IPv6 @ IETF-71, especially Jabber

2008-02-29 Thread Iljitsch van Beijnum
What's going on with the preparations to turn off IPv4 at IETF-71?  
It's been really quiet surrounding that topic since the initial  
discussion.

Because I've had an IPv6 mail server for years and a WWW proxy that  
allows IPv6-only hosts to get access to the IPv4 web is fairly trivial  
to set up (tip for XP users: XP can't do DNS lookups over IPv6, use  
Firefox and configure it with the IPv6 address of the proxy), my  
preperation for this has been mostly getting Jabber to work over IPv6.

A while ago I managed to find a public Jabber server that is reachable  
over IPv6 (amessage.de with some other domains pointing to the same  
server). Unfortunately, the client I generally use, Apple's iChat,  
does support Jabber over IPv6 when there is IPv4 connectivity, but  
when the system has no IPv4 address it says that you're not connected  
to the internet and doesn't try to connect over IPv6. Recently I  
thought this was fixed but it turned out that the Parallels Desktop  
virtualization enviroment sets up a bunch of virtual interfaces with  
private addresses, which is enough for iChat to work over IPv6.

Anyway, I started looking for Jabber clients that support IPv6. Most  
don't, but there are so many Jabber clients that there is actually a  
choice of ones that do. Unfortunately, none of them could connect to  
the jabber.ietf.org rooms. I first thought this was because of the  
clients, so I didn't keep a list of clients that support IPv6. But it  
turned out that this is a problem with my iljitsch at amessage.nl  
account on the amessage.de server, which doesn't seem IPv6-related.

So... does anyone know a place to obtain a Jabber account that's  
usable over IPv6? I assumed psg.com would be a good candidate, but  
even though psg.com has a  record, jabber.psg.com doesn't.
___
IETF mailing list
IETF@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: IPv6 @ IETF-71, especially Jabber

2008-02-29 Thread Ralph Droms
Iljitsch raises an interesting point that I'll generalize: can we  
maximize the learning by identifying specific applications to target  
for IPv6 compatibility during the IPv4 eclipse?

- Ralph

On Feb 29, 2008, at Feb 29, 2008,9:34 AM, Iljitsch van Beijnum wrote:

 What's going on with the preparations to turn off IPv4 at IETF-71?
 It's been really quiet surrounding that topic since the initial
 discussion.

 Because I've had an IPv6 mail server for years and a WWW proxy that
 allows IPv6-only hosts to get access to the IPv4 web is fairly trivial
 to set up (tip for XP users: XP can't do DNS lookups over IPv6, use
 Firefox and configure it with the IPv6 address of the proxy), my
 preperation for this has been mostly getting Jabber to work over IPv6.

 A while ago I managed to find a public Jabber server that is reachable
 over IPv6 (amessage.de with some other domains pointing to the same
 server). Unfortunately, the client I generally use, Apple's iChat,
 does support Jabber over IPv6 when there is IPv4 connectivity, but
 when the system has no IPv4 address it says that you're not connected
 to the internet and doesn't try to connect over IPv6. Recently I
 thought this was fixed but it turned out that the Parallels Desktop
 virtualization enviroment sets up a bunch of virtual interfaces with
 private addresses, which is enough for iChat to work over IPv6.

 Anyway, I started looking for Jabber clients that support IPv6. Most
 don't, but there are so many Jabber clients that there is actually a
 choice of ones that do. Unfortunately, none of them could connect to
 the jabber.ietf.org rooms. I first thought this was because of the
 clients, so I didn't keep a list of clients that support IPv6. But it
 turned out that this is a problem with my iljitsch at amessage.nl
 account on the amessage.de server, which doesn't seem IPv6-related.

 So... does anyone know a place to obtain a Jabber account that's
 usable over IPv6? I assumed psg.com would be a good candidate, but
 even though psg.com has a  record, jabber.psg.com doesn't.
 ___
 IETF mailing list
 IETF@ietf.org
 https://www.ietf.org/mailman/listinfo/ietf

___
IETF mailing list
IETF@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: IPv6 @ IETF-71, especially Jabber

2008-02-29 Thread Stephane Bortzmeyer
On Fri, Feb 29, 2008 at 03:34:41PM +0100,
 Iljitsch van Beijnum [EMAIL PROTECTED] wrote 
 a message of 35 lines which said:

 What's going on with the preparations to turn off IPv4 at IETF-71?
 It's been really quiet surrounding that topic since the initial
 discussion.

Because IPv6-only events are already banal?

http://www.civil-tongue.net/clusterf/
___
IETF mailing list
IETF@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: IPv6 @ IETF-71, especially Jabber

2008-02-29 Thread Leslie Daigle

Hi,

To the basic question of the IPv4 outage -- preparations are
indeed underway, to implement it as Russ described on 12/22/2007[1].

Early next week, there will be a wiki page accessible specifically
for our event, providing more detail and more pointers.  In the
meantime, if you have specific comments, you can send comments to
the team Russ set up[2].

In the meantime, NANOG and APRICOT have had similar events.  You
can see some of the data captured here:

http://www.civil-tongue.net/grandx/

and some writeups:

http://www.networkworld.com/community/node/25276
http://www.circleid.com/posts/82283_ipv6_hour_ipv4_switched_off/


Leslie.


[1]
[On December 22, 2007, Russ Housley wrote:]
 Following the mail list discussion, we have considered several different
 configurations for achieving the desired network experiment environment.
 It is important that everyone have adequate opportunity for advance
 configuration, and it is important that severe impact on other network
 resources at the meeting venue be avoided.  With these goals in mind, we
 intend to add an additional IPv6-only subnet, with a different SSID on
 the wireless network.  The SSID will include some clever name that
 includes the string v6ONLY.  This SSID will be available on all the
 wireless access points throughout the venue for the entire week.
 Everyone is encouraged to try using this network well before the plenary
 session.  Neighbors and friends are encouraged to help each other debug
 problems, and the kind folks at the help desk in the Terminal Room will
 also be happy to assist with any configuration challenges, IPv6-related
 or otherwise.



[2] [EMAIL PROTECTED]



Iljitsch van Beijnum wrote:
 What's going on with the preparations to turn off IPv4 at IETF-71?  
 It's been really quiet surrounding that topic since the initial  
 discussion.
 
 Because I've had an IPv6 mail server for years and a WWW proxy that  
 allows IPv6-only hosts to get access to the IPv4 web is fairly trivial  
 to set up (tip for XP users: XP can't do DNS lookups over IPv6, use  
 Firefox and configure it with the IPv6 address of the proxy), my  
 preperation for this has been mostly getting Jabber to work over IPv6.
 
 A while ago I managed to find a public Jabber server that is reachable  
 over IPv6 (amessage.de with some other domains pointing to the same  
 server). Unfortunately, the client I generally use, Apple's iChat,  
 does support Jabber over IPv6 when there is IPv4 connectivity, but  
 when the system has no IPv4 address it says that you're not connected  
 to the internet and doesn't try to connect over IPv6. Recently I  
 thought this was fixed but it turned out that the Parallels Desktop  
 virtualization enviroment sets up a bunch of virtual interfaces with  
 private addresses, which is enough for iChat to work over IPv6.
 
 Anyway, I started looking for Jabber clients that support IPv6. Most  
 don't, but there are so many Jabber clients that there is actually a  
 choice of ones that do. Unfortunately, none of them could connect to  
 the jabber.ietf.org rooms. I first thought this was because of the  
 clients, so I didn't keep a list of clients that support IPv6. But it  
 turned out that this is a problem with my iljitsch at amessage.nl  
 account on the amessage.de server, which doesn't seem IPv6-related.
 
 So... does anyone know a place to obtain a Jabber account that's  
 usable over IPv6? I assumed psg.com would be a good candidate, but  
 even though psg.com has a  record, jabber.psg.com doesn't.
 ___
 IETF mailing list
 IETF@ietf.org
 https://www.ietf.org/mailman/listinfo/ietf
 

-- 

---
Reality:
  Yours to discover.
 -- ThinkingCat
Leslie Daigle
[EMAIL PROTECTED]
---
___
IETF mailing list
IETF@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Re: IPv6 @ IETF-71, especially Jabber

2008-02-29 Thread Lucy Lynch
On Fri, 29 Feb 2008, Stephane Bortzmeyer wrote:

 On Fri, Feb 29, 2008 at 03:34:41PM +0100,
 Iljitsch van Beijnum [EMAIL PROTECTED] wrote
 a message of 35 lines which said:

 What's going on with the preparations to turn off IPv4 at IETF-71?
 It's been really quiet surrounding that topic since the initial
 discussion.

 Because IPv6-only events are already banal?

Hardly that. My understanding is that the IETF experiment is designed to 
give additional experience with configuration options as the NANOG 
and Apricot events were focused on v6only and v4v6 via NAT-PT.

We're still learning new things with each v6 hour and I (for one) hope to 
see these experiments carried out in a number of venues as the real 
world experience helps inform on-going work.

 http://www.civil-tongue.net/clusterf/

see:
http://www.civil-tongue.net/clusterf/wiki/APRICOT2008-Handout
http://www.civil-tongue.net/clusterf/wiki/APRICOT2008-Lessons

for some the the details of the last go-round.

- Lucy
  ___
 IETF mailing list
 IETF@ietf.org
 https://www.ietf.org/mailman/listinfo/ietf

___
IETF mailing list
IETF@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Missing materials

2008-02-29 Thread Eric Rescorla
I just ran getdrafts [0] on the entire agenda. The output is below.

getdrafts reports three kinds of errors:

- WGs without agendas: As you can see 42/98 WGs have no agendas
  two days after the agenda deadline.
- Missing drafts: Drafts on an agenda which can't be found [1]
- Corrected drafts: Drafts on an agenda which appear to have the
  wrong version number (if this is far enough off, we will report
  these as missing).

-Ekr


[0] https://svn.resiprocate.org/rep/ietf-drafts/ekr/getdrafts.pl
[1] I note that this appears to incorrectly identify mmusic's agenda
as a draft. Doh!


WGs without agendas:
  apparea
  trill
  mpls
  pkix
  esds
  shim6
  softwire
  ccamp
  forces
  l3vpn
  csi
  manet
  6lowpan
  v6ops
  nea
  autoconf
  rtgarea
  intarea
  mipshop
  capwap
  pim
  16ng
  rpsec
  kitten
  idn
  6man
  canmod
  hokey
  lemonade
  ntp
  opsarea
  dna
  grow
  msec
  l2vpn
  eai
  mip4
  tictoc
  opsawg
  saag
  savi
  smime

Missing drafts
  draft-agenda-71.txt (wg=mmusic)
  draft-ietf-rmt-bb-fec-ldpc-06.txt (wg=rmt)
  draft-rmt-pi-norm-revised-06.txt (wg=rmt)
  draft-ietf-tsvwg-admitted-voice-dscp-03.txt (wg=tsvwg)
  draft-ietf-pwe3-redundancy-00.txt (wg=pwe3)
  draft-ietf-ccid4-02.txt (wg=dccp)
  draft-fairhurst-tsvwg-qs-02.txt (wg=dccp)
  draft-ietf-dnsext-rfc2671-edns0-00.txt (wg=dnsext)
  draft-dietz-ipfix-mib-02.txt (wg=ipfix)
  draft-xia-pana-simplified-00.txt (wg=pana)
  draft-ietf-isis-bfd-tlv-00.txt (wg=isis)
  draft-ietf-sip-sec-flows-01.txt (wg=sip)
  draft-ietf-sip-hop-limit-diagnostics-03.txt (wg=sip)

Corrected drafts
  draft-ietf-sip-dtls-srtp-framework-00.txt - 
draft-ietf-sip-dtls-srtp-framework-01.txt (wg=mmusic)
  draft-ietf-mmusic-rtsp-nat-evaluation-00.txt - 
draft-ietf-mmusic-rtsp-nat-evaluation-01.txt (wg=mmusic)
  draft-davie-tsvwg-rsvp-l3vpn-01.txt - draft-davie-tsvwg-rsvp-l3vpn-02.txt 
(wg=tsvwg)
  draft-natarajan-tsvwg-sctp-nrsack-00.txt - 
draft-natarajan-tsvwg-sctp-nrsack-01.txt (wg=tsvwg)
  draft-ietf-lemonade-imap-sieve-04.txt - 
draft-ietf-lemonade-imap-sieve-05.txt (wg=sieve)
  draft-freed-sieve-environment-01.txt - draft-freed-sieve-environment-02.txt 
(wg=sieve)
  draft-melnikov-sieve-notify-sip-message-00.txt - 
draft-melnikov-sieve-notify-sip-message-01.txt (wg=sieve)
  draft-freed-sieve-in-xml-00.txt - draft-freed-sieve-in-xml-01.txt (wg=sieve)
  draft-freed-sieve-date-index-07.txt - draft-freed-sieve-date-index-08.txt 
(wg=sieve)
  draft-ietf-dhc-vpn-option-07.txt - draft-ietf-dhc-vpn-option-08.txt (wg=dhc)
  draft-ietf-tls-rfc4366-bis-01.txt - draft-ietf-tls-rfc4366-bis-02.txt 
(wg=tls)
  draft-ietf-sasl-crammd5-09.txt - draft-ietf-sasl-crammd5-10.txt (wg=sasl)
  draft-ietf-sasl-rfc2831bis-12.txt - draft-ietf-sasl-rfc2831bis-13.txt 
(wg=sasl)
  draft-josefsson-password-auth-00.txt - draft-josefsson-password-auth-01.txt 
(wg=sasl)
  draft-ietf-pce-global-concurrent-optimization-01.txt - 
draft-ietf-pce-global-concurrent-optimization-02.txt (wg=pce)
  draft-otani-pce-gmpls-aps-req-00.txt - draft-otani-pce-gmpls-aps-req-01.txt 
(wg=pce)
  draft-chan-pcn-encoding-comparison-02.txt - 
draft-chan-pcn-encoding-comparison-03.txt (wg=pcn)
  draft-zhang-pcn-performance-evaluation-02.txt - 
draft-zhang-pcn-performance-evaluation-03.txt (wg=pcn)
  draft-ietf-ancp-mib-an-02.txt - draft-ietf-ancp-mib-an-01.txt (wg=ancp)
  draft-ietf-psamp-info-07.txt - draft-ietf-psamp-info-08.txt (wg=ipfix)
  draft-ietf-ipfix-file-00.txt - draft-ietf-ipfix-file-01.txt (wg=ipfix)
  draft-ietf-ipfix-exporting-type-00.txt - 
draft-ietf-ipfix-exporting-type-01.txt (wg=ipfix)
  draft-muenz-ipfix-configuration-03.txt - 
draft-muenz-ipfix-configuration-04.txt (wg=ipfix)
  draft-claise-ipfix-export-per-sctp-stream-02.txt - 
draft-claise-ipfix-export-per-sctp-stream-03.txt (wg=ipfix)
  draft-kobayashi-ipfix-large-ps-00.txt - 
draft-kobayashi-ipfix-large-ps-01.txt (wg=ipfix)
  draft-kobayashi-ipfix-mediator-model-01.txt - 
draft-kobayashi-ipfix-mediator-model-02.txt (wg=ipfix)
  draft-aitken-ipfix-new-infos-01.txt - draft-aitken-ipfix-new-infos-02.txt 
(wg=ipfix)
  draft-ietf-mboned-routingarch-12.txt - draft-ietf-mboned-routingarch-13.txt 
(wg=mboned)
  draft-ietf-mboned-ip-mcast-mib-07.txt - 
draft-ietf-mboned-ip-mcast-mib-08.txt (wg=mboned)
  draft-ietf-mboned-ipv4-uni-based-mcast-04.txt - 
draft-ietf-mboned-ipv4-uni-based-mcast-05.txt (wg=mboned)
  draft-kaplan-sip-info-events-00.txt - draft-kaplan-sip-info-events-01.txt 
(wg=sip)
  draft-kaplan-sip-info-use-cases-00.txt - 
draft-kaplan-sip-info-use-cases-01.txt (wg=sip)
  draft-kaplan-sip-baiting-attack-01.txt - 
draft-kaplan-sip-baiting-attack-02.txt (wg=sip)
  draft-harkins-emu-eap-pwd-00.txt - draft-harkins-emu-eap-pwd-01.txt (wg=emu)
  draft-ietf-behave-nat-behavior-discovery-02.txt - 
draft-ietf-behave-nat-behavior-discovery-03.txt (wg=behave)
  draft-denis-behave-nat-dccp-00.txt - draft-denis-behave-nat-dccp-01.txt 
(wg=behave)

Found 307 out of 320 drafts
___

Re: Gen-ART Review of draft-ietf-smime-sha2-03.txt

2008-02-29 Thread Spencer Dawkins
Hi, Sean,

This is much better than I feared. There were just too many places in -03 
where I was guessing what was intended, for me to say ready for 
publication, or even almost ready with nits.

I know you don't make the decisions about when drafts are last-called, but 
when you talk to your shepherd, you might suggest looking at diffs for the 
version posted for last call. that popped up a lot of the concerns i had 
(which were also concerns that denis had).

Best wishes with the draft.

Spencer


 Spencer,

 Thanks for taking the time to read the draft. Responses are inline.

 spt

-Original Message-
From: Spencer Dawkins [mailto:[EMAIL PROTECTED]
Sent: Friday, February 29, 2008 12:27 AM
To: General Area Review Team
Cc: Sean Turner; Blake Ramsdell; ietf@ietf.org; [EMAIL PROTECTED]
Subject: Gen-ART Review of draft-ietf-smime-sha2-03.txt

I have been selected as the General Area Review Team (Gen-ART)
reviewer for this draft (for background on Gen-ART, please see
http://www.alvestrand.no/ietf/gen/art/gen-art-FAQ.html).

Please resolve these comments along with any other Last Call
comments you may receive.

 Will do.

Document: draft-ietf-smime-sha2-03.txt
Reviewer: Spencer Dawkins
Review Date: 2008 02 28
IETF LC End Date: 2008-03-07
IESG Telechat date: (if known)

Summary: This document isn't ready for publication as a
Proposed Standard - it's got enough cut-and-paste errors and
apparently-omitted text that I'd think twice about trying to
implement it. And if it has a note that says normative
reference still in progress, should be brought in line with
normative reference before publishing as an RFC, I'm not sure
why it's being last called now (of course, that decision is
above my pay grade).

 Wrt the reference, that draft is being worked in PKIX. Hopefully, it will
 progress quickly - I'm hoping for this summer (or sooner) for it to 
 complete
 WG LC and IETF LC.  Also, the reference is for object identifiers all of
 which were assigned years ago and are stable.

Comments:

Please include any nits listed in
http://www.ietf.org/mail-archive/web/ietf/current/msg50518.html
 that I may have missed in this review, by reference :-(

 Will do.

When one of the last call comments is There are obvious
errors (intentionnaly left by the editor in order to know how
many people read the document), this does not inspire
confidence. I note there is no shepherd writeup in the tracker
yet. The of for typo below has been in every version since
00. Who else has read this draft?

 This was, I believe, his attempt at humor. See my response to Denis' 
 email.

Abstract

   This document describes the conventions for using the message digest
   algorithms SHA-224, SHA-256, SHA-384, SHA-512, as defined in FIPS

Nit - I'm not sure what passes for normal in security drafts,
but I'd expect to see SHA and FIPS expanded on first use in
the abstract, and in the introduction of the document. Ditto
for DSA, RSA, and ECDSA.

 I will expand the acronyms.

   180-3, with the Cryptographic Message Syntax (CMS). It also
describes
   the conventions for using these algorithms with CMS and the
DSA, RSA,
   and ECDSA signature algorithms.

Conventions used in this document

Nit - it is odd to see this section as part of the abstract...

 For some reason the tool picks up this section as part of the abstract. 
 It's
 got a heading title so I don't think it's in the abstract.

1. Introduction

   This document specifies the algorithm identifiers and specifies
   parameters for the message digest algorithms SHA-224, SHA-256, SHA-
   384, and SHA-512 for use with the Cryptographic Message Syntax (CMS)
   [RFC3852].  The message digest algorithms are defined in and [SHS].

Concern: in and seems to be missing something.

 Denis caught this too. Will fix by removing the and.

   If an implementation chooses to support one of the algorithms
   discussed in this document, then the implementation MUST do so as
   described in this document.

Concern: this MUST (and the parallel MUST in the next
paragraph) seem odd - do you need to say this?

 Hmmm ... I guess not.  I'll remove both sentences.

   Note that [RFC4231] specifies the conventions for use of for the

Concern: of for seems to be missing something.

 I will remove for use of so the sentence will read: Note that [RFC4231]
 specifies the conventions for the message authentication code (MAC)
 algorithms 

   message authentication code (MAC) algorithms: HMAC with
SHA-224, HMAC
   with SHA-256, HMAC with SHA-384, and HMAC with SHA-512.

2. Message Digest Algorithms

   The following addresses the parameters field:

Nit - this sentence isn't clear and isn't required. I'd strike it.

 Removed.

   There are two possible encodings for the SHA AlgorithmIdentifier
   parameters field.  The two alternatives arise from the fact
that when
   the 1988 syntax for AlgorithmIdentifier was translated into the 1997
   syntax, the OPTIONAL associated with the AlgorithmIdentifier
   parameters got 

Audio Streaming - IETF 71 Philadelphia, PA, USA 9-14 March 2008

2008-02-29 Thread Joel Jaeggli
Greetings,

All 8 parallel tracks will be broadcast starting with the
commencement of working group sessions on Monday March 10 at 0900
EST (UTC-5) and continue until Friday at 1130 EST. Additionally it is
our intention to broadcast the IEPG meeting occurring on Sunday the 9th
starting at 1000 EST.

Because I have been asked several times in the past, note that if you
wish to use the rooms that are being recorded for impromptu meeting
during unscheduled sessions or lunch breaks that you can invite remote
participants to tune in to the appropriate stream. Recording cannot be
guaranteed for unscheduled sessions. Conversely, it should never be
assumed that recording or observation is not occurring on open
microphones, they are after all connected to the Internet.

The links for streaming sources and the schedule will be available
thanks to the continued support of the Network Startup Resource Center
in their traditional location:

http://videolab.uoregon.edu/events/ietf/

I Look forward to seeing some of you in Philadelphia and hope that this
facility remains useful for remote participants in and observers of the
IETF Process.

Regards
Joel Jaeggli

___
IETF mailing list
IETF@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


Impending publication: draft-iab-dns-choices-05

2008-02-29 Thread Olaf Kolkman


The IAB is ready to ask the RFC-Editor to publish

 Design Choices When Expanding DNS
   draft-iab-dns-choices-05


as an Informational RFC.  This document provides a number of
considerations to assist application and protocol designers in
choosing a mechanism to store and retrieve data in the DNS. It treats,
among other things the pros and cons of using TXT records, and of
adding prefixes or suffixes to owner names. It argues that adding an
new Resource Record is the best solution to add new data to the DNS
and that the use of TXT Resource Records is the worst.

The IAB solicits comments by February 23, 2008. Please send
comments to the IAB ([EMAIL PROTECTED]), or to [EMAIL PROTECTED]

The document can be found at

   
http://www.ietf.org/internet-drafts/draft-iab-dns-choices-03.txt


 From the Abstract:

   This note discusses how to extend the DNS with new data for a new
   application.  DNS extension discussions too often focus on reuse of
   the TXT Resource Record Type.  This document lists different
   mechanisms to extend the DNS, and concludes that the use of a new DNS
   Resource Record Type is the best solution.




Olaf Kolkman,
  For the IAB.
___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce


Last Call: draft-ietf-hokey-emsk-hierarchy (Specification for the Derivation of Root Keys from an Extended Master Session Key (EMSK)) to Proposed Standard

2008-02-29 Thread The IESG
The IESG has received a request from the Handover Keying WG (hokey) to 
consider the following document:

- 'Specification for the Derivation of Root Keys from an Extended Master
   Session Key (EMSK) '
   draft-ietf-hokey-emsk-hierarchy-04.txt as a Proposed Standard

The IESG plans to make a decision in the next few weeks, and solicits
final comments on this action.  Please send substantive comments to the
[EMAIL PROTECTED] mailing lists by 2008-03-21. Exceptionally, 
comments may be sent to [EMAIL PROTECTED] instead. In either case, please 
retain the beginning of the Subject line to allow automated sorting.

The file can be obtained via
http://www.ietf.org/internet-drafts/draft-ietf-hokey-emsk-hierarchy-04.txt



IESG discussion can be tracked via
https://datatracker.ietf.org/public/pidtracker.cgi?command=view_iddTag=15627rfc_flag=0

___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce


RFC 5098 on Signaling MIB for PacketCable and IPCablecom Multimedia Terminal Adapters (MTAs)

2008-02-29 Thread rfc-editor

A new Request for Comments is now available in online RFC libraries.


RFC 5098

Title:  Signaling MIB for PacketCable and 
IPCablecom Multimedia Terminal Adapters (MTAs) 
Author: G. Beacham, S. Kumar,
S. Channabasappa
Status: Standards Track
Date:   February 2008
Mailbox:[EMAIL PROTECTED], 
[EMAIL PROTECTED], 
[EMAIL PROTECTED]
Pages:  79
Characters: 159415
Updates/Obsoletes/SeeAlso:   None

I-D Tag:draft-ietf-ipcdn-pktc-signaling-15.txt

URL:http://www.rfc-editor.org/rfc/rfc5098.txt

This memo defines a portion of the Management Information Base (MIB)
for use with network management protocols in the Internet community.
In particular, it defines a basic set of managed objects for Simple
Network Management Protocol (SNMP)-based management of PacketCable-
and IPCablecom-compliant Multimedia Terminal Adapter devices.  
[STANDARDS TRACK]

This document is a product of the IP over Cable Data Network Working Group of 
the IETF.

This is now a Proposed Standard Protocol.

STANDARDS TRACK: This document specifies an Internet standards track
protocol for the Internet community,and requests discussion and suggestions
for improvements.  Please refer to the current edition of the Internet
Official Protocol Standards (STD 1) for the standardization state and
status of this protocol.  Distribution of this memo is unlimited.

This announcement is sent to the IETF list and the RFC-DIST list.
Requests to be added to or deleted from the IETF distribution list
should be sent to [EMAIL PROTECTED]  Requests to be
added to or deleted from the RFC-DIST distribution list should
be sent to [EMAIL PROTECTED]

Details on obtaining RFCs via FTP or EMAIL may be obtained by sending
an EMAIL message to [EMAIL PROTECTED] with the message body 

help: ways_to_get_rfcs. For example:

To: [EMAIL PROTECTED]
Subject: getting rfcs

help: ways_to_get_rfcs

Requests for special distribution should be addressed to either the
author of the RFC in question, or to [EMAIL PROTECTED]  Unless
specifically noted otherwise on the RFC itself, all RFCs are for
unlimited distribution.

Submissions for Requests for Comments should be sent to
[EMAIL PROTECTED]  Please consult RFC 2223, Instructions to RFC
Authors, for further information.


The RFC Editor Team
USC/Information Sciences Institute

...


___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce