Next steps on advancing core IPv6 specifications to full Internet standard

otroan@employees.org Tue, 15 November 2016 06:19 UTC

Return-Path: <otroan@employees.org>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 892931295C2; Mon, 14 Nov 2016 22:19:49 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.335
X-Spam-Level:
X-Spam-Status: No, score=-1.335 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, SPF_SOFTFAIL=0.665] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=employees.org; domainkeys=pass (1024-bit key) header.from=otroan@employees.org header.d=employees.org
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id XUnMnoaT-sF9; Mon, 14 Nov 2016 22:19:48 -0800 (PST)
Received: from inbound03.kjsl.com (inbound03.kjsl.com [IPv6:2001:1868:a100:131::62]) (using TLSv1.2 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 218351296A0; Mon, 14 Nov 2016 22:19:48 -0800 (PST)
Received: from cowbell.employees.org ([IPv6:2001:1868:a000:17::142]) by ironport03.kjsl.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 15 Nov 2016 06:19:48 +0000
Received: from cowbell.employees.org (localhost [127.0.0.1]) by cowbell.employees.org (Postfix) with ESMTP id C161E9CC4F; Mon, 14 Nov 2016 22:19:47 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha1; c=relaxed; d=employees.org; h=from :content-type:content-transfer-encoding:mime-version:subject :message-id:date:cc:to; s=selector1; bh=2t0/uQLQyI0F4bCYqeaSjgWZ S/o=; b=pXC5kWAxntbv+JnMqEAA4n4Iip/H6rgsrNoDXa4ObzQaA6JrhS/mSzL9 KCIPQFEgh99CrRkGRl1Mmo9YRU7WLiTI837W/xgkPUBLwWP+msjlkdu7CQ4WA5rQ hK7CGCOWkytcwa1O5IqTM4RUYExFkAvn/BAet9/o2I5XM2f5BwI=
DomainKey-Signature: a=rsa-sha1; c=nofws; d=employees.org; h=from :content-type:content-transfer-encoding:mime-version:subject :message-id:date:cc:to; q=dns; s=selector1; b=XtalZ1c0s7ouVTLYZG 4pwxWaDTsSma2SgiJBT+0+aa3M3kVkRoiuAuRxgRhsHuVkRcEtR5nE4Wq6zbaxWT 679QpfQOdAh6C3IJ4YRccJPtkxQ6Xo3YmwmMpuxTVKwFFSRSKYAYqijJ4FWg4X3n IjxJ/QB+T3BYP/DnJpy+qjiEY=
Received: from h.hanazo.no (dhcp-895e.meeting.ietf.org [31.133.137.94]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) (Authenticated sender: otroan) by cowbell.employees.org (Postfix) with ESMTPSA id 5C7999CC0F; Mon, 14 Nov 2016 22:19:47 -0800 (PST)
Received: from [IPv6:::1] (localhost [IPv6:::1]) by h.hanazo.no (Postfix) with ESMTP id D9E3F5E54EA0; Tue, 15 Nov 2016 15:19:45 +0900 (KST)
From: otroan@employees.org
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: quoted-printable
Mime-Version: 1.0 (Mac OS X Mail 10.1 \(3251\))
Subject: Next steps on advancing core IPv6 specifications to full Internet standard
Message-Id: <451D4151-B805-4A2E-8BAC-B6627C0B669C@employees.org>
Date: Tue, 15 Nov 2016 15:19:45 +0900
To: 6man WG <ipv6@ietf.org>
X-Mailer: Apple Mail (2.3251)
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/DBOb0JZfNXkdDKEaumIgxwlQDt4>
Cc: Suresh Krishnan <suresh.krishnan@ericsson.com>, 6man-chairs@ietf.org
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 15 Nov 2016 06:19:49 -0000

The 6MAN working group has been working on advancing the core IPv6
specifications to Internet Standard.  The next steps to achieve this
goal is described here.

We have now finished the edits on the RFC2460bis, RFC1981bis and
RFC4291bis documents. With the agreement in today's working group
session on the header insertion issue for 2460, the working group last
call is now complete.

The chairs have decided to declare consensus on the following text:
(that includes a small amendment proposed in the meeting).

   The insertion of Extension Headers by any node other than the
   source of the packet causes serious problems.  Two examples include
   breaking the integrity checks provided by the Authentication Header
   Integrity [RFC4302], and breaking Path MTU Discovery which can
   result in ICMP error messages being sent to the source of the
   packet that did not insert the header, rather than the node that
   inserted the header.

   One approach to avoid these problems is to encapsulate the packet
   using another IPv6 header and including the additional extension
   header after the first IPv6 header, for example, as defined in
   [RFC2473]

New revisions of RFC2460bis and RFC4291bis will be published shortly,
and the intention is to have the IESG writeup and the advancement done
by November 22th.

We will send the IESG the following letter to request reclassifying
RFC3596 and RFC4443 in-place as Internet Standards.

The goal is for all five of these documents to be Internet Standards.

Attached is the draft letter to the IESG.

Best regards,
Ole and Bob


------------------------


Dear IESG,

The 6MAN working group requests that the IESG initiate the process to
reclassify the following two draft standard RFCs as Internet Standard.

Following the requirements in RFC6410, section 2.2:

(1) There are at least two independent interoperating implementations
     with widespread deployment and successful operational experience.

(2) There are no errata against the specification that would cause a
    new implementation to fail to interoperate with deployed ones.

(3) There are no unused features in the specification that greatly
    increase implementation complexity.

(4) If the technology required to implement the specification
   requires patented or otherwise controlled technology, then the
   set of implementations must demonstrate at least two independent,
   separate and successful uses of the licensing process.


RFC4443 (https://datatracker.ietf.org/doc/rfc4443/)
  (1) Widely implemented:
      https://www.ipv6ready.org/db/index.php/public/?o=4
  (2) 4 errata, none of which would cause new interoperability
      problems.
      RFC4443 is updated by: RFC4884, but the consensus is that this update
      it’s not an update, it is an extension to the protocol.
  (3) There are no unused features.
  (4)  No known IPR.

RFC3595 (https://datatracker.ietf.org/doc/rfc3596/)
  (1) Widely implemented:
      https://www.ipv6ready.org/db/index.php/public/?o=4
  (2) No errata. No updated by.
  (3) There are no unused features.
  (4) No known IPR.


Bringing IPv6 draft standards to full standard has been worked on in
the 6MAN working group for some time. The documents for
reclassification have been reviewed in multiple face to face working
group sessions and on the mailing list, and there is a strong
consensus in the working group to have these documents reclassified as
Internet Standards.

Best regards,
Ole & Bob - on behalf of the 6man Working group