Skip to main content

DHCPv4 Vendor-specific Message
draft-ietf-dhc-dhcpv4-vendor-message-01

Revision differences

Document history

Date Rev. By Action
2015-10-14
01 (System) Notify list changed from dhc-chairs@ietf.org, draft-ietf-dhc-dhcpv4-vendor-message@ietf.org to (None)
2012-08-22
01 (System) post-migration administrative database adjustment to the No Objection position for Pasi Eronen
2010-10-24
01 (System) Document has expired
2010-10-23
01 Ralph Droms State changed to Dead::AD Followup from IESG Evaluation::AD Followup by Ralph Droms
2010-03-18
01 Pasi Eronen [Ballot Position Update] Position for Pasi Eronen has been changed to No Objection from Discuss by Pasi Eronen
2010-03-18
01 Pasi Eronen [Note]: 'Ted Lemon (mellon@nominum.com) is the document shepherd.' added by Pasi Eronen
2010-03-18
01 Pasi Eronen Alexey added my concern to his DISCUSS, so I'm clearing.
2010-03-18
01 Alexey Melnikov
[Ballot comment]
In Section 3:

  Applications using these messages MUST NOT assume that all DHCPv4
  clients, relay agents, and servers support them and …
[Ballot comment]
In Section 3:

  Applications using these messages MUST NOT assume that all DHCPv4
  clients, relay agents, and servers support them and MUST use good
  networking practices when transmitting and retransmitting these
  messages.

The second MUST almost raises to the level of DISCUSS.
What are the good practices you are talking about and is the following
sentence describes one of them:

  For some applications, it may be appropriate to use
  Vendor-Identifying Vendor Options [RFC3925] in a standard DHCPv4
  exchange to negotiate whether the end-points support the vendor-
  specific message.

? If not, then it is not clear how this MUST can be satisfied.
In that case you need a reference here.
2010-03-18
01 Alexey Melnikov
[Ballot discuss]
I generally don't object to this document going forward, however I believe there are some minor points that needs to be addressed/discussed first: …
[Ballot discuss]
I generally don't object to this document going forward, however I believe there are some minor points that needs to be addressed/discussed first:

1) In Section 3

  Clients and servers MAY chose to support this message; those that do
  not, MUST discard the message.  Relay agents SHOULD relay these
  messages as they would other DHCPv4 messages unless the relay agent
  understands the specific message and knows that the message was
  directed at it.

This sounds as if this document is trying to put requirements on implementations that are not compliant with this document.
Is this section just describes something which follows from DHCPv4
extensibility rules?

2) In Section 4:

  The option-data field MUST be encoded as a sequence of code/length/
  value fields of identical format to the DHCP options field and is
  identical to the option-data field of Vendor-Identifying Vendor
  Options [RFC3925].

This reference looks Normative to me.

  The option codes are defined by the vendor
  identified in the enterprise-number field and are not managed by
  IANA.  Option codes 0 and 255 have no pre-defined interpretation or

Are you talking about subopt-code here?

  format.  Each of the encapsulated options is formatted as follows:

3) In Section 4:

  Clients, relay agents, and/or servers supporting the Vendor Message
  Option MUST support [RFC3396].

This reference looks Normative to me.

4) Taking over Pasi's DISCUSS:

Section 1 says "New message codes are assigned through IETF Standards
Action". According to the registry and RFC 2939, the policy is
currently "IETF Consensus" -- is this just a typo, or is the intent to
change the policy?

Pasi also wrote: According to the WG chair (Ted Lemon, 2010-02-16), the intent was not to change the current policy, so in Section 1, "Standards Action" should be changed to "IETF Consensus" (or perhaps "IETF Review" in 5226 terms).
2010-02-19
01 (System) Removed from agenda for telechat - 2010-02-18
2010-02-18
01 Cindy Morgan State Changes to IESG Evaluation::AD Followup from Waiting for AD Go-Ahead by Cindy Morgan
2010-02-18
01 Cullen Jennings
[Ballot discuss]
I view this document as effectively making it so no review is needed of new DHCP options. I don't think theWG charter allows …
[Ballot discuss]
I view this document as effectively making it so no review is needed of new DHCP options. I don't think theWG charter allows this. I also view this as very bad thing given the goals of the IETF and would likely move to abstain. If the WG wanted to move to something that allowed a large code space with a easier review process, I would have no objects to that.
2010-02-18
01 Cullen Jennings [Ballot Position Update] New position, Discuss, has been recorded by Cullen Jennings
2010-02-18
01 Ron Bonica [Ballot Position Update] New position, Abstain, has been recorded by Ron Bonica
2010-02-18
01 Ross Callon [Ballot Position Update] New position, No Objection, has been recorded by Ross Callon
2010-02-18
01 Jari Arkko
[Ballot comment]
I do not object to this document going forward, but I support the
Robert Sparks Discuss about better guidance (and perhaps even some …
[Ballot comment]
I do not object to this document going forward, but I support the
Robert Sparks Discuss about better guidance (and perhaps even some
mandatory rules).

Furthermore, upleveling a bit, I think we need to ask why we are doing
this document. Is this a companion document to the other proposals that
I am getting for ND option vendor extensions? When I pushed for the
actual reason to do them, the answer ended up being "because there are
some BBF extensions that we need but would probably not go through the
IETF". Some of such usage is useful stuff that simply has to be specified
and some is questionable (think DHCP authentication).

However, vendor specific options/messages are not the only way to do
these extensions. Here's a couple of other options:

- SDO-specific container for their things (and this cannot then easily
  be used by vendor extensions. i'm not sure I *want* vendor extensions
  to DHCP state machine to begin with, though).

- SDO-specific extension for particular functionality that we just
  approve and hold our nose (and then this cannot be used for any
  extensibility later).

- Generic SDO extension

- Generic extension for vendors and SDOs

Your preferences may vary with regards to the best approach here. I'm
personally happiest with the first two options.

In any case, I would like to understand better the real drivers behind
this work.
2010-02-18
01 Jari Arkko [Ballot Position Update] New position, No Objection, has been recorded by Jari Arkko
2010-02-18
01 Magnus Westerlund [Ballot Position Update] New position, No Objection, has been recorded by Magnus Westerlund
2010-02-17
01 Robert Sparks
[Ballot discuss]
Should this document contain (or point to) more guidance that would encourage the use and development of interoperable DHCP options? It is currently …
[Ballot discuss]
Should this document contain (or point to) more guidance that would encourage the use and development of interoperable DHCP options? It is currently missing any pressure to discourage the replication of already standardized behavior and encourage bringing common functionality through the standards process.
2010-02-17
01 Robert Sparks [Ballot Position Update] New position, Discuss, has been recorded by Robert Sparks
2010-02-17
01 (System) State has been changed to Waiting for AD Go-Ahead from In Last Call by system
2010-02-16
01 Tim Polk
[Ballot comment]
(1) I support Adrian's discuss regarding experimentation.

(2) I support Alexey's discuss regarding section 3 imposing requirements on clients that do not
implement …
[Ballot comment]
(1) I support Adrian's discuss regarding experimentation.

(2) I support Alexey's discuss regarding section 3 imposing requirements on clients that do not
implement this specification.  If that is the intention, shouldn't this specification update 2131?
2010-02-16
01 Tim Polk
[Ballot comment]
(1) I support Adrian's discuss regarding experimentation.

(2) I support Alexey's discuss regarding section 3 imposing requirements on clients that do not
implement …
[Ballot comment]
(1) I support Adrian's discuss regarding experimentation.

(2) I support Alexey's discuss regarding section 3 imposing requirements on clients that do not
implement this specification.  If that is the intention, shouldn't this specification update 2131?

(3) The introductions states "The protocol provides for 256 possible message codes, of which
a small number have been assigned."  Perhaps I am reading the wrong registry, but aren't the
majority of the 256 codes assigned at this point?
2010-02-16
01 Tim Polk [Ballot Position Update] New position, No Objection, has been recorded by Tim Polk
2010-02-16
01 Amanda Baber
IANA comments:

Upon approval of this document, the IANA will do the following:

ACTION 1:

make an assignment in the "DHCP Message Type 53 Values" …
IANA comments:

Upon approval of this document, the IANA will do the following:

ACTION 1:

make an assignment in the "DHCP Message Type 53 Values" registry at
http://www.iana.org/assignments/bootp-dhcp-parameters/bootp-dhcp-parameters.xhtml

Value Message Type Reference
----- --------------- ----------------------------------
254 VENDOR-SPECIFIC [RFC-dhc-dhcpv4-vendor-message-01]


ACTION 2:

make an assignment in the "BOOTP Vendor Extensions and DHCP Options"
registry at
http://www.iana.org/assignments/bootp-dhcp-parameters/bootp-dhcp-parameters.xhtml

Tag Name Data Length Meaning Reference
--- --------------- ----------- --------------------- -
TBD VENDOR-SPECIFIC N OPTION_VENDOR_MESSAGE
[RFC-dhc-dhcpv4-vendor-message-01]
2010-02-16
01 Dan Romascanu
[Ballot comment]
1. I support Adrian's DISCUSS that mentioning experimental purposes is not appropriate.

2. I support Russ's DISCUSS that 'MUST use good networking practices' …
[Ballot comment]
1. I support Adrian's DISCUSS that mentioning experimental purposes is not appropriate.

2. I support Russ's DISCUSS that 'MUST use good networking practices' includes a too vague construct ('good networking practices') for a mandatory to implement statement. 

3. The IANA considerations section should note that the the document makes use of the IANA enterprise id numbers registry. While this is mentioned previously in the document (in Section 4) it is not noted in the IANA considerations section. While no specific action item is requested of IANA it is a consideration.
2010-02-16
01 Dan Romascanu [Ballot discuss]
Section 4 - the document specify that option-len and subopt-len are expressed in octets
2010-02-16
01 Dan Romascanu [Ballot Position Update] New position, Discuss, has been recorded by Dan Romascanu
2010-02-16
01 Lars Eggert [Ballot Position Update] Position for Lars Eggert has been changed to Abstain from No Objection by Lars Eggert
2010-02-16
01 Lars Eggert [Ballot Position Update] Position for Lars Eggert has been changed to No Objection from Discuss by Lars Eggert
2010-02-16
01 Lars Eggert [Ballot Position Update] New position, Discuss, has been recorded by Lars Eggert
2010-02-16
01 Pasi Eronen
[Ballot discuss]
I have reviewed draft-ietf-dhc-dhcpv4-vendor-message-01, and have one
small question that I'd like to discuss before recommending approval
of the document:

Section 1 …
[Ballot discuss]
I have reviewed draft-ietf-dhc-dhcpv4-vendor-message-01, and have one
small question that I'd like to discuss before recommending approval
of the document:

Section 1 says "New message codes are assigned through IETF Standards
Action". According to the registry and RFC 2939, the policy is
currently "IETF Consensus" -- is this just a typo, or is the intent to
change the policy?
2010-02-16
01 Pasi Eronen [Ballot Position Update] New position, Discuss, has been recorded by Pasi Eronen
2010-02-14
01 Russ Housley
[Ballot comment]
s4, top of page 5: 'Option codes 0 and 255 have no pre-defined
  interpretation or format':  This comment (duplicated from RFC 3925 …
[Ballot comment]
s4, top of page 5: 'Option codes 0 and 255 have no pre-defined
  interpretation or format':  This comment (duplicated from RFC 3925)
  is confusing to the uninitiated reader.  If I understand correctly,
  this is intended to contrast with the 'basic' options in DHCPv4 where
  options 0 and 255 are 'special' - i.e. no length code.  I suggest
  adding at the beginning of the sentence: 'Unlike option codes in
  DHCPv4 [RFC2131], option codes 0...'.
2010-02-14
01 Russ Housley
[Ballot discuss]
Two concerns were raised in the Gen-ART Review by Elwyn Davies
  that need to be addressed:

  s3, para 3: This paragraph …
[Ballot discuss]
Two concerns were raised in the Gen-ART Review by Elwyn Davies
  that need to be addressed:

  s3, para 3: This paragraph contains weasel words about 'good
  networking practices' that 'MUST be used'.  This is untestable
  as it stands.  Is this anything more than dealing with non-replies,
  not flooding the network with repeats, and not hanging up if the
  partner never does answer?  Also, servers or clients that do not
  (yet) implement this capability do not have a defined behaviour
  when receiving this new type of message.  There is a assumption
  that they will be silently dropped without causing any problems.

  s7 and s4, next to last para: s4 specifies RFC 3396 as 'MUST support'
  This makes RFC 3396 a normative reference, not informative.  Arguably
  the last para of s4 makes RFC 3925 normative as well.
2010-02-14
01 Russ Housley [Ballot Position Update] New position, Discuss, has been recorded by Russ Housley
2010-02-13
01 Adrian Farrel
[Ballot comment]
I support Alexey's Discuss wrt mandating the behavior of non-supporting nodes. You cannot do that and must refer back to the standard processing …
[Ballot comment]
I support Alexey's Discuss wrt mandating the behavior of non-supporting nodes. You cannot do that and must refer back to the standard processing of unknown messages.

In section 4 you have:
      option-len          5 plus the length of the vendor-option-data.
I think this should s/vendor-option-data/option-data/

Section 1 says:
  DHCPv4 [RFC2131] specifies a mechanism for the assignment of
  addresses and configuration information to nodes.  The protocol
  provides for 256 possible message codes, of which a small number are
  assigned ([DHCPv4Params]).  Each of the assigned message codes have
  specific purposes.  New message codes are assigned through IETF
  Standards Action.
If I am not mistaken, the registry and RFC 2939 say "IETF Consensus". I don't think this changes your work, but you need to fix the document.
2010-02-13
01 Adrian Farrel
[Ballot discuss]
I think adding a vendor-specific message to DHCP is a fine thing to do.

However, I have a relatively minor issue with the …
[Ballot discuss]
I think adding a vendor-specific message to DHCP is a fine thing to do.

However, I have a relatively minor issue with the current text. I don't think it is correct to suggest that a purpose of this is experimentation. Experiments are not supposed to escape into the wider Net and an experimental message would be treated differently from a vendor-specific message.

While it is true that a vendor may choose to experiment under their enterprise number, the fact that it is an experiment is actually hidden from the world, and we don't consider listing all of the other uses to which this message might be put.

I would be happy to see the reference to experimentation removed from the Abstract and the Introduction.
2010-02-13
01 Adrian Farrel
[Ballot comment]
I support Alexey's Discuss wrt mandating the behavior of non-supporting nodes. You cannot do that and must refer back to the standard processing …
[Ballot comment]
I support Alexey's Discuss wrt mandating the behavior of non-supporting nodes. You cannot do that and must refer back to the standard processing of unknown messages.

In section 4 you have:
      option-len          5 plus the length of the vendor-option-data.
I think this should s/vendor-option-data/option-data/
2010-02-13
01 Adrian Farrel
[Ballot discuss]
I think adding a vendor-specific message to DHCP is a fine thing to do.

However, I have a relatively minor issue with the …
[Ballot discuss]
I think adding a vendor-specific message to DHCP is a fine thing to do.

However, I have a relatively minor issue with the current text. I don't think it is correct to suggest that a purpose of this is experimentation. Experiments are not supposed to escape into the wider Net and an experimental message would be treated differently from a vendor-specific message.

While it is true that a vendor may choose to experiment under their enterprise number, the fact that it is an experiment is actually hidden from the world, and we don't consider listing all of the other uses to which this message might be put.

I would be happy to see the reference to experimentation removed from the Abstract and the Introduction.
2010-02-13
01 Adrian Farrel
[Ballot comment]
I support Alexey's Discuss wrt mandating the behavior of non-supporting nodes. You cannot do that and must refer back to the standard processing …
[Ballot comment]
I support Alexey's Discuss wrt mandating the behavior of non-supporting nodes. You cannot do that and must refer back to the standard processing of unknown messages.
2010-02-13
01 Adrian Farrel [Ballot Position Update] New position, Discuss, has been recorded by Adrian Farrel
2010-02-13
01 Alexey Melnikov
[Ballot comment]
In Section 3:

  Applications using these messages MUST NOT assume that all DHCPv4
  clients, relay agents, and servers support them and …
[Ballot comment]
In Section 3:

  Applications using these messages MUST NOT assume that all DHCPv4
  clients, relay agents, and servers support them and MUST use good
  networking practices when transmitting and retransmitting these
  messages.

The second MUST almost raises to the level of DISCUSS.
What are the good practices you are talking about and is the following
sentence describes one of them:

  For some applications, it may be appropriate to use
  Vendor-Identifying Vendor Options [RFC3925] in a standard DHCPv4
  exchange to negotiate whether the end-points support the vendor-
  specific message.

? If not, then it is not clear how this MUST can be satisfied.
In that case you need a reference here.
2010-02-13
01 Alexey Melnikov
[Ballot discuss]
I generally don't object to this document going forward, however I believe there are some minor points that needs to be addressed/discussed first: …
[Ballot discuss]
I generally don't object to this document going forward, however I believe there are some minor points that needs to be addressed/discussed first:

1) In Section 3

  Clients and servers MAY chose to support this message; those that do
  not, MUST discard the message.  Relay agents SHOULD relay these
  messages as they would other DHCPv4 messages unless the relay agent
  understands the specific message and knows that the message was
  directed at it.

This sounds as if this document is trying to put requirements on implementations that are not compliant with this document.
Is this section just describes something which follows from DHCPv4
extensibility rules?

2) In Section 4:

  The option-data field MUST be encoded as a sequence of code/length/
  value fields of identical format to the DHCP options field and is
  identical to the option-data field of Vendor-Identifying Vendor
  Options [RFC3925].

This reference looks Normative to me.

  The option codes are defined by the vendor
  identified in the enterprise-number field and are not managed by
  IANA.  Option codes 0 and 255 have no pre-defined interpretation or

Are you talking about subopt-code here?

  format.  Each of the encapsulated options is formatted as follows:

3) In Section 4:

  Clients, relay agents, and/or servers supporting the Vendor Message
  Option MUST support [RFC3396].

This reference looks Normative to me.
2010-02-13
01 Alexey Melnikov [Ballot Position Update] New position, Discuss, has been recorded by Alexey Melnikov
2010-02-11
01 Samuel Weiler Request for Last Call review by SECDIR Completed. Reviewer: Stephen Farrell.
2010-02-05
01 Samuel Weiler Request for Last Call review by SECDIR is assigned to Stephen Farrell
2010-02-05
01 Samuel Weiler Request for Last Call review by SECDIR is assigned to Stephen Farrell
2010-02-03
01 Amy Vezza Last call sent
2010-02-03
01 Amy Vezza State Changes to In Last Call from Last Call Requested by Amy Vezza
2010-02-03
01 Ralph Droms State Changes to Last Call Requested from AD Evaluation by Ralph Droms
2010-02-03
01 Ralph Droms Last Call was requested by Ralph Droms
2010-02-03
01 Ralph Droms State Changes to AD Evaluation from Last Call Requested by Ralph Droms
2010-02-03
01 Ralph Droms Last Call was requested by Ralph Droms
2010-02-03
01 Ralph Droms Placed on agenda for telechat - 2010-02-18 by Ralph Droms
2010-02-03
01 Ralph Droms State Changes to Last Call Requested from AD Evaluation by Ralph Droms
2010-02-03
01 Ralph Droms State Changes to AD Evaluation from Publication Requested by Ralph Droms
2010-02-03
01 Ralph Droms [Note]: 'Ted Lemon (mellon@nominum.com) is the document shepherd.' added by Ralph Droms
2010-02-03
01 Ralph Droms [Ballot Position Update] New position, Yes, has been recorded for Ralph Droms
2010-02-03
01 Ralph Droms Ballot has been issued by Ralph Droms
2010-02-03
01 Ralph Droms Created "Approve" ballot
2010-02-03
01 (System) Ballot writeup text was added
2010-02-03
01 (System) Last call text was added
2010-02-03
01 (System) Ballot approval text was added
2010-01-28
01 Cindy Morgan
  (1.a) Who is the Document Shepherd for this document? Has the
        Document Shepherd personally reviewed this version of the
  …
  (1.a) Who is the Document Shepherd for this document? Has the
        Document Shepherd personally reviewed this version of the
        document and, in particular, does he or she believe this
        version is ready for forwarding to the IESG for publication?

I (Ted Lemon ) am the shepherd for this document.
I have personally reviewed the document, and I think it is ready to
forward to the IESG for publication.

  (1.b) Has the document had adequate review both from key WG members
        and from key non-WG members? Does the Document Shepherd have
        any concerns about the depth or breadth of the reviews that
        have been performed? 

The document has been carefully reviewed by several experienced DHCP
implementors.  I have no concerns that the document has not had
adequate review.

  (1.c) Does the Document Shepherd have concerns that the document
        needs more review from a particular or broader perspective,
        e.g., security, operational complexity, someone familiar with
        AAA, internationalization or XML?

The document is a pretty simple extension, so I don't have any such
concerns.

  (1.d) Does the Document Shepherd have any specific concerns or
        issues with this document that the Responsible Area Director
        and/or the IESG should be aware of? For example, perhaps he
        or she is uncomfortable with certain parts of the document, or
        has concerns whether there really is a need for it. In any
        event, if the WG has discussed those issues and has indicated
        that it still wishes to advance the document, detail those
        concerns here. Has an IPR disclosure related to this document
        been filed? If so, please include a reference to the
        disclosure and summarize the WG discussion and conclusion on
        this issue.

The primary concern that was raised about this document is that it
creates an escape mechanism whereby a vendor can add functionality to
DHCP without review by the DHC working group.  However, this is
already possible; vendors have in the past simply allocated message
codes from the reserved space and used them without consulting the
working group.

By providing a clear mechanism for creating experimental messages, we
hope that vendors will stop allocating reserved codes when working on
experimental DHCP extensions.

  (1.e) How solid is the WG consensus behind this document? Does it
        represent the strong concurrence of a few individuals, with
        others being silent, or does the WG as a whole understand and
        agree with it? 

Most of the more active members of the working group have reviewed the
document and support its advancement.  It's been explained in working
group meetings, so I think anyone who is interested has a pretty clear
understanding of what it does.

  (1.f) Has anyone threatened an appeal or otherwise indicated extreme
        discontent? If so, please summarise the areas of conflict in
        separate email messages to the Responsible Area Director. (It
        should be in a separate email because this questionnaire is
        entered into the ID Tracker.)

No, in fact I was the only person who objected to the document, and
the reasoning I've given above under (1.d) is what convinced me to
agree it needed to be done.

  (1.g) Has the Document Shepherd personally verified that the
        document satisfies all ID nits? (See the Internet-Drafts Checklist
        and http://tools.ietf.org/tools/idnits/). Boilerplate checks are
        not enough; this check needs to be thorough. Has the document
        met all formal review criteria it needs to, such as the MIB
        Doctor, media type and URI type reviews?

Yes.  The document was last submitted prior to the latest update to
the IETF Trust Provisions as of 28 Dec 2009, so it contains
boilerplate from a previous version.  My intention is to ask the
author to correct this after IESG review, on the assumption that other
document changes will also be required.

  (1.h) Has the document split its references into normative and
        informative? Are there normative references to documents that
        are not ready for advancement or are otherwise in an unclear
        state? If such normative references exist, what is the
        strategy for their completion? Are there normative references
        that are downward references, as described in [RFC3967]? If
        so, list these downward references to support the Area
        Director in the Last Call procedure for them [RFC3967].

This document only makes reference to RFCs and to the IANA.

  (1.i) Has the Document Shepherd verified that the document IANA
        consideration section exists and is consistent with the body
        of the document? If the document specifies protocol
        extensions, are reservations requested in appropriate IANA
        registries? Are the IANA registries clearly identified? If
        the document creates a new registry, does it define the
        proposed initial contents of the registry and an allocation
        procedure for future registrations? Does it suggest a
        reasonable name for the new registry? See [RFC5226]. If the
        document describes an Expert Review process has Shepherd
        conferred with the Responsible Area Director so that the IESG
        can appoint the needed Expert during the IESG Evaluation?

The IANA considerations seem correct to me.

  (1.j) Has the Document Shepherd verified that sections of the
        document that are written in a formal language, such as XML
        code, BNF rules, MIB definitions, etc., validate correctly in
        an automated checker?

The document doesn't contain any such sections.

  (1.k) The IESG approval announcement includes a Document
        Announcement Write-Up. Please provide such a Document
        Announcement Write-Up? Recent examples can be found in the
        "Action" announcements for approved documents. The approval
        announcement contains the following sections:

    Technical Summary
This document provides a standard mechanism for defining
experimental messages in the DHCPv4 protocol.

    Working Group Summary
Standard DHCPv4 message codes are allocated by the IANA
and require working group approval.  The current IANA
procedure for message type code allocation requires that a
document pass a working group last call before a code
can be allocated.  Current practice among implementors of
new or experimental DHCP messages is to simply bypass the
IANA process and allocate a code.  Because this document
provides a clear alternative, the working group hopes that
no new DHCPv4 message type codes will be pirated by
experimenters.

One concern that was raised was that by providing an
unreviewed mechanism for allocating new DHCP message types,
implementors would have less of an incentive for consulting
the working group when developing new DHCP messages.
However, our experience has been that the people least likely
to consult the working group are the same people who would
feel free to simply make up a number and not tell anyone
until a collision arises.  Hence, this mechanism is seen
even by those who raised this objection as the lesser of
two evils.

    Document Quality
The document has already been used for an implementation
of an experimental authentication protocol at Cisco; the
protocol in question is under consideration for
standardization by the DHC working group.

    Personnel
Who is the Document Shepherd for this document?  Who is the
Responsible Area Director?  If the document requires IANA
experts(s), insert 'The IANA Expert(s) for the registries
in this document are .'

The document shepherd is Ted Lemon .  I believe
the responsible A-D is Ralph Droms.
2010-01-28
01 Cindy Morgan Draft Added by Cindy Morgan in state Publication Requested
2010-01-28
01 Cindy Morgan [Note]: 'Ted Lemon (mellon@nominum.com) is the document shepherd.' added by Cindy Morgan
2009-08-04
01 (System) New version available: draft-ietf-dhc-dhcpv4-vendor-message-01.txt
2009-01-22
00 (System) New version available: draft-ietf-dhc-dhcpv4-vendor-message-00.txt