Hierarchical Mobile IPv6 (HMIPv6) Mobility Management
draft-ietf-mipshop-4140bis-05
Revision differences
Document history
Date | Rev. | By | Action |
---|---|---|---|
2012-08-22
|
05 | (System) | post-migration administrative database adjustment to the No Objection position for Pasi Eronen |
2012-08-22
|
05 | (System) | post-migration administrative database adjustment to the No Objection position for David Ward |
2012-08-22
|
05 | (System) | post-migration administrative database adjustment to the No Objection position for Tim Polk |
2012-08-22
|
05 | (System) | post-migration administrative database adjustment to the No Objection position for Magnus Westerlund |
2012-08-22
|
05 | (System) | post-migration administrative database adjustment to the No Objection position for Lars Eggert |
2012-08-22
|
05 | (System) | post-migration administrative database adjustment to the No Objection position for Mark Townsley |
2012-08-22
|
05 | (System) | post-migration administrative database adjustment to the No Objection position for Russ Housley |
2008-08-15
|
05 | Cindy Morgan | State Changes to RFC Ed Queue from Approved-announcement sent by Cindy Morgan |
2008-08-15
|
05 | (System) | IANA Action state changed to No IC from In Progress |
2008-08-15
|
05 | (System) | IANA Action state changed to In Progress |
2008-08-15
|
05 | Cindy Morgan | IESG state changed to Approved-announcement sent |
2008-08-15
|
05 | Cindy Morgan | IESG has approved the document |
2008-08-15
|
05 | Cindy Morgan | Closed "Approve" ballot |
2008-08-15
|
05 | Cindy Morgan | State Changes to Approved-announcement to be sent from IESG Evaluation::AD Followup by Cindy Morgan |
2008-07-28
|
05 | Pasi Eronen | [Ballot Position Update] Position for Pasi Eronen has been changed to No Objection from Discuss by Pasi Eronen |
2008-07-26
|
05 | (System) | Sub state has been changed to AD Follow up from New Id Needed |
2008-07-26
|
05 | (System) | New version available: draft-ietf-mipshop-4140bis-05.txt |
2008-07-18
|
05 | Jari Arkko | State Changes to IESG Evaluation::Revised ID Needed from IESG Evaluation::AD Followup by Jari Arkko |
2008-07-18
|
05 | Jari Arkko | waiting for authors to confirm my text proposal, pasi to OK the change as sufficient, and possibly for a new document revision. |
2008-07-16
|
05 | David Ward | [Ballot Position Update] Position for David Ward has been changed to No Objection from Discuss by David Ward |
2008-07-14
|
04 | (System) | New version available: draft-ietf-mipshop-4140bis-04.txt |
2008-06-26
|
05 | Mark Townsley | [Ballot Position Update] Position for Mark Townsley has been changed to No Objection from Discuss by Mark Townsley |
2008-06-11
|
05 | Lars Eggert | [Ballot Position Update] Position for Lars Eggert has been changed to No Objection from Discuss by Lars Eggert |
2008-06-11
|
05 | Tim Polk | [Ballot Position Update] Position for Tim Polk has been changed to No Objection from Undefined by Tim Polk |
2008-06-11
|
05 | Tim Polk | [Ballot Position Update] Position for Tim Polk has been changed to Undefined from Discuss by Tim Polk |
2008-06-11
|
05 | Magnus Westerlund | [Ballot Position Update] Position for Magnus Westerlund has been changed to No Objection from Discuss by Magnus Westerlund |
2008-06-10
|
05 | (System) | Sub state has been changed to AD Follow up from New Id Needed |
2008-06-10
|
03 | (System) | New version available: draft-ietf-mipshop-4140bis-03.txt |
2008-04-25
|
05 | (System) | Removed from agenda for telechat - 2008-04-24 |
2008-04-24
|
05 | Cindy Morgan | State Changes to IESG Evaluation::Revised ID Needed from IESG Evaluation by Cindy Morgan |
2008-04-24
|
05 | Russ Housley | [Ballot Position Update] Position for Russ Housley has been changed to No Objection from Discuss by Russ Housley |
2008-04-24
|
05 | Cullen Jennings | [Ballot Position Update] Position for Cullen Jennings has been changed to Undefined from No Objection by Cullen Jennings |
2008-04-24
|
05 | Tim Polk | [Ballot discuss] In general, I thought this was a good document. However, there are some problems that need to be remedied before publication. Most of … [Ballot discuss] In general, I thought this was a good document. However, there are some problems that need to be remedied before publication. Most of the issues involve the Security Considerations section, but some changes to the body might also be helfpul. (This is in part a follow-on to Lakshminath Dondeti's secdir review and highlights the issues I consider blocking.) (1) The document introduces the Mobility Anchor Point (MAP) into the mobile IPv6 architecture, but the requirements/assumptions regarding the relationship between the mobile node and the MAP are not clear enough. These assumptions/requirements have a number of implications for the protocols that should be stated. In particular, there is an implication that the trust relationship is so limited that authentication as a group member is generally sufficient. For example, a MAP may authenticate a mobile node based on a certificate issued by a known CA, rather than the specific identity in the certificate. Similarly, the mobile node may authenticate the MAP based on a cert from a known CA, even though the specific MAP was previously unknown. (Examples from 11.1) I believe this is okay, based on my understanding of the requirements, but I would feel more confident if the trust relationship was fleshed somewhere. Note that this is confused somewhat by the discussion of "security relationship" between the mobile node and the MAP in section 11. "mutual authentication, integrity protection and protection against replay attack" are necessary features, not a relationship. (2) Authentication and authorization are conceptually related but they are different. Authentication is generally the precursor, where we determine another party's identity, and authorization follows based on that identitty. Just because a party's identity has been authenticated does not mean they are authorized to access anything. The examples cited above blur the lines between these steps. Hopefully, this will be addressed as a side effect of addressing (1), but please revise with an eye towards clarity on authentication vs. authorization. (3) The security considerations section focuses on the expected deployment architecture, but several alternatives are specified in the document. Tehse should be addressed in teh security considerations as well - either to describe differences in teh security considerations or to state that they are unchanged. For example, It is noted in the introduction that the mobile node can operate in a nomadic manner (no permanent home address). Section 6.5 notes that the RCoA address can be used as the source address without a Home Address option. In these kinds of cases, are there additional constraints or limitations imposed on the trust relationship between the MAP and the mobile node? |
2008-04-24
|
05 | Tim Polk | [Ballot discuss] In general, I thought this was a good document. However, there are some problems that need to be remedied before publication. Most of … [Ballot discuss] In general, I thought this was a good document. However, there are some problems that need to be remedied before publication. Most of the issues involve the Security Considerations section, but some changes to the body might also be helfpul. (This is in part a follow-on to Lakshminath Dondeti's secdir review and highlights the issues I consider blocking.) (1) The document introduces the Mobility Anchor Point (MAP) into the mobile IPv6 architecture, but the requirements/assumptions regarding the relationship between the mobile node and the MAP are not clear enough. These assumptions/requirements have a number of implications for the protocols that should be stated. In particular, there is an implication that the trust relationship is so limited that authentication as a group member is generally sufficient. For example, a MAP may authenticate a mobile node based on a certificate issued by a known CA, rather than the specific identity in the certificate. Similarly, the mobile node may authenticate the MAP based on a cert from a known CA, even though the specific MAP was previously unknown. (Examples from 11.1) I believe this is okay, based on my understanding of the requirements, but I would feel more confident if the trust relationship was fleshed somewhere. Note that this is confused somewhat by the discussion of "security relationship" between the mobile node and the MAP in section 11. "mutual authentication, integrity protection and protection against replay attack" are necessary features, not a relationship. (2) Authentication and authorization are conceptually related but they are different. Authentication is generally the precursor, where we determine another party's identity, and authorization follows based on that identitty. Just because a party's identity has been authenticated does not mean they are authorized to access anything. The examples cited above blur the lines between these steps. Hopefully, this will be addressed as a side effect of addressing (1), but please revise with an eye towards clarity on authentication vs. authorization. (3) The security considerations section focuses on the expected deployment architecture, but several alternatives are specified in the document. Tehse should be addressed in teh security considerations as well - either to describe differences in teh security considerations or to state that they are unchanged. For example, It is noted in the introduction that the mobile node can operate in a nomadic manner (no permanent home address). Section 6.5 notes that the RCoA address can be used as the source address without a Home Address option. In these kinds of cases, are there additional constraints or limitations imposed on the trust relationship between the MAP and the mobile node? |
2008-04-24
|
05 | Tim Polk | [Ballot discuss] In general, I thought this was a good document. However, there are some problems that need to be remedied before publication. Most of … [Ballot discuss] In general, I thought this was a good document. However, there are some problems that need to be remedied before publication. Most of the issues involve the Security Considerations section, but some changes to the body might also be helfpul. (This is in part a follow-on to Lakshminath Dondeti's secdir review and highlights the issues I consider blocking.) (1) The document introduces the Mobility Anchor Point (MAP) into the mobile IPv6 architecture, but the requirements/assumptions regarding the relationship between the mobile node and the MAP are not clear enough. These assumptions/requirements have a number of implications for the protocols that should be stated. In particular, there is an implication that the trust relationship is so limited that authentication as a group member is generally sufficient. For example, a MAP may authenticate a mobile node based on a certificate issued by a known CA, rather than the specific identity in the certificate. Similarly, the mobile node may authenticate the MAP based on a cert from a known CA, even though the specific MAP was previously unknown. (Examples from 11.1) I believe this is okay, based on my understanding of the requirements, but I would feel more confident if the trust relationship was fleshed somewhere. Note that this is confused somewhat by the discussion of "security relationship" between the mobile node and the MAP in section 11. "mutual authentication, integrity protection and protection against replay attack" are necessary features, not a relationship. (2) Authentication and authorization are conceptually related but they are different. Authentication is generally the precursor, where we determine another party's identity, and authorization follows based on that identitty. Just because a party's identity has been authenticated does not mean they are authorized to access anything. The examples cited above blur the lines between these steps. Hopefully, this will be addressed as a side effect of addressing (1), but please revise with an eye towards clarity on authentication vs. authorization. (3) The security considerations section focuses on the expected deployment architecture, but several alternatives are specified in the document. Tehse should be addressed in teh security considerations as well - either to describe differences in teh security considerations or to state that they are unchanged. For example, It is noted in the introduction that the mobile node can operate in a nomadic manner (no permanent home address). Section 6.5 notes that the RCoA address can be used as the source address without a Home Address option. In these kinds of cases, are there additional constraints or limitations imposed on the trust relationship between the MAP and the mobile node? |
2008-04-24
|
05 | Pasi Eronen | [Ballot discuss] Section 11 needs a better description of how IPsec works in this context, including description of required SPD and PAD entries. It also … [Ballot discuss] Section 11 needs a better description of how IPsec works in this context, including description of required SPD and PAD entries. It also seems that the current text proposes rather creative on-the-fly modifications to PAD; probably these could be replaced by the dynamic home address configuration mechanisms described in RFC 4877. Section 7.1 says "If the R flag is set, the mobile node MUST use its RCoA as the Home Address when performing the MAP registration. RCoA is then bound to the LCoA in the MAP's Binding Cache." I had some difficulties in understanding this paragraph; some rephrasing or additional text would clarify it. Topics noted in Lakshminath Dondeti's SecDir review: The draft should describe what assumptions it's making about the network between MN and AR, or AR and MAP; without these, it's hard to say whether, e.g., the recommendations that BUs don't need confidentiality, or protecting payload traffic is optional, are in fact correct. The draft doesn't have any mandatory-to-implement security mechanisms (even IKEv2 is given just as an example), which means there's no interoperability. There's no INVALID-ID-INFORMATION notification in IKEv2. |
2008-04-24
|
05 | Pasi Eronen | [Ballot Position Update] New position, Discuss, has been recorded by Pasi Eronen |
2008-04-24
|
05 | Mark Townsley | [Ballot discuss] The introduction describes that without the mipshop optimization, MNs have on average 1.5 signaling round-trips when the node moves... Then makes a fairly … [Ballot discuss] The introduction describes that without the mipshop optimization, MNs have on average 1.5 signaling round-trips when the node moves... Then makes a fairly wild leap of conclusion that: These round trip delays will disrupt active connections every time a handoff to a new AR is performed. Eliminating this additional delay element from the time- critical handover period will significantly improve the performance of Mobile IPv6. What connections are being disrupted for each and every AR? Also, I see no analysis here that shows that there will be a significant performance improvement to the Mobile IPv6 user. There is language in this document stating the optional nature of this feature, but if the above claims are true then I cannot see how this could be optional. So, the document is rather inconsistent here. I think that probably the right thing to do is to tone down some of the claims of what this optimization does and does not do. |
2008-04-24
|
05 | Tim Polk | [Ballot Position Update] New position, Discuss, has been recorded by Tim Polk |
2008-04-24
|
05 | Mark Townsley | [Ballot Position Update] New position, Discuss, has been recorded by Mark Townsley |
2008-04-24
|
05 | Russ Housley | [Ballot comment] s/Figure 1: Figure 1:/Figure 1:/ |
2008-04-24
|
05 | Russ Housley | [Ballot discuss] Section 11 says: > > Confidentiality may be needed for payload traffic, but is not > required for binding updates … [Ballot discuss] Section 11 says: > > Confidentiality may be needed for payload traffic, but is not > required for binding updates to the MAP. > Under what circumstances is confidentiality desired? When it is desired, is ESP used to provide it? |
2008-04-24
|
05 | Russ Housley | [Ballot Position Update] New position, Discuss, has been recorded by Russ Housley |
2008-04-24
|
05 | Chris Newman | [Ballot Position Update] New position, No Objection, has been recorded by Chris Newman |
2008-04-24
|
05 | Magnus Westerlund | [Ballot discuss] The tunneling between the MAP and the mobile node introduces an extra layer of tunneling that may effect (will unless the path between … [Ballot discuss] The tunneling between the MAP and the mobile node introduces an extra layer of tunneling that may effect (will unless the path between the MN and the MAP has a MTU that is at least tunnel overhead larger than the real MTU bottelnek) the path MTU between the CN and the MN. There needs to be some discussion of this impact on the traffic between the CN and the MN. Especially as this is dynamic and can change due to the choices of the MN or changing the used MAP. |
2008-04-24
|
05 | Magnus Westerlund | [Ballot Position Update] Position for Magnus Westerlund has been changed to Discuss from No Objection by Magnus Westerlund |
2008-04-24
|
05 | Magnus Westerlund | [Ballot comment] I found one acronym in Section 6.1 that isn't explained nor used again: DAD |
2008-04-24
|
05 | Magnus Westerlund | [Ballot Position Update] New position, No Objection, has been recorded by Magnus Westerlund |
2008-04-23
|
05 | David Ward | [Ballot discuss] In section 7.1 there is a mention of options (e.g. preference) that are associated with MAP IP addrs but, there is a very … [Ballot discuss] In section 7.1 there is a mention of options (e.g. preference) that are associated with MAP IP addrs but, there is a very limited encoding (e.g. no flags, or other attributes) in the MAP option. In addition, the definition of a Dist is limited to 4 bits. Is that enough? Is it reasonable to assume that no semantics are to be associated with distance? Later, in the selection algorithm for distributed MAPs (9.1) it appears that DIST and PREF are directly comparable. Although DIST is used as a sorting (akin to hop count although earlier not required), the pref is then used to bias selection. The problem with no strict semantics for DIST to be hop count (e.g. it could be used as inverse hop count) then you'd get a non-optimal selection algorithm. In addition, the PREF variable alone only allows for a very weak application of operational policy (since all this has to be hand configured - no dynamic specified). Given what we know about policy selection requirements from other protocols, something should be mentioned what the RESV space is for or allow at this time greater operational options (via more attrs, flags, etc). Bottomline, the definition of the options (DIST, PREF) appear to not have strict enough semantics to meet the requirements of the default selection algorithm. Next, the section on failure detection and recovery from MAP failures is unfortunately not useful because it describes possible failure detection methods but, nothing to be standardized. Either something has to be specified, referenced or the section has to be removed as an implementor has nothing to specified to detect failures. |
2008-04-23
|
05 | David Ward | [Ballot Position Update] New position, Discuss, has been recorded by David Ward |
2008-04-23
|
05 | Lisa Dusseault | [Ballot Position Update] New position, No Objection, has been recorded by Lisa Dusseault |
2008-04-23
|
05 | Cullen Jennings | [Ballot Position Update] New position, No Objection, has been recorded by Cullen Jennings |
2008-04-23
|
05 | Ron Bonica | [Ballot Position Update] New position, No Objection, has been recorded by Ron Bonica |
2008-04-22
|
05 | Jari Arkko | State Changes to IESG Evaluation from Waiting for AD Go-Ahead by Jari Arkko |
2008-04-22
|
05 | (System) | State has been changed to Waiting for AD Go-Ahead from In Last Call by system |
2008-04-20
|
05 | Samuel Weiler | Request for Last Call review by SECDIR Completed. Reviewer: Lakshminath Dondeti. |
2008-04-19
|
05 | Lars Eggert | [Ballot comment] Section 14., paragraph 0: > 14. References Document contains a six or so unused references, suggest to remove them. Section 14.2., … |
2008-04-19
|
05 | Lars Eggert | [Ballot discuss] > Appendix A. Appendix A - Fast Mobile IPv6 Handoers and HMIPv6 DISCUSS: Has the experiment with RFC4140 covered Fast Hierarchical … [Ballot discuss] > Appendix A. Appendix A - Fast Mobile IPv6 Handoers and HMIPv6 DISCUSS: Has the experiment with RFC4140 covered Fast Hierarchical MIPv6 at all? There are zero technical changes between this appendix in RFC4140 and this document, and with the text below referring to SEAMOBY as if it was still around, I wonder if this appendix isn't outdated and should simply be removed for PS. Appendix B., paragraph 5: > RFC 4140 was implemented and interop tested by at least two different > organisations. A test suite including test cases for RFC 4140 was > also developed by Ericsson and run against both implementations. No > major issues were found. The scalability of Dynamic MAP discovery > defined in RFC 4140 was seen as inappripriate for large scale > deployments and prone to loops. It was removed from this > specification. DISCUSS-DISCUSS: This rationale for going from Experimental to PS is weak. OK, so two implementations interoperated, some minor things were removed, but the open question is whether the protocol actually works as advertised and is useful? |
2008-04-19
|
05 | Lars Eggert | [Ballot discuss] > Appendix A. Appendix A - Fast Mobile IPv6 Handoers and HMIPv6 DISCUSS: Has the experiment with RFC4140 covered Fast Hierarchical … [Ballot discuss] > Appendix A. Appendix A - Fast Mobile IPv6 Handoers and HMIPv6 DISCUSS: Has the experiment with RFC4140 covered Fast Hierarchical MIPv6 at all? There are zero technical changes between this appendix in RFC4140 and this document, and with the text below referring to SEAMOBY as if it was still around, I wonder if this appendix isn't outdated and should simply be removed for PS. Appendix B., paragraph 5: > RFC 4140 was implemented and interop tested by at least two different > organisations. A test suite including test cases for RFC 4140 was > also developed by Ericsson and run against both implementations. No > major issues were found. The scalability of Dynamic MAP discovery > defined in RFC 4140 was seen as inappripriate for large scale > deployments and prone to loops. It was removed from this > specification. DISCUSS-DISCUSS: This rationale for going from Experimental to PS is weak. OK, so two implementations interoperated, some minor things were removed, but the open question is whether the protocol actually works as advertised and is useful? |
2008-04-19
|
05 | Lars Eggert | [Ballot Position Update] New position, Discuss, has been recorded by Lars Eggert |
2008-04-12
|
05 | Samuel Weiler | Request for Last Call review by SECDIR is assigned to Lakshminath Dondeti |
2008-04-12
|
05 | Samuel Weiler | Request for Last Call review by SECDIR is assigned to Lakshminath Dondeti |
2008-04-08
|
05 | Jari Arkko | Placed on agenda for telechat - 2008-04-24 by Jari Arkko |
2008-04-08
|
05 | Amy Vezza | Last call sent |
2008-04-08
|
05 | Amy Vezza | State Changes to In Last Call from Last Call Requested by Amy Vezza |
2008-04-08
|
05 | Jari Arkko | Last Call was requested by Jari Arkko |
2008-04-08
|
05 | Jari Arkko | State Changes to Last Call Requested from AD Evaluation::AD Followup by Jari Arkko |
2008-04-08
|
05 | Jari Arkko | [Ballot Position Update] New position, Yes, has been recorded for Jari Arkko |
2008-04-08
|
05 | Jari Arkko | Ballot has been issued by Jari Arkko |
2008-04-08
|
05 | Jari Arkko | Created "Approve" ballot |
2008-04-08
|
05 | (System) | Ballot writeup text was added |
2008-04-08
|
05 | (System) | Last call text was added |
2008-04-08
|
05 | (System) | Ballot approval text was added |
2008-04-08
|
05 | (System) | Sub state has been changed to AD Follow up from New Id Needed |
2008-04-08
|
02 | (System) | New version available: draft-ietf-mipshop-4140bis-02.txt |
2008-04-07
|
05 | Jari Arkko | (And the AD-re-review was for http://www.elevatemobile.com/ietf/draft-ietf-mipshop-4140bis-02.txt) |
2008-04-07
|
05 | Jari Arkko | New AD review: Part 1:: Before I forget: please ensure that changes that were introduced to RFC 4140 by the RFC Editor are also in … New AD review: Part 1:: Before I forget: please ensure that changes that were introduced to RFC 4140 by the RFC Editor are also in the 4140bis. Sometimes authors start from their old source and miss this. See the diff URL below; I have not looked at if the changes in the current draft or not. Please check them before submitting a new version. http://www.arkko.com/ietf/mipshop/rfc4140-from-draft-ietf-mipshop-hmipv6-04.diff.html Part 2:: 1) The history has to be there, i.e., what changed from 4140. Also, you need to include a paragraph or two about what kind of "experiment" has been going on with 4140. I.e., have people used it, implemented it, whether there was any testing, etc. You don't need to invent any fancy results, simply state what has or has not been done. 2) Typo: 1. eceive and parse all MAP options. 3) This still needs a change: OLD: Note that a mobile node may send a BU containing its LCoA (instead of its RCoA) to correspondent nodes, which are connected to its same link. Packets will then be routed directly without going through the MAP. NEW: Note that a mobile node may send a BU containing its LCoA (instead of its RCoA) to correspondent nodes. If these nodes are connected to the same link, packets will then be routed directly without going through the MAP. 4) Delete this because its inconsistent with later text that actually defines an distance-based algorithm: This specification does not provide an algorithm for the distance-based MAP selection. However, such an algorithm may be introduced in future extensions utilising information about the speed of mobility from lower layers. 5) Typo: KEv2 allows the I'm expecting a revised ID. The above changes should be easy to do, when can we see the new revision? |
2008-01-16
|
05 | Jari Arkko | State Changes to AD Evaluation::Revised ID Needed from AD Evaluation by Jari Arkko |
2008-01-16
|
05 | Jari Arkko | [Note]: 'Document shepherd is Vijay Devarapalli' added by Jari Arkko |
2008-01-16
|
05 | Jari Arkko | I have made my AD review of this document. Please find detailed comments below. Overall, I was pleasantly surprised by this specification. It is in … I have made my AD review of this document. Please find detailed comments below. Overall, I was pleasantly surprised by this specification. It is in relatively good shape and while there are issues, there are generally minor and mostly solvable by removing the offending parts. I was happy with the security parts. The main issues that I have are the flooding scheme and the error recovery parts. I expect some discussion and a new draft revision. After that we can go to IETF Last Call. Technical: > This specification allows a mobile node to use more than one RCoA if > it received more than one MAP option. In this case, the mobile node > MUST perform the binding update procedure for each RCoA. This MUST seems overly strong. Why would the mobile node be forced to use more than one MAP, if it only wanted to use one? See also further below where some inconsistencies with the above have been detected. > Note that a mobile node may send a BU containing its LCoA (instead of > its RCoA) to correspondent nodes, which are connected to its same > link. Packets will then be routed directly without going through the > MAP. How does this happen? If two nodes sit on the same link and employ MAP(s) and home agent(s), they will only see each other's RCoAs and/or HoAs. They would see each other's care-of addresses when route optimization is attempted. But per your specification above you may not attempt it with your local address unless you already know the other node is on the same link. Chicken and egg... Suggestion: do not restrict the type of address the nodes may use in route optimization. > Upon reception of a router advertisement with the MAP option, the > receiving router MUST copy the option and re-send it after > incrementing the Distance field by one. I hope you do not mean re-sending every RA again on another interface, triggered by the reception. This would disturb the router's own timing and processing of RAs. Please clarify the text to indicate that the received RAs are only used for learning the information, and then the information is used in the router's own independent RA sending process. > The MAP option is propagated towards ARs in its domain. I'm not convinced that the dynamic distribution of MAP information is useful. First of all, its a very small configuration task compared to some of the other things you would have to have in this environment (e.g., security policies and key material allowing each mobile node to talk to each MAP securely). Secondly, you seem to be assuming that the MAP is placed in the router hierarchy. I would actually expect that a local domain's MAP would be placed in the same network as other servers and services exists, not necessarily in the aggregated router hierarchy that leads to the Internet. This would imply that a MAP RA would have to be distributed not just "down" but also "sideways" or even "up" if you draw the router placement in the network in a hierarchical manner. Of course, you can configure the routers to do this. But at the end of the day, you've created a complicated flooding scheme to achieve very little. And there may be error modes that we have not thought of. I would suggest removing the support for dynamic distribution, and simply requiring ARs to be configured with this information. > A mobile node MUST store the received option(s) in order to choose at > least one MAP to register with. Storing the options is essential, as > they will be compared to other options received later for the purpose > of the movement detection algorithm. The "at least one" part is right, in my opinion. But it is inconsistent with what I quoted earlier: "MUST perform the binding update procedure for each RCoA" > If no MAP options are found in the router advertisement, the mobile > node MUST use the Mobile IPv6 protocol, as specified in [1]. Hmm. I think MUST NOT use HMIP would be more appropriate within the specification of how to deal with MAP options. You are assuming that whoever implements your spec will also implement and be able to use Mobile IPv6 (including, for instance, having a home agent). > 10. Detection and Recovery from MAP Failures Paragraph 1 is good, but the rest seems suspect. For instance, on a large domain having every AR send this many pings to the MAP would by itself create a problem. And I am not sure this document should be dictating a specific mechanisms where service provider infrastructure keeps aware of what's up and what's not. I would suggest removing everything else except the ability of mobile nodes to react to zero lifetime. Or perhaps even that could be removed, if you simply recommended that if routers become aware of inability to reach the MAP, the MAP option is deleted from RAs. Editorial: Please correct the issues from http://tools.ietf.org/wg/mipshop/draft-ietf-mipshop-4140bis/draft-ietf-mipshop-4140bis-01.nits.txt > It is pertinent to note that the use of the MAP does not reply or > assume that a permanent Home Agent is present. s/reply/rely/ > The mobile node can communicate with a correspondent node through the > HA, or in a route-optimised manner, as described in [1]. When > communicating through the HA, the message formats in [1] can be re- > used. s/can be re-used/are used/ > This specification does not provide an algorithm > for the distance-based MAP selection. However, such an algorithm may > be introduced in future extensions utilising information about the > speed of mobility from lower layers. > > ... The following algorithm is simply based on selecting the > MAP that is most distant, provided that its preference value did not > reach a value of zero. The mobile node operation is shown below: > > 1. Receive and parse all MAP options An apparent inconsistency. Do you provide a distance-based algorithm or not? Note that there might be different algorithms, better/perfect, etc., but that was not what the text was claiming. > This is achieved by using the RCoA as the identity in IKE Phase 2 > negotiation. This step is identical to the use of the home address > in IKE phase 2. I think you mean child SA creation, not phase 2. Phase 2 was an IKEv1 concept. I see that Vijay noted this as well in his review. |
2007-11-28
|
05 | Jari Arkko | State Changes to AD Evaluation from Publication Requested by Jari Arkko |
2007-11-26
|
05 | Dinara Suleymanova | PROTO Write-up (1.a) Who is the Document Shepherd for this document? Has the Document Shepherd personally reviewed this version of the document and, in particular, … PROTO Write-up (1.a) Who is the Document Shepherd for this document? Has the Document Shepherd personally reviewed this version of the document and, in particular, does he or she believe this version is ready for forwarding to the IESG for publication? Vijay Devarapalli is the Document Shepherd for this document. I have reviewed the document and it is ready for forwarding to the IESG for publication. (1.b) Has the document had adequate review both from key WG members and from key non-WG members? Does the Document Shepherd have any concerns about the depth or breadth of the reviews that have been performed? This document has been adequately reviewed. (1.c) Does the Document Shepherd have concerns that the document needs more review from a particular or broader perspective, e.g., security, operational complexity, someone familiar with AAA, internationalization, or XML? No. (1.d) Does the Document Shepherd have any specific concerns or issues with this document that the Responsible Area Director and/or the IESG should be aware of? For example, perhaps he or she is uncomfortable with certain parts of the document, or has concerns whether there really is a need for it. In any event, if the WG has discussed those issues and has indicated that it still wishes to advance the document, detail those concerns here. Has an IPR disclosure related to this document been filed? If so, please include a reference to the disclosure and summarize the WG discussion and conclusion on this issue. No concerns. (1.e) How solid is the WG consensus behind this document? Does it represent the strong concurrence of a few individuals, with others being silent, or does the WG as a whole understand and agree with it? There is WG consensus in advancing this document. (1.f) Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarize the areas of conflict in separate email messages to the Responsible Area Director. (It should be in a separate email because this questionnaire is entered into the ID Tracker.) No. (1.g) Has the Document Shepherd personally verified that the document satisfies all ID nits? (See http://www.ietf.org/ID-Checklist.html and http://tools.ietf.org/tools/idnits/.) Boilerplate checks are not enough; this check needs to be thorough. Has the document met all formal review criteria it needs to, such as the MIB Doctor, media type, and URI type reviews? If the document does not already indicate its intended status at the top of the first page, please indicate the intended status here. Idnits found a few minor issues. There was boiler plate issues related to the IPR statement and the validity of internet drafts. However, the relevant sections are there in the document. There were a couple of references defined, but not referenced anywhere in the document. The intended status "Proposed Standard" is missing in the document. The document also needs to say that it obsoletes RFC 4140. These will be fixed in the next revision. (1.h) Has the document split its references into normative and informative? Are there normative references to documents that are not ready for advancement or are otherwise in an unclear state? If such normative references exist, what is the strategy for their completion? Are there normative references that are downward references, as described in [RFC3967]? If so, list these downward references to support the Area Director in the Last Call procedure for them [RFC3967]. The document splits the references into normative and Informative references. There are no downward references. (1.i) Has the Document Shepherd verified that the document's IANA Considerations section exists and is consistent with the body of the document? If the document specifies protocol extensions, are reservations requested in appropriate IANA registries? Are the IANA registries clearly identified? If the document creates a new registry, does it define the proposed initial contents of the registry and an allocation procedure for future registrations? Does it suggest a reasonable name for the new registry? See [RFC2434]. If the document describes an Expert Review process, has the Document Shepherd conferred with the Responsible Area Director so that the IESG can appoint the needed Expert during IESG Evaluation? The document makes no request from IANA. (1.j) Has the Document Shepherd verified that sections of the document that are written in a formal language, such as XML code, BNF rules, MIB definitions, etc., validate correctly in an automated checker? Does not apply. (1.k) The IESG approval announcement includes a Document Announcement Write-Up. Please provide such a Document Announcement Write-Up. Recent examples can be found in the "Action" announcements for approved documents. The approval announcement contains the following sections: Technical Summary Relevant content can frequently be found in the abstract and/or introduction of the document. If not, this may be an indication that there are deficiencies in the abstract or introduction. This document introduces extensions to Mobile IPv6 and IPv6 Neighbour Discovery to allow for local mobility handling. Hierarchical mobility management for Mobile IPv6 is designed to reduce the amount of signalling between the Mobile Node, its Correspondent Nodes, and its Home Agent. The Mobility Anchor Point (MAP) described in this document can also be used to improve the performance of Mobile IPv6 in terms of handover speed. Working Group Summary Was there anything in the WG process that is worth noting? For example, was there controversy about particular points or were there decisions where the consensus was particularly rough? No. Document Quality Are there existing implementations of the protocol? Have a significant number of vendors indicated their plan to implement the specification? Are there any reviewers that merit special mention as having done a thorough review, e.g., one that resulted in important changes or a conclusion that the document had no substantive issues? If there was a MIB Doctor, Media Type, or other Expert Review, what was its course (briefly)? In the case of a Media Type Review, on what date was the request posted? There are at least two implementations of HMIPv6. Nothing is known about vendor plans. This document revises RFC 4140, which was an Informational document. Personnel Who is the Document Shepherd for this document? Who is the Responsible Area Director? If the document requires IANA experts(s), insert 'The IANA Expert(s) for the registries in this document are .' Document shepherd: Vijay Devarapalli Responsible AD: Jari Arkko/Mark Townsley |
2007-11-26
|
05 | Dinara Suleymanova | Draft Added by Dinara Suleymanova in state Publication Requested |
2007-11-20
|
01 | (System) | New version available: draft-ietf-mipshop-4140bis-01.txt |
2007-03-22
|
00 | (System) | New version available: draft-ietf-mipshop-4140bis-00.txt |