Authors,

While reviewing this document during AUTH48, please resolve (as necessary) the 
following questions, which are also in the XML file.

1) <!--[rfced] To more closely match the document title, we updated the short 
title that spans the header of the PDF file as follows. Please
let us know of any objections.

Original:

   ipn-updates

Current:

   ipn Updates

-->


2) <!--[rfced] Edward, we understand that in other RFCs (RFCs 9171, 9172,
and 9173), your preference was to list your name as "E. Birrane, III" 
on the first page and "Edward J. Birrane, III" in the Authors' 
Addresses section. Please let us know if you would you like to do the 
same in this document for consistency.

-->


3) <!-- [rfced] Throughout the document, specific terms and section
titles are linked/referenced. To help the reader differentiate
between the two, we added quote marks to the section titles;
however, please consider if removing the section titles and
providing links to the section numbers only would be helpful 
for ease of reading and to avoid any confusion. For example:

Current (with terms and section titles/numbers linked):

   Both LocalNode (Section 3.4.2) and Private Use (Section 3.4.3) ipn
   URIs present a risk to the stability of deployed BPv7 networks...

   See "LocalNode ipn EIDs" (Section 5.4) and "Private Use ipn EIDs"
   (Section 5.5) for required behaviors to mitigate against this form of
   abuse.

Perhaps (with terms and section numbers linked):

   Both LocalNode (Section 3.4.2) and Private Use (Section 3.4.3) ipn
   URIs present a risk to the stability of deployed BPv7 networks...

   See Sections 5.4 and 5.5 for required behaviors to mitigate against
   this form of abuse. 

-->


4) <!-- [rfced] FYI - For readability, we have updated the text below as a
bulleted list. Please review and let us know any objections.

Original:

  Specifically, this document
  introduces a hierarchical structure for the assignment of ipn scheme
  URIs, clarifies the behavior and interpretation of ipn scheme URIs,
  defines efficient encodings of ipn scheme URIs, and updates/defines
  the registries associated for this scheme.

Current:

   Specifically, this document:

   *  introduces a hierarchical structure for the assignment of ipn
      scheme URIs,

   *  clarifies the behavior and interpretation of ipn scheme URIs,

   *  defines efficient encodings of ipn scheme URIs, and

   *  updates/defines the registries associated with this scheme.

-->


5) <!-- [rfced] Is "range" meant to be singular (option A) or plural
(option B) in the text below?

Original:

   If a system does not require interoperable deployment of ipn scheme
   URIs, then the Private Use Node Numbers (Section 3.4.3) range,
   reserved by the Default Allocator (Section 3.2.2) for this purpose,
   are to be used.

Perhaps A:

   If a system does not require interoperable deployment of ipn scheme
   URIs, then the Private Use Node Numbers (Section 3.4.3) range,
   reserved by the Default Allocator (Section 3.2.2) for this purpose,
   is to be used.

or

Perhaps B:

   If a system does not require interoperable deployment of ipn scheme
   URIs, then a range of Private Use Node Numbers (Section 3.4.3),
   reserved by the Default Allocator (Section 3.2.2) for this purpose,
   are to be used.
-->


6) <!-- [rfced] For ease of the reader, we have broken up the text
below. Please review.

Original:

   Rather than assigning unique Allocator Identifiers to each sub-
   organization on a first-come first-served basis, there are
   operational benefits in assigning Allocator Identifiers to such an
   organization in a structured way so that an external observer can
   detect that a group of Allocator Identifiers are organizationally
   associated.

Current:

   Rather than assigning unique Allocator Identifiers to each sub-
   organization on a first-come, first-served basis, there are operational
   benefits in assigning Allocator Identifiers to such an organization in a
   structured way. This allows an external observer to detect
   that a group of Allocator Identifiers is organizationally associated.

-->


7) <!--[rfced] FYI - In all of the tables, we have aligned the content to
the left (instead of centering some columns) for consistency
and easy reading. If this is not preferred, please let us know.

-->       


8) <!-- [rfced] May we clarify what specifications the following text refers to
and also rework the last sentence to make clear that an RFC (rather than a
protocol) defines this registry?

Original:

   The IRTF BPv6 experimental specification termed the logical source or
   destination of a bundle as an "Endpoint" identified by an "Endpoint
   Identifier" (EID). BPv6 EIDs are formatted as URIs.  This definition and
   representation of EIDs was carried forward from the IRTF BPv6 specification
   to the IETF BPv7 specification.  BPv7 additionally defined an IANA registry
   called the "Bundle Protocol URI Scheme Types" registry...

Perhaps:

   The IRTF BPv6 experimental specification [RFC5050] termed the logical
   source or destination of a bundle as an "Endpoint" identified by an
   "Endpoint Identifier" (EID). BPv6 EIDs are formatted as URIs.  This
   definition and representation of EIDs was carried forward from the IRTF
   BPv6 specification [RFC5050] to the IETF BPv7 specification [RFC9171].
   [RFC9171] additionally defined an IANA registry called the "Bundle Protocol
   URI Scheme Types" registry...

-->


9) <!-- [rfced] In the instances below, does "security source" read as redundant
after "Bundle Protocol Security"? 

Original:

   For example, a LocalNode ipn EID MUST NOT be used as a Bundle
   Protocol Security [RFC9172] security source for a bundle
   transmitted from the local bundle node, because such a source EID
   would have no meaning at a downstream bundle node.

   For example, a Private Use ipn EID MUST NOT be used as a Bundle Protocol
   Security [RFC9172] security source for a bundle, when the bundle is
   destined for a different administrative domain.

Perhaps:

   For example, a LocalNode ipn EID MUST NOT be used as a 
   source of Bundle Protocol Security (BPSec) [RFC9172] for a bundle
   transmitted from the local bundle node, because such a source EID 
   would have no meaning at a downstream bundle node.

   For example, a Private Use ipn EID MUST NOT be used as a source of 
   BPSec [RFC9172] for a bundle when the bundle is destined for a 
   different administrative domain.

-->


10) <!--[rfced] In Section 6.1.1 and Appendix B.2, "# 2 Element ipn EID
scheme-specific encoding" is 1 character over the 72-character
limit.  Please let us know how you would like to update the
spacing within the sourcecode figures.

Current
Section 6.1.1:
   82                        # 2-Element Endpoint Encoding
      02                     # uri-code: 2 (IPN URI scheme)
      82                     # 2 Element ipn EID scheme-specific encoding
         1B 000EE86800000064 # Fully-Qualified Node Number
         01                  # Service Number

Appendix B.1:
   82                        # 2-Element Endpoint Encoding
      02                     # uri-code: 2 (IPN URI scheme)
      82                     # 2 Element ipn EID scheme-specific encoding
         1B 000EE86800000001 # Fully-Qualified Node Number
         01                  # Service Number

-->


11) <!-- [rfced] FYI - We have adjusted the text below to read as a numbered
list. Please review and let us know any objections.

Original:

   In the three-element scheme-specific encoding of an ipn EID, the
   first element of the array is the Allocator Identifier, the second
   element of the array is the Node Number, and the third element of the
   array is the Service Number.

Current:

   In the three-element scheme-specific encoding of an ipn EID:

   1.  the first element of the array is the Allocator Identifier,

   2.  the second element of the array is the Node Number, and

   3.  the third element of the array is the Service Number.

-->


12) <!-- [rfced] In the text below, should "such as the use of" read as "such as
with the use of"?

Original:
  
   In both cases (and indeed in all bundle processing), the node that
   receives a bundle should verify its authenticity and validity
   before operating on it in any way, such as the use of BPSec
   [RFC9172], and TCPCLv4 with TLS [RFC9174].

Perhaps:

   In both cases (and indeed in all bundle processing), the node that
   receives a bundle should verify its authenticity and validity
   before operating on it in any way, such as with the use of BPSec
   [RFC9172] and TCP Convergence Layer version 4 (TCPCLv4) with TLS
   [RFC9174].

-->


13) <!-- [rfced] We have included some specific questions about the IANA
text below. In addition to responding to those questions, please
review all of the IANA-related updates carefully and let us know
if any further updates are needed. Note that the registries can be 
viewed at <https://www.iana.org/assignments/uri-schemes/>.

a.) We note different capitalization and use of quotation marks around
"Private Use" in the running text. We have removed the quote marks for 
consistency as the policies of RFC 8126 usually appear as uppercase 
without quote marks. 

b.) The registration procedures in Table 4 do not match the registration 
procedures for the "'ipn' Scheme URI Default Allocator Node Numbers" 
registry. We updated the reference entries accordingly (see Tables 4 and 5).
Please review and let us know if any further changes are needed.

c.) FYI: We have made "Well-Known" uppercase in the "'ipn' Scheme URI 
Well-Known Service Numbers for BPv7" registry name, and we will ask 
IANA to make this change prior to publication.

d.) We updated Tables 6 and 7 to match the "'ipn' Scheme URI
Well-Known Service Numbers for BPv7" registry. Please let us
know if any further changes are needed.

e.) In Tables 2, 4, and 6, we updated "Registration Policy" to 
"Registration Procedures" in the column headings to match the 
respective IANA registries. In the running text, may we update 
instances of "registration policies" to "registration procedures"
for consistency?

f.) In Tables 2, 4, 6, and 7, we assume that ">= 2^32" is the same as 
">=0x100000000" in the IANA registries. Are any changes desired in 
the document to make this consistent with the IANA registries, or will 
this variance be clear to readers?

i.) We note the following variances in the IANA registries. Should 
these be made consistent by replacing "greater than" with ">="?

 In the "'ipn' Scheme URI Allocator Identifiers" and "'ipn' Scheme URI 
 Default Allocator Node Numbers" registries:

    ">=0x100000000"

 In the "'ipn' Scheme URI Well-Known Service Numbers for BPv7" 
 registry:

    "greater than 0x100000000"

ii.) FYI: In Table 5, we replaced ">= 2^32" with ">=4294967296" 
("Invalid") to match the "'ipn' Scheme URI Default Allocator Node 
Numbers" registry. Please let us know if this is not correct.

-->


14) <!-- [rfced] Please review the following comments related to XML formatting:

a.) In the html and pdf outputs, the text enclosed in <tt> is output in
fixed-width font. In the txt output, there are no changes to the font, and the
quotation marks are removed. Please review carefully and let us know if the
output is acceptable or if any updates are needed.

b.) Please review each <artwork> element and let us know if any should be marked
as <sourcecode> (or another element) instead.

We have already updated several <artwork> elements to
<sourcecode>.  Please confirm these updates are correct and
whether the "type" attribute of any <sourcecode> element should be set and/or
has been set correctly.

The current list of preferred values for "type" is available at
<https://www.rfc-editor.org/rpc/wiki/doku.php?id=sourcecode-types>.
If the current list does not contain an applicable type, feel free to
suggest additions for consideration. Note that it is also acceptable
to leave the "type" attribute not set.

c.) Please review whether the note in Section 6.3 should be in the 
<aside> element. It is defined as "a container for content that is 
semantically less important or tangential to the content that 
surrounds it" (https://authors.ietf.org/en/rfcxml-vocabulary#aside).
-->


15) <!-- [rfced] Errata exist for both RFCs 7116 and 9171. Please review the
errata for these RFCs and confirm that none are relevant to the content
of this document:

  RFC 7116: <https://www.rfc-editor.org/errata_search.php?rfc=7116>
  RFC 9171: <https://www.rfc-editor.org/errata_search.php?rfc=9171> 

-->


16) <!-- [rfced] Please review the following questions and changes regarding the
terminology used in this document:

a.) In the RFC series, "Fully Qualified Domain Name (FQDN)" typically appears 
as uppercase without a hyphen. Would you like to remove the hyphen from
the expansion of "Fully-Qualified Node Number" for consistency with the series?

Additionally, after the first expansion of "FQNN", may we replace instances
of "Fully-Qualified Node Number" with the acronym (per guidance in
"Web Portion of the Style Guide" at 
<https://www.rfc-editor.org/styleguide/part2/#exp_abbrev>)?

b.) We note some variances with the terms below in the example schemes. Should 
any of the occurrences in the example schemes be updated for consistency 
(hyphen or no hyphen)?

  2 Element vs. 2-Element vs. 
  3 Element

One example (Appendix B.1):

   82                # 2-Element Endpoint Encoding
      02             # uri-code: 2 (IPN URI scheme)
      83             # 3 Element ipn EID scheme-specific encoding
         1A 000EE868 # Allocator Identifier
         01          # Node Number
         01          # Service Number


b.) We note different capitalization and quotation marks for 'null' and
Null in the instances below. Please let us know if/how may we update for 
consistency.

  Null ipn URI (term in IANA registry)
  5.2.  The Null Endpoint
  B.3.  The 'null' Endpoint

  'null' ipn URI
  'null' ipn EID 
  'null' endpoint
  'null' EID

c.) Would you like either double (") or single (') quotes to appear around 
ipn scheme? We note different usage across RFCs.

As used in this document:
 ipn URI scheme

As used in the IANA registry names:
 'ipn' scheme

Usage from RFC 6260:
 the "ipn" scheme

Usage from RFC 7116:
 'ipn' URI scheme


d.) We note different formatting of "0" as seen below. For consistency with
the rest of this document, should any of these instances be updated to 
"zero (0)" and should the <tt> tags be removed? (We note that "Default
Allocator" has a value of "0" in the "'ipn' Scheme URI Allocator
Identifiers" registry.)

   ... the least-significant N bits of the first Allocator Identifier MUST
   be all 0.
   
   ... a range of bit-length 0

   All leading <tt>0</tt> characters MUST be omitted. A single '<tt>0</tt>' 
   is valid.

   Consider the ipn URI identifying Service Number 2 on Node Number 1
   allocated by the Default Allocator (0) (Section 3.2.2).

   Consider the ipn EID ipn:1.1.  This textual representation of an ipn
   EID identifies Service Number 1 on Node Number 1 allocated by the
   Default Allocator (0) (Section 3.2.2).


e.) Because CBOR expands to Concise Binary Object Representation (CBOR), would
"CBOR representation" be redundant in the instances below?
 
   6.   CBOR representation of ipn URIs with BPv7 . . . . . . . .  15
   7.2. CBOR Representation Interoperability  . . . . . . . . . .  19
   CBOR representation (2 instances in the running text)

   
f.) FYI - We have added expansions for abbreviations upon first use
per Section 3.6 of RFC 7322 ("RFC Style Guide"). Please review each
expansion in the document carefully to ensure correctness.

  Concise Binary Object Representation (CBOR) 
  TCP Convergence Layer version 4 (TCPCLv4)

-->


17) <!-- [rfced] Please review the "Inclusive Language" portion of the online 
Style Guide <https://www.rfc-editor.org/styleguide/part2/#inclusive_language>
and let us know if any changes are needed.  Updates of this nature typically
result in more precise language, which is helpful for readers.

Note that our script did not flag any words in particular, but this should 
still be reviewed as a best practice. -->


Thank you.

RFC Editor/kf/kc



On Mar 19, 2025, at 6:20 PM, RFC Editor via auth48archive 
<auth48archive@rfc-editor.org> wrote:

*****IMPORTANT*****

Updated 2025/03/19

RFC Author(s):
--------------

Instructions for Completing AUTH48

Your document has now entered AUTH48.  Once it has been reviewed and 
approved by you and all coauthors, it will be published as an RFC.  
If an author is no longer available, there are several remedies 
available as listed in the FAQ (https://www.rfc-editor.org/faq/).

You and you coauthors are responsible for engaging other parties 
(e.g., Contributors or Working Group) as necessary before providing 
your approval.

Planning your review 
---------------------

Please review the following aspects of your document:

*  RFC Editor questions

  Please review and resolve any questions raised by the RFC Editor 
  that have been included in the XML file as comments marked as 
  follows:

  <!-- [rfced] ... -->

  These questions will also be sent in a subsequent email.

*  Changes submitted by coauthors 

  Please ensure that you review any changes submitted by your 
  coauthors.  We assume that if you do not speak up that you 
  agree to changes submitted by your coauthors.

*  Content 

  Please review the full content of the document, as this cannot 
  change once the RFC is published.  Please pay particular attention to:
  - IANA considerations updates (if applicable)
  - contact information
  - references

*  Copyright notices and legends

  Please review the copyright notice and legends as defined in
  RFC 5378 and the Trust Legal Provisions 
  (TLP – https://trustee.ietf.org/license-info).

*  Semantic markup

  Please review the markup in the XML file to ensure that elements of  
  content are correctly tagged.  For example, ensure that <sourcecode> 
  and <artwork> are set correctly.  See details at 
  <https://authors.ietf.org/rfcxml-vocabulary>.

*  Formatted output

  Please review the PDF, HTML, and TXT files to ensure that the 
  formatted output, as generated from the markup in the XML file, is 
  reasonable.  Please note that the TXT will have formatting 
  limitations compared to the PDF and HTML.


Submitting changes
------------------

To submit changes, please reply to this email using ‘REPLY ALL’ as all 
the parties CCed on this message need to see your changes. The parties 
include:

  *  your coauthors

  *  rfc-edi...@rfc-editor.org (the RPC team)

  *  other document participants, depending on the stream (e.g., 
     IETF Stream participants are your working group chairs, the 
     responsible ADs, and the document shepherd).

  *  auth48archive@rfc-editor.org, which is a new archival mailing list 
     to preserve AUTH48 conversations; it is not an active discussion 
     list:

    *  More info:
       
https://mailarchive.ietf.org/arch/msg/ietf-announce/yb6lpIGh-4Q9l2USxIAe6P8O4Zc

    *  The archive itself:
       https://mailarchive.ietf.org/arch/browse/auth48archive/

    *  Note: If only absolutely necessary, you may temporarily opt out 
       of the archiving of messages (e.g., to discuss a sensitive matter).
       If needed, please add a note at the top of the message that you 
       have dropped the address. When the discussion is concluded, 
       auth48archive@rfc-editor.org will be re-added to the CC list and 
       its addition will be noted at the top of the message. 

You may submit your changes in one of two ways:

An update to the provided XML file
— OR —
An explicit list of changes in this format

Section # (or indicate Global)

OLD:
old text

NEW:
new text

You do not need to reply with both an updated XML file and an explicit 
list of changes, as either form is sufficient.

We will ask a stream manager to review and approve any changes that seem
beyond editorial in nature, e.g., addition of new text, deletion of text, 
and technical changes.  Information about stream managers can be found in 
the FAQ.  Editorial changes do not require approval from a stream manager.


Approving for publication
--------------------------

To approve your RFC for publication, please reply to this email stating
that you approve this RFC for publication.  Please use ‘REPLY ALL’,
as all the parties CCed on this message need to see your approval.


Files 
-----

The files are available here:
  https://www.rfc-editor.org/authors/rfc9758.xml
  https://www.rfc-editor.org/authors/rfc9758.html
  https://www.rfc-editor.org/authors/rfc9758.pdf
  https://www.rfc-editor.org/authors/rfc9758.txt

Diff file of the text:
  https://www.rfc-editor.org/authors/rfc9758-diff.html
  https://www.rfc-editor.org/authors/rfc9758-rfcdiff.html (side by side)

Diff of the XML: 
  https://www.rfc-editor.org/authors/rfc9758-xmldiff1.html


Tracking progress
-----------------

The details of the AUTH48 status of your document are here:
  https://www.rfc-editor.org/auth48/rfc9758

Please let us know if you have any questions.  

Thank you for your cooperation,

RFC Editor

--------------------------------------
RFC9758 (draft-ietf-dtn-ipn-update-14)

Title            : Update to the ipn URI scheme
Author(s)        : R. Taylor, E. Birrane
WG Chair(s)      : Edward J. Birrane, Rick Taylor
Area Director(s) : Erik Kline, Éric Vyncke


-- 
auth48archive mailing list -- auth48archive@rfc-editor.org
To unsubscribe send an email to auth48archive-le...@rfc-editor.org

-- 
auth48archive mailing list -- auth48archive@rfc-editor.org
To unsubscribe send an email to auth48archive-le...@rfc-editor.org

Reply via email to