Skip to main content

DHCPv6 Failover Protocol
draft-ietf-dhc-dhcpv6-failover-protocol-06

Revision differences

Document history

Date Rev. By Action
2017-06-05
06 (System) RFC Editor state changed to AUTH48-DONE from AUTH48
2017-04-26
06 (System) RFC Editor state changed to AUTH48 from RFC-EDITOR
2017-04-21
06 Gunter Van de Velde Closed request for Telechat review by OPSDIR with state 'Overtaken by Events'
2017-04-11
06 (System) RFC Editor state changed to RFC-EDITOR from AUTH
2017-04-07
06 (System) RFC Editor state changed to AUTH from EDIT
2017-03-07
06 (System) IANA Action state changed to RFC-Ed-Ack from Waiting on RFC Editor
2017-03-03
06 (System) IANA Action state changed to Waiting on RFC Editor from In Progress
2017-03-03
06 (System) IANA Action state changed to In Progress from Waiting on Authors
2017-03-03
06 (System) IANA Action state changed to Waiting on Authors from In Progress
2017-02-28
06 (System) RFC Editor state changed to EDIT
2017-02-28
06 (System) IESG state changed to RFC Ed Queue from Approved-announcement sent
2017-02-28
06 (System) Announcement was received by RFC Editor
2017-02-28
06 (System) IANA Action state changed to In Progress
2017-02-28
06 Amy Vezza IESG state changed to Approved-announcement sent from Approved-announcement to be sent
2017-02-28
06 Amy Vezza IESG has approved the document
2017-02-28
06 Amy Vezza Closed "Approve" ballot
2017-02-28
06 Amy Vezza Ballot approval text was generated
2017-02-27
06 Suresh Krishnan IESG state changed to Approved-announcement to be sent from Approved-announcement to be sent::Point Raised - writeup needed
2017-02-27
06 Kim Kinnear New version available: draft-ietf-dhc-dhcpv6-failover-protocol-06.txt
2017-02-27
06 (System) New version approved
2017-02-27
06 (System) Request for posting confirmation emailed to previous authors: dhc-chairs@ietf.org, Tomek Mrugalski , Kim Kinnear
2017-02-27
06 Kim Kinnear Uploaded new revision
2017-02-02
05 (System) IANA Review state changed to Version Changed - Review Needed from IANA OK - Actions Needed
2017-02-02
05 Kim Kinnear New version available: draft-ietf-dhc-dhcpv6-failover-protocol-05.txt
2017-02-02
05 (System) New version approved
2017-02-02
05 (System) Request for posting confirmation emailed to previous authors: dhc-chairs@ietf.org, "Kim Kinnear" , "Tomek Mrugalski"
2017-02-02
05 Kim Kinnear Uploaded new revision
2017-02-02
04 Cindy Morgan IESG state changed to Approved-announcement to be sent::Point Raised - writeup needed from IESG Evaluation
2017-02-02
04 Mirja Kühlewind
[Ballot comment]
A few questions that are not fully clear to me and maybe need some additional explanation in the draft (or maybe it's just …
[Ballot comment]
A few questions that are not fully clear to me and maybe need some additional explanation in the draft (or maybe it's just me...):

- It's not fully clear to me when a TCP connection is opened or closed. Are the two servers supposed to have one long-lived connection? And if that connection is terminated for any reason, should the primary server try to re-open immediately? And if a (new) connection is (re-)open do I always need to send a CONNECT first, or only if I didn't have any connection with this server before? And if the secondary server goes down and comes up in RECOVER state (sec 8.5.1.), should it open a TCP connection to the primary server, or will always the primary server be the one that opens the connection (and if so when will it do it)?

- Also not really clear to me is why OPTION_F_MAX_UNACKED_BNDUPD  is needed and how the server should know the right value. I guess you would want to calculate this based on the send buffer, however, not all message have the same size and as such I don't know how to calculate that. And is that really needed? If messages will not be accepted by the receiver-side server, the receive window will be zero and the socket on the sending side will be blocked; no additional message can be send. What will be different if the sender knows in advance when it could potentially happen (but also might not if the other end processes the messages quickly and there is no excessive loss).
2017-02-02
04 Mirja Kühlewind [Ballot Position Update] New position, No Objection, has been recorded for Mirja Kühlewind
2017-02-01
04 Spencer Dawkins [Ballot Position Update] New position, No Objection, has been recorded for Spencer Dawkins
2017-02-01
04 Alia Atlas [Ballot Position Update] New position, No Objection, has been recorded for Alia Atlas
2017-02-01
04 Ben Campbell [Ballot comment]
Thanks for addressing my DISCUSS comment. I am clearing now under the assumption the proposed text will make it into the draft.
2017-02-01
04 Ben Campbell [Ballot Position Update] Position for Ben Campbell has been changed to No Objection from Discuss
2017-02-01
04 Stephen Farrell
[Ballot comment]

- I support Ben's discuss about "secure mode" - a few
more details are needed, in particular how a pair
decide to use/not-use …
[Ballot comment]

- I support Ben's discuss about "secure mode" - a few
more details are needed, in particular how a pair
decide to use/not-use TLS - are there different ports
or a STARTTLS equivalent - I can't see that defined
here. (Is it inherited from RFC7653? If so, maybe you
need to say?)

- For the DNS update stuff - is there no need to use
TSIG secrets? If there is, how is that sync'd between
the pair of DHCP servers?  If it is sync'd then don't
you need to say that TLS is a MUST for such
connections? If there is no support for TSIG, is that
likely to work?
2017-02-01
04 Stephen Farrell [Ballot Position Update] New position, No Objection, has been recorded for Stephen Farrell
2017-02-01
04 Jari Arkko [Ballot Position Update] New position, No Objection, has been recorded for Jari Arkko
2017-02-01
04 Christer Holmberg Request for Last Call review by GENART Completed: Ready with Nits. Reviewer: Christer Holmberg.
2017-02-01
04 Alissa Cooper [Ballot Position Update] New position, No Objection, has been recorded for Alissa Cooper
2017-02-01
04 Joel Jaeggli [Ballot Position Update] New position, No Objection, has been recorded for Joel Jaeggli
2017-02-01
04 Tero Kivinen Closed request for Last Call review by SECDIR with state 'Withdrawn'
2017-01-31
04 Terry Manderson [Ballot Position Update] New position, No Objection, has been recorded for Terry Manderson
2017-01-31
04 Ben Campbell
[Ballot discuss]
I think the security considerations need some elaboration. The draft says "When operating in secure mode...", but it doesn't discuss when one might …
[Ballot discuss]
I think the security considerations need some elaboration. The draft says "When operating in secure mode...", but it doesn't discuss when one might want to run in secure more vs non-secure mode. It would be helpful to discuss actual threats. You mention TCP DoS attacks, but, for example, can an eavesdropper learn sensitive or private information? Is there a risk of someone impersonating a partner? Tampering with messages on the network?

There's a mention of using TLS certs for authentication/authorization, but I think there's more to be said there. Is there any authentication or authorization if you aren't using secure mode? How do you match a TLS certificate to the partner name?

The section opens saying that the security considerations from 3315 and 3633 apply, but I doubt either of those contemplated that you would be sending DHCP messages over TCP connections between partner servers.
2017-01-31
04 Ben Campbell Ballot discuss text updated for Ben Campbell
2017-01-31
04 Ben Campbell
[Ballot discuss]
I think the security considerations need some elaboration. The draft says "When operating in secure mode...", but it doesn't discuss when one might …
[Ballot discuss]
I think the security considerations need some elaboration. The draft says "When operating in secure mode...", but it doesn't discuss when one might want to run in secure more vs non-secure mode. It would be helpful to discuss the actual threads. You mention TCP DoS attacks, but, for example, can an eavesdropper learn sensitive or private information? Is there a risk of someone impersonating a partner? Tampering with messages on the network?

There's a mention of using TLS certs for authentication/authorization, but I think there's more to be said there. Is there any authentication or authorization if you aren't using secure mode? How do you match a TLS certificate to the partner name?

The section opens saying that the security considerations from 3315 and 3633 apply, but I doubt either of those contemplated that you would be sending DHCP messages over TCP connections between partner servers.
2017-01-31
04 Ben Campbell
[Ballot comment]
- 6.1.3: I'm confused by the procedure for checking OPTION_F_PROTOCOL_VERSION in the CONNECTREPLY message. The secondary already checked that it supported the version …
[Ballot comment]
- 6.1.3: I'm confused by the procedure for checking OPTION_F_PROTOCOL_VERSION in the CONNECTREPLY message. The secondary already checked that it supported the version in the CONNECT message; why does the primary need to check it again? Is it expected that the secondary might choose to send a different version in the CONNECTREPLY than it received in CONNECT? Is it possible that the partners use different protocol versions at the same time?
2017-01-31
04 Ben Campbell [Ballot Position Update] New position, Discuss, has been recorded for Ben Campbell
2017-01-31
04 Deborah Brungard [Ballot Position Update] New position, No Objection, has been recorded for Deborah Brungard
2017-01-31
04 Kathleen Moriarty
[Ballot comment]
I have 2 questions that I would like to chat about and should be easy enough to resolve.

1. I know we've discussed …
[Ballot comment]
I have 2 questions that I would like to chat about and should be easy enough to resolve.

1. I know we've discussed in the past why there is no MUST for TLS and it having to do with DHCPv6 use on private networks or isolated.  Is there text in one of the more recent RFCs that covers this explanation that can be cited?  I'd like to make sure that's enough too.

2. The Security Considerations section says not to use Authentication from RFC3316.  SHould authentication instead be done within TLS or how will the session be authenticated.  Did I miss something?  I'm not finding the term authentication elsewhere in the draft and can infer things, but wanted to make sure since nothing is stated explicitly.
2017-01-31
04 Kathleen Moriarty [Ballot Position Update] New position, No Objection, has been recorded for Kathleen Moriarty
2017-01-31
04 Alvaro Retana [Ballot Position Update] New position, No Objection, has been recorded for Alvaro Retana
2017-01-27
04 Amanda Baber IANA Review state changed to IANA OK - Actions Needed from Version Changed - Review Needed
2017-01-27
04 Suresh Krishnan IESG state changed to IESG Evaluation from Waiting for Writeup
2017-01-27
04 Suresh Krishnan Ballot has been issued
2017-01-27
04 Suresh Krishnan [Ballot Position Update] New position, Yes, has been recorded for Suresh Krishnan
2017-01-27
04 Suresh Krishnan Created "Approve" ballot
2017-01-27
04 Suresh Krishnan Ballot writeup was changed
2017-01-25
04 Gunter Van de Velde Request for Telechat review by OPSDIR is assigned to Victor Kuarsingh
2017-01-25
04 Gunter Van de Velde Request for Telechat review by OPSDIR is assigned to Victor Kuarsingh
2017-01-20
04 (System) IANA Review state changed to Version Changed - Review Needed from IANA - Not OK
2017-01-20
04 Kim Kinnear New version available: draft-ietf-dhc-dhcpv6-failover-protocol-04.txt
2017-01-20
04 (System) New version approved
2017-01-20
04 (System) Request for posting confirmation emailed to previous authors: dhc-chairs@ietf.org, "Kim Kinnear" , "Tomek Mrugalski"
2017-01-20
04 Kim Kinnear Uploaded new revision
2017-01-19
03 (System) IESG state changed to Waiting for Writeup from In Last Call
2017-01-18
03 (System) IANA Review state changed to IANA - Not OK from IANA - Review Needed
2017-01-18
03 Sabrina Tanamal
(Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs:

The IANA Services Operator has completed its review of draft-ietf-dhc-dhcpv6-failover-protocol-03.txt. If any part of this review is inaccurate, please let …
(Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs:

The IANA Services Operator has completed its review of draft-ietf-dhc-dhcpv6-failover-protocol-03.txt. If any part of this review is inaccurate, please let us know.

The IANA Services Operator understands that, upon approval of [ RFC-to-be ], there are three actions which we must complete.

First, in the Message Types subregistry of the Dynamic Host Configuration Protocol for IPv6 (DHCPv6) registry located at:

https://www.iana.org/assignments/dhcpv6-parameters/

twelve new Message Types are to be registered as follows:

Value Description Reference
-----------------------+-------------------------+----------------
[ TBD-at-Registration ] BNDUPD [ RFC-to-be ]
[ TBD-at-Registration ] BNDREPLY [ RFC-to-be ]
[ TBD-at-Registration ] POOLREQ [ RFC-to-be ]
[ TBD-at-Registration ] POOLRESP [ RFC-to-be ]
[ TBD-at-Registration ] UPDREQ [ RFC-to-be ]
[ TBD-at-Registration ] UPDREQALL [ RFC-to-be ]
[ TBD-at-Registration ] UPDDONE [ RFC-to-be ]
[ TBD-at-Registration ] CONNECT [ RFC-to-be ]
[ TBD-at-Registration ] CONNECTREPLY [ RFC-to-be ]
[ TBD-at-Registration ] DISCONNECT [ RFC-to-be ]
[ TBD-at-Registration ] STATE [ RFC-to-be ]
[ TBD-at-Registration ] CONTACT [ RFC-to-be ]

Second, in the Option Codes subregistry of the Dynamic Host Configuration Protocol for IPv6 (DHCPv6) registry located at:

https://www.iana.org/assignments/dhcpv6-parameters/

twenty-one new Option Codes are to be registered as follows:

Value Description Reference
-----------------------+--------------------------------+----------------
[ TBD-at-Registration ] OPTION_F_BINDING_STATUS [ RFC-to-be ]
[ TBD-at-Registration ] OPTION_F_CONNECT_FLAGS [ RFC-to-be ]
[ TBD-at-Registration ] OPTION_F_DNS_REMOVAL_INFO [ RFC-to-be ]
[ TBD-at-Registration ] OPTION_F_DNS_HOST_NAME [ RFC-to-be ]
[ TBD-at-Registration ] OPTION_F_DNS_ZONE_NAME [ RFC-to-be ]
[ TBD-at-Registration ] OPTION_F_DNS_FLAGS [ RFC-to-be ]
[ TBD-at-Registration ] OPTION_F_EXPIRATION_TIME [ RFC-to-be ]
[ TBD-at-Registration ] OPTION_F_MAX_UNACKED_BNDUPD [ RFC-to-be ]
[ TBD-at-Registration ] OPTION_F_MCLT [ RFC-to-be ]
[ TBD-at-Registration ] OPTION_F_PARTNER_LIFETIME [ RFC-to-be ]
[ TBD-at-Registration ] OPTION_F_PARTNER_LIFETIME_SENT [ RFC-to-be ]
[ TBD-at-Registration ] OPTION_F_PARTNER_DOWN_TIME [ RFC-to-be ]
[ TBD-at-Registration ] OPTION_F_PARTNER_RAW_CLT_TIME [ RFC-to-be ]
[ TBD-at-Registration ] OPTION_F_PROTOCOL_VERSION [ RFC-to-be ]
[ TBD-at-Registration ] OPTION_F_KEEPALIVE_TIME [ RFC-to-be ]
[ TBD-at-Registration ] OPTION_F_RECONFIGURE_DATA [ RFC-to-be ]
[ TBD-at-Registration ] OPTION_F_RELATIONSHIP_NAME [ RFC-to-be ]
[ TBD-at-Registration ] OPTION_F_SERVER_FLAGS [ RFC-to-be ]
[ TBD-at-Registration ] OPTION_F_SERVER_STATE [ RFC-to-be ]
[ TBD-at-Registration ] OPTION_F_START_TIME_OF_STATE [ RFC-to-be ]
[ TBD-at-Registration ] OPTION_F_STATE_EXPIRATION_TIME [ RFC-to-be ]

Because this registry requires Expert Review [RFC5226] for registration, we've contacted the IESG-designated expert in a separate ticket to request approval. Expert review should be completed before your document can be approved for publication as an RFC.

Third, in the Status Codes subregistry of the Dynamic Host Configuration Protocol for IPv6 (DHCPv6) registry located at:

https://www.iana.org/assignments/dhcpv6-parameters/

seven new Status Codes are to be registered as follows:

Value Description Reference
-----------------------+--------------------------------+----------------
[ TBD-at-Registration ] AddressInUse [ RFC-to-be ]
[ TBD-at-Registration ] ConfigurationConflict [ RFC-to-be ]
[ TBD-at-Registration ] MissingBindingInformation [ RFC-to-be ]
[ TBD-at-Registration ] OutdatedBindingInformation [ RFC-to-be ]
[ TBD-at-Registration ] ServerShuttingDown [ RFC-to-be ]
[ TBD-at-Registration ] DNSUpdateNotSupported [ RFC-to-be ]
[ TBD-at-Registration ] ExcessiveTimeSkew [ RFC-to-be ]

The IANA Services Operator understands that these three actions are the only ones required to be completed upon approval of [ RFC-to-be ].

Note:  The actions requested in this document will not be completed until the document has been approved for publication as an RFC. This message is only to confirm what actions will be performed.

Thank you,

Sabrina Tanamal
IANA Services Specialist
PTI
2017-01-16
03 Carlos Pignataro Request for Last Call review by OPSDIR Completed: Ready. Reviewer: Carlos Pignataro. Sent review to list.
2017-01-12
03 Tero Kivinen Request for Last Call review by SECDIR is assigned to Matt Lepinski
2017-01-12
03 Tero Kivinen Request for Last Call review by SECDIR is assigned to Matt Lepinski
2017-01-10
03 Gunter Van de Velde Request for Last Call review by OPSDIR is assigned to Carlos Pignataro
2017-01-10
03 Gunter Van de Velde Request for Last Call review by OPSDIR is assigned to Carlos Pignataro
2017-01-05
03 Jean Mahoney Request for Last Call review by GENART is assigned to Christer Holmberg
2017-01-05
03 Jean Mahoney Request for Last Call review by GENART is assigned to Christer Holmberg
2017-01-05
03 Suresh Krishnan Placed on agenda for telechat - 2017-02-02
2017-01-05
03 Amy Vezza IANA Review state changed to IANA - Review Needed
2017-01-05
03 Amy Vezza
The following Last Call announcement was sent out:

From: The IESG
To: "IETF-Announce"
CC: "Bernie Volz" , volz@cisco.com, dhc-chairs@ietf.org, suresh.krishnan@ericsson.com, draft-ietf-dhc-dhcpv6-failover-protocol@ietf.org, …
The following Last Call announcement was sent out:

From: The IESG
To: "IETF-Announce"
CC: "Bernie Volz" , volz@cisco.com, dhc-chairs@ietf.org, suresh.krishnan@ericsson.com, draft-ietf-dhc-dhcpv6-failover-protocol@ietf.org, dhcwg@ietf.org
Reply-To: ietf@ietf.org
Sender:
Subject: Last Call:  (DHCPv6 Failover Protocol) to Proposed Standard


The IESG has received a request from the Dynamic Host Configuration WG
(dhc) to consider the following document:
- 'DHCPv6 Failover Protocol'
  as Proposed Standard

The IESG plans to make a decision in the next few weeks, and solicits
final comments on this action. Please send substantive comments to the
ietf@ietf.org mailing lists by 2017-01-19. Exceptionally, comments may be
sent to iesg@ietf.org instead. In either case, please retain the
beginning of the Subject line to allow automated sorting.

Abstract


  DHCPv6 as defined in "Dynamic Host Configuration Protocol for IPv6
  (DHCPv6)" (RFC3315) does not offer server redundancy.  This document
  defines a protocol implementation to provide DHCPv6 failover, a
  mechanism for running two servers with the capability for either
  server to take over clients' leases in case of server failure or
  network partition.  It meets the requirements for DHCPv6 failover
  detailed in "DHCPv6 Failover Requirements" (RFC7031).




The file can be obtained via
https://datatracker.ietf.org/doc/draft-ietf-dhc-dhcpv6-failover-protocol/

IESG discussion can be tracked via
https://datatracker.ietf.org/doc/draft-ietf-dhc-dhcpv6-failover-protocol/ballot/


No IPR declarations have been submitted directly on this I-D.




2017-01-05
03 Amy Vezza IESG state changed to In Last Call from Last Call Requested
2017-01-05
03 Amy Vezza Last call announcement was changed
2017-01-04
03 Suresh Krishnan Last call was requested
2017-01-04
03 Suresh Krishnan Last call announcement was generated
2017-01-04
03 Suresh Krishnan Ballot approval text was generated
2017-01-04
03 Suresh Krishnan Ballot writeup was generated
2017-01-04
03 Suresh Krishnan IESG state changed to Last Call Requested from AD Evaluation::External Party
2016-12-23
03 Carlos Jesús Bernardos Request for Early review by INTDIR Completed: Ready. Reviewer: Carlos Bernardos. Sent review to list.
2016-12-06
03 Bernie Volz Request for Early review by INTDIR is assigned to Carlos Bernardos
2016-12-06
03 Bernie Volz Request for Early review by INTDIR is assigned to Carlos Bernardos
2016-12-06
03 Bernie Volz Requested Early review by INTDIR
2016-12-05
03 Suresh Krishnan IESG state changed to AD Evaluation::External Party from Publication Requested
2016-11-01
03 Bernie Volz
Write up for draft-ietf-dhc-dhcpv6-failover-protocol(-03).txt:


(1) What type of RFC is being requested (BCP, Proposed Standard,
    Internet Standard, Informational, Experimental, or Historic)? Why …
Write up for draft-ietf-dhc-dhcpv6-failover-protocol(-03).txt:


(1) What type of RFC is being requested (BCP, Proposed Standard,
    Internet Standard, Informational, Experimental, or Historic)? Why
    is this the proper type of RFC? Is this type of RFC indicated in
    the title page header?

Standards Track. This is the proper type as it defines a new proposed
standard for a DHCPv6 failover protocol.


(2) The IESG approval announcement includes a Document Announcement
    Write-Up. Please provide such a Document Announcement
    Write-Up. Recent examples can be found in the "Action"
    announcements for approved documents. The approval announcement
    contains the following sections:

Technical Summary:

This document defines a protocol implementation to provide DHCPv6
failover, a mechanism for running two servers with the capability
for either server to take over clients' leases in case of server
failure or network partition.  It meets the requirements for DHCPv6
failover detailed in "DHCPv6 Failover Requirements" (RFC7031).

Working Group Summary:

This document defines the DHCPv6 failover protocol based on the
requirements outlined in "DHCPv6 Failover Requirements" (RFC7031).

Document Quality:

This document has had thorough reviews by many interested and
knowledgeable folks, and is based on the DHCPv4 failover design
which had many years of review but never made it to the IESG.
There were no significant points of difficulty or controversy
with the contents of the document.

Personnel:

Bernie Volz is the document shepherd. Suresh Krishnan is the
current responsible AD.


(3) Briefly describe the review of this document that was performed by
    the Document Shepherd. If this version of the document is not
    ready for publication, please explain why the document is being
    forwarded to the IESG.

I read the document thoroughly several times, and submitted editorial
and technical suggestions to the authors, which they implemented. I
believe it is ready for publication.


(4) Does the document Shepherd have any concerns about the depth or
    breadth of the reviews that have been performed?

No, the document has had a good deal of careful review.


(5) Do portions of the document need review from a particular or from
    broader perspective, e.g., security, operational complexity, AAA,
    DNS, DHCP, XML, or internationalization? If so, describe the
    review that took place.

No.


(6) Describe any specific concerns or issues that the Document
    Shepherd has with this document that the Responsible Area Director
    and/or the IESG should be aware of? For example, perhaps he or she
    is uncomfortable with certain parts of the document, or has
    concerns whether there really is a need for it. In any event, if
    the WG has discussed those issues and has indicated that it still
    wishes to advance the document, detail those concerns here.

I think the document is good as written, and serves a useful purpose.

I know of a commercial product (Cisco Prime Network Registrar) that
has implemented a protocol that is very similar to the draft protocol
and it has been deployed in large service provider's networks (as well
as many other deployments).


(7) Has each author confirmed that any and all appropriate IPR
    disclosures required for full conformance with the provisions of
    BCP 78 and BCP 79 have already been filed. If not, explain why?

Yes I have confirmed with co-authors.


(8) Has an IPR disclosure been filed that references this document? If
    so, summarize any WG discussion and conclusion regarding the IPR
    disclosures.

No IPR disclosures have been filed.


(9) How solid is the WG consensus behind this document? Does it
    represent the strong concurrence of a few individuals, with others
    being silent, or does the WG as a whole understand and agree with it?

There is a strong consensus behind this document and in particular from
very active WG participants (i.e. "DHCP experts").


(10) Has anyone threatened an appeal or otherwise indicated extreme
    discontent? If so, please summarise the areas of conflict in
    separate email messages to the Responsible Area Director. (It
    should be in a separate email because this questionnaire is
    publicly available.)

No.


(11) Identify any ID nits the Document Shepherd has found in this
    document. (See http://www.ietf.org/tools/idnits/ and the
    Internet-Drafts Checklist). Boilerplate checks are not enough;
    this check needs to be thorough.

There are none.


(12) Describe how the document meets any required formal review
    criteria, such as the MIB Doctor, media type, and URI type
    reviews.

N/A


(13) Have all references within this document been identified as
    either normative or informative?

Yes (there are 13 normative references; and 1 informative).


(14) Are there normative references to documents that are not ready
    for advancement or are otherwise in an unclear state? If such
    normative references exist, what is the plan for their
    completion?

No.


(15) Are there downward normative references references (see RFC
    3967
)? If so, list these downward references to support the Area
    Director in the Last Call procedure.

No.


(16) Will publication of this document change the status of any
    existing RFCs? Are those RFCs listed on the title page header,
    listed in the abstract, and discussed in the introduction? If the
    RFCs are not listed in the Abstract and Introduction, explain
    why, and point to the part of the document where the relationship
    of this document to the other RFCs is discussed. If this
    information is not in the document, explain why the WG considers
    it unnecessary.

No.


(17) Describe the Document Shepherd's review of the IANA
    considerations section, especially with regard to its consistency
    with the body of the document. Confirm that all protocol
    extensions that the document makes are associated with the
    appropriate reservations in IANA registries. Confirm that any
    referenced IANA registries have been clearly identified. Confirm
    that newly created IANA registries include a detailed
    specification of the initial contents for the registry, that
    allocations procedures for future registrations are defined, and
    a reasonable name for the new registry has been suggested (see
    RFC 5226).

There are IANA actions and they are compatible with DHC WG IANA actions
and add new messages, options, and error status codes to the DHCPv6
registries.


(18) List any new IANA registries that require Expert Review for
    future allocations. Provide any public guidance that the IESG
    would find useful in selecting the IANA Experts for these new
    registries.

There are no new registries.


(19) Describe reviews and automated checks performed by the Document
    Shepherd to validate sections of the document written in a formal
    language, such as XML code, BNF rules, MIB definitions, etc.

There are no such parts to the document.
2016-11-01
03 Bernie Volz Responsible AD changed to Suresh Krishnan
2016-11-01
03 Bernie Volz IETF WG state changed to Submitted to IESG for Publication from Waiting for WG Chair Go-Ahead
2016-11-01
03 Bernie Volz IESG state changed to Publication Requested
2016-11-01
03 Bernie Volz IESG process started in state Publication Requested
2016-11-01
03 Bernie Volz Tag Revised I-D Needed - Issue raised by WGLC cleared.
2016-11-01
03 Bernie Volz Changed consensus to Yes from Unknown
2016-11-01
03 Bernie Volz Changed document writeup
2016-11-01
03 Bernie Volz Changed document writeup
2016-10-13
03 Kim Kinnear New version available: draft-ietf-dhc-dhcpv6-failover-protocol-03.txt
2016-10-13
03 (System) New version approved
2016-10-13
02 (System) Request for posting confirmation emailed to previous authors: dhc-chairs@ietf.org, "Kim Kinnear" , "Tomek Mrugalski"
2016-10-13
02 Kim Kinnear Uploaded new revision
2016-09-21
02 Bernie Volz
Hi:

I believe we have sufficient rough consensus to move this document forward given the two WGLCs done for this document, the thorough reviews done …
Hi:

I believe we have sufficient rough consensus to move this document forward given the two WGLCs done for this document, the thorough reviews done before the WGLCs, the fact that this builds on the DHCPv4 failover work (which never did get to RFC), and the fact that it has essentially been implemented and is operating in the field.

An update will be needed to address the minor comments raised during this WGLC by Naiming, Tianxiang, and Marcin. Once updated (and changes confirmed), I can finish the shepherd document and request publication.

We did extend the WGLC by about a week, but no new reviews were received. If you do have additional comments, please provide them ASAP so that they can be resolved before sending the document onward.

- Bernie
2016-09-21
02 Bernie Volz Tag Revised I-D Needed - Issue raised by WGLC set.
2016-09-21
02 Bernie Volz IETF WG state changed to Waiting for WG Chair Go-Ahead from In WG Last Call
2016-09-07
02 Bernie Volz
Hi all,

This message starts the DHC Working Group Last Call to advance draft-ietf-dhc-dhcpv6-failover-protocol-02, DHCPv6 Failover Protocol. This document’s intended status is Proposed Standard. …
Hi all,

This message starts the DHC Working Group Last Call to advance draft-ietf-dhc-dhcpv6-failover-protocol-02, DHCPv6 Failover Protocol. This document’s intended status is Proposed Standard. At present, there is no IPR file against this document.

Please send your comments by September 12, 2016. If you do not feel this  document should advance, please state your reasons why.

Note: We are trying another WGLC based on the discussion regarding this document led by Tomek at the Berlin (IETF-96) meeting and the feedback from those in attendance (see https://www.ietf.org/proceedings/96/minutes/minutes-96-dhc).

Bernie Volz is the assigned shepherd (Tomek is a co-author).

- Tomek & Bernie

PS: I decided to make this a 3 week WGLC because some may still be on summer holiday and because of Labor Day (September 5) in the United States. And, some may be need a break from reviewing draft-ietf-dhc-rfc3315bis-05 for the just ending WGLC (August 22nd).
2016-09-07
02 Bernie Volz IETF WG state changed to In WG Last Call from WG Document
2016-07-11
02 Tomek Mrugalski WGLC has failed due to lack of sufficient support. Will discuss next steps in Berlin.
2016-07-11
02 Tomek Mrugalski IETF WG state changed to WG Document from In WG Last Call
2016-07-01
02 Kim Kinnear New version available: draft-ietf-dhc-dhcpv6-failover-protocol-02.txt
2016-06-28
01 Bernie Volz Added to session: IETF-96: dhc  Wed-1000
2016-05-04
01 Bernie Volz IETF WG state changed to In WG Last Call from WG Document
2016-04-28
01 Bernie Volz Notification list changed to "Bernie Volz" <volz@cisco.com>
2016-04-28
01 Bernie Volz Document shepherd changed to Bernie Volz
2016-03-14
01 Bernie Volz Added to session: IETF-95: dhc  Thu-1400
2015-12-24
01 Kim Kinnear New version available: draft-ietf-dhc-dhcpv6-failover-protocol-01.txt
2015-10-19
00 Bernie Volz Intended Status changed to Proposed Standard from None
2015-10-19
00 Bernie Volz
The protocol draft is replacing the design as there is little that would be left in the design document that is not already addressed in …
The protocol draft is replacing the design as there is little that would be left in the design document that is not already addressed in the protocol document.
2015-10-19
00 Bernie Volz This document now replaces draft-ietf-dhc-dhcpv6-failover-design instead of None
2015-10-19
00 Kim Kinnear New version available: draft-ietf-dhc-dhcpv6-failover-protocol-00.txt