Skip to main content

Definitions of Managed Objects for Middlebox Communication
draft-ietf-midcom-mib-11

Revision differences

Document history

Date Rev. By Action
2012-08-22
11 (System) post-migration administrative database adjustment to the No Objection position for Jari Arkko
2012-08-22
11 (System) post-migration administrative database adjustment to the No Objection position for Tim Polk
2012-08-22
11 (System) post-migration administrative database adjustment to the No Objection position for Dan Romascanu
2012-08-22
11 (System) post-migration administrative database adjustment to the No Objection position for Sam Hartman
2012-08-22
11 (System) post-migration administrative database adjustment to the Yes position for Magnus Westerlund
2008-01-14
11 Amy Vezza State Changes to RFC Ed Queue from Approved-announcement sent by Amy Vezza
2008-01-09
11 (System) IANA Action state changed to RFC-Ed-Ack from Waiting on RFC Editor
2008-01-09
11 (System) IANA Action state changed to Waiting on RFC Editor from In Progress
2008-01-09
11 (System) IANA Action state changed to In Progress from Waiting on Authors
2008-01-09
11 (System) IANA Action state changed to Waiting on Authors from In Progress
2008-01-09
11 (System) IANA Action state changed to In Progress
2008-01-08
11 Amy Vezza IESG state changed to Approved-announcement sent
2008-01-08
11 Amy Vezza IESG has approved the document
2008-01-08
11 Amy Vezza Closed "Approve" ballot
2007-12-07
11 Tim Polk [Ballot Position Update] Position for Tim Polk has been changed to No Objection from Discuss by Tim Polk
2007-12-06
11 (System) New version available: draft-ietf-midcom-mib-11.txt
2007-11-19
11 Dan Romascanu
[Ballot comment]
Version 10 includes a couple of new edits which I suggest to re-visit:

1. in page 9 all terminology was changed from SNMP …
[Ballot comment]
Version 10 includes a couple of new edits which I suggest to re-visit:

1. in page 9 all terminology was changed from SNMP manager to MIDCOM client with the exception of the last instance.

'If this is not possible, then the SNMP manager has to perform additional SNMP get transactions as long as necessary to receive all of the reply parameters.'

I suggest to use here 'SNMP manager (MIDCOM client)' for consistency.

2. in section 5 and in the DESCRIPTION clause of the MIB module 'three braches of managed objects' was replaced by 'three kinds of managed objects'. I do not know why this change was made, but I kind of do not like it, as it fails to convey the fact that the MIB module is structured in sub-groups or branches on these line. I would suggest to default back to the previous terms, or make clear that every 'kind' has one single root node each under midcomObjects.
2007-11-19
11 Dan Romascanu [Ballot Position Update] Position for Dan Romascanu has been changed to No Objection from Discuss by Dan Romascanu
2007-11-16
11 (System) Sub state has been changed to AD Follow up from New Id Needed
2007-11-16
10 (System) New version available: draft-ietf-midcom-mib-10.txt
2007-10-09
11 Magnus Westerlund State Changes to IESG Evaluation::Revised ID Needed from IESG Evaluation::AD Followup by Magnus Westerlund
2007-08-09
11 Dan Romascanu
Dave Harrington's full review:

I reviewed the MIDCOM MIB document, paying particular attention to the separation of protocls from the MIB, and paying attention to …
Dave Harrington's full review:

I reviewed the MIDCOM MIB document, paying particular attention to the separation of protocls from the MIB, and paying attention to the distinction between security subsystems and security models, and access control subsystem and access control models. Overall the document looks good. Almost all the fixes proposed here are minor editorial fixes (but one issue is a major problem).

1) section 4.1 mentions "context"; context has a very special meaning in SNMP, so there is some ambiguity. I think this can be ignored here.
I think it's clear enough.

2) also in 4.1, the discussion of security models and access control models is mostly OK because it is preceded by "such as". However, "is controlled by VACM" would be better as "is controlled by access control models such as VACM".

3) The sentence starting "Recommended configuration of VACM ..." is good since it is only a recommendation.

4) IN 4.2.2, /the SNMP needs to take action/the SNMP manager (the MIDCOM client) needs to take action/  - an SNMP protocol engine does not do things like repeat set transactions or checking the success of the initial write transaction ...
/wrote/write/

5) 4.2.2 - /The SNMP agent informs the SNMP manager about the end of processing the request by sending an SNMP notification/The MIDCOM server informs the MIDCOM client about the end of processing the request by sending an SNMP notification/

[The SNMP protocol never indicates the end of processing by sending a notification; it indicates the end of SNMP processing by sending a Response-PDU. It is MIDCOM that requires the sending of a notification to indicate end of transaction processing.]

6) 4.2.4.5 "All atomiticiy problems.." - note that using RowStatus with a createAndWait can also solve the atomicity problem by allowing managers to build the row using mutliple SET requests that do nothing until the rowStatus is turned "active".

7) 4.2.5 /SNMP user according to USM/authenticated principal, such as a USM user/
/user's access rights/principal's access rights/
/the VACM mechanisms at the SNMP agent/access control mechanisms, such as VACM/

8) 4.3 /policies into configurations of the SNMP/policies into configurations of, for example, the SNMP/
/the mechanisms of VACM/the mechanisms of access control models, such as VACM,/g
/an access control policy can specify that MIDCOM policy rules owned by/an access control policy can specify that MIDCOM-MIB policy rules owned by/ [VACM could not do this if it were not for the design of the MIDCOM-MIB policy rules where owner is part of the index, so this is clearer if you say MIDCOM-MIB policy rules rather than MIDCOM policy rules.]

9) 6.2 - good good good - all RECOMMENDS; that's fine.

10) midcomCompliance /SNMP entities that implement/implementations of/



Some editorial nits:
4.2.3. /stronghold/strength/
4.2.4.5 /atomiticity/atomicity/

5.3 and possibly elsewhere. IN SMIv1 MIB modules, everybody separated things into "groups", but SMIv2 made GROUP a reserved word. It is better to use "subtree" than "group" to describe a subtree of the hierarchy.
/statistics group/statustics subtree/
/transaction branch/transaction subtree/

5.3.2 the names of the counters were changed in the MIB but not here.
OwnersTotal no longer exists, right?

10.2 /vulnerate security/make security vulnerable/ ?? I found no vulnerate in my dictionary.

--
Unfortunately, while reviewing I spotted a few things that I think deserve a closer look.

1) the tables need to discuss persistence more I think. It needs to be clear whether the read-write entries must be preserved across reboots.
As an admin, I'd probably be upset if they weren't.

2) There is a particualrly nasty issue about persistence that needs to be looked at. **You're gonna hate this one!**

ifIndex is not necessarily persistent across reboots (hence the presence of ifAlias, which is). Because a physical configuration can change during a reboot (e.g., a card is removed from a chassis), ifIndex values can be renumbered. If the MIDCOM tables are persistent across reboots, what happens if the ifIndices change on reboot? The table entries would now point to the wrong interfaces.

The reason why ifAlias was defined is that an agent cannot necesarily tell, after the reboot, which ifIndex was assigned to which component before the reboot, and netiher can the MIDCOM-MIB implementation, so you cannt say just change the indices of your tables to match.

ifAlias helps by being consistent across reboots, but it is not set initially, so you need to make sure it is set to something other than a zero-length string before using it.

3) Another issue with ifIndex is the "naming scope" issue mentioned in the ifIndex DESCRIPTION clause.

4) there are references to "strings" - SNMP does not support strings, so you need to clarify whether you are talking C-style null-terminated strings, or OCTET STRINGS. Wehn you say a zero-length string, you need to clarify whether that is a zero-length OCTET STRING, or a one-character OCTET STRING in which the first character is a NULL. (I recommend using zero-length OCTET STRINGS, which avoids character set issues.

(obviously I didn't catch the zero-length string reference in the ifAlias text. ;-)

5) midcomRuleTable talks about IP interfaces. Is it deliberate that only IP interfaces are supported?

6) 7.1 2. "The MIDCOM client enables ... from excluded(2) to included(1)". I think included causes the notification to be filtered out, which would be "disable". Using excluded means the notification is not filtered out, and thus "enabled". Right?

7) for RuleOperStatus, a MIDCOM MIB implementation MAY return processingRequest. What happens if it doesn't return this, and it takes a long time to process the request? Does the SNMP Request have to wait until processing is completed? I don't consider this a problem, just somewhat ambiguous.

under terminated, /an SNMP manager/a MIDCOM client/ - it's the client that controls explicit requests for termination.

8) RuleLifetime says the value after a SET can be different than specified in the SET request. This is very close to, if not, illegal SNMP; The SETRequest-PDU contains the desired value, and the Response-PDU should match to indicate the specified value was actually SET. This could benefit from clearer text on this point. If you
**cannot** SET the object to the specified value, then I think SNMP should return an error, per RFC3416.

9) You return 'inconsistentValue' for a number of objects, in conditions that may not be the appropriate conditions for this error code. I did not review them all; they should all be reviewed. here's
one:
RuleRowStatus - if the StorageType is permanent or readOnly and you try to SET it, I think 'notWritable' is the correct error code. Look at the conditional clauses (the flow) in RFC3416 for SETRequest; the MIB should not specify different error codes than SNMP specifies for a given condition.

10) 10.1 SNMP doesn't actually do "data origin authentication"
(end-to-end authentication for the data), even though USM claims it does. It only does message authentication (hop-to-hop). When a proxy is used, the authentication happens between the origin and the proxy, and then between the proxy and the destination, but there is no authentication by the destination that the data came from the origin, only that the message came from the proxy. SNMP does do (hop-to-hop) identity authentication.
You also left one out - replay protection, and that is very important.
/Compliant MIDCOM MIB implementations MUST support SNMPv3 security
  services including data integrity, data origin authentication and
  data confidentiality./Compliant MIDCOM MIB implementations MUST support SNMPv3 security services including data integrity, identity authentication,
  data confidentiality, and replay protection./
2007-08-09
11 Dan Romascanu
[Ballot discuss]
David Harrington reviewed the document at the request of the Security Area Director. Beyond the security aspects his review fout out a number …
[Ballot discuss]
David Harrington reviewed the document at the request of the Security Area Director. Beyond the security aspects his review fout out a number of other issues. At least one of them seems to have the potential to be a critical issue in the way midcom device configuration is kept accross reboots, and I am holding a DISCUSS until the issue is clarified and answered.

---------

ifIndex is not necessarily persistent across reboots (hence the presence of ifAlias, which is). Because a physical configuration can change during a reboot (e.g., a card is removed from a chassis), ifIndex values can be renumbered. If the MIDCOM tables are persistent across reboots, what happens if the ifIndices change on reboot? The table entries would now point to the wrong interfaces.

The reason why ifAlias was defined is that an agent cannot necesarily tell, after the reboot, which ifIndex was assigned to which component before the reboot, and netiher can the MIDCOM-MIB implementation, so you cannt say just change the indices of your tables to match.

ifAlias helps by being consistent across reboots, but it is not set initially, so you need to make sure it is set to something other than a zero-length string before using it.

--------------

The full text of David's review can be found in the tracker.
2007-08-09
11 Dan Romascanu [Ballot Position Update] Position for Dan Romascanu has been changed to Discuss from No Objection by Dan Romascanu
2007-07-06
11 (System) Removed from agenda for telechat - 2007-07-05
2007-07-05
11 Chris Newman [Ballot Position Update] New position, No Objection, has been recorded by Chris Newman
2007-07-04
11 Lisa Dusseault [Ballot Position Update] New position, No Objection, has been recorded by Lisa Dusseault
2007-07-03
11 Tim Polk
[Ballot discuss]
The security considerations lack the usual statement discouraging deployment of SNMP versions
prior to SNMPv3.  The security considerations section of RFC 4898, …
[Ballot discuss]
The security considerations lack the usual statement discouraging deployment of SNMP versions
prior to SNMPv3.  The security considerations section of RFC 4898, for example, states:

Deployment of SNMP versions prior to SNMPv3 is NOT RECOMMENDED.

Given that SNMPv3 mechanisms are mandatory to implement in this spec, I expected to see
something similar.  What was the rationale for excluding this statement?
2007-07-03
11 Tim Polk
[Ballot discuss]
The security considerations lack the usual statement discouraging deployment of SNMP versions
prior to SNMPv3.  The security considerations section of RFC 4898, …
[Ballot discuss]
The security considerations lack the usual statement discouraging deployment of SNMP versions
prior to SNMPv3.  The security considerations section of RFC 4898, for example, states:

Deployment of SNMP versions prior to SNMPv3 is NOT RECOMMENDED.

Given that SNMPv3 mechanisms are mandatory to implement, I expected to see something similar.
What was the rationale for excluding this statement?
2007-07-03
11 Tim Polk [Ballot Position Update] New position, Discuss, has been recorded by Tim Polk
2007-07-03
11 Ron Bonica [Ballot Position Update] New position, No Objection, has been recorded by Ron Bonica
2007-07-03
11 David Ward [Ballot Position Update] New position, No Objection, has been recorded by David Ward
2007-06-29
11 Sam Hartman [Ballot Position Update] Position for Sam Hartman has been changed to No Objection from Discuss by Sam Hartman
2007-06-27
11 Magnus Westerlund [Note]: 'Needs positions from the new people.
SEC-DIR Reviewer: Radia Perlman (Radia.Perlman@sun.com)
WG Shephard Melinda Shore
' added by Magnus Westerlund
2007-06-27
11 Magnus Westerlund [Note]: 'Needs positions from the new people
SEC-DIR Reviewer: Radia Perlman (Radia.Perlman@sun.com)
WG Shephard Melinda Shore
' added by Magnus Westerlund
2007-06-27
11 Magnus Westerlund [Note]: 'Needs positions from the new people

SEC-DIR Reviewer: Radia Perlman (Radia.Perlman@sun.com)
WG Shephard Melinda Shore
' added by Magnus Westerlund
2007-06-27
11 Magnus Westerlund [Ballot Position Update] Position for Magnus Westerlund has been changed to Yes from Discuss by Magnus Westerlund
2007-06-27
11 Magnus Westerlund Placed on agenda for telechat - 2007-07-05 by Magnus Westerlund
2007-06-27
11 Magnus Westerlund Put onto the agenda for getting enough ballot positions for publication.
2006-11-08
11 (System) Request for Early review by SECDIR Completed. Reviewer: Radia Perlman.
2006-10-26
11 Amy Vezza State Changes to IESG Evaluation::AD Followup from IESG Evaluation by Amy Vezza
2006-10-26
11 Sam Hartman
[Ballot discuss]
I don't believe that normative references to architectural or
framework documents are appropriate in this instance.  I don't believe
this is within the …
[Ballot discuss]
I don't believe that normative references to architectural or
framework documents are appropriate in this instance.  I don't believe
this is within the scope of down references anticipated by RFC 3967.
If we can get to a point where these documents are not required to
understand the protocol at hand or alternatively reclassify the
architecture document as proposed|bcp.
2006-10-26
11 Sam Hartman [Ballot Position Update] New position, Discuss, has been recorded by Sam Hartman
2006-10-26
11 Jon Peterson [Ballot Position Update] New position, No Objection, has been recorded by Jon Peterson
2006-10-26
11 Cullen Jennings [Ballot Position Update] New position, No Objection, has been recorded by Cullen Jennings
2006-10-26
11 Cullen Jennings
[Ballot comment]
On the call, I would like to talk about existing implementations, expected future implementations, what we will do with future midcom protocols that …
[Ballot comment]
On the call, I would like to talk about existing implementations, expected future implementations, what we will do with future midcom protocols that are actually in use, and if we might want to do anything about this.
2006-10-26
11 Jari Arkko
[Ballot comment]
The security considerations section could point
out that there is no need to ensure that the
transactions affect only the owner's IP address. …
[Ballot comment]
The security considerations section could point
out that there is no need to ensure that the
transactions affect only the owner's IP address.
This is because MIDCOM is mostly targeted for
SIP servers and other similar entities, not client
devices.

I am curious about the current state of the WG
and the plans for implementing this. Are there
any implementations ongoing? Which one of the
multiple solutions that exist in this space
actually are being used?
2006-10-26
11 Jari Arkko [Ballot Position Update] Position for Jari Arkko has been changed to No Objection from Discuss by Jari Arkko
2006-10-26
11 Mark Townsley [Ballot Position Update] New position, No Objection, has been recorded by Mark Townsley
2006-10-26
11 Magnus Westerlund [Ballot discuss]
Need to resolve downref issues for RFC3303, RFC 3304, RFC 3989.
2006-10-26
11 Magnus Westerlund [Ballot Position Update] Position for Magnus Westerlund has been changed to Discuss from Yes by Magnus Westerlund
2006-10-26
11 Bill Fenner [Ballot Position Update] New position, No Objection, has been recorded by Bill Fenner
2006-10-25
11 Bill Fenner [Ballot comment]
The references to RFC 3303, RFC 3304 and RFC 3989 are downrefs (see RFC 3967).
2006-10-25
11 David Kessens [Ballot Position Update] New position, No Objection, has been recorded by David Kessens
2006-10-25
11 Ross Callon [Ballot Position Update] New position, No Objection, has been recorded by Ross Callon
2006-10-25
11 Jari Arkko
[Ballot comment]
I am curious about the current state of the WG
and the plans for implementing this. Are there
any implementations ongoing? Which one …
[Ballot comment]
I am curious about the current state of the WG
and the plans for implementing this. Are there
any implementations ongoing? Which one of the
multiple solutions that exist in this space
actually are being used?
2006-10-25
11 Jari Arkko
[Ballot discuss]
The document is very clear on requiring authentication
and authorization of the clients. I also liked the
idea that entries created by a …
[Ballot discuss]
The document is very clear on requiring authentication
and authorization of the clients. I also liked the
idea that entries created by a particular client remain
accessibly only for that client.

However, there is no discussion about the relationship
of the client authentication and the claimed internal
addresses. Does this mean that if two clients Alice
and Bob have addresses A0_Alice and A0_Bob in the
internal network, either one can create rules for
the other client's address?

Perhaps this is something that already exists
as a part of the SNMP security mechanisms. If
so, please document this. If not, please explain
the implications and/or add mechanisms to prevent
the problem.
2006-10-25
11 Jari Arkko [Ballot Position Update] New position, Discuss, has been recorded by Jari Arkko
2006-10-25
11 Dan Romascanu [Ballot Position Update] New position, No Objection, has been recorded by Dan Romascanu
2006-10-24
11 Russ Housley
[Ballot comment]
From the SecDir Review by Radia Perlman:

  I see no security problems with this document, and commend the
  authors for the …
[Ballot comment]
From the SecDir Review by Radia Perlman:

  I see no security problems with this document, and commend the
  authors for the very thorough security considerations section.
2006-10-24
11 Russ Housley [Ballot Position Update] New position, No Objection, has been recorded by Russ Housley
2006-10-23
11 Ted Hardie [Ballot Position Update] New position, No Objection, has been recorded by Ted Hardie
2006-10-23
11 Lars Eggert [Ballot Position Update] New position, Recuse, has been recorded by Lars Eggert
2006-10-23
11 Brian Carpenter [Ballot Position Update] New position, No Objection, has been recorded by Brian Carpenter
2006-10-11
11 Magnus Westerlund [Ballot Position Update] New position, Yes, has been recorded for Magnus Westerlund
2006-10-11
11 Magnus Westerlund Ballot has been issued by Magnus Westerlund
2006-10-11
11 Magnus Westerlund Created "Approve" ballot
2006-10-11
11 Magnus Westerlund State Changes to IESG Evaluation from Waiting for AD Go-Ahead::AD Followup by Magnus Westerlund
2006-10-11
11 Magnus Westerlund Placed on agenda for telechat - 2006-10-26 by Magnus Westerlund
2006-10-09
11 (System) Sub state has been changed to AD Follow up from New Id Needed
2006-10-09
09 (System) New version available: draft-ietf-midcom-mib-09.txt
2006-08-30
11 Magnus Westerlund State Changes to Waiting for AD Go-Ahead::Revised ID Needed from Waiting for Writeup::Revised ID Needed by Magnus Westerlund
2006-08-30
11 Magnus Westerlund [Note]: 'SEC-DIR Reviewer: Radia Perlman (Radia.Perlman@sun.com)
WG Shephard Melinda Shore' added by Magnus Westerlund
2006-08-30
11 Magnus Westerlund State Changes to Waiting for Writeup::Revised ID Needed from Waiting for Writeup by Magnus Westerlund
2006-08-17
11 (System) State has been changed to Waiting for Writeup from In Last Call by system
2006-08-16
11 Yoshiko Fong
IANA Last Call Comment:

Upon approval of this document, the IANA will assign a mib-2 number for
midcomMIB in the Prefix: iso.org.dod.internet.mgmt.mib-2 (1.3.6.1.2.1) at the …
IANA Last Call Comment:

Upon approval of this document, the IANA will assign a mib-2 number for
midcomMIB in the Prefix: iso.org.dod.internet.mgmt.mib-2 (1.3.6.1.2.1) at the following location:

http://www.iana.org/assignments/smi-numbers

We understand this to be the only IANA Action for this document.
2006-08-11
11 Lars Eggert [Note]: 'SEC-DIR Reviewer: Radia Perlman (Radia.Perlman@sun.com)' added by Lars Eggert
2006-08-03
11 Amy Vezza Last call sent
2006-08-03
11 Amy Vezza State Changes to In Last Call from Last Call Requested by Amy Vezza
2006-08-03
11 Magnus Westerlund Last Call was requested by Magnus Westerlund
2006-08-03
11 Magnus Westerlund State Changes to Last Call Requested from AD Evaluation::AD Followup by Magnus Westerlund
2006-08-03
11 (System) Ballot writeup text was added
2006-08-03
11 (System) Last call text was added
2006-08-03
11 (System) Ballot approval text was added
2006-07-31
11 (System) Sub state has been changed to AD Follow up from New Id Needed
2006-07-31
08 (System) New version available: draft-ietf-midcom-mib-08.txt
2006-07-26
11 Magnus Westerlund State Changes to AD Evaluation::Revised ID Needed from AD Evaluation by Magnus Westerlund
2006-07-26
11 Magnus Westerlund Comments sent to the MIDCOM WG and authors.
2006-07-26
11 Magnus Westerlund State Change Notice email list have been change to midcom-chairs@tools.ietf.org,srisuresh@yahoo.com,stiemerling@netlab.nec.de,quittek@netlab.nec.de from mshore@cisco.com
2006-07-03
11 Magnus Westerlund State Changes to AD Evaluation from Publication Requested by Magnus Westerlund
2006-06-20
11 Magnus Westerlund
  1.a) Have the chairs personally reviewed this version of the Internet
        Draft (ID), and in particular, do they believe this …
  1.a) Have the chairs personally reviewed this version of the Internet
        Draft (ID), and in particular, do they believe this ID is ready
        to forward to the IESG for publication?  Which chair is the WG
        Chair Shepherd for this document?

Yes, yes, and Melinda Shore (mshore@cisco.com).

  1.b) Has the document had adequate review from both key WG members
        and key non-WG members?  Do you have any concerns about the
        depth or breadth of the reviews that have been performed?

Yes, the document has been iterated between the authors, the working
group, and the responsible MIB Doctor (Juergen Schoenwaelder) for several
years.  Because the working group is somewhat factionalized, some
participants have been particularly diligent in their reviews.

  1.c) Do you have concerns that the document needs more review from a
        particular (broader) perspective (e.g., security, operational
        complexity, someone familiar with AAA, internationalization,
        XML, etc.)?

No - at this time the document has received extensive review from
experts in other areas, particularly security and operations and
management.

  1.d) Do you have any specific concerns/issues with this document that
        you believe the ADs and/or IESG should be aware of?  For
        example, perhaps you are uncomfortable with certain parts of the
        document, or have concerns whether there really is a need for
        it.  In any event, if your issues have been discussed in the WG
        and the WG has indicated it that it still wishes to advance the
        document, detail those concerns in the write-up.

I suspect that this document has been overtaken by events outside of
the IETF (in fact, I'm certain of it) but I think it's important to
get the document finalized and published.

  1.e) How solid is the WG consensus behind this document?  Does it
        represent the strong concurrence of a few individuals, with
        others being silent, or does the WG as a whole understand and
        agree with it?

I think that working group consensus that the document is complete is
quite strong.  Working group consensus that the document is necessary
is somewhat (!!) less strong.  Not many people are happy that SNMPv2
was chosen, but there wasn't a procedural way around the fact that
it was the winner in the evaluation process.

  1.f) Has anyone threatened an appeal or otherwise indicated extreme
        discontent?  If so, please summarise the areas of conflict in
        separate email to the Responsible Area Director.  (It should be
        separate email because this questionnaire will be entered into
        the tracker).

No.


  1.g) Have the chairs verified that the document checks out against
        all the ID nits? (see http://www.ietf.org/ID-Checklist.html).
        Boilerplate checks are not enough; this check needs to be
        thorough.

Yes.

  1.h) Has the document split its references into normative and
        informative?  Are there normative references to IDs, where the
        IDs are not also ready for advancement or are otherwise in an
        unclear state?

Yes, and no.


Technical summary:

The midcom working group was chartered to develop a protocol to
send requests from network endpoints/application participants to
network devices, initially focusing on firewalls and NATs.  The
charter required that the working group reuse an existing IETF
protocol if possible, and the working group followed an evaluation
process described in RFC 4097.  The protocol that best met
the evaluation criteria was SNMPv2.

The document being submitted for publication is the definition of
a MIB to be used to communicate pinhole requests to a firewall and
NAT table mapping requests to a NAT.

Working group summary:

There is working group consensus that this document is ready to
be published.

Protocol quality:

The protocol has received extensive review by applications experts
in the domain most likely to use a midcom protocol, by SNMP protocol
experts, and by middlebox experts.  We know of no existing
implementations, and it is not clear that it will be implemented given
the existence of competing protocols (for example, SIMCO).  This
protocol received particular attention in its early stages from
David Harrington, Wes Hardaker, and Mary Barnes, and recently from
its MIB Doctor, Juergen Shoenwaelder.
2006-06-20
11 Magnus Westerlund Intended Status has been changed to Proposed Standard from None
2006-06-20
11 Magnus Westerlund State Changes to Publication Requested from AD is watching by Magnus Westerlund
2006-06-08
07 (System) New version available: draft-ietf-midcom-mib-07.txt
2006-04-05
11 Magnus Westerlund Shepherding AD has been changed to Magnus Westerlund from Jon Peterson
2006-01-31
11 Jon Peterson Draft Added by Jon Peterson in state AD is watching
2006-01-24
06 (System) New version available: draft-ietf-midcom-mib-06.txt
2005-03-16
05 (System) New version available: draft-ietf-midcom-mib-05.txt
2005-01-31
04 (System) New version available: draft-ietf-midcom-mib-04.txt
2004-10-28
03 (System) New version available: draft-ietf-midcom-mib-03.txt
2004-07-21
02 (System) New version available: draft-ietf-midcom-mib-02.txt
2004-05-11
01 (System) New version available: draft-ietf-midcom-mib-01.txt
2004-02-02
00 (System) New version available: draft-ietf-midcom-mib-00.txt