Skip to main content

Dual-Stack Hosts Using "Bump-in-the-Host" (BIH)
draft-ietf-behave-v4v6-bih-09

Revision differences

Document history

Date Rev. By Action
2012-08-22
09 (System) post-migration administrative database adjustment to the No Objection position for Stephen Farrell
2012-08-22
09 (System) post-migration administrative database adjustment to the No Objection position for Adrian Farrel
2012-01-19
09 Cindy Morgan State changed to RFC Ed Queue from Approved-announcement sent.
2012-01-18
09 (System) IANA Action state changed to No IC
2012-01-18
09 Amy Vezza IESG state changed to Approved-announcement sent
2012-01-18
09 Amy Vezza IESG has approved the document
2012-01-18
09 Amy Vezza Closed "Approve" ballot
2012-01-18
09 Amy Vezza Ballot writeup text changed
2012-01-18
09 David Harrington State changed to Approved-announcement to be sent from IESG Evaluation::AD Followup.
2012-01-18
09 David Harrington Approval announcement text regenerated
2012-01-16
09 Stephen Farrell [Ballot discuss]
-09 solves all my issues, thanks for handling those,
S
2012-01-16
09 Stephen Farrell [Ballot Position Update] Position for Stephen Farrell has been changed to No Objection from Discuss
2012-01-16
09 (System) New version available: draft-ietf-behave-v4v6-bih-09.txt
2012-01-06
09 Stephen Farrell
[Ballot discuss]
-08 is nearly there, though I didn't see any mail (quicker to
resolve stuff that way usually), just a new I-D again.

Anyway, …
[Ballot discuss]
-08 is nearly there, though I didn't see any mail (quicker to
resolve stuff that way usually), just a new I-D again.

Anyway, thanks for adding the definitions, but I think one
more change is needed: I think you need to remove the
sentence that the "Real IPv4 address is opposite to synthetic
IPv4 address." That just adds confusion since its not really
the case.
2011-12-29
09 Stephen Farrell [Ballot comment]
2011-12-29
09 Stephen Farrell
[Ballot discuss]
-08 is nearly there, though I didn't see any mail (quicker to
resolve stuff that way usually), just a new I-D again.

Anyway, …
[Ballot discuss]
-08 is nearly there, though I didn't see any mail (quicker to
resolve stuff that way usually), just a new I-D again.

Anyway, thanks for adding the definitions, but I think one
more change is needed: I think you need to remove the
sentence that the "Real IPv4 address is opposite to synthetic
IPv4 address." That just adds confusion since its not really
the case.

I also note that you've added a RECOMMENDED (for the
socket API) and a timeout of 300ms that were not in the
previous version. Are those really changes or is it just
the diff tool making it appear as such? If those are real
changes, did the WG and AD agree with them? (Its
very late in the process for substantive changes like
that to be made.)
2011-12-22
09 (System) Sub state has been changed to AD Follow up from New Id Needed
2011-12-22
08 (System) New version available: draft-ietf-behave-v4v6-bih-08.txt
2011-12-16
09 David Harrington
State changed to IESG Evaluation::Revised ID Needed from IESG Evaluation::AD Followup.
draft-ietf-behave-v4v6-bih-07 continues to use the term "real"
address, without defining what a "real" address …
State changed to IESG Evaluation::Revised ID Needed from IESG Evaluation::AD Followup.
draft-ietf-behave-v4v6-bih-07 continues to use the term "real"
address, without defining what a "real" address is. If you insist on
using the term, then please provide a definition for it.

There are a number of comments from the IESG. These SHOULD be
addressed.

In section 8, can you use sentences rather than just phrases, to
explain the chnages a bit more than the current text does?

You refer to rfc1918 addresses as private addresses. I think there may
be more than one range of addresses that could be considered private;
can you change from using private to using rfc1918 addresses to be
more specific where appropriate?
2011-12-13
09 Stephen Farrell
[Ballot comment]
- The term "DNS synthesis" is used but not defined here. It
might be worth explaining. I see you've made a change there …
[Ballot comment]
- The term "DNS synthesis" is used but not defined here. It
might be worth explaining. I see you've made a change there
but am not sure that's made it super clear.
2011-12-13
09 Stephen Farrell
[Ballot discuss]
Part of my discuss on -06 said:

"- 2.3 says "If there is a real IPv4 address available..." but doesn't
say what is …
[Ballot discuss]
Part of my discuss on -06 said:

"- 2.3 says "If there is a real IPv4 address available..." but doesn't
say what is meant by "real" nor "available"- is it that an A record
was returned with a non-1918 address that is contactable or what?
Note - I'm not asking for any particular definition, just that
these terms be well-defined here."

Can you explain (in a mail) how the changes made in -07 address
this point and Pete Resnick's related comment?

Its just not quite clear to me, I'm not saying that the changes don't
address the issue.
2011-12-07
09 (System) Sub state has been changed to AD Follow up from New Id Needed
2011-12-07
07 (System) New version available: draft-ietf-behave-v4v6-bih-07.txt
2011-10-06
09 Cindy Morgan Removed from agenda for telechat
2011-10-06
09 Gonzalo Camarillo [Ballot Position Update] New position, No Objection, has been recorded
2011-10-06
09 Dan Romascanu [Ballot comment]
1. Section 1 uses the term 'DNS synthesis' without defining it.

2. Section 5 deals with ALG considerations but ALG is never expanded
2011-10-06
09 Dan Romascanu [Ballot Position Update] New position, No Objection, has been recorded
2011-10-05
09 Pete Resnick
[Ballot comment]
2.3 - I agree with Stephen's DISCUSS: MUST the ENR wait for an explicit negative response on the A record lookup, or can …
[Ballot comment]
2.3 - I agree with Stephen's DISCUSS: MUST the ENR wait for an explicit negative response on the A record lookup, or can it synthesize from the AAAA in other circumstances? Probably best to explicitly say so. I guess I'd like to hear specifically what "only IPv6 addresses are available" means.
2011-10-05
09 Pete Resnick [Ballot Position Update] New position, No Objection, has been recorded
2011-10-05
09 David Harrington
State changed to IESG Evaluation::Revised ID Needed from Waiting for AD Go-Ahead.
to handle the editorial comments from the IESG and the Gen-ART review.

To …
State changed to IESG Evaluation::Revised ID Needed from Waiting for AD Go-Ahead.
to handle the editorial comments from the IESG and the Gen-ART review.

To handle the creation of an IANA registry for MPA codes and error codes.
2011-10-05
09 Adrian Farrel [Ballot comment]
Clearing my Discuss having seen an email from the WG Chair to the original IPR holder.
2011-10-05
09 Adrian Farrel [Ballot Position Update] Position for Adrian Farrel has been changed to No Objection from Discuss
2011-10-05
09 Adrian Farrel
[Ballot discuss]
Does this document deliberately avoide the IPR disclosed in RFC 2767?
If not, have the people who disclosed IPR in 2767 been …
[Ballot discuss]
Does this document deliberately avoide the IPR disclosed in RFC 2767?
If not, have the people who disclosed IPR in 2767 been invited to comment on whether they have IPR in this document (for example, through a third party declaration or by email)?
2011-10-05
09 Adrian Farrel [Ballot Position Update] New position, Discuss, has been recorded
2011-10-05
09 Ralph Droms
[Ballot comment]
Thanks to the authors for a well-written, easily understandable document.

Assuming that this recommendation in section 2.3 (which I think appears elsewhere; e.g., …
[Ballot comment]
Thanks to the authors for a well-written, easily understandable document.

Assuming that this recommendation in section 2.3 (which I think appears elsewhere; e.g., in section 2.3.2) is a general recommendation:

  Hence the socket API layer option is RECOMMENDED.

it might be helpful to emphasize the recommendation by repeating it somewhere up front in the Introduction.

In section 2.3.4, why would availability of an IPv4 interface case BIH to shut down?
2011-10-05
09 Ralph Droms [Ballot Position Update] New position, No Objection, has been recorded
2011-10-05
09 Stewart Bryant [Ballot Position Update] New position, No Objection, has been recorded
2011-10-04
09 Sean Turner [Ballot Position Update] New position, No Objection, has been recorded
2011-10-04
09 Robert Sparks [Ballot Position Update] New position, No Objection, has been recorded
2011-10-04
09 Russ Housley
[Ballot comment]
The Gen-ART Review by  Wassim Haddad on 3-October-2011 raised this
  concern, and it needs to be resolved.

  Please clarify the connection …
[Ballot comment]
The Gen-ART Review by  Wassim Haddad on 3-October-2011 raised this
  concern, and it needs to be resolved.

  Please clarify the connection to the two obsoleted (RFCs 2767 & 3338).
  - The document states that it "obsoletes" them in the title page
    header and the abstract.
  - The document states that it "updates" them in the Introduction.
  - The document says that it is a "direct update to and directly
    derivative" from them in section 1.1.
  - The document says that it "combines and obsoletes" them in
    section 8.
  Please be clear that this document draws from the material in these
  RFCs, and that it obsoletes them.
2011-10-04
09 Russ Housley [Ballot Position Update] New position, No Objection, has been recorded
2011-10-04
09 Stephen Farrell
[Ballot comment]
- The term "DNS synthesis" is used but not defined here. It
might be worth explaining.

- 2.2, end of 1st para has …
[Ballot comment]
- The term "DNS synthesis" is used but not defined here. It
might be worth explaining.

- 2.2, end of 1st para has a lowercase "should" - is that meant
to be a 2119 SHOULD or not?

- 7.3 refers to "port translation" but I didn't see any discussion
of ports here - is the text there correct?
2011-10-04
09 Stephen Farrell
[Ballot discuss]
- 2.3 says "If there is a real IPv4 address available..." but doesn't
say what is meant by "real" nor "available"- is it …
[Ballot discuss]
- 2.3 says "If there is a real IPv4 address available..." but doesn't
say what is meant by "real" nor "available"- is it that an A record
was returned with a non-1918 address that is contactable or what?
Note - I'm not asking for any particular definition, just that
these terms be well-defined here.

- 2.3.2 says the "main resolver of a host running BIH SHOULD NOT
perform validation of A records" - I think you don't mean that
that resolver should never validate A records (e.g. while BIH is
not running) so clarifying that might be good e.g. by saying
"While running BIH, the main resolver of the host SHOULD NOT
perform validation of A records. While not running BIH, that
resolver can use DNSSEC in the same way that any other resolver
can." or something like that.

- 2.4 refers to section 4.3 for private addresses to use - shouldn't
that be referring to section 4.4?
2011-10-04
09 Stephen Farrell [Ballot Position Update] New position, Discuss, has been recorded
2011-10-03
09 Peter Saint-Andre
[Ballot comment]
The abstract states that this document obsoletes RFC 2767 and RFC 3338. The introduction states that this document updates those RFCs. I …
[Ballot comment]
The abstract states that this document obsoletes RFC 2767 and RFC 3338. The introduction states that this document updates those RFCs. I think the introduction might need to be changed.

Given that RFC 2767 was informational and RFC 3338 was experimental, it might be helpful to summarize the results of the experiment (e.g., implementation and deployment experience).
2011-10-03
09 Peter Saint-Andre [Ballot Position Update] New position, No Objection, has been recorded
2011-09-29
09 Ron Bonica [Ballot Position Update] New position, No Objection, has been recorded
2011-09-23
09 Wesley Eddy [Ballot Position Update] New position, No Objection, has been recorded
2011-09-14
09 (System) State changed to Waiting for AD Go-Ahead from In Last Call.
2011-09-09
09 Amanda Baber We understand that this document doesn't require any IANA actions.
2011-09-02
09 David Harrington Request for Last Call review by TSVDIR is assigned to Fernando Gont
2011-09-02
09 David Harrington Request for Last Call review by TSVDIR is assigned to Fernando Gont
2011-08-31
09 Amy Vezza Last call sent
2011-08-31
09 Amy Vezza
State changed to In Last Call from Last Call Requested.

The following Last Call Announcement was sent out:

From: The IESG
To: IETF-Announce
CC:
Reply-To: …
State changed to In Last Call from Last Call Requested.

The following Last Call Announcement was sent out:

From: The IESG
To: IETF-Announce
CC:
Reply-To: ietf@ietf.org
Subject: Last Call:  (Dual Stack Hosts Using "Bump-in-the-Host" (BIH)) to Proposed Standard


The IESG has received a request from the Behavior Engineering for
Hindrance Avoidance WG (behave) to consider the following document:
- 'Dual Stack Hosts Using "Bump-in-the-Host" (BIH)'
  as a Proposed Standard

The IESG plans to make a decision in the next few weeks, and solicits
final comments on this action. Please send substantive comments to the
ietf@ietf.org mailing lists by 2011-09-14. Exceptionally, comments may be
sent to iesg@ietf.org instead. In either case, please retain the
beginning of the Subject line to allow automated sorting.

Abstract


  Bump-In-the-Host (BIH) is a host-based IPv4 to IPv6 protocol
  translation mechanism that allows a class of IPv4-only applications
  that work through NATs to communicate with IPv6-only peers.  The host
  on which applications are running may be connected to IPv6-only or
  dual-stack access networks.  BIH hides IPv6 and makes the IPv4-only
  applications think they are talking with IPv4 peers by local
  synthesis of IPv4 addresses.  This draft obsoletes RFC 2767 and RFC
  3338
.




The file can be obtained via
http://datatracker.ietf.org/doc/draft-ietf-behave-v4v6-bih/

IESG discussion can be tracked via
http://datatracker.ietf.org/doc/draft-ietf-behave-v4v6-bih/


No IPR declarations have been submitted directly on this I-D.


2011-08-30
09 David Harrington Placed on agenda for telechat - 2011-10-06
2011-08-30
09 David Harrington [Ballot Position Update] New position, Yes, has been recorded for David Harrington
2011-08-30
09 David Harrington Ballot has been issued
2011-08-30
09 David Harrington Created "Approve" ballot
2011-08-30
09 David Harrington Last Call was requested
2011-08-30
09 David Harrington State changed to Last Call Requested from AD Evaluation::AD Followup.
2011-08-30
09 David Harrington Last Call text changed
2011-08-30
09 (System) Ballot writeup text was added
2011-08-30
09 (System) Last call text was added
2011-08-30
09 (System) Ballot approval text was added
2011-08-10
09 (System) Sub state has been changed to AD Follow up from New Id Needed
2011-08-10
06 (System) New version available: draft-ietf-behave-v4v6-bih-06.txt
2011-08-03
09 David Harrington
State changed to AD Evaluation::Revised ID Needed from Publication Requested.
AD review of draft-ietf-behave-v4v6-bih-05

The abstract or section 1.1 should explain WHY a successor is …
State changed to AD Evaluation::Revised ID Needed from Publication Requested.
AD review of draft-ietf-behave-v4v6-bih-05

The abstract or section 1.1 should explain WHY a successor is needed.

2.1 refers to Appendix B; there is no appendix B.

Typically appendices are used for non-normative content, but this appendix lists functions that MUST be intercepted (according to 2.1). This would probably be better placed in the main part of the document.

2.1 says the APIs MUST be intercepted; the Appendix says they SHOULD be intercepted. Which is it?

2.2 says "Protocol translation SHOULD NOT be performed for IPv4 packets sent to the IPv4 address range used by local synthesis and for which a mapping table entry does not exist. The implementation SHOULD attempt to route such packets via IPv4 interfaces instead." Why should and not MUST? Is should, what ar ethe valid exceptions to the recommended practice?

2.3 "returns a proper answer" => returns an answer

2.3 RECOMMENDS the socket API layer option. When is it approrpiate to use the other option?

in 2.3 "In either implementation option, if there is a real IPv4 address available, the ENR SHOULD NOT synthesize IPv4 addresses. By default an ENR implementation MUST NOT synthesize IPv4 addresses when real IPv4 addresses exist." Why only should not? What is the valid exception to a MUST NOT? (is this discussed elsewhere in the document?)

2.3.1 what is a martian address? reference?

overuse of "essentially"; this is typicallty not needed where it is used. "essentially the same" => similar

in 2.3.2 "The ENR can support DNSSEC as any resolver on a host." I don't understand this sentence.

in 2.3.2, the main resolver MUST use the CD bit; what are the operational implications of doing this?

in 2.3.2, are DNS questions the same as DNS queries?

in 2.3.2, I don't like the wording in "In order to properly support DNSSEC, the ENR SHOULD be implemented at the socket API level. If the socket API level implementation is not possible, DNSSEC support SHOULD be provided by other means." Properly support is not a technical phrase;  do you mean to be compliant to dnssec? Do you mean to secure the DNS environment? 

If the socket API is not implemented, why isn't DNSSEC support MUST be provided by other means? If an implementation does not provide dnssec support by other means, then what happens to the security properties of the trusted environment? would not doing this create a vulnerability?

in 4.4, why is the primary address space /30, whereas the other address spaces are /20s?

in 7, "The security considerations of BIH mostly relies on that of [RFC6146]." Do you mean "the security considerations found in 6146 apply, with the following additional considerations specific to BIH"?

in 7, it says "the differences are due to ..." - the differences between what and what? Do you mean between 6146 and this document? If so, simply discuss the considerations for this document. Doing this as a comparison to the other document is a bit confusing, and would really require the reader to have both documents open and to do a diff to understand your text.

s/In the socket-layer implementation approach, the differences are due to the address translation occurring at the API and not in the network layer. That is, since the mechanism/When the implementation/

in 7, "So BIH should employ the same sort of protection techniques as NAT64 [RFC6146] does." I am not sure which protections you refer to here. I think it would be better to point to specific relevant solutions in 6146. The only mention of denial of service is in section 1.2.3. Is that the protection you mean?

in 9, s/The author thanks/The authors thank/
2011-08-03
09 David Harrington
AD review of draft-ietf-behave-v4v6-bih-05

The abstract or section 1.1 should explain WHY a successor is needed.

2.1 refers to Appendix B; there is no appendix …
AD review of draft-ietf-behave-v4v6-bih-05

The abstract or section 1.1 should explain WHY a successor is needed.

2.1 refers to Appendix B; there is no appendix B.

Typically appendices are used for non-normative content, but this appendix lists functions that MUST be intercepted (according to 2.1). This would probably be better placed in the main part of the document.

2.1 says the APIs MUST be intercepted; the Appendix says they SHOULD be intercepted. Which is it?

2.2 says "Protocol translation SHOULD NOT be performed for IPv4 packets sent to the IPv4 address range used by local synthesis and for which a mapping table entry does not exist. The implementation SHOULD attempt to route such packets via IPv4 interfaces instead." Why should and not MUST? Is should, what ar ethe valid exceptions to the recommended practice?

2.3 "returns a proper answer" => returns an answer

2.3 RECOMMENDS the socket API layer option. When is it approrpiate to use the other option?

in 2.3 "In either implementation option, if there is a real IPv4 address available, the ENR SHOULD NOT synthesize IPv4 addresses. By default an ENR implementation MUST NOT synthesize IPv4 addresses when real IPv4 addresses exist." Why only should not? What is the valid exception to a MUST NOT? (is this discussed elsewhere in the document?)

2.3.1 what is a martian address? reference?

overuse of "essentially"; this is typicallty not needed where it is used. "essentially the same" => similar

in 2.3.2 "The ENR can support DNSSEC as any resolver on a host." I don't understand this sentence.

in 2.3.2, the main resolver MUST use the CD bit; what are the operational implications of doing this?

in 2.3.2, are DNS questions the same as DNS queries?

in 2.3.2, I don't like the wording in "In order to properly support DNSSEC, the ENR SHOULD be implemented at the socket API level. If the socket API level implementation is not possible, DNSSEC support SHOULD be provided by other means." Properly support is not a technical phrase;  do you mean to be compliant to dnssec? Do you mean to secure the DNS environment? 

If the socket API is not implemented, why isn't DNSSEC support MUST be provided by other means? If an implementation does not provide dnssec support by other means, then what happens to the security properties of the trusted environment? would not doing this create a vulnerability?

in 4.4, why is the primary address space /30, whereas the other address spaces are /20s?

in 7, "The security considerations of BIH mostly relies on that of [RFC6146]." Do you mean "the security considerations found in 6146 apply, with the following additional considerations specific to BIH"?

in 7, it says "the differences are due to ..." - the differences between what and what? Do you mean between 6146 and this document? If so, simply discuss the considerations for this document. Doing this as a comparison to the other document is a bit confusing, and would really require the reader to have both documents open and to do a diff to understand your text.

s/In the socket-layer implementation approach, the differences are due to the address translation occurring at the API and not in the network layer. That is, since the mechanism/When the implementation/

in 7, "So BIH should employ the same sort of protection techniques as NAT64 [RFC6146] does." I am not sure which protections you refer to here. I think it would be better to point to specific relevant solutions in 6146. The only mention of denial of service is in section 1.2.3. Is that the protection you mean?

in 9, s/The author thanks/The authors thank/
2011-07-25
09 Cindy Morgan
  (1.a) Who is the Document Shepherd for this document?

Dave Thaler

        Has the
        Document Shepherd personally …
  (1.a) Who is the Document Shepherd for this document?

Dave Thaler

        Has the
        Document Shepherd personally reviewed this version of the
        document and, in particular, does he or she believe this
        version is ready for forwarding to the IESG for publication?

Yes.

  (1.b) Has the document had adequate review both from key WG members
        and from key non-WG members? Does the Document Shepherd have
        any concerns about the depth or breadth of the reviews that
        have been performed?

No concerns.

  (1.c) Does the Document Shepherd have concerns that the document
        needs more review from a particular or broader perspective,
        e.g., security, operational complexity, someone familiar with
        AAA, internationalization or XML?

No concerns.  (DNSSEC impact was evaluated by DNS folks as with DNS64.
The recommended option is compatible with DNSSEC.  The not-recommended
option has the same issues as DNS64 implemented in a host.)

  (1.d) Does the Document Shepherd have any specific concerns or
        issues with this document that the Responsible Area Director
        and/or the IESG should be aware of? For example, perhaps he
        or she is uncomfortable with certain parts of the document, or
        has concerns whether there really is a need for it. In any
        event, if the WG has discussed those issues and has indicated
        that it still wishes to advance the document, detail those
        concerns here.

        Has an IPR disclosure related to this document
        been filed? If so, please include a reference to the
        disclosure and summarize the WG discussion and conclusion on
        this issue.

No IPR disclosures have been filed specifically on this document.
However this document incorporates and obsoletes RFC 2767 and RFC 3338,
which are alternative ways to solve the same scenario.

While RFC 3338 has no IPR disclosures filed, RFC 2767 does:
  https://datatracker.ietf.org/ipr/903/
Since the present document incorporates the ideas from RFC 2767,
one might expect a similar disclosure to be filed in the future.

The present document does not, however, mandate (or even recommend)
the RFC 2767-like implementation option.  In fact, for the name
synthesis part, it recommends the other option, and for the data
translation portion, no recommendation is made either way.

  (1.e) How solid is the WG consensus behind this document? Does it
        represent the strong concurrence of a few individuals, with
        others being silent, or does the WG as a whole understand and
        agree with it?

The WG as a whole understands the document.  It represents the
strong concurrence of the main proponents of the document, with
others having no objections.  The primary point of earlier contention
was with respect to whether this NAT46-in-a-host could be placed behind
a NAT64 and achieve NAT464.  The WG consensus was that that case
should be disallowed, and the present document reflects that
consensus.

  (1.f) Has anyone threatened an appeal or otherwise indicated extreme
        discontent? If so, please summarise the areas of conflict in
        separate email messages to the Responsible Area Director. (It
        should be in a separate email because this questionnaire is
        entered into the ID Tracker.)

No.

  (1.g) Has the Document Shepherd personally verified that the
        document satisfies all ID nits? (See the Internet-Drafts Checklist
        and http://tools.ietf.org/tools/idnits/). Boilerplate checks are
        not enough; this check needs to be thorough.

Yes (all uses of special-use IPv4 addresses such as loopback and
RFC 1918 addresses are intentional, so those warnings should be ignored).

        Has the document
        met all formal review criteria it needs to, such as the MIB
        Doctor, media type and URI type reviews?

No such reviews are needed.

  (1.h) Has the document split its references into normative and
        informative?

Yes.

        Are there normative references to documents that
        are not ready for advancement or are otherwise in an unclear
        state? If such normative references exist, what is the
        strategy for their completion? Are there normative references
        that are downward references, as described in [RFC3967]? If
        so, list these downward references to support the Area
        Director in the Last Call procedure for them [RFC3967].

No downward references.

  (1.i) Has the Document Shepherd verified that the document IANA
        consideration section exists and is consistent with the body
        of the document? If the document specifies protocol
        extensions, are reservations requested in appropriate IANA
        registries? Are the IANA registries clearly identified? If
        the document creates a new registry, does it define the
        proposed initial contents of the registry and an allocation
        procedure for future registrations? Does it suggest a
        reasonable name for the new registry? See [RFC5226]. If the
        document describes an Expert Review process has Shepherd
        conferred with the Responsible Area Director so that the IESG
        can appoint the needed Expert during the IESG Evaluation?

IANA section exists and there are no actions for IANA.

  (1.j) Has the Document Shepherd verified that sections of the
        document that are written in a formal language, such as XML
        code, BNF rules, MIB definitions, etc., validate correctly in
        an automated checker?

No such sections exist.

  (1.k) The IESG approval announcement includes a Document
        Announcement Write-Up. Please provide such a Document
        Announcement Write-Up? Recent examples can be found in the
        "Action" announcements for approved documents. The approval
        announcement contains the following sections:

  Technical Summary
        Relevant content can frequently be found in the abstract
        and/or introduction of the document. If not, this may be
        an indication that there are deficiencies in the abstract
        or introduction.

Bump-In-the-Host (BIH) is a host-based IPv4 to IPv6 protocol
translation mechanism that allows a class of IPv4-only applications
that work through NATs to communicate with IPv6-only peers.  The host
on which applications are running may be connected to IPv6-only or
dual-stack access networks.  BIH hides IPv6 and makes the IPv4-only
applications think they are talking with IPv4 peers by local
synthesis of IPv4 addresses.

  Working Group Summary
        Was there anything in WG process that is worth noting? For
        example, was there controversy about particular points or
        were there decisions where the consensus was particularly
        rough?

The primary point of earlier contention was with respect to whether
this NAT46-in-a-host could be placed behind a NAT64 and achieve NAT464.
The WG consensus was that that case should be disallowed, and the
present document reflects that consensus.

  Document Quality
        Are there existing implementations of the protocol? Have a
        significant number of vendors indicated their plan to
        implement the specification? Are there any reviewers that
        merit special mention as having done a thorough review,
        e.g., one that resulted in important changes or a
        conclusion that the document had no substantive issues? If
        there was a MIB Doctor, Media Type or other expert review,
        what was its course (briefly)? In the case of a Media Type
        review, on what date was the request posted?

This document obsoletes two previous RFCs on implementation, and
updates them based on implementation experience.  At least one
implementation is in progress for the new document, and others
are expected. 
2011-07-25
09 Cindy Morgan Draft added in state Publication Requested
2011-07-25
09 Cindy Morgan [Note]: 'Dave Thaler (dthaler@microsoft.com) is the document shepherd.' added
2011-07-25
05 (System) New version available: draft-ietf-behave-v4v6-bih-05.txt
2011-04-12
04 (System) New version available: draft-ietf-behave-v4v6-bih-04.txt
2011-03-11
03 (System) New version available: draft-ietf-behave-v4v6-bih-03.txt
2011-01-23
02 (System) New version available: draft-ietf-behave-v4v6-bih-02.txt
2010-10-19
01 (System) New version available: draft-ietf-behave-v4v6-bih-01.txt
2010-10-11
00 (System) New version available: draft-ietf-behave-v4v6-bih-00.txt