RADIUS Option for the DHCPv6 Relay Agent
draft-ietf-dhc-dhcpv6-radius-opt-14
Revision differences
Document history
Date | Rev. | By | Action |
---|---|---|---|
2013-10-03
|
14 | (System) | RFC Editor state changed to AUTH48 from RFC-EDITOR |
2013-09-03
|
14 | (System) | IANA Action state changed to RFC-Ed-Ack from Waiting on RFC Editor |
2013-09-03
|
14 | (System) | IANA Action state changed to RFC-Ed-Ack from Waiting on RFC Editor |
2013-08-30
|
14 | (System) | RFC Editor state changed to RFC-EDITOR from IANA |
2013-08-30
|
14 | (System) | IANA Action state changed to Waiting on RFC Editor from In Progress |
2013-08-30
|
14 | (System) | IANA Action state changed to In Progress from Waiting on Authors |
2013-08-30
|
14 | (System) | RFC Editor state changed to IANA from EDIT |
2013-08-28
|
14 | (System) | IANA Action state changed to Waiting on Authors from In Progress |
2013-08-19
|
14 | (System) | IANA Action state changed to In Progress |
2013-08-19
|
14 | (System) | IANA Action state changed to In Progress |
2013-08-19
|
14 | Amy Vezza | State changed to RFC Ed Queue from Approved-announcement sent |
2013-08-19
|
14 | (System) | RFC Editor state changed to EDIT |
2013-08-19
|
14 | (System) | Announcement was received by RFC Editor |
2013-08-19
|
14 | Amy Vezza | State changed to Approved-announcement sent from Approved-announcement to be sent |
2013-08-19
|
14 | Amy Vezza | IESG has approved the document |
2013-08-19
|
14 | Amy Vezza | Closed "Approve" ballot |
2013-08-19
|
14 | Amy Vezza | Ballot approval text was generated |
2013-07-29
|
14 | Ted Lemon | The author has updated the document to address all comments and discusses, and the document shepherd has verified that this was done. The document is … The author has updated the document to address all comments and discusses, and the document shepherd has verified that this was done. The document is now ready for the publication process. |
2013-07-29
|
14 | Ted Lemon | State changed to Approved-announcement to be sent from IESG Evaluation::AD Followup |
2013-07-29
|
14 | Leaf Yeh | New version available: draft-ietf-dhc-dhcpv6-radius-opt-14.txt |
2013-07-19
|
13 | Sean Turner | [Ballot comment] Thanks for dealing with my discuss point. |
2013-07-19
|
13 | Sean Turner | [Ballot Position Update] Position for Sean Turner has been changed to No Objection from Discuss |
2013-07-10
|
13 | Stephen Farrell | [Ballot comment] Thanks for handling my discuss points. I didn't check if the comments below still applied so I'll leave them there just in case … [Ballot comment] Thanks for handling my discuss points. I didn't check if the comments below still applied so I'll leave them there just in case it helps someone sometime:-) --- old comments: abstract: this is very unclear to me, having read it the spec could be about three or four different things, but I'm none the wiser. It should say that this is for when the RADIUS client is the DHCP relay and wants to tell the DHCP server about RADIUS stuff. section 1: This bit needs a rewrite. "In that case the NAS directly responds the DHCPv6 messages as per the indication conveyed by the attributes in the Access-Accept message from the RADIUS server." |
2013-07-10
|
13 | Stephen Farrell | [Ballot Position Update] Position for Stephen Farrell has been changed to No Objection from Discuss |
2013-07-05
|
13 | Spencer Dawkins | [Ballot comment] Thank you for resolving my DISCUSS comments. |
2013-07-05
|
13 | Spencer Dawkins | [Ballot Position Update] Position for Spencer Dawkins has been changed to No Objection from Discuss |
2013-07-04
|
13 | (System) | Sub state has been changed to AD Followup from Revised ID Needed |
2013-07-04
|
13 | Leaf Yeh | IANA Review state changed to Version Changed - Review Needed from IANA OK - Actions Needed |
2013-07-04
|
13 | Leaf Yeh | New version available: draft-ietf-dhc-dhcpv6-radius-opt-13.txt |
2013-05-30
|
12 | Martin Thomson | Request for Last Call review by GENART Completed: Ready. Reviewer: Martin Thomson. |
2013-05-30
|
12 | Cindy Morgan | State changed to IESG Evaluation::Revised I-D Needed from IESG Evaluation |
2013-05-30
|
12 | Stephen Farrell | [Ballot discuss] (1) cleared (2) cleared (3) rfc3588-bis has text saying that if you ever send Diameter attributes in Diameter that require security (e.g. … [Ballot discuss] (1) cleared (2) cleared (3) rfc3588-bis has text saying that if you ever send Diameter attributes in Diameter that require security (e.g. keying material) over Diameter then you MUST run over IPSec, TLS or better. An analogous statement seems required here. The last para of section 8 needs to be stregthened to tell the IANA expert(s) not to mess about with that. (Or add equivalent text elsewhere.) |
2013-05-30
|
12 | Stephen Farrell | [Ballot comment] abstract: this is very unclear to me, having read it the spec could be about three or four different things, but I'm none … [Ballot comment] abstract: this is very unclear to me, having read it the spec could be about three or four different things, but I'm none the wiser. It should say that this is for when the RADIUS client is the DHCP relay and wants to tell the DHCP server about RADIUS stuff. section 1: This bit needs a rewrite. "In that case the NAS directly responds the DHCPv6 messages as per the indication conveyed by the attributes in the Access-Accept message from the RADIUS server." |
2013-05-30
|
12 | Stephen Farrell | Ballot comment and discuss text updated for Stephen Farrell |
2013-05-30
|
12 | Benoît Claise | [Ballot comment] I guess the answer is yes, but let me make sure... Does this mechanism support the RADIUS protocol extensions (RFC 6929)? … [Ballot comment] I guess the answer is yes, but let me make sure... Does this mechanism support the RADIUS protocol extensions (RFC 6929)? Regards, Benoit |
2013-05-30
|
12 | Benoît Claise | Ballot comment text updated for Benoit Claise |
2013-05-30
|
12 | Gonzalo Camarillo | [Ballot Position Update] New position, No Objection, has been recorded for Gonzalo Camarillo |
2013-05-30
|
12 | Sean Turner | [Ballot discuss] So this might be a little related to Stpehen's but I'm trying to figure out the authentication requirements here. The following in s8 … [Ballot discuss] So this might be a little related to Stpehen's but I'm trying to figure out the authentication requirements here. The following in s8 made me wonder whether we need to be explicit about what happens when the NAS isn't a trusted network component: However, in the network scenarios described in the section 3, NAS could always be regarded as a trusted network component in the real deployment. In other words, doesn't there need to be a statement that says the NAS and DHCP server MUST have a trust relationship to allow them to mutually authenticate? |
2013-05-30
|
12 | Sean Turner | [Ballot Position Update] New position, Discuss, has been recorded for Sean Turner |
2013-05-30
|
12 | Ted Lemon | State changed to IESG Evaluation from Waiting for AD Go-Ahead |
2013-05-30
|
12 | Stephen Farrell | [Ballot discuss] (1) This is a discuss-discuss: Why (other than because of wg charter) is this v6 specific or even RADIUS and not Diameter specific? … [Ballot discuss] (1) This is a discuss-discuss: Why (other than because of wg charter) is this v6 specific or even RADIUS and not Diameter specific? shouldn't something like this, if its needed, work just as well for v4 and v6 and for RADIUS and Diameter? Are we just making work for standards professionals by splitting the v4 and v6 and RADIUS/Diameter DHCP work this way? (This may be down to the charter, but I wanted to ask.) (2) 4.1: Why expert review if vendor specific is there too? Doesn't that mean that the expert(s) can just be bypassed if they ever say "no"? That type also seems not to be v6-specific and so is maybe out of charter? Also, such attributes might be sensitive and so unsuited for sending in DHCP (see discuss point 3 below). (3) rfc3588-bis has text saying that if you ever send Diameter attributes in Diameter that require security (e.g. keying material) over Diameter then you MUST run over IPSec, TLS or better. An analogous statement seems required here. The last para of section 8 needs to be stregthened to tell the IANA expert(s) not to mess about with that. (Or add equivalent text elsewhere.) |
2013-05-30
|
12 | Stephen Farrell | [Ballot comment] abstract: this is very unclear to me, having read it the spec could be about three or four different things, but I'm none … [Ballot comment] abstract: this is very unclear to me, having read it the spec could be about three or four different things, but I'm none the wiser. It should say that this is for when the RADIUS client is the DHCP relay and wants to tell the DHCP server about RADIUS stuff. section 1: This bit needs a rewrite. "In that case the NAS directly responds the DHCPv6 messages as per the indication conveyed by the attributes in the Access-Accept message from the RADIUS server." |
2013-05-30
|
12 | Stephen Farrell | [Ballot Position Update] New position, Discuss, has been recorded for Stephen Farrell |
2013-05-30
|
12 | Benoît Claise | [Ballot Position Update] New position, No Objection, has been recorded for Benoit Claise |
2013-05-30
|
12 | (System) | State changed to Waiting for AD Go-Ahead from In Last Call |
2013-05-29
|
12 | Jari Arkko | [Ballot comment] This is a useful document - thank you for writing it. I have one comment that is indeed a comment only, not a … [Ballot comment] This is a useful document - thank you for writing it. I have one comment that is indeed a comment only, not a blocking issue. It relates to how the attribute is designed. It is my belief additional interoperability could perhaps been achieved, if you had used the Diameter attribute format. This would have allowed carrying both RADIUS and Diameter attributes (see http://tools.ietf.org/html/rfc6733#section-4.1), at the cost of only a few bytes. (It is of course also possible to define a separate DHCP option for carrying Diameter attributes, perhaps in a separate document.) Did the authors or the working group consider this design choice, or work out what the implications would have been? Or are there existing specifications or other reasons (such as practices on the DHCPv4 side) that dictate the particular design chosen in the draft? |
2013-05-29
|
12 | Jari Arkko | [Ballot Position Update] New position, Yes, has been recorded for Jari Arkko |
2013-05-29
|
12 | Joel Jaeggli | [Ballot Position Update] New position, No Objection, has been recorded for Joel Jaeggli |
2013-05-29
|
12 | (System) | IANA Review state changed to IANA OK - Actions Needed from IANA - Review Needed |
2013-05-29
|
12 | Richard Barnes | [Ballot Position Update] New position, No Objection, has been recorded for Richard Barnes |
2013-05-29
|
12 | Brian Haberman | [Ballot comment] I support Spencer's DISCUSS points on the use of SHOULDs vs/ MUSTs. One way to clarify why SHOULDs are appropriate would be to … [Ballot comment] I support Spencer's DISCUSS points on the use of SHOULDs vs/ MUSTs. One way to clarify why SHOULDs are appropriate would be to add an example exception case where the options are not included. |
2013-05-29
|
12 | Brian Haberman | [Ballot Position Update] New position, No Objection, has been recorded for Brian Haberman |
2013-05-29
|
12 | Stewart Bryant | [Ballot Position Update] New position, No Objection, has been recorded for Stewart Bryant |
2013-05-28
|
12 | Pete Resnick | [Ballot Position Update] New position, No Objection, has been recorded for Pete Resnick |
2013-05-28
|
12 | Spencer Dawkins | [Ballot discuss] This document was very well-done. I expect this DISCUSS and COMMENT will be easy to resolve, because I basically had a question about … [Ballot discuss] This document was very well-done. I expect this DISCUSS and COMMENT will be easy to resolve, because I basically had a question about every SHOULD (NOT) in the document, so maybe I just need help understanding. That wasn't intentional, it just worked out that way :-) In 3. Network Scenarios After receiving RENEW (5) message from the DHCPv6 client, the NAS SHOULD NOT initiate a new Access-Request/Access-Accept message exchange with the RADIUS server; but after receiving REBIND (6) message from the DHCPv6 client, the NAS SHOULD initiate a new Access- Request/Access-Accept message exchange with the RADIUS server. could you help me understand why these are SHOULD NOT/SHOULD, and especially why the second SHOULD is not a MUST? Is there an alternative scenario that can also result in a user being allowed access? In 4. DHCPv6 RADIUS option According to the network scenarios described in section 3, the OPTION_RADIUS SHOULD appear in the RELAY-FORW (12) message relaying SOLICIT (1), REQUEST (3) and REBIND (6) from the DHCPv6 client, and MAY appear in the RELAY-FORW (12) relaying any other message from the DHCPv6 client. I'm not sure I understand why this is a SHOULD, and not a MUST. If I was trying to explain this without 2119 language, I'd say "the OPTION_RADIUS will probably be in RELAY-FORW relaying some kinds of messages, but it might not be, and it might be in RELAY-FORW relaying any other message". Is that a fair summary? If so, is it also correct to say that it might not be present at all? (and, if not, what's supposed to happen next?) |
2013-05-28
|
12 | Spencer Dawkins | [Ballot comment] In 5. DHCPv6 Relay Agent Behavior The DHCPv6 relay agent MAY include OPTION_RADIUS in the RELAY-FORW (12) message. When the value … [Ballot comment] In 5. DHCPv6 Relay Agent Behavior The DHCPv6 relay agent MAY include OPTION_RADIUS in the RELAY-FORW (12) message. When the value in the attributes, for example, Delegated-IPv6-Prefix-Pool (171), Stateful-IPv6-Address-Pool (172), Delegated-IPv6-Prefix (123) or Framed-IPv6-Address (168) in the Access-Accept message replied from RADIUS server are valid, the relay agent that supports OPTION_RADIUS SHOULD include these RADIUS attributes into the OPTION_RADIUS one by one. is this SHOULD just saying relay agents that support OPTION_RADIUS ought to do something with OPTION_RADIUS? In 6. DHCPv6 Server Behavior Upon receipt of the RELAY-FORW (12) message with OPTION_RADIUS from a relay agent, the DHCPv6 server that supports OPTION_RADIUS SHOULD extract and interpret the RADIUS attributes in the OPTION_RADIUS, and use that information in selecting configuration parameters for the requesting client. If the DHCPv6 server does not support OPTION_RADIUS, the DHCPv6 server MUST silently discard this option. I have pretty much the same question, about DHCPv6 servers. |
2013-05-28
|
12 | Spencer Dawkins | [Ballot Position Update] New position, Discuss, has been recorded for Spencer Dawkins |
2013-05-28
|
12 | Adrian Farrel | [Ballot Position Update] New position, No Objection, has been recorded for Adrian Farrel |
2013-05-28
|
12 | Barry Leiba | [Ballot comment] To the document shepherd: I found the shepherd writeup for this document to be particularly good; thanks, Tomek, for being clear and thorough. |
2013-05-28
|
12 | Barry Leiba | [Ballot Position Update] New position, No Objection, has been recorded for Barry Leiba |
2013-05-28
|
12 | Martin Stiemerling | [Ballot Position Update] New position, No Objection, has been recorded for Martin Stiemerling |
2013-05-27
|
12 | Ted Lemon | Ballot has been issued |
2013-05-27
|
12 | Ted Lemon | [Ballot Position Update] New position, Yes, has been recorded for Ted Lemon |
2013-05-27
|
12 | Ted Lemon | Created "Approve" ballot |
2013-05-27
|
12 | Ted Lemon | Ballot writeup was changed |
2013-05-23
|
12 | Jean Mahoney | Request for Last Call review by GENART is assigned to Martin Thomson |
2013-05-23
|
12 | Jean Mahoney | Request for Last Call review by GENART is assigned to Martin Thomson |
2013-05-23
|
12 | Tero Kivinen | Request for Last Call review by SECDIR Completed: Has Issues. Reviewer: Tero Kivinen. |
2013-05-20
|
12 | Leaf Yeh | New version available: draft-ietf-dhc-dhcpv6-radius-opt-12.txt |
2013-05-16
|
11 | Jean Mahoney | Request for Last Call review by GENART is assigned to Martin Thomson |
2013-05-16
|
11 | Jean Mahoney | Request for Last Call review by GENART is assigned to Martin Thomson |
2013-05-16
|
11 | Tero Kivinen | Request for Last Call review by SECDIR is assigned to Tero Kivinen |
2013-05-16
|
11 | Tero Kivinen | Request for Last Call review by SECDIR is assigned to Tero Kivinen |
2013-05-16
|
11 | Ted Lemon | Placed on agenda for telechat - 2013-05-30 |
2013-05-16
|
11 | Cindy Morgan | IANA Review state changed to IANA - Review Needed |
2013-05-16
|
11 | Cindy Morgan | The following Last Call announcement was sent out: From: The IESG To: IETF-Announce CC: Reply-To: ietf@ietf.org Sender: Subject: Last Call: (RADIUS Option for DHCPv6 Relay … The following Last Call announcement was sent out: From: The IESG To: IETF-Announce CC: Reply-To: ietf@ietf.org Sender: Subject: Last Call: (RADIUS Option for DHCPv6 Relay Agent) to Proposed Standard The IESG has received a request from the Dynamic Host Configuration WG (dhc) to consider the following document: - 'RADIUS Option for DHCPv6 Relay Agent' as Proposed Standard The IESG plans to make a decision in the next few weeks, and solicits final comments on this action. Please send substantive comments to the ietf@ietf.org mailing lists by 2013-05-30. Exceptionally, comments may be sent to iesg@ietf.org instead. In either case, please retain the beginning of the Subject line to allow automated sorting. Abstract The DHCPv6 RADIUS option provides a mechanism to exchange authorization and identification information between the DHCPv6 relay agent and the DHCPv6 server. This mechanism is meant for the centralized DHCPv6 server to select the right configuration for the requesting DHCPv6 client based on the authorization information received from the RADIUS server, which is not co-located with the DHCPv6 server. The Network Access Server (NAS) acts as DHCPv6 relay agent and RADIUS client simultaneously in this document. The file can be obtained via http://datatracker.ietf.org/doc/draft-ietf-dhc-dhcpv6-radius-opt/ IESG discussion can be tracked via http://datatracker.ietf.org/doc/draft-ietf-dhc-dhcpv6-radius-opt/ballot/ The following IPR Declarations may be related to this I-D: http://datatracker.ietf.org/ipr/2052/ |
2013-05-16
|
11 | Cindy Morgan | State changed to In Last Call from Last Call Requested |
2013-05-16
|
11 | Ted Lemon | Last call was requested |
2013-05-16
|
11 | Ted Lemon | Last call announcement was generated |
2013-05-16
|
11 | Ted Lemon | Ballot approval text was generated |
2013-05-16
|
11 | Ted Lemon | Ballot writeup was generated |
2013-05-16
|
11 | Ted Lemon | State changed to Last Call Requested from Publication Requested |
2013-05-11
|
11 | Ted Lemon | State changed to Publication Requested from AD is watching |
2013-05-09
|
11 | Tomek Mrugalski | Changed document writeup |
2013-04-19
|
11 | Ted Lemon | State changed to AD is watching from Publication Requested |
2013-04-12
|
11 | Leaf Yeh | New version available: draft-ietf-dhc-dhcpv6-radius-opt-11.txt |
2013-04-08
|
(System) | Posted related IPR disclosure: Huawei Technologies Co.,Ltd's Statement about IPR related to draft-ietf-dhc-dhcpv6-radius-opt-10 | |
2013-04-05
|
10 | Cindy Morgan | Document Writeup, template from IESG area on ietf.org, dated 24 February 2012. draft-ietf-dhc-dhcpv6-radius-opt-10 write-up (1) What type of RFC is being requested (BCP, Proposed … Document Writeup, template from IESG area on ietf.org, dated 24 February 2012. draft-ietf-dhc-dhcpv6-radius-opt-10 write-up (1) What type of RFC is being requested (BCP, Proposed Standard, Internet Standard, Informational, Experimental, or Historic)? Why is this the proper type of RFC? Is this type of RFC indicated in the title page header? Proposed standard. This document defines an extension to the DHCPv6 protocol (and defines new DHCPv6 option), which requires standards track. The intended type is indicated in the header. (2) The IESG approval announcement includes a Document Announcement Write-Up. Please provide such a Document Announcement Write-Up. Recent examples can be found in the "Action" announcements for approved documents. The approval announcement contains the following sections: Technical Summary: This document defines RADIUS DHCPv6 option that is similar to its DHCPv4 counter-part that was defined in RFC4014. The DHCPv6 RADIUS option provides a mechanism to exchange authorization and identification information between the DHCPv6 relay agent and the DHCPv6 server. This mechanism is meant for the centralized DHCPv6 server to select the right configuration for the requesting DHCPv6 client based on the authorization information received from the RADIUS server, which is not co-located with the DHCPv6 server. The Network Access Server (NAS) acts as DHCPv6 relay agent and RADIUS client simultaneously in this document. Working Group Summary: This document was called draft-yeh-dhc-dhcpv6-authorization-opt prior to its adoption. There was unanimous support for it (9 people in favor of adoption and none against), so this document was adopted in May 2012. There was quite high interest in this work - 55 posts since its adoption. There was never any opposition for this work. Document Quality: I'm not aware of any existing implementations, but the level of support from both DHCP vendors (Nominum, Weird Solutions, Cisco, ISC), hardware vendors (Huawei, Cisco) and operators (Orange, Telecom Italia) suggests that this will be implemented and deployed shortly after option code is assigned by IANA. There was no single lead reviewer and many people contributed to the draft (55 posts during its WG life). This document went through rapid updates (10 revisions 10 months), because its lead author - Leaf Yeh - was eager to address any comments as soon as they appeared. Personnel: Who is the Document Shepherd? Who is the Responsible Area Director? Tomek Mrugalski is the document shepherd. Ted Lemon is the responsible AD. (3) Briefly describe the review of this document that was performed by the Document Shepherd. If this version of the document is not ready for publication, please explain why the document is being forwarded to the IESG. I thoroughly reviewed this document twice (and have other minor comments in between): my -09 comments: http://www.ietf.org/mail-archive/web/dhcwg/current/msg13979.html my -05 comments: http://www.ietf.org/mail-archive/web/dhcwg/current/msg13529.html The issues raised in my last review were promptly addressed by authors in -10. This document is ready for publication in my opinion. (4) Does the document Shepherd have any concerns about the depth or breadth of the reviews that have been performed? Yes. This document is between area of expertise of 2 WGs: DHC and RADEXT. It was very well reviewed (detailed discussions and reviews with 55 posts total) in DHC. There was only one post about it in RADEXT wg. http://www.ietf.org/mail-archive/web/radext/current/msg07717.html RADEXT chairs were requested to ask for a review on RADEXT ML. (5) Do portions of the document need review from a particular or from broader perspective, e.g., security, operational complexity, AAA, DNS, DHCP, XML, or internationalization? If so, describe the review that took place. This document has had a great deal of careful DHCP review. It did not get enough RADIUS review. RADEXT chairs were requested to ask for a review on RADEXT ML. (6) Describe any specific concerns or issues that the Document Shepherd has with this document that the Responsible Area Director and/or the IESG should be aware of? For example, perhaps he or she is uncomfortable with certain parts of the document, or has concerns whether there really is a need for it. In any event, if the WG has discussed those issues and has indicated that it still wishes to advance the document, detail those concerns here. There are no outstanding issues from the DHCP perspective. (7) Has each author confirmed that any and all appropriate IPR disclosures required for full conformance with the provisions of BCP 78 and BCP 79 have already been filed. If not, explain why? Yes, the authors, Leaf Yeh and Mohamed Boucadair, did confirm in writing that they are not aware of any IPR. (8) Has an IPR disclosure been filed that references this document? If so, summarize any WG discussion and conclusion regarding the IPR disclosures. No. (9) How solid is the WG consensus behind this document? Does it represent the strong concurrence of a few individuals, with others being silent, or does the WG as a whole understand and agree with it? There was very broad support for adopting this document. It was later reviewed couple times by 6 active WG participants. All changes were mostly minor and did not change the basic mechanism (that was operationally proven to work in DHCPv4). (10) Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarise the areas of conflict in separate email messages to the Responsible Area Director. (It should be in a separate email because this questionnaire is publicly available.) No. There was unanimous support for this work and nobody raised any objections. (11) Identify any ID nits the Document Shepherd has found in this document. (See http://www.ietf.org/tools/idnits/ and the Internet-Drafts Checklist). Boilerplate checks are not enough; this check needs to be thorough. All outstanding issues were resolved in -10 version. This document is now ID nits clean. (12) Describe how the document meets any required formal review criteria, such as the MIB Doctor, media type, and URI type reviews. No MIB Doctor, media type, URI type or similar apply to this document. This document did not go through AAA Doctors review. If such a step is needed, please advise how can I request such a review. (13) Have all references within this document been identified as either normative or informative? Yes. (14) Are there normative references to documents that are not ready for advancement or are otherwise in an unclear state? If such normative references exist, what is the plan for their completion? I-D.ietf-radext-ipv6-access (RFC Ed queue, AUTH48) is a normative reference. All other normative references are to RFC documents. (15) Are there downward normative references references (see RFC 3967)? If so, list these downward references to support the Area Director in the Last Call procedure. No. (16) Will publication of this document change the status of any existing RFCs? Are those RFCs listed on the title page header, listed in the abstract, and discussed in the introduction? If the RFCs are not listed in the Abstract and Introduction, explain why, and point to the part of the document where the relationship of this document to the other RFCs is discussed. If this information is not in the document, explain why the WG considers it unnecessary. No. It was discussed with co-chair and responsible AD that this document extends, but do not update RFC3315 (DHCPv6). (17) Describe the Document Shepherd's review of the IANA considerations section, especially with regard to its consistency with the body of the document. Confirm that all protocol extensions that the document makes are associated with the appropriate reservations in IANA registries. Confirm that any referenced IANA registries have been clearly identified. Confirm that newly created IANA registries include a detailed specification of the initial contents for the registry, that allocations procedures for future registrations are defined, and a reasonable name for the new registry has been suggested (see RFC 5226). This document requests assignment of a new DHCPv6 option code. The IANA registry for this code is clearly identified. This document also requests creation of a new registry that will hold RADIUS attributes that are permitted in the RADIUS option. This will be a sub-set of existing RADIUS attibute types registry that is clearly identified (with a name and URL to IANA website). The initial content of the newly created registry is clearly listed in section 4.1. There is a clear pointer to section 4.1 in IANA considerations section. (18) List any new IANA registries that require Expert Review for future allocations. Provide any public guidance that the IESG would find useful in selecting the IANA Experts for these new registries. This document calls for creation of a 'RADIUS Attributes Permitted in the DHCPv6 RADIUS option' registry. Its name, location, process of adding new values is clearly defined. -09 version did not clearly mention initial content of the new registry in IANA considerations section. This was fixed in -10. (19) Describe reviews and automated checks performed by the Document Shepherd to validate sections of the document written in a formal language, such as XML code, BNF rules, MIB definitions, etc. There are no such parts to the document. |
2013-04-05
|
10 | Cindy Morgan | Note added 'Tomek Mrugalski (tomasz.mrugalski@gmail.com) is the document shepherd.' |
2013-04-05
|
10 | Cindy Morgan | IESG process started in state Publication Requested |
2013-04-05
|
10 | Bernie Volz | IETF WG state changed to Submitted to IESG for Publication from WG Consensus: Waiting for Write-Up |
2013-04-04
|
10 | Tomek Mrugalski | Changed protocol writeup |
2013-04-03
|
10 | Tomek Mrugalski | Changed protocol writeup |
2013-04-03
|
10 | Leaf Yeh | New version available: draft-ietf-dhc-dhcpv6-radius-opt-10.txt |
2013-03-19
|
09 | Tomek Mrugalski | Changed shepherd to Tomek Mrugalski |
2013-03-13
|
09 | Bernie Volz | Intended Status changed to Proposed Standard from None |
2013-03-11
|
09 | Bernie Volz | IETF WG state changed to WG Consensus: Waiting for Write-Up from WG Document |
2013-02-25
|
09 | Leaf Yeh | New version available: draft-ietf-dhc-dhcpv6-radius-opt-09.txt |
2013-02-03
|
08 | Leaf Yeh | New version available: draft-ietf-dhc-dhcpv6-radius-opt-08.txt |
2013-02-03
|
07 | Leaf Yeh | New version available: draft-ietf-dhc-dhcpv6-radius-opt-07.txt |
2013-01-04
|
06 | Leaf Yeh | New version available: draft-ietf-dhc-dhcpv6-radius-opt-06.txt |
2012-11-29
|
05 | Leaf Yeh | New version available: draft-ietf-dhc-dhcpv6-radius-opt-05.txt |
2012-11-04
|
04 | Leaf Yeh | New version available: draft-ietf-dhc-dhcpv6-radius-opt-04.txt |
2012-10-21
|
03 | Leaf Yeh | New version available: draft-ietf-dhc-dhcpv6-radius-opt-03.txt |
2012-10-14
|
02 | Leaf Yeh | New version available: draft-ietf-dhc-dhcpv6-radius-opt-02.txt |
2012-07-29
|
01 | Leaf Yeh | New version available: draft-ietf-dhc-dhcpv6-radius-opt-01.txt |
2012-05-06
|
00 | Leaf Yeh | New version available: draft-ietf-dhc-dhcpv6-radius-opt-00.txt |