Diameter Group Signaling
RFC 9390
Revision differences
Document history
Date | Rev. | By | Action |
---|---|---|---|
2023-04-25
|
14 | (System) | Received changes through RFC Editor sync (created alias RFC 9390, changed abstract to 'In large network deployments, a single Diameter node can support over … Received changes through RFC Editor sync (created alias RFC 9390, changed abstract to 'In large network deployments, a single Diameter node can support over a million concurrent Diameter sessions. In some use cases, Diameter nodes need to apply the same operation to a large group of Diameter sessions concurrently. The Diameter base protocol commands operate on a single session so these use cases can result in many thousands of command exchanges enforcing the same operation on each session in the group. In order to reduce signaling, it is desirable to enable bulk operations on all (or part of) the sessions managed by a Diameter node using a single or a few command exchanges. This document specifies the Diameter protocol extensions to achieve this signaling optimization.', changed pages to 21, changed standardization level to Proposed Standard, changed state to RFC, added RFC published event at 2023-04-25, changed IESG state to RFC Published) |
2023-04-25
|
14 | (System) | RFC published |
2023-04-20
|
14 | (System) | RFC Editor state changed to AUTH48-DONE from AUTH48 |
2023-03-24
|
14 | (System) | RFC Editor state changed to AUTH48 |
2023-01-25
|
14 | (System) | RFC Editor state changed to RFC-EDITOR from EDIT |
2022-11-29
|
14 | (System) | IANA Action state changed to RFC-Ed-Ack from Waiting on RFC Editor |
2022-11-28
|
14 | (System) | IANA Action state changed to Waiting on RFC Editor from In Progress |
2022-11-28
|
14 | (System) | IANA Action state changed to In Progress from Waiting on Authors |
2022-11-21
|
14 | (System) | IANA Action state changed to Waiting on Authors from In Progress |
2022-11-21
|
14 | (System) | IANA Action state changed to In Progress from Waiting on WGC |
2022-11-10
|
14 | (System) | RFC Editor state changed to EDIT |
2022-11-10
|
14 | (System) | IESG state changed to RFC Ed Queue from Approved-announcement sent |
2022-11-10
|
14 | (System) | Announcement was received by RFC Editor |
2022-11-10
|
14 | (System) | IANA Action state changed to Waiting on WGC from In Progress |
2022-11-10
|
14 | (System) | IANA Action state changed to In Progress |
2022-11-10
|
14 | Cindy Morgan | IESG state changed to Approved-announcement sent from Approved-announcement to be sent |
2022-11-10
|
14 | Cindy Morgan | IESG has approved the document |
2022-11-10
|
14 | Cindy Morgan | Closed "Approve" ballot |
2022-11-10
|
14 | Cindy Morgan | Ballot approval text was generated |
2022-11-10
|
14 | Cindy Morgan | Ballot writeup was changed |
2022-11-10
|
14 | Robert Wilton | IESG state changed to Approved-announcement to be sent from Approved-announcement to be sent::AD Followup |
2022-11-10
|
14 | Robert Wilton | Ballot approval text was generated |
2022-08-03
|
14 | (System) | Sub state has been changed to AD Followup from Revised ID Needed |
2022-08-03
|
14 | Marco Liebsch | New version available: draft-ietf-dime-group-signaling-14.txt |
2022-08-03
|
14 | (System) | New version approved |
2022-08-03
|
14 | (System) | Request for posting confirmation emailed to previous authors: Lionel Morand , Marco Liebsch , Mark Jones |
2022-08-03
|
14 | Marco Liebsch | Uploaded new revision |
2021-02-05
|
13 | Jean Mahoney | Closed request for Last Call review by GENART with state 'Overtaken by Events' |
2021-02-05
|
13 | Jean Mahoney | Assignment of request for Last Call review by GENART to Wassim Haddad was marked no-response |
2021-02-04
|
13 | Cindy Morgan | IESG state changed to Approved-announcement to be sent::Revised I-D Needed from IESG Evaluation::Revised I-D Needed |
2021-02-04
|
13 | Cindy Morgan | IESG state changed to IESG Evaluation::Revised I-D Needed from IESG Evaluation |
2021-02-04
|
13 | Magnus Westerlund | [Ballot Position Update] New position, No Objection, has been recorded for Magnus Westerlund |
2021-02-04
|
13 | Martin Vigoureux | [Ballot Position Update] New position, No Objection, has been recorded for Martin Vigoureux |
2021-02-03
|
13 | Roman Danyliw | [Ballot comment] Thanks to Catherine Meadows for the SECDIR review. ** Section 3.3. I had trouble reconciling the generic design principles espoused here with the … [Ballot comment] Thanks to Catherine Meadows for the SECDIR review. ** Section 3.3. I had trouble reconciling the generic design principles espoused here with the more detailed specification of the protocol documented in Section 4.*. The text here says: This specification follows the most flexible model where both, a Diameter client and a Diameter server can create a new group and assign a new identifier to that session group. And the table in this section says that the client could assign itself to a server owned session group. Assign a Session to a non-owned Session Group | X | X | However, in Section 4.2.1 If the Diameter server receives a command request from a Diameter client and the command includes at least one Session-Group-Info AVP having the SESSION_GROUP_ALLOCATION_ACTION flag in the Session-Group- Control-Vector AVP set, the server can accept or reject the request for group assignment. It seems to me that this text in Section 4.2.1 is suggesting that the client could ask to be put into a group but the server has the ability reject it, which seems like an implicit permission model. ** Section 7. In the table in this section the Session-Group-Id is of type OctetString, but in Section 7.3 it is UTF8String. ** Section 10. Given the flexible permission model suggested in Section 3.3, is cautionary guidance needed to say that specific applications using this capability need to consider the decisions they make based on group membership? |
2021-02-03
|
13 | Roman Danyliw | [Ballot Position Update] New position, No Objection, has been recorded for Roman Danyliw |
2021-02-02
|
13 | Benjamin Kaduk | [Ballot comment] I agree with the other commenters that an editorial pass over the document before it is sent to the RFC Editor is probably … [Ballot comment] I agree with the other commenters that an editorial pass over the document before it is sent to the RFC Editor is probably in order; I only noted the more eggregious nits that have obvious fixes but skipped the ones where I did not have a resolution ready at hand to suggest. Barry's remarks about restrictive vs non-restrictive clauses are particularly important. I also have several high-level issues that don't quite rise to discuss-level but seem worth getting resolution on; they mostly involve edge cases where the current text either leaves me unclear on what is supposed to happen or seems to present conflicting guidance: - what's the error handling in cases of partial success? * For operations adding/removing sessions to/from groups, it seems that the general principle is that the new changes introduced with any group-relevant CCF exchange are to be treated atomically: either all group additions/removals succeed or all fail (and when it fails the session is forced into a single-session fallback mode). But for server-initiated modifications this is enforced by "if the client can't do it, the client MUST tear down the affected session(s)", and I'm not sure if there's a case where the client can send a new request that includes some modifications and the server also tries to make some modifications in its response; such a scenario might in effect allow partial success and might also be hard to correctly interpret. * For operations acting on groups, we do allow partial success (DIAMETER_LIMITED_SUCCESS) and attempt to mandate fallback to single-session operation for affected sessions, but the specifics of how the Failed-AVP effectuates this are not clear to me (see my comment on Section 4.4.3). - we require that group identifiers are globally unique, which can be done with the diameter-node namespace prefix. But for the portion after that prefix, we seem to suggest reusing the construction from Section 8.8 of RFC 6733, which is just (in essence) a 64-bit global counter. In the vein of draft-gont-numeric-ids-sec-considerations, that seems overly constrained, in that it reveals sequencing across group creation and rate of per-node group creation to the remote peer. It seems that a construction akin to a keyed hash of a counter would preserve the guaranteed uniqueness property but avoid leaking such information to the network. - the permissions model is a bit unorthodox, with groups "owned" by their creator but the binding of a session to a group "owned" by the node that performed the binding. It seems like there is some risk of deadlock situations or conflict, e.g., where a client has added a session to a group G but the server wants to remove the session from G, or where a session is part of a group but the owner of the group wants to delete the group. For the latter case, my understanding is that group deletion "trumps" ownership of the session/group binding, such that deletion can proceed even while sessions are in the group, but I'm less sure what should happen in the former case (or others). - Is it possible to have a group with no member sessions? Section 3.3 suggests that if the last session is removed the group should be deleted, but AFAICT this would still require the node performing the removal to unset SESSION_GROUP_STATUS_IND, and I didn't see a requirement to do that spelled out. I do see how it is impossible to create a group directly in a state with no member sessions. - Is there a requirement to always send the current state of group membership when acting on a session? I could (perhaps naively) imagine a case where due to previous interactions a session belongs to groups G1, G2, and G3, but in some subsequent request the client only mentions G1. Does the membership in G2 and G3 get implicitly retained in the absence of an explicit unset SESSION_GROUP_ALLOCATION_ACTION or are there some other constraints that make such a scenario impossible? - Is there supposed to be a strong distinction between "including" an AVP and "appending" one? I see that 6733 does make some fairly clear distinction between the terms, but it seems that (e.g.) in Section 4.2.1 we use both phrasings to discuss Session-Group-Info. Now for some section-by-section (mostly editorial or nit-level) notes. Abstract, Introduction a million concurrent Diameter sessions. Recent use cases have revealed the need for Diameter nodes to apply the same operation to a large group of Diameter sessions concurrently. The Diameter base I note that the -00 is from 2012; are these use cases still "recent"? Section 3 As an editorial note, the way the current text jumps in to say that sessions can be assigned to groups leaves the reader uncertain whether this is describing preexisting functionality or the new mechanisms added by this document. A top-level intro paragraph for Section 3 that says roughly "to accomodate bulk operations on Diameter sessions, the concept of session groups is introduced; once sessions are added to a group, a command acting on the group will affect all the member sessions" might help. Section 3.3 If I understand correctly, the lines in the table for "remove a session from an owned Session Group"/"remove a session from a non-owned Session Group" mean only that this operation can be done sometimes, not that it can always be done (per the lines about "created the assignment". Would it be helpful to indicate this, perhaps by using a different symbol for those lines and adding a footnote? Section 4 While I understand the desire to keep the document structure as it is, with the actual AVPs specified in Section 7, it would have been very helpful to have a toplevel introductory paragraph here that mentions or references that there is a containing Session-Group-Info grouped AVP that contains the Session-Group-Control-Vector with information about the action and group, and zero or one(?) Session-Group-Id AVP to identify the group when a specific group is being identified. This would also allow clarifying whether the Session-Group-Id AVP is currently only defined to appear within the Session-Group-Info. Section 4.1.1 Such applications provide intrinsic discovery for the support of session grouping capability using the assigned Application Id advertised during the capability exchange phase two Diameter peers establish a transport connection (see Section 5.3 of [RFC6733]). nit: I think there's a missing word here, perhaps "where" after "phase"? Section 4.2.1 The client may also indicate in the request that the server is responsible for the assignment of the session in one or multiple sessions owned by the server. [...] nit(?): is this supposed to be "assignment of the session into one or multiple session *groups* owned by the server"? I'm having a hard time understanding it as written. If the assignment of the session to one or some of the multiple identified session groups fails, the session group assignment is treated as failure. In such case the session is treated as single session without assignment to any session group by the Diameter nodes. The server sends the response to the client and MAY include those Session-Group-Info AVPs for which the group assignment failed. The SESSION_GROUP_ALLOCATION_ACTION flag of included Session-Group- Info AVPs MUST be cleared. I guess I understand the part where the entire set of group-assignment operations has to succeed or fail as an atomic unit, but this text perhaps implies some semantics that the server is supposed to only explicitly include in the response the subset of group assignments that were unable to be processed, omitting the ones that could have been processed (but were not processed since a failure on one means that none of the operations get applied). If that's the intent, I'd suggest being a bit more explicit about what is and isn't sent. A Diameter client, which sent a request for session initiation to a Diameter server and appended a single or multiple Session-Group-Id AVPs but cannot find any Session-Group-Info AVP in the associated (editorial) the phrase "cannot find" makes me wonder how hard it's expected to be looking; more definitive statements about "not present" seem more typical for RFC style. Section 4.2.3 When a Diameter server enforces an update to the assigned groups mid- nit: this seems to be the only time we use the word "enforce" in this sense in the document; previous discussion seems to just use "decides to make an update" or similar. answer. The client subsequently sends a service-specific re- authorization request containing one or multiple Session-Group-Info AVPs with the SESSION_GROUP_ALLOCATION_ACTION flag set and the Session-Group-Id AVP identifying the session group to which the session had been previously assigned. [...] nit: I think this has to be "group or groups" to be consistent with the rest of the doc. Section 4.4.1 Either Diameter node (client or server) can request the recipient of a request to process an associated command for all sessions assigned to one or multiple groups by identifying these groups in the request. The sender of the request appends for each group, to which the command applies, a Session-Group-Info AVP including the Session- Group-Id AVP to identify the associated session group. Both, the SESSION_GROUP_ALLOCATION_ACTION flag as well as the SESSION_GROUP_STATUS_IND flag MUST be set. What's the error handling if one or both listed flags are not set -- just ignore the request? Action AVP to ALL_GROUPS (1) or PER_GROUP (2). If the answer can be sent before the complete process of the request for all the sessions or if the request timeout timer is high enough, the sender MAY set the Group-Response-Action AVP to ALL_GROUPS (1) or PER_GROUP (2). (side note) just the phrase "high enough" doesn't give much of an indication of what the criteria are and what numerical values might be appropriate. That said, it's not entirely clear how much guidance we can really give in this situation. Section 4.4.2 If the received request identifies multiple groups in multiple appended Session-Group-Id AVPs, the receiver SHOULD process the associated command for each of these groups. If a session has been assigned to more than one of the identified groups, the receiver MUST process the associated command only once per session. Why is this only a SHOULD for each group -- what other behaviors could the receiver do? Section 4.4.3 In the case of limited success, the sessions, for which the processing of the group command failed, MUST be identified using a Failed-AVP AVP as per Section 7.5 of [RFC6733]. [...] My reading of the referenced part of RFC 6733 is that there is a single Failed-AVP pointing to a single AVP that could not be processed properly. Is there such a single failed AVP in the case where processing failed for multiple sessions in the group(s)? It seems that the "largest containing AVP" that includes all failed groups might be so large so as to not be useful in indicating the problem. Section 7.2 SESSION_GROUP_STATUS_IND (0x00000010) If there's a mnemonic for the "IND" part of "SESSION_GROUP_STATUS_IND", that would be helpful to expand. Section 9.2 The Specification Required policy includes review by Designated Experts; is there any guidance we should provide to the DEs? Appendix A.1 Discon GASA received Cleanup Idle Spot-checking against RFC 6733's state machine, the non-group ASA received case only makes this transition when there was a previous ASR that was successfully sent. Is that am important distinction? (Also, as an editorial nit, RFC 6733 spells "Clean up" as two words.) |
2021-02-02
|
13 | Benjamin Kaduk | [Ballot Position Update] New position, No Objection, has been recorded for Benjamin Kaduk |
2021-02-02
|
13 | Warren Kumari | [Ballot comment] Question: Are there any implementations of this? A section/appendix documenting the improvements would be nice if so (decrease in CPU / how quickly … [Ballot comment] Question: Are there any implementations of this? A section/appendix documenting the improvements would be nice if so (decrease in CPU / how quickly N sessions can be changed, etc.) Comment: I also found some of this to be quite heavy reading, but I'm assuming that the readers are likely to be Diameter implementers who are already involved / willing to put in the work. Nit: "to the appended Group-Response-Action AVP ." -- extra space before period. Yes, 'tis a nit, but it would bug me if I didn't mention it... |
2021-02-02
|
13 | Warren Kumari | [Ballot Position Update] New position, No Objection, has been recorded for Warren Kumari |
2021-02-02
|
13 | Deborah Brungard | [Ballot Position Update] New position, No Objection, has been recorded for Deborah Brungard |
2021-02-02
|
13 | Alissa Cooper | [Ballot Position Update] New position, No Objection, has been recorded for Alissa Cooper |
2021-02-02
|
13 | Éric Vyncke | [Ballot comment] Thank you for the work put into this document. Like Barry and other ADs, I found this document difficult to read: long and … [Ballot comment] Thank you for the work put into this document. Like Barry and other ADs, I found this document difficult to read: long and complex sentences do not help the reader (but I am not a native English speaker). Therefore, I trust the responsible AD for the correctness of all the details in the specification. E.g., FSM or time line diagrams would have been helpful. Please find below some non-blocking COMMENT points (but replies would be appreciated), and some nits. I hope that this helps to improve the document, Regards, -éric == DISCUSS == == COMMENTS == Any reason why the authors affiliation is not shown ? The shepherd write-up is dated back in 2018... Is it still applicable ? -- Section 7.2 -- About the flag bits, I wonder why the values are not 0x01 and 0x02 rather than 0x01 and 0x10. Isn't this a waste of bits ? Should the IANA sub-registry for those flags be mentioned? |
2021-02-02
|
13 | Éric Vyncke | [Ballot Position Update] New position, No Objection, has been recorded for Éric Vyncke |
2021-02-01
|
13 | Murray Kucherawy | [Ballot comment] I agree with Barry's editorial suggestions. What does the "*)" in the table in Section 3.3 mean? From Section 10: [...] if … [Ballot comment] I agree with Barry's editorial suggestions. What does the "*)" in the table in Section 3.3 mean? From Section 10: [...] if the Diameter client or server is compromised, an attacker could launch DoS attacks by terminating a large number of sessions with a limited set of commands using the session group management concept. Is it worth mentioning that an attacker could also mess with the set of sessions associated with a group, possibly causing disruptions other than bulk session terminations? |
2021-02-01
|
13 | Murray Kucherawy | [Ballot Position Update] New position, No Objection, has been recorded for Murray Kucherawy |
2021-02-01
|
13 | Alvaro Retana | [Ballot Position Update] New position, No Objection, has been recorded for Alvaro Retana |
2021-01-31
|
13 | Barry Leiba | [Ballot comment] I have to say that I found this to be challenging to read: much of it is very dense, with paragraphs giving sometimes-subtly-different … [Ballot comment] I have to say that I found this to be challenging to read: much of it is very dense, with paragraphs giving sometimes-subtly-different conditions, and I would be reading it thinking, “Does this paragraph apply to my situation? I don’t think so, but what about the next one? Wait, maybe it was the other one after all.” I just have to assume that someon actually implementing Diameter would have an easier time following it. I have some editorial comments that won’t help with that aspect, but that I hope will help with clarity in general: — Section 3.1 — A session group, which has sessions assigned, can be deleted, e.g., due to a change in multiple users' subscription profile so that the group's assigned sessions do not share certain characteristics It appears that “has sessions assigned” is restrictive (it’s a required description, not just extra information). If so, it should say, “A session group that has sessions assigned can be deleted, e.g., due to...” without the internal commas. Another way to put it might be, “A session group can be deleted even if it has sessions assigned, e.g., due to...” — Section 3.3 — This specification follows the most flexible model where both, a Diameter client and a Diameter server can create a new group and Nit: no comma here Either the client and the server can assign a session to a group. Nit: “Either the client or the server can”, or “Both the client and the server can”. Details about enforcing a more constraint permission model I think the word you want is “constrained”. — Section 4.2 — Diameter AAA applications typically assign client and server roles to the Diameter nodes, which are referred to as relevant Diameter nodes to utilize session grouping and issue group commands. I’m having trouble parsing this sentence and determining what you’re trying to tell me. Can you please rephrase or repunctuate it to make it clearer? What are referred to as “relevant Diameter nodes”? What goes with “to utilize session grouping”? Diameter nodes, which are group-aware, MUST store and maintain an entry about the group assignment together with a session's state. Similar to earlier: is “are group aware” meant to be restrictive (there are Diameter nodes that are group aware and those that are not, and you’re talking about the former), or non-restrictive (all Diameter nodes are group aware, and you’re just pointing that fact out). It is currently written as non-restrictive, but I think you mean it to be restrictive. If that is correct, remove both commas and change “which” to “that”. A Diameter node MUST also keep a record about sessions, which have been assigned to a session group by itself. The comma shouldn’t be there, and “which” should be “that”. But it’s a bit awkward anyway: may I suggest rephrasing in active voice as, “Each Diameter node MUST also keep a record about sessions that it has assigned to a session group.” — Section 4.2.1 — If the response from the server indicates success in the result code but solely the assignment of the session to a session group has been rejected by the server, the client treats the session as single session without group assignment. What does “solely” mean in this sentence? A Diameter client, which sent a request for session initiation Please remove the comma (and change “which” to “that”). — Section 4.2.2 — The session, which is to be removed from a group, is Make it, “The session that is to be removed from the group is” When a Diameter client decides to remove a session from all session groups, to which the session has been previously assigned, Remove the comma after “groups”. The session, which is to be removed from all groups, to which the session has been previously assigned, is identified in the Session-Id AVP of the command request. Make it, “The session that is to be removed from all groups to which it had been previously assigned is identified in the Session-Id AVP of the command request.” — Section 7.3 — The portion of the Session-Group-Id MUST identify the Diameter node, which owns the session group. Please remove the comma and change “which” to “that”. |
2021-01-31
|
13 | Barry Leiba | [Ballot Position Update] New position, No Objection, has been recorded for Barry Leiba |
2021-01-30
|
13 | Erik Kline | [Ballot comment] [[ nits ]] [ section 10 ] * s/Session-group-Control-Vector/Session-Group-Control-Vector/ |
2021-01-30
|
13 | Erik Kline | [Ballot Position Update] New position, No Objection, has been recorded for Erik Kline |
2021-01-28
|
13 | Martin Duke | [Ballot comment] Sec 4.2.3 "The server responds with a service-specific auth response and includes one or multiple Session- Group-Info AVP with the SESSION_GROUP_ALLOCATION_ACTION flag set … [Ballot comment] Sec 4.2.3 "The server responds with a service-specific auth response and includes one or multiple Session- Group-Info AVP with the SESSION_GROUP_ALLOCATION_ACTION flag set and the Session-Group-Id AVP identifying the session group, to which the identified session is to be assigned. With the same response message, the server may send one or multiple Session-Group-Info AVPs with the SESSION_GROUP_ALLOCATION_ACTION flag cleared and the Session-Group-Id AVP identifying the session groups from which the identified session is to be removed." s/may/MAY, to match similar text in 4.2.2. Much as in that section, it is a little subtle that the state can be totally inferred by the first requirement, and the second MAY requirement is purely advisory. |
2021-01-28
|
13 | Martin Duke | [Ballot Position Update] New position, No Objection, has been recorded for Martin Duke |
2021-01-28
|
13 | Cindy Morgan | Placed on agenda for telechat - 2021-02-04 |
2021-01-28
|
13 | Robert Wilton | Ballot has been issued |
2021-01-28
|
13 | Robert Wilton | [Ballot Position Update] New position, Yes, has been recorded for Robert Wilton |
2021-01-28
|
13 | Robert Wilton | Created "Approve" ballot |
2021-01-28
|
13 | Robert Wilton | IESG state changed to IESG Evaluation from Waiting for AD Go-Ahead |
2021-01-28
|
13 | Robert Wilton | Ballot writeup was changed |
2021-01-27
|
13 | Sabrina Tanamal | IANA Review state changed to IANA OK - Actions Needed from IANA - Not OK |
2021-01-26
|
13 | Catherine Meadows | Request for Last Call review by SECDIR Completed: Ready. Reviewer: Catherine Meadows. Sent review to list. |
2021-01-25
|
13 | (System) | IESG state changed to Waiting for AD Go-Ahead from In Last Call |
2021-01-22
|
13 | (System) | IANA Review state changed to IANA - Not OK from IANA - Review Needed |
2021-01-22
|
13 | Sabrina Tanamal | (Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs: The IANA Functions Operator has completed its review of draft-ietf-dime-group-signaling-13. If any part of this review is inaccurate, please let … (Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs: The IANA Functions Operator has completed its review of draft-ietf-dime-group-signaling-13. If any part of this review is inaccurate, please let us know. The IANA Functions Operator has a question about one of the actions requested in the IANA Considerations section of this document. The IANA Functions Operator understands that, upon approval of this document, there are three actions which we must complete. First, in the AVP Codes registry on the Authentication, Authorization, and Accounting (AAA) Parameters registry page located at: https://www.iana.org/assignments/aaa-parameters/ five, new AVP Codes are to be registered as follows: AVP Code: [ TBD-at-Registration ] Attribute Name: Session-Group-Info Reference: [ RFC-to-be ] AVP Code: [ TBD-at-Registration ] Attribute Name: Session-Group-Control-Vector Reference: [ RFC-to-be ] AVP Code: [ TBD-at-Registration ] Attribute Name: Session-Group-Id Reference: [ RFC-to-be ] AVP Code: [ TBD-at-Registration ] Attribute Name: Group-Response-Action Reference: [ RFC-to-be ] AVP Code: [ TBD-at-Registration ] Attribute Name: Session-Group-Capability-Vector Reference: [ RFC-to-be ] Second, a new registry is to be created called the Session-Group-Control-Vector AVP registry. The new registry will be located on the the Authentication, Authorization, and Accounting (AAA) Parameters registry page located at: https://www.iana.org/assignments/aaa-parameters/ The registry will be managed via Specification Required as defined in RFC 8126. There are initial values in the new registry as follows. Control Attribute Flag Name Reference -----------+----------------------------------+-------------- 0x00000001 SESSION_GROUP_ALLOCATION_ACTION [ RFC-to-be ] 0x00000010 SESSION_GROUP_STATUS_IND [ RFC-to-be ] IANA Question --> Is 0x00000000 reserved? Are all the values from 0x00000011 to 0x11111111 unassigned? Third, a new registry is to be created called the Session-Group-Capability-Vector AVP registry. The new registry will be located on the the Authentication, Authorization, and Accounting (AAA) Parameters registry page located at: https://www.iana.org/assignments/aaa-parameters/ The registry will be managed via Standards Action as defined in RFC 8126. There are initial values in the new registry as follows. Control Attribute Flag Name Reference -----------+----------------------------------+-------------- 0x00000001 BASE_SESSION_GROUP_CAPABILITY [ RFC-to-be ] IANA Question --> Is 0x00000000 reserved? Are all the values from 0x00000010 to 0x11111111 unassigned? The IANA Functions Operator understands that these are the only actions required to be completed upon approval of this document. Note: The actions requested in this document will not be completed until the document has been approved for publication as an RFC. This message is meant only to confirm the list of actions that will be performed. Thank you, Sabrina Tanamal Senior IANA Services Specialist |
2021-01-15
|
13 | Tero Kivinen | Request for Last Call review by SECDIR is assigned to Catherine Meadows |
2021-01-15
|
13 | Tero Kivinen | Request for Last Call review by SECDIR is assigned to Catherine Meadows |
2021-01-14
|
13 | Jean Mahoney | Request for Last Call review by GENART is assigned to Wassim Haddad |
2021-01-14
|
13 | Jean Mahoney | Request for Last Call review by GENART is assigned to Wassim Haddad |
2021-01-14
|
13 | Gunter Van de Velde | Request for Last Call review by OPSDIR is assigned to Victor Kuarsingh |
2021-01-14
|
13 | Gunter Van de Velde | Request for Last Call review by OPSDIR is assigned to Victor Kuarsingh |
2021-01-11
|
13 | Amy Vezza | IANA Review state changed to IANA - Review Needed |
2021-01-11
|
13 | Amy Vezza | The following Last Call announcement was sent out (ends 2021-01-25): From: The IESG To: IETF-Announce CC: dime-chairs@ietf.org, dime@ietf.org, draft-ietf-dime-group-signaling@ietf.org, jounikor@gmail.com, rwilton@cisco.com … The following Last Call announcement was sent out (ends 2021-01-25): From: The IESG To: IETF-Announce CC: dime-chairs@ietf.org, dime@ietf.org, draft-ietf-dime-group-signaling@ietf.org, jounikor@gmail.com, rwilton@cisco.com Reply-To: last-call@ietf.org Sender: Subject: Last Call: (Diameter Group Signaling) to Proposed Standard The IESG has received a request from the Diameter Maintenance and Extensions WG (dime) to consider the following document: - 'Diameter Group Signaling' as Proposed Standard The IESG plans to make a decision in the next few weeks, and solicits final comments on this action. Please send substantive comments to the last-call@ietf.org mailing lists by 2021-01-25. Exceptionally, comments may be sent to iesg@ietf.org instead. In either case, please retain the beginning of the Subject line to allow automated sorting. Abstract In large network deployments, a single Diameter node can support over a million concurrent Diameter sessions. Recent use cases have revealed the need for Diameter nodes to apply the same operation to a large group of Diameter sessions concurrently. The Diameter base protocol commands operate on a single session so these use cases could result in many thousands of command exchanges to enforce the same operation on each session in the group. In order to reduce signaling, it would be desirable to enable bulk operations on all (or part of) the sessions managed by a Diameter node using a single or a few command exchanges. This document specifies the Diameter protocol extensions to achieve this signaling optimization. The file can be obtained via https://datatracker.ietf.org/doc/draft-ietf-dime-group-signaling/ No IPR declarations have been submitted directly on this I-D. |
2021-01-11
|
13 | Amy Vezza | IESG state changed to In Last Call from Last Call Requested |
2021-01-11
|
13 | Robert Wilton | Ballot writeup was changed |
2021-01-11
|
13 | Robert Wilton | Last call was requested |
2021-01-11
|
13 | Robert Wilton | Ballot writeup was generated |
2021-01-11
|
13 | Robert Wilton | IESG state changed to Last Call Requested from AD Evaluation::AD Followup |
2021-01-11
|
13 | Robert Wilton | Last call announcement was generated |
2021-01-11
|
13 | Robert Wilton | Ballot approval text was generated |
2020-04-01
|
13 | Alissa Cooper | Shepherding AD changed to Robert Wilton |
2020-03-09
|
13 | (System) | Sub state has been changed to AD Followup from Revised ID Needed |
2020-03-09
|
13 | Marco Liebsch | New version available: draft-ietf-dime-group-signaling-13.txt |
2020-03-09
|
13 | (System) | New version approved |
2020-03-09
|
13 | (System) | Request for posting confirmation emailed to previous authors: Marco Liebsch , Lionel Morand , Mark Jones |
2020-03-09
|
13 | Marco Liebsch | Uploaded new revision |
2020-01-27
|
12 | Alissa Cooper | Shepherding AD changed to Alissa Cooper |
2019-04-24
|
12 | Amy Vezza | Shepherding AD changed to Ignas Bagdonas |
2019-02-18
|
12 | Ben Campbell | Hi, This is my AD evaluation of draft-ietf-dime-group-signaling-12. This draft is on the right track, but is not ready for IETF LC. I have a … Hi, This is my AD evaluation of draft-ietf-dime-group-signaling-12. This draft is on the right track, but is not ready for IETF LC. I have a few substantive comments and a number of editorial comments that need to be resolved first. ---------- *** Substantive Comments *** - General: There were comments in the shepherd’s report that need to be addressed. §4.1: Why is the SHOULD not a MUST? What would be the consequences of not following it? §4.1.2, last paragraph: How long should a node remember that another node has announced support for groups? Is that memory forever? What happens if that node ceases to support groups in the future? §4.2: - "A Diameter node MUST also keep a record about sessions, which have been assigned to a session group by itself.” Is this the same as saying a node MUST record the owner of each group? Why does it matter which node assigned a specific session to a group? §4.2 and children: I’d like to see more text about what combinations are allowed and there order of application. For example, if the presence of a Session-Group-Info AVP with the SESSION_GROUP_ALLOCATION_ACTION flag cleared and Session-Group-Id AVP absent indicates deletion of a session from all groups, what if the message also contains other Session-Group-Info AVPs that assign groups? Is that the same thing as moving a session between groups? I’d also like to see some earlier text describing the meaning of Session-Id AVPs in group management and group operations. There’s a mention of that in the “format” section, but that seems an odd place to put it. §4.2.1: - General: Am I correct to assume that failure of a Diameter command means no groups are assigned? If so, please state that explicitly. - first paragraph: The “MUST” seems like a statement of fact. That is, there’s no implementation choice to make here. - "If the Diameter server accepts the client’s request for a group assignment, but the assignment of the session to one or some of the multiple identified session groups fails,” This seems self contradictory; if the assignment fails then how can the server have accepted it? Is there a practical difference between assignment failure and assignment rejection? - "If the Diameter server receives a command request from a Diameter client and the command comprises one or multiple Session-Group-Info AVPs and none of them includes a Session-Group-Id AVP, the server MAY decide to assign the session to one or multiple session groups.” Is there an expectation that the server assigns the session to the same number of groups as the the number of Session-Group-Id AVPs included by the client? If not, why would the client ever include more than one. Is the client prohibited from sending multiple AVPs, some of which contain session IDs and some of which do not? - "the Diameter client SHOULD NOT retry to request group assignment for this session, but MAY try to request group assignment for other new sessions.” Why is the SHOULD NOT not a MUST NOT? §4.2.3: - "When a Diameter server enforces an update to the assigned groups midsession, it sends a Re-Authorization Request (RAR) message to the client identifying the session…” Should that say “or service-specific request”? Or is this operation limited to applications that use RAR? §4.4.1: - "If the process of the request is delay-sensitive, the sender SHOULD NOT set the Group-Response- Action AVP to ALL_GROUPS (1) or PER_GROUP (2).” Why not MUST NOT? - "If the answer can be sent before the complete process of the request for all the sessions or if the request timeout timer is high enough, the sender MAY set the Group-Response-Action AVP to ALL_GROUPS (1) or PER_GROUP (2).” Can you offer guidance on how to decide if a timeout timer is high enough? §5: - It’s worth mentioning that a stateful proxy must advertise support. - "Session group related AVPs being defined as optional AVP SHOULD be ignored by stateless Proxy Agents and SHOULD NOT be removed from the Diameter commands.” This seems to put normative requirements on nodes that do not implement this spec. Or is it really a statement of fact? §7.3: Can you offer guidance on how to ensure sufficient uniqueness? “Eternal” seems like a pretty high bar; is that really the intention? §10: It doesn’t seem likely that the e2e protection work for Diameter will ever complete, or at least not in the near future. I suggest toning down the hopeful language that talks about it. *** Editorial Comments and Nits ** - General: The draft needs at least another proofreading and editing pass to improve readability and clarity. In particular, it needs to be proofread for the following: - plural agreement - Comma usage (there are many placed incorrectly, and many missing where needed) - Proper use of “which” vs “that” (and the associated comma use.) - Convoluted sentence structure §2: Please use the new boilerplate from RFC 8174. i §3.1, - first paragraph: “e.g.” requires a comma afterwards: “e.g.,” (There are several instances of this throughout the draft.) - "In case of mobile users, the user’s session may get transferred to a new Diameter client during handover and assigned to a different group, which is maintained at the new Diameter client, mid-session.” This is hard to parse. I suggest moving “mid-session” to earlier in the sentence. For example, “… session may get transferred mid-session to a new Diameter client…” §3.2: I gather this section is an example. If say, please state that explicitly. §3.3: - This section uses confusing language to describe which nodes can do what. In particular, it often says “any” node, where I think it means “either the client or the server”. I assume nodes that are not a party to a session-group can’t modify it, correct? Likewise it says “each” node when I think it means “either node”. - "Prerequisite for deletion of a session group is that the Diameter node created the session beforehand, hence the node became the group owner.” This seems like a complicated way to explain a simple concept. I suggest something to the effect of “A session group may only be deleted by the Diameter node that created it.” - "The enforcement of more constrained permissions is left to the specification of a particular group signaling enabled Diameter application and compliant implementations of such application MUST enforce the associated permission model.” This is overly complicated language. I suggest something to the effect of ""Diameter application with explicit support for session groups may define a more constrained permission model.” Also, the MUST is not really appropriate; it’s up to the definitions of those applications to set normative requirements on implementations, not _this_ draft. - "specification. For example, a more constrained model could require that a client MUST NOT remove a session from a group which is owned by the server.” Please do not use normative keywords in an example; examples are by definition non-normative. - Default permissions table: I am confused by the “client” and “server” columns. If I understand this section correctly, the role of “client” and “server” is not relevant. (It is telling that each row has the same value in both columns.) Please consider stating this in terms of group “owner” and “non-owner”. - Editor’s note: If this draft does not consider overruling a node’s assignment, why talk about it at all? (Although it seems like it _does_ support that, in the sense that a server can reject or change assignments proposed by a client.) §4.1: Please avoid normative language in the form of “SHOULD…only…”. That can be ambiguous. It’s better to say “SHOULD NOT … unless. For example, “SHOULD NOT perform group operations with a node unless the node has advertised support”. §4.1.1: - It seems to me that §4.1.1 and §4.1.2 have “explicit” and “implicit” reversed, in the sense that, if a Diameter application supports groups, then the announcement of group support is “implied” by the announcement of support for the application. OTOH, the use of Session-Group-Capability-Vector is an “explicit” announcement of group support. - "New Diameter applications may consider support “ s/consider/specify - "Such applications provide intrinsic discovery for the support of group commands and announce this capability through the assigned application ID.” This is confusing. I think you mean support for groups is implied by the announcement of support for the application that explicitly supports it.But it can be read to mean a separate explicit announcement of group support. §4.2: - "It is left to the application to determine the policy of session grouping.” Does “application” mean Diameter application, or just “implementation”? Also, this is vague; I think this still talks about limits to the number of groups a session belongs to, which is much more precise than “the policy of session grouping”. - The second paragraph seems redundant with §3.3. The phrase “single or multiple” would be easier to read as “one or more”. (This pattern repeats throughout the draft, along with some instances of “one or multiple”) - “A list of all known session groups should be locally maintained on each node, each group pointing to individual sessions being assigned to the group." s/should be/is §4.2.1: - “… the server MUST assign the new session to each of the one or multiple identified session groups when present in …” - "If the Diameter server receives a command request from a Diameter client and the command comprises at least one Session-Group-Info AVP” s/comprises/includes (“comprises” means “made up of”, which would suggest that the request contains only Session-Group-Info AVPs). (This occurs several times throughout the draft.) What does “when” mean in context? Would “...session groups present in…” mean the same thing? - "In case one or multiple identified session groups are not already stored by the server” “In case” usually refers to planning for a contingency (For example, “I have a fire extinguisher in case of fire”). I suggest “In the case where…” or even better, “If…” (Variations of this pattern occur several times.) - "the server MUST store the new identified group(s)” s/new/newly - "The server sends the response to the client and MAY include as information to the client only those Session-Group- Info AVPs for which the group assignment failed.” Hard to parse. - "session. When the Diameter client is confident that the Diameter server supports session grouping…” Since this should always be true before the client sends _any_ group operation, why restate it here? §4.4.1: - "Either Diameter node (client or server) can request the recipient of a request to process an associated command for all sessions being assigned to one or multiple groups by identifying these groups in the request.” s/sessions being assigned/sessions assigned - Please expand “CCF” on first mention. - sentence starting with "When a server sends, as example, a Re-Authorization Request (RAR) or a service-specific server-initiated request…” The sentence is hard to parse. - "If the sender sends a request including the Group-Response-Action AVP set to ALL_GROUPS (1) or PER_GROUP (2), it MUST expect some delay…” “expect” is vague for use in a MUST requirement. Please state this in terms of concrete actions or state it descriptively. §A.1, first paragraph: Please don’t use normative keywords to describe requirements defined in other documents. Doing so introduces a high chance of error if either document is updated in the future. |
2019-02-18
|
12 | Ben Campbell | IESG state changed to AD Evaluation::Revised I-D Needed from AD Evaluation |
2019-02-18
|
12 | Ben Campbell | IESG state changed to AD Evaluation from Publication Requested |
2018-12-28
|
12 | Jouni Korhonen | As required by RFC 4858, this is the current template for the Document Shepherd Write-Up. Changes are expected over time. This version is dated … As required by RFC 4858, this is the current template for the Document Shepherd Write-Up. Changes are expected over time. This version is dated 24 February 2012. (1) What type of RFC is being requested (BCP, Proposed Standard, Internet Standard, Informational, Experimental, or Historic)? Why is this the proper type of RFC? Is this type of RFC indicated in the title page header? Standards Track, which is indicated on the title page. (2) The IESG approval announcement includes a Document Announcement Write-Up. Please provide such a Document Announcement Write-Up. Recent examples can be found in the "Action" announcements for approved documents. The approval announcement contains the following sections: Technical Summary The Diameter base protocol commands operate on a single session so some deployment cases could result in many thousands of command exchanges to enforce the same operation on each session in the group. Specifying a mechanisms for bulk operations on a number of session managed by a Diameter node using a single or a few command exchanges would significantly reduce signalling. This document specifies the Diameter protocol extensions to achieve this signalling optimisation. Working Group Summary There is a consensus behind the document. It just took a long time to complete the work. Document Quality There are no known implementation of this protocol yet. There are plans expressed that the solution will be contributed into FreeDiameter. There is no need for MIB Doctor, Media Type or Expert review in this document. Personnel Jouni Korhonen (jouni.nospam@gmail.com) is the document shepherd. Ben Campbell is the responsible AD. (3) Briefly describe the review of this document that was performed by the Document Shepherd. If this version of the document is not ready for publication, please explain why the document is being forwarded to the IESG. Shepherd has reviewed the document as part of the proto write-up process. The document (-11) was re-reviewed again Dec 2019. There are places for improvement, which are not fatal, though. For example "AVP" is used before expanding the acronym. In Section 4.1.2 it is not clear whether it is possible for a Diameter node to withdraw its announcement for group operation support. The current text says on lines 301-304 to log and remember node's support. Section 6 is currently worded in a way that a group support has to use existing commands. It should be possible to create new commands for group support alone with a new Application ID. Although this is not explicit, it would be the case anyway. Section 7.4. "Group-Response-Action AVP" defines how the node should follow up with exchanges in response to a command which impacts multiple sessions. The shepherd chose not to ask for an IANA registry for this AVP. If one is seen beneficial during the IESG review shepherd's recommendation for assignment is "Standards Action" policy. However, the shepherd thinks there are no foreseen new actions without changing the current protocol. (4) Does the document Shepherd have any concerns about the depth or breadth of the reviews that have been performed? No. The document has been lingering the DIME WG for a long time and the people who are interested in this work have already said their comments. (5) Do portions of the document need review from a particular or from broader perspective, e.g., security, operational complexity, AAA, DNS, DHCP, XML, or internationalization? If so, describe the review that took place. No. (6) Describe any specific concerns or issues that the Document Shepherd has with this document that the Responsible Area Director and/or the IESG should be aware of? For example, perhaps he or she is uncomfortable with certain parts of the document, or has concerns whether there really is a need for it. In any event, if the WG has discussed those issues and has indicated that it still wishes to advance the document, detail those concerns here. No issues. However, the security considerations refer to possible end to end security work in DIME / Diameter that may or may not take place. Only RFC7966 for requirements exist. (7) Has each author confirmed that any and all appropriate IPR disclosures required for full conformance with the provisions of BCP 78 and BCP 79 have already been filed. If not, explain why. Yes. There are no IPR concerns. (8) Has an IPR disclosure been filed that references this document? If so, summarize any WG discussion and conclusion regarding the IPR disclosures. No. (9) How solid is the WG consensus behind this document? Does it represent the strong concurrence of a few individuals, with others being silent, or does the WG as a whole understand and agree with it? Solid consensus. (10) Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarise the areas of conflict in separate email messages to the Responsible Area Director. (It should be in a separate email because this questionnaire is publicly available.) No. (11) Identify any ID nits the Document Shepherd has found in this document. (See https://www.ietf.org/tools/idnits/ and the Internet-Drafts Checklist). Boilerplate checks are not enough; this check needs to be thorough. No IDnits found that would not be corrected with a freshly generated txt file from the XML or that are not editorial. (12) Describe how the document meets any required formal review criteria, such as the MIB Doctor, media type, and URI type reviews. No need. (13) Have all references within this document been identified as either normative or informative? Yes. However, there are only Normative references. (14) Are there normative references to documents that are not ready for advancement or are otherwise in an unclear state? If such normative references exist, what is the plan for their completion? No. (15) Are there downward normative references references (see RFC 3967)? If so, list these downward references to support the Area Director in the Last Call procedure. No. (16) Will publication of this document change the status of any existing RFCs? Are those RFCs listed on the title page header, listed in the abstract, and discussed in the introduction? If the RFCs are not listed in the Abstract and Introduction, explain why, and point to the part of the document where the relationship of this document to the other RFCs is discussed. If this information is not in the document, explain why the WG considers it unnecessary. No. (17) Describe the Document Shepherd's review of the IANA considerations section, especially with regard to its consistency with the body of the document. Confirm that all protocol extensions that the document makes are associated with the appropriate reservations in IANA registries. Confirm that any referenced IANA registries have been clearly identified. Confirm that newly created IANA registries include a detailed specification of the initial contents for the registry, that allocations procedures for future registrations are defined, and a reasonable name for the new registry has been suggested (see RFC 5226). The document requests for 5 new AVP code points. The document creates two new registries: 1) Session-Group-Control-Vector AVP registry for capability bits with two initial assignments. The future registration assignment policy is "Specification Required". 2) Session-Group-Capability-Vector AVP with one initial assignment. Changes to this registry is "Standards Action" policy. The AVP names work as the registry names. (18) List any new IANA registries that require Expert Review for future allocations. Provide any public guidance that the IESG would find useful in selecting the IANA Experts for these new registries. 1) Session-Group-Control-Vector AVP registry. The future registration assignment policy is "Specification Required". Existing "AVP Codes" experts listed in IANA for Diameter should suffice. (19) Describe reviews and automated checks performed by the Document Shepherd to validate sections of the document written in a formal language, such as XML code, BNF rules, MIB definitions, etc. None. AVPs were hand checked. |
2018-12-28
|
12 | Jouni Korhonen | Responsible AD changed to Ben Campbell |
2018-12-28
|
12 | Jouni Korhonen | IETF WG state changed to Submitted to IESG for Publication from Waiting for WG Chair Go-Ahead |
2018-12-28
|
12 | Jouni Korhonen | IESG state changed to Publication Requested from I-D Exists |
2018-12-28
|
12 | Jouni Korhonen | IESG process started in state Publication Requested |
2018-12-28
|
12 | Jouni Korhonen | As required by RFC 4858, this is the current template for the Document Shepherd Write-Up. Changes are expected over time. This version is dated … As required by RFC 4858, this is the current template for the Document Shepherd Write-Up. Changes are expected over time. This version is dated 24 February 2012. (1) What type of RFC is being requested (BCP, Proposed Standard, Internet Standard, Informational, Experimental, or Historic)? Why is this the proper type of RFC? Is this type of RFC indicated in the title page header? Standards Track, which is indicated on the title page. (2) The IESG approval announcement includes a Document Announcement Write-Up. Please provide such a Document Announcement Write-Up. Recent examples can be found in the "Action" announcements for approved documents. The approval announcement contains the following sections: Technical Summary The Diameter base protocol commands operate on a single session so some deployment cases could result in many thousands of command exchanges to enforce the same operation on each session in the group. Specifying a mechanisms for bulk operations on a number of session managed by a Diameter node using a single or a few command exchanges would significantly reduce signalling. This document specifies the Diameter protocol extensions to achieve this signalling optimisation. Working Group Summary There is a consensus behind the document. It just took a long time to complete the work. Document Quality There are no known implementation of this protocol yet. There are plans expressed that the solution will be contributed into FreeDiameter. There is no need for MIB Doctor, Media Type or Expert review in this document. Personnel Jouni Korhonen (jouni.nospam@gmail.com) is the document shepherd. Ben Campbell is the responsible AD. (3) Briefly describe the review of this document that was performed by the Document Shepherd. If this version of the document is not ready for publication, please explain why the document is being forwarded to the IESG. Shepherd has reviewed the document as part of the proto write-up process. The document (-11) was re-reviewed again Dec 2019. There are places for improvement, which are not fatal, though. For example "AVP" is used before expanding the acronym. In Section 4.1.2 it is not clear whether it is possible for a Diameter node to withdraw its announcement for group operation support. The current text says on lines 301-304 to log and remember node's support. Section 6 is currently worded in a way that a group support has to use existing commands. It should be possible to create new commands for group support alone with a new Application ID. Although this is not explicit, it would be the case anyway. Section 7.4. "Group-Response-Action AVP" defines how the node should follow up with exchanges in response to a command which impacts multiple sessions. The shepherd chose not to ask for an IANA registry for this AVP. If one is seen beneficial during the IESG review shepherd's recommendation for assignment is "Standards Action" policy. However, the shepherd thinks there are no foreseen new actions without changing the current protocol. (4) Does the document Shepherd have any concerns about the depth or breadth of the reviews that have been performed? No. The document has been lingering the DIME WG for a long time and the people who are interested in this work have already said their comments. (5) Do portions of the document need review from a particular or from broader perspective, e.g., security, operational complexity, AAA, DNS, DHCP, XML, or internationalization? If so, describe the review that took place. No. (6) Describe any specific concerns or issues that the Document Shepherd has with this document that the Responsible Area Director and/or the IESG should be aware of? For example, perhaps he or she is uncomfortable with certain parts of the document, or has concerns whether there really is a need for it. In any event, if the WG has discussed those issues and has indicated that it still wishes to advance the document, detail those concerns here. No issues. However, the security considerations refer to possible end to end security work in DIME / Diameter that may or may not take place. Only RFC7966 for requirements exist. (7) Has each author confirmed that any and all appropriate IPR disclosures required for full conformance with the provisions of BCP 78 and BCP 79 have already been filed. If not, explain why. Yes. There are no IPR concerns. (8) Has an IPR disclosure been filed that references this document? If so, summarize any WG discussion and conclusion regarding the IPR disclosures. No. (9) How solid is the WG consensus behind this document? Does it represent the strong concurrence of a few individuals, with others being silent, or does the WG as a whole understand and agree with it? Solid consensus. (10) Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarise the areas of conflict in separate email messages to the Responsible Area Director. (It should be in a separate email because this questionnaire is publicly available.) No. (11) Identify any ID nits the Document Shepherd has found in this document. (See https://www.ietf.org/tools/idnits/ and the Internet-Drafts Checklist). Boilerplate checks are not enough; this check needs to be thorough. No IDnits found that would not be corrected with a freshly generated txt file from the XML or that are not editorial. (12) Describe how the document meets any required formal review criteria, such as the MIB Doctor, media type, and URI type reviews. No need. (13) Have all references within this document been identified as either normative or informative? Yes. However, there are only Normative references. (14) Are there normative references to documents that are not ready for advancement or are otherwise in an unclear state? If such normative references exist, what is the plan for their completion? No. (15) Are there downward normative references references (see RFC 3967)? If so, list these downward references to support the Area Director in the Last Call procedure. No. (16) Will publication of this document change the status of any existing RFCs? Are those RFCs listed on the title page header, listed in the abstract, and discussed in the introduction? If the RFCs are not listed in the Abstract and Introduction, explain why, and point to the part of the document where the relationship of this document to the other RFCs is discussed. If this information is not in the document, explain why the WG considers it unnecessary. No. (17) Describe the Document Shepherd's review of the IANA considerations section, especially with regard to its consistency with the body of the document. Confirm that all protocol extensions that the document makes are associated with the appropriate reservations in IANA registries. Confirm that any referenced IANA registries have been clearly identified. Confirm that newly created IANA registries include a detailed specification of the initial contents for the registry, that allocations procedures for future registrations are defined, and a reasonable name for the new registry has been suggested (see RFC 5226). The document requests for 5 new AVP code points. The document creates two new registries: 1) Session-Group-Control-Vector AVP registry for capability bits with two initial assignments. The future registration assignment policy is "Specification Required". 2) Session-Group-Capability-Vector AVP with one initial assignment. Changes to this registry is "Standards Action" policy. The AVP names work as the registry names. (18) List any new IANA registries that require Expert Review for future allocations. Provide any public guidance that the IESG would find useful in selecting the IANA Experts for these new registries. 1) Session-Group-Control-Vector AVP registry. The future registration assignment policy is "Specification Required". Existing "AVP Codes" experts listed in IANA for Diameter should suffice. (19) Describe reviews and automated checks performed by the Document Shepherd to validate sections of the document written in a formal language, such as XML code, BNF rules, MIB definitions, etc. None. AVPs were hand checked. |
2018-12-28
|
12 | Jouni Korhonen | As required by RFC 4858, this is the current template for the Document Shepherd Write-Up. Changes are expected over time. This version is dated … As required by RFC 4858, this is the current template for the Document Shepherd Write-Up. Changes are expected over time. This version is dated 24 February 2012. (1) What type of RFC is being requested (BCP, Proposed Standard, Internet Standard, Informational, Experimental, or Historic)? Why is this the proper type of RFC? Is this type of RFC indicated in the title page header? Standards Track, which is indicated on the title page. (2) The IESG approval announcement includes a Document Announcement Write-Up. Please provide such a Document Announcement Write-Up. Recent examples can be found in the "Action" announcements for approved documents. The approval announcement contains the following sections: Technical Summary The Diameter base protocol commands operate on a single session so some deployment cases could result in many thousands of command exchanges to enforce the same operation on each session in the group. Specifying a mechanisms for bulk operations on a number of session managed by a Diameter node using a single or a few command exchanges would significantly reduce signalling. This document specifies the Diameter protocol extensions to achieve this signalling optimisation. Working Group Summary There is a consensus behind the document. It just took a long time to complete the work. Document Quality There are no known implementation of this protocol yet. There are plans expressed that the solution will be contributed into FreeDiameter. There is no need for MIB Doctor, Media Type or Expert review in this document. Personnel Jouni Korhonen (jouni.nospam@gmail.com) is the document shepherd. Eric Rescola is the responsible AD. (3) Briefly describe the review of this document that was performed by the Document Shepherd. If this version of the document is not ready for publication, please explain why the document is being forwarded to the IESG. Shepherd has reviewed the document as part of the proto write-up process. The document (-11) was re-reviewed again Dec 2019. There are places for improvement, which are not fatal, though. For example "AVP" is used before expanding the acronym. In Section 4.1.2 it is not clear whether it is possible for a Diameter node to withdraw its announcement for group operation support. The current text says on lines 301-304 to log and remember node's support. Section 6 is currently worded in a way that a group support has to use existing commands. It should be possible to create new commands for group support alone with a new Application ID. Although this is not explicit, it would be the case anyway. Section 7.4. "Group-Response-Action AVP" defines how the node should follow up with exchanges in response to a command which impacts multiple sessions. The shepherd chose not to ask for an IANA registry for this AVP. If one is seen beneficial during the IESG review shepherd's recommendation for assignment is "Standards Action" policy. However, the shepherd thinks there are no foreseen new actions without changing the current protocol. (4) Does the document Shepherd have any concerns about the depth or breadth of the reviews that have been performed? No. The document has been lingering the DIME WG for a long time and the people who are interested in this work have already said their comments. (5) Do portions of the document need review from a particular or from broader perspective, e.g., security, operational complexity, AAA, DNS, DHCP, XML, or internationalization? If so, describe the review that took place. No. (6) Describe any specific concerns or issues that the Document Shepherd has with this document that the Responsible Area Director and/or the IESG should be aware of? For example, perhaps he or she is uncomfortable with certain parts of the document, or has concerns whether there really is a need for it. In any event, if the WG has discussed those issues and has indicated that it still wishes to advance the document, detail those concerns here. No issues. However, the security considerations refer to possible end to end security work in DIME / Diameter that may or may not take place. Only RFC7966 for requirements exist. (7) Has each author confirmed that any and all appropriate IPR disclosures required for full conformance with the provisions of BCP 78 and BCP 79 have already been filed. If not, explain why. Yes. There are no IPR concerns. (8) Has an IPR disclosure been filed that references this document? If so, summarize any WG discussion and conclusion regarding the IPR disclosures. No. (9) How solid is the WG consensus behind this document? Does it represent the strong concurrence of a few individuals, with others being silent, or does the WG as a whole understand and agree with it? Solid consensus. (10) Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarise the areas of conflict in separate email messages to the Responsible Area Director. (It should be in a separate email because this questionnaire is publicly available.) No. (11) Identify any ID nits the Document Shepherd has found in this document. (See https://www.ietf.org/tools/idnits/ and the Internet-Drafts Checklist). Boilerplate checks are not enough; this check needs to be thorough. No IDnits found that would not be corrected with a freshly generated txt file from the XML or that are not editorial. (12) Describe how the document meets any required formal review criteria, such as the MIB Doctor, media type, and URI type reviews. No need. (13) Have all references within this document been identified as either normative or informative? Yes. However, there are only Normative references. (14) Are there normative references to documents that are not ready for advancement or are otherwise in an unclear state? If such normative references exist, what is the plan for their completion? No. (15) Are there downward normative references references (see RFC 3967)? If so, list these downward references to support the Area Director in the Last Call procedure. No. (16) Will publication of this document change the status of any existing RFCs? Are those RFCs listed on the title page header, listed in the abstract, and discussed in the introduction? If the RFCs are not listed in the Abstract and Introduction, explain why, and point to the part of the document where the relationship of this document to the other RFCs is discussed. If this information is not in the document, explain why the WG considers it unnecessary. No. (17) Describe the Document Shepherd's review of the IANA considerations section, especially with regard to its consistency with the body of the document. Confirm that all protocol extensions that the document makes are associated with the appropriate reservations in IANA registries. Confirm that any referenced IANA registries have been clearly identified. Confirm that newly created IANA registries include a detailed specification of the initial contents for the registry, that allocations procedures for future registrations are defined, and a reasonable name for the new registry has been suggested (see RFC 5226). The document requests for 5 new AVP code points. The document creates two new registries: 1) Session-Group-Control-Vector AVP registry for capability bits with two initial assignments. The future registration assignment policy is "Specification Required". 2) Session-Group-Capability-Vector AVP with one initial assignment. Changes to this registry is "Standards Action" policy. The AVP names work as the registry names. (18) List any new IANA registries that require Expert Review for future allocations. Provide any public guidance that the IESG would find useful in selecting the IANA Experts for these new registries. 1) Session-Group-Control-Vector AVP registry. The future registration assignment policy is "Specification Required". Existing "AVP Codes" experts listed in IANA for Diameter should suffice. (19) Describe reviews and automated checks performed by the Document Shepherd to validate sections of the document written in a formal language, such as XML code, BNF rules, MIB definitions, etc. None. AVPs were hand checked. |
2018-12-28
|
12 | Marco Liebsch | New version available: draft-ietf-dime-group-signaling-12.txt |
2018-12-28
|
12 | (System) | New version approved |
2018-12-28
|
12 | (System) | Request for posting confirmation emailed to previous authors: Marco Liebsch , Lionel Morand , Mark Jones |
2018-12-28
|
12 | Marco Liebsch | Uploaded new revision |
2018-12-25
|
11 | Jouni Korhonen | IETF WG state changed to Waiting for WG Chair Go-Ahead from WG Consensus: Waiting for Write-Up |
2018-12-25
|
11 | Jouni Korhonen | As required by RFC 4858, this is the current template for the Document Shepherd Write-Up. Changes are expected over time. This version is dated … As required by RFC 4858, this is the current template for the Document Shepherd Write-Up. Changes are expected over time. This version is dated 24 February 2012. (1) What type of RFC is being requested (BCP, Proposed Standard, Internet Standard, Informational, Experimental, or Historic)? Why is this the proper type of RFC? Is this type of RFC indicated in the title page header? Standards Track, which is indicated on the title page. (2) The IESG approval announcement includes a Document Announcement Write-Up. Please provide such a Document Announcement Write-Up. Recent examples can be found in the "Action" announcements for approved documents. The approval announcement contains the following sections: Technical Summary The Diameter base protocol commands operate on a single session so some deployment cases could result in many thousands of command exchanges to enforce the same operation on each session in the group. Specifying a mechanisms for bulk operations on a number of session managed by a Diameter node using a single or a few command exchanges would significantly reduce signalling. This document specifies the Diameter protocol extensions to achieve this signalling optimisation. Working Group Summary There is a consensus behind the document. It just took a long time to complete the work. Document Quality There are no known implementation of this protocol yet. There are plans expressed that the solution will be contributed into FreeDiameter. There is no need for MIB Doctor, Media Type or Expert review in this document. Personnel Jouni Korhonen (jouni.nospam@gmail.com) is the document shepherd. Eric Rescola is the responsible AD. (3) Briefly describe the review of this document that was performed by the Document Shepherd. If this version of the document is not ready for publication, please explain why the document is being forwarded to the IESG. Shepherd has reviewed the document as part of the proto write-up process. The document (-11) was re-reviewed again Dec 2019. There are places for improvement, which are not fatal, though. For example "AVP" is used before expanding the acronym. In Section 4.1.2 it is not clear whether it is possible for a Diameter node to withdraw its announcement for group operation support. The current text says on lines 301-304 to log and remember node's support. Section 6 is currently worded in a way that a group support has to use existing commands. It should be possible to create new commands for group support alone with a new Application ID. Although this is not explicit, it would be the case anyway. (4) Does the document Shepherd have any concerns about the depth or breadth of the reviews that have been performed? No. The document has been lingering the DIME WG for a long time and the people who are interested in this work have already said their comments. (5) Do portions of the document need review from a particular or from broader perspective, e.g., security, operational complexity, AAA, DNS, DHCP, XML, or internationalization? If so, describe the review that took place. No. (6) Describe any specific concerns or issues that the Document Shepherd has with this document that the Responsible Area Director and/or the IESG should be aware of? For example, perhaps he or she is uncomfortable with certain parts of the document, or has concerns whether there really is a need for it. In any event, if the WG has discussed those issues and has indicated that it still wishes to advance the document, detail those concerns here. No issues. However, the security considerations refer to possible end to end security work in DIME / Diameter that may or may not take place. Only RFC7966 for requirements exist. (7) Has each author confirmed that any and all appropriate IPR disclosures required for full conformance with the provisions of BCP 78 and BCP 79 have already been filed. If not, explain why. Yes. There are no IPR concerns. (8) Has an IPR disclosure been filed that references this document? If so, summarize any WG discussion and conclusion regarding the IPR disclosures. No. (9) How solid is the WG consensus behind this document? Does it represent the strong concurrence of a few individuals, with others being silent, or does the WG as a whole understand and agree with it? Solid consensus. (10) Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarise the areas of conflict in separate email messages to the Responsible Area Director. (It should be in a separate email because this questionnaire is publicly available.) No. (11) Identify any ID nits the Document Shepherd has found in this document. (See https://www.ietf.org/tools/idnits/ and the Internet-Drafts Checklist). Boilerplate checks are not enough; this check needs to be thorough. No IDnits found that would not be corrected with a freshly generated txt file from the XML or that are not editorial. (12) Describe how the document meets any required formal review criteria, such as the MIB Doctor, media type, and URI type reviews. No need. (13) Have all references within this document been identified as either normative or informative? Yes. However, there are only Normative references. (14) Are there normative references to documents that are not ready for advancement or are otherwise in an unclear state? If such normative references exist, what is the plan for their completion? No. (15) Are there downward normative references references (see RFC 3967)? If so, list these downward references to support the Area Director in the Last Call procedure. No. (16) Will publication of this document change the status of any existing RFCs? Are those RFCs listed on the title page header, listed in the abstract, and discussed in the introduction? If the RFCs are not listed in the Abstract and Introduction, explain why, and point to the part of the document where the relationship of this document to the other RFCs is discussed. If this information is not in the document, explain why the WG considers it unnecessary. No. (17) Describe the Document Shepherd's review of the IANA considerations section, especially with regard to its consistency with the body of the document. Confirm that all protocol extensions that the document makes are associated with the appropriate reservations in IANA registries. Confirm that any referenced IANA registries have been clearly identified. Confirm that newly created IANA registries include a detailed specification of the initial contents for the registry, that allocations procedures for future registrations are defined, and a reasonable name for the new registry has been suggested (see RFC 5226). The document requests for 5 new AVP code points. The document creates two new registries: 1) Session-Group-Control-Vector AVP registry for capability bits with two initial assignments. The future registration assignment policy is "Specification Required". 2) Session-Group-Capability-Vector AVP with one initial assignment. Changes to this registry is "Standards Action" policy. The AVP names work as the registry names. (18) List any new IANA registries that require Expert Review for future allocations. Provide any public guidance that the IESG would find useful in selecting the IANA Experts for these new registries. (19) Describe reviews and automated checks performed by the Document Shepherd to validate sections of the document written in a formal language, such as XML code, BNF rules, MIB definitions, etc. None. AVPs were hand checked. |
2018-12-25
|
11 | Jouni Korhonen | As required by RFC 4858, this is the current template for the Document Shepherd Write-Up. Changes are expected over time. This version is dated … As required by RFC 4858, this is the current template for the Document Shepherd Write-Up. Changes are expected over time. This version is dated 24 February 2012. (1) What type of RFC is being requested (BCP, Proposed Standard, Internet Standard, Informational, Experimental, or Historic)? Why is this the proper type of RFC? Is this type of RFC indicated in the title page header? Standards Track, which is indicated on the title page. (2) The IESG approval announcement includes a Document Announcement Write-Up. Please provide such a Document Announcement Write-Up. Recent examples can be found in the "Action" announcements for approved documents. The approval announcement contains the following sections: Technical Summary The Diameter base protocol commands operate on a single session so some deployment cases could result in many thousands of command exchanges to enforce the same operation on each session in the group. Specifying a mechanisms for bulk operations on a number of session managed by a Diameter node using a single or a few command exchanges would significantly reduce signalling. This document specifies the Diameter protocol extensions to achieve this signalling optimisation. Working Group Summary There is a consensus behind the document. It just took a long time to complete the work. Document Quality There are no known implementation of this protocol yet. There are plans expressed that the solution will be contributed into FreeDiameter. There is no need for MIB Doctor, Media Type or Expert review in this document. Personnel Jouni Korhonen (jouni.nospam@gmail.com) is the document shepherd. Eric Rescola is the responsible AD. (3) Briefly describe the review of this document that was performed by the Document Shepherd. If this version of the document is not ready for publication, please explain why the document is being forwarded to the IESG. Shepherd has reviewed the document as part of the proto write-up process. The document (-11) was re-reviewed again Dec 2019. There are places for improvement, which are not fatal, though. For example "AVP" is used before expanding the acronym. In Section 4.1.2 it is not clear whether it is possible for a Diameter node to withdraw its announcement for group operation support. The current text says on lines 301-304 to log and remember node's support. Section 6 is currently worded in a way that a group support has to use existing commands. It should be possible to create new commands for group support alone with a new Application ID. Although this is not explicit, it would be the case anyway. (4) Does the document Shepherd have any concerns about the depth or breadth of the reviews that have been performed? No. The document has been lingering the DIME WG for a long time and the people who are interested in this work have already said their comments. (5) Do portions of the document need review from a particular or from broader perspective, e.g., security, operational complexity, AAA, DNS, DHCP, XML, or internationalization? If so, describe the review that took place. No. (6) Describe any specific concerns or issues that the Document Shepherd has with this document that the Responsible Area Director and/or the IESG should be aware of? For example, perhaps he or she is uncomfortable with certain parts of the document, or has concerns whether there really is a need for it. In any event, if the WG has discussed those issues and has indicated that it still wishes to advance the document, detail those concerns here. No issues. However, the security considerations refer to possible end to end security work in DIME / Diameter that may or may not take place. Only RFC7966 for requirements exist. (7) Has each author confirmed that any and all appropriate IPR disclosures required for full conformance with the provisions of BCP 78 and BCP 79 have already been filed. If not, explain why. Yes. There are no IPR concerns. (8) Has an IPR disclosure been filed that references this document? If so, summarize any WG discussion and conclusion regarding the IPR disclosures. No. (9) How solid is the WG consensus behind this document? Does it represent the strong concurrence of a few individuals, with others being silent, or does the WG as a whole understand and agree with it? Solid consensus. (10) Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarise the areas of conflict in separate email messages to the Responsible Area Director. (It should be in a separate email because this questionnaire is publicly available.) No. (11) Identify any ID nits the Document Shepherd has found in this document. (See https://www.ietf.org/tools/idnits/ and the Internet-Drafts Checklist). Boilerplate checks are not enough; this check needs to be thorough. No IDnits found that would not be corrected with a freshly generated txt file from the XML or that are not editorial. (12) Describe how the document meets any required formal review criteria, such as the MIB Doctor, media type, and URI type reviews. No need. (13) Have all references within this document been identified as either normative or informative? Yes. However, there are only Normative references. (14) Are there normative references to documents that are not ready for advancement or are otherwise in an unclear state? If such normative references exist, what is the plan for their completion? No. (15) Are there downward normative references references (see RFC 3967)? If so, list these downward references to support the Area Director in the Last Call procedure. No. (16) Will publication of this document change the status of any existing RFCs? Are those RFCs listed on the title page header, listed in the abstract, and discussed in the introduction? If the RFCs are not listed in the Abstract and Introduction, explain why, and point to the part of the document where the relationship of this document to the other RFCs is discussed. If this information is not in the document, explain why the WG considers it unnecessary. No. (17) Describe the Document Shepherd's review of the IANA considerations section, especially with regard to its consistency with the body of the document. Confirm that all protocol extensions that the document makes are associated with the appropriate reservations in IANA registries. Confirm that any referenced IANA registries have been clearly identified. Confirm that newly created IANA registries include a detailed specification of the initial contents for the registry, that allocations procedures for future registrations are defined, and a reasonable name for the new registry has been suggested (see RFC 5226). The document requests for 5 new AVP code points. The document creates two new registries, however, there are clearly two new registries are created: 1) Session-Group-Control-Vector AVP registry for capability bits with two initial assignments. The future registration assignment policy is "Specification Required". 2) Session-Group-Capability-Vector AVP with one initial assignment. Changes to this registry is "Standards Action" policy. The AVP names work as the registry names. (18) List any new IANA registries that require Expert Review for future allocations. Provide any public guidance that the IESG would find useful in selecting the IANA Experts for these new registries. (19) Describe reviews and automated checks performed by the Document Shepherd to validate sections of the document written in a formal language, such as XML code, BNF rules, MIB definitions, etc. None. AVPs were hand checked. |
2018-12-25
|
11 | Jouni Korhonen | As required by RFC 4858, this is the current template for the Document Shepherd Write-Up. Changes are expected over time. This version is dated … As required by RFC 4858, this is the current template for the Document Shepherd Write-Up. Changes are expected over time. This version is dated 24 February 2012. (1) What type of RFC is being requested (BCP, Proposed Standard, Internet Standard, Informational, Experimental, or Historic)? Why is this the proper type of RFC? Is this type of RFC indicated in the title page header? Standards Track, which is indicated on the title page. (2) The IESG approval announcement includes a Document Announcement Write-Up. Please provide such a Document Announcement Write-Up. Recent examples can be found in the "Action" announcements for approved documents. The approval announcement contains the following sections: Technical Summary The Diameter base protocol commands operate on a single session so some deployment cases could result in many thousands of command exchanges to enforce the same operation on each session in the group. Specifying a mechanisms for bulk operations on a number of session managed by a Diameter node using a single or a few command exchanges would significantly reduce signalling. This document specifies the Diameter protocol extensions to achieve this signalling optimisation. Working Group Summary There is a consensus behind the document. It just took a long time to complete the work. Document Quality There are no known implementation of this protocol yet. There are plans expressed that the solution will be contributed into FreeDiameter. There is no need for MIB Doctor, Media Type or Expert review in this document. Personnel Jouni Korhonen (jouni.nospam@gmail.com) is the document shepherd. Eric Rescola is the responsible AD. (3) Briefly describe the review of this document that was performed by the Document Shepherd. If this version of the document is not ready for publication, please explain why the document is being forwarded to the IESG. Shepherd has reviewed the document (-11) as part of the proto write-up process. The document was re-reviewed again Dec 2019. There are places for improvement, which are not fatal, though. For example "AVP" is used before expanding the acronym. In Section 4.1.2 it is not clear whether it is possible for a Diameter node to withdraw its announcement for group operation support. The current text says on lines 301-304 to log and remember node's support. Section 6 is currently worded in a way that a group support has to use existing commands. It should be possible to create new commands for group support alone with a new Application ID. (4) Does the document Shepherd have any concerns about the depth or breadth of the reviews that have been performed? No. The document has been lingering the DIME WG for a long time and the people who are interested in this work have already said their comments. (5) Do portions of the document need review from a particular or from broader perspective, e.g., security, operational complexity, AAA, DNS, DHCP, XML, or internationalization? If so, describe the review that took place. No. (6) Describe any specific concerns or issues that the Document Shepherd has with this document that the Responsible Area Director and/or the IESG should be aware of? For example, perhaps he or she is uncomfortable with certain parts of the document, or has concerns whether there really is a need for it. In any event, if the WG has discussed those issues and has indicated that it still wishes to advance the document, detail those concerns here. No issues. However, the security considerations refer to possible end to end security work in DIME / Diameter that may or may not take place. (7) Has each author confirmed that any and all appropriate IPR disclosures required for full conformance with the provisions of BCP 78 and BCP 79 have already been filed. If not, explain why. Yes. There are no IPR concerns. (8) Has an IPR disclosure been filed that references this document? If so, summarize any WG discussion and conclusion regarding the IPR disclosures. No. (9) How solid is the WG consensus behind this document? Does it represent the strong concurrence of a few individuals, with others being silent, or does the WG as a whole understand and agree with it? Solid consensus. (10) Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarise the areas of conflict in separate email messages to the Responsible Area Director. (It should be in a separate email because this questionnaire is publicly available.) No. (11) Identify any ID nits the Document Shepherd has found in this document. (See https://www.ietf.org/tools/idnits/ and the Internet-Drafts Checklist). Boilerplate checks are not enough; this check needs to be thorough. No IDnits found that would not be corrected with a freshly generated txt file from the XML or that are not editorial. (12) Describe how the document meets any required formal review criteria, such as the MIB Doctor, media type, and URI type reviews. No need. (13) Have all references within this document been identified as either normative or informative? Yes. However, there are only Normative references. (14) Are there normative references to documents that are not ready for advancement or are otherwise in an unclear state? If such normative references exist, what is the plan for their completion? No. (15) Are there downward normative references references (see RFC 3967)? If so, list these downward references to support the Area Director in the Last Call procedure. No. (16) Will publication of this document change the status of any existing RFCs? Are those RFCs listed on the title page header, listed in the abstract, and discussed in the introduction? If the RFCs are not listed in the Abstract and Introduction, explain why, and point to the part of the document where the relationship of this document to the other RFCs is discussed. If this information is not in the document, explain why the WG considers it unnecessary. No. (17) Describe the Document Shepherd's review of the IANA considerations section, especially with regard to its consistency with the body of the document. Confirm that all protocol extensions that the document makes are associated with the appropriate reservations in IANA registries. Confirm that any referenced IANA registries have been clearly identified. Confirm that newly created IANA registries include a detailed specification of the initial contents for the registry, that allocations procedures for future registrations are defined, and a reasonable name for the new registry has been suggested (see RFC 5226). The document requests for 5 new AVP code points. The document does not request new registries, however, there are clearly two new registries are created: 1) Session-Group-Control-Vector AVP registry for capability bits with two initial assignments. The future registration assignment policy is not described. The shepherd suggests "Specification Required" required. 2) Session-Group-Capability-Vector AVP with one initial assignment. Changes to this registry would most likely change the group session management "overlay" protocol, the shepherd proposes "Standards Action" policy. The AVP names work as the registry names. (18) List any new IANA registries that require Expert Review for future allocations. Provide any public guidance that the IESG would find useful in selecting the IANA Experts for these new registries. (19) Describe reviews and automated checks performed by the Document Shepherd to validate sections of the document written in a formal language, such as XML code, BNF rules, MIB definitions, etc. None. AVPs were hand checked. |
2018-12-25
|
11 | Jouni Korhonen | Changed consensus to Yes from Unknown |
2018-12-25
|
11 | Jouni Korhonen | Intended Status changed to Proposed Standard from None |
2018-12-13
|
11 | (System) | Document has expired |
2018-06-11
|
11 | Marco Liebsch | New version available: draft-ietf-dime-group-signaling-11.txt |
2018-06-11
|
11 | (System) | New version approved |
2018-06-11
|
11 | (System) | Request for posting confirmation emailed to previous authors: Marco Liebsch , Lionel Morand , Mark Jones |
2018-06-11
|
11 | Marco Liebsch | Uploaded new revision |
2018-03-11
|
10 | Jouni Korhonen | Changed document writeup |
2018-03-11
|
10 | Jouni Korhonen | Changed document writeup |
2018-03-10
|
10 | Jouni Korhonen | Changed document writeup |
2018-03-09
|
10 | Jouni Korhonen | Changed document writeup |
2018-01-08
|
10 | Marco Liebsch | New version available: draft-ietf-dime-group-signaling-10.txt |
2018-01-08
|
10 | (System) | New version approved |
2018-01-08
|
10 | (System) | Request for posting confirmation emailed to previous authors: Marco Liebsch , Lionel Morand , Mark Jones |
2018-01-08
|
10 | Marco Liebsch | Uploaded new revision |
2018-01-04
|
09 | Jouni Korhonen | Changed document writeup |
2017-09-15
|
09 | Marco Liebsch | New version available: draft-ietf-dime-group-signaling-09.txt |
2017-09-15
|
09 | (System) | New version approved |
2017-09-15
|
09 | (System) | Request for posting confirmation emailed to previous authors: Marco Liebsch , Lionel Morand , Mark Jones |
2017-09-15
|
09 | Marco Liebsch | Uploaded new revision |
2017-09-14
|
08 | (System) | Document has expired |
2017-09-08
|
08 | Lionel Morand | IETF WG state changed to WG Consensus: Waiting for Write-Up from In WG Last Call |
2017-05-22
|
08 | Jouni Korhonen | WGLC #1 ends June 5th. |
2017-05-22
|
08 | Jouni Korhonen | IETF WG state changed to In WG Last Call from WG Document |
2017-03-13
|
08 | Marco Liebsch | New version available: draft-ietf-dime-group-signaling-08.txt |
2017-03-13
|
08 | (System) | New version approved |
2017-03-13
|
08 | (System) | Request for posting confirmation emailed to previous authors: Marco Liebsch , Lionel Morand , Mark Jones |
2017-03-13
|
08 | Marco Liebsch | Uploaded new revision |
2017-02-17
|
07 | Marco Liebsch | New version available: draft-ietf-dime-group-signaling-07.txt |
2017-02-17
|
07 | (System) | New version approved |
2017-02-17
|
07 | (System) | Request for posting confirmation emailed to previous authors: "Mark Jones" , "Marco Liebsch" , "Lionel Morand" |
2017-02-17
|
07 | Marco Liebsch | Uploaded new revision |
2016-09-22
|
06 | (System) | Document has expired |
2016-04-07
|
06 | Lionel Morand | Added -06 to session: IETF-95: dime Fri-1000 |
2016-03-21
|
06 | Marco Liebsch | New version available: draft-ietf-dime-group-signaling-06.txt |
2015-10-14
|
05 | (System) | Notify list changed from dime-chairs@ietf.org, jounikor@gmail.com to (None) |
2015-07-06
|
05 | Lionel Morand | New version available: draft-ietf-dime-group-signaling-05.txt |
2014-12-17
|
04 | Benoît Claise | Notification list changed to dime@ietf.org, dime-chairs@tools.ietf.org, jounikor@gmail.com, draft-ietf-dime-group-signaling.all@tools.ietf.org |
2014-07-04
|
04 | Marco Liebsch | New version available: draft-ietf-dime-group-signaling-04.txt |
2014-02-25
|
03 | Benoît Claise | This document now replaces draft-jones-diameter-group-signaling instead of draft-liebsch-dime-diameter-bulksig |
2014-02-25
|
03 | Benoît Claise | Document shepherd changed to Jouni Korhonen |
2014-02-25
|
03 | Benoît Claise | This document now replaces draft-liebsch-dime-diameter-bulksig instead of None |
2014-02-14
|
03 | Marco Liebsch | New version available: draft-ietf-dime-group-signaling-03.txt |
2013-10-21
|
02 | Marco Liebsch | New version available: draft-ietf-dime-group-signaling-02.txt |
2013-07-15
|
01 | Mark Jones | New version available: draft-ietf-dime-group-signaling-01.txt |
2012-06-22
|
00 | Mark Jones | New version available: draft-ietf-dime-group-signaling-00.txt |