1.
|
Clear description of the referenced document:
|
|
|
2.
|
Status of approval:
|
|
Standards Track
|
3.
|
Justification for the specific reference:
|
|
IETF RFC7574 is used in Q.3055 (ex. Q.HET-GW).
Secure Hash Algorithm 2 (SHA-2) based RFC 7574 Merkle hash.
|
4.
|
Current information, if any, about IPR issues:
|
|
Information on IPR issues regarding RFCs is available at: https://datatracker.ietf.org/ipr/search/. Specifically: https://datatracker.ietf.org/ipr/search/?option=rfc_search&rfc_search=4122
|
5.
|
Other useful information describing the "Quality" of the document:
|
|
The status of all the referenced RFCs, is "Proposed Standard"
|
6.
|
The degree of stability or maturity of the document:
|
|
The status of all the referenced RFCs, is "Proposed Standard"
|
7.
|
Relationship with other existing or emerging documents:
|
|
References within the Referenced RFCs are listed under item 8.
|
8.
|
Any explicit references within that referenced document should also be listed:
|
|
[CCITT.X690.2002] International Telephone and Telegraph Consultative/
Committee, "ASN.1 encoding rules: Specification of basic/
encoding Rules (BER), Canonical encoding rules (CER) and/
Distinguished encoding rules (DER)", CCITT Recommendation/
X.690, July 2002./
[FIPS180-4] National Institute of Standards and Technology,/
Information Technology Laboratory, "Federal Information/
Processing Standards: Secure Hash Standard (SHS)", FIPS/
PUB 180-4, March 2012./
[IANADNSSECALGNUM] IANA, "Domain Name System Security (DNSSEC) Algorithm/
Numbers", March 2014,/
http://www.iana.org/assignments/dns-sec-alg-numbers./
[RFC1918] Rekhter, Y., Moskowitz, B., Karrenberg, D., J. de Groot,/
G., and E. Lear, "Address Allocation for Private/
Internets", BCP 5, RFC 1918, DOI 10.17487/RFC1918,/
February 1996, http://www.rfc-editor.org/info/rfc1918./
/
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate/
Requirement Levels", BCP 14, RFC 2119,/
DOI 10.17487/RFC2119, March 1997,/
http://www.rfc-editor.org/info/rfc2119./
[RFC3110] Eastlake 3rd, D., "RSA/SHA-1 SIGs and RSA KEYs in the/
Domain Name System (DNS)", RFC 3110, DOI 10.17487/RFC3110,/
May 2001, http://www.rfc-editor.org/info/rfc3110./
[RFC3986] Berners-Lee, T., Fielding, R., and L. Masinter, "Uniform/
Resource Identifier (URI): Generic Syntax", STD 66, RFC/
3986, DOI 10.17487/RFC3986, January 2005,/
http://www.rfc-editor.org/info/rfc3986./
/
[RFC4034] Arends, R., Austein, R., Larson, M., Massey, D., and S./
Rose, "Resource Records for the DNS Security Extensions",/
RFC 4034, DOI 10.17487/RFC4034, March 2005,/
http://www.rfc-editor.org/info/rfc4034./
[RFC4291] Hinden, R. and S. Deering, "IP Version 6 Addressing/
Architecture", RFC 4291, DOI 10.17487/RFC4291, February/
2006, http://www.rfc-editor.org/info/rfc4291./
/
[RFC5280] Cooper, D., Santesson, S., Farrell, S., Boeyen, S.,/
Housley, R., and W. Polk, "Internet X.509 Public Key/
Infrastructure Certificate and Certificate Revocation List/
(CRL) Profile", RFC 5280, DOI 10.17487/RFC5280, May 2008,/
http://www.rfc-editor.org/info/rfc5280./
/
[RFC5702] Jansen, J., "Use of SHA-2 Algorithms with RSA in DNSKEY/
and RRSIG Resource Records for DNSSEC", RFC 5702,/
DOI 10.17487/RFC5702, October 2009,/
http://www.rfc-editor.org/info/rfc5702./
/
[RFC5905] Mills, D., Martin, J., Ed., Burbank, J., and W. Kasch,/
"Network Time Protocol Version 4: Protocol and Algorithms/
Specification", RFC 5905, DOI 10.17487/RFC5905, June 2010,/
http://www.rfc-editor.org/info/rfc5905./
/
[RFC6605] Hoffman, P. and W. Wijngaards, "Elliptic Curve Digital/
Signature Algorithm (DSA) for DNSSEC", RFC 6605,/
DOI 10.17487/RFC6605, April 2012,/
http://www.rfc-editor.org/info/rfc6605./
/
[RFC6817] Shalunov, S., Hazel, G., Iyengar, J., and M. Kuehlewind,/
"Low Extra Delay Background Transport (LEDBAT)", RFC 6817,/
DOI 10.17487/RFC6817, December 2012,/
http://www.rfc-editor.org/info/rfc6817./
/
Informative References:/
/
[ABMRKL] Bakker, A., "Merkle hash torrent extension", BitTorrent/
Enhancement Proposal 30, March 2009,/
http://bittorrent.org/beps/bep_0030.html./
/
[BINMAP] Grishchenko, V. and J. Pouwelse, "Binmaps: Hybridizing/
Bitmaps and Binary Trees", Delft University of Technology/
Parallel and Distributed Systems Report Series, Report/
number PDS-2011-005, ISSN 1387-2109, April 2009./
/
[BITOS] Vlavianos, A., Iliofotou, M., Mathieu, F., and M./
Faloutsos, "BiToS: Enhancing BitTorrent for Supporting/
Streaming Applications", IEEE INFOCOM Global Internet/
Symposium, Barcelona, Spain, April 2006./
/
/
/
/
/
/
Bakker, et al. Standards Track [Page 79]/
/
RFC 7574 PPSPP July 2015/
/
/
[BITTORRENT]/
Cohen, B., "The BitTorrent Protocol Specification",/
BitTorrent Enhancement Proposal 3, February 2008,/
http://bittorrent.org/beps/bep_0003.html./
/
[CLOSED] Borch, N., Mitchell, K., Arntzen, I., and D. Gabrijelcic,/
"Access Control to BitTorrent Swarms Using Closed Swarms",/
ACM workshop on Advanced Video Streaming Techniques for/
Peer-to-Peer Networks and Social Networking (AVSTP2P '10),/
Florence, Italy, October 2010,/
http://doi.acm.org/10.1145/1877891.1877898./
/
[DETMAL] Shetty, S., Galdames, P., Tavanapong, W., and Ying. Cai,/
"Detecting Malicious Peers in Overlay Multicast/
Streaming", IEEE Conference on Local Computer Networks,/
(LCN'06), Tampa, FL, USA, November 2006./
/
[ECLIPSE] Sit, E. and R. Morris, "Security Considerations for Peer-/
to-Peer Distributed Hash Tables", IPTPS '01: Revised/
Papers from the First International Workshop on Peer-to-/
Peer Systems, pp. 261-269, Springer-Verlag, 2002./
/
[ECS] Jovanovikj, V., Gabrijelcic, D., and T. Klobucar, "Access/
Control in BitTorrent P2P Networks Using the Enhanced/
Closed Swarms Protocol", International Conference on/
Emerging Security Information, Systems and Technologies/
(SECURWARE 2011), pp. 97-102, Nice, France, August 2011./
/
[ECS-protocol]/
Gabrijelcic, D., "Enhanced Closed Swarm protocol", Work in/
Progress, draft-ppsp-gabrijelcic-ecs-01, June 2013./
/
[EPLIVEPERF]/
Bonald, T., Massoulie, L., Mathieu, F., Perino, D., and A./
Twigg, "Epidemic live streaming: optimal performance/
trade-offs", Proceedings of the 2008 ACM SIGMETRICS/
International Conference on Measurement and Modeling of/
Computer Systems, Annapolis, MD, USA, June 2008./
/
[GIVE2GET] Mol, J., Pouwelse, J., Meulpolder, M., Epema, D., and H./
Sips, "Give-to-Get: Free-riding-resilient Video-on-Demand/
in P2P Systems", Proceedings Multimedia Computing and/
Networking conference (Proceedings of SPIE, Vol. 6818),/
San Jose, CA, USA, January 2008./
/
/
/
/
/
/
/
Bakker, et al. Standards Track [Page 80]/
/
RFC 7574 PPSPP July 2015/
/
/
[HAC01] Menezes, A., van Oorschot, P., and S. Vanstone, "Handbook/
of Applied Cryptography", CRC Press, (Fifth Printing,/
August 2001), October 1996./
/
[JIM11] Jimenez, R., Osmani, F., and B. Knutsson, "Sub-Second/
Lookups on a Large-Scale Kademlia-Based Overlay", IEEE/
International Conference on Peer-to-Peer Computing/
(P2P'11), Kyoto, Japan, August 2011./
/
[LBT] Rossi, D., Testa, C., Valenti, S., and L. Muscariello,/
"LEDBAT: the new BitTorrent congestion control protocol",/
Computer Communications and Networks (ICCCN), Zurich,/
Switzerland, August 2010./
/
[LCOMPL] Testa, C. and D. Rossi, "On the impact of uTP on/
BitTorrent completion time", IEEE International Conference/
on Peer-to-Peer Computing (P2P'11), Kyoto, Japan, August/
2011./
/
[MERKLE] Merkle, R., "Secrecy, Authentication, and Public Key/
Systems", Ph.D. thesis, Dept. of Electrical Engineering,/
Stanford University, CA, USA, pp 40-45, 1979./
/
[P2PWIKI] Bakker, A., Petrocco, R., Dale, M., Gerber, J.,/
Grishchenko, V., Rabaioli, D., and J. Pouwelse, "Online/
video using BitTorrent and HTML5 applied to Wikipedia",/
IEEE International Conference on Peer-to-Peer Computing/
(P2P'10), Delft, The Netherlands, August 2010./
/
[POLLIVE] Dhungel, P., Hei, Xiaojun., Ross, K., and N. Saxena,/
"Pollution in P2P Live Video Streaming", International/
Journal of Computer Networks & Communications (IJCNC) Vol./
1, No. 2, Jul 2009./
/
[PPSP-TP] Cruz, R., Nunes, M., Yingjie, G., Xia, J., Huang, R.,/
Taveira, J., and D. Lingli, "PPSP Tracker Protocol-Base/
Protocol (PPSP-TP/1.0)", Work in Progress,/
draft-ietf-ppsp-base-tracker-protocol-09, March 2015./
/
[PPSPPERF] Petrocco, R., Pouwelse, J., and D. Epema, "Performance/
Analysis of the Libswift P2P Streaming Protocol", IEEE/
International Conference on Peer-to-Peer Computing/
(P2P'12), Tarragona, Spain, September 2012./
/
/
/
/
/
/
/
/
Bakker, et al. Standards Track [Page 81]/
/
RFC 7574 PPSPP July 2015/
/
/
[RFC2564] Kalbfleisch, C., Krupczak, C., Presuhn, R., and J./
Saperia, "Application Management MIB", RFC 2564,/
DOI 10.17487/RFC2564, May 1999,/
http://www.rfc-editor.org/info/rfc2564./
/
[RFC2790] Waldbusser, S. and P. Grillo, "Host Resources MIB", RFC/
2790, DOI 10.17487/RFC2790, March 2000,/
http://www.rfc-editor.org/info/rfc2790./
/
[RFC2975] Aboba, B., Arkko, J., and D. Harrington, "Introduction to/
Accounting Management", RFC 2975, DOI 10.17487/RFC2975,/
October 2000, http://www.rfc-editor.org/info/rfc2975./
/
[RFC3365] Schiller, J., "Strong Security Requirements for Internet/
Engineering Task Force Standard Protocols", BCP 61, RFC/
3365, DOI 10.17487/RFC3365, August 2002,/
http://www.rfc-editor.org/info/rfc3365./
/
[RFC3729] Waldbusser, S., "Application Performance Measurement MIB",/
RFC 3729, DOI 10.17487/RFC3729, March 2004,/
http://www.rfc-editor.org/info/rfc3729./
/
[RFC4113] Fenner, B. and J. Flick, "Management Information Base for/
the User Datagram Protocol (UDP)", RFC 4113,/
DOI 10.17487/RFC4113, June 2005,/
http://www.rfc-editor.org/info/rfc4113./
/
[RFC4150] Dietz, R. and R. Cole, "Transport Performance Metrics/
MIB", RFC 4150, DOI 10.17487/RFC4150, August 2005,/
http://www.rfc-editor.org/info/rfc4150./
/
[RFC4193] Hinden, R. and B. Haberman, "Unique Local IPv6 Unicast/
Addresses", RFC 4193, DOI 10.17487/RFC4193, October 2005,/
http://www.rfc-editor.org/info/rfc4193./
/
[RFC4301] Kent, S. and K. Seo, "Security Architecture for the/
Internet Protocol", RFC 4301, DOI 10.17487/RFC4301,/
December 2005, http://www.rfc-editor.org/info/rfc4301./
/
[RFC4821] Mathis, M. and J. Heffner, "Packetization Layer Path MTU/
Discovery", RFC 4821, DOI 10.17487/RFC4821, March 2007,/
http://www.rfc-editor.org/info/rfc4821./
/
[RFC4960] Stewart, R., Ed., "Stream Control Transmission Protocol",/
RFC 4960, DOI 10.17487/RFC4960, September 2007,/
http://www.rfc-editor.org/info/rfc4960./
/
/
/
/
/
Bakker, et al. Standards Track [Page 82]/
/
RFC 7574 PPSPP July 2015/
/
/
[RFC5226] Narten, T. and H. Alvestrand, "Guidelines for Writing an/
IANA Considerations Section in RFCs", BCP 26, RFC 5226,/
DOI 10.17487/RFC5226, May 2008,/
http://www.rfc-editor.org/info/rfc5226./
/
[RFC5389] Rosenberg, J., Mahy, R., Matthews, P., and D. Wing,/
"Session Traversal Utilities for NAT (STUN)", RFC 5389,/
DOI 10.17487/RFC5389, October 2008,/
http://www.rfc-editor.org/info/rfc5389./
/
[RFC5424] Gerhards, R., "The Syslog Protocol", RFC 5424,/
DOI 10.17487/RFC5424, March 2009,/
http://www.rfc-editor.org/info/rfc5424./
/
[RFC5706] Harrington, D., "Guidelines for Considering Operations and/
Management of New Protocols and Protocol Extensions", RFC/
5706, DOI 10.17487/RFC5706, November 2009,/
http://www.rfc-editor.org/info/rfc5706./
/
[RFC5971] Schulzrinne, H. and R. Hancock, "GIST: General Internet/
Signalling Transport", RFC 5971, DOI 10.17487/RFC5971,/
October 2010, http://www.rfc-editor.org/info/rfc5971./
/
[RFC6194] Polk, T., Chen, L., Turner, S., and P. Hoffman, "Security/
Considerations for the SHA-0 and SHA-1 Message-Digest/
Algorithms", RFC 6194, DOI 10.17487/RFC6194, March 2011,/
http://www.rfc-editor.org/info/rfc6194./
/
[RFC6241] Enns, R., Ed., Bjorklund, M., Ed., Schoenwaelder, J., Ed.,/
and A. Bierman, Ed., "Network Configuration Protocol/
(NETCONF)", RFC 6241, DOI 10.17487/RFC6241, June 2011,/
http://www.rfc-editor.org/info/rfc6241./
/
[RFC6347] Rescorla, E. and N. Modadugu, "Datagram Transport Layer/
Security Version 1.2", RFC 6347, DOI 10.17487/RFC6347,/
January 2012, http://www.rfc-editor.org/info/rfc6347./
/
[RFC6709] Carpenter, B., Aboba, B., Ed., and S. Cheshire, "Design/
Considerations for Protocol Extensions", RFC 6709,/
DOI 10.17487/RFC6709, September 2012,/
http://www.rfc-editor.org/info/rfc6709./
/
[RFC6972] Zhang, Y. and N. Zong, "Problem Statement and Requirements/
of the Peer-to-Peer Streaming Protocol (PPSP)", RFC 6972,/
DOI 10.17487/RFC6972, July 2013,/
http://www.rfc-editor.org/info/rfc6972./
/
/
/
/
/
Bakker, et al. Standards Track [Page 83]/
/
RFC 7574 PPSPP July 2015/
/
/
[RFC7285] Alimi, R., Ed., Penno, R., Ed., Yang, Y., Ed., Kiesel, S.,/
Previdi, S., Roome, W., Shalunov, S., and R. Woundy,/
"Application-Layer Traffic Optimization (ALTO) Protocol",/
RFC 7285, DOI 10.17487/RFC7285, September 2014,/
http://www.rfc-editor.org/info/rfc7285./
/
[SECDHTS] Urdaneta, G., Pierre, G., and M. van Steen, "A Survey of/
DHT Security Techniques", ACM Computing Surveys,/
vol. 43(2), January 2011./
/
[SIGMCAST]/
Wong, C. and S. Lam, "Digital Signatures for Flows and/
Multicasts", IEEE/ACM Transactions on Networking 7(4),/
pp. 502-513, August 1999./
/
[SPS] Jesi, G., Montresor, A., and M. van Steen, "Secure Peer/
Sampling", Computer Networks vol. 54(12), pp. 2086-2098,/
Elsevier, August 2010./
/
[SWIFTIMPL]/
Grishchenko, V., Paananen, J., Pronchenkov, A., Bakker,/
A., and R. Petrocco, "Swift reference implementation",/
2015, https://github.com/libswift/libswift./
/
[TIT4TAT] Cohen, B., "Incentives Build Robustness in BitTorrent",/
1st Workshop on Economics of Peer-to-Peer Systems,/
Berkeley, CA, USA, May 2003.
|
9.
|
Qualification of
ISOC/IETF:
|
|
9.1-9.6 Decisions of ITU Council to admit ISOC to participate in the work of the Sector (June 1995 and June 1996).
9.7 The Internet Engineering Steering Group (IESG) is responsible for ongoing maintenance of the RFCs when the need arises. Comments on RFCs and corresponding changes are accommodated through the existing standardization process.
9.8 Each revision of a given RFC has a different RFC number, so no confusion is possible. All RFCs always remain available on-line. An index of RFCs and their status may be found in the IETF archives at http://www.rfc-editor.org/rfc.html.
|
10.
|
Other (for any supplementary information):
|
|
None
|
|