Skip to main content

OSPF Link-Local Signaling
draft-ietf-ospf-lls-08

Revision differences

Document history

Date Rev. By Action
2012-08-22
08 (System) post-migration administrative database adjustment to the No Objection position for Pasi Eronen
2012-08-22
08 (System) post-migration administrative database adjustment to the No Objection position for Tim Polk
2012-08-22
08 (System) post-migration administrative database adjustment to the No Objection position for Dan Romascanu
2012-08-22
08 (System) post-migration administrative database adjustment to the No Objection position for Magnus Westerlund
2012-08-22
08 (System) post-migration administrative database adjustment to the Yes position for Ross Callon
2012-08-22
08 (System) post-migration administrative database adjustment to the No Objection position for Russ Housley
2009-07-08
08 (System) IANA Action state changed to RFC-Ed-Ack from Waiting on RFC Editor
2009-07-08
08 (System) IANA Action state changed to Waiting on RFC Editor from In Progress
2009-07-08
08 (System) IANA Action state changed to In Progress from Waiting on Authors
2009-07-07
08 (System) IANA Action state changed to Waiting on Authors from In Progress
2009-07-07
08 (System) IANA Action state changed to In Progress from Waiting on Authors
2009-07-02
08 (System) IANA Action state changed to Waiting on Authors from In Progress
2009-06-25
08 (System) IANA Action state changed to In Progress from Waiting on Authors
2009-06-23
08 (System) IANA Action state changed to Waiting on Authors from In Progress
2009-06-18
08 (System) IANA Action state changed to In Progress from Waiting on Authors
2009-06-16
08 (System) IANA Action state changed to Waiting on Authors from In Progress
2009-06-10
08 (System) IANA Action state changed to In Progress
2009-06-09
08 Cindy Morgan State Changes to RFC Ed Queue from Approved-announcement sent by Cindy Morgan
2009-06-09
08 Cindy Morgan IESG state changed to Approved-announcement sent
2009-06-09
08 Cindy Morgan IESG has approved the document
2009-06-09
08 Cindy Morgan Closed "Approve" ballot
2009-06-09
08 Ross Callon State Changes to Approved-announcement to be sent from IESG Evaluation::AD Followup by Ross Callon
2009-06-09
08 Ross Callon [Ballot Position Update] Position for Ross Callon has been changed to Yes from No Objection by Ross Callon
2009-06-09
08 Dan Romascanu [Ballot Position Update] Position for Dan Romascanu has been changed to No Objection from Discuss by Dan Romascanu
2009-06-09
08 Tim Polk [Ballot Position Update] Position for Tim Polk has been changed to No Objection from Undefined by Tim Polk
2009-06-09
08 Tim Polk [Ballot Position Update] Position for Tim Polk has been changed to Undefined from Discuss by Tim Polk
2009-06-09
08 Pasi Eronen [Ballot Position Update] Position for Pasi Eronen has been changed to No Objection from Discuss by Pasi Eronen
2009-06-08
08 (System) Sub state has been changed to AD Follow up from New Id Needed
2009-06-08
08 (System) New version available: draft-ietf-ospf-lls-08.txt
2009-04-03
08 Ross Callon Responsible AD has been changed to Ross Callon from David Ward
2009-03-24
08 David Ward State Changes to IESG Evaluation::Revised ID Needed from IESG Evaluation::AD Followup by David Ward
2009-03-19
08 Dan Romascanu
[Ballot discuss]
I would suggest some more crisp text that makes clear the criteria for approving TLVs i.e. for the goal of OSPF Link-Local signaling. …
[Ballot discuss]
I would suggest some more crisp text that makes clear the criteria for approving TLVs i.e. for the goal of OSPF Link-Local signaling. Unless the intent is to allow for this technique to become a vehicle for transfering arbitrary information, it would be good to make clear that such overloading of the semantics is not permitted.
2009-03-10
08 Russ Housley [Ballot Position Update] Position for Russ Housley has been changed to No Objection from Discuss by Russ Housley
2009-03-10
08 Magnus Westerlund [Ballot Position Update] Position for Magnus Westerlund has been changed to No Objection from Discuss by Magnus Westerlund
2009-03-09
08 (System) Sub state has been changed to AD Follow up from New Id Needed
2009-03-09
07 (System) New version available: draft-ietf-ospf-lls-07.txt
2008-12-18
08 Cindy Morgan State Changes to IESG Evaluation::Revised ID Needed from IESG Evaluation by Cindy Morgan
2008-12-18
08 Pasi Eronen [Ballot comment]
2008-12-18
08 Ross Callon [Ballot Position Update] Position for Ross Callon has been changed to No Objection from Discuss by Ross Callon
2008-12-18
08 Pasi Eronen
[Ballot discuss]
(Updated for version -06)

I have reviewed draft-ietf-ospf-lls-06. Overall, the document looks
good, but I have the following concerns that I'd like to …
[Ballot discuss]
(Updated for version -06)

I have reviewed draft-ietf-ospf-lls-06. Overall, the document looks
good, but I have the following concerns that I'd like to discuss
before recommending approval of the document:

- The document needs to describe its relationship to RFC 4813, and list
changes done since it (based on quickly look, this includes at least
OSPFv3 support and changed format for Private/Enterprise TLVs in
Section 2.6), and explain why this is upgraded from Experimental
to Standards Track (i.e. what was learned from the experiment).

- A question: do you have data to show that existing implementations
(that don't support RFC 4813/this draft) actually behave as assumed
here? (That is, accept OSPF packets with extra junk at the end -- this
sounds like the kind of thing implementations often get wrong....) 
I assume you have such data, but briefly summarizing the real-world
situation in Section 4 would be very useful. (Authors have replied
they have data, but it hasn't been added to the document.)

- Section 3 is unclear whether the IANA is asked to create a registry
for this document, or just update the registry created for RFC 4813 to
point to this document. (The authors replied it's the latter, but
the document doesn't say it.)


From Stephen Farrell's SecDir review:

- Section 2.5 is quite vague on exactly what data is used when
calculating AuthData.  Does "the LLS data block" mean the whole
LLS data block (including the CA-TLV, presumably with AuthData
set to zero or something?), or just the TLVs before this TLV?
2008-12-18
08 Jari Arkko [Ballot Position Update] New position, No Objection, has been recorded by Jari Arkko
2008-12-18
08 Ron Bonica [Ballot Position Update] New position, No Objection, has been recorded by Ron Bonica
2008-12-18
08 Mark Townsley
[Ballot comment]
> 2.4.  Extended Options TLV
>  Bits in the Value field do not have any semantics from the point of
>    view …
[Ballot comment]
> 2.4.  Extended Options TLV
>  Bits in the Value field do not have any semantics from the point of
>    view of the LLS mechanism.  This field MAY be used to announce some
>    OSPF capabilities that are link-specific.  Also, other OSPF
>    extensions MAY allocate bits in the bit vector to perform boolean
>    link-local signaling.

This field doesn't seem to scope the LLS options to be link-local in nature, which I would think would be a minimum requirement. Further, it seems that the bits are not even restricted to being "Extended Options" given that there is explicit wording allowing the bits to be used as boolean flags.

I think that at a minimum this needs to be scoped to link-local signaling, and should probably be renamed to "Extended Flags" or some such so that people will not mistake that it is only used for capability option signaling, but also is open for use for any sort of boolean signaling.

> 2.1.  Options Field

I would rename this section to "L-bit in Options Field" so as not to imply that the Options field is being defined in this document, just that the L bit is.

> 2.6.  Private TLVs
All other TLVs come with a picture, except this one.

>    The data included in the LLS block attached to a Hello packet MAY be
>    used for dynamic signaling since Hello packets may be sent at any
>    time in time.

time in time?
2008-12-18
08 Mark Townsley [Ballot Position Update] New position, No Objection, has been recorded by Mark Townsley
2008-12-17
08 Ross Callon
[Ballot discuss]
My discuss is really a question. I apologize that I didn't get a chance to ask the authors prior to the telechat and …
[Ballot discuss]
My discuss is really a question. I apologize that I didn't get a chance to ask the authors prior to the telechat and expect that I am quite likely to clear during the telechat.

How much testing and/or deployment experience is there with this feature? Are we confident that there aren't any existing implementations that suffer some sort of unfortunate reaction (such as crashing) when they get OSPF packets that contain TLVs encoded in this manner?
2008-12-17
06 (System) New version available: draft-ietf-ospf-lls-06.txt
2008-12-17
08 Ross Callon [Ballot Position Update] New position, Discuss, has been recorded by Ross Callon
2008-12-17
08 Dan Romascanu
[Ballot discuss]
1. The IANA considerations section should be expressed in terms of RFC 5226, which replaces RFC 2434 whichwould have been the correct …
[Ballot discuss]
1. The IANA considerations section should be expressed in terms of RFC 5226, which replaces RFC 2434 whichwould have been the correct reference for [IANA]. If I understand correctly the policy for values 0-32767 is intended to be IETF Review, while the policy for values 32768-65536 is Expert Review.

2. It is not clear to me what Private and Experimental TLVs mean. Will an Expermental TLV be marked in any way, so that routers know that they are dealing with an experiment? I do not understand how this is possible, and unless there is some good reason I suggest to drop Experimental and leave this option for private usage only.

3. I would suggest some more crisp text that makes clear the criteria for approving TLVs i.e. for the goal of OSPF Link-Local signaling. Unless the intent is to allow for this technique to become a vehicle for transfering arbitrary information, it would be good to make clear that such overloading of the semantics is not permitted.
2008-12-17
08 Dan Romascanu [Ballot Position Update] New position, Discuss, has been recorded by Dan Romascanu
2008-12-17
08 Lisa Dusseault [Ballot comment]
I had the same question as Pasi to be sure that this actually gets marked as obsoleting RFC4813.
2008-12-17
08 Lisa Dusseault [Ballot Position Update] New position, No Objection, has been recorded by Lisa Dusseault
2008-12-17
08 Tim Polk
[Ballot discuss]
Two issues I would like to discuss about LLS.  Assuming that these issues need to be
addressed, I believe they could be handled …
[Ballot discuss]
Two issues I would like to discuss about LLS.  Assuming that these issues need to be
addressed, I believe they could be handled in the security considerations.

(1) Since LLS is optional and is not a negotiated capability, there is no way to determine
if the OSPF router receiving the OSPF packet is using this information.  Section 2 glosses
over these complications by stating "changes made due to LLS block TLV's do not affect
the basic routing when interacting with non-LLS routers." 

This strikes me as a goal rather than a promise. I think text describing the implications
of poorly designed LLS data processing is needed, and provide reasonable guidance for
protocol designers that want to use this feature.

(2) I think there is a decent chance that a router will be connected to a router that either
doesn't recognize LLS at all or expects different information to be transmitted (routers
from a different domain or manfacturer?).  Given that, wouldn't it be prudent to recommend
that this feature be configurable on a per-interface basis?
2008-12-17
08 Tim Polk [Ballot Position Update] New position, Discuss, has been recorded by Tim Polk
2008-12-17
08 Tim Polk
[Ballot comment]
The security considerations section would benefit from a few pointers and a bit more text.
I suggest adding the following to the first …
[Ballot comment]
The security considerations section would benefit from a few pointers and a bit more text.
I suggest adding the following to the first paragraph:

Security Considerations inherited from OSPFv2 are described in [OSPFV2].

I would suggest adding the following to the second paragraph:

Security considerations inherited from OSPFv3 are described in [OSPFv3] and [OSPFV3AUTH].
2008-12-17
08 Magnus Westerlund
[Ballot discuss]
After having reviewed this document I have some questions that I really think need to be answered before I am feeling comfortable allowing …
[Ballot discuss]
After having reviewed this document I have some questions that I really think need to be answered before I am feeling comfortable allowing this document to be approved.

This document allows for up to 64k big data objects to be added to OSPF messages. This clearly affects the amount of data consumed by OSPF however, this document seems to have no discussion about the potential transport issues that adding arbitrary data objects can cause.

Fragmentation of OSPF messages. A quick glance in RFC 2328 indicates that there are no built in fragmentation support. The reliance on IP fragmentation have two issues:

1. First how the addition of extra data changes the loss probability for the message due to that a single loss among the fragments results in message delivery failure.

2. That the potential size of the arbitrary data is not 64k, but actually 64k minus all the other message parts in the OSPF message.

Then there is the issue of congestion avoidance and transmission rate control. I have now idea how this works in OSPF (please enlighten me), but enlarging the messages clearly have a potential impact on the message transmission behavior and consumed resources that at least needs to be commented on. Are you certain that the existing mechanism is suitable for arbitrary data?

What reliability are provided for the arbitrary data? It seems that the core messages in OSPF handles reliability in various protocol dependent ways directly related to the message type. It is not at all clear that the arbitrary data object will have the same reliability requirements that the OSPF message it is being sent in. That needs consideration.
2008-12-17
08 Magnus Westerlund [Ballot Position Update] New position, Discuss, has been recorded by Magnus Westerlund
2008-12-16
08 Pasi Eronen
[Ballot comment]
- Stephen Farrell's SecDir review had some suggestions for 
  clarification and editorial nits.
- [IANA] has been obsoleted by RFC 5226. …
[Ballot comment]
- Stephen Farrell's SecDir review had some suggestions for 
  clarification and editorial nits.
- [IANA] has been obsoleted by RFC 5226.
- [OSPFV3] has been obsoleted by RFC 5340.
2008-12-16
08 Pasi Eronen
[Ballot discuss]
I have reviewed draft-ietf-ospf-lls-05. Overall, the document looks
good, but I have the following concerns that I'd like to discuss
before recommending approval …
[Ballot discuss]
I have reviewed draft-ietf-ospf-lls-05. Overall, the document looks
good, but I have the following concerns that I'd like to discuss
before recommending approval of the document:

- Should this document (once approved) obsolete RFC 4813?  Either way,
the document needs to describe its relationship to RFC 4813, and list
changes done since it (based on quickly look, this includes at least
OSPFv3 support and changed format for Private/Enterprise TLVs in
Section 2.6), and explain why this is upgraded from Experimental
to Standards Track (i.e. what was learned from the experiment).

- A question: do you have data to show that existing implementations
(that don't support RFC 4813/this draft) actually behave as assumed
here? (That is, accept OSPF packets with extra junk at the end -- this
sounds like the kind of thing implementations often get wrong....) 
I assume you have such data, but briefly summarizing the real-world
situation in Section 4 would be very useful.

- Section 3 is unclear whether the IANA is asked to create a registry
for this document, or just update the registry created for RFC 4813 to
point to this document (or possibly something else).

From Stephen Farrell's SecDir review (which also needs a reply):

- Section 2.2 describes the use of the checksum field, but never says
what to do if the checksum is wrong. Is just the LLS block ignored or
the entire OSPF message?

- Section 2.2 doesn't say whether the checksum bits (presumably
zero'd?) are considered part of the LLS block when calculating the
checksum.

- The spec doesn't say what to put in the checksum field when using
the Cryptographic Authentication TLV (presumably 0, but should be said)

- Section 2.5 is quite vague on exactly what data is used when
calculating AuthData. Does it include the TLVs following CA-TLV?
(Presumably yes, but the text should say so.) What's placed in
the AuthData field during the calculation? (Presumably zeroes,
but the text doesn't say.)
2008-12-16
08 Pasi Eronen [Ballot Position Update] New position, Discuss, has been recorded by Pasi Eronen
2008-12-16
08 Lars Eggert
[Ballot comment]
Section 2., paragraph 4:
>    The LLS data block MAY be attached to OSPF Hello and DD packets.

  The "MAY" is …
[Ballot comment]
Section 2., paragraph 4:
>    The LLS data block MAY be attached to OSPF Hello and DD packets.

  The "MAY" is ambiguous - do you mean "MUST only"?


Section 6.1., paragraph 4:
>    [OSPFV3]  Coltun, R., Ferguson, D., and J. Moy, "OSPF for IPv6",
>              RFC 2740, December 1999.

  Obsolete normative reference: RFC 2740 (ref. 'OSPFV3') (Obsoleted by
  RFC 5340). Please add RFC Editor Note.
2008-12-16
08 Lars Eggert [Ballot Position Update] New position, No Objection, has been recorded by Lars Eggert
2008-12-15
08 Chris Newman [Ballot Position Update] New position, No Objection, has been recorded by Chris Newman
2008-12-12
08 Russ Housley
[Ballot discuss]
Spencer Dawkins raised a few questions in his Gen-ART Review that was
  posted on 2008-11-05.  There was not a response to these …
[Ballot discuss]
Spencer Dawkins raised a few questions in his Gen-ART Review that was
  posted on 2008-11-05.  There was not a response to these questions.
  Please address these questions.
 
  The document says:
  >
  > The 16-bit LLS Data Length field contains the length (in 32-bit
  > words) of the LLS block including the header and payload.
  > Implementations MUST NOT use the Length field in the IP packet header
  > to determine the length of the LLS data block.
  >
  Spencer asked: "I'm not sure this is a 2119 MUST NOT - aren't you just
  saying that if you try it, you'll fail?"

  The document says:
  >
  > The CA-TLV MUST only appear once in the the LLS block.  Also, when
  > present, this TLV SHOULD be the last TLV in the LLS block.
  >
  Spencer asked: "Why SHOULD and not MUST? At a minimum, I would expect
  to see some description of what should happen if CA-TLV is NOT the
  last TLV in the LLS block - and if the expectation is that processing
  continues, I'm not sure what this sentence means..."
2008-12-12
08 Russ Housley [Ballot Position Update] New position, Discuss, has been recorded by Russ Housley
2008-12-10
08 David Ward [Ballot Position Update] New position, Yes, has been recorded for David Ward
2008-12-10
08 David Ward Ballot has been issued by David Ward
2008-12-10
08 David Ward Created "Approve" ballot
2008-12-06
08 Samuel Weiler Request for Last Call review by SECDIR Completed. Reviewer: Stephen Farrell.
2008-11-18
08 David Ward Telechat date was changed to 2008-12-18 from 2008-12-04 by David Ward
2008-11-16
08 David Ward Placed on agenda for telechat - 2008-12-04 by David Ward
2008-11-16
08 David Ward State Changes to IESG Evaluation from Waiting for AD Go-Ahead by David Ward
2008-11-11
08 Samuel Weiler Request for Last Call review by SECDIR is assigned to Stephen Farrell
2008-11-11
08 Samuel Weiler Request for Last Call review by SECDIR is assigned to Stephen Farrell
2008-11-10
08 (System) State has been changed to Waiting for AD Go-Ahead from In Last Call by system
2008-11-04
08 Amanda Baber
IANA Last Call comments:

Please confirm that we have identified these actions correctly:

Upon the approval of this document, IANA will make the following
changes …
IANA Last Call comments:

Please confirm that we have identified these actions correctly:

Upon the approval of this document, IANA will make the following
changes in the "Open Shortest Path First (OSPF) Link Local
Signalling (LLS) - Type/Length/Value Identifiers (TLV)" registry
at http://www.iana.org/assignments/ospf-lls-tlvs:

OLD:

Registry Name: Link Local Signalling TLV Identifiers (LLS Types)
Reference: [RFC4813]
Registration Rules: IETF Consensus

Registry:
LLS Type Name Reference
----------- -------------------------------------- ---------
0 Reserved
1 Extended Options [RFC4813]
2 Cryptographic Authentication [RFC4813]
3-32767 Unassigned
32768-65535 Reserved for Private Use

Sub-registy: LLS Type 1 Extended Options
Reference: [RFC4813]
Registration Rules: IETF Consensus

Registry:
Extended Options Bit Name Reference
------------------ --------------------------------- ---------
0x00000001 LSDB Resynchronization (LR) [OOB] [RFC4813]
0x00000002 Restart Signal (RS-bit) [RESTART] [RFC4813]


NEW:

Registry Name: Link Local Signalling TLV Identifiers (LLS Types)
Reference: [RFC4813]
Registration Rules: IETF Consensus

Registry:
LLS Type Name Reference
----------- ----------------------------- ---------
0 Reserved [RFC-ietf-ospf-lls-05.txt]
1 Extended Options [RFC-ietf-ospf-lls-05.txt]
2 Cryptographic Authentication [RFC-ietf-ospf-lls-05.txt]
3-32767 Unassigned
32768-65535 Reserved for Private Use [RFC-ietf-ospf-lls-05.txt]

Sub-registy: LLS Type 1 Extended Options
Reference: [RFC4813]
Registration Rules: IETF Consensus

Registry:
Extended Options Bit Name Reference
------------------ --------------------------------- ---------
0x00000001 LSDB Resynchronization (LR) [OOB] [RFC-ietf-ospf-lls-05.txt]
0x00000002 Restart Signal (RS-bit) [RESTART] [RFC-ietf-ospf-lls-05.txt]

If we should add "[RFC-ietf-ospf-lls-05.txt]" to the current
references, rather than replace the current references, please
let us know.
2008-10-27
08 Cindy Morgan Last call sent
2008-10-27
08 Cindy Morgan State Changes to In Last Call from Last Call Requested by Cindy Morgan
2008-10-27
08 David Ward Last Call was requested by David Ward
2008-10-27
08 David Ward State Changes to Last Call Requested from AD Evaluation by David Ward
2008-10-27
08 (System) Ballot writeup text was added
2008-10-27
08 (System) Last call text was added
2008-10-27
08 (System) Ballot approval text was added
2008-10-06
08 David Ward State Changes to AD Evaluation from Publication Requested by David Ward
2008-10-01
08 Ross Callon Responsible AD has been changed to David Ward from Ross Callon
2008-10-01
08 Ross Callon Intended Status has been changed to Proposed Standard from None
2008-10-01
08 Ross Callon
Proto writeup by Acee Lindem:

  1. Have the chairs personally reviewed this version of the Internet
    Draft (ID), and in particular, do …
Proto writeup by Acee Lindem:

  1. Have the chairs personally reviewed this version of the Internet
    Draft (ID), and in particular, do they believe this ID is ready
    to forward to the IESG for publication?

    Yes

  2. Has the document had adequate review from both key WG members and
    key non-WG members?

    Yes - I've reviewed it and we had some good comments during the WG
    last call.

    Do you have any concerns about the depth or
    breadth of the reviews that have been performed?
   
    No

  3. Do you have concerns that the document needs more review from a
    particular (broader) perspective (e.g., security, operational
    complexity, someone familiar with AAA, etc.)?

    No

  4. Do you have any specific concerns/issues with this document that
    you believe the ADs and/or IESG should be aware of? For example,
    perhaps you are uncomfortable with certain parts of the document,
    or have concerns whether there really is a need for it. In any
    event, if your issues have been discussed in the WG and the WG has
    indicated it that it still wishes to advance the document, detail
    those concerns in the write-up.

    No

  5. How solid is the WG consensus behind this document? Does it
    represent the strong concurrence of a few individuals, with
    others being silent, or does the WG as a whole understand and
    agree with it?

    This draft represents the promotion of RFC 4813 from experimental
    to proposed standard. It also extends LLS to OSPFv3 which is
    simpler since authentication is handled via IPsec.


  6. Has anyone threatened an appeal or otherwise indicated extreme
    discontent? If so, please summarise the areas of conflict
    in separate email to the Responsible Area Director.

    No

  7. Have the chairs verified that the document adheres to all
    of the ID Checklist items?

idnits 2.09.00

tmp/draft-ietf-ospf-lls-05.txt:

  Checking boilerplate required by RFC 3978 and 3979, updated by RFC 4748:
  ----------------------------------------------------------------------------

    No issues found here.

  Checking nits according to http://www.ietf.org/ietf/1id-guidelines.txt:
  ----------------------------------------------------------------------------

    No issues found here.

  Checking nits according to http://www.ietf.org/ID-Checklist.html:
  ----------------------------------------------------------------------------

    No issues found here.

  Miscellaneous warnings:
  ----------------------------------------------------------------------------

    No issues found here.

  Checking references for intended status: Proposed Standard
  ----------------------------------------------------------------------------

    (See RFCs 3967 and 4897 for information about using normative references
    to lower-maturity documents in RFCs)

  ** Obsolete normative reference: RFC 2740 (ref. 'OSPFV3') (Obsoleted by RFC
    5340
)


    Summary: 1 error (**), 0 warnings (==), 0 comments (--).

    Run idnits with the --verbose option for more detailed information about
    the items above.

-------------------------------------------------------------------------------

This can be fixed in a new revision or as part of the RFC Editor
process (they check this).


  8. Is the document split into normative and informative references?

    Yes

    Are there normative references to IDs, where the IDs are not
    also ready for advancement or are otherwise in an unclear state?
    (note here that the RFC editor will not publish an RFC with
    normative references to IDs, it will delay publication until all
    such IDs are also ready for publication as RFCs.)

    No - only references to RFCs.

  9. What is the intended status of the document? (e.g., Proposed
    Standard, Informational?)

    Proposed Standard

10. For Standards Track and BCP documents, the IESG approval
    announcement includes a write-up section with the following 
    sections:

    * Technical Summary
    * Working Group Summary
    * Protocol Quality

  OSPF LLS represents an extendible backward compatible mechanism for
  signaling protocol parametes and events to immediate OSPF neighbors.
  The OSPFv2 is currently deployed in Cisco IOS-based routers. The
  OSPFv3 version of LLS has been implemented by several independent
  parties in the context of the OSPF MANET experimental drafts.
2008-10-01
08 Ross Callon Draft Added by Ross Callon in state Publication Requested
2008-04-22
05 (System) New version available: draft-ietf-ospf-lls-05.txt
2008-02-13
04 (System) New version available: draft-ietf-ospf-lls-04.txt
2007-08-06
03 (System) New version available: draft-ietf-ospf-lls-03.txt
2007-01-12
02 (System) New version available: draft-ietf-ospf-lls-02.txt
2006-06-19
01 (System) New version available: draft-ietf-ospf-lls-01.txt
2000-11-14
00 (System) New version available: draft-ietf-ospf-lls-00.txt