1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
|
Internet Engineering Task Force (IETF) J. Arkko
Request for Comments: 5872 Ericsson
Updates: 5191 A. Yegin
Category: Standards Track Samsung
ISSN: 2070-1721 May 2010
IANA Rules for the
Protocol for Carrying Authentication for Network Access (PANA)
Abstract
This document relaxes the IANA rules for the Protocol for Carrying
Authentication for Network Access (PANA).
Status of This Memo
This is an Internet Standards Track document.
This document is a product of the Internet Engineering Task Force
(IETF). It represents the consensus of the IETF community. It has
received public review and has been approved for publication by the
Internet Engineering Steering Group (IESG). Further information on
Internet Standards is available in Section 2 of RFC 5741.
Information about the current status of this document, any errata,
and how to provide feedback on it may be obtained at
http://www.rfc-editor.org/info/rfc5872.
Copyright Notice
Copyright (c) 2010 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as
described in the Simplified BSD License.
Arkko & Yegin Standards Track [Page 1]
^L
RFC 5872 PANA IANA Rules May 2010
1. Introduction
This document relaxes the IANA rules for the Protocol for Carrying
Authentication for Network Access (PANA) [RFC5191]. Rules for the
following protocol fields, all defined in [RFC5191], are affected:
o Message Types
o Message Flags
o Attribute-Value Pair (AVP) Flags
o Result-Code AVP Values
o Termination-Cause AVP Values
The rationale for this update is that there can be situations in
which it makes sense to grant an allocation under special
circumstances. At the time of this writing, the IETF is in the
process of approving one such allocation. By changing the current
IANA rules to allow for IESG Approval [RFC5226] as well, it has
become possible for the Internet Engineering Steering Group (IESG) to
consider an allocation request, even if it does not fulfill the
default rule. For instance, an experimental protocol extension could
perhaps deserve an allocation from a field of reserved bits, as long
as a sufficient number of bits still remain for other purposes, and
the PANA community is happy with such allocation.
2. IANA Considerations
IANA has updated the registries related to PANA Message Types,
Message Flags, AVP Flags, Result-Code AVP Values, and Termination-
Cause AVP Values, as specified below. All other PANA IANA registries
are to remain unchanged.
2.1. Message Types
The Message Types namespace is used to identify PANA messages. Value
0 is not used and is not assigned by IANA. The range of values from
1 - 65,519 are for permanent, standard Message Types, allocated by
IETF Review or IESG Approval [RFC5226]. Previously, the rule for
this range was allocation by IETF Review only. [RFC5191] defined the
range of values from 1 - 4. The same Message Type is used for both
the request and the answer messages, except for type 1. The Request
bit distinguishes requests from answers.
Arkko & Yegin Standards Track [Page 2]
^L
RFC 5872 PANA IANA Rules May 2010
The range of values from 65,520 - 65,535 (hexadecimal values 0xfff0 -
0xffff) is reserved for experimental messages. As these codes are
only for experimental and testing purposes, no guarantee is made for
interoperability between the communicating PANA Client (PaC) and PANA
Authentication Agent (PAA) using experimental commands, as outlined
in [RFC3692].
2.2. Message Flags
There are 16 bits in the Flags field of the PANA message header.
Section 6.2 of [RFC5191] assigned bit 0 ('R'), 1 ('S'), 2 ('C'), 3
('A'), 4 ('P'), and 5 ('I'). Allocations from the remaining free
bits in the PANA header Flag field are made via Standards Action or
IESG Approval [RFC5226]. Previously, the rule for these bits was
allocation by Standards Action only.
2.3. AVP Flags
There are 16 bits in the AVP Flags field of the AVP header, defined
in Section 6.3 of [RFC5191]. That RFC also assigned bit 0 ('V').
The remaining bits are assigned via Standards Action or IESG Approval
[RFC5226]. Previously, the rule for these bits was allocation by
Standards Action only.
2.4. Result-Code AVP Values
As defined in Section 8.7 of [RFC5191], the Result-Code AVP (AVP
Code 7) defines the values from 0 - 2.
All remaining values are available for assignment via IETF Review or
IESG Approval [RFC5226]. Previously, the rule for these values was
allocation by IETF Review only.
2.5. Termination-Cause AVP Values
As defined in Section 8.9 of [RFC5191], the Termination-Cause AVP
(AVP Code 9) defines the values 1, 4, and 8.
All remaining values are available for assignment via IETF Review or
IESG Approval [RFC5226]. Previously, the rule for these values was
allocation by IETF Review only.
Arkko & Yegin Standards Track [Page 3]
^L
RFC 5872 PANA IANA Rules May 2010
3. Security Considerations
This specification does not change the security properties of PANA.
However, a few words are necessary about the use of the experimental
code points defined in Section 2.1. Potentially harmful side effects
from the use of the experimental values need to be carefully
evaluated before deploying any experiment across networks that the
owner of the experiment does not entirely control. Guidance given in
[RFC3692] about the use of experimental values needs to be followed.
4. References
4.1. Normative References
[RFC5191] Forsberg, D., Ohba, Y., Patil, B., Tschofenig, H., and A.
Yegin, "Protocol for Carrying Authentication for Network
Access (PANA)", RFC 5191, May 2008.
[RFC5226] Narten, T. and H. Alvestrand, "Guidelines for Writing an
IANA Considerations Section in RFCs", BCP 26, RFC 5226,
May 2008.
4.2. Informative References
[RFC3692] Narten, T., "Assigning Experimental and Testing Numbers
Considered Useful", BCP 82, RFC 3692, January 2004.
Arkko & Yegin Standards Track [Page 4]
^L
RFC 5872 PANA IANA Rules May 2010
Appendix A. Changes from RFC 5191
This document changes the IANA rules for: Message Types, Message
Flags, AVP Flags, Result-Code AVP Values, and Termination-Cause AVP
Values.
Appendix B. Acknowledgments
The authors would like to thank Yoshihiro Ohba, Ralph Droms,
Magnus Westerlund, and Alfred Hoenes for reviews and comments on this
topic.
Authors' Addresses
Jari Arkko
Ericsson
Jorvas 02420
Finland
EMail: jari.arkko@piuha.net
Alper Yegin
Samsung
Istanbul
Turkey
EMail: alper.yegin@yegin.org
Arkko & Yegin Standards Track [Page 5]
^L
|