Mobile Node Identifier Types for MIPv6
draft-ietf-dmm-4283mnids-08
Revision differences
Document history
Date | Rev. | By | Action |
---|---|---|---|
2018-07-23
|
08 | (System) | RFC Editor state changed to AUTH48-DONE from AUTH48 |
2018-06-04
|
08 | (System) | RFC Editor state changed to AUTH48 from RFC-EDITOR |
2018-05-22
|
08 | (System) | RFC Editor state changed to RFC-EDITOR from EDIT |
2018-04-19
|
08 | (System) | IANA Action state changed to RFC-Ed-Ack from Waiting on RFC Editor |
2018-04-17
|
08 | (System) | IANA Action state changed to Waiting on RFC Editor from In Progress |
2018-04-17
|
08 | (System) | IANA Action state changed to In Progress from Waiting on RFC Editor |
2018-04-16
|
08 | (System) | IANA Action state changed to Waiting on RFC Editor from In Progress |
2018-04-16
|
08 | (System) | IANA Action state changed to In Progress from Waiting on Authors |
2018-03-20
|
08 | (System) | IANA Action state changed to Waiting on Authors from In Progress |
2018-03-19
|
08 | (System) | RFC Editor state changed to EDIT |
2018-03-19
|
08 | (System) | IESG state changed to RFC Ed Queue from Approved-announcement sent |
2018-03-19
|
08 | (System) | Announcement was received by RFC Editor |
2018-03-19
|
08 | (System) | IANA Action state changed to In Progress |
2018-03-19
|
08 | Cindy Morgan | IESG state changed to Approved-announcement sent from Approved-announcement to be sent |
2018-03-19
|
08 | Cindy Morgan | IESG has approved the document |
2018-03-19
|
08 | Cindy Morgan | Closed "Approve" ballot |
2018-03-19
|
08 | Cindy Morgan | Ballot approval text was generated |
2018-03-19
|
08 | Suresh Krishnan | IESG state changed to Approved-announcement to be sent from IESG Evaluation::AD Followup |
2018-03-19
|
08 | Alissa Cooper | [Ballot comment] Thanks for addressing my DISCUSS. |
2018-03-19
|
08 | Alissa Cooper | [Ballot Position Update] Position for Alissa Cooper has been changed to No Objection from Discuss |
2018-03-18
|
08 | Charles Perkins | New version available: draft-ietf-dmm-4283mnids-08.txt |
2018-03-18
|
08 | (System) | New version approved |
2018-03-18
|
08 | (System) | Request for posting confirmation emailed to previous authors: Vijay Devarapalli , Charles Perkins |
2018-03-18
|
08 | Charles Perkins | Uploaded new revision |
2018-03-05
|
07 | Charles Perkins | New version available: draft-ietf-dmm-4283mnids-07.txt |
2018-03-05
|
07 | (System) | New version approved |
2018-03-05
|
07 | (System) | Request for posting confirmation emailed to previous authors: Vijay Devarapalli , Charles Perkins |
2018-03-05
|
07 | Charles Perkins | Uploaded new revision |
2017-11-13
|
06 | Charles Perkins | New version available: draft-ietf-dmm-4283mnids-06.txt |
2017-11-13
|
06 | (System) | New version approved |
2017-11-13
|
06 | (System) | Request for posting confirmation emailed to previous authors: Vijay Devarapalli , dmm-chairs@ietf.org, Charles Perkins |
2017-11-13
|
06 | Charles Perkins | Uploaded new revision |
2017-10-04
|
05 | Alissa Cooper | [Ballot discuss] I have updated my DISCUSS position. Thanks for addressing my question about identifier types that do not uniquely identify one node. I previously … [Ballot discuss] I have updated my DISCUSS position. Thanks for addressing my question about identifier types that do not uniquely identify one node. I previously supported Stephen's DISCUSS and I don't think the issues he raised have been addressed. The argument the document gives for standardizing options for privacy-sensitive identifiers is that it "will avoid additional look-up steps." Why is this sufficient justification given the slippery slope that Stephen describes? In my previous ballot I was also wondering if all of these identifiers are already in common use in MIPv6 without a standard, if there is some privacy improvement that standardization could contribute. I see the new requirement for payload encryption, but nothing about, e.g., encrypting the identifiers, or limiting their transmission to the initial binding, or generating a different cryptographic identifier for each new network attachment. So the benefit of just standardizing the options as-is still seems outweighed by the potential privacy risks as this spec is defined. |
2017-10-04
|
05 | Alissa Cooper | Ballot discuss text updated for Alissa Cooper |
2017-08-30
|
05 | Ben Campbell | [Ballot comment] Thanks for resolving my DISCUSS point. |
2017-08-30
|
05 | Ben Campbell | [Ballot Position Update] Position for Ben Campbell has been changed to No Objection from Discuss |
2017-07-21
|
05 | (System) | Sub state has been changed to AD Followup from Revised ID Needed |
2017-07-21
|
05 | (System) | IANA Review state changed to Version Changed - Review Needed from IANA - Not OK |
2017-07-21
|
05 | Charles Perkins | New version available: draft-ietf-dmm-4283mnids-05.txt |
2017-07-21
|
05 | (System) | New version approved |
2017-07-21
|
05 | (System) | Request for posting confirmation emailed to previous authors: Vijay Devarapalli , dmm-chairs@ietf.org, Charles Perkins |
2017-07-21
|
05 | Charles Perkins | Uploaded new revision |
2017-06-23
|
04 | Suresh Krishnan | The authors will discuss the way forward for this draft with the working group at the IETF 99 dmm F2F meeting in Prague. |
2017-03-28
|
04 | Suresh Krishnan | After several calls to the WG both in the mailing list and at the in person meeting there has been no response on how to … After several calls to the WG both in the mailing list and at the in person meeting there has been no response on how to classify the different IDs into essential and non-essential and also which ones to encrypt or not. Provided the WG one month to respond. |
2017-03-01
|
04 | Gunter Van de Velde | Request for Last Call review by OPSDIR Completed: Ready. Reviewer: Linda Dunbar. |
2017-02-28
|
04 | Amanda Baber | IANA Considerations question sent to authors: In Table 2, all non-assigned values are marked "reserved," but according to rfc5226bis, "Reserved" means "not available for assignment." … IANA Considerations question sent to authors: In Table 2, all non-assigned values are marked "reserved," but according to rfc5226bis, "Reserved" means "not available for assignment." Should the term "Unassigned" be used instead? |
2017-02-28
|
04 | Amanda Baber | IANA Review state changed to IANA - Not OK from IANA OK - Actions Needed |
2017-02-23
|
04 | Henrik Levkowetz | Restored state lost in previous edit |
2017-02-22
|
04 | Henrik Levkowetz | Replaced an author 'none' entry with dvijay@gmail.com |
2017-02-16
|
04 | Cindy Morgan | IESG state changed to IESG Evaluation::Revised I-D Needed from IESG Evaluation |
2017-02-16
|
04 | Joel Jaeggli | [Ballot Position Update] New position, No Objection, has been recorded for Joel Jaeggli |
2017-02-16
|
04 | Mirja Kühlewind | [Ballot comment] Author agreed to do the following change in the security considerations section: OLD "If used in the MNID extension as defined in this … [Ballot comment] Author agreed to do the following change in the security considerations section: OLD "If used in the MNID extension as defined in this document, the packet including the MNID extension should be encrypted so that personal information or trackable identifiers would not be inadvertently disclosed to passive observers." NEW "If used in the MNID extension as defined in this document, the packet including the MNID extension MUST be encrypted so that personal information or trackable identifiers would not be inadvertently disclosed to passive observers." |
2017-02-16
|
04 | Mirja Kühlewind | [Ballot Position Update] Position for Mirja Kühlewind has been changed to No Objection from Discuss |
2017-02-16
|
04 | Jari Arkko | [Ballot comment] The discussion resulting from Dale's excellent Gen-ART review probably needs to move forward before this document is ready to be made an RFC. |
2017-02-16
|
04 | Jari Arkko | [Ballot Position Update] New position, No Objection, has been recorded for Jari Arkko |
2017-02-15
|
04 | Spencer Dawkins | [Ballot comment] I'll watch the DISCUSSions from other ADs ... |
2017-02-15
|
04 | Spencer Dawkins | [Ballot Position Update] New position, No Objection, has been recorded for Spencer Dawkins |
2017-02-15
|
04 | Ben Campbell | [Ballot discuss] The security considerations says some of these identifiers can carry sensitive information, and when they do you should encrypt. This leaves it to … [Ballot discuss] The security considerations says some of these identifiers can carry sensitive information, and when they do you should encrypt. This leaves it to the reader to decide which might be sensitive. The draft should tell the reader which ones the working group thinks are sensitive, keeping in mind that if an identifier is sometimes sensitive, it usually needs to be treated as if always sensitive. (It's hard for deployed code to figure out when it is or isn't sensitive.) |
2017-02-15
|
04 | Ben Campbell | [Ballot comment] I agree with Stephen's, Alissa's, and Mirja's discusses. I especially agree that we should not standardize new identifiers without justifying each one. Section … [Ballot comment] I agree with Stephen's, Alissa's, and Mirja's discusses. I especially agree that we should not standardize new identifiers without justifying each one. Section 5 says this document does not impact existing security mechanisms. But it does add new data elements, and acknowledges some of them may be sensitive. Thus I think the "does not impact" assertion needs some supporting discussion. Are the existing mechanisms still adequate? Why? There are a bunch of acronyms that would benefit from expansion on first mention. |
2017-02-15
|
04 | Ben Campbell | [Ballot Position Update] New position, Discuss, has been recorded for Ben Campbell |
2017-02-15
|
04 | Terry Manderson | [Ballot Position Update] New position, No Objection, has been recorded for Terry Manderson |
2017-02-15
|
04 | Alissa Cooper | [Ballot discuss] I support Stephen's DISCUSS. I'm also wondering, if all of these identifiers are already in common use in MIPv6 without a standard, if … [Ballot discuss] I support Stephen's DISCUSS. I'm also wondering, if all of these identifiers are already in common use in MIPv6 without a standard, if there is some privacy improvement that standardization could contribute (e.g., encrypting the identifiers, or requiring transport encryption, or limiting their transmission to the initial binding, or ... other ideas the community may come up with). The benefit of just standardizing the options as-is seems outweighed by the potential privacy risks as this spec is defined. I'm also confused about the identifier types that do not uniquely identify one node, since I thought that was the point of these options. How are they meant to be used in MIPv6? Would you have multiple mobile node identity options in a single packet that, together, uniquely identify a node? I think this requires some elaboration in the text. |
2017-02-15
|
04 | Alissa Cooper | [Ballot Position Update] New position, Discuss, has been recorded for Alissa Cooper |
2017-02-15
|
04 | Stephen Farrell | [Ballot discuss] I don't consider that merely mentioning that there are some privacy issues (maybe) is nearly sufficient here. Instead I would argue that any … [Ballot discuss] I don't consider that merely mentioning that there are some privacy issues (maybe) is nearly sufficient here. Instead I would argue that any of these identifier types that could have privacy implications need to be specifically justified or else dropped. By specifically justified, I mean that there ought be an argument (and a fairly holistic one) that the Internet is better, and not worse, if we define a codepoint that allows MIPv6 (and later, other protocols) to use that identifier. I do accept that my position is perhaps innovative, in terms of IETF processes, so I'll split the discuss into two parts, one process oriented and mostly for the IESG, and the second relating to the content of the draft. (1) For the IESG: is it ok that we introduce (codepoints for) a slew of new long-term stable privacy-sensitive identifiers just because they might someday be needed, or do we need to have specific justification for defining such things? I would argue the latter, but that may need us to validate that there is IETF consensus for that somehow, and perhaps in the meantime hold on to this draft. Part of my reasoning is that once we define such codepoints (e.g. for IMSIs) then that inevitably means that other protocols, and not just MIPv6, will do the same eventually, so accepting this draft basically means accepting that we end up commonly and perhaps carelessly, passing such highly-sensitive information about on the Internet in many protocols and in many contexts. My argument here I think does adhere to various of our BCPs that do argue for security and privacy, but I do also accept that this may be novel and to some extent goes against another of our generally accepted ideas which is that we benefit from folks documenting things even if those things are sub-optimal in various ways. So I'd argue this is a real case for an IESG discussion - I know what I think, but what do the rest of you think? (2) For the authors: to the extent you are willing to, and want to get ahead of the discussion on point (1) above, can you in fact provide an argument, for each of the identifiers here that have privacy-sensitivity, that the Internet is better overall if we define these codepoints knowing that if we do define a way to represent e.g. an IMSI in MIPv6 that is likely to be copied elsewhere? Note for the authors: I think it's entirely fine for you to do nothing pending the discussion of point (1) above, if that's your preference. |
2017-02-15
|
04 | Stephen Farrell | [Ballot comment] While I'm entirely sympathetic to Mirja's discuss point, I don't think that a statement here can really constrain how these identifiers, once they … [Ballot comment] While I'm entirely sympathetic to Mirja's discuss point, I don't think that a statement here can really constrain how these identifiers, once they are defined, are used in other protocols. While there is a chance that some IESG sometime might say "hold on, RFCxxxx (this doc) says you SHOULD encrypt if identifier is used" the chances that a future IESG notice this isn't that high, but it's also even more likely that the designers of future protocols will successfully argue that since not all identifiers are privacy sensitive, their specific protocol need not adhere to the SHOULD. In the end, I think that should or SHOULD will be ineffective. |
2017-02-15
|
04 | Stephen Farrell | [Ballot Position Update] New position, Discuss, has been recorded for Stephen Farrell |
2017-02-15
|
04 | Alia Atlas | [Ballot Position Update] New position, No Objection, has been recorded for Alia Atlas |
2017-02-14
|
04 | Kathleen Moriarty | [Ballot comment] Thanks for the changes per the SecDir review and Mirja's discuss. https://www.ietf.org/mail-archive/web/secdir/current/msg07164.html |
2017-02-14
|
04 | Kathleen Moriarty | [Ballot Position Update] New position, No Objection, has been recorded for Kathleen Moriarty |
2017-02-14
|
04 | Deborah Brungard | [Ballot Position Update] New position, No Objection, has been recorded for Deborah Brungard |
2017-02-14
|
04 | Alvaro Retana | [Ballot Position Update] New position, No Objection, has been recorded for Alvaro Retana |
2017-02-10
|
04 | Suresh Krishnan | IESG state changed to IESG Evaluation from Waiting for Writeup |
2017-02-10
|
04 | Mirja Kühlewind | [Ballot discuss] I would realy like to see the following changes in the security considerations section: OLD "If used in the MNID extension as defined … [Ballot discuss] I would realy like to see the following changes in the security considerations section: OLD "If used in the MNID extension as defined in this document, the packet including the MNID extension should be encrypted so that personal information or trackable identifiers would not be inadvertently disclosed to passive observers." NEW "If used in the MNID extension as defined in this document, the packet including the MNID extension SHOULD be encrypted so that personal information or trackable identifiers would not be inadvertently disclosed to passive observers." Or even better make it a MUST? Is there a reason for only having a SHOULD? as well as the following change: OLD "Moreover, MNIDs containing sensitive identifiers might only be used for signaling during initial network entry. " NEW "Moreover, MNIDs containing sensitive identifiers MUST only be used for signaling during initial network entry and MUST NOT be leaked to other networks." |
2017-02-10
|
04 | Mirja Kühlewind | [Ballot Position Update] New position, Discuss, has been recorded for Mirja Kühlewind |
2017-02-10
|
04 | Benoît Claise | [Ballot Position Update] New position, No Objection, has been recorded for Benoit Claise |
2017-02-10
|
04 | Suresh Krishnan | Ballot has been issued |
2017-02-10
|
04 | Suresh Krishnan | [Ballot Position Update] New position, Yes, has been recorded for Suresh Krishnan |
2017-02-10
|
04 | Suresh Krishnan | Created "Approve" ballot |
2017-02-10
|
04 | Suresh Krishnan | Ballot writeup was changed |
2017-02-10
|
04 | Suresh Krishnan | Changed consensus to Yes from Unknown |
2017-02-09
|
04 | Tero Kivinen | Request for Last Call review by SECDIR Completed: Has Nits. Reviewer: Joseph Salowey. |
2017-02-07
|
04 | (System) | IESG state changed to Waiting for Writeup from In Last Call |
2017-02-02
|
04 | (System) | IANA Review state changed to IANA OK - Actions Needed from IANA - Review Needed |
2017-02-02
|
04 | Sabrina Tanamal | (Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs: The IANA Services Operator has completed its review of draft-ietf-dmm-4283mnids-04.txt. If any part of this review is inaccurate, please let … (Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs: The IANA Services Operator has completed its review of draft-ietf-dmm-4283mnids-04.txt. If any part of this review is inaccurate, please let us know. The IANA Services Operator understands that, upon approval of this document, there is a single action which we must complete. In the Mobile Node Identifier Option Subtypes subregistry of the Mobile IPv6 parameters registry located at: https://www.iana.org/assignments/mobility-parameters/ a set of new subtypes will be registered as follows: +-----------------+------------------------+---------------+ | Identifier Type | Identifier Type Number | Reference | +-----------------+------------------------+---------------+ | IPv6 Address | 2 | [ RFC-to-be ] | | IMSI | 3 | [ RFC-to-be ] | | P-TMSI | 4 | [ RFC-to-be ] | | EUI-48 address | 5 | [ RFC-to-be ] | | EUI-64 address | 6 | [ RFC-to-be ] | | GUTI | 7 | [ RFC-to-be ] | | DUID-LLT | 8 | [ RFC-to-be ] | | DUID-EN | 9 | [ RFC-to-be ] | | DUID-LL | 10 | [ RFC-to-be ] | | DUID-UUID | 11 | [ RFC-to-be ] | | | 12-15 reserved | [ RFC-to-be ] | | | 16 reserved | [ RFC-to-be ] | | RFID-SGTIN-64 | 17 | [ RFC-to-be ] | | RFID-SSCC-64 | 18 | [ RFC-to-be ] | | RFID-SGLN-64 | 19 | [ RFC-to-be ] | | RFID-GRAI-64 | 20 | [ RFC-to-be ] | | RFID-DOD-64 | 21 | [ RFC-to-be ] | | RFID-GIAI-64 | 22 | [ RFC-to-be ] | | | 23 reserved | [ RFC-to-be ] | | RFID-GID-96 | 24 | [ RFC-to-be ] | | RFID-SGTIN-96 | 25 | [ RFC-to-be ] | | RFID-SSCC-96 | 26 | [ RFC-to-be ] | | RFID-SGLN-96 | 27 | [ RFC-to-be ] | | RFID-GRAI-96 | 28 | [ RFC-to-be ] | | RFID-DOD-96 | 29 | [ RFC-to-be ] | | RFID-GIAI-96 | 30 | [ RFC-to-be ] | | | 31 reserved | [ RFC-to-be ] | | RFID-GID-URI | 32 | [ RFC-to-be ] | | RFID-SGTIN-URI | 33 | [ RFC-to-be ] | | RFID-SSCC-URI | 34 | [ RFC-to-be ] | | RFID-SGLN-URI | 35 | [ RFC-to-be ] | | RFID-GRAI-URI | 36 | [ RFC-to-be ] | | RFID-DOD-URI | 37 | [ RFC-to-be ] | | RFID-GIAI-URI | 38 | [ RFC-to-be ] | | | 39-255 reserved | [ RFC-to-be ] | +-----------------+------------------------+---------------+ The IANA Services Operator understands that this is the only action required to be completed upon approval of this document. Note: The actions requested in this document will not be completed until the document has been approved for publication as an RFC. This message is only to confirm what actions will be performed. Thank you, Sabrina Tanamal IANA Services Specialist PTI |
2017-01-31
|
04 | Dale Worley | Request for Last Call review by GENART Completed: Ready with Issues. Reviewer: Dale Worley. Sent review to list. |
2017-01-26
|
04 | Tero Kivinen | Request for Last Call review by SECDIR is assigned to Joseph Salowey |
2017-01-26
|
04 | Tero Kivinen | Request for Last Call review by SECDIR is assigned to Joseph Salowey |
2017-01-26
|
04 | Jean Mahoney | Request for Last Call review by GENART is assigned to Dale Worley |
2017-01-26
|
04 | Jean Mahoney | Request for Last Call review by GENART is assigned to Dale Worley |
2017-01-25
|
04 | Suresh Krishnan | Placed on agenda for telechat - 2017-02-16 |
2017-01-25
|
04 | Gunter Van de Velde | Request for Last Call review by OPSDIR is assigned to Linda Dunbar |
2017-01-25
|
04 | Gunter Van de Velde | Request for Last Call review by OPSDIR is assigned to Linda Dunbar |
2017-01-24
|
04 | Amy Vezza | IANA Review state changed to IANA - Review Needed |
2017-01-24
|
04 | Amy Vezza | The following Last Call announcement was sent out: From: The IESG To: "IETF-Announce" CC: suresh.krishnan@ericsson.com, max.ldp@alibaba-inc.com, draft-ietf-dmm-4283mnids@ietf.org, dmm-chairs@ietf.org, dmm@ietf.org, "Dapeng … The following Last Call announcement was sent out: From: The IESG To: "IETF-Announce" CC: suresh.krishnan@ericsson.com, max.ldp@alibaba-inc.com, draft-ietf-dmm-4283mnids@ietf.org, dmm-chairs@ietf.org, dmm@ietf.org, "Dapeng Liu" Reply-To: ietf@ietf.org Sender: Subject: Last Call: (MN Identifier Types for RFC 4283 Mobile Node Identifier Option) to Proposed Standard The IESG has received a request from the Distributed Mobility Management WG (dmm) to consider the following document: - 'MN Identifier Types for RFC 4283 Mobile Node Identifier Option' as Proposed Standard The IESG plans to make a decision in the next few weeks, and solicits final comments on this action. Please send substantive comments to the ietf@ietf.org mailing lists by 2017-02-07. Exceptionally, comments may be sent to iesg@ietf.org instead. In either case, please retain the beginning of the Subject line to allow automated sorting. Abstract Additional Identifier Types are proposed for use with the Mobile Node Identifier Option for MIPv6 (RFC 4283). The file can be obtained via https://datatracker.ietf.org/doc/draft-ietf-dmm-4283mnids/ IESG discussion can be tracked via https://datatracker.ietf.org/doc/draft-ietf-dmm-4283mnids/ballot/ No IPR declarations have been submitted directly on this I-D. |
2017-01-24
|
04 | Amy Vezza | IESG state changed to In Last Call from Last Call Requested |
2017-01-24
|
04 | Amy Vezza | Last call announcement was changed |
2017-01-23
|
04 | Suresh Krishnan | Last call was requested |
2017-01-23
|
04 | Suresh Krishnan | Last call announcement was generated |
2017-01-23
|
04 | Suresh Krishnan | Ballot approval text was generated |
2017-01-23
|
04 | Suresh Krishnan | Ballot writeup was generated |
2017-01-23
|
04 | Suresh Krishnan | IESG state changed to Last Call Requested from AD Evaluation |
2017-01-17
|
04 | Charles Perkins | New version available: draft-ietf-dmm-4283mnids-04.txt |
2017-01-17
|
04 | (System) | New version approved |
2017-01-17
|
04 | (System) | Request for posting confirmation emailed to previous authors: " (Unknown)" , "Charles Perkins" , dmm-chairs@ietf.org |
2017-01-17
|
04 | Charles Perkins | Uploaded new revision |
2017-01-06
|
03 | Tatuya Jinmei | Request for Early review by INTDIR Completed: Ready with Nits. Reviewer: Tatuya Jinmei. Sent review to list. |
2017-01-05
|
03 | Carlos Jesús Bernardos | Request for Early review by INTDIR is assigned to Tatuya Jinmei |
2017-01-05
|
03 | Carlos Jesús Bernardos | Request for Early review by INTDIR is assigned to Tatuya Jinmei |
2017-01-04
|
03 | Suresh Krishnan | IESG state changed to AD Evaluation from Publication Requested |
2017-01-04
|
03 | Suresh Krishnan | Requested Early review by INTDIR |
2016-11-24
|
03 | Dapeng Liu | As required by RFC 4858, this is the current template for the Document Shepherd Write-Up. Changes are expected over time. This version is dated … As required by RFC 4858, this is the current template for the Document Shepherd Write-Up. Changes are expected over time. This version is dated 24 February 2012. (1) What type of RFC is being requested (BCP, Proposed Standard, Internet Standard, Informational, Experimental, or Historic)? Why is this the proper type of RFC? Is this type of RFC indicated in the title page header? The type of RFC being requested is Standards Track. The reason is that this document is an extension of RFC 4238 which is a Standard Track RFC. The type of RFC is indicated in the title page header of the current version of the draft. (2) The IESG approval announcement includes a Document Announcement Write-Up. Please provide such a Document Announcement Write-Up. Recent examples can be found in the "Action" announcements for approved documents. The approval announcement contains the following sections: Technical Summary The Mobile Node Identifier Option for MIPv6 [RFC4283] has proved to be a popular design tool for providing identifiers for mobile nodes during authentication procedures with AAA protocols such as Diameter [RFC3588]. To date, only a single type of identifier has been specified, namely the MN NAI. Other types of identifiers are in common use, and even referenced in RFC 4283. This document proposes adding some basic types that are defined in various telecommunications standards, including types for IMSI, P-TMSI, IMEI, and GUTI. Also includes identifiers that are tied to the physical elements of the device (RFID, MAC address etc.) Working Group Summary There is consensus in the WG to publish these documents. Document Quality Are there existing implementations of the protocol? Have a significant number of vendors indicated their plan to implement the specification? Are there any reviewers that merit special mention as having done a thorough review, e.g., one that resulted in important changes or a conclusion that the document had no substantive issues? If there was a MIB Doctor, Media Type or other expert review, what was its course (briefly)? In the case of a Media Type review, on what date was the request posted? This document has been reviewed by some Mobile IP experts in the DMM working group and the WG thinks this extension is useful for deployment. Personnel Who is the Document Shepherd? Who is the Responsible Area Director? The document Shepherd is WG co-chair Dapeng Liu. The Responsible Area Director is Suresh Krishnan. (3) Briefly describe the review of this document that was performed by the Document Shepherd. If this version of the document is not ready for publication, please explain why the document is being forwarded to the IESG. This document is the extension of RFC4283 and proposes to define more types of identifiers as the Mobile Node Identifier. It does not have other technical changes of RFC4283. The proposed new mobile node identifiers includes IMSI, P-TMSI, IMEI, GUTI, RFID, MAC and IPv6 address etc. This version of the document is ready for publication. (4) Does the document Shepherd have any concerns about the depth or breadth of the reviews that have been performed? This document has been discussed in the working group many times and has been reviewed by several Mobile IP experts. (5) Do portions of the document need review from a particular or from broader perspective, e.g., security, operational complexity, AAA, DNS, DHCP, XML, or internationalization? If so, describe the review that took place. This document does not need review from a particular or from broader perspective since it does not define mechanism related to security, operational complexity, AAA, DNS, DHCP, XML, internationalization etc. (6) Describe any specific concerns or issues that the Document Shepherd has with this document that the Responsible Area Director and/or the IESG should be aware of? For example, perhaps he or she is uncomfortable with certain parts of the document, or has concerns whether there really is a need for it. In any event, if the WG has discussed those issues and has indicated that it still wishes to advance the document, detail those concerns here. N/A (7) Has each author confirmed that any and all appropriate IPR disclosures required for full conformance with the provisions of BCP 78 and BCP 79 have already been filed. If not, explain why. Yes. (8) Has an IPR disclosure been filed that references this document? If so, summarize any WG discussion and conclusion regarding the IPR disclosures. No. (9) How solid is the WG consensus behind this document? Does it represent the strong concurrence of a few individuals, with others being silent, or does the WG as a whole understand and agree with it? This document belongs to the maintenance work of Mobile IP in the charter of DMM working group. There is a clear consensus for the publication of this document from those who are working on Mobile IP and there is no objections in the working group. (10) Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarise the areas of conflict in separate email messages to the Responsible Area Director. (It should be in a separate email because this questionnaire is publicly available.) No. (11) Identify any ID nits the Document Shepherd has found in this document. (See https://www.ietf.org/tools/idnits/ and the Internet-Drafts Checklist). Boilerplate checks are not enough; this check needs to be thorough. ID nits check result: Summary: 0 errors (**), 0 flaws (~~), 0 warnings (==), 2 comments (--). (12) Describe how the document meets any required formal review criteria, such as the MIB Doctor, media type, and URI type reviews. This document does not define any MIB, media type, URI etc. (13) Have all references within this document been identified as either normative or informative? Yes. (14) Are there normative references to documents that are not ready for advancement or are otherwise in an unclear state? If such normative references exist, what is the plan for their completion? No. (15) Are there downward normative references references (see RFC 3967)? If so, list these downward references to support the Area Director in the Last Call procedure. No. (16) Will publication of this document change the status of any existing RFCs? Are those RFCs listed on the title page header, listed in the abstract, and discussed in the introduction? If the RFCs are not listed in the Abstract and Introduction, explain why, and point to the part of the document where the relationship of this document to the other RFCs is discussed. If this information is not in the document, explain why the WG considers it unnecessary. Yes. This document will update RFC4283. RFC4283 is listed on the title page, abstract and discussed in the introduction. (17) Describe the Document Shepherd's review of the IANA considerations section, especially with regard to its consistency with the body of the document. Confirm that all protocol extensions that the document makes are associated with the appropriate reservations in IANA registries. Confirm that any referenced IANA registries have been clearly identified. Confirm that newly created IANA registries include a detailed specification of the initial contents for the registry, that allocations procedures for future registrations are defined, and a reasonable name for the new registry has been suggested (see RFC 5226). The new mobile node identifier types defined in the document should be assigned values from the "Mobile Node Identifier Option Subtypes" registry. (http://www.iana.org/assignments/mobility-parameters/mobility-parameters.xhtml#mobility-parameters-5) Currently, only value 1 is used for Mobile Node Identifier Option Subtypes. The IANA considerations section is consistent with the body of the document. (18) List any new IANA registries that require Expert Review for future allocations. Provide any public guidance that the IESG would find useful in selecting the IANA Experts for these new registries. N/A (19) Describe reviews and automated checks performed by the Document Shepherd to validate sections of the document written in a formal language, such as XML code, BNF rules, MIB definitions, etc. N/A |
2016-11-24
|
03 | Dapeng Liu | Responsible AD changed to Suresh Krishnan |
2016-11-24
|
03 | Dapeng Liu | IETF WG state changed to Submitted to IESG for Publication from WG Consensus: Waiting for Write-Up |
2016-11-24
|
03 | Dapeng Liu | IESG state changed to Publication Requested |
2016-11-24
|
03 | Dapeng Liu | IESG process started in state Publication Requested |
2016-11-24
|
03 | Dapeng Liu | Changed document writeup |
2016-11-13
|
03 | Charles Perkins | New version available: draft-ietf-dmm-4283mnids-03.txt |
2016-11-13
|
03 | (System) | New version approved |
2016-11-13
|
03 | (System) | Request for posting confirmation emailed to previous authors: " (Unknown)" , "Charles Perkins" , dmm-chairs@ietf.org |
2016-11-13
|
03 | Charles Perkins | Uploaded new revision |
2016-07-23
|
02 | Jouni Korhonen | Tag Other - see Comment Log cleared. |
2016-07-23
|
02 | Jouni Korhonen | IETF WG state changed to WG Consensus: Waiting for Write-Up from In WG Last Call |
2016-07-23
|
02 | Jouni Korhonen | Notification list changed to "Dapeng Liu" <max.ldp@alibaba-inc.com> |
2016-07-23
|
02 | Jouni Korhonen | Document shepherd changed to Dapeng Liu |
2016-06-29
|
02 | Jouni Korhonen | WGLC #3 |
2016-06-29
|
02 | Jouni Korhonen | Tag Other - see Comment Log set. |
2016-06-29
|
02 | Jouni Korhonen | IETF WG state changed to In WG Last Call from Waiting for WG Chair Go-Ahead |
2016-06-29
|
02 | Jouni Korhonen | Tag Other - see Comment Log cleared. |
2016-06-29
|
02 | Jouni Korhonen | IETF WG state changed to Waiting for WG Chair Go-Ahead from In WG Last Call |
2016-06-29
|
02 | Jouni Korhonen | WGLC #3 Starts: 6/29/16 Ends: 7/13/16 |
2016-06-29
|
02 | Jouni Korhonen | Tag Revised I-D Needed - Issue raised by WGLC cleared. |
2016-06-09
|
02 | Charles Perkins | New version available: draft-ietf-dmm-4283mnids-02.txt |
2015-12-01
|
01 | Jouni Korhonen | https://mailarchive.ietf.org/arch/msg/dmm/AouSIadDglhlNpgFQSFIvandDZU Discussion still ongoing. Next WGLC#3 |
2015-12-01
|
01 | Jouni Korhonen | Tag Revised I-D Needed - Issue raised by WGLC set. |
2015-10-19
|
01 | Charles Perkins | New version available: draft-ietf-dmm-4283mnids-01.txt |
2015-09-02
|
00 | Jouni Korhonen | Folks, This mail starts a two week WGLC #2 for the I-D draft-ietf-dmm-4283mnids-01. The WGLC ends 16th September 2015 EOB Pacific time. Please, review the … Folks, This mail starts a two week WGLC #2 for the I-D draft-ietf-dmm-4283mnids-01. The WGLC ends 16th September 2015 EOB Pacific time. Please, review the document and indicate your support or concerns on the mailing list. If you have concerns or comments that you want to be reflected in the draft text issue a ticket into the issue tracker as well. We urge you to utilize the issue tracker for comments that you want to be resolved. - Dapeng and Jouni |
2015-09-02
|
00 | Jouni Korhonen | IETF WG state changed to In WG Last Call from WG Document |
2015-08-31
|
00 | Jouni Korhonen | WGLC#1 ended 26th Aug. Received only one comment (from the document author). Will initiate another WGLC. |
2015-08-31
|
00 | Jouni Korhonen | Tag Other - see Comment Log set. |
2015-08-31
|
00 | Jouni Korhonen | IETF WG state changed to WG Document from In WG Last Call |
2015-08-12
|
00 | Jouni Korhonen | Last call started 8/12/2015 for two weeks. |
2015-08-12
|
00 | Jouni Korhonen | IETF WG state changed to In WG Last Call from WG Document |
2015-04-27
|
00 | Jouni Korhonen | Intended Status changed to Proposed Standard from None |
2015-04-27
|
00 | Jouni Korhonen | draft-ietf-dmm-* version posted as the WG document |
2015-04-27
|
00 | Jouni Korhonen | This document now replaces draft-perkins-dmm-4283mnids instead of None |
2015-04-22
|
00 | Charles Perkins | New version available: draft-ietf-dmm-4283mnids-00.txt |