IETF-Announce List
New RFCs
New and Revived Drafts
- GOST R 34.12-2015: Block Cipher "Magma" (draft-dolmatov-magma)
By Vasily Dolmatov, Dmitry Eremin-Solenikov, 2019-06-26 TXT HTML PDF
Abstract: This document is intended to be a source of information about updated version of the block cipher with block length of n=64 bits and key length k=256 bits (RFC5830), which is also referred as "Magma" and is described in the Russian Federal standard GOST R 34.12-2015, containing also the description of block cipher "Kuznechik" (RFC7801). These algorithms are from the set of Russian cryptographic standard algorithms (called GOST algorithms).
- DHCPv6 Prefix Delegating relay (draft-fkhp-dhc-dhcpv6-pd-relay-requirements)
By Ian Farrer, Naveen Kottapalli, Martin Hunek, Richard Patterson, 2019-06-25 TXT HTML PDF
Abstract: Operational experience with DHCPv6 prefix delegation has shown that when the DHCPv6 relay function is not co-located with the DHCPv6 server function, issues such as timer synchronization between the DHCP functional elements, rejection of client's messages by the relay, and other problems have been observed. These problems can result in prefix delegation failing or traffic to/from clients addressed from the delegated prefix being unrouteable. Although [RFC8415] mentions this deployment scenario, it does not provide necessary detail on how the relay element should behave when used with PD.
- Extensible Provisioning Protocol (EPP) Secure Authorization Information for Transfer (draft-gould-regext-secure-authinfo-transfer)
By James Gould, Richard Wilhelm, 2019-06-26 TXT HTML PDF
Abstract: The Extensible Provisioning Protocol (EPP), in RFC 5730, defines the use of authorization information to authorize a transfer. The authorization information is object-specific and has been defined in the EPP Domain Name Mapping, in RFC 5731, and the EPP Contact Mapping, in RFC 5733, as password-based authorization information. Other authorization mechanisms can be used, but in practice the password-based authorization information has been used at the time of object create, managed with the object update, and used to authorize an object transfer request. What has not been fully considered is the security of the authorization information that includes the complexity of the authorization information, the time-to-live (TTL) of the authorization information, and where and how the authorization information is stored. This document defines an operational practice, using the EPP RFCs, that leverages the use of strong random authorization information values that are short-lived, that are not stored by the client, and that are stored using a cryptographic hash by the server to provide for secure authorization information used for transfers.
- Preference-based EVPN DF Election (draft-ietf-bess-evpn-pref-df)
By Jorge Rabadan, Senthil Sathappan, Tony Przygienda, Wen Lin, John Drake, Ali Sajassi, satyamoh@cisco.com, 2019-06-25 TXT HTML PDF
Abstract: The Designated Forwarder (DF) in Ethernet Virtual Private Networks (EVPN) is defined as the PE responsible for sending Broadcast, Unknown unicast and Broadcast traffic (BUM) to a multi-homed device/network in the case of an all-active multi-homing Ethernet Segment (ES), or BUM and unicast in the case of single-active multi- homing.
- Network File System (NFS) Version 4 Minor Version 1 Protocol (draft-ietf-nfsv4-rfc5661sesqui-msns)
By David Noveck, Chuck Lever, 2019-06-25 TXT HTML PDF
Abstract: This document describes the Network File System (NFS) version 4 minor version 1, including features retained from the base protocol (NFS version 4 minor version 0, which is specified in RFC 7530) and protocol extensions made subsequently. The later minor version has no dependencies on NFS version 4 minor version 0, and is considered a separate protocol.
- A Framework for Constructing Service Function Chaining Systems Based on Segment Routing (draft-li-spring-sr-sfc-control-plane-framework)
By Cheng Li, Zhenbin Li, 2019-06-25 TXT HTML PDF
Abstract: Segment Routing (SR) allows for a flexible definition of end-to-end paths by encoding paths as sequences of topological sub-paths, called "segments". Segment routing architecture can be implemented over an MPLS data plane as well as an IPv6 data plane.
- Multicast-Only Fast Reroute Based on Topology Independent Loop-free Alternate Fast Reroute (draft-liu-pim-mofrr-tilfa)
By Yisong Liu, 2019-06-25 TXT HTML PDF
Abstract: Multicast-only Fast Reroute (MoFRR) has been defined in [RFC7431], but the selection of the secondary multicast next hop only according to the loop-free alternate fast reroute, which has restrictions in multicast deployments. This document describes a mechanism for Multicast-only Fast Reroute by using Topology Independent Loop-free Alternate fast reroute, which is independent of network topology and can achieve covering more network environments.
Updated Drafts
- DetNet Bounded Latency (draft-finn-detnet-bounded-latency)
By Norman Finn, Jean-Yves Le Boudec, Ehsan Mohammadpour, Jiayi Zhang, Balazs Varga, Janos Farkas, 2019-06-25 TXT HTML PDF
Abstract: This document presents a timing model for Deterministic Networking (DetNet), so that existing and future standards can achieve the DetNet quality of service features of bounded latency and zero congestion loss. It defines requirements for resource reservation protocols or servers. It calls out queuing mechanisms, defined in other documents, that can provide the DetNet quality of service.
- Secret Key Transaction Authentication for DNS (TSIG) (draft-ietf-dnsop-rfc2845bis)
By Francis Dupont, Stephen Morris, Paul Vixie, Donald Eastlake, Olafur Gudmundsson, Brian Wellington, 2019-06-25 TXT HTML PDF
Abstract: This document describes a protocol for transaction level authentication using shared secrets and one way hashing. It can be used to authenticate dynamic updates as coming from an approved client, or to authenticate responses as coming from an approved name server.
- IP Fragmentation Considered Fragile (draft-ietf-intarea-frag-fragile)
By Ron Bonica, Fred Baker, Geoff Huston, Robert Hinden, Ole Troan, Fernando Gont, 2019-06-24 TXT HTML PDF
Abstract: This document describes IP fragmentation and explains how it introduces fragility to Internet communication.
- Ability for a Stateful Path Computation Element (PCE) to request and obtain control of a Label Switched Path (LSP) (draft-ietf-pce-lsp-control-request)
By Aswatnarayan Raghuram, Al Goddard, Jay Karthik, Siva Sivabalan, Mahendra Negi, 2019-06-25 TXT HTML PDF
Abstract: A Stateful Path Computation Element (PCE) retains information about the placement of Multiprotocol Label Switching (MPLS) Traffic Engineering Label Switched Paths (TE LSPs). When a PCE has stateful control over LSPs it may send indications to LSP head-ends to modify the attributes (especially the paths) of the LSPs. A Path Computation Client (PCC) has set up LSPs under local configuration may delegate control of those LSPs to a stateful PCE.
- PIM reserved bits and type space extension (draft-ietf-pim-reserved-bits)
By Stig Venaas, Alvaro Retana, 2019-06-25 TXT HTML PDF
Abstract: The currently defined PIM version 2 messages share a common message header format. The common header definition contains eight reserved bits. This document specifies how these bits may be used by individual message types, and creates a registry containing the per message type usage. This document also extends the PIM type space by defining three new message types. For each of the new types, four of the previously reserved bits are used to form an extended type range.
- Login Security Extension for the Extensible Provisioning Protocol (EPP) (draft-ietf-regext-login-security)
By James Gould, Matthew Pozun, 2019-06-25 TXT HTML PDF
Abstract: The Extensible Provisioning Protocol (EPP) includes a client authentication scheme that is based on a user identifier and password. The structure of the password field is defined by an XML Schema data type that specifies minimum and maximum password length values, but there are no other provisions for password management other than changing the password. This document describes an EPP extension that allows longer passwords to be created and adds additional security features to the EPP login command and response.
- Using RPL Option Type, Routing Header for Source Routes and IPv6-in-IPv6 encapsulation in the RPL Data Plane (draft-ietf-roll-useofrplinfo)
By Ines Robles, Michael Richardson, Pascal Thubert, 2019-06-25 TXT HTML PDF
Abstract: This document looks at different data flows through LLN (Low-Power and Lossy Networks) where RPL (IPv6 Routing Protocol for Low-Power and Lossy Networks) is used to establish routing. The document enumerates the cases where RFC6553 (RPL Option Type), RFC6554 (Routing Header for Source Routes) and IPv6-in-IPv6 encapsulation is required in data plane. This analysis provides the basis on which to design efficient compression of these headers. This document updates RFC6553 adding a change to the RPL Option Type. Additionally, this document updates RFC6550 defining a flag in the DIO Configuration Option to indicate about this change and updates RFC8138 as well to consider the new Option Type when the RPL Option is decompressed.
- Service Function Chaining (SFC) Operations, Administration and Maintenance (OAM) Framework (draft-ietf-sfc-oam-framework)
By Sam Aldrin, Carlos Pignataro, Nagendra Kumar, Ramki Krishnan, Anoop Ghanwani, 2019-06-25 TXT HTML PDF
Abstract: This document provides a reference framework for Operations, Administration and Maintenance (OAM) for Service Function Chaining (SFC).
- A YANG Data Model for In-Situ OAM (draft-zhou-ippm-ioam-yang)
By Tianran Zhou, Jim Guichard, Frank Brockners, Srihari Raghavan, 2019-06-25 TXT HTML PDF
Abstract: In-situ Operations, Administration, and Maintenance (IOAM) records operational and telemetry information in user packets while the packets traverse a path between two points in the network. This document defines a YANG module for the IOAM function.
- Subscription to Multiple Stream Originators (draft-zhou-netconf-multi-stream-originators)
By Tianran Zhou, Guangying Zheng, Eric Voit, Alexander Clemm, Andy Bierman, 2019-06-25 TXT HTML PDF
Abstract: This document describes the distributed data export mechanism that allows multiple data streams to be managed using a single subscription. Specifically, multiple data streams are pushed directly to the collector without passing through a broker for internal consolidation.
Expired Drafts
- draft-ietf-rmcat-wireless-tests
No title available; expired document? TXT HTML PDF
- draft-sharma-bess-multi-site-evpn
No title available; expired document? TXT HTML PDF
|
Drafts Sent to IESG
- Ability for a Stateful Path Computation Element (PCE) to request and obtain control of a Label Switched Path (LSP) (draft-ietf-pce-lsp-control-request): Active » Publication Requested
By Aswatnarayan Raghuram, Al Goddard, Jay Karthik, Siva Sivabalan, Mahendra Negi, 2019-06-25 TXT HTML PDF
Abstract: A Stateful Path Computation Element (PCE) retains information about the placement of Multiprotocol Label Switching (MPLS) Traffic Engineering Label Switched Paths (TE LSPs). When a PCE has stateful control over LSPs it may send indications to LSP head-ends to modify the attributes (especially the paths) of the LSPs. A Path Computation Client (PCC) has set up LSPs under local configuration may delegate control of those LSPs to a stateful PCE.
IESG Progress
- Performance Measurement (PM) with Marking Method in Bit Index Explicit Replication (BIER) Layer (draft-ietf-bier-pmmm-oam): Publication Requested » AD Evaluation
By Gregory Mirsky, Lianshu Zheng, Mach Chen, Giuseppe Fioccola, 2018-12-11 TXT HTML PDF
Abstract: This document describes a hybrid performance measurement method for multicast service over Bit Index Explicit Replication (BIER) domain.
- Support for Adj-RIB-Out in BGP Monitoring Protocol (BMP) (draft-ietf-grow-bmp-adj-rib-out): In Last Call » Waiting for Writeup
By Tim Evens, Serpil Bayraktar, Paolo Lucente, Kevin Mi, Shunwan Zhuang, 2019-06-23 TXT HTML PDF
Abstract: The BGP Monitoring Protocol (BMP) defines access to only the Adj-RIB- In Routing Information Bases (RIBs). This document updates the BGP Monitoring Protocol (BMP) RFC 7854 by adding access to the Adj-RIB- Out RIBs. It adds a new flag to the peer header to distinguish Adj- RIB-In and Adj-RIB-Out.
- Using RPL Option Type, Routing Header for Source Routes and IPv6-in-IPv6 encapsulation in the RPL Data Plane (draft-ietf-roll-useofrplinfo): Approved-announcement to be sent::Revised I-D Needed » ::AD Followup
By Ines Robles, Michael Richardson, Pascal Thubert, 2019-06-25 TXT HTML PDF
Abstract: This document looks at different data flows through LLN (Low-Power and Lossy Networks) where RPL (IPv6 Routing Protocol for Low-Power and Lossy Networks) is used to establish routing. The document enumerates the cases where RFC6553 (RPL Option Type), RFC6554 (Routing Header for Source Routes) and IPv6-in-IPv6 encapsulation is required in data plane. This analysis provides the basis on which to design efficient compression of these headers. This document updates RFC6553 adding a change to the RPL Option Type. Additionally, this document updates RFC6550 defining a flag in the DIO Configuration Option to indicate about this change and updates RFC8138 as well to consider the new Option Type when the RPL Option is decompressed.
Drafts Sent to RFC Editor
Other Status Changes
- draft-ietf-nfsv4-rfc5661-msns-update: Active » Replaced by draft-ietf-nfsv4-rfc5661sesqui-msns
No title available; expired document? TXT HTML PDF
- draft-thaler-teep-otrp-over-http: Active » Replaced by draft-ietf-teep-otrp-over-http
No title available; expired document? TXT HTML PDF
RFC Editor Status Changes
IPR Disclosures
IESG/IAB/IAOC/Trust Minutes
Liaison Statements
Classified Ads
|