Skip to main content

Access Network Identifier (ANI) Option for Proxy Mobile IPv6
draft-ietf-netext-access-network-option-13

Revision differences

Document history

Date Rev. By Action
2012-08-27
13 (System) IANA Action state changed to RFC-Ed-Ack from Waiting on RFC Editor
2012-08-26
13 (System) IANA Action state changed to Waiting on RFC Editor from In Progress
2012-08-26
13 (System) IANA Action state changed to In Progress from Waiting on Authors
2012-08-25
13 (System) IANA Action state changed to Waiting on Authors from In Progress
2012-08-13
13 Amy Vezza State changed to RFC Ed Queue from Approved-announcement sent
2012-08-13
13 (System) IANA Action state changed to In Progress
2012-08-13
13 Amy Vezza State changed to Approved-announcement to be sent from None
2012-08-13
13 Amy Vezza IESG has approved the document
2012-08-13
13 Amy Vezza Closed "Approve" ballot
2012-08-13
13 Amy Vezza State changed to Approved-announcement to be sent from IESG Evaluation::AD Followup
2012-08-13
13 Brian Haberman Ballot approval text was generated
2012-08-10
13 Stephen Farrell [Ballot Position Update] Position for Stephen Farrell has been changed to No Objection from Discuss
2012-08-10
13 Brian Haberman Ballot writeup was changed
2012-08-10
13 Brian Haberman Ballot writeup was changed
2012-08-09
13 Robert Sparks
[Ballot comment]
I assume the conclusion of the discussion you were having at IETF about the encoding of SSIDs fell out to UTF-8 instead of …
[Ballot comment]
I assume the conclusion of the discussion you were having at IETF about the encoding of SSIDs fell out to UTF-8 instead of raw bits?
2012-08-09
13 Robert Sparks [Ballot Position Update] Position for Robert Sparks has been changed to No Objection from Discuss
2012-08-09
13 Stephen Farrell
[Ballot discuss]
(1) Why doesn't this use geopriv?  I think Robert put this better than
I in asking why don't RFC 6280 considerations apply. I …
[Ballot discuss]
(1) Why doesn't this use geopriv?  I think Robert put this better than
I in asking why don't RFC 6280 considerations apply. I think they
ought. The text that's new since -11 however, might provide a way
forward. In -12 you clarified that this information is only for infrastructure
nodes to use to provide better network service. And in -13 you changed
the lat/lon structure. So I'm wondering if there's a way to do a -14
that adds the rule information to the lat/lon as 6280 implies is
needed? That could be as simple as a hardcoded value, not sure
if that'd work, but since you've changed that structure in -13, adding
some hardcoded value meaning "this rule applies" might be a way
to fix this.

(2) cleared

(3) Rolled into point 1 above.

(4) cleared
2012-08-09
13 Stephen Farrell Ballot discuss text updated for Stephen Farrell
2012-08-09
13 Stephen Farrell
[Ballot discuss]
(1) Why doesn't this use geopriv?  I think Robert put this better than
I in asking why don't RFC 6280 considerations apply. I …
[Ballot discuss]
(1) Why doesn't this use geopriv?  I think Robert put this better than
I in asking why don't RFC 6280 considerations apply. I think they
ought. The text that's new since -11 however, might provide a way
forward. In -12 you clarified that this information is only for infrastructure
nodes to use to provide better network service. And in -13 you changed
the lat/lon structure. So I'm wondering if there's a way to do a -14
that adds the rule information to the lat/lon as 6280 implies is
needed? That could be as simple as a hardcoded value, not sure
if that'd work, but since you've changed that structure in -13, adding
some hardcoded value meaning "this rule applies" might be a way
to fix this.

(2) cleared

(3) Rolled into point 1 above.

(4) I looked at 6275 and 5213 and its not clear to me that
these sensitive values, if sent, MUST be protected using IPsec
with strong confidentiality and mutual authentication. The
authentication part may be ok according to the documents, but
I'm not sure if that's the deployed reality. Is it? But even if
so, there's nothing much that I can see to ensure
confidentiality for this information. Where's all that
(clearly) specified? I still do not see this clearly specified
anywhere in -13. Just using AH is arguably not enough
here.
2012-08-09
13 Stephen Farrell Ballot discuss text updated for Stephen Farrell
2012-08-08
13 (System) Sub state has been changed to AD Followup from Revised ID Needed
2012-08-08
13 Sri Gundavelli New version available: draft-ietf-netext-access-network-option-13.txt
2012-08-08
12 Benoît Claise [Ballot Position Update] Position for Benoit Claise has been changed to No Objection from Discuss
2012-08-02
12 Brian Haberman State changed to IESG Evaluation::Revised ID Needed from IESG Evaluation::AD Followup
2012-07-30
12 Pete Resnick [Ballot Position Update] Position for Pete Resnick has been changed to No Objection from Discuss
2012-07-30
12 Sri Gundavelli New version available: draft-ietf-netext-access-network-option-12.txt
2012-07-23
11 Benoît Claise
[Ballot discuss]
Thanks for solving some of my DISCUSSes
Here is the updated DISCUSS.

- I was proposing:

  Operator PEN ID

      …
[Ballot discuss]
Thanks for solving some of my DISCUSSes
Here is the updated DISCUSS.

- I was proposing:

  Operator PEN ID

      SMI Network Management Private Enterprise
      Code of the IANA-maintained Private Enterprise Numbers registry
      [SMI] for the operator running ... [actually running what, that's another
      required clarification in the draft] ... the respective interface on mobile access gateway?

You chose to remove "running ..":
  Operator ID

      The Operator ID is the SMI Network Management Private Enterprise
      Code of the IANA-maintained Private Enterprise Numbers registry
      [SMI].

This is fine but you have to add that "running ..." part in

Operator Identifier (Op-ID) Type:  8-bit unsigned integer indicating
    the type of the Operator Identifier.

By for example, re-using a previous sentence: "This sub-option carries the operator identifier of the access network to which the mobile node is attached."


- Regarding "And also add a few sentences about whether all operators should or must now register new PENs for this spec.  I checked for a couple of my local ISPs, and not all of them had a PEN.", you added: "If a given access network operator has not obtained an identifier from the Private Enterprise Number registry,..." this is fine, but I'm still unclear if the operator MAY/SHOULD/MUST request a PEN?
2012-07-23
11 Benoît Claise Ballot discuss text updated for Benoit Claise
2012-07-23
11 Benoît Claise
[Ballot discuss]
Thanks for solving some of my DISCUSSes
Here is the updated DISCUSS.

- I was proposing:

  Operator PEN ID

      …
[Ballot discuss]
Thanks for solving some of my DISCUSSes
Here is the updated DISCUSS.

- I was proposing:

  Operator PEN ID

      SMI Network Management Private Enterprise
      Code of the IANA-maintained Private Enterprise Numbers registry
      [SMI] for the operator running ... [actually running what, that's another
      required clarification in the draft] ... the respective interface on mobile access gateway?

You chose to remove "running ..":
  Operator ID

      The Operator ID is the SMI Network Management Private Enterprise
      Code of the IANA-maintained Private Enterprise Numbers registry
      [SMI].

This is fine but you have to add that "running ..." part in

Operator Identifier (Op-ID) Type:  8-bit unsigned integer indicating
    the type of the Operator Identifier.

By for example, re-using a previous sentence: "This sub-option carries the operator identifier of the access network to which the mobile node is attached."


- And also add a few sentences about whether all operators should or must now register new PENs for this spec.
  I checked for a couple of my local ISPs, and not all of them had a PEN.
You added: "If a given access network operator has not obtained an identifier from the Private Enterprise Number registry,..." this is fine, but I'm still unclear if the operator MAY/SHOULD/MUST request a PEN?
2012-07-23
11 Benoît Claise Ballot comment and discuss text updated for Benoit Claise
2012-07-21
11 Pete Resnick
[Ballot discuss]
[Updating per email discussion]

3.1.1

  'E'-bit:  1-bit flag for representing the encoding of the following
      name field.  MUST be …
[Ballot discuss]
[Updating per email discussion]

3.1.1

  'E'-bit:  1-bit flag for representing the encoding of the following
      name field.  MUST be set to zero (0) if the network name is
      encoded using a string of opaque 8-bit octets or to one (1) if the
      network name is encoded using UTF-8 [RFC3629].

"Encoded using a string of opaque 8-bit octets" is problematic, particularly the word "encoded". Really, zero (0) means "undefined". That is, if the 'E'-bit is 0, then the encoding is only discoverable via out-of-band mechanisms. I think you need to use those words:

"'E'-bit: 1-bit flag indicating whether the network name is encoded in UTF-8. If this flag is set to one (1), then the network name is encoded using UTF-8 [RFC 3629]. If the flag is set to zero (0), this indicates that the encoding is undefined and is determined by out-of-band mechanisms."

I'd even prefer adding a sentence saying, "Implementations SHOULD use UTF-8 encoding."

  Net-Name Length:  8-bit field for representing the length of the
      network name to be followed.

I think you want to specifically say "in octets", since if it's UTF-8, characters is probably *not* what you mean. Also for AP-Name Length and ANI Length. Check throughout the document please.

3.1.3

      2 -  Realm of the operator.  Realm names are required to be
        unique, and are piggybacked on the administration of the DNS
        namespace.  Realms are encoded using a domain name encoding
        defined in [RFC1035].

  Operator Identifier:  Up to 253 octets of the operator identifier.
      The encoding of the identifier depends on the used Operator-ID
      Type.  Numeric values are encoded in network byte order and
      strings are in UTF-8 representation and have no terminating '\0'
      mark.

So the first part above says that the domain names are encoded to RFC 1035. Are you talking there about the letter-digit-hyphen rules of 2.3.1 of 1035? If so, you should say that. However, if that's what you mean, then clearly those are all US-ASCII. The second part says that "strings are in UTF-8 representation". Now I'm confused. Are you intending to allow things outside of US-ASCII, e.g. unencoded UTF-8 U-labels for IDNs? Something is not right about the above. If you changed the last sentence of the Realm definition to be, "Realms are encoded using a US-ASCII domain name encoding as defined in [RFC1035]" (and explain the bit about the terminating '\0' here), then I think you could get away with just striking the last sentence of the Operator definition and you'd be fine. I just want to make sure you are not allowing IDN U-labels, or if you are allowing them, you need to be explicit (and would need to add a bunch more text and more explanation about comparisons).
2012-07-21
11 Pete Resnick Ballot discuss text updated for Pete Resnick
2012-07-21
11 Stephen Farrell
[Ballot discuss]
(1) Why doesn't this use geopriv?

(2) cleared

(3) Why is it ok to send SSID and AP name  without asking the
user?  …
[Ballot discuss]
(1) Why doesn't this use geopriv?

(2) cleared

(3) Why is it ok to send SSID and AP name  without asking the
user?  Many of those are pretty revealing as to MN location.

(4) I looked at 6275 and 5213 and its not clear to me that
these sensitive values, if sent, MUST be protected using IPsec
with strong confidentiality and mutual authentication. The
authentication part may be ok according to the documents, but
I'm not sure if that's the deployed reality. Is it? But even if
so, there's nothing much that I can see to ensure
confidentiality for this information. Where's all that
(clearly) specified?
2012-07-21
11 Stephen Farrell Ballot discuss text updated for Stephen Farrell
2012-07-19
11 Ralph Droms [Ballot comment]
I've cleared.
2012-07-19
11 Ralph Droms [Ballot Position Update] Position for Ralph Droms has been changed to No Objection from Discuss
2012-07-16
11 (System) Sub state has been changed to AD Followup from Revised ID Needed
2012-07-16
11 Sri Gundavelli New version available: draft-ietf-netext-access-network-option-11.txt
2012-06-04
10 Alexey Melnikov Request for Telechat review by GENART Completed. Reviewer: Alexey Melnikov.
2012-05-24
10 Basavaraj Patil IETF state changed to Submitted to IESG for Publication from In WG Last Call
2012-05-24
10 Basavaraj Patil The I-D has been submitted to the IESG for publication as a proposed standard.
2012-05-24
10 Cindy Morgan State changed to IESG Evaluation::Revised ID Needed from IESG Evaluation
2012-05-24
10 Sean Turner [Ballot comment]
I'm piling on with Stephen and Robert.
2012-05-24
10 Sean Turner [Ballot Position Update] New position, No Objection, has been recorded for Sean Turner
2012-05-24
10 Gonzalo Camarillo [Ballot Position Update] New position, No Objection, has been recorded for Gonzalo Camarillo
2012-05-23
10 Benoît Claise
[Ballot discuss]
-The term "vendor" is confusing

  Vendor ID

      The Vendor ID is the SMI Network Management Private Enterprise
    …
[Ballot discuss]
-The term "vendor" is confusing

  Vendor ID

      The Vendor ID is the SMI Network Management Private Enterprise
      Code of the IANA-maintained Private Enterprise Numbers registry
      [SMI].

The example in figure 1 speaks about: "Operator-Id: provider2.example.com"
Vendor Id, in the network management world is the manufacturer id, while you're after the Operator-Id
I see what you want to do, but this is confusing. Also, do we expect that all operators will have Private Enterprise Number?

Maybe you want to redefine this with something such as (I trust you on the right wording)

  Operator PEN ID

      SMI Network Management Private Enterprise
      Code of the IANA-maintained Private Enterprise Numbers registry
      [SMI] for the operator running ... [actually running what, that's another
      required clarification in the draft] ... the respective interface on mobile access gateway?

In section 3.1.3 (and some other places such as IANA), change "Vendor ID" by "Operator PEN ID"

And also add a few sentences about
- whether all operators should or must now register new PENs for this spec.
  I checked for a couple of my local ISPs, and not all of them had a PEN.
- if there is no PEN Operator ID, then ANI type= 3, Op-ID=2 MUST NOT/SHOULD NOT be used
    if "SHOULD NOT", what should be default?
    Operator PEN ID=8653? (not even sure if this is the right thing to do) or 0?
    You want to discuss with the authors of draft-liang-iana-pen-00, be in synch with them.

- Part of the OPS-DIR review, this one was reported by Juergen Quittek:
Section 3.1.1, description of ANI Length:
ANI Length: The description states
  "The value can be in the range of 2 to 32 octets."
I think this is wrong. A value of 2 would only include
the E-bit, the reserved field and a (zero valued) Net-Name-Len
field.  The description implies that a (zero-valued) AP-Name Length
Field is also mandatory. Then you need at least 3 octets, not just 2.
2012-05-23
10 Benoît Claise
[Ballot comment]
- I was wondering about the relationship between the Access Technology Type option and this new Access Network Identifier option. Both of the …
[Ballot comment]
- I was wondering about the relationship between the Access Technology Type option and this new Access Network Identifier option. Both of the required at the same time? I finally discovered the answer in RFC5213: the Access Technology Type is mandatory. That would help to stress this in the document, just in case the readers are not that familiar with RFC5213 (like myself)

-OLD:
  The
  Access Network Identifier mobility option MUST contains one or more
  Access Network Identifier Sub-options.

NEW:
  The
  Access Network Identifier mobility option MUST contain one or more
  Access Network Identifier Sub-options.


- Part of the OPS-DIR review, the following editorial comments were reported by Juergen Quittek:

Section 3.1.1, description of Net-Name length:
Following up on the technical issue above: It is not clear,
if the Network Name may be of length zero.  The description
of the AP-Name Length explicitly states
  "If the access point name is not included, then this length
  MUST be set to a value of zero."
There is no such statement for the Net-Name Length. Please add
A statement, that the Network name MUST NOT be of length zero,
Or add a statement like the cited one from AP-Name length.


Section 3, description of field "Type" under Figure 2:
"(IANA-1)" is highly ambiguous.  Please replace
OLD
  Type:  (IANA-1)
NEW
  It MUST be set to value of (to be defined by IANA),
  indicating that its a Network-Identifier option.


Section 3.1.2, description of N and E flag:
OLD
  N: When the flag (N) is set to a value of (1), it means North, else
      its South
NEW
  N: When the flag (N) is set to a value of (1), it means North, else
      it means South


The same applies accordingly to the E flag.
2012-05-23
10 Benoît Claise Ballot comment and discuss text updated for Benoit Claise
2012-05-23
10 Robert Sparks
[Ballot discuss]
( no change - just reformatting to make this easier to read in the tracker )

Can the document provide more clarity on …
[Ballot discuss]
( no change - just reformatting to make this easier to read in the tracker )

Can the document provide more clarity on what kinds of things the LMA is expecting to use the information carried by this extension for? Specifically, how is geolocation going to be used? Is there normative text in some other document that constrains what the LMA can do with this information? Could it be used, for instance, for dispatching emergency services?

The document is inconsistent in describing what the location represents. Some sections say it is the location of the MAG. Other sections say it is the location of the network (which is very unclear). The security considerations section says it is the location of the mobile node. What this location represents needs to be very clearly stated.

If the security consideration text is correct, and this location is intended to represent (even as coarsely as which AP a user is attached to) the location of the MN, and thus the MN's user,  then the considerations in RFC6280 do come into play, and the document needs to account for them.

What is the expected relationship/trust model between the APs and the MAGs in Figure 1? Are they required to be part of the same administrative domain? What are the consequences if incorrect data is provided when the information is "dynamically obtained through some of out-of-band means".

The geolocation format proposed in this document doesn't allow specifying details like the coordinate reference system. Was reusing an existing format (such as the geo-uri in RFC5870) considered? Is there a need to express precision or uncertainty?
2012-05-23
10 Robert Sparks Ballot discuss text updated for Robert Sparks
2012-05-23
10 Robert Sparks
[Ballot discuss]
Can the document provide more clarity on what kinds of things the LMA is expecting to use
the information carried by this extension …
[Ballot discuss]
Can the document provide more clarity on what kinds of things the LMA is expecting to use
the information carried by this extension for? Specifically, how is geolocation going to
be used? Is there normative text in some other document that constrains what the LMA can
do with this information? Could it be used, for instance, for dispatching emergency services?

The document is inconsistent in describing what the location represents. Some sections say
it is the location of the MAG. Other sections say it is the location of the network (which is very unclear).
The security considerations section says it is the location of the mobile node.
What this location represents needs to be very clearly stated.

If the security consideration text is correct, and this location is intended to represent
(even as coarsely as which AP a user is attached to) the location of the MN, and thus the MN's user,
then the considerations in RFC6280 do come into play, and the document needs to account for them.

What is the expected relationship/trust model between the APs and the MAGs in Figure 1? Are they
required to be part of the same administrative domain? What are the consequences if incorrect
data is provided when the information is "dynamically obtained through some of out-of-band means".

The geolocation format proposed in this document doesn't allow specifying details like the coordinate
reference system. Was reusing an existing format (such as the geo-uri in RFC5870) considered?
Is there a need to express precision or uncertainty?
2012-05-23
10 Robert Sparks [Ballot Position Update] New position, Discuss, has been recorded for Robert Sparks
2012-05-23
10 Adrian Farrel
[Ballot comment]
This is a not-quite-Discuss Comment

I think a number of references listed as Informative need to be moved
to Normative. Specifically:

SMI
RFC …
[Ballot comment]
This is a not-quite-Discuss Comment

I think a number of references listed as Informative need to be moved
to Normative. Specifically:

SMI
RFC 3629
RFC 1035
RFC 6275

I am in two mindsabout RFC2460.

Happy to discuss why/whether this would be appropriate, but it looks
like the uses are explicit "do encode this thing you need to read this
reference" type of statements.
2012-05-23
10 Adrian Farrel [Ballot Position Update] New position, No Objection, has been recorded for Adrian Farrel
2012-05-23
10 Ron Bonica [Ballot Position Update] New position, No Objection, has been recorded for Ronald Bonica
2012-05-23
10 Stewart Bryant [Ballot Position Update] New position, No Objection, has been recorded for Stewart Bryant
2012-05-22
10 Ralph Droms
[Ballot discuss]
I have a concern about tying the interpretation of the "Network Name"
field in the Network-Identifier Sub-option to the Access Technology
type in …
[Ballot discuss]
I have a concern about tying the interpretation of the "Network Name"
field in the Network-Identifier Sub-option to the Access Technology
type in the Access Technology Type option.  Why not put a "Network
Name Type" field - there's a handy set of Reserved bits available -
that explicitly identifies the type of the Network Name?

Without a "Network Name Type" field, the definition of a new Access
Technology type will have to include the definition of the
interpretation of the "Network Name" field.
2012-05-22
10 Ralph Droms [Ballot Position Update] New position, Discuss, has been recorded for Ralph Droms
2012-05-22
10 Pete Resnick
[Ballot discuss]
3.1.1

  'E'-bit:  1-bit flag for representing the encoding of the following
      name field.  MUST be set to zero (0) …
[Ballot discuss]
3.1.1

  'E'-bit:  1-bit flag for representing the encoding of the following
      name field.  MUST be set to zero (0) if the network name is
      encoded using 8-bit octets or to one (1) if the network name is
      encoded using UTF-8 [RFC3629].

So, I want to understand the semantics of the below network name field if the 'E'-bit is 0. What does it mean to be 8-bit octets that are not UTF-8? What is it then? And I'm not sure this is even correct, since further down in the definition of Network Name you say, "Encoding MUST be UTF-8." Something is funky here. Please explain.

(BTW: RFC3629 is a normative reference, not informative. Please correct that in section 9. I think there are probably several things you've got in the wrong place.)

  Net-Name Length:  8-bit field for representing the length of the
      network name to be followed.

I think you want to specifically say "in octets", since if it's UTF-8, characters is probably *not* what you mean.

3.1.3

      2 -  Realm of the operator.  Realm names are required to be
        unique, and are piggybacked on the administration of the DNS
        namespace.  Realms are encoded using a domain name encoding
        defined in [RFC1035].

  Operator Identifier:  Up to 253 octets of the operator identifier.
      The encoding of the identifier depends on the used Operator-ID
      Type.  Numeric values are encoded in network byte order and
      strings are in UTF-8 representation and have no terminating '\0'
      mark.

So the first part above says that the domain names are encoded to RFC 1035. Are you talking there about the letter-digit-hyphen rules of 2.3.1 of 1035? If so, you should say that. However, if that's what you mean, then clearly those are all US-ASCII. The second part says that "strings are in UTF-8 representation". Now I'm confused. Are you intending to allow things outside of US-ASCII, e.g. unencoded UTF-8 U-labels for IDNs? Something is not right about the above. I also have no idea why you have the note about the terminating '\0'. Please explain.

Now, all that said, I'm a bit worried about the lack of information on how to compare these things that appears in section 4. Comparing network names you seem to leave to DHCP, but others you don't talk about. If you have to compare these things, are you going to (and do you have to) deal with comparing UTF-8 strings which have different normalizations? Perhaps the answer is "no" and these are not things that need to compare if one contains "latin small 'o' followed by combining diaeresis" and the other contains "latin small 'o' with diaeresis". But if these two *do* have to compare as identical, you're going to need to say more about how those comparisons (and normalizations) happen.
2012-05-22
10 Pete Resnick [Ballot Position Update] New position, Discuss, has been recorded for Pete Resnick
2012-05-22
10 Russ Housley [Ballot Position Update] New position, No Objection, has been recorded for Russ Housley
2012-05-22
10 Benoît Claise
[Ballot discuss]
-The term "vendor" is confusing

  Vendor ID

      The Vendor ID is the SMI Network Management Private Enterprise
    …
[Ballot discuss]
-The term "vendor" is confusing

  Vendor ID

      The Vendor ID is the SMI Network Management Private Enterprise
      Code of the IANA-maintained Private Enterprise Numbers registry
      [SMI].

The example in figure 1 speaks about: "Operator-Id: provider2.example.com"
Vendor Id, in the network management world is the manufacturer id, while you're after the Operator-Id
I see what you want to do, but this is confusing. Also, do we expect that all operators will have Private Enterprise Number?

Maybe you want to redefine this with something such as (I trust you on the right wording)

  Operator PEN ID

      SMI Network Management Private Enterprise
      Code of the IANA-maintained Private Enterprise Numbers registry
      [SMI] for the operator running ... [actually running what, that's another
      required clarification in the draft] ... the respective interface on mobile access gateway?

In section 3.1.3 (and some other places such as IANA), change "Vendor ID" by "Operator PEN ID"

And also add a few sentences about
- whether all operators should or must now register new PENs for this spec.
  I checked for a couple of my local ISPs, and not all of them had a PEN.
- if there is no PEN Operator ID, then ANI type= 3, Op-ID=2 MUST NOT/SHOULD NOT be used
    if "SHOULD NOT", what should be default?
    Operator PEN ID=8653? (not even sure if this is the right thing to do) or 0?
    You want to discuss with the authors of draft-liang-iana-pen-00, be in synch with them.
2012-05-22
10 Benoît Claise
[Ballot comment]
- I was wondering about the relationship between the Access Technology Type option and this new Access Network Identifier option. Both of the …
[Ballot comment]
- I was wondering about the relationship between the Access Technology Type option and this new Access Network Identifier option. Both of the required at the same time? I finally discovered the answer in RFC5213: the Access Technology Type is mandatory. That would help to stress this in the document, just in case the readers are not that familiar with RFC5213 (like myself)

-OLD:
  The
  Access Network Identifier mobility option MUST contains one or more
  Access Network Identifier Sub-options.

NEW:
  The
  Access Network Identifier mobility option MUST contain one or more
  Access Network Identifier Sub-options.
2012-05-22
10 Benoît Claise [Ballot Position Update] New position, Discuss, has been recorded for Benoit Claise
2012-05-21
10 Wesley Eddy [Ballot Position Update] New position, No Objection, has been recorded for Wesley Eddy
2012-05-21
10 Stephen Farrell
[Ballot discuss]

(1) Why doesn't this use geopriv?

(2) Why is it ok to send the MN location (3.1.2) without asking
the user?

(3) Why …
[Ballot discuss]

(1) Why doesn't this use geopriv?

(2) Why is it ok to send the MN location (3.1.2) without asking
the user?

(3) Why is it ok to send SSID and AP name  without asking the
user?  Many of those are pretty revealing as to MN location.

(4) I looked at 6275 and 5213 and its not clear to me that
these sensitive values, if sent, MUST be protected using IPsec
with strong confidentiality and mutual authentication. The
authentication part may be ok according to the documents, but
I'm not sure if that's the deployed reality. Is it? But even if
so, there's nothing much that I can see to ensure
confidentiality for this information. Where's all that
(clearly) specified?
2012-05-21
10 Stephen Farrell [Ballot Position Update] New position, Discuss, has been recorded for Stephen Farrell
2012-05-21
10 Martin Stiemerling [Ballot Position Update] New position, No Objection, has been recorded for Martin Stiemerling
2012-05-17
10 Jean Mahoney Request for Telechat review by GENART is assigned to Alexey Melnikov
2012-05-17
10 Jean Mahoney Request for Telechat review by GENART is assigned to Alexey Melnikov
2012-05-16
10 Barry Leiba
[Ballot comment]
IANA Considerations rant:

  o  Action-1: This specification defines a new Mobility Header option,
      the Access Network Identifier.  This mobility …
[Ballot comment]
IANA Considerations rant:

  o  Action-1: This specification defines a new Mobility Header option,
      the Access Network Identifier.  This mobility option is described
      in Section 3.  The Type value for this option needs to be assigned
      from the same numbering space as allocated for the other mobility
      options, as defined in [RFC6275].

I noticed the same problem that confused IANA, and was going to kick in a DISCUSS to get it fixed: the registry is called "Mobility Options", and referring to it as a "Mobility Header option" confused it with the "Mobility Header Types" registry.  No need for the DISCUSS, though, because the author noticed the error in Pearl's proposed IANA actions, and sorted it out by email.

So this comment will just serve to beat people up about this, and to rant a bit.  You can otherwise ignore it:
Folks, it's just not that hard to go to http://www.iana.org/protocols/ and actually *look up* the correct name of the registry you aim to use... and then to use the *exact* name.  Please be specific and accurate; it's important.
2012-05-16
10 Barry Leiba [Ballot Position Update] New position, No Objection, has been recorded for Barry Leiba
2012-05-14
10 Brian Haberman Changed protocol writeup
2012-05-14
10 Brian Haberman State changed to IESG Evaluation from Waiting for AD Go-Ahead
2012-05-14
10 Brian Haberman Placed on agenda for telechat - 2012-05-24
2012-05-14
10 Brian Haberman Ballot has been issued
2012-05-14
10 Brian Haberman [Ballot Position Update] New position, Yes, has been recorded for Brian Haberman
2012-05-14
10 Brian Haberman Created "Approve" ballot
2012-05-14
10 Brian Haberman Ballot writeup was changed
2012-05-09
10 (System) State changed to Waiting for AD Go-Ahead from In Last Call
2012-05-07
10 Alexey Melnikov Request for Last Call review by GENART Completed. Reviewer: Alexey Melnikov.
2012-05-01
10 Pearl Liang
IESG:

IANA has reviewed draft-ietf-netext-access-network-option-10 and has
the following comments:

IANA understands that, upon approval of this document, there are
three actions which IANA must …
IESG:

IANA has reviewed draft-ietf-netext-access-network-option-10 and has
the following comments:

IANA understands that, upon approval of this document, there are
three actions which IANA must complete.

First, a new Mobility Header Type - for the MH Type field in the Mobility Header
will be registered. The new registration will take place in the Mobility Header
Type subregistry of the Mobile IPv6 parameters registry located at:

http://www.iana.org/assignments/mobility-parameters/mobility-parameters.xml

as follows:

Value: [ tbd ]
Description: Access Network Identifier
Reference: [ RFC-to-be ]

Second, IANA is to create a new subregistry of the Mobile IPv6 parameters
registry located at:

http://www.iana.org/assignments/mobility-parameters/mobility-parameters.xml

The new registry will be called the "Access Network Information (ANI)
sub-option" registry. Management of the new subregistry will be through
Expert Review. The reference for the new sub-registry is [ RFC-to-be ].
There are initial values for the registry as follows:

ANI
Sub-option Description Reference
-----------+------------------------------------------+--------------
0 Reserved [ RFC-to-be ]
1 Network-Identifier Sub-option [ RFC-to-be ]
2 Geo-Location Sub-option [ RFC-to-be ]
3 Operator-Identifier Sub-option [ RFC-to-be ]

Third, IANA is to create a new subregistry of the Mobile IPv6 parameters
registry located at:

http://www.iana.org/assignments/mobility-parameters/mobility-parameters.xml

This new registry will be called the "Operator-Identifier Sub-Option of the
Access Network Identifier"

Management of the new subregistry will be through Expert Review.
The reference for the new sub-registry is [ RFC-to-be ]. There are
initial values for the registry as follows:

Operator
Identifier
Sub-Option Description Reference
------------+--------------------------------------------+--------------
0 Reserved [ RFC-to-be ]
1 Vendor ID as four octet Private Enterprise [ RFC-to-be ]
Number
2 Realm of the Operator [ RFC-to-be ]

IANA understands that these are the only actions required upon approval
of the document.

Note: The actions requested in this document will not be completed
until the document has been approved for publication as an RFC.
This message is only to confirm what actions will be performed.
2012-04-26
10 Jean Mahoney Request for Last Call review by GENART is assigned to Alexey Melnikov
2012-04-26
10 Jean Mahoney Request for Last Call review by GENART is assigned to Alexey Melnikov
2012-04-26
10 Samuel Weiler Request for Last Call review by SECDIR is assigned to Lt. Mundy
2012-04-26
10 Samuel Weiler Request for Last Call review by SECDIR is assigned to Lt. Mundy
2012-04-25
10 Amy Vezza Last call sent
2012-04-25
10 Amy Vezza
State changed to In Last Call from Last Call Requested

The following Last Call Announcement was sent out:

From: The IESG

To: IETF-Announce

CC:

Reply-To: …
State changed to In Last Call from Last Call Requested

The following Last Call Announcement was sent out:

From: The IESG

To: IETF-Announce

CC:

Reply-To: ietf@ietf.org

Subject: Last Call:  (Access Network Identifier (ANI) Option for Proxy Mobile IPv6) to Proposed Standard





The IESG has received a request from the Network-Based Mobility

Extensions WG (netext) to consider the following document:

- 'Access Network Identifier (ANI) Option for Proxy Mobile IPv6'

  as a Proposed Standard



The IESG plans to make a decision in the next few weeks, and solicits

final comments on this action. Please send substantive comments to the

ietf@ietf.org mailing lists by 2012-05-09. Exceptionally, comments may be

sent to iesg@ietf.org instead. In either case, please retain the

beginning of the Subject line to allow automated sorting.



Abstract





  The local mobility anchor in a Proxy Mobile IPv6 domain is able to

  provide access network and access operator specific handling or

  policing of the mobile node traffic using information about the

  access network to which the mobile node is attached.  This

  specification defines a mechanism and a related mobility option for

  carrying the access network identifier and the access operator

  identification information from the mobile access gateway to the

  local mobility anchor over Proxy Mobile IPv6.









The file can be obtained via

http://datatracker.ietf.org/doc/draft-ietf-netext-access-network-option/



IESG discussion can be tracked via

http://datatracker.ietf.org/doc/draft-ietf-netext-access-network-option/ballot/





No IPR declarations have been submitted directly on this I-D.





2012-04-25
10 Brian Haberman Last call was requested
2012-04-25
10 Brian Haberman Last call announcement was generated
2012-04-25
10 Brian Haberman Ballot approval text was generated
2012-04-25
10 Brian Haberman Ballot writeup was generated
2012-04-25
10 Brian Haberman State changed to Last Call Requested from AD Evaluation::AD Followup
2012-04-25
10 (System) Sub state has been changed to AD Followup from Revised ID Needed
2012-04-25
10 Sri Gundavelli New version available: draft-ietf-netext-access-network-option-10.txt
2012-04-25
09 Brian Haberman State changed to AD Evaluation::Revised ID Needed from AD Evaluation
2012-04-25
09 Brian Haberman State changed to AD Evaluation from Publication Requested
2012-04-25
09 Sri Gundavelli New version available: draft-ietf-netext-access-network-option-09.txt
2012-04-19
08 Cindy Morgan
(1) What type of RFC is being requested (BCP, Proposed Standard,
Internet Standard, Informational, Experimental, or Historic)? Why
is this the proper type of RFC? …
(1) What type of RFC is being requested (BCP, Proposed Standard,
Internet Standard, Informational, Experimental, or Historic)? Why
is this the proper type of RFC? Is this type of RFC indicated in the
title page header?

Proposed Standard

(2) The IESG approval announcement includes a Document Announcement
Write-Up. Please provide such a Document Announcement Write-Up. Recent
examples can be found in the "Action" announcements for approved
documents. The approval announcement contains the following sections:

Technical Summary

The local mobility anchor in a Proxy Mobile IPv6 domain is able to
provide access network and access operator specific handling or
policing of the mobile node traffic using information about the
access network to which the mobile node is attached. This
specification defines a mechanism and a related mobility option for
carrying the access network identifier and the access operator
identification information from the mobile access gateway to the
local mobility anchor using proxy mobile IPv6 signaling messages.

Working Group Summary

The I-D has followed normal IETF WG process and has consensus
regarding the proposed extension to Proxy Mobile IPv6. There have
been no controversies or opposition to this proposal.

Document Quality

No known or announced implementations of the protocol exist. However
there may be unannounced implementations in progress. Multiple
vendors have indicated interest in implementing these extensions in
their products.
The I-D has undergone multiple reviews and they have been
acknowledged in the document itself.

Personnel

Who is the Document Shepherd? Who is the Responsible Area
Director?

Document shepherd: Basavaraj Patil
Responsible AD: Brian Haberman

(3) Briefly describe the review of this document that was performed by
the Document Shepherd. If this version of the document is not ready
for publication, please explain why the document is being forwarded to
the IESG.

I have reviewed multiple versions of the I-D and have suggested
changes to the text which have been incorporated. Questions about
security (specifically provady) also have been addressed
satisfactorily. Hence I believe the I-D is ready to be forwarded to
the IESG.

(4) Does the document Shepherd have any concerns about the depth or
breadth of the reviews that have been performed?

No concerns. I am satisfied with the number as well as depth and
breadth of the reviews.

(5) Do portions of the document need review from a particular or from
broader perspective, e.g., security, operational complexity, AAA, DNS,
DHCP, XML, or internationalization? If so, describe the review that
took place.

I do not believe there is a need for a broader review or review by
specific experts from the area of security or internationalization
etc.

(6) Describe any specific concerns or issues that the Document Shepherd
has with this document that the Responsible Area Director and/or the
IESG should be aware of? For example, perhaps he or she is uncomfortable
with certain parts of the document, or has concerns whether there really
is a need for it. In any event, if the WG has discussed those issues and
has indicated that it still wishes to advance the document, detail those
concerns here.

I have no concerns with this document and additionally do not believe
that WG members have any concerns either.

(7) Has each author confirmed that any and all appropriate IPR
disclosures required for full conformance with the provisions of BCP 78
and BCP 79 have already been filed. If not, explain why.

Each of the author has confirmed that any and all appropriate IPR
disclosures required for full conformance with the provisions of BCP 78
and BCP 79 have already been filed

(8) Has an IPR disclosure been filed that references this document?
If so, summarize any WG discussion and conclusion regarding the IPR
disclosures.

No IPR disclosure that references this I-D has been filed.

(9) How solid is the WG consensus behind this document? Does it
represent the strong concurrence of a few individuals, with others
being silent, or does the WG as a whole understand and agree with it?

There is sufficient WG consensus behind this document. As has been the
norm a few core contributors in the WG are supportive of the I-D and
approve of it while the majority are silent. However I do believe that
the WG as a whole understands this I-D and the proposed extensions.

(10) Has anyone threatened an appeal or otherwise indicated extreme
discontent? If so, please summarise the areas of conflict in separate
email messages to the Responsible Area Director. (It should be in a
separate email because this questionnaire is publicly available.)

No threats of an appeal have been raised or for that matter extreme
discontent with this I-D.

(11) Identify any ID nits the Document Shepherd has found in this
document. (See http://www.ietf.org/tools/idnits/ and the Internet-Drafts
Checklist). Boilerplate checks are not enough; this check needs to be
thorough.

The idnits tool does not raise any flags or problems with this I-D.

(12) Describe how the document meets any required formal review
criteria, such as the MIB Doctor, media type, and URI type reviews.

This I-D does not specify a MIB, media type or URI type.

(13) Have all references within this document been identified as
either normative or informative?

Yes.

(14) Are there normative references to documents that are not ready for
advancement or are otherwise in an unclear state? If such normative
references exist, what is the plan for their completion?

All normative references are published RFCs.

(15) Are there downward normative references references (see RFC 3967)?
If so, list these downward references to support the Area Director in the
Last Call procedure.

No.

(16) Will publication of this document change the status of any
existing RFCs? Are those RFCs listed on the title page header, listed
in the abstract, and discussed in the introduction? If the RFCs are not
listed in the Abstract and Introduction, explain why, and point to the
part of the document where the relationship of this document to the
other RFCs is discussed. If this information is not in the document,
explain why the WG considers it unnecessary.

Publication of this document does not affect any existing RFCs. This
I-D specifies an extension to Proxy MIP6 signaling and does not change
the status of any other published RFC.

(17) Describe the Document Shepherd's review of the IANA considerations
section, especially with regard to its consistency with the body of the
document. Confirm that all protocol extensions that the document makes
are associated with the appropriate reservations in IANA registries.
Confirm that any referenced IANA registries have been clearly
identified. Confirm that newly created IANA registries include a
detailed specification of the initial contents for the registry, that
allocations procedures for future registrations are defined, and a
reasonable name for the new registry has been suggested (see RFC
5226
).

I have reviewed the IANA section and believe that sufficient
and appropriate information w.r.t the proposed extensions, and the
actions needed by IANA have been specified.

(18) List any new IANA registries that require Expert Review for future
allocations. Provide any public guidance that the IESG would find
useful in selecting the IANA Experts for these new registries.

No new registry is proposed by this I-D.

(19) Describe reviews and automated checks performed by the Document
Shepherd to validate sections of the document written in a formal
language, such as XML code, BNF rules, MIB definitions, etc.

This I-D does not include any XML code, BNF rules or MIB definitions
which would require an automated check and review.
2012-04-19
08 Cindy Morgan Note added 'Basavaraj Patil (Basavaraj.Patil@nokia.com) is the document shepherd.'
2012-04-19
08 Cindy Morgan Intended Status changed to Proposed Standard
2012-04-19
08 Cindy Morgan IESG process started in state Publication Requested
2012-04-19
08 (System) Earlier history may be found in the Comment Log for draft-gundavelli-netext-access-network-option
2012-04-14
08 Sri Gundavelli New version available: draft-ietf-netext-access-network-option-08.txt
2012-03-08
07 Basavaraj Patil IETF state changed to In WG Last Call from WG Document
2012-02-09
06 (System) New version available: draft-ietf-netext-access-network-option-06.txt
2012-02-09
07 Basavaraj Patil
Hello,

This is the working group last call for the I-D:
Access Network Identifier (ANI) Option for Proxy Mobile IPv6


The I-D has been updated …
Hello,

This is the working group last call for the I-D:
Access Network Identifier (ANI) Option for Proxy Mobile IPv6


The I-D has been updated by the authors following multiple reviews
that have been posted on the mailing list.

Abstract:

  This specification defines a mechanism and a related mobility option
  for carrying the access network identifier and the access operator
  identification information from the mobile access gateway to the
  local mobility anchor over Proxy Mobile IPv6.  Based on the received
  information, the local mobility anchor is able to provide access
  network and access operator specific handling or policing for the
  mobile node traffic.

The I-D is intended for publication as a proposed standard.
The deadline for receiving comments (i.e end of WG LC) is March 2nd,
2012.
Please send your review comments to the mailing list or authors.

-Chairs
2012-01-26
05 (System) New version available: draft-ietf-netext-access-network-option-05.txt
2012-01-07
04 (System) New version available: draft-ietf-netext-access-network-option-04.txt
2012-01-03
03 (System) New version available: draft-ietf-netext-access-network-option-03.txt
2011-12-27
02 (System) New version available: draft-ietf-netext-access-network-option-02.txt
2011-12-27
01 (System) New version available: draft-ietf-netext-access-network-option-01.txt
2011-08-22
00 (System) New version available: draft-ietf-netext-access-network-option-00.txt