Authors,

This is a friendly reminder that we await your replies to our questions as well 
as the separate email on 10/28/25 regarding IANA. 

The files are available here:
 https://www.rfc-editor.org/authors/rfc9897.xml
 https://www.rfc-editor.org/authors/rfc9897.html
 https://www.rfc-editor.org/authors/rfc9897.pdf
 https://www.rfc-editor.org/authors/rfc9897.txt

Diff file of the text:
 https://www.rfc-editor.org/authors/rfc9897-diff.html
 https://www.rfc-editor.org/authors/rfc9897-rfcdiff.html (side by side)

Diff of the XML: 
 https://www.rfc-editor.org/authors/rfc9897-xmldiff1.html


Best regards,

Karen Moore
RFC Production Center

> On Oct 27, 2025, at 11:01 PM, [email protected] wrote:
> 
> Authors,
> 
> While reviewing this document during AUTH48, please resolve (as necessary) 
> the following questions, which are also in the source file.
> 
> 1) <!--[rfced] Please note that the title has been updated as
> follows. The abbreviation has been expanded per Section 3.6 of
> RFC 7322 ("RFC Style Guide"). Please review.
> 
> Original:
>   DCCP Extensions for Multipath Operation with Multiple Addresses
> 
> Current:
>   Datagram Congestion Control Protocol (DCCP) Extensions for 
>   Multipath Operation with Multiple Addresses
> -->
> 
> 
> 2) <!-- [rfced] Please insert any keywords (beyond those that appear in
> the title) for use on https://www.rfc-editor.org/search. -->
> 
> 
> 3) <!--[rfced] Please clarify what "This" refers to in the following
> sentence - is it "These fundamentals"?
> 
> Current:
>   This also applies to the DCCP sequencing scheme, which is
>   packet-based (Section 4.2 of [RFC4340]) and the principles for loss
>   and retransmission of features as described in more detail in
>   Section 6.6.3 of [RFC4340].
> 
> Perhaps:
>   These fundamentals also apply to the DCCP sequencing scheme, which is
>   packet-based (Section 4.2 of [RFC4340]), and to the principles for
>   loss and retransmission of features as described in more detail in
>   Section 6.6.3 of [RFC4340].
> -->
> 
> 
> 4) <!--[rfced] Please clarify the latter part of this sentence,
> specifically "between" and the slash ("/"). Is the intended
> meaning that hybrid access networks combine access between the
> user equipment "or" residential gateway "and" an operator network
> (option A) or is it between the user equipment "and" a
> residential gateway within an operator network (option B)?
> 
> Original:
>   In addition to the integration into DCCP services, implementers or
>   future specification could choose MP-DCCP for other use cases like
>   3GPP 5G multi-access solutions (e.g., Access Traffic Steering,
>   Switching, and Splitting (ATSSS) specified in [TS23.501]) or hybrid
>   access networks that either combine a 3GPP and a non-3GPP access or a
>   fixed and cellular access between user-equipment/residential gateway
>   and operator network. 
> 
> Perhaps A:
>   In addition to the integration into DCCP services, implementers or
>   future specifications could choose MP-DCCP for other use cases such
>   as 3GPP 5G multi-access solutions (e.g., Access Traffic Steering,
>   Switching, and Splitting (ATSSS) as specified in [TS23.501]) or
>   hybrid access networks that combine either 3GPP and non-3GPP access
>   or fixed and cellular access between the user equipment or
>   residential gateway and an operator network.
> 
> or
> Perhaps B:
>   In addition to the integration into DCCP services, implementers or
>   future specifications could choose MP-DCCP for other use cases such
>   as 3GPP 5G multi-access solutions (e.g., Access Traffic Steering,
>   Switching, and Splitting (ATSSS) as specified in [TS23.501]) or
>   hybrid access networks that combine either 3GPP and non-3GPP access
>   or fixed and cellular access between the user equipment and
>   residential gateway within an operator network.
> -->
> 
> 
> 5) <!--[rfced] Section 3.1: Would you like to add text to introduce
> the numbered list that immediately follows Figure 4?
> 
> Original:
>   1.  The Client indicates support for both MP-DCCP versions 1 and 0,
>       with a preference for version 1.
> 
>   2.  Server agrees on using MP-DCCP version 1 indicated by the first
>       value, and supplies its own preference list with the following
>       values.
> 
>   3.  MP-DCCP is then enabled between the Client and Server with
>       version 1.
> 
> Perhaps:
>  This example illustrates the following:
> 
>   1.  The Client indicates support for both MP-DCCP versions 1 and 0,
>       with a preference for version 1.
> 
>   2.  The Server agrees on using MP-DCCP version 1 indicated by the first
>       value and supplies its own preference list with the following
>       values.
> 
>   3.  MP-DCCP is then enabled between the Client and Server with
>       version 1.
> -->
> 
> 
> 6) <!--[rfced] Table 4: May we update these IANA-registered descriptions as 
> follows for clarity? If so, we will ask IANA to update the registry 
> accordingly. (Also, they will be updated in Table 8.)
> 
> Original:
> MP_OPT=7  MP_ADDADDR     Advertise additional address(es)/port(s)
> MP_OPT=8  MP_REMOVEADDR  Remove address(es)/port(s)
> 
> Perhaps:
> MP_OPT=7  MP_ADDADDR     Advertise one or more additional addresses/ports
> MP_OPT=8  MP_REMOVEADDR  Remove one or more addresses/ports
> -->
> 
> 
> 7) <!--[rfced] May we rephrase this sentence for improved readability?
> 
> Original:
>   This could happen if a datagram with MP_PRIO and a first MP_SEQ_1
>   and another datagram with MP_ADDADDR and a second MP_SEQ_2 are
>   received in short succession.
> 
> Perhaps:
>   This could happen if the following are received in short
>   succession: a datagram with MP_PRIO and a first MP_SEQ_1 and
>   another datagram with MP_ADDADDR and a second MP_SEQ_2.
> -->
> 
> 
> 8) <!--[rfced] Figure Titles
> 
> a) Should the titles of Figures 7 and 8 include "MP_CONFIRM"
> (instead of "MP-DCCP CONFIRM") to match the content in the
> figures?
> 
> Note that the running text refers to the procedure as "MP-DCCP
> confirm" - should the running text be updated as well for consistency?
> Please let us know if "MP_CONFIRM", "MP-DCCP CONFIRM", or other is 
> preferred.
> 
> Current (Figure 7):
>   Example MP-DCCP CONFIRM Procedure 
> 
> Perhaps:
>   Example MP_CONFIRM Procedure
> 
> ...
> Current (Figure 8)
>   Example MP-DCCP CONFIRM Procedure with an Outdated Suboption
> 
> Perhaps:
>   Example MP_CONFIRM Procedure with an Outdated Suboption
> 
> 
> b) Should the title of Figure 22 perhaps be "Example MP_ADDADDR
> Procedure" rather than "Example MP-DCCP ADDADDR Procedure" to match
> the content in the figure? We note that "MP-DCCP ADDADDR" is not used
> in the running text.
> 
> Current:
>   Example MP-DCCP ADDADDR Procedure 
> 
> Perhaps:
>   Example MP_ADDADDR Procedure 
> 
> c) Should the title of Figure 23 perhaps be "Example MP_ADDADDR
> Procedure" rather than "Example MP-DCCP REMOVEADDR Procedure" to match
> the content in the figure? We note that "MP-DCCP REMOVEADDR" is not
> used in the running text.
> 
> Current:
>   Example MP-DCCP REMOVEADDR Procedure
> 
> Perhaps:
>   Example MP_REMOVEADDR Procedure
> -->
> 
> 
> 9) <!--[rfced] We note that Figures 9, 11, and 19 are listed first within
> their sections without any lead-in text. Is this intended, or
> would you like to add a lead-in sentence for consistency with the
> other sections?
> -->
> 
> 
> 10) <!--[rfced] Per RFCs 2119 and 8174, may we update "REQUIRES" to
> "REQUIRED" for correctness as shown below?
> 
> Original:
>   The MP_JOIN option is used to add a new subflow to an existing MP-
>   DCCP connection and REQUIRES a successful establishment of the first
>   subflow using MP_KEY.
> 
> Perhaps:
>   The MP_JOIN option is used to add a new subflow to an existing MP-
>   DCCP connection, and a successful establishment of the first
>   subflow using MP_KEY is REQUIRED.
> -->  
> 
> 
> 11) <!--[rfced] Please clarify this sentence, specifically "from the both
> hosts Key Data". 
> 
> Original:
>   Together with the derived key from the both hosts
>   Key Data described in Section 3.2.4, the Nonce value builds the basis
>   to calculate the HMAC used in the handshaking process as described in
>   Section 3.3 to avoid replay attacks.
> 
> Perhaps:
>   Together with the derived key from both hosts that exchange 
>   Key Data as described in Section 3.2.4, the Nonce value builds the basis
>   to calculate the Hash-based Message Authentication Code (HMAC) used in 
>   the handshaking process described in Section 3.3 to avoid replay attacks.
> 
> Or:
>   Together with the derived key from both hosts'
>   Key Data (as described in Section 3.2.4), the Nonce value builds the basis
>   to calculate the Hash-based Message Authentication Code (HMAC) used in the 
>   handshaking process (as described in Section 3.3) to avoid replay attacks.
> -->
> 
> 
> 12) <!--[rfced] In Section 3.2.6, the text refers to the
> "second and third step" of the handshake, so should the list 
> in Section 3.3 be an ordered list instead of a bulleted list as
> shown below?
> 
> Section 3.2.6:
>   In addition, it provides authentication for subflows joining an
>   existing MP_DCCP connection, as described in the second and third
>   step of the handshake of a subsequent subflow in Section 3.3.
> 
> Original (Section 3.3):
> The basic initial handshake for the first subflow is as follows:
> 
>   *  Host A sends a DCCP-Request with the MP-Capable feature Change
>      request and the MP_KEY option with a Host-specific CI-A and a KeyA
>      for each of the supported key types as described in Section 3.2.4.
>      CI-A is a unique identifier during the lifetime of an MP-DCCP
>      connection.
> 
>   *  Host B sends a DCCP-Response with Confirm feature for MP-Capable
>      and the MP_Key option with a unique Host-specific CI-B and a
>      single Host-specific KeyB.  The type of the key is chosen from the
>      list of supported types from the previous request.
> 
>   *  Host A sends a DCCP-Ack to confirm the proper key exchange.
> 
>   *  Host B sends a DCCP-Ack to complete the handshake and set both
>      connection ends to the OPEN state.
> 
> Perhaps (Section 3.3):
> The basic initial handshake for the first subflow is as follows:
> 
>   1. Host A sends a DCCP-Request with the MP-Capable feature change
>      request and the MP_KEY option with a Host-specific CI-A and a KeyA
>      for each of the supported key types as described in Section 3.2.4.
>      CI-A is a unique identifier during the lifetime of an MP-DCCP
>      connection.
> 
>   2. Host B sends a DCCP-Response with a Confirm feature for MP-Capable
>      and the MP_Key option with a unique Host-specific CI-B and a
>      single Host-specific KeyB.  The type of the key is chosen from the
>      list of supported types from the previous request.
> 
>   3. Host A sends a DCCP-Ack to confirm the proper key exchange.
> 
>   4. Host B sends a DCCP-Ack to complete the handshake and set both
>      connection ends to the OPEN state.
> -->
> 
> 
> 13) <!--[rfced] May we reword this sentence for better readability as
> shown below? Note that this sentence appears in Sections 3.2.8
> and 3.2.9.
> 
> Original:
>   In the same way as for MP_JOIN, the key for the HMAC algorithm, in
>   the case of the message transmitted by Host A, will be d-KeyA, and
>   in the case of Host B, d-KeyB.
> 
> Perhaps:
>   Similar to MP_JOIN, the key for the HMAC algorithm will be d-KeyA
>   when the message is transmitted by Host A and d-KeyB when
>   transmitted by Host B.
> -->
> 
> 
> 14) <!-- [rfced] FYI: For consistency with the other figures, we fixed the 
> bit ruler on Figure 18. (We extended the right side of the box by one
> space so that the placement of the final "1" is over the minus sign
> rather than the plus sign.) Please let us know if this is not accurate.
> -->
> 
> 
> 15) <!--[rfced] Section 3.2.10. Please confirm if "Cellular paths" should
> be singular in the first sentence below, as we note the singular
> form in the sentence that follows as well as in use cases #2 and #3.
> 
> Original:
>   1.  Setting Wi-Fi path to Primary and Cellular paths to Secondary.
>       In this case Wi-Fi will be used and Cellular will be used only
>       if the Wi-Fi path is congested or not available.
> 
> Perhaps:
>   1.  Setting the Wi-Fi path to Primary and Cellular path to Secondary.
>       In this case, Wi-Fi will be used and Cellular will be used only
>       if the Wi-Fi path is congested or not available.
> -->
> 
> 
> 16) <!--[rfced] Please clarify "and MUST be the appropriate one" - is
> "appropriate one" essential to the sentence, or could it be
> reworded as "the path MUST have the highest available priority
> value" as shown below?
> 
> Original:
>   In the case of path mobility (Section 3.11.1), only one path can be
>   used at a time and MUST be the appropriate one that has the highest
>   available priority value including also the prio numbers 1 and 2.
> 
> Perhaps:
>   In the case of path mobility (Section 3.11.1), only one path can be
>   used at a time, and the path MUST have the highest available
>   priority value that includes the prio numbers 1 and 2.
> -->
> 
> 
> 17) <!--[rfced] Please clarify "in by"; is the intended meaning included
> "in" or "by" the MP_CLOSE option? Also, should the second "must"
> be "MUST"?
> 
> Original:
>   To protect from unauthorized shutdown of a multi-path connection,
>   the selected Key Data of the peer host during the handshaking
>   procedure MUST be included in by the MP_CLOSE option and must be
>   validated by the peer host. 
> 
> Perhaps (if "in"):
>   To protect from unauthorized shutdown of a multipath connection,
>   the selected Key Data of the peer host MUST be included in the
>   MP_CLOSE option during the handshaking procedure and MUST be
>   validated by the peer host. 
> -->
> 
> 
> 18) <!--[rfced] We are having trouble parsing this sentence. Please
> clarify what items "between" refers to.
> 
> Original: 
>   Note, the Key Data is different between MP_CLOSE option carried
>   by DCCP-CloseReq or DCCP-Close.
> -->
> 
> 
> 19) <!--[rfced] Figure 20: May we change "Data TBD" to simply "Data",
> as shown below? It is already explained directly below the figure: 
> "The Data field can carry any data..."  
> 
> We note that "TBD" is used for a different purpose (in Table 3) 
> to refer to the option length being "TBD" when the option type is >11.
> 
> Original:
> |0 0 1 0 1 1 1 0|      var      |0 0 0 0 1 0 1 1|   Data TBD    |
> 
> Perhaps:
> |0 0 1 0 1 1 1 0|      var      |0 0 0 0 1 0 1 1|     Data      |
> -->
> 
> 
> 20) <!--[rfced] FYI, in Figure 21, "DCCP-ACK" has been updated to
> "DCCP-Ack" to match usage in the rest of the document.
> -->
> 
> 
> 21) <!--[rfced] What does "own" refer to in "own random nonce RA"?
> 
> Original: 
>   Additionally, an own random nonce RA is transmitted 
>   with the MP_JOIN.
> -->
> 
> 
> 22) <!--[rfced] In Section 3.3, is "message" the "HMAC Message" and "key"
> the "Key" described in Section 3.2.6? If so, should these terms
> be capitalized as shown below? Note that there is similar text in
> the paragraph that follows (which refers to MP_JOIN(B)").
> 
> Original:
>   As specified in Section 3.2.6, the HMAC is calculated by taking the
>   leftmost 20 bytes from the SHA256 hash of a HMAC code created by
>   using the nonce received with MP_JOIN(A) and the local nonce RB as
>   message and the derived key described in Section 3.2.4 as key:
> 
> Perhaps:
>   As specified in Section 3.2.6, the HMAC is calculated by taking the
>   leftmost 20 bytes from the SHA256 hash of an HMAC code that is
>   created by using both the nonce received with MP_JOIN(A) and the
>   local nonce RB as the Message and the derived key as the Key, as
>   described in Section 3.2.4:
> -->
> 
> 
> 23) <!--[rfced] May we reword this sentence for improved readability?
> 
> Original:
>   The states transitioned when moving from the CLOSED to OPEN state
>   during the four-way handshake remain the same as for DCCP, but it is
>   no longer possible to transmit application data while in the REQUEST
>   state.  
> 
> Perhaps:
>   When the state moves from CLOSED to OPEN during the 4-way
>   handshake, the transitioned states remain the same as for DCCP, but
>   it is no longer possible to transmit application data while in the
>   REQUEST state.
> -->
> 
> 
> 24) <!--[rfced] Is "aspect of" essential to this sentence or may it be 
> removed?
> 
> Original:
>   Likewise, the host that wants to create the subflows is RECOMMENDED
>   to consider the aspect of available resources and the possible
>   gains.
> 
> Perhaps:
>   Likewise, it is RECOMMENDED that the host that wants to create the
>   subflows considers the available resources and possible gains.
> -->
> 
> 
> 25) <!--[rfced] FYI: We added semicolons to this list for better
> readability. Please let us know if you prefer otherwise.
> 
> Original:
>   This can be a dynamic process further facilitated by the means of
>   DCCP and MP-DCCP defined options such as path preference using
>   MP-PRIO, adding or removing DCCP subflows using MP_REMOVEADDR,
>   MP_ADDADDR or DCCP- Close/DCCP-Reset and also path metrics such as
>   packet-loss-rate, CWND or RTT provided by the Congestion Control
>   Algorithm.
> 
> Current:
>   This can be a dynamic process further facilitated by the means of
>   DCCP and MP-DCCP-defined options such as path preference using
>   MP-PRIO; adding or removing DCCP subflows using MP_REMOVEADDR,
>   MP_ADDADDR, or DCCP-Close/DCCP-Reset; and path metrics such as
>   packet loss rate, congestion window (CWND), or RTT provided by 
>   the Congestion Control Algorithm.
> -->
> 
> 
> 26) <!--[rfced] Does "SHOULD" refer only to the first part of this
> sentence? And does "if not available" refer to the "path
> priority"?  If so, may we rephrase the text as shown below for
> clarity?
> 
> Original:
>   This process SHOULD respect the path priority configured by the MP_PRIO
>   suboption or if not available pick the most divergent source-
>   destination pair from the original used source-destination pair.
> 
> Perhaps:
>   This process SHOULD respect the path priority configured by the
>   MP_PRIO suboption; otherwise, if the path priority is not
>   available, pick the most divergent source-destination pair from
>   the originally used source-destination pair.
> -->
> 
> 
> 27) <!-- [rfced] Should "Section 4" be "Section 3.6" where the fallback
> scenario is discussed? Note that this sentence occurs in Section 4.
> 
> Current:
>   Depending on the security requirements, different Key Types can be
>   negotiated in the handshake procedure or must follow the fallback
>   scenario described in Section 4.
> 
> Perhaps:
>   Depending on the security requirements, different Key Types can be
>   negotiated in the handshake procedure or must follow the fallback
>   scenario described in Section 3.6.
> -->
> 
> 
> 28) <!-- [rfced] We note that RFC 4043 does not contain Section 16. Please
> confirm which section should be referenced.
> 
> Current:
>   DCCP already provides means to mitigate the potential impact of
>   middleboxes, in comparison to TCP (see Section 16 of [RFC4043]).
> -->
> 
> 
> 29) <!--[rfced] We have included some clarifications about the IANA text
> below. In addition, please review all of the IANA-related updates
> carefully and let us know if any further updates are needed.
> 
> a) FYI: We updated "auth." to "authentication" in Tables 3 and 8
> as there is enough space to write it out. We will ask IANA to update
> the description in the "Multipath Options" registry accordingly.
> 
> Original:
>   Hash-based message auth. code for MP-DCCP
> 
> Current:
>   Hash-based message authentication code for MP-DCCP
> 
> b) FYI: We have updated the headings in Tables 6 and 7 to match
> the headings listed in the "Feature Numbers" and "MP-DCCP 
> Versions" registries, respectively 
> <https://www.iana.org/assignments/dccp-parameters/>.
> -->
> 
> 
> 30) <!-- [rfced] We found the URL
> <https://dl.acm.org/doi/10.1145/2413176.2413178> from the ACM
> Digital Library. Would you like us to update this reference with
> this URL as shown below?
> 
> Current:
> [OLIA]  Khalili, R., Gast, N., Popovic, M., Upadhyay, U., and J.
>         Le Boudec, "MPTCP is not pareto-optimal: performance
>         issues and a possible solution", CoNEXT '12: Proceedings
>         of the 8th international conference on Emerging networking
>         experiments and technologies, pp. 1-12, December 2012.
> 
> Perhaps:
> [OLIA]  Khalili, R., Gast, N., Popovic, M., Upadhyay, U., and J.
>         Le Boudec, "MPTCP is not pareto-optimal: performance
>         issues and a possible solution", CoNEXT '12: Proceedings
>         of the 8th international conference on Emerging networking
>         experiments and technologies, pp. 1-12, December 2012,
>         <https://dl.acm.org/doi/10.1145/2413176.2413178>.
> -->
> 
> 
> 31) <!-- [rfced] Terminology
> 
> a) Throughout the text, the following terminology appears to be used 
> inconsistently. Please review these occurrences and let us know if/how they
> may be made consistent.  
> 
> CLOSED state vs. CLOSE state vs. CLOSING state
> 
> Client and Server vs. client and server (as well as 'the client and the 
> server')
> 
> Congestion Control procedure vs. congestion control scheme
>   [Note: Should the case be made the same for these terms?]
> 
> "Fast Close" vs. fast close
>   [Note: Should the first mention in quotes be "fast close" 
>   for consistency?]
> 
> Feature number 10 vs. feature number 10
> Length vs. length 
> handshake procedure/process vs. handshaking procedure/process
> Key Type vs. Key types vs. key type
> Multipath Capability vs. multipath capability
> Multipath feature vs. multipath feature
> Multipath option vs. multipath option vs. MP option
> 
> Multipath Capable Feature vs. Multipath Capable feature vs. MP-Capable 
> feature 
>  vs. MP_CAPABLE feature
> 
> Nonce vs. nonce
> Plain Text Key (Table 5) vs. Plain text key (Table 9)
> Reset Code vs. reset code
> Remove Address vs. Remove address (Tables 3 and 8)
> 
> SHA256 vs. SHA-256
>  [Note: "SHA256" is consistent in this document; however, "SHA-256" is 
> hyphenated 
>  in the running text and some descriptions in RFC 6234; are any updates 
> needed 
>  in this document for consistency with that RFC?]
> 
> b) FYI: We updated the following terms to the form on the right for 
> consistency:
> 
> address ID -> Address ID
> age -> Age
> Change request -> change request (per all other RFCs)
> DCCP Connections -> DCCP connections
> four-way -> 4-way
> host A -> Host A
> IP Address -> IP address
> key data -> Key Data
> maximum segment lifetime ->  Maximum Segment Lifetime
> multi-path -> multipath
> UDP Encapsulation -> UDP encapsulation (per RFC 6773)
> NAT Traversal -> NAT traversal (per RFC 6773)
> -->
> 
> 
> 32) <!-- [rfced] Abbreviations
> 
> a) FYI - We have added expansions for the following abbreviations
> per Section 3.6 of RFC 7322 ("RFC Style Guide"). Please review each
> expansion in the document carefully to ensure correctness.
> 
> command-line interface (CLI)
> congestion window (CWND)
> Path MTU (PMTU)
> pebibytes (PiBs)
> Stream Control Transmission Protocol (SCTP)
> 
> b) We note the following variations. Do you prefer the expansion to 
> contain the hyphen or no hyphen?
> 
>  Multipath-DCCP (MP-DCCP) vs. Multipath DCCP (MP-DCCP)
> 
> c) As recommended in the Web Portion of the Style Guide
> <https://www.rfc-editor.org/styleguide/part2/#exp_abbrev>, once an
> abbreviation is introduced, the abbreviated form should be used
> thereafter. Please consider if you would like to apply this style for
> the following terms (i.e., replace the expansion with the abbreviated 
> form on the right):
> 
> Connection Identifier -> CI
> Multipath DCCP -> MP-DCCP
> -->
> 
> 
> 33) <!-- [rfced] Please review the "Inclusive Language" portion of the online 
> Style Guide <https://www.rfc-editor.org/styleguide/part2/#inclusive_language>
> and let us know if any changes are needed.  Updates of this nature typically
> result in more precise language, which is helpful for readers.
> 
> For example, please consider whether "traditionally" should be updated for 
> clarity.  
> 
> While the NIST website 
> <https://web.archive.org/web/20250214092458/https://www.nist.gov/nist-research-library/
> nist-technical-series-publications-author-instructions#table1>
> indicates that this term is potentially biased, it is also ambiguous.  
> "Tradition" is a subjective term, as it is not the same for everyone.
> -->
> 
> 
> Thank you.
> 
> Karen Moore and Alice Russo
> RFC Production Center
> 
> 
> On Oct 27, 2025, [email protected] wrote:
> 
> *****IMPORTANT*****
> 
> Updated 2025/10/27
> 
> RFC Author(s):
> --------------
> 
> Instructions for Completing AUTH48
> 
> Your document has now entered AUTH48.  Once it has been reviewed and 
> approved by you and all coauthors, it will be published as an RFC.  
> If an author is no longer available, there are several remedies 
> available as listed in the FAQ (https://www.rfc-editor.org/faq/).
> 
> You and you coauthors are responsible for engaging other parties 
> (e.g., Contributors or Working Group) as necessary before providing 
> your approval.
> 
> Planning your review 
> ---------------------
> 
> Please review the following aspects of your document:
> 
> *  RFC Editor questions
> 
>  Please review and resolve any questions raised by the RFC Editor 
>  that have been included in the XML file as comments marked as 
>  follows:
> 
>  <!-- [rfced] ... -->
> 
>  These questions will also be sent in a subsequent email.
> 
> *  Changes submitted by coauthors 
> 
>  Please ensure that you review any changes submitted by your 
>  coauthors.  We assume that if you do not speak up that you 
>  agree to changes submitted by your coauthors.
> 
> *  Content 
> 
>  Please review the full content of the document, as this cannot 
>  change once the RFC is published.  Please pay particular attention to:
>  - IANA considerations updates (if applicable)
>  - contact information
>  - references
> 
> *  Copyright notices and legends
> 
>  Please review the copyright notice and legends as defined in
>  RFC 5378 and the Trust Legal Provisions 
>  (TLP – https://trustee.ietf.org/license-info).
> 
> *  Semantic markup
> 
>  Please review the markup in the XML file to ensure that elements of  
>  content are correctly tagged.  For example, ensure that <sourcecode> 
>  and <artwork> are set correctly.  See details at 
>  <https://authors.ietf.org/rfcxml-vocabulary>.
> 
> *  Formatted output
> 
>  Please review the PDF, HTML, and TXT files to ensure that the 
>  formatted output, as generated from the markup in the XML file, is 
>  reasonable.  Please note that the TXT will have formatting 
>  limitations compared to the PDF and HTML.
> 
> 
> Submitting changes
> ------------------
> 
> To submit changes, please reply to this email using ‘REPLY ALL’ as all 
> the parties CCed on this message need to see your changes. The parties 
> include:
> 
>  *  your coauthors
> 
>  *  [email protected] (the RPC team)
> 
>  *  other document participants, depending on the stream (e.g., 
>     IETF Stream participants are your working group chairs, the 
>     responsible ADs, and the document shepherd).
> 
>  *  [email protected], which is a new archival mailing list 
>     to preserve AUTH48 conversations; it is not an active discussion 
>     list:
> 
>    *  More info:
>       
> https://mailarchive.ietf.org/arch/msg/ietf-announce/yb6lpIGh-4Q9l2USxIAe6P8O4Zc
> 
>    *  The archive itself:
>       https://mailarchive.ietf.org/arch/browse/auth48archive/
> 
>    *  Note: If only absolutely necessary, you may temporarily opt out 
>       of the archiving of messages (e.g., to discuss a sensitive matter).
>       If needed, please add a note at the top of the message that you 
>       have dropped the address. When the discussion is concluded, 
>       [email protected] will be re-added to the CC list and 
>       its addition will be noted at the top of the message. 
> 
> You may submit your changes in one of two ways:
> 
> An update to the provided XML file
> — OR —
> An explicit list of changes in this format
> 
> Section # (or indicate Global)
> 
> OLD:
> old text
> 
> NEW:
> new text
> 
> You do not need to reply with both an updated XML file and an explicit 
> list of changes, as either form is sufficient.
> 
> We will ask a stream manager to review and approve any changes that seem
> beyond editorial in nature, e.g., addition of new text, deletion of text, 
> and technical changes.  Information about stream managers can be found in 
> the FAQ.  Editorial changes do not require approval from a stream manager.
> 
> 
> Approving for publication
> --------------------------
> 
> To approve your RFC for publication, please reply to this email stating
> that you approve this RFC for publication.  Please use ‘REPLY ALL’,
> as all the parties CCed on this message need to see your approval.
> 
> 
> Files 
> -----
> 
> The files are available here:
>  https://www.rfc-editor.org/authors/rfc9897.xml
>  https://www.rfc-editor.org/authors/rfc9897.html
>  https://www.rfc-editor.org/authors/rfc9897.pdf
>  https://www.rfc-editor.org/authors/rfc9897.txt
> 
> Diff file of the text:
>  https://www.rfc-editor.org/authors/rfc9897-diff.html
>  https://www.rfc-editor.org/authors/rfc9897-rfcdiff.html (side by side)
> 
> Diff of the XML: 
>  https://www.rfc-editor.org/authors/rfc9897-xmldiff1.html
> 
> 
> Tracking progress
> -----------------
> 
> The details of the AUTH48 status of your document are here:
>  https://www.rfc-editor.org/auth48/rfc9897
> 
> Please let us know if you have any questions.  
> 
> Thank you for your cooperation,
> 
> RFC Editor
> 
> --------------------------------------
> RFC9897 (draft-ietf-tsvwg-multipath-dccp-24)
> 
> Title            : DCCP Extensions for Multipath Operation with Multiple 
> Addresses
> Author(s)        : M. Amend, Ed., A. Brunstrom, A. Kassler, V. Rakocevic, S. 
> Johnson
> WG Chair(s)      : Martin Duke, Zaheduzzaman Sarker
> Area Director(s) : Gorry Fairhurst, Mike Bishop
> 

-- 
auth48archive mailing list -- [email protected]
To unsubscribe send an email to [email protected]

Reply via email to