Professional Documents
Culture Documents
are capable of the new behavior through a new flag in the Router
Solicitations.
"IPv6 Router Advertisement Options for DNS Configuration", Jaehoon
Jeong, Soohong Park, Luc Beloeil, Syam Madanapalli, 2016-04-07,
<draft-ietf-6man-rdnss-rfc6106bis-12.txt>
This document specifies IPv6 Router Advertisement options to allow
IPv6 routers to advertise a list of DNS recursive server addresses
and a DNS Search List to IPv6 hosts.
This document obsoletes RFC 6106 and allows a higher default value of
the lifetime of the RA DNS options to avoid the frequent expiry of
the options on links with a relatively high rate of packet loss.
"Republishing the IPV6-specific MIB modules as obsolete", Bill Fenner,
2016-02-18, <draft-ietf-6man-ipv6-mibs-obsolete-01.txt>
In 2005, the IPv6 MIB update group published updated versions of the
IP-MIB, UDP-MIB, TCP-MIB and IP-FORWARD-MIB modules, which use the
InetAddressType/InetAddress construct to handle IPv4 and IPv6 in the
same table. This document contains versions of the obsoleted
IPV6-MIB, IPV6-TC, IPV6-ICMP-MIB, IPV6-TCP-MIB and IPV6-UDP-MIB
modules, for the purpose of updating MIB module repositories.
"Routing packets from hosts in a multi-prefix network", Fred Baker,
Brian Carpenter, 2016-02-22, <draft-ietf-6man-multi-homed-host-06.txt>
This document describes expected IPv6 host behavior in a network that
has more than one prefix, each allocated by an upstream network that
implements BCP 38 ingress filtering, when the host has multiple
routers to choose from. It also applies to other scenarios such as
the usage of stateful firewalls that effectively act as address-based
filters. This host behavior may interact with source address
selection in a given implementation, but logically follows it. Given
that the network or host is, or appears to be, multihomed with
multiple provider-allocated addresses, that the host has elected to
use a source address in a given prefix, and that some but not all
neighboring routers are advertising that prefix in their Router
Advertisement Prefix Information Options, this document specifies to
which router a host should present its transmission. It updates RFC
4861.
"Internet Protocol, Version 6 (IPv6) Specification", Steve Deering,
Robert Hinden, 2016-03-21, <draft-ietf-6man-rfc2460bis-04.txt>
This document specifies version 6 of the Internet Protocol (IPv6).
It obsoletes RFC2460
"IPv6 Hop-by-Hop Options Extension Header", Fred Baker, Ron Bonica,
2016-03-16, <draft-ietf-6man-hbh-header-handling-03.txt>
This document clarifies requirements for IPv6 routers with respect to
the Hop-by-Hop (HBH) Options Extension Header. These requirements
are applicable to all IPv6 routers, regardless of whether they
maintain a strict separation between forwarding and control plane
hardware. In this respect, this document updates RFC 2460 and RFC
7045.
This document also describes forwarding plane procedures for
standalone utility) that will interact with the user, managing their
identity information and identity-to-service mappings. All designers
of software to fulfil this role will face the same set of challenges.
This document aims to document these challenges with the aim of
producing well-thought out UIs with some degree of consistency
between implementations.
Authentication and Authorization for Constrained Environments (ace)
------------------------------------------------------------------"An architecture for authorization in constrained environments",
Stefanie Gerdes, Ludwig Seitz, Goran Selander, Carsten Bormann,
2016-03-01, <draft-ietf-ace-actors-03.txt>
Constrained-node networks are networks where some nodes have severe
constraints on code size, state memory, processing capabilities, user
interface, power and communication bandwidth (RFC 7228).
This document provides terminology, and identifies the elements that
an architecture needs to address, providing a problem statement, for
authentication and authorization in these networks.
"Authorization for the Internet of Things using OAuth 2.0", Ludwig
Seitz, Goran Selander, Erik Wahlstroem, Samuel Erdtman, Hannes
Tschofenig, 2016-02-25, <draft-ietf-ace-oauth-authz-01.txt>
This memo defines how to use OAuth 2.0 as an authorization framework
with Internet of Things (IoT) deployments, thus bringing a well-known
and widely used security solution to IoT devices. Where possible
vanilla OAuth 2.0 is used, but where the limitations of IoT devices
require it, profiles and extensions are provided.
Automated Certificate Management Environment (acme)
--------------------------------------------------"Automatic Certificate Management Environment (ACME)", Richard Barnes,
Jacob Hoffman-Andrews, James Kasten, 2016-03-21,
<draft-ietf-acme-acme-02.txt>
Certificates in the Web's X.509 PKI (PKIX) are used for a number of
purposes, the most significant of which is the authentication of
domain names. Thus, certificate authorities in the Web PKI are
trusted to verify that an applicant for a certificate legitimately
represents the domain name(s) in the certificate. Today, this
verification is done through a collection of ad hoc mechanisms. This
document describes a protocol that a certificate authority (CA) and
an applicant can use to automate the process of verification and
certificate issuance. The protocol also provides facilities for
other certificate management functions, such as certificate
revocation.
Application-Layer Traffic Optimization (alto)
--------------------------------------------"ALTO Deployment Considerations", Martin Stiemerling, Sebastian Kiesel,
Michael Scharf, Hans Seidel, Stefano Previdi, 2016-04-18,
<draft-ietf-alto-deployments-14.txt>
Many Internet applications are used to access resources such as
pieces of information or server processes that are available in
of
for
It
be
"A PIE-Based AQM for DOCSIS Cable Modems", Greg White, Rong Pan,
2016-02-15, <draft-ietf-aqm-docsis-pie-02.txt>
Cable modems based on the DOCSIS(R) specification provide broadband
Internet access to over one hundred million users worldwide. In some
cases, the cable modem connection is the bottleneck (lowest speed)
link between the customer and the Internet. As a result, the impact
of buffering and bufferbloat in the cable modem can have a
significant effect on user experience. The CableLabs DOCSIS 3.1
specification introduces requirements for cable modems to support an
Active Queue Management (AQM) algorithm that is intended to alleviate
the impact that buffering has on latency sensitive traffic, while
preserving bulk throughput performance. In addition, the CableLabs
DOCSIS 3.0 specifications have also been amended to contain similar
requirements. This document describes the requirements on Active
Queue Management that apply to DOCSIS equipment, including a
description of the "DOCSIS-PIE" algorithm that is required on DOCSIS
3.1 cable modems.
Applications and Real-Time Area (art)
------------------------------------"Brotli Compressed Data Format", Jyrki Alakuijala, Zoltan Szabadka,
2016-05-04, <draft-alakuijala-brotli-10.txt>
This specification defines a lossless compressed data format that
compresses data using a combination of the LZ77 algorithm and Huffman
coding, with efficiency comparable to the best currently available
general-purpose compression methods.
"Lightweight Directory Access Protocol (LDAP) Registrations for PKCS
#9", Sean Leonard, 2016-03-12, <draft-seantek-ldap-pkcs9-04.txt>
PKCS #9 includes several useful definitions that are not yet
reflected in the LDAP IANA registry. This document adds those
definitions to the IANA registry.
"DISPATCH-Style Working Groups and the SIP-Change Process", Ben
Campbell, Alissa Cooper, Barry Leiba, 2016-03-11,
<draft-campbell-art-rfc5727-update-03.txt>
RFC 5727 defined several processes for the former Real-time
Applications and Infrastructure (RAI) area. These processes include
the evolution of the Session Initiation Protocol (SIP) and related
protocols, as well as the operation of the DISPATCH and SIPCORE
working groups. This document updates RFC 5727 to allow flexibility
for the area and working group structure, while preserving the SIPchange processes. It also generalizes the DISPATCH working group
processes so that they can be easily adopted by other working groups.
"A URN Namespace for Globus", Stuart Martin, Steve Tuecke, Brendan
McCollam, Mattias Lidman, 2016-03-18, <draft-martin-urn-globus-03.txt>
This document describes a URN (Uniform Resource Name) namespace that
is used by Globus for naming persistent resources.
"Clarifying registry procedures for the Websockets sub-protocol
registry", Ted Hardie, 2016-04-27,
<draft-hardie-rfc6455-iana-clarification-02.txt>
2016-04-18, <draft-ietf-bfd-multipoint-08.txt>
This document describes extensions to the Bidirectional Forwarding
Detection (BFD) protocol for its use in multipoint and multicast
networks. Comments on this draft should be directed to rtgbfd@ietf.org.
"BFD Management Information Base (MIB) extensions for MPLS and MPLS-TP
Networks", Sam Aldrin, Venkatesan Mahalingam, Kannan Sampath, Tom
Nadeau, 2015-12-01, <draft-ietf-bfd-mpls-mib-07.txt>
This draft defines a portion of the Management Information Base (MIB)
for use with network management protocols in the Internet community.
In particular, it extends the BFD Management Information Base and
describes the managed objects for modeling Bidirectional Forwarding
Detection (BFD) protocol for MPLS and MPLS-TP networks.
"Seamless Bidirectional Forwarding Detection (S-BFD) Use Cases", Sam
Aldrin, Carlos Pignataro, Greg Mirsky, Nagendra Kumar, 2016-05-06,
<draft-ietf-bfd-seamless-use-case-08.txt>
This document describes various use cases for a Seamless
Bidirectional Forwarding Detection (S-BFD), and provides requirements
such that protocol mechanisms allow for a simplified detection of
forwarding failures.
These use cases support S-BFD, as a simplified mechanism to use
Bidirectional Forwarding Detection (BFD) with large portions of
negotiation aspects eliminated, accelerating the establishment of a
BFD session. S-BFD benefits include quick provisioning as well as
improved control and flexibility to network nodes initiating the path
monitoring.
"Seamless Bidirectional Forwarding Detection (S-BFD)", Carlos Pignataro,
David Ward, Nobo Akiya, Manav Bhatia, Juniper Networks, 2016-05-06,
<draft-ietf-bfd-seamless-base-11.txt>
This document defines a simplified mechanism to use Bidirectional
Forwarding Detection (BFD) with large portions of negotiation aspects
eliminated, thus providing benefits such as quick provisioning as
well as improved control and flexibility to network nodes initiating
the path monitoring.
This document updates RFC5880.
"Seamless Bidirectional Forwarding Detection (S-BFD) for IPv4, IPv6 and
MPLS", Carlos Pignataro, David Ward, Nobo Akiya, 2016-05-06,
<draft-ietf-bfd-seamless-ip-06.txt>
This document defines procedures to use Seamless Bidirectional
Forwarding Detection (S-BFD) for IPv4, IPv6 and MPLS environments.
"BFD Multipoint Active Tails.", Dave Katz, David Ward, Juniper Networks,
2015-11-17, <draft-ietf-bfd-multipoint-active-tail-01.txt>
This document describes active tail extensions to the Bidirectional
Forwarding Detection (BFD) protocol for multipoint and multicast
networks. Comments on this draft should be directed to rtgbfd@ietf.org.
"IANA Allocation Procedures for OTN Signal Type Subregistry of the GMPLS
Signaling Parameters Registry", Zafar Ali, Antonello Bonfanti, Matt
Hartley, Fatai Zhang, 2016-03-17,
<draft-ietf-ccamp-otn-signal-type-subregistry-05.txt>
IANA has defined an "OTN Signal Type" subregistry of the
"Generalized Multi-Protocol Label Switching (GMPLS) Signaling
Parameters" registry. This document updates the OTN Signal Type
subregistry specified in RFC 7139 to allow Specification Required
policies, as defined in RFC 5226.
"Resource ReserVation Protocol-Traffic Engineering (RSVP-TE) Extension
for Additional Signal Types in G.709 OTN", Zafar Ali, Antonello
Bonfanti, Matt Hartley, Fatai Zhang, 2016-02-08,
<draft-ietf-ccamp-additional-signal-type-g709v3-03.txt>
RFC 4328 and RFC 7139 provide Resource ReserVation Protocol-Traffic
Engineering (RSVP-TE) signaling extensions to control the full set
of Optical Transport Network (OTN) features. However, these
specifications do not cover the additional Optical channel Data
Unit (ODU) containers defined in G.Sup43 (ODU1e, ODU3e1 and
ODU3e2). This document updates RFC 7139 to define new signal types
for these additional containers.
"A framework for Management and Control of DWDM optical interface
parameters", Ruediger Kunze, Gert Grammel, Dieter Beller, Gabriele
Galimberti, 2016-04-06, <draft-ietf-ccamp-dwdm-if-mng-ctrl-fwk-01.txt>
To ensure an efficient data transport, meeting the requirements
requested by today's IP-services the control and management of DWDM
interfaces is a precondition for enhanced multilayer networking and
for an further automation of network provisioning and operation.
This document describes use cases and requirements for the control
and management of optical interfaces parameters according to
different types of single channel DMDM interfaces. The focus is on
automating the network provisioning process irrespective on how it is
triggered i.e. by EMS, NMS or GMPLS. This document covers management
as well as control plane considerations in different management cases
of a single channel DWDM interface The purpose is to identify the
necessary information elements and processes to be used by control or
management systems for further processing.
"A Yang Data Model for WSON Optical Networks", Young Lee, Dhruv Dhody,
Xian Zhang, Aihua Guo, Victor Lopezalvarez, Daniel King, Bin-Yeong Yoon,
2016-04-05, <draft-ietf-ccamp-wson-yang-01.txt>
This document provides a YANG data model for the routing and
wavelength assignment (RWA) TE topology in wavelength switched
optical networks (WSONs).
Content Delivery Networks Interconnection (cdni)
-----------------------------------------------"CDN Interconnection Metadata", Ben Niven-Jenkins, Rob Murray, Matt
Caulfield, Kevin Ma, 2016-04-28, <draft-ietf-cdni-metadata-16.txt>
The Content Delivery Networks Interconnection (CDNI) metadata
interface enables interconnected Content Delivery Networks (CDNs) to
exchange content distribution metadata in order to enable content
format which is popular for Web based data exchange. Concise Binary
Object Representation, CBOR (RFC7049) is a binary data format which
has been optimized for data exchange for the Internet of Things
(IoT). For many IoT scenarios, CBOR formats will be preferred since
it can help decrease transmission payload sizes as well as
implementation code sizes compared to other data formats.
Web Linking (RFC5988) provides a way to represent links between Web
resources as well as the relations expressed by them and attributes
of such a link. In constrained networks, a collection of Web links
can be exchanged in the CoRE link format (RFC6690). Outside of
constrained environments, it may be useful to represent these
collections of Web links in JSON, and similarly, inside constrained
environments, in CBOR. This specification defines a common format
for this.
Group Communication for the Constrained Application Protocol
(RFC7390) defines a number of JSON formats for controlling
communication between groups of nodes employing the Constrained
Application Protocol (CoAP). In a similar vein, this specification
defines CBOR variants of these formats.
"CoRE Resource Directory", Zach Shelby, Michael Koster, Carsten Bormann,
Peter Van der Stok, 2016-03-21,
<draft-ietf-core-resource-directory-07.txt>
In many M2M applications, direct discovery of resources is not
practical due to sleeping nodes, disperse networks, or networks where
multicast traffic is inefficient. These problems can be solved by
employing an entity called a Resource Directory (RD), which hosts
descriptions of resources held on other servers, allowing lookups to
be performed for those resources. This document specifies the web
interfaces that a Resource Directory supports in order for web
servers to discover the RD and to register, maintain, lookup and
remove resources descriptions. Furthermore, new link attributes
useful in conjunction with an RD are defined.
"Guidelines for HTTP-CoAP Mapping Implementations", Angelo Castellani,
Salvatore Loreto, Akbar Rahman, Thomas Fossati, Esko Dijk, 2016-04-06,
<draft-ietf-core-http-mapping-09.txt>
This document provides reference information for implementing a proxy
that performs translation between the HTTP protocol and the CoAP
protocol, focusing on the reverse proxy case. It describes how a
HTTP request is mapped to a CoAP request and how a CoAP response is
mapped back to a HTTP response. Furthermore, it defines a template
for URI mapping and provides a set of guidelines for HTTP to CoAP
protocol translation and related proxy implementations.
"A TCP and TLS Transport for the Constrained Application Protocol
(CoAP)", Carsten Bormann, Simon Lemay, Zebra Technologies, Hannes
Tschofenig, 2016-04-21, <draft-ietf-core-coap-tcp-tls-02.txt>
The Hypertext Transfer Protocol (HTTP) was designed with TCP as the
underlying transport protocol. The Constrained Application Protocol
(CoAP), while inspired by HTTP, has been defined to make use of UDP
instead of TCP. Therefore, reliable delivery and a simple congestion
control and flow control mechanism are provided by the message layer
of the CoAP protocol.
the set key exchange algorithms that currently exist and which ones
MUST, SHOULD, MAY, and SHOULD NOT be implemented. New key exchange
methods use the SHA-2 family of hashes.
"Use of RSA Keys with SHA-2 256 and 512 in Secure Shell (SSH)", denis
bider, 2016-03-10, <draft-ietf-curdle-rsa-sha2-00.txt>
This memo defines an algorithm name, public key format, and signature
format for use of RSA keys with SHA-2 512 for server and client
authentication in SSH connections.
"Extension Negotiation in Secure Shell (SSH)", denis bider, 2016-03-10,
<draft-ietf-curdle-ssh-ext-info-00.txt>
This memo defines a mechanism for SSH clients and servers to exchange
information about supported protocol extensions confidentially after
completed key exchange.
"Using EdDSA with Ed25519/Ed448 in the Internet X.509 Public Key
Infrastructure", Simon Josefsson, Nikos Mavrogiannopoulos, 2016-03-20,
<draft-ietf-curdle-pkix-eddsa-00.txt>
This document specify algorithm identifiers and ASN.1 encoding
formats for EdDSA digital signatures and subject public keys used in
the Internet X.509 Public Key Infrastructure (PKIX) for Certificates
and CRLs. Parameters for Ed25519, Ed25519ph, Ed448, and Ed448ph are
defined.
"Using Curve25519 and Curve448 in PKIX", Simon Josefsson, 2016-03-20,
<draft-ietf-curdle-pkix-newcurves-00.txt>
This document specify "named curve" object identifiers for the
Curve25519 and Curve448 curves, for use in various X.509 PKIX
structures.
"EdDSA, Ed25519, Ed448, Curve25519 and Curve448 for X.509", Simon
Josefsson, 2016-04-08, <draft-ietf-curdle-pkix-00.txt>
This document specify algorithm identifiers and ASN.1 encoding
formats for EdDSA digital signatures, subject public keys, and a
"named curve" object identifier, used in the Internet X.509 Public
Key Infrastructure. Parameters for Ed25519, Ed25519ph, Ed448,
Ed448ph, Curve25519 and Curve448 are defined.
"EdDSA for DNSSEC", Ond ej Sur, Robert Edmonds, 2016-04-18,
<draft-ietf-curdle-dnskey-eddsa-00.txt>
This document describes how to specify EdDSA keys and signatures in
DNS Security (DNSSEC). It uses the Edwards-curve Digital Security
Algorithm (EdDSA) with the choice of two curves, Ed25519 and Ed448.
"Ed25519 public key algorithm for the Secure Shell (SSH) protocol", Ben
Harris, 2016-05-04, <draft-ietf-curdle-ssh-ed25519-00.txt>
This document describes the use of the Ed25519 digital signature
algorithm in the Secure Shell (SSH) protocol.
"Using ChaCha20-Poly1305 Authenticated Encryption in the Cryptographic
Message Syntax (CMS)", Russ Housley, 2016-05-04,
<draft-ietf-curdle-cms-chacha20-poly1305-00.txt>
For each case, this document will identify the application, identify
representative solutions used today, and what new uses an IETF DetNet
solution may enable.
"Deterministic Networking Problem Statement", Norman Finn, Pascal
Thubert, 2016-04-05, <draft-ietf-detnet-problem-statement-00.txt>
This paper documents the needs in various industries to establish
multi-hop paths for characterized flows with deterministic properties
.
Dynamic Host Configuration (dhc)
-------------------------------"Access Network Identifier Option in DHCP", Shwetha Bhandari, Sri
Gundavelli, Mark Grayson, Bernie Volz, Jouni Korhonen, 2016-02-01,
<draft-ietf-dhc-access-network-identifier-13.txt>
This document specifies the format and mechanism that is to be used
for encoding access network identifiers in DHCPv4 and DHCPv6 messages
by defining new access network identifier options and sub-options.
"Customizing DHCP Configuration on the Basis of Network Topology", Ted
Lemon, Tomek Mrugalski, 2016-05-06, <draft-ietf-dhc-topo-conf-08.txt>
DHCP servers have evolved over the years to provide significant
functionality beyond that which is described in the DHCP base
specifications. One aspect of this functionality is support for
context-specific configuration information. This memo describes some
such features and explains their operation.
"Secure DHCPv6", Sheng Jiang, Lishan Li, Yong Cui, Tatuya Jinmei, Ted
Lemon, Dacheng Zhang, 2016-04-24, <draft-ietf-dhc-sedhcpv6-12.txt>
The Dynamic Host Configuration Protocol for IPv6 (DHCPv6) enables
DHCPv6 servers to pass configuration parameters. It offers
configuration flexibility. If not secured, DHCPv6 is vulnerable to
various attacks. This document analyzes the security issues of
DHCPv6 and specifies the secure DHCPv6 mechanism for authentication
and encryption of messages between a DHCPv6 client and a DHCPv6
server.
"Privacy considerations for DHCPv6", Suresh Krishnan, Tomek Mrugalski,
Sheng Jiang, 2016-02-24, <draft-ietf-dhc-dhcpv6-privacy-05.txt>
DHCPv6 is a protocol that is used to provide addressing
configuration information to IPv6 hosts. This document
privacy issues associated with the use of DHCPv6 by the
users. It is intended to be an analysis of the present
does not propose any solutions.
and
describes the
Internet
situation and
"DHCPv6 Prefix Length Hint Issues", Yong Cui, Tianxiang Li, Cong Liu,
2016-04-28, <draft-ietf-dhc-dhcpv6-prefix-length-hint-issue-01.txt>
DHCPv6 Prefix Delegation [RFC3633] allows a requesting router to
include a prefix-length hint value in the IA_PD option to indicate a
preference for the size of the prefix to be delegated, but is unclear
about how the requesting router and delegating router should act in
different situations involving the prefix-length hint. This document
provides a summary of the existing problems with the prefix-length
hint and guidance on what the requesting router and delegating router
could do in different situations.
DTLS In Constrained Environments (dice)
--------------------------------------"TLS/DTLS Profiles for the Internet of Things", Hannes Tschofenig,
Thomas Fossati, 2015-10-18, <draft-ietf-dice-profile-17.txt>
A common design pattern in Internet of Things (IoT) deployments is
the use of a constrained device that collects data via sensors or
controls actuators for use in home automation, industrial control
systems, smart cities and other IoT deployments.
This document defines a Transport Layer Security (TLS) and Datagram
TLS (DTLS) 1.2 profile that offers communications security for this
data exchange thereby preventing eavesdropping, tampering, and
message forgery. The lack of communication security is a common
vulnerability in Internet of Things products that can easily be
solved by using these well-researched and widely deployed Internet
security protocols.
Diameter Maintenance and Extensions (dime)
-----------------------------------------"Diameter Group Signaling", Mark Jones, Marco Liebsch, Lionel Morand,
2016-03-21, <draft-ietf-dime-group-signaling-06.txt>
In large network deployments, a single Diameter node can support over
a million concurrent Diameter sessions. Recent use cases have
revealed the need for Diameter nodes to apply the same operation to a
large group of Diameter sessions concurrently. The Diameter base
protocol commands operate on a single session so these use cases
could result in many thousands of command exchanges to enforce the
same operation on each session in the group. In order to reduce
signaling, it would be desirable to enable bulk operations on all (or
part of) the sessions managed by a Diameter node using a single or a
few command exchanges. This document specifies the Diameter protocol
extensions to achieve this signaling optimization.
"Diameter AVP Level Security End-to-End Security: Scenarios and
Requirements", Hannes Tschofenig, Jouni Korhonen, Glen Zorn, Kervin
Pillay, 2016-01-13, <draft-ietf-dime-e2e-sec-req-04.txt>
This specification discusses requirements for providing Diameter
security at the level of individual Attribute-Value Pairs.
"Diameter Overload Rate Control", Steve Donovan, Eric Noel, 2016-03-18,
<draft-ietf-dime-doic-rate-control-03.txt>
"On Demand Mobility Management", Alper Yegin, Kisuk Kweon, Jinsung Lee,
Jungshin Park, Danny Moses, 2016-05-03,
<draft-ietf-dmm-ondemand-mobility-03.txt>
Applications differ with respect to whether they need IP session
continuity and/or IP address reachability. The network providing the
same type of service to any mobile host and any application running
on the host yields inefficiencies. This document describes a
solution for taking the application needs into account in selectively
providing IP session continuity and IP address reachability on a persocket basis.
"Protocol for Forwarding Policy Configuration (FPC) in DMM", Marco
Liebsch, Satoru Matsushima, Sri Gundavelli, Danny Moses, Lyle Bertz,
2016-03-21, <draft-ietf-dmm-fpc-cpdp-03.txt>
This specification supports the separation of the Control-Plane for
mobility- and session management from the Data-Plane. The protocol
semantics abstract the configuration of Data-Plane nodes and applies
it between a Client function, which is used by an application of the
mobility Control-Plane, and an Agent function, which is associated
with the configuration of Data-Plane nodes, according to the DataPlane rules issued by the mobility Control-Plane. The scope of the
rules comprises traffic description and treatment of packets in terms
of encapsulation, IP address re-writing and QoS. Additional protocol
semantics are described to support the maintenance of the Data-Plane
path.
"MAG Multipath Binding Option", Pierrick Seite, Alper Yegin, Sri
Gundavelli, 2016-03-02, <draft-ietf-dmm-mag-multihoming-01.txt>
The document [RFC4908] proposes to rely on multiple Care-of Addresses
(CoAs) capabilities of Mobile IP [RFC6275] an Network Mobility (NEMO;
[RFC3963]) to enable Multihoming technology for Small-Scale Fixed
Networks. In the continuation of [RFC4908], this document specifies
a multiple proxy Care-of Addresses (pCoAs) extension for Proxy Mobile
IPv6 [RFC5213]. This extension allows a multihomed Mobile Access
Gateway (MAG) to register more than one proxy care-of-address to the
Local Mobility Anchor (LMA).
"LMA Controlled MAG Session Parameters", Dhananjay Patki, Sri
Gundavelli, Jong-Hyouk Lee, Qiao Fu, Lyle Bertz, 2016-04-13,
<draft-ietf-dmm-lma-controlled-mag-params-01.txt>
This specification defines a new extension, LMA-Controlled-MAGSession-Params to Proxy Mobile IPv6. This option can be used by the
LMA in PMIPv6 signaling for notifying the MAG to conform to various
parameters contained in this extension.
"Home Network Prefix Renumbering in PMIPv6", Zhiwei Yan, Jong-Hyouk Lee,
XiaoDong Lee, 2015-12-16, <draft-ietf-dmm-hnprenum-00.txt>
In the basic Proxy Mobile IPv6 (PMIPv6) specification, a Mobile Node
(MN) is assigned with a 64-bit Home Network Prefix (HNP) during its
initial attachment for the Home Address (HoA) configuration. During
the movement of the MN, this prefix remains unchanged and in this way
it is unnecessary for the MN to reconfigure its HoA and reconnect the
ongoing communications. However, the current protocol (RFC5213) does
not specify related operations to support the MN to timely receive
and use a new HNP when the allocated HNP changes. In this draft, a
solution to support the HNP renumbering is proposed, as an update of
RFC5213.
Domain Name System Operations (dnsop)
------------------------------------"Initializing a DNS Resolver with Priming Queries", Peter Koch, M.
Larson, Paul Hoffman, 2016-03-19,
<draft-ietf-dnsop-resolver-priming-07.txt>
This document describes the queries that a DNS resolver should emit
to initialize its cache. The result is that the resolver gets both a
current NS RRSet for the root zone and the necessary address
information for reaching the root servers.
"Add 100.64.0.0/10 prefixes to IPv4 Locally-Served DNS Zones Registry.",
Mark Andrews, 2015-10-11, <draft-ietf-dnsop-rfc6598-rfc6303-05.txt>
RFC6598 specified that: "Reverse DNS queries for Shared Address Space
addresses [100.64.0.0/10] MUST NOT be forwarded to the global DNS
infrastructure."
This document formally directs IANA to add the associated zones to
the "IPv4 Locally-Served DNS Zones Registry" to prevent such queries
accidently leaking to the global DNS infrastructure.
"DNSSEC Roadblock Avoidance", Wesley Hardaker, lafur Gumundsson,
Suresh Krishnaswamy, 2016-04-03,
<draft-ietf-dnsop-dnssec-roadblock-avoidance-04.txt>
This document describes problems that a DNSSEC aware resolver/
application might run into within a non-compliant infrastructure. It
outline potential detection and mitigation techniques. The scope of
the document is to create a shared approach to detect and overcome
network issues that a DNSSEC software/system may face.
"Chain Query requests in DNS", Paul Wouters, 2016-02-18,
<draft-ietf-dnsop-edns-chain-query-07.txt>
This document defines an EDNS0 extension that can be used by a
security-aware validating resolver configured to use a Forwarder to
send a single query, requesting a complete validation path along with
the regular query answer. The reduction in queries potentially
lowers the latency and reduces the need to send multiple queries at
once. This extension mandates the use of source IP verified
transport such as TCP or UDP with EDNS-COOKIE so it cannot be abused
in amplification attacks.
"Client Subnet in DNS Queries", Carlo Contavalli, Wilmer van der Gaast,
tale, Warren Kumari, 2016-04-19,
<draft-ietf-dnsop-edns-client-subnet-08.txt>
This document describes an EDNS0 extension that is in active use to
carry information about the network that originated a DNS query, and
the network for which the subsequent response can be cached. Since
it has some known operational and privacy shortcomings, a revision
will be worked through the IETF for improvement.
"Domain Name System (DNS) Cookies", Donald Eastlake, Mark Andrews,
2016-04-05, <draft-ietf-dnsop-cookies-10.txt>
DNS cookies are a lightweight DNS transaction security mechanism that
provides limited protection to DNS servers and clients against a
variety of increasingly common denial-of-service and amplification /
forgery or cache poisoning attacks by off-path attackers. DNS Cookies
are tolerant of NAT, NAT-PT, and anycast and can be incrementally
deployed. (Since DNS Cookies are only returned to the IP address from
which they were originally received, they cannot be used to generally
track Internet users.)
"Aggressive use of NSEC/NSEC3", Kazunori Fujiwara, Akira Kato,
2016-03-17, <draft-fujiwara-dnsop-nsec-aggressiveuse-03.txt>
While DNS highly depends on cache, its cache usage of non-existence
information has been limited to exact matching. This draft proposes
the aggressive use of a NSEC/NSEC3 resource record, which is able to
express non-existence of a range of names authoritatively. With this
proposal, it is expected that shorter latency to many of negative
responses as well as some level of mitigation of random sub-domain
attacks (referred to as "Water Torture" attacks). It is also
expected that non-existent TLD queries to Root DNS servers will
decrease.
"The ALT Special Use Top Level Domain", Warren Kumari, Andrew Sullivan,
2016-03-21, <draft-ietf-dnsop-alt-tld-04.txt>
This document reserves a string (ALT) to be used as a TLD label in
non-DNS contexts or for names that have no meaning in a global
context. It also provides advice and guidance to developers
developing alternate namespaces.
[ Ed note: This document lives in GitHub at:
https://github.com/wkumari/draft-wkumari-dnsop-alt-tld . Issues and
pull requests happily accepted. ]
"Reverse DNS in IPv6 for Internet Service Providers", Lee Howard,
2015-12-22, <draft-ietf-dnsop-isp-ip6rdns-01.txt>
In IPv4, Internet Service Providers (ISPs) commonly provide INADDR.ARPA information for their customers by prepopulating the zone
with one PTR record for every available address. This practice does
not scale in IPv6. This document analyzes different approaches and
considerations for ISPs in managing the ip6.arpa zone for IPv6
address space assigned to many customers.
"Providing Minimal-Sized Responses to DNS Queries with QTYPE=ANY", Joe
Abley, lafur Gumundsson, Marek Majkowski, 2016-04-06,
<draft-ietf-dnsop-refuse-any-01.txt>
The Domain Name System (DNS) specifies a query type (QTYPE) "ANY".
The operator of an authoritative DNS server might choose not to
respond to such queries for reasons of local policy, motivated by
security, performance or other reasons.
The DNS specification does not include specific guidance for the
behaviour of DNS servers or clients in this situation. This document
aims to provide such guidance.
"A Common Operational Problem in DNS Servers - Failure To Respond.",
services, which has proven onerous and impractical for simple devices
like printers and network cameras.
Hence, to facilitate efficient and reliable DNS-Based Service
Discovery, a compromise is needed that combines the ease-of-use of
Multicast DNS with the efficiency and scalability of Unicast DNS.
"DNS Push Notifications", Tom Pusateri, Stuart Cheshire, 2016-04-04,
<draft-ietf-dnssd-push-07.txt>
The Domain Name System (DNS) was designed to return matching records
efficiently for queries for data that is relatively static. When
those records change frequently, DNS is still efficient at returning
the updated results when polled. But there exists no mechanism for a
client to be asynchronously notified when these changes occur. This
document defines a mechanism for a client to be notified of such
changes to DNS records, called DNS Push Notifications.
DDoS Open Threat Signaling (dots)
--------------------------------"Use cases for DDoS Open Threat Signaling", Roland Dobbins, Stephane
Fouant, Daniel Migault, Robert Moskowitz, Nik Teague, Liang Xia,
2016-03-21, <draft-ietf-dots-use-cases-01.txt>
This document delineates principal and ancillary use cases for DDoS
Open Threat Signaling (DOTS), a communications protocol intended to
facilitate the programmatic, coordinated mitigation of Distributed
Denial of Service (DDoS) attacks via a standards-based mechanism.
DOTS is purposely designed to support requests for DDoS mitigation
services and status updates across inter-organizational
administrative boundaries.
"Distributed Denial of Service (DDoS) Open Threat Signaling
Requirements", Andrew Mortensen, Robert Moskowitz, Tirumaleswar Reddy,
2016-03-21, <draft-ietf-dots-requirements-01.txt>
This document defines the requirements for the Distributed Denial of
Service (DDoS) Open Threat Signaling (DOTS) protocols coordinating
attack response against DDoS attacks.
DNS PRIVate Exchange (dprive)
----------------------------"DNS over DTLS (DNSoD)", Tirumaleswar Reddy, Dan Wing, Prashanth Patil,
2016-04-04, <draft-ietf-dprive-dnsodtls-06.txt>
DNS queries and responses are visible to network elements on the path
between the DNS client and its server. These queries and responses
can contain privacy-sensitive information which is valuable to
protect. An active attacker can send bogus responses causing
misdirection of the subsequent connection.
To counter passive listening and active attacks, this document
proposes the use of Datagram Transport Layer Security (DTLS) for DNS,
to protect against passive listeners and certain active attacks. As
DNS needs to remain fast, this proposal also discusses mechanisms to
reduce DTLS round trips and reduce DTLS handshake size. The proposed
mechanism runs over port 853.
"Specification for DNS over TLS", Zi, Liang Zhu, John Heidemann, Allison
Mankin, Duane Wessels, Paul Hoffman, 2016-03-17,
<draft-ietf-dprive-dns-over-tls-09.txt>
This document describes the use of TLS to provide privacy for DNS.
Encryption provided by TLS eliminates opportunities for eavesdropping
and on-path tampering with DNS queries in the network, such as
discussed in RFC 7626. In addition, this document specifies two
usage profiles for DNS-over-TLS and provides advice on performance
considerations to minimize overhead from using TCP and TLS with DNS.
This document focuses on securing stub-to-recursive traffic, as per
the charter of the DPRIVE working group. It does not prevent future
applications of the protocol to recursive-to-authoritative traffic.
Note: this document was formerly named draft-ietf-dprive-start-tlsfor-dns. Its name has been changed to better describe the mechanism
now used. Please refer to working group archives under the former
name for history and previous discussion. [RFC Editor: please remove
this paragraph prior to publication]
"The EDNS(0) Padding Option", Alexander Mayrhofer, 2016-03-06,
<draft-ietf-dprive-edns0-padding-03.txt>
This document specifies the EDNS(0) 'Padding' option, which allows
DNS clients and servers to pad request and response messages by a
variable number of octets.
"Authentication and (D)TLS Profile for DNS-over-TLS and DNS-over-DTLS",
Sara Dickinson, Daniel Kahn Gillmor, Tirumaleswar Reddy, 2016-03-21,
<draft-ietf-dprive-dtls-and-tls-profiles-01.txt>
This document describes how a DNS client can use a domain name to
authenticate a DNS server that uses Transport Layer Security (TLS)
and Datagram TLS (DTLS). Additionally, it defines (D)TLS profiles
for DNS clients and servers implementing DNS-over-TLS and DNS-overDTLS.
"Evaluation of Privacy for DNS Private Exchange", Aziz Mohaisen, Allison
Mankin, 2016-02-03, <draft-ietf-dprive-eval-00.txt,.pdf>
The set of DNS requests that an individual makes can provide a
monitor with a large amount of information about that individual.
DNS Private Exchange (DPRIVE) aims to deprive this actor of this
information. This document describes methods for measuring the
performance of DNS privacy mechanisms, particularly it provides
methods for measuring effectiveness in the face of pervasive
monitoring as defined in RFC7258. The document includes example
evaluations for common use cases.
Data for Reachability of Inter/tra-NetworK SIP (drinks)
------------------------------------------------------"Session Peering Provisioning (SPP) Protocol over SOAP", Kenneth
Cartwright, Vikas Bhatia, Jean-Francois Mule, Alexander Mayrhofer,
2016-04-04, <draft-ietf-drinks-spp-protocol-over-soap-09.txt>
The Session Peering Provisioning Framework (SPPF) specifies the data
model and the overall structure to provision session establishment
data into Session Data Registries and SIP Service Provider data
"A Routing Request Extension for the HELD Protocol", James Winterbottom,
Hannes Tschofenig, Laura Liess, 2016-02-09,
<draft-ietf-ecrit-held-routing-05.txt>
For cases where location servers have access to emergency routing
information they are able to return routing information with the
location information if the location request includes a request for
the desired routing information. This document specifies an
extension to the HELD protocol that updates RFC5985, to support this
funciton. Allowing location and routing information to be acquired
in a single request response exchange updates RFC6881, as current
location acquisition and route determination procedures are separate
operations.
Extensible Provisioning Protocol Extensions (eppext)
---------------------------------------------------"Mark and Signed Mark Objects Mapping", Gustavo Lozano, 2016-03-10,
<draft-ietf-eppext-tmch-smd-06.txt>
Domain Name Registries (DNRs) may operate in special modes for
certain periods of time enabling trademark holders to protect their
rights during the introduction of a Top Level Domain (TLD).
One of those special modes of operation is the Sunrise Period. The
Sunrise Period allows trademark holders an advance opportunity to
register domain names corresponding to their trademarks before names
are generally available to the public.
This document describes the format of a mark and a digitally signed
mark used by trademark holders for registering domain names during
the sunrise phase of generic Top Level Domains (gTLDs). Three types
of mark objects are defined in this specification: registered
trademarks, court-validated marks, and marks protected by statue or
treaty.
Global Access to the Internet for All (gaia)
-------------------------------------------"Alternative Network Deployments: Taxonomy, characterization,
technologies and architectures", Jose Saldana, Andres Arcia-Moret, Bart
Braem, Ermanno Pietrosemoli, Arjuna Sathiaseelan, Marco Zennaro,
2016-04-26,
<draft-irtf-gaia-alternative-network-deployments-05.txt,.pdf>
This document presents a taxonomy of a set of "Alternative Network
Deployments" emerged in the last decade with the aim of bringing
Internet connectivity to people or of providing a local communication
infrastructure to serve various complementary needs and objectives.
They employ architectures and topologies different from those of
mainstream networks, and rely on alternative governance and business
models.
The document also surveys the technologies deployed in these
networks, and their differing architectural characteristics,
including a set of definitions and shared properties.
The classification considers models such as Community Networks,
Wireless Internet Service Providers (WISPs), networks owned by
design goals are to keep BMP simple, useful, easily implemented, and
minimally service-affecting. BMP is not suitable for use as a
routing protocol.
"Internet Exchange BGP Route Server Operations", Nick Hilliard, Elisa
Jasinska, Robert Raszuk, Niels Bakker, 2015-06-08,
<draft-ietf-grow-ix-bgp-route-server-operations-05.txt>
The popularity of Internet exchange points (IXPs) brings new
challenges to interconnecting networks. While bilateral eBGP
sessions between exchange participants were historically the most
common means of exchanging reachability information over an IXP, the
overhead associated with this interconnection method causes serious
operational and administrative scaling problems for IXP participants.
Multilateral interconnection using Internet route servers can
dramatically reduce the administrative and operational overhead
associated with connecting to IXPs; in some cases, route servers are
used by IXP participants as their preferred means of exchanging
routing information.
This document describes operational considerations for multilateral
interconnections at IXPs.
"Problem Definition and Classification of BGP Route Leaks", Kotikalapudi
Sriram, Doug Montgomery, Danny McPherson, Eric Osterweil, Brian Dickson,
2016-05-05, <draft-ietf-grow-route-leak-problem-definition-06.txt>
A systemic vulnerability of the Border Gateway Protocol routing
system, known as 'route leaks', has received significant attention in
recent years. Frequent incidents that result in significant
disruptions to Internet routing are labeled "route leaks", but to
date a common definition of the term has been lacking. This document
provides a working definition of route leaks, keeping in mind the
real occurrences that have received significant attention. Further,
this document attempts to enumerate (though not exhaustively)
different types of route leaks based on observed events on the
Internet. The aim is to provide a taxonomy that covers several forms
of route leaks that have been observed and are of concern to Internet
user community as well as the network operator community.
"By default reject propagation when no policy is associated with a BGP
peering session.", Jared Mauch, Job Snijders, 2015-12-28,
<draft-ietf-grow-bgp-reject-00.txt>
This document defines the default behaviour of a BGP speaker when no
explicit policy is associated with a BGP peering session.
"BLACKHOLE BGP Community for Blackholing", Thomas King, Christoph
Dietzel, Job Snijders, Gert Doering, Greg Hankins, 2016-01-11,
<draft-ietf-grow-blackholing-00.txt>
This document describes the use of a well-known Border Gateway
Protocol (BGP) community for blackholing at IP networks and Internet
Exchange Points (IXP). This well-known advisory transitive BGP
community, namely BLACKHOLE, allows an origin AS to specify that a
neighboring IP network or IXP should blackhole a specific IP prefix.
"Multi-Threaded Routing Toolkit (MRT) Routing Information Export Format
with BGP Additional Paths Extensions", Colin Petrie, Thomas King,
2016-01-11, <draft-ietf-grow-mrt-add-paths-00.txt>
This document updates the Multi-threaded Routing Toolkit (MRT) export
format for Border Gateway Protocol (BGP) routing information by
extending it to support the Advertisement of Multiple Paths in BGP
extensions.
Host Identity Protocol (hip)
---------------------------"Host Identity Protocol (HIP) Registration Extension", Julien Laganier,
Lars Eggert, 2016-01-31, <draft-ietf-hip-rfc5203-bis-10.txt>
This document specifies a registration mechanism for the Host
Identity Protocol (HIP) that allows hosts to register with services,
such as HIP rendezvous servers or middleboxes. This document
obsoletes RFC5203.
"Host Identity Protocol (HIP) Rendezvous Extension", Julien Laganier,
Lars Eggert, 2015-12-17, <draft-ietf-hip-rfc5204-bis-07.txt>
This document defines a rendezvous extension for the Host Identity
Protocol (HIP). The rendezvous extension extends HIP and the HIP
registration extension for initiating communication between HIP nodes
via HIP rendezvous servers. Rendezvous servers improve reachability
and operation when HIP nodes are multi-homed or mobile. This
document obsoletes RFC5204.
"Host Identity Protocol Architecture", Robert Moskowitz, Miika Komu,
2015-12-14, <draft-ietf-hip-rfc4423-bis-13.txt>
This memo describes a new namespace, the Host Identity namespace, and
a new protocol layer, the Host Identity Protocol, between the
internetworking and transport layers. Herein are presented the
basics of the current namespaces, their strengths and weaknesses, and
how a new namespace will add completeness to them. The roles of this
new namespace in the protocols are defined.
This document obsoletes RFC 4423 and addresses the concerns raised by
the IESG, particularly that of crypto agility. It incorporates
lessons learned from the implementations of RFC 5201 and goes further
to explain how HIP works as a secure signaling channel.
"Host Identity Protocol (HIP) Domain Name System (DNS) Extension",
Julien Laganier, 2016-01-31, <draft-ietf-hip-rfc5205-bis-09.txt>
This document specifies a new resource record (RR) for the Domain
Name System (DNS), and how to use it with the Host Identity Protocol
(HIP). This RR allows a HIP node to store in the DNS its Host
Identity (HI, the public component of the node public-private key
pair), Host Identity Tag (HIT, a truncated hash of its public key),
and the Domain Names of its rendezvous servers (RVSs). This document
obsoletes RFC5205.
"Host Mobility with the Host Identity Protocol", Thomas Henderson,
Christian Vogt, Jari Arkko, 2016-05-05,
<draft-ietf-hip-rfc5206-bis-11.txt>
This document defines mobility extensions to the Host Identity
Protocol (HIP). Specifically, this document defines a general
"LOCATOR_SET" parameter for HIP messages that allows for a HIP host
to notify peers about alternate addresses at which it may be reached.
This document also defines elements of procedure for mobility of a
HIP host -- the process by which a host dynamically changes the
primary locator that it uses to receive packets. While the same
LOCATOR_SET parameter can also be used to support end-host
multihoming, detailed procedures are out of scope for this document.
This document obsoletes RFC 5206.
"Native NAT Traversal Mode for the Host Identity Protocol", Ari Keranen,
Jan Melen, 2016-01-19, <draft-ietf-hip-native-nat-traversal-10.txt>
This document specifies a new Network Address Translator (NAT)
traversal mode for the Host Identity Protocol (HIP). The new mode is
based on the Interactive Connectivity Establishment (ICE) methodology
and UDP encapsulation of data and signaling traffic. The main
difference from the previously specified modes is the use of HIP
messages for all NAT traversal procedures.
"Host Multihoming with the Host Identity Protocol", Thomas Henderson,
Christian Vogt, Jari Arkko, 2016-04-07,
<draft-ietf-hip-multihoming-08.txt>
This document defines host multihoming extensions to the Host
Identity Protocol (HIP), by leveraging protocol components defined
for host mobility.
"Host Identity Protocol Certificates", Tobias Heer, Samu Varjonen,
2016-04-22, <draft-ietf-hip-rfc6253-bis-08.txt>
The Certificate (CERT) parameter is a container for digital
certificates. It is used for carrying these certificates in Host
Identity Protocol (HIP) control packets. This document specifies the
certificate parameter and the error signaling in case of a failed
verification. Additionally, this document specifies the
representations of Host Identity Tags in X.509 version 3 (v3).
The concrete use cases of certificates, including how certificates
are obtained, requested, and which actions are taken upon successful
or failed verification, are specific to the scenario in which the
certificates are used. Hence, the definition of these scenariospecific aspects is left to the documents that use the CERT
parameter.
This document updates RFC7401 and obsoletes RFC6253.
"HIP Diet EXchange (DEX)", Robert Moskowitz, Rene Hummen, 2016-03-21,
<draft-ietf-hip-dex-02.txt>
This document specifies the Host Identity Protocol Diet EXchange (HIP
DEX), a variant of the Host Identity Protocol Version 2 (HIPv2). The
HIP DEX protocol design aims at reducing the overhead of the employed
cryptographic primitives by omitting public-key signatures and hash
functions. In doing so, the main goal is to still deliver similar
security properties to HIPv2.
The HIP DEX protocol is primarily designed for computation or memoryconstrained sensor/actuator devices. Like HIPv2, it is expected to
be used together with a suitable security protocol such as the
Encapsulated Security Payload (ESP) for the protection of upper layer
2015-12-11, <draft-ietf-i2rs-yang-l3-topology-01.txt>
This document defines a YANG data model for layer 3 network
topologies.
"I2RS Ephemeral State Requirements", Jeffrey Haas, Susan Hares,
2016-05-05, <draft-ietf-i2rs-ephemeral-state-06.txt,.pdf>
This document covers requests to the netmod and netconf Working
Groups for functionality to support the ephemeral state requirements
to implement the I2RS architecture.
"I2RS Security Related Requirements", Susan Hares, Daniel Migault, Joel
Halpern, 2016-05-05,
<draft-ietf-i2rs-protocol-security-requirements-04.txt,.pdf>
This presents security-related requirements for the I2RS protocol for
mutual authentication, transport protocols, data transfer and
transactions.
"I2RS Environment Security Requirements", Daniel Migault, Joel Halpern,
Susan Hares, 2016-04-04,
<draft-ietf-i2rs-security-environment-reqs-01.txt>
This document provides environment security requirements for the I2RS
architecture. Environment security requirements are independent of
the protocol used for I2RS. As a result, the requirements provided
in this document are intended to provide good security practise so
I2RS can be securely deployed and operated.
These security requirements are designated as environment security
requirements as opposed to the protocol security requirements. The
reason to have separate document is that protocol security
requirements are intended to help the design of the I2RS protocol
whether the environment requirements are rather intended for
deployment or implementations.
"Filter-Based RIB Data Model", Susan Hares, Sriganesh Kini, Linda
Dunbar, Ram (Ramki) Krishnan, Dean Bogdanovic, Russ White, 2016-03-21,
<draft-hares-i2rs-fb-rib-data-model-03.txt,.pdf>
This document defines a data model to support the Filter-based
Routing Information Base (RIB) Yang data models for I2RS. A routing
system uses the Filter-based RIB to program FIB entries that process
incoming packets by matching on multiple fields within the packet and
then performing a specified action on it. The FB-RIB can also
specify an action to forward the packet according to the FIB entries
programmed using the RIBs of its routing instance.
"Filter-Based Packet Forwarding ECA Policy", Susan Hares, Qin Wu, Russ
White, 2016-02-09, <draft-hares-i2rs-pkt-eca-data-model-02.txt>
This document describes the yang data model for packet forwarding
policy that filters received packets and forwards (or drops) the
packets. Prior to forwarding the packets out other interfaces, some
of the fields in the packets may be modified. If one considers the
packet reception an event, this packet policy is a minimalistic
Event-Match Condition-Action policy. This policy controls forwarding
of packets received by a routing device on one or more interfaces on
which this policy is enabled. The policy is composed of an ordered
action entries.
This document defines a new encoding which will enhance and simplify
what can be accomplished today with the use of BGP communities. The
most important addition this specification makes over currently
defined BGP communities is the ability to specify, carry as well as
use for execution an operator's defined set of parameters. It also
provides an extensible platform for any new community encoding needs
in the future.
"Registered Wide BGP Community Values", Robert Raszuk, Jeffrey Haas,
2015-11-22, <draft-ietf-idr-registered-wide-bgp-communities-01.txt>
Communicating various routing policies via route tagging plays an
important role in external BGP peering relations. The most common
tool used today to attach various information about routes is
realized with the use of BGP communities. Such information is
important for the peering AS to perform some mutually agreed actions
without the need to maintain a separate offline database for each
pair of prefix and an associated with it requested set of action
entries.
This document proposes to establish a new IANA maintained registry of
most commonly used Wide BGP Communities by network operators. Such
public registry will allow for easy refernece and clear
interpretation of the actions associated with received community
values.
"Carrying Label Information for BGP FlowSpec", LQD, Susan Hares, Jianjie
You, Robert Raszuk, danma@cisco.com, 2016-03-21,
<draft-liang-idr-bgp-flowspec-label-02.txt>
This document specifies a method in which the label mapping
information for a particular FlowSpec rule is piggybacked in the same
Border Gateway Protocol (BGP) Update message that is used to
distribute the FlowSpec rule. Based on the proposed method, the
Label Switching Routers (LSRs) (except the ingress LSR) on the Label
Switched Path (LSP) can use label to indentify the traffic matching a
particular FlowSpec rule; this facilitates monitoring and traffic
statistics for FlowSpec rules.
"Dissemination of Flow Specification Rules for NVO3", Hao Weiguo,
Shunwan Zhuang, Zhenbin Li, Rong Gu, 2015-12-17,
<draft-hao-idr-flowspec-nvo3-03.txt>
This draft proposes a new subset of component types to support the
NVO3 flow-spec application.
"BGP Model for Service Provider Networks", Anees Shaikh, Rob Shakir,
Keyur Patel, Susan Hares, Kevin D'Souza, Deepak Bansal, Alex Clemm,
Alex, Mahesh Jethanandani, Xufeng Liu, 2016-01-07,
<draft-ietf-idr-bgp-model-01.txt>
This document defines a YANG data model for configuring and managing
BGP, including protocol, policy, and operational aspects based on
data center, carrier and content provider operational requirements.
"Methods for Detection and Mitigation of BGP Route Leaks", Kotikalapudi
Sriram, Doug Montgomery, Brian Dickson, Keyur Patel, Andrei Robachevsky,
2016-03-14, <draft-ietf-idr-route-leak-detection-mitigation-02.txt>
"An Information Model for Basic Network Policy and Filter Rules", Susan
Hares, 2016-03-05, <draft-hares-idr-flowspec-combo-01.txt,.pdf>
BGP flow specification (RFC5575) describes the distribution policy
that contains filters and actions that apply when packets are
received on a router with the flow specification function turned on.
The popularity of these flow specification filters in deployment for
DoS and SDN/NFV has led to the requirement for more BGP flow
specification match filters in the NLRI and more BGP flow
specification actions. Two solutions exist for adding new filters:
1) expanding the BGP Flow Specification version 1 (NLRI match filters
and extended communities actions) to included limited number of
filters and actions, and 2) creating a BGP Flow Specification version
2 that allows for ordering filters and actions (using new NLRI and
wide-communities for actions). The two solutions can exist in
parallel.
This document contains an overview existing proposals for expansion
of BGP flow specification policy, proposals for BGP Flow
Specification v1 and a new BGP Flow specification version 2 that
supports order of filters and actions plus allowing more actions.
This document also provides rules for the interaction of IDR Flow
Specification policy (session ephemeral policy) with policy found in
I2RS (reboot ephemeral policy), and policy found in ACLs and Policy
routing (configuration policy). This document does not contain the
individual definitions of policy rule conditions or actions.
"BGP Flow Specification Filter for MPLS Label", Lucy Yong, Susan Hares,
LQD, Jianjie You, 2016-03-21,
<draft-yong-idr-flowspec-mpls-match-00.txt,.pdf>
This draft proposes BGP flow specification rules that are used to
filter MPLS labeled packets.
"BGP FlowSpec Redirect to Generalized Segment ID Action", Zhenbin Li,
Shunwan Zhuang, Nan Wu, 2016-03-21,
<draft-li-idr-flowspec-redirect-generalized-sid-00.txt>
This document defines a new type of the redirect extended community,
called as Redirect to Generalized Segment ID Extended Community.
When activated, the Redirect to Generalized Segment ID Extended
Community is used by BGP FlowSpec Controller to signal the specific
redirecting action to BGP Flowspec Client, and then the BGP Flowspec
Client will use the Generalized Segment ID and the Segment Type to
find a local forwarding entity in a local mapping table.
IMAP APPEND Extensions (imapapnd)
--------------------------------"The IMAP APPENDLIMIT Extension", Jay, Narendra Bisht, 2016-01-08,
<draft-ietf-imapapnd-appendlimit-extension-10.txt>
This document defines an extension to the IMAP service whereby a
server can inform the client about maximum message upload sizes,
allowing the client to avoid sending APPEND commands that will fail
because the messages are too large.
"IMAP4 non-synchronizing literals", Alexey Melnikov, 2016-03-06,
<draft-ietf-imapapnd-rfc2088bis-04.txt>
<draft-ietf-isis-remaining-lifetime-01.txt>
Corruption of the Remainining Lifetime Field in a Link State PDU can
go undetected. In certain scenarios this may cause or exacerbate
flooding storms. It is also a possible denial of service attack
vector. This document defines a backwards compatible solution to
this problem.
"IS-IS Extensions for Advertising Router Info", Les Ginsberg, Stefano
Previdi, Mach Chen, 2016-04-13, <draft-ietf-isis-rfc4971bis-01.txt>
This document defines a new optional Intermediate System to
Intermediate System (IS-IS) TLV named CAPABILITY, formed of multiple
sub-TLVs, which allows a router to announce its capabilities within
an IS-IS level or the entire routing domain.
"Advertising L2 Bundle Member Link Attributes in IS-IS", Les Ginsberg,
Jerome Marcon, Clarence Filsfils, Stefano Previdi, Mohan Nanduri, exa,
2016-02-22, <draft-ietf-isis-l2bundles-01.txt>
There are deployments where the Layer 3 interface on which IS-IS
operates is a Layer 2 interface bundle. Existing IS-IS
advertisements only support advertising link attributes of the Layer
3 interface. If entities external to IS-IS wish to control traffic
flows on the individual physical links which comprise the Layer 2
interface bundle link attribute information about the bundle members
is required.
This document introduces the ability for IS-IS to advertise the link
attributes of layer 2 (L2) bundle members.
Javascript Object Signing and Encryption (jose)
----------------------------------------------"CFRG ECDH and signatures in JOSE", Ilari Liusvaara, 2016-03-21,
<draft-ietf-jose-cfrg-curves-01.txt>
This document defines how to use Diffie-Hellman algorithms "X25519"
and "X448" as well as signature algorithms "Ed25519" and "Ed448" from
IRTF CFRG elliptic curves work in JOSE.
Font Top Level Media Type (justfont)
-----------------------------------"The font Top Level Type", Chris Lilley, 2016-05-03,
<draft-ietf-justfont-toplevel-02.txt>
This memo serves to register and document the "font" Top Level Type,
under which the Internet Media subtypes for representation formats
for fonts may be registered. This document also serves as a
registration application for a set of intended subtypes, which are
representative of some existing subtypes already in use, and
currently registered under the "application" tree by their separate
registrations.
Common Authentication Technology Next Generation (kitten)
--------------------------------------------------------"AES Encryption with HMAC-SHA2 for Kerberos 5", Michael Jenkins, Michael
Peck, Kelley Burgin, 2016-01-26,
<draft-ietf-kitten-aes-cts-hmac-sha2-09.txt>
This document specifies two encryption types and two corresponding
checksum types for Kerberos 5. The new types use AES in CTS mode
(CBC mode with ciphertext stealing) for confidentiality and HMAC with
a SHA-2 hash for integrity.
"Generic Security Service API Version 2: Java Bindings Update", Mayank
Upadhyay, Seema Malkani, Wang Weijun, 2016-04-06,
<draft-ietf-kitten-rfc5653bis-03.txt>
The Generic Security Services Application Program Interface (GSS-API)
offers application programmers uniform access to security services
atop a variety of underlying cryptographic mechanisms. This document
updates the Java bindings for the GSS-API that are specified in
"Generic Security Service API Version 2 : Java Bindings Update" (RFC
5653). This document obsoletes RFC 5653 by adding a new output token
field to the GSSException class so that when the initSecContext or
acceptSecContext methods of the GSSContext class fails it has a
chance to emit an error token which can be sent to the peer for
debugging or informational purpose. The stream-based GSSContext
methods are also removed in this version.
The GSS-API is described at a language-independent conceptual level
in "Generic Security Service Application Program Interface Version 2,
Update 1" (RFC 2743). The GSS-API allows a caller application to
authenticate a principal identity, to delegate rights to a peer, and
to apply security services such as confidentiality and integrity on a
per-message basis. Examples of security mechanisms defined for GSSAPI are "The Simple Public-Key GSS-API Mechanism" (RFC 2025) and "The
Kerberos Version 5 Generic Security Service Application Program
Interface (GSS-API) Mechanism: Version 2" (RFC 4121).
"Public Key Cryptography for Initial Authentication in Kerberos (PKINIT)
Freshness Extension", Michiko Short, Seth Moore, Paul Miller,
2016-04-08, <draft-ietf-kitten-pkinit-freshness-06.txt,.pdf>
This document describes how to further extend the Public Key
Cryptography for Initial Authentication in Kerberos (PKINIT)
extension [RFC4556] to exchange an opaque data blob that a KDC can
validate to ensure that the client is currently in possession of the
private key during a PKINIT AS exchange.
Layer Two Tunneling Protocol Extensions (l2tpext)
------------------------------------------------"Keyed IPv6 Tunnel", Maciek Konstantynowicz, Giles Heron, Rainer
Schatzmayr, Wim Henderickx, 2016-03-21,
<draft-ietf-l2tpext-keyed-ipv6-tunnel-06.txt>
This document describes a simple L2 Ethernet over IPv6 tunnel
encapsulation with mandatory 64-bit cookie for connecting L2 Ethernet
attachment circuits identified by IPv6 addresses. The encapsulation
is based on L2TPv3 over IP.
"Advertising Seamless Bidirectional Forwarding Detection (S-BFD)
Discriminators in Layer Two Tunneling Protocol, Version 3 (L2TPv3)",
Vengada Govindan, Carlos Pignataro, 2016-04-15,
<draft-ietf-l2tpext-sbfd-discriminator-05.txt>
This document defines a new Attribute Value Pair (AVP) that allows
L2TP Control Connection Endpoints (LCCEs) to advertise one or more
Seamless Bidirectional Forwarding Detection (S-BFD) Discriminator
values using the Layer Two Tunneling Protocol, Version 3 (L2TPv3).
"A YANG Data Model for Keyed IPv6 Tunnels", Qi Sun, Ian Farrer, Bing
Liu, Giles Heron, 2016-03-21,
<draft-ietf-l2tpext-keyed-v6-tunnel-yang-01.txt>
This document
management of
configuration
IPv6 tunnels,
descriptions ("m=" lines) represent RTP sessions and are thus carried
over individual underlying transport layer flows. For scenarios
where SDP is used to negotiate the usage of single 5-tuple for
sending and receiving media associated with multiple media
descriptions, it is required to understand the semantic implications
of the SDP attributes associated with the RTP Media Streams
multiplexed over a single underlying transport layer flow.
The purpose of this specification is to provide a framework for
analyzing the multiplexing characteristics of SDP attributes. This
specification also categorizes the existing SDP attributes based on
the framework described herein.
"Using Simulcast in SDP and RTP Sessions", Bo Burman, Magnus Westerlund,
Suhas Nandakumar, Mo Zanaty, 2016-02-03,
<draft-ietf-mmusic-sdp-simulcast-04.txt>
In some application scenarios it may be desirable to send multiple
differently encoded versions of the same media source in different
RTP streams. This is called simulcast. This document describes how
to accomplish simulcast in RTP and how to signal it in SDP. The
described solution uses an RTP/RTCP identification method to identify
RTP streams belonging to the same media source, and makes an
extension to SDP to relate those RTP streams as being different
simulcast formats of that media source. The SDP extension consists
of a new media level SDP attribute that expresses capability to send
and/or receive simulcast RTP streams.
"SDP-based Data Channel Negotiation", Keith Drage, Maridi Makaraju,
Juergen Stoetzer-Bradler, Richard Ejzak, Jerome Marcon, 2016-02-17,
<draft-ietf-mmusic-data-channel-sdpneg-08.txt>
The Real-Time Communication in WEB-browsers (RTCWeb) working group is
charged to provide protocols to support direct interactive rich
communications using audio, video, and data between two peers' webbrowsers. For the support of data communication, the RTCWeb working
group has in particular defined the concept of bi-directional data
channels over SCTP (Stream Control Transmission Protocol), where each
data channel might be used to transport other protocols, called
subprotocols. Data channel setup can be done using either the inband Data Channel Establishment Protocol (DCEP) or using some out-ofband non-DCEP protocol. This document specifies how the SDP (Session
Description Protocol) offer/answer exchange can be used to achieve
such an out-of-band non-DCEP negotiation. Even though data channels
are designed for RTCWeb use initially, they may be used by other
protocols like, but not limited to, the CLUE protocol (which is
defined by the IETF "ControLling mUltiple streams for tElepresence"
working group). This document is intended to be used wherever data
channels are used.
"MSRP over Data Channels", Keith Drage, Maridi Makaraju, Juergen
Stoetzer-Bradler, Richard Ejzak, Jerome Marcon, 2016-02-12,
<draft-ietf-mmusic-msrp-usage-data-channel-04.txt>
This document specifies how the Message Session Relay Protocol (MSRP)
can be instantiated as a data channel sub-protocol, using the SDP
offer/answer exchange-based generic data channel negotiation
framework. Two network configurations are documented: a WebRTC endto-end configuration (connecting two MSRP over data channel
endpoints), and a gateway configuration (connecting an MSRP over data
"Entropy labels for source routed tunnels with label stacks", Sriganesh
Kini, Kireeti Kompella, Siva Sivabalan, Stephane Litkowski, Rob Shakir,
jefftant@gmail.com, 2016-04-07,
<draft-ietf-mpls-spring-entropy-label-03.txt>
Source routed tunnels with label stacking is a technique that can be
leveraged to provide a method to steer a packet through a controlled
set of segments. This can be applied to the Multi Protocol Label
Switching (MPLS) data plane. Entropy label (EL) is a technique used
in MPLS to improve load balancing. This document examines and
describes how ELs are to be applied to source routed tunnels with
label stacks.
"Opportunistic Security in MPLS Networks", Adrian Farrel, Stephen
Farrell, 2016-03-15, <draft-ietf-mpls-opportunistic-encrypt-01.txt>
This document describes a way to apply opportunistic security between
adjacent nodes on an MPLS Label Switched Path (LSP) or between end
points of an LSP. It explains how keys may be agreed to enable
encryption, and how key identifiers are exchanged in encrypted MPLS
packets. Finally, this document describes the applicability of this
approach to opportunistic security in MPLS networks with an
indication of the level of improved security as well as the continued
vulnerabilities.
This document does not describe security for MPLS control plane
protocols.
"Residence Time Measurement in MPLS network", Greg Mirsky, Stefano
Ruffini, Eric Gray, John Drake, Stewart Bryant, Sasha, 2016-04-28,
<draft-ietf-mpls-residence-time-09.txt>
This document specifies G-ACh based Residence Time Measurement and
how it can be used by time synchronization protocols being
transported over MPLS domain.
Residence time is the variable part of propagation delay of timing
and synchronization messages and knowing what this delay is for each
message allows for a more accurate determination of the delay to be
taken into account in applying the value included in a PTP event
message.
"Bidirectional Forwarding Detection (BFD) Directed Return Path", Greg
Mirsky, Jeff Tantsura, Ilya Varlashkin, Mach Chen, 2016-03-02,
<draft-ietf-mpls-bfd-directed-02.txt>
Bidirectional Forwarding Detection (BFD) is expected to monitor bidirectional paths. When a BFD session monitors an explicit routed
path there is a need to be able to direct egress BFD peer to use
specific path for the reverse direction of the BFD session.
"MPLS-TP Shared-Ring protection (MSRP) mechanism for ring topology",
Weiqiang Cheng, Lei Wang, Han Li, Huub van Helvoort, Kai Liu, Jie Dong,
He Jia, Fang Li, Yang Jian, Junfang Wang, 2016-03-21,
<draft-ietf-mpls-tp-shared-ring-protection-01.txt>
This document describes requirements, architecture and solutions for
MPLS-TP Shared Ring Protection (MSRP) in the ring topology for pointto-point (P2P) services. The mechanism of MSRP is illustrated and
how it satisfies the requirements for optimized ring protection in
RFC 5654 is analyzed. This document also defines the Ring Protection
Switch (RPS) Protocol which is used to coordinate the protection
behavior of the nodes on MPLS ring.
"A YANG Data Model for MPLS Base and Static LSPs", Kamran Raza, Rakesh
Gandhi, Xufeng Liu, Vishnu Pavan Beeram, Tarek Saad, Xia Chen, Raqib
Jones, Bin Wen, 2016-03-21, <draft-saad-mpls-static-yang-02.txt>
This document contains a specification of two YANG modules, the MPLS
base, and Static LSP YANG modules. The MPLS base YANG module serves
as a base framework for configuring and managing an MPLS switching
subsystem. The MPLS Static LSP module augments the MPLS base YANG
module with specific data to configure and manage MPLS Static LSP(s).
It is expected that other MPLS YANG modules for MPLS technology YANG
modules (e.g. MPLS LDP or MPLS RSVP-TE) will also augment the MPLS
YANG base model.
"Resilient MPLS Rings", Kireeti Kompella, Luis Contreras, 2016-03-21,
<draft-ietf-mpls-rmr-01.txt>
This document describes the use of the MPLS control and data planes
on ring topologies. It describes the special nature of rings, and
proceeds to show how MPLS can be effectively used in such topologies.
It describes how MPLS rings are configured, auto-discovered and
signaled, as well as how the data plane works. Companion documents
describe the details of discovery and signaling for specific
protocols.
"MPLS Flow Identification Considerations", Stewart Bryant, Carlos
Pignataro, Mach Chen, Zhenbin Li, Greg Mirsky, 2015-12-18,
<draft-ietf-mpls-flow-ident-00.txt>
This memo discusses the desired capabilities for MPLS flow
identification. The key application that needs this is in-band
performance monitoring of user data packets.
"Detecting Multi-Protocol Label Switched (MPLS) Data Plane Failures",
Kireeti Kompella, Carlos Pignataro, Nagendra Kumar, Sam Aldrin, Mach
Chen, 2016-04-30, <draft-ietf-mpls-rfc4379bis-04.txt>
This document describes a simple and efficient mechanism that can be
used to detect data plane failures in Multi-Protocol Label Switching
(MPLS) Label Switched Paths (LSPs). There are two parts to this
document: information carried in an MPLS "echo request" and "echo
reply" for the purposes of fault detection and isolation, and
mechanisms for reliably sending the echo reply.
This document obsoletes RFCs 4379 and 6829.
"Definitions of Managed Objects for the LDP Point-to-Multipoint and
Multipoint-to-Multipoint Label Switched Paths", Kishore Tiruveedhula,
Uwe Joorde, Arvind Venkateswaran, 2016-01-08,
<draft-ietf-mpls-mldp-mib-00.txt>
This memo defines a portion of the Management Information Base (MIB)
for use with network management protocols. In particular it defines
objects for managing multicast LDP point-to-multipoint (P2MP) and
multipoint-to-multipoint (MP2MP) Label Switched Paths. The MIB
module defined in this document is extension of LDP MIB defined in
RFC3815 which supports only for LDP point-to-point LSPs.
"Network Access Control List (ACL) YANG Data Model", Dean Bogdanovic,
Kiran Koushik, Lisa Huang, Dana Blair, 2016-03-11,
<draft-ietf-netmod-acl-model-07.txt>
This document describes a data model of Access Control List (ACL)
basic building blocks.
"Defining and Using Metadata with YANG", Ladislav Lhotka, 2016-03-21,
<draft-ietf-netmod-yang-metadata-07.txt>
This document defines a YANG extension statement that allows for
defining metadata annotations in YANG modules. The document also
specifies XML and JSON encoding of annotations and other rules for
annotating instances of YANG data nodes.
"Terminology and Requirements for Enhanced Handling of Operational
State", Kent Watsen, Tom Nadeau, 2016-01-22,
<draft-ietf-netmod-opstate-reqs-04.txt>
This document primarily regards the difference between the intended
configuration and the applied configuration of a device and how
intended and applied configuration relate to the operational state of
a device. This document defines requirements for the applied
configuration's data model and its values, as well as for enabling a
client to know when a configuration has been fully applied or not,
how to access operational state, and how to relate intended
configuration nodes to applied configuration and derived state nodes.
"YANG Model Classification", Dean Bogdanovic, Benoit Claise, Carl
Moberg, 2016-04-04, <draft-ietf-netmod-yang-model-classification-01.txt>
The YANG [RFC6020] data modeling language is currently being
considered for a wide variety of applications throughout the
networking industry at large. Many standards-defining organizations
(SDOs), open source software projects, vendors and users are using
YANG to develop and publish models of configuration, state data and
operations for a wide variety of applications. At the same time,
there is currently no well-known terminology to categorize various
types of YANG models.
A consistent terminology would help with the categorization of
models, assist in the analysis the YANG data modeling efforts in the
IETF and other organizations, and bring clarity to the YANG-related
discussions between the different groups.
This document describes a set of concepts and associated terms to
support consistent classification of YANG models.
"YANG Schema Mount", Martin Bjorklund, Ladislav Lhotka, 2016-04-05,
<draft-ietf-netmod-schema-mount-01.txt>
This document defines a mechanism to combine YANG modules into the
schema defined in other YANG modules.
"Common Interface Extension YANG Data Models", Robert Wilton, David
Ball, Tapraj Singh, Selvakumar Sivaraj, 2016-04-21,
<draft-ietf-netmod-intf-ext-yang-00.txt>
This document defines two YANG modules that augment the Interfaces
data model defined in the "YANG Data Model for Interface Management"
<draft-dreibholz-ipv4-flowlabel-23.txt>
This draft defines an IPv4 option containing a flowlabel that is
compatible to IPv6. It is required for simplified usage of IntServ
and interoperability with IPv6.
"EAP Support in Smartcard", Pascal Urien, Guy Pujolle, 2015-12-21,
<draft-urien-eap-smartcard-30.txt>
This document describes the functional interface, based on the
ISO7816 standard, to EAP methods, fully and securely executed in
smart cards. This class of tamper resistant device may deliver
client or server services; it can compute Root Keys from an Extended
Master Session Key (EMSK).
"Prepaid Extensions to Remote Authentication Dial-In User Service
(RADIUS)", Avi Lior, Parviz Yegani, Kuntal Chowdhury, Hannes Tschofenig,
Andreas Pashalidis, 2013-02-25,
<draft-lior-radius-prepaid-extensions-22.txt>
This document specifies an extension to the Remote Authentication
Dial-In User Service (RADIUS) protocol that enables service providers
to charge for prepaid services. The supported charging models
supported are volume-based, duration-based, and based on one-time
events.
"Applicability of Reliable Server Pooling for Real-Time Distributed
Computing", Thomas Dreibholz, 2016-01-08,
<draft-dreibholz-rserpool-applic-distcomp-20.txt>
This document describes the applicability of the Reliable Server
Pooling architecture to manage real-time distributed computing pools
and access the resources of such pools.
"Secure SCTP", Carsten Hohendorf, Esbold Unurkhaan, Thomas Dreibholz,
2016-01-08, <draft-hohendorf-secure-sctp-21.txt>
This document explains the reason for the integration of security
functionality into SCTP, and gives a short description of S-SCTP and
its services. S-SCTP is fully compatible with SCTP defined in
RFC4960, it is designed to integrate cryptographic functions into
SCTP.
"Applicability of Reliable Server Pooling for SCTP-Based Endpoint
Mobility", Thomas Dreibholz, Jobin Pulinthanath, 2016-01-08,
<draft-dreibholz-rserpool-applic-mobility-19.txt>
This document describes a novel mobility concept based on a
combination of SCTP with Dynamic Address Reconfiguration extension
and Reliable Server Pooling (RSerPool).
"Reliable Server Pooling (RSerPool) Bakeoff Scoring", Thomas Dreibholz,
Michael Tuexen, 2016-01-08, <draft-dreibholz-rserpool-score-18.txt>
This memo describes some of the scoring to be used in the testing of
Reliable Server Pooling protocols ASAP and ENRP at upcoming bakeoffs.
"Handle Resolution Option for ASAP", Thomas Dreibholz, 2016-01-08,
<draft-dreibholz-rserpool-asap-hropt-18.txt>
This document describes the Handle Resolution option for the ASAP
protocol.
"Definition of a Delay Measurement Infrastructure and Delay-Sensitive
Least-Used Policy for Reliable Server Pooling", Thomas Dreibholz, Xing
Zhou, 2016-01-08, <draft-dreibholz-rserpool-delay-17.txt>
This document contains the definition of a delay measurement
infrastructure and a delay-sensitive Least-Used policy for Reliable
Server Pooling.
"Extensions for Multi-MTU Subnets", Iljitsch van Beijnum, 2016-03-21,
<draft-van-beijnum-multi-mtu-05.txt>
In the early days of the internet, many different link types with
many different maximum packet sizes were in use. For point-to-point
or point-to-multipoint links, there are still some other link types
(PPP, ATM, Packet over SONET), but multipoint subnets are now almost
exclusively implemented as Ethernets. Even though the relevant
standards mandate a 1500 byte maximum packet size for Ethernet, more
and more Ethernet equipment is capable of handling packets bigger
than 1500 bytes. However, since this capability isn't standardized,
it is seldom used today, despite the potential performance benefits
of using larger packets. This document specifies mechanisms to
negotiate per-neighbor maximum packet sizes so that nodes on a
multipoint subnet may use the maximum mutually supported packet size
between them without being limited by nodes with smaller maximum
sizes on the same subnet.
"Saratoga: A Scalable Data Transfer Protocol", Lloyd Wood, Wesley Eddy,
Charles Smith, Will Ivancic, Chris Jackson, 2016-05-03,
<draft-wood-tsvwg-saratoga-19.txt>
This document specifies the Saratoga transfer protocol. Saratoga was
originally developed to transfer remote-sensing imagery efficiently
from a low-Earth-orbiting satellite constellation, but is useful in
many other scenarios, including ad-hoc peer-to-peer communications,
large-scale scientific sensing, and grid computing. Saratoga is a
simple, lightweight, content dissemination protocol that builds on
UDP, and optionally uses UDP-Lite. Saratoga is intended for use when
moving files or streaming data between peers which may have
permanent, sporadic or intermittent connectivity, and is capable of
transferring very large amounts of data reliably under adverse
conditions. The Saratoga protocol is designed to cope with highly
asymmetric link or path capacity between peers, and can support
fully-unidirectional data transfer if required. Saratoga can also
cope with very large files for exascale computing. In scenarios with
dedicated links, Saratoga focuses on high link utilization to make
the most of limited connectivity times, while standard congestion
control mechanisms can be implemented for operation over shared
links. Loss recovery is implemented via a simple negative-ack ARQ
mechanism. The protocol specified in this document is considered to
be appropriate for experimental use on private IP networks.
"The BagIt File Packaging Format (V0.97)", John Kunze, Justin Littman,
Liz Madden, Ed Summers, Andy Boyko, Brian Vargas, 2016-01-26,
<draft-kunze-bagit-13.txt>
This document specifies BagIt, a hierarchical file packaging format
for storage and transfer of arbitrary digital content. A "bag" has
"LISP Mobile Node", Dino Farinacci, Darrel Lewis, David Meyer, Chris
White, 2016-01-07, <draft-meyer-lisp-mn-14.txt>
This document describes how a lightweight version of LISP's ITR/ETR
functionality can be used to provide seamless mobility to a mobile
node. The LISP Mobile Node design described in this document uses
standard LISP functionality to provide scalable mobility for LISP
mobile nodes.
"Revised IAOC Membership", John Klensin, 2016-02-12,
<draft-klensin-iaoc-member-01.txt>
The original specification of the membership of the IAOC included the
IETF and IAB Chairs as voting members. While probably desirable
initially, this has turned out to have unfortunate side effects.
This document discusses those side effects and replaces those
specific individuals with liaisons from the IAB and IESG.
"A Uniform Resource Name (URN) Namespace for Sources of Law (LEX)",
PierLuigi Spinosa, Enrico Francesconi, Caterina Lupo, 2014-03-20,
<draft-spinosa-urn-lex-09.txt>
This document describes a Uniform Resource Name (URN) Namespace
Identification (NID) convention as prescribed by the World Wide Web
Consortium (W3C) for identifying, naming, assigning, and managing
persistent resources in the legal domain.
"Network News Transfer Protocol (NNTP) Extension for Compression",
Kenneth Murchison, 2015-11-12, <draft-murchison-nntp-compress-02.txt>
This memo defines an extension to the Network News Transport Protocol
(NNTP) to allow a connection to be effectively and efficiently
compressed.
"Management Information Base for the Group Domain of Interpretation",
Yogesh Sharma, Rohini Kamath, Amjad Inamdar, 2016-04-13,
<draft-kamarthy-gdoi-mib-01.txt>
This memo defines a portion of the Management Information Base (MIB)
for use with network management protocols. In particular this
document describes a high-level Management Information Base for Group
Domain of Interpretation (GDOI), which is used for secure group
communication in Ipsec-based networks. This draft describes managed
objects used for implementations of the GDOI protocol.
"HIP-based Virtual Private LAN Service (HIPLS)", Thomas Henderson,
Steven Venema, David Mattes, 2016-01-31,
<draft-henderson-hip-vpls-10.txt>
The Host Identity Protocol (HIP) and architecture adds a
cryptographic name space to name Internet hosts. This draft
describes a use case of the HIP architecture, which is to provide a
HIP-enabled virtual private LAN service (VPLS) over an untrusted
network. In this case, HIP is used to secure tunnels between the
provider edge (PE) equipment.
"Group Key Management using IKEv2", Brian Weis, Yoav Nir, Valery
Smyslov, 2016-03-21, <draft-yeung-g-ikev2-10.txt>
"Congestion control for the Saratoga protocol", Lloyd Wood, Wesley Eddy,
Will Ivancic, 2016-05-03,
<draft-wood-tsvwg-saratoga-congestion-control-09.txt>
Saratoga is a data transfer protocol designed to carry potentially
large volumes of data over difficult network paths, often including
only a single high-rate link and only one application flow. As the
requirements for use vary across deployment environments, the base
Saratoga specification only assumes that an implementation will be
able to clock packets out at a configurable rate, and beyond this
specifies no inherent or particular congestion-control behaviour.
The design of Saratoga deliberately supports the integration of
congestion-control algorithms without modification to the base
protocol. This document describes how congestion control can be
supported in the Saratoga transfer protocol. Saratoga is intended
for use in private networks, where its use is engineered as a single
flow to fill a link. However, as Saratoga is implemented over UDP,
it can be multiplexed, and can be run across the public Internet, in
which case congestion control in accordance with the UDP Guidelines
becomes necessary.
"Extended IPv6 Addressing for Encoding Port Range", Congxiao Bao, Xing
Li, 2016-01-03, <draft-bcx-behave-address-fmt-extension-09.txt>
This document discusses an extension of the algorithmic translation
between IPv4 and IPv4-translatable IPv6 addresses. The extended
address format contains transport-layer port set identification
(PSID) which allows several IPv6 nodes to share a single IPv4 address
with each node managing a different range of ports. This address
format extension can be used for IPv4/IPv6 translation, as well as
IPv4 over IPv6 tunneling.
"Cross Stratum Optimization Architecture for Optical as a Service", Hui
Yang, Yongli Zhao, Jie Zhang, Young Lee, Yi Lin, Fatai Zhang,
2015-11-16, <draft-yangh-cso-oaas-09.txt>
Data centers based applications provide a wide variety of services
such as cloud computing, video gaming, grid application and others.
Currently application decisions are made with little information
concerning underlying network used to deliver those services so that
such decisions cannot be the most optimal from both network and
application resource utilization and quality of service objectives.
This document presents a novel architecture of Cross Stratum
Optimization for application and network resource in dynamic optical
networks. Several global load balancing strategies are proposed and
demonstrated by experiments in Optical as a Service experimental
environment.
"The Lightweight On-demand Ad hoc Distance-vector Routing Protocol Next Generation (LOADng)", Thomas Clausen, Axel Verdiere, Jiazi Yi,
Afshin Niktash, Yuichi Igarashi, Hiroki Satoh, Ulrich Herberg, Cedric
Lavenu, Thierry Lys, Justin Dean, 2016-01-07,
<draft-clausen-lln-loadng-14.txt>
This document describes the Lightweight Ad hoc On-Demand - Next
Generation (LOADng) distance vector routing protocol, a reactive
routing protocol intended for use in Mobile Ad hoc NETworks (MANETs).
"A General Framework of Source Address Validation and Traceback for
IPv4/IPv6 Transition Scenarios", DENG Hui, Guangwu Hu, Jun Bi, Mingwei
Xu, Fan Shi, 2015-11-10, <draft-xu-savi-transition-08.txt>
SAVI (Source Address Validation Improvement) is an excellent
mechanism for anti-IP-spoofing, which was advocated by IETF but only
focused on single-stack or simple network scenarios right now. To the
best of our knowledge, existing studies have not paid attention to
the IPv4/IPv6 transition scenarios. However, since IPv4/IPv6
transition schemes are plenty and various, one solution cannot meet
all requirements of them. In this draft, we present a SAVI-based
general framework for IP source address validation and traceback in
the IPv4/IPv6 transition scenarios, which achieve this by extracting
out essential and mutual properties from these schemes, and forming
sub-solutions for each property. When one transition scheme is
composed from various properties, its IP source address validation
and traceback solution is directly comprised by the corresponding
sub-solutions. Thus, the most exciting advantage of this framework is
that it is a once-and-for-all solution no matter how transition
schemes change. Till now, this proposal was approved by China
Communications Standards Association (CCSA), and we will actively
promote it to apply real network scenarios.
"SAVI Requirements and Solutions for ISP IPv6 Access Network", Fan Shi,
DENG Hui, Liang Zhu, Guangwu Hu, Yang Bo, 2015-12-02,
<draft-shi-savi-access-08.txt>
Internet is always confronted with many security threats based on IP
address spoofing which can enable impersonation and malicious traffic
redirection. Unfortunately, the Internet architecture fails to
provide the defense mechanism. Source Address Validation Improvement
(SAVI) was developed to prevent IP source address spoofing.
Especially, the mechanism is essential for ISPs. However, due to the
diversity of address assignment methods, SAVI solution is also
different accordingly. This document describes five scenarios of
ISPs'IPv6 access network, and moreover, states its SAVI requirements
and tentative solutions accordingly.
"A PMIPv6-based solution for Distributed Mobility Management", Carlos
Bernardos, Antonio de la Oliva, Fabio Giust, 2016-03-14,
<draft-bernardos-dmm-pmip-06.txt>
The number of mobile users and their traffic demand is expected to be
ever-increasing in future years, and this growth can represent a
limitation for deploying current mobility management schemes that are
intrinsically centralized, e.g., Mobile IPv6 and Proxy Mobile IPv6.
For this reason it has been waved a need for distributed and dynamic
mobility management approaches, with the objective of reducing
operators' burdens, evolving to a cheaper and more efficient
architecture.
This draft describes multiple solutions for network-based distributed
mobility management inspired by the well known Proxy Mobile IPv6.
"Unified User-Agent String", Mateusz Karcz, 2014-11-10,
<draft-karcz-uuas-01.txt>
User-Agent is a HTTP request-header field. It contains information
about the user agent originating the request, which is often used by
servers to help identify the scope of reported interoperability
problems, to work around or tailor responses to avoid particular user
agent limitations, and for analytics regarding browser or operating
system use. Over the years contents of this field got complicated
and ambiguous. That was the reaction for sending altered version of
websites to web browsers other than popular ones. During the
development of the WWW, authors of the new web browsers used to
construct User-Agent strings similar to Netscape's one. Nowadays
contents of the User-Agent field are much longer than 15 years ago.
This Memo proposes the Uniform User-Agent String as a way to simplify
the User-Agent field contents, while maintaining the previous
possibility of their use.
"Problem Statement of SAVI Beyond the First Hop", Jun Bi, Bingyang Liu,
2015-11-10, <draft-bi-savi-problem-10.txt>
IETF Source Address Validation Improvements (SAVI) working group is
chartered for source address validation within the first hop from the
end hosts, i.e., preventing a node from spoofing the IP source
address of another node in the same IP link. However, since SAVI
requires the edge routers or switches to be upgraded, the deployment
of SAVI will need a long time. During this transition period, some
source address validation techniques beyond the first hop (SAVI-BF)
may be needed to complement SAVI and protect the networks from
spoofing based attacks. In this document, we first propose three
desired features of the SAVI-BF techniques. Then we analyze the
problems of the current SAVI-BF technique, ingress filtering.
Finally, we discuss the directions that we can explore to improve
SAVI-BF.
"Tunneling Compressing and Multiplexing (TCM) Traffic Flows. Reference
Model", Jose Saldana, Dan Wing, Julian Navajas, Muthu Perumal, Fernando
Blanco, 2015-12-14, <draft-saldana-tsvwg-tcmtf-10.txt,.pdf>
Tunneling, Compressing and Multiplexing (TCM) is a method for
improving the bandwidth utilization of network segments that carry
multiple small-packet flows in parallel sharing a common path. The
method combines different protocols for header compression,
multiplexing, and tunneling over a network path for the purpose of
reducing the bandwidth consumption. The amount of packets per second
can be reduced at the same time.
This document describes the TCM framework and the different options
which can be used for each of the three layers (header compression,
multiplexing and tunneling).
"SNMPD to use cache and shared database based on MIB Classification",
Haresh Khandelwal, 2012-03-29,
<draft-haresh-sushrut-mib-classification-01.txt>
The HIP DEX protocol is primarily designed for computation or memoryconstrained sensor/actuator devices. Like HIPv2, it is expected to
be used together with a suitable security protocol such as the
Encapsulated Security Payload (ESP) for the protection of upper layer
protocol data. In addition, HIP DEX can also be used as a keying
mechanism for security primitives at the MAC layer, e.g., for IEEE
802.15.4 networks.
"The scrypt Password-Based Key Derivation Function", Colin Percival,
Simon Josefsson, 2015-11-20, <draft-josefsson-scrypt-kdf-04.txt>
This document specifies the password-based key derivation function
scrypt. The function derives one or more secret keys from a secret
string. It is based on memory-hard functions which offer added
protection against attacks using custom hardware. The document also
provides an ASN.1 schema.
"A Language for Rules Describing JSON Content", Andrew Newton, Pete
Cordell, 2016-03-21, <draft-newton-json-content-rules-06.txt>
This document describes a language for specifying and testing the
expected content of JSON structures found in JSON-using protocols,
software, and processes.
"Design Discussion and Comparison of Protection Mechanisms for Replay
Attack and Withdrawal Suppression in BGPsec", Kotikalapudi Sriram, Doug
Montgomery, 2016-04-18,
<draft-sriram-replay-protection-design-discussion-06.txt>
In the context of BGPsec, a withdrawal suppression occurs when an
adversary AS suppresses a prefix withdrawal with the intension of
continuing to attract traffic for that prefix based on a previous
(signed and valid) BGPsec announcement that was earlier propagated.
Subsequently if the adversary AS had a BGPsec session reset with a
neighboring BGPsec speaker and when the session is restored, the AS
replays said previous BGPsec announcement (even though it was
withdrawn), then such a replay action is called a replay attack. The
BGPsec protocol should incorporate a method for protection from
Replay Attack and Withdrawal Suppression (RAWS), at least to control
the window of exposure. This informational document provides design
discussion and comparison of multiple alternative RAWS protection
mechanisms weighing their pros and cons. This is meant to be a
companion document to the standards track I-D.-ietf-sidr-bgpsecrollover that will specify a method to be used with BGPsec for RAWS
protection.
"The application/stream+json Media Type", James Snell, 2012-10-11,
<draft-snell-activity-streams-type-01.txt>
This specification defines and registers the application/stream+json
Content Type for the JSON Activity Streams format.
"Cryptographic Security Characteristics of 802.11 Wireless LAN Access
Systems", Stephen Orr, Anthony Grieco, Dan Harkins, 2012-10-15,
<draft-orr-wlan-security-architectures-00.txt>
This note identifies all of the places that cryptography is used in
Wireless Local Area Network (WLAN) architectures, to simplify the
task of selecting the protocols, algorithms, and key sizes needed to
achieve a consistent security level across the entire architecture.
<draft-sarikaya-nvo3-vmm-dmm-pmip-10.txt>
This document describes a virtual machine mobility protocol commonly
used in data centers built with overlay-based network virtualization
approach. It is based on using a Network Virtualization Authority
(NVA)-Network Virtualization Edge (NVE) protocol to update Address
Resolution Protocol (ARP) table or neighbor cache entries at the NVA
and the source NVEs tunneling in-flight packets to the destination
NVE after the virtual machine moves from source NVE to the
destination NVE.
"Syslog Format for NAT Logging", Zhonghua Chen, Cathy Zhou, Tina Tsou,
Tom Taylor, 2014-01-24, <draft-ietf-behave-syslog-nat-logging-06.txt>
NAT devices are required to log events like creation and deletion of
translations and information about the resources the NAT is managing.
The logs are required to identify an attacker or a host that was used
to launch malicious attacks, and for various other purposes of
accounting and management. Since there is no standard way of logging
this information, different NAT devices behave differently. The lack
of a consistent way makes it difficult to write the collector
applications that would receive this data and process it to present
useful information.
This document describes the information that is required to be logged
by the NAT devices. It goes on to standardize formats for reporting
these events and parameters using SYSLOG (RFC 5424). A companion
document specifies formats for reporting the same events and
parameters using IPFIX (RFC 7011). Applicability statements are
provided in this document and its companion to guide operators and
implementors in their choice of which technology to use for logging.
"Cisco Enhanced Interior Gateway Routing Protocol", Donnie Savage, James
Ng, Steven Moore, Donald Slice, Peter Paluch, Russ White, 2016-02-23,
<draft-savage-eigrp-05.txt,.pdf>
This document describes the protocol design and architecture for
Enhanced Interior Gateway Routing Protocol (EIGRP). EIGRP is a routing
protocol based on Distance Vector technology. The specific algorithm
used is called DUAL, a Diffusing Update Algorithm as reference in
"Loop-Free Routing using Diffusing Computations". The algorithm and
procedures were researched, developed, and simulated by SRI
International.
"Autonomous Extensible Internet with Network Address Translation(AEIP
NAT)", Diao Yongping, Ming Liao, Diao Yuping, 2016-04-07,
<draft-diao-aeip-nat-06.txt>
The two key issues of today's Internet are autonomy and
extensibility. Autonomous Internet(AIP) technology can provide
extensible internet architecture, own independent root DNS servers
and self management internet network; Furthermore, based on the
Autonomous Internet, here provides a way with extensible address
capacity to solve IP address deficiency and realize
Autonomous Extensible Internet(AEIP). It mainly adopts local
network address based on per Autonomous IP network and uses
bilateral dynamic NAT with global network address between
Autonomous IP networks to solve IP address deficient problem.
This AEIP with Network Address Translation(AEIP NAT) can realize
autonomy and extensibility with minimal cost.
"An Internet Protocol Version 6 (IPv6) Profile for 3GPP Mobile Devices",
David Binet, Mohamed Boucadair, Vizdal Ales, Gang Chen, Nick Heatley,
Ross Chandler, Dave Michaud, Diego Lopez, Walter Haeffner, 2015-12-17,
<draft-ietf-v6ops-mobile-device-profile-24.txt>
This document defines a profile that is a superset of that of the
connection to IPv6 cellular networks defined in the IPv6 for Third
Generation Partnership Project (3GPP) Cellular Hosts document. This
document defines an IPv6 profile that a number of operators recommend
in order to connect 3GPP mobile devices to an IPv6-only or dual-stack
wireless network (including 3GPP cellular network) with a special
focus on IPv4 service continuity features.
Both mobile hosts and mobile devices with capability to share their
3GPP mobile connectivity are in scope.
"Augmented Password-Authenticated Key Exchange for Transport Layer
Security (TLS)", SeongHan Shin, Kazukuni Kobara, 2016-01-21,
<draft-shin-tls-augpake-06.txt>
This document describes an efficient augmented password-authenticated
key exchange (AugPAKE) protocol where a user remembers a low-entropy
password and its verifier is registered in the intended server. In
general, the user password is chosen from a small set of dictionary
whose space is within the off-line dictionary attacks. The AugPAKE
protocol described here is secure against passive attacks, active
attacks and off-line dictionary attacks (on the obtained messages
with passive/active attacks), and also provides resistance to server
compromise (in the context of augmented PAKE security). Based on the
AugPAKE protocol, this document also specifies a new password-only
authentication handshake for Transport Layer Security (TLS) protocol.
"LISP Based FlowMapping for Scaling NFV", sbarkai@gmail.com, Dino
Farinacci, David Meyer, Fabio Maino, Vina Ermagan, Alberto
Rodriguez-Natal, Albert Cabellos-Aparicio, 2015-12-06,
<draft-barkai-lisp-nfv-07.txt>
This draft describes an RFC 6830 Locator ID Separation Protocol
(LISP) based distributed flow-mapping-fabric for dynamic scaling of
virtualized network functions (NFV). Network functions such as
subscriber-management, content-optimization, security and quality of
service, are typically delivered using proprietary hardware
appliances embedded into the network as turn-key service-nodes or
service-blades within routers. Next generation network functions are
being implemented as pure software instances running on standard
servers - unbundled virtualized components of capacity and
functionality. LISP-SDN based flow-mapping, dynamically assembles
these components to whole solutions by steering the right traffic in
the right sequence to the right virtual function instance.
"IPFIX Information Elements for logging NAT Events", Senthil Sivakumar,
Reinaldo Penno, 2016-03-08, <draft-ietf-behave-ipfix-nat-logging-08.txt>
Network operators require NAT devices to log events like creation and
deletion of translations and information about the resources that the
NAT device is managing. The logs are essential in many cases to
identify an attacker or a host that was used to launch malicious
attacks and for various other purposes of accounting. Since there is
no standard way of logging this information, different NAT devices
2016-03-19, <draft-savolainen-core-coap-websockets-06.txt>
This document specifies how to retrieve and update CoAP resources
using CoAP requests and responses over the WebSocket Protocol.
"MPLS Domain Wide Labels", Robert Raszuk, 2015-11-22,
<draft-raszuk-mpls-domain-wide-labels-05.txt>
This document describes a mechanism of using concept of Domain Wide
MPLS Labels in parallel with any of the existing deployments using
other label distribution and allocation methods where multi protocol
label switching paradigm is used for transport. Specifically it
defines a new type of context label which can be used to
differentiate lookup tables when using Domain Wide transport Labels
from other downstream or upstream assigned transport labels. The end
result is creation of clean new label space in data plane allowing
very easy and smooth migration to the number of applications choosing
to use Domain Wide MPLS Labels.
"DNSWL Email Authentication Method Extension", Ale, 2016-04-16,
<draft-vesely-authmethod-dnswl-06.txt>
This document describes an additional Email Authentication Method
compliant with RFC 7601. The method consists in looking up the
sender'IP in a DNS whitelist.
"Using ICN in disaster scenarios", Jan Seedorf, Mayutan Arumaithurai,
Atsushi Tagami, K. Ramakrishnan, Nicola Blefari-Melazzi, 2015-12-29,
<draft-seedorf-icn-disaster-05.txt>
Information Centric Networking (ICN) is a new paradigm where the
network provides users with named content, instead of communication
channels between hosts. This document outlines some research
directions for Information Centric Networking with respect to
applying ICN approaches for coping with natural or human-generated,
large-scale disasters.
"A Framework of Multipath Transport System Based on Application-Level
Relay (MPTS-AR)", Lei Weimin, Wei Zhang, Shaowei Liu, 2016-01-19,
<draft-leiwm-tsvwg-mpts-ar-05.txt>
Multipath transport is an important way to improve the efficiency of
data delivery. This document defines a multipath transport system
framework in which application-level relays are deployed to provide
the conditions to enable multiple paths between source and
destination. In the proposed framework, endpoints are allowed to use
multiple paths, including the default IP path and relay paths, to
transport data in a single session. A relay path may via one or more
application-level relays which provide application-level relay
services for endpoints. This framework defines three kinds of logical
entities including user agent, relay server and relay controller.
Relay server provides relay service for user agents based on a local
path-table. Relay controller manages relay servers and relay paths.
User agent maintains multiple end-to-end paths which include a
default path and multiple relay paths. The framework also defines a
relay service control protocol named OpenPath protocol in control
plane to manage relay servers and relay paths, and a profile of
multipath transport protocol suite in data plane to facilitate
multipath data transport. The multipath transport system framework
can support various applications including applications requiring
This document
been extended
versions. It
that might be
<draft-pkx-infobirdiconswww-06.txt>
The document proposes a WWW as an intelligent being that delivers
information
to users.
This can be combined with a Single SignON
solution for the WWW seen as one
Giant computer.
Imagine having a
handy device and you travel to Bangkok and in the morning when
you
authenticate
to WWW, your WWW navigation screen shows you very
useful Icons that can create a
better experience
for you.
"A Simpler Mechanism For Organizing FedFS NSDBs", Chuck Lever, Simo
Sorce, 2016-05-02, <draft-cel-nfsv4-federated-fs-nce-05.txt,.ps,.pdf>
This document describes a new, simpler mechanism for searching FedFS
NSDBs (Name Space Data Bases) for FedFS records. This mechanism
replaces the mechanism described in existing FedFS Proposed
Standards.
"Protocol independent multicast- Next Generation (PIM-NG): Protocol
Specifications", saeed sami, 2015-11-23, <draft-sami-pim-ng-08.txt,.pdf>
This document specifies protocol independent multicast- Next
generation or simply called PIM-NG. PIM-NG uses the underlying
unicast routing information, but unlike PIM-SM it doesn't necessarily
need to build unidirectional shared trees rooted at a Rendezvous
Point (RP) per group, due to the fact that the processes through
which a source registers with the Rendezvous Point and a host finds
the source of the multicast destination groups it needs are done in a
whole new way and hence, the source of multicast group (G) is
discovered faster. So at some points PIM-NG works faster than its
predecessor. Also the new Domain concept, unique to PIM-NG, along the
RPF check method used in PIM-NG specifications provides many features
along a robust and flexible control and administration over multicast
networks.
"Path Computation Element (PCE) Protocol Extensions for Stateful PCE
usage for Point-to-Multipoint Traffic Engineering Label Switched Paths",
Udayasree Palle, Dhruv Dhody, Yosuke Tanaka, Zafar Ali, Vishnu Pavan
Beeram, 2016-01-10, <draft-palle-pce-stateful-pce-p2mp-08.txt>
The Path Computation Element (PCE) has been identified as an
appropriate technology for the determination of the paths of pointto-multipoint (P2MP) TE LSPs. This document provides extensions
required for Path Computation Element communication Protocol (PCEP)
so as to enable the usage of a stateful PCE capability in supporting
P2MP TE LSPs.
"Generic Fault-avoidance Routing Protocol for Data Center Networks", Bin
Liu, Yantao Sun, Jing Cheng, Yichen Zhang, Bhumip Khasnabish,
2015-11-11, <draft-sl-rtgwg-far-dcn-05.txt>
This draft proposes a generic routing method and protocol for a
regular data center network, named as the fault-avoidance routing
(FAR) protocol. FAR protocol provides a generic routing method for
all types of network architectures that are proposed for large-scale
cloud-based data centers over the past few years. FAR protocol is
well designed to fully leverage the regularity in the topology and
requirements for IPv6 firewalls, in order to establish some commonground in terms of what features can be expected in them.
"Solution for Site Multihoming in a Real IP Environment", Shyam
Bandyopadhyay, 2016-04-12, <draft-shyam-site-multi-23.txt>
This document provides a solution for Site Multihoming of stub
networks in a real IP environment. Each user interface in a customer
network may have as many global unicast addresses as many service
providers it will be connected with. Users can establish multiple
connections through different service providers simultaneously.
Customer networks can maintain private address space to communicate
within its users. Customer networks can provide IP mobility services
as well.
"A TCP Authentication Option Extension for Payload Encryption", Joseph
Touch, 2016-04-18, <draft-touch-tcp-ao-encrypt-05.txt>
This document describes an extension to the TCP Authentication
Option (TCP-AO) to encrypt the TCP segment payload in addition to
providing TCP-AO's authentication of the payload, TCP header, and IP
pseudoheader. This extension augments how the packet contents and
headers are processed and which keys are derived, and adds a
capability for in-band coordination of unauthenticated DiffieHellman key exchange at connection establishment. The extension
preserves key rollover coordination and protection of long-lived
connections.
"Compression of IPsec AH and ESP Headers for 6LoWPAN Networks", Shahid
Raza, Simon Duquennoy, Goran Selander, 2016-03-18,
<draft-raza-6lo-ipsec-04.txt,.ps,.pdf>
This document describes the header compression mechanisms for IPsec
[RFC4301] based on the encoding scheme standardized in [RFC6282]. The
IPsec Authentication Header (AH) and Encapsulated Security Payload
(ESP) headers are compressed using Next Header Compression (NHC)
defined in [RFC6282]. This document does not invalidate any encoding
schemes proposed in 6LoWPAN [RFC6282] but rather complements it with
compressed IPsec AH and ESP headers using the free bits in the IPv6
Extension Header encoding. Also, this document does not require any
changes in a conventional IPsec host on the Internet; the header
compression is applied only at the 6LoWPAN layer and is effective
within 6LoWPAN networks.
"PCE support for Maximizing Diversity", Dhruv Dhody, Qin Wu, 2016-04-14,
<draft-dhody-pce-of-diverse-05.txt>
The computation of one or a set of Traffic Engineering Label Switched
Paths (TE LSPs) in MultiProtocol Label Switching (MPLS) and
Generalized MPLS (GMPLS) networks is subject to a set of one or more
specific optimization criteria, referred to as objective functions.
In the Path Computation Element (PCE) architecture, a Path
Computation Client (PCC) may want a set of services that are required
to be diverse (disjointed) from each other. In case when full
diversity could not be achieved, it is helpful to maximize diversity
as much as possible (or in other words, minimize the common shared
resources).
This document defines objective function code types for three new
"BGP Extensions for Path Computation Element (PCE) Discovery", Jie Dong,
Mach Chen, Dhruv Dhody, Jeff Tantsura, 2016-03-09,
<draft-dong-pce-discovery-proto-bgp-04.txt>
In networks where Path Computation Element (PCE) is used for
centralized path computation, it is desirable for the Path
Computation Clients (PCCs) to automatically discover a set of PCEs
and select the suitable ones to establish the PCEP session. RFC 5088
and RFC 5089 define the PCE discovery mechanisms based on Interior
Gateway Protocols (IGP). This document describes several scenarios
in which the IGP based PCE discovery mechanisms cannot be used
directly. In such scenarios, BGP might be suitable, thus this
document specifies the BGP extensions for PCE discovery. The BGP
based PCE discovery mechanism is complementary to the existing IGP
based mechanisms.
"Usage of the Peer-to-Peer Streaming Protocol (PPSP)", Hong-Ke Zhang,
Fei Song, Di Wu, Mi Zhang, Tianming Zhao, 2016-03-04,
<draft-zhang-ppsp-usage-04.txt>
This document focuses on several crucial operation issues of Peer-toPeer Streaming Protocol (PPSP) usage, considering two basic modes:
Leech mode and Seed mode. The settings of related parameters for
default PPSP scenario reference to tracker protocol and peer protocol
respectively. In addition, the limitations and gaps of current PPSP
system are identified at with the standpoint of satisfying PPSP
requirements.
"A JSON Encoding for HTTP Header Field Values", Julian Reschke,
2016-03-15, <draft-reschke-http-jfv-03.txt>
This document establishes a convention for use of JSON-encoded field
values in HTTP header fields.
"Including Geolocation Information in IPv6 Packet Headers (IPv6 GEO)",
Brian Skeen, Edwin King, Fred Templin, 2016-05-02,
<draft-skeen-6man-ipv6geo-02.txt>
This document provides a specification for including geolocation
information in the headers of IPv6 packets (IPv6 GEO). The
information is intended to be included in packets for which the
location of the source node is to be conveyed via the network to the
destination node or nodes.
"MIF API extension for combining IEEE 802.21", Hong-Ke Zhang, Boxin Du,
Mi Zhang, Fei Song, 2015-11-29,
<draft-zhang-mif-api-extension-802-21-03.txt>
The Application Program Interface (API) of MIF, specified in the MIF
API consideration, must rely on lower layer functionalities when
handover between homogeneous or heterogeneous networks is necessary.
To improve the connectivity performance,the existing MIF API needs to
be extended. IEEE is also aimed at the similar issue from different
way. A kind of logical entities over the link layer protocol for
handling the seamless handover has been defined in IEEE 802.21. This
document proposes a mechanism via conbining the MIF API and IEEE
802.21 to support application service better.
"IP Flow Performance Measurement Report", Mach Chen, Lianshu Zheng, Greg
2016-02-15, <draft-chroboczek-babel-diversity-routing-01.txt>
This document defines an extension to the Babel routing protocol that
allows routing updates to carry radio frequency information, and
therefore makes it possible to use radio diversity information for
route selection.
"Internet Measurement System", m.ooki@ntt.com, Satoshi Kamei,
2015-12-21, <draft-ooki-lmap-internet-measurement-system-03.txt>
This document describes an experience of Japanese Internet
measurement system to measure end-to-end performance of user's
experience. We have developed the system toward the enhancement of
the network performance in an ISP since October 2013. The systems
and the considerations about the Internet measurement are introduced
along with our current status. This document is expected to be
useful for the standardization of Internet measurements.
"6tisch secure join using 6top", Michael Richardson, 2015-11-20,
<draft-richardson-6tisch--security-6top-05.txt>
This document details a security architecture that permits a new
6tisch compliant node to join an 802.15.4e network. The process
bootstraps the new node authenticating the node to the network, and
the network to the node, and configuring the new node with the
required 6tisch schedule. Any resemblance to WirelessHART/IEC62591
is entirely intentional.
"Ideas for a Next Generation of the Stream Control Transmission Protocol
(SCTP)", Thomas Dreibholz, 2016-01-08,
<draft-dreibholz-tsvwg-sctp-nextgen-ideas-03.txt>
This document collects some ideas for a next generation of the Stream
Control Transmission Protocol (SCTP) for further discussion. It is a
result of lessons learned from more than one decade of SCTP
deployment.
"Congestion Control Using FEC for Conversational Media", Varun, Marcin
Nagy, Joerg Ott, Lars Eggert, 2016-03-20,
<draft-singh-rmcat-adaptive-fec-03.txt,.pdf>
This document describes a new mechanism for conversational multimedia
flows. The proposed mechanism uses Forward Error Correction (FEC)
encoded RTP packets (redundant packets) along side the media packets
to probe for available network capacity. A straightforward
interpretation is, the sending endpoint increases the transmission
rate by keeping the media rate constant but increases the amount of
FEC. If no losses and discards occur, the endpoint can then increase
the media rate. If losses occur, the redundant FEC packets help in
recovering the lost packets. Consequently, the endpoint can vary the
FEC bit rate to conservatively (by a small amount) or aggressively
(by a large amount) probe for available network capacity.
"Use cases for remote-initiated LSPs via Path Computation Element
Communication Protocol (PCEP)", Victor Lopez, Oscar Gonzalez de Dios,
Zafar Ali, zhenghaomian@huawei.com, 2016-03-21,
<draft-lopez-pce-use-cases-initiated-pce-01.txt,.pdf>
Thanks to the extensions defined in [I-D. draft-ietf-pce-pceinitiated-lsp] and [I-D.draft-ietf-pce-remote-initiated-gmpls-lsp],
ICMPv6 error messages have been disclosed and exploited in the wild.
The aforementioned attack vectors do not require that the source
address of the packets be forged, but do require that the addresses
of the IP/IPv6 packet embedded in the ICMP/ICMPv6 payload be forged.
This document discusses a simple, effective, and straightforward
method for using ingress traffic filtering to mitigate attacks that
use forged addresses in the IP/IPv6 packet embedded in an ICMP/ICMPv6
payload.
"Extensions to OSPF for Advertising Prefix/Link Administrative Tags",
Acee Lindem, Peter Psenak, 2016-03-15,
<draft-acee-ospf-admin-tags-04.txt>
It is useful for routers in an OSPFv2 or OSPFv3 routing domain to be
able to associate tags with prefixes and links. Previously, OSPFv2
and OSPFv3 were relegated to a single tag for AS External and Not-SoStubby-Area (NSSA) prefixes. With the flexible encodings provided by
OSPFv2 Prefix/Link Attribute Advertisement and OSPFv3 Extended LSAs,
multiple administrative tags may advertised for all types of prefixes
and links. These administrative tags can be used for many
applications including route redistribution policy, selective prefix
prioritization, selective IP Fast-ReRoute (IPFRR) prefix protection,
and many others.
The ISIS protocol supports a similar mechanism that is described in
RFC 5130.
"Source Address Dependent Routing and Source Address Selection for IPv6
Hosts: Problem Space Overview", Behcet Sarikaya, Mohamed Boucadair,
2016-01-04, <draft-sarikaya-6man-sadr-overview-09.txt>
This document presents the source address dependent routing (SADR)
problem space from the host perspective. Both multihomed hosts and
hosts with multiple interfaces are considered. Several network
architectures are presented to illustrate why source address
selection and next hop resolution in view of source address dependent
routing is needed.
"YANG Data Model for MPLS-TP Operations, Administration, and Maintenance
(OAM)", Li Zhang, Lianshu Zheng, Sam Aldrin, Greg Mirsky, 2016-02-23,
<draft-zhang-mpls-tp-yang-oam-02.txt>
The Transport Profile of Multiprotocol Label Switching (MPLS-TP)
[RFC5921]is a packet-based transport technology based on the MPLS
Traffic Engineering (MPLS-TE) and pseudowire (PW) data-plane
architectures. A comprehensive set of Operations, Administration,
and Maintenance (OAM) procedures that fulfill the MPLS-TP OAM
requirements for fault, performance, and protection-switching
management had been defined. YANG [RFC6020]is a data definition
language that was introduced to define the contents of a conceptual
data store that allows networked devices to be managed using NETCONF
[RFC6241]. This document presents the YANG Data model for MPLS-TP
OAM, including the basic functions of Fault Management and
Performance Monitoring.
"Advertising LSPs with Segment Routing", Chris Bowers, Hannes Gredler,
Uma Chunduri, 2015-11-18,
<draft-bowers-spring-advertising-lsps-with-sr-02.txt>
Segment routing uses globally-known labels to accomplish forwarding
NFVIaaS.
"Declaring Kerberos Realm Names in DNS (_kerberos TXT)", Rick van Rein,
2016-03-15, <draft-vanrein-dnstxt-krb1-08.txt>
This specification defines a method to determine Kerberos realm names
for services that are known by their DNS name. Currently, such
information can only be found in static mappings or through educated
guesses. DNS can make this process more flexible, provided that
DNSSEC is used to assure authenticity of resource records.
"YANG Data Model for NVO3 Protocols", Mingui Zhang, Lianshu Zheng, Feng
Zheng, Fu Qiao, 2015-12-15, <draft-zhang-nvo3-yang-cfg-03.txt>
This document describes the base YANG data model that can be used by
operators to configure and manage NVO3 protocols.
"Unifying Carrier and Cloud Networks: Problem Statement and Challenges",
Robert Szabo, Andras Csaszar, Kostas Pentikousis, Mario Kind, Diego
Daino, Zu Qiang, Hagen Woesner, 2016-01-13,
<draft-unify-nfvrg-challenges-03.txt>
The introduction of network and service functionality virtualization
in carrier-grade networks promises improved operations in terms of
flexibility, efficiency, and manageability. In current practice,
virtualization is controlled through orchestrator entities that
expose programmable interfaces according to the underlying resource
types. Typically this means the adoption of, on the one hand,
established data center compute/storage and, on the other, network
control APIs which were originally developed in isolation. Arguably,
the possibility for innovation highly depends on the capabilities and
openness of the aforementioned interfaces. This document introduces
in simple terms the problems arising when one follows this approach
and motivates the need for a high level of programmability beyond
policy and service descriptions. This document also summarizes the
challenges related to orchestration programming in this unified cloud
and carrier network production environment. A subsequent problem is
the resource orchestration. This is handled separately in
[I-D.caszpe-nfvrg-orchestration-challenges] and will be merged in the
next iteration of this document.
"Framework for Deriving Interface Data Schema from UML Information
Models", Malcolm Betts, Nigel Davis, Kam Lam, Eve Varma, Bernd Zeuner,
Scott Mansfield, Paul Doolan, 2016-03-18,
<draft-betts-netmod-framework-data-schema-uml-03.txt,.pdf>
This draft describes a framework for how purpose and protocol
specific interfaces can be systematically derived from an underlying
common information model, focusing upon the networking and forwarding
domain. The benefit of using such an approach in interface
specification development is to promote convergence,
interoperability, and efficiency.
"Existing Support for Network Operations in Multilayer Transport Network
based upon unified approach to OAM (Layer 0 - Layer 2)", Kam Lam, Eve
Varma, Scott Mansfield, Yuji Tochio, Huub van Helvoort, Maarten Vissers,
Paul Doolan, 2016-03-18,
<draft-lam-lime-summary-l0-l2-layer-independent-04.txt,.pdf>
This draft summarizes the existing ITU-T SG 15 standards, (Layer 0 -
NVEs.
This document defines the YANG data model that can be used to
configure NVEs of a NVO3 network to achieve active-active multihoming.
"Software-Defined Networking Based Security Services using Interface to
Network Security Functions", Jaehoon Jeong, Hyoungshick Kim, Park
Jung-Soo, Tae-Jin Ahn, sehuilee@kt.com, 2016-03-16,
<draft-jeong-i2nsf-sdn-security-services-04.txt>
This document describes a framework, objectives, requirements, and
use cases for security services based on Software-Defined Networking
(SDN) using a common Interface to Network Security Functions (I2NSF).
It first proposes the framework of SDN-based security services in the
I2NSF framework. It then explains three use cases, such as a
centralized firewall system, centralized DDoS-attack mitigation
system, and centralized VoIP/VoLTE security system.
"LIME base model extension for BFD Support", Zitao Wang, Liang Xia,
Deepak Kumar, Qin Wu, 2015-11-27, <draft-wang-yang-bfd-oam-06.txt>
This document discusses how LIME base model is applied to BFD and
present an example of YANG Data model for BFD support. The YANG
Model presented in this document extends the technology independent
YANG model for OAM with BFD technology specifics.
"Analysis on Forwarding Methods for Service Chaining", Shunsuke Homma,
Kengo Naito, Diego Lopez, Martin Stiemerling, David Dolson, Alexey
Gorbunov, Nicolai Leymann, P. Bottorff, don.fedyk@hpe.com, 2016-01-29,
<draft-homma-sfc-forwarding-methods-analysis-05.txt>
This document presents the results of analyzing packet forwarding
methods and path selection patterns for achieving Service Chaining.
In Service Chaining, data packets need to be forwarded to the
appropriate service functions deployed in networks based on service
provided for the packets, and distribution of the service-oriented
route information and steering data packets following the route
information would be required.
"YANG Data Model for SFC Operations, Administration, and Maintenance
(OAM)", Liang Xia, Qin Wu, Deepak Kumar, Mohamed Boucadair, Zitao Wang,
2015-12-11, <draft-xia-sfc-yang-oam-05.txt>
This document defines YANG data model for Service Function Chaining
(SFC Operations, Administration, and Maintenance (OAM). It extends
from the basic YANG data model for Layer independent OAM Management
defined in [I-D.ietf-lime-yang-oam-model] with SFC technology
specifics. It includes SFC OAM related configuration, state, and RPC
information data.
"Multi-Layering OAM for Service function Chaining", Cui Wang, Wei Meng,
Bhumip Khasnabish, 2015-12-21, <draft-wang-sfc-multi-layer-oam-03.txt>
This document tries to discuss some problems in SFC OAM framework
document and proposes the SFC OAM multi-layering requirements in SFC
domain to improve the troubleshooting efficiency.
"Generic UDP Encapsulation (GUE) for Network Virtualization Overlay",
Lucy Yong, Tom Herbert, Osama Zia, 2016-03-14,
<draft-hy-nvo3-gue-4-nvo-03.txt>
This document describes network virtualization overlay encapsulation
scheme by use of Generic UDP Encapsulation (GUE) [GUE]. It allocates
one GUE optional flag and defines a 32 bit field for Virtual Network
Identifier (VNID).
"Generic UDP Encapsulation (GUE) for Secure Transport", Lucy Yong, Tom
Herbert, 2016-03-14, <draft-hy-gue-4-secure-transport-03.txt>
This document specifies the ability of Generic UDP Encapsulation
(GUE) to provide secure transport over IP networks and the Internet,
including GUE header integrity protection and origin authentication
and GUE payload encryption. These are optional features of GUE.
"Concise Binary Object Representation (CBOR) Tags for ASN.1 Object
Identifiers", Carsten Bormann, Sean Leonard, 2016-01-06,
<draft-bormann-cbor-tags-oid-02.txt>
The Concise Binary Object Representation (CBOR, RFC 7049) is a data
format whose design goals include the possibility of extremely small
code size, fairly small message size, and extensibility without the
need for version negotiation.
The present document makes use of this extensibility to define CBOR
tags <<O>> and <<R>> [values TBD] for ASN.1 object identifiers. It
is intended as the reference document for the IANA registration of
the CBOR tags so defined.
"DevOps for Software-Defined Telecom Infrastructures", Catalin Meirosu,
Antonio Manzalini, Rebecca Steinert, Guido Marchetto, Ioanna Papafili,
Kostas Pentikousis, Steven Wright, 2016-03-20,
<draft-unify-nfvrg-devops-04.txt>
Carrier-grade network management was optimized for environments built
with monolithic physical nodes and involves significant deployment,
integration and maintenance efforts from network service providers.
The introduction of virtualization technologies, from the physical
layer all the way up to the application layer, however, invalidates
several well-established assumptions in this domain. This draft opens
the discussion in NFVRG about challenges related to transforming the
telecom network infrastructure into an agile, model-driven production
environment for communication services. We take inspiration from data
center DevOps regarding how to simplify and automate management
processes for a telecom service provider software-defined
infrastructure (SDI). Among the identified challenges, we consider
scalability of observability processes and automated inference of
monitoring requirements from logical forwarding graphs, as well as
initial placement (and re-placement) of monitoring functionality
following changes in flow paths enforced by the controllers. In
another category of challenges, verifying correctness of behavior for
network functions where flow rules are no longer necessary and
sufficient for determining the forwarding state (for example,
stateful firewalls or load balancers) is very difficult with current
technology. Finally, we introduce challenges associated with
operationalizing DevOps principles at scale in software-defined
telecom networks in three areas related to key monitoring,
verification and troubleshooting processes.
"Object Security of CoAP (OSCOAP)", Goran Selander, John Mattsson,
tables and the labels can identify entire paths rather than simply
destinations. The HSDN forwarding architecture is based on four main
concepts: 1. Dividing the DC and DCI in a hierarchically-partitioned
structure; 2. Assigning groups of Underlay Border Nodes in charge of
forwarding within each partition; 3. Constructing HSDN MPLS label
stacks to identify endpoints and paths according to the HSDN
structure; and 4. Forwarding using the HSDN MPLS labels.
"Enhanced Mobility Anchoring in Distributed Mobility Management",
Young-Han Kim, Seil Jeon, 2016-03-21,
<draft-yhkim-dmm-enhanced-anchoring-04.txt>
This document presents a new perspective for the solution design of
enhanced mobility anchoring over DMM deployment models described in
[draft-sijeon-dmm-deployment-models].
"Cooperative Stateful Path Computation Element (PCE) for Inter-Domain
Inter-Vendor PCE-initiated LSP Setup", Xiaoping Zheng, Nan Hua, Wangyang
Liu, Yinqiu Jia, Yanlong Li, Bingkun Zhou, Guoying Zhang, 2016-04-27,
<draft-zheng-pce-stateful-pce-inter-domain-lsp-03.txt,.pdf>
A stateful Path Computation Element (PCE) maintains the information
of Label Switched Path (LSP) and resource availability within a
domain. Multiple stateful PCEs are able to provide traffic
engineering inter-domain LSPs through cooperating with each other.
This document introduces the applicability of cooperative stateful
PCE for establishing inter-domain inter-vendor LSPs which are
initiated by PCE.
"Constrained-Cast: Source-Routed Multicast for RPL", Olaf Bergmann,
Carsten Bormann, Stefanie Gerdes, Hao Chen, 2016-04-04,
<draft-bergmann-bier-ccast-01.txt>
This specification defines a protocol for forwarding multicast
traffic in a constrained node network employing the RPL routing
protocol in non-storing mode.
"VXLAN Group Policy Option", Michael Smith, Lawrence Kreeger,
2016-04-25, <draft-smith-vxlan-group-policy-02.txt>
This document defines a backward compatible extension to Virtual
eXtensible Local Area Network (VXLAN) that allows a Tenant System
Interface (TSI) Group Identifier to be carried for the purposes of
policy enforcement.
"AERO Minimal Encapsulation", Fred Templin, 2016-01-08,
<draft-templin-aeromin-03.txt>
Asymmetric Extended Route Optimization (AERO) specifies both a
control messaging and data packet forwarding facility for managing
tunnels over an enterprise network or other Internetwork. Although
AERO can operate with any tunnel encapsulation format, the base
document considers Generic UDP Encapsulation (GUE) as the default.
This document presents minimal encapsulation formats for AERO using
other encapsulation types.
"YANG data model for Flexi-Grid Optical Networks", Universidad de
Madrid, Victor Lopezalvarez, Oscar Gonzalez de Dios, Daniel King, Young
Lee, Zafar Ali, 2016-03-02, <draft-vergara-ccamp-flexigrid-yang-02.txt>
are deriving from the use of a previously assigned address, and the
cost of maintaining an address that was assigned at a previous point
of attachment. As the MN moves farther and farther from the initial
point where an address was assigned, more and more resources are used
to redirect packets destined for that IP address to its current
location. The MN currently does not know the amount of resources
used as this depends on mobility path and internal routing topology
of the network(s) which are known only to the network operator. This
document provides a mechanism to communicate to the MN the cost of
maintaining a given prefix at the MN's current point of attachment so
that the MN can make better decisions about when to release old
addresses and assign new ones.
"Comparison between Segment Routing and LDP/RSVP-TE", Zhenbin Li,
2016-03-12, <draft-li-spring-compare-sr-ldp-rsvpte-01.txt>
Segment Routing has been proposed to cope with the use cases in
traffic engineering, fast re-reroute, service chain, etc. This
document is to compare Segment Routing with the existing LDP and
RSVP-TE. Through the comparison the challenges are clarified for the
Segment Routing when deploy in the existing MPLS network.
"DHCPv6 Extension for On Demand Mobility exposure", Danny Moses, Alper
Yegin, 2015-12-08, <draft-moses-dmm-dhcp-ondemand-mobility-02.txt>
Applications differ with respect to whether or not they need IP
session continuity and/or IP address reachability. Networks
providing the same type of service to any mobile host and any
application running on the host yields inefficiencies. This document
describes extensions to the DHCPv6 protocol to enable mobile hosts to
indicate the required mobility service type associated with a
requested IP address, and networks to indicate the type of mobility
service associated with the allocated IP address in return.
"Definition of P2MP PW TLV for LSP-Ping Mechanisms", Parag Jain, Sami
Boutros, Sam Aldrin, 2016-03-21,
<draft-jain-bess-p2mp-pw-lsp-ping-03.txt>
LSP-Ping is a widely deployed Operation, Administration, and
Maintenance (OAM) mechanism in MPLS networks. This document
describes a mechanism to verify connectivity of Point-to-Multipoint
(P2MP) Pseudowires (PW) using LSP Ping.
"Propagation of IPv6 Neighbor Advertisement Flags in EVPN", Jorge
Rabadan, Senthil Sathappan, Kiran Nagaraj, 2016-01-11,
<draft-snr-bess-evpn-na-flags-03.txt>
The MAC/IP Advertisement route specified in [RFC7432] can optionally
carry IPv4 and IPv6 addresses associated with a MAC address. Remote
PEs can use this information to reply locally (act as proxy) to IPv4
ARP requests and IPv6 Neighbor Solicitation messages and
reduce/suppress the flooding produced by the Address Resolution
procedure. However, if the Neighbor information is learnt via EVPN,
the PE would not know if a particular IPv6->MAC pair belongs to a
host, a router or a host with an anycast address as this information
is not carried in the MAC/IP route advertisements. This document
proposes an OPTIONAL advertisement of the Flags defined in [RFC4861]
along with the EVPN MAC/IP Advertisement routes, so that an EVPN PE
implementing a proxy-ND function can reply to Neighbor Solicitations
with the correct Flag information in Neighbor Advertisements.
"Modern Problem Statement, Use Cases, and Framework", Jon Peterson, Tom
McGarry, 2016-03-21, <draft-peterson-modern-problems-04.txt>
The functions of the public switched telephone network (PSTN) are
rapidly migrating to the Internet. This is generating new
requirements for many traditional elements of the PSTN, including
telephone numbers (TNs). TNs no longer serve simply as telephone
routing addresses, they are now identifiers which may be used by
Internet-based services for a variety of purposes including session
establishment, identity verification, and service enablement. This
problem statement examines how the existing tools for allocating and
managing telephone numbers do not align with the use cases of the
Internet environment, and proposes a framework for Internet-based
services relying on TNs.
"SIP Authentication using the EC-SRP5 Protocol", Fuwen liu, Minpeng Qi,
Min Zuo, 2016-03-03, <draft-liu-sipcore-ec-srp5-02.txt>
This document specifies the way that the elliptic curve secure remote
protocol (EC-SRP) is applied to SIP authentication. SIP Client and
server perform mutual authenticate by using the modern 'zero
knowledge' method without disclosing the password in the process. It
has low computation complexity and low bandwidth consumption due to
the use of elliptical curve cryptography. This makes it more suitable
for resource-constrained environments,e.g. wireless network. The
security of the scheme is based on the computational intractability
of the elliptic curve discrete logarithm problem. It is resilient to
various kinds of attacks, including off-line dictionary attacks.
"Processing Multiple Replies for One Request in NETCONF", Bing Liu,
Guangying Zheng, Mahesh Jethanandani, Kent Watsen, 2016-03-21,
<draft-liu-netconf-multiple-replies-02.txt>
This document discusses several scenarios that multiple replies for a
single request are needed, with the ability to terminate the replies
at any time. Such scenarios are not well supported by current
NETCONF (Network Configuration) protocol. An extention at the
NETCONF messaging layer is needed to fulfill the requirement.
"Deterministic Networking Architecture", Norman Finn, Pascal Thubert,
Michael Teener, 2016-03-21, <draft-finn-detnet-architecture-04.txt>
Deterministic Networking (DetNet) provides a capability to carry
specified unicast or multicast data flows for real-time applications
with extremely low data loss rates and bounded latency. Techniques
used include: 1) reserving data plane resources for individual (or
aggregated) DetNet flows in some or all of the relay systems (bridges
or routers) along the path of the flow; 2) providing fixed paths for
DetNet flows that do not rapidly change with the network topology;
and 3) sequentializing, replicating, and eliminating duplicate
packets at various points to ensure the availability of at least one
path. The capabilities can be managed by configuration, or by manual
or automatic network management.
"IPFIX Information Element extension for SFC", Nagendra Kumar, Carlos
Pignataro, Paul Quinn, 2015-12-31,
<draft-kumar-ipfix-sfc-extension-02.txt>
Service Function Chaining (SFC) is an architecture that enables any
Note to Readers
This Internet-Draft should be discussed on the Thing-to-Thing
Research Group (T2TRG) mailing list <t2trg@irtf.org>.
"Encapsulating IP in UDP", Xiaohu Xu, Rajiv Asati, Tom Herbert, Lucy
Yong, Yiu Lee, Fan Yongbing, Iljitsch van Beijnum, 2016-01-31,
<draft-xu-intarea-ip-in-udp-03.txt>
Existing Softwire encapsulation technologies are not adequate for
efficient load balancing of Softwire service traffic across IP
networks. This document specifies additional Softwire encapsulation
technology, referred to as IP-in-UDP (User Datagram Protocol), which
can facilitate the load balancing of Softwire service traffic across
IP networks.
"Framework for Interface to Network Security Functions", Ed, Diego
Lopez, Linda Dunbar, John Strassner, Xiaojun Zhuang, Joe Parrott, Ram
(Ramki) Krishnan, Seetharama Durbha, 2016-03-16,
<draft-merged-i2nsf-framework-05.txt>
This document defines the framework for guiding the functionality
provided by I2NSF. Network security functions (NSFs) are packetprocessing engines that inspect and optionally modify packets
traversing networks, either directly or in the context of sessions
in which the packet is associated. This document provides an
overview of how NSFs are used, and describes how NSF software
interfaces are controlled and monitored using rulesets. The design
of these software interfaces must prevent the creation of implied
constraints on NSF capability and functionality.
"An Autonomic IPv6 Addressing Scheme", Michael Behringer, 2016-04-06,
<draft-behringer-anima-autonomic-addressing-03.txt>
The content of this document was merged into
[I-D.ietf-anima-autonomic-control-plane]. This document it no longer
maintained.
"Link Relation Types for Web Services", Erik Wilde, 2016-02-22,
<draft-wilde-service-link-rel-01.txt>
Many resources provided on the Web are part of a sets of resources
that are provided in a context that is defined and managed by one
particular service provider. Often, these sets of resources are
referred to as "Web Services" or "Web APIs". This specification
defines two link relations that allow to represent relationships from
those resources to ones that provide documentation or descriptions of
the Web services. The difference between these concepts is that
documentation is primarily intended for human consumers, whereas
descriptions are primarily intended for automated consumers.
"Carrying Binding Label/Segment-ID in PCE-based Networks.", Siva
Sivabalan, Clarence Filsfils, Stefano Previdi, Jeff Tantsura, Jonathan
Hardwick, Mohan Nanduri, 2016-03-21,
<draft-sivabalan-pce-binding-label-sid-01.txt>
It is possible to associate a binding label to RSVP-TE signaled
Traffic Engineering Label Switching Path or binding Segment-ID (SID)
to Segment Routed Traffic Engineering path. Such a binding label/SID
domain.
"Guidelines for Translation of UML Information Model to YANG Data
Model", Scott Mansfield, Bernd Zeuner, Nigel Davis, Xiang Yun, Yuji
Tochio, Hing-Kam Lam, Eve Varma, 2016-03-18,
<draft-mansfield-netmod-uml-to-yang-02.txt,.pdf>
This document defines guidelines for translation of data modeled with
UML to YANG including mapping of object classes, attributes, data
types, associations, interfaces, operations and operation parameters,
notifications, and lifecycle.
"Use Cases for a Substrate Protocol for User Datagrams (SPUD)", Mirja
Khlewind, Brian Trammell, 2016-03-18,
<draft-kuehlewind-spud-use-cases-01.txt>
This document identifies use cases for explicit cooperation between
endpoints and middleboxes in the Internet under endpoint control.
These use cases range from relatively low level applications
(improving the ability for UDP-based protocols to traverse firewalls)
through support for new transport services (in-flow prioritization
for graceful in-network degradation of media streams). They are
intended to provide background for deriving the requirements for a
Substrate Protocol for User Datagrams (SPUD), as discussed at the IAB
Stack Evolution in a Middlebox Internet (SEMI) workshop in January
2015 and the SPUD BoF session at IETF 92 in March 2015.
"VNF Pool Orchestration For Automated Resiliency in Service Chains",
Giacomo Bernini, Giada Landi, Diego Lopez, Pedro Aranda, 2016-04-03,
<draft-bernini-nfvrg-vnf-orchestration-02.txt>
Network Function Virtualisation (NFV) aims at evolving the way
network operators design, deploy and provision their networks by
leveraging on standard IT virtualisation technologies to move and
consolidate a wide range of network functions and services onto
industry standard high volume servers, switches and storage. The
primary area of impact for operators is the network edge, being
stimulated by the recent updates on NFV and SDN. In fact, operators
are looking at their future datacentres and Points of Presence (PoPs)
as increasingly dynamic infrastructures to deploy Virtualised Network
Functions (VNFs) and on-demand chained services with high elasticity.
This document presents an orchestration framework for automated
deployment of highly available VNF chains. Resiliency of VNFs and
chained services is a key requirement for operators to improve, ease,
automate and speed up services lifecycle management. The proposed
VNFs orchestration framework is also positioned with respect to
current NFV and Service Function Chaining (SFC) architectures and
solutions.
"Benchmarking Virtual Switches in OPNFV", Maryam Tahhan, Billy O'Mahony,
Al Morton, 2016-03-21, <draft-vsperf-bmwg-vswitch-opnfv-02.txt>
This memo describes the progress of the Open Platform for NFV (OPNFV)
project on virtual switch performance "VSWITCHPERF". This project
intends to build on the current and completed work of the
Benchmarking Methodology Working Group in IETF, by referencing
existing literature. The Benchmarking Methodology Working Group has
traditionally conducted laboratory characterization of dedicated
physical implementations of internetworking functions. Therefore,
other middleboxes.
"Network Device YANG Organizational Models", Acee Lindem, Lou Berger,
Dean Bogdanovic, Christian Hopps, 2016-02-23,
<draft-rtgyangdt-rtgwg-device-model-03.txt>
This document presents an approach for organizing YANG models in a
comprehensive structure that may be used to configure and operate
network devices. The structure is itself represented as a YANG
model, with all of the related component models logically organized
in a way that is operationally intuitive, but this model is not
expected to be implemented. The identified component modules are
expected to be defined and implemented on common network devices.
This document also defines two modules that can be used to model the
logical and virtual resource representations that may be present on a
network device. Examples of common industry terms for logical
resource representations are Logical Systems or Routers. Examples of
of common industry terms for virtual resource representations are
Virtual Routing and Forwarding (VRF) instances and Virtual Switch
Instances (VSIs).
This document is derived from work submitted to the IETF by members
of the informal OpenConfig working group of network operators and is
a product of the Routing Area YANG Architecture design team.
"Delay Tolerant Network (DTN) Numeric Node IDs", Fred Templin, Scott
Burleigh, 2016-04-06, <draft-templin-dtn-numid-01.txt>
The Delay Tolerant Network (DTN) Bundle Protocol (BP) uses Uniform
Resource Identifiers (URIs) as the basis for Endpoint and Node IDs.
IDs that are encoded as alphanumeric strings can consume excessive
precious bandwidth over constrained links, leading to a desire for a
short numeric ID format. This document discusses alternatives for a
DTN numeric node ID format.
"Anycast Segments in MPLS based Segment Routing", P. Sarkar, Hannes
Gredler, Clarence Filsfils, Stefano Previdi, Bruno Decraene, Martin
Horneffer, 2016-04-12,
<draft-psarkar-spring-mpls-anycast-segments-02.txt,.pdf>
Instead of forwarding to a specific device or to all devices in a
group, anycast addresses, let network devices forward a packet to (or
steer it through) one or more topologically nearest devices in a
specific group of network devices. The use of anycast addresses has
been extended to the Segment Routing (SR) network, wherein a group of
SR-capable devices can represent a anycast address, by having the
same Segment Routing Global Block (SRGB) provisioned on all the
devices and each one of them advertising the same anycast prefix
segment (or Anycast SID).
This document describes a proposal for implementing anycast prefix
segments in a MPLS-based SR network, without the need to have the
same SRGB block (label ranges) provisioned across all the member
devices in the group. Each node can be provisioned with a separate
SRGB from the label range supported by the specfic hardware platform.
"Address Protected Neighbor Discovery for Low-power and Lossy Networks",
Behcet Sarikaya, Pascal Thubert, 2016-03-10,
<draft-sarikaya-6lo-ap-nd-02.txt>
poses non-trivial challenges in the form of selective packetreplication, soft-state and multicast support. iPRP replicates only
time-critical unicast or multicast UDP traffic. iPRP requires no
modifications to the existing monitoring application, end-device
operating system or to the intermediate network devices. It only
requires a simple software installation on the end-devices. iPRP has
a set of diagnostic tools for network debugging. With our
implementation of iPRP in Linux, we show that iPRP supports multiple
flows with minimal processing-and-delay overhead. It is being
installed in our campus smart-grid network and is publicly available.
"T.140 Text Conversation over Data Channels", Keith Drage, Juergen
Stoetzer-Bradler, Albrecht Schwarz, 2016-04-04,
<draft-schwarz-mmusic-t140-usage-data-channel-03.txt>
This document specifies how the ITU-T Protocol for multimedia
application text conversation (Recommendation ITU-T T.140) can be
instantiated as a data channel sub-protocol, using the SDP
offer/answer exchange-based external negotiation defined in [ID.ietf-mmusic-data-channel-sdpneg]. Two network configurations are
documented: a WebRTC end-to-end configuration (connecting two T.140
over data channel endpoints), and a gateway configuration
(connecting an T.140 over data channel endpoint with an T.140 over
RTP/UDP endpoint).
"URI Signing for HTTP Adaptive Streaming (HAS)", Ray van Brandenburg,
2016-03-09, <draft-brandenburg-cdni-uri-signing-for-has-02.txt>
This document defines an extension to the URI Signing mechanism
specified in [I-D.ietf-cdni-uri-signing] that allows for URI Signing
of content delivered via HTTP Adaptive Streaming protocols such as
MPEG DASH or HLS.
The proposed mechanism is applicable to both CDNI as well as singleCDN environments.
"RTP Payload Format for VC-2 HQ Profile Video", James Weaver,
2015-12-16, <draft-weaver-payload-rtp-vc2hq-01.txt>
This memo describes an RTP Payload format for the High Quality (HQ)
profile of SMPTE Standard ST 2042-1 known as VC-2. This document
describes the transport of HQ Profile VC-2 in RTP packets and has
applications for low-complexity, high-bandwidth streaming of both
lossless and lossy compressed video.
The HQ profile of VC-2 is intended for low latency video compression
(with latency potentially on the order of lines of video) at high
data rates (with compression ratios on the order of 2:1 or 4:1).
"IPv6 Backbone Router", Pascal Thubert, 2015-11-09,
<draft-thubert-6lo-backbone-router-03.txt>
This specification proposes an update to IPv6 Neighbor Discovery, to
enhance the operation of IPv6 over wireless links that exhibit lossy
multicast support, and enable a large degree of scalability by
splitting the broadcast domains. A higher speed backbone federates
multiple wireless links to form a large MultiLink Subnet. Backbone
Routers acting as Layer-3 Access Point route packets to registered
nodes, where an classical Layer-2 Access Point would bridge.
Conversely, wireless nodes register to the Backbone Router to setup
<draft-boucadair-lisp-function-discovery-01.txt>
This document specifies extensions to the Open Shortest Path First
(OSPF) protocol for the discovery of Locator/ID Separation Protocol
(LISP) Mapping Service functions, especially the Map-Resolver (MR)
and Map-Server (MS) LISP components.
"A Compact LISP Encapsulation Scheme to Transport IPv4 Packets over an
IPv6 Network", Mohamed Boucadair, Christian Jacquenet, 2015-12-01,
<draft-boucadair-lisp-v6-compact-header-01.txt>
The encapsulation scheme used by the Locator/ID Separation Protocol
(LISP) may sometimes raise MTU issues at the cost of possibly
degrading the overall performance of the LISP network, especially in
IPv6 migration contexts. This document proposes a new, more compact,
encapsulation scheme that aims to accommodate such issues and
facilitate LISP deployment for IPv6 migration purposes, in
particular.
"Improving ITR Resiliency in Locator/ID Separation Protocol (LISP)
Networks", Mohamed Boucadair, Christian Jacquenet, 2016-03-15,
<draft-boucadair-lisp-itr-failure-01.txt>
This document defines an extension to the Locator/ID Separation
Protocol (LISP) to minimize LISP service disruption during Ingress
Tunnel Routers (ITRs) failure events.
"Domain Names", Edward Lewis, 2016-01-28,
<draft-lewis-domain-names-02.txt>
This document states a definition of Domain Name beyond the use of
the term within the Domain Name System. The document includes a
survey of the diverse ways Domain Names have been interpreted within
various protocols over time. The purpose of this is to give a solid
foundation for work on Domain Names across all protocols making use
of Domain Names.
"Architecture for Scheduled Use of Resources", Zhuangyan, Qin Wu, Adrian
Farrel, 2016-03-17, <draft-zhuang-teas-scheduled-resources-01.txt>
Time-Scheduled reservation of traffic engineering (TE) resources can
be used to provide resource booking for TE Label Switched Paths so as
to better guarantee services for customers and to improve the
efficiency of network resource usage into the future. This document
provides a framework that describes and discusses the architecture
for the scheduled reservation of TE resources. This document does
not describe specific protocols or protocol extensions needed to
realize this service.
"Problem Statement for IP in ITS use cases C-ACC and Platooning",
Alexandre Petrescu, Dapeng Liu, Charles Perkins, 2016-04-19,
<draft-petrescu-its-problem-02.txt>
Two vehicle-to-vehicle communications use cases are discussed, namely
Cooperative Adaptive Cruise Control (C-ACC) and Platooning. For
these two use cases, the problems are identified that pertain to
development with Internet protocols and connectivity.
"Criteria for selection of public-key cryptographic algorithms for
quantum-safe hybrid cryptography", John Schanck, William Whyte, Zhenfei
Two or more DNS names may have the same DNS administrative
boundaries. This document adds the function of lookup of domain name
administrative boundary to domain name system, which describes a new
method for using dbound resource record for judging domain name
administrative boundaries.
"Examples of LMAP Objects using IPPM Metrics and Protocols", Al Morton,
2016-03-21, <draft-morton-lmap-examples-01.txt>
In order to examine the completeness and coverage of the LMAP info
and data models, we present examples expressing information from IP
Performance Metric working group metrics and protocols, and the
Performance Metrics Registry. The main update in the version
provides a more realistic and useful example of the Cycle_ID in
measurement instruction and reporting.
"TLS/DTLS PSK Identity Extension", Jayaraghavendran K, Raja K,
2016-01-20, <draft-jay-tls-psk-identity-extension-01.txt>
Pre-Shared Key (PSK) based Key Exchange Mechanism is primarily used
in constrained environments where resource intensive Asymmetric
Cryptography cannot be used. In the Internet of Things (IoT)
deployments, constrained devices are commonly used for collecting
data via sensors for use in home automation, smart energy etc. In
this context, DTLS is being considered as the primary protocol for
communication security at the application layer and in some cases, it
is also being considered for network access authentication.
This document provides a specification for a new extension for
Optimizing DTLS and TLS Handshake when the Pre-Shared Key (PSK) based
Key Exchange is used. This extension is aimed at reducing the number
of messages exchanged and the RTT of the TLS & DTLS Handshakes.
"MS-originated SMRs", Alberto Rodriguez-Natal, Albert Cabellos-Aparicio,
Vina Ermagan, Fabio Maino, Sharon Barkai, 2016-04-04,
<draft-rodrigueznatal-lisp-ms-smr-01.txt>
This document extends [RFC6830] to allow Map Servers to send SMR
messages.
This extension is intended to be used in some SDN deployments that
use LISP as a southbound protocol with (P)ITRs that are compliant
with [RFC6830]. In this use-case mapping updates do not come from
ETRs, but rather from a centralized controller that pushes the
updates directly to the Mapping System. In such deployments, Map
Servers will benefit from having a mechanism to inform directly
(P)ITRs about updates in the mappings they are serving.
"Verification Code Extension for the Extensible Provisioning Protocol
(EPP)", James Gould, 2016-03-10,
<draft-gould-eppext-verificationcode-03.txt>
This document describes an Extensible Provisioning Protocol (EPP)
extension for including a verification code for marking the data for
a transform command as being verified by a 3rd party, which is
referred to as the Verification Service Provider (VSP). The
verification code is digitally signed by the VSP using XML Signature
and is "base64" encoded. The XML Signature includes the VSP signer
certificate, so the server can verify that the verification code
This document provides possible architectural alternatives for linkstate and TE information distribution and their potential impacts on
PCE, network nodes, routing protocols etc.
"Congestion control for 4G and 5G access", Ingemar Johansson,
2016-04-12, <draft-johansson-cc-for-4g-5g-01.txt>
This memo outlines the challenge that 4G and 5G access brings for
transport protocol congestion control and also outlines a few simple
examples that can improve transport protocol congestion control
performance in 4G and 5G access.
"A Mechanism Coping with Unexpected Disruption in Space Delay Tolerant
Networks", Wenfeng Shi, Qi Xu, Bo-Hao Feng, Hua-chun Zhou, 2016-04-04,
<draft-shi-dtn-amcud-01.txt>
This document proposes a coping mechanism used to deal with the
unpredictable disruption problem in Space Delay Tolerant Networks
(DTN) [RFC4838]. Since Licklider Transmission Protocol (LTP)
[RFC5326] provides retransmission-based reliability for bundles,
several times of retransmissions can be seen as a failure occurred
over links. The proposed mechanism is used to direct the following
packets to other nodes and probes the availability of the links
which has disrupted unexpectedly.
"Yang Data Model for IPIPv4 Tunnel", Ying Liu, Adam Foldes, Guangying
Zheng, Zitao Wang, Zhuangyan, 2016-03-21,
<draft-liu-intarea-ipipv4-tunnel-yang-01.txt>
This document defines a YANG data model for the management of IPv4
or IPv6 over IPv4 tunnels. The data model covers configuration data,
operational state data and RPC execution commands.
"Problems in and among industries for the prompt realization of IoT and
safety considerations", Hiroyuki BABA, yoshiki, Takayuki Amatsu, Koichi
KUNITAKE, Kaoru Maeda, 2016-03-10, <draft-baba-iot-problems-01.txt>
This document contains opinions gathered from enterprises engaging in
the IoT business as stated in the preceding version hereof, and also
examines the possibilities of new social problems in the IoT era.
Recognition of the importance of information security has grown in
step with the rising use of the Internet. Closer examination reveals
that the IoT era may see a new direct physical threat to users. For
instance, the situation at a smart house may lead it to judge that
the owner has only temporarily stepped out, causing it to unlock the
front door, which in turn makes it easier for thieves to enter. These
kinds of scenarios may occur without identity fraud, hacking, and
other means of compromising information security. Therefore, for the
purpose of this document, this issue shall be referred to as "IoT
Safety" to distinguish it from Information Security.
We believe that it is necessary to deepen our understanding of these
new IoT-related threats through discussion and ensure there are
measures to address these threats in the future. At the same time, we
must also coordinate these measures with the solutions to the
problems described in the previous version of this document.
"Recursive Monitoring Language in Network Function Virtualization (NFV)
Infrastructures", Xuejun Cai, Catalin Meirosu, Greg Mirsky, 2016-03-21,
<draft-cai-nfvrg-recursive-monitor-01.txt>
Network Function Virtualization (NFV) poses a number of monitoring
challenges; one potential solution to these challenges is a recursive
monitoring language. This document presents a set of requirements
for such a recursive monitoring language.
"PCEP Extensions for BIER", Ran Chen, Zheng Zhang, 2015-12-25,
<draft-chen-pce-bier-01.txt>
Bit Index Explicit Replication (BIER)-TE shares architecture and
packet formats with BIER as described in
([I-D.ietf-bier-architecture]). BIER-TE forwards and replicates
packets based on a BitString in the packet header, but every
BitPosition of the BitString of a BIER-TE packet indicates one or
more adjacencies.BIER-TE Path can be derived from a Path Computation
Element (PCE).
This document specifies extensions to the Path Computation Element
Protocol (PCEP) to handle requests and responses for the computation
of paths for BIER-TE.
"A YANG Data Model for Static Route", LQD, Gang Yan, Shunwan Zhuang,
2015-12-16, <draft-liang-rtgwg-staticrt-yang-cfg-01.txt>
This document defines a YANG data model for static routes. The data
model includes configuration data and state data.
"Authenticated Received Chain (ARC)", None, Kurt Andersen, JohnRG,
Brandon Long, J. Adams, Steven Jones, 2016-04-28,
<draft-andersen-arc-04.txt>
Authenticated Received Chain (ARC) permits an organization which is
creating or handling email to indicate its involvement with the
on" features such as EVPN IRB, EVPN overlay, etc. are for future
investigation. This document mainly focuses on EVPN instance
framework.
"Framework for Temporal Tunnel Services", Huaimo Chen, Mehmet Toy, Lei
Liu, Khuzema Pithewan, 2016-03-21, <draft-chen-teas-frmwk-tts-01.txt>
For existing MPLS LSP tunnel services, it is hard for LSP tunnels to
be booked in advance. In addition, once an LSP tunnel is set up, it
is assumed to consume a certain amount of resources such as link
bandwidth forever.
Temporal LSP tunnel services (TTS) provides an easy way for us to
book temporal LSP tunnels in advance. More importantly, a temporal
LSP is an LSP with one or more time intervals and it is assumed to
consume the resources and carry traffic only in these time intervals.
This document specifies a framework for temporal LSP tunnel services
and provides a few of reference models along with logical components
required to design a solution for TTS.
"RIB YANG Data Model", Acee Lindem, Yingzhen Qu, 2016-03-21,
<draft-acee-rtgwg-yang-rib-extend-01.txt>
The Routing Information Base (RIB) is a list of routes and their
corresponding administrative data and operational state.
The document [ROUTING-CFG] defines the basic building blocks for RIB,
and this model augments it to support multiple next-hops (aka, paths)
for each route as well as additional attributes.
"NFVI PoP Network Topology: Problem Statement", Marcelo Bagnulo, David
Dolson, 2016-03-17, <draft-bagnulo-nfvrg-topology-01.txt>
This documents describes considerations for the design of the
interconnection network of an NFVI PoP.
"Use cases for IPv6 over Networks of Resource-constrained Nodes",
Yong-Geun Hong, Carles Gomez, 2016-03-21,
<draft-hong-6lo-use-cases-01.txt>
This document describes the characteristics of link layer
technologies that are used at constrained node networks and typical
use cases of IPv6 over networks of resource-constrained nodes. In
addition to IEEE 802.15.4, various link layer technologies such as
BLE, ITU-T G.9959 (Z-Wave), DECT-ULE, MS/TP, NFC, and LTE MTC are
widely used at constrained node networks for typical services. Based
on these link layer technologies, IPv6 over networks of resourceconstrained nodes has various and practical use cases. To
efficiently implement typical services, the applicability and
consideration of several design spaces are described.
"CBOR Encoded Message Syntax: Additional Algorithms", Jim Schaad,
2016-03-21, <draft-schaad-cose-alg-01.txt>
This document defines the identifiers and usage for a set of
additional cryptographic algorithms in the CBOR Encoded Message
(COSE) Syntax.
The algorithms setup in this docment are: RSA-PSS, RSA-OAEP, ....
!!TBD!!
"Multiple Ethernet - IPv6 address mapping encapsulation - fixed prefix",
Naoki Matsuhira, 2016-04-18, <draft-matsuhira-me6e-fp-01.txt>
This document specifies Multiple Ethernet - IPv6 address mapping
encapsulation - fixed prefix (ME6E-FP) base specification. ME6E-FP
makes expantion ethernet network over IPv6 backbone network with
encapsuation technoogy. And also, E6ME-FP can stack multiple
Ethernet networks. ME6E-FP work on own routing domain.
"Multiple Ethernet - IPv6 address mapping encapsulation - prefix
resolution", Naoki Matsuhira, 2016-04-18,
<draft-matsuhira-me6e-pr-01.txt>
This document specifies Multiple Ethernet - IPv6 address mapping
encapsulation - Prefix Resolution (ME6E-PR) specification. ME6E-PR
makes expantion ethernet network over IPv6 backbone network with
encapsuation technoogy. And also, E6ME-PR can stack multiple
Ethernet networks. ME6E-PR work on non own routing domain.
"Yang Data Model for Resource Management", Xia Chen, Zhenbin Li,
2015-12-16, <draft-chen-rtgwg-resource-management-yang-01.txt>
This document describes a YANG data model for resource management.
The resource includes mpls label etc. The data model defines the
configuration and operational state for resource management.
"Yang Data Model for BGP/MPLS IP VPN", Zhenbin Li, Shunwan Zhuang,
Xufeng Liu, Jeffrey Haas, Santosh Esale, Bin Wen, 2015-12-20,
<draft-li-bess-l3vpn-yang-01.txt>
This document defines a YANG data model that can be used to configure
and manage L3VPN (BGP/MPLS IP VPN).
"Address Pool Management Yang Data Model", Qiong, Chongfeng Xie,
Mohammed Boucadair, Shucheng LIU, Yiu Lee, 2015-12-11,
<draft-sun-i2apm-address-pool-management-yang-01.txt>
This document describes a YANG data model for address pool
management. It can be used to automatically allocate, update and
delete address pools in different devices of an underlying network.
"HRPC - Report", Avri Doria, 2016-03-21,
<draft-doria-hrpc-report-01.txt>
This document presents an overview snapshot of the HRPC project to
map engineering concepts at the protocol level that may be related to
human rights, with a focus on the promotion and protection of the
freedom of expression and of association.
It provides a framework while reporting on the study including:
theoretical background, results and basic considerations. It will
reference the detailed work being done on terminlogy and case studies
documented in the research draft. It also folds in discussions from
the research literature. The documents, [HRPC-Research] and this
document, form an interrelated set that may later be combined into a
single document.
This draft is still in very early stages and welcomes further
using COAP with a security protocol like DTLS, TLS, or OSCOAP is not
enough. We describe several serious attacks any on-path attacker can
do, and discusses tougher requirements and mechanisms to mitigate the
attacks. While this document is focused on actuators, one of the
attacks applies equally well to sensors using DTLS.
"Inter-Domain DOTS Use Cases", Kaname Nishizuka, 2016-03-20,
<draft-nishizuka-dots-inter-domain-usecases-01.txt>
This document describes inter-domain use cases of the DDoS Open
Threat Signaling(DOTS).
"Yang Data Model for Internet Protocol Security (IPsec)", Khanh Tran,
Honglei Wang, Vijay Nagaraj, Xia Chen, 2016-03-18,
<draft-tran-ipsecme-yang-01.txt>
This document defines a YANG data model that can be used to
configure and manage Internet Protocol Security (IPsec). The model
covers the IPsec protocol operational state, remote procedural
calls, and event notifications data.
"Remote Attestation Procedures for virtualized NSFs (vNSFs) through the
I2NSF Security Controller", Antonio Pastor, Diego Lopez, Adrian Shaw,
2016-03-21, <draft-pastor-i2nsf-vnsf-attestation-02.txt>
This document describes the procedures a user can follow to assess
the trust on a virtualized NSF and its user-defined configuration
through the I2NSF Security Controller. The procedure to assess
trustworthiness is based on a remote attestation of the
virtualization platform and the vNSFs running on it performed through
a Trusted Platform Module (TPM) invoked by the Security Controller.
"Experiences of Implementing ALTO in OpenDaylight", J. Zhang, Kai Gao,
Yang Yang, 2016-04-20, <draft-zhang-alto-opendaylight-impl-01.txt>
This text introduces some experiences of implementing ALTO in
OpenDaylight (ODL). The main key issues about design and
implementation are discussed. Some of these issues have been figured
out in the current implementation, the others have not. This text
also gives some possible designs to discuss.
"RESTful Design for Internet of Things Systems", Ari Keranen, Matthias
Kovatsch, Klaus Hartke, 2016-03-14,
<draft-keranen-t2trg-rest-iot-01.txt>
This document gives guidance for designing Internet of Things (IoT)
systems that follow the principles of the Representational State
Transfer (REST) architectural style.
"A Description of RDAP JSON Messages Using JSON Content Rules", Andrew
Newton, 2016-03-21, <draft-newton-rdap-jcr-01.txt>
This document describes the JSON responses in the Registration Data
Access Protocol with the formal notation of JSON Content Rules.
"Time-Based Uni-Directional Attestation", Andreas Fuchs, Henk Birkholz,
Ira McDonald, Carsten Bormann, 2016-03-21, <draft-birkholz-tuda-01.txt>
This memo documents the method and bindings used to conduct timebased uni-directional attestation between distinguishable endpoints
leafs and spines. The leaf nodes do not need to have the topology
information of other nodes and exact prefixes in the network. This
extension also has application in the Internet of Things (IoT).
"Internationalized Electronic Mail Addresses in RFC5280 / X.509
Certificates", Laetitia Baudoin, Wei Chuang, Nicolas Lidzborkski,
2016-02-04, <draft-lbaudoin-iemax-02.txt>
Specifies support for email address internationalization in RFC5280 /
X.509 certificates. This defines an encoding for Unicode email
local-part characters in certificate Subject Alternative Names and
Issuer Alternative rfc822Names. The encoding is backwards compatible
with existing practices with rfc822Name.
"OpenPGP Message Format", Werner Koch, 2016-03-17,
<draft-koch-openpgp-rfc4880bis-02.txt>
{ Work in progress to update OpenPGP }
This document is maintained in order to publish all necessary
information needed to develop interoperable applications based on the
OpenPGP format. It is not a step-by-step cookbook for writing an
application. It describes only the format and methods needed to
read, check, generate, and write conforming packets crossing any
network. It does not deal with storage and implementation questions.
It does, however, discuss implementation issues necessary to avoid
security flaws.
OpenPGP software uses a combination of strong public-key and
symmetric cryptography to provide security services for electronic
communications and data storage. These services include
confidentiality, key management, authentication, and digital
signatures. This document specifies the message formats used in
OpenPGP.
"Connecting IPv4 Islands over IPv6 MPLS Using IPv4 Provider Edge Routers
(4PE)", Zhenqiang Li, 2016-03-08, <draft-li-bess-4pe-01.txt>
This document explains how to interconnect IPv4 islands over a
Multiprotocol Label Switching (MPLS)-enabled IPv6-only core. This
approach relies on IPv4 Provider Edge routers (4PE), which are Dual
Stacks in order to connect to IPv4 islands and to the MPLS core. The
4PE routers exchange the IPv4 reachability information transparently
over the core using the Multiprotocol Border Gateway Protocol (MPBGP). MP-BGP is extended to do this. A new Subsequence Address
Family Identifier (SAFI) with corresponding new format Network Layer
Reachability Information (NLRI), is introduced. The BGP Next Hop
field is used to convey the IPv4 address of the 4PE router, a field
is added in Network Layer Reachability Information (NLRI) to convey
the IPv6 address of the 4PE router, so that dynamically established
IPv6-signaled MPLS Label Switched Paths (LSPs) can be used without
explicit tunnel configuration.
"Requirements and Challenges for IoT over ICN", Yanyong Zhang, Dipankar
Raychadhuri, Luigi Grieco, Emmanuel Baccelli, Jeff Burke, Ravi
Ravindran, Guoqiang Wang, Bengt Ahlgren, Olov Schelen, 2016-04-22,
<draft-zhang-icnrg-icniot-requirements-01.txt>
The Internet of Things (IoT) promises to connect billions of objects
to the Internet. After deploying many stand-alone IoT systems in
"Nameserver objects sharing the same name, support for the Registration
Data Access Protocol (RDAP)", Gustavo Lozano, 2016-04-22,
<draft-lozano-rdap-nameservers-sharing-name-01.txt>
This document describes a Registration Data Access Protocol (RDAP)
extension that may be used to retrieve the registration information
of a particular nameserver object sharing the name with other
nameserver objects.
"Cache Digests for HTTP/2", Kazuho Oku, Mark Nottingham, 2016-01-06,
<draft-kazuho-h2-cache-digest-00.txt>
This specification defines a HTTP/2 frame type to allow clients to
inform the server of their cache's contents. Servers can then use
this to inform their choices of what to push to clients.
Note to Readers
The issues list for this draft can be found at
https://github.com/mnot/I-D/labels/h2-cache-digest .
The most recent (often, unpublished) draft is at
https://mnot.github.io/I-D/h2-cache-digest/ .
Recent changes are listed at https://github.com/mnot/I-D/commits/ghpages/h2-cache-digest .
"A MILP Model to Solve the Problem of Loading Balance of Routing and
Wavelength Assignment for Optical Transport Networks", Shan Yin, Shanguo
Huang, Dajiang Wang, Xuan Wang, Yu Zhang, 2016-04-19,
<draft-yin-milp-rwa-otn-02.txt>
The RWA problem can be formulated as a Mixed-Integer linear program.
Load balancing is a key factor for the optical transport networks.
However, the existed approaches using mixed-Integer linear program to
solve the RWA problem are not perfect enough without considering the
load balancing of the networks.
This documentary provides a model of Mixed-Integer Linear Programming
to solve the problem of load balancing needed by routing and
wavelength assignment (RWA) process in optical transport networks.
"TLS Extension for DANE Client Identity", Shumon Huque, Viktor Dukhovni,
2016-01-08, <draft-huque-tls-dane-clientid-00.txt>
This document specifies a TLS and DTLS extension to convey a DNSBased Authentication of Named Entities (DANE) Client Identity to a
TLS or DTLS server. This is useful for applications that perform TLS
client authentication via DANE TLSA records.
"SMTP Require TLS Option", Jim Fenton, 2016-02-13,
<draft-fenton-smtp-require-tls-01.txt>
The SMTP STARTTLS option, used in negotiating transport-level
encryption of SMTP connections, is not as useful from a security
standpoint as it might be because of its opportunistic nature;
message delivery is prioritized over security. This document
describes a complementary SMTP service extension, REQUIRETLS. If the
REQUIRETLS option is used when sending a message, it causes message
This document specifies Version 1.0 of JWB which uses HTTP/1.1 for
transport. Use of the multiple stream capabilities of HTTP version 2
is outside the scope of this document.
"Mathematical Mesh: Architecture", Phillip Hallam-Baker, 2016-03-07,
<draft-hallambaker-mesh-architecture-01.txt>
The Mathematical Mesh 'The Mesh' is an end-to-end secure
infrastructure that facilitates the exchange of configuration and
credential data between multiple user devices. The architecture of
the Mesh and examples of typical applications are described.
"Mathematical Mesh: Reference", Phillip Hallam-Baker, 2016-03-07,
<draft-hallambaker-mesh-reference-02.txt>
The Mathematical Mesh 'The Mesh' is an end-to-end secure
infrastructure that facilitates the exchange of configuration and
credential data between multiple user devices. The core protocols of
the Mesh are described with examples of common use cases and
reference data.
"Mathematical Mesh: Developer's Guide", Phillip Hallam-Baker,
2016-03-07, <draft-hallambaker-mesh-developer-01.txt>
The Mathematical Mesh 'The Mesh' is an end-to-end secure
infrastructure that facilitates the exchange of configuration and
credential data between multiple user devices.
This document describes how to install and run the Mesh reference
code and make use of the reference code in applications. It does not
form a part of the Mesh specifications and is not normative.
"DNS Extension to provide Default (Preferred) Protocol", Piotr
Kupisiewicz, 2016-02-01, <draft-pkupisie-dnsop-dprot-01.txt>
This document defines extension to the Domain Name System to support
Default Protocol. Default Protocol extension allows owners of the
resources to determine which are preferred protocols to be used with
their Services (i.e. https protocol to be preferred instead of http
for specific servers).
"Considerations for stateful vs stateless join router in ANIMA
bootstrap", Michael Richardson, 2016-01-16,
<draft-richardson-anima-state-for-joinrouter-00.txt>
This document explores a number of issues affecting the decision to
use a stateful or stateless forwarding mechanism by the join router
(aka join assistant) during the bootstrap process for ANIMA.
"Privacy considerations for IP broadcast and multicast protocol
designers", Rolf Winter, Michael Faath, Fabian Weisshaar, 2016-03-21,
<draft-winfaa-intarea-broadcast-consider-01.txt>
A number of application-layer protocols make use of IP broadcasts or
multicast messages for functions such as local service discovery or
name resolution. Some of these functions can only be implemented
efficiently using such mechanisms. When using broadcasts or
multicast messages, a passive observer in the same broadcast domain
can trivially record these messages and analyze their content.
Therefore, broadcast/multicast protocol designers need to take
2016-01-29, <draft-jacpra-bmwg-pmtest-00.txt>
This draft is proposed for benchmarking the Y1731 performance
monitoring on DUT in various scenarios.
"Benchmarking Methodology for EVPN", Kishore Tiruveedhula, 2016-01-31,
<draft-kishjac-bmwg-evpntest-00.txt>
This document defines the methodologies for benchmarking performance
of EVPN. EVPN been implemented with many varying designs in order to
achieve their intended network functionality.
"Uniform Resource Name (URN) Namespaces for Broadband Forum", Barbara
Stark, David Sinicrope, William Lupton, 2016-04-04,
<draft-bbf-bbf-urn-01.txt>
This document describes the Namespace Identifiers (NIDs) 'bbf',
'broadband-forum-org', and 'dslforum-org' for Uniform Resource Names
(URNs) used to identify resources published by Broadband Forum (BBF).
BBF specifies and manages resources that utilize these three URN
identification models. Management activities for these and other
resource types are handled by BBF.
"The Use of Registries", Erik Wilde, 2016-02-03,
<draft-wilde-registries-01.txt>
Registries on the Internet and the Web fulfill a wide range of tasks,
ranging from low-level networking aspects such as packet type
identifiers, all the way to application-level protocols and
standards. This document summarizes some of the reasons of why and
how to use registries, and how some of them are operated. It serves
as a informative reference for specification writers considering
whether to create and manage a registry, allowing them to better
understand some of the issues associated with certain design
discussions.
"Updating the ex officio member of the IAB in the IAOC", Ted Hardie,
Andrew Sullivan, Russ Housley, 2016-02-18,
<draft-hardie-iaoc-iab-update-02.txt>
This document updates the way in which the ex officio member from the
IAB who serves on the IAOC is appointed in order to better match the
skills set out in RFC 4333.
"An X.509 Extension for Manufacturer Usage Description URI", Eliot Lear,
2016-02-02, <draft-lear-ietf-pkix-mud-extension-00.txt>
Manufacturer User Descriptions are used by device manufacturers to
provide indications to the network as to the intended use of a
particular device and with what end points it might communicate. A
URI points to those descriptions. This memo specifies an X.509
certificate extension to specify that URI in a device certificate to
be used with IEEE 802.1AR.
"PKCS #1 Version 2.2: RSA Cryptography Specifications", Kathleen
Moriarty, Burt Kaliski, Jakob Jonsson, A. Rusch, 2016-04-06,
<draft-moriarty-pkcs1-01.txt>
This memo represents a republication of PKCS #1 v2.2 from RSA
Laboratories' Public-Key Cryptography Standards (PKCS) series. By
host from IPv6 host. IPv4 host is identified as M46 address in IPv6
address space. The address assigned to IPv4 host may be global IPv4
address or private IPv4 address. M46T does not support access to
IPv6 host from IPv4 only host.
"Multiple IPv4 address and port number - IPv6 address mapping
encapsulation (M4P6E)", Naoki Matsuhira, 2016-02-03,
<draft-matsuhira-m4p6e-00.txt>
This document specifies Multiple IPv4 address and port number - IPv6
address mapping encapulation (M4P6E) specification.
"Security and Privacy Implications of Numeric Identifiers Employed in
Network Protocols", Fernando Gont, Ivan Arce, 2016-02-04,
<draft-gont-predictable-protocol-ids-00.txt>
This document performs an analysis of the security and privacy
implications of different types of "numeric identifiers" used in IETF
protocols, and tries to categorize them based on their
interoperability requirements and the assoiated failure severity when
such requirements are not met. It describes a number of algorithms
that have been employed in real implementations to meet such
requirements and analyzes their security and privacy properties.
Additionally, it provides advice on possible algorithms that could be
employed to satisfy the interoperability requirements of each
identifier type, while minimizing the security and privacy
implications, thus providing guidance to protocol designers and
protocol implementers. Finally, it provides recommendations for
future protocol specifications regarding the specification of the
aforementioned numeric identifiers.
"Security and Privacy Implications of Numeric Identifiers Employed in
Network Protocols", Fernando Gont, Ivan Arce, 2016-02-04,
<draft-gont-predictable-numeric-ids-00.txt>
This document performs an analysis of the security and privacy
implications of different types of "numeric identifiers" used in IETF
protocols, and tries to categorize them based on their
interoperability requirements and the assoiated failure severity when
such requirements are not met. It describes a number of algorithms
that have been employed in real implementations to meet such
requirements and analyzes their security and privacy properties.
Additionally, it provides advice on possible algorithms that could be
employed to satisfy the interoperability requirements of each
identifier type, while minimizing the security and privacy
implications, thus providing guidance to protocol designers and
protocol implementers. Finally, it provides recommendations for
future protocol specifications regarding the specification of the
aforementioned numeric identifiers.
"DNS Delegation Requirements", Patrik Wallstrom, Jakob Schlyter,
2016-02-04, <draft-wallstrom-dnsop-dns-delegation-requirements-00.txt>
This document outlines a set of requirements on a well-behaved DNS
delegation of a domain name. A large number of tools have been
developed to test DNS delegations, but each tool uses a different set
of requirements for what is a correct setup for a delegated domain
name. However, there are few requirements on how to set up DNS in
order to just make the delegation work. In order to have a wellbehaved delegation that is robust to failures and also makes DNS
class. The class field is not effective, and it is not used the way
it appears to have been intended. This memo closes the DNS class
registry and requires those defining new RRTYPEs to define them for
all classes.
"Software-Defined Storage Definition and Overview", Eui-Nam Huh, Gawon
Lee, Yunkon Kim, Jintaek Kim, 2016-02-14,
<draft-sds-definition-overview-00.txt,.pdf>
In accordance with rapid increase of data related to IoT and big
data, techniques to control high capacity data is currently active
and vibrant research field. Enterprises are trying to manage data on
the cloud because of flexibility and capability. However, there are
some limits to handle data intelligently in cloud. The SDS is
considered as a good technique regarding this manner. SDS improves
efficiency, scalability and flexibility in scale-out architecture,
as well as, provides a cost effective solution using the existing
storage resources efficiently.
"Software-Defined Storage Reference Model and Use-case", Eui-Nam Huh,
Gawon Lee, Yunkon Kim, Dongha Oh, 2016-02-14,
<draft-sds-reference-usecase-00.txt,.pdf>
In IoT, IoE era, the cloud needs to accommodate enormous requests,
and also the cloud has to provide unlimited scalability, real-time
analysis, and workload integration. Thus, inter-cloud storages
integration is required and a standard for complete integration
between cloud and legacy system is compulsory. Physical host and
storage integration from the perspective of bare metal provisioning
are also under the spotlight. The SDS is a proper technique to fulfil
this issue. According to the increasing demand for software defined
storage, it is required to develop software defined storage reference
model.
"Captive Portals Problem Statement", Mark Nottingham, 2016-04-04,
<draft-nottingham-capport-problem-01.txt>
This draft attempts to establish a problem statement for "Captive
Portals", in order to inform discussions of improving their
operation.
Note to Readers
The issues list for this draft can be found at
https://github.com/mnot/I-D/labels/capport-problem .
The most recent (often, unpublished) draft is at
https://mnot.github.io/I-D/capport-problem/ .
Recent changes are listed at https://github.com/mnot/I-D/commits/ghpages/capport-problem .
"Applicability of the Babel routing protocol", Juliusz Chroboczek,
2016-02-29, <draft-chroboczek-babel-applicability-01.txt>
This document describes some application areas where the Babel
routing protocol [RFC6126] has been found to be useful.
"Problem Statement for Vehicle-to-Infrastructure Networking", Jaehoon
Jeong, Tae Oh, 2016-02-15,
<draft-jeong-its-v2i-problem-statement-00.txt>
This document specifies the problem statement for IPv6-based vehicleto-infrastructure networking. Dedicated Short-Range Communications
(DSRC) is standardized as IEEE 802.11p for the wireless media access
in vehicular networks. This document addresses the extension of IPv6
as the network layer protocol in vehicular networks and is focused on
the networking issues in one-hop communication between a Road-Side
Unit (RSU) and vehicle. The RSU is connected to the Internet and
allows vehicles to have the Internet access if connected. The major
issues of including IPv6 in vehicular networks are neighbor discovery
protocol, stateless address autoconfiguration, and DNS configuration
for the Internet connectivity over DSRC. Also, when the vehicle and
the RSU have an internal network, respectively, the document
discusses the issues of internetworking between the vehicle's
internal network and the RSU's internal network.
"Infrastructure Service Forwarding For NSH", Surendra, Kent Leung, Peter
Bosch, Dongkee Lee, Rajeev Manur, Andrew Dolganow, Sumandra Majee, Joel
Halpern, 2016-02-15, <draft-kumar-sfc-nsh-forwarding-00.txt>
This draft describes the separation of service forwarding function
and service delivery function abstractions, along with the mechanics
of NSH encapsulated packet forwarding with such separation, in SFC
deployments.
This separation frees the service functions from making forwarding
decisions and the necessary control plane integration, thereby
keeping the service functions simple and focused on service delivery.
Further, this separation fully contains the forwarding decisions in
forwarding functions, thereby allowing implementations to enforce
integrity of the forwarding state carried in NSH which in turn is
required for correctly forwarding NSH encapsulated packets.
"BIER TE YANG module", Zheng Zhang, Cui Wang, Ran Chen, fangwei hu,
2016-02-29, <draft-zhang-bier-te-yang-01.txt>
This document defines a YANG data model for BIER TE configuration and
operation.
"Centralized EVPN DF Election", Hao Weiguo, Lili Wang, Li Yizhou,
Shunwan Zhuang, 2016-02-15, <draft-hao-bess-evpn-centralized-df-00.txt>
This document proposes a centralized DF Designated Forwarder
election mechanism to be used between the SDN(Software defined
network) controller and each PE(Provider Edge) in EVPN network. Such
a mechanism overcomes the issues of current standalone DF election
defined in RFC7432. A new BGP capability and an additional DF
Election Result Route Type are proposed to support the centralized
DF mechanism.
"DHCP option for NSH in Service Function Path (SFP)", Yogendra Pal,
Vikram Menon, venkat gorrepati, 2016-02-16,
<draft-ypal-sfc-dhcp-option-for-nsh-for-sfp-00.txt>
This draft specifies Dynamic Host Configuration Protocol option
(both DHCPv4 and DHCPv6) for NSH aware clients participating in
the service function path(SFP) of the service chaining. As part
of this proposal SFF and SF will receive the SFP information
containing Service Path Identifier(SPI), Transport protocol and
they form in a consistent, scalable, extensible, secure, energyefficient manner with low computational and protocol complexity
cannot be done in an ad-hoc manner. This document outlines the
problem at hand and provides a roadmap of the possible solutions
develped at the IETF. The description includes the basic constrained
management problem, as well as properties of the solution. Details
as to the Constrained Objecs Language (CoOL) protocol itself can be
found in companion documents.
"CBOR Encoding of Data Modeled with YANG", Michel Veillette, Alexander
Pelov, Abhinav Somaraju, Randy Turner, Ana Minaburo, 2016-03-11,
<draft-veillette-core-yang-cbor-mapping-00.txt>
This document defines encoding rules for serializing configuration
data, state data, RPC input and RPC output, Action input, Action
output and notifications defined within YANG modules using the
Concise Binary Object Representation (CBOR) [RFC7049].
"DNS Transport over TCP - Operational Requirements", John Kristoff,
2016-03-11, <draft-kristoff-dnsop-dns-tcp-requirements-00.txt>
This document encourages the practice of permitting DNS messages to
be carried over TCP on the Internet. It also describes some of the
consequences of this behavior and the potential operational issues
that can arise when this best common practice is not applied.
"Multi-Stage Transparent Server Load Balancing", Naoki Matsuhira,
2016-03-12, <draft-matsuhira-mslb-00.txt>
This document specifies Multi-Stage Transparent Server Load Balancing
(MSLB) specification. MSLB make server load balancing over Layer3
network without packet header change at client and server. MSLB make
server load balancing with any protocol and protocol with encription
such as IPsec ESP, SSL/TLS.
"Use of BGP for dissemination of ILA mapping information", Petr
Lapukhov, 2016-03-21, <draft-lapukhov-bgp-ila-afi-01.txt>
Identifier-Locator Addressing [I-D.herbert-nvo3-ila] relies on
splitting the 128-bit IPv6 address into identifier and locator parts
to implement identifier mobility, and network virtualization. This
document proposes a method for distributing the identifier to locator
mapping information using Multiprotocol Extensions for BGP-4
[RFC4760].
"Packet Loss measurement for layer2 services", Bharat Gaonkar, Praveen
Ananthasankaran, sudhin jacob, 2016-03-12,
<draft-bhaprasud-lime-pm-00.txt>
This memo defines the loss measurement over a point-to-point service.
Loss will be measured over this service in single class colored and
colorless mode.
"The Constrained RESTful Application Language (CoRAL)", Klaus Hartke,
2016-03-13, <draft-hartke-t2trg-coral-00.txt>
The Constrained RESTful Application Language (CoRAL) is a compact,
binary representation format for hypermedia-driven applications. It
supports links, forms and the embedding of resource representations.
<draft-pularikkal-virtual-cpe-00.txt>
Broadband Service Provider Industry has been gearing towards the
adoption of Virtual CPE (vCPE) solutions. The concept of vCPE is
build around the idea that the physical CPE device at the customer
premises can be simplified by moving some of the key feature
functionalities from the physical CPE device to the Service Provider
Network. This document starts discussing the drivers behind vCPE
adoption followed by Solution level requirements. Two key
Architecture models for vCPE, which can address the service provider
and subscriber requirements, are covered in this reference document.
Document also touches up on some of the key deployment
considerations, which can influence the adoption of the vCPE
architecture models.
"I2RS Data Flow Requirements", Susan Hares, amit.dass@ericsson.com,
2016-05-05, <draft-hares-i2rs-dataflow-req-04.txt,.pdf>
This document covers requests to the netmod and netconf Working
Groups for functionality to support the data flows described in the
I2RS architecture and the I2RS use cases requirements summary.
"IPv4 Declared Historic", Lee Howard, 2016-03-14,
<draft-howard-sunset4-v4historic-00.txt>
IPv4 has been superseded by IPv6, and is therefore Historic.
"Decomposing the Hypertext Transfer Protocol", Mike Bishop, 2016-03-14,
<draft-bishop-httpbis-decomposing-http-00.txt>
The Hypertext Transfer Protocol in its various versions combines
concepts of both an application and transport-layer protocol. As
this group contemplates employing alternate transport protocols
underneath HTTP, this document attempts to delineate the boundaries
between these functions to define a shared vocabulary in discussing
the revision and/or replacement of one or more of these components.
"Implementation Report for BGP FlowSpec RPD", Nan Wu, Shankara Devadiga,
2016-03-15, <draft-wu-idr-flowspec-rpd-impl-00.txt>
BGP FlowSpec Extensions for Routing Policy Distribution (RPD) has
provided a mechanism to use BGP Flowspec address family as routingpolicy distribution protocol.
This document provides an implementation report for RPD mechanism on
inbound-traffic and outbound-traffic adjustment scenarios. What's
more, it gives some details and consideration for exceptions during
development and verification.
"VLAN Extension to DLEP", Ashish Dalela, Arun Parashar, Ananth S,
2016-03-15, <draft-dalela-vlans-and-dlep-01.txt>
This document introduces optional extension to the core DLEP
specification for VLAN encapsulation.
"Carry congestion status in BGP extended community", Zhenqiang Li, Jie
Dong, 2016-03-15,
<draft-li-idr-congestion-status-extended-community-00.txt>
A new extended community is introduced in this document to carry the
link congestion status, especially for the exit link of one AS. We
call this extended community congestion status community, which can
be used by the BGP routers to steer the Internet-access traffic among
the exit links by deploying policy routing.
"Secondary Server-Certificate Authentication in HTTP/2", Mike Bishop,
2016-03-15, <draft-bishop-httpbis-http2-additional-certs-00.txt>
Many HTTP servers host content from several origins. HTTP/2
[RFC7540] permits clients to reuse an existing HTTP connection to a
server provided that certain conditions are satisfied. One of these
conditions is the inclusion of the secondary origin in the
certificate provided during the TLS [I-D.ietf-tls-tls13] handshake.
In many cases, origins will wish to maintain separate certificates
for different origins but still desire the benefits of a shared HTTP
connection. This draft describes how frames which were defined to
transfer client certificates might be used to provide additional
server certificates as well.
"The CCNx URI Scheme", marc.mosko@parc.com, Christopher Wood,
2016-04-06, <draft-mosko-icnrg-ccnxurischeme-01.txt>
This document defines an RFC3986 URI compliant identifier called a
Labeled Segment URI in which name segments carry a label. This
allows differentiation between unrelated resources with similar
identifiers. This document also specifies the CCNx URI scheme,
called "ccnx:," which conforms to the labeled segment encoding rules
presented here. The CCNx URI scheme applies specific labels to each
name segment of a URI to disambiguate between resources with similar
names. This document defines a specific set of segment labels with
label semantics.
"I2RS protocol strawman", Susan Hares, 2016-03-15,
<draft-hares-dt-i2rs-protocol-strawman-00.txt,.pdf>
This document provides a strawman proposal for the I2RS protocol
covering the ephemeral data store and data flow requirements not
covered by i2rs publication/subscription service or traceability. It
also proposes additions to YANG for the ephemeral data store and for
additional data flow requirements. It proposes additions to the
NETCONF and RESTCONF for these additions. Future versions of this
document will propose changes to support the I2RS protocol security
requirements.
"I2RS protocol strawman", Susan Hares, Andy Bierman,
amit.dass@ericsson.com, 2016-05-05,
<draft-hares-i2rs-protocol-strawman-02.txt,.pdf>
This strawman proposal for the I2RS protocol supports I2RS
requirements for ephemeral data store, management data flows, and
protocol security. It proposes additions to the NETCONF, RESTCONF,
and YANG for these requirements.
"IEEE 802.15.4 Information Element for IETF", Tero Kivinen, Pat Kinney,
2016-04-22, <draft-kivinen-802-15-ie-02.txt>
IEEE Std 802.15.4 has Information Elements (IE) that can be used to
extend the 802.15.4 in interoperable manner. IEEE 802.15 Assigned
Numbers Authority (ANA) manages the registry of the Information
<draft-bsipos-dtn-amp-yang-01.txt>
This document specifies a YANG profile for defining Application Data
Model (ADM) schema for the Asynchronous Management Protocol (AMP).
The AMP has no relation to NETCONF; YANG is used here only for its
language syntax, and its module and type systems.
"Research into Human Rights Protocol Considerations", Niels Oever,
Corinne Cath, 2016-05-05, <draft-tenoever-hrpc-research-01.txt>
The increased intertwinement of Internet and society increases the
impact of the Internet on the lives of individuals. Because of this,
the design and development of the architecture of the Internet also
has an increasing impact on society. This has led to an increasing
recognition that human rights [UDHR] [ICCPR] [ICESCR] have a role in
the development and management of the Internet [HRC2012] [UNGA2013]
[NETmundial]. It has also been argued that the Internet should be
strenghtened as a human rights enabeling environment [Brown].
This document provides a proposal for a glossary to discuss the
relation between human rights and Internet protocols, an overview of
the discussion, a proposal for the mapping of the relation between
human rights and technical concepts, and a proposal for guidelines
for human rights considerations, similar to the work done on the
guidelines for privacy considerations [RFC6973].
Discussion of this draft at: hrpc@irtf.org //
https://www.irtf.org/mailman/listinfo/hrpc
"DNS Name Autoconfiguration for Internet of Things Devices", Jaehoon
Jeong, Sejun Lee, Park Jung-Soo, 2016-03-17,
<draft-jeong-its-iot-dns-autoconf-00.txt>
This document specifies an autoconfiguration scheme for the global
(or local) DNS names of Internet of Things (IoT) devices, such as
sensors, actuators, and in-vehicle units. By this scheme, the DNS
name of an IoT device can be autoconfigured with the device's
category and model in wired and wireless target networks (e.g.,
vehicle, road network, home, office, shopping mall, and smart grid).
This DNS name lets IoT users (e.g., drivers, passengers, home
residents, and customers) in the Internet (or local network) easily
identify each device for monitoring and remote-controlling it in the
target network.
"A YANG model to manage the optical interface parameters for an external
transponder in a WDM network", Gabriele Galimberti, Ruediger Kunze,
Hing-Kam Lam, Dharini Hiremagalur, Gert Grammel, Luyuan Fang, Gary
Ratterree, 2016-03-17, <draft-dharini-ccamp-dwdm-if-yang-00.txt>
This memo defines a Yang model that translates the SNMP mib module
defined in draft-galikunze-ccamp-dwdm-if-snmp-mib for managing single
channel optical interface parameters of DWDM applications. This
model is to support the optical parameters specified in ITU-T G.698.2
[ITU.G698.2] and application identifiers specified in ITU-T G.874.1
[ITU.G874.1] . Note that G.874.1 encompasses vendor-specific codes,
which if used would make the interface a single vendor IaDI and could
still be managed.
The Yang model defined in this memo can be used for Optical
Parameters monitoring and/or configuration of the endpoints of the
This document lists some typical use cases for traffic steering
services. This document does not attempt to enumerate all kinds of
scenarios, but rather it describes several key features of these
scenarios from which solutions may be constructed.
"Conveying Vendor-Specific Information in the Path Computation Element
(PCE) Communication Protocol (PCEP) extensions for stateful PCE.", Dhruv
Dhody, 2016-03-18, <draft-dhody-pce-stateful-pce-vendor-00.txt>
A Stateful Path Computation Element (PCE) maintains information on
the current network state, including: computed Label Switched Path
(LSPs), reserved resources within the network, and pending path
computation requests. This information may then be considered when
computing new traffic engineered LSPs, and for associated and
dependent LSPs, received from Path Computation Clients (PCCs).
RFC 7470 defines a facility to carry vendor-specific information in
PCEP.
This document extends this capability for stateful PCE.
"BIER-TE Ping and Trace", Ran Chen, Shaofu Peng, 2016-03-18,
<draft-chen-bier-te-ping-00.txt>
Bit Index Explicit Replication (BIER)-TE shares architecture and
packet formats with BIER as described in
[I-D.ietf-bier-architecture]. BIER-TE forwards and replicates
packets based on a BitString in the packet header, but every
BitPosition of the BitString of a BIER-TE packet indicates one or
more adjacencies.
This document describes the mechanism and basic BIER-TE OAM packet
format that can be used to perform Ping and Traceroute on BIER-TE
network.
"PCEP Extensions for Bidirectional Forwarding Detection", Zhenbin Li,
Xia Chen, 2016-03-18, <draft-li-pce-bfd-00.txt>
This document describes the extensions to the PCEP to notify BFD
parameters for LSPs from PCE to PCC for PCE-initiated LSP. The
extensions include BFD protocol parameters and allow PCC to support
BFD for PCE-Initiated LSP whose BFD session is a bi-directional corouted channel.
"I2NSF Management Traffic Flow Requirement", Susan Hares, 2016-03-20,
<draft-hares-i2nsf-mgtflow-reqs-01.txt,.pdf>
This document discuss the stresses on I2NSF management traffic during
periods DDoS and network attacks, and how application layer tuning of
I2NSF management traffic can improve the managementtraffic flow.
"Data-plane probe for in-band telemetry collection", Petr Lapukhov,
2016-03-18, <draft-lapukhov-dataplane-probe-00.txt>
Detecting and isolating network faults in IP networks has
traditionally been done using tools like ping and traceroute (see
[RFC7276]) or more complex systems built on similar concepts of
active probing and path tracing. While using active synthetic probes
is proven to be helpful in detecting data-plane faults, isolating
Yang, Yanhe Fan, Mehmet Toy, Zhenqiang Li, Lei Liu, 2016-03-21,
<draft-chen-idr-com-cntlrs-00.txt>
This document describes extensions to the BGP routing protocol for
supporting communications among SDN controllers in a centralized
control system, which comprises multiple SDN controllers controlling
a network with a number of domains.
"PASSporT Extension for Caller Name", Jon Peterson, Chris Wendt,
2016-03-21, <draft-peterson-stir-cnam-00.txt>
This document extends the PASSporT object, which conveys
cryptographically-signed information about the people involved in
personal communications, to include a human-readable display name
comparable to the "Caller ID" function common on the telephone
network.
"SACM Information Model", Henk Birkholz, Nancy Cam-Winget, 2016-03-21,
<draft-cam-winget-sacm-information-model-00.txt>
This document defines the data types and data relations and
operations that comprise the information model for Security
Automation and Continuous Monitoring (SACM) of posture information.
This information model is maintained as the IANA "SACM Information
Elements" registry. This document defines the initial set and
contents to address SACM's use cases (RFC7632).
Please help this paragraph becoming an abstract.
"Concise Software Identifiers", Henk Birkholz, Jessica Fitzgerald-McKay,
Charles Schmidt, D. Waltermire, 2016-03-21,
<draft-birkholz-sacm-coswid-00.txt>
This document defines a concise representation of ISO 19770-2:2015
Software Identifiers (SWID tags) that is interoperable with the XML
schema definition of ISO 19770-2:2015.
"A JSON format for LGR files", Audric Schiltknecht, 2016-03-21,
<draft-schiltknecht-lager-json-00.txt>
This document defines a JSON format for LGRs (Label Generation
Rules). LGRs are used to represent rules for validating identifier
labels and their alternate representations. These LGRs are expressed
in XML as defined in [I-D.ietf-lager-specification].
"Encrypted Key Transport for Secure RTP", John Mattsson, David McGrew,
Dan Wing, Cullen Jennings, 2016-04-20,
<draft-jennings-perc-srtp-ekt-diet-01.txt>
IMPORTANT: This draft is just a cut down version of draft-ietfavtcore-srtp-ekt-03 to help discussion about the key parts of EKT for
the PERC WG. Any changes decided here would need to be synchronized
with the draft-ietf-avtcore-srtp-ekt draft. Nearly all the text here
came from draft-ietf-avtcore-srtp-ekt and the authors of that draft.
Encrypted Key Transport (EKT) is an extension to Secure Real-time
Transport Protocol (SRTP) that provides for the secure transport of
SRTP master keys, Rollover Counters, and other information within
SRTP. This facility enables SRTP to work for decentralized
conferences with minimal control by allowing a common key to be used
live". The "bytes-live" range unit provides the ability for a client
to specify a byte range in a GET or HEAD request which starts at an
arbitrary byte offset within the representation and ends at an
indeterminate offset, represented by "*".
"A Uniform Resource Name (URN) Namespace for SCTE", Darshak Thakore,
Niem Dang, Gary Hughes, 2016-04-03, <draft-dthakore-scte-urn-00.txt>
This document describers the Namespace Identifier (NID) 'scte' for
Uniform Resource Names (URNs) used to identify resources published by
the Society of Cable Telecommunications Engineers (SCTE). SCTE
specifies and manages resources that utilize this URN identification
model. Management activities for these and other resource types are
handled by the SCTE.
"Microwave Radio Link YANG Data Models", Jonas Ahlberg, Jan-Olof
Carlson, Hans-Ake Lund, Thomas Olausson, 2016-04-04,
<draft-ahlberg-ccamp-microwave-radio-link-00.txt>
YANG model for managing microwave radio link functionality.
"YANG Model for QoS", Aseem Choudhary, Mahesh Jethanandani, 2016-04-04,
<draft-asechoud-netmod-qos-model-00.txt>
This document describes a YANG model for Quality of Service (QoS)
configuration and operational parameters.
"OPEN-O (Orchestrator)", DENG Hui, Uri Elzur, 2016-04-04,
<draft-deng-opsawg-nfvrg-sdnrg-openo-00.txt>
OPEN-O(Orchestrator) Project was presented for the first time during
Open Network Summit 2016 in Santa Clara. The purpose of OPEN-O would
intent to propose an open source project under Linux foundation. It
includes cross domain orchestrator, SDN-O and NFV-O. SDN-O is
sitting on top of SDN Controller like ODL or ONOS and somewhere
below the SDN APP. NFVO is aligned with ETSI NFV ISG. This document
is seeking for the relationship between open standard IETF and open
source project OPEN-O.
"Piggybacked DTLS Handshakes in SDP", Eric Rescorla, 2016-04-04,
<draft-rescorla-dtls-in-sdp-00.txt>
This document describes a mechanism for embedding DTLS handshake
messages in SDP descriptions. This technique allows implementations
to shave a full round-trip off of DTLS-SRTP session establishment,
while retaining compatibility with ordinary DTLS-SRTP endpoints.
"Constrained Application Protocol (CoAP) over IEEE 802.15.4 Information
Element for IETF", Carsten Bormann, 2016-04-04,
<draft-bormann-6lo-coap-802-15-ie-00.txt>
IEEE Std. 802.15.4-2015 defines Information Elements (IE), and draftkivinen-802-15-ie defines a framework for using these IEs in IETF
protocols.
The present specification defines a way to transport CoAP messages in
IEs. This can be used to perform CoAP exchanges with neighboring
IEEE 802.15.4 nodes before there is IP connectivity, e.g., to
configure that IP connectivity.
<draft-jones-cose-rsa-00.txt>
The CBOR Object Signing and Encryption (COSE) specification defines
cryptographic message encodings using Concise Binary Object
Representation (CBOR). This specification defines algorithm
encodings and representations enabling RSA algorithms to be used for
COSE messages.
"YANG Data Model for PW Protocol", Ran Chen, fangwei hu, 2016-04-04,
<draft-chen-pals-pw-yang-00.txt>
This document defines a YANG data model for PW configuration and
operation.
"Identity Event Subscription Protocol", Phil Hunt, Morteza Ansari,
2016-04-04, <draft-hunt-idevent-distribution-00.txt>
This specification defines a registry to define methods to distribute
identity events to subscribers. It includes a definition for
publishers to use HTTP POST to push events to clients via web
callback, and a method for subscribers to use HTTP GET to retrieve
events in a feed queue.
"Asynchronous Services Bus Protocol", Scott Morgan, Adligo Inc,
2016-04-07, <draft-adligo-hybi-asbp-01.txt>
ASBP (Asynchronous Services Bus Protocol) is a simple command based
application-level protocol for routing data and messages. ASBP
is intended to allow implementation of fully Asynchronous
Service Bus Architectures, in a simple standardized
manor. ASBP is intended to be layered over
WebSocket or HTTP. The protocol consists of a simple UTF-8
key value(s) header and any arbitrary data (text, binary, XML, JSON,
etc.), which the application's specific Command-Attendant or
Command-Respondent processes. In addition this document touches on
an extension to ASBP, CP (Conversation Protocol) a protocol used
to facilitate communication between Asynchronous Service Busses
implemented or hosted by different organizations. CP will be
covered in more detail in another RFC still in progress.
Internet-Draft
This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current
Internet-Drafts is at http://datatracker.ietf.org/drafts/current.
Internet-Drafts are draft documents valid for a maximum of six
months and may be updated, replaced, or obsoleted by other
documents at any time. It is inappropriate to use InternetDrafts as reference material or to cite them other than as
"work in progress.
"Priority based Flow Rule Request Message Processing Mechanism in the
OpenFlow Switch", Xinjian Long, Wendong Wang, Xiangyang Gong, Xirong
Que, Qinglei Qi, 2016-04-05, <draft-long-sdnrg-pfrrmpm-openflow-00.txt>
<draft-toutain-lp-wan-compression-context-00.txt>
This documents describes a way to adapt the formal notation to the
IoT context, especially for LP-WAN communication where packet size is
drastically limited. It is also necessary to simplify several
notation and avoid a specific notation. Concept described in
[RFC4997] may be written in CBOR or YANG.
"Simpler Algorithms for Processing Alert-Info URNs", Dale Worley,
2016-04-19, <draft-worley-alert-info-fsm-00.txt>
The "alert" namespace of uniform resource names (URNs) can be used in
the Alert-Info header field of Session Initiation Protocol (SIP)
requests and responses to inform a VoIP telephone (user agent) of the
characteristics of the call that the user agent has originated or
terminated. Based on the URNs in the Alert-Info header field, the
user agent must select an the best available signal to present to its
user to indicate the characteristics of the call. This document
describes a method of constructing a finite state machine (FSM) to do
this selection. In many situations, the resulting FSM is simpler and
faster than previously described selection algorithms. The designer
must construct the FSM so that its behavior will satisfy the
requirements given in the definition of the "alert" URN namespace.
"Routing Optimization with SDN in Data Center Networks", Qian Kong, Tao
Gao, Dajiang Wang, Zhenyu Wang, Jiayu Wang, Bingli Guo, Shanguo Huang,
2016-04-20, <draft-kong-sdnrg-routing-optimization-sdn-in-dc-00.txt>
With the open and standard programmatic interface and the flexibility
of controlling network, Software Defined Network (SDN) can obviously
simplify and integrate operation and business support systems. As a
consequence, to satisfy the rising switching demand in the data
center network, it is a good option to adopt SDN technology. In
addition, current architecture of data center network is far from
ideality, which results in the low utilization rate in bandwidth
resource. For example, mice flow cannot be well effectively served in
the conventional Wavelength Division Multiplexing (WDM) optical
network with at least 50GHz spectrum interval. From a data center
network perspective, it is necessary to further improve the resource
utilization efficiency and the flexibility of coping with different
traffic.
This document described an optical data center interconnect, which
comprises both the fixed and flexible grid transceivers. A traffic
monitor is implemented in the SDN-based data center network to
evaluate the coming traffic demands and allocate appropriate spectrum
for the request. For instance, mice flow can be served by fixed grid
transceivers, well the elephant flows can be transmitted by the
flexi-grid transceiver using multiple subcarriers to form a
superchannel. Thus, spectrum efficiency is optimized and bandwidth
utilization is improved dramatically.
"Path Table based Routing Mechanism in Software-Defined Optical
Transport Networks (SD-OTN)", Li Xin, Yu Zhou, Dajiang Wang, Zhenyu
Wang, Jiayu Wang, Wenzhe Li, Shan Yin, Shanguo Huang, 2016-04-20,
<draft-li-sdnrg-path-table-routing-in-sd-otn-00.txt>
The dynamic establishment and removal of an end-to-end light-path
consume a lot of time which are also the main burden of control plane
in optical transport networks. With the frequent arrival and
through a packet-switched
result significant. This is
a number of headers are prepended
be added to each packet.
<draft-stenn-ntp-last-extension-00.txt>
NTPv4 is defined by RFC 5905 [RFC5905], and it and earlier versions
of the NTP Protocol have supported symmetric private key MAC
authentication. MACs pre-date the Extension Fields introduced in RFC
5905 [RFC5905], and as the number of Extension Fields grows there is
an increasing chance of ambiguity when deciding if the "next" set of
data is an Extension Field or a MAC. This proposal defines a new
Extension Field which is used to signifiy that it is the last
Extension Field in the packet. If present, any subsequent data
SHOULD be considered to be a legacy MAC.
"Network Time Protocol Leap Smear REFID", H. Stenn, 2016-03-14,
<draft-stenn-ntp-leap-smear-refid-00.txt>
RFC 5905 [RFC5905] and earlier versions of NTP are the overwhelming
method of distributing time on networks. Leap Seconds will continue
to exist for a good number of years' time, and since the timescale
mandated by POSIX effectively ignores any instances where there are
not 86,400 seconds' time in a day, something must be done to reliably
synchronize clocks during the application of leap second corrections.
One mechanism for dealing with the application that has recently
become visible is to apply the leap second using a "smear", where the
time reported by leap-second aware servers is gradually adjusted so
there is no major disruption to time synchronization when processing
a leap second.
While leap second processing can be expected to be properly handled
by up-to-date software and by time servers, there are large numbers
of out-of-date software installations and client systems that are
just not able to properly handle a leap second correction.
This proposal offers a way for a system to generate a REFID that
indicates that the time being supplied in the NTP packet already
contains an amount of leap smear correction, and what that amount is.
"Network Time Protocol Suggest REFID Extension Field", H. Stenn,
2016-03-14, <draft-stenn-ntp-suggest-refid-00.txt>
NTP has been widely used through several revisions, with the latest
being RFC 5905 [RFC5905]. A core component of the protocol and the
algoritms is the Reference ID, or REFID, which is used to identify
the source of time used for synchronization. Traditionally, when the
source of time was another system the REFID was the IPv4 address of
that other system. The purpose of the REFID is to prevent a onedegree timing loop, where if A has several timing sources that
include B, if B decides to get its time from A we don't want A then
deciding to get its time from B. The REFID is considered to be
"public data" and is a vital core-component of the base NTP packet.
If a system's REFID is the IPv4 address of its system peer, an
attacker can try to use that information to send spoofed time packets
to either or both the target or the target's server, attempting to
cause a disruption in time service. This proposal is a backwardcompatible way for a time source to tell its peers or clients "If you
use me as your system peer, use this nonce as your REFID." This
nonce SHOULD not be traceable to the original system, and if it is
used as the REFID this type of attack is prevented.
Network Virtualization Overlays (nvo3)
--------------------------------------
An IPFIX Options Template and method are specified, which are used to
export the extra information required to fully describe Simple
Network Management Protocol (SNMP) MIB objects in IPFIX.
Operations and Management Area Working Group (opsawg)
----------------------------------------------------"The TACACS+ Protocol", Thorsten Dahm, Andrej Ota, D. Medway Gash, David
Carrel, Jerome Marcon, 2016-04-12,
<draft-ietf-opsawg-tacacs-02.txt,.pdf>
TACACS+ provides Device Administration for routers, network access
servers and other networked computing devices via one or more
centralized servers. This document describes the protocol that is
used by TACACS+.
Operational Security Capabilities for IP Network Infrastructure (opsec)
----------------------------------------------------------------------"Operational Security Considerations for IPv6 Networks", Kiran
Chittimaneni, Merike Kaeo, Eric Vyncke, 2016-03-21,
<draft-ietf-opsec-v6-08.txt>
Knowledge and experience on how to operate IPv4 securely is
available: whether it is the Internet or an enterprise internal
network. However, IPv6 presents some new security challenges. RFC
4942 describes the security issues in the protocol but network
managers also need a more practical, operations-minded document to
enumerate advantages and/or disadvantages of certain choices.
This document analyzes the operational security issues in all places
of a network (enterprises, service providers and residential users)
and proposes technical and procedural mitigations techniques.
Open Shortest Path First IGP (ospf)
----------------------------------"OSPFv3 LSA Extendibility", Acee Lindem, Sina Mirtorabi, Abhay Roy, Fred
Baker, 2015-11-19, <draft-ietf-ospf-ospfv3-lsa-extend-09.txt>
OSPFv3 requires functional extension beyond what can readily be done
with the fixed-format Link State Advertisement (LSA) as described in
RFC 5340. Without LSA extension, attributes associated with OSPFv3
links and advertised IPv6 prefixes must be advertised in separate
LSAs and correlated to the fixed-format LSAs. This document extends
the LSA format by encoding the existing OSPFv3 LSA information in
Type-Length-Value (TLV) tuples and allowing advertisement of
additional information with additional TLVs. Backward compatibility
mechanisms are also described.
"OSPF Extensions for Segment Routing", Peter Psenak, Stefano Previdi,
Clarence Filsfils, Hannes Gredler, Rob Shakir, Wim Henderickx, Jeff
Tantsura, 2016-04-27,
<draft-ietf-ospf-segment-routing-extensions-08.txt>
Segment Routing (SR) allows a flexible definition of end-to-end paths
within IGP topologies by encoding paths as sequences of topological
sub-paths, called "segments". These segments are advertised by the
link-state routing protocols (IS-IS and OSPF).
<draft-ietf-ospf-yang-04.txt>
This document defines a YANG data model that can be used to configure
and manage OSPF.
"Signaling Entropy Label Capability Using OSPF", Xiaohu Xu, Sriganesh
Kini, Siva Sivabalan, Clarence Filsfils, Stephane Litkowski, 2016-05-04,
<draft-ietf-ospf-mpls-elc-02.txt>
Multi Protocol Label Switching (MPLS) has defined a mechanism to load
balance traffic flows using Entropy Labels (EL). An ingress LSR
cannot insert ELs for packets going into a given tunnel unless an
egress LSR has indicated via signaling that it can process ELs on
that tunnel. This draft defines a mechanism to signal that
capability using OSPF. This mechanism is useful when the label
advertisement is also done via OSPF.
"OSPF Extensions for Flow Specification", LQD, Jianjie You, Nan Wu, Peng
Fan, Keyur Patel, Acee Lindem, 2016-04-14,
<draft-ietf-ospf-flowspec-extensions-01.txt>
Dissemination of the Traffic flow information was first introduced in
the BGP protocol [RFC5575]. FlowSpec routes are used to distribute
traffic filtering rules that are used to filter Denial-of-Service
(DoS) attacks. For the networks that only deploy an IGP (Interior
Gateway Protocol) (e.g., OSPF), it is required that the IGP is
extended to distribute Flow Specification or FlowSpec routes.
This document discusses the use cases for distributing flow
specification (FlowSpec) routes using OSPF. Furthermore, this
document defines a OSPF FlowSpec Opaque Link State Advertisement
(LSA) encoding format that can be used to distribute FlowSpec routes,
its validation procedures for imposing the filtering information on
the routers, and a capability to indicate the support of FlowSpec
functionality.
"OSPF Link Overload", Shraddha Hegde, Hannes Gredler, Mohan Nanduri,
Luay Jalil, 2016-01-06, <draft-ietf-ospf-link-overload-01.txt,.pdf>
When a link is being prepared to be taken out of service, the traffic
needs to be diverted from both ends of the link. Increasing the
metric to the highest metric on one side of the link is not
sufficient to divert the traffic flowing in the other direction.
It is useful for routers in an
able to advertise a link being
impending maintenance activity
used by the network devices to
LSP or two LSPs that share the same routes. In addition, the user
traffic may traverse through multiple transport networks.
This document defines an optional extension to LDP that enables the
binding between PWs and the underlying LSPs.
"Pseudowire Setup and Maintenance using the Label Distribution
Protocol", Luca Martini, Giles Heron, 2016-02-04,
<draft-ietf-pals-rfc4447bis-03.txt>
Layer 2 services (such as Frame Relay, Asynchronous Transfer Mode,
and Ethernet) can be "emulated" over an MPLS backbone by
encapsulating the Layer 2 Protocol Data Units (PDU) and then
transmitting them over "pseudowires". It is also possible to use
pseudowires to provide low-rate Time Division Multiplexed and
Synchronous Optical NETworking circuit emulation over an MPLS-enabled
network. This document specifies a protocol for establishing and
maintaining the pseudowires, using extensions to the Label
Distribution Protocol (LDP). Procedures for encapsulating Layer 2
PDUs are specified in a set of companion documents.
This document has been written to address errata in a previous
version of this standard.
"Dual-Homing Coordination for MPLS Transport Profile (MPLS-TP)
Pseudowires Protection", Weiqiang Cheng, Lei Wang, Han Li, Kai Liu,
Shahram Davari, Jie Dong, Alessandro D'Alessandro, 2016-03-20,
<draft-ietf-pals-mpls-tp-dual-homing-coordination-02.txt>
In some scenarios, the MPLS Transport Profile (MPLS-TP) Pseudowires
(PWs) are provisioned through either static configuration or
management plane, where a dynamic control plane is not available. A
fast protection mechanism for MPLS-TP PWs is needed to protect
against the failure of Attachment Circuit (AC), the failure of
Provider Edge (PE) and also the failure in the Packet Switched
Network (PSN). The framework and typical scenarios of dual-homing PW
local protection are described in [draft-ietf-pals-mpls-tp-dualhoming-protection]. This document proposes a dual-homing
coordination mechanism for MPLS-TP PWs, which is used for state
exchange and switchover coordination between the dual-homing PEs for
dual-homing PW local protection.
"Dual-Homing Protection for MPLS and MPLS-TP Pseudowires", Weiqiang
Cheng, Lei Wang, Han Li, Kai Liu, Shahram Davari, Jie Dong, Alessandro
D'Alessandro, 2016-03-20,
<draft-ietf-pals-mpls-tp-dual-homing-protection-02.txt>
This document describes a framework and several scenarios for
pseudowire (PW) dual-homing local protection. A Dual-Node
Interconnection (DNI) PW is provisioned between the dual-homing
Provider Edge (PE) nodes for carrying traffic when failure occurs in
the Attachment Circuit (AC) or PW side. In order for the dual-homing
PE nodes to determine the forwarding state of AC, PW and the DNI PW,
necessary state exchange and coordination between the dual-homing PEs
are needed. The PW dual-homing local protection mechanism is
complementary to the existing PW protection mechanisms.
"Protocol Independent Multicast (PIM) over Virtual Private LAN Service
(VPLS)", Olivier Dornon, Jayant Kotalwar, Venu Hemige, Ray Qiu, Jeffrey
Zhang, 2016-04-15, <draft-ietf-pals-vpls-pim-snooping-02.txt>
Seamless BFD (S-BFD) for VCCV. This document updates RFC 5885,
extending the CV Values and the Capability Selection.
"Pseudowire Congestion Considerations", Yaakov Stein, David Black, Bob
Briscoe, 2016-04-21, <draft-ietf-pals-congcons-02.txt,.pdf>
Pseudowires (PWs) have become a common mechanism for tunneling
traffic, and may be found in unmanaged scenarios competing for
network resources both with other PWs and with non-PW traffic, such
as TCP/IP flows. It is thus worthwhile specifying under what
conditions such competition is acceptable, i.e., the PW traffic does
not significantly harm other traffic or contribute more than it
should to congestion. We conclude that PWs transporting responsive
traffic behave as desired without the need for additional mechanisms.
For inelastic PWs (such as TDM PWs) we derive a bound under which
such PWs consume no more network capacity than a TCP flow. For TDM
PWs, we find that the level of congestion at which the PW can no
longer deliver acceptable TDM service is never significantly greater,
and typically much lower, than this bound. Therefore, as long as the
PW is shut down when it can no longer deliver acceptable TDM service,
it will never do significantly more harm than even a single TCP flow.
If the TDM service does not automatically shut down, a mechanism to
block persistently unacceptable TDM pseudowires is required.
"MPLS LSP PW status refresh reduction for Static Pseudowires", Luca
Martini, George Swallow, Elisa Bellagamba, 2016-02-04,
<draft-ietf-pals-status-reduction-00.txt>
This document describes a method for generating an aggregated
pseudowire status message on Multi-Protocol Label Switching (MPLS)
network Label Switched Path (LSP).
The method for transmitting the pseudowire (PW) status information is
not new, however this protocol extension allows a Service Provider
(SP) to reliably monitor the individual PW status while not
overwhelming the network of multiple periodic status messages. This
is achieved by sending a single cumulative summary status
verification message for all the PWs grouped in the same LSP.
"Signaling Root-Initiated Point-to-Multipoint Pseudowire using LDP",
Siva Sivabalan, Sami Boutros, Luca Martini, Maciek Konstantynowicz,
Gianni Vecchio, Yuji Kamite, Lizhong Jin, 2016-03-21,
<draft-ietf-pals-p2mp-pw-00.txt>
This document specifies a mechanism to signal Point-to-Multipoint
(P2MP) Pseudowires (PW) tree using LDP. Such a mechanism is suitable
for any Layer 2 VPN service requiring P2MP connectivity over an IP or
MPLS enabled PSN. A P2MP PW established via the proposed mechanism is
root initiated.
Audio/Video Transport Payloads (payload)
---------------------------------------"How to Write an RTP Payload Format", Magnus Westerlund, 2015-05-04,
<draft-ietf-payload-rtp-howto-14.txt>
This document contains information on how to best write an RTP
payload format specification. It provides reading tips, design
practices, and practical tips on how to produce an RTP payload format
specification quickly and with good results. A template is also
--------------------------------------------"SAVI for Mixed Address Assignment Methods Scenario", Jun Bi, Guang Yao,
Joel Halpern, Eric Levy-Abegnoli, 2015-11-15,
<draft-ietf-savi-mix-10.txt>
In networks that use multiple techniques for address assignment, the
appropriate Source Address Validation Improvement (SAVI) methods must
be used to prevent spoofing of addresses assigned by each such
technique. This document reviews how multiple SAVI methods can
coexist in a single SAVI device and collisions are resolved when the
same binding entry is discovered by two or more methods.
Software Defined Networking (sdnrg)
----------------------------------"Cooperating Layered Architecture for SDN", Luis Contreras, Carlos
Bernardos, Diego Lopez, Mohamed Boucadair, Paola Iovanna, 2016-03-21,
<draft-irtf-sdnrg-layered-sdn-00.txt>
Software Defined Networking proposes the separation of the control
plane from the data plane in the network nodes and its logical
centralization on a control entity. Most of the network intelligence
is moved to this functional entity. Typically, such entity is seen
as a compendium of interacting control functions in a vertical, tight
integrated fashion. The relocation of the control functions from a
number of distributed network nodes to a logical central entity
conceptually places together a number of control capabilities with
different purposes. As a consequence, the existing solutions do not
provide a clear separation between transport control and services
that relies upon transport capabilities.
This document describes a proposal named Cooperating Layered
Architecture for SDN. The idea behind that is to differentiate the
control functions associated to transport from those related to
services, in such a way that they can be provided and maintained
independently, and can follow their own evolution path.
Security Area (sec)
------------------"Domain-based signing and encryption using S/MIME", William Ottaway,
Alexey Melnikov, 2014-03-05, <draft-melnikov-smime-msa-to-mda-04.txt>
The S/MIME protocols Message Specification (RFC 5751), Cryptographic
Message Syntax (RFC 5652), S/MIME Certificate Handling (RFC 5750) and
Enhanced Security Services for S/MIME (RFC 2634) specify a consistent
way to securely send and receive MIME messages providing end to end
integrity, authentication, non-repudiation and confidentiality. This
document identifies a number of interoperability, technical,
procedural and policy related issues that may result in end-to-end
security services not being achievable. To resolve such issues, this
document profiles domain-based signing and encryption using S/MIME,
such as specifying how S/MIME signing and encryption can be applied
between a Message Submission Agent (MSA) and a Message Delivery Agent
(MDA) or between 2 Message Transfer Agents (MTA).
This document is also registering 2 URI scheme: "smtp" and "submit"
which are used for designating SMTP/SMTP Submission servers
(respectively), as well as SMTP/Submission client accounts.
<draft-ietf-sfc-oam-framework-01.txt>
This document provides reference framework for Operations,
Administration and Maintenance (OAM) for Service Function
Chaining (SFC).
"Service Function Chaining (SFC) Control Plane Components &
Requirements", Mohamed Boucadair, 2016-04-21,
<draft-ietf-sfc-control-plane-04.txt>
This document describes requirements for conveying information
between Service Function Chaining (SFC) control elements and SFC
functional elements. Also, this document identifies a set of control
interfaces to interact with SFC-aware elements to establish, maintain
or recover service function chains. This document does not specify
protocols nor extensions to existing protocols.
This document exclusively focuses on SFC deployments that are under
the responsibility of a single administrative entity. Inter-domain
considerations are out of scope.
Secure Inter-Domain Routing (sidr)
---------------------------------"Securing RPSL Objects with RPKI Signatures", kistel, Brian Haberman,
2016-03-10, <draft-ietf-sidr-rpsl-sig-10.txt>
This document describes a method to allow parties to electronically
sign Routing Policy Specification Language objects and validate such
electronic signatures. This allows relying parties to detect
accidental or malicious modifications on such objects. It also
allows parties who run Internet Routing Registries or similar
databases, but do not yet have Routing Policy System Security-based
authentication of the maintainers of certain objects, to verify that
the additions or modifications of such database objects are done by
the legitimate holder(s) of the Internet resources mentioned in those
objects. This document updates RFC 2622 and RFC 4012 to add the
signature attribute to supported RPSL objects.
"A Publication Protocol for the Resource Public Key Infrastructure
(RPKI)", Samuel Weiler, Anuja Sonalker, Rob Austein, 2016-03-21,
<draft-ietf-sidr-publication-08.txt>
This document defines a protocol for publishing Resource Public Key
Infrastructure (RPKI) objects. Even though the RPKI will have many
participants issuing certificates and creating other objects, it is
operationally useful to consolidate the publication of those objects.
This document provides the protocol for doing so.
"BGP Prefix Origin Validation State Extended Community", Pradosh
Mohapatra, Keyur Patel, John Scudder, David Ward, Randy Bush,
2015-12-14, <draft-ietf-sidr-origin-validation-signaling-08.txt>
This document defines a new BGP opaque extended community to carry
the origination AS validation state inside an autonomous system.
IBGP speakers that receive this validation state can configure local
policies allowing it to influence their decision process.
"BGPsec Protocol Specification", Matthew Lepinski, Kotikalapudi Sriram,
2016-03-16, <draft-ietf-sidr-bgpsec-protocol-15.txt>
2016-04-15, <draft-ietf-sidr-adverse-actions-00.txt>
This document analyzes actions by or against a CA or independent
repository manager in the RPKI that can adversely affect the Internet
Number Resources (INRs) associated with that CA or its subordinate
CAs. The analysis is based on examination of the data items in the
RPKI repository, as controlled by a CA (or independent repository
manager) and fetched by Relying Parties (RPs). The analysis is
performed from the perspective of an affected INR holder. The
analysis does not purport to be comprehensive; it does represent an
orderly way to analyze a number of ways that errors by or attacks
against a CA or repository manager can affect the RPKI and routing
decisions based on RPKI data.
Session Initiation Protocol Core (sipcore)
-----------------------------------------"Locating Session Initiation Protocol (SIP) Servers in a Dual-Stack IP
Network", oej, Gonzalo Salgueiro, Vijay Gurbani, Dale Worley,
2016-05-02, <draft-ietf-sipcore-dns-dual-stack-06.txt>
RFC 3263 defines how a Session Initiation Protocol (SIP)
implementation, given a SIP Uniform Resource Identifier (URI), should
locate the next-hop SIP server using Domain Name System (DNS)
procedures. As SIP networks increasingly transition from IPv4-only
to dual-stack, a quality user experience must be ensured for dualstack SIP implementations. This document updates the DNS procedures
described in RFC 3263 for dual-stack SIP implementations in
preparation for forthcoming specifications for applying Happy
Eyeballs principles to SIP.
SIP Recording (siprec)
---------------------"Session Initiation Protocol (SIP) Recording Metadata", Ram R,
Parthasarathi Ravindran, Paul Kyzivat, 2016-04-04,
<draft-ietf-siprec-metadata-22.txt>
Session recording is a critical requirement in many communications
environments such as call centers and financial trading. In some of
these environments, all calls must be recorded for regulatory,
compliance, and consumer protection reasons. Recording of a session
is typically performed by sending a copy of a media stream to a
recording device. This document describes the metadata model as
viewed by Session Recording Server(SRS) and the Recording metadata
format.
"Session Recording Protocol", Leon Portman, Henry Lum, Charles Eckel,
Alan Johnston, Andrew Hutton, 2015-09-25,
<draft-ietf-siprec-protocol-18.txt>
This document specifies the use of the Session Initiation Protocol
(SIP), the Session Description Protocol (SDP), and the Real Time
Protocol (RTP) for delivering real-time media and metadata from a
Communication Session (CS) to a recording device. The Session
Recording Protocol specifies the use of SIP, SDP, and RTP to
establish a Recording Session (RS) between the Session Recording
Client (SRC), which is on the path of the CS, and a Session Recording
Server (SRS) at the recording device. This document considers only
active recording, where the SRC purposefully streams media to an SRS
"Softwire Mesh Multicast", Mingwei Xu, Yong Cui, Jianping Wu, Shu Yang,
Chris Metz, Greg Shepherd, 2016-04-04,
<draft-ietf-softwire-mesh-multicast-12.txt>
The Internet needs to support IPv4 and IPv6 packets. Both address
families and their related protocol suites support multicast of the
single-source and any-source varieties. During IPv6 transition,
there will be scenarios where a backbone network running one IP
address family internally (referred to as internal IP or I-IP) will
provide transit services to attached client networks running another
IP address family (referred to as external IP or E-IP). It is
expected that the I-IP backbone will offer unicast and multicast
transit services to the client E-IP networks.
Softwire Mesh is a solution to E-IP unicast and multicast support
across an I-IP backbone. This document describes the mechanism for
supporting Internet-style multicast across a set of E-IP and I-IP
networks supporting softwire mesh.
"DHCPv6 Option for IPv4-Embedded Multicast and Unicast IPv6 Prefixes",
Mohamed Boucadair, Jacni Qin, Tina Tsou, Xiaohong Deng, 2016-02-26,
<draft-ietf-softwire-multicast-prefix-option-10.txt>
This document defines Dynamic Host Configuration Protocol version 6
(DHCPv6) Option for multicast IPv4 service continuity solutions,
aiming to convey the IPv6 prefixes to be used to build unicast and
multicast IPv4-embedded IPv6 addresses.
"Softwire Mesh Management Information Base (MIB)", Yong Cui, Jiang Dong,
Peng Wu, Mingwei Xu, Antti Yla-Jaaski, 2015-12-19,
<draft-ietf-softwire-mesh-mib-14.txt>
This memo defines a portion of the Management Information Base (MIB)
for use with network management protocols in the Internet community.
In particular it defines objects for managing a softwire mesh.
"DS-Lite Management Information Base (MIB) for AFTRs", Yu Fu, Sheng
Jiang, Jiang Dong, Yuchi Chen, 2016-01-03,
<draft-ietf-softwire-dslite-mib-15.txt>
This memo defines a portion of the Management Information Base (MIB)
for using with network management protocols in the Internet
community. In particular, it defines managed objects for Address
Family Transition Routers (AFTRs) of Dual-Stack Lite (DS-Lite).
"Unified IPv4-in-IPv6 Softwire CPE", Mohamed Boucadair, Ian Farrer,
2016-04-22, <draft-ietf-softwire-unified-cpe-04.txt>
In IPv6-only provider networks, transporting IPv4 packets
encapsulated in IPv6 is a common solution to the problem of IPv4
service continuity. A number of differing functional approaches have
been developed for this, each having their own specific
characteristics. As these approaches share a similar functional
architecture and use the same data plane mechanisms, this memo
describes a specification whereby a single CPE can interwork with all
of the standardized and proposed approaches to providing encapsulated
IPv4 in IPv6 services.
"Definitions of Managed Objects for MAP-E", Yu Fu, Sheng Jiang, Bing
CUBIC is safe for deployment and testing in the global Internet. The
intent of this document is to provide the protocol specification of
CUBIC for a third party implementation and solicit the community
feedback through experimentation on the performance of CUBIC.
"Transmission Control Protocol Specification", Wesley Eddy, 2016-03-21,
<draft-ietf-tcpm-rfc793bis-02.txt>
This document specifies the Internet's Transmission Control Protocol
(TCP). TCP is an important transport layer protocol in the Internet
stack, and has continuously evolved over decades of use and growth of
the Internet. Over this time, a number of changes have been made to
TCP as it was specified in RFC 793, though these have only been
documented in a piecemeal fashion. This document collects and brings
those changes together with the protocol specification from RFC 793.
This document obsoletes RFC 793 and several other RFCs (TODO: list
all actual RFCs when finished).
RFC EDITOR NOTE: If approved for publication as an RFC, this should
be marked additionally as "STD: 7" and replace RFC 793 in that role.
"More Accurate ECN Feedback in TCP", Bob Briscoe, Mirja Khlewind,
Richard Scheffenegger, 2015-12-14, <draft-ietf-tcpm-accurate-ecn-00.txt>
Explicit Congestion Notification (ECN) is a mechanism where network
nodes can mark IP packets instead of dropping them to indicate
incipient congestion to the end-points. Receivers with an ECNcapable transport protocol feed back this information to the sender.
ECN is specified for TCP in such a way that only one feedback signal
can be transmitted per Round-Trip Time (RTT). Recently, new TCP
mechanisms like Congestion Exposure (ConEx) or Data Center TCP
(DCTCP) need more accurate ECN feedback information whenever more
than one marking is received in one RTT. This document specifies an
experimental scheme to provide more than one feedback signal per RTT
in the TCP header. Given TCP header space is scarce, it overloads
the three existing ECN-related flags in the TCP header and provides
additional information in a new TCP option.
"Retransmission Timeout Considerations", Mark Allman, 2016-04-15,
<draft-ietf-tcpm-rto-consider-03.txt>
Each implementation of a retransmission timeout mechanism represents
a balance between correctness and timeliness and therefore no
implementation suits all situations. This document provides
high-level requirements for retransmission timeout schemes
appropriate for general use in the Internet. Within the
requirements, implementations have latitude to define particulars
that best address each situation.
Terminology
Traffic Engineering Architecture and Signaling (teas)
----------------------------------------------------"Problem Statement and Architecture for Information Exchange Between
Interconnected Traffic Engineered Networks", Adrian Farrel, John Drake,
Nabil Bitar, George Swallow, Daniele Ceccarelli, Xian Zhang, 2016-04-26,
<draft-ietf-teas-interconnected-te-info-exchange-05.txt>
In Traffic Engineered (TE) systems, it is sometimes desirable to
This document defines a YANG data model for the configuration and
management of RSVP Protocol. The model defines generic RSVP protocol
building blocks that can be augmented and used by other RSVP
extension models such as RVSP extensions to Traffic-Engineering
(RSVP-TE). The model covers the RSVP protocol configuration,
operational state, remote procedural calls, and event notifications
data.
"A YANG Data Model for Traffic Engineering Tunnels and Interfaces",
Tarek Saad, Rakesh Gandhi, Xufeng Liu, Vishnu Pavan Beeram, Himanshu
Shah, Xia Chen, Raqib Jones, Bin Wen, 2016-03-20,
<draft-ietf-teas-yang-te-03.txt>
This document defines a YANG data model for the configuration and
management of Traffic Engineering (TE) interfaces, tunnels and Label
Switched Paths (LSPs). The model is divided into YANG modules that
classify data into generic, device-specific, technology agnostic, and
technology-specific elements. The model also includes module(s) that
contain reusable TE data types and data groupings.
This model covers the configuration, operational state, remote
procedural calls, and event notifications data.
"Requirements for Abstraction and Control of TE Networks", Young Lee,
Dhruv Dhody, Sergio Belotti, Khuzema Pithewan, Daniele Ceccarelli,
2016-04-13, <draft-ietf-teas-actn-requirements-02.txt>
This draft provides a set of requirements for abstraction and
control of TE networks.
"Implementation Recommendations to Improve the Scalability of RSVP-TE
Deployments", Vishnu Pavan Beeram, Ina Minei, Rob Shakir, Dante Pacella,
Tarek Saad, 2016-03-21, <draft-ietf-teas-rsvp-te-scaling-rec-01.txt>
The scale at which RSVP-TE Label Switched Paths (LSPs) get deployed
is growing continually and the onus is on RSVP-TE implementations
across the board to keep up with this increasing demand.
This document makes a set of implementation recommendations to help
RSVP-TE deployments push the envelope on scaling and advocates the
use of a couple of techniques - "Refresh Interval Independent RSVP
(RI-RSVP)" and "Per-Peer flow-control" - for improving scaling.
Timing over IP Connection and Transfer of Clock (tictoc)
-------------------------------------------------------"Precision Time Protocol Version 2 (PTPv2) Management Information Base",
Vinay Shankarkumar, Laurent Montini, Tim Frost, Greg Dowd, 2016-04-21,
<draft-ietf-tictoc-ptp-mib-09.txt>
This memo defines a portion of the Management Information Base (MIB)
for use with network management protocols in TCP/IP-based internets.
In particular, it defines objects for managing networks using
Precision Time Protocol, specified in IEEE Std. 1588(TM)-2008.
This memo specifies a MIB module in a manner that is both compliant
to the SMIv2, and semantically identical to the peer SMIv1
definitions.
"Enterprise Profile for the Precision Time Protocol With Mixed Multicast
available information.
"Secure Password Ciphersuites for Transport Layer Security (TLS)", Dan
Harkins, Dave Halasz, 2016-02-25, <draft-ietf-tls-pwd-07.txt>
This memo defines several new ciphersuites for the Transport Layer
Security (TLS) protocol to support certificate-less, secure
authentication using only a simple, low-entropy, password. The
ciphersuites are all based on an authentication and key exchange
protocol that is resistant to off-line dictionary attack.
"The Transport Layer Security (TLS) Protocol Version 1.3", Eric
Rescorla, 2016-03-22, <draft-ietf-tls-tls13-12.txt>
This document specifies Version 1.3 of the Transport Layer Security
(TLS) protocol. The TLS protocol allows client/server applications
to communicate over the Internet in a way that is designed to prevent
eavesdropping, tampering, and message forgery.
"Negotiated Finite Field Diffie-Hellman Ephemeral Parameters for TLS",
Daniel Kahn Gillmor, 2015-06-01,
<draft-ietf-tls-negotiated-ff-dhe-10.txt>
Traditional finite-field-based Diffie-Hellman (DH) key exchange
during the TLS handshake suffers from a number of security,
interoperability, and efficiency shortcomings. These shortcomings
arise from lack of clarity about which DH group parameters TLS
servers should offer and clients should accept. This document offers
a solution to these shortcomings for compatible peers by using a
section of the TLS "EC Named Curve Registry" to establish common
finite-field DH parameters with known structure and a mechanism for
peers to negotiate support for these groups.
This draft updates TLS versions 1.0 [RFC2246], 1.1 [RFC4346], and 1.2
[RFC5246], as well as the TLS ECC extensions [RFC4492].
"Elliptic Curve Cryptography (ECC) Cipher Suites for Transport Layer
Security (TLS) Versions 1.2 and Earlier", Yoav Nir, Simon Josefsson,
Manuel Pgouri-Gonnard, 2016-03-21, <draft-ietf-tls-rfc4492bis-07.txt>
This document describes key exchange algorithms based on Elliptic
Curve Cryptography (ECC) for the Transport Layer Security (TLS)
protocol. In particular, it specifies the use of Ephemeral Elliptic
Curve Diffie-Hellman (ECDHE) key agreement in a TLS handshake and the
use of Elliptic Curve Digital Signature Algorithm (ECDSA) and Edwards
Digital Signature Algorithm (EdDSA) as new authentication mechanisms.
"Transport Layer Security (TLS) False Start", Adam Langley, Nagendra
Modadugu, Bodo Moeller, 2015-11-02, <draft-ietf-tls-falsestart-01.txt>
This document specifies an optional behavior of TLS client
implementations, dubbed False Start. It affects only protocol
timing, not on-the-wire protocol data, and can be implemented
unilaterally. A TLS False Start reduces handshake latency to one
round trip.
"ChaCha20-Poly1305 Cipher Suites for Transport Layer Security (TLS)",
Adam Langley, Wan-Teh Chang, Nikos Mavrogiannopoulos, Joachim
Strombergson, Simon Josefsson, 2015-12-16,
<draft-ietf-tls-chacha20-poly1305-04.txt>
This document describes the use of the ChaCha stream cipher and
Poly1305 authenticator in the Transport Layer Security (TLS) and
Datagram Transport Layer Security (DTLS) protocols.
Token Binding (tokbind)
----------------------"The Token Binding Protocol Version 1.0", Andrey Popov, Magnus Nystrom,
Dirk Balfanz, Adam Langley, Jeff Hodges, 2016-04-04,
<draft-ietf-tokbind-protocol-05.txt>
This document specifies Version 1.0 of the Token Binding protocol.
The Token Binding protocol allows client/server applications to
create long-lived, uniquely identifiable TLS [RFC5246] bindings
spanning multiple TLS sessions and connections. Applications are
then enabled to cryptographically bind security tokens to the TLS
layer, preventing token export and replay attacks. To protect
privacy, the TLS Token Binding identifiers are only transmitted
encrypted and can be reset by the user at any time.
"Token Binding over HTTP", Andrey Popov, Magnus Nystrom, Dirk Balfanz,
Adam Langley, Jeff Hodges, 2016-03-21, <draft-ietf-tokbind-https-03.txt>
This document describes a collection of mechanisms that allow HTTP
servers to cryptographically bind authentication tokens (such as
cookies and OAuth tokens) to a TLS [RFC5246] connection.
We describe both _first-party_ as well as _federated_ scenarios. In
a first-party scenario, an HTTP server issues a security token (such
as a cookie) to a client, and expects the client to send the security
token back to the server at a later time in order to authenticate.
Binding the token to the TLS connection between client and server
protects the security token from theft, and ensures that the security
token can only be used by the client that it was issued to.
Federated token bindings, on the other hand, allow servers to
cryptographically bind security tokens to a TLS [RFC5246] connection
that the client has with a _different_ server than the one issuing
the token.
This Internet-Draft is a companion document to The Token Binding
Protocol [TBPROTO]
"Transport Layer Security (TLS) Extension for Token Binding Protocol
Negotiation", Andrey Popov, Magnus Nystrom, Dirk Balfanz, Adam Langley,
2016-01-08, <draft-ietf-tokbind-negotiation-02.txt>
This document specifies a Transport Layer Security (TLS) [RFC5246]
extension for the negotiation of Token Binding protocol
[I-D.ietf-tokbind-protocol] version and key parameters.
TURN Revised and Modernized (tram)
---------------------------------"TURN Server Auto Discovery", Prashanth Patil, Tirumaleswar Reddy, Dan
Wing, 2016-04-18, <draft-ietf-tram-turn-server-discovery-07.txt>
Current Traversal Using Relays around NAT (TURN) server discovery
mechanisms are relatively static and limited to explicit
"Path MTU Discovery Using Session Traversal Utilities for NAT (STUN)",
Marc Petit-Huguenin, Gonzalo Salgueiro, 2016-01-26,
<draft-ietf-tram-stun-pmtud-01.txt>
This document describes a Session Traversal Utilities for NAT (STUN)
usage for Path MTU Discovery (PMTUD) between a client and a server.
"Mobility with TURN", Dan Wing, Prashanth Patil, Tirumaleswar Reddy,
Paal-Erik Martinsen, 2016-04-04, <draft-ietf-tram-turn-mobility-02.txt>
It is desirable to minimize traffic disruption caused by changing IP
address during a mobility event. One mechanism to minimize
disruption is to expose a shorter network path to the mobility event
so only the local network elements are aware of the changed IP
address but the remote peer is unaware of the changed IP address.
This draft provides such an IP address mobility solution using
Traversal Using Relays around NAT (TURN). This is achieved by
allowing a client to retain an allocation on the TURN server when the
IP address of the client changes.
Public Notary Transparency (trans)
----------------------------------"Certificate Transparency", Ben Laurie, Adam Langley, Emilia Kasper,
Eran Messeri, Rob Stradling, 2016-04-11,
<draft-ietf-trans-rfc6962-bis-14.txt>
This document describes a protocol for publicly logging the existence
of Transport Layer Security (TLS) certificates as they are issued or
observed, in a manner that allows anyone to audit certification
authority (CA) activity and notice the issuance of suspect
certificates as well as to audit the certificate logs themselves.
The intent is that eventually clients would refuse to honor
certificates that do not appear in a log, effectively forcing CAs to
add all issued certificates to the logs.
Logs are network services that implement the protocol operations for
submissions and queries that are defined in this document.
"Attack Model and Threat for Certificate Transparency", Stephen Kent,
2016-04-14, <draft-ietf-trans-threat-analysis-05.txt>
This document describes an attack model and discusses threats for
the Web PKI context in which security mechanisms to detect misissuance of web site certificates are being developed. The model
provides an analysis of detection and remediation mechanisms for
both syntactic and semantic mis-issuance. The model introduces an
outline of attacks to organize the discussion. The model also
describes the roles played by the elements of the Certificate
Transparency (CT) system, to establish a context for the model.
"Gossiping in CT", Linus Nordberg, Daniel Kahn Gillmor, Tom Ritter,
2016-03-21, <draft-ietf-trans-gossip-02.txt>
The logs in Certificate Transparency are untrusted in the sense that
the users of the system don't have to trust that they behave
correctly since the behaviour of a log can be verified to be correct.
This document tries to solve the problem with logs presenting a
<draft-ietf-trill-p2mp-bfd-01.txt>
Point to multipoint (P2MP) BFD is designed to verify multipoint
connectivity. This document specifies the support of P2MP BFD in
TRILL. Similar to TRILL point-to-point BFD, BFD Control packets in
TRILL P2MP BFD are transmitted using RBridge Channel message.
"Alternatives for Multilevel TRILL (Transparent Interconnection of Lots
of Links)", Radia Perlman, Donald Eastlake, Mingui Zhang, Anoop
Ghanwani, Hongjun Zhai, 2016-04-19,
<draft-ietf-trill-rbridge-multilevel-02.txt>
Extending TRILL to multiple levels has challenges that are not
addressed by the already-existing capability of IS-IS to have
multiple levels. One issue is with the handling of multi-destination
packet distribution trees. Another issue is with TRILL switch
nicknames. There have been two proposed approaches. One approach,
which we refer to as the "unique nickname" approach, gives unique
nicknames to all the TRILL switches in the multilevel campus, either
by having the level-1/level-2 border TRILL switches advertise which
nicknames are not available for assignment in the area, or by
partitioning the 16-bit nickname into an "area" field and a "nickname
inside the area" field. The other approach, which we refer to as the
"aggregated nickname" approach, involves hiding the nicknames within
areas, allowing nicknames to be reused in different areas, by having
the border TRILL switches rewrite the nickname fields when entering
or leaving an area. Each of those approaches has advantages and
disadvantages. This informational document suggests allowing a choice
of approach in each area. This allows the simplicity of the unique
nickname approach in installations in which there is no danger of
running out of nicknames and allows the complexity of hiding the
nicknames in an area to be phased into larger installations on a perarea basis.
"Transparent Interconnection of Lots of Links (TRILL) Single Area Border
RBridge Nickname for Multilevel", Mingui Zhang, Donald Eastlake, Radia
Perlman, Margaret Cullen, Hongjun Zhai, 2016-02-15,
<draft-ietf-trill-multilevel-single-nickname-01.txt>
A major issue in multilevel TRILL is how to manage RBridge nicknames.
In this document, the area border RBridge uses a single nickname in
both Level 1 and Level 2. RBridges in Level 2 must obtain unique
nicknames but RBridges in different Level 1 areas may have the same
nicknames.
"TRILL: Multi-Topology", Donald Eastlake, Mingui Zhang, Ayan Banerjee,
Vishwas Manral, 2016-02-28, <draft-ietf-trill-multi-topology-01.txt>
This document specifies extensions to the IETF TRILL (Transparent
Interconnection of Lots of Links) protocol to support multi-topology
routing of unicast and multi-destination traffic based on IS-IS
(Intermediate System to Intermediate System) multi-topology specified
in RFC 5120. This document updates RFC 6325 and RFC 7177.
"TRILL: Appointed Forwarders", Donald Eastlake, Li Yizhou, Mohammed
Umair, Ayan Banerjee, fangwei hu, 2016-01-05,
<draft-ietf-trill-rfc6439bis-01.txt>
TRILL supports multi-access LAN (Local Area Network) links where a
single link can have multiple end stations and TRILL switches
that could occur as a result. The requirements have now been changed
in [[RFC 2141bis]]. That document adopts a different model. This
document specifies IANA instructions to adapt selected existing
registrations to the new model. It also obsoletes some previous RFCs
to eliminate any ambiguity about the status of new templates and
updated registrations.
"URN Semantics Clarification", John Klensin, 2016-02-06,
<draft-ietf-urnbis-semantics-clarif-03.txt>
Experience has shown that identifiers associated with persistent
names have properties and requirements that may be somewhat different
from identifiers associated with the locations of objects. This is
especially true when such names are expected to be stable for a very
long time or when they identify large and complex entities. In order
to allow Uniform Resource Names (URNs) to evolve to meet the needs of
the Library, Museum, Publisher, and Information Science communities
and other users, this specification separates URNs from the semantic
constraints that many people believe are part of the specification
for Uniform Resource Identifiers (URIs) in RFC 3986, updating that
document accordingly. The syntax of URNs is still constrained to
that of RFC 3986, so generic URI parsers are unaffected by this
change.
Using TLS in Applications (uta)
------------------------------"Deployable Enhanced Email Privacy (DEEP)", Keith Moore, Chris Newman,
2016-03-17, <draft-ietf-uta-email-deep-04.txt>
This specification defines a set of requirements and facilities
designed to improve email confidentiality between a mail user agent
(MUA) and a mail submission or mail access server. This provides
mechanisms intended to increase use of already deployed Transport
Layer Security (TLS) technology, provide a model for mail user
agent's confidentiality assurance, and enable mail service providers
to advertise improved TLS confidentiality facilities.
IPv6 Operations (v6ops)
----------------------"DHCPv6/SLAAC Interaction Problems on Address and DNS Configuration",
Bing Liu, Sheng Jiang, Xiangyang Gong, Wendong Wang, Enno Rey,
2016-02-06, <draft-ietf-v6ops-dhcpv6-slaac-problem-06.txt>
The IPv6 Neighbor Discovery (ND) Protocol includes an ICMPv6 Router
Advertisement (RA) message. The RA message contains three flags,
indicating the availability of address auto-configuration mechanisms
and other configuration such as DNS-related configuration. These are
the M, O, and A flags, which by definition are advisory, not
prescriptive.
This document describes divergent host behaviors observed in popular
operating systems. It also discusses operational problems that the
divergent behaviors might cause.
"Observations on the Dropping of Packets with IPv6 Extension Headers in
the Real World", Fernando Gont, J. Linkova, Tim Chown, Shucheng LIU,
2015-12-11, <draft-ietf-v6ops-ipv6-ehs-in-real-world-02.txt>
"Considerations for Selecting RTCP Extended Report (XR) Metrics for the
WebRTC Statistics API", Varun Singh, Rachel Huang, Roni Even, Dan
Romascanu, Deng Lingli, 2016-03-21,
<draft-ietf-xrblock-rtcweb-rtcp-xr-metrics-03.txt,.pdf>
This document describes monitoring features related to media streams
in Web real-time communication (WebRTC). It provides a list of RTCP
Sender Report, Receiver Report and Extended Report metrics, which may
need to be supported by RTP implementations in some diverse
environments. It also defines a new IANA registry, a list of
identifiers for the WebRTC's statistics API. These identifiers are a
set of RTCP SR, RR, and XR metrics related to the transport of
multimedia flows.
"RTCP XR Report Block for Loss Concealment Metrics Reporting on Video
Applications", Rachel Huang, 2016-03-30,
<draft-ietf-xrblock-rtcp-xr-video-lc-06.txt>
This document defines a new RTCP XR Report Block that allows the
reporting of loss concealment metrics for video applications of RTP.
"RTP Control Protocol (RTCP) Extended Report (XR) Block for Independent
Reporting of Burst/Gap Discard Metric", Varun, Colin Perkins, Alan
Clark, Rachel Huang, 2016-03-21,
<draft-ietf-xrblock-independent-burst-gap-discard-01.txt,.pdf>
This document defines an RTP Control Protocol (RTCP) Extended Report
(XR) block that allows the reporting of burst and gap discard metrics
independently of the burst and gap loss metrics for use in a range of
RTP applications.