[appsdir] Fwd: Last Call: <draft-ietf-radext-datatypes-06.txt> (Data Types in the Remote Authentication Dial-In User Service Protocol (RADIUS)) to Proposed Standard
Eliot Lear <lear@cisco.com> Fri, 05 August 2016 14:51 UTC
Return-Path: <lear@cisco.com>
X-Original-To: appsdir@ietfa.amsl.com
Delivered-To: appsdir@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CF0DA12D8B2 for <appsdir@ietfa.amsl.com>; Fri, 5 Aug 2016 07:51:37 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -15.809
X-Spam-Level:
X-Spam-Status: No, score=-15.809 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H4=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-1.287, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id xqvyPlGNKMbE for <appsdir@ietfa.amsl.com>; Fri, 5 Aug 2016 07:51:36 -0700 (PDT)
Received: from aer-iport-2.cisco.com (aer-iport-2.cisco.com [173.38.203.52]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7C6E412D89C for <appsdir@ietf.org>; Fri, 5 Aug 2016 07:51:35 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=11686; q=dns/txt; s=iport; t=1470408695; x=1471618295; h=references:subject:to:from:message-id:date:mime-version: in-reply-to; bh=nDDr7xjNOmc1LzPJdnXZisi990Zd1OpdDH51yaKnDbI=; b=YGN29OGaEkyL1rgli8D0JzURhYvf6a+kq2aobNv5MlNsLYLR6uzyS8Go i4i1rIr5xl8rzYasCqNYPhiBSwjSJYYA0sTgoOJhJRkkVCfDnBbEzO+vj HuMTSG3fMH6iCTq2ZTCXhPXtVXAXHPKqCEZooDNlPOMlt9FV7LNSse2qT E=;
X-Files: signature.asc : 481
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0CCAgBFpKRX/xbLJq1chBsqUrcSgg+BfSSFeQKBdxQBAQEBAQEBXRwLhF8GI0sbRgcCAkYHCgYNBgIBAYgtDq5QkAIBAQEBAQEBAQIBAQEBAQETCQWIIgiCTYdBgloFmTWDO4Fzb4hrgWuEW4MOhW6GZIVPg3ceNoJFgTc6ModlAQEB
X-IronPort-AV: E=Sophos;i="5.28,474,1464652800"; d="asc'?eml'208?scan'208,208";a="638830748"
Received: from aer-iport-nat.cisco.com (HELO aer-core-4.cisco.com) ([173.38.203.22]) by aer-iport-2.cisco.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 05 Aug 2016 14:51:33 +0000
Received: from [10.61.89.30] (ams3-vpn-dhcp6431.cisco.com [10.61.89.30]) by aer-core-4.cisco.com (8.14.5/8.14.5) with ESMTP id u75EpXE6015149 for <appsdir@ietf.org>; Fri, 5 Aug 2016 14:51:33 GMT
References: <20160803180345.6185.91442.idtracker@ietfa.amsl.com>
To: "appsdir@ietf.org" <appsdir@ietf.org>
From: Eliot Lear <lear@cisco.com>
X-Forwarded-Message-Id: <20160803180345.6185.91442.idtracker@ietfa.amsl.com>
Message-ID: <df46c92e-ecdf-e861-8435-4fe7e7f9372b@cisco.com>
Date: Fri, 05 Aug 2016 16:51:32 +0200
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.11; rv:45.0) Gecko/20100101 Thunderbird/45.2.0
MIME-Version: 1.0
In-Reply-To: <20160803180345.6185.91442.idtracker@ietfa.amsl.com>
Content-Type: multipart/signed; micalg="pgp-sha256"; protocol="application/pgp-signature"; boundary="0oPuiTXx6GiCkS81ABjFiJqL7LIX97lWr"
Archived-At: <https://mailarchive.ietf.org/arch/msg/appsdir/UvSXALRsNcg2iFFvtxkU49yqo5Y>
Subject: [appsdir] Fwd: Last Call: <draft-ietf-radext-datatypes-06.txt> (Data Types in the Remote Authentication Dial-In User Service Protocol (RADIUS)) to Proposed Standard
X-BeenThere: appsdir@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Apps Area Review List <appsdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/appsdir>, <mailto:appsdir-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/appsdir/>
List-Post: <mailto:appsdir@ietf.org>
List-Help: <mailto:appsdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/appsdir>, <mailto:appsdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 05 Aug 2016 14:51:38 -0000
Names names and more names. Would anyone like to review this document in last call? For one thing, it may make sense, and I don't know if this is really an apps area thing, to see if we have other protocols that also declare data types, and how the two might map. That seems to me very appy, but I am also thinking in terms of YANG... Eliot
--- Begin Message ---The IESG has received a request from the RADIUS EXTensions WG (radext) to consider the following document: - 'Data Types in the Remote Authentication Dial-In User Service Protocol (RADIUS)' <draft-ietf-radext-datatypes-06.txt> as Proposed Standard The IESG plans to make a decision in the next few weeks, and solicits final comments on this action. Please send substantive comments to the ietf@ietf.org mailing lists by 2016-08-17. Exceptionally, comments may be sent to iesg@ietf.org instead. In either case, please retain the beginning of the Subject line to allow automated sorting. Abstract RADIUS specifications have used data types for two decades without defining them as managed entities. During this time, RADIUS implementations have named the data types, and have used them in attribute definitions. This document updates the specifications to better follow established practice. We do this by naming the data types defined in RFC 6158, which have been used since at least RFC 2865. We provide an IANA registry for the data types, and update the RADIUS Attribute Type registry to include a "Data Type" field for each attribute. Finally, we recommend that authors of RADIUS specifications use these types in preference to existing practice. This document updates RFC 2865, 3162, 6158, and 6572. The file can be obtained via https://datatracker.ietf.org/doc/draft-ietf-radext-datatypes/ IESG discussion can be tracked via https://datatracker.ietf.org/doc/draft-ietf-radext-datatypes/ballot/ No IPR declarations have been submitted directly on this I-D. The document contains these normative downward references. See RFC 3967 for additional information: rfc3576: Dynamic Authorization Extensions to Remote Authentication Dial In User Service (RADIUS) (Informational - Independent Submission Editor stream) rfc5904: RADIUS Attributes for IEEE 802.16 Privacy Key Management Version 1 (PKMv1) Protocol Support (Informational - IETF stream) rfc2866: RADIUS Accounting (Informational - IETF stream) rfc2867: RADIUS Accounting Modifications for Tunnel Protocol Support (Informational - IETF stream) Note that some of these references may already be listed in the acceptable Downref Registry.--- End Message ---