< draft-knutsen-tcpm-middlebox-discovery-03.txt   draft-knutsen-tcpm-middlebox-discovery-04.txt >
TCP Maintenance and Minor A. Knutsen TCP Maintenance and Minor A. Knutsen
Extensions (tcpm) R. Frederick Extensions (tcpm) R. Frederick
Internet Draft J. Mahdavi Internet Draft J. Mahdavi
Intended Category: Informational Q. Li Intended Category: Informational Q. Li
Expires: May 2010 W.J. Yeh Expires: November 2010 W.J. Yeh
Blue Coat Systems Blue Coat Systems
November 9, 2009 May 3, 2010
TCP Option for Transparent Middlebox Discovery TCP Option for Transparent Middlebox Discovery
<draft-knutsen-tcpm-middlebox-discovery-03.txt> <draft-knutsen-tcpm-middlebox-discovery-04.txt>
Status of this Memo Status of this Memo
Distribution of this memo is unlimited. Distribution of this memo is unlimited.
This Internet-Draft is submitted to IETF in full conformance with the This Internet-Draft is submitted to IETF in full conformance with the
provisions of BCP 78 and BCP 79. provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that Task Force (IETF), its areas, and its working groups. Note that
skipping to change at page 1, line 45 skipping to change at page 1, line 45
http://www.ietf.org/shadow.html. http://www.ietf.org/shadow.html.
This Internet-Draft will expire February, 2010. This Internet-Draft will expire February, 2010.
Copyright Notice Copyright Notice
Copyright (c) 2009 IETF Trust and the persons identified as the Copyright (c) 2009 IETF Trust and the persons identified as the
document authors. All rights reserved. document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal Provisions This document is subject to BCP 78 and the IETF Trust's Legal Provisions
Relating to IETF Documents in effect on the date of publication of Relating to IETF Documents (http://trustee.ietf.org/license-info)
this document (http://trustee.ietf.org/license-info). Please in effect on the date of publication of this document. Please
review these documents carefully, as they describe your rights and review these documents carefully, as they describe your rights and
restrictions with respect to this document. restrictions with respect to this document.
Abstract Abstract
This document describes a TCP option intended to facilitate This document describes a TCP option intended to facilitate
transparent detection of middleboxes (or services playing that role) transparent detection of middleboxes (or services playing that role)
along the path of a TCP connection as the connection is made. The along the path of a TCP connection as the connection is made. The
option has no effect if an appropriate middlebox is not on the path. option has no effect if an appropriate middlebox is not on the path.
skipping to change at page 6, line 34 skipping to change at page 6, line 34
The request MUST have the "R" bit to 0. The request MUST have the "R" bit to 0.
The device capability specifies what target data MUST be present in The device capability specifies what target data MUST be present in
the option, if any. the option, if any.
Requests are only valid in SYN packets. They MUST NOT appear in other Requests are only valid in SYN packets. They MUST NOT appear in other
segments and MUST be ignored when found outside of a SYN. segments and MUST be ignored when found outside of a SYN.
5.3. Responding to Discovery Request 5.3. Responding to Discovery Request
Requests received in any state except SYN-SENT MUST be ignored.
Devices MUST NOT respond to requests which have not been validated Devices MUST NOT respond to requests which have not been validated
using the target data, if required by the device capability. using the target data, if required by the device capability.
Responses MUST have the "R" bit set to 1. Responses MUST have the "R" bit set to 1.
The device capability specifies what target data MUST be present in The device capability specifies what target data MUST be present in
the option, if any. the option, if any.
Responses are only valid in valid SYN-ACK packets. They MUST NOT Responses are only valid in valid SYN-ACK packets. They MUST NOT
appear in other segments and MUST be ignored when found outside of a appear in other segments and MUST be ignored when found outside of a
 End of changes. 5 change blocks. 
7 lines changed or deleted 5 lines changed or added

This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/