summaryrefslogtreecommitdiff
path: root/doc/rfc/rfc5226.txt
diff options
context:
space:
mode:
Diffstat (limited to 'doc/rfc/rfc5226.txt')
-rw-r--r--doc/rfc/rfc5226.txt1515
1 files changed, 1515 insertions, 0 deletions
diff --git a/doc/rfc/rfc5226.txt b/doc/rfc/rfc5226.txt
new file mode 100644
index 0000000..fa07145
--- /dev/null
+++ b/doc/rfc/rfc5226.txt
@@ -0,0 +1,1515 @@
+
+
+
+
+
+
+Network Working Group T. Narten
+Request for Comments: 5226 IBM
+BCP: 26 H. Alvestrand
+Obsoletes: 2434 Google
+Category: Best Current Practice May 2008
+
+
+ Guidelines for Writing an IANA Considerations Section in RFCs
+
+Status of This Memo
+
+ This document specifies an Internet Best Current Practices for the
+ Internet Community, and requests discussion and suggestions for
+ improvements. Distribution of this memo is unlimited.
+
+Abstract
+
+ Many protocols make use of identifiers consisting of constants and
+ other well-known values. Even after a protocol has been defined and
+ deployment has begun, new values may need to be assigned (e.g., for a
+ new option type in DHCP, or a new encryption or authentication
+ transform for IPsec). To ensure that such quantities have consistent
+ values and interpretations across all implementations, their
+ assignment must be administered by a central authority. For IETF
+ protocols, that role is provided by the Internet Assigned Numbers
+ Authority (IANA).
+
+ In order for IANA to manage a given namespace prudently, it needs
+ guidelines describing the conditions under which new values can be
+ assigned or when modifications to existing values can be made. If
+ IANA is expected to play a role in the management of a namespace,
+ IANA must be given clear and concise instructions describing that
+ role. This document discusses issues that should be considered in
+ formulating a policy for assigning values to a namespace and provides
+ guidelines for authors on the specific text that must be included in
+ documents that place demands on IANA.
+
+ This document obsoletes RFC 2434.
+
+
+
+
+
+
+
+
+
+
+
+
+
+Narten & Alvestrand Best Current Practice [Page 1]
+
+RFC 5226 IANA Considerations Section in RFCs May 2008
+
+
+Table of Contents
+
+ 1. Introduction ....................................................2
+ 2. Why Management of a Namespace May Be Necessary ..................3
+ 3. Designated Experts ..............................................4
+ 3.1. The Motivation for Designated Experts ......................4
+ 3.2. The Role of the Designated Expert ..........................5
+ 3.3. Designated Expert Reviews ..................................7
+ 4. Creating a Registry .............................................8
+ 4.1. Well-Known IANA Policy Definitions .........................9
+ 4.2. What to Put in Documents That Create a Registry ...........12
+ 4.3. Updating IANA Guidelines for Existing Registries ..........15
+ 5. Registering New Values in an Existing Registry .................15
+ 5.1. What to Put in Documents When Registering Values ..........15
+ 5.2. Updating Registrations ....................................17
+ 5.3. Overriding Registration Procedures ........................17
+ 6. Miscellaneous Issues ...........................................18
+ 6.1. When There Are No IANA Actions ............................18
+ 6.2. Namespaces Lacking Documented Guidance ....................19
+ 6.3. After-the-Fact Registrations ..............................19
+ 6.4. Reclaiming Assigned Values ................................19
+ 7. Appeals ........................................................20
+ 8. Mailing Lists ..................................................20
+ 9. Security Considerations ........................................20
+ 10. Changes Relative to RFC 2434 ..................................21
+ 11. Acknowledgments ...............................................22
+ 12. References ....................................................22
+ 12.1. Normative References .....................................22
+ 12.2. Informative References ...................................22
+
+1. Introduction
+
+ Many protocols make use of fields that contain constants and other
+ well-known values (e.g., the Protocol field in the IP header [IP] or
+ MIME media types [MIME-REG]). Even after a protocol has been defined
+ and deployment has begun, new values may need to be assigned (e.g., a
+ new option type in DHCP [DHCP-OPTIONS] or a new encryption or
+ authentication transform for IPsec [IPSEC]). To ensure that such
+ fields have consistent values and interpretations in different
+ implementations, their assignment must be administered by a central
+ authority. For IETF protocols, that role is provided by the Internet
+ Assigned Numbers Authority (IANA) [IANA-MOU].
+
+ In this document, we call the set of possible values for such a field
+ a "namespace"; its actual value may be a text string, a number, or
+ another kind of value. The binding or association of a specific
+ value with a particular purpose within a namespace is called an
+ assigned number (or assigned value, or sometimes a "code point",
+
+
+
+Narten & Alvestrand Best Current Practice [Page 2]
+
+RFC 5226 IANA Considerations Section in RFCs May 2008
+
+
+ "protocol constant", or "protocol parameter"). Each assignment of a
+ value in a namespace is called a registration.
+
+ In order for IANA to manage a given namespace prudently, it needs
+ guidelines describing the conditions under which new values should be
+ assigned or when (and how) modifications to existing values can be
+ made. This document provides guidelines to authors on what sort of
+ text should be added to their documents in order to provide IANA
+ clear guidelines, and it reviews issues that should be considered in
+ formulating an appropriate policy for assigning numbers to name
+ spaces.
+
+ Not all namespaces require centralized administration. In some
+ cases, it is possible to delegate a namespace in such a way that
+ further assignments can be made independently and with no further
+ (central) coordination. In the Domain Name System, for example, IANA
+ only deals with assignments at the higher levels, while subdomains
+ are administered by the organization to which the space has been
+ delegated. As another example, Object Identifiers (OIDs) as defined
+ by the ITU are also delegated [ASSIGNED]; IANA manages the subtree
+ rooted at "iso.org.dod.internet" (1.3.6.1) . When a namespace is
+ delegated, the scope of IANA is limited to the parts of the namespace
+ where IANA has authority.
+
+ The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
+ "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
+ document are to be interpreted as described in RFC 2119 [KEYWORDS].
+ For this document, "the specification" as used by RFC 2119 refers to
+ the processing of protocol documents within the IETF standards
+ process.
+
+2. Why Management of a Namespace May Be Necessary
+
+ One issue to consider in managing a namespace is its size. If the
+ space is small and limited in size, assignments must be made
+ carefully to prevent exhaustion of the space. If the space is
+ essentially unlimited, on the other hand, potential exhaustion will
+ probably not be a practical concern at all. Even when the space is
+ essentially unlimited, however, it is usually desirable to have at
+ least a minimal review prior to assignment in order to:
+
+ - prevent the hoarding of or unnecessary wasting of values. For
+ example, if the space consists of text strings, it may be
+ desirable to prevent entities from obtaining large sets of
+ strings that correspond to desirable names (e.g., existing
+ company names).
+
+
+
+
+
+Narten & Alvestrand Best Current Practice [Page 3]
+
+RFC 5226 IANA Considerations Section in RFCs May 2008
+
+
+ - provide a sanity check that the request actually makes sense and
+ is necessary. Experience has shown that some level of minimal
+ review from a subject matter expert is useful to prevent
+ assignments in cases where the request is malformed or not
+ actually needed (i.e., an existing assignment for an essentially
+ equivalent service already exists).
+
+ A second consideration is whether it makes sense to delegate the
+ namespace in some manner. This route should be pursued when
+ appropriate, as it lessens the burden on IANA for dealing with
+ assignments.
+
+ A third, and perhaps most important, consideration concerns potential
+ impact on the interoperability of unreviewed extensions. Proposed
+ protocol extensions generally benefit from community review; indeed,
+ review is often essential to avoid future interoperability problems
+ [PROTOCOL-EXT].
+
+ When the namespace is essentially unlimited and there are no
+ potential interoperability issues, assigned numbers can safely be
+ given out to anyone without any subjective review. In such cases,
+ IANA can make assignments directly, provided that IANA is given
+ specific instructions on what types of requests it should grant, and
+ what information must be provided as part of a well-formed request
+ for an assigned number.
+
+3. Designated Experts
+
+3.1. The Motivation for Designated Experts
+
+ It should be noted that IANA does not create or define assignment
+ policy itself; rather, it carries out policies that have been defined
+ by others and published in RFCs. IANA must be given a set of
+ guidelines that allow it to make allocation decisions with minimal
+ subjectivity and without requiring any technical expertise with
+ respect to the protocols that make use of a registry.
+
+ In many cases, some review of prospective allocations is appropriate,
+ and the question becomes who should perform the review and what is
+ the purpose of the review. One might think that an IETF working
+ group (WG) familiar with the namespace at hand should be consulted.
+ In practice, however, WGs eventually disband, so they cannot be
+ considered a permanent evaluator. It is also possible for namespaces
+ to be created through individual submission documents, for which no
+ WG is ever formed.
+
+
+
+
+
+
+Narten & Alvestrand Best Current Practice [Page 4]
+
+RFC 5226 IANA Considerations Section in RFCs May 2008
+
+
+ One way to ensure community review of prospective assignments is to
+ have the requester submit a document for publication as an RFC. Such
+ an action helps ensure that the specification is publicly and
+ permanently available, and it allows some review of the specification
+ prior to publication and assignment of the requested code points.
+ This is the preferred way of ensuring review, and is particularly
+ important if any potential interoperability issues can arise. For
+ example, some assignments are not just assignments, but also involve
+ an element of protocol specification. A new option may define fields
+ that need to be parsed and acted on, which (if specified poorly) may
+ not fit cleanly with the architecture of other options or the base
+ protocols on which they are built.
+
+ In some cases, however, the burden of publishing an RFC in order to
+ get an assignment is excessive. However, it is generally still
+ useful (and sometimes necessary) to discuss proposed additions on a
+ mailing list dedicated to the purpose (e.g., the ietf-types@iana.org
+ for media types) or on a more general mailing list (e.g., that of a
+ current or former IETF WG). Such a mailing list provides a way for
+ new registrations to be publicly reviewed prior to getting assigned,
+ or gives advice to persons wanting help in understanding what a
+ proper registration should contain.
+
+ While discussion on a mailing list can provide valuable technical
+ feedback, opinions may vary and discussions may continue for some
+ time without clear resolution. In addition, IANA cannot participate
+ in all of these mailing lists and cannot determine if or when such
+ discussions reach consensus. Therefore, IANA relies on a "designated
+ expert" for advice regarding the specific question of whether an
+ assignment should be made. The designated expert is an individual
+ who is responsible for carrying out an appropriate evaluation and
+ returning a recommendation to IANA.
+
+ It should be noted that a key motivation for having designated
+ experts is for the IETF to provide IANA with a subject matter expert
+ to whom the evaluation process can be delegated. IANA forwards
+ requests for an assignment to the expert for evaluation, and the
+ expert (after performing the evaluation) informs IANA as to whether
+ or not to make the assignment or registration.
+
+3.2. The Role of the Designated Expert
+
+ The designated expert is responsible for initiating and coordinating
+ the appropriate review of an assignment request. The review may be
+ wide or narrow, depending on the situation and the judgment of the
+ designated expert. This may involve consultation with a set of
+ technology experts, discussion on a public mailing list, consultation
+ with a working group (or its mailing list if the working group has
+
+
+
+Narten & Alvestrand Best Current Practice [Page 5]
+
+RFC 5226 IANA Considerations Section in RFCs May 2008
+
+
+ disbanded), etc. Ideally, the designated expert follows specific
+ review criteria as documented with the protocol that creates or uses
+ the namespace. (See the IANA Considerations sections of [RFC3748]
+ and [RFC3575] for examples that have been done for specific
+ namespaces.)
+
+ Designated experts are expected to be able to defend their decisions
+ to the IETF community, and the evaluation process is not intended to
+ be secretive or bestow unquestioned power on the expert. Experts are
+ expected to apply applicable documented review or vetting procedures,
+ or in the absence of documented criteria, follow generally accepted
+ norms, e.g., those in Section 3.3.
+
+ Section 5.2 discusses disputes and appeals in more detail.
+
+ Designated experts are appointed by the IESG (normally upon
+ recommendation by the relevant Area Director). They are typically
+ named at the time a document creating or updating a namespace is
+ approved by the IESG, but as experts originally appointed may later
+ become unavailable, the IESG will appoint replacements if necessary.
+
+ For some registries, it has proven useful to have multiple designated
+ experts. Sometimes those experts work together in evaluating a
+ request, while in other cases additional experts serve as backups.
+ In cases of disagreement among those experts, it is the
+ responsibility of those experts to make a single clear recommendation
+ to IANA. It is not appropriate for IANA to resolve disputes among
+ experts. In extreme situations (e.g., deadlock), the IESG may need
+ to step in to resolve the problem.
+
+ In registries where a pool of experts evaluates requests, the pool
+ should have a single chair responsible for defining how requests are
+ to be assigned to and reviewed by experts. In some cases, the expert
+ pool may consist of a primary and backups, with the backups involved
+ only when the primary expert is unavailable. In other cases, IANA
+ might assign requests to individual members in sequential or
+ approximate random order. In the event that IANA finds itself having
+ received conflicting advice from its experts, it is the
+ responsibility of the pool's chair to resolve the issue and provide
+ IANA with clear instructions.
+
+ Since the designated experts are appointed by the IESG, they may be
+ removed by the IESG.
+
+
+
+
+
+
+
+
+Narten & Alvestrand Best Current Practice [Page 6]
+
+RFC 5226 IANA Considerations Section in RFCs May 2008
+
+
+3.3. Designated Expert Reviews
+
+ In the eight years since RFC 2434 was published and has been put to
+ use, experience has led to the following observations:
+
+ - A designated expert must respond in a timely fashion, normally
+ within a week for simple requests to a few weeks for more
+ complex ones. Unreasonable delays can cause significant
+ problems for those needing assignments, such as when products
+ need code points to ship. This is not to say that all reviews
+ can be completed under a firm deadline, but they must be
+ started, and the requester and IANA should have some
+ transparency into the process if an answer cannot be given
+ quickly.
+
+ - If a designated expert does not respond to IANA's requests
+ within a reasonable period of time, either with a response or
+ with a reasonable explanation for the delay (e.g., some requests
+ may be particularly complex), and if this is a recurring event,
+ IANA must raise the issue with the IESG. Because of the
+ problems caused by delayed evaluations and assignments, the IESG
+ should take appropriate actions to ensure that the expert
+ understands and accepts his or her responsibilities, or appoint
+ a new expert.
+
+ - The designated expert is not required to personally bear the
+ burden of evaluating and deciding all requests, but acts as a
+ shepherd for the request, enlisting the help of others as
+ appropriate. In the case that a request is denied, and
+ rejecting the request is likely to be controversial, the expert
+ should have the support of other subject matter experts. That
+ is, the expert must be able to defend a decision to the
+ community as a whole.
+
+ In the case where a designated expert is used, but there are no
+ specific documented criteria for performing an evaluation, the
+ presumption should be that a code point should be granted, unless
+ there is a compelling reason to the contrary. Possible reasons to
+ deny a request include:
+
+ - scarcity of code points, where the finite remaining code points
+ should be prudently managed, or when a request for a large
+ number of code points is made, when a single code point is the
+ norm.
+
+ - documentation is not of sufficient clarity to evaluate or ensure
+ interoperability.
+
+
+
+
+Narten & Alvestrand Best Current Practice [Page 7]
+
+RFC 5226 IANA Considerations Section in RFCs May 2008
+
+
+ - the code point is needed for a protocol extension, but the
+ extension is not consistent with the documented (or generally
+ understood) architecture of the base protocol being extended,
+ and would be harmful to the protocol if widely deployed. It is
+ not the intent that "inconsistencies" refer to minor differences
+ "of a personal preference nature". Instead, they refer to
+ significant differences such as inconsistencies with the
+ underlying security model, implying a change to the semantics of
+ an existing message type or operation, requiring unwarranted
+ changes in deployed systems (compared with alternate ways of
+ achieving a similar result), etc.
+
+ - the extension would cause problems with existing deployed
+ systems.
+
+ - the extension would conflict with one under active development
+ by the IETF, and having both would harm rather than foster
+ interoperability.
+
+4. Creating a Registry
+
+ Creating a registry involves describing the namespaces to be created,
+ an initial set of assignments (if appropriate), and guidelines on how
+ future assignments are to be made.
+
+ Once a registry has been created, IANA records assignments that have
+ been made. The following labels describe the status of an individual
+ (or range) of assignments:
+
+ Private Use: Private use only (not assigned), as described in
+ Section 4.1.
+
+ Experimental: Available for experimental use as described in
+ [EXPERIMENTATION]. IANA does not record specific
+ assignments for any particular use.
+
+ Unassigned: Unused and available for assignment via documented
+ procedures.
+
+ Reserved: Not to be assigned. Reserved values are held for
+ special uses, such as to extend the namespace when it become
+ exhausted. Reserved values are not available for general
+ assignment.
+
+
+
+
+
+
+
+
+Narten & Alvestrand Best Current Practice [Page 8]
+
+RFC 5226 IANA Considerations Section in RFCs May 2008
+
+
+4.1. Well-Known IANA Policy Definitions
+
+ The following are some defined policies, some of which are in use
+ today. These cover a range of typical policies that have been used
+ to date to describe the procedure for assigning new values in a
+ namespace. It is not required that documents use these terms; the
+ actual requirement is that the instructions to IANA are clear and
+ unambiguous. However, use of these terms is RECOMMENDED where
+ possible, since their meaning is widely understood.
+
+ Private Use - For private or local use only, with the type and
+ purpose defined by the local site. No attempt is made to
+ prevent multiple sites from using the same value in
+ different (and incompatible) ways. There is no need for
+ IANA to review such assignments (since IANA does not record
+ them) and assignments are not generally useful for broad
+ interoperability. It is the responsibility of the sites
+ making use of the Private Use range to ensure that no
+ conflicts occur (within the intended scope of use).
+
+ Examples: Site-specific options in DHCP [DHCP-IANA], Fibre
+ Channel Port Type Registry [RFC4044], Exchange Types in the
+ IKEv2 header [RFC4306].
+
+ Experimental Use - Similar to private or local use only, with the
+ purpose being to facilitate experimentation. See
+ [EXPERIMENTATION] for details.
+
+ Example: Experimental Values in IPv4, IPv6, ICMPv4, ICMPv6,
+ UDP, and TCP Headers [RFC4727].
+
+ Hierarchical Allocation - Delegated managers can assign values
+ provided they have been given control over that part of the
+ namespace. IANA controls the higher levels of the namespace
+ according to one of the other policies.
+
+ Examples: DNS names, Object Identifiers, IP addresses.
+
+ First Come First Served - Assignments are made to anyone on a
+ first come, first served basis. There is no substantive
+ review of the request, other than to ensure that it is
+ well-formed and doesn't duplicate an existing assignment.
+ However, requests must include a minimal amount of clerical
+ information, such as a point of contact (including an email
+ address) and a brief description of how the value will be
+ used. Additional information specific to the type of value
+ requested may also need to be provided, as defined by the
+ namespace. For numbers, the exact value is generally
+
+
+
+Narten & Alvestrand Best Current Practice [Page 9]
+
+RFC 5226 IANA Considerations Section in RFCs May 2008
+
+
+ assigned by IANA; with names, specific text strings can
+ usually be requested.
+
+ Examples: SASL mechanism names [RFC4422], LDAP Protocol
+ Mechanisms, and LDAP Syntax [RFC4520].
+
+ Expert Review (or Designated Expert) - approval by a Designated
+ Expert is required. The required documentation and review
+ criteria for use by the Designated Expert should be provided
+ when defining the registry. For example, see Sections 6 and
+ 7.2 in [RFC3748].
+
+ Examples: EAP Method Types [RFC3748], HTTP Digest AKA
+ algorithm versions [RFC4169], URI schemes [RFC4395], GEOPRIV
+ Location Types [RFC4589].
+
+ Specification Required - Values and their meanings must be
+ documented in a permanent and readily available public
+ specification, in sufficient detail so that interoperability
+ between independent implementations is possible. When used,
+ Specification Required also implies use of a Designated
+ Expert, who will review the public specification and
+ evaluate whether it is sufficiently clear to allow
+ interoperable implementations. The intention behind
+ "permanent and readily available" is that a document can
+ reasonably be expected to be findable and retrievable long
+ after IANA assignment of the requested value. Publication
+ of an RFC is an ideal means of achieving this requirement,
+ but Specification Required is intended to also cover the
+ case of a document published outside of the RFC path. For
+ RFC publication, the normal RFC review process is expected
+ to provide the necessary review for interoperability, though
+ the Designated Expert may be a particularly well-qualified
+ person to perform such a review.
+
+ Examples: Diffserv-aware TE Bandwidth Constraints Model
+ Identifiers [RFC4124], TLS ClientCertificateType Identifiers
+ [RFC4346], ROHC Profile Identifiers [RFC4995].
+
+ RFC Required - RFC publication (either as an IETF submission or as
+ an RFC Editor Independent submission [RFC3932]) suffices.
+ Unless otherwise specified, any type of RFC is sufficient
+ (e.g., Informational, Experimental, Standards Track, etc.).
+
+
+
+
+
+
+
+
+Narten & Alvestrand Best Current Practice [Page 10]
+
+RFC 5226 IANA Considerations Section in RFCs May 2008
+
+
+ IETF Review - (Formerly called "IETF Consensus" in
+ [IANA-CONSIDERATIONS]) New values are assigned only through
+ RFCs that have been shepherded through the IESG as AD-
+ Sponsored or IETF WG Documents [RFC3932] [RFC3978]. The
+ intention is that the document and proposed assignment will
+ be reviewed by the IESG and appropriate IETF WGs (or
+ experts, if suitable working groups no longer exist) to
+ ensure that the proposed assignment will not negatively
+ impact interoperability or otherwise extend IETF protocols
+ in an inappropriate or damaging manner.
+
+ To ensure adequate community review, such documents are
+ shepherded through the IESG as AD-sponsored (or WG)
+ documents with an IETF Last Call.
+
+ Examples: IPSECKEY Algorithm Types [RFC4025],
+ Accounting-Auth-Method AVP values in DIAMETER [RFC4005], TLS
+ Handshake Hello Extensions [RFC4366].
+
+ Standards Action - Values are assigned only for Standards Track
+ RFCs approved by the IESG.
+
+ Examples: BGP message types [RFC4271], Mobile Node
+ Identifier option types [RFC4283], DCCP Packet Types
+ [RFC4340].
+
+ IESG Approval - New assignments may be approved by the IESG.
+ Although there is no requirement that the request be
+ documented in an RFC, the IESG has discretion to request
+ documents or other supporting materials on a case-by-case
+ basis.
+
+ IESG Approval is not intended to be used often or as a
+ "common case"; indeed, it has seldom been used in practice
+ during the period RFC 2434 was in effect. Rather, it is
+ intended to be available in conjunction with other policies
+ as a fall-back mechanism in the case where one of the other
+ allowable approval mechanisms cannot be employed in a timely
+ fashion or for some other compelling reason. IESG Approval
+ is not intended to circumvent the public review processes
+ implied by other policies that could have been employed for
+ a particular assignment. IESG Approval would be
+ appropriate, however, in cases where expediency is desired
+ and there is strong consensus for making the assignment
+ (e.g., WG consensus).
+
+
+
+
+
+
+Narten & Alvestrand Best Current Practice [Page 11]
+
+RFC 5226 IANA Considerations Section in RFCs May 2008
+
+
+ The following guidelines are suggested for any evaluation
+ under IESG Approval:
+
+ - The IESG can (and should) reject a request if another path
+ for registration is available that is more appropriate and
+ there is no compelling reason to use that path.
+
+ - Before approving a request, the community should be
+ consulted, via a "call for comments" that provides as much
+ information as is reasonably possible about the request.
+
+ Examples: IPv4 Multicast address assignments [RFC3171], IPv4
+ IGMP Type and Code values [RFC3228], Mobile IPv6 Mobility
+ Header Type and Option values [RFC3775].
+
+ It should be noted that it often makes sense to partition a namespace
+ into multiple categories, with assignments within each category
+ handled differently. For example, many protocols now partition
+ namespaces into two (or even more) parts, where one range is reserved
+ for Private or Experimental Use, while other ranges are reserved for
+ globally unique assignments assigned following some review process.
+ Dividing a namespace into ranges makes it possible to have different
+ policies in place for different ranges.
+
+ Examples: LDAP [RFC4520], Pseudowire Edge to Edge Emulation (PWE3)
+ [RFC4446].
+
+4.2. What to Put in Documents That Create a Registry
+
+ The previous sections presented some issues that should be considered
+ in formulating a policy for assigning values in namespaces. It is
+ the working group and/or document author's job to formulate an
+ appropriate policy and specify it in the appropriate document. In
+ almost all cases, having an explicit "IANA Considerations" section is
+ appropriate. The following and later sections define what is needed
+ for the different types of IANA actions.
+
+ Documents that create a new namespace (or modify the definition of an
+ existing space) and that expect IANA to play a role in maintaining
+ that space (e.g., serving as a repository for registered values) MUST
+ provide clear instructions on details of the namespace. In
+ particular, instructions MUST include:
+
+ 1) The name of the registry (or sub-registry) being created and/or
+ maintained. The name will appear on the IANA web page and will
+ be referred to in future documents that need to allocate a
+ value from the new space. The full name (and abbreviation, if
+ appropriate) should be provided. It is highly desirable that
+
+
+
+Narten & Alvestrand Best Current Practice [Page 12]
+
+RFC 5226 IANA Considerations Section in RFCs May 2008
+
+
+ the chosen name not be easily confusable with the name of
+ another registry. When creating a sub-registry, the registry
+ that it is a part of should be clearly identified. When
+ referring to an already existing registry, providing a URL to
+ precisely identify the registry is helpful. All such URLs,
+ however, will be removed from the RFC prior to final
+ publication. For example, documents could contain: [TO BE
+ REMOVED: This registration should take place at the following
+ location: http://www.iana.org/assignments/foobar-registry]
+
+ 2) What information must be provided as part of a request in order
+ to assign a new value. This information may include the need
+ to document relevant security considerations, if any.
+
+ 3) The review process that will apply to all future requests for a
+ value from the namespace.
+
+ Note: When a Designated Expert is used, documents MUST NOT name
+ the Designated Expert in the document itself; instead, the name
+ should be relayed to the appropriate Area Director at the time
+ the document is sent to the IESG for approval.
+
+ If the request should also be reviewed on a specific public
+ mailing list (such as the ietf-types@iana.org for media types),
+ that mailing address should be specified. Note, however, that
+ when mailing lists are specified, the requirement for a
+ Designated Expert MUST also be specified (see Section 3).
+
+ If IANA is expected to make assignments without requiring an
+ outside review, sufficient guidance MUST be provided so that
+ the requests can be evaluated with minimal subjectivity.
+
+ 4) The size, format, and syntax of registry entries. When
+ creating a new name/number space, authors must describe any
+ technical requirements on registry (and sub-registry) values
+ (e.g., valid ranges for integers, length limitations on
+ strings, etc.) as well as the exact format in which registry
+ values should be displayed. For number assignments, one should
+ specify whether values are to be recorded in decimal,
+ hexadecimal, or some other format. For strings, the encoding
+ format should be specified (e.g., ASCII, UTF8, etc.). Authors
+ should also clearly specify what fields to record in the
+ registry.
+
+ 5) Initial assignments and reservations. Clear instructions
+ should be provided to identify any initial assignments or
+ registrations. In addition, any ranges that are to be reserved
+
+
+
+
+Narten & Alvestrand Best Current Practice [Page 13]
+
+RFC 5226 IANA Considerations Section in RFCs May 2008
+
+
+ for "Private Use", "Reserved", "Unassigned", etc. should be
+ clearly indicated.
+
+ When specifying the process for making future assignments, it is
+ quite acceptable to pick one (or more) of the example policies listed
+ in Section 4.1 and refer to it by name. Indeed, this is the
+ preferred mechanism in those cases where the sample policies provide
+ the desired level of review. It is also acceptable to cite one of
+ the above policies and include additional guidelines for what kind of
+ considerations should be taken into account by the review process.
+ For example, RADIUS [RFC3575] specifies the use of a Designated
+ Expert, but includes specific additional criteria the Designated
+ Expert should follow.
+
+ For example, a document could say something like:
+
+ This document defines a new DHCP option, entitled "FooBar" (see
+ Section y), assigned a value of TBD1 from the DHCP Option space
+ [to be removed upon publication:
+ http://www.iana.org/assignments/bootp-dhcp-parameters]
+ [DHCP-OPTIONS] [DHCP-IANA]:
+
+ Data
+ Tag Name Length Meaning
+ ---- ---- ------ -------
+ TBD1 FooBar N FooBar server
+
+ The FooBar option also defines an 8-bit FooType field, for which
+ IANA is to create and maintain a new sub-registry entitled
+ "FooType values" under the FooBar option. Initial values for the
+ DHCP FooBar FooType registry are given below; future assignments
+ are to be made through Expert Review [IANA-CONSIDERATIONS].
+ Assignments consist of a DHCP FooBar FooType name and its
+ associated value.
+
+ Value DHCP FooBar FooType Name Definition
+ ---- ------------------------ ----------
+ 0 Reserved
+ 1 Frobnitz See Section y.1
+ 2 NitzFrob See Section y.2
+ 3-254 Unassigned
+ 255 Reserved
+
+ For examples of documents that provide detailed guidance to IANA
+ on the issue of assigning numbers, consult [RFC2929], [RFC3575],
+ [RFC3968], and [RFC4520].
+
+
+
+
+
+Narten & Alvestrand Best Current Practice [Page 14]
+
+RFC 5226 IANA Considerations Section in RFCs May 2008
+
+
+4.3. Updating IANA Guidelines for Existing Registries
+
+ Updating the registration process for an already existing (i.e.,
+ previously created) namespace (whether created explicitly or
+ implicitly) follows a process similar to that used when creating a
+ new namespace. That is, a document is produced that makes reference
+ to the existing namespace and then provides detailed guidelines for
+ handling assignments in each individual namespace. Such documents
+ are normally processed as Best Current Practices (BCPs)
+ [IETF-PROCESS].
+
+ Example documents that updated the guidelines for managing (then)
+ pre-existing registries include: [RFC2929], [RFC3228], and [RFC3575].
+
+5. Registering New Values in an Existing Registry
+
+5.1. What to Put in Documents When Registering Values
+
+ Often, documents request an assignment from an already existing
+ namespace (i.e., one created by a previously published RFC). In such
+ cases:
+
+ - Documents should clearly identify the namespace in which each
+ value is to be registered. If the registration goes into a
+ sub-registry, the author should clearly describe where the
+ assignment or registration should go. It is helpful to use the
+ exact namespace name as listed on the IANA web page (and
+ defining RFC), and cite the RFC where the namespace is defined.
+
+ Note 1: There is no need to mention what the assignment policy
+ for new assignments is, as that should be clear from the
+ references.
+
+ Note 2: When referring to an existing registry, providing a URL
+ to precisely identify the registry is helpful. Such URLs,
+ however, should usually be removed from the RFC prior to final
+ publication, since IANA URLs are not guaranteed to be stable in
+ the future. In cases where it is important to include a URL in
+ the document, IANA should concur on its inclusion.
+
+ As an example, documents could contain: [TO BE REMOVED: This
+ registration should take place at the following location:
+ http://www.iana.org/assignments/foobar-registry]
+
+ - Each value requested should be given a unique reference. When
+ the value is numeric, use the notation: TBD1, TBD2, etc.
+ Throughout the document where an actual IANA-assigned value
+ should be filled in, use the "TBDx" notation. This helps ensure
+
+
+
+Narten & Alvestrand Best Current Practice [Page 15]
+
+RFC 5226 IANA Considerations Section in RFCs May 2008
+
+
+ that the final RFC has the correct assigned values inserted in
+ all of the relevant places where the value is expected to appear
+ in the final document. For values that are text strings, a
+ specific name can be suggested. IANA will normally assign the
+ name, unless it conflicts with a name already in use.
+
+ - Normally, the values to be used are chosen by IANA and documents
+ should specify values of "TBD". However, in some cases, a value
+ may have been used for testing or in early implementations. In
+ such cases, it is acceptable to include text suggesting what
+ specific value should be used (together with the reason for the
+ choice). For example, one might include the text "the value XXX
+ is suggested as it is used in implementations". However, it
+ should be noted that suggested values are just that; IANA will
+ attempt to assign them, but may find that impossible, if the
+ proposed number has already been assigned for some other use.
+
+ For some registries, IANA has a long-standing policy prohibiting
+ assignment of names or codes on a vanity or organization name
+ basis, e.g., codes are always assigned sequentially unless there
+ is a strong reason for making an exception. Nothing in this
+ document is intended to change those policies or prevent their
+ future application.
+
+ - The IANA Considerations section should summarize all of the IANA
+ actions, with pointers to the relevant sections elsewhere in the
+ document as appropriate. When multiple values are requested, it
+ is generally helpful to include a summary table. It is also
+ helpful for this table to be in the same format as it should
+ appear on the IANA web site. For example:
+
+ Value Description Reference
+ -------- ------------------- ---------
+ TBD1 Foobar [RFCXXXX]
+
+ Note: In cases where authors feel that including the full table is
+ too verbose or repetitive, authors should still include the table,
+ but may include a note asking that the table be removed prior to
+ publication of the final RFC.
+
+ As an example, the following text could be used to request assignment
+ of a DHCPv6 option number:
+
+ IANA has assigned an option code value of TBD1 to the DNS
+ Recursive Name Server option and an option code value of TBD2 to
+ the Domain Search List option from the DHCP option code space
+ defined in Section 24.3 of RFC 3315.
+
+
+
+
+Narten & Alvestrand Best Current Practice [Page 16]
+
+RFC 5226 IANA Considerations Section in RFCs May 2008
+
+
+5.2. Updating Registrations
+
+ Registrations are a request to assign a new value, including the
+ related information needed to evaluate and document the request.
+ Even after a number has been assigned, some types of registrations
+ contain additional information that may need to be updated over time.
+ For example, MIME media types, character sets, and language tags,
+ etc. typically include more information than just the registered
+ value itself. Example information can include point-of-contact
+ information, security issues, pointers to updates, literature
+ references, etc. In such cases, the document defining the namespace
+ must clearly state who is responsible for maintaining and updating a
+ registration. In different cases, it may be appropriate to specify
+ one or more of the following:
+
+ - Let the author update the registration, subject to the same
+ constraints and review as with new registrations.
+
+ - Allow some mechanism to attach comments to the registration, for
+ cases where others have significant objections to claims in a
+ registration, but the author does not agree to change the
+ registration.
+
+ - Designate the IESG, a Designated Expert, or another entity as
+ having the right to change the registrant associated with a
+ registration and any requirements or conditions on doing so.
+ This is mainly to get around the problem when a registrant
+ cannot be reached in order to make necessary updates.
+
+5.3. Overriding Registration Procedures
+
+ Since RFC 2434 was published, experience has shown that the
+ documented IANA considerations for individual protocols do not always
+ adequately cover the reality after the protocol is deployed. For
+ example, many older routing protocols do not have documented,
+ detailed IANA considerations. In addition, documented IANA
+ considerations are sometimes found to be too stringent to allow even
+ working group documents (for which there is strong consensus) to
+ obtain code points from IANA in advance of actual RFC publication.
+ In other cases, the documented procedures are unclear or neglected to
+ cover all the cases. In order to allow assignments in individual
+ cases where there is strong IETF consensus that an allocation should
+ go forward, but the documented procedures do not support such an
+ assignment, the IESG is granted authority to approve assignments in
+ such cases. The intention is not to overrule properly documented
+ procedures, or to obviate the need for protocols to properly document
+ their IANA considerations. Instead, the intention is to permit
+ assignments in individual cases where it is obvious that the
+
+
+
+Narten & Alvestrand Best Current Practice [Page 17]
+
+RFC 5226 IANA Considerations Section in RFCs May 2008
+
+
+ assignment should just be made, but updating the IANA process just to
+ assign a particular code point is viewed as too heavy a burden.
+
+ In general, the IETF would like to see deficient IANA registration
+ procedures for a namespace revised through the IETF standards
+ process, but not at the cost of unreasonable delay for needed
+ assignments. If the IESG has had to take the action in this section,
+ it is a strong indicator that the IANA registration procedures should
+ be updated, possibly in parallel with ongoing protocol work.
+
+6. Miscellaneous Issues
+
+6.1. When There Are No IANA Actions
+
+ Before an Internet-Draft can be published as an RFC, IANA needs to
+ know what actions (if any) it needs to perform. Experience has shown
+ that it is not always immediately obvious whether a document has no
+ IANA actions, without reviewing the document in some detail. In
+ order to make it clear to IANA that it has no actions to perform (and
+ that the author has consciously made such a determination), such
+ documents should include an IANA Considerations section that states:
+
+ This document has no IANA actions.
+
+ This statement, or an equivalent, must only be inserted after the WG
+ or individual submitter has carefully verified it to be true. Using
+ such wording as a matter of "boilerplate" or without careful
+ consideration can lead to incomplete or incorrect IANA actions being
+ performed.
+
+ If a specification makes use of values from a namespace that is not
+ managed by IANA, it may be useful to note this fact, e.g., with
+ wording such as:
+
+ The values of the Foobar parameter are assigned by the Barfoo
+ registry on behalf of the Rabfoo Forum. Therefore, this document
+ has no IANA actions.
+
+ In some cases, the absence of IANA-assigned values may be considered
+ valuable information for future readers; in other cases, it may be
+ considered of no value once the document has been approved, and may
+ be removed before archival publication. This choice should be made
+ clear in the draft, for example, by including a sentence such as
+
+ [RFC Editor: please remove this section prior to publication.]
+
+ or
+
+
+
+
+Narten & Alvestrand Best Current Practice [Page 18]
+
+RFC 5226 IANA Considerations Section in RFCs May 2008
+
+
+ [RFC Editor: please do not remove this section.]
+
+6.2. Namespaces Lacking Documented Guidance
+
+ For all existing RFCs that either explicitly or implicitly rely on
+ IANA to evaluate assignments without specifying a precise evaluation
+ policy, IANA (in consultation with the IESG) will continue to decide
+ what policy is appropriate. Changes to existing policies can always
+ be initiated through the normal IETF consensus process.
+
+ All future RFCs that either explicitly or implicitly rely on IANA to
+ register or otherwise manage namespace assignments MUST provide
+ guidelines for managing the namespace.
+
+6.3. After-the-Fact Registrations
+
+ Occasionally, IANA becomes aware that an unassigned value from a
+ managed namespace is in use on the Internet or that an assigned value
+ is being used for a different purpose than originally registered.
+ IANA will not condone such misuse; i.e., procedures of the type
+ described in this document MUST be applied to such cases. In the
+ absence of specifications to the contrary, values may only be
+ reassigned for a different purpose with the consent of the original
+ assignee (when possible) and with due consideration of the impact of
+ such a reassignment. In cases of likely controversy, consultation
+ with the IESG is advised.
+
+6.4. Reclaiming Assigned Values
+
+ Reclaiming previously assigned values for reuse is tricky, because
+ doing so can lead to interoperability problems with deployed systems
+ still using the assigned values. Moreover, it can be extremely
+ difficult to determine the extent of deployment of systems making use
+ of a particular value. However, in cases where the namespace is
+ running out of unassigned values and additional ones are needed, it
+ may be desirable to attempt to reclaim unused values. When
+ reclaiming unused values, the following (at a minimum) should be
+ considered:
+
+ - Attempts should be made to contact the original party to which a
+ value is assigned, to determine if the value was ever used, and
+ if so, the extent of deployment. (In some cases, products were
+ never shipped or have long ceased being used. In other cases,
+ it may be known that a value was never actually used at all.)
+
+
+
+
+
+
+
+Narten & Alvestrand Best Current Practice [Page 19]
+
+RFC 5226 IANA Considerations Section in RFCs May 2008
+
+
+ - Reassignments should not normally be made without the
+ concurrence of the original requester. Reclamation under such
+ conditions should only take place where there is strong evidence
+ that a value is not widely used, and the need to reclaim the
+ value outweighs the cost of a hostile reclamation. In any case,
+ IESG Approval is needed in this case.
+
+ - It may be appropriate to write up the proposed action and
+ solicit comments from relevant user communities. In some cases,
+ it may be appropriate to write an RFC that goes through a formal
+ IETF process (including IETF Last Call) as was done when DHCP
+ reclaimed some of its "Private Use" options [RFC3942].
+
+7. Appeals
+
+ Appeals of registration decisions made by IANA can be made using the
+ normal IETF appeals process as described in Section 6.5 of
+ [IETF-PROCESS]. Specifically, appeals should be directed to the
+ IESG, followed (if necessary) by an appeal to the IAB, etc.
+
+8. Mailing Lists
+
+ All IETF mailing lists associated with evaluating or discussing
+ assignment requests as described in this document are subject to
+ whatever rules of conduct and methods of list management are
+ currently defined by Best Current Practices or by IESG decision.
+
+9. Security Considerations
+
+ Information that creates or updates a registration needs to be
+ authenticated and authorized. IANA updates registries according to
+ instructions in published RFCs and from the IESG. It also may accept
+ clarifications from document authors, relevant WG chairs, Designated
+ Experts, and mail list participants, too.
+
+ Information concerning possible security vulnerabilities of a
+ protocol may change over time. Likewise, security vulnerabilities
+ related to how an assigned number is used (e.g., if it identifies a
+ protocol) may change as well. As new vulnerabilities are discovered,
+ information about such vulnerabilities may need to be attached to
+ existing registrations, so that users are not misled as to the true
+ security issues surrounding the use of a registered number.
+
+ An analysis of security issues is generally required for all
+ protocols that make use of parameters (data types, operation codes,
+ keywords, etc.) used in IETF protocols or registered by IANA. Such
+ security considerations are usually included in the protocol document
+ [RFC3552]. It is the responsibility of the IANA considerations
+
+
+
+Narten & Alvestrand Best Current Practice [Page 20]
+
+RFC 5226 IANA Considerations Section in RFCs May 2008
+
+
+ associated with a particular registry to specify what (if any)
+ security considerations must be provided when assigning new values,
+ and the process for reviewing such claims.
+
+10. Changes Relative to RFC 2434
+
+ Changes include:
+
+ - Major reordering of text to expand descriptions and to better
+ group topics such as "updating registries" vs. "creating new
+ registries", in order to make it easier for authors to find the
+ text most applicable to their needs.
+
+ - Numerous editorial changes to improve readability.
+
+ - Changed the term "IETF Consensus" to "IETF Review" and added
+ more clarifications. History has shown that people see the
+ words "IETF Consensus" (without consulting the actual
+ definition) and are quick to make incorrect assumptions about
+ what the term means in the context of IANA Considerations.
+
+ - Added "RFC Required" to list of defined policies.
+
+ - Much more explicit directions and examples of "what to put in
+ RFCs".
+
+ - "Specification Required" now implies use of a Designated Expert
+ to evaluate specs for sufficient clarity.
+
+ - Significantly changed the wording in Section 3. Main purpose is
+ to make clear that Expert Reviewers are accountable to the
+ community, and to provide some guidance for review criteria in
+ the default case.
+
+ - Changed wording to remove any special appeals path. The normal
+ RFC 2026 appeals path is used.
+
+ - Added a section about reclaiming unused value.
+
+ - Added a section on after-the-fact registrations.
+
+ - Added a section indicating that mailing lists used to evaluate
+ possible assignments (e.g., by a Designated Expert) are subject
+ to normal IETF rules.
+
+
+
+
+
+
+
+Narten & Alvestrand Best Current Practice [Page 21]
+
+RFC 5226 IANA Considerations Section in RFCs May 2008
+
+
+11. Acknowledgments
+
+ This document has benefited from specific feedback from Jari Arkko,
+ Marcelo Bagnulo Braun, Brian Carpenter, Michelle Cotton, Spencer
+ Dawkins, Barbara Denny, Miguel Garcia, Paul Hoffman, Russ Housley,
+ John Klensin, Allison Mankin, Blake Ramsdell, Mark Townsley, Magnus
+ Westerlund, and Bert Wijnen.
+
+ The original acknowledgments section in RFC 2434 was:
+
+ Jon Postel and Joyce Reynolds provided a detailed explanation on what
+ IANA needs in order to manage assignments efficiently, and patiently
+ provided comments on multiple versions of this document. Brian
+ Carpenter provided helpful comments on earlier versions of the
+ document. One paragraph in the Security Considerations section was
+ borrowed from [MIME-REG].
+
+12. References
+
+12.1. Normative References
+
+ [KEYWORDS] Bradner, S., "Key words for use in RFCs to
+ Indicate Requirement Levels", BCP 14, RFC 2119,
+ March 1997.
+
+12.2. Informative References
+
+ [ASSIGNED] Reynolds, J., Ed., "Assigned Numbers: RFC 1700
+ is Replaced by an On-line Database", RFC 3232,
+ January 2002.
+
+ [DHCP-OPTIONS] Alexander, S. and R. Droms, "DHCP Options and
+ BOOTP Vendor Extensions", RFC 2132, March 1997.
+
+ [DHCP-IANA] Droms, R., "Procedures and IANA Guidelines for
+ Definition of New DHCP Options and Message
+ Types", BCP 43, RFC 2939, September 2000.
+
+ [EXPERIMENTATION] Narten, T., "Assigning Experimental and Testing
+ Numbers Considered Useful", BCP 82, RFC 3692,
+ January 2004.
+
+ [IANA-CONSIDERATIONS] Narten, T. and H. Alvestrand, "Guidelines for
+ Writing an IANA Considerations Section in
+ RFCs", BCP 26, RFC 2434, October 1998.
+
+
+
+
+
+
+Narten & Alvestrand Best Current Practice [Page 22]
+
+RFC 5226 IANA Considerations Section in RFCs May 2008
+
+
+ [IANA-MOU] Carpenter, B., Baker, F., and M. Roberts,
+ "Memorandum of Understanding Concerning the
+ Technical Work of the Internet Assigned Numbers
+ Authority", RFC 2860, June 2000.
+
+ [IETF-PROCESS] Bradner, S., "The Internet Standards Process --
+ Revision 3", BCP 9, RFC 2026, October 1996.
+
+ [IP] Postel, J., "Internet Protocol", STD 5, RFC
+ 791, September 1981.
+
+ [IPSEC] Kent, S. and K. Seo, "Security Architecture for
+ the Internet Protocol", RFC 4301, December
+ 2005.
+
+ [MIME-REG] Freed, N. and J. Klensin, "Media Type
+ Specifications and Registration Procedures",
+ BCP 13, RFC 4288, December 2005.
+
+ [PROTOCOL-EXT] Carpenter, B. and B. Aboba, "Design
+ Considerations for Protocol Extensions", Work
+ in Progress, December 2007.
+
+ [RFC2929] Eastlake 3rd, D., Brunner-Williams, E., and B.
+ Manning, "Domain Name System (DNS) IANA
+ Considerations", BCP 42, RFC 2929, September
+ 2000.
+
+ [RFC3171] Albanna, Z., Almeroth, K., Meyer, D., and M.
+ Schipper, "IANA Guidelines for IPv4 Multicast
+ Address Assignments", BCP 51, RFC 3171, August
+ 2001.
+
+ [RFC3228] Fenner, B., "IANA Considerations for IPv4
+ Internet Group Management Protocol (IGMP)", BCP
+ 57, RFC 3228, February 2002.
+
+ [RFC3552] Rescorla, E. and B. Korver, "Guidelines for
+ Writing RFC Text on Security Considerations",
+ BCP 72, RFC 3552, July 2003.
+
+ [RFC3575] Aboba, B., "IANA Considerations for RADIUS
+ (Remote Authentication Dial In User Service)",
+ RFC 3575, July 2003.
+
+
+
+
+
+
+
+Narten & Alvestrand Best Current Practice [Page 23]
+
+RFC 5226 IANA Considerations Section in RFCs May 2008
+
+
+ [RFC3748] Aboba, B., Blunk, L., Vollbrecht, J., Carlson,
+ J., and H. Levkowetz, Ed., "Extensible
+ Authentication Protocol (EAP)", RFC 3748, June
+ 2004.
+
+ [RFC3775] Johnson, D., Perkins, C., and J. Arkko,
+ "Mobility Support in IPv6", RFC 3775, June
+ 2004.
+
+ [RFC3932] Alvestrand, H., "The IESG and RFC Editor
+ Documents: Procedures", BCP 92, RFC 3932,
+ October 2004.
+
+ [RFC3942] Volz, B., "Reclassifying Dynamic Host
+ Configuration Protocol version 4 (DHCPv4)
+ Options", RFC 3942, November 2004.
+
+ [RFC3968] Camarillo, G., "The Internet Assigned Number
+ Authority (IANA) Header Field Parameter
+ Registry for the Session Initiation Protocol
+ (SIP)", BCP 98, RFC 3968, December 2004.
+
+ [RFC3978] Bradner, S., Ed., "IETF Rights in
+ Contributions", BCP 78, RFC 3978, March 2005.
+
+ [RFC4005] Calhoun, P., Zorn, G., Spence, D., and D.
+ Mitton, "Diameter Network Access Server
+ Application", RFC 4005, August 2005.
+
+ [RFC4025] Richardson, M., "A Method for Storing IPsec
+ Keying Material in DNS", RFC 4025, March 2005.
+
+ [RFC4044] McCloghrie, K., "Fibre Channel Management MIB",
+ RFC 4044, May 2005.
+
+ [RFC4124] Le Faucheur, F., Ed., "Protocol Extensions for
+ Support of Diffserv-aware MPLS Traffic
+ Engineering", RFC 4124, June 2005.
+
+ [RFC4169] Torvinen, V., Arkko, J., and M. Naslund,
+ "Hypertext Transfer Protocol (HTTP) Digest
+ Authentication Using Authentication and Key
+ Agreement (AKA) Version-2", RFC 4169, November
+ 2005.
+
+ [RFC4271] Rekhter, Y., Ed., Li, T., Ed., and S. Hares,
+ Ed., "A Border Gateway Protocol 4 (BGP-4)", RFC
+ 4271, January 2006.
+
+
+
+Narten & Alvestrand Best Current Practice [Page 24]
+
+RFC 5226 IANA Considerations Section in RFCs May 2008
+
+
+ [RFC4283] Patel, A., Leung, K., Khalil, M., Akhtar, H.,
+ and K. Chowdhury, "Mobile Node Identifier
+ Option for Mobile IPv6 (MIPv6)", RFC 4283,
+ November 2005.
+
+ [RFC4306] Kaufman, C., Ed., "Internet Key Exchange
+ (IKEv2) Protocol", RFC 4306, December 2005.
+
+ [RFC4340] Kohler, E., Handley, M., and S. Floyd,
+ "Datagram Congestion Control Protocol (DCCP)",
+ RFC 4340, March 2006.
+
+ [RFC4346] Dierks, T. and E. Rescorla, "The Transport
+ Layer Security (TLS) Protocol Version 1.1", RFC
+ 4346, April 2006.
+
+ [RFC4366] Blake-Wilson, S., Nystrom, M., Hopwood, D.,
+ Mikkelsen, J., and T. Wright, "Transport Layer
+ Security (TLS) Extensions", RFC 4366, April
+ 2006.
+
+ [RFC4395] Hansen, T., Hardie, T., and L. Masinter,
+ "Guidelines and Registration Procedures for New
+ URI Schemes", BCP 115, RFC 4395, February 2006.
+
+ [RFC4422] Melnikov, A., Ed., and K. Zeilenga, Ed.,
+ "Simple Authentication and Security Layer
+ (SASL)", RFC 4422, June 2006.
+
+ [RFC4446] Martini, L., "IANA Allocations for Pseudowire
+ Edge to Edge Emulation (PWE3)", BCP 116, RFC
+ 4446, April 2006.
+
+ [RFC4520] Zeilenga, K., "Internet Assigned Numbers
+ Authority (IANA) Considerations for the
+ Lightweight Directory Access Protocol (LDAP)",
+ BCP 64, RFC 4520, June 2006.
+
+ [RFC4589] Schulzrinne, H. and H. Tschofenig, "Location
+ Types Registry", RFC 4589, July 2006.
+
+ [RFC4727] Fenner, B., "Experimental Values In IPv4, IPv6,
+ ICMPv4, ICMPv6, UDP, and TCP Headers", RFC
+ 4727, November 2006.
+
+ [RFC4995] Jonsson, L-E., Pelletier, G., and K. Sandlund,
+ "The RObust Header Compression (ROHC)
+ Framework", RFC 4995, July 2007.
+
+
+
+Narten & Alvestrand Best Current Practice [Page 25]
+
+RFC 5226 IANA Considerations Section in RFCs May 2008
+
+
+Authors' Addresses
+
+ Thomas Narten
+ IBM Corporation
+ 3039 Cornwallis Ave.
+ PO Box 12195 - BRQA/502
+ Research Triangle Park, NC 27709-2195
+
+ Phone: 919-254-7798
+ EMail: narten@us.ibm.com
+
+
+ Harald Tveit Alvestrand
+ Google
+ Beddingen 10
+ Trondheim, 7014
+ Norway
+
+ EMail: Harald@Alvestrand.no
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Narten & Alvestrand Best Current Practice [Page 26]
+
+RFC 5226 IANA Considerations Section in RFCs May 2008
+
+
+Full Copyright Statement
+
+ Copyright (C) The IETF Trust (2008).
+
+ This document is subject to the rights, licenses and restrictions
+ contained in BCP 78, and except as set forth therein, the authors
+ retain all their rights.
+
+ This document and the information contained herein are provided on an
+ "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
+ OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY, THE IETF TRUST AND
+ THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS
+ OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF
+ THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
+ WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
+
+Intellectual Property
+
+ The IETF takes no position regarding the validity or scope of any
+ Intellectual Property Rights or other rights that might be claimed to
+ pertain to the implementation or use of the technology described in
+ this document or the extent to which any license under such rights
+ might or might not be available; nor does it represent that it has
+ made any independent effort to identify any such rights. Information
+ on the procedures with respect to rights in RFC documents can be
+ found in BCP 78 and BCP 79.
+
+ Copies of IPR disclosures made to the IETF Secretariat and any
+ assurances of licenses to be made available, or the result of an
+ attempt made to obtain a general license or permission for the use of
+ such proprietary rights by implementers or users of this
+ specification can be obtained from the IETF on-line IPR repository at
+ http://www.ietf.org/ipr.
+
+ The IETF invites any interested party to bring to its attention any
+ copyrights, patents or patent applications, or other proprietary
+ rights that may cover technology that may be required to implement
+ this standard. Please address the information to the IETF at
+ ietf-ipr@ietf.org.
+
+
+
+
+
+
+
+
+
+
+
+
+Narten & Alvestrand Best Current Practice [Page 27]
+