Resource Reservation Protocol (RSVP) Extensions for Path-Triggered RSVP Receiver Proxy
draft-ietf-tsvwg-rsvp-proxy-proto-11
Revision differences
Document history
Date | Rev. | By | Action |
---|---|---|---|
2012-08-22
|
11 | (System) | post-migration administrative database adjustment to the No Objection position for Robert Sparks |
2012-08-22
|
11 | (System) | post-migration administrative database adjustment to the No Objection position for Gonzalo Camarillo |
2012-08-22
|
11 | (System) | post-migration administrative database adjustment to the No Objection position for Tim Polk |
2012-08-22
|
11 | (System) | post-migration administrative database adjustment to the Yes position for Magnus Westerlund |
2010-05-05
|
11 | (System) | IANA Action state changed to RFC-Ed-Ack from Waiting on RFC Editor |
2010-05-05
|
11 | (System) | IANA Action state changed to Waiting on RFC Editor from In Progress |
2010-05-05
|
11 | (System) | IANA Action state changed to In Progress from Waiting on Authors |
2010-04-26
|
11 | (System) | IANA Action state changed to Waiting on Authors from In Progress |
2010-04-26
|
11 | (System) | IANA Action state changed to In Progress |
2010-04-26
|
11 | Cindy Morgan | State Changes to RFC Ed Queue from Approved-announcement sent by Cindy Morgan |
2010-04-26
|
11 | Amy Vezza | IESG state changed to Approved-announcement sent |
2010-04-26
|
11 | Amy Vezza | IESG has approved the document |
2010-04-26
|
11 | Amy Vezza | Closed "Approve" ballot |
2010-04-26
|
11 | Amy Vezza | State Changes to Approved-announcement to be sent from IESG Evaluation::AD Followup by Amy Vezza |
2010-04-23
|
11 | Gonzalo Camarillo | [Ballot Position Update] Position for Gonzalo Camarillo has been changed to No Objection from Discuss by Gonzalo Camarillo |
2010-04-19
|
11 | Lars Eggert | [Ballot Position Update] Position for Lars Eggert has been changed to Yes from No Objection by Lars Eggert |
2010-04-16
|
11 | Gonzalo Camarillo | [Ballot discuss] I am picking up Cullen's discusses on draft-ietf-tsvwg-rsvp-proxy-approaches-09.txt and draft-ietf-tsvwg-rsvp-proxy-proto-11 Discuss (2010-03-22) Need to discuss the applicability of deployment - as previous RSVP … [Ballot discuss] I am picking up Cullen's discusses on draft-ietf-tsvwg-rsvp-proxy-approaches-09.txt and draft-ietf-tsvwg-rsvp-proxy-proto-11 Discuss (2010-03-22) Need to discuss the applicability of deployment - as previous RSVP discussions, this is likely only deployable inside a single trust domain. For a proxy that does inspection or path triggered, how does it know which ones to "proxy" and what to ignore. It seems this will break all end to end RSVP that behind a proxy. Why are section 4.1 and 4.1 SHOULD and MAY implement. It seem like they need to be MUST. How do proxies know what bandwidth to request for a flow? If they assume some certain bandwidth, this makes it much harder to deploy new services. Need to specify "predetermined time" in section 4.1. Not willing to have it be zero. Why is the Receiver-Proxy-Needed needed? RAO paragraph in security consideration does not seem right. The dissection in last para of stein 5 is no longer true with the other changes. Don't understand why this needs the group-keying work For something like triggered approach, when does the reservation get town down? The draft discusses deployments snooping SIP. Experience with SIP ALGs in firewalls has proven this is a really bad idea and mostly fails. Not to mention SIP over TLS. The draft seems to hint at detecting RTP packets - I have no idea how to do this, please clarify. ICE is sometime used to signal media flows, but not always - how would the device know. Even worst, how would it know what bandwidth to use. Has the working group considered if there are ways to achieve this that are not IPR encumbered? |
2010-04-16
|
11 | Gonzalo Camarillo | [Ballot Position Update] New position, Discuss, has been recorded by Gonzalo Camarillo |
2010-03-30
|
11 | Magnus Westerlund | Responsible AD has been changed to Lars Eggert from Magnus Westerlund |
2010-03-16
|
11 | Magnus Westerlund | [Ballot Position Update] Position for Magnus Westerlund has been changed to Yes from No Objection by Magnus Westerlund |
2010-03-08
|
11 | (System) | New version available: draft-ietf-tsvwg-rsvp-proxy-proto-11.txt |
2010-01-14
|
11 | Cullen Jennings | [Ballot discuss] Need to discuss the applicability of deployment - as previous RSVP discussions, this is likely only deployable inside a single trust domain. For … [Ballot discuss] Need to discuss the applicability of deployment - as previous RSVP discussions, this is likely only deployable inside a single trust domain. For a proxy that does inspection or path triggered, how does it know which ones to "proxy" and what to ignore. It seems this will break all end to end RSVP that behind a proxy. Why are section 4.1 and 4.1 SHOULD and MAY implement. It seem like they need to be MUST. How do proxies know what bandwidth to request for a flow? If they assume some certain bandwidth, this makes it much harder to deploy new services. Need to specify "predetermined time" in section 4.1. Not willing to have it be zero. Why is the Receiver-Proxy-Needed needed? RAO paragraph in security consideration does not seem right. The dissection in last para of stein 5 is no longer true with the other changes. Don't understand why this needs the group-keying work For something like triggered approach, when does the reservation get town down? The draft discusses deployments snooping SIP. Experience with SIP ALGs in firewalls has proven this is a really bad idea and mostly fails. Not to mention SIP over TLS. The draft seems to hint at detecting RTP packets - I have no idea how to do this, please clarify. ICE is sometime used to signal media flows, but not always - how would the device know. Even worst, how would it know what bandwidth to use. Has the working group considered if there are ways to achieve this that are not IPR encumbered? |
2009-10-29
|
11 | Tim Polk | [Ballot Position Update] Position for Tim Polk has been changed to No Objection from Undefined by Tim Polk |
2009-10-29
|
11 | Tim Polk | [Ballot Position Update] Position for Tim Polk has been changed to Undefined from Discuss by Tim Polk |
2009-10-29
|
11 | Magnus Westerlund | [Ballot Position Update] Position for Magnus Westerlund has been changed to No Objection from Discuss by Magnus Westerlund |
2009-10-26
|
11 | (System) | Sub state has been changed to AD Follow up from New Id Needed |
2009-10-26
|
10 | (System) | New version available: draft-ietf-tsvwg-rsvp-proxy-proto-10.txt |
2009-09-01
|
11 | Magnus Westerlund | State Changes to IESG Evaluation::Revised ID Needed from IESG Evaluation::AD Followup by Magnus Westerlund |
2009-09-01
|
11 | Magnus Westerlund | After discussion in Stockholm an updated document is need. |
2009-06-03
|
11 | Magnus Westerlund | [Ballot discuss] As currently defined the deployment of RSVP porxy will prevent end-to-end to work as long as the proxy is in place. To me … [Ballot discuss] As currently defined the deployment of RSVP porxy will prevent end-to-end to work as long as the proxy is in place. To me the damage this extension will cause to regular RSVP and the current model is just to great too allow publication until their is a better co-existence story in place. |
2009-06-03
|
11 | Magnus Westerlund | [Ballot Position Update] Position for Magnus Westerlund has been changed to Discuss from Yes by Magnus Westerlund |
2009-05-21
|
11 | Cindy Morgan | State Changes to IESG Evaluation::AD Followup from IESG Evaluation by Cindy Morgan |
2009-05-21
|
11 | Cullen Jennings | [Ballot discuss] I have placed all my issues for this spec into the discuss for proxy-approaches as it seemed better to have them in one … [Ballot discuss] I have placed all my issues for this spec into the discuss for proxy-approaches as it seemed better to have them in one place. Once we resolve theses, we can figure out what to do here. I would expect for important things like deployment applicability, for theses to occur in this specification and not just by reference to an informational document. |
2009-05-21
|
11 | Cullen Jennings | [Ballot discuss] I have placed all my issues for this spec into the discuss for proxy-approaches as it seemed better to have them in one … [Ballot discuss] I have placed all my issues for this spec into the discuss for proxy-approaches as it seemed better to have them in one place. Once we resolve theses, we can figure out what to do here. I would expect for important things like deployment applicability, for theses to occur in this specification and not just by reference to an informational document. |
2009-05-21
|
11 | Cullen Jennings | [Ballot Position Update] New position, Discuss, has been recorded by Cullen Jennings |
2009-05-21
|
11 | Ross Callon | [Ballot Position Update] New position, No Objection, has been recorded by Ross Callon |
2009-05-21
|
11 | Ross Callon | [Ballot comment] I am concerned that RSVP in general allows hosts to send something that the router has to receive in its control plane, which … [Ballot comment] I am concerned that RSVP in general allows hosts to send something that the router has to receive in its control plane, which opens up the possibility of DOS attacks by the hosts against the routers. Given the current state of host security, it is pretty much a non-starter to let millions of hosts send anything to the router's control plane. The result is that service providers won't allow RSVP packets across the CE/PE boundary (or just tunnel them over the network). I am not aware of this being discussed anywhere. I think that this general issue is worth writing up in more detail. I am putting this in as a comment, rather than a DISCUSS, since this is not specific to RSVP proxy. It is a basic issue with RSVP (which of course is water than went over the dam a very long time ago). Thus it is not at all clear that this document is the right place to discuss this issue. |
2009-05-21
|
11 | Ross Callon | [Ballot comment] I am concerned that RSVP in general allows hosts to send something that the router has to receive in its control plane, which … [Ballot comment] I am concerned that RSVP in general allows hosts to send something that the router has to receive in its control plane, which opens up the possibility of DOS attacks by the hosts against the routers. Given the current state of host security, it is pretty much a non-starter to let millions of hosts send anything to the router's control plane. The result of course is that service providers won't allow RSVP packets across the CE/PE boundary (or just tunnel them over the network). I am not aware of this being discussed anywhere. I think that this general issue is worth writing up in more detail. I am putting this in as a comment, rather than a DISCUSS, since this is not specific to RSVP proxy. It is a basic issue with RSVP (which of course is water than went over the dam a very long time ago). Thus it is not at all clear that this document is the right place to discuss this issue. |
2009-05-21
|
11 | Dan Romascanu | [Ballot Position Update] New position, No Objection, has been recorded by Dan Romascanu |
2009-05-21
|
11 | Jari Arkko | [Ballot Position Update] New position, No Objection, has been recorded by Jari Arkko |
2009-05-20
|
11 | Tim Polk | [Ballot discuss] The specification implies that use of these extensions is restricted to Receiver Proxies, but as I understand it, the sender has no way … [Ballot discuss] The specification implies that use of these extensions is restricted to Receiver Proxies, but as I understand it, the sender has no way to determine whether they are performing end-to-end RSVP or communicating with a proxy. If a Regular RSVP Receiver implemented sender notification, what are the consequences (if any)? |
2009-05-20
|
11 | Tim Polk | [Ballot Position Update] New position, Discuss, has been recorded by Tim Polk |
2009-05-19
|
11 | Robert Sparks | [Ballot comment] The document currently doesn't discuss how a proxy knows to act as a proxy. It appears that if a proxy as defined in … [Ballot comment] The document currently doesn't discuss how a proxy knows to act as a proxy. It appears that if a proxy as defined in this document is placed in front of a RSVP capable endpoint, that endpoint will cease to be allowed to participate in RSVP with no indication of why. Was that the intent, and if so, shouldn't this be explained in the document? |
2009-05-19
|
11 | Robert Sparks | [Ballot Position Update] Position for Robert Sparks has been changed to No Objection from Discuss by Robert Sparks |
2009-05-19
|
11 | Lisa Dusseault | [Ballot Position Update] New position, No Objection, has been recorded by Lisa Dusseault |
2009-05-19
|
11 | Ron Bonica | [Ballot comment] I am abstaining not so much because of the content of this document, but because this document extends other work which is not … [Ballot comment] I am abstaining not so much because of the content of this document, but because this document extends other work which is not fit for deployment across provider boundaries. For the most part, ISPs do not permit customers to signal bandwidth across their boundaries using RSVP. There are many reasons for this, most significant of which is that it generally does not support the ISPs business models. Network security issues are also significant. When most routers detect an RSVP message, which includes the IP Router Alert Option, the router consumes additional resources to process the optioned packet, before it authenticates the packet. This leaves the router vulnerable to various types of DoS attack. The IETF should address the general problem of secure signaling before it spends any more cycles on RSVP extensions. |
2009-05-19
|
11 | Ron Bonica | [Ballot discuss] |
2009-05-19
|
11 | Ron Bonica | [Ballot discuss] I am abstaining not so much because of the content of this document, but because this document extends other work which is not … [Ballot discuss] I am abstaining not so much because of the content of this document, but because this document extends other work which is not fit for deployment across provider boundaries. For the most part, ISPs do not permit customers to signal bandwidth across their boundaries using RSVP. There are many reasons for this, most significant of which is that it generally does not support the ISPs business models. Network security issues are also significant. When most routers detect an RSVP message, which includes the IP Router Alert Option, the router consumes additional resources to process the optioned packet, before it authenticates the packet. This leaves the router vulnerable to various types of DoS attack. The IETF should address the general problem of secure signaling before it spends any more cycles on RSVP extensions. |
2009-05-19
|
11 | Ron Bonica | [Ballot Position Update] Position for Ron Bonica has been changed to Abstain from Discuss by Ron Bonica |
2009-05-19
|
11 | Ralph Droms | [Ballot comment] Is the problem described in this text from section 3 a new problem introduced by RSVP receiver proxies: While the sender could … [Ballot comment] Is the problem described in this text from section 3 a new problem introduced by RSVP receiver proxies: While the sender could infer reservation failure from the fact that it has not received a Resv message after a certain time, there are clear benefits in ensuring that the sender gets a prompt, explicit notification in case of reservation failure. This includes faster end-user notification at application layer (e.g., busy signal), faster application level reaction (e.g., application level rerouting), as well as faster release of application-level resources. |
2009-05-19
|
11 | Ralph Droms | [Ballot comment] Is the problem described in this text from section 3 a new problem introducted by RSVP receiver proxies: While the sender could … [Ballot comment] Is the problem described in this text from section 3 a new problem introducted by RSVP receiver proxies: While the sender could infer reservation failure from the fact that it has not received a Resv message after a certain time, there are clear benefits in ensuring that the sender gets a prompt, explicit notification in case of reservation failure. This includes faster end-user notification at application layer (e.g., busy signal), faster application level reaction (e.g., application level rerouting), as well as faster release of application-level resources. |
2009-05-19
|
11 | Ralph Droms | [Ballot Position Update] New position, No Objection, has been recorded by Ralph Droms |
2009-05-18
|
11 | (System) | State Changes to IESG Evaluation from IESG Evaluation - Defer by system |
2009-05-17
|
11 | Robert Sparks | [Ballot discuss] The document currently doesn't discuss how a proxy knows to act as a proxy. It appears that if a proxy as defined in … [Ballot discuss] The document currently doesn't discuss how a proxy knows to act as a proxy. It appears that if a proxy as defined in this document is placed in front of a RSVP capable endpoint, that endpoint will cease to be allowed to participate in RSVP with no indication of why. Was that the intent, and if so, shouldn't this be explained in the document? |
2009-05-17
|
11 | Robert Sparks | [Ballot Position Update] New position, Discuss, has been recorded by Robert Sparks |
2009-05-08
|
11 | (System) | Removed from agenda for telechat - 2009-05-07 |
2009-05-05
|
11 | Alexey Melnikov | [Ballot Position Update] New position, No Objection, has been recorded by Alexey Melnikov |
2009-05-05
|
11 | Cullen Jennings | State Changes to IESG Evaluation - Defer from IESG Evaluation by Cullen Jennings |
2009-05-05
|
11 | Russ Housley | [Ballot Position Update] New position, No Objection, has been recorded by Russ Housley |
2009-05-04
|
09 | (System) | New version available: draft-ietf-tsvwg-rsvp-proxy-proto-09.txt |
2009-05-04
|
11 | Ron Bonica | [Ballot discuss] At this point, this is a DISCUSS DISCUSS. I we were to massively deploy RSVP proxies, would that cause a massive increase in … [Ballot discuss] At this point, this is a DISCUSS DISCUSS. I we were to massively deploy RSVP proxies, would that cause a massive increase in the amount of RAO traffic arriving at provider boundaries? Would that traffic be dropped? If not, could it cause problems for provider equipment? |
2009-05-04
|
11 | Ron Bonica | [Ballot Position Update] New position, Discuss, has been recorded by Ron Bonica |
2009-05-04
|
11 | Lars Eggert | [Ballot Position Update] New position, No Objection, has been recorded by Lars Eggert |
2009-05-02
|
11 | Samuel Weiler | Request for Telechat review by SECDIR Completed. Reviewer: Stephen Kent. |
2009-04-29
|
11 | Adrian Farrel | [Ballot comment] draft-ietf-tsvwg-rsvp-proxy-proto-08.txt Nits to fix if you have to do a respin or in AUTH-48 if the RFC Editor misses them. --- I think … [Ballot comment] draft-ietf-tsvwg-rsvp-proxy-proto-08.txt Nits to fix if you have to do a respin or in AUTH-48 if the RFC Editor misses them. --- I think the documents should be marked as "Updates RFC 3305" --- Section 1 line 1 s/Qos/QoS/ --- Section 1 para 1 s/network need to operate/network needs to operate/ --- Section 1 However, we note that multicast applications do not always mesh well with RSVP Receiver Proxies s/mesh/coexist/ ? --- I am a little bothered by the use of "protected by an RSVP reservation" throughout the document. This is not the use of "protection" that I am familiar with. Perhaps "guaranteed" or "enabled"? --- Figure 4 The key does not explain NotifyU === |
2009-04-29
|
11 | Magnus Westerlund | [Ballot Position Update] New position, Yes, has been recorded for Magnus Westerlund |
2009-04-29
|
11 | Magnus Westerlund | Ballot has been issued by Magnus Westerlund |
2009-04-29
|
11 | Magnus Westerlund | [Note]: 'Please read the informational document draft-ietf-tsvwg-rsvp-proxy-approaches before this one!' added by Magnus Westerlund |
2009-04-29
|
11 | Adrian Farrel | [Ballot Position Update] New position, Yes, has been recorded by Adrian Farrel |
2009-04-29
|
11 | Adrian Farrel | [Ballot comment] draft-ietf-tsvwg-rsvp-proxy-proto-08.txt Nits to fix if you have to do a respin or in AUTH-48 if the RFC Editor misses them. --- I think … [Ballot comment] draft-ietf-tsvwg-rsvp-proxy-proto-08.txt Nits to fix if you have to do a respin or in AUTH-48 if the RFC Editor misses them. --- I think the documents should be marked as "Updates RFC 3305" --- Section 1 line 1 s/Qos/QoS/ --- Section 1 para 1 s/network need to operate/network needs to operate/ --- Section 1 However, we note that multicast applications do not always mesh well with RSVP Receiver Proxies s/mesh/coexist/ ? --- I am a little bothered by the use of "protected by an RSVP reservation" throughout the document. This is not the use of "protection" that I am familiar with. Perhaps "guaranteed" or "enabled"? --- Figure 4 The key does not explain NotifyU === draft-ietf-tsvwg-rsvp-proxy-approaches-06.txt --- I am surprised that all of your references are Informative. Surely some of these are prerequisites for understanding your work? --- |
2009-04-29
|
11 | Adrian Farrel | [Ballot comment] draft-ietf-tsvwg-rsvp-proxy-proto-08.txt Nits to fix if you have to do a respin or in AUTH-48 if the RFC Editor misses them. --- I think … [Ballot comment] draft-ietf-tsvwg-rsvp-proxy-proto-08.txt Nits to fix if you have to do a respin or in AUTH-48 if the RFC Editor misses them. --- I think the documents should be marked as "Updates RFC 3305" --- Section 1 line 1 s/Qos/QoS/ --- Section 1 para 1 s/network need to operate/network needs to operate/ --- Section 1 However, we note that multicast applications do not always mesh well with RSVP Receiver Proxies s/mesh/coexist/ ? --- I am a little bothered by the use of "protected by an RSVP reservation" throughout the document. This is not the use of "protection" that I am familiar with. Perhaps "guaranteed" or "enabled"? --- Figure 4 The key does not explain NotifyU --- |
2009-04-29
|
11 | Adrian Farrel | Created "Approve" ballot |
2009-04-24
|
11 | Samuel Weiler | Request for Telechat review by SECDIR is assigned to Stephen Kent |
2009-04-24
|
11 | Samuel Weiler | Request for Telechat review by SECDIR is assigned to Stephen Kent |
2009-04-22
|
11 | Magnus Westerlund | Placed on agenda for telechat - 2009-05-07 by Magnus Westerlund |
2009-04-22
|
11 | Magnus Westerlund | Note field has been cleared by Magnus Westerlund |
2009-04-22
|
11 | Magnus Westerlund | State Changes to IESG Evaluation from Waiting for AD Go-Ahead::External Party by Magnus Westerlund |
2009-03-02
|
08 | (System) | New version available: draft-ietf-tsvwg-rsvp-proxy-proto-08.txt |
2008-12-18
|
11 | Samuel Weiler | Request for Last Call review by SECDIR Completed. Reviewer: Stephen Kent. |
2008-11-27
|
11 | Magnus Westerlund | State Changes to Waiting for AD Go-Ahead::External Party from Waiting for AD Go-Ahead by Magnus Westerlund |
2008-11-27
|
11 | Magnus Westerlund | [Note]: 'Waiting for some conclusion on the RSVP RAO issues.' added by Magnus Westerlund |
2008-11-16
|
11 | Magnus Westerlund | Will hold in this state for a while until we figure out how to deal with Router Alert security consideration. |
2008-11-14
|
11 | (System) | State has been changed to Waiting for AD Go-Ahead from In Last Call by system |
2008-11-12
|
11 | Amanda Baber | IANA Last Call comments: Action 1: Upon approval of this document, the IANA will make the following changes in the "Error Codes and Globally-Defined Error … IANA Last Call comments: Action 1: Upon approval of this document, the IANA will make the following changes in the "Error Codes and Globally-Defined Error Value Sub-Codes"registry at http://www.iana.org/assignments/rsvp-parameters OLD: Error Code Meaning 1 Admission Control Failure [RFC2205] ... 2 Policy Control Failure [RFC2205] NEW: Error Code Meaning 1 Admission Control Failure [RFC2205][RFC-tsvwg-rsvp-proxy-proto-07] ... 2 Policy Control Failure [RFC2205][RFC-tsvwg-rsvp-proxy-proto-07] Action 2: Upon approval of this document, the IANA will make the following assignment in the "Error Codes and Globally-Defined Error Value Sub-Codes" registry at http://www.iana.org/assignments/rsvp-parameters Error Code Meaning [TBD] Unrecoverable Receiver Proxy Error [RFC-tsvwg-rsvp-proxy-proto-07] The sixteen bits of the Error Value field are defined in [RFC-tsvwg-rsvp-proxy-proto-07] We understand the above to be the only IANA Actions for this document. |
2008-11-11
|
11 | Samuel Weiler | Request for Last Call review by SECDIR is assigned to Stephen Kent |
2008-11-11
|
11 | Samuel Weiler | Request for Last Call review by SECDIR is assigned to Stephen Kent |
2008-10-31
|
11 | Cindy Morgan | Last call sent |
2008-10-31
|
11 | Cindy Morgan | State Changes to In Last Call from Last Call Requested by Cindy Morgan |
2008-10-31
|
11 | Magnus Westerlund | State Changes to Last Call Requested from AD Evaluation::Revised ID Needed by Magnus Westerlund |
2008-10-31
|
11 | Magnus Westerlund | Last Call was requested by Magnus Westerlund |
2008-10-31
|
11 | (System) | Ballot writeup text was added |
2008-10-31
|
11 | (System) | Last call text was added |
2008-10-31
|
11 | (System) | Ballot approval text was added |
2008-09-08
|
11 | Magnus Westerlund | State Changes to AD Evaluation::Revised ID Needed from AD Evaluation::External Party by Magnus Westerlund |
2008-09-08
|
11 | Magnus Westerlund | State Changes to AD Evaluation::External Party from AD Evaluation::AD Followup by Magnus Westerlund |
2008-09-08
|
11 | Magnus Westerlund | Waiting for approaches to be updated. |
2008-07-04
|
11 | Magnus Westerlund | An addition to the write up is that there do exist IPR disclosures on this document from Cisco. https://datatracker.ietf.org/ipr/892/ |
2008-07-01
|
11 | (System) | Sub state has been changed to AD Follow up from New Id Needed |
2008-07-01
|
07 | (System) | New version available: draft-ietf-tsvwg-rsvp-proxy-proto-07.txt |
2008-07-01
|
11 | Magnus Westerlund | This is writeup for the two documents: draft-ietf-tsvwg-rsvp-proxy-proto (proposed standard) draft-ietf-tsvwg-rsvp-proxy-approaches (informational) (1.a) Who is the Document Shepherd for this document? Has the … This is writeup for the two documents: draft-ietf-tsvwg-rsvp-proxy-proto (proposed standard) draft-ietf-tsvwg-rsvp-proxy-approaches (informational) (1.a) Who is the Document Shepherd for this document? Has the Document Shepherd personally reviewed this version of the document and, in particular, does he or she believe this version is ready for forwarding to the IESG for publication? Magnus Westerlund is the Document shepherd. The AD review made it clear some improvements where needed. (1.b) Has the document had adequate review both from key WG members and from key non-WG members? Does the Document Shepherd have any concerns about the depth or breadth of the reviews that have been performed? It has received reasonable review from the RSVP interested folks. I think the document could have benefitted from more wide review. (1.c) Does the Document Shepherd have concerns that the document needs more review from a particular or broader perspective, e.g., security, operational complexity, someone familiar with AAA, internationalization, or XML? I think the operational aspects may require more review. (1.d) Does the Document Shepherd have any specific concerns or issues with this document that the Responsible Area Director and/or the IESG should be aware of? For example, perhaps he or she is uncomfortable with certain parts of the document, or has concerns whether there really is a need for it. In any event, if the WG has discussed those issues and has indicated that it still wishes to advance the document, detail those concerns here. Has an IPR disclosure related to this document been filed? If so, please include a reference to the disclosure and summarize the WG discussion and conclusion on this issue. I hope by clarifying the AD review comments these concerns will be removed. (1.e) How solid is the WG consensus behind this document? Does it represent the strong concurrence of a few individuals, with others being silent, or does the WG as a whole understand and agree with it? Strong consensus from a couple of individuals. (1.f) Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarize the areas of conflict in separate email messages to the Responsible Area Director. (It should be in a separate email because this questionnaire is entered into the ID Tracker.) No (1.g) Has the Document Shepherd personally verified that the document satisfies all ID nits? (See http://www.ietf.org/ID-Checklist.html and http://tools.ietf.org/tools/idnits/.) Boilerplate checks are not enough; this check needs to be thorough. Has the document met all formal review criteria it needs to, such as the MIB Doctor, media type, and URI type reviews? If the document does not already indicate its intended status at the top of the first page, please indicate the intended status here. Yes, there is one downref needed to be take care of. (1.h) Has the document split its references into normative and informative? Are there normative references to documents that are not ready for advancement or are otherwise in an unclear state? If such normative references exist, what is the strategy for their completion? Are there normative references that are downward references, as described in [RFC3967]? If so, list these downward references to support the Area Director in the Last Call procedure for them [RFC3967]. Yes, one downref that can be changed to informational ref. (1.i) Has the Document Shepherd verified that the document's IANA Considerations section exists and is consistent with the body of the document? If the document specifies protocol extensions, are reservations requested in appropriate IANA registries? Are the IANA registries clearly identified? If the document creates a new registry, does it define the proposed initial contents of the registry and an allocation procedure for future registrations? Does it suggest a reasonable name for the new registry? See [RFC2434]. If the document describes an Expert Review process, has the Document Shepherd conferred with the Responsible Area Director so that the IESG can appoint the needed Expert during IESG Evaluation? Yes, protos IANA seems okay. (1.j) Has the Document Shepherd verified that sections of the document that are written in a formal language, such as XML code, BNF rules, MIB definitions, etc., validate correctly in an automated checker? No formal language used. (1.k) The IESG approval announcement includes a Document Announcement Write-Up. Please provide such a Document Announcement Write-Up. Recent examples can be found in the "Action" announcements for approved documents. The approval announcement contains the following sections: Technical Summary RSVP signaling can be used to make end-to-end resource reservations in an IP network in order to guarantee the QoS required by certain flows. With conventional RSVP, both the data sender and receiver of a given flow take part in RSVP signaling. Yet, there are many use cases where resource reservation is required, but the receiver, the sender, or both, is not RSVP-capable. Where the receiver is not RSVP-capable, an RSVP router may behave as an RSVP Receiver Proxy thereby performing RSVP signaling on behalf of the receiver. This allows resource reservations to be established on the segment of the end-to-end path from the sender to the RSVP Receiver Proxy. The Proto document defines the RSVP extensions that are needed to facilitate operations with an RSVP Receiver Proxy whose signaling is triggered by receipt of RSVP Path messages from the sender. Working Group Summary The consensus for the publication was strong but from a small group within the WG. Document Quality The shepherd doesn't know of any implementations. Personnel WG Shepherd and responsible AD is Magnus Westerlund. |
2008-07-01
|
11 | Magnus Westerlund | State Changes to AD Evaluation::Revised ID Needed from AD Evaluation by Magnus Westerlund |
2008-07-01
|
11 | Magnus Westerlund | State Changes to AD Evaluation from Publication Requested by Magnus Westerlund |
2008-05-30
|
11 | Magnus Westerlund | Note field has been cleared by Magnus Westerlund |
2008-05-30
|
11 | Magnus Westerlund | State Changes to Publication Requested from AD is watching by Magnus Westerlund |
2008-05-30
|
06 | (System) | New version available: draft-ietf-tsvwg-rsvp-proxy-proto-06.txt |
2008-04-25
|
05 | (System) | New version available: draft-ietf-tsvwg-rsvp-proxy-proto-05.txt |
2007-12-18
|
04 | (System) | New version available: draft-ietf-tsvwg-rsvp-proxy-proto-04.txt |
2007-10-15
|
03 | (System) | New version available: draft-ietf-tsvwg-rsvp-proxy-proto-03.txt |
2007-10-12
|
02 | (System) | New version available: draft-ietf-tsvwg-rsvp-proxy-proto-02.txt |
2007-10-12
|
(System) | Posted related IPR disclosure: Cisco's Statement about IPR claimed in draft-ietf-tsvwg-rsvp-proxy-proto | |
2007-09-14
|
11 | Magnus Westerlund | Draft Added by Magnus Westerlund in state AD is watching |
2007-09-14
|
11 | Magnus Westerlund | [Note]: 'Needs WG last call in CCAMP' added by Magnus Westerlund |
2007-06-28
|
01 | (System) | New version available: draft-ietf-tsvwg-rsvp-proxy-proto-01.txt |
2007-02-28
|
00 | (System) | New version available: draft-ietf-tsvwg-rsvp-proxy-proto-00.txt |