Skip to main content

Captive-Portal Identification in DHCP and Router Advertisements (RAs)
draft-ietf-capport-rfc7710bis-11

Revision differences

Document history

Date Rev. By Action
2020-09-11
11 (System) RFC Editor state changed to AUTH48-DONE from AUTH48
2020-09-09
11 (System) RFC Editor state changed to AUTH48 from RFC-EDITOR
2020-07-14
11 (System) RFC Editor state changed to RFC-EDITOR from EDIT
2020-07-14
11 Bernie Volz Request closed, assignment withdrawn: Charles Perkins Telechat INTDIR review
2020-07-14
11 Bernie Volz Closed request for Telechat review by INTDIR with state 'Overtaken by Events'
2020-07-13
11 (System) IANA Action state changed to RFC-Ed-Ack from Waiting on RFC Editor
2020-07-13
11 (System) IANA Action state changed to Waiting on RFC Editor from In Progress
2020-07-13
11 (System) IANA Action state changed to In Progress from Waiting on Authors
2020-07-13
11 Erik Kline New version available: draft-ietf-capport-rfc7710bis-11.txt
2020-07-13
11 (System) New version accepted (logged-in submitter: Erik Kline)
2020-07-13
11 Erik Kline Uploaded new revision
2020-07-13
11 (System) IANA Action state changed to Waiting on Authors from In Progress
2020-07-13
10 (System) IANA Action state changed to In Progress from Waiting on Authors
2020-07-09
10 (System) IANA Action state changed to Waiting on Authors from In Progress
2020-07-01
10 (System) RFC Editor state changed to EDIT
2020-07-01
10 (System) IESG state changed to RFC Ed Queue from Approved-announcement sent
2020-07-01
10 (System) Announcement was received by RFC Editor
2020-07-01
10 (System) IANA Action state changed to In Progress
2020-07-01
10 Cindy Morgan IESG state changed to Approved-announcement sent from Approved-announcement to be sent
2020-07-01
10 Cindy Morgan IESG has approved the document
2020-07-01
10 Cindy Morgan Closed "Approve" ballot
2020-07-01
10 Cindy Morgan Ballot approval text was generated
2020-07-01
10 Barry Leiba IESG state changed to Approved-announcement to be sent from IESG Evaluation::AD Followup
2020-07-01
10 Warren Kumari New version available: draft-ietf-capport-rfc7710bis-10.txt
2020-07-01
10 (System) New version accepted (logged-in submitter: Warren Kumari)
2020-07-01
10 Warren Kumari Uploaded new revision
2020-06-30
09 Benjamin Kaduk [Ballot comment]
Thank you for addressing my Discuss (and Comment) points!
2020-06-30
09 Benjamin Kaduk [Ballot Position Update] Position for Benjamin Kaduk has been changed to No Objection from Discuss
2020-06-25
09 Magnus Westerlund [Ballot comment]
Thanks for addressing my issue.
2020-06-25
09 Magnus Westerlund [Ballot Position Update] Position for Magnus Westerlund has been changed to No Objection from Discuss
2020-06-24
09 Warren Kumari New version available: draft-ietf-capport-rfc7710bis-09.txt
2020-06-24
09 (System) New version accepted (logged-in submitter: Warren Kumari)
2020-06-24
09 Warren Kumari Uploaded new revision
2020-06-23
08 (System) Sub state has been changed to AD Followup from Revised ID Needed
2020-06-23
08 (System) IANA Review state changed to Version Changed - Review Needed from IANA OK - Actions Needed
2020-06-23
08 Warren Kumari New version available: draft-ietf-capport-rfc7710bis-08.txt
2020-06-23
08 (System) New version approved
2020-06-23
08 (System) Request for posting confirmation emailed to previous authors: Warren Kumari , Erik Kline
2020-06-23
08 Warren Kumari Uploaded new revision
2020-06-11
07 Cindy Morgan IESG state changed to IESG Evaluation::Revised I-D Needed from IESG Evaluation
2020-06-11
07 Éric Vyncke
[Ballot comment]
Thank you for the work put into this document. The document is easy to read. I really like the signaling of 'no captive …
[Ballot comment]
Thank you for the work put into this document. The document is easy to read. I really like the signaling of 'no captive portal'.

Please find below one non-blocking COMMENT (but you know the story) and 2 nits.

Please also address all Suresh's comments in his IoT review:
https://datatracker.ietf.org/doc/review-ietf-capport-rfc7710bis-07-iotdir-telechat-krishnan-2020-06-11/

I hope that this helps to improve the document,

Regards,

-éric

== COMMENTS ==

-- Section 2.2 ==
In "should not be provisioned", I would suggest to use the normative "SHOULD".
 
== NITS ==

-- Abstract --
Not all users of a captive portal are 'customers', they can be guests, students, employees, ... suggest to use 'users' (and even in the world of IoT).

-- Section 2 --
Authors, being English natives, are probably correct but " should not be provisioned via IPv6 DHCP nor IPv6 RA options." looks weird to m; why not " should be provisioned via neither IPv6 DHCP nor IPv6 RA
options." ?
2020-06-11
07 Éric Vyncke Ballot comment text updated for Éric Vyncke
2020-06-11
07 Magnus Westerlund
[Ballot discuss]
IANA Section:

As this document is obsoleting RFC 7710 is the document that registered the options for DHCPv6 and RA. Why isn't this …
[Ballot discuss]
IANA Section:

As this document is obsoleting RFC 7710 is the document that registered the options for DHCPv6 and RA. Why isn't this document updating the registrations to ensure that IANA has the current document as being owner of the codepoints?

In addition when it comes to BOOTP options code 160. What you have in this document appear to potentially lead to another future assignment end up in trouble? Wouldn't reserved be better status for this codepoint?
2020-06-11
07 Magnus Westerlund [Ballot Position Update] New position, Discuss, has been recorded for Magnus Westerlund
2020-06-11
07 Suresh Krishnan Request for Telechat review by IOTDIR Completed: Ready. Reviewer: Suresh Krishnan. Sent review to list.
2020-06-11
07 Robert Wilton
[Ballot comment]
Just one minor nit:

I would have preferred if the packet diagram for "IPv4 DHCP Option" looked a lot more like the one …
[Ballot comment]
Just one minor nit:

I would have preferred if the packet diagram for "IPv4 DHCP Option" looked a lot more like the one in section 2.3 for "IPv6 RA", but perhaps there is a reason why the v4 DHCP represents the URL as two separate fields.

Regards,
Rob
2020-06-11
07 Robert Wilton [Ballot Position Update] New position, No Objection, has been recorded for Robert Wilton
2020-06-10
07 Deborah Brungard [Ballot Position Update] New position, No Objection, has been recorded for Deborah Brungard
2020-06-10
07 Martin Vigoureux [Ballot Position Update] New position, No Objection, has been recorded for Martin Vigoureux
2020-06-09
07 Roman Danyliw
[Ballot comment]
Thanks for this updated document.

** I support Ben's Discuss position

** (Editorially) Is there a reason that this draft doesn’t reference draft-ietf-capport-architecture-08 …
[Ballot comment]
Thanks for this updated document.

** I support Ben's Discuss position

** (Editorially) Is there a reason that this draft doesn’t reference draft-ietf-capport-architecture-08 and use the notional architecture and terminology it defines?  It would be clearer if it did.

** Section 2.2 and 2.3.  Per “The maximum length of the URI that can be carried in IPv4 DHCP is 255 bytes, so URIs longer than 255 bytes should not be provisioned via IPv6 DHCP options.”
-- should this be a normative SHOULD?

-- recommend stating when this length can be ignored (e.g., IPv6 only environment)

** Section 5.  Per “In the absence of security measures like RA Guard ([RFC6105], [RFC7113]) or DHCP Shield [RFC7610] …”, are these recommended for operators to use in the Captive Portal System?
2020-06-09
07 Roman Danyliw [Ballot Position Update] New position, No Objection, has been recorded for Roman Danyliw
2020-06-09
07 Benjamin Kaduk
[Ballot discuss]
There seems to be an internal inconsistency about whether, when the API
URL is available in a given network via multiple mechanisms, the …
[Ballot discuss]
There seems to be an internal inconsistency about whether, when the API
URL is available in a given network via multiple mechanisms, the URLs
provided by the different mechanisms must be "identical" (Section 3) or
merely "equivalent" (Section 2).  I think we need to be consistent in
the requirement, as it is possible for URLs to be equivalent but not
identical just by virtue of mundane encoding tricks, even without
getting to the question of semantic equivalence of pointed-to resources.
2020-06-09
07 Benjamin Kaduk
[Ballot comment]
There is perhaps something to be said about how us moving from DHCP code
point 160 to 114 is in effect making a …
[Ballot comment]
There is perhaps something to be said about how us moving from DHCP code
point 160 to 114 is in effect making a mockery of the registration
policy of IETF Review, when it is in practice First Come First Served as
the squatter wins.  I think we should consider making a stronger
statement about squatting being bad (though if I understand correctly
for this case, the registration policy in this range has changed since
the creation of the registry, so maybe there are extenuating
circumstances).  [N.B. that this is the COMMENT section, not the DISCUSS section.]

I also think we should be more explicit about the potential gap in the
chain of custody for getting the user to the captive portal server to
fulfil the Captive Portal Conditions.  In order for the user to trust
that they're in the right place (even as they may be, e.g., entering
payment information), they rely on the network to only provide
legitimate versions of the signals defined in this document, blocking
sppofed ones.  At present, this seems to involve a component of "blind
faith", and though we do discuss the technical capabilities of the
attacker we don't go into how this affects the "trust chain" from
initial network attachment.  (More discussion in the section-by-section
comments.)

Abstract

  In many environments offering short-term or temporary Internet access
  (such as coffee shops), it is common to start new connections in a
  captive portal mode.  This highly restricts what the customer can do
  until the customer has authenticated.

side note: I don't remember seeing "customer" used in the architecture or API
document.

  This document describes a DHCPv4 and DHCPv6 option and a Router
  Advertisement (RA) option to inform clients that they are behind some
  sort of captive-portal enforcement device, and that they will need to
  authenticate to get Internet access.  It is not a full solution to

In the terminology of the architecture doc, the client will "satisfy the
Captive Portal Conditions" (as opposed to "authenticate").  Is there a
reason to use divergent terminology?

  hosts to interact with such portals.  While this document defines how
  the network operator may convey the captive portal API endpoint to
  hosts, the specific methods of authenticating to, and interacting
  with the captive portal are out of scope of this document.

["authenticating" again]

Section 2

  information faster and more reliably.  Note that, for the foreseeable
  future, captive portals will still need to implement interception
  techniques to serve legacy clients, and clients will need to perform
  probing to detect captive portals.

side note: I'd consider reiterating the "faster and more reliably" here
to incentivize adoption of the new mechanisms even though the legacy
ones are still needed.

  to reduce the chance of operational problems.  The maximum length of
  the URI that can be carried in IPv4 DHCP is 255 bytes, so URIs longer
  than 255 bytes should not be provisioned via IPv6 DHCP nor IPv6 RA
  options.

I'm not sure whether this text is conveying the intended meaning -- the
current version sounds like it's saying that because IPv4 DHCP is
limited, we need an entirely new mechanism to convey longer URIs,
leaving the reader to guess that this is out of some desire to keep the
existing mechanisms at feature parity.  Is the intent more along the
lines of "URIs longer than 255 bytes should not be used at all, so that
it's easier to present a consistent view across the three different
provisioning mechanisms defined in this document"?

  In all variants of this option, the URI MUST be that of the captive
  portal API endpoint, conforming to the recommendations for such URIs
  [draft-ietf-capport-api].

I'm sympathetic to the intdir reviewer's comments about the
"recommendations" from draft-ietf-capport-api not being laid out
particularly clearly.

  "user-portal-url" API key.  When performing such content negotiation
  ([RFC7231] Section 3.4), implementors of captive portals need to keep
  in mind that such responses might be cached, and therefore SHOULD
  include an appropriate Vary header field ([RFC7231] Section 7.1.4) or
  mark them explicitly uncacheable (for example, using Cache-Control:
  no-store [RFC7234] Section 5.2.2.3).

The API doc says "'private' or a more restrictive value"; do we want to
be diverging from that recommendation?

  The URI SHOULD NOT contain an IP address literal.  Exceptions to this
  might include networks with only one operational IP address family
  where DNS is either not available or not fully functional until the
  captive portal has been satisfied.

If we don't heed the SHOULD then we end up trying to speak TLS with only
an IP address for the server identifier, so we want an iPAddress
certificate, which adds complications of its own.  (Perhaps most of the
discussion of these complications should be in the API document, and
I'm pretty amenable to arguments that they are out of scope for
*extended* discussion here.  I'd still like to see a brief mention that
this scenario has some complications.)

  Networks with no captive portals MAY explicitly indicate this
  condition by using this option with the IANA-assigned URI for this
  purpose.  Clients observing the URI value
  "urn:ietf:params:capport:unrestricted" MAY forego time-consuming
  forms of captive portal detection.

It's not entirely clear that the BCP 14 "MAY" is adding much here.

Section 2.1

  o  Len: The length (one octet), in octets of the URI.

nit: comma after "in octets" as well as before.

Section 2.2

  The maximum length of the URI that can be carried in IPv4 DHCP is 255
  bytes, so URIs longer than 255 bytes should not be provisioned via
  IPv6 DHCP options.

[similar comment as above]

Section 2.3

  URI  The URI for the captive portal API endpoint to which the user
      should connect.  This MUST be padded with NULL (0x00) to make the

nit: in the context of (ASCII) characters, the octet with all bits zero
is usually written a "NUL", not "NULL".

  Note that the URI parameter is not guaranteed to be null terminated.

(ditto)

  The maximum length of the URI that can be carried in IPv4 DHCP is 255
  bytes, so URIs longer than 255 bytes should not be provisioned via
  IPv6 RA options.

[similar comment as above]

Section 4

Shouldn't we also request the reference be updated for the DHCPv6 option
code and RA option type?

Section 4.1

(I assume the question of "capport:unrestricted" vs.
"capport-unrestricted" was discussed already and don't wish to rehash it
again.)

Section 4.2

If this document is just de-registering the former capport use of code
160, what process is going to mark it as used for the polycom thing?

Section 5

RFC 7227 (BCP 187) "strongly advises" authors of documents defining new
DHCP options to define validation measures for recipients of such
options.  I don't see any such validation measures specified in this
document; why is it okay to diverge from the BCP recommendation?

  By removing or reducing the need for captive portals to perform MITM
  hijacking, this mechanism improves security by making the portal and
  its actions visible, rather than hidden, and reduces the likelihood
  that users will disable useful security safeguards like DNSSEC
  validation, VPNs, etc.  In addition, because the system knows that it

Perhaps we should say why the users would be disabling those mechanisms
in the absence of this mechanism?

  credentials, etc.  By handing out a URI which is protected with TLS,
  the captive portal operator can attempt to reassure the user that the
  captive portal is not malicious.

It's not entirely clear how successful such attempts will be, though, as
the trustworthiness of the captive-portal provisioning signal depends on
the network operator implementing (e.g.) RA-guard and DHCP sheild to
prevent the client from receiving signals not authorized by the network
operator, and the client does not in general know whether or not that is
the case.  (While we do talk about those mechanisms in the following
paragraph, we don't really talk about how the user can('t) know for sure
that those mechanisms are in place.)

  However, as the operating systems and application that make use of
  this information know that they are connecting to a captive-portal
  device (as opposed to intercepted connections) they can render the

I think we want to clarify in the parenthetical that for the case of
intercepted connections the OS/application may not know that they are
connecting to a captive-portal or hostile device.

Appendix B

  2.  Clarify that the option URI SHOULD be that of the captive portal
      API endpoint.

I couldn't find where this is done -- I just see descriptive text that
the URI is the URI of the API endpoint.
2020-06-09
07 Benjamin Kaduk [Ballot Position Update] New position, Discuss, has been recorded for Benjamin Kaduk
2020-06-09
07 Alvaro Retana [Ballot Position Update] New position, No Objection, has been recorded for Alvaro Retana
2020-06-06
07 Martin Duke [Ballot Position Update] New position, No Objection, has been recorded for Martin Duke
2020-06-06
07 Ralf Weber Request for Telechat review by INTDIR Completed: Ready with Nits. Reviewer: Ralf Weber. Sent review to list.
2020-06-05
07 Amanda Baber IANA Review state changed to IANA OK - Actions Needed from Version Changed - Review Needed
2020-05-31
07 Murray Kucherawy
[Ballot comment]
Nice work.  A couple of minor things:

In Section 2, paragraph 2, it says the operator "SHOULD ensure that the URIs provisioned by …
[Ballot comment]
Nice work.  A couple of minor things:

In Section 2, paragraph 2, it says the operator "SHOULD ensure that the URIs provisioned by each method are equivalent".  Does "equivalent" here mean "identical", or just "synonymous"?

In Sections 2.1 and 2.2, the lists are bulleted and the names being described are delimited by colons.  I suggest the same be done for 2.3.

> Thanks IANA!

RFC8126 should've required this of all documents.
2020-05-31
07 Murray Kucherawy [Ballot Position Update] New position, No Objection, has been recorded for Murray Kucherawy
2020-05-27
07 Samita Chakrabarti Request for Telechat review by IOTDIR is assigned to Suresh Krishnan
2020-05-27
07 Samita Chakrabarti Request for Telechat review by IOTDIR is assigned to Suresh Krishnan
2020-05-27
07 Bernie Volz Request for Telechat review by INTDIR is assigned to Ralf Weber
2020-05-27
07 Bernie Volz Request for Telechat review by INTDIR is assigned to Ralf Weber
2020-05-27
07 Bernie Volz Request for Telechat review by INTDIR is assigned to Charles Perkins
2020-05-27
07 Bernie Volz Request for Telechat review by INTDIR is assigned to Charles Perkins
2020-05-27
07 Éric Vyncke
[Ballot comment]
Thank you for the work put into this document. The document is easy to read. I really like the signaling of 'no captive …
[Ballot comment]
Thank you for the work put into this document. The document is easy to read. I really like the signaling of 'no captive portal'.

Please find below one non-blocking COMMENT (but you know the story) and 2 nits.

I hope that this helps to improve the document,

Regards,

-éric

== COMMENTS ==

-- Section 2.2 ==
In "should not be provisioned", I would suggest to use the normative "SHOULD".
 
== NITS ==

-- Abstract --
Not all users of a captive portal are 'customers', they can be guests, students, employees, ... suggest to use 'users' (and even in the world of IoT).

-- Section 2 --
Authors, being English natives, are probably correct but " should not be provisioned via IPv6 DHCP nor IPv6 RA options." looks weird to m; why not " should be provisioned via neither IPv6 DHCP nor IPv6 RA
options." ?
2020-05-27
07 Éric Vyncke [Ballot Position Update] New position, No Objection, has been recorded for Éric Vyncke
2020-05-27
07 Éric Vyncke Requested Telechat review by INTDIR
2020-05-27
07 Éric Vyncke Requested Telechat review by IOTDIR
2020-05-27
07 Éric Vyncke Requested Telechat review by INTDIR
2020-05-26
07 Gunter Van de Velde Closed request for Telechat review by OPSDIR with state 'Team Will not Review Version'
2020-05-26
07 Gunter Van de Velde Assignment of request for Telechat review by OPSDIR to Tim Chown was withdrawn
2020-05-26
07 Gunter Van de Velde Request for Telechat review by OPSDIR is assigned to Tim Chown
2020-05-26
07 Gunter Van de Velde Request for Telechat review by OPSDIR is assigned to Tim Chown
2020-05-25
07 Erik Kline [Ballot Position Update] New position, Recuse, has been recorded for Erik Kline
2020-05-25
07 Warren Kumari [Ballot comment]
'norther.
2020-05-25
07 Warren Kumari [Ballot Position Update] New position, Recuse, has been recorded for Warren Kumari
2020-05-25
07 Cindy Morgan Placed on agenda for telechat - 2020-06-11
2020-05-24
07 Barry Leiba Ballot has been issued
2020-05-24
07 Barry Leiba [Ballot Position Update] New position, Yes, has been recorded for Barry Leiba
2020-05-24
07 Barry Leiba Created "Approve" ballot
2020-05-24
07 Barry Leiba IESG state changed to IESG Evaluation from Waiting for AD Go-Ahead::AD Followup
2020-05-23
07 Erik Kline New version available: draft-ietf-capport-rfc7710bis-07.txt
2020-05-23
07 (System) New version accepted (logged-in submitter: Erik Kline)
2020-05-23
07 Erik Kline Uploaded new revision
2020-05-15
06 (System) Sub state has been changed to AD Followup from Revised ID Needed
2020-05-15
06 Erik Kline New version available: draft-ietf-capport-rfc7710bis-06.txt
2020-05-15
06 (System) New version accepted (logged-in submitter: Erik Kline)
2020-05-15
06 Erik Kline Uploaded new revision
2020-05-14
05 Barry Leiba IESG state changed to Waiting for AD Go-Ahead::Revised I-D Needed from Waiting for AD Go-Ahead::AD Followup
2020-05-14
05 Tim Chown Request for Last Call review by OPSDIR Completed: Has Nits. Reviewer: Tim Chown. Sent review to list.
2020-05-13
05 (System) Sub state has been changed to AD Followup from Revised ID Needed
2020-05-13
05 (System) IANA Review state changed to Version Changed - Review Needed from IANA - Not OK
2020-05-13
05 Erik Kline New version available: draft-ietf-capport-rfc7710bis-05.txt
2020-05-13
05 (System) New version accepted (logged-in submitter: Erik Kline)
2020-05-13
05 Erik Kline Uploaded new revision
2020-05-13
04 Barry Leiba IESG state changed to Waiting for AD Go-Ahead::Revised I-D Needed from Waiting for AD Go-Ahead
2020-05-13
04 (System) IESG state changed to Waiting for AD Go-Ahead from In Last Call
2020-05-12
04 (System) IANA Review state changed to IANA - Not OK from IANA - Review Needed
2020-05-12
04 Sabrina Tanamal
(Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs:

The IANA Functions Operator has completed its review of draft-ietf-capport-rfc7710bis-04. If any part of this review is inaccurate, please let …
(Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs:

The IANA Functions Operator has completed its review of draft-ietf-capport-rfc7710bis-04. If any part of this review is inaccurate, please let us know.

The IANA Functions Operator has a question about one of the actions requested in the IANA Considerations section of this document.

We understand that, upon approval of this document, there are two actions which we must complete.

First, Section 4.1 states that "This document registers a new entry under the IETF URN Sub-namespace defined in [RFC3553]" however, the registry at https://www.iana.org/assignments/params defined by RFC 3553 is actually the IETF URN Sub-namespace for Registered Protocol Parameter Identifiers registry. In addition, neither registry's columns match the columns named in the registration.

IANA Question --> The authors provide the following registration information in Section 4.1 of the draft:

Registry name: Captive Portal Unrestricted Identifier
URN: urn:ietf:params:capport:unrestricted
Specification: RFC TBD (this document)
Repository: RFC TBD (this document)
Index value: Only one value is defined (see URN above). No hierarchy is defined and therefore no sub-namespace registrations are possible.

The IETF URN Sub-namespaces registry records the following information:

Sub-namespace
Reference
IANA Registry Reference

And the IETF URN Sub-namespace for Registered Protocol Parameter Identifiers provide the following information:

Registered Parameter Identifier
Reference
IANA Registry Reference

Is the registration information in Section 4.1 of the draft for a different registry; or, is the information provided different from the requirements for the IETF URN Sub-namespace for Registered Protocol Parameter Identifiers registry?

Second, two changes are to be made in the BOOTP Vendor Extensions and DHCP Options registry on the Dynamic Host Configuration Protocol (DHCP) and Bootstrap Protocol (BOOTP) Parameters registry page located at:

https://www.iana.org/assignments/bootp-dhcp-parameters/

The current registration:

Tag: 114
Name: URL
Data Length: N
Meaning: URL
Reference: [RFC3679]

is to be changed to:

Tag: 114
Name: DHCP Captive-Portal
Data Length: N
Meaning: DHCP Captive-Portal
Reference: [ RFC-to-be ]

And, the current registration:

Tag: 160
Name: DHCP Captive-Portal
Data Length: N
Meaning: DHCP Captive-Portal
Reference: [RFC7710]

is to be changed to:

Tag: 160
Name: REMOVED/Unassigned
Data Length:
Meaning:
Reference: [ RFC-to-be ][RFC7710]

The IANA Functions Operator understands that these are the only actions required to be completed upon approval of this document.

Note:  The actions requested in this document will not be completed until the document has been approved for publication as an RFC. This message is meant only to confirm the list of actions that will be performed.

Thank you,

Sabrina Tanamal
Senior IANA Services Specialist
2020-05-11
04 Stewart Bryant Request for Last Call review by GENART Completed: Ready. Reviewer: Stewart Bryant. Sent review to list.
2020-05-04
04 Gunter Van de Velde Request for Last Call review by OPSDIR is assigned to Tim Chown
2020-05-04
04 Gunter Van de Velde Request for Last Call review by OPSDIR is assigned to Tim Chown
2020-05-01
04 Rifaat Shekh-Yusef Request for Last Call review by SECDIR Completed: Has Issues. Reviewer: Rifaat Shekh-Yusef. Sent review to list.
2020-04-30
04 Jean Mahoney Request for Last Call review by GENART is assigned to Stewart Bryant
2020-04-30
04 Jean Mahoney Request for Last Call review by GENART is assigned to Stewart Bryant
2020-04-30
04 Tero Kivinen Request for Last Call review by SECDIR is assigned to Rifaat Shekh-Yusef
2020-04-30
04 Tero Kivinen Request for Last Call review by SECDIR is assigned to Rifaat Shekh-Yusef
2020-04-29
04 Cindy Morgan IANA Review state changed to IANA - Review Needed
2020-04-29
04 Cindy Morgan
The following Last Call announcement was sent out (ends 2020-05-13):

From: The IESG
To: IETF-Announce
CC: Martin Thomson , mt@lowentropy.net, captive-portals@ietf.org, capport-chairs@ietf.org, …
The following Last Call announcement was sent out (ends 2020-05-13):

From: The IESG
To: IETF-Announce
CC: Martin Thomson , mt@lowentropy.net, captive-portals@ietf.org, capport-chairs@ietf.org, draft-ietf-capport-rfc7710bis@ietf.org, barryleiba@gmail.com
Reply-To: last-call@ietf.org
Sender:
Subject: Last Call:  (Captive-Portal Identification in DHCP / RA) to Proposed Standard


The IESG has received a request from the Captive Portal Interaction WG
(capport) to consider the following document: - 'Captive-Portal
Identification in DHCP / RA'
  as Proposed Standard

The IESG plans to make a decision in the next few weeks, and solicits final
comments on this action. Please send substantive comments to the
last-call@ietf.org mailing lists by 2020-05-13. Exceptionally, comments may
be sent to iesg@ietf.org instead. In either case, please retain the beginning
of the Subject line to allow automated sorting.

Abstract


  In many environments offering short-term or temporary Internet access
  (such as coffee shops), it is common to start new connections in a
  captive portal mode.  This highly restricts what the customer can do
  until the customer has authenticated.

  This document describes a DHCP option (and a Router Advertisement
  (RA) extension) to inform clients that they are behind some sort of
  captive-portal enforcement device, and that they will need to
  authenticate to get Internet access.  It is not a full solution to
  address all of the issues that clients may have with captive portals;
  it is designed to be used in larger solutions.  The method of
  authenticating to, and interacting with the captive portal is out of
  scope of this document.

  This document replaces RFC 7710RFC 7710 used DHCP code point 160.
  Due to a conflict, this document specifies 114.

  [ This document is being collaborated on in Github at:
  https://github.com/capport-wg/7710bis.  The most recent version of
  the document, open issues, etc should all be available here.  The
  authors (gratefully) accept pull requests.  Text in square brackets
  will be removed before publication. ]




The file can be obtained via
https://datatracker.ietf.org/doc/draft-ietf-capport-rfc7710bis/

IESG discussion can be tracked via
https://datatracker.ietf.org/doc/draft-ietf-capport-rfc7710bis/ballot/


No IPR declarations have been submitted directly on this I-D.




2020-04-29
04 Cindy Morgan IESG state changed to In Last Call from Last Call Requested
2020-04-29
04 Cindy Morgan Last call announcement was generated
2020-04-28
04 Barry Leiba Last call was requested
2020-04-28
04 Barry Leiba Last call announcement was generated
2020-04-28
04 Barry Leiba Ballot approval text was generated
2020-04-28
04 Barry Leiba IESG state changed to Last Call Requested from AD Evaluation::AD Followup
2020-04-28
04 (System) Sub state has been changed to AD Followup from Revised ID Needed
2020-04-28
04 Erik Kline New version available: draft-ietf-capport-rfc7710bis-04.txt
2020-04-28
04 (System) New version accepted (logged-in submitter: Erik Kline)
2020-04-28
04 Erik Kline Uploaded new revision
2020-04-23
03 Barry Leiba IESG state changed to AD Evaluation::Revised I-D Needed from AD Evaluation
2020-04-21
03 Barry Leiba Ballot writeup was changed
2020-04-21
03 Barry Leiba IESG state changed to AD Evaluation from Publication Requested
2020-04-20
03 Martin Thomson
Publication request writeup for draft-ietf-capport-rfc7710bis-03

Intended status: Proposed Standard
Working group: capport
Document shepherd: Martin Thomson

Technical Summary:

This document defines DHCP and RA options …
Publication request writeup for draft-ietf-capport-rfc7710bis-03

Intended status: Proposed Standard
Working group: capport
Document shepherd: Martin Thomson

Technical Summary:

This document defines DHCP and RA options that allow a network to indicate the
location of a captive portal.

This version of the document replaces RFC 7710 with clarifications about what
the "location of a captive portal" means, a means for a network to indicate the
absence of a captive portal, and a new DHCP code point that we believe to be
uncontested.

Working Group Summary:

This document was fairly uncontroversial in discussions.

Document Quality:

The document is a considerable refinement over the previous version, which left
many aspects undefined.  Experiments (and multiple implementations) revealed
that the previous version was undeployable due to the DHCP option conflict.  We
have several implementations and have validated this.  Those implementations are
prototype quality, but implemented in major operating system stacks, so we are
confident that this is implementable.

Personnel:

Martin Thomson is document shepherd.  Barry Leiba is the responsible Area Director.

Important information:

This document represents the consensus of the capport WG.  There were no
significant problems with this particular document.

It is the understanding of the shepherd that extensive collaboration was
undertaken by authors with IANA, DHC, and the DHCP registry experts in reaching
the conclusions in the draft.

IPR disclosures from authors have been checked.  No IPR disclosures have been
made with reference to this work.

IANA considerations were checked and cleaned up.  Entries are registered, but no
new registries created.

Validation is limited to nits check (which only has false positives).
2020-04-20
03 Martin Thomson Responsible AD changed to Barry Leiba
2020-04-20
03 Martin Thomson IETF WG state changed to Submitted to IESG for Publication from WG Document
2020-04-20
03 Martin Thomson IESG state changed to Publication Requested from I-D Exists
2020-04-20
03 Martin Thomson IESG process started in state Publication Requested
2020-04-20
03 Martin Thomson
Publication request writeup for draft-ietf-capport-rfc7710bis-03

Intended status: Proposed Standard
Working group: capport
Document shepherd: Martin Thomson

Technical Summary:

This document defines DHCP and RA options …
Publication request writeup for draft-ietf-capport-rfc7710bis-03

Intended status: Proposed Standard
Working group: capport
Document shepherd: Martin Thomson

Technical Summary:

This document defines DHCP and RA options that allow a network to indicate the
location of a captive portal.

This version of the document replaces RFC 7710 with clarifications about what
the "location of a captive portal" means, a means for a network to indicate the
absence of a captive portal, and a new DHCP code point that we believe to be
uncontested.

Working Group Summary:

This document was fairly uncontroversial in discussions.

Document Quality:

The document is a considerable refinement over the previous version, which left
many aspects undefined.  Experiments (and multiple implementations) revealed
that the previous version was undeployable due to the DHCP option conflict.  We
have several implementations and have validated this.  Those implementations are
prototype quality, but implemented in major operating system stacks, so we are
confident that this is implementable.

Personnel:

Martin Thomson is document shepherd.  Barry Leiba is the responsible Area Director.

Important information:

This document represents the consensus of the capport WG.  There were no
significant problems with this particular document.

It is the understanding of the shepherd that extensive collaboration was
undertaken by authors with IANA, DHC, and the DHCP registry experts in reaching
the conclusions in the draft.

IPR disclosures from authors have been checked.  No IPR disclosures have been
made with reference to this work.

IANA considerations were checked and cleaned up.  Entries are registered, but no
new registries created.

Validation is limited to nits check (which only has false positives).
2020-03-31
03 Martin Thomson Notification list changed to Martin Thomson <mt@lowentropy.net>
2020-03-31
03 Martin Thomson Document shepherd changed to Martin Thomson
2020-03-31
03 Martin Thomson Changed consensus to Yes from Unknown
2020-03-31
03 Martin Thomson Intended Status changed to Proposed Standard from None
2020-03-30
03 Warren Kumari New version available: draft-ietf-capport-rfc7710bis-03.txt
2020-03-30
03 (System) New version approved
2020-03-30
03 (System) Request for posting confirmation emailed to previous authors: Erik Kline , Warren Kumari
2020-03-30
03 Warren Kumari Uploaded new revision
2020-03-07
02 Warren Kumari New version available: draft-ietf-capport-rfc7710bis-02.txt
2020-03-07
02 (System) New version approved
2020-03-07
02 (System) Request for posting confirmation emailed to previous authors: Warren Kumari , Erik Kline
2020-03-07
02 Warren Kumari Uploaded new revision
2020-01-12
01 Erik Kline New version available: draft-ietf-capport-rfc7710bis-01.txt
2020-01-12
01 (System) New version accepted (logged-in submitter: Erik Kline)
2020-01-12
01 Erik Kline Uploaded new revision
2020-01-03
00 (System) Document has expired
2019-07-14
00 Martin Thomson Added to session: IETF-105: capport  Mon-1000
2019-07-02
00 Erik Kline This document now replaces draft-ekwk-capport-rfc7710bis instead of None
2019-07-02
00 Erik Kline New version available: draft-ietf-capport-rfc7710bis-00.txt
2019-07-02
00 (System) WG -00 approved
2019-07-02
00 Erik Kline Set submitter to "Erik Kline ", replaces to (none) and sent approval email to group chairs: capport-chairs@ietf.org
2019-07-02
00 Erik Kline Uploaded new revision