Last Call: (Extended TCP Options and IPv6 Extension Headers IPFIX Information Elements) to Proposed Standard

2024-04-26 Thread The IESG


The IESG has received a request from the Operations and Management Area
Working Group WG (opsawg) to consider the following document: - 'Extended TCP
Options and IPv6 Extension Headers IPFIX Information
   Elements'
   as Proposed Standard

The IESG plans to make a decision in the next few weeks, and solicits final
comments on this action. Please send substantive comments to the
last-c...@ietf.org mailing lists by 2024-05-10. Exceptionally, comments may
be sent to i...@ietf.org instead. In either case, please retain the beginning
of the Subject line to allow automated sorting.

Abstract


   This document specifies new IP Flow Information Export (IPFIX)
   Information Elements (IEs) to solve issues with existing
   ipv6ExtensionHeaders and tcpOptions IPFIX IEs, especially the ability
   to export any observed IPv6 extension headers or TCP options.




The file can be obtained via
https://datatracker.ietf.org/doc/draft-ietf-opsawg-ipfix-tcpo-v6eh/



No IPR declarations have been submitted directly on this I-D.





___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce


Protocol Action: 'YANG Groupings for TCP Clients and TCP Servers' to Proposed Standard (draft-ietf-netconf-tcp-client-server-24.txt)

2024-03-18 Thread The IESG
The IESG has approved the following document:
- 'YANG Groupings for TCP Clients and TCP Servers'
  (draft-ietf-netconf-tcp-client-server-24.txt) as Proposed Standard

This document is the product of the Network Configuration Working Group.

The IESG contact persons are Warren Kumari and Robert Wilton.

A URL of this Internet-Draft is:
https://datatracker.ietf.org/doc/draft-ietf-netconf-tcp-client-server/




Technical Summary

   This document defines three YANG 1.1 modules to support the
   configuration of TCP clients and TCP servers.  The modules include
   basic parameters of a TCP connection relevant for client or server
   applications, as well as client configuration required for traversing
   proxies.  The modules can be used either standalone or in conjunction
   with configuration of other stack protocol layers.

Working Group Summary

   This document has been progressing in the working group for
   a long time and reflects a good consensus.

Document Quality

   The document is of good quality.

Personnel

   The Document Shepherd for this document is Per Andersson.
   The Responsible Area Director is Robert Wilton.

___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce


Last Call: (YANG Groupings for TCP Clients and TCP Servers) to Proposed Standard

2024-01-29 Thread The IESG


The IESG has received a request from the Network Configuration WG (netconf)
to consider the following document: - 'YANG Groupings for TCP Clients and TCP
Servers'
   as Proposed Standard

The IESG plans to make a decision in the next few weeks, and solicits final
comments on this action. Please send substantive comments to the
last-c...@ietf.org mailing lists by 2024-02-12. Exceptionally, comments may
be sent to i...@ietf.org instead. In either case, please retain the beginning
of the Subject line to allow automated sorting.

Abstract


   This document defines three YANG 1.1 modules to support the
   configuration of TCP clients and TCP servers.  The modules include
   basic parameters of a TCP connection relevant for client or server
   applications, as well as client configuration required for traversing
   proxies.  The modules can be used either standalone or in conjunction
   with configuration of other stack protocol layers.




The file can be obtained via
https://datatracker.ietf.org/doc/draft-ietf-netconf-tcp-client-server/



No IPR declarations have been submitted directly on this I-D.





___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce


WG Action: Rechartered TCP Maintenance and Minor Extensions (tcpm)

2023-12-15 Thread The IESG
The TCP Maintenance and Minor Extensions (tcpm) WG in the Transport Area of
the IETF has been rechartered. For additional information, please contact the
Area Directors or the WG Chairs.

TCP Maintenance and Minor Extensions (tcpm)
---
Current status: Active WG

Chairs:
  Yoshifumi Nishida 
  Michael Tüxen 
  Ian Swett 

Assigned Area Director:
  Martin Duke 

Transport Area Directors:
  Martin Duke 
  Zaheduzzaman Sarker 

Mailing list:
  Address: t...@ietf.org
  To subscribe: https://www.ietf.org/mailman/listinfo/tcpm
  Archive: https://mailarchive.ietf.org/arch/browse/tcpm/

Group page: https://datatracker.ietf.org/group/tcpm/

Charter: https://datatracker.ietf.org/doc/charter-ietf-tcpm/

TCP is currently one of the Internet's predominant transport protocols. TCPM
is the working group within the IETF that handles small TCP changes,
i.e., minor extensions to TCP algorithms and protocol mechanisms.
The TCPM WG serves several purposes:

* The WG mostly focuses on maintenance issues (e.g., bug fixes) and
modest changes to the protocol, algorithms, and interfaces that
maintain TCP's utility.

* The WG is a venue for moving current TCP specifications along the
standards track.

* The WG maintains Multipath TCP (MPTCP) and is a home for minor
MPTCP enhancements including updates to the existing multipath
congestion control.

The preferred venue for Congestion control work is generally CCWG or ICCRG.
However, TCPM can take on such work in coordination with those groups,
especially if it relies on TCP-specific protocol elements.

New TCPM milestones that fall within the scope specified within the
charter can be added after consensus on acceptance in the working
group and approval by the responsible Area Director.

Milestones:

  Nov 2022 - Submit RFC6937bis document to the IESG for publication as a
  Proposed Standard RFC

  Dec 2022 - Submit specification of more accurate ECN feedback in TCP to the
  IESG for publication as a Proposed Standard RFC

  Jan 2023 - Submit document on adding Explicit Congestion Notification (ECN)
  to TCP Control Packets to the IESG for publication as Experimental RFC

  Dec 2023 - Submit document on a TCP Extended Data Offset Option to the IESG
  as a Proposed Standard RFC

  Oct 2024 - Submit document on adding acknowledgement rate handling for TCP
  to the IESG for publication as Experimental RFC



___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce


WG Review: TCP Maintenance and Minor Extensions (tcpm)

2023-12-01 Thread The IESG
The TCP Maintenance and Minor Extensions (tcpm) WG in the Transport Area of
the IETF is undergoing rechartering. The IESG has not made any determination
yet. The following draft charter was submitted, and is provided for
informational purposes only. Please send your comments to the IESG mailing
list (i...@ietf.org) by 2023-12-11.

TCP Maintenance and Minor Extensions (tcpm)
---
Current status: Active WG

Chairs:
  Yoshifumi Nishida 
  Michael Tüxen 
  Ian Swett 

Assigned Area Director:
  Martin Duke 

Transport Area Directors:
  Martin Duke 
  Zaheduzzaman Sarker 

Mailing list:
  Address: t...@ietf.org
  To subscribe: https://www.ietf.org/mailman/listinfo/tcpm
  Archive: https://mailarchive.ietf.org/arch/browse/tcpm/

Group page: https://datatracker.ietf.org/group/tcpm/

Charter: https://datatracker.ietf.org/doc/charter-ietf-tcpm/

TCP is currently the Internet's predominant transport protocol. TCPM
is the working group within the IETF that handles small TCP changes,
i.e., minor extensions to TCP algorithms and protocol mechanisms.
The TCPM WG serves several purposes:

* The WG mostly focuses on maintenance issues (e.g., bug fixes) and
modest changes to the protocol, algorithms, and interfaces that
maintain TCP's utility.

* The WG is a venue for moving current TCP specifications along the
standards track (as community energy is available for such efforts).

* The WG maintains Multipath TCP (MPTCP) and is a home for minor
MPTCP enhancements including updates to the existing multipath
congestion control.

The preferred venue for Congestion control work is generally CCWG or ICCRG.
However, TCPM can take on such work in coordination with those groups,
especially if it relies on TCP-specific protocol elements.

New TCPM milestones that fall within the scope specified within the
charter can be added after consensus on acceptance in the working
group and approval by the responsible Area Director.

Milestones:

  Nov 2022 - Submit RFC6937bis document to the IESG for publication as a
  Proposed Standard RFC

  Dec 2022 - Submit specification of more accurate ECN feedback in TCP to the
  IESG for publication as a Proposed Standard RFC

  Jan 2023 - Submit document on adding Explicit Congestion Notification (ECN)
  to TCP Control Packets to the IESG for publication as Experimental RFC

  Dec 2023 - Submit document on a TCP Extended Data Offset Option to the IESG
  as a Proposed Standard RFC

  Oct 2024 - Submit document on adding acknowledgement rate handling for TCP
  to the IESG for publication as Experimental RFC



___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce


RFC 9406 on HyStart++: Modified Slow Start for TCP

2023-05-15 Thread rfc-editor
A new Request for Comments is now available in online RFC libraries.


RFC 9406

Title:  HyStart++: Modified Slow Start for TCP 
Author: P. Balasubramanian,
Y. Huang,
M. Olson
Status: Standards Track
Stream: IETF
Date:   May 2023
Mailbox:pravb.i...@gmail.com,
hua...@microsoft.com,
maol...@microsoft.com
Pages:  9
Updates/Obsoletes/SeeAlso:   None

I-D Tag:draft-ietf-tcpm-hystartplusplus-14.txt

URL:https://www.rfc-editor.org/info/rfc9406

DOI:10.17487/RFC9406

This document describes HyStart++, a simple modification to the slow
start phase of congestion control algorithms. Slow start can
overshoot the ideal send rate in many cases, causing high packet loss
and poor performance. HyStart++ uses increase in round-trip delay as
a heuristic to find an exit point before possible overshoot. It also
adds a mitigation to prevent jitter from causing premature slow start
exit.

This document is a product of the TCP Maintenance and Minor Extensions Working 
Group of the IETF.

This is now a Proposed Standard.

STANDARDS TRACK: This document specifies an Internet Standards Track
protocol for the Internet community, and requests discussion and suggestions
for improvements.  Please refer to the current edition of the Official
Internet Protocol Standards (https://www.rfc-editor.org/standards) for the 
standardization state and status of this protocol.  Distribution of this 
memo is unlimited.

This announcement is sent to the IETF-Announce and rfc-dist lists.
To subscribe or unsubscribe, see
  https://www.ietf.org/mailman/listinfo/ietf-announce
  https://mailman.rfc-editor.org/mailman/listinfo/rfc-dist

For searching the RFC series, see https://www.rfc-editor.org/search
For downloading RFCs, see https://www.rfc-editor.org/retrieve/bulk

Requests for special distribution should be addressed to either the
author of the RFC in question, or to rfc-edi...@rfc-editor.org.  Unless
specifically noted otherwise on the RFC itself, all RFCs are for
unlimited distribution.


The RFC Editor Team
Association Management Solutions, LLC


___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce


RFC 9401 on The Addition of the Death (DTH) Flag to TCP

2023-04-01 Thread rfc-editor
A new Request for Comments is now available in online RFC libraries.


RFC 9401

Title:  The Addition of the Death (DTH) Flag to TCP 
Author: S. Toyosawa
Status: Informational
Stream: Independent
Date:   1 April 2023
Mailbox:s2.toyos...@gmail.com
Pages:  6
Updates/Obsoletes/SeeAlso:   None

I-D Tag:draft-deathflag-01.txt

URL:https://www.rfc-editor.org/info/rfc9401

DOI:10.17487/RFC9401

This memo specifies the incorporation of Death (DTH) flag to TCP,
including DTH's use of one bit in the TCP header.  The flag is
designed to make TCP session narratives smooth and attractive.


INFORMATIONAL: This memo provides information for the Internet community.
It does not specify an Internet standard of any kind. Distribution of
this memo is unlimited.

This announcement is sent to the IETF-Announce and rfc-dist lists.
To subscribe or unsubscribe, see
  https://www.ietf.org/mailman/listinfo/ietf-announce
  https://mailman.rfc-editor.org/mailman/listinfo/rfc-dist

For searching the RFC series, see https://www.rfc-editor.org/search
For downloading RFCs, see https://www.rfc-editor.org/retrieve/bulk

Requests for special distribution should be addressed to either the
author of the RFC in question, or to rfc-edi...@rfc-editor.org.  Unless
specifically noted otherwise on the RFC itself, all RFCs are for
unlimited distribution.


The RFC Editor Team
Association Management Solutions, LLC


___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce


Protocol Action: 'HyStart++: Modified Slow Start for TCP' to Proposed Standard (draft-ietf-tcpm-hystartplusplus-14.txt)

2023-02-28 Thread The IESG
The IESG has approved the following document:
- 'HyStart++: Modified Slow Start for TCP'
  (draft-ietf-tcpm-hystartplusplus-14.txt) as Proposed Standard

This document is the product of the TCP Maintenance and Minor Extensions
Working Group.

The IESG contact persons are Zaheduzzaman Sarker and Martin Duke.

A URL of this Internet-Draft is:
https://datatracker.ietf.org/doc/draft-ietf-tcpm-hystartplusplus/





Technical Summary

   This document describes HyStart++, a simple modification to the slow start 
phase of congestion control algorithms. Traditional slow start can overshoot 
the ideal send rate in many cases, causing high packet loss and poor 
performance. HyStart++ uses a delay increase heuristic to find an exit point 
before possible overshoot. It also adds a mitigation to prevent jitter from 
causing premature slow start exit.

Working Group Summary

The document has broad agreement, in particular from TCP implementers. There 
was no controversy.

Document Quality

   There are implementations for the TCP stacks in FreeBSD, Linux, and Windows,
   and a QUIC implementations Quiche from CloudFlare and s2n-quic from AWS.?

Personnel

The document shepherd is Michael Tuexen. The AD is Martin Duke.

___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce


Last Call: (HyStart++: Modified Slow Start for TCP) to Proposed Standard

2023-01-11 Thread The IESG


The IESG has received a request from the TCP Maintenance and Minor Extensions
WG (tcpm) to consider the following document: - 'HyStart++: Modified Slow
Start for TCP'
   as Proposed Standard

The IESG plans to make a decision in the next few weeks, and solicits final
comments on this action. Please send substantive comments to the
last-c...@ietf.org mailing lists by 2023-01-25. Exceptionally, comments may
be sent to i...@ietf.org instead. In either case, please retain the beginning
of the Subject line to allow automated sorting.

Abstract


   This document describes HyStart++, a simple modification to the slow
   start phase of congestion control algorithms.  Traditional slow start
   can overshoot the ideal send rate in many cases, causing high packet
   loss and poor performance.  HyStart++ uses a delay increase heuristic
   to find an exit point before possible overshoot.  It also adds a
   mitigation to prevent jitter from causing premature slow start exit.




The file can be obtained via
https://datatracker.ietf.org/doc/draft-ietf-tcpm-hystartplusplus/



No IPR declarations have been submitted directly on this I-D.





___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce


RFC 9329 on TCP Encapsulation of Internet Key Exchange Protocol (IKE) and IPsec Packets

2022-11-30 Thread rfc-editor
A new Request for Comments is now available in online RFC libraries.


RFC 9329

Title:  TCP Encapsulation of Internet Key 
Exchange Protocol (IKE) and IPsec Packets 
Author: T. Pauly,
V. Smyslov
Status: Standards Track
Stream: IETF
Date:   November 2022
Mailbox:tpa...@apple.com,
s...@elvis.ru
Pages:  30
Obsoletes:  RFC 8229

I-D Tag:draft-ietf-ipsecme-rfc8229bis-09.txt

URL:https://www.rfc-editor.org/info/rfc9329

DOI:10.17487/RFC9329

This document describes a method to transport Internet Key Exchange
Protocol (IKE) and IPsec packets over a TCP connection for traversing
network middleboxes that may block IKE negotiation over UDP.  This
method, referred to as "TCP encapsulation", involves sending both IKE
packets for Security Association (SA) establishment and Encapsulating
Security Payload (ESP) packets over a TCP connection.  This method is
intended to be used as a fallback option when IKE cannot be
negotiated over UDP. 

TCP encapsulation for IKE and IPsec was defined in RFC 8229. This
document clarifies the specification for TCP encapsulation by
including additional clarifications obtained during implementation
and deployment of this method. This documents obsoletes RFC 8229.

This document is a product of the IP Security Maintenance and Extensions 
Working Group of the IETF.

This is now a Proposed Standard.

STANDARDS TRACK: This document specifies an Internet Standards Track
protocol for the Internet community, and requests discussion and suggestions
for improvements.  Please refer to the current edition of the Official
Internet Protocol Standards (https://www.rfc-editor.org/standards) for the 
standardization state and status of this protocol.  Distribution of this 
memo is unlimited.

This announcement is sent to the IETF-Announce and rfc-dist lists.
To subscribe or unsubscribe, see
  https://www.ietf.org/mailman/listinfo/ietf-announce
  https://mailman.rfc-editor.org/mailman/listinfo/rfc-dist

For searching the RFC series, see https://www.rfc-editor.org/search
For downloading RFCs, see https://www.rfc-editor.org/retrieve/bulk

Requests for special distribution should be addressed to either the
author of the RFC in question, or to rfc-edi...@rfc-editor.org.  Unless
specifically noted otherwise on the RFC itself, all RFCs are for
unlimited distribution.


The RFC Editor Team
Association Management Solutions, LLC


___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce


Protocol Action: 'TCP Encapsulation of IKE and IPsec Packets' to Proposed Standard (draft-ietf-ipsecme-rfc8229bis-09.txt)

2022-09-13 Thread The IESG
The IESG has approved the following document:
- 'TCP Encapsulation of IKE and IPsec Packets'
  (draft-ietf-ipsecme-rfc8229bis-09.txt) as Proposed Standard

This document is the product of the IP Security Maintenance and Extensions
Working Group.

The IESG contact persons are Paul Wouters and Roman Danyliw.

A URL of this Internet Draft is:
https://datatracker.ietf.org/doc/draft-ietf-ipsecme-rfc8229bis/





Technical Summary

   This document describes a method to transport Internet Key Exchange
   Protocol (IKE) and IPsec packets over a TCP connection for traversing
   network middleboxes that may block IKE negotiation over UDP.  This
   method, referred to as "TCP encapsulation", involves sending both IKE
   packets for Security Association establishment and Encapsulating
   Security Payload (ESP) packets over a TCP connection.  This method is
   intended to be used as a fallback option when IKE cannot be
   negotiated over UDP.

   TCP encapsulation for IKE and IPsec was defined in RFC 8229.  This
   document updates the specification for TCP encapsulation by including
   additional clarifications obtained during implementation and
   deployment of this method.  This documents obsoletes RFC 8229.

Working Group Summary

This work started in 2018 with document "Clarifications and Implementation
Guidelines for using TCP Encapsulation in IKEv2", but during the process
IPsecME WG decided to make bis document of RFC8229 instead as some of the
clarifications were actually modifying the protocol. The first version of
the rfc8229bis document was published as individual draft in May 2020 as
individual draft, and  it was adopted by the WG in April 2021.

Updates were made in response to AD Review, GENART, TSV, and SECDIR review.

Document Quality

There are several implementations of the RFC8229 and during those
implementations few issues were found that required modifications. Because
of that this RFC8229bis document was created, when it was obvious that
simple clarifications are not enough. There are already some
implementations implementing changes described in this bis document.

Personnel

  Shepherd: Tero Kivinen
  Responsible AD: Roman Danyliw

___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce


Protocol Action: 'A YANG Model for Transmission Control Protocol (TCP) Configuration and State' to Proposed Standard (draft-ietf-tcpm-yang-tcp-09.txt)

2022-09-12 Thread The IESG
The IESG has approved the following document:
- 'A YANG Model for Transmission Control Protocol (TCP) Configuration and
   State'
  (draft-ietf-tcpm-yang-tcp-09.txt) as Proposed Standard

This document is the product of the TCP Maintenance and Minor Extensions
Working Group.

The IESG contact persons are Zaheduzzaman Sarker and Martin Duke.

A URL of this Internet Draft is:
https://datatracker.ietf.org/doc/draft-ietf-tcpm-yang-tcp/





Technical Summary

This document specifies a minimal YANG model for TCP on devices that are 
configured by network management protocols. The YANG model defines a container 
for all TCP connections and groupings of authentication parameters that can be 
imported and used in TCP implementations or by other models that need to 
configure TCP parameters. The model also includes basic TCP statistics. The 
model is compliant with Network Management Datastore Architecture (NMDA) (RFC 
8342).

Working Group Summary

The draft has been active for over 3 years. At first, some raised concerns that 
other TCP related
YANG models might create conflicts or overlap, and that attempting a model for 
all of TCP
would be complicated and time-consuming, and TCP implementations would not 
provide a
YANG-based configuration interface.  Therefore, the focus is limited
to a small set of parameters and TCP configuration on BGP routers, where YANG 
is already in use.
There have been no other controversial points that required long arguments. 
There is a solid
consensus in the WG for publication.

Document Quality

There are prototype implementations. A YANG Doctors review is in progress. This 
work was
requested by people in the BGP community, so we expect industry adoption.

Personnel

The Shepherd is Yoshifumi Nishida. The Responsible AD is Martin Duke.   


___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce


STD 7, RFC 9293 on Transmission Control Protocol (TCP)

2022-08-18 Thread rfc-editor
A new Request for Comments is now available in online RFC libraries.

STD 7
RFC 9293

Title:  Transmission Control Protocol (TCP) 
Author: W. Eddy, Ed.
Status: Standards Track
Stream: IETF
Date:   August 2022
Mailbox:w...@mti-systems.com
Pages:  98
Obsoletes:  RFC 793, RFC 879, RFC 2873, RFC 6093, 
RFC 6429, RFC 6528, RFC 6691
Updates:RFC 1011, RFC 1122, RFC 5961
See Also:   STD 7

I-D Tag:draft-ietf-tcpm-rfc793bis-28.txt

URL:https://www.rfc-editor.org/info/rfc9293

DOI:10.17487/RFC9293

This document specifies the Transmission Control Protocol (TCP).  TCP
is an important transport-layer protocol in the Internet protocol
stack, and it has continuously evolved over decades of use and growth
of the Internet.  Over this time, a number of changes have been made
to TCP as it was specified in RFC 793, though these have only been
documented in a piecemeal fashion.  This document collects and brings
those changes together with the protocol specification from RFC 793. 
This document obsoletes RFC 793, as well as RFCs 879, 2873, 6093,
6429, 6528, and 6691 that updated parts of RFC 793.  It updates RFCs
1011 and 1122, and it should be considered as a replacement for the
portions of those documents dealing with TCP requirements.  It also
updates RFC 5961 by adding a small clarification in reset handling
while in the SYN-RECEIVED state.  The TCP header control bits from
RFC 793 have also been updated based on RFC 3168.

This document is a product of the TCP Maintenance and Minor Extensions Working 
Group of the IETF.

This is now an Internet Standard.

STANDARDS TRACK: This document specifies an Internet Standards Track
protocol for the Internet community, and requests discussion and suggestions
for improvements.  Please refer to the current edition of the Official
Internet Protocol Standards (https://www.rfc-editor.org/standards) for the 
standardization state and status of this protocol.  Distribution of this 
memo is unlimited.

This announcement is sent to the IETF-Announce and rfc-dist lists.
To subscribe or unsubscribe, see
  https://www.ietf.org/mailman/listinfo/ietf-announce
  https://mailman.rfc-editor.org/mailman/listinfo/rfc-dist

For searching the RFC series, see https://www.rfc-editor.org/search
For downloading RFCs, see https://www.rfc-editor.org/retrieve/bulk

Requests for special distribution should be addressed to either the
author of the RFC in question, or to rfc-edi...@rfc-editor.org.  Unless
specifically noted otherwise on the RFC itself, all RFCs are for
unlimited distribution.


The RFC Editor Team
Association Management Solutions, LLC


___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce


Last Call: (TCP Encapsulation of IKE and IPsec Packets) to Proposed Standard

2022-05-17 Thread The IESG


The IESG has received a request from the IP Security Maintenance and
Extensions WG (ipsecme) to consider the following document: - 'TCP
Encapsulation of IKE and IPsec Packets'
   as Proposed Standard

The IESG plans to make a decision in the next few weeks, and solicits final
comments on this action. Please send substantive comments to the
last-c...@ietf.org mailing lists by 2022-05-31. Exceptionally, comments may
be sent to i...@ietf.org instead. In either case, please retain the beginning
of the Subject line to allow automated sorting.

Abstract


   This document describes a method to transport Internet Key Exchange
   Protocol (IKE) and IPsec packets over a TCP connection for traversing
   network middleboxes that may block IKE negotiation over UDP.  This
   method, referred to as "TCP encapsulation", involves sending both IKE
   packets for Security Association establishment and Encapsulating
   Security Payload (ESP) packets over a TCP connection.  This method is
   intended to be used as a fallback option when IKE cannot be
   negotiated over UDP.

   TCP encapsulation for IKE and IPsec was defined in RFC 8229.  This
   document updates the specification for TCP encapsulation by including
   additional clarifications obtained during implementation and
   deployment of this method.  This documents obsoletes RFC 8229.




The file can be obtained via
https://datatracker.ietf.org/doc/draft-ietf-ipsecme-rfc8229bis/



No IPR declarations have been submitted directly on this I-D.





___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce


RFC 9235 on TCP Authentication Option (TCP-AO) Test Vectors

2022-05-12 Thread rfc-editor
A new Request for Comments is now available in online RFC libraries.


RFC 9235

Title:  TCP Authentication Option (TCP-AO) Test 
Vectors 
Author: J. Touch,
J. Kuusisaari
Status: Informational
Stream: IETF
Date:   May 2022
Mailbox:to...@strayalpha.com,
jkuusisa...@infinera.com
Pages:  25
Updates/Obsoletes/SeeAlso:   None

I-D Tag:draft-ietf-tcpm-ao-test-vectors-09.txt

URL:https://www.rfc-editor.org/info/rfc9235

DOI:10.17487/RFC9235

This document provides test vectors to validate implementations of
the two mandatory authentication algorithms specified for the TCP
Authentication Option over both IPv4 and IPv6. This includes
validation of the key derivation function (KDF) based on a set of
test connection parameters as well as validation of the message
authentication code (MAC). Vectors are provided for both currently
required pairs of KDF and MAC algorithms: KDF_HMAC_SHA1 and HMAC-
SHA-1-96, and KDF_AES_128_CMAC and AES-128-CMAC-96. The vectors also
validate both whole TCP segments as well as segments whose options
are excluded for middlebox traversal.

This document is a product of the TCP Maintenance and Minor Extensions Working 
Group of the IETF.


INFORMATIONAL: This memo provides information for the Internet community.
It does not specify an Internet standard of any kind. Distribution of
this memo is unlimited.

This announcement is sent to the IETF-Announce and rfc-dist lists.
To subscribe or unsubscribe, see
  https://www.ietf.org/mailman/listinfo/ietf-announce
  https://mailman.rfc-editor.org/mailman/listinfo/rfc-dist

For searching the RFC series, see https://www.rfc-editor.org/search
For downloading RFCs, see https://www.rfc-editor.org/retrieve/bulk

Requests for special distribution should be addressed to either the
author of the RFC in question, or to rfc-edi...@rfc-editor.org.  Unless
specifically noted otherwise on the RFC itself, all RFCs are for
unlimited distribution.


The RFC Editor Team
Association Management Solutions, LLC


___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce


Protocol Action: 'Transmission Control Protocol (TCP) Specification' to Internet Standard (draft-ietf-tcpm-rfc793bis-28.txt)

2022-04-04 Thread The IESG
The IESG has approved the following document:
- 'Transmission Control Protocol (TCP) Specification'
  (draft-ietf-tcpm-rfc793bis-28.txt) as Internet Standard

This document is the product of the TCP Maintenance and Minor Extensions
Working Group.

The IESG contact persons are Zaheduzzaman Sarker and Martin Duke.

A URL of this Internet Draft is:
https://datatracker.ietf.org/doc/draft-ietf-tcpm-rfc793bis/





Technical Summary

   This is an update to RFC793, the core specification for TCP,
   which is 40 years old. It also replaces some RFCs that update
   793, including the TCP-related bits of RFC 1122.

Working Group Summary

   This has taken 6 years. The objective was to not actually
   change how TCP works, for obvious reasons. Nevertheless, 
   there are many deviations between the specification and
   practice in the real world. The consensus was to document
   these issues rather than attempt to correct them here.

   For more, please see the (exceptional) Shepherd Writeup.

Document Quality

   You almost certainly, have at least one, if not several, TCP
   implementations on your body right now, and are right now
   reading text that was delivered via TCP.

Personnel

The document shepherd is Michael Scharf .

The responsible Area Director is Martin Duke .





___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce


BCP 235, RFC 9210 on DNS Transport over TCP - Operational Requirements

2022-03-22 Thread rfc-editor
A new Request for Comments is now available in online RFC libraries.

BCP 235
RFC 9210

Title:  DNS Transport over TCP - 
Operational Requirements 
Author: J. Kristoff,
D. Wessels
Status: Best Current Practice
Stream: IETF
Date:   March 2022
Mailbox:j...@dataplane.org,
dwess...@verisign.com
Pages:  29
Updates:RFC 1123, RFC 1536
See Also:   BCP 235

I-D Tag:draft-ietf-dnsop-dns-tcp-requirements-15.txt

URL:https://www.rfc-editor.org/info/rfc9210

DOI:10.17487/RFC9210

This document updates RFCs 1123 and 1536.  This document requires the
operational practice of permitting DNS messages to be carried over
TCP on the Internet as a Best Current Practice.  This operational
requirement is aligned with the implementation requirements in RFC
7766.  The use of TCP includes both DNS over unencrypted TCP as well
as over an encrypted TLS session.  The document also considers the
consequences of this form of DNS communication and the potential
operational issues that can arise when this Best Current Practice is
not upheld.

This document is a product of the Domain Name System Operations Working Group 
of the IETF.


BCP: This document specifies an Internet Best Current Practices for the
Internet Community, and requests discussion and suggestions for 
improvements. Distribution of this memo is unlimited.

This announcement is sent to the IETF-Announce and rfc-dist lists.
To subscribe or unsubscribe, see
  https://www.ietf.org/mailman/listinfo/ietf-announce
  https://mailman.rfc-editor.org/mailman/listinfo/rfc-dist

For searching the RFC series, see https://www.rfc-editor.org/search
For downloading RFCs, see https://www.rfc-editor.org/retrieve/bulk

Requests for special distribution should be addressed to either the
author of the RFC in question, or to rfc-edi...@rfc-editor.org.  Unless
specifically noted otherwise on the RFC itself, all RFCs are for
unlimited distribution.


The RFC Editor Team
Association Management Solutions, LLC


___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce


Document Action: 'TCP-AO Test Vectors' to Informational RFC (draft-ietf-tcpm-ao-test-vectors-09.txt)

2022-03-15 Thread The IESG
The IESG has approved the following document:
- 'TCP-AO Test Vectors'
  (draft-ietf-tcpm-ao-test-vectors-09.txt) as Informational RFC

This document is the product of the TCP Maintenance and Minor Extensions
Working Group.

The IESG contact persons are Zaheduzzaman Sarker and Martin Duke.

A URL of this Internet Draft is:
https://datatracker.ietf.org/doc/draft-ietf-tcpm-ao-test-vectors/





Technical Summary

   This document provides test vectors to validate implementations of
   the two mandatory authentication algorithms specified for the TCP
   Authentication Option over both IPv4 and IPv6. This includes
   validation of the key derivation function (KDF) based on a set of
   test connection parameters as well as validation of the message
   authentication code (MAC). Vectors are provided for both currently
   required pairs of KDF and MAC algorithms: KDF_HMAC_SHA1 and HMAC-
   SHA-1-96, and KDF_AES_128_CMAC and AES-128-CMAC-96. The vectors also
   validate both whole TCP segments as well as segments whose options
   are excluded for middlebox traversal.

Working Group Summary

   This is a niche interest, so there was less TCPM review than usual, but 
there was also no controversy.

Document Quality

   The test vectors here have been verified by multiple sources. TCP-AO is 
often used in routers.

Personnel

   The Shepherd is Michael Scharf. The responsible AD is Martin Duke.


___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce


Last Call: (A YANG Model for Transmission Control Protocol (TCP) Configuration) to Proposed Standard

2022-02-16 Thread The IESG


The IESG has received a request from the TCP Maintenance and Minor Extensions
WG (tcpm) to consider the following document: - 'A YANG Model for
Transmission Control Protocol (TCP) Configuration'
   as Proposed Standard

The IESG plans to make a decision in the next few weeks, and solicits final
comments on this action. Please send substantive comments to the
last-c...@ietf.org mailing lists by 2022-03-02. Exceptionally, comments may
be sent to i...@ietf.org instead. In either case, please retain the beginning
of the Subject line to allow automated sorting.

Abstract


   This document specifies a minimal YANG model for TCP on devices that
   are configured by network management protocols.  The YANG model
   defines a container for all TCP connections and groupings of
   authentication parameters that can be imported and used in TCP
   implementations or by other models that need to configure TCP
   parameters.  The model also includes basic TCP statistics.  The model
   is compliant with Network Management Datastore Architecture (NMDA)
   (RFC 8342).




The file can be obtained via
https://datatracker.ietf.org/doc/draft-ietf-tcpm-yang-tcp/



No IPR declarations have been submitted directly on this I-D.





___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce


RFC 9174 on Delay-Tolerant Networking TCP Convergence-Layer Protocol Version 4

2022-01-31 Thread rfc-editor
A new Request for Comments is now available in online RFC libraries.


RFC 9174

Title:  Delay-Tolerant Networking TCP Convergence-Layer 
Protocol Version 4 
Author: B. Sipos,
M. Demmer,
J. Ott,
S. Perreault
Status: Standards Track
Stream: IETF
Date:   January 2022
Mailbox:brian.sipos+i...@gmail.com,
dem...@gmail.com,
o...@in.tum.de,
simon.perrea...@logmein.com
Pages:  62
Updates/Obsoletes/SeeAlso:   None

I-D Tag:draft-ietf-dtn-tcpclv4-28.txt

URL:https://www.rfc-editor.org/info/rfc9174

DOI:10.17487/RFC9174

This document describes a TCP convergence layer (TCPCL) for
Delay-Tolerant Networking (DTN). This version of the TCPCL protocol
resolves implementation issues in the earlier TCPCL version 3 as
defined in RFC 7242 and provides updates to the Bundle Protocol (BP)
contents, encodings, and convergence-layer requirements in BP version
7 (BPv7). Specifically, TCPCLv4 uses BPv7 bundles encoded by the
Concise Binary Object Representation (CBOR) as its service data unit
being transported and provides a reliable transport of such bundles.
This TCPCL version also includes security and extensibility
mechanisms.

This document is a product of the Delay/Disruption Tolerant Networking Working 
Group of the IETF.

This is now a Proposed Standard.

STANDARDS TRACK: This document specifies an Internet Standards Track
protocol for the Internet community, and requests discussion and suggestions
for improvements.  Please refer to the current edition of the Official
Internet Protocol Standards (https://www.rfc-editor.org/standards) for the 
standardization state and status of this protocol.  Distribution of this 
memo is unlimited.

This announcement is sent to the IETF-Announce and rfc-dist lists.
To subscribe or unsubscribe, see
  https://www.ietf.org/mailman/listinfo/ietf-announce
  https://mailman.rfc-editor.org/mailman/listinfo/rfc-dist

For searching the RFC series, see https://www.rfc-editor.org/search
For downloading RFCs, see https://www.rfc-editor.org/retrieve/bulk

Requests for special distribution should be addressed to either the
author of the RFC in question, or to rfc-edi...@rfc-editor.org.  Unless
specifically noted otherwise on the RFC itself, all RFCs are for
unlimited distribution.


The RFC Editor Team
Association Management Solutions, LLC


___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce


Last Call: (TCP-AO Test Vectors) to Informational RFC

2022-01-18 Thread The IESG


The IESG has received a request from the TCP Maintenance and Minor Extensions
WG (tcpm) to consider the following document: - 'TCP-AO Test Vectors'
   as Informational RFC

The IESG plans to make a decision in the next few weeks, and solicits final
comments on this action. Please send substantive comments to the
last-c...@ietf.org mailing lists by 2022-02-01. Exceptionally, comments may
be sent to i...@ietf.org instead. In either case, please retain the beginning
of the Subject line to allow automated sorting.

Abstract


   This document provides test vectors to validate implementations of
   the two mandatory authentication algorithms specified for the TCP
   Authentication Option over both IPv4 and IPv6. This includes
   validation of the key derivation function (KDF) based on a set of
   test connection parameters as well as validation of the message
   authentication code (MAC). Vectors are provided for both currently
   required pairs of KDF and MAC algorithms: one based on SHA-1 and the
   other on AES-128. The vectors also validate both whole TCP segments
   as well as segments whose options are excluded for middlebox
   traversal.




The file can be obtained via
https://datatracker.ietf.org/doc/draft-ietf-tcpm-ao-test-vectors/



No IPR declarations have been submitted directly on this I-D.





___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce


Protocol Action: 'DNS Transport over TCP - Operational Requirements' to Best Current Practice (draft-ietf-dnsop-dns-tcp-requirements-15.txt)

2022-01-13 Thread The IESG
The IESG has approved the following document:
- 'DNS Transport over TCP - Operational Requirements'
  (draft-ietf-dnsop-dns-tcp-requirements-15.txt) as Best Current Practice

This document is the product of the Domain Name System Operations Working
Group.

The IESG contact persons are Warren Kumari and Robert Wilton.

A URL of this Internet Draft is:
https://datatracker.ietf.org/doc/draft-ietf-dnsop-dns-tcp-requirements/





Technical Summary

This document clarifies and strengthens an existing protocol feature specified 
in RFC 1123 from a SHOULD to a MUST. The bulk of it is a justification of the 
MUST for implementers, and corresponding advice to operators that they use the 
feature.  For many years it's been typical for DNS implementers to provide code 
for servicing DNS requests over TCP, but it has also been common for operators 
to turn it off; this document attempts to establish a best common practice for 
operators to only use DNS software that implements TCP support and to not 
disable the capability.


Working Group Summary

This document has been around in various forms for some time, and has been 
extensively reviewed in the WG by both protocol experts and DNS operators.  THe 
authors are experienced DNS protocol designers and operators as well, and 
responded to every issue raised in the WG discussion over time.


Document Quality

   This document clarifies and strengthens an existing protocol feature 
specified in RFC 1123 from a SHOULD to a MUST. The bulk of it is a 
justification of the MUST for implementers, and corresponding advice to 
operators that they use the feature.  For many years it's been typical for DNS 
implementers to provide code for servicing DNS requests over TCP, but it has 
also been common for operators to turn it off; this document attempts to 
establish a best common practice for operators to only use DNS software that 
implements TCP support and to not disable the capability.


Personnel
Suzanne Woolf is the Document Shepherd
Warren Kumari is RAD

___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce


Last Call: (DNS Transport over TCP - Operational Requirements) to Best Current Practice

2021-08-20 Thread The IESG


The IESG has received a request from the Domain Name System Operations WG
(dnsop) to consider the following document: - 'DNS Transport over TCP -
Operational Requirements'
   as Best Current Practice

The IESG plans to make a decision in the next few weeks, and solicits final
comments on this action. Please send substantive comments to the
last-c...@ietf.org mailing lists by 2021-09-03. Exceptionally, comments may
be sent to i...@ietf.org instead. In either case, please retain the beginning
of the Subject line to allow automated sorting.

Abstract


   This document updates RFC 1123.  This document strongly encourages
   the operational practice of permitting DNS messages to be carried
   over TCP on the Internet as a best current practice.  Such
   encouragement is aligned with the implementation requirements in RFC
   7766.  The use of TCP includes both DNS over unencrypted TCP, as well
   as over an encrypted TLS session.  The document also considers the
   consequences with this form of DNS communication and the potential
   operational issues that can arise when this best current practice is
   not upheld.




The file can be obtained via
https://datatracker.ietf.org/doc/draft-ietf-dnsop-dns-tcp-requirements/



No IPR declarations have been submitted directly on this I-D.


The document contains these normative downward references.
See RFC 3967 for additional information: 
rfc8482: Providing Minimal-Sized Responses to DNS Queries That Have 
QTYPE=ANY (Proposed Standard - Internet Engineering Task Force (IETF))
rfc8490: DNS Stateful Operations (Proposed Standard - Internet Engineering 
Task Force (IETF))
rfc7873: Domain Name System (DNS) Cookies (Proposed Standard - Internet 
Engineering Task Force (IETF))
rfc7828: The edns-tcp-keepalive EDNS0 Option (Proposed Standard - Internet 
Engineering Task Force (IETF))
rfc7766: DNS Transport over TCP - Implementation Requirements (Proposed 
Standard - Internet Engineering Task Force (IETF))
rfc7477: Child-to-Parent Synchronization in DNS (Proposed Standard - 
Internet Engineering Task Force (IETF))
rfc6762: Multicast DNS (Proposed Standard - Internet Engineering Task Force 
(IETF))
rfc5936: DNS Zone Transfer Protocol (AXFR) (Proposed Standard - Internet 
Engineering Task Force (IETF))
rfc2181: Clarifications to the DNS Specification (Proposed Standard - 
Internet Engineering Task Force (IETF))
rfc1996: A Mechanism for Prompt Notification of Zone Changes (DNS NOTIFY) 
(Proposed Standard - Internet Engineering Task Force (IETF))
rfc1995: Incremental Zone Transfer in DNS (Proposed Standard - Internet 
Engineering Task Force (IETF))




___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce


RFC 9040 on TCP Control Block Interdependence

2021-07-27 Thread rfc-editor
A new Request for Comments is now available in online RFC libraries.


RFC 9040

Title:  TCP Control Block Interdependence 
Author: J. Touch,
M. Welzl,
S. Islam
Status: Informational
Stream: IETF
Date:   July 2021
Mailbox:to...@strayalpha.com,
mich...@ifi.uio.no,
safiq...@ifi.uio.no
Pages:  29
Obsoletes:  RFC 2140

I-D Tag:draft-ietf-tcpm-2140bis-11.txt

URL:https://www.rfc-editor.org/info/rfc9040

DOI:10.17487/RFC9040

This memo provides guidance to TCP implementers that is intended to
help improve connection convergence to steady-state operation without
affecting interoperability. It updates and replaces RFC 2140's
description of sharing TCP state, as typically represented in TCP
Control Blocks, among similar concurrent or consecutive connections.

This document is a product of the TCP Maintenance and Minor Extensions Working 
Group of the IETF.


INFORMATIONAL: This memo provides information for the Internet community.
It does not specify an Internet standard of any kind. Distribution of
this memo is unlimited.

This announcement is sent to the IETF-Announce and rfc-dist lists.
To subscribe or unsubscribe, see
  https://www.ietf.org/mailman/listinfo/ietf-announce
  https://mailman.rfc-editor.org/mailman/listinfo/rfc-dist

For searching the RFC series, see https://www.rfc-editor.org/search
For downloading RFCs, see https://www.rfc-editor.org/retrieve/bulk

Requests for special distribution should be addressed to either the
author of the RFC in question, or to rfc-edi...@rfc-editor.org.  Unless
specifically noted otherwise on the RFC itself, all RFCs are for
unlimited distribution.


The RFC Editor Team
Association Management Solutions, LLC


___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce


Last Call: (Transmission Control Protocol (TCP) Specification) to Internet Standard

2021-07-12 Thread The IESG


The IESG has received a request from the TCP Maintenance and Minor Extensions
WG (tcpm) to consider the following document: - 'Transmission Control
Protocol (TCP) Specification'
   as Internet Standard

The IESG plans to make a decision in the next few weeks, and solicits final
comments on this action. Please send substantive comments to the
last-c...@ietf.org mailing lists by 2021-08-02. Exceptionally, comments may
be sent to i...@ietf.org instead. In either case, please retain the beginning
of the Subject line to allow automated sorting.

Abstract


   This document specifies the Transmission Control Protocol (TCP).  TCP
   is an important transport layer protocol in the Internet protocol
   stack, and has continuously evolved over decades of use and growth of
   the Internet.  Over this time, a number of changes have been made to
   TCP as it was specified in RFC 793, though these have only been
   documented in a piecemeal fashion.  This document collects and brings
   those changes together with the protocol specification from RFC 793.
   This document obsoletes RFC 793, as well as RFCs 879, 2873, 6093,
   6429, 6528, and 6691 that updated parts of RFC 793.  It updates RFC
   1122, and should be considered as a replacement for the portions of
   that document dealing with TCP requirements.  It also updates RFC
   5961 by adding a small clarification in reset handling while in the
   SYN-RECEIVED state.  The TCP header control bits from RFC 793 have
   also been updated based on RFC 3168.

   RFC EDITOR NOTE: If approved for publication as an RFC, this should
   be marked additionally as "STD: 7" and replace RFC 793 in that role.




The file can be obtained via
https://datatracker.ietf.org/doc/draft-ietf-tcpm-rfc793bis/



No IPR declarations have been submitted directly on this I-D.


The document contains these normative downward references.
See RFC 3967 for additional information: 
rfc6633: Deprecation of ICMP Source Quench Messages (Proposed Standard - 
Internet Engineering Task Force (IETF))
rfc6298: Computing TCP's Retransmission Timer (Proposed Standard - Internet 
Engineering Task Force (IETF))
    rfc5681: TCP Congestion Control (Draft Standard - Internet Engineering Task 
Force (IETF))
rfc3168: The Addition of Explicit Congestion Notification (ECN) to IP 
(Proposed Standard - Internet Engineering Task Force (IETF))
rfc2675: IPv6 Jumbograms (Proposed Standard - Internet Engineering Task 
Force (IETF))
rfc2474: Definition of the Differentiated Services Field (DS Field) in the 
IPv4 and IPv6 Headers (Proposed Standard - Internet Engineering Task Force 
(IETF))
rfc1191: Path MTU discovery (Draft Standard - Legacy stream)




___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce


Document Action: 'TCP Control Block Interdependence' to Informational RFC (draft-ietf-tcpm-2140bis-11.txt)

2021-04-20 Thread The IESG
The IESG has approved the following document:
- 'TCP Control Block Interdependence'
  (draft-ietf-tcpm-2140bis-11.txt) as Informational RFC

This document is the product of the TCP Maintenance and Minor Extensions
Working Group.

The IESG contact persons are Zaheduzzaman Sarker and Martin Duke.

A URL of this Internet Draft is:
https://datatracker.ietf.org/doc/draft-ietf-tcpm-2140bis/





Technical Summary

This informational document describes TCP Control Block Interdependence, i.e. 
sharing of a part of TCP state among similar concurrent or consecutive 
connections. Many TCP implementations use such sharing to help improve 
convergence to steady-state operation. The memo documents known caching 
mechanisms and provides guidance to TCP implementers.

2140bis updates and replaces RFC 2140's description of interdependent TCP 
control blocks. The document describes local heuristics inside a TCP endpoint 
that do not affect interoperability between different TCP implementations. As 
described in the document, different TCP/IP stacks internally cache different 
TCP parameters, and there is no known best approach. As a result, 2140bis is 
submitted as informational document, like RFC 2140.


Working Group Summary

The document is an outcome of the TCPM working group and has been discussed in 
TCPM for a long time. There is strong consensus in the TCPM working group that 
an up-to-date description of TCP Control Block Interdependence is useful - 
instead of the outdated content of RFC 2140. Section 11 describes the updates 
compared to RFC 2140. Various TCP implementers provided feedback about actually 
implemented mechanisms and contributed e.g. to the summary in Section 10. 

Before adoption in TCPM there were discussions about the target status of this 
document, most notably about the question whether to publish 2140bis as BCP. 
However, many implementers pushed back against a BCP in this space, given that 
there is no known "best" caching heuristic and different operating systems have 
successfully used different strategies for a long time. As different choices by 
implementers do not result in interoperability issues, there is no apparent 
need for normative IETF guidance. As a result, the TCPM consensus is to update 
and replace the informational RFC 2140 by an informational document. 

A small number of TCPM contributors has performed comprehensive reviews of the 
document, both before and during WGLC. Given the informational status, parts of 
the working group may not care much about the content of the document. 
Nonetheless, the shepherd believes that there is strong consensus in the TCPM 
working group to publish the main body of the document as informational RFC, as 
it contains valuable information on how to efficiently implement TCP.

A notable exception is appendix C, which is based on text from an expired 
individual Internet-Draft (draft-touch-tcpm-automatic-iw), for which there is 
no known implementation at the time of publication. During and after WGLC, some 
TCPM contributors expressed concerns about appendix C and in particular about 
its length. While everybody agrees that it makes sense to discuss sharing of 
the TCP initial window in this document, small parts of the TCPM working group 
believe that a link to the expired draft and some summary discussion would be 
sufficient instead of a full specification of the algorithm. Some improvements 
in the appendix were made to address these WGLC comments, but the authors 
prefer to keep a full description of an algorithm in appendix C instead of a 
summary only. All in all, this discussion was between a small number of TCPM 
contributors only. The vast majority in the TCPM working group stays silent on 
that question.

The TCPM consensus whether to include a full description of an example 
algorithm in appendix C is rough, and, as a result, appendix C has no strong 
backing inside the TCPM working group. Nonetheless, the example in appendix C 
is only a minor part of the overall document.

Document Quality

TCP control block interdependence is widely deployed, and this memo attempts to 
update the Informational RFC to reflect modern practices.

Personnel

The document shepherd is Michael Scharf .

The responsible Area Director is Martin Duke .


___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce


RFC 9006 on TCP Usage Guidance in the Internet of Things (IoT)

2021-03-27 Thread rfc-editor
A new Request for Comments is now available in online RFC libraries.


RFC 9006

Title:  TCP Usage Guidance in the Internet of Things (IoT) 
Author: C. Gomez,
J. Crowcroft,
M. Scharf
Status: Informational
Stream: IETF
Date:   March 2021
Mailbox:carle...@entel.upc.edu,
jon.crowcr...@cl.cam.ac.uk,
michael.sch...@hs-esslingen.de
Pages:  24
Updates/Obsoletes/SeeAlso:   None

I-D Tag:draft-ietf-lwig-tcp-constrained-node-networks-13.txt

URL:https://www.rfc-editor.org/info/rfc9006

DOI:10.17487/RFC9006

This document provides guidance on how to implement and use the
Transmission Control Protocol (TCP) in Constrained-Node Networks
(CNNs), which are a characteristic of the Internet of Things (IoT).
Such environments require a lightweight TCP implementation and may
not make use of optional functionality. This document explains a
number of known and deployed techniques to simplify a TCP stack as
well as corresponding trade-offs. The objective is to help embedded
developers with decisions on which TCP features to use.

This document is a product of the Light-Weight Implementation Guidance Working 
Group of the IETF.


INFORMATIONAL: This memo provides information for the Internet community.
It does not specify an Internet standard of any kind. Distribution of
this memo is unlimited.

This announcement is sent to the IETF-Announce and rfc-dist lists.
To subscribe or unsubscribe, see
  https://www.ietf.org/mailman/listinfo/ietf-announce
  https://mailman.rfc-editor.org/mailman/listinfo/rfc-dist

For searching the RFC series, see https://www.rfc-editor.org/search
For downloading RFCs, see https://www.rfc-editor.org/retrieve/bulk

Requests for special distribution should be addressed to either the
author of the RFC in question, or to rfc-edi...@rfc-editor.org.  Unless
specifically noted otherwise on the RFC itself, all RFCs are for
unlimited distribution.


The RFC Editor Team
Association Management Solutions, LLC

___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce


RFC 8985 on The RACK-TLP Loss Detection Algorithm for TCP

2021-02-20 Thread rfc-editor
A new Request for Comments is now available in online RFC libraries.


RFC 8985

Title:  The RACK-TLP Loss Detection Algorithm 
for TCP 
Author: Y. Cheng,
N. Cardwell,
N. Dukkipati,
P. Jha
Status: Standards Track
Stream: IETF
Date:   February 2021
Mailbox:ych...@google.com,
ncardw...@google.com,
nandi...@google.com,
priyar...@google.com
Pages:  29
Updates/Obsoletes/SeeAlso:   None

I-D Tag:draft-ietf-tcpm-rack-15.txt

URL:https://www.rfc-editor.org/info/rfc8985

DOI:10.17487/RFC8985

This document presents the RACK-TLP loss detection algorithm for TCP.
RACK-TLP uses per-segment transmit timestamps and selective
acknowledgments (SACKs) and has two parts. Recent Acknowledgment
(RACK) starts fast recovery quickly using time-based inferences
derived from acknowledgment (ACK) feedback, and Tail Loss Probe (TLP)
leverages RACK and sends a probe packet to trigger ACK feedback to
avoid retransmission timeout (RTO) events. Compared to the widely
used duplicate acknowledgment (DupAck) threshold approach, RACK-TLP
detects losses more efficiently when there are application-limited
flights of data, lost retransmissions, or data packet reordering
events. It is intended to be an alternative to the DupAck threshold
approach.

This document is a product of the TCP Maintenance and Minor Extensions Working 
Group of the IETF.

This is now a Proposed Standard.

STANDARDS TRACK: This document specifies an Internet Standards Track
protocol for the Internet community, and requests discussion and suggestions
for improvements.  Please refer to the current edition of the Official
Internet Protocol Standards (https://www.rfc-editor.org/standards) for the 
standardization state and status of this protocol.  Distribution of this 
memo is unlimited.

This announcement is sent to the IETF-Announce and rfc-dist lists.
To subscribe or unsubscribe, see
  https://www.ietf.org/mailman/listinfo/ietf-announce
  https://mailman.rfc-editor.org/mailman/listinfo/rfc-dist

For searching the RFC series, see https://www.rfc-editor.org/search
For downloading RFCs, see https://www.rfc-editor.org/retrieve/bulk

Requests for special distribution should be addressed to either the
author of the RFC in question, or to rfc-edi...@rfc-editor.org.  Unless
specifically noted otherwise on the RFC itself, all RFCs are for
unlimited distribution.


The RFC Editor Team
Association Management Solutions, LLC


___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce


Protocol Action: 'Delay-Tolerant Networking TCP Convergence Layer Protocol Version 4' to Proposed Standard (draft-ietf-dtn-tcpclv4-26.txt)

2021-02-17 Thread The IESG
The IESG has approved the following document:
- 'Delay-Tolerant Networking TCP Convergence Layer Protocol Version 4'
  (draft-ietf-dtn-tcpclv4-26.txt) as Proposed Standard

This document is the product of the Delay/Disruption Tolerant Networking
Working Group.

The IESG contact persons are Martin Duke and Magnus Westerlund.

A URL of this Internet Draft is:
https://datatracker.ietf.org/doc/draft-ietf-dtn-tcpclv4/





Technical Summary

This document describes the Delay-Tolerant Networking TCP Convergence Layer 
Protocol Version 4 (TCPCLv4) for use with the Bundle Protocol Version 7 (BPv7) 
[I-D.ietf-dtn-bpbis]. 

The BPv7 implements a store-and-forward overlay network suitable for 
delay-tolerant message exchange. The protocol data unit for the BPv7 is the 
"bundle". BPv7 agents require convergence layer adapters (CLAs) to send and 
receive "bundles" using the service of some "native" link, network, or 
Internet protocol. Both the BPv7 and its CLAs reside at the application layer 
of the Internet model protocol stack [RFC1122]. 

The TCPCLv4 describes a CLA that sends and received bundles using the 
well-known 
Transmission Control Protocol (TCP). This specification describes the format 
and 
processing of the protocol data units passed between entities participating in 
TCPCLv4 communications.  


Working Group Summary:

TCPCLv4 is descended from an experimental IRTF specification TCPCLv3 [RFC7242]. 
Implementation experience with TCPCLv3 identified limitations such as ambiguity 
in bundle acknowledgment and refusal, non-normative discussion on how to 
incorporate TLS, and minor inefficiencies associated with sequencing. TCPCLv4 
was created to address those limitations and prepare the specification for 
non-experimental use. Technical discussions over the last 3 years have been
well informed and focused on TLS negotiations, overall protocol agent state 
machines, and a protocol extension mechanism. There is no controversy related 
to the adoption of the specification; DTNWG consensus on the draft is strong. 

Document Quality:

The workflow for TCPCLv4 remained largely unchanged from that of TCPCLv3 for 
which reference implementations exist. Co-author B. Sipos has created a 
reference implementation of TCPCLv4 to demonstrate features and ensure the 
clarity of the draft. Much of the recent review provided by the DTNWG focused 
on increasing the overall clarity of the specification to ensure no ambiguities 
exist for implementers. There have been no problems discovered with the 
reference implementation for this draft. 

Personnel:

The Document Shepherd is Ed Birrane.

The Responsible Area Director is Magnus Westerlund.


___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce


Last Call: (TCP Control Block Interdependence) to Informational RFC

2021-02-08 Thread The IESG


The IESG has received a request from the TCP Maintenance and Minor Extensions
WG (tcpm) to consider the following document: - 'TCP Control Block
Interdependence'
   as Informational RFC

The IESG plans to make a decision in the next few weeks, and solicits final
comments on this action. Please send substantive comments to the
last-c...@ietf.org mailing lists by 2021-02-22. Exceptionally, comments may
be sent to i...@ietf.org instead. In either case, please retain the beginning
of the Subject line to allow automated sorting.

Abstract


   This memo provides guidance to TCP implementers that are intended to
   help improve convergence to steady-state operation without affecting
   interoperability. It updates and replaces RFC 2140's description of
   interdependent TCP control blocks and the ways that part of TCP
   state can be shared among similar concurrent or consecutive
   connections. TCP state includes a combination of parameters, such as
   connection state, current round-trip time estimates, congestion
   control information, and process information. Most of this state is
   maintained on a per-connection basis in the TCP Control Block (TCB),
   but implementations can (and do) share certain TCB information
   across connections to the same host. Such sharing is intended to
   improve overall transient transport performance, while maintaining
   backward-compatibility with existing implementations. The sharing
   described herein is limited to only the TCB initialization and so
   has no effect on the long-term behavior of TCP after a connection
   has been established.




The file can be obtained via
https://datatracker.ietf.org/doc/draft-ietf-tcpm-2140bis/



No IPR declarations have been submitted directly on this I-D.





___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce


Document Action: 'TCP Usage Guidance in the Internet of Things (IoT)' to Informational RFC (draft-ietf-lwig-tcp-constrained-node-networks-13.txt)

2021-01-26 Thread The IESG
The IESG has approved the following document:
- 'TCP Usage Guidance in the Internet of Things (IoT)'
  (draft-ietf-lwig-tcp-constrained-node-networks-13.txt) as Informational RFC

This document is the product of the Light-Weight Implementation Guidance
Working Group.

The IESG contact persons are Erik Kline and Éric Vyncke.

A URL of this Internet Draft is:
https://datatracker.ietf.org/doc/draft-ietf-lwig-tcp-constrained-node-networks/




Technical Summary

   This document provides guidance on how to implement and use the
   Transmission Control Protocol (TCP) in Constrained-Node Networks
   (CNNs, defined in RFC7228), which are a characterstic of the Internet of 
Things (IoT).
   Such environments require a lightweight TCP implementation and may
   not make use of optional functionality.  This document explains a
   number of known and deployed techniques to simplify a TCP stack as
   well as corresponding tradeoffs.  The objective is to help embedded
   developers with decisions on which TCP features to use.

Working Group Summary

   Nothing noteworthy.

Document Quality

   This document is not a protocol specification, and it intends to  provide 
guidance
   on how to implement and configure TCP stack, as well as on how TCP is 
advisable
   to be used by applications. This document has been reviewed thoroughly by the
   experts in both LWIG and TCPM working groups during the WGLC.  Markku Kojo,
   a long-time IETF transport expert, has provided a thorough review.  Many 
others
   provided comments which have been reflected in the current version of this 
draft.  

Personnel

   Shepherd: Zhen Cao
   Responsible AD: Erik Kline


___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce


Protocol Action: 'The RACK-TLP loss detection algorithm for TCP' to Proposed Standard (draft-ietf-tcpm-rack-15.txt)

2020-12-22 Thread The IESG
The IESG has approved the following document:
- 'The RACK-TLP loss detection algorithm for TCP'
  (draft-ietf-tcpm-rack-15.txt) as Proposed Standard

This document is the product of the TCP Maintenance and Minor Extensions
Working Group.

The IESG contact persons are Martin Duke and Magnus Westerlund.

A URL of this Internet Draft is:
https://datatracker.ietf.org/doc/draft-ietf-tcpm-rack/





Technical Summary

   This document presents the RACK-TLP loss detection algorithm for TCP.
   RACK-TLP uses per-segment transmit timestamps and selective
   acknowledgements (SACK) and has two parts: RACK ("Recent
   ACKnowledgment") starts fast recovery quickly using time-based
   inferences derived from ACK feedback.  TLP ("Tail Loss Probe")
   leverages RACK and sends a probe packet to trigger ACK feedback to
   avoid retransmission timeout (RTO) events.  Compared to the widely
   used DUPACK threshold approach, RACK-TLP detects losses more
   efficiently when there are application-limited flights of data, lost
   retransmissions, or data packet reordering events.  It is intended to
   be an alternative to the DUPACK threshold approach.

Working Group Summary

  The general approach was uncontroversial. As the algorithm is quite
  intricate, there were many comments to clarify the text and the
  pseudocode.

Document Quality

The core mechanisms described in the document are implemented in FreeBSD, 
Linux, and Windows. They are in active use on these platforms. RACK can also be 
used by other transport protocols. QUIC loss recovery uses the same ideas and 
there exists also an implementation for SCTP within a simulation environment.

Personnel

   The document shepherd is Michael Tüxen. The Responsible AD is Martin Duke


___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce


Last Call: (Delay-Tolerant Networking TCP Convergence Layer Protocol Version 4) to Proposed Standard

2020-12-17 Thread The IESG


The IESG has received a request from the Delay/Disruption Tolerant Networking
WG (dtn) to consider the following document: - 'Delay-Tolerant Networking TCP
Convergence Layer Protocol Version 4'
   as Proposed Standard

This is a second IETF last call due to extensive changes since previous IETF 
last call.

The IESG plans to make a decision in the next few weeks, and solicits final
comments on this action. Please send substantive comments to the
last-c...@ietf.org mailing lists by 2021-01-18. Exceptionally, comments may
be sent to i...@ietf.org instead. In either case, please retain the beginning
of the Subject line to allow automated sorting.

Abstract


   This document describes a TCP-based convergence layer (TCPCL) for
   Delay-Tolerant Networking (DTN).  This version of the TCPCL protocol
   resolves implementation issues in the earlier TCPCL Version 3 of
   RFC7242 and updates to the Bundle Protocol (BP) contents, encodings,
   and convergence layer requirements in BP Version 7.  Specifically,
   the TCPCLv4 uses CBOR-encoded BPv7 bundles as its service data unit
   being transported and provides a reliable transport of such bundles.
   This version of TCPCL also includes security and extensibility
   mechanisms.




The file can be obtained via
https://datatracker.ietf.org/doc/draft-ietf-dtn-tcpclv4/



No IPR declarations have been submitted directly on this I-D.





___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce


Last Call: (The RACK-TLP loss detection algorithm for TCP) to Proposed Standard

2020-11-16 Thread The IESG


The IESG has received a request from the TCP Maintenance and Minor Extensions
WG (tcpm) to consider the following document: - 'The RACK-TLP loss detection
algorithm for TCP'
   as Proposed Standard

The IESG plans to make a decision in the next few weeks, and solicits final
comments on this action. Please send substantive comments to the
last-c...@ietf.org mailing lists by 2020-11-30. Exceptionally, comments may
be sent to i...@ietf.org instead. In either case, please retain the beginning
of the Subject line to allow automated sorting.

Abstract


   This document presents the RACK-TLP loss detection algorithm for TCP.
   RACK-TLP uses per-segment transmit timestamps and selective
   acknowledgements (SACK) and has two parts: RACK ("Recent
   ACKnowledgment") starts fast recovery quickly using time-based
   inferences derived from ACK feedback.  TLP ("Tail Loss Probe")
   leverages RACK and sends a probe packet to trigger ACK feedback to
   avoid retransmission timeout (RTO) events.  Compared to the widely
   used DUPACK threshold approach, RACK-TLP detects losses more
   efficiently when there are application-limited flights of data, lost
   retransmissions, or data packet reordering events.  It is intended to
   be an alternative to the DUPACK threshold approach.




The file can be obtained via
https://datatracker.ietf.org/doc/draft-ietf-tcpm-rack/



No IPR declarations have been submitted directly on this I-D.





___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce


Last Call: (TCP Usage Guidance in the Internet of Things (IoT)) to Informational RFC

2020-09-16 Thread The IESG


The IESG has received a request from the Light-Weight Implementation Guidance
WG (lwig) to consider the following document: - 'TCP Usage Guidance in the
Internet of Things (IoT)'
   as Informational RFC

The IESG plans to make a decision in the next few weeks, and solicits final
comments on this action. Please send substantive comments to the
last-c...@ietf.org mailing lists by 2020-09-30. Exceptionally, comments may
be sent to i...@ietf.org instead. In either case, please retain the beginning
of the Subject line to allow automated sorting.

Abstract


   This document provides guidance on how to implement and use the
   Transmission Control Protocol (TCP) in Constrained-Node Networks
   (CNNs), which are a characterstic of the Internet of Things (IoT).
   Such environments require a lightweight TCP implementation and may
   not make use of optional functionality.  This document explains a
   number of known and deployed techniques to simplify a TCP stack as
   well as corresponding tradeoffs.  The objective is to help embedded
   developers with decisions on which TCP features to use.




The file can be obtained via
https://datatracker.ietf.org/doc/draft-ietf-lwig-tcp-constrained-node-networks/



No IPR declarations have been submitted directly on this I-D.





___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce


RFC 8803 on 0-RTT TCP Convert Protocol

2020-07-28 Thread rfc-editor
A new Request for Comments is now available in online RFC libraries.


RFC 8803

Title:  0-RTT TCP Convert Protocol 
Author: O. Bonaventure, Ed.,
M. Boucadair, Ed.,
S. Gundavelli,
S. Seo,
B. Hesmans
Status: Experimental
Stream: IETF
Date:   July 2020
Mailbox:olivier.bonavent...@tessares.net, 
mohamed.boucad...@orange.com, 
sgund...@cisco.com,
sh@kt.com, 
benjamin.hesm...@tessares.net
Pages:  47
Updates/Obsoletes/SeeAlso:   None

I-D Tag:draft-ietf-tcpm-converters-19.txt

URL:https://www.rfc-editor.org/info/rfc8803

DOI:10.17487/RFC8803

This document specifies an application proxy, called Transport
Converter, to assist the deployment of TCP extensions such as
Multipath TCP. A Transport Converter may provide conversion service
for one or more TCP extensions. The conversion service is provided by
means of the 0-RTT TCP Convert Protocol (Convert).

This protocol provides 0-RTT (Zero Round-Trip Time) conversion
service since no extra delay is induced by the protocol compared to
connections that are not proxied. Also, the Convert Protocol does not
require any encapsulation (no tunnels whatsoever).

This specification assumes an explicit model, where the Transport
Converter is explicitly configured on hosts. As a sample
applicability use case, this document specifies how the Convert
Protocol applies for Multipath TCP.

This document is a product of the TCP Maintenance and Minor Extensions Working 
Group of the IETF.


EXPERIMENTAL: This memo defines an Experimental Protocol for the
Internet community.  It does not specify an Internet standard of any
kind. Discussion and suggestions for improvement are requested.
Distribution of this memo is unlimited.

This announcement is sent to the IETF-Announce and rfc-dist lists.
To subscribe or unsubscribe, see
  https://www.ietf.org/mailman/listinfo/ietf-announce
  https://mailman.rfc-editor.org/mailman/listinfo/rfc-dist

For searching the RFC series, see https://www.rfc-editor.org/search
For downloading RFCs, see https://www.rfc-editor.org/retrieve/bulk

Requests for special distribution should be addressed to either the
author of the RFC in question, or to rfc-edi...@rfc-editor.org.  Unless
specifically noted otherwise on the RFC itself, all RFCs are for
unlimited distribution.


The RFC Editor Team
Association Management Solutions, LLC

___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce


TCP Maintenance and Minor Extensions (tcpm) WG Virtual Meeting: 2020-04-29

2020-04-14 Thread IESG Secretary
The TCP Maintenance and Minor Extensions (tcpm) Working Group will hold
a virtual interim meeting on 2020-04-29 from 16:00 to 18:30 Europe/Berlin 
(14:00 to 16:30 UTC).

Agenda:
TBD

Information about remote participation:
https://ietf.webex.com/ietf/j.php?MTID=ma838311f033ebe35fefacc0d50658988

___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce


RFC 8684 on TCP Extensions for Multipath Operation with Multiple Addresses

2020-03-30 Thread rfc-editor
A new Request for Comments is now available in online RFC libraries.


RFC 8684

Title:  TCP Extensions for Multipath Operation 
with Multiple Addresses 
Author: A. Ford, 
C. Raiciu,
M. Handley, 
O. Bonaventure,
C. Paasch
Status: Standards Track
Stream: IETF
Date:   March 2020
Mailbox:alan.f...@gmail.com, 
costin.rai...@cs.pub.ro, 
m.hand...@cs.ucl.ac.uk,  
olivier.bonavent...@uclouvain.be, 
cpaa...@apple.com
Pages:  68
Obsoletes:  RFC 6824

I-D Tag:draft-ietf-mptcp-rfc6824bis-18.txt

URL:https://www.rfc-editor.org/info/rfc8684

DOI:10.17487/RFC8684

TCP/IP communication is currently restricted to a single path per
connection, yet multiple paths often exist between peers. The
simultaneous use of these multiple paths for a TCP/IP session would
improve resource usage within the network and thus improve user
experience through higher throughput and improved resilience to
network failure.

Multipath TCP provides the ability to simultaneously use multiple
paths between peers. This document presents a set of extensions to
traditional TCP to support multipath operation. The protocol offers
the same type of service to applications as TCP (i.e., a reliable
bytestream), and it provides the components necessary to establish
and use multiple TCP flows across potentially disjoint paths.

This document specifies v1 of Multipath TCP, obsoleting v0 as
specified in RFC 6824, through clarifications and modifications
primarily driven by deployment experience.

This document is a product of the Multipath TCP Working Group of the IETF.

This is now a Proposed Standard.

STANDARDS TRACK: This document specifies an Internet Standards Track
protocol for the Internet community, and requests discussion and suggestions
for improvements.  Please refer to the current edition of the Official
Internet Protocol Standards (https://www.rfc-editor.org/standards) for the 
standardization state and status of this protocol.  Distribution of this 
memo is unlimited.

This announcement is sent to the IETF-Announce and rfc-dist lists.
To subscribe or unsubscribe, see
  https://www.ietf.org/mailman/listinfo/ietf-announce
  https://mailman.rfc-editor.org/mailman/listinfo/rfc-dist

For searching the RFC series, see https://www.rfc-editor.org/search
For downloading RFCs, see https://www.rfc-editor.org/retrieve/bulk

Requests for special distribution should be addressed to either the
author of the RFC in question, or to rfc-edi...@rfc-editor.org.  Unless
specifically noted otherwise on the RFC itself, all RFCs are for
unlimited distribution.


The RFC Editor Team
Association Management Solutions, LLC

___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce


Document Action: '0-RTT TCP Convert Protocol' to Experimental RFC (draft-ietf-tcpm-converters-19.txt)

2020-03-24 Thread The IESG
The IESG has approved the following document:
- '0-RTT TCP Convert Protocol'
  (draft-ietf-tcpm-converters-19.txt) as Experimental RFC

This document is the product of the TCP Maintenance and Minor Extensions
Working Group.

The IESG contact persons are Mirja Kühlewind and Magnus Westerlund.

A URL of this Internet Draft is:
https://datatracker.ietf.org/doc/draft-ietf-tcpm-converters/





Technical Summary

This document specifies an application proxy, called Transport Converter, to 
assist the deployment of TCP extensions such as Multipath TCP. This proxy is 
designed to avoid inducing extra delay when involved in a network-assisted 
connection (that is, 0-RTT). This specification assumes an explicit model, 
where the proxy is explicitly configured on hosts. The proxy can be installed 
in managed networks by a network operator, for instance to help the deployment 
of Multipath TCP.

Working Group Summary

While Multipath TCP is an important use case, the Convert Protocol can actually 
be used for several TCP extensions. As the protocol is highly related to TCP 
standards and not specific to Multipath TCP, it was decided to home this 
document in the TCPM working group. The TCPM working group requests publication 
as Experimental document because the protocol targets controlled environments 
in which all network attachments are managed by the same administrative entity.

Document Quality

The document has been presented and discussed repeatedly in TCPM and as a 
result the protocol has changed several times. One frequently discussed design 
choice is whether and how to use TCP Fast Open (TFO). Appendix C explains the 
rationale for the final solution. There have also been some discussions whether 
such a proxy is really useful and needed. Some few contributors to the working 
group were not convinced by the MPTCP use case. During WGLC, Philip Eardley 
(chair of the MPTCP WG) has performed a comprehensive review, which was 
subsequently addressed in a number of document updates. The shepherd has 
reviewed the document before WGLC and verified that all WGLC comments are 
addressed. In addition to that, several contributors from vendors and network 
operators have explicitly expressed their support before and during WGLC. It 
has also been mentioned that the protocol is of interest to 3GPP. In TCPM, 
there is very strong but not unanimous support for publication as experimental 
document.

There is at least one known implementation: Tessares has an open-sourced a 
library (https://github.com/Tessares/libconvert) and a closed-source Hybrid 
Access Gateway (HAG) that uses this library directly to act as an MPTCP 
Converter. Korea Telekom (KT) has reported to TCPM the results of a PoC using 
these implementations (see 
https://tessares.pr.co/181810-kt-tessares-successfully-test-5g-low-latency-multi-radio-access-technology-in-a-commercial-5g-network).
 Other vendors have also expressed interest, but there is no publicly known 
second implementation.

Personnel

The document shepherd is Michael Scharf. The responsible Area Director is Mirja 
Kuehlewind.


___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce


WG Action: Conclusion of Multipath TCP (mptcp)

2020-03-17 Thread IESG Secretary
The Multipath TCP (mptcp) WG in the Transport Area has concluded. The 
IESG contact persons are Mirja Kuehlewind and Magnus Westerlund.

The mailing list will remain open.

This group was closed as it fulfilled its charter and milestones in
specifying and revising the MPTCP protocol. Future maintenance or
extension work for MPTCP will be done in the TCP Maintenance and Minor
Extensions (tcpm) working group, see
https://datatracker.ietf.org/group/tcpm/about/

___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce


WG Action: Rechartered TCP Maintenance and Minor Extensions (tcpm)

2020-03-16 Thread The IESG
The TCP Maintenance and Minor Extensions (tcpm) WG in the Transport Area of
the IETF has been rechartered. For additional information, please contact the
Area Directors or the WG Chairs.

TCP Maintenance and Minor Extensions (tcpm)
---
Current status: Active WG

Chairs:
  Yoshifumi Nishida 
  Michael Scharf 
  Michael Tüxen 

Assigned Area Director:
  Mirja Kühlewind 

Transport Area Directors:
  Mirja Kühlewind 
  Magnus Westerlund 

Mailing list:
  Address: t...@ietf.org
  To subscribe: https://www.ietf.org/mailman/listinfo/tcpm
  Archive: https://mailarchive.ietf.org/arch/browse/tcpm/

Group page: https://datatracker.ietf.org/group/tcpm/

Charter: https://datatracker.ietf.org/doc/charter-ietf-tcpm/

TCP is currently the Internet's predominant transport protocol. TCPM
is the working group within the IETF that handles small TCP changes,
i.e., minor extensions to TCP algorithms and protocol mechanisms.
The TCPM WG serves several purposes:

* The WG mostly focuses on maintenance issues (e.g., bug fixes) and
modest changes to the protocol, algorithms, and interfaces that
maintain TCP's utility.

* The WG is a venue for moving current TCP specifications along the
standards track (as community energy is available for such efforts).

* The WG maintains Multipath TCP (MPTCP) and is a home for minor
MPTCP enhancements including updates to the existing multipath
congestion control.

* The focus of the working group is TCP. In cases where small
changes are directly applicable to other transports (e.g., SCTP or
DCCP), the mappings to other transports may be specified alongside
that for TCP, but other significant additions and changes to other
transports are not in scope.

TCPM also provides a venue for standardization of incremental
enhancements of TCP's standard congestion control. In addition,
TCPM may document alternative TCP congestion control algorithms
that are known to be widely deployed, and that are considered
safe for large-scale deployment in the Internet. Changes of algorithms
may require additional review by the IRTF Congestion Control
Research Group (ICCRG). Fundamental changes to TCP or its congestion
control algorithms (e.g., departure from loss-based congestion
control) will be handled by other working groups or will require
rechartering.

TCP's congestion control algorithms are the model followed by
other IETF transports (e.g., SCTP or DCCP), which are standardized in
other working groups, such as the Transport Area WG (tsvwg). In the
past, the IETF has worked on several documents about algorithms that
are specified for multiple protocols (e.g., TCP and SCTP) in the
same document. Which WG shepherds such documents will be determined
on a case-by-case basis. In any case, the TCPM WG will remain in
close contact with other relevant WGs working on these protocols to
ensure openness and stringent review from all angles.

New TCPM milestones that fall within the scope specified within the
charter can be added after consensus on acceptance in the working
group and approval by the responsible Area Director.

Milestones:

  Apr 2020 - Submit document on a time-based fast loss detection algorithm
  for TCP to the IESG for publication as a Proposed Standard RFC

  May 2020 - Submit document on Retransmission Timeout Considerations as Best
  Current Practice RFC

  Jun 2020 - Submit RFC793bis document to the IESG for publication as
  Internet Standard

  Jul 2020 - Submit document on TCP Control Block Interdependence to the IESG
  for publication as Informational RFC

  Aug 2020 - Submit specification of more accurate ECN feedback in TCP to the
  IESG for publication as an Experimental RFC

  Sep 2020 - Submit document on adding Explicit Congestion Notification (ECN)
  to TCP Control Packets to the IESG for publication as Experimental RFC

  Nov 2020 - Submit document on a TCP Extended Data Offset Option to the IESG
  as a Proposed Standard RFC



___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce


Last Call: (0-RTT TCP Convert Protocol) to Experimental RFC

2020-02-14 Thread The IESG


The IESG has received a request from the TCP Maintenance and Minor Extensions
WG (tcpm) to consider the following document: - '0-RTT TCP Convert Protocol'
   as Experimental RFC

The IESG plans to make a decision in the next few weeks, and solicits final
comments on this action. Please send substantive comments to the
last-c...@ietf.org mailing lists by 2020-02-28. Exceptionally, comments may
be sent to i...@ietf.org instead. In either case, please retain the beginning
of the Subject line to allow automated sorting.

Abstract


   This document specifies an application proxy, called Transport
   Converter, to assist the deployment of TCP extensions such as
   Multipath TCP.  A Transport Converter may provide conversion service
   for one or more TCP extensions.  The conversion service is provided
   by means of the TCP Convert Protocol (Convert).

   This protocol provides 0-RTT (Zero Round-Trip Time) conversion
   service since no extra delay is induced by the protocol compared to
   connections that are not proxied.  Also, the Convert Protocol does
   not require any encapsulation (no tunnels, whatsoever).

   This specification assumes an explicit model, where the Transport
   Converter is explicitly configured on hosts.




The file can be obtained via
https://datatracker.ietf.org/doc/draft-ietf-tcpm-converters/

IESG discussion can be tracked via
https://datatracker.ietf.org/doc/draft-ietf-tcpm-converters/ballot/

The following IPR Declarations may be related to this I-D:

   https://datatracker.ietf.org/ipr/3616/





___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce


Last Call: (Delay-Tolerant Networking TCP Convergence Layer Protocol Version 4) to Proposed Standard

2019-10-23 Thread The IESG


The IESG has received a request from the Delay/Disruption Tolerant Networking
WG (dtn) to consider the following document: - 'Delay-Tolerant Networking TCP
Convergence Layer Protocol Version 4'
   as Proposed Standard

The IESG plans to make a decision in the next few weeks, and solicits final
comments on this action. Please send substantive comments to the
last-c...@ietf.org mailing lists by 2019-11-06. Exceptionally, comments may
be sent to i...@ietf.org instead. In either case, please retain the beginning
of the Subject line to allow automated sorting.

Abstract


   This document describes a revised protocol for the TCP-based
   convergence layer (TCPCL) for Delay-Tolerant Networking (DTN).  The
   protocol revision is based on implementation issues in the original
   TCPCL Version 3 of RFC7242 and updates to the Bundle Protocol
   contents, encodings, and convergence layer requirements in Bundle
   Protocol Version 7.  Specifically, the TCPCLv4 uses CBOR-encoded BPv7
   bundles as its service data unit being transported and provides a
   reliable transport of such bundles.  Several new IANA registries are
   defined for TCPCLv4 which define some behaviors inherited from
   TCPCLv3 but with updated encodings and/or semantics.




The file can be obtained via
https://datatracker.ietf.org/doc/draft-ietf-dtn-tcpclv4/

IESG discussion can be tracked via
https://datatracker.ietf.org/doc/draft-ietf-dtn-tcpclv4/ballot/


No IPR declarations have been submitted directly on this I-D.




___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce


Protocol Action: 'TCP Extensions for Multipath Operation with Multiple Addresses' to Proposed Standard (draft-ietf-mptcp-rfc6824bis-18.txt)

2019-07-22 Thread The IESG
The IESG has approved the following document:
- 'TCP Extensions for Multipath Operation with Multiple Addresses'
  (draft-ietf-mptcp-rfc6824bis-18.txt) as Proposed Standard

This document is the product of the Multipath TCP Working Group.

The IESG contact persons are Mirja Kühlewind and Magnus Westerlund.

A URL of this Internet Draft is:
https://datatracker.ietf.org/doc/draft-ietf-mptcp-rfc6824bis/





Technical Summary

   Multipath TCP provides the ability to simultaneously use multiple paths 
between peers.  This document presents a set of extensions to traditional TCP 
to support multipath operation.  The protocol offers the same type of service 
to applications as TCP (i.e., reliable bytestream), and it provides the 
components necessary to establish and use multiple TCP flows across potentially 
disjoint paths. This document specifies v1 of Multipath TCP, obsoleting v0 as 
specified in RFC6824, through clarifications and modifications primarily driven 
by deployment experience. 

Working Group Summary

   After creating the Experimental RFC6824, the primary goal of the MPTCP 
working group has been to create a bis version of the protocol document on the 
Standards track, incorporating experience from (for example) implementations, 
interoperability events, experiments, usage scenarios, protocol corner cases, 
and feedback from TCPM.This process led to several changes, a couple of 
which make RFC6824bis incompatible with RFC6824. Hence this document obsoletes 
RFC6824.  There is WG agreement to move ahead with publishing the document. 

Document Quality

  This document has been reviewed by various people. There is one (non-public) 
implementation and other implementers of RFC6824 have indicated that they will 
implement against the new RFC. The original MPTCP spec has been widely 
implemented and deployed and the Linux implementation is publicly available. 
The bis document has been implemented in Linux, but permission to release this 
code has not been forthcoming. The WG is OK with publishing the RFC at this 
stage rather than waiting further, and vendors /implementers have indicated 
that they will implement against the new RFC. 

Personnel

   Philip Eardley is the Document Shepherd and Mirja Kuehlewind is the 
Responsible Area Director

___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce


WG Action: Conclusion of TCP Increased Security (TCPINC)

2019-06-05 Thread IESG Secretary
The TCP Increased Security (TCPINC) WG in the Transport Area has concluded. The 
IESG contact person is Mirja Kühlewind.

The mailing list will be closed.

With the publication of the two main RFCs the group concluded most of
their charter (actually all of the initial milestones). The only left
milestone on an extended API document was added to the charter later,
in order to separate this part of the on-ongoing work form the
protocol specification itself. However, there is no on-going work on
this milestone right now, and the group is not planning to complete
this document. Therefore the group will close without any further
action on the remaining document.

Closure of the group will also close the mailing list as there has not
been a lot of traffic on the mailing list over the last 1-2 years. As
tcpinc is part of the TCP protocol, any future questions on the
protocol itself or maintenance can be brought to the TCP Maintenance
and Minor Extensions (tcpm) mailing list: t...@ietf.org

WG: https://datatracker.ietf.org/wg/tcpinc/about/
Charter: https://datatracker.ietf.org/doc/charter-ietf-tcpinc/



RFC 8548 on Cryptographic Protection of TCP Streams (tcpcrypt)

2019-05-22 Thread rfc-editor
A new Request for Comments is now available in online RFC libraries.


RFC 8548

Title:  Cryptographic Protection of TCP Streams (tcpcrypt) 
Author: A. Bittau,
D. Giffin,
M. Handley,
D. Mazieres,
Q. Slack,
E. Smith
Status: Experimental
Stream: IETF
Date:   May 2019
Mailbox:bit...@google.com, 
dan...@beech-grove.net, 
m.hand...@cs.ucl.ac.uk,
d...@uun.org, 
s...@sourcegraph.com,
eric.sm...@kestrel.edu
Pages:  32
Characters: 75149
Updates/Obsoletes/SeeAlso:   None

I-D Tag:draft-ietf-tcpinc-tcpcrypt-15.txt

URL:https://www.rfc-editor.org/info/rfc8548

DOI:10.17487/RFC8548

This document specifies "tcpcrypt", a TCP encryption protocol
designed for use in conjunction with the TCP Encryption Negotiation
Option (TCP-ENO).  Tcpcrypt coexists with middleboxes by tolerating
resegmentation, NATs, and other manipulations of the TCP header.  The
protocol is self-contained and specifically tailored to TCP
implementations, which often reside in kernels or other environments
in which large external software dependencies can be undesirable.
Because the size of TCP options is limited, the protocol requires one
additional one-way message latency to perform key exchange before
application data can be transmitted.  However, the extra latency can
be avoided between two hosts that have recently established a
previous tcpcrypt connection.

This document is a product of the TCP Increased Security Working Group of the 
IETF.


EXPERIMENTAL: This memo defines an Experimental Protocol for the
Internet community.  It does not specify an Internet standard of any
kind. Discussion and suggestions for improvement are requested.
Distribution of this memo is unlimited.

This announcement is sent to the IETF-Announce and rfc-dist lists.
To subscribe or unsubscribe, see
  https://www.ietf.org/mailman/listinfo/ietf-announce
  https://mailman.rfc-editor.org/mailman/listinfo/rfc-dist

For searching the RFC series, see https://www.rfc-editor.org/search
For downloading RFCs, see https://www.rfc-editor.org/retrieve/bulk

Requests for special distribution should be addressed to either the
author of the RFC in question, or to rfc-edi...@rfc-editor.org.  Unless
specifically noted otherwise on the RFC itself, all RFCs are for
unlimited distribution.


The RFC Editor Team
Association Management Solutions, LLC




RFC 8547 on TCP-ENO: Encryption Negotiation Option

2019-05-22 Thread rfc-editor
A new Request for Comments is now available in online RFC libraries.


RFC 8547

Title:  TCP-ENO: Encryption Negotiation Option 
Author: A. Bittau,
D. Giffin,
M. Handley,
D. Mazieres,
E. Smith
Status: Experimental
Stream: IETF
Date:   May 2019
Mailbox:bit...@google.com, 
dan...@beech-grove.net, 
m.hand...@cs.ucl.ac.uk,
d...@uun.org, 
eric.sm...@kestrel.edu
Pages:  31
Characters: 72176
Updates/Obsoletes/SeeAlso:   None

I-D Tag:draft-ietf-tcpinc-tcpeno-19.txt

URL:https://www.rfc-editor.org/info/rfc8547

DOI:10.17487/RFC8547

Despite growing adoption of TLS, a significant fraction of TCP
traffic on the Internet remains unencrypted.  The persistence of
unencrypted traffic can be attributed to at least two factors.
First, some legacy protocols lack a signaling mechanism (such as a
STARTTLS command) by which to convey support for encryption, thus
making incremental deployment impossible.  Second, legacy
applications themselves cannot always be upgraded and therefore
require a way to implement encryption transparently entirely within
the transport layer.  The TCP Encryption Negotiation Option (TCP-ENO)
addresses both of these problems through a new TCP option kind
providing out-of-band, fully backward-compatible negotiation of
encryption.

This document is a product of the TCP Increased Security Working Group of the 
IETF.


EXPERIMENTAL: This memo defines an Experimental Protocol for the
Internet community.  It does not specify an Internet standard of any
kind. Discussion and suggestions for improvement are requested.
Distribution of this memo is unlimited.

This announcement is sent to the IETF-Announce and rfc-dist lists.
To subscribe or unsubscribe, see
  https://www.ietf.org/mailman/listinfo/ietf-announce
  https://mailman.rfc-editor.org/mailman/listinfo/rfc-dist

For searching the RFC series, see https://www.rfc-editor.org/search
For downloading RFCs, see https://www.rfc-editor.org/retrieve/bulk

Requests for special distribution should be addressed to either the
author of the RFC in question, or to rfc-edi...@rfc-editor.org.  Unless
specifically noted otherwise on the RFC itself, all RFCs are for
unlimited distribution.


The RFC Editor Team
Association Management Solutions, LLC




Last Call: (TCP Extensions for Multipath Operation with Multiple Addresses) to Proposed Standard

2019-04-12 Thread The IESG


The IESG has received a request from the Multipath TCP WG (mptcp) to consider
the following document: - 'TCP Extensions for Multipath Operation with
Multiple Addresses'
   as Proposed Standard

The IESG plans to make a decision in the next few weeks, and solicits final
comments on this action. Please send substantive comments to the
i...@ietf.org mailing lists by 2019-04-26. Exceptionally, comments may be
sent to i...@ietf.org instead. In either case, please retain the beginning of
the Subject line to allow automated sorting.

Abstract


   TCP/IP communication is currently restricted to a single path per
   connection, yet multiple paths often exist between peers.  The
   simultaneous use of these multiple paths for a TCP/IP session would
   improve resource usage within the network and, thus, improve user
   experience through higher throughput and improved resilience to
   network failure.

   Multipath TCP provides the ability to simultaneously use multiple
   paths between peers.  This document presents a set of extensions to
   traditional TCP to support multipath operation.  The protocol offers
   the same type of service to applications as TCP (i.e., reliable
   bytestream), and it provides the components necessary to establish
   and use multiple TCP flows across potentially disjoint paths.

   This document specifies v1 of Multipath TCP, obsoleting v0 as
   specified in RFC6824, through clarifications and modifications
   primarily driven by deployment experience.




The file can be obtained via
https://datatracker.ietf.org/doc/draft-ietf-mptcp-rfc6824bis/

IESG discussion can be tracked via
https://datatracker.ietf.org/doc/draft-ietf-mptcp-rfc6824bis/ballot/

The following IPR Declarations may be related to this I-D:

   https://datatracker.ietf.org/ipr/1842/
   https://datatracker.ietf.org/ipr/1843/
   https://datatracker.ietf.org/ipr/3242/



The document contains these normative downward references.
See RFC 3967 for additional information: 
rfc6182: Architectural Guidelines for Multipath TCP Development 
(Informational - IETF stream)





Document Action: 'Cryptographic protection of TCP Streams (tcpcrypt)' to Experimental RFC (draft-ietf-tcpinc-tcpcrypt-15.txt)

2019-01-08 Thread The IESG
The IESG has approved the following document:
- 'Cryptographic protection of TCP Streams (tcpcrypt)'
  (draft-ietf-tcpinc-tcpcrypt-15.txt) as Experimental RFC

This document is the product of the TCP Increased Security Working Group.

The IESG contact persons are Mirja Kühlewind and Spencer Dawkins.

A URL of this Internet Draft is:
https://datatracker.ietf.org/doc/draft-ietf-tcpinc-tcpcrypt/





Technical Summary

   This document specifies tcpcrypt, a TCP encryption protocol designed
   for use in conjunction with the TCP Encryption Negotiation Option
   (TCP-ENO).  Tcpcrypt coexists with middleboxes by tolerating 
   resegmentation, NATs, and other manipulations of the TCP header.  
   The protocol is self-contained and specifically tailored to TCP 
   implementations, which often reside in kernels or other environments 
   in which large external software dependencies can be undesirable.  
   Because the size of TCP options is limited, the protocol requires one 
   additional one-way message latency to perform key exchange before 
   application data may be transmitted. However, this cost can be avoided 
   between two hosts that have recently established a previous tcpcrypt 
   connection.

Working Group Summary

   Initially in the wg, there were two competing proposals, the Stanford-led 
   tcpcrypt and a profile of TLS with authentication removed (tcpinc-use-TLS). 
   As both tcpcrypt and tcpinc-use-TLS are independent and fully-realized 
   protocols, this led to an inability to achieve consensus. After the split 
off 
   of tcp-eno, an extension notably to negotiate multiple TCP stream
   encryption protocols, allowing potentially for runtime negotiation of either
   tcpcrypt or tcpinc-use-TLS (or indeed any other future encryption protocol),
   the working group chairs made a call for adoption of both tcpcrypt and 
   tcpinc-use-TLS. ENO enabled this action by making it credible that
   both protocols could be concurrently deployed. However, due to competing 
   demands for the TLS community, including for the editor of the 
tcpinc-use-TLS 
   draft, especially for completion of TLS 1.3 work in early 2016, the 
tcpinc-use-TLS
   scheme was not further maintain (at least up to now). This was discussed in 
the 
   tcpinc WG, and the resulting rough consensus of the WG was that the 
   appropriate course of action was to complete work on tcpcrypt and TCP-ENO 
   as soon as possible, making sure that ENO could eventually support a TLS 
profile.

Document Quality

   There is only one current implementation of tcpcrypt (together with tcpeno), 
   that being the reference implementation by the Stanford team. At least one 
   other implementation effort is in progress. The inability to achieve 
consensus 
   damaged the WG, as parties looking for a solution in this space grew weary 
   of the lack of progress. Many who initially expressed interest in working on 
   independent implementations lost interest and moved on to other work. The 
   WG chairs believe that a reliable implementation distributed as part of a 
major 
   operating system based on this experimental documen is the best  approach to 
   rekindling interest in this project and for encouraging the development of 
   additional interoperating implementations.

Personnel

   The document shepherd is Kyle Rose.
   The responsible AD is Mirja Kühlewind.

IESG Note

  Based on comments received during IETF last cast, the latest version of this 
  document (-08) now recommends a different AEAD algorithm as MIT. There 
  is still some on-going  discussion with the SEC ADs if only one MIT is 
acceptable. 
  There is consensus in the working group to move forward with only one but 
  they are also open for other recommendations as feedback from the IESG 
evaluation.



RFC 8511 on TCP Alternative Backoff with ECN (ABE)

2018-12-18 Thread rfc-editor
A new Request for Comments is now available in online RFC libraries.


RFC 8511

Title:  TCP Alternative Backoff with ECN (ABE) 
Author: N. Khademi,
M. Welzl,
G. Armitage, 
G. Fairhurst
Status: Experimental
Stream: IETF
Date:   December 2018
Mailbox:nae...@ifi.uio.no, 
mich...@ifi.uio.no, 
garmit...@netflix.com, 
go...@erg.abdn.ac.uk
Pages:  12
Characters: 27408
Updates/Obsoletes/SeeAlso:   None

I-D Tag:draft-ietf-tcpm-alternativebackoff-ecn-12.txt

URL:https://www.rfc-editor.org/info/rfc8511

DOI:10.17487/RFC8511

Active Queue Management (AQM) mechanisms allow for burst tolerance
while enforcing short queues to minimise the time that packets spend
enqueued at a bottleneck.  This can cause noticeable performance
degradation for TCP connections traversing such a bottleneck,
especially if there are only a few flows or their bandwidth-delay
product (BDP) is large.  The reception of a Congestion Experienced
(CE) Explicit Congestion Notification (ECN) mark indicates that an
AQM mechanism is used at the bottleneck, and the bottleneck network
queue is therefore likely to be short.  Feedback of this signal
allows the TCP sender-side ECN reaction in congestion avoidance to
reduce the Congestion Window (cwnd) by a smaller amount than the
congestion control algorithm's reaction to inferred packet loss.
Therefore, this specification defines an experimental change to the
TCP reaction specified in RFC 3168, as permitted by RFC 8311.

This document is a product of the TCP Maintenance and Minor Extensions Working 
Group of the IETF.


EXPERIMENTAL: This memo defines an Experimental Protocol for the
Internet community.  It does not specify an Internet standard of any
kind. Discussion and suggestions for improvement are requested.
Distribution of this memo is unlimited.

This announcement is sent to the IETF-Announce and rfc-dist lists.
To subscribe or unsubscribe, see
  https://www.ietf.org/mailman/listinfo/ietf-announce
  https://mailman.rfc-editor.org/mailman/listinfo/rfc-dist

For searching the RFC series, see https://www.rfc-editor.org/search
For downloading RFCs, see https://www.rfc-editor.org/retrieve/bulk

Requests for special distribution should be addressed to either the
author of the RFC in question, or to rfc-edi...@rfc-editor.org.  Unless
specifically noted otherwise on the RFC itself, all RFCs are for
unlimited distribution.


The RFC Editor Team
Association Management Solutions, LLC




Document Action: 'TCP Alternative Backoff with ECN (ABE)' to Experimental RFC (draft-ietf-tcpm-alternativebackoff-ecn-12.txt)

2018-11-04 Thread The IESG
The IESG has approved the following document:
- 'TCP Alternative Backoff with ECN (ABE)'
  (draft-ietf-tcpm-alternativebackoff-ecn-12.txt) as Experimental RFC

This document is the product of the TCP Maintenance and Minor Extensions
Working Group.

The IESG contact persons are Mirja Kühlewind and Spencer Dawkins.

A URL of this Internet Draft is:
https://datatracker.ietf.org/doc/draft-ietf-tcpm-alternativebackoff-ecn/





Technical Summary

   The recently published RFC 8311 (Relaxing Restrictions on Explicit 
Congestion Notification (ECN) Experimentation) allows a TCP sender to react to 
an ECN signal in a different way than to a inferred loss signal if the 
behaviour is documented in an experimental RFC. This document describes such an 
experiment in which the reduction of the congestion window in response to an 
ECN signal is smaller than in response to an inferred packet loss. Therefore 
the TCPM working group requests publication as an experimental document.

Working Group Summary

   Was there anything in the WG process that is worth noting?
   For example, was there controversy about particular points 
   or were there decisions where the consensus was
   particularly rough? 

Document Quality

   The document has been discussed several times in working group meetings 
without any major controversy. There were also no substantial problems reported 
during the working group last call and it is implemented for FreeBSD (the code 
has been committed to the FreeBSD code base). The risk of running this 
experiment is relatively low, since the reaction to a loss is not changed. 
There is very strong consensus in the TCPM working group that this document 
should be published.

Personnel

   The document shepherd is Michael Tüxen . The 
responsible Area Director is Mirja Kühlewind .



Last Call: (TCP Alternative Backoff with ECN (ABE)) to Experimental RFC

2018-08-14 Thread The IESG


The IESG has received a request from the TCP Maintenance and Minor Extensions
WG (tcpm) to consider the following document: - 'TCP Alternative Backoff with
ECN (ABE)'
   as Experimental RFC

The IESG plans to make a decision in the next few weeks, and solicits final
comments on this action. Please send substantive comments to the
i...@ietf.org mailing lists by 2018-08-28. Exceptionally, comments may be
sent to i...@ietf.org instead. In either case, please retain the beginning of
the Subject line to allow automated sorting.

Abstract


   Active Queue Management (AQM) mechanisms allow for burst tolerance
   while enforcing short queues to minimise the time that packets spend
   enqueued at a bottleneck.  This can cause noticeable performance
   degradation for TCP connections traversing such a bottleneck,
   especially if there are only a few flows or their bandwidth-delay-
   product is large.  The reception of a Congestion Experienced (CE) ECN
   mark indicates that an AQM mechanism is used at the bottleneck, and
   therefore the bottleneck network queue is likely to be short.
   Feedback of this signal allows the TCP sender-side ECN reaction in
   congestion avoidance to reduce the Congestion Window (cwnd) by a
   smaller amount than the congestion control algorithm's reaction to
   inferred packet loss.  This specification therefore defines an
   experimental change to the TCP reaction specified in RFC3168, as
   permitted by RFC 8311.




The file can be obtained via
https://datatracker.ietf.org/doc/draft-ietf-tcpm-alternativebackoff-ecn/

IESG discussion can be tracked via
https://datatracker.ietf.org/doc/draft-ietf-tcpm-alternativebackoff-ecn/ballot/


No IPR declarations have been submitted directly on this I-D.






RFC 8323 on CoAP (Constrained Application Protocol) over TCP, TLS, and WebSockets

2018-02-14 Thread rfc-editor
A new Request for Comments is now available in online RFC libraries.


RFC 8323

Title:  CoAP (Constrained Application Protocol) over 
TCP, TLS, and WebSockets 
Author: C. Bormann, 
S. Lemay,
H. Tschofenig,
K. Hartke,
B. Silverajan,
B. Raymor, Ed.
Status: Standards Track
Stream: IETF
Date:   February 2018
Mailbox:c...@tzi.org, 
sle...@zebra.com, 
hannes.tschofe...@gmx.net,
har...@tzi.org, 
bilhanan.silvera...@tut.fi,
brianray...@hotmail.com
Pages:  54
Characters: 110771
Updates:RFC 7641, RFC 7959

I-D Tag:draft-ietf-core-coap-tcp-tls-11.txt

URL:https://www.rfc-editor.org/info/rfc8323

DOI:10.17487/RFC8323

The Constrained Application Protocol (CoAP), although inspired by
HTTP, was designed to use UDP instead of TCP.  The message layer of
CoAP over UDP includes support for reliable delivery, simple
congestion control, and flow control.

Some environments benefit from the availability of CoAP carried over
reliable transports such as TCP or Transport Layer Security (TLS).
This document outlines the changes required to use CoAP over TCP,
TLS, and WebSockets transports.  It also formally updates RFC 7641
for use with these transports and RFC 7959 to enable the use of
larger messages over a reliable transport.

This document is a product of the Constrained RESTful Environments Working 
Group of the IETF.

This is now a Proposed Standard.

STANDARDS TRACK: This document specifies an Internet Standards Track
protocol for the Internet community, and requests discussion and suggestions
for improvements.  Please refer to the current edition of the Official
Internet Protocol Standards (https://www.rfc-editor.org/standards) for the 
standardization state and status of this protocol.  Distribution of this 
memo is unlimited.

This announcement is sent to the IETF-Announce and rfc-dist lists.
To subscribe or unsubscribe, see
  https://www.ietf.org/mailman/listinfo/ietf-announce
  https://mailman.rfc-editor.org/mailman/listinfo/rfc-dist

For searching the RFC series, see https://www.rfc-editor.org/search
For downloading RFCs, see https://www.rfc-editor.org/retrieve/bulk

Requests for special distribution should be addressed to either the
author of the RFC in question, or to rfc-edi...@rfc-editor.org.  Unless
specifically noted otherwise on the RFC itself, all RFCs are for
unlimited distribution.


The RFC Editor Team
Association Management Solutions, LLC




Protocol Action: 'CoAP (Constrained Application Protocol) over TCP, TLS, and WebSockets' to Proposed Standard (draft-ietf-core-coap-tcp-tls-11.txt)

2017-12-18 Thread The IESG
The IESG has approved the following document:
- 'CoAP (Constrained Application Protocol) over TCP, TLS, and WebSockets'
  (draft-ietf-core-coap-tcp-tls-11.txt) as Proposed Standard

This document is the product of the Constrained RESTful Environments Working
Group.

The IESG contact persons are Adam Roach, Alexey Melnikov and Ben Campbell.

A URL of this Internet Draft is:
https://datatracker.ietf.org/doc/draft-ietf-core-coap-tcp-tls/




Technical Summary

   The Constrained Application Protocol (CoAP), although inspired by
   HTTP, was designed to use UDP instead of TCP.  The message layer of
   the CoAP over UDP protocol includes support for reliable delivery,
   simple congestion control, and flow control.

   Some environments benefit from the availability of CoAP carried over
   reliable transports such as TCP or TLS.  This document outlines the
   changes required to use CoAP over TCP, TLS, and WebSockets
   transports.  It also formally updates RFC 7641 for use with these
   transports and RFC 7959 to enable the use of larger messages over a
   reliable transport.

Working Group Summary

   The document has gone through multiple expert reviews over
   the years and was last presented on multiple IETF sessions.

   The discussion on whether the document should use coaps+ws://
   versa coap+wss:// URI scheme was rather protracted, but the WG
   finally came to a conclusion.

   The decision to allocate several new URI schemes for different
   underlying transports has caused some controversy, but was finally
   settled after a discussion with IESG and URI experts.

Document Quality

   Several vendors are interested in implementing the specification.

Personnel

   Document Shepherd: Jaime Jiménez <jaime.jime...@ericsson.com>
   Responsible Area Director: Alexey Melnikov 



RFC 8257 on Data Center TCP (DCTCP): TCP Congestion Control for Data Centers

2017-10-17 Thread rfc-editor
A new Request for Comments is now available in online RFC libraries.


RFC 8257

Title:  Data Center TCP (DCTCP): TCP Congestion Control
for Data Centers 
Author: S. Bensley,
D. Thaler,
P. Balasubramanian,
L. Eggert,
G. Judd
Status: Informational
Stream: IETF
Date:   October 2017
Mailbox:sb...@microsoft.com, 
dtha...@microsoft.com, 
pr...@microsoft.com,
l...@netapp.com, 
glenn.j...@morganstanley.com
Pages:  17
Characters: 37357
Updates/Obsoletes/SeeAlso:   None

I-D Tag:draft-ietf-tcpm-dctcp-10.txt

URL:https://www.rfc-editor.org/info/rfc8257

DOI:10.17487/RFC8257

This Informational RFC describes Data Center TCP (DCTCP): a TCP
congestion control scheme for data-center traffic.  DCTCP extends the
Explicit Congestion Notification (ECN) processing to estimate the
fraction of bytes that encounter congestion rather than simply
detecting that some congestion has occurred.  DCTCP then scales the
TCP congestion window based on this estimate.  This method achieves
high-burst tolerance, low latency, and high throughput with shallow-
buffered switches.  This memo also discusses deployment issues
related to the coexistence of DCTCP and conventional TCP, discusses
the lack of a negotiating mechanism between sender and receiver, and
presents some possible mitigations.  This memo documents DCTCP as
currently implemented by several major operating systems.  DCTCP, as
described in this specification, is applicable to deployments in
controlled environments like data centers, but it must not be
deployed over the public Internet without additional measures.

This document is a product of the TCP Maintenance and Minor Extensions Working 
Group of the IETF.


INFORMATIONAL: This memo provides information for the Internet community.
It does not specify an Internet standard of any kind. Distribution of
this memo is unlimited.

This announcement is sent to the IETF-Announce and rfc-dist lists.
To subscribe or unsubscribe, see
  https://www.ietf.org/mailman/listinfo/ietf-announce
  https://mailman.rfc-editor.org/mailman/listinfo/rfc-dist

For searching the RFC series, see https://www.rfc-editor.org/search
For downloading RFCs, see https://www.rfc-editor.org/retrieve/bulk

Requests for special distribution should be addressed to either the
author of the RFC in question, or to rfc-edi...@rfc-editor.org.  Unless
specifically noted otherwise on the RFC itself, all RFCs are for
unlimited distribution.


The RFC Editor Team
Association Management Solutions, LLC



Last Call: (TCP-ENO: Encryption Negotiation Option) to Experimental RFC

2017-10-05 Thread The IESG

The IESG has received a request from the TCP Increased Security WG (tcpinc)
to consider the following document: - 'TCP-ENO: Encryption Negotiation Option'
   as Experimental RFC

The IESG plans to make a decision in the next few weeks, and solicits final
comments on this action. Please send substantive comments to the
i...@ietf.org mailing lists by 2017-10-19. Exceptionally, comments may be
sent to i...@ietf.org instead. In either case, please retain the beginning of
the Subject line to allow automated sorting.

Abstract


   Despite growing adoption of TLS, a significant fraction of TCP
   traffic on the Internet remains unencrypted.  The persistence of
   unencrypted traffic can be attributed to at least two factors.
   First, some legacy protocols lack a signaling mechanism (such as a
   "STARTTLS" command) by which to convey support for encryption, making
   incremental deployment impossible.  Second, legacy applications
   themselves cannot always be upgraded, requiring a way to implement
   encryption transparently entirely within the transport layer.  The
   TCP Encryption Negotiation Option (TCP-ENO) addresses both of these
   problems through a new TCP option kind providing out-of-band, fully
   backward-compatible negotiation of encryption.




The file can be obtained via
https://datatracker.ietf.org/doc/draft-ietf-tcpinc-tcpeno/

IESG discussion can be tracked via
https://datatracker.ietf.org/doc/draft-ietf-tcpinc-tcpeno/ballot/


No IPR declarations have been submitted directly on this I-D.






Last Call: (Cryptographic protection of TCP Streams (tcpcrypt)) to Experimental RFC

2017-10-05 Thread The IESG

The IESG has received a request from the TCP Increased Security WG (tcpinc)
to consider the following document: - 'Cryptographic protection of TCP
Streams (tcpcrypt)'
   as Experimental RFC

The IESG plans to make a decision in the next few weeks, and solicits final
comments on this action. Please send substantive comments to the
i...@ietf.org mailing lists by 2017-10-19. Exceptionally, comments may be
sent to i...@ietf.org instead. In either case, please retain the beginning of
the Subject line to allow automated sorting.

Abstract


   This document specifies tcpcrypt, a TCP encryption protocol designed
   for use in conjunction with the TCP Encryption Negotiation Option
   (TCP-ENO).  Tcpcrypt coexists with middleboxes by tolerating
   resegmentation, NATs, and other manipulations of the TCP header.  The
   protocol is self-contained and specifically tailored to TCP
   implementations, which often reside in kernels or other environments
   in which large external software dependencies can be undesirable.
   Because the size of TCP options is limited, the protocol requires one
   additional one-way message latency to perform key exchange before
   application data may be transmitted.  However, this cost can be
   avoided between two hosts that have recently established a previous
   tcpcrypt connection.




The file can be obtained via
https://datatracker.ietf.org/doc/draft-ietf-tcpinc-tcpcrypt/

IESG discussion can be tracked via
https://datatracker.ietf.org/doc/draft-ietf-tcpinc-tcpcrypt/ballot/


No IPR declarations have been submitted directly on this I-D.






Document Action: 'Datacenter TCP (DCTCP): TCP Congestion Control for Datacenters' to Informational RFC (draft-ietf-tcpm-dctcp-10.txt)

2017-09-15 Thread The IESG
The IESG has approved the following document:
- 'Datacenter TCP (DCTCP): TCP Congestion Control for Datacenters'
  (draft-ietf-tcpm-dctcp-10.txt) as Informational RFC

This document is the product of the TCP Maintenance and Minor Extensions
Working Group.

The IESG contact persons are Mirja Kühlewind and Spencer Dawkins.

A URL of this Internet Draft is:
https://datatracker.ietf.org/doc/draft-ietf-tcpm-dctcp/





Technical Summary

   This informational memo describes Datacenter TCP (DCTCP). DCTCP is an 
improvement to TCP congestion control for datacenter traffic that uses Explicit 
Congestion Notification (ECN). DCTCP as described in this draft is applicable 
to deployments in controlled environments like datacenters, but it must not be 
deployed over the public Internet without additional measures. The document is 
published to document an implementation in the Microsoft Windows Server 2012 
operating system. The Linux and FreeBSD operating systems have also implemented 
support for DCTCP.

Working Group Summary

   The TCPM working group has reviewed the document regarding clarity and 
comprehensiveness of the protocol specification, e.g. in corner cases. The 
document has been discussed multiple times in the working group without any 
major controversy. During the working group last call there have been several 
detailed reviews, and those comments have been addressed in the most recent 
version. All in all, there is very strong consensus in the TCPM working group 
that this document should be published. 

Document Quality

   The document describes DCTCP as implemented in Microsoft Windows Server 
2012. Since the publication of the first versions of the document, the Linux 
and FreeBSD operating systems have also implemented support for DCTCP. The 
specification should also enable implementation in other TCP stacks. The 
objective of this informational memo is to document an alternative TCP 
congestion control algorithm that is known to be widely deployed. It is 
consensus in the TCPM working group that a DCTCP standard would require further 
work. A precise documentation of running code enables follow-up experimental or 
standards track RFCs.

Personnel

   The document shepherd is Michael Scharf <michael.sch...@nokia.com>.
   The responsible Area Director is Mirja Kuehlewind <i...@kuehlewind.net>.



RFC 8229 on TCP Encapsulation of IKE and IPsec Packets

2017-08-12 Thread rfc-editor
A new Request for Comments is now available in online RFC libraries.


RFC 8229

Title:  TCP Encapsulation of IKE and 
IPsec Packets 
Author: T. Pauly, 
S. Touati,
R. Mantha
Status: Standards Track
Stream: IETF
Date:   August 2017 
Mailbox:tpa...@apple.com, 
samy.tou...@ericsson.com, 
raman...@cisco.com
Pages:  25
Characters: 56294
Updates/Obsoletes/SeeAlso:   None

I-D Tag:draft-ietf-ipsecme-tcp-encaps-10.txt

URL:https://www.rfc-editor.org/info/rfc8229

DOI:10.17487/RFC8229

This document describes a method to transport Internet Key Exchange
Protocol (IKE) and IPsec packets over a TCP connection for traversing
network middleboxes that may block IKE negotiation over UDP.  This
method, referred to as "TCP encapsulation", involves sending both IKE
packets for Security Association establishment and Encapsulating
Security Payload (ESP) packets over a TCP connection.  This method is
intended to be used as a fallback option when IKE cannot be
negotiated over UDP.

This document is a product of the IP Security Maintenance and Extensions 
Working Group of the IETF.

This is now a Proposed Standard.

STANDARDS TRACK: This document specifies an Internet Standards Track
protocol for the Internet community, and requests discussion and suggestions
for improvements.  Please refer to the current edition of the Official
Internet Protocol Standards (https://www.rfc-editor.org/standards) for the 
standardization state and status of this protocol.  Distribution of this 
memo is unlimited.

This announcement is sent to the IETF-Announce and rfc-dist lists.
To subscribe or unsubscribe, see
  https://www.ietf.org/mailman/listinfo/ietf-announce
  https://mailman.rfc-editor.org/mailman/listinfo/rfc-dist

For searching the RFC series, see https://www.rfc-editor.org/search
For downloading RFCs, see https://www.rfc-editor.org/retrieve/bulk

Requests for special distribution should be addressed to either the
author of the RFC in question, or to rfc-edi...@rfc-editor.org.  Unless
specifically noted otherwise on the RFC itself, all RFCs are for
unlimited distribution.


The RFC Editor Team
Association Management Solutions, LLC




Protocol Action: 'TCP Encapsulation of IKE and IPsec Packets' to Proposed Standard (draft-ietf-ipsecme-tcp-encaps-10.txt)

2017-06-19 Thread The IESG
The IESG has approved the following document:
- 'TCP Encapsulation of IKE and IPsec Packets'
  (draft-ietf-ipsecme-tcp-encaps-10.txt) as Proposed Standard

This document is the product of the IP Security Maintenance and Extensions
Working Group.

The IESG contact persons are Kathleen Moriarty and Eric Rescorla.

A URL of this Internet Draft is:
https://datatracker.ietf.org/doc/draft-ietf-ipsecme-tcp-encaps/





Technical Summary

This document describes a method to transport IKE and IPsec packets over a TCP 
connection for traversing network middleboxes that may block IKE negotiation 
over UDP.  This method, referred to as TCP encapsulation, involves sending both 
IKE packets for Security Association establishment and ESP packets over a TCP 
connection. This method is intended to be used as a fallback option when IKE 
cannot be negotiated over UDP.


Working Group Summary

The draft came to the working group out of a need to standardize a push towards 
adding TCP support for IKE that was coming from several sources (VPN vendors 
and cellular carriers using IKE for telephony services). Some of the major 
changes that the WG made early on compared to existing proposals from external 
bodies was to remove the reliance on encapsulating IKE traffic within TLS. Much 
of the other WG discussion later on in review revolved around how to best 
manage the connection establishment and teardown transitions.
  

Document Quality

There are several early implementations of the protocol that were made to test 
interoperability (notably, Cisco and Apple). The draft also received input from 
vendors that have previously deployed proprietary versions of IPsec over TCP.


Personnel

 The Document Shepherd is Tero Kivinen. The responsible ADs are Kathleen 
Moriarty (with Eric Rescorla taking custody for IESG revies).




Last Call: (TCP Encapsulation of IKE and IPsec Packets) to Proposed Standard

2017-03-28 Thread The IESG

The IESG has received a request from the IP Security Maintenance and
Extensions WG (ipsecme) to consider the following document:
- 'TCP Encapsulation of IKE and IPsec Packets'
   as Proposed Standard

The IESG plans to make a decision in the next few weeks, and solicits
final comments on this action. Please send substantive comments to the
i...@ietf.org mailing lists by 2017-04-18. Exceptionally, comments may be
sent to i...@ietf.org instead. In either case, please retain the
beginning of the Subject line to allow automated sorting.

Abstract


   This document describes a method to transport IKE and IPsec packets
   over a TCP connection for traversing network middleboxes that may
   block IKE negotiation over UDP.  This method, referred to as TCP
   encapsulation, involves sending both IKE packets for Security
   Association establishment and ESP packets over a TCP connection.
   This method is intended to be used as a fallback option when IKE
   cannot be negotiated over UDP.




The file can be obtained via
https://datatracker.ietf.org/doc/draft-ietf-ipsecme-tcp-encaps/

IESG discussion can be tracked via
https://datatracker.ietf.org/doc/draft-ietf-ipsecme-tcp-encaps/ballot/


No IPR declarations have been submitted directly on this I-D.






Last Call: (CoAP (Constrained Application Protocol) over TCP, TLS, and WebSockets) to Proposed Standard

2017-03-26 Thread The IESG

The IESG has received a request from the Constrained RESTful Environments
WG (core) to consider the following document:
- 'CoAP (Constrained Application Protocol) over TCP, TLS, and
WebSockets'
   as Proposed Standard

The IESG plans to make a decision in the next few weeks, and solicits
final comments on this action. Please send substantive comments to the
i...@ietf.org mailing lists by 2017-04-09. Exceptionally, comments may be
sent to i...@ietf.org instead. In either case, please retain the
beginning of the Subject line to allow automated sorting.

Abstract


   The Constrained Application Protocol (CoAP), although inspired by
   HTTP, was designed to use UDP instead of TCP.  The message layer of
   the CoAP over UDP protocol includes support for reliable delivery,
   simple congestion control, and flow control.

   Some environments benefit from the availability of CoAP carried over
   reliable transports such as TCP or TLS.  This document outlines the
   changes required to use CoAP over TCP, TLS, and WebSockets
   transports.  It also formally updates [RFC7641] for use with these
   transports.




The file can be obtained via
https://datatracker.ietf.org/doc/draft-ietf-core-coap-tcp-tls/

IESG discussion can be tracked via
https://datatracker.ietf.org/doc/draft-ietf-core-coap-tcp-tls/ballot/


No IPR declarations have been submitted directly on this I-D.






RFC 8041 on Use Cases and Operational Experience with Multipath TCP

2017-01-12 Thread rfc-editor
A new Request for Comments is now available in online RFC libraries.


RFC 8041

Title:  Use Cases and Operational Experience 
with Multipath TCP 
Author: O. Bonaventure, C. Paasch, G. Detal
Status: Informational
Stream: IETF
Date:   January 2017
Mailbox:olivier.bonavent...@uclouvain.be, 
cpaa...@apple.com, 
gregory.de...@tessares.net
Pages:  30
Characters: 75260
Updates/Obsoletes/SeeAlso:   None

I-D Tag:draft-ietf-mptcp-experience-07.txt

URL:https://www.rfc-editor.org/info/rfc8041

DOI:10.17487/RFC8041

This document discusses both use cases and operational experience
with Multipath TCP (MPTCP) in real networks.  It lists several
prominent use cases where Multipath TCP has been considered and is
being used.  It also gives insight to some heuristics and decisions
that have helped to realize these use cases and suggests possible
improvements.

This document is a product of the Multipath TCP Working Group of the IETF.


INFORMATIONAL: This memo provides information for the Internet community.
It does not specify an Internet standard of any kind. Distribution of
this memo is unlimited.

This announcement is sent to the IETF-Announce and rfc-dist lists.
To subscribe or unsubscribe, see
  https://www.ietf.org/mailman/listinfo/ietf-announce
  https://mailman.rfc-editor.org/mailman/listinfo/rfc-dist

For searching the RFC series, see https://www.rfc-editor.org/search
For downloading RFCs, see https://www.rfc-editor.org/retrieve/bulk

Requests for special distribution should be addressed to either the
author of the RFC in question, or to rfc-edi...@rfc-editor.org.  Unless
specifically noted otherwise on the RFC itself, all RFCs are for
unlimited distribution.


The RFC Editor Team
Association Management Solutions, LLC




Document Action: 'Use Cases and Operational Experience with Multipath TCP' to Informational RFC (draft-ietf-mptcp-experience-07.txt)

2016-10-31 Thread The IESG
The IESG has approved the following document:
- 'Use Cases and Operational Experience with Multipath TCP'
  (draft-ietf-mptcp-experience-07.txt) as Informational RFC

This document is the product of the Multipath TCP Working Group.

The IESG contact persons are Mirja Kühlewind and Spencer Dawkins.

A URL of this Internet Draft is:
https://datatracker.ietf.org/doc/draft-ietf-mptcp-experience/




Technical Summary

   This document discusses both use cases and operational experience with 
Multipath TCP in real world networks.  It lists several prominent use cases for 
which Multipath TCP has been considered and is being used.  It also gives 
insight to some heuristics and decisions that have helped to realize these use 
cases.

Working Group Summary

   The WG consensus is good. 

Document Quality

   The document has been written by several of the people who have implemented 
the MPTCP protocol and who are intimately involved in its deployment. The 
document is very informative. 

Personnel

   The Document Shepherd is Philip Eardley. The Responsible Area Director is 
Mirja Kühlewind.



RFC 7974 on An Experimental TCP Option for Host Identification

2016-10-19 Thread rfc-editor
A new Request for Comments is now available in online RFC libraries.


RFC 7974

Title:  An Experimental TCP Option for 
Host Identification 
Author: B. Williams, M. Boucadair,
D. Wing
Status: Experimental
Stream: Independent
Date:   October 2016
Mailbox:brandon.willi...@akamai.com, 
mohamed.boucad...@orange.com, 
dwing-i...@fuggles.com
Pages:  20
Characters: 48381
Updates/Obsoletes/SeeAlso:   None

I-D Tag:draft-williams-exp-tcp-host-id-opt-08.txt

URL:https://www.rfc-editor.org/info/rfc7974

DOI:http://dx.doi.org/10.17487/RFC7974

Recent RFCs have discussed issues with host identification in IP
address-sharing systems, such as address/prefix-sharing devices and
application-layer proxies.  Potential solutions for revealing a host
identifier in shared address deployments have also been discussed.
This memo describes the design, deployment, and privacy
considerations for one such solution in operational use on the
Internet today that uses a TCP option to transmit a host identifier.


EXPERIMENTAL: This memo defines an Experimental Protocol for the
Internet community.  It does not specify an Internet standard of any
kind. Discussion and suggestions for improvement are requested.
Distribution of this memo is unlimited.

This announcement is sent to the IETF-Announce and rfc-dist lists.
To subscribe or unsubscribe, see
  https://www.ietf.org/mailman/listinfo/ietf-announce
  https://mailman.rfc-editor.org/mailman/listinfo/rfc-dist

For searching the RFC series, see https://www.rfc-editor.org/search
For downloading RFCs, see https://www.rfc-editor.org/retrieve/bulk

Requests for special distribution should be addressed to either the
author of the RFC in question, or to rfc-edi...@rfc-editor.org.  Unless
specifically noted otherwise on the RFC itself, all RFCs are for
unlimited distribution.


The RFC Editor Team
Association Management Solutions, LLC




Last Call: (Use Cases and Operational Experience with Multipath TCP) to Informational RFC

2016-08-30 Thread The IESG

The IESG has received a request from the Multipath TCP WG (mptcp) to
consider the following document:
- 'Use Cases and Operational Experience with Multipath TCP'
   as Informational RFC

The IESG plans to make a decision in the next few weeks, and solicits
final comments on this action. Please send substantive comments to the
i...@ietf.org mailing lists by 2016-09-13. Exceptionally, comments may be
sent to i...@ietf.org instead. In either case, please retain the
beginning of the Subject line to allow automated sorting.

Abstract


   This document discusses both use cases and operational experience
   with Multipath TCP in real world networks.  It lists several
   prominent use cases for which Multipath TCP has been considered and
   is being used.  It also gives insight to some heuristics and
   decisions that have helped to realize these use cases.




The file can be obtained via
https://datatracker.ietf.org/doc/draft-ietf-mptcp-experience/

IESG discussion can be tracked via
https://datatracker.ietf.org/doc/draft-ietf-mptcp-experience/ballot/


No IPR declarations have been submitted directly on this I-D.






RFC 7930 on Larger Packets for RADIUS over TCP

2016-08-17 Thread rfc-editor
A new Request for Comments is now available in online RFC libraries.


RFC 7930

Title:  Larger Packets for RADIUS over TCP 
Author: S. Hartman
Status: Experimental
Stream: IETF
Date:   August 2016
Mailbox:hartmans-i...@mit.edu
Pages:  10
Characters: 22676
Updates:RFC 6613

I-D Tag:draft-ietf-radext-bigger-packets-07.txt

URL:https://www.rfc-editor.org/info/rfc7930

DOI:http://dx.doi.org/10.17487/RFC7930

The RADIUS-over-TLS experiment described in RFC 6614 has opened
RADIUS to new use cases where the 4096-octet maximum size limit of a
RADIUS packet proves problematic.  This specification extends the
RADIUS-over-TCP experiment (RFC 6613) to permit larger RADIUS
packets.  This specification compliments other ongoing work to permit
fragmentation of RADIUS authorization information.  This document
registers a new RADIUS code, an action that required IESG approval.

This document is a product of the RADIUS EXTensions Working Group of the IETF.


EXPERIMENTAL: This memo defines an Experimental Protocol for the
Internet community.  It does not specify an Internet standard of any
kind. Discussion and suggestions for improvement are requested.
Distribution of this memo is unlimited.

This announcement is sent to the IETF-Announce and rfc-dist lists.
To subscribe or unsubscribe, see
  https://www.ietf.org/mailman/listinfo/ietf-announce
  https://mailman.rfc-editor.org/mailman/listinfo/rfc-dist

For searching the RFC series, see https://www.rfc-editor.org/search
For downloading RFCs, see https://www.rfc-editor.org/retrieve/bulk

Requests for special distribution should be addressed to either the
author of the RFC in question, or to rfc-edi...@rfc-editor.org.  Unless
specifically noted otherwise on the RFC itself, all RFCs are for
unlimited distribution.


The RFC Editor Team
Association Management Solutions, LLC




Document Action: TCP and UDP with Bigger Addresses (TUBA), A Simple Proposal for Internet Addressing and Routing to Historic

2016-05-24 Thread The IESG
The IESG has approved changing the status of the following document:
- TCP and UDP with Bigger Addresses (TUBA), A Simple Proposal for
Internet Addressing and Routing
  (rfc1347) to Historic

This document action is documented at:
https://datatracker.ietf.org/doc/status-change-ip-versions-5-8-9-to-historic/

A URL of the affected document is:
https://datatracker.ietf.org/doc/rfc1347/

Status Change Details:

A variety of alternative architectures have been proposed as the
successor to IPv4. Many of these proposals have been published as RFCs
and allocated IP version numbers by IANA. This status change formally
moves RFC 1347, RFC 1819, RFC 1621,and RFC 1622 to Historic status.

As a part of this status change, IANA is directed to change IP version
numbers 5, 8, and 9 to Reserved in the IP Version Numbers registry
(http://www.iana.org/assignments/version-numbers/version-numbers.xhtml)
and add this status-change document to their references. Additionally,
version number 7 is to be marked Reserved and its reference updated to
include RFC 6814.

Personnel 

   Suresh Krishnan is the responsible Area Director.





Document Action: 'Larger Packets for RADIUS over TCP' to Experimental RFC (draft-ietf-radext-bigger-packets-07.txt)

2016-05-23 Thread The IESG
The IESG has approved the following document:
- 'Larger Packets for RADIUS over TCP'
  (draft-ietf-radext-bigger-packets-07.txt) as Experimental RFC

This document is the product of the RADIUS EXTensions Working Group.

The IESG contact persons are Stephen Farrell, Benoit Claise and Joel
Jaeggli.

A URL of this Internet Draft is:
https://datatracker.ietf.org/doc/draft-ietf-radext-bigger-packets/





Technical Summary:

The Remote Authentication Dial-In User Service (RADIUS) protocol is limited to 
a total
packet size of 4096 octets. The RADIUS over TLS experiment described in RFC 
6614 has
opened RADIUS to new use cases where the 4096-octet maximum size limit of 
RADIUS packets
proves problematic. This specification extends the RADIUS over TCP experiment 
(RFC 6613)
to permit larger RADIUS packets.  This specification compliments other ongoing 
work to
permit fragmentation of RADIUS authorization information.  This document 
registers a new
RADIUS code, an action which requires IESG approval.

Working Group Summary:

The document advanced through the working group stage smoothly. The amount of 
review it
got was not overwhelming, but enough people participated to make it a solid and 
credible
review and consensus overall.

Document Quality:

The document was reviewed by key contributors of the radext working group. It 
has not undergone an
external review yet. There should be a review of the new Protocol-Error packet 
type during
the IETF Last Call and IESG evaluation, since the allocation of a new packet 
type requires
IESG approval.
At least one vendor (FreeRADIUS) has indicated an interest to implement this 
specification.

Personnel:

The Document Shepherd is Stefan Winter <stefan.win...@restena.lu>. The 
responsible Area
Director is Kathleen Moriarty (kathleen.moriarty.i...@gmail.com); currently 
Stephen Farrell
(stephen.farr...@cs.tcd.ie).



RFC 7786 on TCP Modifications for Congestion Exposure (ConEx)

2016-05-13 Thread rfc-editor
A new Request for Comments is now available in online RFC libraries.


RFC 7786

Title:  TCP Modifications for Congestion Exposure 
(ConEx) 
Author: M. Kuehlewind, Ed.,
R. Scheffenegger
Status: Experimental
Stream: IETF
Date:   May 2016
Mailbox:mirja.kuehlew...@tik.ee.ethz.ch, 
rs.i...@gmx.at
Pages:  20
Characters: 48439
Updates/Obsoletes/SeeAlso:   None

I-D Tag:draft-ietf-conex-tcp-modifications-10.txt

URL:https://www.rfc-editor.org/info/rfc7786

DOI:http://dx.doi.org/10.17487/RFC7786

Congestion Exposure (ConEx) is a mechanism by which senders inform
the network about expected congestion based on congestion feedback
from previous packets in the same flow.  This document describes the
necessary modifications to use ConEx with the Transmission Control
Protocol (TCP).

This document is a product of the Congestion Exposure Working Group of the IETF.


EXPERIMENTAL: This memo defines an Experimental Protocol for the
Internet community.  It does not specify an Internet standard of any
kind. Discussion and suggestions for improvement are requested.
Distribution of this memo is unlimited.

This announcement is sent to the IETF-Announce and rfc-dist lists.
To subscribe or unsubscribe, see
  https://www.ietf.org/mailman/listinfo/ietf-announce
  https://mailman.rfc-editor.org/mailman/listinfo/rfc-dist

For searching the RFC series, see https://www.rfc-editor.org/search
For downloading RFCs, see https://www.rfc-editor.org/retrieve/bulk

Requests for special distribution should be addressed to either the
author of the RFC in question, or to rfc-edi...@rfc-editor.org.  Unless
specifically noted otherwise on the RFC itself, all RFCs are for
unlimited distribution.


The RFC Editor Team
Association Management Solutions, LLC




RFC 7850 on Registering Values of the SDP 'proto' Field for Transporting RTP Media over TCP under Various RTP Profiles

2016-04-29 Thread rfc-editor
A new Request for Comments is now available in online RFC libraries.


RFC 7850

Title:  Registering Values of the SDP 
'proto' Field for Transporting RTP Media 
over TCP under Various RTP Profiles 
Author: S. Nandakumar
Status: Standards Track
Stream: IETF
Date:   April 2016
Mailbox:snand...@cisco.com
Pages:  7
Characters: 15190
Updates/Obsoletes/SeeAlso:   None

I-D Tag:draft-ietf-mmusic-proto-iana-registration-06.txt

URL:https://www.rfc-editor.org/info/rfc7850

DOI:http://dx.doi.org/10.17487/RFC7850

The Real-time Transport Protocol (RTP) specification establishes a
registry of profile names for use by higher-level control protocols,
such as the Session Description Protocol (SDP), to refer to the
transport methods.  This specification describes the following new
SDP transport protocol identifiers for transporting RTP Media over
TCP: 'TCP/RTP/AVPF', 'TCP/RTP/SAVP', 'TCP/RTP/SAVPF',
'TCP/DTLS/RTP/SAVP', 'TCP/DTLS/RTP/SAVPF', 'TCP/TLS/RTP/AVP', and
'TCP/TLS/RTP/AVPF'.

This document is a product of the Multiparty Multimedia Session Control Working 
Group of the IETF.

This is now a Proposed Standard.

STANDARDS TRACK: This document specifies an Internet Standards Track
protocol for the Internet community, and requests discussion and suggestions
for improvements.  Please refer to the current edition of the Official
Internet Protocol Standards (https://www.rfc-editor.org/standards) for the 
standardization state and status of this protocol.  Distribution of this 
memo is unlimited.

This announcement is sent to the IETF-Announce and rfc-dist lists.
To subscribe or unsubscribe, see
  https://www.ietf.org/mailman/listinfo/ietf-announce
  https://mailman.rfc-editor.org/mailman/listinfo/rfc-dist

For searching the RFC series, see https://www.rfc-editor.org/search
For downloading RFCs, see https://www.rfc-editor.org/retrieve/bulk

Requests for special distribution should be addressed to either the
author of the RFC in question, or to rfc-edi...@rfc-editor.org.  Unless
specifically noted otherwise on the RFC itself, all RFCs are for
unlimited distribution.


The RFC Editor Team
Association Management Solutions, LLC




RFC 7805 on Moving Outdated TCP Extensions and TCP-Related Documents to Historic or Informational Status

2016-04-07 Thread rfc-editor
A new Request for Comments is now available in online RFC libraries.


RFC 7805

Title:  Moving Outdated TCP Extensions and 
TCP-Related Documents to Historic or 
Informational Status 
Author: A. Zimmermann, W. Eddy, L. Eggert
Status: Informational
Stream: IETF
Date:   April 2016
Mailbox:alexan...@zimmermann.eu.com, 
w...@mti-systems.com, 
l...@netapp.com
Pages:  8
Characters: 15754
Obsoletes:  RFC 675, RFC 721, RFC 761, RFC 813, RFC 816, 
RFC 879, RFC 896, RFC 1078, RFC 6013
Updates:RFC 7414

I-D Tag:draft-ietf-tcpm-undeployed-03.txt

URL:https://www.rfc-editor.org/info/rfc7805

DOI:http://dx.doi.org/10.17487/RFC7805

This document reclassifies several TCP extensions and TCP-related
documents that either have been superseded, have never seen
widespread use, or are no longer recommended for use to "Historic"
status.  The affected documents are RFCs 675, 721, 761, 813, 816,
879, 896, 1078, and 6013.  Additionally, this document reclassifies
RFCs 700, 794, 814, 817, 872, 889, 964, and 1071 to "Informational"
status.

This document is a product of the TCP Maintenance and Minor Extensions Working 
Group of the IETF.


INFORMATIONAL: This memo provides information for the Internet community.
It does not specify an Internet standard of any kind. Distribution of
this memo is unlimited.

This announcement is sent to the IETF-Announce and rfc-dist lists.
To subscribe or unsubscribe, see
  https://www.ietf.org/mailman/listinfo/ietf-announce
  https://mailman.rfc-editor.org/mailman/listinfo/rfc-dist

For searching the RFC series, see https://www.rfc-editor.org/search
For downloading RFCs, see https://www.rfc-editor.org/retrieve/bulk

Requests for special distribution should be addressed to either the
author of the RFC in question, or to rfc-edi...@rfc-editor.org.  Unless
specifically noted otherwise on the RFC itself, all RFCs are for
unlimited distribution.


The RFC Editor Team
Association Management Solutions, LLC




RFC 7828 on The edns-tcp-keepalive EDNS0 Option

2016-04-06 Thread rfc-editor
A new Request for Comments is now available in online RFC libraries.


RFC 7828

Title:  The edns-tcp-keepalive EDNS0 Option 
Author: P. Wouters, 
J. Abley,
S. Dickinson, 
R. Bellis
Status: Standards Track
Stream: IETF
Date:   April 2016
Mailbox:pwout...@redhat.com, 
jab...@dyn.com, 
s...@sinodun.com,  
r...@isc.org
Pages:  11
Characters: 24282
Updates/Obsoletes/SeeAlso:   None

I-D Tag:draft-ietf-dnsop-edns-tcp-keepalive-06.txt

URL:https://www.rfc-editor.org/info/rfc7828

DOI:http://dx.doi.org/10.17487/RFC7828

DNS messages between clients and servers may be received over 
either UDP or TCP.  UDP transport involves keeping less state 
on a busy server, but can cause truncation and retries over 
TCP.  Additionally, UDP can be exploited for reflection attacks.  
Using TCP would reduce retransmits and amplification.  However, 
clients commonly use TCP only for retries and servers typically 
use idle timeouts on the order of seconds.

This document defines an EDNS0 option ("edns-tcp-keepalive") 
that allows DNS servers to signal a variable idle timeout.  
This signalling encourages the use of long-lived TCP connections 
by allowing the state associated with TCP transport to be managed
effectively with minimal impact on the DNS transaction time.


This document is a product of the Domain Name System Operations 
Working Group of the IETF.

This is now a Proposed Standard.

STANDARDS TRACK: This document specifies an Internet Standards Track
protocol for the Internet community, and requests discussion and suggestions
for improvements.  Please refer to the current edition of the Official
Internet Protocol Standards (https://www.rfc-editor.org/standards) for the 
standardization state and status of this protocol.  Distribution of this 
memo is unlimited.

This announcement is sent to the IETF-Announce and rfc-dist lists.
To subscribe or unsubscribe, see
  https://www.ietf.org/mailman/listinfo/ietf-announce
  https://mailman.rfc-editor.org/mailman/listinfo/rfc-dist

For searching the RFC series, see https://www.rfc-editor.org/search
For downloading RFCs, see https://www.rfc-editor.org/retrieve/bulk

Requests for special distribution should be addressed to either the
author of the RFC in question, or to rfc-edi...@rfc-editor.org.  Unless
specifically noted otherwise on the RFC itself, all RFCs are for
unlimited distribution.


The RFC Editor Team
Association Management Solutions, LLC




Protocol Action: 'IANA registrations of SDP 'proto' attribute for transporting RTP Media over TCP under various RTP profiles.' to Proposed Standard (draft-ietf-mmusic-proto-iana-registration-06.txt)

2016-03-21 Thread The IESG
The IESG has approved the following document:
- 'IANA registrations of SDP 'proto' attribute for transporting RTP Media
   over TCP under various RTP profiles.'
  (draft-ietf-mmusic-proto-iana-registration-06.txt) as Proposed Standard

This document is the product of the Multiparty Multimedia Session Control
Working Group.

The IESG contact persons are Barry Leiba, Ben Campbell and Alissa Cooper.

A URL of this Internet Draft is:
https://datatracker.ietf.org/doc/draft-ietf-mmusic-proto-iana-registration/





Technical Summary

The Real-time Transport Protocol (RTP) specification establishes a registry of 
profile names for use by higher-level control protocols, 
such as the Session Description Protocol (SDP), to refer to the transport 
methods.  This specification describes the following new SDP 
transport protocol identifiers for transporting RTP Media over TCP: 
'TCP/RTP/AVPF', 'TCP/RTP/SAVP', 'TCP/RTP/SAVPF', 
'TCP/DTLS/RTP/SAVP', 'TCP/DTLS/RTP/SAVPF', 'TCP/TLS/RTP/AVP', 
'TCP/TLS/RTP/AVPF'.

Working Group Summary

   There was nothing worth noting in the working group process.

Document Quality

Flemming Andreasen, Bo Burman and Cullen Jennings reviewed the document and 
found no issues.

Personnel

The Document Shepherd is Bo Burman.
The Responsible AD is Ben Campbell.




Last Call: (Larger Packets for RADIUS over TCP) to Experimental RFC

2016-03-09 Thread The IESG

The IESG has received a request from the RADIUS EXTensions WG (radext) to
consider the following document:
- 'Larger Packets for RADIUS over TCP'
   as Experimental RFC

The IESG plans to make a decision in the next few weeks, and solicits
final comments on this action. Please send substantive comments to the
i...@ietf.org mailing lists by 2016-03-23. Exceptionally, comments may be
sent to i...@ietf.org instead. In either case, please retain the
beginning of the Subject line to allow automated sorting.

Abstract


   The RADIUS over TLS experiment described in RFC 6614 has opened
   RADIUS to new use cases where the 4096-octet maximum size limit of
   RADIUS packet proves problematic.  This specification extends the
   RADIUS over TCP experiment (RFC 6613) to permit larger RADIUS
   packets.  This specification compliments other ongoing work to permit
   fragmentation of RADIUS authorization information.  This document
   registers a new RADIUS code, an action which requires IESG approval.




The file can be obtained via
https://datatracker.ietf.org/doc/draft-ietf-radext-bigger-packets/

IESG discussion can be tracked via
https://datatracker.ietf.org/doc/draft-ietf-radext-bigger-packets/ballot/


No IPR declarations have been submitted directly on this I-D.




Last Call: (IANA registrations of SDP 'proto' attribute for transporting RTP Media over TCP under various RTP profiles.) to Proposed Standard

2016-02-12 Thread The IESG

The IESG has received a request from the Multiparty Multimedia Session
Control WG (mmusic) to consider the following document:
- 'IANA registrations of SDP 'proto' attribute for transporting RTP Media
   over TCP under various RTP profiles.'
   as Proposed Standard

The IESG plans to make a decision in the next few weeks, and solicits
final comments on this action. Please send substantive comments to the
i...@ietf.org mailing lists by 2016-02-26. Exceptionally, comments may be
sent to i...@ietf.org instead. In either case, please retain the
beginning of the Subject line to allow automated sorting.

Abstract


   The Real-time Transport Protocol (RTP) specification establishes a
   registry of profile names for use by higher-level control protocols,
   such as the Session Description Protocol (SDP), to refer to the
   transport methods.  This specification describes the following new
   SDP transport protocol identifiers for transporting RTP Media over
   TCP: 'TCP/RTP/AVPF', 'TCP/RTP/SAVP', 'TCP/RTP/SAVPF', 'TCP/DTLS/RTP/
   SAVP', 'TCP/DTLS/RTP/SAVPF', 'TCP/TLS/RTP/AVP', 'TCP/TLS/RTP/AVPF'.




The file can be obtained via
https://datatracker.ietf.org/doc/draft-ietf-mmusic-proto-iana-registration/

IESG discussion can be tracked via
https://datatracker.ietf.org/doc/draft-ietf-mmusic-proto-iana-registration/ballot/


No IPR declarations have been submitted directly on this I-D.




RFC 7765 on TCP and Stream Control Transmission Protocol (SCTP) RTO Restart

2016-02-11 Thread rfc-editor
A new Request for Comments is now available in online RFC libraries.


RFC 7765

Title:  TCP and Stream Control Transmission 
Protocol (SCTP) RTO Restart 
Author: P. Hurtig, A. Brunstrom,
A. Petlund, M. Welzl
Status: Experimental
Stream: IETF
Date:   February 2016
Mailbox:per.hur...@kau.se, 
anna.brunst...@kau.se, 
apetl...@simula.no,
mich...@ifi.uio.no
Pages:  15
Characters: 35361
Updates/Obsoletes/SeeAlso:   None

I-D Tag:draft-ietf-tcpm-rtorestart-10.txt

URL:https://www.rfc-editor.org/info/rfc7765

DOI:http://dx.doi.org/10.17487/RFC7765

This document describes a modified sender-side algorithm for managing
the TCP and Stream Control Transmission Protocol (SCTP)
retransmission timers that provides faster loss recovery when there
is a small amount of outstanding data for a connection.  The
modification, RTO Restart (RTOR), allows the transport to restart its
retransmission timer using a smaller timeout duration, so that the
effective retransmission timeout (RTO) becomes more aggressive in
situations where fast retransmit cannot be used.  This enables faster
loss detection and recovery for connections that are short lived or
application limited.

This document is a product of the TCP Maintenance and Minor Extensions Working 
Group of the IETF.


EXPERIMENTAL: This memo defines an Experimental Protocol for the
Internet community.  It does not specify an Internet standard of any
kind. Discussion and suggestions for improvement are requested.
Distribution of this memo is unlimited.

This announcement is sent to the IETF-Announce and rfc-dist lists.
To subscribe or unsubscribe, see
  https://www.ietf.org/mailman/listinfo/ietf-announce
  https://mailman.rfc-editor.org/mailman/listinfo/rfc-dist

For searching the RFC series, see https://www.rfc-editor.org/search
For downloading RFCs, see https://www.rfc-editor.org/retrieve/bulk

Requests for special distribution should be addressed to either the
author of the RFC in question, or to rfc-edi...@rfc-editor.org.  Unless
specifically noted otherwise on the RFC itself, all RFCs are for
unlimited distribution.


The RFC Editor Team
Association Management Solutions, LLC



Results of IETF-conflict review for draft-williams-exp-tcp-host-id-opt-07

2016-01-25 Thread The IESG
The IESG has completed a review of draft-williams-exp-tcp-host-id-opt-07
consistent with RFC5742.


The IESG recommends that 'Experimental Option for TCP Host
Identification'  NOT be
published as an Experimental RFC.


The IESG has concluded that this document violates IETF procedures about
pervasive monitoring (RFC 7258) and should therefore not be published
without IETF review and IESG approval. This work is related to IETF work
done in the INTAREA WG.

The IESG would also like the Independent Submissions Editor to review the
comments in the datatracker related to this document and determine
whether or not they merit incorporation into the document. Comments may
exist in both the ballot and the history log.

The IESG review is documented at:
https://datatracker.ietf.org/doc/conflict-review-williams-exp-tcp-host-id-opt/

A URL of the reviewed Internet Draft is:
https://datatracker.ietf.org/doc/draft-williams-exp-tcp-host-id-opt/

The process for such documents is described at
https://www.rfc-editor.org/indsubs.html 

Thank you,

The IESG Secretary





Document Action: 'Moving Outdated TCP Extensions and TCP-related Documents to Historic and Informational Status' to Informational RFC (draft-ietf-tcpm-undeployed-03.txt)

2016-01-25 Thread The IESG
The IESG has approved the following document:
- 'Moving Outdated TCP Extensions and TCP-related Documents to Historic
   and Informational Status'
  (draft-ietf-tcpm-undeployed-03.txt) as Informational RFC

This document is the product of the TCP Maintenance and Minor Extensions
Working Group.

The IESG contact persons are Spencer Dawkins and Martin Stiemerling.

A URL of this Internet Draft is:
https://datatracker.ietf.org/doc/draft-ietf-tcpm-undeployed/





Technical Summary

   This document reclassifies several TCP extensions and TCP-related
   documents that have either been superseded, have never seen
   widespread use, or are no longer recommended for use to "Historic"
   status.  The affected RFCs are RFC 675, RFC 721, RFC 761, RFC 813,
   RFC 816, RFC 879, RFC 896, RFC 1078, and RFC 6013.  Additionally,
   this document reclassifies RFC 700, RFC 794, RFC 814, RFC 817, RFC
   872, RFC 889, RFC 964, and RFC 1071 to "Informational" status.


Working Group Summary

The inclusion of the TCPMUX document (RFC 1078) raised some discussion
earlier, because implementations of TCPMUX have been reported in some OS
distributions, although it is not in use to our knowledge. There was
consensus in the TCPM WG that because of the operational and
security concerns in TCPMUX, it should also be declared Historic.

Document Quality

  Document was reviewed by multiple TCPM WG participants. Given its 
  administrative nature, there has been no controversy over it, and it
  is generally supported by the TCPM community.

Personnel

Document shepherd is Pasi Sarolahti. Responsible Area Director is
Martin Stiemerling.



Protocol Action: 'DNS Transport over TCP - Implementation Requirements' to Proposed Standard (draft-ietf-dnsop-5966bis-06.txt)

2016-01-15 Thread The IESG
The IESG has approved the following document:
- 'DNS Transport over TCP - Implementation Requirements'
  (draft-ietf-dnsop-5966bis-06.txt) as Proposed Standard

This document is the product of the Domain Name System Operations Working
Group.

The IESG contact persons are Benoit Claise and Joel Jaeggli.

A URL of this Internet Draft is:
https://datatracker.ietf.org/doc/draft-ietf-dnsop-5966bis/




Technical Summary

The document specifies the requirements for support TCP as a transport 
protocol for DNS. It also provides guidelines on optimizing performance 
of DNS over TCP.

This document obsoletes RFC 5966.

Working Group Summary

This document was actively discussed and reviewed, partially because 
this is a revision of an older RFC, but also as more DNS falls back to 
TCP (DNSSEC) and the need for DNS to support the DNS-over-TLS work in 
DPRIVE working group.  The community feels updating the older RFC is 
well needed. This also include the initial author of RFC5966.

The document had a broad discussion as the wording of several points 
were more accurately described. Once these issues were resolved, 
consensus was strong with no complaints.

Personnel

Document Shepherd:   Tim Wicinski
Area Director:   Joel Jaggeli



Last Call: (DNS Transport over TCP - Implementation Requirements) to Internet Standard

2015-11-23 Thread The IESG

The IESG has received a request from the Domain Name System Operations WG
(dnsop) to consider the following document:
- 'DNS Transport over TCP - Implementation Requirements'
   as Internet Standard

The IESG plans to make a decision in the next few weeks, and solicits
final comments on this action. Please send substantive comments to the
i...@ietf.org mailing lists by 2015-12-07. Exceptionally, comments may be
sent to i...@ietf.org instead. In either case, please retain the
beginning of the Subject line to allow automated sorting.

Abstract


   This document specifies the requirement for support of TCP as a
   transport protocol for DNS implementations and provides guidelines
   towards DNS-over-TCP performance on par with that of DNS-over-UDP.
   This document obsoletes RFC5966.




The file can be obtained via
https://datatracker.ietf.org/doc/draft-ietf-dnsop-5966bis/

IESG discussion can be tracked via
https://datatracker.ietf.org/doc/draft-ietf-dnsop-5966bis/ballot/


No IPR declarations have been submitted directly on this I-D.




Document Action: 'TCP and SCTP RTO Restart' to Experimental RFC (draft-ietf-tcpm-rtorestart-10.txt)

2015-11-19 Thread The IESG
The IESG has approved the following document:
- 'TCP and SCTP RTO Restart'
  (draft-ietf-tcpm-rtorestart-10.txt) as Experimental RFC

This document is the product of the TCP Maintenance and Minor Extensions
Working Group.

The IESG contact persons are Spencer Dawkins and Martin Stiemerling.

A URL of this Internet Draft is:
https://datatracker.ietf.org/doc/draft-ietf-tcpm-rtorestart/





Technical Summary

This document describes a modified sender-side algorithm for managing 
the TCP and SCTP retransmission timers that provides faster loss 
recovery when there is a small amount of outstanding data for a 
connection.  The modification, RTO Restart (RTOR), allows the transport 
to restart its retransmission timer so that the effective RTO becomes 
more aggressive in situations where fast retransmit cannot be used.  
This enables faster loss detection and recovery for connections that are 
short-lived or application-limited.

Working Group Summary

It is the consensus of the TCPM working group to document this 
alternative algorithm, given the potential performance benefit. The work 
has mostly been driven by the authors, but the document has been 
reviewed in detail by several experts and the content has been modified 
accordingly. Performance experiments in simulations and testbeds have 
been performed and published by the authors and the experimental results 
have been reviewed in several TCPM meetings. At the time of writing, 
there is only limited deployment experience. 

Two issues have been discussed extensively in the working group. First, 
any reduction of the retransmission timeout duration inherently comes 
along with a risk of negative impact on TCP performance, e.g. in mobile 
networks with highly variable RTT. The current understanding is that 
this risk is low and that the algorithm is conservative and relatively 
robust, but further experimentation has to confirm this. Second, the 
Linux operation system uses the "Tail Loss Probe" method discussed in 
Section 6, which is similar but more complex. This method was not 
adopted in TCPM since it depends on FACK error recovery method, which 
has not been standardizes so far.

Document Quality

This document was also last called in TSVWG, since it specifies an 
algorithm that can be applied both to TCP and SCTP. As a result of WGLC 
comments the applicability to SCTP has been better explained, including 
the SCTP API. One issue is that TCP and SCTP use slightly different 
terminology for comparable concepts. In order to keep the document 
simple, it was decided not to add another, duplicated description of the 
algorithm using SCTP terminology.

Personnel

The document shepherd is Michael Scharf <michael.scharf@alcatel-
lucent.com>. The responsible Area Director is Martin Stiemerling 
<mls.i...@gmail.com>.



Last Call: (The edns-tcp-keepalive EDNS0 Option) to Proposed Standard

2015-11-16 Thread The IESG

The IESG has received a request from the Domain Name System Operations WG
(dnsop) to consider the following document:
- 'The edns-tcp-keepalive EDNS0 Option'
   as Proposed Standard

The IESG plans to make a decision in the next few weeks, and solicits
final comments on this action. Please send substantive comments to the
i...@ietf.org mailing lists by 2015-11-30. Exceptionally, comments may be
sent to i...@ietf.org instead. In either case, please retain the
beginning of the Subject line to allow automated sorting.

Abstract


   DNS messages between clients and servers may be received over either
   UDP or TCP.  UDP transport involves keeping less state on a busy
   server, but can cause truncation and retries over TCP.  Additionally,
   UDP can be exploited for reflection attacks.  Using TCP would reduce
   retransmits and amplification.  However, clients commonly use TCP
   only for fallback and servers typically use idle timeouts on the
   order of seconds.

   This document defines an EDNS0 option ("edns-tcp-keepalive") that
   allows DNS servers to signal a variable idle timeout.  This
   signalling facilitates a better balance of UDP and TCP transport
   between individual clients and servers, reducing the impact of
   problems associated with UDP transport and allowing the state
   associated with TCP transport to be managed effectively with minimal
   impact on the DNS transaction time.




The file can be obtained via
https://datatracker.ietf.org/doc/draft-ietf-dnsop-edns-tcp-keepalive/

IESG discussion can be tracked via
https://datatracker.ietf.org/doc/draft-ietf-dnsop-edns-tcp-keepalive/ballot/


No IPR declarations have been submitted directly on this I-D.




Last Call: (TCP and SCTP RTO Restart) to Experimental RFC

2015-09-24 Thread The IESG

The IESG has received a request from the TCP Maintenance and Minor
Extensions WG (tcpm) to consider the following document:
- 'TCP and SCTP RTO Restart'
   as Experimental RFC

The IESG plans to make a decision in the next few weeks, and solicits
final comments on this action. Please send substantive comments to the
i...@ietf.org mailing lists by 2015-10-08. Exceptionally, comments may be
sent to i...@ietf.org instead. In either case, please retain the
beginning of the Subject line to allow automated sorting.

Abstract


   This document describes a modified sender-side algorithm for managing
   the TCP and SCTP retransmission timers that provides faster loss
   recovery when there is a small amount of outstanding data for a
   connection.  The modification, RTO Restart (RTOR), allows the
   transport to restart its retransmission timer so that the effective
   RTO becomes more aggressive in situations where fast retransmit
   cannot be used.  This enables faster loss detection and recovery for
   connections that are short-lived or application-limited.




The file can be obtained via
https://datatracker.ietf.org/doc/draft-ietf-tcpm-rtorestart/

IESG discussion can be tracked via
https://datatracker.ietf.org/doc/draft-ietf-tcpm-rtorestart/ballot/


No IPR declarations have been submitted directly on this I-D.




Last Call: draft-ietf-conex-tcp-modifications-09.txt (TCP modifications for Congestion Exposure) to Experimental RFC

2015-08-17 Thread The IESG

The IESG has received a request from the Congestion Exposure WG (conex)
to consider the following document:
- 'TCP modifications for Congestion Exposure'
  draft-ietf-conex-tcp-modifications-09.txt as Experimental RFC

The IESG plans to make a decision in the next few weeks, and solicits
final comments on this action. Please send substantive comments to the
i...@ietf.org mailing lists by 2015-08-31. Exceptionally, comments may be
sent to i...@ietf.org instead. In either case, please retain the
beginning of the Subject line to allow automated sorting.

Abstract


   Congestion Exposure (ConEx) is a mechanism by which senders inform
   the network about expected congestion based on congestion feedback
   from previous packets in the same flow.  This document describes the
   necessary modifications to use ConEx with the Transmission Control
   Protocol (TCP).




The file can be obtained via
https://datatracker.ietf.org/doc/draft-ietf-conex-tcp-modifications/

IESG discussion can be tracked via
https://datatracker.ietf.org/doc/draft-ietf-conex-tcp-modifications/ballot/


The following IPR Declarations may be related to this I-D:

   https://datatracker.ietf.org/ipr/1922/





New Non-WG Mailing List: TCP Prague -- Evolution of DCTCP designed to live alongside other TCP variants and derivatives

2015-07-24 Thread IETF Secretariat
A new IETF non-working group email list has been created.

List address: tcppra...@ietf.org
Archive: https://mailarchive.ietf.org/arch/browse/tcpprague/
To subscribe: https://www.ietf.org/mailman/listinfo/tcpprague

Purpose:

This mailing list is to coordinate parallel implementation and standardisation 
of TCP Prague across platforms. TCP Prague will be an evolution of Data Centre 
TCP (DCTCP) designed to live alongside other TCP variants and derivatives. 
DCTCP has demonstrated how minimal latency could be, but it is only applicable 
in controlled environments such as data centers. This is because the congestion 
control in DCTCP dominates existing variants (Reno, Cubic, etc) and DCTCP 
redefines the meaning of TCP-ECN feedback. The defining features of TCP Prague 
will be: 

o Designed to exploit the full potential of ECN in the network 
o Marking frequency invariant with flow rate.


For additional information, please contact the list administrators.



Document Action: 'Updating TCP to support Rate-Limited Traffic' to Experimental RFC (draft-ietf-tcpm-newcwv-13.txt)

2015-07-23 Thread The IESG
The IESG has approved the following document:
- 'Updating TCP to support Rate-Limited Traffic'
  (draft-ietf-tcpm-newcwv-13.txt) as Experimental RFC

This document is the product of the TCP Maintenance and Minor Extensions
Working Group.

The IESG contact persons are Spencer Dawkins and Martin Stiemerling.

A URL of this Internet Draft is:
https://datatracker.ietf.org/doc/draft-ietf-tcpm-newcwv/




Technical Summary

This document describes an experimental proposal to allow TCP senders
to restart data transfer quickly following an idle or less active period.
This approach is expected to benefit applications that unable to send 
at the maximum rate permitted by the congestion window for some reasons. 
As a result, it aims to provide incentives for long-lived connections and 
to remove ad-hoc tweaks in some applications that try to maintain a large
cwnd for future data transmissions.
The approach can be viewed as an updated version of RFC2861 and it obsoletes
RFC2861.

Working Group Summary

The draft has been discussed for around 4 years. There has been explicit 
support
for the draft since the beginning. Main discussion points were some 
detailed 
mechanisms in the logic that are related to estimating path capacity and 
preserving congestion window size during applications are idle or less 
active. 
The initial intended status of the draft was PS, but it has been changed to 
Experimental as a result of the discussions. 
Linux kernel has the codes which address the same issue. Their algorithms
are slightly different from the document. There had been discussions between
the linux kernel implementers and the document authors; however, they 
haven't
reached the consensus to replace the existing kernel codes until more solid 
evidences are found.
The WG's conclusion is to publish the draft as an experimental and explore 
its efficiency and feasibility of this approach. 

Document Quality

The document has been reviewed and discussed by multiple participants in 
the WG.
Some discussions points raised by reviewers are listed in Section 9.1.
The patches to FreeBSD and Linux kernel have been made by the efforts from 
the 
authors and other group. 

Personnel

Yoshifumi Nishida is the Document Shepherd for this document.
The Responsible Area Director is Martin Stiemerling




Results of IETF-conflict review for draft-williams-exp-tcp-host-id-opt-05

2015-06-01 Thread The IESG
The IESG has completed a review of draft-williams-exp-tcp-host-id-opt-05
consistent with RFC5742.


The IESG recommends that 'Experimental Option for TCP Host
Identification' draft-williams-exp-tcp-host-id-opt-05.txt NOT be
published as an Experimental RFC.


The IESG has concluded that this document violates IETF procedures about
pervasive monitoring (RFC 7258) and should therefore not be published
without IETF review and IESG approval. This work is related to IETF work
done in the INTAREA WG.


The IESG would also like the RFC-Editor to review the comments in the
datatracker related to this document and determine whether or not they
merit incorporation into the document. Comments may exist in both the
ballot and the history log.

The IESG review is documented at:
https://datatracker.ietf.org/doc/conflict-review-williams-exp-tcp-host-id-opt/

A URL of the reviewed Internet Draft is:
https://datatracker.ietf.org/doc/draft-williams-exp-tcp-host-id-opt/

The process for such documents is described at
https://www.rfc-editor.org/indsubs.html 

Thank you,

The IESG Secretary





Last Call: draft-ietf-tcpm-newcwv-10.txt (Updating TCP to support Rate-Limited Traffic) to Experimental RFC

2015-05-08 Thread The IESG

The IESG has received a request from the TCP Maintenance and Minor
Extensions WG (tcpm) to consider the following document:
- 'Updating TCP to support Rate-Limited Traffic'
  draft-ietf-tcpm-newcwv-10.txt as Experimental RFC

The IESG plans to make a decision in the next few weeks, and solicits
final comments on this action. Please send substantive comments to the
i...@ietf.org mailing lists by 2015-05-22. Exceptionally, comments may be
sent to i...@ietf.org instead. In either case, please retain the
beginning of the Subject line to allow automated sorting.

Abstract


   This document provides a mechanism to address issues that arise when
   TCP is used to support traffic that exhibits periods where the
   sending rate is limited by the application rather than the congestion
   window.  It provides an experimental update to TCP that allows a TCP
   sender to restart quickly following a rate-limited interval.  This
   method is expected to benefit applications that send rate-limited
   traffic using TCP, while also providing an appropriate response if
   congestion is experienced.

   It also evaluates the Experimental specification of TCP Congestion
   Window Validation, CWV, defined in RFC 2861, and concludes that RFC
   2861 sought to address important issues, but failed to deliver a
   widely used solution.  This document therefore recommends that the
   status of RFC 2861 is moved from Experimental to Historic, and that
   it is replaced by the current specification.




The file can be obtained via
https://datatracker.ietf.org/doc/draft-ietf-tcpm-newcwv/

IESG discussion can be tracked via
https://datatracker.ietf.org/doc/draft-ietf-tcpm-newcwv/ballot/


No IPR declarations have been submitted directly on this I-D.




WG Review: TCP Maintenance and Minor Extensions (tcpm)

2015-03-13 Thread The IESG
The TCP Maintenance and Minor Extensions (tcpm) working group in the
Transport Area of the IETF is undergoing rechartering. The IESG has not
made any determination yet. The following draft charter was submitted,
and is provided for informational purposes only. Please send your
comments to the IESG mailing list (iesg at ietf.org) by 2015-03-23.

TCP Maintenance and Minor Extensions (tcpm)

Current Status: Active WG

Chairs:
  Michael Scharf michael.sch...@alcatel-lucent.com
  Yoshifumi Nishida nish...@sfc.wide.ad.jp
  Pasi Sarolahti pasi.sarola...@iki.fi

Assigned Area Director:
  Martin Stiemerling mls.i...@gmail.com

Mailing list
  Address: t...@ietf.org
  To Subscribe: https://www.ietf.org/mailman/listinfo/tcpm
  Archive: http://www.ietf.org/mail-archive/web/tcpm/

Charter:

TCP is currently the Internet's predominant transport protocol. TCPM
is the working group within the IETF that handles small TCP changes,
i.e., minor extensions to TCP algorithms and protocol mechanisms.
The TCPM WG serves several purposes: 

* The WG mostly focuses on maintenance issues (e.g., bug fixes) and
modest changes to the protocol, algorithms, and interfaces that
maintain TCP's utility.

* The WG is a venue for moving current TCP specifications along the
standards track (as community energy is available for such efforts). 

* The focus of the working group is TCP. In cases where small
changes are directly applicable to other transports (e.g., SCTP or
DCCP), the mappings to other transports may be specified alongside
that for TCP, but other significant additions and changes to other
transports are not in scope.

TCPM also provides a venue for standardization of incremental
enhancements of TCP's standard congestion control. In addition,
TCPM may document alternative TCP congestion control algorithms
that are known to be widely deployed, and that are considered
safe for large-scale deployment in the Internet. Changes of algorithms
may require additional review by the IRTF Congestion Control
Research Group (ICCRG). Fundamental changes to TCP or its congestion
control algorithms (e.g., departure from loss-based congestion
control) will be handled by other working groups or will require
rechartering.

TCP's congestion control algorithms are the model followed by
alternate transports (e.g., SCTP or DCCP), which are standardized in
other working groups, such as the Transport Area WG (tsvwg). In the
past, the IETF has worked on several documents about algorithms that
are specified for multiple protocols (e.g., TCP and SCTP) in the
same document. Which WG shepherds such documents will be determined
on a case-by-case basis. In any case, the TCPM WG will remain in
close contact with other relevant WGs working on these protocols to
ensure openness and stringent review from all angles.

New TCPM milestones that fall within the scope specified within the
charter can be added after consensus on acceptance in the working
group and approval by the responsible Area Director.

Milestones:
  Aug 2013 - Submit document on restarting the RTO timer to the IESG for
publication as an Experimental RFC
  Nov 2013 - Submit document on TCP support for rate-limited traffic for
publication (status decided as earlier milestone)
  Nov 2013 - Submit document on an analysis of more detailed ECN feedback
in TCP to the IESG for publication as an Informational RFC
  Mar 2014 - Submit revision of TCP roadmap (RFC 4614) to the IESG for
publication as an Informational RFC
  Mar 2015 - Submit document obsoleting undeployed TCP extensions to the
IESG for publication as an Informational RFC
  Aug 2015 - Submit document on a TCP Extended Data Offset Option to the
IESG as a Proposed Standard RFC




RFC 7414 on A Roadmap for Transmission Control Protocol (TCP) Specification Documents

2015-02-02 Thread rfc-editor
A new Request for Comments is now available in online RFC libraries.


RFC 7414

Title:  A Roadmap for Transmission Control 
Protocol (TCP) Specification Documents 
Author: M. Duke, R. Braden,
W. Eddy, E. Blanton,
A. Zimmermann
Status: Informational
Stream: IETF
Date:   February 2015
Mailbox:m.d...@f5.com, 
bra...@isi.edu, 
w...@mti-systems.com, 
e...@interruptsciences.com, 
alexander.zimmerm...@netapp.com
Pages:  57
Characters: 130622
Obsoletes:  RFC 4614

I-D Tag:draft-ietf-tcpm-tcp-rfc4614bis-08.txt

URL:https://www.rfc-editor.org/info/rfc7414

This document contains a roadmap to the Request for Comments (RFC)
documents relating to the Internet's Transmission Control Protocol
(TCP).  This roadmap provides a brief summary of the documents
defining TCP and various TCP extensions that have accumulated in the
RFC series.  This serves as a guide and quick reference for both TCP
implementers and other parties who desire information contained in
the TCP-related RFCs.

This document obsoletes RFC 4614.

This document is a product of the TCP Maintenance and Minor Extensions Working 
Group of the IETF.


INFORMATIONAL: This memo provides information for the Internet community.
It does not specify an Internet standard of any kind. Distribution of
this memo is unlimited.

This announcement is sent to the IETF-Announce and rfc-dist lists.
To subscribe or unsubscribe, see
  https://www.ietf.org/mailman/listinfo/ietf-announce
  https://mailman.rfc-editor.org/mailman/listinfo/rfc-dist

For searching the RFC series, see https://www.rfc-editor.org/search
For downloading RFCs, see https://www.rfc-editor.org/rfc.html

Requests for special distribution should be addressed to either the
author of the RFC in question, or to rfc-edi...@rfc-editor.org.  Unless
specifically noted otherwise on the RFC itself, all RFCs are for
unlimited distribution.


The RFC Editor Team
Association Management Solutions, LLC




Document Action: 'TCP Fast Open' to Experimental RFC (draft-ietf-tcpm-fastopen-10.txt)

2014-09-30 Thread The IESG
The IESG has approved the following document:
- 'TCP Fast Open'
  (draft-ietf-tcpm-fastopen-10.txt) as Experimental RFC

This document is the product of the TCP Maintenance and Minor Extensions
Working Group.

The IESG contact persons are Martin Stiemerling and Spencer Dawkins.

A URL of this Internet Draft is:
http://datatracker.ietf.org/doc/draft-ietf-tcpm-fastopen/





Technical Summary

   This document describes an experimental TCP mechanism TCP Fast Open
   (TFO). TFO allows data to be carried in the SYN and SYN-ACK packets
   and consumed by the receiving end during the initial connection
   handshake, thus saving up to one full round trip time (RTT)
   compared to the standard TCP, which requires a three-way handshake
   (3WHS) to complete before data can be exchanged. However TFO
   deviates from the standard TCP semantics since the data in the SYN
   could be replayed to an application in some rare
   circumstances. Applications should not use TFO unless they can
   tolerate this issue detailed in the Applicability section.

Working Group Summary

  This document was extensively discussed and reviewed by the TCPM
  working group and there is strong support to publish the
  document. While being an experimental document, the TCPM working
  group decided to ask IESG for approving an IANA allocation of a new
  TCP option codepoint.

Document Quality

  The protocol extension described in this document is implemented and
  deployed in the Linux TCP/IP stack, and it is supported by the Chrome
  Web browser and all Google servers. Experimental results have been
  discussed in the TCPM working group. An early SECDIR review 
  concluded that the document had no substantive issues.

Personnel

  The Document Shepherd is Michael Scharf
  michael.sch...@alcatel-lucent.com. The Responsible Area Director
  is Martin Stiemerling mls.i...@gmail.com.




RFC 7323 on TCP Extensions for High Performance

2014-09-19 Thread rfc-editor
A new Request for Comments is now available in online RFC libraries.


RFC 7323

Title:  TCP Extensions for High Performance 
Author: D. Borman, B. Braden,
V. Jacobson, R. Scheffenegger, Ed.
Status: Standards Track
Stream: IETF
Date:   September 2014
Mailbox:david.bor...@quantum.com, 
bra...@isi.edu, 
v...@google.com,
r...@netapp.com
Pages:  49
Characters: 106013
Obsoletes:  RFC 1323

I-D Tag:draft-ietf-tcpm-1323bis-21.txt

URL:https://www.rfc-editor.org/rfc/rfc7323.txt

This document specifies a set of TCP extensions to improve
performance over paths with a large bandwidth * delay product and to
provide reliable operation over very high-speed paths.  It defines
the TCP Window Scale (WS) option and the TCP Timestamps (TS) option
and their semantics.  The Window Scale option is used to support
larger receive windows, while the Timestamps option can be used for
at least two distinct mechanisms, Protection Against Wrapped
Sequences (PAWS) and Round-Trip Time Measurement (RTTM), that are
also described herein.

This document obsoletes RFC 1323 and describes changes from it.

This document is a product of the TCP Maintenance and Minor Extensions Working 
Group of the IETF.

This is now a Proposed Standard.

STANDARDS TRACK: This document specifies an Internet Standards Track
protocol for the Internet community, and requests discussion and suggestions
for improvements.  Please refer to the current edition of the Official
Internet Protocol Standards (https://www.rfc-editor.org/standards) for the 
standardization state and status of this protocol.  Distribution of this 
memo is unlimited.

This announcement is sent to the IETF-Announce and rfc-dist lists.
To subscribe or unsubscribe, see
  https://www.ietf.org/mailman/listinfo/ietf-announce
  https://mailman.rfc-editor.org/mailman/listinfo/rfc-dist

For searching the RFC series, see https://www.rfc-editor.org/search
For downloading RFCs, see https://www.rfc-editor.org/rfc.html

Requests for special distribution should be addressed to either the
author of the RFC in question, or to rfc-edi...@rfc-editor.org.  Unless
specifically noted otherwise on the RFC itself, all RFCs are for
unlimited distribution.


The RFC Editor Team
Association Management Solutions, LLC




Document Action: 'A Roadmap for Transmission Control Protocol (TCP) Specification Documents' to Informational RFC (draft-ietf-tcpm-tcp-rfc4614bis-08.txt)

2014-08-21 Thread The IESG
The IESG has approved the following document:
- 'A Roadmap for Transmission Control Protocol (TCP) Specification
   Documents'
  (draft-ietf-tcpm-tcp-rfc4614bis-08.txt) as Informational RFC

This document is the product of the TCP Maintenance and Minor Extensions
Working Group.

The IESG contact persons are Martin Stiemerling and Spencer Dawkins.

A URL of this Internet Draft is:
http://datatracker.ietf.org/doc/draft-ietf-tcpm-tcp-rfc4614bis/





Technical Summary

Due to long-term development efforts, understanding TCP is
becoming difficult as it consists of many separated RFCs. 
This document provides a summary of the various documents
related to TCP standards, guidelines and best current practices. 
The objective of the document is to provide a roadmap for TCP
standards so that implementers and other parties can reach proper
information smoothly and quickly. 


Working Group Summary

This document is the update from RFC4614 which has been
published for the same purpose.  As the information in RFC4614 is
getting stale, there has been consensus in the WG to publish a new
version. One discussion point was whether we will keep publishing
this type of documents from time to time or find a way to provide
up-to-date information through dynamic contents such as Wiki or
perpetual I-D. After some discussions, we have concluded to publish
this document as an RFC. The consensus was clear as we need
further discussions for the other methods and there was no strong
support for them.


Document Quality

The document has been reviewed and discussed by multiple
participants in the WG. 

Personnel

 Yoshifumi Nishida is the Document Shepherd for this document.
 The Responsible Area Director is Martin Stiemerling





Last Call: draft-ietf-tcpm-fastopen-09.txt (TCP Fast Open) to Experimental RFC

2014-07-09 Thread The IESG

The IESG has received a request from the TCP Maintenance and Minor
Extensions WG (tcpm) to consider the following document:
- 'TCP Fast Open'
  draft-ietf-tcpm-fastopen-09.txt as Experimental RFC

The IESG plans to make a decision in the next few weeks, and solicits
final comments on this action. Please send substantive comments to the
i...@ietf.org mailing lists by 2014-07-23. Exceptionally, comments may be
sent to i...@ietf.org instead. In either case, please retain the
beginning of the Subject line to allow automated sorting.

Abstract


   This document describes an experimental TCP mechanism TCP Fast Open
   (TFO). TFO allows data to be carried in the SYN and SYN-ACK packets
   and consumed by the receiving end during the initial connection
   handshake, thus saving up to one full round trip time (RTT) compared
   to the standard TCP, which requires a three-way handshake (3WHS) to
   complete before data can be exchanged. However TFO deviates from the
   standard TCP semantics since the data in the SYN could be replayed to
   an application in some rare circumstances. Applications should not
   use TFO unless they can tolerate this issue detailed in the
   Applicability section.




The file can be obtained via
http://datatracker.ietf.org/doc/draft-ietf-tcpm-fastopen/

IESG discussion can be tracked via
http://datatracker.ietf.org/doc/draft-ietf-tcpm-fastopen/ballot/


No IPR declarations have been submitted directly on this I-D.




Last Call: draft-ietf-tcpm-tcp-rfc4614bis-05.txt (A Roadmap for Transmission Control Protocol (TCP) Specification Documents) to Informational RFC

2014-06-16 Thread The IESG

The IESG has received a request from the TCP Maintenance and Minor
Extensions WG (tcpm) to consider the following document:
- 'A Roadmap for Transmission Control Protocol (TCP) Specification
   Documents'
  draft-ietf-tcpm-tcp-rfc4614bis-05.txt as Informational RFC

The IESG plans to make a decision in the next few weeks, and solicits
final comments on this action. Please send substantive comments to the
i...@ietf.org mailing lists by 2014-06-30. Exceptionally, comments may be
sent to i...@ietf.org instead. In either case, please retain the
beginning of the Subject line to allow automated sorting.

Abstract


   This document contains a roadmap to the Requests for Comments (RFC)
   documents relating to the Internet's Transmission Control Protocol
   (TCP).  This roadmap provides a brief summary of the documents
   defining TCP and various TCP extensions that have accumulated in the
   RFC series.  This serves as a guide and quick reference for both TCP
   implementers and other parties who desire information contained in
   the TCP-related RFCs.

   This document obsoletes RFC 4614.




The file can be obtained via
http://datatracker.ietf.org/doc/draft-ietf-tcpm-tcp-rfc4614bis/

IESG discussion can be tracked via
http://datatracker.ietf.org/doc/draft-ietf-tcpm-tcp-rfc4614bis/ballot/


No IPR declarations have been submitted directly on this I-D.




RFC 7242 on Delay-Tolerant Networking TCP Convergence-Layer Protocol

2014-06-13 Thread rfc-editor
A new Request for Comments is now available in online RFC libraries.


RFC 7242

Title:  Delay-Tolerant Networking 
TCP Convergence-Layer Protocol 
Author: M. Demmer,
J. Ott,
S. Perreault
Status: Experimental
Stream: IRTF
Date:   June 2014
Mailbox:dem...@cs.berkeley.edu, 
j...@netlab.tkk.fi, 
si...@per.reau.lt
Pages:  22
Characters: 53818
Updates/Obsoletes/SeeAlso:   None

I-D Tag:draft-irtf-dtnrg-tcp-clayer-09.txt

URL:http://www.rfc-editor.org/rfc/rfc7242.txt

This document describes the protocol for the TCP-based convergence
layer for Delay-Tolerant Networking (DTN).  It is the product of the
IRTF's DTN Research Group (DTNRG).

This document is a product of the Delay-Tolerant Networking Research Group of 
the IRTF.


EXPERIMENTAL: This memo defines an Experimental Protocol for the
Internet community.  It does not specify an Internet standard of any
kind. Discussion and suggestions for improvement are requested.
Distribution of this memo is unlimited.

This announcement is sent to the IETF-Announce, rfc-dist and IRTF-Announce 
lists.To subscribe or unsubscribe, see
  http://www.ietf.org/mailman/listinfo/ietf-announce
  http://mailman.rfc-editor.org/mailman/listinfo/rfc-dist
  http://www.irtf.org/mailman/listinfo/irtf-announce

For searching the RFC series, see http://www.rfc-editor.org/search
For downloading RFCs, see http://www.rfc-editor.org/rfc.html

Requests for special distribution should be addressed to either the
author of the RFC in question, or to rfc-edi...@rfc-editor.org.  Unless
specifically noted otherwise on the RFC itself, all RFCs are for
unlimited distribution.


The RFC Editor Team
Association Management Solutions, LLC



New Non-WG Mailing List: Tcpcrypt -- Discussion list for adding encryption to TCP

2014-03-24 Thread IETF Secretariat
A new IETF non-working group email list has been created.

List address: tcpcr...@ietf.org
Archive: http://www.ietf.org/mail-archive/web/tcpcrypt/
To subscribe: https://www.ietf.org/mailman/listinfo/tcpcrypt

Purpose: 

The goal of this mailing list is to discuss encryption of TCP 
sessions, without necessarily requiring endpoint authentication 
in all cases (but while also making endpoint authentication 
possible). The initial purpose of the mailing list is to discuss the 
scope and a potential charter of a WG that would work 
on the definition of TCP extensions to support such encryption, 
or to find an existing WG to perform the work. 

For additional information, please contact the list administrators.



Results of IETF-conflict review for draft-irtf-dtnrg-tcp-clayer-08

2014-02-24 Thread The IESG
The IESG has completed a review of draft-irtf-dtnrg-tcp-clayer-08
consistent with RFC5742.


The IESG has no problem with the publication of 'Delay Tolerant
Networking TCP Convergence Layer Protocol'
draft-irtf-dtnrg-tcp-clayer-08.txt as an Experimental RFC.


The IESG has concluded that there is no conflict between this document
and IETF work.



The IESG would also like the IRTF to review the comments in the
datatracker related to this document and determine whether or not they
merit incorporation into the document. Comments may exist in both the
ballot and the history log.

The IESG review is documented at:
http://datatracker.ietf.org/doc/conflict-review-irtf-dtnrg-tcp-clayer/

A URL of the reviewed Internet Draft is:
http://datatracker.ietf.org/doc/draft-irtf-dtnrg-tcp-clayer/

The process for such documents is described in RFC 5743  

Thank you,

The IESG Secretary





Last Call: draft-ietf-tcpm-1323bis-19.txt (TCP Extensions for High Performance) to Proposed Standard

2014-02-04 Thread The IESG

The IESG has received a request from the TCP Maintenance and Minor
Extensions WG (tcpm) to consider the following document:
- 'TCP Extensions for High Performance'
  draft-ietf-tcpm-1323bis-19.txt as Proposed Standard

The IESG plans to make a decision in the next few weeks, and solicits
final comments on this action. Please send substantive comments to the
i...@ietf.org mailing lists by 2014-02-18. Exceptionally, comments may be
sent to i...@ietf.org instead. In either case, please retain the
beginning of the Subject line to allow automated sorting.

Abstract


   This document specifies a set of TCP extensions to improve
   performance over paths with a large bandwidth * delay product and to
   provide reliable operation over very high-speed paths.  It defines
   the TCP Window Scale (WS) option and the TCP Timestamps (TS) option
   and their semantics.  The Window Scale option is used to support
   larger receive windows, while the Timestamps option can be used for
   at least two distinct mechanisms, PAWS (Protection Against Wrapped
   Sequences) and RTTM (Round Trip Time Measurement), that are also
   described herein.

   This document obsoletes RFC1323 and describes changes from it.




The file can be obtained via
http://datatracker.ietf.org/doc/draft-ietf-tcpm-1323bis/

IESG discussion can be tracked via
http://datatracker.ietf.org/doc/draft-ietf-tcpm-1323bis/ballot/


No IPR declarations have been submitted directly on this I-D.




  1   2   3   4   5   6   7   >