Skip to main content

DHCPv6 Failover Requirements
draft-ietf-dhc-dhcpv6-failover-requirements-07

Revision differences

Document history

Date Rev. By Action
2013-09-25
07 (System) RFC Editor state changed to AUTH48-DONE from AUTH48
2013-09-16
07 (System) RFC Editor state changed to AUTH48 from RFC-EDITOR
2013-09-11
07 Elwyn Davies Request for Last Call review by GENART Completed: Ready. Reviewer: Elwyn Davies.
2013-09-04
07 (System) RFC Editor state changed to RFC-EDITOR from EDIT
2013-08-19
07 (System) IANA Action state changed to No IC from In Progress
2013-08-19
07 (System) IANA Action state changed to No IC from In Progress
2013-08-19
07 (System) IANA Action state changed to In Progress
2013-08-19
07 Amy Vezza State changed to RFC Ed Queue from Approved-announcement sent
2013-08-19
07 (System) RFC Editor state changed to EDIT
2013-08-19
07 (System) Announcement was received by RFC Editor
2013-08-19
07 Amy Vezza State changed to Approved-announcement sent from Approved-announcement to be sent
2013-08-19
07 Amy Vezza IESG has approved the document
2013-08-19
07 Amy Vezza Closed "Approve" ballot
2013-08-19
07 Amy Vezza Ballot approval text was generated
2013-07-19
07 Ted Lemon State changed to Approved-announcement to be sent from IESG Evaluation::AD Followup
2013-07-19
07 Stephen Farrell [Ballot comment]

Thanks for handling my discuss points.

S.
2013-07-19
07 Stephen Farrell [Ballot Position Update] Position for Stephen Farrell has been changed to No Objection from Discuss
2013-07-19
07 (System) Sub state has been changed to AD Followup from Revised ID Needed
2013-07-19
07 Maddy Conner New version available: draft-ietf-dhc-dhcpv6-failover-requirements-07.txt
2013-07-18
06 Tero Kivinen Request for Last Call review by SECDIR Completed: Has Issues. Reviewer: Scott Kelly.
2013-07-18
06 Cindy Morgan State changed to IESG Evaluation::Revised I-D Needed from IESG Evaluation
2013-07-18
06 Benoît Claise
[Ballot comment]
My DISCUSS was:
This DISCUSS resolution might be a simple as educating a clueless AD, having a forward pointer (from the intro to …
[Ballot comment]
My DISCUSS was:
This DISCUSS resolution might be a simple as educating a clueless AD, having a forward pointer (from the intro to section 6), reorganizing the sections, or clearly explaining what is specific to DHCPv6 versus common to DHCPv4/DHCPv6.
"Why are these requirementis specific to DHCPv6?" I asked myself while reading this document.
All of section 3, 4, and 5 (except maybe 4.5 and 4.6) is common for IPv4 and IPv6, right?
It's only when I arrived at section 6 that I somehow understood. I should have paid more attention to the table of content. Proposal: the introduction could introduce a sentence or two, with a forward reference to section 6.
However, I was wondering "There is surely a RFC for DHCPv4 failover!", but I could not find anything, except an old draft http://tools.ietf.org/html/draft-ietf-dhc-failover-12.
Slightly confused, should be missing something ...

I cleared my DISCUSS on the basis that the following text is in.

      The DHCPv6 failover concept borrows heavily from its DHCPv4
      counterpart [dhcpv4-failover] that never completed standardization
      process, but has several successful, operationally proven vendor-
      specific implementations. For a discussion about commonalities and
      differences, see Section 6.

What would be very nice (more of a COMMENT type of feedback) is to label which sections/requirements are specific to IPv6.

- Question: have you been thinking about all operational questions/requirements from RFC 5706 appendix A?

-
      A binding (or client binding) is a group of server data records
      containing the information the server has about the addresses in
      an IA or configuration information explicitly assigned to the
      client.

What is "an IA"?

-  "A notable example is a PXE scenario where hosts require an address during boot."
No idea what a PXE scenario is

- in order to match the statement

2.  For each prefix or address pool, a server must not participate
        in more than one failover relationship.

I believe you want
OLD:
  4.  Servers participating in multiple failover relationships for any
      given pool.

NEW:
  4.  Servers participating in multiple failover relationships for any
      given prefix or address pool.
2013-07-18
06 Benoît Claise [Ballot Position Update] Position for Benoit Claise has been changed to No Objection from Discuss
2013-07-18
06 Jari Arkko [Ballot Position Update] Position for Jari Arkko has been changed to No Objection from Discuss
2013-07-18
06 Stephen Farrell
[Ballot discuss]

(1) Section 8 says that security is only required to be
specified. Why would BCP61 not apply here? That would
require that a …
[Ballot discuss]

(1) Section 8 says that security is only required to be
specified. Why would BCP61 not apply here? That would
require that a security solution is implemented but can
still be turned off in a deployment.

(2) 4.6: I hate the example at the end which seems to
represent an abuse of DHCP and not a valid use for DHCP.
I don't think we should be designing for that requirement
at all. Please remove that example or replace it with
something that's not an abuse of IETF protocols. I
realise people might do these kinds of things, but we
should not be designing protocols that are designed to
make e2e hard.
2013-07-18
06 Stephen Farrell
[Ballot comment]

- s2: expand IA on 1st use

- s3: I have no idea why a set of documents of increasing
specificity is considered …
[Ballot comment]

- s2: expand IA on 1st use

- s3: I have no idea why a set of documents of increasing
specificity is considered a good thing. In particular I
don't see why a design document is needed myself but
whatever.

- 3.1.1: what's PXE?

- 3.1.3: wouldn't one also care about security here as
well? I think just saying that is enough here.

- 4.4: nit: m-to-m would be better as m-to-n IMO

- 4.7: Is this meant to motivate a requirement? If so,
then why not state the requirement? Or this might be
intended to rule that scenario out of scope, in which
case you should also say so.

- s7, what does "secure" mean? integrity,
confidentiality, non-replay? I'd suggest you might want
roughly the same services as are offered by TLS or IPsec.
2013-07-18
06 Stephen Farrell [Ballot Position Update] New position, Discuss, has been recorded for Stephen Farrell
2013-07-18
06 Gonzalo Camarillo [Ballot Position Update] New position, No Objection, has been recorded for Gonzalo Camarillo
2013-07-17
06 Adrian Farrel [Ballot Position Update] New position, No Objection, has been recorded for Adrian Farrel
2013-07-17
06 Benoît Claise
[Ballot discuss]
This DISCUSS resolution might be a simple as educating a clueless AD, having a forward pointer (from the intro to section 6), reorganizing …
[Ballot discuss]
This DISCUSS resolution might be a simple as educating a clueless AD, having a forward pointer (from the intro to section 6), reorganizing the sections, or clearly explaining what is specific to DHCPv6 versus common to DHCPv4/DHCPv6.
"Why are these requirementis specific to DHCPv6?" I asked myself while reading this document.
All of section 3, 4, and 5 (except maybe 4.5 and 4.6) is common for IPv4 and IPv6, right?
It's only when I arrived at section 6 that I somehow understood. I should have paid more attention to the table of content. Proposal: the introduction could introduce a sentence or two, with a forward reference to section 6.
However, I was wondering "There is surely a RFC for DHCPv4 failover!", but I could not find anything, except an old draft http://tools.ietf.org/html/draft-ietf-dhc-failover-12.

Slightly confused, should be missing something ...
2013-07-17
06 Benoît Claise
[Ballot comment]
- Question: have you been thinking about all operational questions/requirements from RFC 5706 appendix A?

-

      A binding (or client …
[Ballot comment]
- Question: have you been thinking about all operational questions/requirements from RFC 5706 appendix A?

-

      A binding (or client binding) is a group of server data records
      containing the information the server has about the addresses in
      an IA or configuration information explicitly assigned to the
      client.

What is "an IA"?

-  "A notable example is a PXE scenario where hosts require an address during boot."
No idea what a PXE scenario is

- in order to match the statement

2.  For each prefix or address pool, a server must not participate
        in more than one failover relationship.

I believe you want
OLD:
  4.  Servers participating in multiple failover relationships for any
      given pool.

NEW:
  4.  Servers participating in multiple failover relationships for any
      given prefix or address pool.
2013-07-17
06 Benoît Claise [Ballot Position Update] New position, Discuss, has been recorded for Benoit Claise
2013-07-17
06 Pete Resnick [Ballot Position Update] New position, No Objection, has been recorded for Pete Resnick
2013-07-17
06 Richard Barnes [Ballot Position Update] New position, No Objection, has been recorded for Richard Barnes
2013-07-17
06 Brian Haberman
[Ballot comment]
I have no issues with the publication of this document.  I do have some comments that I think will make it stronger.

1. …
[Ballot comment]
I have no issues with the publication of this document.  I do have some comments that I think will make it stronger.

1. There are instances of acronyms without expansion on the first use (e.g., PXE).

2. The models described in sections 4.1 & 4.2 talk about two servers remaining in contact with one another.  I assume this is through messages outside of DHCP.  If that is the case, it may be worthwhile to explicitly state that.

3. For completeness, are there scenarios that would involve cold (or warm) standby servers?

4. The discussion in 5.2.2 misses a key point.  Lazy updates paired with Split Prefixes can be very efficient since there is little risk in overlapping assignments.

5. I find the wording in section 7, a little distressing.  This document is just "an attempt to define requirements"?

6. Requirement 1 in section 7 is confusing for several reasons.  The first sentence makes it sound like a DHCP server can have 2 failover partners.  The next sentence says that a particular resource is protected by a pair-wise relationship between two servers.  I don't understand the rationale for limiting the number of failover partners in a requirements statement.  Additionally, this requirement is confusing given that section 4.4. talked about having m-to-m failover relationships.

7. It is unclear why section 7.1 is in this document.  The requirements in section 7 describe the *minimum* set of functionality that has to be in the protocol.  Why rule out other functionality?
2013-07-17
06 Brian Haberman [Ballot Position Update] New position, No Objection, has been recorded for Brian Haberman
2013-07-17
06 Ted Lemon State changed to IESG Evaluation from Waiting for AD Go-Ahead
2013-07-17
06 Barry Leiba [Ballot Position Update] New position, No Objection, has been recorded for Barry Leiba
2013-07-17
06 (System) State changed to Waiting for AD Go-Ahead from In Last Call
2013-07-16
06 Joel Jaeggli [Ballot Position Update] New position, No Objection, has been recorded for Joel Jaeggli
2013-07-16
06 Stewart Bryant [Ballot Position Update] New position, No Objection, has been recorded for Stewart Bryant
2013-07-16
06 Martin Stiemerling [Ballot Position Update] New position, No Objection, has been recorded for Martin Stiemerling
2013-07-16
06 Jari Arkko [Ballot discuss]
I would like to ensure that the authors have seen Elwyn's review. Have you?
2013-07-16
06 Jari Arkko [Ballot Position Update] New position, Discuss, has been recorded for Jari Arkko
2013-07-15
06 Spencer Dawkins [Ballot Position Update] New position, No Objection, has been recorded for Spencer Dawkins
2013-07-15
06 Ted Lemon Ballot has been issued
2013-07-15
06 Ted Lemon [Ballot Position Update] New position, Yes, has been recorded for Ted Lemon
2013-07-15
06 Ted Lemon Created "Approve" ballot
2013-07-15
06 Ted Lemon Ballot writeup was changed
2013-07-14
06 Ted Lemon Placed on agenda for telechat - 2013-07-18
2013-07-12
06 (System) IANA Review state changed to IANA OK - No Actions Needed from IANA - Review Needed
2013-07-12
06 (System) IANA Review state changed to IANA OK - No Actions Needed from IANA - Review Needed
2013-07-12
06 Amanda Baber
IESG/Authors/WG Chairs:

IANA has reviewed draft-ietf-dhc-dhcpv6-failover-requirements-06, which is currently in Last Call, and has the following comments:

We understand that this document doesn't require …
IESG/Authors/WG Chairs:

IANA has reviewed draft-ietf-dhc-dhcpv6-failover-requirements-06, which is currently in Last Call, and has the following comments:

We understand that this document doesn't require any IANA actions.

If this assessment is not accurate, please respond as soon as possible.
2013-07-05
06 Peter Yee Request for Last Call review by GENART is assigned to Elwyn Davies
2013-07-05
06 Peter Yee Request for Last Call review by GENART is assigned to Elwyn Davies
2013-07-05
06 Peter Yee Closed request for Last Call review by GENART with state 'Withdrawn'
2013-07-05
06 Peter Yee Request for Last Call review by GENART is assigned to Martin Thomson
2013-07-05
06 Peter Yee Request for Last Call review by GENART is assigned to Martin Thomson
2013-07-05
06 Peter Yee Closed request for Last Call review by GENART with state 'Withdrawn'
2013-07-05
06 Peter Yee Request for Last Call review by GENART is assigned to Alexey Melnikov
2013-07-05
06 Peter Yee Request for Last Call review by GENART is assigned to Alexey Melnikov
2013-07-05
06 Tero Kivinen Request for Last Call review by SECDIR is assigned to Scott Kelly
2013-07-05
06 Tero Kivinen Request for Last Call review by SECDIR is assigned to Scott Kelly
2013-07-03
06 Amy Vezza IANA Review state changed to IANA - Review Needed
2013-07-03
06 Amy Vezza
The following Last Call announcement was sent out:

From: The IESG
To: IETF-Announce
CC:
Reply-To: ietf@ietf.org
Sender:
Subject: Last Call:  (DHCPv6 Failover Requirements) to Informational …
The following Last Call announcement was sent out:

From: The IESG
To: IETF-Announce
CC:
Reply-To: ietf@ietf.org
Sender:
Subject: Last Call:  (DHCPv6 Failover Requirements) to Informational RFC


The IESG has received a request from the Dynamic Host Configuration WG
(dhc) to consider the following document:
- 'DHCPv6 Failover Requirements'
  as Informational
RFC

The IESG plans to make a decision in the next few weeks, and solicits
final comments on this action. Please send substantive comments to the
ietf@ietf.org mailing lists by 2013-07-17. Exceptionally, comments may be
sent to iesg@ietf.org instead. In either case, please retain the
beginning of the Subject line to allow automated sorting.

Abstract


  The DHCPv6 protocol, defined in [RFC3315] allows for multiple servers
  to operate on a single network, however it does not define any way
  the servers could share information about currently active clients
  and their leases.  Some sites are interested in running multiple
  servers in such a way as to provide increased availability in case of
  server failure.  In order for this to work reliably, the cooperating
  primary and secondary servers must maintain a consistent database of
  the lease information.  [RFC3315] allows for but does not define any
  redundancy or failover mechanisms.  This document outlines
  requirements for DHCPv6 failover, enumerates related problems, and
  discusses the proposed scope of work to be conducted.  This document
  does not define a DHCPv6 failover protocol.




The file can be obtained via
http://datatracker.ietf.org/doc/draft-ietf-dhc-dhcpv6-failover-requirements/

IESG discussion can be tracked via
http://datatracker.ietf.org/doc/draft-ietf-dhc-dhcpv6-failover-requirements/ballot/


No IPR declarations have been submitted directly on this I-D.


2013-07-03
06 Amy Vezza State changed to In Last Call from Last Call Requested
2013-07-03
06 Ted Lemon Last call was requested
2013-07-03
06 Ted Lemon Okay, this time for sure.
2013-07-03
06 Ted Lemon State changed to Last Call Requested from AD Evaluation
2013-07-03
06 Ted Lemon I'm pulling this temporarily out of last call requested because the authors want to make one more update... :}
2013-07-03
06 Ted Lemon State changed to AD Evaluation from Last Call Requested
2013-07-03
06 Ted Lemon Last call was requested
2013-07-03
06 Ted Lemon Last call announcement was generated
2013-07-03
06 Ted Lemon Ballot approval text was generated
2013-07-03
06 Ted Lemon Ballot writeup was generated
2013-07-03
06 Ted Lemon State changed to Last Call Requested from AD Evaluation::External Party
2013-07-03
06 Ted Lemon Changed consensus to Yes from Unknown
2013-07-03
06 Tomek Mrugalski New version available: draft-ietf-dhc-dhcpv6-failover-requirements-06.txt
2013-06-30
05 Ted Lemon Review complete; awaiting response to review comments from authors.
2013-06-30
05 Ted Lemon State changed to AD Evaluation::External Party from Publication Requested
2013-06-10
05 Cindy Morgan
Write up for draft-ietf-dhcpv6-failover-requirements:

(1) What type of RFC is being requested (BCP, Proposed Standard,
    Internet Standard, Informational, Experimental, or Historic)? Why
  …
Write up for draft-ietf-dhcpv6-failover-requirements:

(1) What type of RFC is being requested (BCP, Proposed Standard,
    Internet Standard, Informational, Experimental, or Historic)? Why
    is this the proper type of RFC? Is this type of RFC indicated in
    the title page header?

Informational. This is the proper type because this document specifies
requirements for a failover protocol for DHCPv6. It does not define the
protocol itself. This is indicated in the header (Intended status).

(2) The IESG approval announcement includes a Document Announcement
    Write-Up. Please provide such a Document Announcement
    Write-Up. Recent examples can be found in the "Action"
    announcements for approved documents. The approval announcement
    contains the following sections:

Technical Summary:

This document outlines the requirements for DHCPv6 failover, enumerates
related problems, and discusses the proposed scope of work to be
conducted. This document does not define a DHCPv6 failover protocol.

Working Group Summary:

The need for a DHCPv6 failover protocol had been discussed by the WG
ever since RFC 3315 was published. After some discussion on how to
approach this work given the lack of progress for the DHCPv4 draft
(draft-ietf-dhc-failover), work was begun in June 2011 on the first
of a possible series of documents. And adopted by the WG in October
2011. The document has good support from key individuals (those that
worked on or implemented the DHCPv4 failover draft), but does lack
broad support - though no one raised any objection to the work.

Document Quality:

The document builds on earlier DHCPv4 work (draft-ietf-dhc-failover).
The document has had a thorough review by a small number of very
interested and knowledgable folks (mentioned in the acknowledgements
section). There were no significant points of difficulty or
controversy, primarily as this work builds on earlier DHCPv4 work.

Personnel:

Bernie Volz is the document shepherd. Ted Lemon is the responsible AD.

(3) Briefly describe the review of this document that was performed by
    the Document Shepherd. If this version of the document is not
    ready for publication, please explain why the document is being
    forwarded to the IESG.

I read the document thoroughly, and submitted quite a few editorial
suggestions to the authors, which they implemented.  The differences
between the -03 and -05 versions of the document reflect this review.


(4) Does the document Shepherd have any concerns about the depth or
    breadth of the reviews that have been performed?

No, the document has had a good deal of careful review.

(5) Do portions of the document need review from a particular or from
    broader perspective, e.g., security, operational complexity, AAA,
    DNS, DHCP, XML, or internationalization? If so, describe the
    review that took place.

This is strictly a DHCP document, and has had sufficient review from
DHCP experts.

(6) Describe any specific concerns or issues that the Document
    Shepherd has with this document that the Responsible Area Director
    and/or the IESG should be aware of? For example, perhaps he or she
    is uncomfortable with certain parts of the document, or has
    concerns whether there really is a need for it. In any event, if
    the WG has discussed those issues and has indicated that it still
    wishes to advance the document, detail those concerns here.

I think the document is good as written, and serves a useful purpose
and will be useful for future work on DHCPv6 failover.

(7) Has each author confirmed that any and all appropriate IPR
    disclosures required for full conformance with the provisions of
    BCP 78 and BCP 79 have already been filed. If not, explain why?

Yes, the authors did confirm that they are not aware of any IPR.

(8) Has an IPR disclosure been filed that references this document? If
    so, summarize any WG discussion and conclusion regarding the IPR
    disclosures.

No.

(9) How solid is the WG consensus behind this document? Does it
    represent the strong concurrence of a few individuals, with others
    being silent, or does the WG as a whole understand and agree with it?

There is a strong consensus behind this document and in particular from
very active WG participants (i.e. "DHCP experts").

(10) Has anyone threatened an appeal or otherwise indicated extreme
    discontent? If so, please summarise the areas of conflict in
    separate email messages to the Responsible Area Director. (It
    should be in a separate email because this questionnaire is
    publicly available.)

No, and nobody's indicated that they were against the WGLC or had
any issues with the document advancing.

(11) Identify any ID nits the Document Shepherd has found in this
    document. (See http://www.ietf.org/tools/idnits/ and the
    Internet-Drafts Checklist). Boilerplate checks are not enough;
    this check needs to be thorough.

The document passes idnits with no errors and review using the
checklist did not turn up any issues.

(12) Describe how the document meets any required formal review
    criteria, such as the MIB Doctor, media type, and URI type
    reviews.

The document contains nothing like this.

(13) Have all references within this document been identified as
    either normative or informative?

Yes.

(14) Are there normative references to documents that are not ready
    for advancement or are otherwise in an unclear state? If such
    normative references exist, what is the plan for their
    completion?

No, all the normative references are to RFCs.

(15) Are there downward normative references references (see RFC
    3967
)? If so, list these downward references to support the Area
    Director in the Last Call procedure.

No.

(16) Will publication of this document change the status of any
    existing RFCs? Are those RFCs listed on the title page header,
    listed in the abstract, and discussed in the introduction? If the
    RFCs are not listed in the Abstract and Introduction, explain
    why, and point to the part of the document where the relationship
    of this document to the other RFCs is discussed. If this
    information is not in the document, explain why the WG considers
    it unnecessary.

No.

(17) Describe the Document Shepherd's review of the IANA
    considerations section, especially with regard to its consistency
    with the body of the document. Confirm that all protocol
    extensions that the document makes are associated with the
    appropriate reservations in IANA registries. Confirm that any
    referenced IANA registries have been clearly identified. Confirm
    that newly created IANA registries include a detailed
    specification of the initial contents for the registry, that
    allocations procedures for future registrations are defined, and
    a reasonable name for the new registry has been suggested (see
    RFC 5226).

I reviewed the IANA Considerations section and it is fine and clear -
there are no IANA actions needed.

(18) List any new IANA registries that require Expert Review for
    future allocations. Provide any public guidance that the IESG
    would find useful in selecting the IANA Experts for these new
    registries.

None.

(19) Describe reviews and automated checks performed by the Document
    Shepherd to validate sections of the document written in a formal
    language, such as XML code, BNF rules, MIB definitions, etc.

There are no such parts to the document.
2013-06-10
05 Cindy Morgan Note added 'Bernie Volz (volz@cisco.com) is the document shepherd.'
2013-06-10
05 Cindy Morgan IESG process started in state Publication Requested
2013-06-10
05 (System) Earlier history may be found in the Comment Log for draft-mrugalski-dhc-dhcpv6-failover-requirements
2013-06-10
05 Bernie Volz IETF WG state changed to Submitted to IESG for Publication from WG Consensus: Waiting for Write-Up
2013-06-10
05 Bernie Volz Annotation tag Revised I-D Needed - Issue raised by WGLC cleared.
2013-06-10
05 Bernie Volz Changed document writeup
2013-06-10
05 Tomek Mrugalski New version available: draft-ietf-dhc-dhcpv6-failover-requirements-05.txt
2013-05-09
04 Tomek Mrugalski New version available: draft-ietf-dhc-dhcpv6-failover-requirements-04.txt
2013-04-15
03 Bernie Volz Annotation tag Revised I-D Needed - Issue raised by WGLC set.
2013-03-19
03 Bernie Volz Awaiting a revised version before submitting to the IESG.
2013-03-19
03 Tomek Mrugalski Changed shepherd to Bernie Volz
2013-03-13
03 Bernie Volz Intended Status changed to Informational from None
2013-03-13
03 Bernie Volz IETF WG state changed to WG Consensus: Waiting for Write-Up from WG Document
2013-03-11
03 Tomek Mrugalski New version available: draft-ietf-dhc-dhcpv6-failover-requirements-03.txt
2012-09-07
02 Tomek Mrugalski New version available: draft-ietf-dhc-dhcpv6-failover-requirements-02.txt
2012-07-04
01 Tomek Mrugalski New version available: draft-ietf-dhc-dhcpv6-failover-requirements-01.txt
2011-10-18
00 (System) New version available: draft-ietf-dhc-dhcpv6-failover-requirements-00.txt