Skip to main content

IPv6 Wireless Access in Vehicular Environments (IPWAVE): Problem Statement and Use Cases
draft-ietf-ipwave-vehicular-networking-30

Revision differences

Document history

Date Rev. By Action
2023-03-10
30 (System) RFC Editor state changed to AUTH48-DONE from AUTH48
2023-02-19
30 (System) RFC Editor state changed to AUTH48
2023-01-26
30 (System) RFC Editor state changed to RFC-EDITOR from EDIT
2022-11-10
30 (System) IANA Action state changed to No IANA Actions from In Progress
2022-11-09
30 (System) RFC Editor state changed to EDIT
2022-11-09
30 (System) IESG state changed to RFC Ed Queue from Approved-announcement sent
2022-11-09
30 (System) Announcement was received by RFC Editor
2022-11-09
30 (System) IANA Action state changed to In Progress
2022-11-09
30 Cindy Morgan IESG state changed to Approved-announcement sent from Approved-announcement to be sent
2022-11-09
30 Cindy Morgan IESG has approved the document
2022-11-09
30 Cindy Morgan Closed "Approve" ballot
2022-11-09
30 Cindy Morgan Ballot approval text was generated
2022-11-09
30 Cindy Morgan Ballot writeup was changed
2022-11-09
30 (System) Removed all action holders (IESG state changed)
2022-11-09
30 Erik Kline IESG state changed to Approved-announcement to be sent from IESG Evaluation::AD Followup
2022-11-02
30 Roman Danyliw
[Ballot comment]
Thank you to Daniel Migault for the SECDIR review.

Thank you for making edits in response to my DISCUSS positions.  Despite these changes, …
[Ballot comment]
Thank you to Daniel Migault for the SECDIR review.

Thank you for making edits in response to my DISCUSS positions.  Despite these changes, it is my assessment that the security and privacy properties are not sufficiently described given the wide array of enabling technologies cited (e.g., credit-based authorization models, blockchain based authentication and logging, in vehicle credit card transactions).  Furthermore, the document references architectural elements such as “legal vehicles” and “legal … smartphones”; and threats such as “privacy breakage” without sufficient explanation.

For the reasons above and a few noted by Rob Wilton in his ballot, I am abstaining on this document.  The IESG DISCUSS criteria (https://www.ietf.org/about/groups/iesg/statements/iesg-discuss-criteria/#stand-disc) is not applicable to my above concerns since no protocol is being described and the guidance presented here is not intended to be implemented without significant further design and specification.
2022-11-02
30 Roman Danyliw [Ballot Position Update] Position for Roman Danyliw has been changed to Abstain from Discuss
2022-10-24
30 Jaehoon Paul Jeong New version available: draft-ietf-ipwave-vehicular-networking-30.txt
2022-10-24
30 Jaehoon Paul Jeong New version accepted (logged-in submitter: Jaehoon Paul Jeong)
2022-10-24
30 Jaehoon Paul Jeong Uploaded new revision
2022-09-23
29 Roman Danyliw
[Ballot discuss]
Thanks for all of the changes in -29 to address the DISCUSS points noted for -28.  To help us talk these through the …
[Ballot discuss]
Thanks for all of the changes in -29 to address the DISCUSS points noted for -28.  To help us talk these through the remaining issues, I have updated my ballot to remove issues that have already been resolved.  I have also provided feedback on the new text in -29 intended to resolve the original DISCUSS points.

(1) The Privacy Considerations are under-specified:

(1.a) [per -28] Section 6.3 suggests the needs for logging, “To deal with this kind of security issue, for monitoring suspicious behaviors, vehicles' communication activities can be recorded in either a central way through a logging server (e.g., TCC) in the vehicular cloud or a distributed way (e.g., blockchain [Bitcoin]) along with other vehicles or infrastructure.  To solve the issue ultimately, we need a solution where, without    privacy breakage, …”.  Some discussion on the “privacy breakage” is needed.  What exactly would be the trade offs between a centralized vs. distributed log?  Who would get to see this information?  What is sensitive about this information?

From -29:
  Alternatively, for
  completely secure vehicular networks, we shall embrace the concept of
  "zero-trust" for vehicles in which no vehicle is trustable and
  verifying every message (such as IPv6 control messages including ND,
  DAD, NUD, and application layer messages) is necessary.  In this way,
  a failure to prevent a cyberattack shall never happen on a vehicular
  network.  Thus, we need to have an efficient zero-trust framework or
  mechanism for vehicular networks.

I’m speculating that the second from last sentence, “[i]n this way, a failure to prevent a cyberattack shall never happen on a vehicular network” was added to partially respond to the above feedback.  Saying that an attack will “never” success due to a zero-trust framework is not plausible.  Could this please rephrased.

(1.b) [per -28] Section 3.3 notes a V2P use case where the pedestrian’s smart-phone is sharing unspecified information.  Does that include location
information?  Who gets it?  What kind of identifiers are shared?

Thanks for adding the following text -29:

  The location information of a VRU from a smart device is multicasted
  only to the nearby vehicles.  The true identifiers of a VRU's
  smartphone shall be protected, and only the type of the VRU, such as
  pedestrian, cyclist, and scooter, is disclosed to the nearby
  vehicles.

To clarify, this “multicasted” in the IPv6 sense?  The VRU’s smartphone is using some kind of “fake identifier” (source address?) to announce its presence so as not to reveal its “true identifier”?  Is there a security consideration (attack) that these “fake identifiers” multicasting to nearby vehicles could convince that vehicle that they are surrounded by pedestrians (e.g., roughly https://www.abc.net.au/news/2020-02-04/man-creates-fake-traffic-jam-on-google-maps-by-carting-99-phones/11929136)? 

Can we state the security properties or provide a reference to handle this issue.  I see the following text later in the section:

  To support applications of these V2X use cases, the required
  functions of IPv6 include IPv6-based packet exchange, transport-layer
  session continuity, and secure, safe communication between a vehicle
  and a pedestrian either directly or indirectly via an IP-RSU.

I don’t recognize the desired properties of protecting identifiers as being congruent with the above text.

(2) Section 4.2

  Note that it is dangerous if the
  internal network of a vehicle is controlled by a malicious party.  To
  minimize this kind of risk, an reinforced identification and
  verification protocol shall be implemented.

-- [per -28] Who are the parties in this verification protocol?  What security properties is this verification providing?

[new per -29] Thanks for adding this new text in -29 in response:

  To minimize this kind of risk,
  an augmented identification and verification protocol with extra
  means shall be implemented.  These extra means can be certificate-
  based, biometric, credit-based, and one-time passcode (OTP)
  approaches in addition to a used approach [RFC8002].  The
  verification shall provide security properties such as
  confidentiality, integrity, authentication, authorization, and
  accounting [RFC7427].

I’m having trouble understanding this guidance.  The architecture is suggesting “augmented identification and verification with extra means.”  I don’t follow what “augmented means” or “extra” -- augmented or extra from what baseline?  The security properties this provides is “confidentiality, integrity, authentication, authorization and accounting” don’t seem to match authentication and identity topics. 

To the specific examples, how does “credit-based” provide the stated security properties?  I have the same question for the others.

** [per -28 and same for -29] The need for safety properties (very helpful) is asserted multiple times but not further discussed in the Security Considerations:

-- Section 3: 
      In addition, IPv6
      security needs to be extended to support those V2V use cases in a
      safe, secure, privacy-preserving way.

-- Section 3.1:
      To support applications of these V2V use cases, the required
    functions of IPv6 include IPv6-based packet exchange and secure,   
    safe communication between two vehicles. 

-- Section 3.3:
  To support applications of these V2X use cases, the required
  functions of IPv6 include IPv6-based packet exchange, transport-layer
  session continuity, and secure, safe communication between a vehicle
  and a pedestrian either directly or indirectly via an IP-RSU.

The explanation from the authors noted that the following text was added to Section 4.2 -29:

“A malicious party can be a group of hackers, a criminal group, and a competitor for industrial espionage or sabotage.”

“The verification shall provide security properties such as confidentiality, integrity, authentication, authorization, and accounting [RFC7427].”

I’m having trouble understanding how this text addresses the safety properties.
2022-09-23
29 Roman Danyliw
[Ballot comment]
Thank you to Daniel Migault for the SECDIR review.

Thanks for addressing the other COMMENTs in -29.

** Section 6.3.  Per the proposed …
[Ballot comment]
Thank you to Daniel Migault for the SECDIR review.

Thanks for addressing the other COMMENTs in -29.

** Section 6.3.  Per the proposed use of blockchain for "IPv6 transaction", thanks for making a few edits per the more granular feedback on -28.  I leave it to the WG, but I think this guidance seems speculative, under-specified, and one of only a number of candidate architectures.  It seems misplaced to be calling it out here.
2022-09-23
29 Roman Danyliw Ballot comment and discuss text updated for Roman Danyliw
2022-06-25
29 Éric Vyncke
[Ballot comment]
Thank you for the work put into this document. I found the use cases part of section 3.1 very interesting to read even …
[Ballot comment]
Thank you for the work put into this document. I found the use cases part of section 3.1 very interesting to read even if some of them seem very far fetched ;-)

I have now cleared my previous blocking DISCUSS points as you have addressed them as well as all but one of my previous non-blocking COMMENTs. Thanks for your reaction.

I have kept below the DISCUSS & COMMENT points just for archiving, please ignore them.

Special thanks to

- Carlos Bernardos for the shepherd's write-up even if a justification for the informational status would have been welcome but the WG consensus description is appreciated.

- Pascal Thubert for his IETF last call INT directorate review at: https://datatracker.ietf.org/doc/review-ietf-ipwave-vehicular-networking-20-intdir-lc-thubert-2021-06-18/ and for his IESG telechat INT directorate review https://datatracker.ietf.org/doc/review-ietf-ipwave-vehicular-networking-27-intdir-telechat-thubert-2022-02-28/ Pascal's Last Call & telechat reviews were (at least partially) acted upon by Paul ;-)

I hope that this helps to improve the document,

Regards,

-éric

# DISCUSS (just for archiving)

As noted in https://www.ietf.org/blog/handling-iesg-ballot-positions/, a DISCUSS ballot is a request to have a discussion on the following topics:

## Abstract & Section 1

"then enumerates requirements for the extensions of those IPv6 protocols" does not match any IPWAVE WG work item, i.e., it is outside the scope of the charter of IPWAVE WG. As the document does not explicitly specify requirements, I strongly suggest to use the word "gaps" rather than "requirements" in the abstract and section 1.

## Section 4.1

Using an IPv6 address out of a ULA prefix still requires DAD. So the text below should be updated to be corrected:
  "their own IPv6 Unique Local Addresses
  (ULAs) [RFC4193] over the wireless network, which does not require
  the messaging (e.g., Duplicate Address Detection (DAD)) of IPv6
  Stateless Address Autoconfiguration (SLAAC) [RFC4862]."

## Section 4.2

Very similar comment as above (i.e., DAD & MLD must be done for all IPv6 addresses of an interface and not only for the global one):
  "... When global IPv6
  addresses are used, wireless interface configuration and control
  overhead for DAD"

## Section 5.2
  "... If DHCPv6 is used to assign
  a unique IPv6 address to each vehicle in this shared link, DAD is not
  required. "
This is incorrect and must be changed (see section 18.2.10.1. of RFC 8415)

# COMMENTS (just for archiving)

"100km/h as the speed limit in highway" will make many European drivers smile as it is really slow...

## Section 1

"Most countries and regions in the world have adopted the same frequency allocation for vehicular networks." but there are TWO frequency allocations described just before, so, which one has been adopted ?

## Section 2

"GPS" is just the USA commercial example of the more generic "global navigation satellite system" (GNSS), GNSS should be used in this document.

As IP-RSU have at least 2 interfaces, should "Also, it may have *the* third IP-enabled wireless interface" be replaced by "Also, it may have *a* third IP-enabled wireless interface" ?

LiDAR ... "by measuring the reflected pulsed light" but on which kind of metrics ?

## Section 3.1

Should the 1st and 5th bullets be grouped together ?

Please describe "UAM" (e.g., in the terminology section) as it is unclear to the reader whether it is a crewed / uncrewed aircraft.

If both road and air vehicles are use case, what about river / sea ships or trains ?

Does the paragraph about "reward system" belong to the use case ? It rather sounds like a business requirement. Suggest to remove this part.

Like written by Pascal Thubert in his telechat review, the last paragraph "IPv6-based packet exchange and secure" should be clear that this is not only about data plane traffic but also control plane L2/L3 ones. Please also use the Oxford comma, i.e., add a "," after "exchange".

## Section 3.2

Suggest to also mention "5G" after "IP-RSU or 4G-LTE networks"

How is the UAM use case different from a driverless terrestrial EV ? Suggest to merge those use cases.

## Section 4.1

As noted by other ADs, "Existing network architectures," the list should not include OMNI yet as it is not deployed and would probably not be described as an architecture.

"the wireless media interfaces are autoconfigured with a global IPv6 prefix", is it the same shared prefix or multiple prefixes ?

Is "RSU" the same concept as "IP-RSU" ?

The last paragraph is about TCP session continuity, but does not explain why multi-path TCP or QUIC session resumption cannot be used.

## Section 4.2

The computation about "dwell time" is interesting even if it is computed in the best case. But, I really wonder whether using IPv6 and routing are applicable to the use case as opposed to more layer-2 + tunnel solutions (like 3GPP) with such short time for hand-over. I am a strong supporter of layer-3 (IPv6 and routing), but I cannot refrain from thinking that IPv6 is the wrong technical solution for those use cases... Was this discussed in the WG ?

## Section 5.1

What is "legacy DAD" ?

  "...the NA interval needs to be
  dynamically adjusted according to a vehicle's speed so that the
  vehicle can maintain its neighboring vehicles in a stable way"
With the issues linked to multicast over wireless, are the authors and the WG sure that increasing the amount of multicast will not aggravate the problem ? See RFC 9119 (cited as a normative down reference)

## Section 5.1.2

Please add some references to the MADINAS WG current work items. The authors may also consider adding this use case to the MADINAS use case.

"The pseudonym of a MAC address affects an IPv6 address based on the MAC address", nearly no implementations use EUI-64 anymore so this part should probably be removed from the document. But, the change of MAC address probably has other impact on the IP stack, e.g., the neighbour cache.

## Section 5.1.3

AFAIK, RPL relies on messages to discover the topology and I am afraid that in such a moving / dynamic environment, there will be too many of RPL messages. Will RPL scale in this ever changing network ? Please note that I am not a RPL expert.

## Section 6.1

Some explanations on how SEND protects against DAD flooding would be welcome.

Is "classical IPv6 ND" the same as the previously used "legacy ND" ?

Wondering why "Vehicle Identification Number (VIN)" is suggested to be used as SubjectAltName in a certificate rather than a car manufacturer cert ?

## Section 6.3

The part about bitcoin and blockchain errs probably too far away from the IETF remit.

## Appendix B

I fail to understand how RPL and OMNI can be compared as they are vastly different technologies (routing vs. tunneling).

"In OMNI protocol, each wireless media interface is configured with an IPv6 Unique Local Address (ULA)" but from my last read of OMNI drafts (1+ year ago), the OMNI virtual interface can have a ULA indeed but the wireless physical ones are using any prefix.

## Appendix D

What will be the impact of high packet loss rate (that I am expecting on such networks) on IP parcels ?

# NITS 

Please check that all IPv6 addresses are in lowercase (e.g., in section 4.1).
2022-06-25
29 Éric Vyncke [Ballot Position Update] Position for Éric Vyncke has been changed to No Objection from Discuss
2022-05-19
29 Murray Kucherawy
[Ballot comment]
First off, this is really interesting stuff.  Thanks for putting it together, and I'm looking forward to reading more.

I support Roman's and …
[Ballot comment]
First off, this is really interesting stuff.  Thanks for putting it together, and I'm looking forward to reading more.

I support Roman's and Eric's DISCUSS positions.  I also concur with Alvaro's comments about references.

The shepherd writeup doesn't say why "Informational" is the right type of RFC here.  (It becomes obvious quickly, but please still answer the question.  We often go to the writeup first.)

Section 2 defines "Class-Based Safety Plan", "V2I2D", "VMM", "VND", and "VSP", but then those terms don't appear anywhere in the document.  (I did find "class-based automatic safety action plan" later.)  It also defines "OCB" and "VIP", but then only really uses them as part of reference anchors.  On the flipside, I would love to see a definition (or reference) for "UAM".
2022-05-19
29 Murray Kucherawy Ballot comment text updated for Murray Kucherawy
2022-05-19
29 (System) Changed action holders to Erik Kline (IESG state changed)
2022-05-19
29 (System) Sub state has been changed to AD Followup from Revised ID Needed
2022-05-19
29 (System) IANA Review state changed to Version Changed - Review Needed from IANA OK - No Actions Needed
2022-05-19
29 Jaehoon Paul Jeong New version available: draft-ietf-ipwave-vehicular-networking-29.txt
2022-05-19
29 Jaehoon Paul Jeong New version accepted (logged-in submitter: Jaehoon Paul Jeong)
2022-05-19
29 Jaehoon Paul Jeong Uploaded new revision
2022-05-09
28 Daniel Migault Request for Telechat review by SECDIR Completed: Has Nits. Reviewer: Daniel Migault. Sent review to list.
2022-04-07
28 (System) Changed action holders to Erik Kline, Jaehoon (Paul) Jeong (IESG state changed)
2022-04-07
28 Cindy Morgan IESG state changed to IESG Evaluation::Revised I-D Needed from IESG Evaluation
2022-04-07
28 Robert Wilton
[Ballot comment]
I'm not an expect on these areas of technology, but I find parts of this document to be quite uncompelling.  However, it is …
[Ballot comment]
I'm not an expect on these areas of technology, but I find parts of this document to be quite uncompelling.  However, it is an informational document, where considerable latitude is allowed.

Although I'm happy for the authors to correct my misunderstandings below, if they wish, I'm doubtful that such a discussion will really be helpful, hence my abstain ballot.

Some of my concerns when reviewing this document:

(1) It feels like quite a lot of these problems are (or could be) solved today using the existing wireless networks and GPS already included in cars.  E.g., presumably they are already making use of IP over 4G-LTE without needing these proposed protocol changes?  I.e., how many of the problems described here can really be most efficiently solved by having a local dynamic network?

(2) Having some sort of bitcoin/blockchain based micropayment scheme for sharing sensor data between vehicles feels highly implausible to me, given that the world hasn't seemed to manage a micropayment scheme for websites which seems like an easier problem to solve.

(3) Would vehicles even be able to safely trust sensor data coming from other vehicles?  E.g., hacked vehicles that randomly occasionally inject false sensor readings.  Who would have legal liability if your vehicle takes some action based on unreliable 3rd party sensor data?  I appreciate that it outside this type of technical document, but I think that it limits the likely hood of solving this in an ad hoc network.

(4) I struggle to understand how the V2X use cases really work.  In a street (at least in the UK) there would often be people in very close proximity to a vehicle (e.g., walking on the pavement [sidewalk] next to a vehicle, and presumably it is only people in front of the vehicle that are potential collision problems, and for these cases, are radar/lidar/cameras/sensors not a more robust choice (and are already deployed today, and seemingly improving every year).  I would think that the only way that this could work with a smartphone is if it sharing very precise (0.1 m) location data all the time to everything around it, which would probably degrade the battery and would also seem to have some serious privacy considerations.

(5) In Appendix D, I don't understand how the AERO/OMNI service solves the MTU problem.  It seems to be just introducing another layer to solve exactly the problem that are already solved by existing transport layer protocols.  If there is some data illustrating how TCP over OAL (with IP parcels) is more efficient that straight TCP over IP then that would be worth sharing.

Regards,
Rob
2022-04-07
28 Robert Wilton [Ballot Position Update] New position, Abstain, has been recorded for Robert Wilton
2022-04-06
28 Murray Kucherawy
[Ballot comment]
First off, this is really interesting stuff.  Thanks for putting it together, and I'm looking forward to reading more.

I support Roman's and …
[Ballot comment]
First off, this is really interesting stuff.  Thanks for putting it together, and I'm looking forward to reading more.

I support Roman's and Eric's DISCUSS positions.  I also concur with Alvaro's comments about references.

The shepherd writeup doesn't say why "Informational" is the right type of RFC here.  (It becomes obvious quickly, but please still answer the question.  We often go to the writeup first.)

Section 2 defines "Class-Based Safety Plan", "V2I2D", "VMM", "VND", and "VSP", but then those terms don't appear anywhere in the document.  (I did find "class-based automatic safety action plan" later.)  It also defines "OCB" and "VIP', but then only really uses them as part of reference anchors.  On the flipside, I would love to see a definition (or reference) for "UAM".
2022-04-06
28 Murray Kucherawy [Ballot Position Update] New position, No Objection, has been recorded for Murray Kucherawy
2022-04-06
28 Paul Wouters
[Ballot comment]
I concur with Ronan's DISCUSS concerns.

In addition, I have a few comments:

        To encourage more vehicles to participate …
[Ballot comment]
I concur with Ronan's DISCUSS concerns.

In addition, I have a few comments:

        To encourage more vehicles to participate in this cooperative
        environmental sensing, a reward system will be needed.

The reward system could be "you are allowed to sell your car and drive it here".
In other words, how things are encouraged seems very open, and not really limited
to a reward system. I'd strongly recommend removing blockchain/bitcoin references
as these are too speculative - if anything these reward systems seem to be headed
towards getting banned or restricted by governments.

I'm very nervous about adding pedestrians to vehicle networks. It will
be a big privacy concern, especially if these networks are commercially
run by for-profit companies as these days companies are very eager to
monetize their data. Furthermore, pedestrian gadgets (phones, tablets)
usually can only connect to one wifi network, so sacrificing this to V2X
might not be what they want when sitting near an intersection at the coffee
shop.

also think Bring-Your-Own- Prefix (BYOP)") does not avoid doing DAD, especially
if there might be malicious parties around.

  Note that it is dangerous if the
  internal network of a vehicle is controlled by a malicious party.  To
  minimize this kind of risk, an reinforced identification and
  verification protocol shall be implemented.

I don't see easy solutions here. No one wants to give control of their vehicle network
to another entity - even if identification/verification is "reinforced".

  For doing so, we shall have an
  efficient zero-trust framework or mechanism for vehicular networks.

There is a lot of heavy lifting done by this one sentence. Especially when it is
also being combined with blockchain/bitcoin solutions. All of these mechanisms
seem many orders of magnitude slower than for an attaker to pretend to be a new
and different vehicle.
2022-04-06
28 Paul Wouters [Ballot Position Update] New position, No Objection, has been recorded for Paul Wouters
2022-04-06
28 Francesca Palombini
[Ballot comment]
Thank you for the work on this document

Many thanks to Jim Fenton for his ART ART review: https://mailarchive.ietf.org/arch/msg/art/8JP36SKQXl7jNXXdWEbcXng5bD0/, and to
the …
[Ballot comment]
Thank you for the work on this document

Many thanks to Jim Fenton for his ART ART review: https://mailarchive.ietf.org/arch/msg/art/8JP36SKQXl7jNXXdWEbcXng5bD0/, and to
the authors for addressing it.

Francesca
2022-04-06
28 Francesca Palombini [Ballot Position Update] New position, No Objection, has been recorded for Francesca Palombini
2022-04-06
28 Zaheduzzaman Sarker
[Ballot comment]
Thanks for working on this informational document.

I found this document a good read from the vehicular connectivity and networking point of view, …
[Ballot comment]
Thanks for working on this informational document.

I found this document a good read from the vehicular connectivity and networking point of view, however, there are some cases where the descriptions are not clear to convey the message and required ask.  Specially in section 4 and section 6. I think Roman already have covered most of those. Hence supporting his discuss points regarding  those sections.

I also have following observation/comments which I believe if addressed will improve the document-

* Abstract: I actually didn't find enumerated requirements form the problem statements that obviously. Hence, I would suggest to remove this part ("then enumerates requirements for the extensions of those IPv6 protocols for IPv6-based vehicular networking") from the abstract. Lets stick to what the title says.  Otherwise, I would expect a numbered list of requirements that the wg would like to refer to and fulfill in future works.

* Please add V2P (and X2P) definitions like others in the terminology section.

* Section 3.1: it says -

    "To encourage more vehicles to participate in this cooperative environmental sensing, a reward system will be needed. Sensing activities of each vehicle need to be logged in either a central way through a logging server (e.g., TCC) in the vehicular cloud or a distributed way (e.g., blockchain [Bitcoin]) through other vehicles or infrastructure. In the case of a blockchain, each sensing message from a vehicle can be treated as a transaction and the neighboring vehicles can play the role of peers in a consensus method of a blockchain [Bitcoin][Vehicular-BlockChain]."

  This seems like a misfit to the use case section and felt more like belongs to some sort of requirement for a reward system. I would suggest to just remove this paragraph.

* Section 5: it says -

    "Since the vehicles are likely to be moving at great speed, protocol exchanges need to be completed in a relatively short time compared to the lifetime of a link between a vehicle and an IP-RSU, or between two vehicles"

  While it is true that vehicles can move with "great speed", it is also true that the relative speeds between vehicles might not be that "great", e.g. platooning case. And when vehicles passes each other or a IP-RSU really fast there might not be enough time to setup the link layer connection and V2I communication becomes more important. I found the quoted section of problem statement to be ignorant of these facts and missing the potential relation among V2V, V2I and V2X connectivity and communication.

*  I would note that, fro, the use case and problem statement, tranport-layer session mobility and usage of available bandwidth mentioned in the document. However, those are not discussed with details but I understand would play vital role to support the discussed application use cases and architecture. I assume this might be due to  the scope of the document but this document should say something about those aspect, at least mention as potential future work that need to fulfill the envisioned use cases.
2022-04-06
28 Zaheduzzaman Sarker Ballot comment text updated for Zaheduzzaman Sarker
2022-04-06
28 Zaheduzzaman Sarker
[Ballot comment]
Thanks for working on this informational document.

I found this document a good read from the vehicular connectivity and networking point of view, …
[Ballot comment]
Thanks for working on this informational document.

I found this document a good read from the vehicular connectivity and networking point of view, however, there are some case it was not clear in the message and required ask.  Specially in section 4 and section 6. I think Roman already have covered most of those. Hence supporting his discuss points regarding  those sections.

I also have following observation/comments which I believe if address will improve the document-

* Abstract: I actually didn't find enumerated requirements form the problem statements that obviously. Hence, I would suggest to remove this part ("then enumerates requirements for the extensions of those IPv6 protocols for IPv6-based vehicular networking") from the abstract. Lets stick to what the title says.  Otherwise, I would expect a numbered list of requirements that the wg would like to refer to and fulfill in future works.

* Please add V2P (and X2P) definitions like others in the terminology section.

* Section 3.1: it says -

    "To encourage more vehicles to participate in this cooperative environmental sensing, a reward system will be needed. Sensing activities of each vehicle need to be logged in either a central way through a logging server (e.g., TCC) in the vehicular cloud or a distributed way (e.g., blockchain [Bitcoin]) through other vehicles or infrastructure. In the case of a blockchain, each sensing message from a vehicle can be treated as a transaction and the neighboring vehicles can play the role of peers in a consensus method of a blockchain [Bitcoin][Vehicular-BlockChain]."

  This seems like a misfit to the use case section and felt more like belongs to some sort of requirement for a reward system. I would suggest to just remove this paragraph.

* Section 5: it says -

    "Since the vehicles are likely to be moving at great speed, protocol exchanges need to be completed in a relatively short time compared to the lifetime of a link between a vehicle and an IP-RSU, or between two vehicles"

  While it is true that vehicles can move with "great speed", it is also true that the relative speeds between vehicles might not that "great". And when vehicles passes each other or a IP-RSU really fast there might not be enough time to setup the link layer connection and V2I communication becomes more important. I found the quoted section of problem statement to be ignorant of this fact and over missing the potential relation among V2V, V2I and V2X connectivity and communication.

*  I would note that from, the use case and problem statement, tranport-layer session mobility is mentioned, also  usage of available bandwidth mentioned in the document. However, those are not discussed with details but I understand would play vital role to support the discussed application use cases and architecture. I assume this might be because of the scope of the document but this document should say something about those aspect, at least mention as potential future work,.
2022-04-06
28 Zaheduzzaman Sarker [Ballot Position Update] New position, No Objection, has been recorded for Zaheduzzaman Sarker
2022-04-06
28 Alvaro Retana
[Ballot comment]

I support Roman's and Eric's DISCUSS positions.  I, too, found the line between examples and gaps/requirements to be blurry, at best.


This document …
[Ballot comment]

I support Roman's and Eric's DISCUSS positions.  I, too, found the line between examples and gaps/requirements to be blurry, at best.


This document lists more than 40 Normative references!  Most (all?) of them point at examples of potential technology or are there as background.  For example, the first few point at MLD/MLDv2, OLSR, NEMO, and a couple of documents about terminology and documentation -- all clearly informative.

This is how the IESG Statement on Normative and Informative References [1] characterizes them:

  Within an RFC, references to other documents fall into two general
  categories: "normative" and "informative". Normative references specify
  documents that must be read to understand or implement the technology
  in the new RFC, or whose technology must be present for the technology
  in the new RFC to work. An informative reference is not normative;
  rather, it only provides additional information. For example, an
  informative reference might provide background or historical information.
  Informative references are not required to implement the technology in
  the RFC.

Please examine the references and classify them accordingly.



[1] https://www.ietf.org/about/groups/iesg/statements/normative-informative-references/
2022-04-06
28 Alvaro Retana [Ballot Position Update] New position, No Objection, has been recorded for Alvaro Retana
2022-04-05
28 Éric Vyncke
[Ballot discuss]
Thank you for the work put into this document. I found the use cases part of section 3.1 very interesting to read even …
[Ballot discuss]
Thank you for the work put into this document. I found the use cases part of section 3.1 very interesting to read even if some of them seem very far fetched ;-)

Please find below some blocking DISCUSS points (easy to address though), some non-blocking COMMENT points (but replies would be appreciated even if only for my own education), and some nits.

Special thanks to

- Carlos Bernardos for the shepherd's write-up even if a justification for the informational status would have been welcome but the WG consensus description is appreciated.

- Pascal Thubert for his IETF last call INT directorate review at: https://datatracker.ietf.org/doc/review-ietf-ipwave-vehicular-networking-20-intdir-lc-thubert-2021-06-18/ and for his IESG telechat INT directorate review https://datatracker.ietf.org/doc/review-ietf-ipwave-vehicular-networking-27-intdir-telechat-thubert-2022-02-28/ Pascal's Last Call & telechat reviews were (at least partially) acted upon by Paul ;-)

I hope that this helps to improve the document,

Regards,

-éric

# DISCUSS

As noted in https://www.ietf.org/blog/handling-iesg-ballot-positions/, a DISCUSS ballot is a request to have a discussion on the following topics:

## Abstract & Section 1

"then enumerates requirements for the extensions of those IPv6 protocols" does not match any IPWAVE WG work item, i.e., it is outside the scope of the charter of IPWAVE WG. As the document does not explicitly specify requirements, I strongly suggest to use the word "gaps" rather than "requirements" in the abstract and section 1.

## Section 4.1

Using an IPv6 address out of a ULA prefix still requires DAD. So the text below should be updated to be corrected:
  "their own IPv6 Unique Local Addresses
  (ULAs) [RFC4193] over the wireless network, which does not require
  the messaging (e.g., Duplicate Address Detection (DAD)) of IPv6
  Stateless Address Autoconfiguration (SLAAC) [RFC4862]."

## Section 4.2

Very similar comment as above (i.e., DAD & MLD must be done for all IPv6 addresses of an interface and not only for the global one):
  "... When global IPv6
  addresses are used, wireless interface configuration and control
  overhead for DAD"

## Section 5.2
  "... If DHCPv6 is used to assign
  a unique IPv6 address to each vehicle in this shared link, DAD is not
  required. "
This is incorrect and must be changed (see section 18.2.10.1. of RFC 8415)
2022-04-05
28 Éric Vyncke
[Ballot comment]

# COMMENTS

"100km/h as the speed limit in highway" will make many European drivers smile as it is really slow...

## Section 1 …
[Ballot comment]

# COMMENTS

"100km/h as the speed limit in highway" will make many European drivers smile as it is really slow...

## Section 1

"Most countries and regions in the world have adopted the same frequency allocation for vehicular networks." but there are TWO frequency allocations described just before, so, which one has been adopted ?

## Section 2

"GPS" is just the USA commercial example of the more generic "global navigation satellite system" (GNSS), GNSS should be used in this document.

As IP-RSU have at least 2 interfaces, should "Also, it may have *the* third IP-enabled wireless interface" be replaced by "Also, it may have *a* third IP-enabled wireless interface" ?

LiDAR ... "by measuring the reflected pulsed light" but on which kind of metrics ?

## Section 3.1

Should the 1st and 5th bullets be grouped together ?

Please describe "UAM" (e.g., in the terminology section) as it is unclear to the reader whether it is a crewed / uncrewed aircraft.

If both road and air vehicles are use case, what about river / sea ships or trains ?

Does the paragraph about "reward system" belong to the use case ? It rather sounds like a business requirement. Suggest to remove this part.

Like written by Pascal Thubert in his telechat review, the last paragraph "IPv6-based packet exchange and secure" should be clear that this is not only about data plane traffic but also control plane L2/L3 ones. Please also use the Oxford comma, i.e., add a "," after "exchange".

## Section 3.2

Suggest to also mention "5G" after "IP-RSU or 4G-LTE networks"

How is the UAM use case different from a driverless terrestrial EV ? Suggest to merge those use cases.

## Section 4.1

As noted by other ADs, "Existing network architectures," the list should not include OMNI yet as it is not deployed and would probably not be described as an architecture.

"the wireless media interfaces are autoconfigured with a global IPv6 prefix", is it the same shared prefix or multiple prefixes ?

Is "RSU" the same concept as "IP-RSU" ?

The last paragraph is about TCP session continuity, but does not explain why multi-path TCP or QUIC session resumption cannot be used.

## Section 4.2

The computation about "dwell time" is interesting even if it is computed in the best case. But, I really wonder whether using IPv6 and routing are applicable to the use case as opposed to more layer-2 + tunnel solutions (like 3GPP) with such short time for hand-over. I am a strong supporter of layer-3 (IPv6 and routing), but I cannot refrain from thinking that IPv6 is the wrong technical solution for those use cases... Was this discussed in the WG ?

## Section 5.1

What is "legacy DAD" ?

  "...the NA interval needs to be
  dynamically adjusted according to a vehicle's speed so that the
  vehicle can maintain its neighboring vehicles in a stable way"
With the issues linked to multicast over wireless, are the authors and the WG sure that increasing the amount of multicast will not aggravate the problem ? See RFC 9119 (cited as a normative down reference)

## Section 5.1.2

Please add some references to the MADINAS WG current work items. The authors may also consider adding this use case to the MADINAS use case.

"The pseudonym of a MAC address affects an IPv6 address based on the MAC address", nearly no implementations use EUI-64 anymore so this part should probably be removed from the document. But, the change of MAC address probably has other impact on the IP stack, e.g., the neighbour cache.

## Section 5.1.3

AFAIK, RPL relies on messages to discover the topology and I am afraid that in such a moving / dynamic environment, there will be too many of RPL messages. Will RPL scale in this ever changing network ? Please note that I am not a RPL expert.

## Section 6.1

Some explanations on how SEND protects against DAD flooding would be welcome.

Is "classical IPv6 ND" the same as the previously used "legacy ND" ?

Wondering why "Vehicle Identification Number (VIN)" is suggested to be used as SubjectAltName in a certificate rather than a car manufacturer cert ?

## Section 6.3

The part about bitcoin and blockchain errs probably too far away from the IETF remit.

## Appendix B

I fail to understand how RPL and OMNI can be compared as they are vastly different technologies (routing vs. tunneling).

"In OMNI protocol, each wireless media interface is configured with an IPv6 Unique Local Address (ULA)" but from my last read of OMNI drafts (1+ year ago), the OMNI virtual interface can have a ULA indeed but the wireless physical ones are using any prefix.

## Appendix D

What will be the impact of high packet loss rate (that I am expecting on such networks) on IP parcels ?

# NITS 

Please check that all IPv6 addresses are in lowercase (e.g., in section 4.1).
2022-04-05
28 Éric Vyncke [Ballot Position Update] New position, Discuss, has been recorded for Éric Vyncke
2022-04-05
28 Roman Danyliw
[Ballot discuss]
I had difficulty in understanding the bounds for the scope of the use cases and proposed architecture.  At times I had trouble understanding …
[Ballot discuss]
I had difficulty in understanding the bounds for the scope of the use cases and proposed architecture.  At times I had trouble understanding what was an example of related work, and what was narrative formally describing the gaps in IPv6 for vehicular networking.  In that spirit:

** The Privacy Considerations are under-specified:

-- Section 6.3 suggests the needs for logging, “To deal with this kind of security issue, for monitoring suspicious behaviors, vehicles' communication activities can be recorded in either a central way through a logging server (e.g., TCC) in the vehicular cloud or a distributed way (e.g., blockchain [Bitcoin]) along with other vehicles or infrastructure.  To solve the issue ultimately, we need a solution where, without    privacy breakage, …”.  Some discussion on the “privacy breakage” is needed.  What exactly would be the trade offs between a centralized vs. distributed log?  Who would get to see this information?  What is sensitive about this information?

-- Section 5.1.2 and 6.3 highlights the use of MAC address pseudonyms.  This is helpful.  More discussion is needed about the associate privacy threat being mitigated.  Section 6.3 mentions an “adversary from tracking a vehicle” which I think means a passive observer of the path.  However, there are other entities in which ecosystem – what is the privacy exposure to the TCC, V2I, etc?  The opening in Section 6 notes that “vehicles and infrastructure must be authenticated” and those credentials (perhaps bound to even MAC pseudonyms) would also facilitate tracking even given MAC pseudonyms.  Section 6.1 explicit comments on using VINs in certificates.  Who are the assumed trusted actors?

-- Section 3.3 notes a V2P use case where the pedestrian’s smart-phone is sharing unspecified information.  Does that include location information?  Who gets it?  What kind of identifiers are shared?

** Section 4.2

  Note that it is dangerous if the
  internal network of a vehicle is controlled by a malicious party.  To
  minimize this kind of risk, an reinforced identification and
  verification protocol shall be implemented.

-- What are these dangers?

-- What is a ‘reinforced identification’?

-- Who are the parties in this verification protocol?  What security properties is this verification providing?

** Section 6.
  Vehicles and infrastructure must be authenticated in order to
  participate in vehicular networking. 

Authenticated with respect to whom? Vehicles to infrastructure and vice-versa?  Or to someone else?

** Section 6 makes references to “secure communication” – what is the expected key management approach and is that in scope?

** The need for safety properties (very helpful) is asserted multiple times but not further discussed in the Security Considerations:

-- Section 3: 
      In addition, IPv6
      security needs to be extended to support those V2V use cases in a
      safe, secure, privacy-preserving way.

-- Section 3.1:
      To support applications of these V2V use cases, the required
    functions of IPv6 include IPv6-based packet exchange and secure,   
    safe communication between two vehicles. 

-- Section 3.3:
  To support applications of these V2X use cases, the required
  functions of IPv6 include IPv6-based packet exchange, transport-layer
  session continuity, and secure, safe communication between a vehicle
  and a pedestrian either directly or indirectly via an IP-RSU.
2022-04-05
28 Roman Danyliw
[Ballot comment]
Thank you to Daniel Migault for the SECDIR review.

** Section 1.  Editorial
  Vehicular networking studies have mainly focused on improving safety …
[Ballot comment]
Thank you to Daniel Migault for the SECDIR review.

** Section 1.  Editorial
  Vehicular networking studies have mainly focused on improving safety
  and efficiency, and also enabling entertainment in vehicular
  networks. 

This first sentence is unrelated to the reset of the paragraph which is focused on spectrum allocation.

** Section 1.

  Most countries and regions in
  the world have adopted the same frequency allocation for vehicular
  networks.

This statement seems incongruent with the previous two sentences which describe how the US and EU have allocated very similar but not “same” spectrum (5.850 – 5.925 vs. 5.875 vs. 5.905).

** Section 2.  Edge Computing is defined but doesn’t seem to be used in the rest of the document beyond in ECD.  Is it needed?

** Section 2.

IP-OBU: "Internet Protocol On-Board Unit": An IP-OBU denotes a
      computer situated in a vehicle

Is this “computer” the same as an ECD defined earlier in the section?

** Section 3.1.  Editorial.

  These five techniques will be important elements for autonomous
  vehicles, which may be either terrestrial vehicles or UAM end
  systems.

This sentence seems to suggest that all give techniques are relevant to both terrestrial and UAMs.  As far as I can tell, the first three (1 – 3) are terrestrial related, the fourth is relevant to both terrestrial and UAM, and the fifth is UAM only.

** Section 3.1

  To encourage more vehicles to participate in this cooperative
  environmental sensing, a reward system will be needed.  Sensing
  activities of each vehicle need to be logged in either a central way
  through a logging server (e.g., TCC) in the vehicular cloud or a
  distributed way (e.g., blockchain [Bitcoin]) through other vehicles
  or infrastructure.  In the case of a blockchain, each sensing message
  from a vehicle can be treated as a transaction and the neighboring
  vehicles can play the role of peers in a consensus method of a
  blockchain [Bitcoin][Vehicular-BlockChain].

I’m struggling to link this proposed solution to stated uses case or gap-analysis for IPv6.  Can the IPv6 enablers be described.

** Section 3.2.  Typo?  s/air firmware/over-the-air firmware/.  If not a typo, what is an “air firmware/software update”?

** Section 3.2. Editorial?
  For this battery charging schedule, a UAM
  end system can communicate with an infrastructure node (e.g., IP-RSU)
  toward a cloud server via V2I communications.

Is there is a missing word here.  What does it mean to “... communicate with an infrastructure node … toward a cloud server”

** Section 4.2

  It is reasonable to consider the
  interaction between the internal network and an external network
  within another vehicle or an EN. 

Can the intent of this be clarified?  Isn’t something on the internal vehicle network talking to another vehicle the definition of V2V per Section 3.1?

** Section 4.2.  Is there any expectation of any perimeter-based policy enforcement between this internal network and the edge network (e.g., firewall?).

** Section 4.3.  Is there implicit trust between the platooning vehicles?  Security impact if one becomes untrusted?

** Section 5.
  For safe driving, vehicles need to exchange application messages
  every 0.5 second [NHTSA-ACAS-Report] to let drivers take an action to
  avoid a dangerous situation (e.g., vehicle collision), so IPv6
  protocol exchanges  need to support this order of magnitude for
  application message exchanges. 

This is a helpful performance envelope.  Can this be more tightly linked to IPv6?  It seems like this kind of performance is related to the capabilities of the link layer to move the IPv6 packets fast enough.

** Section 5.1.1
  For instance, some IPv6 protocols assume symmetry in the connectivity
  among neighboring interfaces [RFC6250]. 

RFC6250 (Section 3.1.1) seems to be saying the opposite of this sentence which is that symmetry can’t be assumed.  What protocols are making this assumption?

** Section 5.1.2

  However, the pseudonym handling is not
  implemented and tested yet for applications on IP-based vehicular
  networking.

No issues.  However, isn’t this true for all of the VIP and VND work (as in, it needs more testing)?

** Section 6.

  For the authentication in
  vehicular networks, vehicular cloud needs to support a kind of Public
  Key Infrastructure (PKI) in an efficient way.

What does the qualifier of “a kind of” PKI mean?

** Section 6

  Also, in-vehicle devices (e.g.,
  ECU) and a driver/passenger's mobile devices (e.g., smartphone and
  tablet PC) in a vehicle need to communicate with other in-vehicle
  devices and another driver/passenger's mobile devices in another
  vehicle, or other servers behind an IP-RSU in a secure way.

Is securing arbitrary communication between a smartphone-A in vehicle-1 and smartphone-B in vehicle-2 in scope?

** Section 6.
  Even
  though a vehicle is perfectly authenticated and legitimate,

What does it mean for a vehicle to be legitimate?  Authenticated to whom?

** Section 6
  Note that when driver/passenger's mobile devices are
  connected to a vehicle's internal network, the vehicle may be more
  vulnerable to possible attacks from external networks.

This doesn’t seem framed right.  Why is it _more vulnerable_?  More relative to what?  I think the central idea is that like any network (e.g., public library, IETF conference network), the end-node assumes risk of its packets transiting a network it doesn’t control, and exposes itself to “local network/segment” attacks of any peer nodes on the network.

** Section 6.3
  Alternatively, for
  completely secure vehicular networks, we shall embrace the concept of
  "zero-trust" for vehicles in which no vehicle is trustable and
  verifying every message is necessary.  For doing so, we shall have an
  efficient zero-trust framework or mechanism for vehicular networks.

-- What is a “completely secure vehicular network”?

-- There seems to be an architecture mismatch in this aspirational zero trust architecture.  How does the premise of “verifying every message” align with focus of this document being IPv6 protocol mechanisms.  What is an “IPv6 message”?  Is that a packet?  It would seem to me that these messages would be application layer matters.

** Section 6.3

Each message from a
  vehicle can be treated as a transaction and the neighboring vehicles
  can play the role of peers in a consensus method of a blockchain
  [Bitcoin] [Vehicular-BlockChain].

Same comment as for ZT -- what is an “IPv6 message” that could be put on a blockchain?

** Section 6.3

  For the non-repudiation of the harmful activities of malicious nodes,
  a blockchain technology can be used [Bitcoin].  Each message from a
  vehicle can be treated as a transaction and the neighboring vehicles
  can play the role of peers in a consensus method of a blockchain
  [Bitcoin] [Vehicular-BlockChain].  For a blockchain's efficient
  consensus in vehicular networks having fast moving vehicles, a new
  consensus algorithm needs to be developed or an existing consensus
  algorithm needs to be enhanced.

Given the architecture layout in Figures 1 – 5?  Where does this block live?  Who checks it?  Under what circumstances?  It isn’t clear how this architectural construct is linked a gap analysis of IPv6 for vehicular networking.
2022-04-05
28 Roman Danyliw [Ballot Position Update] New position, Discuss, has been recorded for Roman Danyliw
2022-04-05
28 Lars Eggert
[Ballot comment]
Section 1. , paragraph 5, comment:
>    Along with these WAVE standards and C-V2X standards, regardless of a
>    wireless access …
[Ballot comment]
Section 1. , paragraph 5, comment:
>    Along with these WAVE standards and C-V2X standards, regardless of a
>    wireless access technology under the IP stack of a vehicle, vehicular
>    networks can operate IP mobility with IPv6 [RFC8200] and Mobile IPv6
>    protocols (e.g., Mobile IPv6 (MIPv6) [RFC6275], Proxy MIPv6 (PMIPv6)
>    [RFC5213], Distributed Mobility Management (DMM) [RFC7333], Network
>    Mobility (NEMO) [RFC3963], Locator/ID Separation Protocol (LISP)
>    [I-D.ietf-lisp-rfc6830bis], and Automatic Extended Route Optimization
>    based on the Overlay Multilink Network Interface (AERO/OMNI)
>    [I-D.templin-6man-aero] [I-D.templin-6man-omni]).  In addition, ISO
>    has approved a standard specifying the IPv6 network protocols and
>    services to be used for Communications Access for Land Mobiles (CALM)
>    [ISO-ITS-IPv6][ISO-ITS-IPv6-AMD1].

Isn't it a bit premature to list AERO and OMNI alongside a number of published
standards from the IETF and other organizations? As far as I know they are
individual documents that have not been adopted? (Here and elsewhere in the
document.)

Found terminology that should be reviewed for inclusivity; see
https://www.rfc-editor.org/part2/#inclusive_language for background and more
guidance:

* Term "invalid"; alternatives might be "not valid", "unenforceable", "not
  binding", "inoperative", "illegitimate", "incorrect", "improper",
  "unacceptable", "inapplicable", "revoked", "rescinded".

-------------------------------------------------------------------------------
NIT
-------------------------------------------------------------------------------
All comments below are about very minor potential issues that you may choose to
address in some way - or ignore - as you see fit. Some were flagged by
automated tools (via https://github.com/larseggert/ietf-reviewtool), so there
will likely be some false positives. There is no need to let me know what you
did with these suggestions.

Section 5.2. , paragraph 7, nit:
-    home.  There is nonnegligible control overhead to set up and maintain
+    home.  There is non-negligible control overhead to set up and maintain
+                      +

Section 1. , paragraph 3, nit:
> 9.4 [WAVE-1609.4] specifies the multi-channel operation. IEEE 802.11p was fi
>                                ^^^^^^^^^^^^^
This word is normally spelled as one.

Section 4.1. , paragraph 7, nit:
> arty. To minimize this kind of risk, an reinforced identification and verific
>                                      ^^
Use "a" instead of "an" if the following word doesn't start with a vowel sound,
e.g. "a sentence", "a university".

Section 4.3. , paragraph 17, nit:
> livered to relevant vehicles in an efficient way (e.g., multicasting). With
>                              ^^^^^^^^^^^^^^^^^^^
Consider replacing this phrase with the adverb "efficiently" to avoid
wordiness.

Section 4.3. , paragraph 17, nit:
> layers (e.g., IPv6, TCP, and UDP). Hence the bandwidth selection according t
>                                    ^^^^^
A comma may be missing after the conjunctive/linking adverb "Hence".

Section 5.1.1. , paragraph 4, nit:
> y with standard IPv6 links in an efficient fashion to support IPv6 DAD, MLD a
>                            ^^^^^^^^^^^^^^^^^^^^^^^
Consider replacing this phrase with the adverb "efficiently" to avoid
wordiness.

Section 5.1.2. , paragraph 2, nit:
> ergy constraints, RPL does not suggest to use a proactive mechanism (e.g., k
>                                ^^^^^^^^^^^^^^
The verb "suggest" is used with the gerund form.

Section 5.2. , paragraph 4, nit:
> lic Key Infrastructure (PKI) in an efficient way. To provide safe interactio
>                              ^^^^^^^^^^^^^^^^^^^
Consider replacing this phrase with the adverb "efficiently" to avoid
wordiness.

Section 5.2. , paragraph 5, nit:
> other servers behind an IP-RSU in a secure way. Even though a vehicle is per
>                                ^^^^^^^^^^^^^^^
Consider replacing this phrase with the adverb "securely" to avoid wordiness.

Section 5.2. , paragraph 8, nit:
> eceived ND message, which requires to use the CGA ND option in the ND protoc
>                                    ^^^^^^
Did you mean "using"? Or maybe you should add a pronoun? In active voice,
"require" + "to" takes an object, usually a pronoun.

Section 6. , paragraph 3, nit:
>  taking a safe maneuver. Since cyber security issues in vehicular networks ma
>                                ^^^^^^^^^^^^^^
The word "cybersecurity" is spelled as one.

Section 6.1. , paragraph 4, nit:
> ensus algorithm needs to be developed or an existing consensus algorithm need
>                                      ^^^
Use a comma before "or" if it connects two independent clauses (unless they are
closely connected and short).

Section 8.2. , paragraph 7, nit:
>  Device-free human counting through WiFi fine-grained subcarrier information
>                                    ^^^^
Did you mean "Wi-Fi"? (This is the officially approved term by the Wi-Fi
Alliance.).

Section 8.2. , paragraph 23, nit:
> unction (called OF), which allows to adapt the activity of the routing proto
>                                  ^^^^^^^^
Did you mean "adapting"? Or maybe you should add a pronoun? In active voice,
"allow" + "to" takes an object, usually a pronoun.

"Appendix B. ", paragraph 5, nit:
> ST, CEA Saclay, Gif-sur-Yvette, Ile-de-France 91190, France, Phone: +33169089
>                                ^^^^^^^^^^^^^
"Ile-de-France" is an imported foreign expression, which originally has a
diacritic. Consider using "Île-de-France".

Uncited references: [RFC3849].
2022-04-05
28 Lars Eggert [Ballot Position Update] New position, No Objection, has been recorded for Lars Eggert
2022-04-04
28 Amanda Baber IANA Review state changed to IANA OK - No Actions Needed from Version Changed - Review Needed
2022-03-31
28 Tero Kivinen Request for Telechat review by SECDIR is assigned to Daniel Migault
2022-03-31
28 Tero Kivinen Request for Telechat review by SECDIR is assigned to Daniel Migault
2022-03-30
28 (System) IANA Review state changed to Version Changed - Review Needed from IANA OK - No Actions Needed
2022-03-30
28 Jaehoon Paul Jeong New version available: draft-ietf-ipwave-vehicular-networking-28.txt
2022-03-30
28 (System) New version approved
2022-03-30
28 (System) Request for posting confirmation emailed to previous authors: Jaehoon Jeong
2022-03-30
28 Jaehoon Paul Jeong Uploaded new revision
2022-03-28
27 Jim Fenton Request for Telechat review by ARTART Completed: Almost Ready. Reviewer: Jim Fenton. Sent review to list.
2022-03-02
27 Daniel Migault Request for Telechat review by SECDIR Completed: Has Issues. Reviewer: Daniel Migault. Sent review to list.
2022-02-28
27 Cindy Morgan Telechat date has been changed to 2022-04-07 from 2022-03-03
2022-02-28
27 Pascal Thubert Request for Telechat review by INTDIR Completed: Ready with Issues. Reviewer: Pascal Thubert. Sent review to list.
2022-02-24
27 Amanda Baber IANA Review state changed to IANA OK - No Actions Needed from Version Changed - Review Needed
2022-02-24
27 Cindy Morgan Telechat date has been changed to 2022-03-03 from 2022-04-07
2022-02-22
27 Jaehoon Paul Jeong New version available: draft-ietf-ipwave-vehicular-networking-27.txt
2022-02-22
27 (System) New version approved
2022-02-22
27 (System) Request for posting confirmation emailed to previous authors: Jaehoon Jeong
2022-02-22
27 Jaehoon Paul Jeong Uploaded new revision
2022-02-22
27 (System) Request for posting confirmation emailed to previous authors: Jaehoon Jeong
2022-02-22
27 Jaehoon Paul Jeong Uploaded new revision
2022-02-22
27 (System) Request for posting confirmation emailed to previous authors: Jaehoon Jeong
2022-02-22
27 Jaehoon Paul Jeong Uploaded new revision
2022-02-20
26 Jaehoon Paul Jeong New version available: draft-ietf-ipwave-vehicular-networking-26.txt
2022-02-20
26 (System) New version approved
2022-02-20
26 (System) Request for posting confirmation emailed to previous authors: Jaehoon Jeong
2022-02-20
26 Jaehoon Paul Jeong Uploaded new revision
2022-02-13
25 (System) IANA Review state changed to Version Changed - Review Needed from IANA OK - No Actions Needed
2022-02-13
25 Jaehoon Paul Jeong New version available: draft-ietf-ipwave-vehicular-networking-25.txt
2022-02-13
25 (System) New version approved
2022-02-13
25 (System) Request for posting confirmation emailed to previous authors: Jaehoon Jeong
2022-02-13
25 Jaehoon Paul Jeong Uploaded new revision
2022-02-13
25 (System) Request for posting confirmation emailed to previous authors: Jaehoon Jeong
2022-02-13
25 Jaehoon Paul Jeong Uploaded new revision
2022-02-10
24 Tero Kivinen Request for Telechat review by SECDIR is assigned to Daniel Migault
2022-02-10
24 Tero Kivinen Request for Telechat review by SECDIR is assigned to Daniel Migault
2022-02-10
24 Carlos Jesús Bernardos Request for Telechat review by INTDIR is assigned to Pascal Thubert
2022-02-10
24 Carlos Jesús Bernardos Request for Telechat review by INTDIR is assigned to Pascal Thubert
2022-02-09
24 Éric Vyncke Requested Telechat review by INTDIR
2022-02-08
24 Amanda Baber IANA Review state changed to IANA OK - No Actions Needed from Version Changed - Review Needed
2022-02-08
24 Barry Leiba Request for Telechat review by ARTART is assigned to Jim Fenton
2022-02-08
24 Barry Leiba Request for Telechat review by ARTART is assigned to Jim Fenton
2022-02-07
24 Cindy Morgan Placed on agenda for telechat - 2022-04-07
2022-02-06
24 Erik Kline Ballot has been issued
2022-02-06
24 Erik Kline [Ballot Position Update] New position, Yes, has been recorded for Erik Kline
2022-02-06
24 Erik Kline Created "Approve" ballot
2022-02-06
24 Erik Kline IESG state changed to IESG Evaluation from Waiting for Writeup
2022-02-06
24 Erik Kline Ballot writeup was changed
2022-02-06
24 Erik Kline Changed consensus to Yes from Unknown
2021-10-09
24 Jaehoon Paul Jeong New version available: draft-ietf-ipwave-vehicular-networking-24.txt
2021-10-09
24 (System) New version approved
2021-10-09
24 (System) Request for posting confirmation emailed to previous authors: Jaehoon Jeong
2021-10-09
24 Jaehoon Paul Jeong Uploaded new revision
2021-09-02
23 Jaehoon Paul Jeong New version available: draft-ietf-ipwave-vehicular-networking-23.txt
2021-09-02
23 (System) New version approved
2021-09-02
23 (System) Request for posting confirmation emailed to previous authors: Jaehoon Jeong
2021-09-02
23 Jaehoon Paul Jeong Uploaded new revision
2021-09-02
23 (System) Request for posting confirmation emailed to previous authors: Jaehoon Jeong
2021-09-02
23 Jaehoon Paul Jeong Uploaded new revision
2021-09-02
22 Jaehoon Paul Jeong New version available: draft-ietf-ipwave-vehicular-networking-22.txt
2021-09-02
22 (System) New version approved
2021-09-02
22 (System) Request for posting confirmation emailed to previous authors: Jaehoon Jeong
2021-09-02
22 Jaehoon Paul Jeong Uploaded new revision
2021-08-30
21 (System) IANA Review state changed to Version Changed - Review Needed from IANA OK - No Actions Needed
2021-08-30
21 Jaehoon Paul Jeong New version available: draft-ietf-ipwave-vehicular-networking-21.txt
2021-08-30
21 (System) New version approved
2021-08-30
21 (System) Request for posting confirmation emailed to previous authors: Jaehoon Jeong
2021-08-30
21 Jaehoon Paul Jeong Uploaded new revision
2021-07-29
20 Jean Mahoney Closed request for Last Call review by GENART with state 'Overtaken by Events'
2021-07-29
20 Jean Mahoney Assignment of request for Last Call review by GENART to Pete Resnick was marked no-response
2021-07-19
20 Gunter Van de Velde Closed request for Last Call review by OPSDIR with state 'Overtaken by Events'
2021-06-28
20 (System) IESG state changed to Waiting for Writeup from In Last Call
2021-06-22
20 (System) IANA Review state changed to IANA OK - No Actions Needed from IANA - Review Needed
2021-06-22
20 Sabrina Tanamal
(Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs:

The IANA Functions Operator has reviewed draft-ietf-ipwave-vehicular-networking-20, which is currently in Last Call, and has the following comments:

We …
(Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs:

The IANA Functions Operator has reviewed draft-ietf-ipwave-vehicular-networking-20, which is currently in Last Call, and has the following comments:

We understand that this document doesn't require any registry actions.

While it's often helpful for a document's IANA Considerations section to remain in place upon publication even if there are no actions, if the authors strongly prefer to remove it, we do not object.

If this assessment is not accurate, please respond as soon as possible.

Thank you,

Sabrina Tanamal
Senior IANA Services Specialist
2021-06-22
20 Gunter Van de Velde Assignment of request for Last Call review by OPSDIR to Ron Bonica was withdrawn
2021-06-22
20 Gunter Van de Velde Request for Last Call review by OPSDIR is assigned to Ron Bonica
2021-06-22
20 Gunter Van de Velde Request for Last Call review by OPSDIR is assigned to Ron Bonica
2021-06-22
20 Gunter Van de Velde Closed request for Last Call review by OPSDIR with state 'Withdrawn': duplicate review request in OPSDIR tool
2021-06-18
20 Pascal Thubert Request for Last Call review by INTDIR Completed: Not Ready. Reviewer: Pascal Thubert. Sent review to list.
2021-06-16
20 Gunter Van de Velde Request for Last Call review by OPSDIR is assigned to Dan Romascanu
2021-06-16
20 Gunter Van de Velde Request for Last Call review by OPSDIR is assigned to Dan Romascanu
2021-06-15
20 Jean Mahoney Request for Last Call review by GENART is assigned to Pete Resnick
2021-06-15
20 Jean Mahoney Request for Last Call review by GENART is assigned to Pete Resnick
2021-06-15
20 Carlos Jesús Bernardos Request for Last Call review by INTDIR is assigned to Pascal Thubert
2021-06-15
20 Carlos Jesús Bernardos Request for Last Call review by INTDIR is assigned to Pascal Thubert
2021-06-15
20 Éric Vyncke Requested Last Call review by INTDIR
2021-06-14
20 Amy Vezza IANA Review state changed to IANA - Review Needed
2021-06-14
20 Amy Vezza
The following Last Call announcement was sent out (ends 2021-06-28):

From: The IESG
To: IETF-Announce
CC: Carlos Bernardos , cjbc@it.uc3m.es, draft-ietf-ipwave-vehicular-networking@ietf.org, ek.ietf@gmail.com, …
The following Last Call announcement was sent out (ends 2021-06-28):

From: The IESG
To: IETF-Announce
CC: Carlos Bernardos , cjbc@it.uc3m.es, draft-ietf-ipwave-vehicular-networking@ietf.org, ek.ietf@gmail.com, ipwave-chairs@ietf.org, its@ietf.org
Reply-To: last-call@ietf.org
Sender:
Subject: Last Call:  (IPv6 Wireless Access in Vehicular Environments (IPWAVE): Problem Statement and Use Cases) to Informational RFC


The IESG has received a request from the IP Wireless Access in Vehicular
Environments WG (ipwave) to consider the following document: - 'IPv6 Wireless
Access in Vehicular Environments (IPWAVE): Problem
  Statement and Use Cases'
  as Informational RFC

The IESG plans to make a decision in the next few weeks, and solicits final
comments on this action. Please send substantive comments to the
last-call@ietf.org mailing lists by 2021-06-28. Exceptionally, comments may
be sent to iesg@ietf.org instead. In either case, please retain the beginning
of the Subject line to allow automated sorting.

Abstract


  This document discusses the problem statement and use cases of
  IPv6-based vehicular networking for Intelligent Transportation
  Systems (ITS).  The main scenarios of vehicular communications are
  vehicle-to-vehicle (V2V), vehicle-to-infrastructure (V2I), and
  vehicle-to-everything (V2X) communications.  First, this document
  explains use cases using V2V, V2I, and V2X networking.  Next, for
  IPv6-based vehicular networks, it makes a gap analysis of current
  IPv6 protocols (e.g., IPv6 Neighbor Discovery, Mobility Management,
  and Security & Privacy), and then enumerates requirements for the
  extensions of those IPv6 protocols for IPv6-based vehicular
  networking.




The file can be obtained via
https://datatracker.ietf.org/doc/draft-ietf-ipwave-vehicular-networking/



No IPR declarations have been submitted directly on this I-D.




2021-06-14
20 Amy Vezza IESG state changed to In Last Call from Last Call Requested
2021-06-14
20 Amy Vezza Last call announcement was changed
2021-06-13
20 Erik Kline Last call was requested
2021-06-13
20 Erik Kline Last call announcement was generated
2021-06-13
20 Erik Kline Ballot approval text was generated
2021-06-13
20 Erik Kline Ballot writeup was generated
2021-06-13
20 (System) Changed action holders to Erik Kline (IESG state changed)
2021-06-13
20 Erik Kline IESG state changed to Last Call Requested from AD Evaluation::AD Followup
2021-03-18
20 (System) Sub state has been changed to AD Followup from Revised ID Needed
2021-03-18
20 Jaehoon Paul Jeong New version available: draft-ietf-ipwave-vehicular-networking-20.txt
2021-03-18
20 (System) New version approved
2021-03-18
20 (System) Request for posting confirmation emailed to previous authors: Jaehoon Jeong
2021-03-18
20 Jaehoon Paul Jeong Uploaded new revision
2021-03-07
19 Erik Kline
[ abstract, section 1 ]

* "lists up" -> "enumerates|sets forth|details|...", might be a better
  word/verb phrase


[ section 2 ]

* "table PC"? …
[ abstract, section 1 ]

* "lists up" -> "enumerates|sets forth|details|...", might be a better
  word/verb phrase


[ section 2 ]

* "table PC"? Perhaps "tablet PC", like in section 6.

[ section 3 ]

* There are two sentences in the final paragraph which both direct the reader
  to section 5 for vehicular IPv6 problem statement and requirements.
  Probably only one of those sentences is really required.

[ section 3.2 ]

* "can facilitates" -> "can facilitate"

* "can make the battery charging schedule" is technically correct, but the
  multiple possible interpretations of "make" in this context tripped me up
  looking for some final (indirect) object or something.

  Suggest something like "can plan the battery charging schedule", perhaps?

* "The existing IPv6 protocol must be augmented ..."

  Should there be some explanation about why this needs to be done at the IPv6
  layer and, more explicitly, why a Layer 2 solution is not an option that
  can also be considered?  I can understand that L2 options are out of scope
  for the IETF to work on, but are they also out of scope overall?  I could
  believe that the reason is RFC 4903 -style issues, but I figured I'd ask.

[ section 4.1 ]

* "...vehicles under the coverage of an RSU share a prefix such
  that mobile nodes share a prefix..."

  Perhaps s/such that/(just as)|(in the same way that)/?

[ section 4.2/5(.0) ]

* The final paragraph of 4.2 hints at this, but I found myself wanting to read
  about the expected "dwell times" for a vehicle connected to an IP-RSU.
  For how long is a vehicle expected to be connected to any given access node?
  I think the maximum is probably uninteresting (the vehicle could be parked,
  for example), but what is the useful minimum time?

  (I see that section 5.1.2 goes include a helpful timescale reference.)

[ section 5.1.1/5.2 ]

* During handover, can a vehicle be connected to multiple IP-RSUs on the
  logical interface?  If so, does this mean they need to use RFC 8028 -style
  address and next hop selection?

[ section 6 ]

* How can a vehicle authenticate other vehicles (and their ND information)
  and the RAs coming from IP-RSUs?

  Ah, I guess this is what the final two paragraphs are saying, actually, that
  there needs to be such a mechanism.
2021-03-07
19 (System) Changed action holders to Jaehoon (Paul) Jeong (IESG state changed)
2021-03-07
19 Erik Kline IESG state changed to AD Evaluation::Revised I-D Needed from AD Evaluation
2020-09-27
19 Erik Kline IESG state changed to AD Evaluation from Publication Requested
2020-08-09
19 Russ Housley
As required by RFC 4858, this is the current template for the Document
Shepherd Write-Up.  Changes are expected over time.

This version is dated …
As required by RFC 4858, this is the current template for the Document
Shepherd Write-Up.  Changes are expected over time.

This version is dated 1 November 2019.

(1) What type of RFC is being requested (BCP, Proposed Standard, Internet
Standard, Informational, Experimental, or Historic)?  Why is this the
proper type of RFC?  Is this type of RFC indicated in the title page
header?

  Informational.  It is indicated in the title page header.

(2) The IESG approval announcement includes a Document Announcement
Write-Up.  Please provide such a Document Announcement Write-Up.  Recent
examples can be found in the "Action" announcements for approved
documents.  The approval announcement contains the following sections:

  Technical Summary:

    The document introduces different use cases of interest for
    IPv6-based vehicular networking for Intelligent Transportation
    Systems (ITS).  Then, it describes an example vehicular network
    architecture supporting V2V, V2I, and V2X communications as a
    baseline for further discussion about current IPv6 protocols with
    respect to IPv6 neighbor discovery, mobility management, security,
    and privacy.  Finally, some requirements for future work are offered.

  Working Group Summary:

    Initially, the IPWAVE WG was chartered to work on documents:
    one informational document explaining the state of the art in the
    field and describe the use cases for IPv6, and another
    informational document describing the problem statement, including
    associated security and privacy considerations.  The charter
    indicated that the working group would decide at a future point
    whether these informational documents needed to be published
    separately as RFCs or if they could be combined.  It was decided at
    the beginning of the process to combine them, without any
    controversy.

    The document has required a lot of time to progress, due to the low
    energy level of the IPWAVE WG.

  Document Quality:

    The document is informational, and therefore does not include any
    protocol specification, so no implementations exist.  The document
    went through many iterations, as it originally had an academic
    flavor, and did not properly serve its purpose of identifying key
    gaps that require protocol development.  This has been improved in
    the last revisions.  Overall, the document has a good quality.

    The document has been reviewed in several occasions (more than 10) by
    several IPWAVE WG participants and external reviewers recruited by
    the WG chairs and the document editor.  None of the reviewers has
    expressed concerns with latest version of the Internet-Draft.

Personnel:

    Carlos J. Bernardos is the Document Shepherd.
    Erik Kline is the responsible Area Director.

(3) Briefly describe the review of this document that was performed by
the Document Shepherd.  If this version of the document is not ready for
publication, please explain why the document is being forwarded to the
IESG.

  The Document Shepherd has reviewed this document in multiple occasions,
  even before it was adopted by the IPWAVE WG.  During the process,
  different recommendations were provided, especially aimed at making the
  document more concise and less "academic".  After this long process,
  the document is now ready to be forwarded to the IESG.

(4) Does the document Shepherd have any concerns about the depth or
breadth of the reviews that have been performed?

  No.

(5) Do portions of the document need review from a particular or from
broader perspective, e.g., security, operational complexity, AAA, DNS,
DHCP, XML, or internationalization?  If so, describe the review that took
place.

  No, not really.  As part of the publication process, I understand that
  a SecDir review will take place, which might be further improve the
  security-related content of the document.

(6) Describe any specific concerns or issues that the Document Shepherd
has with this document that the Responsible Area Director and/or the IESG
should be aware of?  For example, perhaps he or she is uncomfortable with
certain parts of the document, or has concerns whether there really is a
need for it.  In any event, if the WG has discussed those issues and has
indicated that it still wishes to advance the document, detail those
concerns here.

  No critical concerns.  I feel that with more energy at the IPWAVE WG,
  we could have come up with a baseline document to take on further work.

(7) Has each author confirmed that any and all appropriate IPR
disclosures required for full conformance with the provisions of BCP 78
and BCP 79 have already been filed.  If not, explain why?

  Yes.

(8) Has an IPR disclosure been filed that references this document?  If
so, summarize any WG discussion and conclusion regarding the IPR
disclosures.

  No IPR has been filed.

(9) How solid is the WG consensus behind this document?  Does it
represent the strong concurrence of a few individuals, with others being
silent, or does the WG as a whole understand and agree with it?

  Strong consensus.

(10) Has anyone threatened an appeal or otherwise indicated extreme
discontent?  If so, please summarise the areas of conflict in separate
email messages to the Responsible Area Director.  (It should be in a
separate email because this questionnaire is publicly available.)

  No.

(11) Identify any ID nits the Document Shepherd has found in this
document.  (See http://www.ietf.org/tools/idnits/ and the Internet-Drafts
Checklist).  Boilerplate checks are not enough; this check needs to be
thorough.

  idnits reflects just one comment, regarding an unexpected draft version,
  which is actually correct in the document.

(12) Describe how the document meets any required formal review criteria,
such as the MIB Doctor, YANG Doctor, media type, and URI type reviews.

  N/A.

(13) Have all references within this document been identified as either
normative or informative?

  Yes.

(14) Are there normative references to documents that are not ready for
advancement or are otherwise in an unclear state?  If such normative
references exist, what is the plan for their completion?

  The document has no normative references.

(15) Are there downward normative references references (see RFC 3967)?
If so, list these downward references to support the Area Director in the
Last Call procedure.

  N/A.

(16) Will publication of this document change the status of any existing
RFCs?  Are those RFCs listed on the title page header, listed in the
abstract, and discussed in the introduction?  If the RFCs are not listed
in the Abstract and Introduction, explain why, and point to the part of
the document where the relationship of this document to the other RFCs is
discussed.  If this information is not in the document, explain why the
WG considers it unnecessary.

  No.

(17) Describe the Document Shepherd's review of the IANA considerations
section, especially with regard to its consistency with the body of the
document.  Confirm that all protocol extensions that the document makes
are associated with the appropriate reservations in IANA registries.
Confirm that any referenced IANA registries have been clearly identified.
Confirm that newly created IANA registries include a detailed
specification of the initial contents for the registry, that allocations
procedures for future registrations are defined, and a reasonable name
for the new registry has been suggested (see RFC 8126).

  The document does not require any IANA action, and this is reflected
  in the IANA considerations section.

(18) List any new IANA registries that require Expert Review for future
allocations.  Provide any public guidance that the IESG would find useful
in selecting the IANA Experts for these new registries.

  N/A.

(19) Describe reviews and automated checks performed by the Document
Shepherd to validate sections of the document written in a formal
language, such as XML code, BNF rules, MIB definitions, YANG modules,
etc.

  N/A.

(20) If the document contains a YANG module, has the module been checked
with any of the recommended validation tools
(https://trac.ietf.org/trac/ops/wiki/yang-review-tools) for syntax and
formatting validation?  If there are any resulting errors or warnings,
what is the justification for not fixing them at this time?  Does the
YANG module comply with the Network Management Datastore Architecture
(NMDA) as specified in RFC8342?

  N/A.
2020-08-09
19 Russ Housley Responsible AD changed to Erik Kline
2020-08-09
19 Russ Housley IETF WG state changed to Submitted to IESG for Publication from WG Consensus: Waiting for Write-Up
2020-08-09
19 Russ Housley IESG state changed to Publication Requested from I-D Exists
2020-08-09
19 Russ Housley IESG process started in state Publication Requested
2020-08-09
19 Russ Housley Tag Doc Shepherd Follow-up Underway cleared.
2020-07-29
19 Carlos Jesús Bernardos
As required by RFC 4858, this is the current template for the Document
Shepherd Write-Up.  Changes are expected over time.

This version is dated …
As required by RFC 4858, this is the current template for the Document
Shepherd Write-Up.  Changes are expected over time.

This version is dated 1 November 2019.

(1) What type of RFC is being requested (BCP, Proposed Standard, Internet
Standard, Informational, Experimental, or Historic)?  Why is this the
proper type of RFC?  Is this type of RFC indicated in the title page
header?

  Informational.  It is indicated in the title page header.

(2) The IESG approval announcement includes a Document Announcement
Write-Up.  Please provide such a Document Announcement Write-Up.  Recent
examples can be found in the "Action" announcements for approved
documents.  The approval announcement contains the following sections:

  Technical Summary:

    The document introduces different use cases of interest for
    IPv6-based vehicular networking for Intelligent Transportation
    Systems (ITS).  Then, it describes an example vehicular network
    architecture supporting V2V, V2I, and V2X communications as a
    baseline for further discussion about current IPv6 protocols with
    respect to IPv6 neighbor discovery, mobility management, security,
    and privacy.  Finally, some requirements for future work are offered.

  Working Group Summary:

    Initially, the IPWAVE WG was chartered to work on documents:
    one informational document explaining the state of the art in the
    field and describe the use cases for IPv6, and another
    informational document describing the problem statement, including
    associated security and privacy considerations.  The charter
    indicated that the working group would decide at a future point
    whether these informational documents needed to be published
    separately as RFCs or if they could be combined.  It was decided at
    the beginning of the process to combine them, without any
    controversy.

    The document has required a lot of time to progress, due to the low
    energy level of the IPWAVE WG.

  Document Quality:

    The document is informational, and therefore does not include any
    protocol specification, so no implementations exist.  The document
    went through many iterations, as it originally had an academic
    flavor, and did not properly serve its purpose of identifying key
    gaps that require protocol development.  This has been improved in
    the last revisions.  Overall, the document has a good quality.

    The document has been reviewed in several occasions (more than 10) by
    several IPWAVE WG participants and external reviewers recruited by
    the WG chairs and the document editor.  None of the reviewers has
    expressed concerns with latest version of the Internet-Draft.

Personnel:

    Carlos J. Bernardos is the Document Shepherd.
    Erik Kline is the responsible Area Director.

(3) Briefly describe the review of this document that was performed by
the Document Shepherd.  If this version of the document is not ready for
publication, please explain why the document is being forwarded to the
IESG.

  The Document Shepherd has reviewed this document in multiple occasions,
  even before it was adopted by the IPWAVE WG.  During the process,
  different recommendations were provided, especially aimed at making the
  document more concise and less "academic".  After this long process,
  the document is now ready to be forwarded to the IESG.

(4) Does the document Shepherd have any concerns about the depth or
breadth of the reviews that have been performed?

  No.

(5) Do portions of the document need review from a particular or from
broader perspective, e.g., security, operational complexity, AAA, DNS,
DHCP, XML, or internationalization?  If so, describe the review that took
place.

  No, not really.  As part of the publication process, I understand that
  a SecDir review will take place, which might be further improve the
  security-related content of the document.

(6) Describe any specific concerns or issues that the Document Shepherd
has with this document that the Responsible Area Director and/or the IESG
should be aware of?  For example, perhaps he or she is uncomfortable with
certain parts of the document, or has concerns whether there really is a
need for it.  In any event, if the WG has discussed those issues and has
indicated that it still wishes to advance the document, detail those
concerns here.

  No critical concerns.  I feel that with more energy at the IPWAVE WG,
  we could have come up with a baseline document to take on further work.

(7) Has each author confirmed that any and all appropriate IPR
disclosures required for full conformance with the provisions of BCP 78
and BCP 79 have already been filed.  If not, explain why?

  Yes.

(8) Has an IPR disclosure been filed that references this document?  If
so, summarize any WG discussion and conclusion regarding the IPR
disclosures.

  No IPR has been filed.

(9) How solid is the WG consensus behind this document?  Does it
represent the strong concurrence of a few individuals, with others being
silent, or does the WG as a whole understand and agree with it?

  Strong consensus.

(10) Has anyone threatened an appeal or otherwise indicated extreme
discontent?  If so, please summarise the areas of conflict in separate
email messages to the Responsible Area Director.  (It should be in a
separate email because this questionnaire is publicly available.)

  No.

(11) Identify any ID nits the Document Shepherd has found in this
document.  (See http://www.ietf.org/tools/idnits/ and the Internet-Drafts
Checklist).  Boilerplate checks are not enough; this check needs to be
thorough.

  idnits reflects just one comment, regarding an unexpected draft version,
  which is actually correct in the document.

(12) Describe how the document meets any required formal review criteria,
such as the MIB Doctor, YANG Doctor, media type, and URI type reviews.

  N/A.

(13) Have all references within this document been identified as either
normative or informative?

  Yes.

(14) Are there normative references to documents that are not ready for
advancement or are otherwise in an unclear state?  If such normative
references exist, what is the plan for their completion?

  The document has no normative references.

(15) Are there downward normative references references (see RFC 3967)?
If so, list these downward references to support the Area Director in the
Last Call procedure.

  N/A.

(16) Will publication of this document change the status of any existing
RFCs?  Are those RFCs listed on the title page header, listed in the
abstract, and discussed in the introduction?  If the RFCs are not listed
in the Abstract and Introduction, explain why, and point to the part of
the document where the relationship of this document to the other RFCs is
discussed.  If this information is not in the document, explain why the
WG considers it unnecessary.

  No.

(17) Describe the Document Shepherd's review of the IANA considerations
section, especially with regard to its consistency with the body of the
document.  Confirm that all protocol extensions that the document makes
are associated with the appropriate reservations in IANA registries.
Confirm that any referenced IANA registries have been clearly identified.
Confirm that newly created IANA registries include a detailed
specification of the initial contents for the registry, that allocations
procedures for future registrations are defined, and a reasonable name
for the new registry has been suggested (see RFC 8126).

  The document does not require any IANA action, and this is reflected
  in the IANA considerations section.

(18) List any new IANA registries that require Expert Review for future
allocations.  Provide any public guidance that the IESG would find useful
in selecting the IANA Experts for these new registries.

  N/A.

(19) Describe reviews and automated checks performed by the Document
Shepherd to validate sections of the document written in a formal
language, such as XML code, BNF rules, MIB definitions, YANG modules,
etc.

  N/A.

(20) If the document contains a YANG module, has the module been checked
with any of the recommended validation tools
(https://trac.ietf.org/trac/ops/wiki/yang-review-tools) for syntax and
formatting validation?  If there are any resulting errors or warnings,
what is the justification for not fixing them at this time?  Does the
YANG module comply with the Network Management Datastore Architecture
(NMDA) as specified in RFC8342?

  N/A.
2020-07-29
19 Jaehoon Paul Jeong New version available: draft-ietf-ipwave-vehicular-networking-19.txt
2020-07-29
19 (System) New version accepted (logged-in submitter: Jaehoon Jeong)
2020-07-29
19 Jaehoon Paul Jeong Uploaded new revision
2020-07-29
18 Jaehoon Paul Jeong New version available: draft-ietf-ipwave-vehicular-networking-18.txt
2020-07-29
18 (System) New version accepted (logged-in submitter: Jaehoon Jeong)
2020-07-29
18 Jaehoon Paul Jeong Uploaded new revision
2020-07-28
17 Jaehoon Paul Jeong New version available: draft-ietf-ipwave-vehicular-networking-17.txt
2020-07-28
17 (System) New version accepted (logged-in submitter: Jaehoon Jeong)
2020-07-28
17 Jaehoon Paul Jeong Uploaded new revision
2020-07-28
16 Carlos Jesús Bernardos Tag Doc Shepherd Follow-up Underway set.
2020-07-28
16 Carlos Jesús Bernardos IETF WG state changed to WG Consensus: Waiting for Write-Up from In WG Last Call
2020-07-28
16 Carlos Jesús Bernardos Notification list changed to Carlos Bernardos <cjbc@it.uc3m.es>
2020-07-28
16 Carlos Jesús Bernardos Document shepherd changed to Carlos J. Bernardos
2020-07-12
16 Russ Housley IETF WG state changed to In WG Last Call from WG Document
2020-07-12
16 Russ Housley Intended Status changed to Informational from None
2020-07-07
16 Jaehoon Paul Jeong New version available: draft-ietf-ipwave-vehicular-networking-16.txt
2020-07-07
16 (System) New version approved
2020-07-07
16 (System) Request for posting confirmation emailed to previous authors: Jaehoon Jeong
2020-07-07
16 Jaehoon Paul Jeong Uploaded new revision
2020-06-29
15 Jaehoon Paul Jeong New version available: draft-ietf-ipwave-vehicular-networking-15.txt
2020-06-29
15 (System) New version approved
2020-06-29
15 (System) Request for posting confirmation emailed to previous authors: Jaehoon Jeong
2020-06-29
15 Jaehoon Paul Jeong Uploaded new revision
2020-03-09
14 Jaehoon Paul Jeong New version available: draft-ietf-ipwave-vehicular-networking-14.txt
2020-03-09
14 (System) New version approved
2020-03-09
14 (System) Request for posting confirmation emailed to previous authors: Jaehoon Jeong
2020-03-09
14 Jaehoon Paul Jeong Uploaded new revision
2020-01-06
13 Jaehoon Paul Jeong New version available: draft-ietf-ipwave-vehicular-networking-13.txt
2020-01-06
13 (System) New version approved
2020-01-06
13 (System) Request for posting confirmation emailed to previous authors: Jaehoon Jeong
2020-01-06
13 Jaehoon Paul Jeong Uploaded new revision
2019-10-03
12 Jaehoon Paul Jeong New version available: draft-ietf-ipwave-vehicular-networking-12.txt
2019-10-03
12 (System) New version approved
2019-10-03
12 (System) Request for posting confirmation emailed to previous authors: Jaehoon Jeong
2019-10-03
12 Jaehoon Paul Jeong Uploaded new revision
2019-07-20
11 Jaehoon Paul Jeong New version available: draft-ietf-ipwave-vehicular-networking-11.txt
2019-07-20
11 (System) New version approved
2019-07-20
11 (System) Request for posting confirmation emailed to previous authors: Jaehoon Jeong
2019-07-20
11 Jaehoon Paul Jeong Uploaded new revision
2019-07-12
10 Russ Housley Added to session: IETF-105: ipwave  Tue-1000
2019-07-08
10 Jaehoon Paul Jeong New version available: draft-ietf-ipwave-vehicular-networking-10.txt
2019-07-08
10 (System) New version approved
2019-07-08
10 (System) Request for posting confirmation emailed to previous authors: Jaehoon Jeong
2019-07-08
10 Jaehoon Paul Jeong Uploaded new revision
2019-05-24
09 Jaehoon Paul Jeong New version available: draft-ietf-ipwave-vehicular-networking-09.txt
2019-05-24
09 (System) New version approved
2019-05-24
09 (System) Request for posting confirmation emailed to previous authors: Jaehoon Jeong
2019-05-24
09 Jaehoon Paul Jeong Uploaded new revision
2019-03-25
08 Russ Housley Added to session: IETF-104: ipwave  Fri-1050
2019-03-24
08 Jaehoon Paul Jeong New version available: draft-ietf-ipwave-vehicular-networking-08.txt
2019-03-24
08 (System) New version approved
2019-03-24
08 (System) Request for posting confirmation emailed to previous authors: Jaehoon Jeong
2019-03-24
08 Jaehoon Paul Jeong Uploaded new revision
2018-11-04
07 Carlos Jesús Bernardos Added to session: IETF-103: ipwave  Tue-1120
2018-11-04
07 Jaehoon Paul Jeong New version available: draft-ietf-ipwave-vehicular-networking-07.txt
2018-11-04
07 (System) New version approved
2018-11-04
07 (System) Request for posting confirmation emailed to previous authors: Jaehoon Jeong
2018-11-04
07 Jaehoon Paul Jeong Uploaded new revision
2018-10-22
06 Jaehoon Paul Jeong New version available: draft-ietf-ipwave-vehicular-networking-06.txt
2018-10-22
06 (System) New version approved
2018-10-22
06 (System) Request for posting confirmation emailed to previous authors: Jaehoon Jeong
2018-10-22
06 Jaehoon Paul Jeong Uploaded new revision
2018-10-22
05 Jaehoon Paul Jeong New version available: draft-ietf-ipwave-vehicular-networking-05.txt
2018-10-22
05 (System) New version approved
2018-10-22
05 (System) Request for posting confirmation emailed to previous authors: Jaehoon Jeong
2018-10-22
05 Jaehoon Paul Jeong Uploaded new revision
2018-07-16
04 Jaehoon Paul Jeong New version available: draft-ietf-ipwave-vehicular-networking-04.txt
2018-07-16
04 (System) New version approved
2018-07-16
04 (System) Request for posting confirmation emailed to previous authors: Jaehoon Jeong
2018-07-16
04 Jaehoon Paul Jeong Uploaded new revision
2018-07-15
03 Carlos Jesús Bernardos Added to session: IETF-102: ipwave  Mon-1330
2018-07-02
03 Jaehoon Paul Jeong New version available: draft-ietf-ipwave-vehicular-networking-03.txt
2018-07-02
03 (System) New version approved
2018-07-02
03 (System) Request for posting confirmation emailed to previous authors: Jaehoon Jeong
2018-07-02
03 Jaehoon Paul Jeong Uploaded new revision
2018-03-18
02 Carlos Jesús Bernardos Added to session: IETF-101: ipwave  Mon-0930
2018-03-05
02 Jaehoon Paul Jeong New version available: draft-ietf-ipwave-vehicular-networking-02.txt
2018-03-05
02 (System) New version approved
2018-03-05
02 (System) Request for posting confirmation emailed to previous authors: Jaehoon Jeong
2018-03-05
02 Jaehoon Paul Jeong Uploaded new revision
2018-03-05
02 (System) Request for posting confirmation emailed to previous authors: Jaehoon Jeong
2018-03-05
02 Jaehoon Paul Jeong Uploaded new revision
2017-11-13
01 Jaehoon Paul Jeong New version available: draft-ietf-ipwave-vehicular-networking-01.txt
2017-11-13
01 (System) New version approved
2017-11-13
01 (System) Request for posting confirmation emailed to previous authors: Jaehoon Jeong
2017-11-13
01 Jaehoon Paul Jeong Uploaded new revision
2017-11-12
00 Carlos Jesús Bernardos Added to session: IETF-100: ipwave  Mon-1740
2017-10-30
00 Carlos Jesús Bernardos Requested to merge into a single document by the chairs according to our charter.
2017-10-30
00 Carlos Jesús Bernardos This document now replaces draft-ietf-ipwave-vehicular-networking-survey, draft-ietf-ipwave-problem-statement instead of None
2017-10-30
00 Jaehoon Paul Jeong New version available: draft-ietf-ipwave-vehicular-networking-00.txt
2017-10-30
00 (System) WG -00 approved
2017-10-30
00 Jaehoon Paul Jeong Set submitter to "Jaehoon Paul Jeong ", replaces to (none) and sent approval email to group chairs: ipwave-chairs@ietf.org
2017-10-30
00 Jaehoon Paul Jeong Uploaded new revision