[Thanks to Alain Durand for taking the minutes] No presenters today, chairs will present all slides Administrativia ---------------------- recharter/update reviewed with AD External Liaison: talk to Scott Bradner for doc movement Doc update ---------------- Would like to move doc to standard track RFC to PS RFC1195, 2753, 2966, 3373, 3567, 3784, .... mailing list for details Draft to PS see mailing list for details will not got to PS see mailing list for rfc numbers reason: no interop issues/BCP may go to PS draft-ietf-isis-igp-p2p-over-lan-06.txt Issue with ISO: some doc modify operation on non IP networks document affected: point to point ops over lan, three way handshake Question: will there be inter-operability reports: answer no, those are BCP/Info docs, no bits onthe wire [ED: there will be some interop reports for some documents as nec] draft-ginsberg-isis-genapp-00.txt --------------------------------------------------------- Issue: running out of TLV code point (limited to 255, 37 assigned), while lots of app want to use TLV... proposal: assign one TLV to use by all applactions: No additional TLV codepoint required ever! (;-)) and use sub-TLV for apps discuss on ML if sub-TLV need to be reserved Note: dampening is required read the draft: 8-10 should become wg item: 1 should not become a wg item: 2 continue discussion on the mailling list draft-bhatia-manral-crypto-req-isis-01 --------------------------------------------------- clear text and MD5, security wants to move to something better like SHA1 would not like to change the IS-IS spec but the security/authentication spec Issue with algorithms mandatory to implement new terminology: SHOULD+, MUST-, MAY+ to indicate that in the future the status might change Tony li: some of the language in the draft is still inflamatory. Some people using MD5 might be offensed Dward: we can take out the strong language by not accepting this document Chairs: there are no request by the authors to make this a wg document show of hands of those who think we need a security doc at all: no one draft-ietf-isis-hmac-sha-01.txt ----------------------------------------- recent reports of attacks using collision on MD5 details in slides Tony Li and Ran Atkinson have a similar draft of using hash: draft-li-isis-hmac-shs-01 Tony Li and Ran Atkinson to sync up with authors Take this to the mailing list Tony Li: agreement with IANA ---------- we have permission to add code point for IS-IS we have all code point except for authentication TLV