Last Call: draft-ietf-l2tpext-tdm (Layer Two Tunneling Protocol - Setup of TDM Pseudowires) to Proposed Standard

2008-11-14 Thread The IESG
The IESG has received a request from the Layer Two Tunneling Protocol 
Extensions WG (l2tpext) to consider the following document:

- 'Layer Two Tunneling Protocol - Setup of TDM Pseudowires '
   draft-ietf-l2tpext-tdm-06.txt as a Proposed Standard

The IESG plans to make a decision in the next few weeks, and solicits
final comments on this action.  Please send substantive comments to the
[EMAIL PROTECTED] mailing lists by 2008-11-28. Exceptionally, 
comments may be sent to [EMAIL PROTECTED] instead. In either case, please 
retain the beginning of the Subject line to allow automated sorting.

The file can be obtained via
http://www.ietf.org/internet-drafts/draft-ietf-l2tpext-tdm-06.txt


IESG discussion can be tracked via
https://datatracker.ietf.org/public/pidtracker.cgi?command=view_iddTag=12745rfc_flag=0

___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce


Last Call: draft-ietf-nfsv4-rpc-netid (IANA Considerations for RPC Net Identifiers and Universal Address Formats) to Proposed Standard

2008-11-14 Thread The IESG
The IESG has received a request from the Network File System Version 4 WG
(nfsv4) to consider the following document:

- 'IANA Considerations for RPC Net Identifiers and Universal Address 
   Formats '
   draft-ietf-nfsv4-rpc-netid-03.txt as a Proposed Standard

The IESG plans to make a decision in the next few weeks, and solicits
final comments on this action.  Please send substantive comments to the
[EMAIL PROTECTED] mailing lists by 2008-12-5. Exceptionally, 
comments may be sent to [EMAIL PROTECTED] instead. In either case, please 
retain the beginning of the Subject line to allow automated sorting.

The file can be obtained via
http://www.ietf.org/internet-drafts/draft-ietf-nfsv4-rpc-netid-03.txt


IESG discussion can be tracked via
https://datatracker.ietf.org/public/pidtracker.cgi?command=view_iddTag=17646rfc_flag=0

___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce


RFC 5376 on Inter-AS Requirements for the Path Computation Element Communication Protocol (PCECP)

2008-11-14 Thread rfc-editor

A new Request for Comments is now available in online RFC libraries.


RFC 5376

Title:  Inter-AS Requirements for the Path 
Computation Element Communication Protocol (PCECP) 
Author: N. Bitar, R. Zhang, K. Kumaki
Status: Informational
Date:   November 2008
Mailbox:[EMAIL PROTECTED], 
[EMAIL PROTECTED], 
[EMAIL PROTECTED]
Pages:  14
Characters: 33114
Updates/Obsoletes/SeeAlso:   None

I-D Tag:draft-ietf-pce-interas-pcecp-reqs-06.txt

URL:http://www.rfc-editor.org/rfc/rfc5376.txt

Multiprotocol Label Switching Traffic Engineered (MPLS TE) Label
Switched Paths (LSPs) may be established wholly within an Autonomous
System (AS) or may cross AS boundaries.

The Path Computation Element (PCE) is a component that is capable of
computing constrained paths for (G)MPLS TE LSPs.  The PCE Communication 
Protocol (PCECP) is defined to allow communication between Path Computation 
Clients (PCCs) and PCEs, as well as between PCEs.
The PCECP is used to request constrained paths and to supply computed
paths in response.  Generic requirements for the PCECP are set out in
Path Computation Element (PCE) Communication Protocol Generic
Requirements, RFC 4657.  This document extends those requirements to
cover the use of PCECP in support of inter-AS MPLS TE.  This memo provides 
information for the Internet community.

This document is a product of the Path Computation Element Working Group of the 
IETF.


INFORMATIONAL: This memo provides information for the Internet community.
It does not specify an Internet standard of any kind. Distribution of
this memo is unlimited.

This announcement is sent to the IETF-Announce and rfc-dist lists.
To subscribe or unsubscribe, see
  http://www.ietf.org/mailman/listinfo/ietf-announce
  http://mailman.rfc-editor.org/mailman/listinfo/rfc-dist

For searching the RFC series, see http://www.rfc-editor.org/rfcsearch.html.
For downloading RFCs, see http://www.rfc-editor.org/rfc.html.

Requests for special distribution should be addressed to either the
author of the RFC in question, or to [EMAIL PROTECTED]  Unless
specifically noted otherwise on the RFC itself, all RFCs are for
unlimited distribution.


The RFC Editor Team
USC/Information Sciences Institute


___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce


RFC 5384 on The Protocol Independent Multicast (PIM) Join Attribute Format

2008-11-14 Thread rfc-editor

A new Request for Comments is now available in online RFC libraries.


RFC 5384

Title:  The Protocol Independent Multicast (PIM) 
Join Attribute Format 
Author: A. Boers, I. Wijnands, E. Rosen
Status: Standards Track
Date:   November 2008
Mailbox:[EMAIL PROTECTED], 
[EMAIL PROTECTED], 
[EMAIL PROTECTED]
Pages:  10
Characters: 22330
Updates/Obsoletes/SeeAlso:   None

I-D Tag:draft-ietf-pim-join-attributes-06.txt

URL:http://www.rfc-editor.org/rfc/rfc5384.txt

A Protocol Independent Multicast - Sparse Mode Join message sent by
a given node identifies one or more multicast distribution trees that
that node wishes to join.  Each tree is identified by the combination
of a multicast group address and a source address (where the source
address is possibly a wild card).  Under certain conditions it can
be useful, when joining a tree, to specify additional information
related to the construction of the tree.  However, there has been no
way to do so until now.  This document describes a modification of the Join 
message that allows a node to associate attributes with a particular tree.  The 
attributes are encoded in Type-Length-Value format.  [STANDARDS TRACK]

This document is a product of the Protocol Independent Multicast Working Group 
of the IETF.

This is now a Proposed Standard Protocol.

STANDARDS TRACK: This document specifies an Internet standards track
protocol for the Internet community,and requests discussion and suggestions
for improvements.  Please refer to the current edition of the Internet
Official Protocol Standards (STD 1) for the standardization state and
status of this protocol.  Distribution of this memo is unlimited.

This announcement is sent to the IETF-Announce and rfc-dist lists.
To subscribe or unsubscribe, see
  http://www.ietf.org/mailman/listinfo/ietf-announce
  http://mailman.rfc-editor.org/mailman/listinfo/rfc-dist

For searching the RFC series, see http://www.rfc-editor.org/rfcsearch.html.
For downloading RFCs, see http://www.rfc-editor.org/rfc.html.

Requests for special distribution should be addressed to either the
author of the RFC in question, or to [EMAIL PROTECTED]  Unless
specifically noted otherwise on the RFC itself, all RFCs are for
unlimited distribution.


The RFC Editor Team
USC/Information Sciences Institute


___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce


RFC 5386 on Better-Than-Nothing Security: An Unauthenticated Mode of IPsec

2008-11-14 Thread rfc-editor

A new Request for Comments is now available in online RFC libraries.


RFC 5386

Title:  Better-Than-Nothing Security: An Unauthenticated Mode 
of IPsec 
Author: N. Williams, M. Richardson
Status: Standards Track
Date:   November 2008
Mailbox:[EMAIL PROTECTED], 
[EMAIL PROTECTED]
Pages:  11
Characters: 23103
Updates/Obsoletes/SeeAlso:   None

I-D Tag:draft-ietf-btns-core-07.txt

URL:http://www.rfc-editor.org/rfc/rfc5386.txt

This document specifies how to use the Internet Key Exchange (IKE)
protocols, such as IKEv1 and IKEv2, to setup unauthenticated
security associations (SAs) for use with the IPsec Encapsulating
Security Payload (ESP) and the IPsec Authentication Header (AH).  No
changes to IKEv2 bits-on-the-wire are required, but Peer
Authorization Database (PAD) and Security Policy Database (SPD)
extensions are specified.  Unauthenticated IPsec is herein referred
to by its popular acronym, BTNS (Better-Than-Nothing Security).  
[STANDARDS TRACK]

This document is a product of the Better-Than-Nothing Security Working Group of 
the IETF.

This is now a Proposed Standard Protocol.

STANDARDS TRACK: This document specifies an Internet standards track
protocol for the Internet community,and requests discussion and suggestions
for improvements.  Please refer to the current edition of the Internet
Official Protocol Standards (STD 1) for the standardization state and
status of this protocol.  Distribution of this memo is unlimited.

This announcement is sent to the IETF-Announce and rfc-dist lists.
To subscribe or unsubscribe, see
  http://www.ietf.org/mailman/listinfo/ietf-announce
  http://mailman.rfc-editor.org/mailman/listinfo/rfc-dist

For searching the RFC series, see http://www.rfc-editor.org/rfcsearch.html.
For downloading RFCs, see http://www.rfc-editor.org/rfc.html.

Requests for special distribution should be addressed to either the
author of the RFC in question, or to [EMAIL PROTECTED]  Unless
specifically noted otherwise on the RFC itself, all RFCs are for
unlimited distribution.


The RFC Editor Team
USC/Information Sciences Institute


___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce


RFC 5387 on Problem and Applicability Statement for Better-Than-Nothing Security (BTNS)

2008-11-14 Thread rfc-editor

A new Request for Comments is now available in online RFC libraries.


RFC 5387

Title:  Problem and Applicability Statement for 
Better-Than-Nothing Security (BTNS) 
Author: J. Touch, D. Black, Y. Wang
Status: Informational
Date:   November 2008
Mailbox:[EMAIL PROTECTED], 
[EMAIL PROTECTED], 
[EMAIL PROTECTED]
Pages:  28
Characters: 71707
Updates/Obsoletes/SeeAlso:   None

I-D Tag:draft-ietf-btns-prob-and-applic-07.txt

URL:http://www.rfc-editor.org/rfc/rfc5387.txt

The Internet network security protocol suite, IPsec, requires
authentication, usually of network-layer entities, to enable access
control and provide security services.  This authentication can be
based on mechanisms such as pre-shared symmetric keys, certificates
with associated asymmetric keys, or the use of Kerberos (via
Kerberized Internet Negotiation of Keys (KINK)).  The need to deploy
authentication information and its associated identities can be a
significant obstacle to the use of IPsec.

This document explains the rationale for extending the Internet
network security protocol suite to enable use of IPsec security
services without authentication.  These extensions are intended to
protect communication, providing better-than-nothing security
(BTNS).  The extensions may be used on their own (this use is called
Stand-Alone BTNS, or SAB) or may be used to provide network-layer
security that can be authenticated by higher layers in the protocol
stack (this use is called Channel-Bound BTNS, or CBB).  The document
also explains situations for which use of SAB and/or CBB extensions
are applicable.  This memo provides information for the Internet community.

This document is a product of the Better-Than-Nothing Security Working Group of 
the IETF.


INFORMATIONAL: This memo provides information for the Internet community.
It does not specify an Internet standard of any kind. Distribution of
this memo is unlimited.

This announcement is sent to the IETF-Announce and rfc-dist lists.
To subscribe or unsubscribe, see
  http://www.ietf.org/mailman/listinfo/ietf-announce
  http://mailman.rfc-editor.org/mailman/listinfo/rfc-dist

For searching the RFC series, see http://www.rfc-editor.org/rfcsearch.html.
For downloading RFCs, see http://www.rfc-editor.org/rfc.html.

Requests for special distribution should be addressed to either the
author of the RFC in question, or to [EMAIL PROTECTED]  Unless
specifically noted otherwise on the RFC itself, all RFCs are for
unlimited distribution.


The RFC Editor Team
USC/Information Sciences Institute


___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce