Skip to main content

IPv6 Node Requirements
draft-ietf-6man-rfc6434-bis-09

Revision differences

Document history

Date Rev. By Action
2019-01-28
09 (System) RFC Editor state changed to AUTH48-DONE from AUTH48
2018-11-08
09 (System) RFC Editor state changed to AUTH48 from RFC-EDITOR
2018-10-17
09 (System) RFC Editor state changed to RFC-EDITOR from EDIT
2018-08-16
09 (System) IANA Action state changed to No IC from In Progress
2018-08-16
09 (System) RFC Editor state changed to EDIT
2018-08-16
09 (System) IESG state changed to RFC Ed Queue from Approved-announcement sent
2018-08-16
09 (System) Announcement was received by RFC Editor
2018-08-16
09 (System) IANA Action state changed to In Progress
2018-08-16
09 Cindy Morgan IESG state changed to Approved-announcement sent from Approved-announcement to be sent
2018-08-16
09 Cindy Morgan IESG has approved the document
2018-08-16
09 Cindy Morgan Closed "Approve" ballot
2018-08-16
09 Cindy Morgan Ballot approval text was generated
2018-08-16
09 Suresh Krishnan IESG state changed to Approved-announcement to be sent from IESG Evaluation::AD Followup
2018-08-02
09 Tero Kivinen Request for Last Call review by SECDIR Completed: Ready. Reviewer: Tobias Gondrom.
2018-07-16
09 Vijay Gurbani Request for Last Call review by GENART Completed: Ready with Nits. Reviewer: Vijay Gurbani. Sent review to list.
2018-07-16
09 Benjamin Kaduk
[Ballot comment]
Thanks for the easy DISCUSS resolution :)
Original ballot comment preserved below.

Thanks for doing this work; it's quite helpful to have all …
[Ballot comment]
Thanks for the easy DISCUSS resolution :)
Original ballot comment preserved below.

Thanks for doing this work; it's quite helpful to have all this information assembled in one place!

I have a few comments, broken out by section.

Section 1

]draft-thomson-postel-was-wrong and some discussion I've seen surrounding it has made me
wonder whether we are best served by continuing to "blindly cite" Postel's Principle.  The principles
it espouses do remain true in some aspects, but there seems to be a tradeoff against other concerns
as well.

Section 5.3

  A host MAY impose a limit on the maximum number of non-padding
  options allowed in a destination options and hop-by-hop extension
  headers. [...]

nit: is there a singular/plural mismatch here?

Section 13

Why is the phrase "SSL VPN" preferable to the phrase "TLS VPN"?
SSL is deprecated; the IETF protocol is TLS.

Section 15

  If an IPv6 node is concerned about the impact of IPv6 message power
  consumption, it SHOULD want to implement the recommendations in
  [RFC7772].

Do we really need to assign motive to IPv6 nodes?
2018-07-16
09 Benjamin Kaduk [Ballot Position Update] Position for Benjamin Kaduk has been changed to No Objection from Discuss
2018-07-16
09 (System) Sub state has been changed to AD Followup from Revised ID Needed
2018-07-16
09 (System) IANA Review state changed to Version Changed - Review Needed from IANA OK - No Actions Needed
2018-07-16
09 Timothy Winters New version available: draft-ietf-6man-rfc6434-bis-09.txt
2018-07-16
09 (System) New version approved
2018-07-16
09 (System) Request for posting confirmation emailed to previous authors: Tim Chown , John Loughney , Timothy Winters
2018-07-16
09 Timothy Winters Uploaded new revision
2018-07-05
08 Cindy Morgan IESG state changed to IESG Evaluation::Revised I-D Needed from Waiting for Writeup
2018-07-05
08 Ignas Bagdonas [Ballot Position Update] New position, No Objection, has been recorded for Ignas Bagdonas
2018-07-05
08 Benjamin Kaduk
[Ballot discuss]
This is a pretty minor point and should be easy to resolve, but there seems to be an internal inconsistency
that is introduced …
[Ballot discuss]
This is a pretty minor point and should be easy to resolve, but there seems to be an internal inconsistency
that is introduced with the new section on Constrained Devices.  In particular, Section 1.1 has a short
note:

  This document assumes that all IPv6 nodes meet the minimum
  requirements specified here.

but Section 15 says something a bit different:

  [...] While the requirements of this
  document are RECOMMENDED for all nodes, including constrained nodes,
  compromises may need to be made in certain cases.
2018-07-05
08 Benjamin Kaduk
[Ballot comment]
Thanks for doing this work; it's quite helpful to have all this information assembled in one place!

I have a few comments, broken …
[Ballot comment]
Thanks for doing this work; it's quite helpful to have all this information assembled in one place!

I have a few comments, broken out by section.

Section 1

]draft-thomson-postel-was-wrong and some discussion I've seen surrounding it has made me
wonder whether we are best served by continuing to "blindly cite" Postel's Principle.  The principles
it espouses do remain true in some aspects, but there seems to be a tradeoff against other concerns
as well.

Section 5.3

  A host MAY impose a limit on the maximum number of non-padding
  options allowed in a destination options and hop-by-hop extension
  headers. [...]

nit: is there a singular/plural mismatch here?

Section 13

Why is the phrase "SSL VPN" preferable to the phrase "TLS VPN"?
SSL is deprecated; the IETF protocol is TLS.

Section 15

  If an IPv6 node is concerned about the impact of IPv6 message power
  consumption, it SHOULD want to implement the recommendations in
  [RFC7772].

Do we really need to assign motive to IPv6 nodes?
2018-07-05
08 Benjamin Kaduk [Ballot Position Update] New position, Discuss, has been recorded for Benjamin Kaduk
2018-07-04
08 Alvaro Retana [Ballot Position Update] New position, No Objection, has been recorded for Alvaro Retana
2018-07-04
08 Warren Kumari
[Ballot comment]
Thank you for this - it is a large amount of work!

I had a question, and a few nits.

Question:
"In core …
[Ballot comment]
Thank you for this - it is a large amount of work!

I had a question, and a few nits.

Question:
"In core networks dominated by routers, Redirects are typically disabled.  The sending of Redirects SHOULD be disabled by default on backbone routers.  They MAY be enabled by default on routers intended to support hosts on edge networks."
The SHOULD here concerns me, but only because a "backbone router" isn't really defined. I know one when I see one, but if I'm an implementer I don't really know if the box is a backbone router or not (todays backbone gear becomes tomorrow's edge gear, and next week's boat anchor). I have no suggestions for how to address this (and feel free to ignore it!)

Nits (I'm sure the RFC Ed would have caught them, but doesn't hurt to make their lives easier)
Section 5.3.  Protecting a node from excessive EH options
"If a packet is received and the number of destination or hop-by-hop optines exceeds the limit, then the packet should be silently discarded."
options

Section  5.4.  Neighbor Discovery for IPv6 - RFC 4861
"  [RFC7559] discusses packet loss resliency for Router Solicitations,"
resiliency

Section 5.7.1.  Path MTU Discovery - RFC 8201
" For example, this will result in connections that
  complete the TCP three- way handshake"
three-way.
2018-07-04
08 Warren Kumari [Ballot Position Update] New position, No Objection, has been recorded for Warren Kumari
2018-07-04
08 Martin Vigoureux [Ballot Position Update] New position, No Objection, has been recorded for Martin Vigoureux
2018-07-04
08 Mirja Kühlewind
[Ballot comment]
Two comments that I would really like to see addressed before publication, however, I don't think they would warrant a discuss:

1) I …
[Ballot comment]
Two comments that I would really like to see addressed before publication, however, I don't think they would warrant a discuss:

1) I agree with Adam comments but I would like to say that I am even more concerned about the use of normative language. Especially, sections 5.2 and 5.3 (maybe others; did check further) seems to be word-by-word copies of the text in RFC8200, including use of normative language. This doesn't seem to be appropriate as it would mean that if you would ever want to update RFC8200, you also have to update this RFC. Please consider re-wording these section appropriately to make sure that only RFC8200 is defining the IPv6 protocol normatively and this document only points at the right positions in RFC8200 and provide additional discussion/background where needed.

2) sec 5.12:
"Nodes that may be deployed in environments where they would benefit
  from such early congestion notification SHOULD implement [RFC3168].
  In such cases, the updates presented in [RFC8311] may also be
  relevant."
Thanks for pointer to ECN, however, this advise seems quite misleading.  First I guess the more useful reference here would be RFC8087. But more important, ECN can/should only be used if there is a feedback mechanism in the transport layer, therefore using ECN is a transport layer decision and the only thing the IP layer at the end host can do is to make sure that there is an interface for the upper layer to set the bits. I didn't make this point a discussion because the sentence is not entirely wrong (just not very helpful either). But I really think this sentence needs clarification! (Also thanks to Magnus who pointed at this sentences already in his TSV-ART review!)
2018-07-04
08 Mirja Kühlewind [Ballot Position Update] New position, No Objection, has been recorded for Mirja Kühlewind
2018-07-03
08 Eric Rescorla
[Ballot comment]
Rich version of this review at:
https://mozphab-ietf.devsvcdev.mozaws.net/D4050


I see you are using a mix of lower case and capital normative
language. Do you …
[Ballot comment]
Rich version of this review at:
https://mozphab-ietf.devsvcdev.mozaws.net/D4050


I see you are using a mix of lower case and capital normative
language. Do you want to converge that?


COMMENTS
S 1.2.
>      we have the following definitions:

>      IPv6 node  - a device that implements IPv6.
>      IPv6 router - a node that forwards IPv6 packets not explicitly
>                    addressed to itself.
>      IPv6 host  - any node that is not a router.

Nit: any IPv6 node.


S 5.1.
>      field as defined in the IPv6 Flow Label specification [RFC6437].
>      Forwarding nodes such as routers and load distributors MUST NOT
>      depend only on Flow Label values being uniformly distributed.  It is
>      RECOMMENDED that source hosts support the flow label by setting the
>      Flow Label field for all packets of a given flow to the same value
>      chosen from an approximation to a discrete uniform distribution.

Is there a reason you are using "approximation" here?


S 5.2.
>      to the action to be taken when a Next Header value in the current
>      header is not recognized by a node, that action applies whether the
>      value is an unrecognized Extension Header or an unrecognized upper
>      layer protocol (ULP).

>      An IPv6 node MUST be able to process these headers.  An exception is

"these headers" == "extension headers"? I guess it's clear in context
from the title...


S 5.3.
>      A host MAY impose a limit on the maximum length of destination
>      options or hop-by-hop options extension header.  This value should be
>      configurable and the default is to accept options of any length.  If
>      a packet is received and the length of destination or hop-by-hop
>      options extension header exceeds the length limit, then the packet
>      should be silently discarded.

This is a WG decision, but experience with other protocols suggests
that language like this has the implicit effect of banning anything
outside these limtis.


S 5.7.2.

>  5.7.2.  Minimum MTU considerations

>      While an IPv6 link MTU can be set to 1280 bytes, it is recommended
>      that for IPv6 UDP in particular, which includes DNS operation, the
>      sender use a large MTU if they can, in order to avoid gratuitous

Can you be clearer about "large"?


S 5.12.
>      receiver of the packet echoes the congestion indication to the
>      sender, which can then reduce its transmission rate as if it detected
>      a dropped packet.

>      Nodes that may be deployed in environments where they would benefit
>      from such early congestion notification SHOULD implement [RFC3168].

How would I know if I have such a node?


S 13.
>      key management approach of IKE.  This document updates that
>      recommendation by making support of the IPsec Architecture [RFC4301]
>      a SHOULD for all IPv6 nodes.  Note that the IPsec Architecture
>      requires (e.g., Section 4.5 of RFC 4301) the implementation of both
>      manual and automatic key management.  Currently, the default
>      automated key management protocol to implement is IKEv2 [RFC7296].

What does "default" mean in this case?
2018-07-03
08 Eric Rescorla [Ballot Position Update] New position, No Objection, has been recorded for Eric Rescorla
2018-07-03
08 Deborah Brungard [Ballot Position Update] New position, No Objection, has been recorded for Deborah Brungard
2018-07-03
08 Alissa Cooper
[Ballot comment]
I support Adam's comments concerning the use of normative keywords. In particular this sentence in 6.3 is in need of a normative "RECOMMENDED" …
[Ballot comment]
I support Adam's comments concerning the use of normative keywords. In particular this sentence in 6.3 is in need of a normative "RECOMMENDED" I think:

"It is
  recommended, as described in [RFC8064], that unless there is a
  specific requirement for MAC addresses to be embedded in an IID,
  nodes follow the procedure in [RFC7217] to generate SLAAC-based
  addresses, rather than using [RFC4862]."

In Section 9, this sentence seems unlikely to remain up-to-date for the life of this document: "The IETF dnssd WG is defining solutions for DNS-based service
  discovery in multi-link networks."
2018-07-03
08 Alissa Cooper [Ballot Position Update] New position, No Objection, has been recorded for Alissa Cooper
2018-07-03
08 Magnus Westerlund Request for Telechat review by TSVART Completed: Ready with Issues. Reviewer: Magnus Westerlund. Sent review to list.
2018-07-03
08 Magnus Westerlund Request for Telechat review by TSVART is assigned to Magnus Westerlund
2018-07-03
08 Magnus Westerlund Request for Telechat review by TSVART is assigned to Magnus Westerlund
2018-07-02
08 Terry Manderson [Ballot Position Update] New position, No Objection, has been recorded for Terry Manderson
2018-07-02
08 Ben Campbell
[Ballot comment]
(I mostly reviewed the diff from RFC 6434)

- I echo Adam's comments.

- There's a normative downref to RFC 7739, …
[Ballot comment]
(I mostly reviewed the diff from RFC 6434)

- I echo Adam's comments.

- There's a normative downref to RFC 7739, which was not mentioned in the LC announcement nor is it in the downref registry.

§5.3: Do the "MAY limit" statements added in this section imply corresponding "MUST/SHOULD not exceed" requirements for the sender? Otherwise, it seems like a potential interop issue.
2018-07-02
08 Ben Campbell [Ballot Position Update] New position, No Objection, has been recorded for Ben Campbell
2018-07-02
08 Adam Roach
[Ballot comment]
Thanks for the work everyone put into updating this document. I have a couple of
minor comments.

---------------------------------------------------------------------------

§2:
>  The key words …
[Ballot comment]
Thanks for the work everyone put into updating this document. I have a couple of
minor comments.

---------------------------------------------------------------------------

§2:
>  The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
>  "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
>  document are to be interpreted as described in RFC 2119 [RFC2119].

Please update this to the boilerplate in RFC 8174.

The document's use of capitalized versus non-capitalized versions of these terms
appears to be inconsistent. In many cases, lowercase forms appear to be used
when reiterating behavior that has been normatively specified in other
documents, which seems correct. In other places, the selection of uppercase
keywords appears to be fairly arbitrary (e.g., §5.3 uses a mix of "MAY" and
"should"). Consider doing a pass to ensure that the use of normative language is
consistent.

---------------------------------------------------------------------------

With the removal of its final paragraph, §8.4 appears to only describe general
principles, and doesn't seem to contain any actionable requirements anymore. As
an implementor, I don't know what I would do to conform with its contents.
Consider adding concrete implementor guidance, or removing the section.
2018-07-02
08 Adam Roach [Ballot Position Update] New position, No Objection, has been recorded for Adam Roach
2018-07-01
08 Spencer Dawkins
[Ballot comment]
Thanks for doing this update. I have some comments, but the only one that's more than editorial is on RFC 8311.

Do …
[Ballot comment]
Thanks for doing this update. I have some comments, but the only one that's more than editorial is on RFC 8311.

Do the right thing, of course.

I'm not understanding

  A host MAY limit the number of consecutive PAD1 options in
  destination options or hop-by-hop options to seven.  In this case, if
  the more than seven consecutive PAD1 options are present the packet
  should be silently discarded.  The rationale is that if padding of
  eight or more bytes is required than the PADN option should be used.

Isn't this saying that a path might work, or might fail silently, or might work even if the packet should have been discarded (I note the lower-case "should", without a reference to RFC 8174, which doesn't help)? It seems like "MAY limit" is significantly more permissive than "should be silently discarded", turning Jon Postel's Robustness Principle on its head. I'd either expect "SHOULD limit" or "may/MAY be silently discarded", for starters.

I'm sure that's for a good reason, but perhaps it's worth explaining it in the text. And I have the same confusion about

  A host MAY disallow unknown options in destination options or hop-by-
  hop options.  This should be configurable where the default is to
  accept unknown options and process them per [RFC8200].  If a packet
  with unknown options is received and the host is configured to
  disallow them, then the packet should be silently discarded.

A nit: "optines" for "options".

A nit: "resliency" for "resiliency".

I'm not sure that RFC 4821 would qualify as an extension to RFC 8201 in this text - the functionality is similar, but the mechanism is different by design.

  An extension to Path MTU Discovery defined in RFC 8201 can be found
  in [RFC4821], which defines a method for Packetization Layer Path MTU
  Discovery (PLPMTUD) designed for use over paths where delivery of
  ICMPv6 messages to a host is not assured.

Perhaps "An alternative to Path MTU Discovery defined in RFC 8201 can be found
  in [RFC4821] ... "?

Thanks for including the reference to RFC 8311 in this text.

  Nodes that may be deployed in environments where they would benefit
  from such early congestion notification SHOULD implement [RFC3168].
  In such cases, the updates presented in [RFC8311] may also be
  relevant.

It may not be possible to do anything about this, but "may also be relevant" seems weaker than I would have hoped. We were able to reclaim ECT(1) for experimentation because we couldn't find more than a trace of evidence that anyone on the Internet was using it, and this text doesn't quite discourage someone from starting to use it now, which would prevent us from doing ECN experiments. But do the right thing, of course.

This text

  Thus it is possible for 3rd
  party devices such nodes communicate with to track the activities of
  the node as it moves around the network.

wasn't easy for me to parse. Perhaps something like

  Thus it is possible for 3rd
  party devices to track the activities of a node they
  communicate with, as that node moves around the network.

would be clearer?

"Recently" may have been overtaken by events in this text.

  Recently, additional work has been done to support mobility in mixed-
  mode IPv4 and IPv6 networks [RFC5555].

I think

  If an IPv6 node is concerned about the impact of IPv6 message power
  consumption, it SHOULD want to implement the recommendations in
  [RFC7772].

might be clearer as

  If IPv6 implementers are concerned about the impact of IPv6 message power
  consumption in an IPv6 node, they SHOULD implement the recommendations in
  [RFC7772].
2018-07-01
08 Spencer Dawkins [Ballot Position Update] New position, No Objection, has been recorded for Spencer Dawkins
2018-07-01
08 Alexey Melnikov [Ballot Position Update] New position, No Objection, has been recorded for Alexey Melnikov
2018-06-25
08 Min Ye Request for Last Call review by RTGDIR Completed: Ready. Reviewer: Russ White.
2018-06-25
08 Cindy Morgan Placed on agenda for telechat - 2018-07-05
2018-06-25
08 Suresh Krishnan Ballot has been issued
2018-06-25
08 Suresh Krishnan [Ballot Position Update] New position, Yes, has been recorded for Suresh Krishnan
2018-06-25
08 Suresh Krishnan Created "Approve" ballot
2018-06-25
08 Suresh Krishnan Ballot writeup was changed
2018-06-25
08 (System) IESG state changed to Waiting for Writeup from In Last Call
2018-06-19
08 Scott Bradner Request for Last Call review by OPSDIR Completed: Ready. Reviewer: Scott Bradner. Sent review to list.
2018-06-15
08 Tero Kivinen Request for Last Call review by SECDIR is assigned to Tobias Gondrom
2018-06-15
08 Tero Kivinen Request for Last Call review by SECDIR is assigned to Tobias Gondrom
2018-06-15
08 (System) IANA Review state changed to IANA OK - No Actions Needed from IANA - Review Needed
2018-06-15
08 Sabrina Tanamal
(Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs:

The IANA Functions Operator has reviewed draft-ietf-6man-rfc6434-bis-08, which is currently in Last Call, and has the following comments:

We …
(Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs:

The IANA Functions Operator has reviewed draft-ietf-6man-rfc6434-bis-08, which is currently in Last Call, and has the following comments:

We understand that this document doesn't require any registry actions.

While it's often helpful for a document's IANA Considerations section to remain in place upon publication even if there are no actions, if the authors strongly prefer to remove it, we do not object.

If this assessment is not accurate, please respond as soon as possible.

Thank you,

Sabrina Tanamal
Senior IANA Services Specialist
2018-06-14
08 Jean Mahoney Request for Last Call review by GENART is assigned to Vijay Gurbani
2018-06-14
08 Jean Mahoney Request for Last Call review by GENART is assigned to Vijay Gurbani
2018-06-12
08 Min Ye Request for Last Call review by RTGDIR is assigned to Russ White
2018-06-12
08 Min Ye Request for Last Call review by RTGDIR is assigned to Russ White
2018-06-12
08 Alvaro Retana Requested Last Call review by RTGDIR
2018-06-12
08 Gunter Van de Velde Request for Last Call review by OPSDIR is assigned to Scott Bradner
2018-06-12
08 Gunter Van de Velde Request for Last Call review by OPSDIR is assigned to Scott Bradner
2018-06-11
08 Cindy Morgan IANA Review state changed to IANA - Review Needed
2018-06-11
08 Cindy Morgan
The following Last Call announcement was sent out (ends 2018-06-25):

From: The IESG
To: IETF-Announce
CC: ipv6@ietf.org, bob.hinden@gmail.com, Robert Hinden , draft-ietf-6man-rfc6434-bis@ietf.org, …
The following Last Call announcement was sent out (ends 2018-06-25):

From: The IESG
To: IETF-Announce
CC: ipv6@ietf.org, bob.hinden@gmail.com, Robert Hinden , draft-ietf-6man-rfc6434-bis@ietf.org, suresh@kaloom.com, 6man-chairs@ietf.org
Reply-To: ietf@ietf.org
Sender:
Subject: Last Call:  (IPv6 Node Requirements) to Best Current Practice


The IESG has received a request from the IPv6 Maintenance WG (6man) to
consider the following document: - 'IPv6 Node Requirements'
  as Best Current Practice

The IESG plans to make a decision in the next few weeks, and solicits final
comments on this action. Please send substantive comments to the
ietf@ietf.org mailing lists by 2018-06-25. Exceptionally, comments may be
sent to iesg@ietf.org instead. In either case, please retain the beginning of
the Subject line to allow automated sorting.

Abstract


  This document defines requirements for IPv6 nodes.  It is expected
  that IPv6 will be deployed in a wide range of devices and situations.
  Specifying the requirements for IPv6 nodes allows IPv6 to function
  well and interoperate in a large number of situations and
  deployments.

  This document obsoletes RFC 6434, and in turn RFC 4294.




The file can be obtained via
https://datatracker.ietf.org/doc/draft-ietf-6man-rfc6434-bis/

IESG discussion can be tracked via
https://datatracker.ietf.org/doc/draft-ietf-6man-rfc6434-bis/ballot/


No IPR declarations have been submitted directly on this I-D.


The document contains these normative downward references.
See RFC 3967 for additional information:
    rfc6106: IPv6 Router Advertisement Options for DNS Configuration (Proposed Standard - IETF stream)
    rfc6775: Neighbor Discovery Optimization for IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs) (Proposed Standard - IETF stream)
    rfc7112: Implications of Oversized IPv6 Header Chains (Proposed Standard - IETF stream)
    rfc4301: Security Architecture for the Internet Protocol (Proposed Standard - IETF stream)
    rfc7048: Neighbor Unreachability Detection Is Too Impatient (Proposed Standard - IETF stream)
    rfc4303: IP Encapsulating Security Payload (ESP) (Proposed Standard - IETF stream)
    rfc7045: Transmission and Processing of IPv6 Extension Headers (Proposed Standard - IETF stream)
    rfc3736: Stateless Dynamic Host Configuration Protocol (DHCP) Service for IPv6 (Proposed Standard - IETF stream)
    rfc6762: Multicast DNS (Proposed Standard - IETF stream)
    rfc5942: IPv6 Subnet Model: The Relationship between Links and Subnet Prefixes (Proposed Standard - IETF stream)
    rfc8221: Cryptographic Algorithm Implementation Requirements and Usage Guidance for Encapsulating Security Payload (ESP) and Authentication Header (AH) (Proposed Standard - IETF stream)
    rfc6564: A Uniform Format for IPv6 Extension Headers (Proposed Standard - IETF stream)
    rfc8106: IPv6 Router Advertisement Options for DNS Configuration (Proposed Standard - IETF stream)
    rfc8028: First-Hop Router Selection by Hosts in a Multi-Prefix Network (Proposed Standard - IETF stream)
    rfc5790: Lightweight Internet Group Management Protocol Version 3 (IGMPv3) and Multicast Listener Discovery Version 2 (MLDv2) Protocols (Proposed Standard - IETF stream)
    rfc8021: Generation of IPv6 Atomic Fragments Considered Harmful (Informational - IETF stream)
    rfc5095: Deprecation of Type 0 Routing Headers in IPv6 (Proposed Standard - IETF stream)
    rfc6241: Network Configuration Protocol (NETCONF) (Proposed Standard - IETF stream)
    rfc4941: Privacy Extensions for Stateless Address Autoconfiguration in IPv6 (Draft Standard - IETF stream)
    rfc4861: Neighbor Discovery for IP version 6 (IPv6) (Draft Standard - IETF stream)
    rfc4862: IPv6 Stateless Address Autoconfiguration (Draft Standard - IETF stream)
    rfc4213: Basic Transition Mechanisms for IPv6 Hosts and Routers (Proposed Standard - IETF stream)
    rfc8247: Algorithm Implementation Requirements and Usage Guidance for the Internet Key Exchange Protocol Version 2 (IKEv2) (Proposed Standard - IETF stream)
    rfc4607: Source-Specific Multicast for IP (Proposed Standard - IETF stream)
    rfc3168: The Addition of Explicit Congestion Notification (ECN) to IP (Proposed Standard - IETF stream)
    rfc5175: IPv6 Router Advertisement Flags Option (Proposed Standard - IETF stream)
    rfc6946: Processing of IPv6 "Atomic" Fragments (Proposed Standard - IETF stream)
    rfc6437: IPv6 Flow Label Specification (Proposed Standard - IETF stream)
    rfc6434: IPv6 Node Requirements (Informational - IETF stream)
    rfc8311: Relaxing Restrictions on Explicit Congestion Notification (ECN) Experimentation (Proposed Standard - IETF stream)
    rfc7559: Packet-Loss Resiliency for Router Solicitations (Proposed Standard - IETF stream)
    rfc4293: Management Information Base for the Internet Protocol (IP) (Proposed Standard - IETF stream)
    rfc4294: IPv6 Node Requirements (Informational - IETF stream)
    rfc5722: Handling of Overlapping IPv6 Fragments (Proposed Standard - IETF stream)
    rfc4292: IP Forwarding Table MIB (Proposed Standard - IETF stream)
    rfc4035: Protocol Modifications for the DNS Security Extensions (Proposed Standard - IETF stream)
    rfc6724: Default Address Selection for Internet Protocol Version 6 (IPv6) (Proposed Standard - IETF stream)
    rfc8343: A YANG Data Model for Interface Management (Proposed Standard - IETF stream)
    rfc8064: Recommendation on Stable IPv6 Interface Identifiers (Proposed Standard - IETF stream)
    rfc7527: Enhanced Duplicate Address Detection (Proposed Standard - IETF stream)
    rfc5453: Reserved IPv6 Interface Identifiers (Proposed Standard - IETF stream)
    rfc2675: IPv6 Jumbograms (Proposed Standard - IETF stream)
    rfc4033: DNS Security Introduction and Requirements (Proposed Standard - IETF stream)
    rfc7739: Security Implications of Predictable Fragment Identification Values (Informational - IETF stream)
    rfc4034: Resource Records for the DNS Security Extensions (Proposed Standard - IETF stream)
    rfc3315: Dynamic Host Configuration Protocol for IPv6 (DHCPv6) (Proposed Standard - IETF stream)
    rfc6763: DNS-Based Service Discovery (Proposed Standard - IETF stream)
    rfc3810: Multicast Listener Discovery Version 2 (MLDv2) for IPv6 (Proposed Standard - IETF stream)
    rfc7217: A Method for Generating Semantically Opaque Interface Identifiers with IPv6 Stateless Address Autoconfiguration (SLAAC) (Proposed Standard - IETF stream)
    rfc4311: IPv6 Host-to-Router Load Sharing (Proposed Standard - IETF stream)
    rfc8344: A YANG Data Model for IP Management (Proposed Standard - IETF stream)
    rfc8040: RESTCONF Protocol (Proposed Standard - IETF stream)
    rfc2863: The Interfaces Group MIB (Draft Standard - IETF stream)
    rfc2711: IPv6 Router Alert Option (Proposed Standard - IETF stream)
    rfc2710: Multicast Listener Discovery (MLD) for IPv6 (Proposed Standard - IETF stream)



2018-06-11
08 Cindy Morgan IESG state changed to In Last Call from Last Call Requested
2018-06-11
08 Suresh Krishnan Last call was requested
2018-06-11
08 Suresh Krishnan Last call announcement was generated
2018-06-11
08 Suresh Krishnan Ballot approval text was generated
2018-06-11
08 Suresh Krishnan Ballot writeup was generated
2018-06-11
08 Suresh Krishnan IESG state changed to Last Call Requested from AD Evaluation
2018-05-17
08 Bernie Volz Request for Early review by INTDIR is assigned to Ralph Droms
2018-05-17
08 Bernie Volz Request for Early review by INTDIR is assigned to Ralph Droms
2018-05-16
08 Suresh Krishnan Requested Early review by INTDIR
2018-05-06
08 Suresh Krishnan IESG state changed to AD Evaluation from Publication Requested
2018-03-21
08 Bob Hinden
Title          : IPv6 Node Requirements
Authors        : Tim Chown
                  …
Title          : IPv6 Node Requirements
Authors        : Tim Chown
                  John Loughney
                  Timothy Winters
Filename        : draft-ietf-6man-rfc6434-bis-08.txt
Pages          : 40
Date            : 2018-03-20


(1) What type of RFC is being requested (BCP, Proposed Standard, Internet
Standard, Informational, Experimental, or Historic)? Why is this the
proper type of RFC? Is this type of RFC indicated in the title page
header?

  Best Current Practice (BCP)

  This is appropriate as this document is describing the requirements
  for all IPv6 nodes.  It obsoletes the previous version of this
  document RFC6434.
 

(2) The IESG approval announcement includes a Document Announcement
Write-Up. Please provide such a Document Announcement Write-Up. Recent
examples can be found in the "Action" announcements for approved
documents. The approval announcement contains the following sections:

Technical Summary:

  This document defines requirements for IPv6 nodes.  It is expected
  that IPv6 will be deployed in a wide range of devices and situations.
  Specifying the requirements for IPv6 nodes allows IPv6 to function
  well and interoperate in a large number of situations and
  deployments.


Working Group Summary:

  There is support for this document in the 6MAN working group.  There
  is a consensus to advance this document.

Document Quality:

  The quality of the document is very good, it has received adequate
  review in the working group on the mailing list and at a series of
  6man sessions at IETF meetings.  The changes from the previous
  versions have been described on the mailing list and at the 6man
  sessions.

Personnel:

Who is the Document Shepherd? Who is the Responsible Area Director?

  Document Shepherd:  Bob Hinden
  Responsible AD: Suresh Krishnan


(3) Briefly describe the review of this document that was performed by
the Document Shepherd. If this version of the document is not ready for
publication, please explain why the document is being forwarded to the
IESG.

  The document Shepard has reviewed and commented on this draft, and
  followed the process in the working group, and thinks that the issues
  raised have been resolved in the current draft.


(4) Does the document Shepherd have any concerns about the depth or
breadth of the reviews that have been performed?

  No concerns.


(5) Do portions of the document need review from a particular or from
broader perspective, e.g., security, operational complexity, AAA, DNS,
DHCP, XML, or internationalization? If so, describe the review that took
place.

  No, N/A


(6) Describe any specific concerns or issues that the Document Shepherd
has with this document that the Responsible Area Director and/or the IESG
should be aware of? For example, perhaps he or she is uncomfortable with
certain parts of the document, or has concerns whether there really is a
need for it. In any event, if the WG has discussed those issues and has
indicated that it still wishes to advance the document, detail those
concerns here.

  No concerns.


(7) Has each author confirmed that any and all appropriate IPR
disclosures required for full conformance with the provisions of BCP 78
and BCP 79 have already been filed. If not, explain why?

  Yes, the authors have each confirmed that there is no IPR and full
  conformance with BCP78 and BCP79.


(8) Has an IPR disclosure been filed that references this document? If
so, summarize any WG discussion and conclusion regarding the IPR
disclosures.

  No IPR disclosures have been filed.


(9) How solid is the WG consensus behind this document? Does it represent
the strong concurrence of a few individuals, with others being silent, or
does the WG as a whole understand and agree with it?

  There is a solid consensus around this document.  No one is opposed to
  it's publication.


(10) Has anyone threatened an appeal or otherwise indicated extreme
discontent? If so, please summarise the areas of conflict in separate
email messages to the Responsible Area Director. (It should be in a
separate email because this questionnaire is publicly available.)

  No appeals have been threatened, nor is there any extreme discontent.


(11) Identify any ID nits the Document Shepherd has found in this
document. (See http://www.ietf.org/tools/idnits/ and the Internet-Drafts
Checklist). Boilerplate checks are not enough; this check needs to be
thorough.

  No serious nits found.  There are two references to drafts that are now
  RFCs, and two down references.  The references to IDs are:

    [I-D.ietf-netmod-rfc7223bis]
    [I-D.ietf-netmod-rfc7277bis]

  They were published as RFC 8343 and RFC 8344.  These will be fixed
  in the next version, and the down references are appropriate.


(12) Describe how the document meets any required formal review criteria,
such as the MIB Doctor, media type, and URI type reviews.

  N/A

(13) Have all references within this document been identified as either
normative or informative?

  The document has a separate Normative and Information reference
  section.  References are characterized correctly.


(14) Are there normative references to documents that are not ready for
advancement or are otherwise in an unclear state? If such normative
references exist, what is the plan for their completion?

  No.  All references are to RFC or IDs that are now RFCs (see (11) ).


(15) Are there downward normative references references (see RFC 3967)?
If so, list these downward references to support the Area Director in the
Last Call procedure.

  There are normative references to RFC 7739 and RFC 8021.  Both are
  Informational.


(16) Will publication of this document change the status of any existing
RFCs? Are those RFCs listed on the title page header, listed in the
abstract, and discussed in the introduction? If the RFCs are not listed
in the Abstract and Introduction, explain why, and point to the part of
the document where the relationship of this document to the other RFCs is
discussed. If this information is not in the document, explain why the WG
considers it unnecessary.

  This document obsoletes RFC6434 that is the earlier version of IPv6
  Node Requirements.  This is listed in the title page header and
  abstract.  It does not include this in the Introduction.  This can be
  fixed later.


(17) Describe the Document Shepherd's review of the IANA considerations
section, especially with regard to its consistency with the body of the
document. Confirm that all protocol extensions that the document makes
are associated with the appropriate reservations in IANA
registries. Confirm that any referenced IANA registries have been clearly
identified. Confirm that newly created IANA registries include a detailed
specification of the initial contents for the registry, that allocations
procedures for future registrations are defined, and a reasonable name
for the new registry has been suggested (see RFC 5226).

  This document does not require any IANA actions.


(18) List any new IANA registries that require Expert Review for future
allocations. Provide any public guidance that the IESG would find useful
in selecting the IANA Experts for these new registries.

  N/A


(19) Describe reviews and automated checks performed by the Document
Shepherd to validate sections of the document written in a formal
language, such as XML code, BNF rules, MIB definitions, etc.

  N/A

2018-03-21
08 Bob Hinden Responsible AD changed to Suresh Krishnan
2018-03-21
08 Bob Hinden IETF WG state changed to Submitted to IESG for Publication from WG Consensus: Waiting for Write-Up
2018-03-21
08 Bob Hinden IESG state changed to Publication Requested
2018-03-21
08 Bob Hinden IESG process started in state Publication Requested
2018-03-21
08 Bob Hinden Changed document writeup
2018-03-21
08 Bob Hinden Changed document writeup
2018-03-21
08 Bob Hinden Changed document writeup
2018-03-21
08 Bob Hinden Notification list changed to Robert Hinden <bob.hinden@gmail.com>
2018-03-21
08 Bob Hinden Document shepherd changed to Robert M. Hinden
2018-03-21
08 Bob Hinden IETF WG state changed to WG Consensus: Waiting for Write-Up from In WG Last Call
2018-03-20
08 Timothy Winters New version available: draft-ietf-6man-rfc6434-bis-08.txt
2018-03-20
08 (System) New version approved
2018-03-20
08 (System) Request for posting confirmation emailed to previous authors: Tim Chown , John Loughney , Timothy Winters
2018-03-20
08 Timothy Winters Uploaded new revision
2018-03-04
07 Tim Chown New version available: draft-ietf-6man-rfc6434-bis-07.txt
2018-03-04
07 (System) New version approved
2018-03-04
07 (System) Request for posting confirmation emailed to previous authors: Tim Chown , John Loughney , Timothy Winters
2018-03-04
07 Tim Chown Uploaded new revision
2018-03-04
06 Tim Chown New version available: draft-ietf-6man-rfc6434-bis-06.txt
2018-03-04
06 (System) New version approved
2018-03-04
06 (System) Request for posting confirmation emailed to previous authors: Tim Chown , John Loughney , Timothy Winters
2018-03-04
06 Tim Chown Uploaded new revision
2018-02-27
05 Timothy Winters New version available: draft-ietf-6man-rfc6434-bis-05.txt
2018-02-27
05 (System) New version approved
2018-02-27
05 (System) Request for posting confirmation emailed to previous authors: Tim Chown , John Loughney , Timothy Winters
2018-02-27
05 Timothy Winters Uploaded new revision
2018-02-22
04 Timothy Winters New version available: draft-ietf-6man-rfc6434-bis-04.txt
2018-02-22
04 (System) New version approved
2018-02-22
04 (System) Request for posting confirmation emailed to previous authors: Tim Chown , John Loughney , Timothy Winters
2018-02-22
04 Timothy Winters Uploaded new revision
2018-02-06
03 Bob Hinden Changed consensus to Yes from Unknown
2018-02-06
03 Bob Hinden Intended Status changed to Best Current Practice from None
2018-02-06
03 Bob Hinden IETF WG state changed to In WG Last Call from WG Document
2018-02-06
03 Timothy Winters New version available: draft-ietf-6man-rfc6434-bis-03.txt
2018-02-06
03 (System) New version approved
2018-02-06
03 (System) Request for posting confirmation emailed to previous authors: Tim Chown , John Loughney , Timothy Winters
2018-02-06
03 Timothy Winters Uploaded new revision
2017-10-30
02 Timothy Winters New version available: draft-ietf-6man-rfc6434-bis-02.txt
2017-10-30
02 (System) New version approved
2017-10-30
02 (System) Request for posting confirmation emailed to previous authors: Tim Chown , 6man-chairs@ietf.org, John Loughney , Timothy Winters
2017-10-30
02 Timothy Winters Uploaded new revision
2017-07-05
01 Bob Hinden Added to session: IETF-99: 6man  Mon-0930
2017-07-03
01 Tim Chown New version available: draft-ietf-6man-rfc6434-bis-01.txt
2017-07-03
01 (System) New version approved
2017-07-03
01 (System) Request for posting confirmation emailed to previous authors: Timothy Winters , John Loughney , 6man-chairs@ietf.org
2017-07-03
01 Tim Chown Uploaded new revision
2017-05-02
00 Ole Trøan This document now replaces draft-clw-rfc6434-bis instead of None
2017-05-02
00 Timothy Winters New version available: draft-ietf-6man-rfc6434-bis-00.txt
2017-05-02
00 (System) WG -00 approved
2017-05-02
00 Timothy Winters Set submitter to "Timothy Winters ", replaces to draft-clw-rfc6434-bis and sent approval email to group chairs: 6man-chairs@ietf.org
2017-05-02
00 Timothy Winters Uploaded new revision