Custom Query (198 matches)
Results (1 - 100 of 198)
Ticket | Summary | Owner | Type | Priority | Milestone | Component |
---|---|---|---|---|---|---|
#7 | IESG DISCUSS comments | aland@… | defect | blocker | milestone1 | status-server |
#11 | Review | aland@… | defect | blocker | milestone1 | design |
#12 | Applicability | aland@… | defect | blocker | milestone1 | design |
#14 | DDNS Application | stefan.winter@… | defect | blocker | milestone1 | dynamic-discovery |
#19 | i18n Issues with RFC 4282 | aland@… | defect | blocker | milestone1 | RFC4282bis |
#21 | Crypto-Agility thoughts | bernard_aboba@… | defect | blocker | milestone1 | Crypto-Agility |
#25 | IESG DISCUSS Comments | aland@… | defect | blocker | milestone1 | tcp-transport |
#33 | Section 2.3 | defect | blocker | milestone1 | design | |
#42 | A1.4 | defect | blocker | milestone1 | design | |
#43 | A.2 | defect | blocker | milestone1 | design | |
#73 | Section 3.1 | wdec@… | defect | blocker | milestone1 | ipv6-access |
#75 | Section 3.6 | wdec@… | defect | blocker | milestone1 | ipv6-access |
#93 | Compliance with Crypto-Agility Requirements | defect | blocker | milestone1 | radsec | |
#94 | Compliance with Crypto-Agility Requirements | defect | blocker | milestone1 | dtls | |
#104 | IANA Considerations Issues | draft-ietf-radext-radius-extensions@… | defect | blocker | milestone1 | radius-extensions |
#124 | private enterprise numbers | draft-ietf-radext-radius-extensions@… | defect | blocker | milestone1 | radius-extensions |
#158 | Section 1 | draft-ietf-radext-nai@… | defect | blocker | milestone1 | nai |
#159 | Section 1.3 | draft-ietf-radext-nai@… | defect | blocker | milestone1 | nai |
#162 | Section 2.6 | draft-ietf-radext-nai@… | defect | blocker | milestone1 | nai |
#27 | Section 1.3 | aland@… | defect | critical | milestone1 | design |
#28 | Section 1.2 | defect | critical | milestone1 | design | |
#29 | Section 2 | defect | critical | milestone1 | design | |
#49 | B.10 | aland@… | defect | critical | milestone1 | design |
#87 | Guidance on mandatory-to-implement algorithms | defect | critical | milestone1 | Crypto-Agility | |
#89 | Key Wrap and Password Hiding Requirements | defect | critical | milestone1 | Crypto-Agility | |
#90 | Process for publication and selection | defect | critical | milestone1 | Crypto-Agility | |
#125 | vendor-ID fields | draft-ietf-radext-radius-extensions@… | defect | critical | milestone1 | radius-extensions |
#144 | Definition of NAI | aland@… | defect | critical | milestone1 | RFC4282bis |
#147 | Internationalization and draft-ietf-radext-dynamic-discovery | draft-ietf-radext-dynamic-discovery@… | defect | critical | milestone1 | dynamic-discovery |
#151 | Section 2.9: WLAN-SSID Attribute in Access-Accept | draft-ietf-radext-ieee802ext@… | defect | critical | milestone1 | ieee802ext |
#152 | Section 2.7: Network-Id-Name | draft-ietf-radext-ieee802ext@… | defect | critical | milestone1 | ieee802ext |
#153 | Section 2.8 Access-Info | draft-ietf-radext-ieee802ext@… | defect | critical | milestone1 | ieee802ext |
#154 | Section 2.10 WLAN-HESSID | draft-ietf-radext-ieee802ext@… | defect | critical | milestone1 | ieee802ext |
#155 | Section 2.11 WLAN-Venue-Info | draft-ietf-radext-ieee802ext@… | defect | critical | milestone1 | ieee802ext |
#160 | Section 2.1 | draft-ietf-radext-nai@… | defect | critical | milestone1 | nai |
#161 | Section 2.5 | draft-ietf-radext-nai@… | defect | critical | milestone1 | nai |
#163 | Section 2.7 | draft-ietf-radext-nai@… | defect | critical | milestone1 | nai |
#166 | Section 2.10 | draft-ietf-radext-nai@… | defect | critical | milestone1 | nai |
#2 | comments on draft-ietf-radext-ipv6-access-01 | wdec@… | defect | major | milestone1 | ipv6-access |
#3 | Review of RTLS document (part 1, Technical) | stefan.winter@… | defect | major | milestone1 | radsec |
#9 | AD review (technical) | aland@… | defect | major | milestone1 | tcp-transport |
#13 | Review | stefan.winter@… | defect | major | milestone1 | dynamic-discovery |
#15 | DTLS Comments | aland@… | defect | major | milestone1 | dtls |
#16 | Diameter and IANA considerations | bernard_aboba@… | defect | major | milestone1 | Extended |
#17 | 4005bis Dependency | bernard_aboba@… | defect | major | milestone1 | Extended |
#18 | Extended Attribute Restrictions | bernard_aboba@… | defect | major | milestone1 | Extended |
#22 | Review | bernard_aboba@… | defect | major | milestone1 | Crypto-Agility |
#23 | Comments | bernard_aboba@… | defect | major | milestone1 | Crypto-Agility |
#34 | Section 2.4 | defect | major | milestone1 | design | |
#35 | Section 3.2 | defect | major | milestone1 | design | |
#36 | Section 3.2.3 | defect | major | milestone1 | design | |
#41 | A1.2 | defect | major | milestone1 | design | |
#46 | B.3 | defect | major | milestone1 | design | |
#48 | B.6 | aland@… | defect | major | milestone1 | design |
#52 | Basic vs. Complex Attributes | defect | major | milestone1 | design | |
#55 | Disconnect-Request | aland@… | enhancement | major | milestone1 | design |
#56 | Review | stefan.winter@… | defect | major | milestone1 | radsec |
#57 | Disconnect-Request | aland@… | defect | major | milestone1 | design |
#58 | Section A.4 | aland@… | defect | major | milestone1 | design |
#59 | Section 2.2 Assigned Ports | aland@… | defect | major | milestone1 | tcp-transport |
#60 | Behavior in response to CoA-Request | stefan.winter@… | defect | major | milestone1 | radsec |
#63 | 4.1 session inactivity management | aland@… | defect | major | milestone1 | dtls |
#69 | Section 1 | wdec@… | defect | major | milestone1 | ipv6-access |
#70 | Section 2.1 | wdec@… | defect | major | milestone1 | ipv6-access |
#71 | Section 2.3 and 3.3 | wdec@… | defect | major | milestone1 | ipv6-access |
#72 | Section 2.4 | wdec@… | defect | major | milestone1 | ipv6-access |
#76 | Section 6 | wdec@… | defect | major | milestone1 | ipv6-access |
#77 | Section 2 | wdec@… | defect | major | milestone1 | ipv6-access |
#81 | Location Privacy | defect | major | milestone1 | Crypto-Agility | |
#83 | AKM Requirements | defect | major | milestone1 | Crypto-Agility | |
#85 | Confidentiality Requirements | defect | major | milestone1 | Crypto-Agility | |
#86 | MD5 Stream Cipher Weaknesses | defect | major | milestone1 | Crypto-Agility | |
#91 | Citation for MD5 security Issues | defect | major | milestone1 | Crypto-Agility | |
#92 | End-to-end versus hop-by-hop confidentiality | defect | major | milestone1 | Crypto-Agility | |
#95 | Section 4.2 | defect | major | milestone1 | Crypto-Agility | |
#98 | Section 4.2 | defect | major | milestone1 | Crypto-Agility | |
#99 | AD Review of RADIUS Crypto-Agility Requirements | defect | major | milestone1 | Crypto-Agility | |
#102 | Comments on draft-ietf-radext-ipv6-access-04 | draft-ietf-radext-ipv6-access@… | defect | major | milestone1 | ipv6-access |
#103 | Long attribute fragmentation constraints | draft-ietf-radext-radius-extensions@… | defect | major | milestone1 | radius-extensions |
#105 | Section 2.3 | blourdel@… | defect | major | milestone1 | ipv6-access |
#106 | Section 2.1 | blourdel@… | defect | major | milestone1 | ipv6-access |
#109 | Additional IEEE 802.11 Attributes | bernard_aboba@… | defect | major | milestone1 | ieee802ext |
#111 | Definitions for 802 or 802.11? | bernard_aboba@… | defect | major | milestone1 | ieee802ext |
#114 | encoding the IEEE 802.11 SSID | bernard_aboba@… | defect | major | milestone1 | ieee802ext |
#119 | 'levels of compliance'? | draft-ietf-radext-radius-extensions@… | defect | major | milestone1 | radius-extensions |
#123 | nesting depth | draft-ietf-radext-radius-extensions@… | defect | major | milestone1 | radius-extensions |
#130 | Dan's Review | bernard_aboba@… | defect | major | milestone1 | ieee802ext |
#131 | Additional 802.11 reason code values for draft-ietf-radext-ieee802ext | draft-ietf-radext-ieee802ext@… | defect | major | milestone1 | ieee802ext |
#132 | Additional comments from IEEE 802.11 | bernard_aboba@… | defect | major | milestone1 | ieee802ext |
#133 | Additional comments from IEEE 802.11 | bernard_aboba@… | defect | major | milestone1 | ieee802ext |
#135 | Server policy handling should be informative | draft-ietf-radext-dtls@… | defect | major | dtls | |
#136 | Table state management as security consideration? | draft-ietf-radext-dtls@… | defect | major | dtls | |
#137 | Clarify behavior if request authenticator or message authenticator fails | draft-ietf-radext-dtls@… | defect | major | dtls | |
#138 | The sections referenced in the RADIUS/TLS RFC in section 2.2.1 are wrong. | draft-ietf-radext-dtls@… | defect | major | milestone1 | dtls |
#139 | Implementation specifics should be informative | draft-ietf-radext-dtls@… | defect | major | milestone1 | dtls |
#140 | tearing down the DTLS session when there is an upper layer discard | draft-ietf-radext-dtls@… | defect | major | milestone1 | dtls |
#141 | Comments on Section 4.2 | draft-ietf-radext-dtls@… | defect | major | milestone1 | dtls |
#142 | Comments on Section 7.1 | draft-ietf-radext-dtls@… | defect | major | milestone1 | dtls |
#143 | Review of draft-dekok-radext-nai-02 | aland@… | defect | major | milestone1 | RFC4282bis |
#145 | Allowable code points | aland@… | defect | major | milestone1 | nai |
Note: See TracQuery
for help on using queries.