'd already configured the APs to ONLY listen to one address and they'd also configured them to ONLY do fault alarms... So, anyway we can set up to collect decent information?

Thanks for your support. :-)

-Kevin
------------------------------------------------------------
Message #4 From Michael Richardson (almost in its entirety...extraneous sentence omitted)

(NOTE: Brett sent Michael Richardson and Kevin Almeroth a note asking for more details about their testing plans for Minneapolis.  He cc'd the mailing list for his IETF "meeting crew" on the note.  Message #4 is Michael Richardson's response to Brett's note.)

Subject: Re: Testing at the IETF
Date: Tuesday 09 September 2003 15:20
From: Michael Richardson <mcr@sandelman.ottawa.on.ca>
To: Brett Thorson <bthorson@foretec.com>
Cc: "Kevin C. Almeroth" <almeroth@cs.ucsb.edu>

>>>>> "Brett" == Brett Thorson <bthorson@foretec.com> writes:

Brett> Hi there Michael & Kevin.

Brett> It has come to my attention that both of you would like to do some
Brett> testing at the IETF meetings (and from what I understand, at the
Brett> Minneapolis IETF meeting). The Acting IETF Director has discussed
Brett> this idea with Harald (The IETF Chair) and he would like me to
Brett> collect from you a description of what you will be testing /
Brett> providing, and your goals.

I am not specifically interesting in doing it *at* IETF, but rather
immediately preceeding - Friday/Saturday.

My impression from being involved with network setup is that it is much easier to be the guinea pigs as the network goes up, rather than try and get the network to remain up after Friday.

And in general, I was hoping that this could become a tradition rather
than just an incidental occurance.

Brett> If you could get this to me by 1300 Eastern Time Thursday
Brett> 2003/11/09, I can then submit it for the weekly discussion.

The protocols that I have in mind are:
IPsec IKEv2
DNSSEC

I can not be certain at this time that there is sufficient interest in
either of them at this time, but I will attempt to determine this by
Thursday.
------------------------------------------------------------
Message #5 From Michael Richardson (in its entirety)

(NOTE: Chris Liljenstolpe, who is on the mailing list for Brett's "meeting crew," responded to Brett's note with a question, and Michael Richardson responded to Chris.  Message #5 is Michael's response to Chris's question.)

Subject: Re: [58crew] Testing at the IETF
Date: Tuesday 09 September 2003 15:29
From: Michael Richardson <mcr@sandelman.ottawa.on.ca>
To: Chris Liljenstolpe <cds@io.com>
Cc: Brett Thorson <bthorson@foretec.com>, "Kevin C. Almeroth"
<almeroth@cs.ucsb.edu>

>>>>> "Chris" == Chris Liljenstolpe <cds@io.com> writes:

Chris> What kind of testing?

I can't speak for Kevin, since I don't know what he is after.

In general, what we are looking for is a tradition of having some
room(s) with a network drop that becomes live on the IETF network earlier, ideally Friday morning. With real IPv4 and IPv6 space alive.

Pretty much anyone who wants to do testing winds up needing some amount of Internet, but we one 9 of reliability is probably enough.

What? DNSSEC, IPsec is what I do.

I think most groups could easily deal with bring hubs/switches, etc. We would not bring wireless if asked not to.
------------------------------------------------
----------------------------------------------------------------
Envelope-to: bfuller@foretec.com
From: Brett Thorson <bthorson@foretec.com>
To: "Barbara B. Fuller" <bfuller@foretec.com>
Subject: Testing @ IETF Meeting
Date: Thu, 11 Sep 2003 14:20:22 -0400
User-Agent: KMail/1.5

If the IESG decides to approve of the testing, they should be aware of the
added difficulties & cost that it adds to the host and/or Foretec.

>From some previous e-mails it reads that some of these testers were expecting
the network to be up and running when they got there (which would be before
the meeting).  Trying to setup a network with "experiments" going on,
increases the level of stress while trying to get this network up and
running.  On the back end, leaving the network run longer for testers is just
that many more days added onto a really long week (for the NOC Crew).

One of the considerations should also be the cost of this event.  If we are
going to sanction testing before or after the meeting, some level of network
infrastructure will need to be setup before or remain after the meeting.

Even now, we have a hard time getting into these rooms before the meeting. The
hotel would rather sell them to a customer, rather than letting us in for
free before we have officially purchased the room.  Also with the hotels now
adding more wiring to the buildings, and the IETF using that wiring, we also
incur the additional costs of using their infrastructure for these days.  In
some cases (Such as Minneapolis) we have received gracious considerations
from both Onvoy and U of M in providing Internet circuits.  Right now, they
are donating these to the IETF.  Would we then need to offer some sort of fee
to them for using their networks beyond the official IETF meeting?

If we get into a hotel that doesn't mind us being there early, and lets us
leave the equipment there for as long as we want, or come in as early as we
want, then we still have the issue of people to set it up.  (Hotel rooms,
meals, missed work, etc.)

All costs aside, it also encompasses a face to face issue.  The relationship
that any host or secretariat has with the hotel is important.  If you get a
good team at the hotel (and treat them right) the meeting is A LOT easier.
If these groups were to offer that they would show up at the hotel early, set
up their own equipment, I would also fear that these testers might not give
the hotel a good impression of the IETF.  That would make our job (coming in
the week after, etc.) that much harder.  The telecom guys especially, you
want to keep them happy, and starting off with a positive relationship is
VERY important.

Also take into consideration that the network quality expected at an IETF
meeting, is VERY different than the network expected at an Interop meeting.
People come to the IETF to work and attend meetings. I don't know a lot about
the Interop testing grounds, but I do know that they have a hot-stage event.
IETF usually does not.  Most of our equipment (when Foretec has hosted the
meeting) is loaned and borrowed, and we usually don't get it until close to
meeting time.  Making this hardware plug and play, with IETF expectations is
a different scenario then getting hardware early, hotstaging it, and finding
bugs and kinks early.

The possibility of a testing event is not out of our grasp.  All the
challenges listed here have solutions.  However, it doesn't appear that any
of the solutions are free.  Nothing to say that it can't be done.  I do think
having an open discussions about the costs & benefits of this event is worth
while.

Respectfully submitted,
Brett M. Thorson

---------------------------------------------------------------------------
On Monday 15 September 2003 13:13, Kevin C. Almeroth wrote:
> BTW, more info and a question.  (I've CC'ed the person who will be running
> and coordinating the whole project:  Krishan Ramachandran).
>
> Details on what we would like:
>
> 1.  SNMP access (either from one of our UCSB machines or a
> machine we put at the IETF) to each wireless AP.  From these
> APs we want to collect data from a variety of MIBs at intervals
> as short as one minute (or what load will allow without causing
> problems).
>
> 2.  In conjunction with #1, we'd like to have access to all
> egress traffic so we can do a tcpdump of snaplen 60 bytes.  We'll
> provide the machine, we just need a 100 Mbps Ethernet port.
>
> 3.  We also want to set up a test network for supporting ad hoc
> networking.  Basically, we'll set up 3-4 gateways at the edge
> of the IETF network and this will provide access to people with
> wireless cards who want to roam around using AODV.  We'll
> eventualy be clearer about what our needs are from the IETF
> but this is the basic idea for now.
>
> The question:  do you know what which vendors AP you'll be
> using?  It makes a difference because each implements a
> different set of MIBs (related to #1).
>
> -Kevin

------------------------------------------------

7.3 Referral of draft-klensin-name-filters-03.txt to the IAB (Ted Hardie)
1. Architectural question to IAB

        Document draft-klensin-name-filters-03.txt has been sent
        to the RFC editor for publication and referred to the IESG
        for review as an Informational RFC. The draft raises an
        issue related to protocol processing which seems fairly
        important, which can be summarized as:

              "What issues should be considered when deciding when
                and how to apply validity checks for protocol
                processing not conducted by the application applying
                the validity check?"

        To steal a concrete example, what might be the issues in an
        application pre-checking the syntactical validity of a DNS
        name prior to passing it to the DNS?

2. Type of response expected

        The IESG expects two things in response:

        - a review of the Klensin draft and

        - a short document describing the issues.

        Note that this is not asking IAB to re-write the Klensin
        draft, which explicitly does not take on this task:

          "this document takes no position on whether or not the
            testing is desirable. It only identifies the correct
            tests to be made if tests are to be applied."

3. Response expected by: November 7, 2003.

4. Specific IAB people the IESG considers to have the best
        background are: Leslie Daigle, Rob Austein, Patrik Falstrom