Skip to main content

Multicast Ping Protocol
RFC 6450

Revision differences

Document history

Date Rev. By Action
2015-10-14
09 (System) Notify list changed from mboned-chairs@ietf.org, draft-ietf-mboned-ssmping@ietf.org to (None)
2012-08-22
09 (System) post-migration administrative database adjustment to the No Objection position for Sean Turner
2012-08-22
09 (System) post-migration administrative database adjustment to the No Objection position for Stewart Bryant
2012-08-22
09 (System) post-migration administrative database adjustment to the No Objection position for Wesley Eddy
2012-08-22
09 (System) post-migration administrative database adjustment to the No Objection position for Adrian Farrel
2012-08-22
09 (System) post-migration administrative database adjustment to the No Objection position for Russ Housley
2011-12-08
09 Cindy Morgan State changed to RFC Published from RFC Ed Queue.
2011-12-08
09 (System) RFC published
2011-11-16
09 (System) IANA Action state changed to RFC-Ed-Ack from Waiting on RFC Editor
2011-11-16
09 (System) IANA Action state changed to Waiting on RFC Editor from Waiting on Authors
2011-10-31
09 (System) IANA Action state changed to Waiting on Authors from In Progress
2011-10-31
09 (System) IANA Action state changed to In Progress from Waiting on Authors
2011-10-31
09 (System) IANA Action state changed to Waiting on Authors from In Progress
2011-10-19
09 Amy Vezza State changed to RFC Ed Queue from Approved-announcement sent.
2011-10-18
09 (System) IANA Action state changed to In Progress
2011-10-18
09 Amy Vezza IESG state changed to Approved-announcement sent
2011-10-18
09 Amy Vezza IESG has approved the document
2011-10-18
09 Amy Vezza Closed "Approve" ballot
2011-10-18
09 Amy Vezza Approval announcement text regenerated
2011-10-18
09 Amy Vezza Ballot writeup text changed
2011-10-12
09 Ron Bonica State changed to Approved-announcement to be sent from IESG Evaluation::AD Followup.
2011-10-10
09 Sean Turner [Ballot Position Update] Position for Sean Turner has been changed to No Objection from Discuss
2011-10-06
09 Stewart Bryant [Ballot comment]
Thank you for including the note
2011-10-06
09 Stewart Bryant [Ballot Position Update] Position for Stewart Bryant has been changed to No Objection from Discuss
2011-10-05
09 Wesley Eddy [Ballot Position Update] Position for Wesley Eddy has been changed to No Objection from Discuss
2011-10-05
09 Adrian Farrel [Ballot comment]
Thank you for addressing my Discuss and Comments
2011-10-05
09 Adrian Farrel [Ballot Position Update] Position for Adrian Farrel has been changed to No Objection from Discuss
2011-10-05
09 Russ Housley
[Ballot discuss]
The Gen-ART Review by Suresh Krishnan on 12-Jul 2011 raised two
  concerns that deserve a response.

  * I am not sure …
[Ballot discuss]
The Gen-ART Review by Suresh Krishnan on 12-Jul 2011 raised two
  concerns that deserve a response.

  * I am not sure why this spec needs to contain the options 7 and 8
    as they are not relevant to this version of the protocol. Wouldn't
    the default behavior with unknown options take care of this
    automatically?

  * It would be good if the draft specifies a default TTL (e.g. 64) in
    case the server did not include a TTL option. In this case, the
    server implementations need not bother to add the option if they
    are happy with the default (which I suspect they would be).
2011-10-05
09 Russ Housley [Ballot Position Update] Position for Russ Housley has been changed to No Objection from Discuss
2011-10-05
09 (System) Sub state has been changed to AD Follow up from New Id Needed
2011-10-05
09 (System) New version available: draft-ietf-mboned-ssmping-09.txt
2011-08-01
09 Samuel Weiler Request for Telechat review by SECDIR Completed. Reviewer: Vincent Roca.
2011-07-14
09 Cindy Morgan Removed from agenda for telechat
2011-07-14
09 Cindy Morgan State changed to IESG Evaluation::Revised ID Needed from IESG Evaluation.
2011-07-14
09 Dan Romascanu
[Ballot comment]
I support Wesley's DISCUSS. The one second interval between answers of a server to a given client may be too little, just fine …
[Ballot comment]
I support Wesley's DISCUSS. The one second interval between answers of a server to a given client may be too little, just fine or too much depending on many factors, size and topology of the network included. Either some justification or some other indication of how this value is to be used (or deviated from) is required.
2011-07-14
09 Dan Romascanu
[Ballot comment]
I support Wesley's DISCUSS. The one second interval between answers of a server to a given client may be too little, just fine …
[Ballot comment]
I support Wesley's DISCUSS. The one second interval between answers of a server to a given client may be too little, just fine or too much depending on many factors, size and topology of the network included. Either some justification or some other indication of how this value is to be used (or devaited from) is required.
2011-07-14
09 Dan Romascanu [Ballot Position Update] New position, No Objection, has been recorded
2011-07-14
09 Adrian Farrel
[Ballot comment]
I am slightly puzzled by the author's contact details. Are they
up-to-date and will the email address reach the author in AUTH48?

--- …
[Ballot comment]
I am slightly puzzled by the author's contact details. Are they
up-to-date and will the email address reach the author in AUTH48?

---

I think it would help, very early in Section 2, to say that the Server
is typically the root of a multicast tree, and the Client is typically
the leaf. You could go on to explain variations from this.

---

Section 3

  The Init message generally contains some prefix options asking the
  server for a group from one of the specified prefixes.

  For an Echo Request the client generally includes a number of
  options

These are pretty vague statements for a protocol specification!
2011-07-14
09 Adrian Farrel
[Ballot discuss]
The mboned charter says:
  This is not meant to be a protocol development Working Group.

Is this not a protocol? In which …
[Ballot discuss]
The mboned charter says:
  This is not meant to be a protocol development Working Group.

Is this not a protocol? In which other WGs has it been reviewed? (The
write-up is silent)

---

idnits says...

  == You're using the IETF Trust Provisions' Section 6.b License Notice
    from 12 Sep 2009 rather than the newer Notice from 28 Dec 2009.
    (See http://trustee.ietf.org/license-info/)

I think we need the draft to be resubmitted with the up-to-date
license notice before we can accept it for publication.

---

The Experimental ranges available here are far too large. There are 64
experimental message types and 16384 experimental option types.
Experiments are supposed to have limited scope and duration. Such large
experimental ranges will encourage code-point squatting. Please reduce
the available range to one or two messages and no more than six options.

---

Section 3.2

  Values 7 and 8 are reserved.

You need to be more careful. I suspect that you mean "reserved and must
not be allocated by any future document."  If you just say "reserved"
this may be mistaken for "available".

But anyway, the text later in 3.2 is confusing:

      Reserved, type 7

        This option code value was used by early implementations for an
        option that is now deprecated.  This option should no longer be
        used.  Clients MUST NOT use this option.  Servers MUST treat it
        as an unknown option (not process it if received, but if
        received in an Echo Request message, it MUST be echoed in the
        Echo Reply message).

You say "deprecated" but you asked for the code point to be "reserved".

This says both "should (sic) no longer be used" and MUST NOT be used by
a client. Then it goes on to say that that MUST NOT is not an error and
MUST be processed by the server. 

I suggest:

        This option code value was used by implementations of version 1
        of this protocol, and is not used in this version. Servers MUST
        treat it as an unknown option (not process it if received, but
        if received in an Echo Request message, it MUST be echoed in
        the Echo Reply message).

Similarly, I suggest:

      Reserved, type 8

        This option code value was used by implementations of version 1
        of this protocol, and is not used in this version. Servers MUST
        treat it as an unknown option (not process it if received, but
        if received in an Echo Request message, it MUST be echoed in
        the Echo Reply message).

---

Section 3.2

Client ID says...

        A server should treat
        this as opaque data, and MUST echo this option back in the
        reply if present (both Server Response and Echo Reply).
                       
But Version says...

        Client
        ID and Sequence Number options SHOULD be echoed if present

MUST != SHOULD

Similarly:
Sequence Number...

        A
        server replying to an Echo Request message MUST copy it into
        the Echo Reply (or Server Response message on error). 

The table in Section 3.4 confirms the "MUST" echo.
2011-07-14
09 Adrian Farrel [Ballot Position Update] New position, Discuss, has been recorded
2011-07-13
09 Gonzalo Camarillo [Ballot Position Update] New position, No Objection, has been recorded
2011-07-13
09 Jari Arkko [Ballot Position Update] New position, No Objection, has been recorded
2011-07-13
09 Stephen Farrell
[Ballot comment]
This sets up a sort-of covert channel between the
client sending the Init and the MC group members
that could be used e.g. …
[Ballot comment]
This sets up a sort-of covert channel between the
client sending the Init and the MC group members
that could be used e.g. in botnet control. (I've no
idea if that's actually happened or not.)

I don't know what might be done about that right now, but
having the server just send a hash of the client supplied
options should work, but would be a fairly large change
to the protocol at this stage.

I guess it might be worth noting this potential abuse
and possible solution in case the protocol is revised later.
2011-07-13
09 Stephen Farrell [Ballot Position Update] New position, No Objection, has been recorded
2011-07-13
09 Stewart Bryant
[Ballot discuss]
The timestamp specifies the time when the Echo
Request message is sent.  The first 4 bytes specify the number
of seconds since the …
[Ballot discuss]
The timestamp specifies the time when the Echo
Request message is sent.  The first 4 bytes specify the number
of seconds since the Epoch (0000 UTC Jan 1, 1970).  The next 4
bytes specify the number of microseconds since the second
specified in the first 4 bytes.

It would seem to be in the best interests of the Internet if we were to minimize the number of timestamp epochs and formats that we used in our OAM protocols.  Unless there are good reasons to choose a different format, the NTP format shown in Figure 3 of RFC5905 and used in RFC 4379 (see Errata) would seem to be most appropriate.

There is a good case for writing a BCP on the subject of on the wire and in particular OAM timestamps so that there is a reference point for future occasions when the subject arrises.
2011-07-13
09 Stewart Bryant [Ballot Position Update] New position, Discuss, has been recorded
2011-07-13
09 Pete Resnick [Ballot Position Update] New position, No Objection, has been recorded
2011-07-12
09 Russ Housley
[Ballot discuss]
The Gen-ART Review by Suresh Krishnan on 12-Jul 2011 raised two
  concerns that deserve a response.

  * I am not sure …
[Ballot discuss]
The Gen-ART Review by Suresh Krishnan on 12-Jul 2011 raised two
  concerns that deserve a response.

  * I am not sure why this spec needs to contain the options 7 and 8
    as they are not relevant to this version of the protocol. Wouldn't
    the default behavior with unknown options take care of this
    automatically?

  * It would be good if the draft specifies a default TTL (e.g. 64) in
    case the server did not include a TTL option. In this case, the
    server implementations need not bother to add the option if they
    are happy with the default (which I suspect they would be).
2011-07-12
09 Russ Housley [Ballot Position Update] New position, Discuss, has been recorded
2011-07-12
09 Robert Sparks [Ballot Position Update] New position, No Objection, has been recorded
2011-07-12
09 Sean Turner
[Ballot comment]
This is an update comment based on Vincent's SECDIR review (http://www.ietf.org/mail-archive/web/secdir/current/msg02772.html).

#1) Section 3.2 (Server Info, type 6):

1.1) r/Support for …
[Ballot comment]
This is an update comment based on Vincent's SECDIR review (http://www.ietf.org/mail-archive/web/secdir/current/msg02772.html).

#1) Section 3.2 (Server Info, type 6):

1.1) r/Support for this option is optional./Support for this option is OPTIONAL.

1.2) Need a normative reference to UTF-8.

#2) Section 6, If these are really recommendations shouldn't the text be tweaked to use the phrases like "It is RECOMMENDED that ..." Technically, there's no 2119 language in the section.

#3) Section 8, unless you're trying to redefine the meaning of the following: "Message types 0-191 require specification (an RFC or other permanent and readily available reference)," replace it with "Message type 0-191 are registered following the procedures for Specification Required from [RFC5226]," and add a normative reference to RFC 5226 (which is where specification required is defined). X2

#4) Section 8, I think this ought to be a MUST:

  An option specification must describe how
  the option may be used with the known message types.

#5) Section 3.2, Is there a recommendation for the Session ID format?  Maybe a 16-bit or 32-bit field should be recommended?

#6) Section 3.4, When describing the format of the "Server Response, type 83", there should be a note that a Session ID option SHOULD be included, since this is the only way for a server to communicate this option.

#7) Section 4, "Client behaviour": must -> MUST in:

  If the Server Response contained a Session ID, then it
  must also include that, with the exact same value, in the Echo
  Requests.

#8) Section 5: should -> SHOULD in:

  The server should additionally include a Session ID.

#9) Section 9 says:
        "The worst case is if the host receiving the unicast Echo Replies also
        happens to be joined to the multicast group used."

  Yes in case of an ASM session, no in case of an SSM session
  (unless the server is also the SSM source, of course). This should
  be clarified.

#10) Section 9 says:

        "...responding to at most one Echo Request per second."

  It should be clarified that this is one response per second per client.
  BTW, I'm also wondering if there should not be a global rate limitation,
  in addition to the per-client rate limitation.

#11) Section 9 says:

  Rather than saying "how spoofing can be prevented", I'd rather
  say "how spoofing can be mitigated" since spoofing is NOT
  prevented with this approach.

  Note also that an attacker that is on the path between a client
  and a server may eavesdrop the traffic, learn a valid Session ID,
  and if he can use spoofing, he can also continue generating Echo
  Requests until the Session ID validity period times out... A note
  may be added to clarify that this is by no means a definite security
  mechanism.

#12) Section 9, 2nd paragraph:

  It's clear that group management is critical with ASM, and that
  the multicast IP address range used for multicast ping SHOULD be
  disjoint from those used for data sessions. There is no clear
  recommendation though. I suggest to add some text here.

#13) Section 9 says:

        "The main concern is bandwidth."

  Is it really "the main concern"? I'm not sure. Disturbing an ASM
  data session with Echo Response traffic (when feasible) is a serious
  concern, since Echo Response traffic may be misinterpreted by the
  receivers.
2011-07-12
09 Sean Turner
[Ballot discuss]
This is an update discuss based on Vincent's SECDIR review (http://www.ietf.org/mail-archive/web/secdir/current/msg02772.html).

#1) Random #s

The minute you mention random #s a …
[Ballot discuss]
This is an update discuss based on Vincent's SECDIR review (http://www.ietf.org/mail-archive/web/secdir/current/msg02772.html).

#1) Random #s

The minute you mention random #s a reference to RFC 4086 pop in to my mind.  Please tweak the following:

Section 3.2:

Add a reference to [RFC4086] in the following sentence (Client ID):

    The value might be a randomised string that is likely
    to be unique, possibly combined with the client IP address.

Section 5:

Add a reference to [RFC4086] in the following sentence:

  A good Session ID would be a pseudo random
  byte string that is hard to predict.

Section 8:

Please add the following:

  [RFC4086] provides more information on generating
  pseudo-random numbers.

Section 11:

Add a normative reference to RFC 4086

A question:

Section 2 includes the following:

  At runtime, a client generates a client ID that is unique for the
  ping test.

But then there's no requirement in 3.2 about the ID being unique.  Shouldn't there be?

#2) Shouldn't there be something about DoS attacks in the security considerations?

#3) Section 5, "Server Behaviour", says:

  When the server receives an Echo Request message, it may first check
  that the group address and Session ID (if provided) are valid."

  This is a "MUST"!!! If the Session ID is used, the server has no
  choice but checking it during the first processing stages.

#4) Section 5 says:

        "Note that the server may receive Echo Request messages with no prior
        Init message.  This may happen when the server restarts or if a
        client sends an Echo Request with no prior Init message.  The server
        may go ahead and respond if it is okay with the group used.  If the
        group is not okay, the server sends back a Server Response."

  This "may go ahead and respond" is in total contradiction with
  the security recommendations. Using a Session ID is a "SHOULD", and
  it is allowed to ignore this recommendation only in rare circumstances.
  A few ping requests may fail if the server is restarted, sure, but
  this will only be a transitory problem, so it's not a big deal.

  I'm also wondering if the "sends back a Server Response" strategy is
  appropriate. With this "Response", an attacker that spoofs the IP address
  of a target has a way to oblige a server to send back a UDP packet to
  the target. It's questionable.

#5) Section 9 says:

        "The server SHOULD then only respond to Echo
        Request messages that have a valid Session ID associated with the
        source IP address of the Echo Request."

  How should the server behave if the Session ID is not valid?
  This is not clarified whereas this is a critical aspect.
2011-07-11
09 Peter Saint-Andre
[Ballot comment]
I concur with Sean Turner's DISCUSS. Regarding denial of service attacks, reference to RFC 4732 would be helpful (both to formulate appropriate text …
[Ballot comment]
I concur with Sean Turner's DISCUSS. Regarding denial of service attacks, reference to RFC 4732 would be helpful (both to formulate appropriate text and for completeness of the references).
2011-07-11
09 Peter Saint-Andre [Ballot Position Update] New position, No Objection, has been recorded
2011-07-11
09 Sean Turner
[Ballot discuss]
#1) Random #s

The minute you mention random #s a reference to RFC 4086 pop in to my mind.  Please tweak the following: …
[Ballot discuss]
#1) Random #s

The minute you mention random #s a reference to RFC 4086 pop in to my mind.  Please tweak the following:

Section 3.2:

Add a reference to [RFC4086] in the following sentence (Client ID):

    The value might be a randomised string that is likely
    to be unique, possibly combined with the client IP address.

Section 5:

Add a reference to [RFC4086] in the following sentence:

  A good Session ID would be a pseudo random
  byte string that is hard to predict.

Section 8:

Please add the following:

  [RFC4086] provides more information on generating
  pseudo-random numbers.

Section 11:

Add a normative reference to RFC 4086

A question:

Section 2 includes the following:

  At runtime, a client generates a client ID that is unique for the
  ping test.

But then there's no requirement in 3.2 about the ID being unique.  Shouldn't there be?

#2) Shouldn't there be something about DoS attacks in the security considerations?
2011-07-11
09 Sean Turner
[Ballot comment]
#1) Section 3.2 (Server Info, type 6):

1.1) r/Support for this option is optional./Support for this option is OPTIONAL.

1.2) Need a normative …
[Ballot comment]
#1) Section 3.2 (Server Info, type 6):

1.1) r/Support for this option is optional./Support for this option is OPTIONAL.

1.2) Need a normative reference to UTF-8.

#2) Section 6, If these are really recommendations shouldn't the text be tweaked to use the phrases like "It is RECOMMENDED that ..." Technically, there's no 2119 language in the section.

#3) Section 8, unless you're trying to redefine the meaning of the following: "Message types 0-191 require specification (an RFC or other permanent and readily available reference)," replace it with "Message type 0-191 are registered following the procedures for Specification Required from [RFC5226]," and add a normative reference to RFC 5226 (which is where specification required is defined). X2

#4) Section 8, I think this ought to be a MUST:

  An option specification must describe how
  the option may be used with the known message types.
2011-07-11
09 Sean Turner
[Ballot discuss]
#1) Random #s

The minute you mention random #s a reference to RFC 4086 pop in to my mind.  Please tweak the following: …
[Ballot discuss]
#1) Random #s

The minute you mention random #s a reference to RFC 4086 pop in to my mind.  Please tweak the following:

Section 3.2:

Add a reference to [RFC4086] in the following sentence (Client ID):

    The value might be a randomised string that is likely
    to be unique, possibly combined with the client IP address.

Section 5:

Add a reference to [RFC4086] in the following sentence:

  A good Session ID would be a pseudo random
  byte string that is hard to predict.

Section 8:

Please add the following:

  [RFC4086] provides more information on generating
  pseudo-random numbers.

Section 11:

Add a normative reference to RFC 4086

A question:

Section Section 2 includes the following:

  At runtime, a client generates a client ID that is unique for the
  ping test.

But then there's no requirement in 3.2 about the ID being unique.  Shouldn't there be?

#2) Shouldn't there be something about DoS attacks in the security considerations?
2011-07-11
09 Sean Turner [Ballot Position Update] New position, Discuss, has been recorded
2011-07-06
09 Wesley Eddy Request for Last Call review by TSVDIR Completed. Reviewer: Scott Bradner.
2011-07-05
09 Ron Bonica State changed to IESG Evaluation from Waiting for AD Go-Ahead.
2011-07-04
09 (System) State changed to Waiting for AD Go-Ahead from In Last Call.
2011-06-29
09 David Harrington Request for Last Call review by TSVDIR is assigned to Scott Bradner
2011-06-29
09 David Harrington Request for Last Call review by TSVDIR is assigned to Scott Bradner
2011-06-22
09 Wesley Eddy
[Ballot comment]
Section 1 should really be more to the point about what
this document's purpose is.  It specifies a way to send
packets to …
[Ballot comment]
Section 1 should really be more to the point about what
this document's purpose is.  It specifies a way to send
packets to a unicast address which elicit responses to
both a unicast and a multicast addresses, yet never says
that so clearly until midway through section 2.
2011-06-22
09 Wesley Eddy
[Ballot discuss]
in section 2, there's discussion of rate limiting and
mention of a one request per second per IP address limit.
This is a …
[Ballot discuss]
in section 2, there's discussion of rate limiting and
mention of a one request per second per IP address limit.
This is a bit of a heuristic, and should be described as
such.  It is not necessarily ideal for all networks and
configurations and may err on either the too conservative
or too aggressive sides depending on several variables.
2011-06-22
09 Wesley Eddy [Ballot Position Update] New position, Discuss, has been recorded
2011-06-20
09 Cindy Morgan Last call sent
2011-06-20
09 Cindy Morgan
State changed to In Last Call from Last Call Requested.

The following Last Call Announcement was sent out:

From: The IESG
To: IETF-Announce
CC:
Reply-To: …
State changed to In Last Call from Last Call Requested.

The following Last Call Announcement was sent out:

From: The IESG
To: IETF-Announce
CC:
Reply-To: ietf@ietf.org
Subject: Last Call:  (Multicast Ping Protocol) to Proposed Standard


The IESG has received a request from the MBONE Deployment WG (mboned) to
consider the following document:
- 'Multicast Ping Protocol'
  as a Proposed Standard

The IESG plans to make a decision in the next few weeks, and solicits
final comments on this action. Please send substantive comments to the
ietf@ietf.org mailing lists by 2011-07-04. Exceptionally, comments may be
sent to iesg@ietf.org instead. In either case, please retain the
beginning of the Subject line to allow automated sorting.

Abstract


The Multicast Ping Protocol specified in this document allows for
checking whether an endpoint can receive multicast, both Source-
Specific Multicast (SSM) and Any-Source Multicast (ASM).  It can also
be used to obtain additional multicast-related information such as
multicast tree setup time.  This protocol is based on an
implementation of tools called ssmping and asmping.



The file can be obtained via
http://datatracker.ietf.org/doc/draft-ietf-mboned-ssmping/

IESG discussion can be tracked via
http://datatracker.ietf.org/doc/draft-ietf-mboned-ssmping/


No IPR declarations have been submitted directly on this I-D.


2011-06-20
09 Ron Bonica Telechat date has been changed to 2011-07-14 from 2011-06-23
2011-06-20
09 Ron Bonica Last Call was requested
2011-06-20
09 Ron Bonica State changed to Last Call Requested from AD Evaluation.
2011-06-17
09 Samuel Weiler Request for Telechat review by SECDIR is assigned to Vincent Roca
2011-06-17
09 Samuel Weiler Request for Telechat review by SECDIR is assigned to Vincent Roca
2011-06-17
09 Ron Bonica Ballot has been issued
2011-06-16
09 Amanda Baber
Upon approval of this document, IANA understands that there are three
IANA Actions that must be completed.

First, a user registered port number will be …
Upon approval of this document, IANA understands that there are three
IANA Actions that must be completed.

First, a user registered port number will be assigned to "Multicast
Ping" with a short name of mcastping, and for UDP only.

Second, a new registry will be created for "Multicast Ping Message
Types." Message types are in the range 0-255. Message types 0-191
require specification (an RFC or other permanent and readily available
reference), while types 192-255 are for experimental use and are not
registered. The registry is managed through IETF Specification Required.
There are initial values to be added to the Multicast Ping Message Types
registry as follows:

Registry Name: Multicast Ping Protocol Message Types
Reference: [ RFC-to-be ]
Registration Procedures: Specification Required

Registry:
Type Name Reference
----------- ------------------------------------ -------------
65 Echo Reply [ RFC-to-be ]
73 Init [ RFC-to-be ]
81 Echo Request [ RFC-to-be ]
83 Server Response [ RFC-to-be ]
192-255 Experimental

Third, a new registry will be created for "Multicast Ping Option Types."
Option types 0-49151 require specification (an RFC or other permanent
and readily available reference), while types 49152-65535 are for
experimental use and are not registered. The registry is managed through
IETF Specification Required. There are initial values to be added to the
Multicast Ping Option Types registry as follows:

Registry Name: Multicast Ping Protocol Option Types
Reference: [ RFC-to-be ]
Registration Procedures: Specification Required

Registry:
Type Name Reference
----------- ------------------------------------ -------------
0 Version [ RFC-to-be ]
1 Client ID [ RFC-to-be ]
2 Sequence Number [ RFC-to-be ]
3 Client Timestamp [ RFC-to-be ]
4 Multicast Group [ RFC-to-be ]
5 Option Request Option [ RFC-to-be ]
6 Server Information [ RFC-to-be ]
7 Reserved [ RFC-to-be ]
8 Reserved [ RFC-to-be ]
9 TTL [ RFC-to-be ]
10 Multicast Prefix [ RFC-to-be ]
11 Session ID [ RFC-to-be ]
12 Server Timestamp [ RFC-to-be ]
49152-65535 Experimental

IANA understands that these three actions are the only ones required
upon approval of the document.
2011-06-10
09 Ron Bonica Placed on agenda for telechat - 2011-06-23
2011-06-10
09 Ron Bonica State changed to AD Evaluation from Publication Requested.
2011-06-10
09 Ron Bonica [Ballot Position Update] New position, Yes, has been recorded for Ronald Bonica
2011-06-10
09 Ron Bonica Ballot has been issued
2011-06-10
09 Ron Bonica Created "Approve" ballot
2011-06-10
09 (System) Ballot writeup text was added
2011-06-10
09 (System) Last call text was added
2011-06-10
09 (System) Ballot approval text was added
2011-05-31
09 Cindy Morgan Area acronym has been changed to ops from gen
2010-12-06
09 Cindy Morgan Draft added in state Publication Requested
2010-03-04
08 (System) New version available: draft-ietf-mboned-ssmping-08.txt
2008-12-02
07 (System) New version available: draft-ietf-mboned-ssmping-07.txt
2008-11-03
06 (System) New version available: draft-ietf-mboned-ssmping-06.txt
2008-09-18
05 (System) New version available: draft-ietf-mboned-ssmping-05.txt
2008-02-21
04 (System) New version available: draft-ietf-mboned-ssmping-04.txt
2008-02-12
03 (System) New version available: draft-ietf-mboned-ssmping-03.txt
2007-11-19
02 (System) New version available: draft-ietf-mboned-ssmping-02.txt
2007-07-11
01 (System) New version available: draft-ietf-mboned-ssmping-01.txt
2007-05-23
00 (System) New version available: draft-ietf-mboned-ssmping-00.txt