< draft-narten-iana-considerations-rfc2434bis-01.txt   draft-narten-iana-considerations-rfc2434bis-02.txt >
INTERNET-DRAFT Thomas Narten INTERNET-DRAFT Thomas Narten
IBM IBM
<draft-narten-iana-considerations-rfc2434bis> Harald Tveit Alvestrand <draft-narten-iana-considerations-rfc2434bis> Harald Tveit Alvestrand
Cisco Cisco
September 16, 2004 June 27, 2005
Guidelines for Writing an IANA Considerations Section in RFCs Guidelines for Writing an IANA Considerations Section in RFCs
<draft-narten-iana-considerations-rfc2434bis-01.txt> <draft-narten-iana-considerations-rfc2434bis-02.txt>
Status of this Memo Status of this Memo
By submitting this Internet-Draft, I certify that any applicable By submitting this Internet-Draft, each author represents that any
patent or other IPR claims of which I am aware have been disclosed, applicable patent or other IPR claims of which he or she is aware
and any of which I become aware will be disclosed, in accordance with have been or will be disclosed, and any of which he or she becomes
RFC 3668. aware will be disclosed, in accordance with Section 6 of BCP 79.
Internet-Drafts are working documents of the Internet Engineering Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that Task Force (IETF), its areas, and its working groups. Note that
other groups may also distribute working documents as Internet- other groups may also distribute working documents as Internet-
Drafts. Drafts.
Internet-Drafts are draft documents valid for a maximum of six months Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference mate- time. It is inappropriate to use Internet-Drafts as reference
rial or to cite them other than as "work in progress." material or to cite them other than as "work in progress".
The list of current Internet-Drafts can be accessed at The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt. http://www.ietf.org/1id-abstracts.html
The list of Internet-Draft Shadow Directories can be accessed at The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html. http://www.ietf.org/shadow.html
This Internet-Draft expires March, 2005.
Copyright Notice
Copyright (C) The Internet Society (2004). All Rights Reserved. This Internet-Draft expires December 30, 2005.
Abstract Abstract
Many protocols make use of identifiers consisting of constants and Many protocols make use of identifiers consisting of constants and
other well-known values. Even after a protocol has been defined and other well-known values. Even after a protocol has been defined and
deployment has begun, new values may need to be assigned (e.g., for a deployment has begun, new values may need to be assigned (e.g., for a
new option type in DHCP, or a new encryption or authentication new option type in DHCP, or a new encryption or authentication
transform for IPsec). To ensure that such quantities have consistent transform for IPsec). To ensure that such quantities have consistent
values and interpretations in different implementations, their values and interpretations in different implementations, their
assignment must be administered by a central authority. For IETF assignment must be administered by a central authority. For IETF
skipping to change at page 3, line 12 skipping to change at page 3, line 12
the specific text that must be included in documents that place the specific text that must be included in documents that place
demands on the IANA. demands on the IANA.
Contents Contents
Status of this Memo.......................................... 1 Status of this Memo.......................................... 1
1. Introduction............................................. 3 1. Introduction............................................. 3
2. Issues To Consider....................................... 4 2. Issues To Consider....................................... 4
2.1. The Motivation For Designated Experts............... 5
3. Well-Known IANA Policy Definitions....................... 6 3. Creating A Registry...................................... 6
3.1. Well-Known IANA Policy Definitions.................. 7
3.2. What To Put In Documents That Create A Registry..... 9
3.3. Updating Guidelines In Existing Registries.......... 10
4. Registration maintenance................................. 8 4. Registering Values In An Existing Registry............... 11
4.1. What to Put In Documents When Registering Values.... 11
4.2. Maintaining Registrations........................... 12
4.3. Overriding Registration Procedures.................. 12
5. What To Put In Documents................................. 8 5. Miscellaneous Issues..................................... 13
5.1. When There Are No IANA Actions...................... 9 5.1. When There Are No IANA Actions...................... 13
5.2. Requesting Assignments From an Existing Name Space.. 9 5.2. Appeals............................................. 13
5.3. Creation of New Registries.......................... 10 5.3. Namespaces Lacking Documented Guidance.............. 13
6. Applicability to Past and Future RFCs.................... 11 6. Security Considerations.................................. 14
7. Security Considerations.................................. 12 7. Changes Relative to RFC 2434............................. 14
7.1. Changes Relative to -00............................. 14
8. Changes Relative to RFC 2434............................. 13 8. IANA Considerations...................................... 15
8.1. Changes Relative to -00............................. 13
9. Acknowledgments.......................................... 13 9. Acknowledgments.......................................... 15
10. References.............................................. 13 10. References.............................................. 15
11. Authors' Addresses...................................... 14 11. Authorsどヨ Addresses.................................... 17
1. Introduction 1. Introduction
Many protocols make use of fields that contain constants and other Many protocols make use of fields that contain constants and other
well-known values (e.g., the Protocol field in the IP header [IP] or well-known values (e.g., the Protocol field in the IP header [IP] or
MIME types in mail messages [MIME-REG]). Even after a protocol has MIME types in mail messages [MIME-REG]). Even after a protocol has
been defined and deployment has begun, new values may need to be been defined and deployment has begun, new values may need to be
assigned (e.g., a new option type in DHCP [DHCP] or a new encryption assigned (e.g., a new option type in DHCP [DHCP] or a new encryption
or authentication algorithm for IPsec [IPSEC]). To ensure that such or authentication algorithm for IPsec [IPSEC]). To ensure that such
fields have consistent values and interpretations in different fields have consistent values and interpretations in different
implementations, their assignment must be administered by a central implementations, their assignment must be administered by a central
authority. For IETF protocols, that role is provided by the Internet authority. For IETF protocols, that role is provided by the Internet
Assigned Numbers Authority (IANA) [IANA-MOU]. Assigned Numbers Authority (IANA) [IANA-MOU].
In this document, we call the set of possible values for such a field In this document, we call the set of possible values for such a field
a "name space"; its actual content may be a name, a number or another a "name space"; its actual value may be a text string, a number or
kind of value. The assignment of a specific value to a name space is another kind of value. The assignment of a specific value to a name
called an assigned number (or assigned value). Each assignment of a space is called an assigned number (or assigned value). Each
number in a name space is called a registration. assignment of a number in a name space is called a registration.
In order for the IANA to manage a given name space prudently, it In order for the IANA to manage a given name space prudently, it
needs guidelines describing the conditions under which new values needs guidelines describing the conditions under which new values
should be assigned. This document provides guidelines to authors on should be assigned. This document provides guidelines to authors on
what sort of text should be added to their documents, and reviews what sort of text should be added to their documents, and reviews
issues that should be considered in formulating an appropriate policy issues that should be considered in formulating an appropriate policy
for assigning numbers to name spaces. for assigning numbers to name spaces.
Not all name spaces require centralized administration. In some Not all name spaces require centralized administration. In some
cases, it is possible to delegate a name space in such a way that cases, it is possible to delegate a name space in such a way that
further assignments can be made independently and with no further further assignments can be made independently and with no further
(central) coordination. In the Domain Name System, for example, the (central) coordination. In the Domain Name System, for example, the
IANA only deals with assignments at the higher-levels, while IANA only deals with assignments at the higher-levels, while
subdomains are administered by the organization to which the space subdomains are administered by the organization to which the space
has been delegated. As another example, Object Identifiers (OIDs) as has been delegated. As another example, Object Identifiers (OIDs) as
defined by the ITU are also delegated [ASSIGNED]. When a name space defined by the ITU are also delegated [ASSIGNED]. When a name space
can be delegated, the IANA only deals with assignments at the top can be delegated, the scope of IANA is limited to the parts of the
level. namespace where IANA has authority.
This document uses the terms 'MUST', 'SHOULD' and 'MAY', and their This document uses the terms どヨMUSTどヨ, どヨSHOULDどヨ and どヨMAYどヨ, and their
negatives, in the way described in RFC 2119 [KEYWORDS]. In this case, negatives, in the way described in RFC 2119 [KEYWORDS]. In this case,
"the specification" as used by RFC 2119 refers to the processing of "the specification" as used by RFC 2119 refers to the processing of
protocols being submitted to the IETF standards process. protocols being submitted to the IETF standards process.
2. Issues To Consider 2. Issues To Consider
One issue to consider in managing a name space is its size. If the One issue to consider in managing a name space is its size. If the
space is small and limited in size, assignments must be made space is small and limited in size, assignments must be made
carefully to ensure that the space doesn't become exhausted. If the carefully to prevent exhaustion of the space. If the space is
space is essentially unlimited, on the other hand, it may be essentially unlimited, on the other hand, it may be perfectly
perfectly reasonable to hand out new values to anyone that wants one. reasonable to hand out new values to anyone that wants one. Even
Even when the space is essentially unlimited, however, it is usually when the space is essentially unlimited, however, it is usually
desirable to have at least minimal review to prevent the hoarding of desirable to have at least minimal review to prevent the hoarding of
or unnecessary wasting of a space. For example, if the space or unnecessary wasting of a space. For example, if the space
consists of text strings, it may be desirable to prevent consists of text strings, it may be desirable to prevent
organizations from obtaining large sets of strings that correspond to organizations from obtaining large sets of strings that correspond to
the "best" names (e.g., existing company names). Experience has also the "best" names (e.g., existing company names). Experience has also
shown that some level of minimal review is useful to prevent shown that some level of minimal review is useful to prevent
assignments in cases where the request is malformed or not actually assignments in cases where the request is malformed or not actually
needed (this may not always be immediately obvious to a non-subject- needed (this may not always be immediately obvious to a non-subject-
matter expert). matter expert).
skipping to change at page 5, line 21 skipping to change at page 5, line 27
In some cases, the name space is essentially unlimited, there are no In some cases, the name space is essentially unlimited, there are no
potential interoperability issues, and assigned numbers can safely be potential interoperability issues, and assigned numbers can safely be
given out to anyone. When no subjective review is needed, the IANA given out to anyone. When no subjective review is needed, the IANA
can make assignments directly, provided that the IANA is given can make assignments directly, provided that the IANA is given
specific instructions on what types of requests it should grant, and specific instructions on what types of requests it should grant, and
what information must be provided before a request for an assigned what information must be provided before a request for an assigned
number will be considered. Note that the IANA will not define an number will be considered. Note that the IANA will not define an
assignment policy; it should be given a set of guidelines that allow assignment policy; it should be given a set of guidelines that allow
it to make allocation decisions with minimal subjectivity. it to make allocation decisions with minimal subjectivity.
2.1. The Motivation For Designated Experts
In most cases, some review of prospective allocations is appropriate, In most cases, some review of prospective allocations is appropriate,
and the question becomes who should perform the review and how and the question becomes who should perform the review and how
rigorous the review needs to be. In many cases, one might think that rigorous the review needs to be. In many cases, one might think that
an IETF Working Group (WG) familiar with the name space at hand an IETF Working Group (WG) familiar with the name space at hand
should be consulted. In practice, however, WGs eventually disband, so should be consulted. In practice, however, WGs eventually disband, so
they cannot be considered a permanent evaluator. It is also possible they cannot be considered a permanent evaluator. It is also possible
for name spaces to be created through individual submission for name spaces to be created through individual submission
documents, for which no WG is ever formed. documents, for which no WG is ever formed.
One way to ensure community review of prospective assignments is to One way to ensure community review of prospective assignments is to
have the requester submit a document for publication as an RFC. Such have the requester submit a document for publication as an RFC. Such
an action helps ensure that the IESG and relevant WGs review the an action helps ensure that the specification is publicly and
assignment. [XXX update wrt draft-iesg-rfced-documents?] This is the permanently available, and allows some review of the specification
preferred way of ensuring review, and is particularly important if prior to publication. This is the preferred way of ensuring review,
any potential interoperability issues can arise. For example, many and is particularly important if any potential interoperability
assignments are not just assignments, but also involve an element of issues can arise. For example, many assignments are not just
protocol specification. A new option may define fields that need to assignments, but also involve an element of protocol specification. A
be parsed and acted on, which (if specified poorly) may not fit new option may define fields that need to be parsed and acted on,
cleanly with the architecture of other options or the base protocols which (if specified poorly) may not fit cleanly with the architecture
on which they are built. of other options or the base protocols on which they are built.
In some cases, however, the burden of publishing an RFC in order to In some cases, however, the burden of publishing an RFC in order to
get an assignment is excessive. However, it is generally still useful get an assignment is excessive. However, it is generally still useful
(and sometimes necessary) to discuss proposed additions on a mailing (and sometimes necessary) to discuss proposed additions on a mailing
list dedicated to the purpose (e.g., the ietf-types@iana.org for list dedicated to the purpose (e.g., the ietf-types@iana.org for
media types) or on a more general mailing list (e.g., that of a media types) or on a more general mailing list (e.g., that of a
current or former IETF WG). Such a mailing list provides a way for current or former IETF WG). Such a mailing list provides a way for
new registrations to be publicly reviewed prior to getting assigned, new registrations to be publicly reviewed prior to getting assigned,
or to give advice for persons who want help in understanding what a or to give advice for persons who want help in understanding what a
proper registration should contain. proper registration should contain.
While discussion on a mailing list can provide valuable technical While discussion on a mailing list can provide valuable technical
expertise, opinions may vary and discussions may continue for some expertise, opinions may vary and discussions may continue for some
time without clear resolution. In addition, the IANA cannot time without clear resolution. In addition, the IANA cannot
participate in all of these mailing lists and cannot determine if or participate in all of these mailing lists and cannot determine if or
when such discussions reach consensus. Therefore, the IANA cannot when such discussions reach consensus. Therefore, the IANA relies on
allow general mailing lists to fill the role of providing definitive a "designated expert" to advise it in assignment matters. The
recommendations regarding a registration question. Instead, the IANA designated expert is a single individual who is responsible for
will rely on a "designated expert" to advise it in assignment carrying out an appropriate evaluation and returning a recommendation
matters. That is, the IANA forwards the requests it receives to a to IANA. The designated expert is responsible for initiating and
specific point-of-contact (one or a small number of individuals) and coordinating as wide a review of an assignment request as may be
acts upon the returned recommendation from the designated expert. The necessary to evaluate it properly. This may involve consultation with
designated expert can initiate and coordinate as wide a review of an a set of technology experts, discussion on a public mailing list, or
assignment request as may be necessary to evaluate it properly. consultation with a working group (or its mailing list if the working
group has disbanded), etc. In some case, the designated expert
follows specific review guidelines as documented in a related
document. (See the IANA Considerations sections of [RFC3748,RFC3575]
for examples of some review criteria an expert follows for specific
protocol name spaces.)
Designated experts are appointed by the relevant Area Director of the Designated experts are appointed by the relevant Area Director of the
IESG. They are typically named at the time a document that creates a IESG. They are typically named at the time a document that creates a
new numbering space is published as an RFC, but as experts originally new numbering space is published as an RFC, but as experts originally
appointed may later become unavailable, the relevant Area Director appointed may later become unavailable, the relevant Area Director
will appoint replacements if necessary. will appoint replacements if necessary.
Any decisions made by the designated expert can be appealed using the Any decisions made by the designated expert can be appealed using the
normal IETF appeals process as outlined in Section 6.5 of [IETF- normal IETF appeals process as discussed in Section 5.2. below.
PROCESS]. Since the designated experts are appointed by the IESG,
they may be removed by the IESG.
3. Well-Known IANA Policy Definitions Since the designated experts are appointed by the IESG, they may be
removed by the IESG.
3. Creating A Registry
Creating a registry involves describing the name spaces to be created
together with an initial set of assignments (if appropriate) and
guidelines on how future assignments are to be made.
3.1. Well-Known IANA Policy Definitions
The following are some defined policies, some of which are in use The following are some defined policies, some of which are in use
today. These cover a range of typical policies that have been used to today. These cover a range of typical policies that have been used to
date. It is not required that documents use these terms; the actual date to describe the procedure for assigning new values in a name
space. It is not required that documents use these terms; the actual
requirement is that the instructions to IANA are clear and requirement is that the instructions to IANA are clear and
unambigous. However, it is preferable to use these terms where unambiguous. However, it is preferable to use these terms where
possible, since there meaning is widely understood. possible, since their meaning is widely understood.
Private Use - For private or local use only, with the type and Private Use - For private or local use only, with the type and
purpose defined by the local site. No attempt is made to purpose defined by the local site. No attempt is made to
prevent multiple sites from using the same value in prevent multiple sites from using the same value in
different (and incompatible) ways. There is no need for different (and incompatible) ways. There is no need for
IANA to review such assignments and assignments are not IANA to review such assignments and assignments are not
generally useful for interoperability. generally useful for interoperability.
Examples: Site-specific options in DHCP [DHCP] have Examples: Site-specific options in DHCP [DHCP] have
significance only within a single site. "X-foo:" header significance only within a single site. "X-foo:" header
skipping to change at page 7, line 16 skipping to change at page 7, line 41
provided they have been given control over that part of the provided they have been given control over that part of the
name space. IANA controls the higher levels of the name space. IANA controls the higher levels of the
namespace according to one of the other policies. namespace according to one of the other policies.
Examples: DNS names, Object Identifiers Examples: DNS names, Object Identifiers
First Come First Served - Anyone can obtain an assigned number, so First Come First Served - Anyone can obtain an assigned number, so
long as they provide a point of contact and a brief long as they provide a point of contact and a brief
description of what the value would be used for. For description of what the value would be used for. For
numbers, the exact value is generally assigned by the IANA; numbers, the exact value is generally assigned by the IANA;
with names, specific names are usually requested. with names, specific text strings are usually requested.
Examples: vnd. (vendor assigned) MIME types [MIME-REG], TCP Examples: vnd. (vendor assigned) MIME types [MIME-REG], TCP
and UDP port numbers. and UDP port numbers.
Expert Review (or Designated Expert) - approval by a Designated Expert Review (or Designated Expert) - approval by a Designated
Expert is required. Expert is required. The required documentation and review
criteria to be used by the Designated Expert should be
provided when defining the registry.
Specification Required - Values and their meaning must be Specification Required - Values and their meaning must be
documented in an RFC or other permanent and readily documented in an RFC or other permanent and readily
available reference, in sufficient detail so that available reference, in sufficient detail so that
interoperability between independent implementations is interoperability between independent implementations is
possible. possible. [XXX: who assesses whether a non-RFC document is
sufficiently clear for interoperability? IANA cannot.]
Examples: SCSP [SCSP] Examples: SCSP [SCSP]
IESG Approval - New assignments must be approved by the IESG. RFC Required - RFC publication (either as IETF Submission or as an
Although there is no requirement that the request be RFC Editor submission [RFC3932]) suffices.
documented in an RFC, the IESG has discretion to request
documents or other supporting materials on a case-by-case
basis.
IETF Review - (Formerly "IETF Consensus" [IANA-CONSIDERATIONS]) IETF Review - (Formerly called "IETF Consensus" in [IANA-
New values are assigned only through RFC publication of CONSIDERATIONS]) New values are assigned only through RFCs
documents that have been shepherded through the IESG as AD- that have been shepherded through the IESG as AD-Sponsored
Sponsored documents [XXX need ref]. The intention is that IETF Documents [RFC3932,RFC3978]. The intention is that the
the document and proposed assignment will be reviewed by document and proposed assignment will be reviewed by the
the IESG and appropriate IETF WGs (or experts, if suitable IESG and appropriate IETF WGs (or experts, if suitable
working groups no longer exist) to ensure that the proposed working groups no longer exist) to ensure that the proposed
assignment will not negatively impact interoperability or assignment will not negatively impact interoperability or
otherwise extend IETF protocols in an inappropriate manner. otherwise extend IETF protocols in an inappropriate or
damaging manner.
[XXX: should an explicit last call be required?] To ensure adequate community review, such documents should
be Last Called.
Examples: SMTP extensions [SMTP-EXT], BGP Subsequent Examples: SMTP extensions [SMTP-EXT], BGP Subsequent
Address Family Identifiers [BGP4-EXT]. Address Family Identifiers [BGP4-EXT].
Standards Action - Values are assigned only for Standards Track Standards Action - Values are assigned only for Standards Track
RFCs approved by the IESG. RFCs approved by the IESG.
Examples: MIME top level types [MIME-REG] Examples: MIME top level types [MIME-REG]
IESG Approval - New assignments may be approved by the IESG.
Although there is no requirement that the request be
documented in an RFC, the IESG has discretion to request
documents or other supporting materials on a case-by-case
basis.
IESG Approval is not intended to be used often. Rather, it
is intended to be used in conjunction with other policies
as a fall-back mechanism in the case where one of the other
allowable approval mechanisms cannot be employed in a
timely fashion or for some other compelling reason. IESG
Approval is not intended to circumvent the public review
processes implied by other policies that could have been
employed for a particular assignment.
[XXX: Is Section 4.3. below sufficient to cover the case
that IESG is designed to handle?]
It should be noted that it often makes sense to partition a name It should be noted that it often makes sense to partition a name
space into several categories, with assignments out of each category space into several categories, with assignments out of each category
handled differently. For example, the DHCP option space [DHCP] is handled differently. For example, the DHCP option space [DHCP] is
split into two parts. Option numbers in the range of 1-127 are split into two parts. Option numbers in the range of 1-127 are
globally unique and assigned according to the Specification Required globally unique and assigned according to the Specification Required
policy described above, while options number 128-254 are "site policy described above, while options number 128-254 are "site
specific", i.e., Private Use. Dividing the name space up makes it specific", i.e., Private Use. Dividing the name space up makes it
possible to have different policies in place for different ranges. possible to have different policies in place for different ranges.
4. Registration maintenance 3.2. What To Put In Documents That Create A Registry
Registrations are a request for an assigned number, including the
related information needed to evaluate and document the request. Even
after a number has been assigned, some types of registrations contain
additional information that may need to be updated over time. For
example, mime types, character sets, language tags, etc. typically
include more information than just the registered value itself.
Example information can include point of contact information,
security issues, pointers to updates, literature references, etc. In
such cases, the document must clearly state who is responsible for
maintaining and updating a registration. It is appropriate to:
- Let the author update the registration, subject to the same
constraints and review as with new registrations.
- Allow some mechanism to attach comments to the registration, for
cases where others have significant objections to claims in a
registration, but the author does not agree to change the
registration.
- Designate the IESG or another authority as having the right to
reassign ownership of a registration. This is mainly to get
around the problem when some registration owner cannot be
reached in order to make necessary updates.
5. What To Put In Documents
The previous sections presented some issues that should be considered The previous sections presented some issues that should be considered
in formulating a policy for assigning well-known numbers and other in formulating a policy for assigning well-known numbers and other
protocol constants. It is the Working Group and/or document author's protocol constants. It is the Working Group and/or document authorどヨs
job to formulate an appropriate policy and specify it in the job to formulate an appropriate policy and specify it in the
appropriate document. In almost all cases, having an explicit "IANA appropriate document. In almost all cases, having an explicit "IANA
Considerations" section is appropriate. The following subsections Considerations" section is appropriate. The following subsections
define what is needed for the different types of IANA actions. define what is needed for the different types of IANA actions.
5.1. When There Are No IANA Actions
Before an Internet-Draft can be published as an RFC, IANA needs to
know what actions (if any) it needs to perform. Experience has shown
that it is not always immediately obvious whether a document has no
IANA actions, without reviewing a document in some detail. In order
to make it clear to IANA that it has no actions to perform (and that
the author has consciously made such a determination!), such docu-
ments should include an IANA Considerations section that states:
This document has no IANA Actions.
5.2. Requesting Assignments From an Existing Name Space
Often, a document requests the assignment of a code point from an
already existing name space (i.e., one created by a previously-pub-
lished RFC). In such cases documents should make clear:
- From what name space is a value is being requested? List the exact
name space listed on the IANA web page (and RFC), and cite the RFC
where the name space is defined. (Note: There is no need to men-
tion what the allocation policy for new assignments is, as that
should be clear from the references.)
- For each value being requested, give it a unique name, e.g., TBD1,
TBD2, etc. Throughout the document where the actual IANA-assigned
value should be filled in, use "TDBx" notation. This helps ensure
that the final RFC has the correct assigned value filled in in all
of the relevant places where the value is listed in the final doc-
ument.
- Normally, the values to be used are chosen by IANA; documents
shouldn't pick values themselves. However, in some cases a value
may have been used for testing or in early implementations. In
such cases, it is acceptable to include text suggesting what spe-
cific value should be used (e.g., include the text "the value XXX
is suggested"). However, it should be noted that suggested values
are just that; IANA will attempt to assign them, but may find that
impossible, if the proposed number has already been assigned for
some other use.
- The IANA Considerations section should summarize all of the IANA
actions, with pointers to the relevant sections as appropriate.
When multiple values are requested, it is generally helpful to
include a summary table.
As an example, the following text could be used to request assignment
of a DHCPv6 option number:
IANA has assigned an option code value of TBD1 to the DNS Recur-
sive Name Server option and an option code value of TBD2 to the
Domain Search List option from the DHCP option code space defined
in section 24.3 of RFC 3315.
5.3. Creation of New Registries
Documents that create a new name space (or modify the definition of Documents that create a new name space (or modify the definition of
an existing space) and that expect the IANA to play a role in main- an existing space) and that expect the IANA to play a role in
taining that space (e.g., serving as a repository for registered val- maintaining that space (e.g., serving as a repository for registered
ues) MUST provide clear instructions on details of the name space. In values) MUST provide clear instructions on details of the name space.
particular, instructions MUST include: In particular, instructions MUST include:
1) The name of the registry being created and/or maintained. The 1) The name of the registry being created and/or maintained. The
name will appear on the IANA web page and will be refered to in name will appear on the IANA web page and will be referred to in
future Internet Drafts that need to allocate a value from the future documents that need to allocate a value from the new
new space. space. The full name (and abbreviation, if appropriate) should
be provided.
2) What information must be provided in order to assign a new 2) What information must be provided in order to assign a new
value. value.
3) The process through which future assignments are made (see Sec- 3) The process through which future assignments are made (see
tion 3). Section 3.1).
Note: When a Designated Expert is used, documents MUST NOT name Note: When a Designated Expert is used, documents MUST NOT name
the Designated Expert in the document itself; instead, the name the Designated Expert in the document itself; instead, the name
should be relayed to the appropriate IESG Area Director at the should be relayed to the appropriate IESG Area Director at the
time the document is sent to the IESG for approval. time the document is sent to the IESG for approval.
If the request should also be reviewed on a specific public If the request should also be reviewed on a specific public
mailing list (such as the ietf-types@iana.org for media types), mailing list (such as the ietf-types@iana.org for media types),
that mailing address should be specified. Note, however, that that mailing address should be specified. Note, however, that
use of a Designated Expert MUST also be specified. use of a Designated Expert MUST also be specified.
If the IANA is expected to make assignments without requiring an If the IANA is expected to make assignments without requiring an
outside review, sufficient guidance MUST be provided so that the outside review, sufficient guidance MUST be provided so that the
requests can be evaluated with minimal subjectivity. requests can be evaluated with minimal subjectivity.
When specifying the process for making future assignments, it is When specifying the process for making future assignments, it is
quite acceptable to pick one of the example policies listed in Sec- quite acceptable to pick one of the example policies listed in
tion 3 and refer to it by name. Indeed, this is the preferred mecha- Section 3.1 and refer to it by name. Indeed, this is the preferred
nism in those cases where the sample policies provide the desired mechanism in those cases where the sample policies provide the
level of review. It is also acceptable to cite one of the above poli- desired level of review. It is also acceptable to cite one of the
cies and include additional guidelines for what kind of considera- above policies and include additional guidelines for what kind of
tions should be taken into account by the review process. For exam- considerations should be taken into account by the review process.
ple, RADIUS [RFC3575] specifies the use of a Designated Expert, but For example, RADIUS [RFC3575] specifies the use of a Designated
includes additional criteria the Designated Expert should follow. Expert, but includes additional criteria the Designated Expert should
follow.
For example, a document could say something like: For example, a document could say something like:
This document defines a new DHCP option, entitled "FooBar" (see This document defines a new DHCP option, entitled "FooBar" (see
Section y), assigned a value of TBD1 from the DCHP Option space Section y), assigned a value of TBD1 from the DCHP Option space
[RFCXXX]. The FooBar option also contains an 8-bit FooType [RFCXXX]. The FooBar option also contains an 8-bit FooType
field, for which IANA is to create and maintain a registry enti- field, for which IANA is to create and maintain a registry
tled "FooType values". Initial values for FooType field are entitled "FooType values". Initial values for FooType field are
given below; future assignments are to be made through Expert given below; future assignments are to be made through Expert
Review [IANA-CONSIDERATIONS]. Assignments consist of a name and Review [IANA-CONSIDERATIONS]. Assignments consist of a name and
the value. the value.
Name Value Definition Name Value Definition
---- ----- ---------- ---- ----- ----------
Frobnitz 1 See Section y.1 Frobnitz 1 See Section y.1
NitzFrob 2 See Section y.2 NitzFrob 2 See Section y.2
For examples of documents that provide good and detailed guidance to For examples of documents that provide good and detailed guidance to
the IANA on the issue of assigning numbers, consult [MIME-REG, MIME- the IANA on the issue of assigning numbers, consult [MIME-REG, MIME-
LANG, RFC3757, RFC3749, RFC3575]. LANG, RFC3757, RFC3749, RFC3575].
6. Applicability to Past and Future RFCs 3.3. Updating Guidelines In Existing Registries
For all existing RFCs that either explicitly or implicitly rely on Updating the registration process for an existing name space is
the IANA to evaluate assignments without specifying a precise similar to that used when creating an new namespace. That is, a
evaluation policy, the IANA (in consultation with the IESG) will document is produced that makes reference to the existing namespace
continue to decide what policy is appropriate. Changes to existing and then provides detailed management guidelines for each registry.
policies can always be initiated through the normal IETF consensus Such documents are normally processed as BCPs [RFC1818].
process.
Any decisions made by the IANA can be appealed using the normal IETF Example documents that updated the guidelines for managing (then)
appeals process as outlined in Section 6.5 of [IETF-PROCESS]. pre-existing registries include: [RFC2929,RFC3228,RFC3575].
Specifically, appeals should be directed to the IESG, followed (if
necessary) by an appeal to the IAB. By virtue of the IAB's role as
overseer of IANA administration [RFC 1602], the IAB's decision is
final.
All future RFCs that either explicitly or implicitly rely on the IANA 4. Registering Values In An Existing Registry
to register or otherwise manage assignments MUST provide guidelines
for managing the name space. 4.1. What to Put In Documents When Registering Values
Often, a document requests the assignment of a code point from an
already existing name space (i.e., one created by a previously-pub-
lished RFC). In such cases documents should make clear:
- From what name space is a value is being requested? List the exact
name space listed on the IANA web page (and RFC), and cite the RFC
where the name space is defined. (Note: There is no need to men-
tion what the allocation policy for new assignments is, as that
should be clear from the references.)
- For each value being requested, give it a unique name. When the
value is numeric, use the notation: TBD1, TBD2, etc. Throughout
the document where an actual IANA-assigned value should be filled
in, use the "TDBx" notation. This helps ensure that the final RFC
has the correct assigned value filled in in all of the relevant
places where the value is listed in the final document. For values
that are text strings, a specific name can be suggested: IANA will
assign the name, unless it conflicts with a name already in use.
- Normally, the values to be used are chosen by IANA; documents
shouldnどヨt pick values themselves. However, in some cases a value
may have been used for testing or in early implementations. In
such cases, it is acceptable to include text suggesting what spe-
cific value should be used (e.g., include the text "the value XXX
is suggested"). However, it should be noted that suggested values
are just that; IANA will attempt to assign them, but may find that
impossible, if the proposed number has already been assigned for
some other use.
- The IANA Considerations section should summarize all of the IANA
actions, with pointers to the relevant sections as appropriate.
When multiple values are requested, it is generally helpful to
include a summary table.
As an example, the following text could be used to request assignment
of a DHCPv6 option number:
IANA has assigned an option code value of TBD1 to the DNS Recur-
sive Name Server option and an option code value of TBD2 to the
Domain Search List option from the DHCP option code space defined
in section 24.3 of RFC 3315.
4.2. Maintaining Registrations
Registrations are a request for an assigned number, including the
related information needed to evaluate and document the request. Even
after a number has been assigned, some types of registrations contain
additional information that may need to be updated over time. For
example, MIME types, character sets, language tags, etc. typically
include more information than just the registered value itself.
Example information can include point of contact information,
security issues, pointers to updates, literature references, etc. In
such cases, the document defining the namespace must clearly state
who is responsible for maintaining and updating a registration. It is
appropriate to:
- Let the author update the registration, subject to the same
constraints and review as with new registrations.
- Allow some mechanism to attach comments to the registration, for
cases where others have significant objections to claims in a
registration, but the author does not agree to change the
registration.
- Designate the IESG or another authority as having the right to
reassign ownership of a registration. This is mainly to get
around the problem when some registration owner cannot be
reached in order to make necessary updates.
4.3. Overriding Registration Procedures
[XXX: following is new text w.r.t. 2434. Is this something that is [XXX: following is new text w.r.t. 2434. Is this something that is
appropriate to include??] appropriate to include??]
Since RFC 2434 was published, experience has shown that the Since RFC 2434 was published, experience has shown that the
documented IANA considerations for individual protocols do not always documented IANA considerations for individual protocols do not always
adequately cover the reality on the ground. For example, many older adequately cover the reality on the ground. For example, many older
routing protocols do not have documented, detailed IANA routing protocols do not have documented, detailed IANA
considerations. In addition, documented IANA considerations are considerations. In addition, documented IANA considerations are
sometimes found to be too stringent to allow even working group sometimes found to be too stringent to allow even working group
documents (for which there is strong consensus) to obtain code points documents (for which there is strong consensus) to obtain code points
from IANA in advance of actual RFC publication. In other cases, the from IANA in advance of actual RFC publication. In other cases, the
documented procedures are unclear or neglected to cover all the documented procedures are unclear or neglected to cover all the
cases. In order to allow assignments in individual cases where there cases. In order to allow assignments in individual cases where there
is strong IETF consensus that an allocation should go forward, but is strong IETF consensus that an allocation should go forward, but
the documented procedures do not support such an assignment, the IESG the documented procedures do not support such an assignment, the IESG
is granted authority to approve assignments in such cases. The is granted authority to approve assignments in such cases. The
intention is not to overule documented procedures, or to obviate the intention is not to overrule documented procedures, or to obviate the
need for protocols to properly document their IANA Considerations, need for protocols to properly document their IANA Considerations,
but to permit assignments in individual cases where it is obvious but to permit assignments in individual cases where it is obvious
that the assignment should just be made, but updating the IANA that the assignment should just be made, but updating the IANA
process just to assign a particular code point is viewed as too heavy process just to assign a particular code point is viewed as too heavy
a burden. a burden. In general, the IETF would like to see deficient IANA
registration procedures for a namespace revised through the IETF
standards process.
7. Security Considerations 5. Miscellaneous Issues
5.1. When There Are No IANA Actions
Before an Internet-Draft can be published as an RFC, IANA needs to
know what actions (if any) it needs to perform. Experience has shown
that it is not always immediately obvious whether a document has no
IANA actions, without reviewing a document in some detail. In order
to make it clear to IANA that it has no actions to perform (and that
the author has consciously made such a determination!), such
documents should include an IANA Considerations section that states:
This document has no IANA Actions.
5.2. Appeals
Appeals on registration decisions made by the IANA can be appealed to
the IESG using the normal IETF appeals process as outlined in Section
6.5 of [IETF-PROCESS]. Specifically, appeals should be directed to
the IESG, followed (if necessary) by an appeal to the IAB. By virtue
of the IABどヨs role as overseer of IANA administration [RFC 1602], the
IABどヨs decision is final.
5.3. Namespaces Lacking Documented Guidance
For all existing RFCs that either explicitly or implicitly rely on
the IANA to evaluate assignments without specifying a precise
evaluation policy, the IANA (in consultation with the IESG) will
continue to decide what policy is appropriate. Changes to existing
policies can always be initiated through the normal IETF consensus
process.
All future RFCs that either explicitly or implicitly rely on the IANA
to register or otherwise manage assignments MUST provide guidelines
for managing the name space.
6. Security Considerations
Information that creates or updates a registration needs to be Information that creates or updates a registration needs to be
authenticated. authenticated.
Information concerning possible security vulnerabilities of a Information concerning possible security vulnerabilities of a
protocol may change over time. Likewise, security vulnerabilities protocol may change over time. Likewise, security vulnerabilities
related to how an assigned number is used (e.g., if it identifies a related to how an assigned number is used (e.g., if it identifies a
protocol) may change as well. As new vulnerabilities are discovered, protocol) may change as well. As new vulnerabilities are discovered,
information about such vulnerabilities may need to be attached to information about such vulnerabilities may need to be attached to
existing registrations, so that users are not mislead as to the true existing registrations, so that users are not mislead as to the true
skipping to change at page 13, line 5 skipping to change at page 14, line 27
An analysis of security issues is required for all parameters (data An analysis of security issues is required for all parameters (data
types, operation codes, keywords, etc.) used in IETF protocols or types, operation codes, keywords, etc.) used in IETF protocols or
registered by the IANA. All descriptions of security issues must be registered by the IANA. All descriptions of security issues must be
as accurate as possible regardless of level of registration. In as accurate as possible regardless of level of registration. In
particular, a statement that there are "no security issues associated particular, a statement that there are "no security issues associated
with this type" must not given when it would be more accurate to with this type" must not given when it would be more accurate to
state that "the security issues associated with this type have not state that "the security issues associated with this type have not
been assessed". been assessed".
8. Changes Relative to RFC 2434 7. Changes Relative to RFC 2434
TBD Changes include:
8.1. Changes Relative to -00 - Major reordering of text to group the "creation of registries"
text in same section, etc.
- Numerous editorial changes to improve readability.
- Change "IETF Consensus" term to "IETF Review" and added more
clarifications.
- Added "RFC Required" to list of defined policies.
- Much more explicit directions and examples of "what to put in
RFCs".
- no doubt other things...
7.1. Changes Relative to -00
- Revised Section 5.3 to try and make it even more clear. - Revised Section 5.3 to try and make it even more clear.
8. IANA Considerations
This document is all about IANA Considerations.
9. Acknowledgments 9. Acknowledgments
From RFC 2434: From RFC 2434:
Jon Postel and Joyce Reynolds provided a detailed explanation on what Jon Postel and Joyce Reynolds provided a detailed explanation on what
the IANA needs in order to manage assignments efficiently, and the IANA needs in order to manage assignments efficiently, and
patiently provided comments on multiple versions of this document. patiently provided comments on multiple versions of this document.
Brian Carpenter provided helpful comments on earlier versions of the Brian Carpenter provided helpful comments on earlier versions of the
document. One paragraph in the Security Considerations section was document. One paragraph in the Security Considerations section was
borrowed from [MIME-REG]. borrowed from [MIME-REG].
skipping to change at page 14, line 35 skipping to change at page 16, line 30
Synchronization Protocol (SCSP)", RFC 2334, April Synchronization Protocol (SCSP)", RFC 2334, April
1998. 1998.
[SMTP-EXT] Klensin, J., Freed, N., Rose, M., Stefferud, E. and D. [SMTP-EXT] Klensin, J., Freed, N., Rose, M., Stefferud, E. and D.
Crocker, "SMTP Service Extensions", RFC 1869, Crocker, "SMTP Service Extensions", RFC 1869,
November 1995. November 1995.
[VENDOR-EXT] "Considerations on the Extensibility of IETF protocols", [VENDOR-EXT] "Considerations on the Extensibility of IETF protocols",
draft-iesg-vendor-extensions-02.txt draft-iesg-vendor-extensions-02.txt
[RFC1818] Best Current Practices. J. Postel, T. Li, Y. Rekhter.
August 1995.
[RFC2929] Domain Name System (DNS) IANA Considerations. D. Eastlake
3rd, E. Brunner-Williams, B. Manning. September
2000.
[RFC3228] IANA Considerations for IPv4 Internet Group Management
Protocol (IGMP). B. Fenner. February 2002.
[RFC3575] IANA Considerations for RADIUS (Remote Authentication Dial [RFC3575] IANA Considerations for RADIUS (Remote Authentication Dial
In User Service). B. Aboba. RFC 3575, July 2003. In User Service). B. Aboba. RFC 3575, July 2003.
11. Authors' Addresses [RFC3978] IETF Rights in Contributions. S. Bradner, Ed.. March 2005.
[RFC3575] IANA Considerations for RADIUS (Remote Authentication Dial
In User Service). B. Aboba. July 2003.
[RFC3748] Extensible Authentication Protocol (EAP). B. Aboba, L.
Blunk, J. Vollbrecht, J. Carlson, H. Levkowetz,
Ed.. June 2004.
[RFC3932] The IESG and RFC Editor Documents: Procedures. H.
Alvestrand. October 2004.
11. Authorsどヨ Addresses
Thomas Narten Thomas Narten
IBM Corporation IBM Corporation
3039 Cornwallis Ave. 3039 Cornwallis Ave.
PO Box 12195 - BRQA/502 PO Box 12195 - BRQA/502
Research Triangle Park, NC 27709-2195 Research Triangle Park, NC 27709-2195
Phone: 919-254-7798 Phone: 919-254-7798
EMail: narten@us.ibm.com EMail: narten@us.ibm.com
Harald Tveit Alvestrand Harald Tveit Alvestrand
Cisco Systems Cisco Systems
5245 Arboretum Dr 5245 Arboretum Dr
Los Altos, CA Los Altos, CA
USA USA
Email: Harald@Alvestrand.no Email: Harald@Alvestrand.no
Intellectual Property Statement Intellectual Property Statement
The IETF takes no position regarding the validity or scope of any The IETF takes no position regarding the validity or scope of any
Intellectual Property Rights or other rights that might be claimed to Intellectual Property Rights or other rights that might be claimed to
pertain to the implementation or use of the technology described in pertain to the implementation or use of the technology described in
this document or the extent to which any license under such rights this document or the extent to which any license under such rights
might or might not be available; nor does it represent that it has might or might not be available; nor does it represent that it has
made any independent effort to identify any such rights. Information made any independent effort to identify any such rights. Information
on the procedures with respect to rights in RFC documents can be on the procedures with respect to rights in RFC documents can be
found in BCP 78 and BCP 79. found in BCP 78 and BCP 79.
Copies of IPR disclosures made to the IETF Secretariat and any assur- Copies of IPR disclosures made to the IETF Secretariat and any
ances of licenses to be made available, or the result of an attempt assurances of licenses to be made available, or the result of an
made to obtain a general license or permission for the use of such attempt made to obtain a general license or permission for the use of
proprietary rights by implementers or users of this specification can such proprietary rights by implementers or users of this
be obtained from the IETF on-line IPR repository at specification can be obtained from the IETF on-line IPR repository at
http://www.ietf.org/ipr. http://www.ietf.org/ipr.
The IETF invites any interested party to bring to its attention any The IETF invites any interested party to bring to its attention any
copyrights, patents or patent applications, or other proprietary copyrights, patents or patent applications, or other proprietary
rights that may cover technology that may be required to implement rights that may cover technology that may be required to implement
this standard. Please address the information to the IETF at ietf- this standard. Please address the information to the IETF at ietf-
ipr@ietf.org. ipr@ietf.org.
Disclaimer of Validity Disclaimer of Validity
This document and the information contained herein are provided on an This document and the information contained herein are provided on an
"AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET
ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED, ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED,
INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFOR- INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE
MATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
Copyright Statement Copyright Statement
Copyright (C) The Internet Society (2004). This document is subject Copyright (C) The Internet Society (2005).
to the rights, licenses and restrictions contained in BCP 78, and
except as set forth therein, the authors retain all their rights. This document is subject to the rights, licenses and restrictions
contained in BCP 78, and except as set forth therein, the authors
retain all their rights.
This document and the information contained herein are provided on an
"AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET
ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED,
INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE
INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
 End of changes. 61 change blocks. 
214 lines changed or deleted 318 lines changed or added

This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/