Skip to main content

Diameter Mobile IPv6: Support for Home Agent to Diameter Server Interaction
draft-ietf-dime-mip6-split-17

Revision differences

Document history

Date Rev. By Action
2012-08-22
17 (System) post-migration administrative database adjustment to the No Objection position for Pasi Eronen
2009-05-20
17 (System) IANA Action state changed to RFC-Ed-Ack from Waiting on RFC Editor
2009-05-20
17 (System) IANA Action state changed to Waiting on RFC Editor from In Progress
2009-05-20
17 (System) IANA Action state changed to In Progress from Waiting on Authors
2009-05-19
17 (System) IANA Action state changed to Waiting on Authors from In Progress
2009-05-19
17 Amy Vezza State Changes to RFC Ed Queue from Approved-announcement sent by Amy Vezza
2009-05-19
17 (System) IANA Action state changed to In Progress
2009-05-19
17 Amy Vezza IESG state changed to Approved-announcement sent
2009-05-19
17 Amy Vezza IESG has approved the document
2009-05-19
17 Amy Vezza Closed "Approve" ballot
2009-05-19
17 Amy Vezza State Changes to Approved-announcement to be sent from IESG Evaluation by Amy Vezza
2009-05-19
17 Amy Vezza State Changes to IESG Evaluation from Waiting for AD Go-Ahead by Amy Vezza
2009-05-15
17 (System) State has been changed to Waiting for AD Go-Ahead from In Last Call by system
2009-05-12
17 Amanda Baber
IANA comments:

Action 1 (Section 9.1):

Upon approval of this document, IANA will make the following
assignments in the "Command Codes" registry at
http://iana.org/assignments/aaa-parameters/aaa-parameters.xhtml

Code …
IANA comments:

Action 1 (Section 9.1):

Upon approval of this document, IANA will make the following
assignments in the "Command Codes" registry at
http://iana.org/assignments/aaa-parameters/aaa-parameters.xhtml

Code Value Name Reference
--------- ----- ---------
TBD MIP6-Request [RFC-dime-mip6-split-17]
TBD MIP6-Answer [RFC-dime-mip6-split-17]


Action 2 (Section 9.2):

Upon approval of this document, IANA will make the following
assignments in the "AVP Codes" registry at
http://iana.org/assignments/aaa-parameters/aaa-parameters.xhtml

AVP Code Attribute Name Reference
-------- -------------- ---------
TBD MIP-Careof-Address [RFC-dime-mip6-split-17]
TBD MIP-Authenticator [RFC-dime-mip6-split-17]
TBD MIP-MAC-Mobility-Data [RFC-dime-mip6-split-17]
TBD MIP-Timestamp [RFC-dime-mip6-split-17]
TBD MIP-MN-HA-SPI [RFC-dime-mip6-split-17]
TBD MIP-MN-HA-MSA [RFC-dime-mip6-split-17]
TBD Service-Selection [RFC-dime-mip6-split-17]
TBD MIP6-Auth-Mode [RFC-dime-mip6-split-17]


Action 3 (Section 9.3):

Upon approval of this document, IANA will make the following
assignments in the "Result-Code AVP Values (code 268)" registry at
http://iana.org/assignments/aaa-parameters/aaa-parameters.xhtml

AVP Values Attribute Name Reference
---------- -------------- ---------
TBD DIAMETER_SUCCESS_RELOCATE_HA [RFC-dime-mip6-split-17]
TBD DIAMETER_ERROR_MIP6_AUTH_MODE [RFC-dime-mip6-split-17]


Action 4 (Section 9.4):

Upon approval of this document, IANA will make the following
assignments in the "Application IDs" registry at
http://iana.org/assignments/aaa-parameters/aaa-parameters.xhtml

ID values Name Reference
--------- ----- ----------
TBD Diameter Mobile IPv6 IKE (MIP6I) [RFC-dime-mip6-split-17]
TBD Diameter Mobile IPv6 Auth (MIP6A) [RFC-dime-mip6-split-17]


Action 5 (Section 9.5):

Upon approval of this document, IANA will create the following
registry at
http://iana.org/assignments/aaa-parameters/aaa-parameters.xhtml

Registry Name: MIP6 Authentication Mode (MIP6-Auth-Mode AVP)
Registration Procedure: Specification Required
Initial contents of this sub-registry will be:

Value Token Reference
---- ----- ---------
0 Reserved [RFC-dime-mip6-split-17]
1 MIP6_AUTH_MN_AAA [RFC-dime-mip6-split-17]
2-4294967295 Unassigned

We understand the above to be the only IANA Actions for this document.
2009-05-01
17 Pasi Eronen [Ballot Position Update] Position for Pasi Eronen has been changed to No Objection from Discuss by Pasi Eronen
2009-05-01
17 Cindy Morgan Last call sent
2009-05-01
17 Cindy Morgan State Changes to In Last Call from Last Call Requested by Cindy Morgan
2009-05-01
17 Dan Romascanu Last Call was requested by Dan Romascanu
2009-05-01
17 Dan Romascanu State Changes to Last Call Requested from In Last Call by Dan Romascanu
2009-05-01
17 Cindy Morgan State Changes to In Last Call from Last Call Requested by Cindy Morgan
2009-05-01
17 Dan Romascanu State Changes to Last Call Requested from IESG Evaluation::AD Followup by Dan Romascanu
2009-05-01
17 Dan Romascanu Last Call was requested by Dan Romascanu
2009-04-28
17 Pasi Eronen [Ballot discuss]
(Updated for version -17)

The normative downrefs need to be mentioned during IETF Last Call.
2009-04-28
17 Pasi Eronen [Ballot comment]
2009-04-28
17 (System) Sub state has been changed to AD Follow up from New Id Needed
2009-04-28
17 (System) New version available: draft-ietf-dime-mip6-split-17.txt
2009-04-24
17 (System) Removed from agenda for telechat - 2009-04-23
2009-04-23
17 Cindy Morgan State Changes to IESG Evaluation::Revised ID Needed from IESG Evaluation by Cindy Morgan
2009-04-23
17 Lisa Dusseault
[Ballot comment]
Figure 2 could be much better explained and referenced.  It's clear there are conventions for such diagrams but the conventions are slightly mixed  …
[Ballot comment]
Figure 2 could be much better explained and referenced.  It's clear there are conventions for such diagrams but the conventions are slightly mixed  --  different for IKE and for EAP so different for left and right side of the same diagram!
- On the left side, every message contains an HDR but that's just part of the list of what the message contains
- on the right side, every message begins with its type (DER/DEA)
- SK{xxx} indicates signing?
- (xxx) indicates payload in DER and DEA messages
- CP(xxx) indicates an IKE config payload?
- is the order of messages required -- must the HA wait for a DEA before sending the next message to the MN

An explicit reference that the abbreviations and conventions in the left side come from RFC4306 would be good.  There is a reference to 4306 shortly after the diagram but it is worded as if it explains only a small point.  Better would be  "Conventions and abbreviations for the MN/HA interactions in this diagram are from RFC4306" (plus an explanation for SK(xxx) which is not there.)

I'm not sure what the reference for the right side would be.

Similar, for the tables in section 6, it's unclear that the conventions and meaning of the columns comes from, for example, RFC3588 (though the specifics differ -- in RFC3588, the last column is not considered an AVP Flag Rule)
2009-04-23
17 Lisa Dusseault [Ballot Position Update] New position, No Objection, has been recorded by Lisa Dusseault
2009-04-23
17 Tim Polk
[Ballot comment]
Use of EAP methods that do not establish a shared key is discouraged but permitted
(a SHOULD NOT in section 4.1). 

That seems …
[Ballot comment]
Use of EAP methods that do not establish a shared key is discouraged but permitted
(a SHOULD NOT in section 4.1). 

That seems to conflict with goal G4.3 from ietf-mext-aaa-ha-goals...
2009-04-23
17 Tim Polk [Ballot Position Update] Position for Tim Polk has been changed to No Objection from Undefined by Tim Polk
2009-04-22
17 Tim Polk [Ballot Position Update] Position for Tim Polk has been changed to Undefined from Discuss by Tim Polk
2009-04-22
17 Tim Polk [Ballot Position Update] New position, Discuss, has been recorded by Tim Polk
2009-04-22
17 Ross Callon [Ballot Position Update] New position, No Objection, has been recorded by Ross Callon
2009-04-22
17 Ron Bonica [Ballot Position Update] New position, No Objection, has been recorded by Ron Bonica
2009-04-22
17 Pasi Eronen
[Ballot comment]
Couple of editorial suggestions/nits:

The abstract gives the impression that this document supports IKEv2
with certificates and pre-shared secrets. This is probably left …
[Ballot comment]
Couple of editorial suggestions/nits:

The abstract gives the impression that this document supports IKEv2
with certificates and pre-shared secrets. This is probably left over
from older draft versions, which did support them?

Section 4.3, 2nd paragraph: The text should be clearer that for IPsec,
it means IKE SAs (not CHILD SAs/IPsec SAs).

Section 6.7: what about an IPv4 care-of address? (with DSMIPv6)

Sections 8: The symbol "*0" isn't defined -- does this mean "0+"
or something else?
2009-04-22
17 Pasi Eronen
[Ballot discuss]
I have reviewed draft-ietf-dime-mip6-split-16, and have couple of
questions/concerns that I'd like to discuss before recommending
approval of the document:

1) This …
[Ballot discuss]
I have reviewed draft-ietf-dime-mip6-split-16, and have couple of
questions/concerns that I'd like to discuss before recommending
approval of the document:

1) This document specifies only the MIP6_AUTH_MN_AAA authentication
mode, but seems to have lot of text that doesn't make sense for this
authentication mode -- but would make sense for the (somewhat
controversial) MN-HA authentication mode (where HA just asks the AAA
server for a key, without proving that the user is "live" -- violating
various AAA design rules).

The MN-HA parts include e.g. Section 4.2, 5th paragraph ("In some
architectures..."), and many of the AVP definitions (such as including
MIP-MN-HA-SPI in MIP6-Request message -- as far as I can tell, with
MIP6_AUTH_MN_AAA mode, it's included only in MIP6-Answers).

Could you clarify what is the situation here? Is there a second draft
which defines the MN-HA authentication mode? Or is the intent to
specify the final missing piece for MN-HA mode (the enumerated value)
in some non-IETF spec (which is allowed by the "Specification
Required" IANA rule)?

(My preference would be to either omit the MN-HA authentication mode
completely, or include it fully -- including 90% of it doesn't seem
like a terribly good idea.)

2) Section 4.1, paragraph beginning with "In some deployment
scenarios.."  seems to suggest using the MIP6I Diameter application
for non-Mobile IPv6 purposes (IPsec VPNs). Could you clarify
what is the intent here?

3) Section 6.14, "The replay modes, defined in RFC 4004 [RFC4004], are
supported".  The replay modes in RFC 4004 are for Mobile IPv4, not
Mobile IPv6.  It seems not all of them are actually supported by
MIPv6?

4) Section 6.16: The MIP-Timestamp AVP is 32 bits, but the timestamp
in the BU/BAck is 64 bits -- is the HA supposed to truncate/expand
this?

5) Section 6.15: What are the expected semantics of the MIP6_SPLIT
bit? A NAS that sends a message with MIP6I/MIP6A application
identifier already supports this specification -- so what additional
information is communicated by setting or not setting this bit?

6) The security considerations (or some place) should explicitly
mention that this spec expects that the AAA Server derives the MN-HA
security association (including MN-HA shared key) somehow (probably
based on the MN-AAA shared key), but there is no IETF document
specifying how that is done, and the security properties of the system
depend on how this is done. (For example, the simplest possible way,
just using MN-AAA key as the MN-HA key, would probably have
implications on how you would want to deploy your AAA nodes.)

(This is one big difference from RFC 4004 and related Mobile IPv4
specs -- in MIPv4 case, there is an RFC (3957) that specifies how to
derive the MN-HA shared key from the MN-AAA key, in a way that's
reasonably OK to transport over AAA.)

7) To me both RFC 4285 and 5149 look like they should be normative.
What was the reason for moving RFC 4285 from a Normative Reference
(like it was in version -15) to Informative?
2009-04-22
17 Pasi Eronen [Ballot Position Update] New position, Discuss, has been recorded by Pasi Eronen
2009-04-22
17 Robert Sparks [Ballot Position Update] New position, No Objection, has been recorded by Robert Sparks
2009-04-21
17 Cullen Jennings [Ballot Position Update] New position, No Objection, has been recorded by Cullen Jennings
2009-04-20
17 Russ Housley [Ballot Position Update] New position, No Objection, has been recorded by Russ Housley
2009-04-20
17 Ralph Droms [Ballot comment]
Should RFC 4285, "Authentication Protocol for Mobile IPv6" be a normative reference?
2009-04-20
17 Ralph Droms [Ballot Position Update] New position, No Objection, has been recorded by Ralph Droms
2009-04-20
17 Lars Eggert
[Ballot comment]
Section 6., paragraph 2:
>                    AVP  Defined            |    …
[Ballot comment]
Section 6., paragraph 2:
>                    AVP  Defined            |    |    |SHLD| MUST|MAY |

  I'd prefer SHLD->SHOULD. (Here and elsewhere.)
2009-04-20
17 Lars Eggert
[Ballot comment]
Section 6., paragraph 2:
>                    AVP  Defined            |    …
[Ballot comment]
Section 6., paragraph 2:
>                    AVP  Defined            |    |    |SHLD| MUST|MAY |
>    Attribute Name  Code in      Value Type |MUST| MAY| NOT|  NOT|Encr|

  I'd prefer SHLD->SHOULD. (Here and elsewhere.)
2009-04-20
17 Lars Eggert [Ballot Position Update] New position, No Objection, has been recorded by Lars Eggert
2009-04-20
17 Adrian Farrel [Ballot Position Update] New position, No Objection, has been recorded by Adrian Farrel
2009-04-20
17 Adrian Farrel [Ballot comment]
Page 20
"[ Multi-Round-Time"
Is there a missing close square bracket?
2009-04-14
17 Dan Romascanu
Security Directorate Review by Donald Eastlake:

I have reviewed this document as part of the security directorate's ongoing effort to review all IETF documents being …
Security Directorate Review by Donald Eastlake:

I have reviewed this document as part of the security directorate's ongoing effort to review all IETF documents being processed by the IESG. Document editors and WG chairs should treat these comments just like any other last call comments.

This document primarily specifies the interaction between a Mobile IP Home Agent and a Diameter server when an IPv6 Mobile Mode wants to bootstrap its operations dynamically through interaction between its Home Agent and the Diameter server of a Mobile Service Provider.

General: I'm always a bit suspicious of draft that include several options and alternatives. These at least make the document more complex and increase the probability that some security flaw in one of the options/alternatives will be overlooked.

Security: The Security Considerations section of this draft is pretty short and primarily refers to the Security Considerations of three other RFCs. It appears that the referenced documents, particularly RFC
5026
and the RFCs referenced by the Securities Considerations section of RFC 5026, are adequate.

Nits:

Given that the first two messages in the Figure 2 message flow diagram are annotated "(1)" and "(2)", it would seem like a good idea to add those annotations at an appropriate place in the subsequent text.

"a IKEv2" -> "an IKEv2".

First paragraph of 5.1: "a number AVPs" -> "a number of AVPs".

Second paragraph of 5.2.1: "with a replay protection related information" -> "with replay protection related information".

9.5: "values" -> "value".

10: "in in" -> "in".
2009-04-14
17 Dan Romascanu State Changes to IESG Evaluation from Waiting for AD Go-Ahead by Dan Romascanu
2009-04-14
17 Dan Romascanu Placed on agenda for telechat - 2009-04-23 by Dan Romascanu
2009-04-14
17 Dan Romascanu [Ballot Position Update] New position, Yes, has been recorded for Dan Romascanu
2009-04-14
17 Dan Romascanu Ballot has been issued by Dan Romascanu
2009-04-14
17 Dan Romascanu Created "Approve" ballot
2009-04-09
17 Samuel Weiler Request for Last Call review by SECDIR Completed. Reviewer: Donald Eastlake.
2009-03-23
17 (System) State has been changed to Waiting for AD Go-Ahead from In Last Call by system
2009-03-13
17 Samuel Weiler Request for Last Call review by SECDIR is assigned to Donald Eastlake
2009-03-13
17 Samuel Weiler Request for Last Call review by SECDIR is assigned to Donald Eastlake
2009-03-12
17 Amanda Baber
IANA Last Call questions/comments:

- In the "MIP6 Authentication Mode (MIP6-Auth-Mode AVP)" registry, is
0 reserved or available for assignment? Also, does this registry have …
IANA Last Call questions/comments:

- In the "MIP6 Authentication Mode (MIP6-Auth-Mode AVP)" registry, is
0 reserved or available for assignment? Also, does this registry have
an upper limit?

Action 1 (Section 9.1):

Upon approval of this document, IANA will make the following
assignments in the "Command Codes" registry at
http://iana.org/assignments/aaa-parameters/aaa-parameters.xhtml

Code Value Name Reference
--------- ----- ---------
TBD MIP6-Request [RFC-dime-mip6-split-16]
TBD MIP6-Answer [RFC-dime-mip6-split-16]


Action 2 (Section 9.2):

Upon approval of this document, IANA will make the following
assignments in the "AVP Codes" registry at
http://iana.org/assignments/aaa-parameters/aaa-parameters.xhtml

AVP Code Attribute Name Reference
-------- -------------- ---------
TBD MIP-Careof-Address [RFC-dime-mip6-split-16]
TBD MIP-Authenticator [RFC-dime-mip6-split-16]
TBD MIP-MAC-Mobility-Data [RFC-dime-mip6-split-16]
TBD MIP-Timestamp [RFC-dime-mip6-split-16]
TBD MIP-MN-HA-SPI [RFC-dime-mip6-split-16]
TBD MIP-MN-HA-MSA [RFC-dime-mip6-split-16]
TBD Service-Selection [RFC-dime-mip6-split-16]
TBD MIP6-Auth-Mode [RFC-dime-mip6-split-16]


Action 3 (Section 9.3):

Upon approval of this document, IANA will make the following
assignments in the "Result-Code AVP Values (code 268)" registry at
http://iana.org/assignments/aaa-parameters/aaa-parameters.xhtml

AVP Values Attribute Name Reference
---------- -------------- ---------
TBD DIAMETER_SUCCESS_RELOCATE_HA [RFC-dime-mip6-split-16]
TBD DIAMETER_ERROR_MIP6_AUTH_MODE [RFC-dime-mip6-split-16]


Action 4 (Section 9.4):

Upon approval of this document, IANA will make the following
assignments in the "Application IDs" registry at
http://iana.org/assignments/aaa-parameters/aaa-parameters.xhtml

ID values Name Reference
--------- ----- ----------
TBD Diameter Mobile IPv6 IKE (MIP6I) [RFC-dime-mip6-split-16]
TBD Diameter Mobile IPv6 Auth (MIP6A) [RFC-dime-mip6-split-16]


Action 5 (Section 9.5):

Upon approval of this document, IANA will make the following
assignment in the "Mobility Capability Registry" at
http://iana.org/assignments/aaa-parameters/aaa-parameters.xhtml

Value Token Reference
---- ----- ---------
0x0000000100000000 MIP6_SPLIT [RFC-dime-mip6-split-16]


Action 6 (Section 9.5):

Upon approval of this document, IANA will create the following
registry at
http://iana.org/assignments/aaa-parameters/aaa-parameters.xhtml

Registry Name: MIP6 Authentication Mode (MIP6-Auth-Mode AVP)
Allocation Policy: Specification Required
Initial contents of this sub-registry will be:

Value Token Reference
---- ----- ---------
1 MIP6_SPLIT [RFC-dime-mip6-split-16]


We understand the above to be the only IANA Actions for this document.
2009-03-09
17 Amy Vezza State Changes to In Last Call from Last Call Requested by Amy Vezza
2009-03-09
17 Dan Romascanu State Changes to Last Call Requested from Publication Requested by Dan Romascanu
2009-03-09
17 Dan Romascanu Last Call was requested by Dan Romascanu
2009-03-09
17 (System) Ballot writeup text was added
2009-03-09
17 (System) Last call text was added
2009-03-09
17 (System) Ballot approval text was added
2008-12-29
16 (System) New version available: draft-ietf-dime-mip6-split-16.txt
2008-12-23
17 Cindy Morgan
PROTO WRITEUP for draft-ietf-dime-mip6-split-15.txt
===================================================

  (1.a)  Who is the Document Shepherd for this document?  Has the
          Document Shepherd personally …
PROTO WRITEUP for draft-ietf-dime-mip6-split-15.txt
===================================================

  (1.a)  Who is the Document Shepherd for this document?  Has the
          Document Shepherd personally reviewed this version of the
          document and, in particular, does he or she believe this
          version is ready for forwarding to the IESG for publication?

The document shepherd is Victor Fajardo. I have personally reviewed the
document and I believe it is ready for publication.

  (1.b)  Has the document had adequate review both from key WG members
          and from key non-WG members?  Does the Document Shepherd have
          any concerns about the depth or breadth of the reviews that
          have been performed?

This document is a solutions document for the MIPv6 bootstrapping problem
for the split scenario. It has direct implications for 
authentication/authorization, provisioning and accounting of mobility 
resources to users. Therefore, the document has received extensive reviews 
by relevant WG members - under the employ of operators and parties that 
have associations with interested SDOs.

Discrepancies found during the lifetime of this doc have received a fair
amount of reviews both within and outside of the WG. All discussions
have been publicly posted in the dime mailing list. So, I do not have any
concerns with the depth or breadth of the reviews.

  (1.c)  Does the Document Shepherd have concerns that the document
          needs more review from a particular or broader perspective,
          e.g., security, operational complexity, someone familiar with
          AAA, internationalization, or XML?

There are no concerns with this document.

  (1.d)  Does the Document Shepherd have any specific concerns or
          issues with this document that the Responsible Area Director
          and/or the IESG should be aware of?  For example, perhaps he
          or she is uncomfortable with certain parts of the document, or
          has concerns whether there really is a need for it.  In any
          event, if the WG has discussed those issues and has indicated
          that it still wishes to advance the document, detail those
          concerns here.  Has an IPR disclosure related to this document
          been filed?  If so, please include a reference to the
          disclosure and summarize the WG discussion and conclusion on
          this issue.

There are no concerns with this document. An IPR disclosure has been
filed, 
see https://datatracker.ietf.org/ipr/964/, and the group has been informed 
about it. Content that may be subject of the IPR claim was moved 
into a separate document, see 
http://tools.ietf.org/id/draft-korhonen-dime-mip6-feature-bits-00.txt


  (1.e)  How solid is the WG consensus behind this document?  Does it
          represent the strong concurrence of a few individuals, with
          others being silent, or does the WG as a whole understand and
          agree with it?

There is consensus in the WG behind the document. The problem is
well understood and the solution is acceptable to the WG, as well
as other interested SDOs.

  (1.f)  Has anyone threatened an appeal or otherwise indicated extreme
          discontent?  If so, please summarize the areas of conflict in
          separate email messages to the Responsible Area Director.  (It
          should be in a separate email because this questionnaire is
          entered into the ID Tracker.)

There is no opposition to this document.

  (1.g)  Has the Document Shepherd personally verified that the
          document satisfies all ID nits?  (See
          http://www.ietf.org/ID-Checklist.html and
          http://tools.ietf.org/tools/idnits/.)  Boilerplate checks are
          not enough; this check needs to be thorough.  Has the document
          met all formal review criteria it needs to, such as the MIB
          Doctor, media type, and URI type reviews?  If the document
          does not already indicate its intended status at the top of
          the first page, please indicate the intended status here.

The document does not contain nits.

  (1.h)  Has the document split its references into normative and
          informative?  Are there normative references to documents that
          are not ready for advancement or are otherwise in an unclear
          state?  If such normative references exist, what is the
          strategy for their completion?  Are there normative references
          that are downward references, as described in [RFC3967]?  If
          so, list these downward references to support the Area
          Director in the Last Call procedure for them [RFC3967].

The document has been split into normative and informative references.
There normative references that are work in progress. They are as follows:

  [I-D.ietf-dime-mip6-integrated]
              Korhonen, J., Bournelle, J., Tschofenig, H., Perkins, C.,
              and K. Chowdhury, "Diameter Mobile IPv6: Support for
              Network Access Server to Diameter Server  Interaction",
              draft-ietf-dime-mip6-integrated-11 (work in progress),
              November 2008.

  [I-D.ietf-dime-qos-attributes]
              Korhonen, J., Tschofenig, H., Arumaithurai, M., Jones, M.,
              and A. Lior, "Quality of Service Attributes for Diameter",
              draft-ietf-dime-qos-attributes-09 (work in progress),
              December 2008.

It is expected that these referenced documents will be published ahead
of draft-ietf-dime-mip6-split-15.txt.

This document requires a DOWNREF for RFC 4285

  (1.i)  Has the Document Shepherd verified that the document's IANA
          Considerations section exists and is consistent with the body
          of the document?  If the document specifies protocol
          extensions, are reservations requested in appropriate IANA
          registries?  Are the IANA registries clearly identified?  If
          the document creates a new registry, does it define the
          proposed initial contents of the registry and an allocation
          procedure for future registrations?  Does it suggest a
          reasonable name for the new registry?  See [RFC2434].  If the
          document describes an Expert Review process, has the Document
          Shepherd conferred with the Responsible Area Director so that
          the IESG can appoint the needed Expert during IESG Evaluation?

The document has an IANA considerations section that is consistent with
the body.
The document creates a new registry for the MIP6-Auth-Mode AVP (also
defined in the
document). The document provides an initial value for this AVP and
follows BCP 26
with "Specification Required" as an allocation requirement. 

Following RFC 3588, IETF consensus is required for allocation
application ids, 
command  codes, AVP codes and values is done as part of the review and 
consensus process given by the work on it through the DIME working group. 

  (1.j)  Has the Document Shepherd verified that sections of the
          document that are written in a formal language, such as XML
          code, BNF rules, MIB definitions, etc., validate correctly in
          an automated checker?

The document contains ABNF rules specified in RFC 3588. The ABNF content
has been validated.

  (1.k)  The IESG approval announcement includes a Document
          Announcement Write-Up.  Please provide such a Document
          Announcement Write-Up.  Recent examples can be found in the
          "Action" announcements for approved documents.  The approval
          announcement contains the following sections:

  Technical Summary

    This document specifies the interactions between the Mobile IP Home
    Agent and the Diameter server (AAA) in the case where the network
    access service and the mobility service is not in the same
administrative
    domain. The purpose of the interactions is to bootstrap the mobile
node
    from the MSP as part of the authentication and/or authorization
process.

    The document defines new diameter applications to support IKEv2 and
    MIPv6 authentication protocol. It defines diameter messages, AVPs and
    command codes to carry the authentication, authorization and
bootstrapping 
    attributes.

  Working Group Summary

    There was consensus in the WG to publish the document.

  Document Quality

    The document has been sent for review to MEXT. This document is part
    of the solution for Mobile IPv6 bootstrapping problem defined in
    RFC 4640. It has received extensive reviews from DIME WG members.

  Personnel

    Victor Fajardo is the document shepherd for this document.
2008-12-23
17 Cindy Morgan Draft Added by Cindy Morgan in state Publication Requested
2008-12-23
15 (System) New version available: draft-ietf-dime-mip6-split-15.txt
2008-12-21
14 (System) New version available: draft-ietf-dime-mip6-split-14.txt
2008-10-27
13 (System) New version available: draft-ietf-dime-mip6-split-13.txt
2008-09-23
12 (System) New version available: draft-ietf-dime-mip6-split-12.txt
2008-09-15
11 (System) New version available: draft-ietf-dime-mip6-split-11.txt
2008-07-06
10 (System) New version available: draft-ietf-dime-mip6-split-10.txt
2008-06-23
(System) Posted related IPR disclosure: Nortel Networks Statement about IPR claimed in draft-ietf-dime-mip6-split
2008-06-03
09 (System) New version available: draft-ietf-dime-mip6-split-09.txt
2008-05-28
08 (System) New version available: draft-ietf-dime-mip6-split-08.txt
2008-02-25
07 (System) New version available: draft-ietf-dime-mip6-split-07.txt
2007-11-19
06 (System) New version available: draft-ietf-dime-mip6-split-06.txt
2007-09-29
05 (System) New version available: draft-ietf-dime-mip6-split-05.txt
2007-07-11
04 (System) New version available: draft-ietf-dime-mip6-split-04.txt
2007-07-03
03 (System) New version available: draft-ietf-dime-mip6-split-03.txt
2007-05-03
02 (System) New version available: draft-ietf-dime-mip6-split-02.txt
2006-10-25
01 (System) New version available: draft-ietf-dime-mip6-split-01.txt
2006-06-20
00 (System) New version available: draft-ietf-dime-mip6-split-00.txt