Updated Specification of the IPv4 ID Field
RFC 6864
Revision differences
Document history
Date | Rev. | By | Action |
---|---|---|---|
2016-11-30
|
07 | Martin Stiemerling | Closed request for Last Call review by TSVDIR with state 'Unknown' |
2016-11-30
|
07 | (System) | Closed request for Last Call review by GENART with state 'Unknown' |
2015-10-14
|
07 | (System) | Notify list changed from intarea-chairs@ietf.org, draft-ietf-intarea-ipv4-id-update.notify@ietf.org to draft-ietf-intarea-ipv4-id-update.notify@ietf.org |
2013-02-09
|
07 | (System) | RFC published |
2012-12-14
|
07 | Amy Vezza | State changed to RFC Ed Queue from Approved-announcement sent |
2012-12-13
|
07 | (System) | IANA Action state changed to No IC |
2012-12-13
|
07 | Cindy Morgan | State changed to Approved-announcement sent from IESG Evaluation::AD Followup |
2012-12-13
|
07 | Cindy Morgan | IESG has approved the document |
2012-12-13
|
07 | Cindy Morgan | Closed "Approve" ballot |
2012-12-13
|
07 | Cindy Morgan | Ballot approval text was generated |
2012-12-12
|
07 | Brian Haberman | Ballot writeup was changed |
2012-11-27
|
07 | (System) | Sub state has been changed to AD Followup from Revised ID Needed |
2012-11-27
|
07 | Joseph Touch | New version available: draft-ietf-intarea-ipv4-id-update-07.txt |
2012-11-26
|
06 | Brian Haberman | State changed to IESG Evaluation::Revised ID Needed from IESG Evaluation::AD Followup |
2012-11-04
|
06 | Stewart Bryant | [Ballot comment] The authors have addressed my original concerns largely by providing better context for their proposed changes and thus I am clearing my discuss. … [Ballot comment] The authors have addressed my original concerns largely by providing better context for their proposed changes and thus I am clearing my discuss. There is however one other concern that I am trying to get my head around, but as I am unable to fully articulate it, and as I did not pick this up the first time I only log it is only a comment. I leave it to the Author/AD to decide what action (if any) to take. Although it is an axiom of IP networking that packets may be misordered, this is, at least in most networks, a very rare event. Routers work hard not to re-order packets, and networks are normally very stable. Thus de facto packets normally arrive strictly in order, and almost emulate a circuit switch in this regard. Hence the constant ID value is not, in practice, of any great importance. Re-ordering really only arises during a routing (or virtual physical layer) event. When a failure occurs, the normal case is (a) a number of packets are often lost and (b) the outage is normally long compared to the inter-fragment pair delay. Even so the normal case is that the new path is longer than the old path, the application is normally disrupted by packet lost, but if not, order is usually maintained anyway. What is interesting is the case where we shorten the outage time through fast reroute and the new path is shorter, here I would expect to see occasional misordering of fragments. Note that you may also get a misorder when the path is restored because the restored path is usually shorter and less congested than the path in use at that point, but most routing networks handle restoration in much the same way as outage and one may well see packet loss that disrupts the application. The text is silent on the issue of the interaction between the IP layer and the routing layer and the transport network (virtual physical) layer, but I think it likely that those systems that use constant ID are largely saved by the in-order and reliability properties of modern networks, with reassembly errors that are so rare they are usually passed off as something else. It is possibly worth some text on this layer interaction since we rarely consider it much, and it might be useful if the reader interested in the IP layer was reminded of the properties of the packet path provided by the network layer process and of the virtual physical layers we now use. |
2012-11-04
|
06 | Stewart Bryant | [Ballot Position Update] Position for Stewart Bryant has been changed to No Objection from Discuss |
2012-11-01
|
06 | Ralph Droms | [Ballot comment] Thank you for addressing my Discuss and Comment points. |
2012-11-01
|
06 | Ralph Droms | [Ballot Position Update] Position for Ralph Droms has been changed to No Objection from Discuss |
2012-10-09
|
06 | (System) | Sub state has been changed to AD Followup from Revised ID Needed |
2012-10-09
|
06 | Joseph Touch | New version available: draft-ietf-intarea-ipv4-id-update-06.txt |
2012-09-06
|
05 | Adrian Farrel | [Ballot comment] I understand why this document was written, and support the intent of clarifying what is really in the wild. Furthermore, such documentation will … [Ballot comment] I understand why this document was written, and support the intent of clarifying what is really in the wild. Furthermore, such documentation will facilitate future interoperability and stability. My concern was that this change in definition of the specification would impact existing deployed implementations that depended on or used other interpretation of the ID. I am persuaded that there is such a significant base of implementations that already act according to what is described in this new document that "old" implementations would already be experiencing interoperability problems. Thus, I support this work. (I look forward to the revision that adds clarification of this point) |
2012-09-06
|
05 | Adrian Farrel | Ballot comment text updated for Adrian Farrel |
2012-07-05
|
05 | Samuel Weiler | Request for Telechat review by SECDIR Completed: Ready. Reviewer: Stephen Kent. |
2012-07-05
|
05 | Cindy Morgan | State changed to IESG Evaluation::Revised ID Needed from IESG Evaluation |
2012-07-05
|
05 | Gonzalo Camarillo | [Ballot Position Update] New position, No Objection, has been recorded for Gonzalo Camarillo |
2012-07-05
|
05 | Robert Sparks | [Ballot comment] In section 8.3's update to RFC2003, consider saying "as permitted by RFCXXXX" instead of "as permitted by this document" to avoid any … |
2012-07-05
|
05 | Robert Sparks | [Ballot Position Update] New position, No Objection, has been recorded for Robert Sparks |
2012-07-05
|
05 | Adrian Farrel | [Ballot comment] I understand why this document was written, and support the intent of clarifying what is really in the wild. However, this document worries … [Ballot comment] I understand why this document was written, and support the intent of clarifying what is really in the wild. However, this document worries me for the reasons listed in Stewart's Discuss. Thus, I support Stewart's Discuss. But my concerns would be satisfied if the authors would consider repositioning the document as an applicability or informational document that describes what some implementations do in order to support faster line speeds? |
2012-07-05
|
05 | Adrian Farrel | [Ballot Position Update] New position, No Objection, has been recorded for Adrian Farrel |
2012-07-04
|
05 | Ralph Droms | [Ballot discuss] 1. Throughout this document, "MSL" is confused with "time the datagram (or any fragment of it) could be alive in the internet" (from … [Ballot discuss] 1. Throughout this document, "MSL" is confused with "time the datagram (or any fragment of it) could be alive in the internet" (from RFC 791) or "typical maximum delay across the Internet" (from RFC 1122). While the TCP MSL "sets an upper limit on a reasonable reassembly timeout value" (from RFC 1122), there is no mention of "MSL" in RFC 791 and there is no explicit discussion of the uniqueness properties of the ID field in RFC 1122. For clarity and correctness, I would like the description of the ID field in the Introduction to quote the text from RFC 791, with no mention of "MSL", and the discussion of the speed limits - esp. the 6.4 Mbps number - to be replaced with a simple pointer to RFC 4963, which has a more complete and accurate discussion of the topic. I also think section 5 can simply be omitted. The details are unimportant in this document (and I consider the document to be misleading about the details). All that needs to be concluded is that high speed interfaces have to violate the uniqueness requirement, even for maximum delays across the Interent of 1 second. All other references to "MSL" should be replaced, perhaps with "maximum datagram lifetime". 2. This requirement in section 6.3 does NOT derive exactly as stated from RFC 791: >> Sources emitting non-atomic datagrams MUST NOT repeat IPv4 ID values within one MSL for a given source address/destination address/protocol triple. The actual requirement, quoted elsewhere in the document, makes no direct reference to "MSL". |
2012-07-04
|
05 | Ralph Droms | [Ballot comment] 1. In this text from section 4: The IPv4 ID field can be useful for other purposes. The field has been … [Ballot comment] 1. In this text from section 4: The IPv4 ID field can be useful for other purposes. The field has been proposed as a way to detect and remove duplicate datagrams, e.g., at congested routers (noted in Sec. 3.2.1.5 of [RFC1122]) or in network accelerators. It can similarly be used at end hosts to reduce the impact of duplication on higher-layer protocols (e.g., additional processing in TCP, or the need for application-layer duplicate suppression in UDP). Is the ID field actually used in the ways suggested? 2. In section 9.2: Some such devices reportedly feature datagram de-duplication, which relies on IP ID uniqueness to identify duplicates. Normally, I wouldn't raise a pedantic fuss about "which" versus "that". But, in this case, I think it's important because the following sentence is, I think, correct while the sentence about is not: Some such devices reportedly feature datagram de-duplication that relies on IP ID uniqueness to identify duplicates. |
2012-07-04
|
05 | Ralph Droms | [Ballot Position Update] New position, Discuss, has been recorded for Ralph Droms |
2012-07-03
|
05 | Russ Housley | [Ballot Position Update] New position, No Objection, has been recorded for Russ Housley |
2012-07-03
|
05 | Pete Resnick | [Ballot comment] I share Stewart's concern about the lack of data to support this document. The document does not have a section on how current … [Ballot comment] I share Stewart's concern about the lack of data to support this document. The document does not have a section on how current implementations actually do this, and that lack is worrying. (The shepherd writeup has *no* information on implementation, and that's a problem. The shepherd should have asked.) All things being equal, I would have silently balloted "No Objection", but I given his comments, I do support Stewart's DISCUSS. |
2012-07-03
|
05 | Pete Resnick | [Ballot Position Update] New position, No Objection, has been recorded for Pete Resnick |
2012-07-03
|
05 | Stewart Bryant | [Ballot discuss] RFC791 is one of the most fundamental protocols in the Internet that is now 31 years old, and I do not think that … [Ballot discuss] RFC791 is one of the most fundamental protocols in the Internet that is now 31 years old, and I do not think that it should be changed (or clarified) unless there is some major issue that jeopardizes the operation of the Internet. The author makes a case for housekeeping, but does not make a case that we have a catastrophic problem that demands addressing. I am therefore concerned that publishing this is an unnecessary risk to the Internet. My rational for the above is that we have no idea of the behavior of all of the applications and protocols in the wild, and can never be completely sure that there will be no unforeseen consequences of the proposed changes in this draft. The following are some examples that bare further thought given the fundamental nature of IPv4. ">> IPv4 ID field MUST NOT be used for purposes other than fragmentation and reassembly." ">> All devices that examine IPv4 headers MUST ignore the IPv4 ID field of atomic datagrams. We have no idea what this field might be used for in atomic packets and hence we cannot be sure we are making some application non-compliant. "Deprecating the use of the IPv4 ID field for non-reassembly uses should have little - if any - impact." For a protocol this fundamental to the Internet, "should" is insufficient. ">> Sources of non-atomic IPv4 datagrams MUST rate-limit their output to comply with the ID uniqueness requirements." What is the situation today - do all existing, functioning devices comply with this rule? " o IPv4 ID uniqueness applies to only non-atomic datagrams." " o Retransmitted non-atomic IPv4 datagrams are no longer permitted to reuse the ID value." "o Retransmitted non-atomic IPv4 datagrams are no longer permitted to reuse the ID value." Can we be sure that there is no protocol anywhere on the Internet, using atomic datagrams, that is also using the feature being deprecated? " >> Datagram de-duplication mechanisms MUST ignore the ID values on atomic datagrams." Are we certain that no device used this feature for anything? |
2012-07-03
|
05 | Stewart Bryant | [Ballot comment] In IPv4, the Identification (ID) field is a 16-bit value that is unique for every datagram for a given source address, destination address, … [Ballot comment] In IPv4, the Identification (ID) field is a 16-bit value that is unique for every datagram for a given source address, destination address, and protocol, such that it does not repeat within the Maximum Segment Lifetime (MSL) [RFC791][RFC1122]. As currently specified, all datagrams between a source and destination of a given protocol must have unique IPv4 ID values over a period of this MSL, which is typically interpreted as two minutes (120 seconds). I just could looked at RFC791 and RFC1122, and as far as I can see RFC791 does not say two mins and RFC1122 is quoting from TCP which it notes is arbitrary. |
2012-07-03
|
05 | Stewart Bryant | [Ballot Position Update] New position, Discuss, has been recorded for Stewart Bryant |
2012-07-03
|
05 | Ron Bonica | [Ballot Position Update] New position, Yes, has been recorded for Ronald Bonica |
2012-07-03
|
05 | Sean Turner | [Ballot comment] As noted in Steve Kent's secdir review, the security considerations section should indicate whether the change proposed in this document may adversely affect … [Ballot comment] As noted in Steve Kent's secdir review, the security considerations section should indicate whether the change proposed in this document may adversely affect availability, if middleboxes are not updated to account for this change. |
2012-07-03
|
05 | Sean Turner | [Ballot Position Update] New position, No Objection, has been recorded for Sean Turner |
2012-07-02
|
05 | Wesley Eddy | [Ballot Position Update] New position, Yes, has been recorded for Wesley Eddy |
2012-07-02
|
05 | Martin Stiemerling | [Ballot Position Update] New position, No Objection, has been recorded for Martin Stiemerling |
2012-07-02
|
05 | Stephen Farrell | [Ballot comment] Minor comments, feel free to take 'em or leave 'em. (Updated: I'd forgotten to note the secdir review.) - A reference for a … [Ballot comment] Minor comments, feel free to take 'em or leave 'em. (Updated: I'd forgotten to note the secdir review.) - A reference for a hash-based de-duplication scheme mentioned in 6.1 might be useful, even if only as an illustration. - The reference to SEAL (RFC 5320) is a bit unclear. You have a "SHOULD verify integrity" requirement but then say "as in SEAL." I'm not clear if you're saying that SEAL is a SHOULD, and if you are, then would that be ok? (SEAL being an experimental RFC.) I assume that you don't mean SEAL is a SHOULD-implement though, and since its given as an example in the next para, I think you could delete the reference from the SHOULD requirement bullet in section 7. - The discussion of entropy in section 11 is a little opaque, you could say why the entropy of a datagram is interesting. (Is it that people sometimes use datagram fields to seen PRNGs?). Steve Kent's secdir review [1] also suggested maybe changing or removing this. [1] http://www.ietf.org/mail-archive/web/secdir/current/msg03358.html - Typo: s/now adds much less entropy of the header/ now adds much less to the entropy of the header/? |
2012-07-02
|
05 | Stephen Farrell | Ballot comment text updated for Stephen Farrell |
2012-07-02
|
05 | Stephen Farrell | [Ballot comment] Minor comments, feel free to take 'em or leave 'em. (Updated: I'd forgottent to note the secdir review.) - A reference for a … [Ballot comment] Minor comments, feel free to take 'em or leave 'em. (Updated: I'd forgottent to note the secdir review.) - A reference for a hash-based de-duplication scheme mentioned in 6.1 might be useful, even if only as an illustration. - The reference to SEAL (RFC 5320) is a bit unclear. You have a "SHOULD verify integrity" requirement but then say "as in SEAL." I'm not clear if you're saying that SEAL is a SHOULD, and if you are, then would that be ok? (SEAL being an experimental RFC.) I assume that you don't mean SEAL is a SHOULD-implement though, and since its given as an example in the next para, I think you could delete the reference from the SHOULD requirement bullet in section 7. - The discussion of entropy in section 11 is a little opaque, you could say why the entropy of a datagram is interesting. (Is it that people sometimes use datagram fields to seen PRNGs?). Steve Kent's secdir review [1] also suggested maybe changing or removing this. [1] http://www.ietf.org/mail-archive/web/secdir/current/msg03358.html - Typo: s/now adds much less entropy of the header/ now adds much less to the entropy of the header/? |
2012-07-02
|
05 | Stephen Farrell | Ballot comment text updated for Stephen Farrell |
2012-07-02
|
05 | Stephen Farrell | [Ballot comment] Minor comments, feel free to take 'em or leave 'em. - A reference for a hash-based de-duplication scheme mentioned in 6.1 might be … [Ballot comment] Minor comments, feel free to take 'em or leave 'em. - A reference for a hash-based de-duplication scheme mentioned in 6.1 might be useful, even if only as an illustration. - The reference to SEAL (RFC 5320) is a bit unclear. You have a "SHOULD verify integrity" requirement but then say "as in SEAL." I'm not clear if you're saying that SEAL is a SHOULD, and if you are, then would that be ok? (SEAL being an experimental RFC.) I assume that you don't mean SEAL is a SHOULD-implement though, and since its given as an example in the next para, I think you could delete the reference from the SHOULD requirement bullet in section 7. - The discussion of entropy in section 11 is a little opaque, you could say why the entropy of a datagram is interesting. (Is it that people sometimes use datagram fields to seen PRNGs?). - Typo: s/now adds much less entropy of the header/ now adds much less to the entropy of the header/? |
2012-07-02
|
05 | Stephen Farrell | [Ballot Position Update] New position, No Objection, has been recorded for Stephen Farrell |
2012-06-30
|
05 | Barry Leiba | [Ballot comment] Very clear, understandable document. Thanks. |
2012-06-30
|
05 | Barry Leiba | [Ballot Position Update] New position, Yes, has been recorded for Barry Leiba |
2012-06-28
|
05 | Samuel Weiler | Request for Telechat review by SECDIR is assigned to Stephen Kent |
2012-06-28
|
05 | Samuel Weiler | Request for Telechat review by SECDIR is assigned to Stephen Kent |
2012-06-25
|
05 | Brian Haberman | Placed on agenda for telechat - 2012-07-05 |
2012-06-25
|
05 | Brian Haberman | Ballot has been issued |
2012-06-25
|
05 | Brian Haberman | [Ballot Position Update] New position, Yes, has been recorded for Brian Haberman |
2012-06-25
|
05 | Brian Haberman | Created "Approve" ballot |
2012-06-25
|
05 | Brian Haberman | State changed to IESG Evaluation from Waiting for AD Go-Ahead |
2012-06-21
|
05 | Martin Stiemerling | Request for Last Call review by TSVDIR is assigned to Matt Mathis |
2012-06-21
|
05 | Martin Stiemerling | Request for Last Call review by TSVDIR is assigned to Matt Mathis |
2012-06-18
|
05 | Pearl Liang | IANA has reviewed draft-ietf-intarea-ipv4-id-update-05 and has the following comments: IANA understands that, upon approval of this document, there are no IANA Actions that need completion. |
2012-06-14
|
05 | (System) | State changed to Waiting for AD Go-Ahead from In Last Call |
2012-05-31
|
05 | Jean Mahoney | Request for Last Call review by GENART is assigned to Wassim Haddad |
2012-05-31
|
05 | Jean Mahoney | Request for Last Call review by GENART is assigned to Wassim Haddad |
2012-05-31
|
05 | Julien Laganier | IETF state changed to Submitted to IESG for Publication from WG Document |
2012-05-31
|
05 | Julien Laganier | Annotation tags Awaiting Expert Review/Resolution of Issues Raised, Revised I-D Needed - Issue raised by WGLC cleared. |
2012-05-31
|
05 | Amy Vezza | The following Last Call announcement was sent out: From: The IESG To: IETF-Announce CC: Reply-To: ietf@ietf.org Subject: Last Call: (Updated Specification of the IPv4 ID … The following Last Call announcement was sent out: From: The IESG To: IETF-Announce CC: Reply-To: ietf@ietf.org Subject: Last Call: (Updated Specification of the IPv4 ID Field) to Proposed Standard The IESG has received a request from the Internet Area Working Group WG (intarea) to consider the following document: - 'Updated Specification of the IPv4 ID Field' as Proposed Standard The IESG plans to make a decision in the next few weeks, and solicits final comments on this action. Please send substantive comments to the ietf@ietf.org mailing lists by 2012-06-14. Exceptionally, comments may be sent to iesg@ietf.org instead. In either case, please retain the beginning of the Subject line to allow automated sorting. Abstract The IPv4 Identification (ID) field enables fragmentation and reassembly, and as currently specified is required to be unique within the maximum lifetime for all datagrams with a given source/destination/protocol tuple. If enforced, this uniqueness requirement would limit all connections to 6.4 Mbps. Because individual connections commonly exceed this speed, it is clear that existing systems violate the current specification. This document updates the specification of the IPv4 ID field in RFC791, RFC1122, and RFC2003 to more closely reflect current practice and to more closely match IPv6 so that the field's value is defined only when a datagram is actually fragmented. It also discusses the impact of these changes on how datagrams are used. The file can be obtained via http://datatracker.ietf.org/doc/draft-ietf-intarea-ipv4-id-update/ IESG discussion can be tracked via http://datatracker.ietf.org/doc/draft-ietf-intarea-ipv4-id-update/ballot/ No IPR declarations have been submitted directly on this I-D. |
2012-05-31
|
05 | Julien Laganier | in IETF Last Call |
2012-05-31
|
05 | Amy Vezza | State changed to In Last Call from Last Call Requested |
2012-05-31
|
05 | Amy Vezza | Last call announcement was generated |
2012-05-31
|
05 | Brian Haberman | Last call was requested |
2012-05-31
|
05 | Brian Haberman | State changed to Last Call Requested from AD Evaluation::AD Followup |
2012-05-30
|
05 | Brian Haberman | Ballot approval text was generated |
2012-05-30
|
05 | Brian Haberman | Last call announcement was generated |
2012-05-30
|
05 | Brian Haberman | Ballot writeup was changed |
2012-05-30
|
05 | (System) | Sub state has been changed to AD Followup from Revised ID Needed |
2012-05-30
|
05 | Joseph Touch | New version available: draft-ietf-intarea-ipv4-id-update-05.txt |
2012-05-07
|
04 | Brian Haberman | State changed to AD Evaluation::Revised ID Needed from AD Evaluation |
2012-05-07
|
04 | Brian Haberman | All, I have performed the AD review for draft-ietf-intarea-ipv4-id-update-04.txt. I have a few comments that I would like addressed before this draft proceeds... … All, I have performed the AD review for draft-ietf-intarea-ipv4-id-update-04.txt. I have a few comments that I would like addressed before this draft proceeds... * Section 3 states that the IPv6 fragmentation header is only present when a datagram has been fragmented. Section 5 of RFC 2460 allows atomic fragments to carry a fragmentation header in the scenario where a Packet-Too-Big ICMPv6 message has been received for an MTU smaller than 1280 and the packet is subject to translation. This means that there are atomic IPv6 packets that carry a fragmentation header. * Section 4 : I am curious as to what impact you think this document will have with trying to restrict the non-fragmentation use of the ID field. With many of those types of tools around (and people trying to standardize a persistent ID for IPv6 packets), what impact will this document really have? * Section 5 - 2nd paragraph : The use of the 120 second MSL value is misleading. First of all, the 120 seconds is specified as the MSL for TCP, not any other transport protocol. Secondly, my understanding is that implementations use RTT computations to determine when a segment has been lost, not a static MSL timer. The MSL is tunable in a variety of implementations when they are applied to teardown states (e.g., TIME-WIAT). As noted in the draft, implementations are doing something outside of what is specified in RFC 791 to manage their ID values and that is to be expected given the evolution. - 4th paragraph : I am not aware of any routers that actually apply any type of time component to the management of a packet's TTL. * Section 6 presents the classification of atomic and non-atomic packets in a mathematical framework. That framework is not used anywhere else, so I don't see the benefit of the section. * Section 6.1 - The discussion of SMF's use of the ID field is obsolete. The SMF draft (now in the RFC Editor's queue) does not rely on the ID field for any of its packet identification. - The "o >>" notation in the lists is clumsy. I would suggest changing it to strictly ">>" or some other single list icon. * Section 6.3 tries to state the requirements defined in 791 that were not changed. I do not understand why they are restated in terms of 2119 keywords. To me, that is imparting someone's interpretation of the 791 rules. * Section 8.3 discusses the updates to RFC 2003. Why does this section not warrant an itemized list of changes to 2003 like the previous two sections that discuss changes to 791 and 1122? |
2012-05-03
|
04 | Brian Haberman | State Change Notice email list changed to intarea-chairs@tools.ietf.org, draft-ietf-intarea-ipv4-id-update.notify@tools.ietf.org from intarea-chairs@tools.ietf.org, draft-ietf-intarea-ipv4-id-update@tools.ietf.org |
2012-05-03
|
04 | Brian Haberman | Changed protocol writeup |
2012-03-30
|
04 | Brian Haberman | Responsible AD changed to Brian Haberman from Jari Arkko |
2012-01-11
|
04 | (System) | Ballot writeup text was added |
2012-01-11
|
04 | (System) | Last call text was added |
2012-01-11
|
04 | (System) | Ballot approval text was added |
2012-01-11
|
04 | Jari Arkko | Ballot writeup text changed |
2012-01-11
|
04 | Jari Arkko | State changed to AD Evaluation from Publication Requested. |
2011-10-24
|
04 | Amy Vezza | (1.a) Who is the Document Shepherd for this document? Has the Document Shepherd personally reviewed this version of the … (1.a) Who is the Document Shepherd for this document? Has the Document Shepherd personally reviewed this version of the document and, in particular, does he or she believe this version is ready for forwarding to the IESG for publication? The Document Shepherd is Julien Laganier, INTAREA co-chair. He has personally done a thorough review of the document. He believe the document is ready for forwarding to IESG for publication. (1.b) Has the document had adequate review both from key WG members and from key non-WG members? Does the Document Shepherd have any concerns about the depth or breadth of the reviews that have been performed? The document was given adequate reviews. The Document Shepherd has no concerns about the depth or breadth of these reviews. (1.c) Does the Document Shepherd have concerns that the document needs more review from a particular or broader perspective, e.g., security, operational complexity, someone familiar with AAA, internationalization or XML? The Document Shepherd has no such concerns. (1.d) Does the Document Shepherd have any specific concerns or issues with this document that the Responsible Area Director and/or the IESG should be aware of? For example, perhaps he or she is uncomfortable with certain parts of the document, or has concerns whether there really is a need for it. In any event, if the WG has discussed those issues and has indicated that it still wishes to advance the document, detail those concerns here. Has an IPR disclosure related to this document been filed? If so, please include a reference to the disclosure and summarize the WG discussion and conclusion on this issue. The Document Shepherd has no such concerns. (1.e) How solid is the WG consensus behind this document? Does it represent the strong concurrence of a few individuals, with others being silent, or does the WG as a whole understand and agree with it? There is WG consensus behind this document. (1.f) Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarise the areas of conflict in separate email messages to the Responsible Area Director. (It should be in a separate email because this questionnaire is entered into the ID Tracker.) No. (1.g) Has the Document Shepherd personally verified that the document satisfies all ID nits? (See the Internet-Drafts Checklist and http://tools.ietf.org/tools/idnits/). Boilerplate checks are not enough; this check needs to be thorough. Has the document met all formal review criteria it needs to, such as the MIB Doctor, media type and URI type reviews? Yes. (1.h) Has the document split its references into normative and informative? Are there normative references to documents that are not ready for advancement or are otherwise in an unclear state? If such normative references exist, what is the strategy for their completion? Are there normative references that are downward references, as described in [RFC3967]? If so, list these downward references to support the Area Director in the Last Call procedure for them [RFC3967]. The document has split its references into normative and informative. There are neither normative references in an unclear state, nor downward references. (1.i) Has the Document Shepherd verified that the document IANA consideration section exists and is consistent with the body of the document? If the document specifies protocol extensions, are reservations requested in appropriate IANA registries? Are the IANA registries clearly identified? If the document creates a new registry, does it define the proposed initial contents of the registry and an allocation procedure for future registrations? Does it suggest a reasonable name for the new registry? See [RFC5226]. If the document describes an Expert Review process has Shepherd conferred with the Responsible Area Director so that the IESG can appoint the needed Expert during the IESG Evaluation? The document has an IANA considerations sections that correctly state that the document does not need IANA actions. (1.j) Has the Document Shepherd verified that sections of the document that are written in a formal language, such as XML code, BNF rules, MIB definitions, etc., validate correctly in an automated checker? There are no such sections. (1.k) The IESG approval announcement includes a Document Announcement Write-Up. Please provide such a Document Announcement Write-Up? Recent examples can be found in the "Action" announcements for approved documents. The approval announcement contains the following sections: Technical Summary The IPv4 Identification (ID) field enables fragmentation and reassembly, and as currently specified is required to be unique within the maximum lifetime for all datagrams with a given source/destination/protocol tuple. If enforced, this uniqueness requirement would limit all connections to 6.4 Mbps. Because individual connections commonly exceed this speed, it is clear that existing systems violate the current specification. This document updates the specification of the IPv4 ID field in RFC791, RFC1122, and RFC2003 to more closely reflect current practice and to more closely match IPv6 so that the field's value is defined only when a datagram is actually fragmented. It also discusses the impact of these changes on how datagrams are used. Working Group Summary The normal WG process was followed and the document as it stands now reflects WG consensus with nothing special worth mentioning. Document Quality The document was given adequate reviews. The Document Shepherd has no concerns about the depth or breadth of these reviews. |
2011-10-24
|
04 | Amy Vezza | Draft added in state Publication Requested |
2011-10-24
|
04 | Amy Vezza | [Note]: 'The Document Shepherd is Julien Laganier (julien.ietf@gmail.com).' added |
2011-09-16
|
04 | (System) | New version available: draft-ietf-intarea-ipv4-id-update-04.txt |
2011-09-15
|
03 | (System) | New version available: draft-ietf-intarea-ipv4-id-update-03.txt |
2011-07-18
|
04 | Julien Laganier | Needs update to address Erik Nordmark and Mike Heard. |
2011-07-18
|
04 | Julien Laganier | Annotation tag Revised I-D Needed - Issue raised by WGLC set. |
2011-06-23
|
04 | Julien Laganier | Need an update that resolve's Erik Nordmark's comment. |
2011-06-23
|
04 | Julien Laganier | Annotation tag Awaiting Expert Review/Resolution of Issues Raised set. |
2011-03-14
|
02 | (System) | New version available: draft-ietf-intarea-ipv4-id-update-02.txt |
2010-10-22
|
01 | (System) | New version available: draft-ietf-intarea-ipv4-id-update-01.txt |
2010-09-27
|
04 | (System) | Document has expired |
2010-03-26
|
00 | (System) | New version available: draft-ietf-intarea-ipv4-id-update-00.txt |