Skip to main content

Resource Reservation Protocol (RSVP) Extensions for Path-Triggered RSVP Receiver Proxy
draft-ietf-tsvwg-rsvp-proxy-proto-11

Revision differences

Document history

Date Rev. By Action
2012-08-22
11 (System) post-migration administrative database adjustment to the No Objection position for Robert Sparks
2012-08-22
11 (System) post-migration administrative database adjustment to the No Objection position for Gonzalo Camarillo
2012-08-22
11 (System) post-migration administrative database adjustment to the No Objection position for Tim Polk
2012-08-22
11 (System) post-migration administrative database adjustment to the Yes position for Magnus Westerlund
2010-05-05
11 (System) IANA Action state changed to RFC-Ed-Ack from Waiting on RFC Editor
2010-05-05
11 (System) IANA Action state changed to Waiting on RFC Editor from In Progress
2010-05-05
11 (System) IANA Action state changed to In Progress from Waiting on Authors
2010-04-26
11 (System) IANA Action state changed to Waiting on Authors from In Progress
2010-04-26
11 (System) IANA Action state changed to In Progress
2010-04-26
11 Cindy Morgan State Changes to RFC Ed Queue from Approved-announcement sent by Cindy Morgan
2010-04-26
11 Amy Vezza IESG state changed to Approved-announcement sent
2010-04-26
11 Amy Vezza IESG has approved the document
2010-04-26
11 Amy Vezza Closed "Approve" ballot
2010-04-26
11 Amy Vezza State Changes to Approved-announcement to be sent from IESG Evaluation::AD Followup by Amy Vezza
2010-04-23
11 Gonzalo Camarillo [Ballot Position Update] Position for Gonzalo Camarillo has been changed to No Objection from Discuss by Gonzalo Camarillo
2010-04-19
11 Lars Eggert [Ballot Position Update] Position for Lars Eggert has been changed to Yes from No Objection by Lars Eggert
2010-04-16
11 Gonzalo Camarillo
[Ballot discuss]
I am picking up Cullen's discusses on draft-ietf-tsvwg-rsvp-proxy-approaches-09.txt and draft-ietf-tsvwg-rsvp-proxy-proto-11

Discuss (2010-03-22)

Need to discuss the applicability of deployment - as previous RSVP …
[Ballot discuss]
I am picking up Cullen's discusses on draft-ietf-tsvwg-rsvp-proxy-approaches-09.txt and draft-ietf-tsvwg-rsvp-proxy-proto-11

Discuss (2010-03-22)

Need to discuss the applicability of deployment - as previous RSVP discussions,
this is likely only deployable inside a single trust domain.

For a proxy that does inspection or path triggered, how does it know which ones
to "proxy" and what to ignore. It seems this will break all end to end RSVP that
behind a proxy.

Why are section 4.1 and 4.1 SHOULD and MAY implement. It seem like they need to
be MUST.

How do proxies know what bandwidth to request for a flow? If they assume some
certain bandwidth, this makes it much harder to deploy new services.

Need to specify "predetermined time" in section 4.1. Not willing to have it be
zero.

Why is the Receiver-Proxy-Needed needed?

RAO paragraph in security consideration does not seem right.

The dissection in last para of stein 5 is no longer true with the other changes.

Don't understand why this needs the group-keying work

For something like triggered approach, when does the reservation get town down?

The draft discusses deployments snooping SIP. Experience with SIP ALGs in
firewalls has proven this is a really bad idea and mostly fails. Not to mention
SIP over TLS.

The draft seems to hint at detecting RTP packets - I have no idea how to do
this, please clarify.

ICE is sometime used to signal media flows, but not always - how would the
device know. Even worst, how would it know what bandwidth to use.

Has the working group considered if there are ways to achieve this that are not
IPR encumbered?
2010-04-16
11 Gonzalo Camarillo [Ballot Position Update] New position, Discuss, has been recorded by Gonzalo Camarillo
2010-03-30
11 Magnus Westerlund Responsible AD has been changed to Lars Eggert from Magnus Westerlund
2010-03-16
11 Magnus Westerlund [Ballot Position Update] Position for Magnus Westerlund has been changed to Yes from No Objection by Magnus Westerlund
2010-03-08
11 (System) New version available: draft-ietf-tsvwg-rsvp-proxy-proto-11.txt
2010-01-14
11 Cullen Jennings
[Ballot discuss]
Need to discuss the applicability of deployment - as previous RSVP discussions, this is likely only deployable inside a single trust domain.

For …
[Ballot discuss]
Need to discuss the applicability of deployment - as previous RSVP discussions, this is likely only deployable inside a single trust domain.

For a proxy that does inspection or path triggered, how does it know which ones to "proxy" and what to ignore. It seems this will break all end to end RSVP that behind a proxy.

Why are section 4.1 and 4.1 SHOULD and MAY implement. It seem like they need to be MUST.

How do proxies know what bandwidth to request for a flow? If they assume some certain bandwidth, this makes it much harder to deploy new services.

Need to specify "predetermined time" in section 4.1. Not willing to have it be zero.

Why is the Receiver-Proxy-Needed needed?

RAO paragraph in security consideration does not seem right.

The dissection in last para of stein 5 is no longer true with the other changes.

Don't understand why this needs the group-keying work

For something like triggered approach, when does the reservation get town down?

The draft discusses deployments snooping SIP. Experience with SIP ALGs in firewalls has proven this is a really bad idea and mostly fails. Not to mention SIP over TLS.

The draft seems to hint at detecting RTP packets - I have no idea how to do this, please clarify.

ICE is sometime used to signal media flows, but not always - how would the device know. Even worst, how would it know what bandwidth to use.

Has the working group considered if there are ways to achieve this that are not IPR encumbered?
2009-10-29
11 Tim Polk [Ballot Position Update] Position for Tim Polk has been changed to No Objection from Undefined by Tim Polk
2009-10-29
11 Tim Polk [Ballot Position Update] Position for Tim Polk has been changed to Undefined from Discuss by Tim Polk
2009-10-29
11 Magnus Westerlund [Ballot Position Update] Position for Magnus Westerlund has been changed to No Objection from Discuss by Magnus Westerlund
2009-10-26
11 (System) Sub state has been changed to AD Follow up from New Id Needed
2009-10-26
10 (System) New version available: draft-ietf-tsvwg-rsvp-proxy-proto-10.txt
2009-09-01
11 Magnus Westerlund State Changes to IESG Evaluation::Revised ID Needed from IESG Evaluation::AD Followup by Magnus Westerlund
2009-09-01
11 Magnus Westerlund After discussion in Stockholm an updated document is need.
2009-06-03
11 Magnus Westerlund
[Ballot discuss]
As currently defined the deployment of RSVP porxy will prevent end-to-end to work as long as the proxy is in place. To me …
[Ballot discuss]
As currently defined the deployment of RSVP porxy will prevent end-to-end to work as long as the proxy is in place. To me the damage this extension will cause to regular RSVP and the current model is just to great too allow publication until their is a better co-existence story in place.
2009-06-03
11 Magnus Westerlund [Ballot Position Update] Position for Magnus Westerlund has been changed to Discuss from Yes by Magnus Westerlund
2009-05-21
11 Cindy Morgan State Changes to IESG Evaluation::AD Followup from IESG Evaluation by Cindy Morgan
2009-05-21
11 Cullen Jennings
[Ballot discuss]
I have placed all my issues for this spec into the discuss for proxy-approaches as it seemed better to have them in one …
[Ballot discuss]
I have placed all my issues for this spec into the discuss for proxy-approaches as it seemed better to have them in one place. Once we resolve theses, we can figure out what to do here. I would expect for important things like deployment applicability, for theses to occur in this specification and not just by reference to an informational document.
2009-05-21
11 Cullen Jennings
[Ballot discuss]
I have placed all my issues for this spec into the discuss for proxy-approaches as it seemed better to have them in one …
[Ballot discuss]
I have placed all my issues for this spec into the discuss for proxy-approaches as it seemed better to have them in one place. Once we resolve theses, we can figure out what to do here. I would expect for important things like deployment applicability, for theses to occur in this specification and not just by reference to an informational document.
2009-05-21
11 Cullen Jennings [Ballot Position Update] New position, Discuss, has been recorded by Cullen Jennings
2009-05-21
11 Ross Callon [Ballot Position Update] New position, No Objection, has been recorded by Ross Callon
2009-05-21
11 Ross Callon
[Ballot comment]
I am concerned that RSVP in general allows hosts to send something that the router has to receive in its control plane, which …
[Ballot comment]
I am concerned that RSVP in general allows hosts to send something that the router has to receive in its control plane, which opens up the possibility of DOS attacks by the hosts against the routers. Given the current state of host security, it is pretty much a non-starter to let millions of hosts send anything to the router's control plane. The result is that service providers won't allow RSVP packets across the CE/PE boundary (or just tunnel them over the network).

I am not aware of this being discussed anywhere. I think that this general issue is worth writing up in more detail.

I am putting this in as a comment, rather than a DISCUSS, since this is not specific to RSVP proxy. It is a basic issue with RSVP (which of course is water than went over the dam a very long time ago). Thus it is not at all clear that this document is the right place to discuss this issue.
2009-05-21
11 Ross Callon
[Ballot comment]
I am concerned that RSVP in general allows hosts to send something that the router has to receive in its control plane, which …
[Ballot comment]
I am concerned that RSVP in general allows hosts to send something that the router has to receive in its control plane, which opens up the possibility of DOS attacks by the hosts against the routers. Given the current state of host security, it is pretty much a non-starter to let millions of hosts send anything to the router's control plane. The result of course is that service providers won't allow RSVP packets across the CE/PE boundary (or just tunnel them over the network).

I am not aware of this being discussed anywhere. I think that this general issue is worth writing up in more detail.

I am putting this in as a comment, rather than a DISCUSS, since this is not specific to RSVP proxy. It is a basic issue with RSVP (which of course is water than went over the dam a very long time ago). Thus it is not at all clear that this document is the right place to discuss this issue.
2009-05-21
11 Dan Romascanu [Ballot Position Update] New position, No Objection, has been recorded by Dan Romascanu
2009-05-21
11 Jari Arkko [Ballot Position Update] New position, No Objection, has been recorded by Jari Arkko
2009-05-20
11 Tim Polk
[Ballot discuss]
The specification implies that use of these extensions is restricted to Receiver Proxies, but as I
understand it, the sender has no way …
[Ballot discuss]
The specification implies that use of these extensions is restricted to Receiver Proxies, but as I
understand it, the sender has no way to determine whether they are performing end-to-end
RSVP or communicating with a proxy.  If a Regular RSVP Receiver implemented sender
notification, what are the consequences (if any)?
2009-05-20
11 Tim Polk [Ballot Position Update] New position, Discuss, has been recorded by Tim Polk
2009-05-19
11 Robert Sparks
[Ballot comment]
The document currently doesn't discuss how a proxy knows to act as a proxy. It appears that if a proxy as defined in …
[Ballot comment]
The document currently doesn't discuss how a proxy knows to act as a proxy. It appears that if a proxy as defined in this document is placed in front of a RSVP capable endpoint, that endpoint will cease to be allowed to participate in RSVP with no indication of why. Was that the intent, and if so, shouldn't this be explained in the document?
2009-05-19
11 Robert Sparks [Ballot Position Update] Position for Robert Sparks has been changed to No Objection from Discuss by Robert Sparks
2009-05-19
11 Lisa Dusseault [Ballot Position Update] New position, No Objection, has been recorded by Lisa Dusseault
2009-05-19
11 Ron Bonica
[Ballot comment]
I am abstaining not so much because of the content of this document, but because this document extends other work which is not …
[Ballot comment]
I am abstaining not so much because of the content of this document, but because this document extends other work which is not fit for deployment across provider boundaries.

For the most part, ISPs do not permit customers to signal bandwidth across their boundaries using RSVP. There are many reasons for this, most significant of which is that it generally does not support the ISPs business models.

Network security issues are also significant. When most routers detect an RSVP message, which includes the IP Router Alert Option, the router consumes additional resources to process the optioned packet, before it authenticates the packet. This leaves the router vulnerable to various types of DoS attack.

The IETF should address the general problem of secure signaling before it spends any more cycles on RSVP extensions.
2009-05-19
11 Ron Bonica [Ballot discuss]
2009-05-19
11 Ron Bonica
[Ballot discuss]
I am abstaining not so much because of the content of this document, but because this document extends other work which is not …
[Ballot discuss]
I am abstaining not so much because of the content of this document, but because this document extends other work which is not fit for deployment across provider boundaries.

For the most part, ISPs do not permit customers to signal bandwidth across their boundaries using RSVP. There are many reasons for this, most significant of which is that it generally does not support the ISPs business models.

Network security issues are also significant. When most routers detect an RSVP message, which includes the IP Router Alert Option, the router consumes additional resources to process the optioned packet, before it authenticates the packet. This leaves the router vulnerable to various types of DoS attack.

The IETF should address the general problem of secure signaling before it spends any more cycles on RSVP extensions.
2009-05-19
11 Ron Bonica [Ballot Position Update] Position for Ron Bonica has been changed to Abstain from Discuss by Ron Bonica
2009-05-19
11 Ralph Droms
[Ballot comment]
Is the problem described in this text from section 3 a new problem introduced by RSVP receiver proxies:

  While the sender could …
[Ballot comment]
Is the problem described in this text from section 3 a new problem introduced by RSVP receiver proxies:

  While the sender could infer reservation failure from the fact that
  it has not received a Resv message after a certain time, there are
  clear benefits in ensuring that the sender gets a prompt, explicit
  notification in case of reservation failure.  This includes faster
  end-user notification at application layer (e.g., busy signal),
  faster application level reaction (e.g., application level
  rerouting), as well as faster release of application-level resources.
2009-05-19
11 Ralph Droms
[Ballot comment]
Is the problem described in this text from section 3 a new problem introducted by RSVP receiver proxies:

  While the sender could …
[Ballot comment]
Is the problem described in this text from section 3 a new problem introducted by RSVP receiver proxies:

  While the sender could infer reservation failure from the fact that
  it has not received a Resv message after a certain time, there are
  clear benefits in ensuring that the sender gets a prompt, explicit
  notification in case of reservation failure.  This includes faster
  end-user notification at application layer (e.g., busy signal),
  faster application level reaction (e.g., application level
  rerouting), as well as faster release of application-level resources.
2009-05-19
11 Ralph Droms [Ballot Position Update] New position, No Objection, has been recorded by Ralph Droms
2009-05-18
11 (System) State Changes to IESG Evaluation from IESG Evaluation - Defer by system
2009-05-17
11 Robert Sparks
[Ballot discuss]
The document currently doesn't discuss how a proxy knows to act as a proxy. It appears that if a proxy as defined in …
[Ballot discuss]
The document currently doesn't discuss how a proxy knows to act as a proxy. It appears that if a proxy as defined in this document is placed in front of a RSVP capable endpoint, that endpoint will cease to be allowed to participate in RSVP with no indication of why. Was that the intent, and if so, shouldn't this be explained in the document?
2009-05-17
11 Robert Sparks [Ballot Position Update] New position, Discuss, has been recorded by Robert Sparks
2009-05-08
11 (System) Removed from agenda for telechat - 2009-05-07
2009-05-05
11 Alexey Melnikov [Ballot Position Update] New position, No Objection, has been recorded by Alexey Melnikov
2009-05-05
11 Cullen Jennings State Changes to IESG Evaluation - Defer from IESG Evaluation by Cullen Jennings
2009-05-05
11 Russ Housley [Ballot Position Update] New position, No Objection, has been recorded by Russ Housley
2009-05-04
09 (System) New version available: draft-ietf-tsvwg-rsvp-proxy-proto-09.txt
2009-05-04
11 Ron Bonica
[Ballot discuss]
At this point, this is a DISCUSS DISCUSS.

I we were to massively deploy RSVP proxies, would that cause a massive increase in …
[Ballot discuss]
At this point, this is a DISCUSS DISCUSS.

I we were to massively deploy RSVP proxies, would that cause a massive increase in the amount of RAO traffic arriving at provider boundaries? Would that traffic be dropped? If not, could it cause problems for provider equipment?
2009-05-04
11 Ron Bonica [Ballot Position Update] New position, Discuss, has been recorded by Ron Bonica
2009-05-04
11 Lars Eggert [Ballot Position Update] New position, No Objection, has been recorded by Lars Eggert
2009-05-02
11 Samuel Weiler Request for Telechat review by SECDIR Completed. Reviewer: Stephen Kent.
2009-04-29
11 Adrian Farrel
[Ballot comment]
draft-ietf-tsvwg-rsvp-proxy-proto-08.txt

Nits to fix if you have to do a respin or in AUTH-48 if the RFC Editor
misses them.
---
I think …
[Ballot comment]
draft-ietf-tsvwg-rsvp-proxy-proto-08.txt

Nits to fix if you have to do a respin or in AUTH-48 if the RFC Editor
misses them.
---
I think the documents should be marked as "Updates RFC 3305"
---
Section 1 line 1
s/Qos/QoS/
---
Section 1 para 1
s/network need to operate/network needs to operate/
---
Section 1
  However, we note that multicast applications do not always mesh well
  with RSVP Receiver Proxies
s/mesh/coexist/  ?
---
I am a little bothered by the use of "protected by an RSVP reservation"
throughout the document. This is not the use of "protection" that I am
familiar with. Perhaps "guaranteed" or "enabled"?
---
Figure 4
The key does not explain NotifyU
===
2009-04-29
11 Magnus Westerlund [Ballot Position Update] New position, Yes, has been recorded for Magnus Westerlund
2009-04-29
11 Magnus Westerlund Ballot has been issued by Magnus Westerlund
2009-04-29
11 Magnus Westerlund [Note]: 'Please read the informational document draft-ietf-tsvwg-rsvp-proxy-approaches before this one!' added by Magnus Westerlund
2009-04-29
11 Adrian Farrel [Ballot Position Update] New position, Yes, has been recorded by Adrian Farrel
2009-04-29
11 Adrian Farrel
[Ballot comment]
draft-ietf-tsvwg-rsvp-proxy-proto-08.txt

Nits to fix if you have to do a respin or in AUTH-48 if the RFC Editor
misses them.
---
I think …
[Ballot comment]
draft-ietf-tsvwg-rsvp-proxy-proto-08.txt

Nits to fix if you have to do a respin or in AUTH-48 if the RFC Editor
misses them.
---
I think the documents should be marked as "Updates RFC 3305"
---
Section 1 line 1
s/Qos/QoS/
---
Section 1 para 1
s/network need to operate/network needs to operate/
---
Section 1
  However, we note that multicast applications do not always mesh well
  with RSVP Receiver Proxies
s/mesh/coexist/  ?
---
I am a little bothered by the use of "protected by an RSVP reservation"
throughout the document. This is not the use of "protection" that I am
familiar with. Perhaps "guaranteed" or "enabled"?
---
Figure 4
The key does not explain NotifyU
===

draft-ietf-tsvwg-rsvp-proxy-approaches-06.txt
---
I am surprised that all of your references are Informative. Surely some of these are prerequisites for understanding your work?
---
2009-04-29
11 Adrian Farrel
[Ballot comment]
draft-ietf-tsvwg-rsvp-proxy-proto-08.txt

Nits to fix if you have to do a respin or in AUTH-48 if the RFC Editor
misses them.
---
I think …
[Ballot comment]
draft-ietf-tsvwg-rsvp-proxy-proto-08.txt

Nits to fix if you have to do a respin or in AUTH-48 if the RFC Editor
misses them.
---
I think the documents should be marked as "Updates RFC 3305"
---
Section 1 line 1
s/Qos/QoS/
---
Section 1 para 1
s/network need to operate/network needs to operate/
---
Section 1
  However, we note that multicast applications do not always mesh well
  with RSVP Receiver Proxies
s/mesh/coexist/  ?
---
I am a little bothered by the use of "protected by an RSVP reservation"
throughout the document. This is not the use of "protection" that I am
familiar with. Perhaps "guaranteed" or "enabled"?
---
Figure 4
The key does not explain NotifyU
---
2009-04-29
11 Adrian Farrel Created "Approve" ballot
2009-04-24
11 Samuel Weiler Request for Telechat review by SECDIR is assigned to Stephen Kent
2009-04-24
11 Samuel Weiler Request for Telechat review by SECDIR is assigned to Stephen Kent
2009-04-22
11 Magnus Westerlund Placed on agenda for telechat - 2009-05-07 by Magnus Westerlund
2009-04-22
11 Magnus Westerlund Note field has been cleared by Magnus Westerlund
2009-04-22
11 Magnus Westerlund State Changes to IESG Evaluation from Waiting for AD Go-Ahead::External Party by Magnus Westerlund
2009-03-02
08 (System) New version available: draft-ietf-tsvwg-rsvp-proxy-proto-08.txt
2008-12-18
11 Samuel Weiler Request for Last Call review by SECDIR Completed. Reviewer: Stephen Kent.
2008-11-27
11 Magnus Westerlund State Changes to Waiting for AD Go-Ahead::External Party from Waiting for AD Go-Ahead by Magnus Westerlund
2008-11-27
11 Magnus Westerlund [Note]: 'Waiting for some conclusion on the RSVP RAO issues.' added by Magnus Westerlund
2008-11-16
11 Magnus Westerlund Will hold in this state for a while until we figure out how to deal with Router Alert security consideration.
2008-11-14
11 (System) State has been changed to Waiting for AD Go-Ahead from In Last Call by system
2008-11-12
11 Amanda Baber
IANA Last Call comments:

Action 1:

Upon approval of this document, the IANA will make the following
changes in the "Error Codes and Globally-Defined Error …
IANA Last Call comments:

Action 1:

Upon approval of this document, the IANA will make the following
changes in the "Error Codes and Globally-Defined Error Value
Sub-Codes"registry at
http://www.iana.org/assignments/rsvp-parameters

OLD:

Error Code Meaning

1 Admission Control Failure [RFC2205]

...

2 Policy Control Failure [RFC2205]

NEW:

Error Code Meaning

1 Admission Control Failure
[RFC2205][RFC-tsvwg-rsvp-proxy-proto-07]

...

2 Policy Control Failure
[RFC2205][RFC-tsvwg-rsvp-proxy-proto-07]



Action 2:

Upon approval of this document, the IANA will make the following
assignment in the "Error Codes and Globally-Defined Error Value
Sub-Codes" registry at
http://www.iana.org/assignments/rsvp-parameters

Error Code Meaning

[TBD] Unrecoverable Receiver Proxy Error [RFC-tsvwg-rsvp-proxy-proto-07]

The sixteen bits of the Error Value field are defined in
[RFC-tsvwg-rsvp-proxy-proto-07]


We understand the above to be the only IANA Actions for this document.
2008-11-11
11 Samuel Weiler Request for Last Call review by SECDIR is assigned to Stephen Kent
2008-11-11
11 Samuel Weiler Request for Last Call review by SECDIR is assigned to Stephen Kent
2008-10-31
11 Cindy Morgan Last call sent
2008-10-31
11 Cindy Morgan State Changes to In Last Call from Last Call Requested by Cindy Morgan
2008-10-31
11 Magnus Westerlund State Changes to Last Call Requested from AD Evaluation::Revised ID Needed by Magnus Westerlund
2008-10-31
11 Magnus Westerlund Last Call was requested by Magnus Westerlund
2008-10-31
11 (System) Ballot writeup text was added
2008-10-31
11 (System) Last call text was added
2008-10-31
11 (System) Ballot approval text was added
2008-09-08
11 Magnus Westerlund State Changes to AD Evaluation::Revised ID Needed from AD Evaluation::External Party by Magnus Westerlund
2008-09-08
11 Magnus Westerlund State Changes to AD Evaluation::External Party from AD Evaluation::AD Followup by Magnus Westerlund
2008-09-08
11 Magnus Westerlund Waiting for approaches to be updated.
2008-07-04
11 Magnus Westerlund An addition to the write up is that there do exist IPR disclosures on this document from Cisco.
https://datatracker.ietf.org/ipr/892/
2008-07-01
11 (System) Sub state has been changed to AD Follow up from New Id Needed
2008-07-01
07 (System) New version available: draft-ietf-tsvwg-rsvp-proxy-proto-07.txt
2008-07-01
11 Magnus Westerlund
This is writeup for the two documents:
draft-ietf-tsvwg-rsvp-proxy-proto (proposed standard)
draft-ietf-tsvwg-rsvp-proxy-approaches (informational)

  (1.a)  Who is the Document Shepherd for this document?  Has the
  …
This is writeup for the two documents:
draft-ietf-tsvwg-rsvp-proxy-proto (proposed standard)
draft-ietf-tsvwg-rsvp-proxy-approaches (informational)

  (1.a)  Who is the Document Shepherd for this document?  Has the
          Document Shepherd personally reviewed this version of the
          document and, in particular, does he or she believe this
          version is ready for forwarding to the IESG for publication?
         
Magnus Westerlund is the Document shepherd. The AD review made it
clear some improvements where needed.

  (1.b)  Has the document had adequate review both from key WG members
          and from key non-WG members?  Does the Document Shepherd have
          any concerns about the depth or breadth of the reviews that
          have been performed?
         
It has received reasonable review from the RSVP interested folks. I
think the document could have benefitted from more wide review.

  (1.c)  Does the Document Shepherd have concerns that the document
          needs more review from a particular or broader perspective,
          e.g., security, operational complexity, someone familiar with
          AAA, internationalization, or XML?
         
I think the operational aspects may require more review.         

  (1.d)  Does the Document Shepherd have any specific concerns or
          issues with this document that the Responsible Area Director
          and/or the IESG should be aware of?  For example, perhaps he
          or she is uncomfortable with certain parts of the document, or
          has concerns whether there really is a need for it.  In any
          event, if the WG has discussed those issues and has indicated
          that it still wishes to advance the document, detail those
          concerns here.  Has an IPR disclosure related to this document
          been filed?  If so, please include a reference to the
          disclosure and summarize the WG discussion and conclusion on
          this issue.
       
I hope by clarifying the AD review comments these concerns will be removed.

  (1.e)  How solid is the WG consensus behind this document?  Does it
          represent the strong concurrence of a few individuals, with
          others being silent, or does the WG as a whole understand and
          agree with it?
         
Strong consensus from a couple of individuals.         

  (1.f)  Has anyone threatened an appeal or otherwise indicated extreme
          discontent?  If so, please summarize the areas of conflict in
          separate email messages to the Responsible Area Director.  (It
          should be in a separate email because this questionnaire is
          entered into the ID Tracker.)
         
No         

  (1.g)  Has the Document Shepherd personally verified that the
          document satisfies all ID nits?  (See
          http://www.ietf.org/ID-Checklist.html and
          http://tools.ietf.org/tools/idnits/.)  Boilerplate checks are
          not enough; this check needs to be thorough.  Has the document
          met all formal review criteria it needs to, such as the MIB
          Doctor, media type, and URI type reviews?  If the document
          does not already indicate its intended status at the top of
          the first page, please indicate the intended status here.

Yes, there is one downref needed to be take care of.

  (1.h)  Has the document split its references into normative and
          informative?  Are there normative references to documents that
          are not ready for advancement or are otherwise in an unclear
          state?  If such normative references exist, what is the
          strategy for their completion?  Are there normative references
          that are downward references, as described in [RFC3967]?  If
          so, list these downward references to support the Area
          Director in the Last Call procedure for them [RFC3967].
         
Yes, one downref that can be changed to informational ref.         

  (1.i)  Has the Document Shepherd verified that the document's IANA
          Considerations section exists and is consistent with the body
          of the document?  If the document specifies protocol
          extensions, are reservations requested in appropriate IANA
          registries?  Are the IANA registries clearly identified?  If
          the document creates a new registry, does it define the
          proposed initial contents of the registry and an allocation
          procedure for future registrations?  Does it suggest a
          reasonable name for the new registry?  See [RFC2434].  If the
          document describes an Expert Review process, has the Document
          Shepherd conferred with the Responsible Area Director so that
          the IESG can appoint the needed Expert during IESG Evaluation?
         
Yes, protos IANA seems okay.         

  (1.j)  Has the Document Shepherd verified that sections of the
          document that are written in a formal language, such as XML
          code, BNF rules, MIB definitions, etc., validate correctly in
          an automated checker?
         
No formal language used.         

  (1.k)  The IESG approval announcement includes a Document
          Announcement Write-Up.  Please provide such a Document
          Announcement Write-Up.  Recent examples can be found in the
          "Action" announcements for approved documents.  The approval
          announcement contains the following sections:

          Technical Summary
                RSVP signaling can be used to make end-to-end resource
                reservations in an IP network in order to guarantee the
                QoS required by certain flows.  With conventional RSVP,
                both the data sender and receiver of a given flow take
                part in RSVP signaling.  Yet, there are many use cases
                where resource reservation is required, but the
                receiver, the sender, or both, is not RSVP-capable. 
                Where the receiver is not RSVP-capable, an RSVP router
                may behave as an RSVP Receiver Proxy thereby performing
                RSVP signaling on behalf of the receiver.  This allows
                resource reservations to be established on the segment
                of the end-to-end path from the sender to the RSVP
                Receiver Proxy.
               
                The Proto document defines the RSVP extensions that are
                needed to facilitate operations with an RSVP Receiver
                Proxy whose signaling is triggered by receipt of RSVP
                Path messages from the sender. 

          Working Group Summary
            The consensus for the publication was strong but from a
            small group within the WG.

          Document Quality
            The shepherd doesn't know of any implementations.
           
          Personnel
            WG Shepherd and responsible AD is Magnus Westerlund.
2008-07-01
11 Magnus Westerlund State Changes to AD Evaluation::Revised ID Needed from AD Evaluation by Magnus Westerlund
2008-07-01
11 Magnus Westerlund State Changes to AD Evaluation from Publication Requested by Magnus Westerlund
2008-05-30
11 Magnus Westerlund Note field has been cleared by Magnus Westerlund
2008-05-30
11 Magnus Westerlund State Changes to Publication Requested from AD is watching by Magnus Westerlund
2008-05-30
06 (System) New version available: draft-ietf-tsvwg-rsvp-proxy-proto-06.txt
2008-04-25
05 (System) New version available: draft-ietf-tsvwg-rsvp-proxy-proto-05.txt
2007-12-18
04 (System) New version available: draft-ietf-tsvwg-rsvp-proxy-proto-04.txt
2007-10-15
03 (System) New version available: draft-ietf-tsvwg-rsvp-proxy-proto-03.txt
2007-10-12
02 (System) New version available: draft-ietf-tsvwg-rsvp-proxy-proto-02.txt
2007-10-12
(System) Posted related IPR disclosure: Cisco's Statement about IPR claimed in draft-ietf-tsvwg-rsvp-proxy-proto
2007-09-14
11 Magnus Westerlund Draft Added by Magnus Westerlund in state AD is watching
2007-09-14
11 Magnus Westerlund [Note]: 'Needs WG last call in CCAMP' added by Magnus Westerlund
2007-06-28
01 (System) New version available: draft-ietf-tsvwg-rsvp-proxy-proto-01.txt
2007-02-28
00 (System) New version available: draft-ietf-tsvwg-rsvp-proxy-proto-00.txt