Container Option for Server Configuration
draft-ietf-dhc-container-opt-07
Revision differences
Document history
Date | Rev. | By | Action |
---|---|---|---|
2015-10-14
|
07 | (System) | Notify list changed from dhc-chairs@ietf.org, draft-ietf-dhc-container-opt@ietf.org to (None) |
2013-10-10
|
07 | (System) | Document has expired |
2013-10-10
|
07 | (System) | State changed to I-D Exists (IESG: Dead) from AD is watching |
2013-04-28
|
07 | Bernie Volz | IETF WG state changed to WG Document from In WG Last Call |
2013-04-28
|
07 | Bernie Volz | Annotation tag Revised I-D Needed - Issue raised by WGLC set. |
2013-04-15
|
07 | Bernie Volz | IETF WG state changed to In WG Last Call from WG Document |
2013-04-08
|
07 | Bernie Volz | This document did NOT pass WGLC as there was no support for it and Ralph indicated that there were several IESG Discusses from several years … This document did NOT pass WGLC as there was no support for it and Ralph indicated that there were several IESG Discusses from several years ago (2009) that did not get addressed. Also, Barbara Stark commented about " alternative solution that exists in BBF, for managed "RGs", for DHCPv6 options." The authors are encouraged to update the draft addressing the open issues and try again. However, we will need additional support for this work if it is to pass a future WGLC. - Tomek & Bernie |
2013-04-08
|
07 | Reinaldo Penno | New version available: draft-ietf-dhc-container-opt-07.txt |
2013-03-14
|
06 | Ted Lemon | Shepherding AD changed to Ted Lemon |
2012-12-17
|
06 | Ryan Cross | Created "Approve" ballot |
2012-12-17
|
06 | Ryan Cross | Closed "Approve" ballot |
2012-12-17
|
06 | Ralph Droms | State changed to AD is watching from Dead |
2012-12-17
|
06 | Ralph Droms | IESG positions from previous ballot Robert Sparks Discuss (2010-04-13) This document appears to target a very specific type of deployment, but doesn't explicitly restrict the … IESG positions from previous ballot Robert Sparks Discuss (2010-04-13) This document appears to target a very specific type of deployment, but doesn't explicitly restrict the applicability of the option to that deployment scenario. Given the very limited semantic definition it's very difficult to anticipate the potential consequences should some other type of deployment attempt to use the option, or if the option leaks into unintended places. There was some list discussion around multiple interfaces in an RG, but it focused on DHCP-clients on those interfaces. It's not clear what could happen that's sane if the RG element had more than one interface where it was acting as a server. ---- (4/13/2010 Adopting Cullen Jenning's Discuss) ------ I would like the geopriv and ecrit folks to get a chance to look at this. My understanding of their assumptions about DHCP will work is not at all consistent with this and this could have some fairly significant implications to plans for Emergency 911 type systems. Today, RG are almost always NATs and they are deployed in a nested fashion. So the DSL modem may have a RG, but very often another "RG" that is perhaps a wireless AP is plugged into that. This draft needs advice on how it works with multiple layers of RGs. My current read of it, it does not look like it would work in the layered case. This draft needs advice on how the RG deals with conflicts. For example, if normally it would take whatever DNS server was found by the RG client and advertise that in the RG server. But imagine the container also has the name of the DNS server. Which one does the RG Server use? I don't understand why the the SP needs to be able send different information to the equipment behind the RG than it sends to the RG. Can you clarify the reasoning behind this requirement? In section 3, the third req bullet point. I'm not clear on the requirement. Are you saying there much be a way for a SP to add new potion that gets sent to the user equipment without changing the software/config on the RG? This would make sense to me as a requirement but I'm not sure this draft meets that. When the RG Server gets an option it does not know about in he container, what does it do with it? How is expiry of the information in the container handled? If the SP wants to change some of the information in it, how is that done? These containers are going to get very large - does anything need to be said about size? With this work with a 10k container? In section 5.5, can you please explicitly list the things the RG Server needs to discard - as an implementer I would not know what to do. Can the SP send a container even if the RG client does not request it? This seems inconsistent with other DHCP stuff. Why is it like this? Can the RG server return a container to someone that requests it and what goes in it? The idea that DHCP authentication would be configure between two nested RG in grandma's house seems extremely unlikely. I am not aware of any deployments that use authenticated DHCP between SP and RG. The idea that I can get pushed a container with the RG client did not even send a request, seems very disturbing from a security point of view. This is going to contain things like my location for E911 calls. I realize that what is possible for the security is going to be pretty limited but I'd like to see it at least mitigate attackers that were not on the path between RG Client and SP DHCP server. The statement that the RG server MAY discard everything make a device that passes nothing useful down fully compliant with the spec. This seems a bit problematic for trying to deploy services that actually use this. I rather see something along lines of SHOULD pass it all unless explicitly configured to block something and default configuration needs to not block. *************** Ronald Bonica Discuss (2009-04-22) This document probably deserves some discussion. To be honest, I am torn between voting YES and DISCUSS. Let's see how the discussion on the call goes. On the one hand, the DHCP container object is a good thing. It permits the host and the SP DHCP Server, even when the intervening RG client has no idea what those two parties are discussing. On the other hand, this conversation could be dangerous. If one were to think of the customer and SP domains as being separate, the RG client would be a reasonable place to put the security boundary. If the boundary were implemented at the RG client, it would be a bad thing for the client to pass on messages that it doesn't understand. If this option were to be used, each client host would have to protect itself from bad behavior on the part part of the SP (e.g., installing as route to 0.0.0.0/0 through your other provider, installing a static route to the SP's competitor through /dev/null). *************** Russ Housley Discuss (2009-04-21) The Gen-ART Review by Scott Brim posted on 7 April 2009 raises some concerns that have not been addressed. Responses to these concerns are needed, even if there are not any document changes. The review can be found at: http://www.softarmor.com/rai/temp-gen-art/ draft-ietf-dhc-container-opt-05-brim.txt *************** [Cullen Jennings] Discuss (2009-04-22) My apologies for getting to this draft so late. I did not realize what it was and did not even realize this work was in progress. It has lots of implication to VoIP and IpTV work in RAI. These are discus discuss and many of them simply reflect I am just getting up to speed on this now. I would like the geopriv and ecrit folks to get a chance to look at this. My understanding of their assumptions about DHCP will work is not at all consistent with this and this could have some fairly significant implications to plans for Emergency 911 type systems. Today, RG are almost always NATs and they are deployed in a nested fashion. So the DSL modem may have a RG, but very often another "RG" that is perhaps a wireless AP is plugged into that. This draft needs advice on how it works with multiple layers of RGs. My current read of it, it does not look like it would work in the layered case. This draft needs advice on how the RG deals with conflicts. For example, if normally it would take whatever DNS server was found by the RG client and advertise that in the RG server. But imagine the container also has the name of the DNS server. Which one does the RG Server use? I don't understand why the the SP needs to be able send different information to the equipment behind the RG than it sends to the RG. Can you clarify the reasoning behind this requirement? In section 3, the third req bullet point. I'm not clear on the requirement. Are you saying there much be a way for a SP to add new potion that gets sent to the user equipment without changing the software/config on the RG? This would make sense to me as a requirement but I'm not sure this draft meets that. When the RG Server gets an option it does not know about in he container, what does it do with it? How is expiry of the information in the container handled? If the SP wants to change some of the information in it, how is that done? These containers are going to get very large - does anything need to be said about size? With this work with a 10k container? In section 5.5, can you please explicitly list the things the RG Server needs to discard - as an implementer I would not know what to do. Can the SP send a container even if the RG client does not request it? This seems inconsistent with other DHCP stuff. Why is it like this? Can the RG server return a container to someone that requests it and what goes in it? The idea that DHCP authentication would be configure between two nested RG in grandma's house seems extremely unlikely. I am not aware of any deployments that use authenticated DHCP between SP and RG. The idea that I can get pushed a container with the RG client did not even send a request, seems very disturbing from a security point of view. This is going to contain things like my location for E911 calls. I realize that what is possible for the security is going to be pretty limited but I'd like to see it at least mitigate attackers that were not on the path between RG Client and SP DHCP server. The statement that the RG server MAY discard everything make a device that passes nothing useful down fully compliant with the spec. This seems a bit problematic for trying to deploy services that actually use this. I rather see something along lines of SHOULD pass it all unless explicitly configured to block something and default configuration needs to not block. *************** [Dan Romascanu] Discuss (2009-04-21) I share the concerns expressed by othe ADs about the danger of this document being interpreted as defining an extension of DHCP that would allow usage as a more generic service configuration protocol. I believe that there is need for more strict language that clarifies the scope of the container option and restricts the deployment space to RGs. Specifically wherever it makes sense replace 'configuration information' by 'DHCP configuration information'. Also in the Intorduction section: The DHCP Container option defined in this document provides a mechanism through which the RG DHCP client can pass DHCP options to the RG DHCP server without explicit knowledge of the semantics of those options. With this option, the SP DHCP server can pass both current and future DHCP options to the RG DHCP server. The DHCP Container option does not carry IP addresses, IPv6 prefixes or other information about leases. It carries other configuration information. The last phrase should make clear that the DHCP container option carries configuration information expressed as DHCP options. Also, in the OPS-DIR review by Tina Tsou the observation was made that it is not clear from the text that the RG client and RG server are always considered as being physically colocated in the same device. It would be good to make this statement explicit, to avoid any other 'creative' deployments or interpretations in the future. *************** [Lars Eggert] Comment (2009-04-20) I'm abstaining. Basically, the addition of this option turns DHCP from a host configuration protocol into a DHCP server operations&management protocol. That's a pretty dramatic change in scope for DHCP, and even if I thought this was a good idea, I'm missing documents that describe how a DHCP that had been extended with this options would be used for this purpose. *************** [Magnus Westerlund] Comment (2009-04-23) I do support the discusses from Cullen on the need to clarify and explain multi-level deployments. I am also worried about the architectural change and lack of documented analysis on what the change means. *************** [Tim Polk] Discuss (2009-04-22) Joe Salowey's secdir review (posted on 14 April 2009) proposed clarifying text for the security considerations and raised questions regarding the suitability of this protocol for interactions between the RG server and client hosts. I have not seen a response to this message, and am interested in hearing the author's position on the proposed text and the applicability question. |
2012-12-17
|
06 | Ralph Droms | Shepherding AD changed to Ralph Droms |
2012-12-17
|
06 | Reinaldo Penno | New version available: draft-ietf-dhc-container-opt-06.txt |
2012-08-22
|
05 | (System) | post-migration administrative database adjustment to the No Objection position for Adrian Farrel |
2012-08-22
|
05 | (System) | post-migration administrative database adjustment to the No Objection position for Magnus Westerlund |
2010-10-24
|
05 | (System) | Document has expired |
2010-10-23
|
05 | Jari Arkko | State Changes to Dead from IESG Evaluation::External Party by Jari Arkko |
2010-10-23
|
05 | Jari Arkko | Ralph and the chairs indicate that there is no longer interest for this draft. Time to mark it dead. |
2010-05-03
|
05 | Jari Arkko | State Changes to IESG Evaluation::External Party from IESG Evaluation::Revised ID Needed by Jari Arkko |
2010-05-03
|
05 | Jari Arkko | Ralph thinks there is one customer for this. Ralph will take an action item to determine with the chairs if that's really the case. If … Ralph thinks there is one customer for this. Ralph will take an action item to determine with the chairs if that's really the case. If not, the document can be moved to dead. |
2010-04-26
|
05 | Jari Arkko | Resent the request to do something about this. The token is by the DHC WG chairs. |
2010-04-13
|
05 | Robert Sparks | [Ballot discuss] This document appears to target a very specific type of deployment, but doesn't explicitly restrict the applicability of the option to that deployment … [Ballot discuss] This document appears to target a very specific type of deployment, but doesn't explicitly restrict the applicability of the option to that deployment scenario. Given the very limited semantic definition it's very difficult to anticipate the potential consequences should some other type of deployment attempt to use the option, or if the option leaks into unintended places. There was some list discussion around multiple interfaces in an RG, but it focused on DHCP-clients on those interfaces. It's not clear what could happen that's sane if the RG element had more than one interface where it was acting as a server. ---- (4/13/2010 Adopting Cullen Jenning's Discuss) ------ I would like the geopriv and ecrit folks to get a chance to look at this. My understanding of their assumptions about DHCP will work is not at all consistent with this and this could have some fairly significant implications to plans for Emergency 911 type systems. Today, RG are almost always NATs and they are deployed in a nested fashion. So the DSL modem may have a RG, but very often another "RG" that is perhaps a wireless AP is plugged into that. This draft needs advice on how it works with multiple layers of RGs. My current read of it, it does not look like it would work in the layered case. This draft needs advice on how the RG deals with conflicts. For example, if normally it would take whatever DNS server was found by the RG client and advertise that in the RG server. But imagine the container also has the name of the DNS server. Which one does the RG Server use? I don't understand why the the SP needs to be able send different information to the equipment behind the RG than it sends to the RG. Can you clarify the reasoning behind this requirement? In section 3, the third req bullet point. I'm not clear on the requirement. Are you saying there much be a way for a SP to add new potion that gets sent to the user equipment without changing the software/config on the RG? This would make sense to me as a requirement but I'm not sure this draft meets that. When the RG Server gets an option it does not know about in he container, what does it do with it? How is expiry of the information in the container handled? If the SP wants to change some of the information in it, how is that done? These containers are going to get very large - does anything need to be said about size? With this work with a 10k container? In section 5.5, can you please explicitly list the things the RG Server needs to discard - as an implementer I would not know what to do. Can the SP send a container even if the RG client does not request it? This seems inconsistent with other DHCP stuff. Why is it like this? Can the RG server return a container to someone that requests it and what goes in it? The idea that DHCP authentication would be configure between two nested RG in grandma's house seems extremely unlikely. I am not aware of any deployments that use authenticated DHCP between SP and RG. The idea that I can get pushed a container with the RG client did not even send a request, seems very disturbing from a security point of view. This is going to contain things like my location for E911 calls. I realize that what is possible for the security is going to be pretty limited but I'd like to see it at least mitigate attackers that were not on the path between RG Client and SP DHCP server. The statement that the RG server MAY discard everything make a device that passes nothing useful down fully compliant with the spec. This seems a bit problematic for trying to deploy services that actually use this. I rather see something along lines of SHOULD pass it all unless explicitly configured to block something and default configuration needs to not block. |
2009-08-28
|
05 | Jari Arkko | Ralph and I agreed that this work item should be handled by the DHC chairs: - find a new author (to replace Ralph) - find … Ralph and I agreed that this work item should be handled by the DHC chairs: - find a new author (to replace Ralph) - find a use case - confirm that the approach using DHC is architecturally right, as opposed to using some of the other means that have been developed independent of DHCP and which are less reliant on the network architecture - solve the problem with passing unrecognized options |
2009-04-24
|
05 | (System) | Removed from agenda for telechat - 2009-04-23 |
2009-04-23
|
05 | Cindy Morgan | State Changes to IESG Evaluation::Revised ID Needed from IESG Evaluation by Cindy Morgan |
2009-04-23
|
05 | Ross Callon | [Ballot Position Update] New position, No Objection, has been recorded by Ross Callon |
2009-04-23
|
05 | Magnus Westerlund | [Ballot Position Update] Position for Magnus Westerlund has been changed to No Objection from Discuss by Magnus Westerlund |
2009-04-23
|
05 | Magnus Westerlund | [Ballot discuss] Under what charter item has this work been done in the DHC WG? Looking at the charter and milestones I find this item: … [Ballot discuss] Under what charter item has this work been done in the DHC WG? Looking at the charter and milestones I find this item: * Develop extensions to the DHCP infrastructure as required to meet new applications and deployments of DHCP. The topics currently in development are: - Subnet allocation mechanisms - Virtual subnet identification option - Option for passing DNS domain information in DHCPv6 - DHCP relay agent assignment notification in DHCPv6 - Option for DHCPv6 server reply sequence numbers - Rebinding capability for DHCPv6 Reconfigure messages - Behavior of layer 2 relay agents The adoption of new items requires explicit agreement from the AD or rechartering. This doesn't seem to fit any of the explicitly listed items. Has the AD explicitly approved this work? I am asking as there are no milestone for this document what I can find. Considering the architecture change, shouldn't maybe this gone through a recharter action? |
2009-04-23
|
05 | Magnus Westerlund | [Ballot Position Update] Position for Magnus Westerlund has been changed to Discuss from Abstain by Magnus Westerlund |
2009-04-23
|
05 | Magnus Westerlund | [Ballot comment] I do support the discusses from Cullen on the need to clarify and explain multi-level deployments. I am also worried about the architectural … [Ballot comment] I do support the discusses from Cullen on the need to clarify and explain multi-level deployments. I am also worried about the architectural change and lack of documented analysis on what the change means. |
2009-04-23
|
05 | Magnus Westerlund | [Ballot Position Update] New position, Abstain, has been recorded by Magnus Westerlund |
2009-04-22
|
05 | Pasi Eronen | [Ballot Position Update] New position, No Objection, has been recorded by Pasi Eronen |
2009-04-22
|
05 | Cullen Jennings | [Ballot discuss] My apologies for getting to this draft so late. I did not realize what it was and did not even realize this work … [Ballot discuss] My apologies for getting to this draft so late. I did not realize what it was and did not even realize this work was in progress. It has lots of implication to VoIP and IpTV work in RAI. These are discus discuss and many of them simply reflect I am just getting up to speed on this now. I would like the geopriv and ecrit folks to get a chance to look at this. My understanding of their assumptions about DHCP will work is not at all consistent with this and this could have some fairly significant implications to plans for Emergency 911 type systems. Today, RG are almost always NATs and they are deployed in a nested fashion. So the DSL modem may have a RG, but very often another "RG" that is perhaps a wireless AP is plugged into that. This draft needs advice on how it works with multiple layers of RGs. My current read of it, it does not look like it would work in the layered case. This draft needs advice on how the RG deals with conflicts. For example, if normally it would take whatever DNS server was found by the RG client and advertise that in the RG server. But imagine the container also has the name of the DNS server. Which one does the RG Server use? I don't understand why the the SP needs to be able send different information to the equipment behind the RG than it sends to the RG. Can you clarify the reasoning behind this requirement? In section 3, the third req bullet point. I'm not clear on the requirement. Are you saying there much be a way for a SP to add new potion that gets sent to the user equipment without changing the software/config on the RG? This would make sense to me as a requirement but I'm not sure this draft meets that. When the RG Server gets an option it does not know about in he container, what does it do with it? How is expiry of the information in the container handled? If the SP wants to change some of the information in it, how is that done? These containers are going to get very large - does anything need to be said about size? With this work with a 10k container? In section 5.5, can you please explicitly list the things the RG Server needs to discard - as an implementer I would not know what to do. Can the SP send a container even if the RG client does not request it? This seems inconsistent with other DHCP stuff. Why is it like this? Can the RG server return a container to someone that requests it and what goes in it? The idea that DHCP authentication would be configure between two nested RG in grandma's house seems extremely unlikely. I am not aware of any deployments that use authenticated DHCP between SP and RG. The idea that I can get pushed a container with the RG client did not even send a request, seems very disturbing from a security point of view. This is going to contain things like my location for E911 calls. I realize that what is possible for the security is going to be pretty limited but I'd like to see it at least mitigate attackers that were not on the path between RG Client and SP DHCP server. The statement that the RG server MAY discard everything make a device that passes nothing useful down fully compliant with the spec. This seems a bit problematic for trying to deploy services that actually use this. I rather see something along lines of SHOULD pass it all unless explicitly configured to block something and default configuration needs to not block. |
2009-04-22
|
05 | Cullen Jennings | [Ballot discuss] My apologies for getting to this draft so late. I did not realize what it was. |
2009-04-22
|
05 | Cullen Jennings | [Ballot Position Update] New position, Discuss, has been recorded by Cullen Jennings |
2009-04-22
|
05 | Ron Bonica | [Ballot discuss] This document probably deserves some discussion. To be honest, I am torn between voting YES and DISCUSS. Let's see how the discussion on … [Ballot discuss] This document probably deserves some discussion. To be honest, I am torn between voting YES and DISCUSS. Let's see how the discussion on the call goes. On the one hand, the DHCP container object is a good thing. It permits the host and the SP DHCP Server, even when the intervening RG client has no idea what those two parties are discussing. On the other hand, this conversation could be dangerous. If one were to think of the customer and SP domains as being separate, the RG client would be a reasonable place to put the security boundary. If the boundary were implemented at the RG client, it would be a bad thing for the client to pass on messages that it doesn't understand. If this option were to be used, each client host would have to protect itself from bad behavior on the part part of the SP (e.g., installing as route to 0.0.0.0/0 through your other provider, installing a static route to the SP's competitor through /dev/null). |
2009-04-22
|
05 | Ron Bonica | [Ballot discuss] This document probably deserves some discussion. To be honest, I am torn between voting YES and DISCUSS. Let's see how the discussion on … [Ballot discuss] This document probably deserves some discussion. To be honest, I am torn between voting YES and DISCUSS. Let's see how the discussion on the call goes. On the one hand, the DHCP container object is a good thing. It permits the host and the SP DHCP Server, even when the intervening RG client has no idea what those two parties are discussing. On the other hand, this conversation could be dangerous. If one were to think of the customer and SP domains as being separate, the RG client would be a reasonable place to put the security boundary. If the boundary were implemented at the RG client, it would be a bad thing for the client to pass on messages that it doesn't understand. If this option were to be used, each client host would have to protect itself from bad behavior on the part part of the SP (e.g., installing as route to 0.0.0.0/0 through your other provider, installing a static route to the SP's competitor through /dev/null). |
2009-04-22
|
05 | Ron Bonica | [Ballot Position Update] New position, Discuss, has been recorded by Ron Bonica |
2009-04-22
|
05 | Tim Polk | [Ballot discuss] Joe Salowey's secdir review (posted on 14 April 2009) proposed clarifying text for the security considerations and raised questions regarding the suitability of … [Ballot discuss] Joe Salowey's secdir review (posted on 14 April 2009) proposed clarifying text for the security considerations and raised questions regarding the suitability of this protocol for interactions between the RG server and client hosts. I have not seen a response to this message, and am interested in hearing the author's position on the proposed text and the applicability question. |
2009-04-22
|
05 | Tim Polk | [Ballot Position Update] New position, Discuss, has been recorded by Tim Polk |
2009-04-22
|
05 | Lisa Dusseault | [Ballot Position Update] New position, No Objection, has been recorded by Lisa Dusseault |
2009-04-21
|
05 | Russ Housley | [Ballot discuss] The Gen-ART Review by Scott Brim posted on 7 April 2009 raises some concerns that have not been addressed. Responses to these … [Ballot discuss] The Gen-ART Review by Scott Brim posted on 7 April 2009 raises some concerns that have not been addressed. Responses to these concerns are needed, even if there are not any document changes. The review can be found at: http://www.softarmor.com/rai/temp-gen-art/ draft-ietf-dhc-container-opt-05-brim.txt |
2009-04-21
|
05 | Russ Housley | [Ballot Position Update] New position, Discuss, has been recorded by Russ Housley |
2009-04-21
|
05 | Dan Romascanu | [Ballot discuss] I share the concerns expressed by othe ADs about the danger of this document being interpreted as defining an extension of DHCP that … [Ballot discuss] I share the concerns expressed by othe ADs about the danger of this document being interpreted as defining an extension of DHCP that would allow usage as a more generic service configuration protocol. I believe that there is need for more strict language that clarifies the scope of the container option and restricts the deployment space to RGs. Specifically wherever it makes sense replace 'configuration information' by 'DHCP configuration information'. Also in the Intorduction section: The DHCP Container option defined in this document provides a mechanism through which the RG DHCP client can pass DHCP options to the RG DHCP server without explicit knowledge of the semantics of those options. With this option, the SP DHCP server can pass both current and future DHCP options to the RG DHCP server. The DHCP Container option does not carry IP addresses, IPv6 prefixes or other information about leases. It carries other configuration information. The last phrase should make clear that the DHCP container option carries configuration information expressed as DHCP options. Also, in the OPS-DIR review by Tina Tsou the observation was made that it is not clear from the text that the RG client and RG server are always considered as being physically colocated in the same device. It would be good to make this statement explicit, to avoid any other 'creative' deployments or interpretations in the future. |
2009-04-21
|
05 | Dan Romascanu | [Ballot Position Update] New position, Discuss, has been recorded by Dan Romascanu |
2009-04-20
|
05 | Robert Sparks | [Ballot discuss] This document appears to target a very specific type of deployment, but doesn't explicitly restrict the applicability of the option to that deployment … [Ballot discuss] This document appears to target a very specific type of deployment, but doesn't explicitly restrict the applicability of the option to that deployment scenario. Given the very limited semantic definition it's very difficult to anticipate the potential consequences should some other type of deployment attempt to use the option, or if the option leaks into unintended places. There was some list discussion around multiple interfaces in an RG, but it focused on DHCP-clients on those interfaces. It's not clear what could happen that's sane if the RG element had more than one interface where it was acting as a server. |
2009-04-20
|
05 | Robert Sparks | [Ballot Position Update] New position, Discuss, has been recorded by Robert Sparks |
2009-04-20
|
05 | Ralph Droms | [Ballot Position Update] New position, Recuse, has been recorded by Ralph Droms |
2009-04-20
|
05 | Lars Eggert | [Ballot comment] I'm abstaining. Basically, the addition of this option turns DHCP from a host configuration protocol into a DHCP server operations&management protocol. That's a … [Ballot comment] I'm abstaining. Basically, the addition of this option turns DHCP from a host configuration protocol into a DHCP server operations&management protocol. That's a pretty dramatic change in scope for DHCP, and even if I thought this was a good idea, I'm missing documents that describe how a DHCP that had been extended with this options would be used for this purpose. |
2009-04-20
|
05 | Lars Eggert | [Ballot comment] Basically, the addition of this option turns DHCP from a host configuration protocol into a DHCP server operations&management protocol. That's a pretty dramatic … [Ballot comment] Basically, the addition of this option turns DHCP from a host configuration protocol into a DHCP server operations&management protocol. That's a pretty dramatic change in scope for DHCP, and even if I thought this was a good idea, I'm missing documents that describe how a DHCP that had been extended with this options would be used for this purpose. |
2009-04-20
|
05 | Lars Eggert | [Ballot Position Update] Position for Lars Eggert has been changed to Abstain from Discuss by Lars Eggert |
2009-04-20
|
05 | Lars Eggert | [Ballot discuss] |
2009-04-20
|
05 | Lars Eggert | [Ballot discuss] Basically, the addition of this option turns DHCP from a host configuration protocol into a DHCP server operations&management protocol. That's a pretty dramatic … [Ballot discuss] Basically, the addition of this option turns DHCP from a host configuration protocol into a DHCP server operations&management protocol. That's a pretty dramatic change in scope for DHCP, and even if I thought this was a good idea, I'm missing documents that describe how a DHCP that had been extended with this options would be used for this purpose. |
2009-04-20
|
05 | Lars Eggert | [Ballot Position Update] New position, Discuss, has been recorded by Lars Eggert |
2009-04-20
|
05 | Adrian Farrel | [Ballot Position Update] Position for Adrian Farrel has been changed to No Objection from Discuss by Adrian Farrel |
2009-04-20
|
05 | Jari Arkko | State Changes to IESG Evaluation from Waiting for AD Go-Ahead by Jari Arkko |
2009-04-20
|
05 | Adrian Farrel | [Ballot discuss] In Setion 1 you have: The DHCP Container option does not carry IP addresses, IPv6 prefixes or other information about leases. … [Ballot discuss] In Setion 1 you have: The DHCP Container option does not carry IP addresses, IPv6 prefixes or other information about leases. It carries other configuration information. And I note that there is no use of RFC 2119 language. So I looked later in the I-D for a definition of what may be found in "DHCP Options for RG server". All I could find was in section 5.3: the policy determining the contents of the Container object are out of scope of this document and left unspecified. Which seems to be significantly in conflict with section 1. And section 5.5: The RG server MUST discard any options related to IP address assignment, IPv6 prefix delegation or operation of the DHCP protocol itself. which implies that the IP addresses MAY be present, but MUST be discarded. Consistency please. Oh, and when banning the use of addresses in this way, half a sentence saying why would be nice. |
2009-04-20
|
05 | Adrian Farrel | [Ballot Position Update] New position, Discuss, has been recorded by Adrian Farrel |
2009-04-20
|
05 | Adrian Farrel | [Ballot comment] The second sentence of the Abstract is particularly flimsy. "This DHCP option carries a set of DHCP options that can be used by … [Ballot comment] The second sentence of the Abstract is particularly flimsy. "This DHCP option carries a set of DHCP options that can be used by another DHCP server." An option carries a set of options? "Used by"? "Another DHCP server" with respect to what? This optional use of the word "option" gets heavy again in the penultimate paragraph of section 1. |
2009-04-16
|
05 | Samuel Weiler | Request for Last Call review by SECDIR Completed. Reviewer: Joseph Salowey. |
2009-04-14
|
05 | (System) | State has been changed to Waiting for AD Go-Ahead from In Last Call by system |
2009-04-12
|
05 | Alexey Melnikov | [Ballot Position Update] New position, No Objection, has been recorded by Alexey Melnikov |
2009-04-09
|
05 | Samuel Weiler | Request for Last Call review by SECDIR is assigned to Joseph Salowey |
2009-04-09
|
05 | Samuel Weiler | Request for Last Call review by SECDIR is assigned to Joseph Salowey |
2009-04-09
|
05 | Samuel Weiler | Assignment of request for Last Call review by SECDIR to Stephen Kent was rejected |
2009-04-09
|
05 | Amanda Baber | IANA questions/comments: IANA has reviewed draft-ietf-dhc-container-opt-05.txt, which is currently in Last Call, and has the following questions and comments: - What's the Data Length … IANA questions/comments: IANA has reviewed draft-ietf-dhc-container-opt-05.txt, which is currently in Last Call, and has the following questions and comments: - What's the Data Length of the DHCPv4 Option? Action 1: Upon approval of this document, IANA will make the following assignment in the "BOOTP Vendor Extensions and DHCP Options" registry at http://www.iana.org/assignments/bootp-dhcp-parameters/bootp-dhcp-parameters.xhtml Tag Name Data Length Meaning Reference --- ----- ----------- --------- ---------- TBD OPTION_CONTAINER_V4 ? Container Option [RFC-dhc-container-opt-05] Action 2: Upon approval of this document, IANA will make the following assignments in the "DHCP Option Codes" registry at http://www.iana.org/assignments/dhcpv6-parameters/dhcpv6-parameters.xhtml Value Description Reference ----- ----------- --------- TBD OPTION_CONTAINER_V6 [RFC-dhc-container-opt-05] We understand the above to be the only IANA Actions for this document. |
2009-04-03
|
05 | Samuel Weiler | Request for Last Call review by SECDIR is assigned to Stephen Kent |
2009-04-03
|
05 | Samuel Weiler | Request for Last Call review by SECDIR is assigned to Stephen Kent |
2009-04-01
|
05 | Jari Arkko | Placed on agenda for telechat - 2009-04-23 by Jari Arkko |
2009-03-31
|
05 | Amy Vezza | Last call sent |
2009-03-31
|
05 | Amy Vezza | State Changes to In Last Call from Last Call Requested by Amy Vezza |
2009-03-30
|
05 | Jari Arkko | State Changes to Last Call Requested from AD Evaluation by Jari Arkko |
2009-03-30
|
05 | Jari Arkko | Last Call was requested by Jari Arkko |
2009-03-30
|
05 | Jari Arkko | [Ballot Position Update] New position, Yes, has been recorded for Jari Arkko |
2009-03-30
|
05 | Jari Arkko | Ballot has been issued by Jari Arkko |
2009-03-30
|
05 | Jari Arkko | Created "Approve" ballot |
2009-03-30
|
05 | (System) | Ballot writeup text was added |
2009-03-30
|
05 | (System) | Last call text was added |
2009-03-30
|
05 | (System) | Ballot approval text was added |
2009-03-30
|
05 | Jari Arkko | State Changes to AD Evaluation from Publication Requested by Jari Arkko |
2009-03-25
|
05 | Cindy Morgan | (1.a) Who is the Document Shepherd for this document? Has the Document Shepherd personally reviewed this version of … (1.a) Who is the Document Shepherd for this document? Has the Document Shepherd personally reviewed this version of the document and, in particular, does he or she believe this version is ready for forwarding to the IESG for publication? John Jason Brzozowski, dhc WG co-chair. I have reviewed the document and believe it is ready for publication. (1.b) Has the document had adequate review both from key WG members and from key non-WG members? Does the Document Shepherd have any concerns about the depth or breadth of the reviews that have been performed? The document has had adequate review. The WG last call discussion thread starts at http://www.ietf.org/mail-archive/web/dhcwg/current/msg08858.html There are no concerns regarding the review of this document. (1.c) Does the Document Shepherd have concerns that the document needs more review from a particular or broader perspective, e.g., security, operational complexity, someone familiar with AAA, internationalization or XML? No. (1.d) Does the Document Shepherd have any specific concerns or issues with this document that the Responsible Area Director and/or the IESG should be aware of? For example, perhaps he or she is uncomfortable with certain parts of the document, or has concerns whether there really is a need for it. In any event, if the WG has discussed those issues and has indicated that it still wishes to advance the document, detail those concerns here. Has an IPR disclosure related to this document been filed? If so, please include a reference to the disclosure and summarize the WG discussion and conclusion on this issue. No there are no known issues that the responsible AD needs to be aware of. There are no sections of this document that the shepherd has concerns with. There are no known IPR disclosures related to this document. (1.e) How solid is the WG consensus behind this document? Does it represent the strong concurrence of a few individuals, with others being silent, or does the WG as a whole understand and agree with it? The consensus for the document is from a minority of WG members, with no dissenting opinions. (1.f) Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarise the areas of conflict in separate email messages to the Responsible Area Director. (It should be in a separate email because this questionnaire is entered into the ID Tracker.) No appeals have been threatened. (1.g) Has the Document Shepherd personally verified that the document satisfies all ID nits? (See http://www.ietf.org/ID-Checklist.html and http://tools.ietf.org/tools/idnits/). Boilerplate checks are not enough; this check needs to be thorough. Has the document met all formal review criteria it needs to, such as the MIB Doctor, media type and URI type reviews? It passes the ID nits tool. No other review is necessary. (1.h) Has the document split its references into normative and informative? Are there normative references to documents that are not ready for advancement or are otherwise in an unclear state? If such normative references exist, what is the strategy for their completion? Are there normative references that are downward references, as described in [RFC3967]? If so, list these downward references to support the Area Director in the Last Call procedure for them [RFC3967]. All normative references are to published documents. There are no downward references. (1.i) Has the Document Shepherd verified that the document IANA consideration section exists and is consistent with the body of the document? If the document specifies protocol extensions, are reservations requested in appropriate IANA registries? Are the IANA registries clearly identified? If the document creates a new registry, does it define the proposed initial contents of the registry and an allocation procedure for future registrations? Does it suggest a reasonable name for the new registry? See [RFC5226]. If the document describes an Expert Review process has Shepherd conferred with the Responsible Area Director so that the IESG can appoint the needed Expert during the IESG Evaluation? There is an IANA considerations section, which requests new DHCP option codes in the "BOOTP Vendor Extensions and DHCP Options" and "DHCPv6 Option Codes" registries. No new registries are required. (1.j) Has the Document Shepherd verified that sections of the document that are written in a formal language, such as XML code, BNF rules, MIB definitions, etc., validate correctly in an automated checker? N/A (1.k) The IESG approval announcement includes a Document Announcement Write-Up. Please provide such a Document Announcement Write-Up? Recent examples can be found in the "Action" announcements for approved documents. The approval announcement contains the following sections: Technical Summary Relevant content can frequently be found in the abstract and/or introduction of the document. If not, this may be an indication that there are deficiencies in the abstract or introduction. Working Group Summary Was there anything in WG process that is worth noting? For example, was there controversy about particular points or were there decisions where the consensus was particularly rough? Document Quality Are there existing implementations of the protocol? Have a significant number of vendors indicated their plan to implement the specification? Are there any reviewers that merit special mention as having done a thorough review, e.g., one that resulted in important changes or a conclusion that the document had no substantive issues? If there was a MIB Doctor, Media Type or other expert review, what was its course (briefly)? In the case of a Media Type review, on what date was the request posted? Document announcement write-up: Technical Summary In some DHCP service deployments, it is desirable for a DHCP server in one administrative domain to pass configuration options to a DHCP server in a different administrative domain. This DHCP option carries a set of DHCP options that can be passed from one DHCP server to another DHCP server to pass configuration information to clients served by that second DHCP server. Working Group Summary There has been consensus in the dhc WG to support the development of this document throughout the WG review process. The WG last call showed consensus to advance the document to the IESG, http://www.ietf.org/mail-archive/web/dhcwg/current/msg08858.html Issues raised during the WG last call have been addressed in the most recent revision of the document. Document Quality A version of this option was developed as part of the CableLabs eRouter DHCP Container vendor-identifying vendor-specific option, and defined in "CableLabs' DHCP Options Registry". There is wider applicability of this option beyond cable service provider deployments, so the dhc WG was asked to develop an Internet Standard specification of the option. (end) |
2009-03-25
|
05 | Cindy Morgan | Draft Added by Cindy Morgan in state Publication Requested |
2009-03-24
|
05 | (System) | New version available: draft-ietf-dhc-container-opt-05.txt |
2008-11-28
|
04 | (System) | New version available: draft-ietf-dhc-container-opt-04.txt |
2008-11-17
|
03 | (System) | New version available: draft-ietf-dhc-container-opt-03.txt |
2008-11-03
|
02 | (System) | New version available: draft-ietf-dhc-container-opt-02.txt |
2008-09-08
|
01 | (System) | New version available: draft-ietf-dhc-container-opt-01.txt |
2008-01-24
|
00 | (System) | New version available: draft-ietf-dhc-container-opt-00.txt |