[appsdir] Fwd: Last Call: <draft-ietf-radext-datatypes-06.txt> (Data Types in the Remote Authentication Dial-In User Service Protocol (RADIUS)) to Proposed Standard

Eliot Lear <lear@cisco.com> Fri, 05 August 2016 14:51 UTC

Return-Path: <lear@cisco.com>
X-Original-To: appsdir@ietfa.amsl.com
Delivered-To: appsdir@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CF0DA12D8B2 for <appsdir@ietfa.amsl.com>; Fri, 5 Aug 2016 07:51:37 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -15.809
X-Spam-Level:
X-Spam-Status: No, score=-15.809 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H4=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-1.287, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id xqvyPlGNKMbE for <appsdir@ietfa.amsl.com>; Fri, 5 Aug 2016 07:51:36 -0700 (PDT)
Received: from aer-iport-2.cisco.com (aer-iport-2.cisco.com [173.38.203.52]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7C6E412D89C for <appsdir@ietf.org>; Fri, 5 Aug 2016 07:51:35 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=11686; q=dns/txt; s=iport; t=1470408695; x=1471618295; h=references:subject:to:from:message-id:date:mime-version: in-reply-to; bh=nDDr7xjNOmc1LzPJdnXZisi990Zd1OpdDH51yaKnDbI=; b=YGN29OGaEkyL1rgli8D0JzURhYvf6a+kq2aobNv5MlNsLYLR6uzyS8Go i4i1rIr5xl8rzYasCqNYPhiBSwjSJYYA0sTgoOJhJRkkVCfDnBbEzO+vj HuMTSG3fMH6iCTq2ZTCXhPXtVXAXHPKqCEZooDNlPOMlt9FV7LNSse2qT E=;
X-Files: signature.asc : 481
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0CCAgBFpKRX/xbLJq1chBsqUrcSgg+BfSSFeQKBdxQBAQEBAQEBXRwLhF8GI0sbRgcCAkYHCgYNBgIBAYgtDq5QkAIBAQEBAQEBAQIBAQEBAQETCQWIIgiCTYdBgloFmTWDO4Fzb4hrgWuEW4MOhW6GZIVPg3ceNoJFgTc6ModlAQEB
X-IronPort-AV: E=Sophos;i="5.28,474,1464652800"; d="asc'?eml'208?scan'208,208";a="638830748"
Received: from aer-iport-nat.cisco.com (HELO aer-core-4.cisco.com) ([173.38.203.22]) by aer-iport-2.cisco.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 05 Aug 2016 14:51:33 +0000
Received: from [10.61.89.30] (ams3-vpn-dhcp6431.cisco.com [10.61.89.30]) by aer-core-4.cisco.com (8.14.5/8.14.5) with ESMTP id u75EpXE6015149 for <appsdir@ietf.org>; Fri, 5 Aug 2016 14:51:33 GMT
References: <20160803180345.6185.91442.idtracker@ietfa.amsl.com>
To: "appsdir@ietf.org" <appsdir@ietf.org>
From: Eliot Lear <lear@cisco.com>
X-Forwarded-Message-Id: <20160803180345.6185.91442.idtracker@ietfa.amsl.com>
Message-ID: <df46c92e-ecdf-e861-8435-4fe7e7f9372b@cisco.com>
Date: Fri, 05 Aug 2016 16:51:32 +0200
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.11; rv:45.0) Gecko/20100101 Thunderbird/45.2.0
MIME-Version: 1.0
In-Reply-To: <20160803180345.6185.91442.idtracker@ietfa.amsl.com>
Content-Type: multipart/signed; micalg="pgp-sha256"; protocol="application/pgp-signature"; boundary="0oPuiTXx6GiCkS81ABjFiJqL7LIX97lWr"
Archived-At: <https://mailarchive.ietf.org/arch/msg/appsdir/UvSXALRsNcg2iFFvtxkU49yqo5Y>
Subject: [appsdir] Fwd: Last Call: <draft-ietf-radext-datatypes-06.txt> (Data Types in the Remote Authentication Dial-In User Service Protocol (RADIUS)) to Proposed Standard
X-BeenThere: appsdir@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Apps Area Review List <appsdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/appsdir>, <mailto:appsdir-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/appsdir/>
List-Post: <mailto:appsdir@ietf.org>
List-Help: <mailto:appsdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/appsdir>, <mailto:appsdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 05 Aug 2016 14:51:38 -0000

Names names and more names.  Would anyone like to review this document
in last call?  For one thing, it may make sense, and I don't know if
this is really an apps area thing, to see if we have other protocols
that also declare data types, and how the two might map.  That seems to
me very appy, but I am also thinking in terms of YANG...

Eliot

--- Begin Message ---
The IESG has received a request from the RADIUS EXTensions WG (radext) to
consider the following document:
- 'Data Types in the Remote Authentication Dial-In User Service Protocol
   (RADIUS)'
  <draft-ietf-radext-datatypes-06.txt> as Proposed Standard

The IESG plans to make a decision in the next few weeks, and solicits
final comments on this action. Please send substantive comments to the
ietf@ietf.org mailing lists by 2016-08-17. Exceptionally, comments may be
sent to iesg@ietf.org instead. In either case, please retain the
beginning of the Subject line to allow automated sorting.

Abstract


   RADIUS specifications have used data types for two decades without
   defining them as managed entities.  During this time, RADIUS
   implementations have named the data types, and have used them in
   attribute definitions.  This document updates the specifications to
   better follow established practice.  We do this by naming the data
   types defined in RFC 6158, which have been used since at least RFC
   2865.  We provide an IANA registry for the data types, and update the
   RADIUS Attribute Type registry to include a "Data Type" field for
   each attribute.  Finally, we recommend that authors of RADIUS
   specifications use these types in preference to existing practice.
   This document updates RFC 2865, 3162, 6158, and 6572.




The file can be obtained via
https://datatracker.ietf.org/doc/draft-ietf-radext-datatypes/

IESG discussion can be tracked via
https://datatracker.ietf.org/doc/draft-ietf-radext-datatypes/ballot/


No IPR declarations have been submitted directly on this I-D.


The document contains these normative downward references.
See RFC 3967 for additional information: 
    rfc3576: Dynamic Authorization Extensions to Remote Authentication Dial In User Service (RADIUS) (Informational - Independent Submission Editor stream)
    rfc5904: RADIUS Attributes for IEEE 802.16 Privacy Key Management Version 1 (PKMv1) Protocol Support (Informational - IETF stream)
    rfc2866: RADIUS Accounting (Informational - IETF stream)
    rfc2867: RADIUS Accounting Modifications for Tunnel Protocol Support (Informational - IETF stream)
Note that some of these references may already be listed in the acceptable Downref Registry.



--- End Message ---