diff options
author | Thomas Voss <mail@thomasvoss.com> | 2024-11-27 20:54:24 +0100 |
---|---|---|
committer | Thomas Voss <mail@thomasvoss.com> | 2024-11-27 20:54:24 +0100 |
commit | 4bfd864f10b68b71482b35c818559068ef8d5797 (patch) | |
tree | e3989f47a7994642eb325063d46e8f08ffa681dc /doc/rfc/rfc5872.txt | |
parent | ea76e11061bda059ae9f9ad130a9895cc85607db (diff) |
doc: Add RFC documents
Diffstat (limited to 'doc/rfc/rfc5872.txt')
-rw-r--r-- | doc/rfc/rfc5872.txt | 283 |
1 files changed, 283 insertions, 0 deletions
diff --git a/doc/rfc/rfc5872.txt b/doc/rfc/rfc5872.txt new file mode 100644 index 0000000..e014f30 --- /dev/null +++ b/doc/rfc/rfc5872.txt @@ -0,0 +1,283 @@ + + + + + + +Internet Engineering Task Force (IETF) J. Arkko +Request for Comments: 5872 Ericsson +Updates: 5191 A. Yegin +Category: Standards Track Samsung +ISSN: 2070-1721 May 2010 + + + IANA Rules for the + Protocol for Carrying Authentication for Network Access (PANA) + +Abstract + + This document relaxes the IANA rules for the Protocol for Carrying + Authentication for Network Access (PANA). + +Status of This Memo + + This is an Internet Standards Track document. + + This document is a product of the Internet Engineering Task Force + (IETF). It represents the consensus of the IETF community. It has + received public review and has been approved for publication by the + Internet Engineering Steering Group (IESG). Further information on + Internet Standards is available in Section 2 of RFC 5741. + + Information about the current status of this document, any errata, + and how to provide feedback on it may be obtained at + http://www.rfc-editor.org/info/rfc5872. + +Copyright Notice + + Copyright (c) 2010 IETF Trust and the persons identified as the + document authors. All rights reserved. + + This document is subject to BCP 78 and the IETF Trust's Legal + Provisions Relating to IETF Documents + (http://trustee.ietf.org/license-info) in effect on the date of + publication of this document. Please review these documents + carefully, as they describe your rights and restrictions with respect + to this document. Code Components extracted from this document must + include Simplified BSD License text as described in Section 4.e of + the Trust Legal Provisions and are provided without warranty as + described in the Simplified BSD License. + + + + + + + + +Arkko & Yegin Standards Track [Page 1] + +RFC 5872 PANA IANA Rules May 2010 + + +1. Introduction + + This document relaxes the IANA rules for the Protocol for Carrying + Authentication for Network Access (PANA) [RFC5191]. Rules for the + following protocol fields, all defined in [RFC5191], are affected: + + o Message Types + + o Message Flags + + o Attribute-Value Pair (AVP) Flags + + o Result-Code AVP Values + + o Termination-Cause AVP Values + + The rationale for this update is that there can be situations in + which it makes sense to grant an allocation under special + circumstances. At the time of this writing, the IETF is in the + process of approving one such allocation. By changing the current + IANA rules to allow for IESG Approval [RFC5226] as well, it has + become possible for the Internet Engineering Steering Group (IESG) to + consider an allocation request, even if it does not fulfill the + default rule. For instance, an experimental protocol extension could + perhaps deserve an allocation from a field of reserved bits, as long + as a sufficient number of bits still remain for other purposes, and + the PANA community is happy with such allocation. + +2. IANA Considerations + + IANA has updated the registries related to PANA Message Types, + Message Flags, AVP Flags, Result-Code AVP Values, and Termination- + Cause AVP Values, as specified below. All other PANA IANA registries + are to remain unchanged. + +2.1. Message Types + + The Message Types namespace is used to identify PANA messages. Value + 0 is not used and is not assigned by IANA. The range of values from + 1 - 65,519 are for permanent, standard Message Types, allocated by + IETF Review or IESG Approval [RFC5226]. Previously, the rule for + this range was allocation by IETF Review only. [RFC5191] defined the + range of values from 1 - 4. The same Message Type is used for both + the request and the answer messages, except for type 1. The Request + bit distinguishes requests from answers. + + + + + + +Arkko & Yegin Standards Track [Page 2] + +RFC 5872 PANA IANA Rules May 2010 + + + The range of values from 65,520 - 65,535 (hexadecimal values 0xfff0 - + 0xffff) is reserved for experimental messages. As these codes are + only for experimental and testing purposes, no guarantee is made for + interoperability between the communicating PANA Client (PaC) and PANA + Authentication Agent (PAA) using experimental commands, as outlined + in [RFC3692]. + +2.2. Message Flags + + There are 16 bits in the Flags field of the PANA message header. + Section 6.2 of [RFC5191] assigned bit 0 ('R'), 1 ('S'), 2 ('C'), 3 + ('A'), 4 ('P'), and 5 ('I'). Allocations from the remaining free + bits in the PANA header Flag field are made via Standards Action or + IESG Approval [RFC5226]. Previously, the rule for these bits was + allocation by Standards Action only. + +2.3. AVP Flags + + There are 16 bits in the AVP Flags field of the AVP header, defined + in Section 6.3 of [RFC5191]. That RFC also assigned bit 0 ('V'). + The remaining bits are assigned via Standards Action or IESG Approval + [RFC5226]. Previously, the rule for these bits was allocation by + Standards Action only. + +2.4. Result-Code AVP Values + + As defined in Section 8.7 of [RFC5191], the Result-Code AVP (AVP + Code 7) defines the values from 0 - 2. + + All remaining values are available for assignment via IETF Review or + IESG Approval [RFC5226]. Previously, the rule for these values was + allocation by IETF Review only. + +2.5. Termination-Cause AVP Values + + As defined in Section 8.9 of [RFC5191], the Termination-Cause AVP + (AVP Code 9) defines the values 1, 4, and 8. + + All remaining values are available for assignment via IETF Review or + IESG Approval [RFC5226]. Previously, the rule for these values was + allocation by IETF Review only. + + + + + + + + + + +Arkko & Yegin Standards Track [Page 3] + +RFC 5872 PANA IANA Rules May 2010 + + +3. Security Considerations + + This specification does not change the security properties of PANA. + + However, a few words are necessary about the use of the experimental + code points defined in Section 2.1. Potentially harmful side effects + from the use of the experimental values need to be carefully + evaluated before deploying any experiment across networks that the + owner of the experiment does not entirely control. Guidance given in + [RFC3692] about the use of experimental values needs to be followed. + +4. References + +4.1. Normative References + + [RFC5191] Forsberg, D., Ohba, Y., Patil, B., Tschofenig, H., and A. + Yegin, "Protocol for Carrying Authentication for Network + Access (PANA)", RFC 5191, May 2008. + + [RFC5226] Narten, T. and H. Alvestrand, "Guidelines for Writing an + IANA Considerations Section in RFCs", BCP 26, RFC 5226, + May 2008. + +4.2. Informative References + + [RFC3692] Narten, T., "Assigning Experimental and Testing Numbers + Considered Useful", BCP 82, RFC 3692, January 2004. + + + + + + + + + + + + + + + + + + + + + + + + +Arkko & Yegin Standards Track [Page 4] + +RFC 5872 PANA IANA Rules May 2010 + + +Appendix A. Changes from RFC 5191 + + This document changes the IANA rules for: Message Types, Message + Flags, AVP Flags, Result-Code AVP Values, and Termination-Cause AVP + Values. + +Appendix B. Acknowledgments + + The authors would like to thank Yoshihiro Ohba, Ralph Droms, + Magnus Westerlund, and Alfred Hoenes for reviews and comments on this + topic. + +Authors' Addresses + + Jari Arkko + Ericsson + Jorvas 02420 + Finland + + EMail: jari.arkko@piuha.net + + + Alper Yegin + Samsung + Istanbul + Turkey + + EMail: alper.yegin@yegin.org + + + + + + + + + + + + + + + + + + + + + + + +Arkko & Yegin Standards Track [Page 5] + |