Last Call: draft-ietf-sip-fork-loop-fix (Addressing an Amplification Vulnerability in Session Initiation Protocol (SIP) Forking Proxies) to Proposed Standard

The IESG <iesg-secretary@ietf.org> Mon, 30 April 2007 15:55 UTC

Return-path: <ietf-announce-bounces@ietf.org>
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com) by megatron.ietf.org with esmtp (Exim 4.43) id 1HiYDY-0000qv-LB; Mon, 30 Apr 2007 11:55:12 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1HiYDV-0000qD-U1; Mon, 30 Apr 2007 11:55:09 -0400
Received: from ns1.neustar.com ([2001:503:c779:1a::9c9a:108a]) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1HiYDV-00042i-Nt; Mon, 30 Apr 2007 11:55:09 -0400
Received: from stiedprstage1.ietf.org (stiedprstage1.va.neustar.com [10.31.47.10]) by ns1.neustar.com (Postfix) with ESMTP id 9D62526ED1; Mon, 30 Apr 2007 15:55:09 +0000 (GMT)
Received: from ietf by stiedprstage1.ietf.org with local (Exim 4.43) id 1HiYDV-0007yZ-Hf; Mon, 30 Apr 2007 11:55:09 -0400
X-test-idtracker: no
To: IETF-Announce <ietf-announce@ietf.org>
From: The IESG <iesg-secretary@ietf.org>
Message-Id: <E1HiYDV-0007yZ-Hf@stiedprstage1.ietf.org>
Date: Mon, 30 Apr 2007 11:55:09 -0400
X-Spam-Score: -2.8 (--)
X-Scan-Signature: 79899194edc4f33a41f49410777972f8
Cc: sip@ietf.org
Subject: Last Call: draft-ietf-sip-fork-loop-fix (Addressing an Amplification Vulnerability in Session Initiation Protocol (SIP) Forking Proxies) to Proposed Standard
X-BeenThere: ietf-announce@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
Reply-To: ietf@ietf.org
List-Id: ietf-announce.ietf.org
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ietf-announce>, <mailto:ietf-announce-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ietf-announce@ietf.org>
List-Help: <mailto:ietf-announce-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ietf-announce>, <mailto:ietf-announce-request@ietf.org?subject=subscribe>
Errors-To: ietf-announce-bounces@ietf.org

The IESG has received a request from the Session Initiation Protocol WG 
(sip) to consider the following document:

- 'Addressing an Amplification Vulnerability in Session Initiation 
   Protocol (SIP) Forking Proxies '
   <draft-ietf-sip-fork-loop-fix-05.txt> as a Proposed Standard

The IESG plans to make a decision in the next few weeks, and solicits
final comments on this action.  Please send substantive comments to the
ietf@ietf.org mailing lists by 2007-05-14. Exceptionally, 
comments may be sent to iesg@ietf.org instead. In either case, please 
retain the beginning of the Subject line to allow automated sorting.

The file can be obtained via
http://www.ietf.org/internet-drafts/draft-ietf-sip-fork-loop-fix-05.txt


IESG discussion can be tracked via
https://datatracker.ietf.org/public/pidtracker.cgi?command=view_id&dTag=14447&rfc_flag=0


_______________________________________________
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf-announce