Skip to main content

Protocol for Access Node Control Mechanism in Broadband Networks
draft-ietf-ancp-protocol-17

Revision differences

Document history

Date Rev. By Action
2012-08-22
17 (System) post-migration administrative database adjustment to the No Objection position for Sean Turner
2012-08-22
17 (System) post-migration administrative database adjustment to the No Objection position for Robert Sparks
2012-08-22
17 (System) post-migration administrative database adjustment to the No Objection position for Dan Romascanu
2012-08-22
17 (System) post-migration administrative database adjustment to the No Objection position for Alexey Melnikov
2012-08-22
17 (System) post-migration administrative database adjustment to the No Objection position for Adrian Farrel
2011-06-17
17 (System) IANA Action state changed to RFC-Ed-Ack from Waiting on RFC Editor
2011-06-17
17 (System) IANA Action state changed to Waiting on RFC Editor from In Progress
2011-06-17
17 (System) IANA Action state changed to In Progress from Waiting on Authors
2011-06-16
17 (System) IANA Action state changed to Waiting on Authors from In Progress
2011-06-13
17 (System) IANA Action state changed to In Progress from Waiting on Authors
2011-06-10
17 (System) IANA Action state changed to Waiting on Authors from In Progress
2011-05-31
17 Cindy Morgan State changed to RFC Ed Queue from Approved-announcement sent.
2011-05-31
17 (System) IANA Action state changed to In Progress from Waiting on Authors
2011-05-25
17 (System) IANA Action state changed to Waiting on Authors from In Progress
2011-05-18
17 David Harrington Closed request for Last Call review by TSVDIR with state 'No Response'
2011-05-17
17 (System) IANA Action state changed to In Progress
2011-05-17
17 Amy Vezza IESG state changed to Approved-announcement sent
2011-05-17
17 Amy Vezza IESG has approved the document
2011-05-17
17 Amy Vezza Closed "Approve" ballot
2011-05-17
17 Amy Vezza Approval announcement text regenerated
2011-05-17
17 Amy Vezza Ballot writeup text changed
2011-05-16
17 Dan Romascanu [Ballot Position Update] Position for Dan Romascanu has been changed to No Objection from Discuss
2011-04-26
17 Sean Turner [Ballot Position Update] Position for Sean Turner has been changed to No Objection from Discuss
2011-04-26
17 (System) New version available: draft-ietf-ancp-protocol-17.txt
2011-04-21
17 Adrian Farrel
[Ballot comment]
Thanks for working on my Discuss issues. I believe you have done enough for me to Clear. However, can I suggest that with …
[Ballot comment]
Thanks for working on my Discuss issues. I believe you have done enough for me to Clear. However, can I suggest that with the new version number scheme you change the Abstract as:

OLD
  ANCP is based on GSMPv3 (RFC 3292), but with many modifications and
  extensions, to the point that the two protocols are not
  interoperable.
NEW
  ANCP is based on GSMPv3 (RFC 3292), but with many modifications and
  extensions, to the point that the two protocols are not
  interoperable and so a new protocol version number is used.
END.

---

In my original Discuss I asked about co-existence. This has been taken to mean "co-existence within the same network" and work has been done in the I-D (thanks) to prevent clashes of protocol version numbers and protect against future versions, etc.

It is still not quite clear to me how an implementation that supported ANCP and GSMP would work out which code component was bound to the port etc. But I suspect this case is unlikely to arise.
2011-04-21
17 Adrian Farrel [Ballot Position Update] Position for Adrian Farrel has been changed to No Objection from Discuss
2011-04-20
17 Robert Sparks [Ballot Position Update] Position for Robert Sparks has been changed to No Objection from Discuss
2011-04-18
17 Peter Saint-Andre [Ballot Position Update] Position for Peter Saint-Andre has been changed to No Objection from Discuss
2011-04-18
17 (System) Sub state has been changed to AD Follow up from New Id Needed
2011-04-18
16 (System) New version available: draft-ietf-ancp-protocol-16.txt
2011-03-17
17 Cindy Morgan Removed from agenda for telechat
2011-03-17
17 Cindy Morgan State changed to IESG Evaluation::Revised ID Needed from IESG Evaluation.
2011-03-17
17 Alexey Melnikov [Ballot comment]
Peter took over my DISCUSS/Comment.
2011-03-17
17 Alexey Melnikov [Ballot Position Update] Position for Alexey Melnikov has been changed to No Objection from Discuss
2011-03-17
17 Peter Saint-Andre
[Ballot comment]
[I am taking over this COMMENT from Alexey Melnikov]

5.1.1.  Control Context (Informative)

  Aside from its use in ANCP signalling, access line …
[Ballot comment]
[I am taking over this COMMENT from Alexey Melnikov]

5.1.1.  Control Context (Informative)

  Aside from its use in ANCP signalling, access line identification is
  also used in DHCP transactions involving hosts served by DSL.  Either
  the AN or the NAS can serve as a DHCP relay node.  [TR-101] requires
  the AN or NAS in this role to add access line identification in
  Option 82 (Information) to each DHCP request it forwards to the DHCP
  server.  It is desirable for efficiency that the identification used
  in this signalling should be the same as the identification used in
  ANCP messages.

An informative reference to DHCP is needed here.
2011-03-17
17 Peter Saint-Andre
[Ballot discuss]
The relationship between this specification and RFC 3292 is unclear and confusing.

On the one hand, this document notes that modifies the GSMPv3 …
[Ballot discuss]
The relationship between this specification and RFC 3292 is unclear and confusing.

On the one hand, this document notes that modifies the GSMPv3 adjacency message format, the base GSMPv3 message format, the GSMPv3 Event message format, and the Port Management message format; therefore it appears to update RFC 3292. However, the specification does not indicate that it updates RFC 3292.

On the other hand, this document points implementers to Sections 3.1.1, 9, and 11 of RFC 3292 for aspects of the protocol, thus introducing a normative dependency on parts of RFC 3292 while at the same time it updates other parts; why not simply copy the relevant text to this specification so that all the documentation is in one place, thus enabling us to remove the normative dependency on RFC 3292?

[The rest of this DISCUSS is copied from that of Alexey Melnikov because I am taking over his DISCUSS]

3.1.  Protocol Version

  GSMPv3 messages contain an 8-bit protocol version field.  As
  described below, ANCP subdivides this into two 4-bit sub-fields, for
  version and sub-version.  Implementations of this version of the ANCP
  specification MUST set the version sub-field to 3 and the sub-version
  sub-field to 1.  That is, the hexadecimal representation of the value
  of the complete protocol version field MUST be 0x31.

What is the meaning and semantics of version and subversion? The document is not
clear on why the separation into version and subversion is needed.

3.2.  ANCP Transport

  Identifier:  This 2-byte field identifies a GSMP or ANCP message.
      The type code for GSMP and ANCP messages is 0x880C (i.e., the same
      as GSMP's Ethertype).

Is it wise to reuse the same identifier, considering the statement elsewhere
in the document that the 2 protocols are not really compatible?

  The NAS MUST listen for incoming connections from the Access Nodes.
  Port 6068 is used for TCP connection.

Does this need to be listed in the IANA Considerations section?

4.5.  Status-Info TLV

      Error Message:  Human-readable string providing information about
        the warning or error condition.  Padded with zeroes as
        necessary to extend to a four-byte word boundary.

Typically human readable strings need some language tagging information.
Please
see  for
more details.

8.5.1.  OAM-Loopback-Test-Parameters TLV

        Byte 2: Timeout.  Upper bound on the time in seconds that the
        NAS will wait for a response from the DSLAM.  The value 0 MAY
        be used, but has a special meaning.

What is the special meaning of 0?

10.  Security Considerations

  Security of the ANCP protocol is discussed in [RFC5713].  A number of
  security requirements on ANCP are stated in Section 8 of that
  document.  Those applicable to ANCP itself are listed here:

  o  The protocol solution MUST offer authentication of the AN to the
      NAS.

  o  The protocol solution MUST offer authentication of the NAS to the
      AN.

This section is a bit think on TLS-specific details. In particular it doesn't
describe how these requirements can be achieved with TLS (Note that TLS client
authentication to the TLS server is optional, so not every ciphersuite is
suitable to satisfy these requirements).
2011-03-17
17 Stewart Bryant
[Ballot comment]
RFC EDITOR'S NOTE: please change the value of sub-version in the
  above paragraph to 2 (respectively a version field value of 0x32) …
[Ballot comment]
RFC EDITOR'S NOTE: please change the value of sub-version in the
  above paragraph to 2 (respectively a version field value of 0x32) in
  the published specification.  For an explanation see the Introduction
  above.

I understand the need to rev this field, but not why it is done via an embedded Editors note

----------
2011-03-17
17 Stewart Bryant [Ballot Position Update] New position, No Objection, has been recorded
2011-03-17
17 Dan Romascanu
[Ballot comment]
I support the DISCUSSes by Adrian and Alexey concerning the version number and the DISCUSS from Peter concerning the relationship with RFC 3292 …
[Ballot comment]
I support the DISCUSSes by Adrian and Alexey concerning the version number and the DISCUSS from Peter concerning the relationship with RFC 3292.
2011-03-17
17 Dan Romascanu
[Ballot discuss]
In section 3.6.1.4:

> In addition to any suggested action in the text which follows, the
  Code value SHOULD be logged in …
[Ballot discuss]
In section 3.6.1.4:

> In addition to any suggested action in the text which follows, the
  Code value SHOULD be logged in a MIB. 

If I was writing the MIB module and/or the instrumentation for MIB module I would not know what to do, What needs to be logged in a MIB module? (or MIB object? which of these?). The fact that the code value is supported? Each sending of a request? Each receive of a Request? Something else?
2011-03-17
17 Dan Romascanu [Ballot Position Update] New position, Discuss, has been recorded
2011-03-17
17 Sean Turner [Ballot comment]
#1) I support Alexey's discuss position on TLS.
2011-03-17
17 Sean Turner
[Ballot discuss]
#1) DISCUSS-DISCUSS

I have to admint I'm completely out of my element here:

If ANCP and GSMPv3 do kind of the same thing. …
[Ballot discuss]
#1) DISCUSS-DISCUSS

I have to admint I'm completely out of my element here:

If ANCP and GSMPv3 do kind of the same thing. Has there been thought to retiring GSMPv3?  Are the two protocols going to gracefully co-exist?

#2) Sec 10 includes security considerations from RFC 5713 with an informative reference.  If these are the security considerations of ANCP aren't they normative?  Unfortunately, RFC 5713 is informative and this would then be a DOWNREF.
2011-03-17
17 Sean Turner [Ballot Position Update] New position, Discuss, has been recorded
2011-03-17
17 Jari Arkko [Ballot Position Update] New position, No Objection, has been recorded
2011-03-16
17 Peter Saint-Andre [Ballot comment]
I concur with the DISCUSSes posted by Adrian Farrel and Alexey Melnikov.
2011-03-16
17 Peter Saint-Andre
[Ballot discuss]
The relationship between this specification and RFC 3292 is unclear and confusing.

On the one hand, this document notes that modifies the GSMPv3 …
[Ballot discuss]
The relationship between this specification and RFC 3292 is unclear and confusing.

On the one hand, this document notes that modifies the GSMPv3 adjacency message format, the base GSMPv3 message format, the GSMPv3 Event message format, and the Port Management message format; therefore it appears to update RFC 3292. However, the specification does not indicate that it updates RFC 3292.

On the other hand, this document points implementers to Sections 3.1.1, 9, and 11 of RFC 3292 for aspects of the protocol, thus introducing a normative dependency on parts of RFC 3292 while at the same time it updates other parts; why not simply copy the relevant text to this specification so that all the documentation is in one place, thus enabling us to remove the normative dependency on RFC 3292?
2011-03-16
17 Peter Saint-Andre [Ballot Position Update] New position, Discuss, has been recorded
2011-03-16
17 Robert Sparks
[Ballot comment]
I found the "must" convention distracting, and am skeptical of it's effectiveness as a way to communicate requirements to another SDO (which is …
[Ballot comment]
I found the "must" convention distracting, and am skeptical of it's effectiveness as a way to communicate requirements to another SDO (which is what I understand its purpose to be based on the author's response to the genart review). If this remains in the document, please follow up and ensure it had the desired effect before trying the convention again.

Section 3.6.1.6 speaks of incrementing transaction IDs linearly when I think it's really trying to say "by one". (If there's ever a chance of an intermediary being introduced in the path of these messages, it would help to say something now about whether recipients should care about gaps in the sequence they receive.)
2011-03-16
17 Robert Sparks
[Ballot discuss]
Allowing ACNP agents to use any Code values from the (about to be modified) GSMPv3 Failure Response Message Name Space registry "if they …
[Ballot discuss]
Allowing ACNP agents to use any Code values from the (about to be modified) GSMPv3 Failure Response Message Name Space registry "if they appear applicable" seems underspecified. Could some guidance about when a code would NOT be applicable be added? Would an exhaustive list of applicability of the codes already registered (in the IETF Consensus ranges) be hard to produce?  I take it from Tom's responses to some of the review comments that you do not expect GSMPv3 focused codes to be added to the registry, but if one ever were added (with a value below 256) that really was targeting GSMP and not ANCP, why not ask the registrant say so and capture it in the registry?

Can the document explain when it might be reasonable to not follow the SHOULD in 3.6.1.7?
2011-03-16
17 Robert Sparks [Ballot Position Update] New position, Discuss, has been recorded
2011-03-16
17 Ron Bonica [Ballot Position Update] New position, No Objection, has been recorded
2011-03-16
17 Adrian Farrel
[Ballot discuss]
I have two issues related to version numbering that I would like to
Discuss. Additionally, if time permits, I intend to return with …
[Ballot discuss]
I have two issues related to version numbering that I would like to
Discuss. Additionally, if time permits, I intend to return with a more
in depth review of the protocol

---

I am trying to work out how ANCP will co-exist with GSMP. It seems they
both use the same port (6068) so I assume disambiguation happens on
version number negotiation. But...

A GSMP version number is an 8 bit number, with 0x03 being the current
version. Since the GSMP version number is not currently tracked by IANA,
there is a risk that a future version of GSMP will decide that 0x32
(i.e., version 50) will be used.

I strongly suggest, therefore, that you need a new registry for the
"GSMP and ANCP version Numbers". This will need some careful words to
indicate that GSMP version 4 is allowed. You will also want to track
ANCP sub-versions (but see below).

[This point relates to part of Alexey's Discuss]

---

I am really not happy about the lengths that are being gone to to
support pre-standard implementations. I think this document should at
least state that version 3.1 is not allowed. That is, it should not
allow downward version negotiation from 3.2. Furthermore, sub-version
1 should be shown in the IANA registry as "reserved - not available for
allocation".

Furthermore, I see no reason to require the RFC Editor to make the
various changes you request with respect to the version numbering. You
should make these changes now.
2011-03-16
17 Adrian Farrel [Ballot Position Update] New position, Discuss, has been recorded
2011-03-15
17 Ralph Droms State changed to IESG Evaluation from Waiting for AD Go-Ahead.
2011-03-15
17 Russ Housley
[Ballot comment]
The Gen-ART Review by Ben Campbell on 9-Mar-2011 raised a few minor
  points.  Tom Taylor responded; he seems to agree with some …
[Ballot comment]
The Gen-ART Review by Ben Campbell on 9-Mar-2011 raised a few minor
  points.  Tom Taylor responded; he seems to agree with some of them. 
  However, the document has not been updated yet.  Please do so before
  approval.
2011-03-15
17 Russ Housley [Ballot Position Update] New position, No Objection, has been recorded
2011-03-15
17 Alexey Melnikov
[Ballot discuss]
[Updated: added one more issue in the DISCUSS section (look at the end of it)]

This is a well written document and I …
[Ballot discuss]
[Updated: added one more issue in the DISCUSS section (look at the end of it)]

This is a well written document and I don't have objections to its publication. However I would like to discuss the following issues before recommending its approval:

3.1.  Protocol Version

  GSMPv3 messages contain an 8-bit protocol version field.  As
  described below, ANCP subdivides this into two 4-bit sub-fields, for
  version and sub-version.  Implementations of this version of the ANCP
  specification MUST set the version sub-field to 3 and the sub-version
  sub-field to 1.  That is, the hexadecimal representation of the value
  of the complete protocol version field MUST be 0x31.

What is the meaning and semantics of version and subversion? The document is not clear on why the separation into version and subversion is needed.

3.2.  ANCP Transport

  Identifier:  This 2-byte field identifies a GSMP or ANCP message.
      The type code for GSMP and ANCP messages is 0x880C (i.e., the same
      as GSMP's Ethertype).

Is it wise to reuse the same identifier, considering the statement elsewhere
in the document that the 2 protocols are not really compatible?

  The NAS MUST listen for incoming connections from the Access Nodes.
  Port 6068 is used for TCP connection.

Does this need to be listed in the IANA Considerations section?


4.5.  Status-Info TLV

      Error Message:  Human-readable string providing information about
        the warning or error condition.  Padded with zeroes as
        necessary to extend to a four-byte word boundary.

Typically human readable strings need some language tagging information.
Please see  for more details.

8.5.1.  OAM-Loopback-Test-Parameters TLV

        Byte 2: Timeout.  Upper bound on the time in seconds that the
        NAS will wait for a response from the DSLAM.  The value 0 MAY
        be used, but has a special meaning.

What is the special meaning of 0?

10.  Security Considerations

  Security of the ANCP protocol is discussed in [RFC5713].  A number of
  security requirements on ANCP are stated in Section 8 of that
  document.  Those applicable to ANCP itself are listed here:

  o  The protocol solution MUST offer authentication of the AN to the
      NAS.

  o  The protocol solution MUST offer authentication of the NAS to the
      AN.

This section is a bit think on TLS-specific details. In particular it doesn't describe how these requirements can be achieved with TLS (Note that TLS client authentication to the TLS server is optional, so not every ciphersuite is suitable to satisfy these requirements).
2011-03-14
17 Alexey Melnikov
[Ballot comment]
5.1.1.  Control Context (Informative)

  Aside from its use in ANCP signalling, access line identification is
  also used in DHCP transactions involving …
[Ballot comment]
5.1.1.  Control Context (Informative)

  Aside from its use in ANCP signalling, access line identification is
  also used in DHCP transactions involving hosts served by DSL.  Either
  the AN or the NAS can serve as a DHCP relay node.  [TR-101] requires
  the AN or NAS in this role to add access line identification in
  Option 82 (Information) to each DHCP request it forwards to the DHCP
  server.  It is desirable for efficiency that the identification used
  in this signalling should be the same as the identification used in
  ANCP messages.

An informative reference to DHCP is needed here.
2011-03-14
17 Alexey Melnikov
[Ballot discuss]
This is a well written document and I don't have objections to its publication. However I would like to discuss the following issues …
[Ballot discuss]
This is a well written document and I don't have objections to its publication. However I would like to discuss the following issues before recommending its approval:

3.1.  Protocol Version

  GSMPv3 messages contain an 8-bit protocol version field.  As
  described below, ANCP subdivides this into two 4-bit sub-fields, for
  version and sub-version.  Implementations of this version of the ANCP
  specification MUST set the version sub-field to 3 and the sub-version
  sub-field to 1.  That is, the hexadecimal representation of the value
  of the complete protocol version field MUST be 0x31.

What is the meaning and semantics of version and subversion? The document is not clear on why the separation into version and subversion is needed.

3.2.  ANCP Transport

  Identifier:  This 2-byte field identifies a GSMP or ANCP message.
      The type code for GSMP and ANCP messages is 0x880C (i.e., the same
      as GSMP's Ethertype).

Is it wise to reuse the same identifier, considering the statement elsewhere
in the document that the 2 protocols are not really compatible?

  The NAS MUST listen for incoming connections from the Access Nodes.
  Port 6068 is used for TCP connection.

Does this need to be listed in the IANA Considerations section?


4.5.  Status-Info TLV

      Error Message:  Human-readable string providing information about
        the warning or error condition.  Padded with zeroes as
        necessary to extend to a four-byte word boundary.

Typically human readable strings need some language tagging information.
Please see  for more details.

8.5.1.  OAM-Loopback-Test-Parameters TLV

        Byte 2: Timeout.  Upper bound on the time in seconds that the
        NAS will wait for a response from the DSLAM.  The value 0 MAY
        be used, but has a special meaning.

What is the special meaning of 0?
2011-03-13
17 Alexey Melnikov
[Ballot comment]
3.2.  ANCP Transport

  The NAS MUST listen for incoming connections from the Access Nodes.
  Port 6068 is used for TCP connection. …
[Ballot comment]
3.2.  ANCP Transport

  The NAS MUST listen for incoming connections from the Access Nodes.
  Port 6068 is used for TCP connection.

Does this need to be listed in the IANA Considerations section?

4.1.  Provisioning Message

  The Provisioning message is sent by the NAS to the AN to provision
  information of global scope (i.e., not associated with specific
  access lines) on the AN.  The Provisioning message has the format
  shown in Figure 8.  Support of the Provisioning message is OPTIONAL
  unless the ANCP agent claims support for a capability that requires
  its use.

Is any such capability defined?

5.1.1.  Control Context (Informative)

  Aside from its use in ANCP signalling, access line identification is
  also used in DHCP transactions involving hosts served by DSL.  Either
  the AN or the NAS can serve as a DHCP relay node.  [TR-101] requires
  the AN or NAS in this role to add access line identification in
  Option 82 (Information) to each DHCP request it forwards to the DHCP
  server.  It is desirable for efficiency that the identification used
  in this signalling should be the same as the identification used in
  ANCP messages.

An informative reference to DHCP is needed here.
2011-03-13
17 Alexey Melnikov
[Ballot discuss]
This is a well written document and I don't have objections to its publication. However I would like to discuss the following issues …
[Ballot discuss]
This is a well written document and I don't have objections to its publication. However I would like to discuss the following issues before recommending its approval:

3.1.  Protocol Version

  GSMPv3 messages contain an 8-bit protocol version field.  As
  described below, ANCP subdivides this into two 4-bit sub-fields, for
  version and sub-version.  Implementations of this version of the ANCP
  specification MUST set the version sub-field to 3 and the sub-version
  sub-field to 1.  That is, the hexadecimal representation of the value
  of the complete protocol version field MUST be 0x31.

What is the meaning and semantics of version and subversion? The document is not clear on why the separation into version and subversion is needed.

3.2.  ANCP Transport

  Identifier:  This 2-byte field identifies a GSMP or ANCP message.
      The type code for GSMP and ANCP messages is 0x880C (i.e., the same
      as GSMP's Ethertype).

Is it wise to reuse the same identifier, considering the statement elsewhere
in the document that the 2 protocols are not really compatible?

4.5.  Status-Info TLV

      Error Message:  Human-readable string providing information about
        the warning or error condition.  Padded with zeroes as
        necessary to extend to a four-byte word boundary.

Typically human readable strings need some language tagging information.
Please see  for more details.

8.5.1.  OAM-Loopback-Test-Parameters TLV

        Byte 2: Timeout.  Upper bound on the time in seconds that the
        NAS will wait for a response from the DSLAM.  The value 0 MAY
        be used, but has a special meaning.

What is the special meaning of 0?
2011-03-13
17 Alexey Melnikov [Ballot Position Update] New position, Discuss, has been recorded
2011-03-09
17 (System) State changed to Waiting for AD Go-Ahead from In Last Call.
2011-03-07
17 Amanda Baber
IANA understands that, upon approval of this document, there are nine
IANA Actions that need to be completed.

First, in the GSMPv3 Message Type Name …
IANA understands that, upon approval of this document, there are nine
IANA Actions that need to be completed.

First, in the GSMPv3 Message Type Name Space registry located at:

http://www.iana.org/assignments/gsmpv3-message

IANA will create a new message category.  The name of the new message
category is: "Access Network Control Protocol (ANCP) Messages".  The
initial values for this new message category are:

+------------------+----------------+--------+-----------+
| Message Name    | Message Number | Status | Reference |
+------------------+----------------+--------+-----------+
| Generic Response | 91            |        | RFC-to-be |  |
| Provisioning    | 93            |        | RFC-to-be |
+------------------+----------------+--------+-----------+

Second, in the Global Switch Management Protocol version 3 (GSMPv3)
Result Type Name Space located at:

http://www.iana.org/assignments/gsmpv3-result/gsmpv3-result.xml

IANA will make a single change to the existing registry.  The
registration for Result Value zero will be changed as follows:

+--------------+-----------------------+-----------+
| Result Value | Result Type Name      | Reference |
+--------------+-----------------------+-----------+
| 0            | Ignore (was Reserved) | RFC-to-be |
+--------------+-----------------------+-----------+

Third, IANA will make a series of modifications to the Global Switch
Management Protocol version 3 (GSMPv3) Failure Response Message Name
Space located at:

http://www.iana.org/assignments/gsmpv3-failure/gsmpv3-failure.xml

The following note will be added to the beginning of the registry:

"This registry is shared with the Access Node Control Protocol (ANCP)
[RFC-to-be].  GSMPv3 [RFC3292] allows values up to a maximum of 255.
ANCP extends this maximum to 4095.  Hence values above 255 are
applicable to ANCP only."

The table of registration procedures will be modified to include the
following line:

+----------+------------------------+---------------+
| Range    | Registration Procedure | Notes        |
+----------+------------------------+---------------+
| 256-4095 | IETF Consensus        | ANCP use only |
+----------+------------------------+---------------+

The registry of failure response messages will be modified so that the
following values are added to the appropriate lines of the registry:

+-------+----------------------------------------------+-----------+
| Value | Failure Response Message Name                | Reference |
+-------+----------------------------------------------+-----------+
| 81    | Request message type not implemented (0x51)  | RFC-to-be |
| 83    | Malformed message (0x53)                    | RFC-to-be |
| 84    | Mandatory TLV missing (0x54)                | RFC-to-be |
| 85    | Invalid value in TLV (0x55)                  | RFC-to-be |
| 1280  | Specified access line does not exist (0x500) | RFC-to-be |
| 1281  | Loopback test timed out (0x501)              | RFC-to-be |
| 1282  | Reserved (0x502)                            | RFC-to-be |
| 1283  | DSL line status showtime (0x503)            | RFC-to-be |
| 1284  | DSL line status idle (0x504)                | RFC-to-be |
| 1285  | DSL line status silent (0x505)              | RFC-to-be |
| 1286  | DSL line status training (0x506)            | RFC-to-be |
| 1287  | DSL line integrity error (0x507)            | RFC-to-be |
| 1288  | DSLAM resource not available (0x508)        | RFC-to-be |
| 1289  | Invalid test parameter (0x509)              | RFC-to-be |
+-------+----------------------------------------------+-----------+

The ranges of unassigned codes at the end of the failure response
message name table will be modified as follows:


+-----------+-------------------------------+-----------+
| Value    | Failure Response Message Name | Reference |
+-----------+-------------------------------+-----------+
| 8-9      | Unassigned                    |          |
| 47-59    | Unassigned                    |          |
| 86-127    | Unassigned                    |          |
| 160-255  | Unassigned                    |          |
| 256-1279  | Unassigned (ANCP use only)    |          |
| 1290-4095 | Unassigned (ANCP use only)    |          |
+-----------+-------------------------------+-----------+

Fourth, a new registry will be created for ANCP Port Management Function
Names. Values in this registry will be managed through IETF Consensus.
Values in the registry may range from 0 to 255 inclusive. 

The registry will include the following note: "Future extensions of ANCP
may need to establish sub-registries of permitted X-Function values for
specific values of Function."

The initial values in this registry are:

+----------------+-----------------------------------+-----------+
| Function Value | Function Name                    | Reference |
+----------------+-----------------------------------+-----------+
| 0              | Reserved                          | RFC-to-be |
| 1-7            | Unassigned                        |          |
| 8              | Configure Connection Service Data | RFC-to-be |
| 9              | Remote Loopback                  | RFC-to-be |
| 10-255        | Unassigned                        |          |
+----------------+-----------------------------------+-----------+

Fifth, a new registry will be created for ANCP Versions.  Values in this
registry will be managed through IETF Consensus.

The initial values in this registry are:

+---------+-------------+--------------+-----------+
| Version | Sub-Version | Name        | Reference |
+---------+-------------+--------------+-----------+
| 3      | 1          | Pre-standard |          |
| 3      | 2          | ANCPv1      | RFC-to-be |
+---------+-------------+--------------+-----------+

Sixth, a new registry will be created for ANCP Technology Types. Values
in this registry will be managed through IETF Consensus.

The initial values in this registry are:

+-----------------+----------------+-----------+
| Tech Type Value | Tech Type Name | Reference |
+-----------------+----------------+-----------+
| 0              | Any technology | RFC-to-be |
| 1              | PON            | RFC-to-be |
| 2-4            | Unassigned    |          |
| 5              | DSL            | RFC-to-be |
| 6-254          | Unassigned    |          |
| 255            | Reserved      | RFC-to-be |
+-----------------+----------------+-----------+

Seventh, a new registry will be created for ANCP Command Codes. Values
in this registry will be managed through IETF Consensus.

The initial values in this registry are::

+--------------------+-----------------------------+-----------+
| Command Code Value | Command Code Directive Name | Reference |
+--------------------+-----------------------------+-----------+
| 0                  | Reserved                    | RFC-to-be |
+--------------------+-----------------------------+-----------+

Eigth, a new registry will be created for ANCP TLV Types. Values may
range from 0x0000 to 0xFFFF.  New assignments should be in the range of
values from 0x0100 upwards. Values in this registry will be managed
through IETF Consensus.

The initial values in thie registry are:

+---------------+--------------------------------------------+-----------+
| Type Code    | TLV Name                                  | Reference |
+---------------+--------------------------------------------+-----------+
| 0x0000        | Reserved                                  | RFC-to-be |
| 0x0001        | Access-Loop-Circuit-ID                    | RFC-to-be |
| 0x0002        | Access-Loop-Remote-Id                      | RFC-to-be |
| 0x0003        | Access-Aggregation-Circuit-ID-ASCII        | RFC-to-be |
| 0x0004        | DSL-Line-Attributes                        | RFC-to-be |
| 0x0005        | Service-Profile-Name                      | RFC-to-be |
| 0x0006        | Access-Aggregation-Circuit-ID-Binary      | RFC-to-be |
| 0x0007        | OAM-Loopback-Test-Parameters              | RFC-to-be |
| 0x0008        | Opaque-Data                                | RFC-to-be |
| 0x0009        | OAM-Loopback-Test-Response-String          | RFC-to-be |
| 0x000a-0x0010 | Unassigned                                |          |
| 0x0011        | Command                                    | RFC-to-be |
| 0x0012-0x0080 | Unassigned                                |          |
| 0x0081        | Actual-Net-Data-Upstream                  | RFC-to-be |
| 0x0082        | Actual-Net-Data-Rate-Downstream            | RFC-to-be |
| 0x0083        | Minimum-Net-Data-Rate-Upstream            | RFC-to-be |
| 0x0084        | Minimum-Net-Data-Rate-Downstream          | RFC-to-be |
| 0x0085        | Attainable-Net-Data-Rate-Upstream          | RFC-to-be |
| 0x0086        | Attainable-Net-Data-Rate-Downstream        | RFC-to-be |
| 0x0087        | Maximum-Net-Data-Rate-Upstream            | RFC-to-be |
| 0x0088        | Maximum-Net-Data-Rate-Downstream          | RFC-to-be |
| 0x0089        | Minimum-Net-Low-Power-Data-Rate-Upstream  | RFC-to-be |
| 0x008A        | Minimum-Net-Low-Power-Data-Rate-Downstrea  | RFC-to-be |
| 0x008B        | Maximum-Interleaving-Delay-Upstream        | RFC-to-be |
| 0x008C        | Actual-Interleaving-Delay-Upstream        | RFC-to-be |
| 0x008D        | Maximum-Interleaving-Delay-Downstream      | RFC-to-be |
| 0x008E        | Actual-Interleaving-Delay-Downstream      | RFC-to-be |
| 0x008F        | DSL-Line-State                            | RFC-to-be |
| 0x0090        | Access-Loop-Encapsulation                  | RFC-to-be |
| 0x0091        | DSL-Type                                  | RFC-to-be |
| 0x092-0x0105  | Unassigned                                |          |
| 0x0106        | Status-Info                                | RFC-to-be |
| 0x0107-0x0FFF | Unassigned                                |          |
| 0x1000        | Target (single access line variant)        | RFC-to-be |
| 0x1001 -      | Reserved for Target variants              | RFC-to-be |
| 0x1020        |                                            |          |
| 0x1021-0xFFFF | Unassigned                                |          |
+---------------+--------------------------------------------+-----------+


Ninth, a new registry will be created for ANCP Capabilities.  Values may
range from 0 to 255.  The specification for a given capability MUST
indicate whether it applies to a specific access technology or applies
to all access technologies.  The specification MUST further indicate
whether the capability is associated with any capability data. Values in
this registry will be managed through IETF Consensus.

Initial values in the new registry will be:

+-------+-------------------+------------+--------------+-----------+
| Value | Capability Type  | Technology | Capability  | Reference |
|      | Name              |            | Data        |          |
+-------+-------------------+------------+--------------+-----------+
| 0    | Reserved          |            |              | RFC-to-be |
| 1    | DSL Topology      | DSL        | None        | RFC-to-be |
|      | Discovery        |            |              |          |
| 2    | DSL Line          | DSL        | None        | RFC-to-be |
|      | Configuration    |            |              |          |
| 3    | Reserved          |            |              | RFC-to-be |
| 4    | DSL Line Testing  | DSL        | None        | RFC-to-be |
| 5-255 | Unassigned        |            |              |          |
+-------+-------------------+------------+--------------+-----------+

IANA understands that these nine actions are all that are required upon
approval of this document.
2011-02-26
17 Samuel Weiler Request for Last Call review by SECDIR is assigned to Catherine Meadows
2011-02-26
17 Samuel Weiler Request for Last Call review by SECDIR is assigned to Catherine Meadows
2011-02-24
17 David Harrington Request for Last Call review by TSVDIR is assigned to Mark Handley
2011-02-24
17 David Harrington Request for Last Call review by TSVDIR is assigned to Mark Handley
2011-02-23
17 Amy Vezza Last call sent
2011-02-23
17 Amy Vezza
State changed to In Last Call from Last Call Requested.

The following Last Call Announcement was sent out:

From: The IESG
To: IETF-Announce
CC:
Reply-To: …
State changed to In Last Call from Last Call Requested.

The following Last Call Announcement was sent out:

From: The IESG
To: IETF-Announce
CC:
Reply-To: ietf@ietf.org
Subject: Last Call:  (Protocol for Access Node Control Mechanism in Broadband Networks) to Proposed Standard


The IESG has received a request from the Access Node Control Protocol WG
(ancp) to consider the following document:
- 'Protocol for Access Node Control Mechanism in Broadband Networks'
  as a Proposed Standard

The IESG plans to make a decision in the next few weeks, and solicits
final comments on this action. Please send substantive comments to the
ietf@ietf.org mailing lists by 2011-03-09. Exceptionally, comments may be
sent to iesg@ietf.org instead. In either case, please retain the
beginning of the Subject line to allow automated sorting.

The file can be obtained via
http://datatracker.ietf.org/doc/draft-ietf-ancp-protocol/

IESG discussion can be tracked via
http://datatracker.ietf.org/doc/draft-ietf-ancp-protocol/

2011-02-23
17 Ralph Droms Placed on agenda for telechat - 2011-03-17
2011-02-23
17 Ralph Droms Status Date has been changed to 2011-02-23 from None
2011-02-23
17 Ralph Droms Last Call was requested
2011-02-23
17 Ralph Droms State changed to Last Call Requested from AD Evaluation.
2011-02-23
17 Ralph Droms Last Call text changed
2011-02-23
17 Ralph Droms [Ballot Position Update] New position, Yes, has been recorded for Ralph Droms
2011-02-23
17 Ralph Droms Ballot has been issued
2011-02-23
17 Ralph Droms Created "Approve" ballot
2011-02-23
17 (System) Ballot writeup text was added
2011-02-23
17 (System) Last call text was added
2011-02-23
17 (System) Ballot approval text was added
2011-02-14
17 Ralph Droms Ballot writeup text changed
2011-02-12
17 Ralph Droms Ballot writeup text changed
2011-02-10
17 Ralph Droms State changed to AD Evaluation from Publication Requested.
2011-02-02
17 Cindy Morgan
(1.a) Who is the Document Shepherd for this document? Has the
Document Shepherd personally reviewed this version of the
document and, in particular, does he …
(1.a) Who is the Document Shepherd for this document? Has the
Document Shepherd personally reviewed this version of the
document and, in particular, does he or she believe this
version is ready for forwarding to the IESG for publication?

Matthew Bocci (matthew.bocci@alcatel-lucent.com)
Yes, I have reviewed the document and I believe it is ready for
forwarding to the IESG.


(1.b) Has the document had adequate review both from key WG members
and from key non-WG members? Does the Document Shepherd have
any concerns about the depth or breadth of the reviews that
have been performed?

Yes, the document has received adequate review. The document
has been developed over long period within the WG and received
extensive review over several years, as well as two WG last calls.

(1.c) Does the Document Shepherd have concerns that the document
needs more review from a particular or broader perspective,
e.g., security, operational complexity, someone familiar with
AAA, internationalization or XML?

No.


(1.d) Does the Document Shepherd have any specific concerns or
issues with this document that the Responsible Area Director
and/or the IESG should be aware of? For example, perhaps he
or she is uncomfortable with certain parts of the document, or
has concerns whether there really is a need for it. In any
event, if the WG has discussed those issues and has indicated
that it still wishes to advance the document, detail those
concerns here. Has an IPR disclosure related to this document
been filed? If so, please include a reference to the
disclosure and summarize the WG discussion and conclusion on
this issue.

No specific concerns. There is one IPR disclosure, 1124, which is
also claimed to apply to draft-ietf-ancp-framework-08 (now
RFC5851). The IPR disclosure was highlighted during WG last call,
but no concerns were raised.


(1.e) How solid is the WG consensus behind this document? Does it
represent the strong concurrence of a few individuals, with
others being silent, or does the WG as a whole understand and
agree with it?

I am comfortable that the document represents WG consensus and has
been reviewed by a reasonable number of active WG participants.


(1.f) Has anyone threatened an appeal or otherwise indicated extreme
discontent? If so, please summarise the areas of conflict in
separate email messages to the Responsible Area Director. (It
should be in a separate email because this questionnaire is
entered into the ID Tracker.)

None indicated.


(1.g) Has the Document Shepherd personally verified that the
document satisfies all ID nits? (See
http://www.ietf.org/ID-Checklist.html and
http://tools.ietf.org/tools/idnits/). Boilerplate checks are
not enough; this check needs to be thorough. Has the document
met all formal review criteria it needs to, such as the MIB
Doctor, media type and URI type reviews?


The document satisfied ID nits. No further formal reviews are
required.

(1.h) Has the document split its references into normative and
informative? Are there normative references to documents that
are not ready for advancement or are otherwise in an unclear
state? If such normative references exist, what is the
strategy for their completion? Are there normative references
that are downward references, as described in [RFC3967]? If
so, list these downward references to support the Area
Director in the Last Call procedure for them [RFC3967].

Yes, the references are split appropriately. There is one reference
to the ANCP framework, that will need to be updated as both documents
should be published together.



(1.i) Has the Document Shepherd verified that the document IANA
consideration section exists and is consistent with the body
of the document? If the document specifies protocol
extensions, are reservations requested in appropriate IANA
registries? Are the IANA registries clearly identified? If
the document creates a new registry, does it define the
proposed initial contents of the registry and an allocation
procedure for future registrations? Does it suggest a
reasonable name for the new registry? See [RFC5226]. If the
document describes an Expert Review process has Shepherd
conferred with the Responsible Area Director so that the IESG
can appoint the needed Expert during the IESG Evaluation?

The IANA considerations section exists and makes appropriate
requests.


(1.j) Has the Document Shepherd verified that sections of the
document that are written in a formal language, such as XML
code, BNF rules, MIB definitions, etc., validate correctly in
an automated checker?

There are no sections that use a formal language.


(1.k) The IESG approval announcement includes a Document
Announcement Write-Up. Please provide such a Document
Announcement Write-Up? Recent examples can be found in the
"Action" announcements for approved documents. The approval
announcement contains the following sections:

Technical Summary

This document describes the Access Node Control Protocol (ANCP).
ANCP operates between a Network Access Server (NAS) and an Access
Node (e.g., a Digital Subscriber Line Access Multiplexer (DSLAM)) in
a multi-service reference architecture in order to perform QoS-
related, service-related and subscriber-related operations. Use
cases for ANCP are documented in RFC 5851. As well as describing the
base ANCP protocol, this document specifies capabilities for Digital
Subscriber Line (DSL) topology discovery, line configuration, and
remote line connectivity testing. The design of ANCP allows for
protocol extensions in other documents if they are needed to support
other use cases and other access technologies.

ANCP is based on GSMPv3 (RFC 3292), but with many modifications and
extensions, to the point that the two protocols are not
interoperable.

This document is a product of the ANCP working group.

This document is Standards Track.

Working Group Summary

The origin of the working group can be traced back to the WT-147 "Layer 2 Control Protocol"
document from the Broadband Forum. The ANCP protocol developed in the ANCP working group
as a result of that document is typically used in the access and aggregation portions of a broadband
access network, and also in inter-provider
environments. This draft specifies the base protocol for ANCP, which is n itself derived from GSMP.

Document Quality

The document specifies the base protocol for ANCP which has a number of implementations.

Personnel
Who is the Document Shepherd for this document?

Matthew Bocci (matthew.bocci@alcatel-lucent.com)

Who is the Responsible Area Director?
Ralph Droms
2011-02-02
17 Cindy Morgan [Note]: changed to 'Matthew Bocci (matthew.bocci@alcatel-lucent.com) is the document shepherd.'
2011-02-02
17 Cindy Morgan Draft added in state Publication Requested
2011-02-02
17 Cindy Morgan [Note]: 'atthew Bocci (matthew.bocci@alcatel-lucent.com) is the document shepherd.' added
2011-02-02
15 (System) New version available: draft-ietf-ancp-protocol-15.txt
2011-01-11
14 (System) New version available: draft-ietf-ancp-protocol-14.txt
2011-01-04
13 (System) New version available: draft-ietf-ancp-protocol-13.txt
2010-08-24
12 (System) New version available: draft-ietf-ancp-protocol-12.txt
2010-08-23
11 (System) New version available: draft-ietf-ancp-protocol-11.txt
2010-07-11
10 (System) New version available: draft-ietf-ancp-protocol-10.txt
2010-02-26
09 (System) New version available: draft-ietf-ancp-protocol-09.txt
2009-11-09
08 (System) New version available: draft-ietf-ancp-protocol-08.txt
2009-10-22
07 (System) New version available: draft-ietf-ancp-protocol-07.txt
2009-07-13
06 (System) New version available: draft-ietf-ancp-protocol-06.txt
2009-03-31
(System) Posted related IPR disclosure: Deutsche Telekom AG's Statement about IPR related to draft-ietf-ancp-framework-08 and draft-ietf-ancp-protocol-05
2009-03-09
05 (System) New version available: draft-ietf-ancp-protocol-05.txt
2008-11-03
04 (System) New version available: draft-ietf-ancp-protocol-04.txt
2008-07-21
03 (System) New version available: draft-ietf-ancp-protocol-03.txt
2007-11-20
02 (System) New version available: draft-ietf-ancp-protocol-02.txt
2007-07-12
01 (System) New version available: draft-ietf-ancp-protocol-01.txt
2007-03-06
00 (System) New version available: draft-ietf-ancp-protocol-00.txt