Skip to main content

Anonymity Profiles for DHCP Clients
draft-ietf-dhc-anonymity-profile-08

Revision differences

Document history

Date Rev. By Action
2016-05-10
08 (System) RFC Editor state changed to AUTH48-DONE from AUTH48
2016-04-08
08 (System) RFC Editor state changed to AUTH48 from RFC-EDITOR
2016-04-06
08 (System) RFC Editor state changed to RFC-EDITOR from AUTH
2016-03-25
08 (System) RFC Editor state changed to AUTH from EDIT
2016-02-25
08 Tero Kivinen Closed request for Last Call review by SECDIR with state 'No Response'
2016-02-24
08 (System) IANA Action state changed to No IC from In Progress
2016-02-24
08 (System) RFC Editor state changed to EDIT
2016-02-24
08 (System) IESG state changed to RFC Ed Queue from Approved-announcement sent
2016-02-24
08 (System) Announcement was received by RFC Editor
2016-02-24
08 (System) IANA Action state changed to In Progress
2016-02-24
08 Amy Vezza IESG state changed to Approved-announcement sent from Approved-announcement to be sent::Point Raised - writeup needed
2016-02-24
08 Amy Vezza IESG has approved the document
2016-02-24
08 Amy Vezza Closed "Approve" ballot
2016-02-24
08 Brian Haberman Ballot writeup was changed
2016-02-24
08 Brian Haberman Ballot approval text was generated
2016-02-21
08 Gunter Van de Velde Closed request for Last Call review by OPSDIR with state 'No Response'
2016-02-19
08 Christian Huitema IANA Review state changed to Version Changed - Review Needed from IANA OK - No Actions Needed
2016-02-19
08 Christian Huitema New version available: draft-ietf-dhc-anonymity-profile-08.txt
2016-02-18
07 Cindy Morgan IESG state changed to Approved-announcement to be sent::Point Raised - writeup needed from IESG Evaluation
2016-02-18
07 Benoît Claise [Ballot comment]
Thanks. Happy to see this work, along with the trade-off analysis.
2016-02-18
07 Benoît Claise [Ballot Position Update] New position, Yes, has been recorded for Benoit Claise
2016-02-18
07 Jari Arkko [Ballot Position Update] New position, No Objection, has been recorded for Jari Arkko
2016-02-17
07 Joel Jaeggli [Ballot Position Update] New position, No Objection, has been recorded for Joel Jaeggli
2016-02-17
07 Amanda Baber IANA Review state changed to IANA OK - No Actions Needed from Version Changed - Review Needed
2016-02-17
07 Alissa Cooper
[Ballot comment]
Great work, thanks.

= General =

This document seems to use the term "link-layer address randomization" to describe the situation where a link-layer …
[Ballot comment]
Great work, thanks.

= General =

This document seems to use the term "link-layer address randomization" to describe the situation where a link-layer address is randomly generated AND changes over time. While this seems the likely way that such addresses may be standardized in the future, it's not guaranteed. An address could be randomly generated (or otherwise semantically opaque, e.g. not containing an OUI) but permanent for the life of the device/interface, in which case the privacy benefits of what is specified in this draft are not the same. Therefore I think it's worth explicitly stating the interpretation of "random address" that is being used here.

= Section 1 =

s/Reports surfaced recently/There have been reports/

= Section 2 =

Would be good to update the references to work going on in IEEE 802.1. Also there were experiments at multiple IEEE and IETF meetings.

= Section 3 =

Section 3.1 says:

"The client willing to protect its privacy SHOULD limit the subset of
  options sent in messages to the subset listed in the following
  sections."

Then all the subsections discuss specific options and considerations for using them, except 3.9, which basically says "don't use these." I would assume there are a bunch of other options that clients definitely shouldn't use if they want to maintain anonymity (I was thinking of 123 and 144, geolocation). So why are only the PXE options mentioned here, when the text in 3.1 seemed to be saying that clients should avoid all other options not mentioned?
2016-02-17
07 Alissa Cooper [Ballot Position Update] New position, Yes, has been recorded for Alissa Cooper
2016-02-17
07 Barry Leiba [Ballot Position Update] New position, Yes, has been recorded for Barry Leiba
2016-02-17
07 Martin Stiemerling [Ballot Position Update] New position, Yes, has been recorded for Martin Stiemerling
2016-02-16
07 Ben Campbell
[Ballot comment]
Thanks for doing this. I have some comments, most of which can be safely ignored:

*** Substantive ***
- 2.6, 2nd paragraph:
It …
[Ballot comment]
Thanks for doing this. I have some comments, most of which can be safely ignored:

*** Substantive ***
- 2.6, 2nd paragraph:
It seems like the "if servers do not object" part goes against the spirit of section 2.5.

- 3 (top level)

-- There's a lot of normative language about things people MUST or MAY put into DHCP messages (as opposed to the SHOULD NOTs). Are those new requirements created by this profile, or statements of fact about DHCP in general? If the latter, please consider dropping the 2119 keywords.

-- "It SHOULD NOT contain any other option"
This language repeats several times. But there’s a fair amount of text later in the subsections that talks about specific “other options” that SHOULD NOT be included. That seems redundant. I wonder if there's an opportunity to simplify things?

-- 2nd to last paragraph:
It seems odd to say things SHOULD follow the dhcp standard; that's kind of implied by being dhcp.

- 3 and subsections:
There are a lot of SHOULDs that I am surprised are not MUSTs. I understand that the entire profile is optional, but it seems like some of the guidance could be stronger for clients that use the profile in the first place.

- 3.1, last paragraph:
Please describe the consequences of not following that SHOULD. For example, doesn’t the MAY alternative _add_ a fingerprinting opportunity?
- 3.2, 2nd to last paragraph: "DHCP clients should ensure"
Should that be SHOULD?
-3.3, 2nd paragraph: "They MUST use the option when mandated by the DHCP protocol..."
That seems more like a statement of fact.

-3.7, third paragraph:
What’s the point of allowing the sending of an obfuscated host name, rather than just saying MUST NOT send the host name in the first place?

- 4.3, 3rd paragraph:
Isn't the randomization of link-layer addresses a fundamental premise of this draft?

*** Editorial ***

- 3, 2nd to last paragraph:
Can the "following sections" be more specific? That is, list the section numbers, or mention "The remaining subsections"?

- 3.1, 2nd to last paragraph:
Are we really talking about clients "willing" to protect privacy, or clients "wishing" or "intending" to protect privacy?

- 3.4:
The document already spent several pages motivating the randomization of link-layer addresses. It seems unnecessary to do it again here.

-3.5, 2nd to last paragraph:
“based solely” seems ambiguous. Do I understand correctly that this means the client MUST NOT use client identifiers that persist across changes in the link layer address?
The assertion that this will ensure that no privacy leaks occur seems overstated. I suspect there are other ways clients can leak private information.

- 3.6:
The guidance on ordering seems redundant with 3.1.

- 3.9, 2nd paragraph, last sentence: "If only for privacy reasons..."
I suggest removing the clause. It weakens the following normative requirement.

- 4.5, first paragraph: "indemtified"
identified?
2016-02-16
07 Ben Campbell [Ballot Position Update] New position, Yes, has been recorded for Ben Campbell
2016-02-16
07 Terry Manderson [Ballot Position Update] New position, No Objection, has been recorded for Terry Manderson
2016-02-16
07 Alvaro Retana [Ballot Position Update] New position, No Objection, has been recorded for Alvaro Retana
2016-02-16
07 Deborah Brungard [Ballot Position Update] New position, No Objection, has been recorded for Deborah Brungard
2016-02-16
07 Brian Carpenter Request for Telechat review by GENART Completed: Ready. Reviewer: Brian Carpenter.
2016-02-15
07 Spencer Dawkins
[Ballot comment]
Thank you for producing this document. It's important. I do have a couple of observations for you to consider.

In this text:

  …
[Ballot comment]
Thank you for producing this document. It's important. I do have a couple of observations for you to consider.

In this text:

  We can also
  assume that privacy conscious users will attempt to evade this
  monitoring, for example by ensuring that low level identifiers such
  as link-layer addresses are "randomized," so that the devices do not
  broadcast a unique identifier in every location that they visit.
 
it would be clearer to me if it said "broadcast the same unique identifier".

I really like

  Declaring a preference for
  anonymity is a bit like walking around with a Guy Fawkes mask.
 
but I do wonder if that's accessible for a global audience. Is there a reference, or a short explanation that would work?
2016-02-15
07 Spencer Dawkins [Ballot Position Update] New position, Yes, has been recorded for Spencer Dawkins
2016-02-15
07 Stephen Farrell
[Ballot comment]

Thank you for doing this work. I think it's important and an
excellent example.

- general: I have a question for which I …
[Ballot comment]

Thank you for doing this work. I think it's important and an
excellent example.

- general: I have a question for which I think it'd be good if
the answer were visible to others doing similar work later. That
could be recorded in email that can be referenced (via an
archive URL) or it could be in this document. Perhaps the latter
is better, not sure.  Anyway, the question is: what was the
methodology used to identify the various DHCP related anonymity
issues that need to be tackled, and to consider/test proposed
mitigations? I think it may be worth including some text on
methodology in this document (maybe a new appendix or as a
section 2.8?) so that we can use this as a self-contained
example when other folks are doing similar work.  (Sorry for
trying to add work.) If a part of that answer is e.g. "I bought
Ralph a G&T" that is IMO also worth including in some anonymised
form:-)

- The IPR declaration makes me a bit sad, but I think the WG
did process it according to our processes.

- abstract: Is "anonymous to the visited network" the right
goal? Perhaps also "not be identified as the same entity as
previously connected to this or another network" is more like
it, but too wordy;-) If you can figure a way to include the
"another network" aspect in the abstract that'd be good I think,
as that might help motivate network admins to want this profile,
as they're not only protecting their users from themselves, but
from other network admins as well.

- section 2: In the introductory text, you could update this to
refer to IEEE's ongoing work here, which I think is now more
official than it was perhaps when this text was written.

- 2.5: The Guy Fawkes reference might not be meaningful in a
few years. I'd suggest deleting that sentence.

- 3.5: So this says to do the opposite of 4361, which is
correct.  I wonder does that mean this UPDATEs 4361? (But don't
care about the answer;-) Same issue may arise wrt 3315 I guess.
(And I still don't care about the answer:-)

- 3.7: typo, "SOULD"

- 4.3: "from the previous year" - that's neat! Don't think I've
seen that before.

- 4.5: typo, "indemtified"

- 4.5.2: This still seems a bit too negative to me. Can't PD
assist privacy in some cases even if further study is needed.
E.g. if a home router is given a prefix via PD and that changes
now and then.

- DHCPv6: is there really nothing to say about link local
addresses? (I'm not sure how those are used in DHCPv6, if they
are, but they do often contain MACs.)

- The secdir review of the dhcp-privacy draft [1] suggested some
additional text for the security considerations text there that
might be better here.

  [1] https://www.ietf.org/mail-archive/web/secdir/current/msg06338.html

(PS: This review was done on -06 with a quick look at the diff
vs. -07. I think it all still applies though.)
2016-02-15
07 Stephen Farrell [Ballot Position Update] New position, Yes, has been recorded for Stephen Farrell
2016-02-15
07 Brian Haberman Ballot has been issued
2016-02-15
07 Brian Haberman [Ballot Position Update] New position, Yes, has been recorded for Brian Haberman
2016-02-15
07 Brian Haberman Created "Approve" ballot
2016-02-15
07 Brian Haberman Ballot writeup was changed
2016-02-15
07 Brian Haberman Changed consensus to Yes from Unknown
2016-02-15
07 Brian Haberman IESG state changed to IESG Evaluation from Waiting for Writeup
2016-02-15
07 Christian Huitema IANA Review state changed to Version Changed - Review Needed from IANA OK - No Actions Needed
2016-02-15
07 Christian Huitema New version available: draft-ietf-dhc-anonymity-profile-07.txt
2016-02-15
06 (System) IESG state changed to Waiting for Writeup from In Last Call
2016-02-11
06 Jean Mahoney Request for Telechat review by GENART is assigned to Brian Carpenter
2016-02-11
06 Jean Mahoney Request for Telechat review by GENART is assigned to Brian Carpenter
2016-02-09
06 Brian Haberman Placed on agenda for telechat - 2016-02-18
2016-02-06
06 Brian Carpenter Request for Last Call review by GENART Completed: Almost Ready. Reviewer: Brian Carpenter.
2016-02-04
06 Jean Mahoney Request for Last Call review by GENART is assigned to Brian Carpenter
2016-02-04
06 Jean Mahoney Request for Last Call review by GENART is assigned to Brian Carpenter
2016-02-04
06 (System) IANA Review state changed to IANA OK - No Actions Needed from IANA - Review Needed
2016-02-04
06 Sabrina Tanamal
(Via drafts-lastcall-comment@iana.org): IESG/Authors/WG Chairs:

IANA has reviewed draft-ietf-dhc-anonymity-profile-06.txt, which is currently in Last Call, and has the following comments:

We understand that this …
(Via drafts-lastcall-comment@iana.org): IESG/Authors/WG Chairs:

IANA has reviewed draft-ietf-dhc-anonymity-profile-06.txt, which is currently in Last Call, and has the following comments:

We understand that this document doesn't require any IANA actions.

While it's often helpful for a document's IANA Considerations section to remain in place upon publication even if there are no actions, if the authors strongly prefer to remove it, IANA does not object.

If this assessment is not accurate, please respond as soon as possible.

Thank you,

Sabrina Tanamal
IANA Specialist
ICANN
2016-02-04
06 Tero Kivinen Request for Last Call review by SECDIR is assigned to Warren Kumari
2016-02-04
06 Tero Kivinen Request for Last Call review by SECDIR is assigned to Warren Kumari
2016-02-03
06 Gunter Van de Velde Request for Last Call review by OPSDIR is assigned to Mahalingam Mani
2016-02-03
06 Gunter Van de Velde Request for Last Call review by OPSDIR is assigned to Mahalingam Mani
2016-02-01
06 Cindy Morgan IANA Review state changed to IANA - Review Needed
2016-02-01
06 Cindy Morgan
The following Last Call announcement was sent out:

From: The IESG
To: "IETF-Announce"
CC: dhc-chairs@ietf.org, brian@innovationslab.net, volz@cisco.com, draft-ietf-dhc-anonymity-profile@ietf.org, dhcwg@ietf.org
Reply-To: ietf@ietf.org …
The following Last Call announcement was sent out:

From: The IESG
To: "IETF-Announce"
CC: dhc-chairs@ietf.org, brian@innovationslab.net, volz@cisco.com, draft-ietf-dhc-anonymity-profile@ietf.org, dhcwg@ietf.org
Reply-To: ietf@ietf.org
Sender:
Subject: Last Call:  (Anonymity profile for DHCP clients) to Proposed Standard


The IESG has received a request from the Dynamic Host Configuration WG
(dhc) to consider the following document:
- 'Anonymity profile for DHCP clients'
  as Proposed Standard

The IESG plans to make a decision in the next few weeks, and solicits
final comments on this action. Please send substantive comments to the
ietf@ietf.org mailing lists by 2016-02-15. Exceptionally, comments may be
sent to iesg@ietf.org instead. In either case, please retain the
beginning of the Subject line to allow automated sorting.

Abstract


  Some DHCP options carry unique identifiers.  These identifiers can
  enable device tracking even if the device administrator takes care of
  randomizing other potential identifications like link-layer addresses
  or IPv6 addresses.  The anonymity profile is designed for clients
  that wish to remain anonymous to the visited network.  The profile
  provides guidelines on the composition of DHCP or DHCPv6 requests,
  designed to minimize disclosure of identifying information.




The file can be obtained via
https://datatracker.ietf.org/doc/draft-ietf-dhc-anonymity-profile/

IESG discussion can be tracked via
https://datatracker.ietf.org/doc/draft-ietf-dhc-anonymity-profile/ballot/


The following IPR Declarations may be related to this I-D:

  https://datatracker.ietf.org/ipr/2654/



2016-02-01
06 Cindy Morgan IESG state changed to In Last Call from Last Call Requested
2016-02-01
06 Brian Haberman Last call was requested
2016-02-01
06 Brian Haberman Last call announcement was generated
2016-02-01
06 Brian Haberman Ballot approval text was generated
2016-02-01
06 Brian Haberman Ballot writeup was generated
2016-02-01
06 Brian Haberman IESG state changed to Last Call Requested from AD Evaluation::AD Followup
2016-01-29
06 (System) Sub state has been changed to AD Followup from Revised ID Needed
2016-01-29
06 Christian Huitema New version available: draft-ietf-dhc-anonymity-profile-06.txt
2016-01-26
05 Brian Haberman IESG state changed to AD Evaluation::Revised I-D Needed from AD Evaluation::Point Raised - writeup needed
2016-01-25
05 Brian Haberman IESG state changed to AD Evaluation::Point Raised - writeup needed from AD Evaluation
2016-01-14
05 Brian Haberman IESG state changed to AD Evaluation from Publication Requested
2016-01-13
05 Bernie Volz
Write up for draft-ietf-dhc-anonymity-profile(-05).txt:

NOTE TO AD: The 3 documents (draft-ietf-dhc-dhcp-privacy,
draft-ietf-dhc-dhcpv6-privacy, and draft-ietf-dhc-anonymity-profile)
should likely be sent to IETF/IESG …
Write up for draft-ietf-dhc-anonymity-profile(-05).txt:

NOTE TO AD: The 3 documents (draft-ietf-dhc-dhcp-privacy,
draft-ietf-dhc-dhcpv6-privacy, and draft-ietf-dhc-anonymity-profile)
should likely be sent to IETF/IESG together as a package.


(1) What type of RFC is being requested (BCP, Proposed Standard,
    Internet Standard, Informational, Experimental, or Historic)? Why
    is this the proper type of RFC? Is this type of RFC indicated in
    the title page header?

Standards Track. This is the proper type because this document specifies
a mechanism for DHCP anonymity (v4 and v6) and the more DHCP implementations
that use this approach, the less profiling and tracking will be possible. If
different implementation use different techniques, some profiling and
tracking may still be possible.


(2) The IESG approval announcement includes a Document Announcement
    Write-Up. Please provide such a Document Announcement
    Write-Up. Recent examples can be found in the "Action"
    announcements for approved documents. The approval announcement
    contains the following sections:

Technical Summary:

This document specifies an anonymity profile for DHCP clients to remain
as anonymous as possible on visited networks.


Working Group Summary:

This document is an answer to the privacy considerations raised in
draft-ietf-dhc-dhcp-privacy and draft-ietf-dhc-dhcpv6-privacy with respect
to DHCPv4 and DHCPv6, respectively. The profile provides guidelines on the
composition of DHCP or DHCPv6 requests, designed to minimize disclosure of
identifying information.

Document Quality:

This document has had thorough reviews by many interested and
knowledgeable folks (beyond those mentioned in the acknowledgements
section). There were no significant points of difficulty or
controversy with the contents of the document.

Microsoft did a prototype implementation and reported great results (see
https://www.ietf.org/proceedings/93/slides/slides-93-dhc-1.pdf).

Personnel:

Bernie Volz is the document shepherd. Brian Haberman is the responsible AD.


(3) Briefly describe the review of this document that was performed by
    the Document Shepherd. If this version of the document is not
    ready for publication, please explain why the document is being
    forwarded to the IESG.

I read the document thoroughly several times, and submitted editorial and
technical suggestions to the authors, which they implemented. I believe it
is ready for publication.


(4) Does the document Shepherd have any concerns about the depth or
    breadth of the reviews that have been performed?

No, the document has had a good deal of careful review.


(5) Do portions of the document need review from a particular or from
    broader perspective, e.g., security, operational complexity, AAA,
    DNS, DHCP, XML, or internationalization? If so, describe the
    review that took place.

The WGLC was posted to the perpass mailing list, though no comments were
received (see
http://www.ietf.org/mail-archive/web/perpass/current/msg01911.html).


(6) Describe any specific concerns or issues that the Document
    Shepherd has with this document that the Responsible Area Director
    and/or the IESG should be aware of? For example, perhaps he or she
    is uncomfortable with certain parts of the document, or has
    concerns whether there really is a need for it. In any event, if
    the WG has discussed those issues and has indicated that it still
    wishes to advance the document, detail those concerns here.

I think the document is good as written, and serves a useful purpose.


(7) Has each author confirmed that any and all appropriate IPR
    disclosures required for full conformance with the provisions of
    BCP 78 and BCP 79 have already been filed. If not, explain why?

Yes. However, please see (8).


(8) Has an IPR disclosure been filed that references this document? If
    so, summarize any WG discussion and conclusion regarding the IPR
    disclosures.

Yes. One IPR was filed about a month before the WGLC was started. The WGLC
announcement mentioned the IPR. No one raised a concern. The IPR is from
an involved party and its exact impact has not been reviewed.


(9) How solid is the WG consensus behind this document? Does it
    represent the strong concurrence of a few individuals, with others
    being silent, or does the WG as a whole understand and agree with it?

There is a strong consensus behind this document and in particular from
very active WG participants (i.e. "DHCP experts").


(10) Has anyone threatened an appeal or otherwise indicated extreme
    discontent? If so, please summarise the areas of conflict in
    separate email messages to the Responsible Area Director. (It
    should be in a separate email because this questionnaire is
    publicly available.)

No.


(11) Identify any ID nits the Document Shepherd has found in this
    document. (See http://www.ietf.org/tools/idnits/ and the
    Internet-Drafts Checklist). Boilerplate checks are not enough;
    this check needs to be thorough.

No issues or nits reported.


(12) Describe how the document meets any required formal review
    criteria, such as the MIB Doctor, media type, and URI type
    reviews.

N/A


(13) Have all references within this document been identified as
    either normative or informative?

Yes, and seems to be done appropriately.


(14) Are there normative references to documents that are not ready
    for advancement or are otherwise in an unclear state? If such
    normative references exist, what is the plan for their
    completion?

No.


(15) Are there downward normative references references (see RFC
    3967
)? If so, list these downward references to support the Area
    Director in the Last Call procedure.

No.


(16) Will publication of this document change the status of any
    existing RFCs? Are those RFCs listed on the title page header,
    listed in the abstract, and discussed in the introduction? If the
    RFCs are not listed in the Abstract and Introduction, explain
    why, and point to the part of the document where the relationship
    of this document to the other RFCs is discussed. If this
    information is not in the document, explain why the WG considers
    it unnecessary.

No.


(17) Describe the Document Shepherd's review of the IANA
    considerations section, especially with regard to its consistency
    with the body of the document. Confirm that all protocol
    extensions that the document makes are associated with the
    appropriate reservations in IANA registries. Confirm that any
    referenced IANA registries have been clearly identified. Confirm
    that newly created IANA registries include a detailed
    specification of the initial contents for the registry, that
    allocations procedures for future registrations are defined, and
    a reasonable name for the new registry has been suggested (see
    RFC 5226).

There are no IANA actions required.


(18) List any new IANA registries that require Expert Review for
    future allocations. Provide any public guidance that the IESG
    would find useful in selecting the IANA Experts for these new
    registries.

There are no new IANA registries requested by this draft.


(19) Describe reviews and automated checks performed by the Document
    Shepherd to validate sections of the document written in a formal
    language, such as XML code, BNF rules, MIB definitions, etc.

There are no such parts to the document.
2016-01-13
05 Bernie Volz Responsible AD changed to Brian Haberman
2016-01-13
05 Bernie Volz IETF WG state changed to Submitted to IESG for Publication from WG Consensus: Waiting for Write-Up
2016-01-13
05 Bernie Volz IESG state changed to Publication Requested
2016-01-13
05 Bernie Volz IESG process started in state Publication Requested
2016-01-13
05 Bernie Volz Tag Revised I-D Needed - Issue raised by WG cleared.
2016-01-13
05 Bernie Volz Changed document writeup
2016-01-13
05 Bernie Volz Changed document writeup
2016-01-13
05 Bernie Volz Changed document writeup
2016-01-13
05 Christian Huitema New version available: draft-ietf-dhc-anonymity-profile-05.txt
2016-01-12
04 Bernie Volz Tag Revised I-D Needed - Issue raised by WG set. Tag Doc Shepherd Follow-up Underway cleared.
2016-01-12
04 Bernie Volz
1. In reviewing this in preparation for the shepherd write-up, the change to the 04 draft:

  3.  Anonymity profile for DHCPv4  . . . …
1. In reviewing this in preparation for the shepherd write-up, the change to the 04 draft:

  3.  Anonymity profile for DHCPv4  . . . . . . . . . . . . . . . .  8
    3.1.  Option encoding and avoiding  Avoiding fingerprinting . . . . . . . . . . . . . . . . .  9

Yet:

  4.  Anonymity profile for DHCPv6  . . . . . . . . . . . . . . . .  14
    4.1.  Option encoding and avoiding fingerprinting . . . . . . .  14  15

I am curious to know if the difference between the two section titles was intentional or not?

Also, I didn’t find anything that requested this change (but that doesn’t mean there was a reason for it).


Here’s some other nits from the changes in Section 4.5:

  We interpret that as requiring that the IAID MUST be constant for the
  association, as long as the link layer Address remains constant.

Should Address be capitalized here?

  Clients MAY meet the privacy, uniqueness and stability requirement of
  the IAID using by constructing it as the combination of one byte

The “using by constructing” seems odd? Drop “using”?
  encoding the interface number in the system, and three bytes of the
  link layer address.

(Not sure if it matters which 3 bytes and the order of the combination. Though perhaps if that varies by implementations, it can be used to fingerprint so perhaps better to be more explicit?)

2. Also, I ran through idnits:

The one issue that likely needs to be fixed is the one about the header should have the “Updates:” line to match what the abstract states? But, I don’t see any specific text that specifies a specific change to RFC 4361 and the change log has:

          Changes from draft-02 to draft-03:

          1.  Removed the update of [RFC4361] since we are specifying when to
              use that RFC, but are not recommending any specific change.

So, perhaps rewording the abstract is what is really needed? Can we just drop “ This draft updates RFC4361.” from the Abstract?

3. And, there is a Normative Reference to ietf-dhc-rfc3315bis.

This will cause this document to block (RFC editor queue) until that work is done and is ready to be an RFC. I don’t think we want this?

Can this be changed to an Informative reference so it does not block?

While it doesn’t matter that much, I do wonder why some references are Normative – such as to RFC4702. Please review all references if you could to assure that they are appropriate. (RFC2132, 3925, 4361, 4704  all look like they could be Informative?)
2016-01-12
04 Bernie Volz Tag Doc Shepherd Follow-up Underway set.
2016-01-12
04 Bernie Volz Changed document writeup
2015-12-14
04 Bernie Volz IETF WG state changed to WG Consensus: Waiting for Write-Up from Waiting for WG Chair Go-Ahead
2015-12-14
04 Bernie Volz Tag Doc Shepherd Follow-up Underway cleared.
2015-12-14
04 Bernie Volz We are waiting on the draft-ietf-dhc-dhcp-privacy and draft-ietf-dhc-dhcpv6-privacy documents to be ready to send all 3 to the IESG at once.
2015-12-14
04 Bernie Volz Tag Doc Shepherd Follow-up Underway set. Tag Revised I-D Needed - Issue raised by WGLC cleared.
2015-10-21
04 Bernie Volz Tag Revised I-D Needed - Issue raised by WGLC set.
2015-10-21
04 Bernie Volz IETF WG state changed to Waiting for WG Chair Go-Ahead from In WG Last Call
2015-10-14
04 (System) Notify list changed from "Bernie Volz"  to (None)
2015-10-02
04 Christian Huitema New version available: draft-ietf-dhc-anonymity-profile-04.txt
2015-09-02
03 Bernie Volz
Hi all,

This message starts the DHC Working Group Last Call to advance draft-ietf-dhc-anonymity-profile-03, Anonymity profile for DHCP clients, http://tools.ietf.org/html/draft-ietf-dhc-anonymity-profile-03. This document’s intended …
Hi all,

This message starts the DHC Working Group Last Call to advance draft-ietf-dhc-anonymity-profile-03, Anonymity profile for DHCP clients, http://tools.ietf.org/html/draft-ietf-dhc-anonymity-profile-03. This document’s intended status is Standards Track.

Note: At present, there is 1 IPR against file against this document (http://datatracker.ietf.org/ipr/2654/).

This is a part of the WGLC of 3 documents (draft-ietf-dhc-dhcp-privacy-01draft-ietf-dhc-dhcpv6-privacy-01, and draft-ietf-dhc-anonymity-profile-03).

Please send your comments by September 22th, 2015. If you do not feel this  document should advance, please state your reasons why.

Bernie Volz is the assigned shepherd.

- Tomek & Bernie
2015-09-02
03 Bernie Volz IETF WG state changed to In WG Last Call from WG Document
2015-09-02
03 Bernie Volz Notification list changed to "Bernie Volz" <volz@cisco.com>
2015-09-02
03 Bernie Volz Document shepherd changed to Bernie Volz
2015-09-02
03 Bernie Volz Intended Status changed to Proposed Standard from None
2015-09-01
03 Christian Huitema New version available: draft-ietf-dhc-anonymity-profile-03.txt
2015-08-20
Naveen Khan Posted related IPR disclosure: InterDigital Patent Holdings, Inc.'s Statement about IPR related to draft-ietf-dhc-anonymity-profile
2015-08-20
02 Suresh Krishnan New version available: draft-ietf-dhc-anonymity-profile-02.txt
2015-06-30
01 Christian Huitema New version available: draft-ietf-dhc-anonymity-profile-01.txt
2015-05-19
00 Bernie Volz This document now replaces draft-huitema-dhc-anonymity-profile instead of None
2015-05-19
00 Christian Huitema New version available: draft-ietf-dhc-anonymity-profile-00.txt