Authentication/Confidentiality for OSPFv3
draft-ietf-ospf-ospfv3-auth-08
Revision differences
Document history
| Date | Rev. | By | Action |
|---|---|---|---|
|
2012-08-22
|
08 | (System) | post-migration administrative database adjustment to the No Objection position for Scott Hollenbeck |
|
2012-08-22
|
08 | (System) | post-migration administrative database adjustment to the No Objection position for Harald Alvestrand |
|
2012-08-22
|
08 | (System) | post-migration administrative database adjustment to the No Objection position for Sam Hartman |
|
2012-08-22
|
08 | (System) | post-migration administrative database adjustment to the No Objection position for Russ Housley |
|
2006-03-23
|
08 | Amy Vezza | State Changes to RFC Ed Queue from Approved-announcement sent by Amy Vezza |
|
2006-03-13
|
08 | Amy Vezza | IESG state changed to Approved-announcement sent |
|
2006-03-13
|
08 | Amy Vezza | IESG has approved the document |
|
2006-03-13
|
08 | Amy Vezza | Closed "Approve" ballot |
|
2006-03-01
|
08 | Bill Fenner | State Changes to Approved-announcement to be sent from IESG Evaluation::AD Followup by Bill Fenner |
|
2006-03-01
|
08 | Sam Hartman | [Ballot Position Update] Position for Sam Hartman has been changed to No Objection from Discuss by Sam Hartman |
|
2006-03-01
|
08 | (System) | Sub state has been changed to AD Follow up from New Id Needed |
|
2006-03-01
|
08 | (System) | New version available: draft-ietf-ospf-ospfv3-auth-08.txt |
|
2006-01-10
|
08 | Bert Wijnen | [Ballot Position Update] New position, No Objection, has been recorded for Bert Wijnen by Bert Wijnen |
|
2005-12-16
|
08 | Bill Fenner | Authors have been corresponding with Sam; latest update from Sam follows. From: Sam Hartman Subject: Re: OSPFv3 Security: Updated Draft.. Date: Fri, Dec 16 12:55:49 … Authors have been corresponding with Sam; latest update from Sam follows. From: Sam Hartman Subject: Re: OSPFv3 Security: Updated Draft.. Date: Fri, Dec 16 12:55:49 To: Mukesh Gupta Cc: acee@cisco.com, rohit@utstar.com, nmelam@juniper.net, housley@vigilsec.com, zinin@psg.com, fenner@research.att.com Hi. We're getting closer but I still see some significant problems: 1) Section 6 specifies that the implementation must support a specific SPD selection function but does not describe properties of that function. Presumably the primary property you need is the ability to choose an SPD based on interface. Do you need anything else? 2) You still do not specify where the IPsec protection barrier is. We had a long discussion on that topic and the results of the discussion need to make it into the draft. 3) Section 11 is still not compatible with RFC 3401. A) You cannot specify an interface in an SPD. Instead, you can have an SPD selected based on interface and put rules into that SPD that are appropriate for the selected interface. B) There are not separate inbound and outbound rules. Rules apply equally to inbound and outbound traffic. C) Use the term protect rather than apply. Use the term discard rather than drop. So you're going to need to rewrite section 11 to say that you assume there is an SPD that will be selected for each outbound interface and that the rules for a given interface need to be added to that SPD. You are going to need to be careful describing virtual link rules to describe which SPDs they need to be added to. In particular, you don't want a virtual link OSPF packet received on the wrong interface to be accepted when one normally would not be accepted. |
|
2005-12-16
|
08 | Bill Fenner | State Change Notice email list have been change to , from , , |
|
2005-04-12
|
08 | Bill Fenner | State Changes to IESG Evaluation::Revised ID Needed from IESG Evaluation::AD Followup by Bill Fenner |
|
2005-04-12
|
08 | Bill Fenner | Verified in Minneapolis that a new version is coming to address Sam's concerns |
|
2005-02-14
|
08 | Sam Hartman | [Ballot discuss] This discussed based on comments from Steve Kent and who did a brief review of the document at my request. Other comments also … [Ballot discuss] This discussed based on comments from Steve Kent and who did a brief review of the document at my request. Other comments also come from my initial review. Section 6, IPsec requirements does not appear to use the same model of IPsec as draft-ietf-ipsec-rfc2401bis. It assumes that the source and destination interface is part of the traffic selector in the SPD. This is not true. It's possible to obtain this effect through implementation-specific extensions to IPsec such as multiple SPDs and a SPD-selection function that looks at source interface. It is not clear to me that there is only one way of getting this effect nor that most implementations will tend to choose the same mechanism. - section 6: the reference to "interface index" and "direction" are a bit odd, relative to both 2401 and 2401bis SPD descriptions. Directionality is implicit in policy specifications, in that for IPsec-protected traffic, we always created paired SAs. The phrase "interface index" does not appear in either 2401 or 2401bis. at this point in the text, it is not clear what the intent is when this term is used. - section 7: the discussion of static SA management here seems inconsistent with the mandated support for "Dynamic IPsec rule configuration" at the end of section 6. How are these virtual link SAs created if only manual configuration is supported? - Section 7 (again) the discussion of using the same SA for inbound and outbound traffic says that this is NOT IPsec, period. A fundamental concept in IPsec, since the very early days, is that an SA is unidirectional. - Section 9 does not describe how the SAs for virtual links are keyed; similar to comment on section 7. - Section 11 The rules are incomplete (missing bypass rules) and do not seem to fit the model for RFC 2401bis very well. Are you assuming multiple SPDs with one per interface? Are you assuming a single SPD? Where is the protection barrier? [The following comments from Steve Kent may be useful in understanding how to fit this work to the 2401bis model.] Using the 2401bis model, this is all a lot simpler, I think (except for their multicast SA problem.) Since the user of IPsec is the OSPF host inside a router, the simplest way to talk about IPse use here is to imagine it as a an entity like an end system host. It is on the protected side of the IPsec barrier, and the rest of the Internet is on the unprotected side. So, all traffic emitted by the OSPF host, and all traffic directed to it, transit the barrier, irrespective of the physical interface via which the traffic enters or exits the router. This avoids the need to worry about bypassing subscriber traffic or accidentally grabbing subscriber traffic that happens to use IPsec, because such traffic is NOT legitimately directed to this OSPF host. The forwarding function on the unprotected side of the barrier, as noted in the 2401bis processing model, deals with directing outbound IPse protected traffic to the right physical interface. I'm not sure how the virtual links work here, as I did not understand section 9, but I do think this will be easier to deal with under the new model. |
|
2005-02-14
|
08 | Sam Hartman | [Ballot comment] The discussion of how often manual keys need to be changed is poorly worded. It states as facts that hmac-SHA1 is more secure … [Ballot comment] The discussion of how often manual keys need to be changed is poorly worded. It states as facts that hmac-SHA1 is more secure than hmac-MD5 and that DES plus hmac-MD5 is more secure than hmac-MD5 alone. These are reasonable assumptions to make, but they are not facts; the section would be improved by stating these as assumptions. |
|
2005-02-14
|
08 | Sam Hartman | [Ballot Position Update] Position for Sam Hartman has been changed to Discuss from Abstain by Sam Hartman |
|
2005-02-10
|
07 | (System) | New version available: draft-ietf-ospf-ospfv3-auth-07.txt |
|
2005-01-09
|
08 | Sam Hartman | [Ballot comment] I cannot support a security solution for OSPF that only supports manual keying for broadcast/multicast networks without understand why no better options are … [Ballot comment] I cannot support a security solution for OSPF that only supports manual keying for broadcast/multicast networks without understand why no better options are possible. Rather than delaying the document to confirm that we don't have better options, I'll abstain. If I were not entering an abstain, I'd enter a discuss over at least the follo wing issues: Section 6, IPsec requirements does not appear to use the same model of IPsec as draft-ietf-ipsec-rfc2401bis. It assumes that the source and destination interface is part of the traffic selector in the SPD. This is not true. It's possible to obtain this effect through implementation-specific extensions to IPsec such as multiple SPDs and a SPD-selection function that looks at source interface. It is not clear to me that there is only one way of getting this effect nor that most implementations will tend to choose the same mechanism. The discussion of how often manual keys need to be changed is poorly worded. It states as facts that hmac-SHA1 is more secure than hmac-MD5 and that DES plus hmac-MD5 is more secure than hmac-MD5 alone. These are reasonable assumptions to make, but they are not facts; the section would be improved by stating these as assumptions. |
|
2005-01-09
|
08 | Sam Hartman | [Ballot Position Update] New position, Abstain, has been recorded for Sam Hartman by Sam Hartman |
|
2005-01-03
|
08 | Bill Fenner | State Changes to IESG Evaluation::AD Followup from IESG Evaluation by Bill Fenner |
|
2005-01-03
|
08 | Bill Fenner | I jumped the gun - the WG wants to do another Last Call because of the number of changes. |
|
2005-01-03
|
08 | Bill Fenner | Removed from agenda for telechat - 2005-01-06 by Bill Fenner |
|
2005-01-03
|
08 | Scott Hollenbeck | [Ballot Position Update] Position for Scott Hollenbeck has been changed to No Objection from Discuss by Scott Hollenbeck |
|
2005-01-03
|
08 | Russ Housley | [Ballot Position Update] Position for Russ Housley has been changed to No Objection from Discuss by Russ Housley |
|
2004-12-29
|
08 | Bill Fenner | Placed on agenda for telechat - 2005-01-06 by Bill Fenner |
|
2004-12-29
|
08 | Bill Fenner | State Changes to IESG Evaluation from IESG Evaluation::AD Followup by Bill Fenner |
|
2004-12-29
|
08 | Bill Fenner | Alex/Bill, 06 version of the OSPFv3 Security draft addresses the following comments/issues: From IESG: - Discuss about how much protection OSPF has for replay … Alex/Bill, 06 version of the OSPFv3 Security draft addresses the following comments/issues: From IESG: - Discuss about how much protection OSPF has for replay attacks without the security enabled - Add references to 3602 and 2404 - Analyze and recommend values of rekeying interval and KeyRolloverInterval - Spell out in the security considerations that one router can impersonate another - Larger routing security not considered here (refer to rpsec) i.e., "What's left to worry about after you deploy this?" - Refer to rpsec drafts From authors: - MUST requirement for hex format keys. This will significantly increase the entropy of the keys. |
|
2004-12-29
|
08 | (System) | Sub state has been changed to AD Follow up from New Id Needed |
|
2004-12-29
|
06 | (System) | New version available: draft-ietf-ospf-ospfv3-auth-06.txt |
|
2004-11-03
|
08 | Steven Bellovin | [Ballot discuss] The Security Considerations section needs to discuss matters in the purview of the rpsec wg -- that's the real threat. Such concerns fall … [Ballot discuss] The Security Considerations section needs to discuss matters in the purview of the rpsec wg -- that's the real threat. Such concerns fall under the heading of "residual threats", which must always be in a Security Considerations section. |
|
2004-10-27
|
08 | Bill Fenner | State Changes to IESG Evaluation::Revised ID Needed from IESG Evaluation::AD Followup by Bill Fenner |
|
2004-10-27
|
08 | Bill Fenner | Authors have not yet completely addressed IESG comments: From: Mukesh Gupta Subject: Re: I-D ACTION:draft-ietf-ospf-ospfv3-auth-05.txt Date: Mon, 25 Oct 2004 14:01:30 -0500 To: OSPF@PEACH.EASE.LSOFT.COM Reply-to: … Authors have not yet completely addressed IESG comments: From: Mukesh Gupta Subject: Re: I-D ACTION:draft-ietf-ospf-ospfv3-auth-05.txt Date: Mon, 25 Oct 2004 14:01:30 -0500 To: OSPF@PEACH.EASE.LSOFT.COM Reply-to: Mailing List Hi All, We have addressed the following things in this revision: - Changed rule 3 & 5 to add OSPF with AH/ESP. - Rules for interfaces and virtual links were separated to remove iface column - Made AES-CBC & HMAC SHA1 a MUST and other non-stream ciphers a SHOULD. - Use of stream ciphers with manual keys is now prevented - Made changing keys a "SHOULD" from "MAY". - Mentioning that the SAs are per-link (as defined in OSPFv3 RFC). Therefore, all the OSPF instances have to use same SA. - Referring to New version of IPsec drafts or old versions of IPsec RFCs now - Some paragraphs were rephrased for clarity - ADDed OSPFv2 in References - Moved to the newer boilerplate This draft does NOT address all the comments that we received from IESG and on the list. We will be submitting another revision to address the remaining changes. Please review this version and see if we got things right. Regards Mukesh & Suresh |
|
2004-10-25
|
08 | Russ Housley | [Ballot discuss] The -05 version of this document is greatly improved over the -04 version. Nice work. However, I still have two concerns. … [Ballot discuss] The -05 version of this document is greatly improved over the -04 version. Nice work. However, I still have two concerns. In the Security Considerations section, the document needs to prevent the use of stream ciphers with manual key management. I think that this is easily done by adding another bullet to the list of limitations that already appears in that section. To ensure interoperability, AES-CBC and HMAC-SHA-1 are mandatory to implement. As such, the ESP with AES-CBC specification (RFC 3602) needs to be a normative reference. Also, a normative reference is needed for HMAC-SHA-1. I assume that HMAC-SHA-1-96 will be used as specified in RFC 2404. |
|
2004-10-22
|
05 | (System) | New version available: draft-ietf-ospf-ospfv3-auth-05.txt |
|
2004-06-24
|
08 | Amy Vezza | State Changes to IESG Evaluation::AD Followup from IESG Evaluation by Amy Vezza |
|
2004-06-24
|
08 | Harald Alvestrand | [Ballot comment] Reviewed by Spencer Dawkins, Gen-ART A DISCUSS that has been turned into a comment: I can not find in section 8 where it … [Ballot comment] Reviewed by Spencer Dawkins, Gen-ART A DISCUSS that has been turned into a comment: I can not find in section 8 where it defines what keying shall be used for virtual links. Either the intention is that a single key be used over the whole domain, which would need to be stated, with its security implications, or else IKE needs to be used, in which case that needs to be stated, along with moving IKE to a normative reference. Or maybe there is some alternative I have missed. My grumble: With all the work that's been sunk into multicast security, is it really not possible to do any better than "broadcast media requires static keying with one key per medium"? However, I trust Steve and Russ to do as well as can be done over this. |
|
2004-06-24
|
08 | Amy Vezza | [Ballot Position Update] New position, No Objection, has been recorded for Margaret Wasserman by Amy Vezza |
|
2004-06-24
|
08 | Harald Alvestrand | [Ballot Position Update] Position for Harald Alvestrand has been changed to No Objection from Discuss by Harald Alvestrand |
|
2004-06-24
|
08 | Thomas Narten | [Ballot Position Update] Position for Thomas Narten has been changed to No Objection from Undefined by Thomas Narten |
|
2004-06-24
|
08 | Thomas Narten | [Ballot comment] > 2. OSPFv2 to OSPFv3 > > Security concerns MUST be taken away from OSPFv3 protocol and IPv6 > stack MUST … [Ballot comment] > 2. OSPFv2 to OSPFv3 > > Security concerns MUST be taken away from OSPFv3 protocol and IPv6 > stack MUST provide inherent security to OSPFv3 by using AH/ESP > extension headers. It means OSPFv3 protocol MUST NOT receive any > unauthenticated packets. As OSPFv2 has its own security mechanisms, > no inherent security needs to be provided by the IPv4 stack. As > OSPFv2 is only for IPv4 and OSPFv3 is only for IPv6, the distinction > between the packets can be easily made by IP version. wording poor. sounds like you MUST use AH/ESP. Surely, it is optional when one chooses to use it. > Encryption and Authentication Algorithms > The implementations MUST be conformant to the RFCs that describe > mandatory-to-implement algorithms for use with ESP and AH. Cite the RFC please... > So, all the neighbor routers on a network/subnet MUST use the same SA > and the same SA MUST be used for inbound and outbound processing. and how does this impact replay protection? > Different SA than the SA of underlying interface MUST be provided for > virtual links. Packets sent out on virtual links use unicast site- > local or global IPv6 addresses as the IPv6 source address and all the > other packets use multicast and unicast link local addresses. This > difference in the IPv6 source address is used in order to > differentiate the packets sent on interfaces and virtual links. given the deprecation of site local, can the above be rewritten to say "non-link local" rather than mentioning site-local? Also, is this necessary? Why do use of virtual links have standards implications? In general, virtual links are just implementation tricks. Protocols should not need to know about them. > links are learnt during the routing table build up process. The s/learnt/learned/ > To maintain the security of a link, it may be desirable to change the > key values from time to time. The following three-step procedure MAY > be provided to rekey the routers on a link without dropping OSPFv3 > protocol packets or disrupting the adjacency. This is only a MAY? Seems like a SHOULD or MUST. Security considerations seems pretty weak.. |
|
2004-06-24
|
08 | Thomas Narten | [Ballot Position Update] New position, Undefined, has been recorded for Thomas Narten by Thomas Narten |
|
2004-06-24
|
08 | Allison Mankin | [Ballot Position Update] New position, No Objection, has been recorded for Allison Mankin by Allison Mankin |
|
2004-06-24
|
08 | Jon Peterson | [Ballot Position Update] New position, No Objection, has been recorded for Jon Peterson by Jon Peterson |
|
2004-06-24
|
08 | Alex Zinin | [Ballot Position Update] New position, No Objection, has been recorded for Alex Zinin by Alex Zinin |
|
2004-06-23
|
08 | David Kessens | [Ballot Position Update] New position, No Objection, has been recorded for David Kessens by David Kessens |
|
2004-06-23
|
08 | Russ Housley | [Ballot discuss] The first sentence of section 2 is very confusing, and it contains two MUST statements. It says: > > Security … [Ballot discuss] The first sentence of section 2 is very confusing, and it contains two MUST statements. It says: > > Security concerns MUST be taken away from OSPFv3 protocol and IPv6 > stack MUST provide inherent security to OSPFv3 by using AH/ESP > extension headers. > I propose the following replacement text for the first two sentences: The IPv6 stack, by making use of either AH or ESP, MUST provide integrity and authentication of all datagrams delivered to OSPFv3. The IPv6 stack MAY also provide confidentiality of datagrams delivered to OSPFv3. I also find the last paragraph of section 2. I believe separate paragraphs on confidentiality and authentication is desirable, but I cannot figure out the MUST statement that is intended for authentication. See the following attempt to create replacement text. Authentication of selected portions of IPv6 header, selected portions of extension headers, and selected options can be provided when AH is employed. If this form of authentication is provided, it MUST ... Confidentiality can be provided when ESP is employed. When confidentiality is provided, it MUST cover the entire OSPFv3 header and data. The last paragraph of section 3 does not cover ESP integrity checking. Also, AH delivers cleartext packets; they are not encrypted. I propose the following alternate text: OSPFv3 packets that are not protected with AH or ESP MUST be silently discarded. When the Integrity Check Value (ICV) is incorrect in either AH or ESP, the encapsulated OSPFv3 packets MUST be silently discarded. In the Security Considerations section, the document needs to prevent the use of stream ciphers with manual key management. To ensure interoperability, I expected a set of mandatory to implement algorithms for ESP and AH. |
|
2004-06-23
|
08 | Russ Housley | [Ballot Position Update] New position, Discuss, has been recorded for Russ Housley by Russ Housley |
|
2004-06-23
|
08 | Harald Alvestrand | [Ballot discuss] From Spencer Dawkins' review: I can not find in section 8 where it defines what keying shall be used for virtual links. Either … [Ballot discuss] From Spencer Dawkins' review: I can not find in section 8 where it defines what keying shall be used for virtual links. Either the intention is that a single key be used over the whole domain, which would need to be stated, with its security implications, or else IKE needs to be used, in which case that needs to be stated, along with moving IKE to a normative reference. Or maybe there is some alternative I have missed. My grumble: With all the work that's been sunk into multicast security, is it really not possible to do any better than "broadcast media requires static keying with one key per medium"? |
|
2004-06-23
|
08 | Harald Alvestrand | [Ballot comment] Reviewed by Spencer Dawkins, Gen-ART |
|
2004-06-23
|
08 | Harald Alvestrand | [Ballot discuss] From Spencer Dawkins' review: I can not find in section 8 where it defines what keying shall be used for virtual links. Either … [Ballot discuss] From Spencer Dawkins' review: I can not find in section 8 where it defines what keying shall be used for virtual links. Either the intention is that a single key be used over the whole domain, which would need to be stated, with its security implications, or else IKE needs to be used, in which case that needs to be stated, along with moving IKE to a normative reference. Or maybe there is some alternative I have missed. |
|
2004-06-23
|
08 | Harald Alvestrand | [Ballot Position Update] New position, Discuss, has been recorded for Harald Alvestrand by Harald Alvestrand |
|
2004-06-22
|
08 | Ted Hardie | [Ballot comment] Not blocking since the blocking portion of it is covered in Steve's DISCUSS, but I also found Section 9 on Changing Keys fairly … [Ballot comment] Not blocking since the blocking portion of it is covered in Steve's DISCUSS, but I also found Section 9 on Changing Keys fairly weak and Section 6's discussion of manual keying and multicast light. I think the reader would benefit from a discussion of how the limitations on manual keying for multicast will affect the deployment of this mechanism--does it imply, for example, something about appropriate multicast group sizes? |
|
2004-06-22
|
08 | Ted Hardie | [Ballot Position Update] New position, No Objection, has been recorded for Ted Hardie by Ted Hardie |
|
2004-06-18
|
08 | Steven Bellovin | [Ballot discuss] Given the reliance on static keying, there needs to be discussion of key rollover mechanisms (as well as key change guidelines similar to … [Ballot discuss] Given the reliance on static keying, there needs to be discussion of key rollover mechanisms (as well as key change guidelines similar to those in RFC 3562). Note that this is not an easy problem, since uncoordinated key changes can eliminate the connectivity needed for easy changes on other routers. I suggest a requirement for a key overlap period. (This also helps address the replay issue.) Note the implementation constraints: a single protocol handler must have the ability to accept input from more that one SPI from a single source. The IPsec rules in Section 10 are not correct. More accurately, rules 3 and 5 are imprecise; they say to accept AH/ESP packets, where as what they should say is to accept AH/ESP+OSPF packets. The Security Considerations section needs to discuss matters in the purview of the rpsec wg -- that's the real threat. Such concerns fall under the heading of "residual threats", which must always be in a Security Considerations section. |
|
2004-06-18
|
08 | Steven Bellovin | [Ballot Position Update] New position, Discuss, has been recorded for Steve Bellovin by Steve Bellovin |
|
2004-06-15
|
08 | Scott Hollenbeck | [Ballot discuss] Section 2: The text says "It means OSPFv3 protocol MUST NOT receive any unauthenticated packets". Later in the same section, the text says: … [Ballot discuss] Section 2: The text says "It means OSPFv3 protocol MUST NOT receive any unauthenticated packets". Later in the same section, the text says: "Authentication and confidentiality, if provided, MUST be provided to the entire OSPFv3 header and data. Authentication to the selected portions of IPv6 header, selected portions of extension headers and selected options MAY also be provided optionally." How can these be "if provided" and "MAY also be provided optionally" if there MUST NOT be any unauthenticated packets? Section 5: Please cite a reference to describe "IPsec in transport mode MUST be supported". Please cite the RFCs "that describe mandatory-to-implement algorithms for use with ESP and AH". |
|
2004-06-15
|
08 | Scott Hollenbeck | [Ballot discuss] Section 2: The text says "It means OSPFv3 protocol MUST NOT receive any unauthenticated packets". Later in the same section, the text says: … [Ballot discuss] Section 2: The text says "It means OSPFv3 protocol MUST NOT receive any unauthenticated packets". Later in the same section, the text says: "Authentication and confidentiality, if provided, MUST be provided to the entire OSPFv3 header and data. Authentication to the selected portions of IPv6 header, selected portions of extension headers and selected options MAY also be provided optionally." How can these be "if provided" and "MAY also be provided optionally" if there MUST NOT be any unauthenticated packets? Section 5: Please cite a reference to support "IPsec in transport mode MUST be supported". Please cite the RFCs "that describe mandatory-to-implement algorithms for use with ESP and AH". |
|
2004-06-15
|
08 | Scott Hollenbeck | [Ballot Position Update] Position for Scott Hollenbeck has been changed to Discuss from Undefined by Scott Hollenbeck |
|
2004-06-15
|
08 | Scott Hollenbeck | [Ballot comment] In the abstract, s/using IPv6/using an IPv6/ |
|
2004-06-15
|
08 | Scott Hollenbeck | [Ballot Position Update] New position, Undefined, has been recorded for Scott Hollenbeck by Scott Hollenbeck |
|
2004-06-10
|
08 | Bill Fenner | Placed on agenda for telechat - 2004-06-24 by Bill Fenner |
|
2004-06-10
|
08 | Bill Fenner | State Changes to IESG Evaluation from Waiting for Writeup by Bill Fenner |
|
2004-06-10
|
08 | Bill Fenner | [Ballot Position Update] New position, Yes, has been recorded for Bill Fenner |
|
2004-06-10
|
08 | Bill Fenner | Ballot has been issued by Bill Fenner |
|
2004-06-10
|
08 | Bill Fenner | Created "Approve" ballot |
|
2004-05-01
|
08 | Margaret Cullen | [Note]: 'Participant in PROTO Team pilot: Working Group Chair Followup of DISCUSS Comments http://www.ietf.org/internet-drafts/draft-ietf-proto-wgchair-discuss-pilot-01.txt' added by Margaret Wasserman |
|
2004-04-20
|
08 | (System) | State has been changed to Waiting for Writeup from In Last Call by system |
|
2004-04-06
|
08 | Amy Vezza | Last call sent |
|
2004-04-06
|
08 | Amy Vezza | State Changes to In Last Call from Last Call Requested by Amy Vezza |
|
2004-04-05
|
08 | Bill Fenner | Last Call was requested by Bill Fenner |
|
2004-04-05
|
08 | Bill Fenner | State Changes to Last Call Requested from Publication Requested by Bill Fenner |
|
2004-04-05
|
08 | (System) | Ballot writeup text was added |
|
2004-04-05
|
08 | (System) | Last call text was added |
|
2004-04-05
|
08 | (System) | Ballot approval text was added |
|
2004-01-16
|
08 | Dinara Suleymanova | Intended Status has been changed to Proposed Standard from None |
|
2004-01-13
|
08 | Bill Fenner | State Changes to Publication Requested from AD is watching by Bill Fenner |
|
2004-01-13
|
08 | Bill Fenner | Subject: Re: WG Last Call for draft-ietf-ospf-ospfv3-auth-04.txt - Authentication/Confidentiality for OSPFv3 Date: Tue, 13 Jan 2004 13:47:33 -0500 From: Acee … Subject: Re: WG Last Call for draft-ietf-ospf-ospfv3-auth-04.txt - Authentication/Confidentiality for OSPFv3 Date: Tue, 13 Jan 2004 13:47:33 -0500 From: Acee Lindem To: OSPF WG List , Bill Fenner , Alex Zinin , IESG Secretary Organization: Redback Networks This WG last call has completed and the subject document will be submitted to the IESG for evaluation. |
|
2004-01-13
|
08 | Bill Fenner | Shepherding AD has been changed to Bill Fenner from Alex Zinin |
|
2003-12-11
|
04 | (System) | New version available: draft-ietf-ospf-ospfv3-auth-04.txt |
|
2003-08-20
|
03 | (System) | New version available: draft-ietf-ospf-ospfv3-auth-03.txt |
|
2003-07-29
|
02 | (System) | New version available: draft-ietf-ospf-ospfv3-auth-02.txt |
|
2003-06-10
|
08 | Alex Zinin | Draft Added by Zinin, Alex |
|
2003-04-18
|
01 | (System) | New version available: draft-ietf-ospf-ospfv3-auth-01.txt |
|
2002-12-09
|
00 | (System) | New version available: draft-ietf-ospf-ospfv3-auth-00.txt |