Internet Protocol, Version 6 (IPv6) Specification
draft-ietf-6man-rfc2460bis-13
Revision differences
Document history
Date | Rev. | By | Action |
---|---|---|---|
2017-07-11
|
13 | (System) | RFC Editor state changed to AUTH48-DONE from AUTH48 |
2017-06-29
|
13 | (System) | RFC Editor state changed to AUTH48 from RFC-EDITOR |
2017-06-26
|
13 | (System) | RFC Editor state changed to RFC-EDITOR from EDIT |
2017-05-26
|
13 | (System) | IANA Action state changed to RFC-Ed-Ack from Waiting on RFC Editor |
2017-05-25
|
13 | (System) | IANA Action state changed to Waiting on RFC Editor from In Progress |
2017-05-25
|
13 | (System) | IANA Action state changed to In Progress from Waiting on Authors |
2017-05-24
|
13 | (System) | IANA Action state changed to Waiting on Authors from In Progress |
2017-05-24
|
13 | (System) | IANA Action state changed to In Progress from Waiting on Authors |
2017-05-24
|
13 | (System) | IANA Action state changed to Waiting on Authors from In Progress |
2017-05-23
|
13 | (System) | RFC Editor state changed to EDIT |
2017-05-23
|
13 | (System) | IESG state changed to RFC Ed Queue from Approved-announcement sent |
2017-05-23
|
13 | (System) | Announcement was received by RFC Editor |
2017-05-22
|
13 | (System) | IANA Action state changed to In Progress |
2017-05-22
|
13 | Amy Vezza | IESG state changed to Approved-announcement sent from Approved-announcement to be sent |
2017-05-22
|
13 | Amy Vezza | IESG has approved the document |
2017-05-22
|
13 | Amy Vezza | Closed "Approve" ballot |
2017-05-22
|
13 | Amy Vezza | Ballot approval text was generated |
2017-05-19
|
13 | Suresh Krishnan | IESG state changed to Approved-announcement to be sent from IESG Evaluation::AD Followup |
2017-05-19
|
13 | Alvaro Retana | [Ballot comment] Thanks for addressing the points in my DISCUSS. |
2017-05-19
|
13 | Alvaro Retana | [Ballot Position Update] Position for Alvaro Retana has been changed to No Objection from Discuss |
2017-05-19
|
13 | Bob Hinden | New version available: draft-ietf-6man-rfc2460bis-13.txt |
2017-05-19
|
13 | (System) | New version approved |
2017-05-19
|
13 | (System) | Request for posting confirmation emailed to previous authors: Robert Hinden , 6man-chairs@ietf.org |
2017-05-19
|
13 | Bob Hinden | Uploaded new revision |
2017-05-19
|
12 | Mirja Kühlewind | [Ballot comment] Thanks for addressing my discuss. Please put a reference to RFC6465 in there to make sure that these RFCs do run out of … [Ballot comment] Thanks for addressing my discuss. Please put a reference to RFC6465 in there to make sure that these RFCs do run out of sync. |
2017-05-19
|
12 | Mirja Kühlewind | [Ballot Position Update] Position for Mirja Kühlewind has been changed to No Objection from Discuss |
2017-05-19
|
13 | (System) | Request for posting confirmation emailed to previous authors: Robert Hinden , 6man-chairs@ietf.org |
2017-05-19
|
13 | Bob Hinden | Uploaded new revision |
2017-05-18
|
12 | Jean Mahoney | Closed request for Telechat review by GENART with state 'Team Will not Review Version' |
2017-05-16
|
12 | Bob Hinden | New version available: draft-ietf-6man-rfc2460bis-12.txt |
2017-05-16
|
12 | (System) | New version approved |
2017-05-16
|
12 | (System) | Request for posting confirmation emailed to previous authors: Robert Hinden , 6man-chairs@ietf.org |
2017-05-16
|
12 | Bob Hinden | Uploaded new revision |
2017-05-08
|
11 | Mirja Kühlewind | [Ballot discuss] Thanks for addressing my discuss. Text on rfc3168 is fine! I'm also okay with the text on extension headers, however, I have one … [Ballot discuss] Thanks for addressing my discuss. Text on rfc3168 is fine! I'm also okay with the text on extension headers, however, I have one remaining processing question: Now the text uses similar but not the same wording as RFC6564. RFC6564 says "new IPv6 extension headers MUST NOT be created or specified, ..." and this draft says "Defining new IPv6 extension headers is not recommended, ..." in not normative language. Is that on purpose? Does this draft need to absolete RFC6564 or refer or whatever? |
2017-05-08
|
11 | Mirja Kühlewind | Ballot comment and discuss text updated for Mirja Kühlewind |
2017-04-28
|
11 | Bob Hinden | New version available: draft-ietf-6man-rfc2460bis-11.txt |
2017-04-28
|
11 | (System) | New version approved |
2017-04-28
|
11 | (System) | Request for posting confirmation emailed to previous authors: Robert Hinden , 6man-chairs@ietf.org |
2017-04-28
|
11 | Bob Hinden | Uploaded new revision |
2017-04-22
|
10 | Kathleen Moriarty | [Ballot comment] Thanks for updating the Security Considerations section, I was glad to see the references added to the fragmentation work that had already been … [Ballot comment] Thanks for updating the Security Considerations section, I was glad to see the references added to the fragmentation work that had already been done. If the TLS and SSH reference remain in the document, references would be good - RFC7525 and RFC4250-4254, but my preference would be to delete the sentence as this document is about IPv6 and developers and implementers of this standard wouldn't need those references, IPsec is enough. |
2017-04-22
|
10 | Kathleen Moriarty | Ballot comment text updated for Kathleen Moriarty |
2017-04-22
|
10 | Kathleen Moriarty | [Ballot comment] Thanks for updating the Security Considerations section. |
2017-04-22
|
10 | Kathleen Moriarty | [Ballot Position Update] Position for Kathleen Moriarty has been changed to No Objection from Discuss |
2017-04-22
|
10 | Mirja Kühlewind | [Ballot discuss] I'm changing this discuss because I believe changes regarding any text in section 4.8 would mostly be editorial at this point if any. … [Ballot discuss] I'm changing this discuss because I believe changes regarding any text in section 4.8 would mostly be editorial at this point if any. I would still like to see more background information explaining the situation and risks, rather than just giving a general recommendation that might even out-date in cases routers get updated accordingly in future. However, I holding this discuss, because the ECN issue I originally only raised as a question in the comment section really needs to be addressed. Hope to wrap this up soon. It's about this text: Section 4.5: "The number and content of the headers preceding the Fragment header of different fragments of the same original packet may differ. Whatever headers are present, preceding the Fragment header in each fragment packet, are processed when the packets arrive, prior to queueing the fragments for reassembly. Only those headers in the Offset zero fragment packet are retained in the reassembled packet." The ECN codepoint may differ in each fragment and RFC3168 speficies handling for reassembly. |
2017-04-22
|
10 | Mirja Kühlewind | [Ballot comment] My discuss was mainly on text in section 4.8 (also based on the tsv-art review -> Thanks Martin!): I find the recommendation to … [Ballot comment] My discuss was mainly on text in section 4.8 (also based on the tsv-art review -> Thanks Martin!): I find the recommendation to basically just not use hop-by-hop headers in section 4.8 extremely unsatisfying. Can we maybe do better? Wouldn't it be maybe time to just deprecate the current hop-by-hop number an assign a new one? I know that also has deployment problem but maybe it's worth a try. I guess the assignment could happen in a new document though, but the deprecation could be done here. This related to this comment from Martin's review, also proposing a potential way forward: "- Section 4.8. "Defining New Extension Headers and Options": It says new hop-by-hop headers must never ever defined. This is problematic, as this closing the door forever, even if future instances of the IETF do would like to wish to define new hop-by-hop headers. A better way would have to say "that new hop-by-hop headers must have IETF consensus". - Section 4.8. "Defining New Extension Headers and Options": Also the „not recommended“ to define new extension headers looks strange, especially with the phrase "There has to be a very clear justification". The term "clear justification" is not an exact engineering specification. Why not using "technical protocol specification and real word use case required, plus IETF consensus"?" As a side note, there is at least one experimental RFC that defines a destination option to be inspected by a network device, given the know problems of hop-by-hop option which renders them unusable. |
2017-04-22
|
10 | Mirja Kühlewind | Ballot comment and discuss text updated for Mirja Kühlewind |
2017-04-21
|
10 | Eric Rescorla | [Ballot Position Update] Position for Eric Rescorla has been changed to No Objection from Discuss |
2017-04-21
|
10 | (System) | Sub state has been changed to AD Followup from Revised ID Needed |
2017-04-21
|
10 | (System) | IANA Review state changed to Version Changed - Review Needed from IANA OK - Actions Needed |
2017-04-21
|
10 | Bob Hinden | New version available: draft-ietf-6man-rfc2460bis-10.txt |
2017-04-21
|
10 | (System) | New version approved |
2017-04-21
|
10 | (System) | Request for posting confirmation emailed to previous authors: Robert Hinden , 6man-chairs@ietf.org |
2017-04-21
|
10 | Bob Hinden | Uploaded new revision |
2017-04-21
|
09 | Gunter Van de Velde | Request for Early review by OPSDIR Completed: Has Issues. Reviewer: Linda Dunbar. |
2017-04-21
|
09 | Gunter Van de Velde | Request for Early review by OPSDIR is assigned to Linda Dunbar |
2017-04-21
|
09 | Gunter Van de Velde | Request for Early review by OPSDIR is assigned to Linda Dunbar |
2017-04-21
|
09 | Gunter Van de Velde | Requested Early review by OPSDIR |
2017-04-21
|
09 | Gunter Van de Velde | Closed request for Last Call review by OPSDIR with state 'No Response' |
2017-04-19
|
09 | Mirja Kühlewind | [Ballot discuss] I'm changing this discuss because I believe changes regarding any text in section 4.8 would mostly be editorial at this point if any. … [Ballot discuss] I'm changing this discuss because I believe changes regarding any text in section 4.8 would mostly be editorial at this point if any. I would still like to see more background information explaining the situation and risks, rather than just giving a general recommendation that might even out-date in cases routers get updated accordingly in future. However, I holding this discuss, because the ECN issue I originally only raised as a question in the comment section really needs to be addressed. Hope to wrap this up soon. |
2017-04-19
|
09 | Mirja Kühlewind | [Ballot comment] My discuss was mainly on text in section 4.8 (also based on the tsv-art review -> Thanks Martin!): I find the recommendation to … [Ballot comment] My discuss was mainly on text in section 4.8 (also based on the tsv-art review -> Thanks Martin!): I find the recommendation to basically just not use hop-by-hop headers in section 4.8 extremely unsatisfying. Can we maybe do better? Wouldn't it be maybe time to just deprecate the current hop-by-hop number an assign a new one? I know that also has deployment problem but maybe it's worth a try. I guess the assignment could happen in a new document though, but the deprecation could be done here. This related to this comment from Martin's review, also proposing a potential way forward: "- Section 4.8. "Defining New Extension Headers and Options": It says new hop-by-hop headers must never ever defined. This is problematic, as this closing the door forever, even if future instances of the IETF do would like to wish to define new hop-by-hop headers. A better way would have to say "that new hop-by-hop headers must have IETF consensus". - Section 4.8. "Defining New Extension Headers and Options": Also the „not recommended“ to define new extension headers looks strange, especially with the phrase "There has to be a very clear justification". The term "clear justification" is not an exact engineering specification. Why not using "technical protocol specification and real word use case required, plus IETF consensus"?" As a side note, there is at least one experimental RFC that defines a destination option to be inspected by a network device, given the know problems of hop-by-hop option which renders them unusable. One question because I'm not sure if I interpret this correct to make it part of my discuss: Section 4.5: "The number and content of the headers preceding the Fragment header of different fragments of the same original packet may differ. Whatever headers are present, preceding the Fragment header in each fragment packet, are processed when the packets arrive, prior to queueing the fragments for reassembly. Only those headers in the Offset zero fragment packet are retained in the reassembled packet." Does this mean the ECN codepoint (part of the Traffic Class field) is copied from the first fragment? This doesn't seem to be correct, however, also not sure what the correct answer is. I know this was not changed in this revision but maybe we can still get this right. |
2017-04-19
|
09 | Mirja Kühlewind | Ballot comment and discuss text updated for Mirja Kühlewind |
2017-04-13
|
09 | Cindy Morgan | IESG state changed to IESG Evaluation::Revised I-D Needed from IESG Evaluation |
2017-04-13
|
09 | Cindy Morgan | Changed consensus to Yes from Unknown |
2017-04-13
|
09 | Kathleen Moriarty | [Ballot discuss] I would also like to see an updated security considerations section specific to IPv6 and have the opportunity to review that prior to … [Ballot discuss] I would also like to see an updated security considerations section specific to IPv6 and have the opportunity to review that prior to publication of this draft. |
2017-04-13
|
09 | Kathleen Moriarty | [Ballot comment] I agree with the SecDir reviewer that the text should not be limited to privacy. s/exposure of private information/exposure of confidential information/ |
2017-04-13
|
09 | Kathleen Moriarty | [Ballot Position Update] New position, Discuss, has been recorded for Kathleen Moriarty |
2017-04-13
|
09 | Tero Kivinen | Request for Telechat review by SECDIR Completed: Has Issues. Reviewer: Hilarie Orman. |
2017-04-13
|
09 | Alexey Melnikov | [Ballot comment] I support Ekr's DISCUSS (and most of his comments should be DISCUSSes) and Alvaro's DISCUSS. |
2017-04-13
|
09 | Alexey Melnikov | [Ballot Position Update] New position, No Objection, has been recorded for Alexey Melnikov |
2017-04-12
|
09 | Spencer Dawkins | [Ballot Position Update] New position, No Objection, has been recorded for Spencer Dawkins |
2017-04-12
|
09 | Alia Atlas | [Ballot comment] I think it is valuable and accurate to express the maturity of IPv6 by making it an Internet Standard as the transition to … [Ballot comment] I think it is valuable and accurate to express the maturity of IPv6 by making it an Internet Standard as the transition to IPv6 accelerates. |
2017-04-12
|
09 | Alia Atlas | [Ballot Position Update] New position, Yes, has been recorded for Alia Atlas |
2017-04-12
|
09 | Warren Kumari | [Ballot Position Update] New position, No Objection, has been recorded for Warren Kumari |
2017-04-12
|
09 | Deborah Brungard | [Ballot comment] Support Alvaro's Discuss. |
2017-04-12
|
09 | Deborah Brungard | [Ballot Position Update] New position, No Objection, has been recorded for Deborah Brungard |
2017-04-12
|
09 | Ben Campbell | [Ballot comment] I support Ekr's DISCUSS. Otherwise, thank you for structuring this bis draft in a way where the diff tools are actually helpful. |
2017-04-12
|
09 | Ben Campbell | [Ballot Position Update] New position, No Objection, has been recorded for Ben Campbell |
2017-04-12
|
09 | Alissa Cooper | [Ballot comment] Please have a look at the changes suggested in Peter's Gen-ART review: https://datatracker.ietf.org/doc/review-ietf-6man-rfc2460bis-08-genart-lc-yee-2017-02-28/ |
2017-04-12
|
09 | Alissa Cooper | [Ballot Position Update] New position, No Objection, has been recorded for Alissa Cooper |
2017-04-12
|
09 | Mirja Kühlewind | [Ballot discuss] My discuss is mainly on text in section 4.8 (also based on the tsv-art review -> Thanks Martin!): I find the recommendation to … [Ballot discuss] My discuss is mainly on text in section 4.8 (also based on the tsv-art review -> Thanks Martin!): I find the recommendation to basically just not use hop-by-hop headers in section 4.8 extremely unsatisfying. Can we maybe do better? Wouldn't it be maybe time to just deprecate the current hop-by-hop number an assign a new one? I know that also has deployment problem but maybe it's worth a try. I guess the assignment could happen in a new document though, but the deprecation could be done here. This related to this comment from Martin's review, also proposing a potential way forward: "- Section 4.8. "Defining New Extension Headers and Options": It says new hop-by-hop headers must never ever defined. This is problematic, as this closing the door forever, even if future instances of the IETF do would like to wish to define new hop-by-hop headers. A better way would have to say "that new hop-by-hop headers must have IETF consensus". - Section 4.8. "Defining New Extension Headers and Options": Also the „not recommended“ to define new extension headers looks strange, especially with the phrase "There has to be a very clear justification". The term "clear justification" is not an exact engineering specification. Why not using "technical protocol specification and real word use case required, plus IETF consensus"?" As a side note, there is at least one experimental RFC that defines a destination option to be inspected by a network device, given the know problems of hop-by-hop option which renders them unusable. |
2017-04-12
|
09 | Mirja Kühlewind | [Ballot comment] One question because I'm not sure if I interpret this correct to make it part of my discuss: Section 4.5: "The number and … [Ballot comment] One question because I'm not sure if I interpret this correct to make it part of my discuss: Section 4.5: "The number and content of the headers preceding the Fragment header of different fragments of the same original packet may differ. Whatever headers are present, preceding the Fragment header in each fragment packet, are processed when the packets arrive, prior to queueing the fragments for reassembly. Only those headers in the Offset zero fragment packet are retained in the reassembled packet." Does this mean the ECN codepoint (part of the Traffic Class field) is copied from the first fragment? This doesn't seem to be correct, however, also not sure what the correct answer is. I know this was not changed in this revision but maybe we can still get this right. |
2017-04-12
|
09 | Mirja Kühlewind | [Ballot Position Update] New position, Discuss, has been recorded for Mirja Kühlewind |
2017-04-11
|
09 | Martin Stiemerling | Request for Telechat review by TSVART Completed: Ready with Issues. Reviewer: Martin Stiemerling. |
2017-04-08
|
09 | Eric Rescorla | [Ballot discuss] This security considerations section seems fairly unsatisfactory. First, you can't just point back to IPv4, which doesn't even have a security considerations section. … [Ballot discuss] This security considerations section seems fairly unsatisfactory. First, you can't just point back to IPv4, which doesn't even have a security considerations section. Second, IPv6 actually has different security and privacy properties than IPv4 in a number of respects, so you actually need to document them. |
2017-04-08
|
09 | Eric Rescorla | [Ballot comment] I get that this document is from a period before the style became as uniformly to upper-casify RFC2119 keywords, but but it seems … [Ballot comment] I get that this document is from a period before the style became as uniformly to upper-casify RFC2119 keywords, but but it seems like it might be a good idea to do that here. It's a little hard to determine what is normative here, but S 4. says A full implementation of IPv6 includes implementation of the following extension headers: Hop-by-Hop Options Fragment Destination Options Routing Authentication Encapsulating Security Payload Given that 6434-bis seems to have backed away from IPsec, this document needs to as well. S 4.4. Assuming I am reading this document correctly (and I've never implemented v6 so I could be crazy), in order to implement the routing header you need to decrement Segments Left, but the document does not seem to say that. S 4.5. As I read this document the order of headers is only strongly recommended, but the rules about fragmentation seem to absolutely require a specific order: The Per-Fragment Headers consists of the IPv6 header plus any extension headers that must be processed by nodes en route to the destination, that is, all headers up to and including the Routing header if present, else the Hop-by-Hop Options header if present, else no extension headers. Is there a reason why the rules are not MUST? S 4.5. The following conditions are not expected to occur, but are not considered errors if they do: The number and content of the headers preceding the Fragment header of different fragments of the same original packet may differ. Whatever headers are present, preceding the Fragment header in each fragment packet, are processed when the packets arrive, prior to queueing the fragments for reassembly. Only those headers in the Offset zero fragment packet are retained in the reassembled packet. If fragments follow different paths (not crazy) then the hop limit will be different, right? So perhaps "not expected" is a bit strong. S 8.4. Response packets that carry Routing headers that were derived by reversing the Routing header of the received packet IF AND ONLY IF the integrity and authenticity of the Source Address and Routing header from the received packet have been verified by the responder. It's not clear to me how this works. If, as I suggest above, the routing header gets changed in transit, how do you measure the integrity and authenticity? Even if that is not the case, and you use something like IPsec to provide integrity, why do you trust whatever claims the sender makes about routing. |
2017-04-08
|
09 | Eric Rescorla | Ballot comment and discuss text updated for Eric Rescorla |
2017-04-08
|
09 | Eric Rescorla | [Ballot discuss] This security considerations section seems fairly unsatisfactory. First, you can't just point back to IPv4, which doesn't even have a security considerations section. … [Ballot discuss] This security considerations section seems fairly unsatisfactory. First, you can't just point back to IPv4, which doesn't even have a security considerations section. Second, IPv6 actually has different security and privacy properties than IPv4 in a number of respects, so you actually need to document them. document needs to as well. |
2017-04-08
|
09 | Eric Rescorla | [Ballot comment] I get that this document is from a period before the style became as uniformly to upper-casify RFC2119 keywords, but but it seems … [Ballot comment] I get that this document is from a period before the style became as uniformly to upper-casify RFC2119 keywords, but but it seems like it might be a good idea to do that here. It's a little hard to determine what is normative here, but S 4. says A full implementation of IPv6 includes implementation of the following extension headers: Hop-by-Hop Options Fragment Destination Options Routing Authentication Encapsulating Security Payload Given that 6434-bis seems to have backed away from IPsec, this S 4.4. Assuming I am reading this document correctly (and I've never implemented v6 so I could be crazy), in order to implement the routing header you need to decrement Segments Left, but the document does not seem to say that. S 4.5. As I read this document the order of headers is only strongly recommended, but the rules about fragmentation seem to absolutely require a specific order: The Per-Fragment Headers consists of the IPv6 header plus any extension headers that must be processed by nodes en route to the destination, that is, all headers up to and including the Routing header if present, else the Hop-by-Hop Options header if present, else no extension headers. Is there a reason why the rules are not MUST? S 4.5. The following conditions are not expected to occur, but are not considered errors if they do: The number and content of the headers preceding the Fragment header of different fragments of the same original packet may differ. Whatever headers are present, preceding the Fragment header in each fragment packet, are processed when the packets arrive, prior to queueing the fragments for reassembly. Only those headers in the Offset zero fragment packet are retained in the reassembled packet. If fragments follow different paths (not crazy) then the hop limit will be different, right? So perhaps "not expected" is a bit strong. S 8.4. Response packets that carry Routing headers that were derived by reversing the Routing header of the received packet IF AND ONLY IF the integrity and authenticity of the Source Address and Routing header from the received packet have been verified by the responder. It's not clear to me how this works. If, as I suggest above, the routing header gets changed in transit, how do you measure the integrity and authenticity? Even if that is not the case, and you use something like IPsec to provide integrity, why do you trust whatever claims the sender makes about routing. |
2017-04-08
|
09 | Eric Rescorla | [Ballot Position Update] New position, Discuss, has been recorded for Eric Rescorla |
2017-04-07
|
09 | (System) | IANA Review state changed to IANA OK - Actions Needed from Version Changed - Review Needed |
2017-04-07
|
09 | Alvaro Retana | [Ballot discuss] First off, this DISCUSS is NOT about questioning the rough consensus calls that the responsible Chair and AD have made, or wanting to … [Ballot discuss] First off, this DISCUSS is NOT about questioning the rough consensus calls that the responsible Chair and AD have made, or wanting to change them, but about clarifying to avoid misinterpretations. Given the ongoing discussion about Extension Headers and controlled domains (for example [1] and [2]), the text should be very specific on what is expected and where. Because it is not, I think that this document is teetering along the line of having a "high degree of technical maturity", and not being ready for Internet Standard [rfc6410]. Without further clarifications and guidance, this document also brings on unanticipated second order effects [rfc3439] that can impact the direction, or even the viability, of future work in the IETF. Specifically, a straight forward interpretation of the text in Section 4 is the absolute prohibition to process, insert or delete EHs -- but discussion on the 6man mailing list seems to point at an understanding that the conditions inside a controlled domain may be different, for example (from Brian Carpenter [3]): ===== I've tried to say this before but I'm not sure people are getting it: RFC2460bis, if approved as is, draws a line in the sand *for interoperability across the whole Internet*. There are reasons for this - PMTUD in any form, any future replacement for the unsuccessful IPsec/AH, and all the problems of deploying extension headers that are understood by some nodes and not by others. There is no reason why a subsequent standards-track document cannot allow header insertion (and removal) within finite domains where the above issues do not apply. In fact, an improved version of draft-voyer-6man-extension-header-insertion-00 could become exactly that. ===== [N.B.: I'm not implying that Brian's opinion represents consensus, that is not my call to make.] I'm pointing at an opinion (which I agree with) that recognizes the need to differentiate between contexts -- but the current text in rfc2460bis doesn't do that. I believe that this issue is significant (as reflected by the ongoing discussions) that that it should be resolved (by clarifying the text) before proceeding with the publication of this document as an Internet Standard. To summarize, the text in this document has the second order effect of not leaving a clear path forward for extensions to IPv6 so that they adhere to the protocol's architecture, specially when applied to a controlled domain. At a minimum, I would like to see a clear path forward, whether that is in the form of an update for use of extensions in controlled domains, or a statement that this document just applies to IPv6 traffic intended to cross the Internet (as suggested at the 6man meeting in Chicago [4])... My opinion is that this document should not be published as an Internet Standard until the remaining open discussions are explicitly resolved and this document reflects that resolution. [1] https://mailarchive.ietf.org/arch/msg/ipv6/UI0PfqrWco4Hpbvm8keGR8FabRg/?qid=9a6ba8e9777114e24a1e964336ed78f1 [2] https://mailarchive.ietf.org/arch/msg/ipv6/OrLYxKumiKWLHGkeNamhq9pxutQ/?qid=63c159fe41c18653d9dc0be609f9e97f [3] https://mailarchive.ietf.org/arch/msg/ipv6/REez0-lbebpo-Xem-xX_sWV0pf4/?qid=5cdab6c6085795129802ab622bb4159f [4] https://www.ietf.org/proceedings/98/minutes/minutes-98-6man-00 ========== Related to the above, I also want to point out the lack of clarity in the text in Section 4. (IPv6 Extension Headers), which leaves itself open to interpretation and should be cleaned up. (A) The main piece of text that has been discussed now reads: With one exception, extension headers are not examined, processed, inserted, or deleted by any node along a packet's delivery path, until the packet reaches the node (or each of the set of nodes, in the case of multicast) identified in the Destination Address field of the IPv6 header. Note: If an intermediate forwarding node examines an extension header for any reason, it must do so in accordance with the provisions of [RFC7045]. ... The exception referred to in the preceding paragraph is the Hop-by- Hop Options header, which carries information that may be examined and processed by every node along a packet's delivery path, including the source and destination nodes. The Hop-by-Hop Options header, when present, must immediately follow the IPv6 header. Its presence is indicated by the value zero in the Next Header field of the IPv6 header. NOTE: While [RFC2460] required that all nodes must examine and process the Hop-by-Hop Options header, it is now expected that nodes along a packet's delivery path only examine and process the Hop-by- Hop Options header if explicitly configured to do so. While the first sentence seems clear on what this document wants forwarding nodes to do (or not), there are two notes that define exceptions: any forwarding node can examine the headers "for any reason", and, the Hop-by-Hop Options header doesn't really have to be examined and processed by everyone. This text needs some more work to at least not contradict itself: there is more than one exception, and they are not absolute, anyone can examine the headers "for any reason"... (B) As it stands, the note about the changed expectations for the Hop-by-Hop options header opens a significant door to work around the "limitations" of other options. For example, it would be relatively straight forward to define a new Hop-by-Hop option to carry any type of information that could then be "examined, processed, inserted, or deleted by any node along a packet's delivery path". In the world of controllers and programmatic access to forwarding nodes, changing the explicit configuration on the fly to customize which nodes do what, is trivial. Is that the intent of this document, to provide a generic mechanism for cases that may need extension headers to be "examined, processed, inserted, or deleted by any node along a packet's delivery path"? Will the WG/IETF be in a position to charter, adopt and/or publish these types of documents? I ask this question not only in the context of my concerns expressed above, but also because the definition of the Hop-by-Hop Option would seem to be able to handle anything ("used to carry optional information that may be examined and processed by every node along a packet's delivery path" - I didn't see any constraints), even if (for example) the Routing Header "is used by an IPv6 source to list one or more intermediate nodes to be "visited" on the way to a packet's destination" -- so it makes me wonder whether using the Hop-by-Hop Options header to carry (for example) routing information so that it can be "examined, processed, inserted, or deleted by any node along a packet's delivery path" would pass the bar set in Section 4.8. (Defining New Extension Headers and Options): New hop-by-hop options are not recommended because nodes may be configured to ignore the Hop-by-Hop Option header, drop packets containing a hop-by-hop header, or assign packets containing a hop- by-hop header to a slow processing path. Designers considering defining new hop-by-hop options need to be aware of this likely behaviour. There has to be a very clear justification why any new hop-by-hop option is needed before it is standardized. In the context of a controlled domain, it should be relatively easy for the operator to account for those issues. So my interpretation of whether a Hop-by-Hop option is ok to carry (for example) routing information is a strong "Yes!". Whether my interpretation is what was intended or not, I believe the overall text could benefit from more clarity. |
2017-04-07
|
09 | Alvaro Retana | Ballot discuss text updated for Alvaro Retana |
2017-04-07
|
09 | Alvaro Retana | [Ballot discuss] First off, this DISCUSS is NOT about questioning the rough consensus calls that the responsible Chair and AD have made, or wanting to … [Ballot discuss] First off, this DISCUSS is NOT about questioning the rough consensus calls that the responsible Chair and AD have made, or wanting to change them, but about clarifying to avoid misinterpretations. Given the ongoing discussion about Extension Headers and controlled domains (for example [1] and [2]), the text should be very specific on what is expected and where. Because it is not, I think that this document is teetering along the line of having a "high degree of technical maturity", and not being ready for Internet Standard [rfc6410]. Without further clarifications and guidance, this document also brings on unanticipated second order effects [rfc3439] that can impact the direction, or even the viability, of future work in the IETF. Specifically, a straight forward interpretation of the text in Section 4 is the absolute prohibition to process, insert or delete EHs -- but discussion on the 6man mailing list seems to point at an understanding that the conditions inside a controlled domain may be different, for example (from Brian Carpenter [3]): ===== I've tried to say this before but I'm not sure people are getting it: RFC2460bis, if approved as is, draws a line in the sand *for interoperability across the whole Internet*. There are reasons for this - PMTUD in any form, any future replacement for the unsuccessful IPsec/AH, and all the problems of deploying extension headers that are understood by some nodes and not by others. There is no reason why a subsequent standards-track document cannot allow header insertion (and removal) within finite domains where the above issues do not apply. In fact, an improved version of draft-voyer-6man-extension-header-insertion-00 could become exactly that. ===== [N.B.: I'm not implying that Brian's opinion represents consensus, that is not my call to make.] I'm pointing at an opinion (which I agree with) that recognizes the need to differentiate between contexts -- but the current text in rfc2460bis doesn't do that. I believe that this issue is significant (as reflected by the ongoing discussions) that that it should be resolved (by clarifying the text) before proceeding with the publication of this document as an Internet Standard. To summarize, the text in this document has the second order effect of not leaving a clear path forward for extensions to IPv6 so that they adhere to the protocol's architecture, specially when applied to a controlled domain. At a minimum, I would like to see a clear path forward, whether that is in the form of an update for use of extensions in controlled domains, or a statement that this document just applies to IPv6 traffic intended to cross the Internet (as suggested at the 6man meeting in Chicago [4])... My opinion is that this document should not be published as an Internet Standard until the remaining open discussions are explicitly resolved and this document reflects that resolution. [1] https://mailarchive.ietf.org/arch/msg/ipv6/UI0PfqrWco4Hpbvm8keGR8FabRg/?qid=9a6ba8e9777114e24a1e964336ed78f1 [2] https://mailarchive.ietf.org/arch/msg/ipv6/OrLYxKumiKWLHGkeNamhq9pxutQ/?qid=63c159fe41c18653d9dc0be609f9e97f [3] https://mailarchive.ietf.org/arch/msg/ipv6/REez0-lbebpo-Xem-xX_sWV0pf4/?qid=5cdab6c6085795129802ab622bb4159f [4] https://www.ietf.org/proceedings/98/minutes/minutes-98-6man-00 ========== Related to the above, I also want to point out the lack of clarity in the text in Section 4. (IPv6 Extension Headers), which leaves itself open to interpretation and should be cleaned up. (A) The main piece of text that has been discussed now reads: With one exception, extension headers are not examined, processed, inserted, or deleted by any node along a packet's delivery path, until the packet reaches the node (or each of the set of nodes, in the case of multicast) identified in the Destination Address field of the IPv6 header. Note: If an intermediate forwarding node examines an extension header for any reason, it must do so in accordance with the provisions of [RFC7045]. ... The exception referred to in the preceding paragraph is the Hop-by- Hop Options header, which carries information that may be examined and processed by every node along a packet's delivery path, including the source and destination nodes. The Hop-by-Hop Options header, when present, must immediately follow the IPv6 header. Its presence is indicated by the value zero in the Next Header field of the IPv6 header. NOTE: While [RFC2460] required that all nodes must examine and process the Hop-by-Hop Options header, it is now expected that nodes along a packet's delivery path only examine and process the Hop-by- Hop Options header if explicitly configured to do so. While the first sentence seems clear on what this document wants forwarding nodes to do (or not), there are two notes that define exceptions: any forwarding node can examine the headers "for any reason", and, the Hop-by-Hop Options header doesn't really have to be examined and processed by everyone. This text needs some more work to at least not contradict itself: there is more than one exception, and they are not absolute, anyone can examine the headers "for any reason"... (B) As it stands, the note about the changed expectations for the Hop-by-Hop options header opens a significant door to work around the "limitations" of other options. For example, it would be relatively straight forward to define a new Hop-by-Hop option to carry any type of information that could then be "examined, processed, inserted, or deleted by any node along a packet's delivery path". In the world of controllers and programmatic access to forwarding nodes, changing the explicit configuration on the fly to customize which nodes do what, is trivial. Is that the intent of this document, to provide a generic mechanism for cases that may need extension headers to be "examined, processed, inserted, or deleted by any node along a packet's delivery path"? Will the WG/IETF be in a position to charter, adopt and/or publish these types of documents? I ask this question not only in the context of my concerns expressed above, but also because the definition of the Hop-by-Hop Option would seem to be able to handle anything ("used to carry optional information that may be examined and processed by every node along a packet's delivery path" - I didn't see any constraints), even if (for example) the Routing Header "is used by an IPv6 source to list one or more intermediate nodes to be "visited" on the way to a packet's destination" -- so it makes me wonder whether using the Hop-by-Hop Options header to carry (for example) routing information so that it can be "examined, processed, inserted, or deleted by any node along a packet's delivery path" would pass the bar set in Section 4.8. (Defining New Extension Headers and Options): New hop-by-hop options are not recommended because nodes may be configured to ignore the Hop-by-Hop Option header, drop packets containing a hop-by-hop header, or assign packets containing a hop- by-hop header to a slow processing path. Designers considering defining new hop-by-hop options need to be aware of this likely behaviour. There has to be a very clear justification why any new hop-by-hop option is needed before it is standardized. In the context of a controlled domain, it should be relatively easy for the operator to account for those issues. So my interpretation of whether a Hop-by-Hop option is ok to carry (for example) routing information is a strong "Yes!". Whether my interpretation is what was intended or not, I believe the overall text could benefit from more clarity. |
2017-04-07
|
09 | Alvaro Retana | Ballot discuss text updated for Alvaro Retana |
2017-04-07
|
09 | Alvaro Retana | [Ballot discuss] First off, this DISCUSS is NOT about questioning the rough consensus calls that the responsible Chair and AD have made, or wanting to … [Ballot discuss] First off, this DISCUSS is NOT about questioning the rough consensus calls that the responsible Chair and AD have made, or wanting to change them, but about clarifying to avoid misinterpretations. Given the ongoing discussion about Extension Headers and controlled domains (for example [1] and [2]), the text should be very specific on what is expected and where. Because it is not, I think that this document is teetering along the line of having a "high degree of technical maturity", and not being ready for Internet Standard [rfc6410]. Without further clarifications and guidance, this document also brings on unanticipated second order effects [rfc3439] that can impact the direction, or even the viability, of future work in the IETF. Specifically, a straight forward interpretation of the text in Section 4 is the absolute prohibition to process, insert or delete EHs -- but discussion on the 6man mailing list seems to point at an understanding that the conditions inside a controlled domain may be different, for example (from Brian Carpenter [3]): ===== I've tried to say this before but I'm not sure people are getting it: RFC2460bis, if approved as is, draws a line in the sand *for interoperability across the whole Internet*. There are reasons for this - PMTUD in any form, any future replacement for the unsuccessful IPsec/AH, and all the problems of deploying extension headers that are understood by some nodes and not by others. There is no reason why a subsequent standards-track document cannot allow header insertion (and removal) within finite domains where the above issues do not apply. In fact, an improved version of draft-voyer-6man-extension-header-insertion-00 could become exactly that. ===== [N.B.: I'm not implying that Brian's opinion represents consensus, that is not my call to make.] I'm pointing at an opinion (which I agree with) that recognizes the need to differentiate between contexts -- but the current text in rfc2460bis doesn't do that. I believe that this issue is significant (as reflected by the ongoing discussions) that that it should be resolved (by clarifying the text) before proceeding with the publication of this document as an Internet Standard. To summarize, the text in this document has the second order effect of not leaving a clear path forward for extensions to IPv6 so that they adhere to the protocol's architecture, specially when applied to a controlled domain. At a minimum, I would like to see a clear path forward, whether that is in the form of an update for use of extensions in controlled domains, or a statement that this document just applies to IPv6 traffic intended to cross the Internet (as suggested at the 6man meeting in Chicago [4])... My opinion is that this document should not be published as an Internet Standard until the remaining open discussions are explicitly resolved and this document reflects that resolution. [1] https://mailarchive.ietf.org/arch/msg/ipv6/UI0PfqrWco4Hpbvm8keGR8FabRg/?qid=9a6ba8e9777114e24a1e964336ed78f1 [2] https://mailarchive.ietf.org/arch/msg/ipv6/OrLYxKumiKWLHGkeNamhq9pxutQ/?qid=63c159fe41c18653d9dc0be609f9e97f [3] https://mailarchive.ietf.org/arch/msg/ipv6/REez0-lbebpo-Xem-xX_sWV0pf4/?qid=5cdab6c6085795129802ab622bb4159f [4] https://www.ietf.org/proceedings/98/minutes/minutes-98-6man-00 ========== Related to the above, I also want to point out the lack of clarity in the text in Section 4. (IPv6 Extension Headers), which leaves itself open to interpretation and should be cleaned up. (A) The main piece of text that has been discussed now reads: With one exception, extension headers are not examined, processed, inserted, or deleted by any node along a packet's delivery path, until the packet reaches the node (or each of the set of nodes, in the case of multicast) identified in the Destination Address field of the IPv6 header. Note: If an intermediate forwarding node examines an extension header for any reason, it must do so in accordance with the provisions of [RFC7045]. ... The exception referred to in the preceding paragraph is the Hop-by- Hop Options header, which carries information that may be examined and processed by every node along a packet's delivery path, including the source and destination nodes. The Hop-by-Hop Options header, when present, must immediately follow the IPv6 header. Its presence is indicated by the value zero in the Next Header field of the IPv6 header. NOTE: While [RFC2460] required that all nodes must examine and process the Hop-by-Hop Options header, it is now expected that nodes along a packet's delivery path only examine and process the Hop-by- Hop Options header if explicitly configured to do so. While the first sentence seems clear on what this document wants forwarding nodes to do (or not), there are two notes that define exceptions: any forwarding node can examine the headers "for any reason", and, the Hop-by-Hop Options header doesn't really have to be examined and processed by everyone. This text needs some more work to at least not contradict itself: there is more than one exception, and they are not absolute, anyone can examine the headers "for any reason"... (B) As it stands, the note about the changed expectations for the Hop-by-Hop options header opens a significant door to work around the "limitations" of other options. For example, it would be relatively straight forward to define a new Hop-by-Hop option to carry any type of information that could then be "examined, processed, inserted, or deleted by any node along a packet's delivery path". In the world of controllers and programmatic access to forwarding nodes, changing the explicit configuration on the fly to customize which nodes do what, is trivial. Is that the intent of this document, to provide a generic mechanism for cases that may need extension headers to be "examined, processed, inserted, or deleted by any node along a packet's delivery path"? Will the WG/IETF be in a position to charter, adopt and/or publish these types of documents? I ask this question not only in the context of my concerns expressed above, but also because the definition of the Hop-by-Hop Option would seem to be able to handle anything ("used to carry optional information that may be examined and processed by every node along a packet's delivery path" - I didn't see any constraints), even if (for example) the Routing Header "is used by an IPv6 source to list one or more intermediate nodes to be "visited" on the way to a packet's destination" -- so it makes me wonder whether using the Hop-by-Hop Options header to carry (for example) routing information so that it can be "examined, processed, inserted, or deleted by any node along a packet's delivery path" would pass the bar set in Section 4.8. (Defining New Extension Headers and Options): New hop-by-hop options are not recommended because nodes may be configured to ignore the Hop-by-Hop Option header, drop packets containing a hop-by-hop header, or assign packets containing a hop- by-hop header to a slow processing path. Designers considering defining new hop-by-hop options need to be aware of this likely behaviour. There has to be a very clear justification why any new hop-by-hop option is needed before it is standardized. In the context of a controlled domain, it should be relatively easy for the operator to account for those issues. So my interpretation of whether a Hop-by-Hop option is ok to carry (for example) routing information is a strong "Yes!". Whether my interpretation is what was intended or not, I believe the overall text could benefit from more clarity. |
2017-04-07
|
09 | Alvaro Retana | [Ballot comment] Appendix B. (Changes Since RFC2460) mentions that the text was revised based on updates from several other RFCs which Updated rfc2460. … [Ballot comment] Appendix B. (Changes Since RFC2460) mentions that the text was revised based on updates from several other RFCs which Updated rfc2460. I didn't check all the details, but if the updates were incorporated in this document, why are those RFCs not marked as being Obsolete? Is there any value left in them? |
2017-04-07
|
09 | Alvaro Retana | [Ballot Position Update] New position, Discuss, has been recorded for Alvaro Retana |
2017-04-07
|
09 | Suresh Krishnan | IESG state changed to IESG Evaluation from Waiting for Writeup |
2017-04-07
|
09 | Suresh Krishnan | Ballot has been issued |
2017-04-07
|
09 | Suresh Krishnan | [Ballot Position Update] New position, Yes, has been recorded for Suresh Krishnan |
2017-04-07
|
09 | Suresh Krishnan | Created "Approve" ballot |
2017-04-07
|
09 | Suresh Krishnan | Ballot writeup was changed |
2017-04-07
|
09 | Suresh Krishnan | Ballot writeup was changed |
2017-04-06
|
09 | Jean Mahoney | Request for Telechat review by GENART is assigned to Peter Yee |
2017-04-06
|
09 | Jean Mahoney | Request for Telechat review by GENART is assigned to Peter Yee |
2017-03-30
|
09 | (System) | IANA Review state changed to Version Changed - Review Needed from IANA OK - Actions Needed |
2017-03-30
|
09 | Bob Hinden | New version available: draft-ietf-6man-rfc2460bis-09.txt |
2017-03-30
|
09 | (System) | New version approved |
2017-03-30
|
09 | (System) | Request for posting confirmation emailed to previous authors: Robert Hinden , 6man-chairs@ietf.org |
2017-03-30
|
09 | Bob Hinden | Uploaded new revision |
2017-03-28
|
08 | Martin Stiemerling | Request for Telechat review by TSVART is assigned to Martin Stiemerling |
2017-03-28
|
08 | Martin Stiemerling | Request for Telechat review by TSVART is assigned to Martin Stiemerling |
2017-03-23
|
08 | Tero Kivinen | Request for Telechat review by SECDIR is assigned to Hilarie Orman |
2017-03-23
|
08 | Tero Kivinen | Request for Telechat review by SECDIR is assigned to Hilarie Orman |
2017-03-17
|
08 | Suresh Krishnan | Placed on agenda for telechat - 2017-04-13 |
2017-03-15
|
08 | Tero Kivinen | Closed request for Last Call review by SECDIR with state 'No Response' |
2017-03-02
|
08 | Min Ye | Request for Last Call review by RTGDIR Completed: Has Issues. Reviewer: Papadimitriou Dimitri. |
2017-03-01
|
08 | Amanda Baber | IANA Review state changed to IANA OK - Actions Needed from IANA - Not OK |
2017-03-01
|
08 | (System) | IESG state changed to Waiting for Writeup from In Last Call |
2017-02-28
|
08 | Peter Yee | Request for Last Call review by GENART Completed: Ready with Nits. Reviewer: Peter Yee. Sent review to list. |
2017-02-28
|
08 | (System) | IANA Review state changed to IANA - Not OK from IANA - Review Needed |
2017-02-28
|
08 | Amanda Baber | (Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs: The IANA Services Operator has completed its review of draft-ietf-6man-rfc2460bis-08. If any part of this review is inaccurate, please let … (Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs: The IANA Services Operator has completed its review of draft-ietf-6man-rfc2460bis-08. If any part of this review is inaccurate, please let us know. We have a question about the actions requested in this document. The document provides a list of registries and other locations at iana.org where references to RFC 2460 need to be replaced with references to this document. However, there are references to RFC 2460 that are not included in this list. In addition to the list below, references to RFC 2460 can be found here: http://www.iana.org/assignments/xml-registry/schema/traceroute-1.0.xsd http://www.iana.org/assignments/ipfix http://www.iana.org/assignments/version-numbers Should the references in those locations be updated as well? These are the locations named by the document, which should complete the list of locations where references to RFC 2460 appear: Internet Protocol Version 6 (IPv6) Parameters located at: www.iana.org/assignments/ipv6-parameters/ Assigned Internet Protocol Numbers located at: www.iana.org/assignments/protocol-numbers/ ONC RPC Network Identifiers (netids) located at: www.iana.org/assignments/rpc-netids/ Technical requirements for authoritative name servers located at: www.iana.org/help/nameserver-requirements Network Layer Protocol Identifiers (NLPIDs) of Interest located at: www.iana.org/assignments/nlpids/ Protocol Registries located at: www.iana.org/protocols Structure of Management Information (SMI) Numbers (MIB Module Registrations) located at: www.iana.org/assignments/smi-numbers/ Note: The actions requested in this document will not be completed until the document has been approved for publication as an RFC. This message is only to confirm what actions will be performed. Thank you, Amanda Baber Lead IANA Services Specialist PTI |
2017-02-26
|
08 | Suresh Krishnan | Removed from agenda for telechat |
2017-02-12
|
08 | Min Ye | Request for Last Call review by RTGDIR is assigned to Papadimitriou Dimitri |
2017-02-12
|
08 | Min Ye | Request for Last Call review by RTGDIR is assigned to Papadimitriou Dimitri |
2017-02-10
|
08 | Alvaro Retana | Requested Last Call review by RTGDIR |
2017-02-10
|
08 | Martin Stiemerling | Request for Telechat review by TSVART is assigned to Yoshifumi Nishida |
2017-02-10
|
08 | Martin Stiemerling | Request for Telechat review by TSVART is assigned to Yoshifumi Nishida |
2017-02-09
|
08 | Suresh Krishnan | Placed on agenda for telechat - 2017-03-02 |
2017-02-03
|
08 | Gunter Van de Velde | Request for Last Call review by OPSDIR is assigned to Linda Dunbar |
2017-02-03
|
08 | Gunter Van de Velde | Request for Last Call review by OPSDIR is assigned to Linda Dunbar |
2017-02-02
|
08 | Jean Mahoney | Request for Last Call review by GENART is assigned to Peter Yee |
2017-02-02
|
08 | Jean Mahoney | Request for Last Call review by GENART is assigned to Peter Yee |
2017-02-02
|
08 | Tero Kivinen | Request for Last Call review by SECDIR is assigned to Yaron Sheffer |
2017-02-02
|
08 | Tero Kivinen | Request for Last Call review by SECDIR is assigned to Yaron Sheffer |
2017-02-01
|
08 | Cindy Morgan | IANA Review state changed to IANA - Review Needed |
2017-02-01
|
08 | Cindy Morgan | The following Last Call announcement was sent out: From: The IESG To: "IETF-Announce" CC: draft-ietf-6man-rfc2460bis@ietf.org, ipv6@ietf.org, "Ole Troan" , suresh.krishnan@ericsson.com, otroan@employees.org, … The following Last Call announcement was sent out: From: The IESG To: "IETF-Announce" CC: draft-ietf-6man-rfc2460bis@ietf.org, ipv6@ietf.org, "Ole Troan" , suresh.krishnan@ericsson.com, otroan@employees.org, 6man-chairs@ietf.org Reply-To: ietf@ietf.org Sender: Subject: Last Call: (Internet Protocol, Version 6 (IPv6) Specification) to Internet Standard The IESG has received a request from the IPv6 Maintenance WG (6man) to consider the following document: - 'Internet Protocol, Version 6 (IPv6) Specification' as Internet Standard The IESG plans to make a decision in the next few weeks, and solicits final comments on this action. Please send substantive comments to the ietf@ietf.org mailing lists by 2017-03-01. Exceptionally, comments may be sent to iesg@ietf.org instead. In either case, please retain the beginning of the Subject line to allow automated sorting. Abstract This document specifies version 6 of the Internet Protocol (IPv6). It obsoletes RFC2460 The file can be obtained via https://datatracker.ietf.org/doc/draft-ietf-6man-rfc2460bis/ IESG discussion can be tracked via https://datatracker.ietf.org/doc/draft-ietf-6man-rfc2460bis/ballot/ No IPR declarations have been submitted directly on this I-D. The document contains these normative downward references. See RFC 3967 for additional information: rfc4443: Internet Control Message Protocol (ICMPv6) for the Internet Protocol Version 6 (IPv6) Specification (Draft Standard - IETF stream) rfc3168: The Addition of Explicit Congestion Notification (ECN) to IP (Proposed Standard - IETF stream) Note that some of these references may already be listed in the acceptable Downref Registry. |
2017-02-01
|
08 | Cindy Morgan | IESG state changed to In Last Call from Last Call Requested |
2017-02-01
|
08 | Suresh Krishnan | Last call was requested |
2017-02-01
|
08 | Suresh Krishnan | Last call was requested |
2017-02-01
|
08 | Suresh Krishnan | Last call announcement was changed |
2017-02-01
|
08 | Suresh Krishnan | Last call announcement was changed |
2017-02-01
|
08 | Suresh Krishnan | Last call announcement was changed |
2017-02-01
|
08 | Suresh Krishnan | Last call was requested |
2017-02-01
|
08 | Suresh Krishnan | Last call announcement was generated |
2017-02-01
|
08 | Suresh Krishnan | Ballot approval text was generated |
2017-02-01
|
08 | Suresh Krishnan | Ballot writeup was generated |
2017-02-01
|
08 | Suresh Krishnan | IESG state changed to Last Call Requested from AD Evaluation |
2017-01-06
|
08 | Bob Halley | Request for Early review by INTDIR Completed: Ready. Reviewer: Bob Halley. Sent review to list. |
2017-01-05
|
08 | Carlos Jesús Bernardos | Request for Early review by INTDIR is assigned to Bob Halley |
2017-01-05
|
08 | Carlos Jesús Bernardos | Request for Early review by INTDIR is assigned to Bob Halley |
2017-01-04
|
08 | Suresh Krishnan | IESG state changed to AD Evaluation from Publication Requested |
2017-01-04
|
08 | Suresh Krishnan | Requested Early review by INTDIR |
2016-12-02
|
08 | Bob Hinden | RFC2460bis Writeup Title : Internet Protocol, Version 6 (IPv6) Specification Author : Stephen E. Deering … RFC2460bis Writeup Title : Internet Protocol, Version 6 (IPv6) Specification Author : Stephen E. Deering Robert M. Hinden Filename : draft-ietf-6man-rfc2460bis-08.txt Pages : 39 Date : 2016-11-15 (1) What type of RFC is being requested (BCP, Proposed Standard, Internet Standard, Informational, Experimental, or Historic)? Why is this the proper type of RFC? Is this type of RFC indicated in the title page header? Internet Standard RFC2460 is currently at Draft Standard, the 6MAN working group has reached a consensus that it’s time to elevate the IPv6 protocol specification to Internet Standard. The header indicates “Standards Track”. (2) The IESG approval announcement includes a Document Announcement Write-Up. Please provide such a Document Announcement Write-Up. Recent examples can be found in the "Action" announcements for approved documents. The approval announcement contains the following sections: Technical Summary: This document specifies version 6 of the Internet Protocol (IPv6). It obsoletes RFC2460 Working Group Summary: Was there anything in WG process that is worth noting? For example, was there controversy about particular points or were there decisions where the consensus was particularly rough? The 6MAN working started working on advancing the IPv6 core specifications to Internet Standard at IETF93 July 2015. See: https://www.ietf.org/proceedings/93/slides/slides-93-6man-3.pdf The working group identified three RFCs to update (RFC2460, RFC4291, and RFC1981) by incorporating updates from other RFCs and Errata, and three to advance in place RFC4443, RFC3596, and RFC4941. After further analysis, the w.g. decided to not reclassify RFC4941 at this time. The working followed the requirements in RFC6410 for advancing a Draft Standard to Internet Standard. While RFC6410 describes how to handle Errata, it doesn't say anything about Updated-By RFCs. The working group, with the advice of our AD, incorporated the changes from the the Updated-By RFC and verified there was interoperability of the updates. All of the Updated-By and errata were brought into the new draft in small steps to allow thorough review of all of the changes. A summary and link to diff from the previous version was sent to the mailing list. All of the changes to each draft were also discussed in detail at IETF94, IETF95, IETF96, and IETF97. All of the changes from RFC2460 are summarized in Appendix B and are ordered by the Internet Draft that brought the change in. A working group last call for moving this and the other two documents to Internet Standard was started on 30 May 2016. Reviews were also requested. Issues found during the last call and reviews were entered into the 6MAN ticket system. These are now closed. The biggest issue raised was how to handle the issue of Extension Header insertion in this document. After many discussion on the mailing list and face to face meeting, there wasn’t a clear consensus. The chairs conducted an online survey that provided three choices: Ban header insertion, describe the problems with header insertion, or say nothing. The result of the survey was to describe the solution. The results and methodology used to evaluate the results can be seen at: https://mailarchive.ietf.org/arch/msg/ipv6/_gG2foiugk5B7w3TpnPvBbjHDzs This was discussed at the 6MAN session at IETF97 and on the mailing list after the meeting. The chairs believe there is a consensus to go forward with the text that is in draft-ietf-6man-rfc2460bis-08. Document Quality: Are there existing implementations of the protocol? Have a significant number of vendors indicated their plan to implement the specification? Are there any reviewers that merit special mention as having done a thorough review, e.g., one that resulted in important changes or a conclusion that the document had no substantive issues? If there was a MIB Doctor, Media Type or other expert review, what was its course (briefly)? In the case of a Media Type review, on what date was the request posted? IPv6 is implemented on most platforms (hosts, routers, servers, etc.), including proprietary and open source. A list of products that have received the IPV6 Ready logo can be found at: https://www.ipv6ready.org/db/index.php/public/?o=4 Most major ISP now support IPv6, as well as many mobile operators. Google’s IPv6 stats at https://www.google.com/intl/en/ipv6/statistics.html show they are seeing now about 15% of their overall user traffic is IPv6. Country adoption is 29% in the US, Germany 27%, Finland 12%, Japan 14%, Brazil 11%. IPv6 users per AS can be found at http://stats.labs.apnic.net/aspop The University of New Hampshire InterOperability Laboratory (UNH) analyzed the incorporated updates to insure they were implemented and interoperable. No problems were found. Their report can be found at: https://www.ietf.org/proceedings/95/slides/slides-95-6man-2.pdf No MIB, Media, or other expert reviews are required. Personnel: Who is the Document Shepherd? Who is the Responsible Area Director? Document Shepherd: Ole Trøan Responsible AD: Suresh Krishnan (3) Briefly describe the review of this document that was performed by the Document Shepherd. If this version of the document is not ready for publication, please explain why the document is being forwarded to the IESG. The document was reviewed by the Document Shepherd and believes it is ready for publication. (4) Does the document Shepherd have any concerns about the depth or breadth of the reviews that have been performed? No. (5) Do portions of the document need review from a particular or from broader perspective, e.g., security, operational complexity, AAA, DNS, DHCP, XML, or internationalization? If so, describe the review that took place. No. (6) Describe any specific concerns or issues that the Document Shepherd has with this document that the Responsible Area Director and/or the IESG should be aware of? For example, perhaps he or she is uncomfortable with certain parts of the document, or has concerns whether there really is a need for it. In any event, if the WG has discussed those issues and has indicated that it still wishes to advance the document, detail those concerns here. Nothing, issues raised in the working group are discussed in working group summary above. (7) Has each author confirmed that any and all appropriate IPR disclosures required for full conformance with the provisions of BCP 78 and BCP 79 have already been filed. If not, explain why? Yes (8) Has an IPR disclosure been filed that references this document? If so, summarize any WG discussion and conclusion regarding the IPR disclosures. No IPR. (9) How solid is the WG consensus behind this document? Does it represent the strong concurrence of a few individuals, with others being silent, or does the WG as a whole understand and agree with it? The document has had extensive review in the 6MAN working group and there is broad support to this version of the IPv6 specification as an Internet Standard. (10) Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarise the areas of conflict in separate email messages to the Responsible Area Director. (It should be in a separate email because this questionnaire is publicly available.) No appeals have been threatened. The biggest area of conflict has been around text describing Extension Header Insertion, there are strong opinions on both sides. (11) Identify any ID nits the Document Shepherd has found in this document. (See http://www.ietf.org/tools/idnits/ and the Internet-Drafts Checklist). Boilerplate checks are not enough; this check needs to be thorough. Nothing serious. A few miscellaneous warning about line spacing and notice that the reference to draft-ietf-6man-rfc4291bis is a down reference. Draft-ietf-6man-rfc4291bis will be submitted for Internet Standard with this. (12) Describe how the document meets any required formal review criteria, such as the MIB Doctor, media type, and URI type reviews. N/A (13) Have all references within this document been identified as either normative or informative? Yes. (14) Are there normative references to documents that are not ready for advancement or are otherwise in an unclear state? If such normative references exist, what is the plan for their completion? The only normative reference this is not an RFC, is a reference to draft-ietf-6man-rfc4291bis. This draft is also being submitted to the IESG for Internet standard around the same time. (15) Are there downward normative references references (see RFC 3967)? If so, list these downward references to support the Area Director in the Last Call procedure. [RFC2474] Nichols, K., Blake, S., Baker, F., and D. Black, "Definition of the Differentiated Services Field (DS Field) in the IPv4 and IPv6 Headers", RFC 2474, DOI 10.17487/RFC2474, December 1998, . [RFC3168] Ramakrishnan, K., Floyd, S., and D. Black, "The Addition of Explicit Congestion Notification (ECN) to IP", RFC 3168, DOI 10.17487/RFC3168, September 2001, . [RFC6437] Amante, S., Carpenter, B., Jiang, S., and J. Rajahalme, "IPv6 Flow Label Specification", RFC 6437, DOI 10.17487/ RFC6437, November 2011, . RFC4443 is also listed, but the working group is going to request that RFC4443 be advance in place to Internet Standard. (16) Will publication of this document change the status of any existing RFCs? Are those RFCs listed on the title page header, listed in the abstract, and discussed in the introduction? If the RFCs are not listed in the Abstract and Introduction, explain why, and point to the part of the document where the relationship of this document to the other RFCs is discussed. If this information is not in the document, explain why the WG considers it unnecessary. This document obsoletes RFC2460. This is indicated in the header and abstract. (17) Describe the Document Shepherd's review of the IANA considerations section, especially with regard to its consistency with the body of the document. Confirm that all protocol extensions that the document makes are associated with the appropriate reservations in IANA registries. Confirm that any referenced IANA registries have been clearly identified. Confirm that newly created IANA registries include a detailed specification of the initial contents for the registry, that allocations procedures for future registrations are defined, and a reasonable name for the new registry has been suggested (see RFC 5226). This document does not make any new assignment, but it does requests that the IANA update a number of IANA registries to point to this document instead of RFC2460. (18) List any new IANA registries that require Expert Review for future allocations. Provide any public guidance that the IESG would find useful in selecting the IANA Experts for these new registries. None. (19) Describe reviews and automated checks performed by the Document Shepherd to validate sections of the document written in a formal language, such as XML code, BNF rules, MIB definitions, etc. N/A |
2016-12-02
|
08 | Bob Hinden | Responsible AD changed to Suresh Krishnan |
2016-12-02
|
08 | Bob Hinden | IETF WG state changed to Submitted to IESG for Publication from WG Consensus: Waiting for Write-Up |
2016-12-02
|
08 | Bob Hinden | IESG state changed to Publication Requested |
2016-12-02
|
08 | Bob Hinden | IESG process started in state Publication Requested |
2016-11-30
|
08 | Bob Hinden | Changed document writeup |
2016-11-15
|
08 | Bob Hinden | New version available: draft-ietf-6man-rfc2460bis-08.txt |
2016-11-15
|
08 | (System) | New version approved |
2016-11-15
|
08 | (System) | Request for posting confirmation emailed to previous authors: "Robert Hinden" , 6man-chairs@ietf.org |
2016-11-15
|
08 | Bob Hinden | Uploaded new revision |
2016-11-15
|
07 | Ole Trøan | IETF WG state changed to WG Consensus: Waiting for Write-Up from In WG Last Call |
2016-11-01
|
07 | Bob Hinden | Added to session: IETF-97: 6man Tue-0930 |
2016-10-04
|
07 | Bob Hinden | New version available: draft-ietf-6man-rfc2460bis-07.txt |
2016-10-04
|
07 | (System) | New version approved |
2016-10-04
|
07 | (System) | Request for posting confirmation emailed to previous authors: "Robert Hinden" , 6man-chairs@ietf.org |
2016-10-04
|
07 | Bob Hinden | Uploaded new revision |
2016-09-13
|
06 | Bob Hinden | New version available: draft-ietf-6man-rfc2460bis-06.txt |
2016-09-13
|
06 | Bob Hinden | New version approved |
2016-09-13
|
06 | Bob Hinden | Request for posting confirmation emailed to previous authors: "Robert M. Hinden" , 6man-chairs@ietf.org |
2016-09-13
|
06 | (System) | Uploaded new revision |
2016-07-16
|
05 | Ole Trøan | IETF WG state changed to In WG Last Call from WG Document |
2016-06-28
|
05 | Bob Hinden | New version available: draft-ietf-6man-rfc2460bis-05.txt |
2016-05-22
|
04 | Ole Trøan | Notification list changed to "Ole Troan" <otroan@employees.org> |
2016-05-22
|
04 | Ole Trøan | Document shepherd changed to Ole Troan |
2016-03-21
|
04 | Bob Hinden | New version available: draft-ietf-6man-rfc2460bis-04.txt |
2016-03-02
|
03 | Ole Trøan | Added to session: IETF-95: 6man (unscheduled) |
2016-01-22
|
03 | Bob Hinden | New version available: draft-ietf-6man-rfc2460bis-03.txt |
2015-12-15
|
02 | Bob Hinden | New version available: draft-ietf-6man-rfc2460bis-02.txt |
2015-11-02
|
01 | Bob Hinden | New version available: draft-ietf-6man-rfc2460bis-01.txt |
2015-10-19
|
00 | Bob Hinden | This document now replaces draft-hinden-6man-rfc2460bis instead of None |
2015-10-19
|
00 | Bob Hinden | Intended Status changed to Internet Standard from None |
2015-10-19
|
00 | Bob Hinden | New version available: draft-ietf-6man-rfc2460bis-00.txt |