< draft-leiba-cotton-iana-5226bis-13.txt   draft-leiba-cotton-iana-5226bis-14.txt >
Network Working Group M. Cotton Network Working Group M. Cotton
Internet-Draft ICANN Internet-Draft ICANN
BCP: 26 B. Leiba BCP: 26 B. Leiba
Obsoletes: 5226 (if approved) Huawei Technologies Obsoletes: 5226 (if approved) Huawei Technologies
Intended status: Best Current Practice T. Narten Intended status: Best Current Practice T. Narten
Expires: November 24, 2016 IBM Corporation Expires: November 29, 2016 IBM Corporation
May 25, 2016 May 30, 2016
Guidelines for Writing an IANA Considerations Section in RFCs Guidelines for Writing an IANA Considerations Section in RFCs
draft-leiba-cotton-iana-5226bis-13 draft-leiba-cotton-iana-5226bis-14
Abstract Abstract
Many protocols make use of points of extensibility that use constants Many protocols make use of points of extensibility that use constants
to identify various protocol parameters. To ensure that the values to identify various protocol parameters. To ensure that the values
used in these fields do not have conflicting uses, and to promote used in these fields do not have conflicting uses, and to promote
interoperability, their allocation is often coordinated by a central interoperability, their allocation is often coordinated by a central
record keeper. For IETF protocols, that role is filled by the record keeper. For IETF protocols, that role is filled by the
Internet Assigned Numbers Authority (IANA). Internet Assigned Numbers Authority (IANA).
skipping to change at page 1, line 48 skipping to change at page 1, line 48
Internet-Drafts are working documents of the Internet Engineering Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet- working documents as Internet-Drafts. The list of current Internet-
Drafts is at http://datatracker.ietf.org/drafts/current/. Drafts is at http://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress." material or to cite them other than as "work in progress."
This Internet-Draft will expire on November 24, 2016. This Internet-Draft will expire on November 29, 2016.
Copyright Notice Copyright Notice
Copyright (c) 2016 IETF Trust and the persons identified as the Copyright (c) 2016 IETF Trust and the persons identified as the
document authors. All rights reserved. document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents (http://trustee.ietf.org/ Provisions Relating to IETF Documents (http://trustee.ietf.org/
license-info) in effect on the date of publication of this document. license-info) in effect on the date of publication of this document.
Please review these documents carefully, as they describe your rights Please review these documents carefully, as they describe your rights
skipping to change at page 2, line 38 skipping to change at page 2, line 38
3.4. Early Allocations . . . . . . . . . . . . . . . . . . . . 12 3.4. Early Allocations . . . . . . . . . . . . . . . . . . . . 12
4. Choosing a Registration Policy, and Well-Known Policies . . . 13 4. Choosing a Registration Policy, and Well-Known Policies . . . 13
4.1. Private Use . . . . . . . . . . . . . . . . . . . . . . . 15 4.1. Private Use . . . . . . . . . . . . . . . . . . . . . . . 15
4.2. Experimental Use . . . . . . . . . . . . . . . . . . . . . 15 4.2. Experimental Use . . . . . . . . . . . . . . . . . . . . . 15
4.3. Hierarchical Allocation . . . . . . . . . . . . . . . . . 16 4.3. Hierarchical Allocation . . . . . . . . . . . . . . . . . 16
4.4. First Come First Served . . . . . . . . . . . . . . . . . 16 4.4. First Come First Served . . . . . . . . . . . . . . . . . 16
4.5. Expert Review . . . . . . . . . . . . . . . . . . . . . . 17 4.5. Expert Review . . . . . . . . . . . . . . . . . . . . . . 17
4.6. Specification Required . . . . . . . . . . . . . . . . . . 18 4.6. Specification Required . . . . . . . . . . . . . . . . . . 18
4.7. RFC Required . . . . . . . . . . . . . . . . . . . . . . . 19 4.7. RFC Required . . . . . . . . . . . . . . . . . . . . . . . 19
4.8. IETF Review . . . . . . . . . . . . . . . . . . . . . . . 19 4.8. IETF Review . . . . . . . . . . . . . . . . . . . . . . . 19
4.9. Standards Action . . . . . . . . . . . . . . . . . . . . . 19 4.9. Standards Action . . . . . . . . . . . . . . . . . . . . . 20
4.10. IESG Approval . . . . . . . . . . . . . . . . . . . . . . 20 4.10. IESG Approval . . . . . . . . . . . . . . . . . . . . . . 20
4.11. Using the Well-Known Registration Policies . . . . . . . . 20 4.11. Using the Well-Known Registration Policies . . . . . . . . 21
4.12. Using Multiple Policies in Combination . . . . . . . . . . 21 4.12. Using Multiple Policies in Combination . . . . . . . . . . 22
5. Designated Experts . . . . . . . . . . . . . . . . . . . . . . 22 5. Designated Experts . . . . . . . . . . . . . . . . . . . . . . 23
5.1. The Motivation for Designated Experts . . . . . . . . . . 22 5.1. The Motivation for Designated Experts . . . . . . . . . . 23
5.2. The Role of the Designated Expert . . . . . . . . . . . . 22 5.2. The Role of the Designated Expert . . . . . . . . . . . . 23
5.2.1. Managing Designated Experts in the IETF . . . . . . . 23 5.2.1. Managing Designated Experts in the IETF . . . . . . . 24
5.3. Designated Expert Reviews . . . . . . . . . . . . . . . . 24 5.3. Designated Expert Reviews . . . . . . . . . . . . . . . . 25
5.4. Expert Reviews and the Document Lifecycle . . . . . . . . 25 5.4. Expert Reviews and the Document Lifecycle . . . . . . . . 26
6. Well-Known Registration Status Terminology . . . . . . . . . . 26 6. Well-Known Registration Status Terminology . . . . . . . . . . 27
7. Documentation References in IANA Registries . . . . . . . . . 27 7. Documentation References in IANA Registries . . . . . . . . . 27
8. What to Do in "bis" Documents . . . . . . . . . . . . . . . . 27 8. What to Do in "bis" Documents . . . . . . . . . . . . . . . . 28
9. Miscellaneous Issues . . . . . . . . . . . . . . . . . . . . . 28 9. Miscellaneous Issues . . . . . . . . . . . . . . . . . . . . . 29
9.1. When There Are No IANA Actions . . . . . . . . . . . . . . 28 9.1. When There Are No IANA Actions . . . . . . . . . . . . . . 29
9.2. Namespaces Lacking Documented Guidance . . . . . . . . . . 29 9.2. Namespaces Lacking Documented Guidance . . . . . . . . . . 30
9.3. After-the-Fact Registrations . . . . . . . . . . . . . . . 29 9.3. After-the-Fact Registrations . . . . . . . . . . . . . . . 30
9.4. Reclaiming Assigned Values . . . . . . . . . . . . . . . . 29 9.4. Reclaiming Assigned Values . . . . . . . . . . . . . . . . 30
9.5. Contact Person vs Assignee or Owner . . . . . . . . . . . 30 9.5. Contact Person vs Assignee or Owner . . . . . . . . . . . 31
9.6. Closing or Obsoleting a Registry/Registrations . . . . . . 31 9.6. Closing or Obsoleting a Registry/Registrations . . . . . . 32
10. Appeals . . . . . . . . . . . . . . . . . . . . . . . . . . . 31 10. Appeals . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
11. Mailing Lists . . . . . . . . . . . . . . . . . . . . . . . . 31 11. Mailing Lists . . . . . . . . . . . . . . . . . . . . . . . . 32
12. Security Considerations . . . . . . . . . . . . . . . . . . . 31 12. Security Considerations . . . . . . . . . . . . . . . . . . . 32
13. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 32 13. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 33
14. Changes Relative to Earlier Editions of BCP 26 . . . . . . . . 32 14. Changes Relative to Earlier Editions of BCP 26 . . . . . . . . 33
14.1. 2016: Changes in This Document Relative to RFC 5226 . . . 32 14.1. 2016: Changes in This Document Relative to RFC 5226 . . . 33
14.2. 2008: Changes in RFC 5226 Relative to RFC 2434 . . . . . 33 14.2. 2008: Changes in RFC 5226 Relative to RFC 2434 . . . . . 34
15. Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . 34 15. Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . 35
15.1. Acknowledgments for This Document (2016) . . . . . . . . 34 15.1. Acknowledgments for This Document (2016) . . . . . . . . 35
15.2. Acknowledgments from the second edition (2008) . . . . . 34 15.2. Acknowledgments from the second edition (2008) . . . . . 35
15.3. Acknowledgments from the first edition (1998) . . . . . . 34 15.3. Acknowledgments from the first edition (1998) . . . . . . 35
16. References . . . . . . . . . . . . . . . . . . . . . . . . . . 35 16. References . . . . . . . . . . . . . . . . . . . . . . . . . . 36
16.1. Normative References . . . . . . . . . . . . . . . . . . 35 16.1. Normative References . . . . . . . . . . . . . . . . . . 36
16.2. Informative References . . . . . . . . . . . . . . . . . 35 16.2. Informative References . . . . . . . . . . . . . . . . . 36
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . 38 Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . 39
1. Introduction 1. Introduction
Many protocols make use of points of extensibility that use constants Many protocols make use of points of extensibility that use constants
to identify various protocol parameters. To ensure that the values to identify various protocol parameters. To ensure that the values
used in these fields do not have conflicting uses, and to promote used in these fields do not have conflicting uses, and to promote
interoperability, their allocation is often coordinated by a central interoperability, their allocation is often coordinated by a central
record keeper. For IETF protocols, that role is filled by the record keeper. For IETF protocols, that role is filled by the
Internet Assigned Numbers Authority (IANA) [RFC2860]. Internet Assigned Numbers Authority (IANA) [RFC2860].
skipping to change at page 15, line 55 skipping to change at page 16, line 5
Experimental Use is similar to Private Use, but with the purpose Experimental Use is similar to Private Use, but with the purpose
being to facilitate experimentation. See [RFC3692] for details. being to facilitate experimentation. See [RFC3692] for details.
IANA does not record assignments from registries or ranges with this IANA does not record assignments from registries or ranges with this
policy (and therefore there is no need for IANA to review them) and policy (and therefore there is no need for IANA to review them) and
assignments are not generally useful for broad interoperability. assignments are not generally useful for broad interoperability.
Unless the registry explicitly allows it, it is not appropriate for Unless the registry explicitly allows it, it is not appropriate for
documents to select explicit values from registries or ranges with documents to select explicit values from registries or ranges with
this policy. Specific experiments will select a value to use during this policy. Specific experiments will select a value to use during
the experiment. the experiment.
When code points are set aside for experimental use, it's important
to make clear any expected restrictions on experimental scope. For
example, say whether it's acceptable to run experiments using those
code points over the open Internet, or whether such experiments
should be confined to more closed environments. See [RFC6994] for an
example of such considerations.
Example: Example:
Experimental Values in IPv4, IPv6, ICMPv4, ICMPv6, UDP, and TCP Experimental Values in IPv4, IPv6, ICMPv4, ICMPv6, UDP, and TCP
Headers [RFC4727] Headers [RFC4727]
4.3. Hierarchical Allocation 4.3. Hierarchical Allocation
With Hierarchical Allocation, delegated administrators are given With Hierarchical Allocation, delegated administrators are given
control over part of the namespace, and can assign values in that control over part of the namespace, and can assign values in that
part of the namespace. IANA makes allocations in the higher levels part of the namespace. IANA makes allocations in the higher levels
skipping to change at page 16, line 39 skipping to change at page 17, line 4
* IANA, which hands out OIDs the "Private Enterprises" branch, * IANA, which hands out OIDs the "Private Enterprises" branch,
* ANSI, which hands out OIDs under the "US Organizations" branch, * ANSI, which hands out OIDs under the "US Organizations" branch,
and and
* BSI, which hands out OIDs under the "UK Organizations" branch. * BSI, which hands out OIDs under the "UK Organizations" branch.
- URN namespaces. IANA registers URN Namespace IDs (NIDs [RFC3406]), - URN namespaces. IANA registers URN Namespace IDs (NIDs [RFC3406]),
and the organization registering an NID is responsible for and the organization registering an NID is responsible for
allocations of URNs within that namespace. allocations of URNs within that namespace.
4.4. First Come First Served 4.4. First Come First Served
For the First Come First Served policy, assignments are made to For the First Come First Served policy, assignments are made to
anyone on a first come, first served basis. There is no substantive anyone on a first come, first served basis. There is no substantive
review of the request, other than to ensure that it is well-formed review of the request, other than to ensure that it is well-formed
and doesn't duplicate an existing assignment. However, requests must and doesn't duplicate an existing assignment. However, requests must
include a minimal amount of clerical information, such as a point of include a minimal amount of clerical information, such as a point of
contact (including an email address, and sometimes a postal address) contact (including an email address, and sometimes a postal address)
and a brief description of how the value will be used. Additional and a brief description of how the value will be used. Additional
information specific to the type of value requested may also need to information specific to the type of value requested may also need to
be provided, as defined by the namespace. For numbers, the exact be provided, as defined by the namespace. For numbers, IANA
value is generally assigned by IANA; with names, specific text generally assigns the next in-sequence unallocated value, but other
strings can usually be requested. values may be requested and assigned if an extenuating circumstance
exists. With names, specific text strings can usually be requested.
When creating a new registry with First Come First Served as the When creating a new registry with First Come First Served as the
registration policy, in addition to the contact person field or registration policy, in addition to the contact person field or
reference, the registry should contain a field for change controller. reference, the registry should contain a field for change controller.
Having a change controller for each entry for these types of Having a change controller for each entry for these types of
registrations makes authorization of future modifications more clear. registrations makes authorization of future modifications more clear.
See Section 2.3. It is important that changes to the registration of See Section 2.3.
a First Come First Served code point retain compatibility with the
current usage of that code point, and so changes need to be made with
care.
It is also important to understand that First Come First Served It is important that changes to the registration of a First Come
really has no filtering. Essentially, any well formed request is First Served code point retain compatibility with the current usage
accepted. of that code point, and so changes need to be made with care. The
change controller should not, in most cases, be requesting
incompatible changes nor repurposing a registered code point. See
also Section 9.4 and Section 9.5.
A working group or any other entity that is developing a protocol A working group or any other entity that is developing a protocol
based on a First Come First Served code point has to be extremely based on a First Come First Served code point has to be extremely
careful that the protocol retains wire compatibility with current use careful that the protocol retains wire compatibility with current use
of the code point. Once that is no longer true, the new work needs of the code point. Once that is no longer true, the new work needs
to change to a different code point (and register that use at the to change to a different code point (and register that use at the
appropriate time). appropriate time).
It is also important to understand that First Come First Served
really has no filtering. Essentially, any well formed request is
accepted.
Examples: Examples:
SASL mechanism names [RFC4422] SASL mechanism names [RFC4422]
LDAP Protocol Mechanisms and LDAP Syntax [RFC4520] LDAP Protocol Mechanisms and LDAP Syntax [RFC4520]
4.5. Expert Review 4.5. Expert Review
(Also called "Designated Expert" in earlier editions of this (Also called "Designated Expert" in earlier editions of this
document.) For the Expert Review policy, review and approval by a document.) For the Expert Review policy, review and approval by a
designated expert (see Section 5) is required. designated expert (see Section 5) is required.
skipping to change at page 21, line 16 skipping to change at page 21, line 48
interoperability. interoperability.
7. RFC Required 7. RFC Required
Any RFC publication, IETF or a non-IETF Stream. Any RFC publication, IETF or a non-IETF Stream.
8. IETF Review 8. IETF Review
RFC publication, IETF Stream only, but need not be Standards RFC publication, IETF Stream only, but need not be Standards
Track. Track.
9. Standards Action 9. Standards Action
RFC publication, IETF Stream, Standards Track only. RFC publication, IETF Stream, Standards Track or BCP only.
Examples of situations that might merit IETF Review or Standards Examples of situations that might merit IETF Review or Standards
Action include the following: Action include the following:
o When a resource is limited, such as bits in a byte (or in two o When a resource is limited, such as bits in a byte (or in two
bytes, or four), or numbers in a limited range. In these cases, bytes, or four), or numbers in a limited range. In these cases,
allowing registrations that haven't been carefully reviewed and allowing registrations that haven't been carefully reviewed and
agreed by community consensus could too quickly deplete the agreed by community consensus could too quickly deplete the
allowable values. allowable values.
o When thorough community review is necessary to avoid extending or o When thorough community review is necessary to avoid extending or
modifying the protocol in ways that could be damaging. One modifying the protocol in ways that could be damaging. One
example is in defining new command codes, as opposed to options example is in defining new command codes, as opposed to options
that use existing command codes: the former might require a strict that use existing command codes: the former might require a strict
policy, where a more relaxed policy could be adequate for the policy, where a more relaxed policy could be adequate for the
latter. Another example is in defining protocol elements that latter. Another example is in defining protocol elements that
change the semantics of existing operations. change the semantics of existing operations.
o When there are security implications with respect to the resource,
and thorough review is needed to ensure that the new usage is
sound. Examples of this include lists of acceptable hashing and
cryptographic algorithms, and assignment of transport ports in the
system range.
When reviewing a document that asks IANA to create a new registry or When reviewing a document that asks IANA to create a new registry or
change a registration policy to any policy more stringent than Expert change a registration policy to any policy more stringent than Expert
Review or Specification Required, the IESG should ask for Review or Specification Required, the IESG should ask for
justification to ensure that more relaxed policies have been justification to ensure that more relaxed policies have been
considered and that the strict policy is the right one. considered and that the strict policy is the right one.
Accordingly, document developers need to anticipate this and document Accordingly, document developers need to anticipate this and document
their considerations for selecting the specified policy (ideally, in their considerations for selecting the specified policy (ideally, in
the document itself; failing that, in the shepherd writeup). the document itself; failing that, in the shepherd writeup).
Likewise, the document shepherd should ensure that the selected Likewise, the document shepherd should ensure that the selected
skipping to change at page 27, line 6 skipping to change at page 27, line 46
namespace when it becomes exhausted. "Reserved" is also namespace when it becomes exhausted. "Reserved" is also
sometimes used to designate values that had been assigned sometimes used to designate values that had been assigned
but are no longer in use, keeping them set aside as long as but are no longer in use, keeping them set aside as long as
other unassigned values are available. Note that this is other unassigned values are available. Note that this is
distinctly different from "Unassigned". distinctly different from "Unassigned".
Reserved values can be released for assignment by the change Reserved values can be released for assignment by the change
controller for the registry (this is often the IESG, for controller for the registry (this is often the IESG, for
registries created by RFCs in the IETF stream). registries created by RFCs in the IETF stream).
7. Documentation References in IANA Registries Known Unregistered Use: It's known that the assignment or range is
in use without having been defined in accordance with
reasonable practice. Documentation for use of the
assignment or range may be unavailable, inadequate, or
conflicting. This is a warning against use, as well as an
alert to network operators, who might see these values in
use on their networks.
7. Documentation References in IANA Registries
Usually, registries and registry entries include references to Usually, registries and registry entries include references to
documentation (RFCs or other documents). The purpose of these documentation (RFCs or other documents). The purpose of these
references is to provide pointers for implementors to find details references is to provide pointers for implementors to find details
necessary for implementation, NOT to simply note what document necessary for implementation, NOT to simply note what document
created the registry or entry. Therefore: created the registry or entry. Therefore:
o If a document registers an item that is defined and explained o If a document registers an item that is defined and explained
elsewhere, the registered reference should be to the document elsewhere, the registered reference should be to the document
containing the definition, not to the document that is merely containing the definition, not to the document that is merely
performing the registration. performing the registration.
skipping to change at page 29, line 41 skipping to change at page 30, line 34
All future RFCs that either explicitly or implicitly rely on IANA to All future RFCs that either explicitly or implicitly rely on IANA to
register or otherwise administer namespace assignments must provide register or otherwise administer namespace assignments must provide
guidelines for administration of the namespace. guidelines for administration of the namespace.
9.3. After-the-Fact Registrations 9.3. After-the-Fact Registrations
Occasionally, the IETF becomes aware that an unassigned value from a Occasionally, the IETF becomes aware that an unassigned value from a
namespace is in use on the Internet or that an assigned value is namespace is in use on the Internet or that an assigned value is
being used for a different purpose than it was registered for. The being used for a different purpose than it was registered for. The
IETF does not condone such misuse; procedures of the type described IETF does not condone such misuse; procedures of the type described
in this document need to be applied to such cases. In the absence of in this document need to be applied to such cases, and it might not
specifications to the contrary, values may only be reassigned for a always be possible to formally assign the desired value. In the
different purpose with the consent of the original assignee (when absence of specifications to the contrary, values may only be
possible) and with due consideration of the impact of such a reassigned for a different purpose with the consent of the original
reassignment. In cases of likely controversy, consultation with the assignee (when possible) and with due consideration of the impact of
IESG is advised. such a reassignment. In cases of likely controversy, consultation
with the IESG is advised.
This is part of the reason for the advice in Section 3.1 about using
placeholder values, such as "TBD1", during document development: open
use of unregistered values after results from well-meant, early
implementations, where the implementations retained the use of
developmental code points that never proceeded to a final IANA
assignment.
9.4. Reclaiming Assigned Values 9.4. Reclaiming Assigned Values
Reclaiming previously assigned values for reuse is tricky, because Reclaiming previously assigned values for reuse is tricky, because
doing so can lead to interoperability problems with deployed systems doing so can lead to interoperability problems with deployed systems
still using the assigned values. Moreover, it can be extremely still using the assigned values. Moreover, it can be extremely
difficult to determine the extent of deployment of systems making use difficult to determine the extent of deployment of systems making use
of a particular value. However, in cases where the namespace is of a particular value. However, in cases where the namespace is
running out of unassigned values and additional ones are needed, it running out of unassigned values and additional ones are needed, it
may be desirable to attempt to reclaim unused values. When may be desirable to attempt to reclaim unused values. When
reclaiming unused values, the following (at a minimum) should be reclaiming unused values, the following (at a minimum) should be
skipping to change at page 30, line 33 skipping to change at page 31, line 33
is not widely used, and the need to reclaim the value outweighs is not widely used, and the need to reclaim the value outweighs
the cost of a hostile reclamation. In any case, IESG Approval is the cost of a hostile reclamation. In any case, IESG Approval is
needed in this case. needed in this case.
o It may be appropriate to write up the proposed action and solicit o It may be appropriate to write up the proposed action and solicit
comments from relevant user communities. In some cases, it may be comments from relevant user communities. In some cases, it may be
appropriate to write an RFC that goes through a formal IETF appropriate to write an RFC that goes through a formal IETF
process (including IETF Last Call) as was done when DHCP reclaimed process (including IETF Last Call) as was done when DHCP reclaimed
some of its "Private Use" options [RFC3942]. some of its "Private Use" options [RFC3942].
o It may be useful to differentiate between revocation, release, and
transfer. Revocation occurs when IANA removes an assignment,
release occurs when the assignee initiates that removal, and
transfer occurs when either revocation or release is coupled with
immediate reassignment. It may be useful to specify procedures
for each of these, or to explicitly prohibit combinations that are
not desired.
9.5. Contact Person vs Assignee or Owner 9.5. Contact Person vs Assignee or Owner
Many registries include designation of a technical or administrative Many registries include designation of a technical or administrative
contact associated with each entry. Often, this is recorded as contact associated with each entry. Often, this is recorded as
contact information for an individual. It is unclear, though, what contact information for an individual. It is unclear, though, what
role the individual has with respect to the registration: is this role the individual has with respect to the registration: is this
item registered on behalf of the individual, the company the item registered on behalf of the individual, the company the
individual worked for, or perhaps another organization the individual individual worked for, or perhaps another organization the individual
was acting for? was acting for?
This matters because some time later, when the individual has changed This matters because some time later, when the individual has changed
jobs or roles, and perhaps can no longer be contacted, someone might jobs or roles, and perhaps can no longer be contacted, someone might
want to update the registration. IANA has no way to know what want to update the registration. IANA has no way to know what
company, organization, or individual should be allowed to take the company, organization, or individual should be allowed to take the
registration over. For registrations rooted in RFCs, the stream registration over. For registrations rooted in RFCs, the stream
owner (such as the IESG or the IAB) can make an overriding decision. owner (such as the IESG or the IAB) can make an overriding decision.
But in other cases, there is no recourse. But in other cases, there is no recourse.
Registries can include, in addition to a "Contact" field, an Registries can include, in addition to a "Contact" field, an
"Assignee" or "Owner" field that can be used to address this "Assignee" or "Owner" field (also referred to as "Change Controller")
situation, giving IANA clear guidance as to the actual owner of the that can be used to address this situation, giving IANA clear
registration. This is strongly advised especially for registries guidance as to the actual owner of the registration. This is
that do not require RFCs to manage their information (registries with strongly advised especially for registries that do not require RFCs
policies such as First Come First Served Section 4.4, Expert Review to manage their information (registries with policies such as First
Section 4.5, and Specification Required Section 4.6). Alternatively, Come First Served Section 4.4, Expert Review Section 4.5, and
organizations can put an organizational role into the "Contact" field Specification Required Section 4.6). Alternatively, organizations
in order to make their ownership clear. can put an organizational role into the "Contact" field in order to
make their ownership clear.
9.6. Closing or Obsoleting a Registry/Registrations 9.6. Closing or Obsoleting a Registry/Registrations
Sometimes there is a request to "close" a registry to further Sometimes there is a request to "close" a registry to further
registrations. When a registry is closed, no further registrations registrations. When a registry is closed, no further registrations
will be accepted. The information in the registry will still be will be accepted. The information in the registry will still be
valid and registrations already in the registry can still be updated. valid and registrations already in the registry can still be updated.
A closed registry can also be marked as "obsolete", as an indication A closed registry can also be marked as "obsolete", as an indication
that the information in the registry is no longer in current use. that the information in the registry is no longer in current use.
skipping to change at page 37, line 43 skipping to change at page 38, line 43
[RFC6195] Eastlake, D., "Domain Name System (DNS) IANA [RFC6195] Eastlake, D., "Domain Name System (DNS) IANA
Considerations", BCP 42, RFC 6195, March 2011. Considerations", BCP 42, RFC 6195, March 2011.
[RFC6275] Perkins, C., Johnson, D. and J. Arkko, "Mobility Support [RFC6275] Perkins, C., Johnson, D. and J. Arkko, "Mobility Support
in IPv6", RFC 6275, July 2011. in IPv6", RFC 6275, July 2011.
[RFC6709] Carpenter, B., Aboba, B. and S. Cheshire, "Design [RFC6709] Carpenter, B., Aboba, B. and S. Cheshire, "Design
Considerations for Protocol Extensions", RFC 6709, Considerations for Protocol Extensions", RFC 6709,
September 2012. September 2012.
[RFC6994] Touch, J., "Shared Use of Experimental TCP Options", RFC
6994, DOI 10.17487/RFC6994, August 2013, <http://www.rfc-
editor.org/info/rfc6994>.
[RFC7120] Cotton, M., "Early IANA Allocation of Standards Track Code [RFC7120] Cotton, M., "Early IANA Allocation of Standards Track Code
Points", BCP 100, RFC 7120, January 2014. Points", BCP 100, RFC 7120, January 2014.
[RFC7564] Saint-Andre, P. and M. Blanchet, "PRECIS Framework: [RFC7564] Saint-Andre, P. and M. Blanchet, "PRECIS Framework:
Preparation, Enforcement, and Comparison of Preparation, Enforcement, and Comparison of
Internationalized Strings in Application Protocols", RFC Internationalized Strings in Application Protocols", RFC
7564, DOI 10.17487/RFC7564, May 2015, <http://www.rfc- 7564, DOI 10.17487/RFC7564, May 2015, <http://www.rfc-
editor.org/info/rfc7564>. editor.org/info/rfc7564>.
[RFC7752] Gredler, H., Ed., Medved, J., Previdi, S., Farrel, A. and [RFC7752] Gredler, H., Ed., Medved, J., Previdi, S., Farrel, A. and
 End of changes. 22 change blocks. 
65 lines changed or deleted 109 lines changed or added

This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/