Skip to main content

The Line-Identification Option
draft-ietf-6man-lineid-08

Yes

(Brian Haberman)
(Ron Bonica)

No Objection

(Gonzalo Camarillo)
(Martin Stiemerling)
(Pete Resnick)
(Robert Sparks)
(Russ Housley)
(Stewart Bryant)

Note: This ballot was opened for revision 05 and is now closed.

Adrian Farrel Former IESG member
Yes
Yes (2012-07-05 for -05) Unknown
I am balloting "yes" but there are some minor comments from Dave
Sinicrope's Routing Directorate review. Please consider them 
before advancing the document for publication.

 1.  Section 1.1 Terminology & all related sections:  Throughout 
     several sections of the document the term "subscriber" is used.
     It is not defined in the Terminology.  It seems this is often
     used synonimously with End-device which is defined.  This is 
     particularly true of section 2. Applicability Statement.  
     Please define "subscriber" or substitute a defined term (e.g.,
     "end device") for "subscriber" throughout the document.

 2.  Section 1.1 Terminology & all related sections:  Throughout 
     several sections of the document the term "host" is used. While
     "host" is defined in the Terminology, it seems this is often 
     used synonimously with End-device where it would be better to
     use the latter term.  This is particularly true of section 2.
     Applicability Statement paras 3 and 5.  Please substitute "end
     device" for "host" throughout the document where this is 
     applicable.

 3.  Section 2. Applicability Statement: This section focuses on the
     limitations of the draft, but it should elaborate more on the 
     applicability and usefulness of the draft to support stateless
     auto configuration.

 4.  Section 2. Applicability Statement, para 3, last 2 sentences: 
     These statements make it appear that all broadband networks rely
     on the [end device] MAC address and that it is not recommended
     that this draft be used for networks that require the [end 
     device] MAC address, leading the reader to the possible conclusion
     that this draft has little use.  In practice some broadband 
     networks use the [end device] MAC address, but not all making the
     draft far more applicable than indicated.  Please qualify the 
     penultimate sentence of paragraph 3 "currently used in <"some"
     or "many"> Broadband networks"

 5.  Section 2 Applicability Statement: The document would benefit
     from a brief flow diagram showing the Router Solicitation & 
     Router Advertisement flows between the nodes shown in Figure 1.

 6.  Section 4 Basic Operation, last sentence:  The last sentence is
     not clear as to why a packet with a hop limit not set to 255 is
     discarded.  Please briefly elaborate (e.g., "because they appear
     to be more than a single hop away.")

 7.  Section 5.1 On receiving a Router Solicitation: Add a figure
     showing the construction of a tunneled Router Solicitation.  Add
     "See Figure X" within the paragraph to reference the figure.

 8.  Section 5.2.1 Identifying tunneled Router Advertisements: It is 
     unclear, at least initially, what is meant by "All BBF Access 
     Nodes".  Please clarify its use as done in section 6.2, noting
     that it is a well known, link-local scoped multicast address. 

 9.  Section 5.3 On detecting a subscriber circuit coming up, para 1,
     "When the access node": I believe what is meant by "When the 
     access node detects that a subscriber circuit has come up" is
     really "Each time the access node detects that a subscriber 
     circuit has come up".  "When the" could be misinterpreted as 
     meaning "the first time".  Please change "When the" to "Each 
     time" in this sentence.

 10. Section 6.1 On receiving a Tunneled Router Solicitation: It is
     not clear how the edge router recognizes a tunneled RS. Please
     briefly elaborate on how this datagram is identified by the 
     edge router.

 11. Section 6.1 On receiving a Tunneled Router Solicitation, "The
     link-layer destination address of the tunneled RA MUST".  There
     are two statements in this paragraph that start with this clause
     that seem to be contradictory.  Please reconcile and clarify.

 12. Section 6.3 Sending periodic unsolicited Router Advertisements:
     This section would benefit from a forward reference to section 8
     Garbage collection of unused prefixes to help the reader
     understand when and how the prefixes are eventually removed or
     cleared.

 13. Section 7 Line Identification Destination Option (LIO): Change
     "no alignment requirement." to "… no byte alignment 
     requirement."

 14. Section 7.1 Encoding of Line ID, para 3: It is not clear why
     compatibility with DHCP is needed as these are two independent
     protocols.  The section notes the derivation of the option from
     DHCP.  It seems to be implied that compatibility is kept to allow
     the same processing to be used.  If this is the case it should be
     stated.  If it is not the case, the rationale would help the
     reader understand better why compatibility must be kept and the 
     relation to the install base which would seem to need a software
     upgrade to support this draft.

Nits:

 1.  Section 2 Applicability Statement, para 3: This paragraph should
     be broken into two paragraphs as the latter sentences explain 
     limitations and recommendations of the draft itself while the 
     earlier sentences explain operation of Router Solicitation and
     Advertisement.

 2.  Section 5.1 On receiving a Router Solicitation:  Clarify the use
     of "the unspecified address", with a reference or context. (e.g.,
     "the unspecified address defined in RFC"

 3.  General: inconsistent use of capitalization on "Edge Router"/"edge
     router"/"Edge router"
Brian Haberman Former IESG member
Yes
Yes (for -05) Unknown

                            
Ron Bonica Former IESG member
Yes
Yes (for -05) Unknown

                            
Barry Leiba Former IESG member
(was Discuss) No Objection
No Objection (2012-07-04 for -05) Unknown
Former DISCUSS points, now resolved [3 July]:

1. Suresh has confirmed that the NOT RECOMMENDED text in Section 2 is correctly meant in the 2119 sense, and shouldn't be MUST NOT.

2. Suresh has confirmed that the AN is not physically accessible to the subscriber, so securing the network beginning at that point and continuing out is sufficient.

========
Non-blocking comments;  no need to respond to these:

Authors:
Thank you for being very clear in the IANA Considerations.

*** A note to the document shepherd about the writeup:
You say, in responses to writeup questions (1) and (2), that there was a great deal of discussion and disagreement about this document in the WG:

> (1) Experimental as indicated in the header. This designation
> was reached after a long discussion in the working group.

> (2) Working Group Summary
> It was difficult reaching a consensus on this document, hence the two w.g. last
> calls. This approach was requested by the Broad Band Forum. The issues were
> resolved by some changes in the document and an agreement to have it be an
> experimental RFC.

It would have been helpful to have had more explanation (perhaps in the response to question (9)) of what the issues were, why they were considered difficult problems, and how that led to Experimental status rather than... what status was it intended for before?  A lot of discussion happened about why this is problematic or questionable, and how that got resolved, and ADs from other areas have to review it without any of that background.  These writeups aren't just meant to say "yes" and "no", and "yeh, there were issues."  This one is pretty perfunctory.
Gonzalo Camarillo Former IESG member
No Objection
No Objection (for -05) Unknown

                            
Martin Stiemerling Former IESG member
No Objection
No Objection (for -05) Unknown

                            
Pete Resnick Former IESG member
(was Discuss) No Objection
No Objection () Unknown

                            
Ralph Droms Former IESG member
(was Discuss) No Objection
No Objection (2012-08-17 for -07) Unknown
1. (cleared)

2. (cleared)

3. (cleared)

4. Two questions about this text from section 6.2:

   If the Source Address field of the received IPv6 datagram
   was not the unspecified address, the Edge router MUST copy this
   address into the Destination Address field of the outer IPv6 datagram
   sent back towards the Access Node.  The link-layer destination
   address of the tunneled RA MUST be resolved using regular Neighbour
   Discovery procedures.  Otherwise, the destination address of the
   outer IPv6 datagram MUST be set to the well-known link-local scope
   All-BBF-Access-Nodes multicast address [to be allocated].

Is the "tunneled RA" the "outer IPv6 datagram"?

Does the "Otherwise" apply to the first "If" in the quoted text?

(update) I see that section 6.2 has been revised to clarify the
various cases.  In e-mail, you explained that "tunneled RA" is
equivalent to "outer IPv6 datagram".  While this is a non-blocking
comment, it would be good to be consistent in using one term or the
other throughout the document (I would suggest "outer IPv6 datagram"
as more precise and clear), or add a sentence explaining the two
phrases are equivalent.

5.(cleared)

6. (new, from previous Discuss point 2) The use of the word "uses"
clarifies that this option will only be carried in an RS in a tunnel.
It wouldn't hurt to add a sentence that explicitly expresses that
restriction, and specifies the behavior if an "untunneled" RS carrying
this option is received.

7. (new, from previous Discuss point 8)  I've cleared my Discuss
based on the text regarding MTU in rev -07.  I
suggest some minor word-smithing for that next text:

OLD:

   The edge router MUST ensure that it does not transmit tunneled RAs
   whose size is larger than the MTU of the link between the edge router
   and the AN. i.e.  The outer IPv6 datagram would require
   fragmentation.  This is required because the AN may not be capable of
   handling the reassembly of such fragmented datagrams.

NEW:

   The edge router MUST ensure that it does not transmit tunneled RAs
   whose size is larger than the MTU of the link between the edge
   router and the AN, which would require that the outer IPv6 datagram
   undergo fragmentation.  This limitation is imposed because the AN
   may not be capable of handling the reassembly of such fragmented
   datagrams.
Robert Sparks Former IESG member
No Objection
No Objection (for -05) Unknown

                            
Russ Housley Former IESG member
No Objection
No Objection (for -05) Unknown

                            
Sean Turner Former IESG member
No Objection
No Objection (2012-07-04 for -05) Unknown
Picking up on Stephen's point about referring the LIO referring to "subscriber premise."  The last sentence of s3 does use this term so maybe just sprinkling premise in s2/s3 title?
Stephen Farrell Former IESG member
No Objection
No Objection (2012-07-02 for -05) Unknown
- Just want to check, I'm fairly sure no change is needed but
just in case... Is there any way in which the LIO for one
subscriber can leak out so as to be visible to another 
subscriber?

- Wouldn't it be better to say that the LIO identifies the
subscriber premises or account rather than the subscriber?
That is, its not a person, being identified, e.g. the title of 
section 3 reads like there might be something privacy 
sensitive here, but I don't think there is really.

- Some fixes due to Dan Harkins' secdir review [1] comments
seem to be agreed by the authors. 

   [1] http://www.ietf.org/mail-archive/web/secdir/current/msg03361.html
Stewart Bryant Former IESG member
No Objection
No Objection (for -05) Unknown

                            
Wesley Eddy Former IESG member
No Objection
No Objection (2012-07-05 for -05) Unknown
I agree with Pete's DISCUSS.