IETF-Announce List
New RFCs
New and Revived Drafts
Updated Drafts
- Applicability Statement for IETF Core Email Protocols (draft-ietf-emailcore-as)
By John Klensin, Kenneth Murchison, Ekow Sam, 2022-05-23 TXT HTML PDF
Abstract: Electronic mail is one of the oldest Internet applications that is still in very active use. While the basic protocols and formats for mail transport and message formats have evolved slowly over the years, events and thinking in more recent years have supplemented those core protocols with additional features and suggestions for their use. This Applicability Statement describes the relationship among many of those protocols and provides guidance and makes recommendations for the use of features of the core protocols.
- I2NSF Capability YANG Data Model (draft-ietf-i2nsf-capability-data-model)
By Susan Hares, Jaehoon Jeong, Jinyong Kim, Robert Moskowitz, Qiushi Lin, 2022-05-23 TXT HTML PDF
Abstract: This document defines an information model and the corresponding YANG data model for the capabilities of various Network Security Functions (NSFs) in the Interface to Network Security Functions (I2NSF) framework to centrally manage the capabilities of the various NSFs.
- I2NSF Consumer-Facing Interface YANG Data Model (draft-ietf-i2nsf-consumer-facing-interface-dm)
By Jaehoon Jeong, Chaehong Chung, Tae-Jin Ahn, Rakesh Kumar, Susan Hares, 2022-05-23 TXT HTML PDF
Abstract: This document describes an information model and the corresponding YANG data model for the Consumer-Facing Interface of the Security Controller in an Interface to Network Security Functions (I2NSF) system in a Network Functions Virtualization (NFV) environment. The information model defines various types of managed objects and the relationship among them needed to build the flow policies from users' perspective. This information model is based on the "Event- Condition-Action" (ECA) policy model defined by a capability information model for I2NSF, and the YANG data model is defined for enabling different users of a given I2NSF system to define, manage, and monitor flow policies within an administrative domain.
- I2NSF Network Security Function-Facing Interface YANG Data Model (draft-ietf-i2nsf-nsf-facing-interface-dm)
By Jinyong Kim, Jaehoon Jeong, J., PARK, Susan Hares, Qiushi Lin, 2022-05-23 TXT HTML PDF
Abstract: This document defines a YANG data model for configuring security policy rules on Network Security Functions (NSF) in the Interface to Network Security Functions (I2NSF) framework. The YANG data model in this document is for the NSF-Facing Interface between a Security Controller and NSFs in the I2NSF framework. It is built on the basis of the YANG data model in the I2NSF Capability YANG Data Model document for the I2NSF framework.
- I2NSF NSF Monitoring Interface YANG Data Model (draft-ietf-i2nsf-nsf-monitoring-data-model)
By Jaehoon Jeong, Patrick Lingga, Susan Hares, Liang Xia, Henk Birkholz, 2022-05-23 TXT HTML PDF
Abstract: This document proposes an information model and the corresponding YANG data model of an interface for monitoring Network Security Functions (NSFs) in the Interface to Network Security Functions (I2NSF) framework. If the monitoring of NSFs is performed with the NSF monitoring interface in a standard way, it is possible to detect the indication of malicious activity, anomalous behavior, the potential sign of denial-of-service attacks, or system overload in a timely manner. This monitoring functionality is based on the monitoring information that is generated by NSFs. Thus, this document describes not only an information model for the NSF monitoring interface along with a YANG tree diagram, but also the corresponding YANG data model.
- I2NSF Registration Interface YANG Data Model (draft-ietf-i2nsf-registration-interface-dm)
By Sangwon Hyun, Jaehoon Jeong, TaeKyun Roh, Sarang Wi, J., PARK, 2022-05-23 TXT HTML PDF
Abstract: This document defines an information model and a YANG data model for Registration Interface between Security Controller and Developer's Management System (DMS) in the Interface to Network Security Functions (I2NSF) framework to register Network Security Functions (NSF) of the DMS with the Security Controller. The objective of these information and data models is to support NSF capability registration and query via I2NSF Registration Interface.
- Advertising Layer 2 Bundle Member Link Attributes in OSPF (draft-ietf-lsr-ospf-l2bundles)
By Ketan Talaulikar, Peter Psenak, 2022-05-23 TXT HTML PDF
Abstract: There are deployments where the Layer 3 (L3) interface on which OSPF operates is a Layer 2 (L2) interface bundle. Existing OSPF advertisements only support advertising link attributes of the Layer 3 interface. If entities external to OSPF wish to control traffic flows on the individual physical links which comprise the Layer 2 interface bundle, link attribute information for the bundle members is required.
- Use of Internationalized Email Addresses in the Extensible Provisioning Protocol (EPP) (draft-ietf-regext-epp-eai)
By Dmitry Belyavsky, James Gould, 2022-05-23 TXT HTML PDF
Abstract: This document describes an EPP extension that permits usage of Internationalized Email Addresses in the EPP protocol and specifies the terms when it can be used by EPP clients and servers. The Extensible Provisioning Protocol (EPP), being developed before appearing the standards for Internationalized Email Addresses (EAI), does not support such email addresses.
- Simple Group Keying Protocol (SGKP) (draft-ietf-trill-group-keying)
By Donald Eastlake, Dacheng Zhang, 2022-05-23 TXT HTML PDF
Abstract: This document specifies a simple general group keying protocol that provides for the distribution of shared secret keys to group members and the management of such keys. It assumes that secure pairwise keys can be created between any two group members.
- Pros and Cons of IPv6 Transition Technologies for IPv4aaS (draft-ietf-v6ops-transition-comparison)
By Gabor Lencse, Jordi Martinez, Lee Howard, Richard Patterson, Ian Farrer, 2022-05-23 TXT HTML PDF
Abstract: Several IPv6 transition technologies have been developed to provide customers with IPv4-as-a-Service (IPv4aaS) for ISPs with an IPv6-only access and/or core network. All these technologies have their advantages and disadvantages, and depending on existing topology, skills, strategy and other preferences, one of these technologies may be the most appropriate solution for a network operator.
- Interface Stack Table Definition and Example for Point-to-Point (P2P) Interface over LAN (draft-liu-lsr-p2poverlan)
By Daiying Liu, Joel Halpern, Congjie Zhang, 2022-05-23 TXT HTML PDF
Abstract: RFC 5309 defines the Point-to-Point (P2P) circuit type, one of the two circuit types used in the link state routing protocols, and highlights that it is important to identify the correct circuit type when forming adjacencies, flooding link state database packets, and monitoring the link state.
- Oblivious Proxy Feedback (draft-rdb-ohai-feedback-to-proxy)
By Tirumaleswar Reddy.K, Dan Wing, Mohamed Boucadair, Roberto Polli, 2022-05-23 TXT HTML PDF
Abstract: To provide equitable service to clients, servers often rate-limit incoming requests, for example, based upon the source IP address. However, oblivious HTTP removes the ability for the server to distinguish amongst clients so the server can only rate-limit traffic from the oblivious proxy. This harms all clients behind that oblivious proxy.
Expired Drafts
- Multi-cluster Edge System Architecture and Network Function Requirements (draft-dwon-t2trg-multiedge-arch)
By Dae Kim, Joo-Sang Youn, 2021-11-19 TXT HTML PDF
Abstract: Artificial intelligence based IoT applications demand more massive computing resource through networks for the process of AI tasks. To support these applications, some new technologies based an edge computing and fog computing are emerging. Especially, the computation-intensive and latency-sensitive IoT applications such as augmented reality, virtual reality and AI based inference application is deployed with an edge computing and fog computing which are connected with cloud computing. Recently, cluster-based edge system is deployed to extend computation capacity of an edge server. The cluster-based edge system has the advantage that can enhace the resource scalability and availability in edge computing and fog computing. In this draft, we present cluster-based edge system architecture and multi-cluster edge network topology that consists of multi-cluster edge system and core cloud. Also, we define the network functions and network node to configurate and operate multi- cluster edge network collaboratively.
- OSPFv3 Extensions for SRv6 (draft-ietf-lsr-ospfv3-srv6-extensions)
By Zhenbin Li, Zhibo Hu, Dean Cheng, Ketan Talaulikar, Peter Psenak, 2021-11-19 TXT HTML PDF
Abstract: The Segment Routing (SR) architecture allows flexible definition of the end-to-end path by encoding it as a sequence of topological elements called "segments". It can be implemented over the MPLS or the IPv6 data plane. This document describes the OSPFv3 extensions required to support Segment Routing over the IPv6 data plane (SRv6).
|
Drafts Sent to IESG
- Advertising Layer 2 Bundle Member Link Attributes in OSPF (draft-ietf-lsr-ospf-l2bundles): Active » Publication Requested
By Ketan Talaulikar, Peter Psenak, 2022-05-23 TXT HTML PDF
Abstract: There are deployments where the Layer 3 (L3) interface on which OSPF operates is a Layer 2 (L2) interface bundle. Existing OSPF advertisements only support advertising link attributes of the Layer 3 interface. If entities external to OSPF wish to control traffic flows on the individual physical links which comprise the Layer 2 interface bundle, link attribute information for the bundle members is required.
- Proxying UDP in HTTP (draft-ietf-masque-connect-udp): Active » Publication Requested
By David Schinazi, 2022-05-03 TXT HTML PDF
Abstract: This document describes how to proxy UDP in HTTP, similar to how the HTTP CONNECT method allows proxying TCP in HTTP. More specifically, this document defines a protocol that allows HTTP clients to create a tunnel for UDP communications through an HTTP server that acts as a proxy.
- HTTP Datagrams and the Capsule Protocol (draft-ietf-masque-h3-datagram): Active » Publication Requested
By David Schinazi, Lucas Pardue, 2022-04-11 TXT HTML PDF
Abstract: This document describes HTTP Datagrams, a convention for conveying multiplexed, potentially unreliable datagrams inside an HTTP connection.
- Path Computation Element Communication Protocol (PCEP) extensions for establishing relationships between sets of Label Switched Paths and Virtual Networks (draft-ietf-pce-vn-association): Active » Publication Requested
By Young Lee, Haomian Zheng, Daniele Ceccarelli, 2022-05-12 TXT HTML PDF
Abstract: This document describes how to extend the Path Computation Element (PCE) Communication Protocol (PCEP) association mechanism introduced by the PCEP Association Group specification, to further associate sets of Label Switched Paths (LSPs) with a higher-level structure such as a Virtual Network (VN) requested by a customer or application. This extended association mechanism can be used to facilitate control of virtual network using the PCE architecture.
IESG Progress
- A YANG Data Model for Challenge-Response-based Remote Attestation Procedures using TPMs (draft-ietf-rats-yang-tpm-charra): Approved-announcement to be sent » Approved-announcement sent
By Henk Birkholz, Michael Eckel, Shwetha Bhandari, Eric Voit, Bill Sulzen, Liang Xia, Tom Laffey, Guy Fedorkow, 2022-05-18 TXT HTML PDF
Abstract: This document defines YANG RPCs and a few configuration nodes required to retrieve attestation evidence about integrity measurements from a device, following the operational context defined in TPM-based Network Device Remote Integrity Verification. Complementary measurement logs are also provided by the YANG RPCs, originating from one or more roots of trust for measurement (RTMs). The module defined requires at least one TPM 1.2 or TPM 2.0 as well as a corresponding TPM Software Stack (TSS), or equivalent hardware implementations that include the protected capabilities as provided by TPMs as well as a corresponding software stack, included in the device components of the composite device the YANG server is running on.
- Pros and Cons of IPv6 Transition Technologies for IPv4aaS (draft-ietf-v6ops-transition-comparison): IESG Evaluation::Revised I-D Needed » ::AD Followup
By Gabor Lencse, Jordi Martinez, Lee Howard, Richard Patterson, Ian Farrer, 2022-05-23 TXT HTML PDF
Abstract: Several IPv6 transition technologies have been developed to provide customers with IPv4-as-a-Service (IPv4aaS) for ISPs with an IPv6-only access and/or core network. All these technologies have their advantages and disadvantages, and depending on existing topology, skills, strategy and other preferences, one of these technologies may be the most appropriate solution for a network operator.
Drafts Sent to RFC Editor
Other Status Changes
RFC Editor Status Changes
- Operations, Administration, and Maintenance (OAM) in Segment Routing Networks with IPv6 Data plane (SRv6) (draft-ietf-6man-spring-srv6-oam): » AUTH48
By Zafar Ali, Clarence Filsfils, Satoru Matsushima, Dan Voyer, Mach Chen, 2022-01-23 TXT HTML PDF
Abstract: This document describes how the existing IPv6 mechanisms for ping and traceroute can be used in an SRv6 network. The document also specifies the OAM flag in the Segment Routing Header (SRH) for performing controllable and predictable flow sampling from segment endpoints. In addition, the document describes how a centralized monitoring system performs a path continuity check between any nodes within an SRv6 domain.
IPR Disclosures
IESG/IAB/IAOC/Trust Minutes
Liaison Statements
Classified Ads
|