[btns] Version 11 of draft-ietf-btns-connection-latching posted

Nicolas Williams <Nicolas.Williams@sun.com> Fri, 14 August 2009 00:05 UTC

Return-Path: <Nicolas.Williams@sun.com>
X-Original-To: btns@core3.amsl.com
Delivered-To: btns@core3.amsl.com
Received: from localhost (localhost []) by core3.amsl.com (Postfix) with ESMTP id 416253A6D98 for <btns@core3.amsl.com>; Thu, 13 Aug 2009 17:05:51 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.874
X-Spam-Status: No, score=-5.874 tagged_above=-999 required=5 tests=[AWL=0.172, BAYES_00=-2.599, HELO_MISMATCH_COM=0.553, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([]) by localhost (core3.amsl.com []) (amavisd-new, port 10024) with ESMTP id kKatooLTvRMD for <btns@core3.amsl.com>; Thu, 13 Aug 2009 17:05:50 -0700 (PDT)
Received: from sca-ea-mail-3.sun.com (sca-ea-mail-3.Sun.COM []) by core3.amsl.com (Postfix) with ESMTP id 915D53A6992 for <btns@ietf.org>; Thu, 13 Aug 2009 17:05:50 -0700 (PDT)
Received: from dm-central-02.central.sun.com ([]) by sca-ea-mail-3.sun.com (8.13.6+Sun/8.12.9) with ESMTP id n7E05siS006501 for <btns@ietf.org>; Fri, 14 Aug 2009 00:05:55 GMT
Received: from binky.Central.Sun.COM (binky.Central.Sun.COM []) by dm-central-02.central.sun.com (8.13.8+Sun/8.13.8/ENSMAIL, v2.2) with ESMTP id n7E05sKA022904 for <btns@ietf.org>; Thu, 13 Aug 2009 18:05:54 -0600 (MDT)
Received: from binky.Central.Sun.COM (localhost []) by binky.Central.Sun.COM (8.14.3+Sun/8.14.3) with ESMTP id n7DNtFjI001303 for <btns@ietf.org>; Thu, 13 Aug 2009 18:55:15 -0500 (CDT)
Received: (from nw141292@localhost) by binky.Central.Sun.COM (8.14.3+Sun/8.14.3/Submit) id n7DNtF7V001302 for btns@ietf.org; Thu, 13 Aug 2009 18:55:15 -0500 (CDT)
X-Authentication-Warning: binky.Central.Sun.COM: nw141292 set sender to Nicolas.Williams@sun.com using -f
Date: Thu, 13 Aug 2009 18:55:15 -0500
From: Nicolas Williams <Nicolas.Williams@sun.com>
To: btns@ietf.org
Message-ID: <20090813235515.GC1043@Sun.COM>
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
User-Agent: Mutt/1.5.7i
Subject: [btns] Version 11 of draft-ietf-btns-connection-latching posted
X-BeenThere: btns@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Better-Than-Nothing-Security Working Group discussion list <btns.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/btns>, <mailto:btns-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/btns>
List-Post: <mailto:btns@ietf.org>
List-Help: <mailto:btns-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/btns>, <mailto:btns-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 14 Aug 2009 00:05:51 -0000




Changes made:

 - Added section 5.5 and updated sections 5.2 and 5.4 to reflect the new
   consensus on how to handle latch stat transitions to the BROKEN state
   in the absence of new APIs.
 - Added recommendation to break latches when IKE DPD concludes their
   remote peers are dead or rebooted.
    - Updated the latch state diagram to mention DPD.
 - Added Security Considerations sub-section to cover DoS attacks.
 - While updating section 2.2 text about the BROKEN state I noticed that
   a MUST in section 2.3 was not reflected in 2.2, so I updated that
   section 2.2 text accordingly.