4-Octet AS Specific BGP Extended Community
draft-ietf-l3vpn-as4octet-ext-community-03
Revision differences
Document history
Date | Rev. | By | Action |
---|---|---|---|
2012-08-22
|
03 | (System) | post-migration administrative database adjustment to the No Objection position for Tim Polk |
2012-08-22
|
03 | (System) | post-migration administrative database adjustment to the No Objection position for Dan Romascanu |
2012-08-22
|
03 | (System) | post-migration administrative database adjustment to the No Objection position for Adrian Farrel |
2009-09-04
|
03 | (System) | IANA Action state changed to RFC-Ed-Ack from Waiting on RFC Editor |
2009-09-04
|
03 | (System) | IANA Action state changed to Waiting on RFC Editor from In Progress |
2009-09-04
|
03 | (System) | IANA Action state changed to In Progress from Waiting on Authors |
2009-09-03
|
03 | (System) | IANA Action state changed to Waiting on Authors from In Progress |
2009-09-03
|
03 | Amy Vezza | State Changes to RFC Ed Queue from Approved-announcement sent by Amy Vezza |
2009-09-03
|
03 | (System) | IANA Action state changed to In Progress |
2009-09-03
|
03 | Amy Vezza | IESG state changed to Approved-announcement sent |
2009-09-03
|
03 | Amy Vezza | IESG has approved the document |
2009-09-03
|
03 | Amy Vezza | Closed "Approve" ballot |
2009-09-02
|
03 | Ross Callon | State Changes to Approved-announcement to be sent from IESG Evaluation::AD Followup by Ross Callon |
2009-09-02
|
03 | Tim Polk | [Ballot Position Update] Position for Tim Polk has been changed to No Objection from Undefined by Tim Polk |
2009-09-02
|
03 | Tim Polk | [Ballot Position Update] Position for Tim Polk has been changed to Undefined from Discuss by Tim Polk |
2009-08-14
|
03 | (System) | Removed from agenda for telechat - 2009-08-13 |
2009-08-13
|
03 | Cindy Morgan | State Changes to IESG Evaluation::AD Followup from IESG Evaluation by Cindy Morgan |
2009-08-13
|
03 | Dan Romascanu | [Ballot Position Update] Position for Dan Romascanu has been changed to No Objection from Discuss by Dan Romascanu |
2009-08-13
|
03 | Adrian Farrel | [Ballot Position Update] Position for Adrian Farrel has been changed to No Objection from Undefined by Adrian Farrel |
2009-08-13
|
03 | Adrian Farrel | [Ballot Position Update] Position for Adrian Farrel has been changed to Undefined from Discuss by Adrian Farrel |
2009-08-13
|
03 | Lisa Dusseault | [Ballot Position Update] New position, No Objection, has been recorded by Lisa Dusseault |
2009-08-12
|
03 | Pasi Eronen | [Ballot Position Update] New position, No Objection, has been recorded by Pasi Eronen |
2009-08-12
|
03 | Robert Sparks | [Ballot Position Update] New position, No Objection, has been recorded by Robert Sparks |
2009-08-12
|
03 | Ron Bonica | [Ballot Position Update] New position, No Objection, has been recorded by Ron Bonica |
2009-08-12
|
03 | Tim Polk | [Ballot discuss] [This text repeats issues raised in Steve Kent's secdir review, which does not appeared to have received an answer. Please include him in … [Ballot discuss] [This text repeats issues raised in Steve Kent's secdir review, which does not appeared to have received an answer. Please include him in any followup emails; his address is Stephen Kent ] The Security Considerations for this document need to be expanded. The current text states: 5. Security Considerations All the security considerations for BGP Extended Communities apply here. I assume that the intent of this text was to point to RFC 4360, and originally intended to simply request a inclusion pointer. As a general rule, I support Security Considerations by reference. Unfortunately, RFC 4360 provides yet another indirection and the reference is empty. From RFC 4360: 8. Security Considerations This extension to BGP has similar security implications as BGP Communities [RFC1997]. This extension to BGP does not change the underlying security issues. Specifically, an operator who is relying on the information carried in BGP must have a transitive trust relationship back to the source of the information. Specifying the mechanism(s) to provide such a relationship is beyond the scope of this document. And from RFC 1997: Security Considerations Security issues are not discussed in this memo. The authors need to write a meaningful Security Considerations section addressing BGP Extended Communities, or find a prior documents that already explores the topic. This text should also apply to draft-ietf-l3vpn-v6-ext-communities, where I am entering a parallel discuss. |
2009-08-12
|
03 | Tim Polk | [Ballot discuss] [This text repeats issues raised in Steve Kent's secdir review, which does not appeared to have received an answer. Please include him in … [Ballot discuss] [This text repeats issues raised in Steve Kent's secdir review, which does not appeared to have received an answer. Please include him in any followup emails; his address is Stephen Kent ] The Security Considerations for this document need to be expanded. The current text states: 5. Security Considerations All the security considerations for BGP Extended Communities apply here. I assume that the intent of this text was to point to RFC 4360, and originally intended to simply request a inclusion pointer. As a general rule, I support Security Considerations by reference. Unfortunately, RFC 4360 provides yet another indirection and the reference is empty. From RFC 4360: 8. Security Considerations This extension to BGP has similar security implications as BGP Communities [RFC1997]. This extension to BGP does not change the underlying security issues. Specifically, an operator who is relying on the information carried in BGP must have a transitive trust relationship back to the source of the information. Specifying the mechanism(s) to provide such a relationship is beyond the scope of this document. And from RFC 1997: Security Considerations Security issues are not discussed in this memo. The authors need to write a meaningful Security Considerations section addressing BGP Extended Communities, or find a prior documents that already explores the topic. (This text will also apply to draft-ietf-l3vpn-v6-ext-communities, where I am entering a parallel discuss.) |
2009-08-12
|
03 | Tim Polk | [Ballot Position Update] New position, Discuss, has been recorded by Tim Polk |
2009-08-11
|
03 | Adrian Farrel | [Ballot discuss] A lovely short draft, thanks! Updating my Discuss to provide a bit more clarity. (Sorry about the first version!) Although the IANA section … [Ballot discuss] A lovely short draft, thanks! Updating my Discuss to provide a bit more clarity. (Sorry about the first version!) Although the IANA section creates a registry for the transitive and non-transitive extended communities, it doesn't call out the information specific to the interpretation of the Local Administrator sub-field. The I-D says for the Local Administrator sub-field that... The format and meaning of the value encoded in this sub-field should be defined by the sub-type of the commu- nity. This could mean one of two things... - That the format and meaning is independent of the AS number even though the value is dependent on the AS number. In this case I think it would be worth having the registry discuss the format and meaning of the Local Administrator sub-field. And in this case the FCFS assignment rule seems a bit lax. - The format and meaning is dependent on the AS number. In other words the parse of the Local Administrator field is dependent first on the AS number and then on the community sub-type. If this is the case, more explanation needs to be added to the I-D. |
2009-08-11
|
03 | Adrian Farrel | [Ballot discuss] A lovely short draft, thanks! Hopefully this question can be resolved either by an email response or a tiny mod to the I-D. … [Ballot discuss] A lovely short draft, thanks! Hopefully this question can be resolved either by an email response or a tiny mod to the I-D. Why doesn't this draft create a registry for the community sub-types? I know the I-D does not define any values, but it does say for the Local Administrator sub-field that... The format and meaning of the value encoded in this sub-field should be defined by the sub-type of the commu- nity. This could mean one of two things... - That the format and meaning is independent of the AS number even though the value is dependent on the AS number. In this case I think it would be worth creating the registry ready to be populated. In particular, the rules for assignment should be specified. - The format and meaning is dependent on the AS number. In other words the parse of the Local Administrator field is dependent first on the AS number and then on the community sub-type. If this is the case, more explanation needs to be added to the I-D. |
2009-08-11
|
03 | Adrian Farrel | [Ballot Position Update] New position, Discuss, has been recorded by Adrian Farrel |
2009-08-11
|
03 | Lars Eggert | [Ballot Position Update] New position, No Objection, has been recorded by Lars Eggert |
2009-08-11
|
03 | Lars Eggert | [Ballot comment] Section 5., paragraph 1: > All the security considerations for BGP Extended Communities apply > here. It would be useful … [Ballot comment] Section 5., paragraph 1: > All the security considerations for BGP Extended Communities apply > here. It would be useful to provide a reference. |
2009-08-10
|
03 | Russ Housley | [Ballot comment] Please consider the comments from the Gen-ART Review by Ben Campbell on 2009-Jun-30. Are there missing words in Abstract? … [Ballot comment] Please consider the comments from the Gen-ART Review by Ben Campbell on 2009-Jun-30. Are there missing words in Abstract? > > "...allows to carry 4 octet autonomous system numbers" There's no motivational text in the Introduction. A paragraph describing (very briefly) why you would want 4 octet extended communities might be helpful. |
2009-08-10
|
03 | Russ Housley | [Ballot Position Update] New position, No Objection, has been recorded by Russ Housley |
2009-08-10
|
03 | Dan Romascanu | [Ballot comment] AS should be expanded either in the title or in the Abstract section of the document. |
2009-08-10
|
03 | Dan Romascanu | [Ballot discuss] This is a DISCUSS-DISCUSS that I plan to clear after we discuss the issue on mail or in the meeting and I understand … [Ballot discuss] This is a DISCUSS-DISCUSS that I plan to clear after we discuss the issue on mail or in the meeting and I understand what I may be missing. > 3. Considerations for two-octet Autonomous Systems As per [RFC4893], a two-octet Autonomous System number can be con- verted into a 4-octet Autonomous System number by setting the two high-order octets of the 4-octet field to zero. As a consequence, at least in principle an autonomous system that uses a two-octet Autonomous System number could use either two-octet or four-octet AS specific extended communities. This is undesirable, as both communities would be treated as different, even if they had the same Sub-Type and Local Administrator values. Therefore, for backward compatibility with existing deployments, and to avoid inconsistencies between two-octet and four-octet specific extended communities, autonomous systems that use two-octet Autonomous System numbers SHOULD use two-octet AS specific extended communities rather than four-octet AS specific extended communities. What is the reason the SHOULD in the last paragraph is not a MUST? Are there any justified exception cases that should be considered (maybe also described)? |
2009-08-10
|
03 | Dan Romascanu | [Ballot Position Update] New position, Discuss, has been recorded by Dan Romascanu |
2009-08-10
|
03 | Jari Arkko | [Ballot Position Update] New position, No Objection, has been recorded by Jari Arkko |
2009-08-08
|
03 | Alexey Melnikov | [Ballot Position Update] New position, No Objection, has been recorded by Alexey Melnikov |
2009-08-06
|
03 | Ross Callon | [Ballot Position Update] New position, Yes, has been recorded for Ross Callon |
2009-08-06
|
03 | Ross Callon | Ballot has been issued by Ross Callon |
2009-08-06
|
03 | Ross Callon | Created "Approve" ballot |
2009-08-06
|
03 | Ross Callon | State Changes to IESG Evaluation from Waiting for AD Go-Ahead by Ross Callon |
2009-08-06
|
03 | Ross Callon | Placed on agenda for telechat - 2009-08-13 by Ross Callon |
2009-07-18
|
03 | Samuel Weiler | Request for Last Call review by SECDIR Completed. Reviewer: Stephen Kent. |
2009-07-07
|
03 | (System) | State has been changed to Waiting for AD Go-Ahead from In Last Call by system |
2009-06-30
|
03 | Michelle Cotton | IANA Last Call comments: registry "Border Gateway Protocol (BGP) Data Collection Standard Communities" located at http://www.iana.org/assignments/bgp-extended-communities create a new sub-registry "Four-octet AS Specific Extended Community" … IANA Last Call comments: registry "Border Gateway Protocol (BGP) Data Collection Standard Communities" located at http://www.iana.org/assignments/bgp-extended-communities create a new sub-registry "Four-octet AS Specific Extended Community" Initial contents of this sub-registry will be: Registry Name: Four-octet AS Specific Extended Community Reference: [RFC-l3vpn-as4octet-ext-community-03] Range Registration Procedures ----------------------------------------- ------------------------------ 0x0200-0x02ff Transitive communities First Come First Served 0x4200-0x42ff Non-transitive communities First Come First Served Registry: Type Value Name Reference ------------ --------------------------------------- -------- 0x0202 four-octet AS specific Route Target [RFC-l3vpn-as4octet-ext-community-03] 0x0203 four-octet AS specific Route Origin [RFC-l3vpn-as4octet-ext-community-03] We understand the above to be the only IANA Actions for this document. |
2009-06-25
|
03 | Samuel Weiler | Request for Last Call review by SECDIR is assigned to Stephen Kent |
2009-06-25
|
03 | Samuel Weiler | Request for Last Call review by SECDIR is assigned to Stephen Kent |
2009-06-23
|
03 | Amy Vezza | Last call sent |
2009-06-23
|
03 | Amy Vezza | State Changes to In Last Call from Last Call Requested by Amy Vezza |
2009-06-23
|
03 | Ross Callon | State Changes to Last Call Requested from AD Evaluation by Ross Callon |
2009-06-23
|
03 | Ross Callon | Last Call was requested by Ross Callon |
2009-06-23
|
03 | (System) | Ballot writeup text was added |
2009-06-23
|
03 | (System) | Last call text was added |
2009-06-23
|
03 | (System) | Ballot approval text was added |
2009-06-23
|
03 | Ross Callon | PROTO writeup by Danny McPherson: (1.a) Who is the Document Shepherd for this document? Has the Document Shepherd … PROTO writeup by Danny McPherson: (1.a) Who is the Document Shepherd for this document? Has the Document Shepherd personally reviewed this version of the document and, in particular, does he or she believe this version is ready for forwarding to the IESG for publication? The Document Shepherd is myself (Danny McPherson). I believe that the 01 version is ready for forwarding to the IESG for publication on the Internet Standards Track. (1.b) Has the document had adequate review both from key WG members and from key non-WG members? Does the Document Shepherd have any concerns about the depth or breadth of the reviews that have been performed? The document passed the L3VPN WG Last Call, although we received no comments on the document during the Last Call. It was also Last Called in the IDR WG because of the proximity to IDR work. No outstanding comments exist. (1.c) Does the Document Shepherd have concerns that the document needs more review from a particular or broader perspective, e.g., security, operational complexity, someone familiar with AAA, internationalization or XML? No. (1.d) Does the Document Shepherd have any specific concerns or issues with this document that the Responsible Area Director and/or the IESG should be aware of? For example, perhaps he or she is uncomfortable with certain parts of the document, or has concerns whether there really is a need for it. In any event, if the WG has discussed those issues and has indicated that it still wishes to advance the document, detail those concerns here. Has an IPR disclosure related to this document been filed? If so, please include a reference to the disclosure and summarize the WG discussion and conclusion on this issue. No. (1.e) How solid is the WG consensus behind this document? Does it represent the strong concurrence of a few individuals, with others being silent, or does the WG as a whole understand and agree with it? There were no objections during the WG Last Call on the document, and the utility of the specification is both obvious and intuitive. (1.f) Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarise the areas of conflict in separate email messages to the Responsible Area Director. (It should be in a separate email because this questionnaire is entered into the ID Tracker.) No. (1.g) Has the Document Shepherd personally verified that the document satisfies all ID nits? (See http://www.ietf.org/ID-Checklist.html and http://tools.ietf.org/tools/idnits/). Boilerplate checks are not enough; this check needs to be thorough. Has the document met all formal review criteria it needs to, such as the MIB Doctor, media type and URI type reviews? The boilerplate for the document needs to be updated, the authors have no issues with the new boilerplate and will submit a new revision when the I-D submission window is re-opened. No other concerns exist. (1.h) Has the document split its references into normative and informative? Are there normative references to documents that are not ready for advancement or are otherwise in an unclear state? If such normative references exist, what is the strategy for their completion? Are there normative references that are downward references, as described in [RFC3967]? If so, list these downward references to support the Area Director in the Last Call procedure for them [RFC3967]. The document split its references. There are no normative references that are not published, so there should be no issues here. (1.i) Has the Document Shepherd verified that the document IANA consideration section exists and is consistent with the body of the document? If the document specifies protocol extensions, are reservations requested in appropriate IANA registries? Are the IANA registries clearly identified? If the document creates a new registry, does it define the proposed initial contents of the registry and an allocation procedure for future registrations? Does it suggest a reasonable name for the new registry? See [RFC2434]. If the document describes an Expert Review process has Shepherd conferred with the Responsible Area Director so that the IESG can appoint the needed Expert during the IESG Evaluation? The document contains IANA consideration section. To the best of my knowledge the IANA considerations are consistent with the rest of the document. The document does create a new registry titled "Four-octet AS Specific Extended Community" and the contents of that registry are clearly identified. (1.j) Has the Document Shepherd verified that sections of the document that are written in a formal language, such as XML code, BNF rules, MIB definitions, etc., validate correctly in an automated checker? No section of this document is written in a formal language. (1.k) The IESG approval announcement includes a Document Announcement Write-Up. Please provide such a Document Announcement Write-Up? Recent examples can be found in the "Action" announcements for approved documents. The approval announcement contains the following sections: Technical Summary Relevant content can frequently be found in the abstract and/or introduction of the document. If not, this may be an indication that there are deficiencies in the abstract or introduction. This document defines a new type of BGP extended community ([RFC4360]) - four-octet AS specific extended community. This type of extended community is similar to the two-octet AS specific extended community, except that it can carry a four octets autonomous system number. Working Group Summary Was there anything in WG process that is worth noting? For example, was there controversy about particular points or were there decisions where the consensus was particularly rough? This document is a product of L3VPN WG. There were no comments on the document during the WG Last Call, nor were than any from the IDR WG. Document Quality Are there existing implementations of the protocol? Not to my knowledge, or that of the primary author, but my knowledge is limited. Have a significant number of vendors indicated their plan to implement the specification? I do not know. Are there any reviewers that merit special mention as having done a thorough review, e.g., one that resulted in important changes or a conclusion that the document had no substantive issues? Not to the best of my knowledge, or that of the author, but the document is a straightforward extension of the existing extended communities RFC. So, with this in mind one should not expect to have any substantive issues with the document. If there was a MIB Doctor, Media Type or other expert review, what was its course (briefly)? In the case of a Media Type review, on what date was the request posted? Nope, none of the above. |
2009-06-23
|
03 | Ross Callon | PROTO writeup by Danny McPherson: (1.a) Who is the Document Shepherd for this document? Has the Document Shepherd … PROTO writeup by Danny McPherson: (1.a) Who is the Document Shepherd for this document? Has the Document Shepherd personally reviewed this version of the document and, in particular, does he or she believe this version is ready for forwarding to the IESG for publication? The Document Shepherd is myself (Danny McPherson). I believe that the 01 version is ready for forwarding to the IESG for publication on the Internet Standards Track. (1.b) Has the document had adequate review both from key WG members and from key non-WG members? Does the Document Shepherd have any concerns about the depth or breadth of the reviews that have been performed? The document passed the L3VPN WG Last Call, although we received no comments on the document during the Last Call. It was also Last Called in the IDR WG because of the proximity to IDR work. No outstanding comments exist. (1.c) Does the Document Shepherd have concerns that the document needs more review from a particular or broader perspective, e.g., security, operational complexity, someone familiar with AAA, internationalization or XML? No. (1.d) Does the Document Shepherd have any specific concerns or issues with this document that the Responsible Area Director and/or the IESG should be aware of? For example, perhaps he or she is uncomfortable with certain parts of the document, or has concerns whether there really is a need for it. In any event, if the WG has discussed those issues and has indicated that it still wishes to advance the document, detail those concerns here. Has an IPR disclosure related to this document been filed? If so, please include a reference to the disclosure and summarize the WG discussion and conclusion on this issue. No. (1.e) How solid is the WG consensus behind this document? Does it represent the strong concurrence of a few individuals, with others being silent, or does the WG as a whole understand and agree with it? There were no objections during the WG Last Call on the document, and the utility of the specification is both obvious and intuitive. (1.f) Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarise the areas of conflict in separate email messages to the Responsible Area Director. (It should be in a separate email because this questionnaire is entered into the ID Tracker.) No. (1.g) Has the Document Shepherd personally verified that the document satisfies all ID nits? (See http://www.ietf.org/ID-Checklist.html and http://tools.ietf.org/tools/idnits/). Boilerplate checks are not enough; this check needs to be thorough. Has the document met all formal review criteria it needs to, such as the MIB Doctor, media type and URI type reviews? The boilerplate for the document needs to be updated, the authors have no issues with the new boilerplate and will submit a new revision when the I-D submission window is re-opened. No other concerns exist. (1.h) Has the document split its references into normative and informative? Are there normative references to documents that are not ready for advancement or are otherwise in an unclear state? If such normative references exist, what is the strategy for their completion? Are there normative references that are downward references, as described in [RFC3967]? If so, list these downward references to support the Area Director in the Last Call procedure for them [RFC3967]. The document split its references. There are no normative references that are not published, so there should be no issues here. (1.i) Has the Document Shepherd verified that the document IANA consideration section exists and is consistent with the body of the document? If the document specifies protocol extensions, are reservations requested in appropriate IANA registries? Are the IANA registries clearly identified? If the document creates a new registry, does it define the proposed initial contents of the registry and an allocation procedure for future registrations? Does it suggest a reasonable name for the new registry? See [RFC2434]. If the document describes an Expert Review process has Shepherd conferred with the Responsible Area Director so that the IESG can appoint the needed Expert during the IESG Evaluation? The document contains IANA consideration section. To the best of my knowledge the IANA considerations are consistent with the rest of the document. The document does create a new registry titled "Four-octet AS Specific Extended Community" and the contents of that registry are clearly identified. (1.j) Has the Document Shepherd verified that sections of the document that are written in a formal language, such as XML code, BNF rules, MIB definitions, etc., validate correctly in an automated checker? No section of this document is written in a formal language. (1.k) The IESG approval announcement includes a Document Announcement Write-Up. Please provide such a Document Announcement Write-Up? Recent examples can be found in the "Action" announcements for approved documents. The approval announcement contains the following sections: Technical Summary Relevant content can frequently be found in the abstract and/or introduction of the document. If not, this may be an indication that there are deficiencies in the abstract or introduction. This document defines a new type of BGP extended community ([RFC4360]) - four-octet AS specific extended community. This type of extended community is similar to the two-octet AS specific extended community, except that it can carry a four octets autonomous system number. Working Group Summary Was there anything in WG process that is worth noting? For example, was there controversy about particular points or were there decisions where the consensus was particularly rough? This document is a product of L3VPN WG. There were no comments on the document during the WG Last Call, nor were than any from the IDR WG. Document Quality Are there existing implementations of the protocol? Not to my knowledge, or that of the primary author, but my knowledge is limited. Have a significant number of vendors indicated their plan to implement the specification? I do not know. Are there any reviewers that merit special mention as having done a thorough review, e.g., one that resulted in important changes or a conclusion that the document had no substantive issues? Not to the best of my knowledge, or that of the author, but the document is a straightforward extension of the existing extended communities RFC. So, with this in mind one should not expect to have any substantive issues with the document. If there was a MIB Doctor, Media Type or other expert review, what was its course (briefly)? In the case of a Media Type review, on what date was the request posted? Nope, none of the above. |
2009-06-23
|
03 | Ross Callon | State Changes to AD Evaluation from Publication Requested by Ross Callon |
2009-06-23
|
03 | Ross Callon | Draft Added by Ross Callon in state Publication Requested |
2009-03-26
|
03 | (System) | New version available: draft-ietf-l3vpn-as4octet-ext-community-03.txt |
2008-11-24
|
02 | (System) | New version available: draft-ietf-l3vpn-as4octet-ext-community-02.txt |
2008-10-27
|
01 | (System) | New version available: draft-ietf-l3vpn-as4octet-ext-community-01.txt |
2008-09-29
|
00 | (System) | New version available: draft-ietf-l3vpn-as4octet-ext-community-00.txt |