Software Version Capability for BGP
draft-abraitis-bgp-version-capability-16
Revision differences
Document history
Date | Rev. | By | Action |
---|---|---|---|
2024-08-07
|
16 | Donatas Abraitis | New version available: draft-abraitis-bgp-version-capability-16.txt |
2024-08-07
|
16 | (System) | New version approved |
2024-08-07
|
16 | (System) | Request for posting confirmation emailed to previous authors: Donatas Abraitis |
2024-08-07
|
16 | Donatas Abraitis | Uploaded new revision |
2024-05-24
|
15 | Donatas Abraitis | New version available: draft-abraitis-bgp-version-capability-15.txt |
2024-05-24
|
15 | Donatas Abraitis | New version accepted (logged-in submitter: Donatas Abraitis) |
2024-05-24
|
15 | Donatas Abraitis | Uploaded new revision |
2024-03-20
|
14 | Donatas Abraitis | New version available: draft-abraitis-bgp-version-capability-14.txt |
2024-03-20
|
14 | (System) | New version approved |
2024-03-20
|
14 | (System) | Request for posting confirmation emailed to previous authors: Donatas Abraitis |
2024-03-20
|
14 | Donatas Abraitis | Uploaded new revision |
2023-08-05
|
13 | (System) | Document has expired |
2023-02-01
|
13 | Donatas Abraitis | New version available: draft-abraitis-bgp-version-capability-13.txt |
2023-02-01
|
13 | (System) | New version approved |
2023-02-01
|
13 | (System) | Request for posting confirmation emailed to previous authors: Donatas Abraitis |
2023-02-01
|
13 | Donatas Abraitis | Uploaded new revision |
2023-01-25
|
12 | Donatas Abraitis | New version available: draft-abraitis-bgp-version-capability-12.txt |
2023-01-25
|
12 | (System) | New version approved |
2023-01-25
|
12 | (System) | Request for posting confirmation emailed to previous authors: Donatas Abraitis |
2023-01-25
|
12 | Donatas Abraitis | Uploaded new revision |
2023-01-19
|
11 | Donatas Abraitis | New version available: draft-abraitis-bgp-version-capability-11.txt |
2023-01-19
|
11 | (System) | New version approved |
2023-01-19
|
11 | (System) | Request for posting confirmation emailed to previous authors: Donatas Abraitis |
2023-01-19
|
11 | Donatas Abraitis | Uploaded new revision |
2023-01-10
|
10 | Donatas Abraitis | New version available: draft-abraitis-bgp-version-capability-10.txt |
2023-01-10
|
10 | (System) | New version approved |
2023-01-10
|
10 | (System) | Request for posting confirmation emailed to previous authors: Donatas Abraitis |
2023-01-10
|
10 | Donatas Abraitis | Uploaded new revision |
2023-01-10
|
09 | Donatas Abraitis | New version available: draft-abraitis-bgp-version-capability-09.txt |
2023-01-10
|
09 | (System) | New version approved |
2023-01-10
|
09 | (System) | Request for posting confirmation emailed to previous authors: Donatas Abraitis |
2023-01-10
|
09 | Donatas Abraitis | Uploaded new revision |
2021-03-08
|
08 | (System) | Document has expired |
2020-09-08
|
08 | Adrian Farrel | Notification list changed to none from Adrian Farrel <rfc-ise@rfc-editor.org> |
2020-09-08
|
08 | Adrian Farrel | Stream changed to None from ISE |
2020-08-29
|
08 | (System) | IANA Review state changed to Version Changed - Review Needed from IANA OK - Actions Needed |
2020-08-29
|
08 | Donatas Abraitis | New version available: draft-abraitis-bgp-version-capability-08.txt |
2020-08-29
|
08 | (System) | New version approved |
2020-08-29
|
08 | (System) | Request for posting confirmation emailed to previous authors: Donatas Abraitis |
2020-08-29
|
08 | Donatas Abraitis | Uploaded new revision |
2020-08-18
|
07 | (System) | IANA Review state changed to IANA OK - Actions Needed |
2020-08-18
|
07 | Amanda Baber | (Via drafts-eval@iana.org): IESG/Authors/ISE: The IANA Functions Operator has completed its review of draft-abraitis-bgp-version-capability-05. If any part of this review is inaccurate, please let us … (Via drafts-eval@iana.org): IESG/Authors/ISE: The IANA Functions Operator has completed its review of draft-abraitis-bgp-version-capability-05. If any part of this review is inaccurate, please let us know. IANA has a question about this document. We understand that when this document is sent to us for processing, we will perform a single registry action. Specifically, we'll add the following entry to the Capability Codes registry at https://www.iana.org/assignments/capability-codes: Value: TBD (First Come First Served range) Description: Version Capability Reference: this document Change Controller: IETF As noted at the top of the registry, the IETF will be the Change Controller for all future Capability Code registrations. Thank you, Amanda Baber Lead IANA Services Specialist |
2020-08-17
|
07 | Alvaro Retana | Removed from agenda for telechat |
2020-08-17
|
07 | Alvaro Retana | Placed on agenda for telechat - 2020-09-10 |
2020-08-16
|
07 | Adrian Farrel | ISE state changed to In IESG Review from In ISE Review |
2020-08-16
|
07 | Adrian Farrel | IETF conflict review initiated - see conflict-review-abraitis-bgp-version-capability |
2020-08-16
|
07 | Adrian Farrel | draft-abraitis-bgp-version-capability has been presented to the ISE for publication as an Informational RFC in the Independent Stream. Quite a lot of time has been spent … draft-abraitis-bgp-version-capability has been presented to the ISE for publication as an Informational RFC in the Independent Stream. Quite a lot of time has been spent trying to decide whether this should be marked as Experimental or Informational. To some extent this work is an experiment, but (as noted in Section 4.1) this has been implemented in Free Range Routing, and (as noted throughout the document) the mechanisms defined here can be deployed on the open Internet without impacting other implementations. Thus, the only "experiment" would be to decide whether this extension is useful. This document has been discussed in IDR (the appropriate working group for BGP extensions) where a number of opinions were expressed ranging through: - this is handy - there are scurity concerns - using an NMS would be a better approach - you have to be aware that software can be updated without interupting the sesison - it is impractical and of limited use - there might be other ways of doing this - there may be overlap with draft-ietf-idr-operational-message which expired in 2012 However, the IDR WG did not have enough interest in adopting the work and did not respond to an email from the ISE offering them the opportunity to step in. This position was cross-checked by the ISE with John Scudder, one of the IDR chairs. The document makes a request for an allocation from the FCFS portion of a registry. This document stands as the reference and explanation for the code point. No further material is demanded by the document that created the registry (RFC 5492). Note that the registry is currently being updated by draft-ietf-idr-capabilities-registry-change - that update does not remove the availability of FCFS assignments. Along the way, the ISE did two reviews and commissioned a review from Jeff Haas, a BGP expert. More review than there is draft! The reviews are presented below, and the author updated the document accordingly. ==ISE First review== Experimental or Informational? Sorry that we are flip-flopping on this question, but after talking with John Scudder and re-reading your draft, I think that Informational is a better position. That is, you are describing a mechanism and an assigned code point, and that is it - no need for an experiment, it is what it is. That means... - Change the Intended Status to Informational - Delete the second sentence from the Abstract - Delete or rewrite the second paragraph of the Introduction - Delete section 2 (You end up with an even shorter draft ;-) --- Section 3 Please use the more recent version of this boilerplate: The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all capitals, as shown here. You will need to add RFC 8174 to your references. --- You need to add RFC 5492 to your references as you use it in Section 4. --- I think you should make it very clear in Section 4 that the encoding of the Version is unstructured and implementation-specific, but intended to be human-readbale. --- In Section 5 you have... The Version capability SHOULD only be used for displaying the version of a speaker in order to make troubleshooting easier. Why is this "SHOULD" and not "MUST"? If you use "SHOULD" you are allowing other possible uses, and you need to say why/how an implementation might vary this. --- In Section 5, please use an address from the reserved documentation address spaces. For example, 198.51.100.0/24. --- Section 6 OLD IANA is requested to assign a capability number for the Version Capability in this document from the BGP Capabilities Codes registry. NEW IANA maintains the "Border Gateway Protocol (BGP) Parameters" registry with a subregistry called "Capabilities Codes". IANA is requested to assign a capability number from the First Come First Served range for the Version Capability in this document as follows: Value | Description | Reference ------+-------------------+------------ TBD | Vesion Capability | [This.I-D] END --- Section 7 The text here is not going to be good enough. You actually have to address the security issues with your new capability. Things to note include: - Specific verisons of routing code may be known to have vulnerabilites. Therefore, announcing what version of code is running on which routers may improve an attacker's chances of success. - Advertising which versions of code and from which vendor it comes may facilitate a number of social-engineering attacks. - Modifying the information advertised by a router might lead to attacks including bogus software upgrades and also might mask the causes of faults in the network. You need to describe how these attacks are mitigated: - How is the information kep hidden from sniffers? - How is the information kept with a domain of trust? By all means discuss other issues as well :-) You will probably want to reference other documents that already address BGP security mechanisms. ==Jeff Haas== The capability limits the length of the display to 255 octets of valid UTF-8 characters. The BGP optional parameters field in which capabilities are carried without further extension can hold 255 octets of information (RFC 4271 §4.2). This means the longest possible capability value is 253 octets. (RFC 5492 §4). The primary reason to highlight this is that without extension, the length of a version string is sufficient to eat space that is normally used to permit BGP to operate by exchanging the things it can do. This means the field is effectively a DoS against the critical stuff. What do you do when you need to encode important stuff? Do you truncate the string? No guidance is offered. A path out of this specific issue is given here: https://tools.ietf.org/html/draft-ietf-idr-ext-opt-param-05 In my opinion, it'd be wise for anyone looking at implementing this feature to require support for ext-opt-param to be negotiated before trying to put in non-essential operational stuff. Encoding comment (draft-abraltis §3): the version length is likely unnecessary. Why not just use the capability length? UTF-8 issues/considerations: UTF-8 is the right way to send this stuff. IETF is desperately in need of some general purpose boilerplate for putting this stuff in a protocol since it forces each draft to try to get it right. In §3 of the draft, the "Version length" is listed as "The number of characters in the Version". The definition of a character in UTF-8 is a valid multi-byte sequence from 1 to 4 octets. Does this mean that the Version Length is intended to encode the length of such UTF-8 characters, or the octet length of Version? (See above about should this just be the Capability Length) RFC 8203 tries to get a number of critical considerations correct here.See §6 in there where it gives pointers to a number of encoding considerations. By indirection, this also covers the issues of what to do when a UTF-8 sequence is truncated and you have an invalid character. This RFC also mentions the lack of a terminating NUL character and that the full length is to be derived from the supplied protocol length. Operational considerations: Routers may be upgraded without necessarily bouncing BGP sessions. (E.g. NSR.) It is thus possible for active software revision to change without the end user being notified in this extension. Security considerations: The draft covers a lot of reasons you likely don't want to disclose this stuff. It even gives a bit of guidance, without RFC 2119 style normative keywords, that you might want to let this be enabled for iBGP, but perhaps not ebgp? In my personal opinion, this document should recommend that the version string is NOT advertised by default, and MUST require explicit configuration to advertise. And even when that configuration is explicitly provided, it should be required per-neighbor. The document also offers zero guidance about giving out this information as part of unsolicited attempts to peer. A number of BGP implementations basically provide wildcard port 179 listens and will get through the BGP handshake before hanging up on you. During that handshake, you may disclose this information. My personal read on this feature: If you're in a trust boundary where you are welcome to this information, you probably have access to it by a different means. And that might include LLDP or CDP. Why put it in BGP? If this is for ebgp speakers between different non-cooperating (customer/provider) relationships, their security people will likely give you an address in the heated afterlife of your choice for asking to turn this on. My final personal analysis is that after the issues raised above are cleared that the document could be published. However, no one in their right mind should implement it. ==ISE Second review== You should get into the habit of running idnits before you submit a new version of your draft. (https://www6.ietf.org/tools/idnits/) The current revision of your draft generates the following warnings... Checking nits according to https://www.ietf.org/id-info/checklist : ---------------------------------------------------------------------------- ** There are 3 instances of too long lines in the document, the longest one being 18 characters in excess of 72. Checking references for intended status: Informational ---------------------------------------------------------------------------- == Missing Reference: 'RFC8174' is mentioned on line 76, but not defined == Missing Reference: 'RFC5492' is mentioned on line 79, but not defined == Missing Reference: 'RFC5082' is mentioned on line 197, but not defined == Unused Reference: 'RFC3552' is defined on line 218, but no explicit reference was found in the text --- Abstract s/speaker's version/speaker's routing daemon version/ --- Abstract and Introduction Add a second paragraph... This BGP capability is an optoinal advertisement. Implementations are not required to advertise the version nor to process received advertisements. --- Introduction In modern data center designs, we tend to have conventional hosts participating in the routing process. And the fleet of hosts has different versions of routing daemon. The term "host" is now conventionally used to mean "any node that is not a router" [RFC2460]. I don't think that hosts participate in the routing process. You could say "node" or (posisbly better) you could say "router". --- Introduction OLD This means that troubleshooting is a crucial part to quickly identify the root cause. NEW This means that knowing which versions of the routing daemons are running the various nodes in the network can be a crucial factor in quickly identifying the root cause of any protocol or network problems. END --- Introduction Move the following text up from Section 3 Such protocols like LLDP, CDP can provide the same information as well, but in containerized environments, it's very hard and NOT RECOMMENDED run background processes. To minimize operational costs it would help having all the necessary information in place. But rewrite it as... Information about the version of the routing daeon could also be exchanged in protocols such as LLDP and CDP. However, in containerized environments, it is very hard and not recommended to exchange this information between background processes. Therefore, and to help minimize operational costs, it is helpful to exchange the routing daemon information between BGP peers directly. --- 2. Please start with this extra paragraph... Although this document is not an IETF Standards Track document, it makes use of the terminology from BCP 14 in order to clearly state the implementation behaviors. --- 3. I think we need to completely rewrite this section for clarity and precision. OLD 3. Version Capability The Version Capability is a new BGP capability [RFC5492]. The implementation is specific to the vendor. The version is unstructured and can be defined in any format the vendor decides. The length of the version SHOULD be limited to 64 bytes. This is the limit to allow other capabilities as much space as they require. The version MUST NOT be empty. This capability is OPTIONAL. The vendor MUST implement a capability switch to enable or disable it. In case you reached 255 bytes of capabilities, you can disable this capability. The capability is designed more to non-production environments where you need more visibility for troubleshooting purposes. It's RECOMMENDED to turn it only inside a single Autonomous System domain or Autonomous System Confederations. Such protocols like LLDP, CDP can provide the same information as well, but in containerized environments, it's very hard and NOT RECOMMENDED run background processes. To minimize operational costs it would help having all the necessary information in place. +--------------------------------+ | Version Length (1 octet) | +--------------------------------+ | Version (variable) | +--------------------------------+ Figure 1 Version Length: The number of characters in the Version Version: The Version encoded via UTF-8 NEW 3. Version Capability Capabilities avdertisements with BGP are defined in [RFC5492]. They utilise the BGP Capabilities Optional Parameter that contains one or more triples . This document defines a new BGP capability, the Version Capability, with Capability Code TBD and Capability Length and Capability Value as described below. The inclusion of the Version Capability is OPTIONAL. If an implementation supports inclusion of the capability, the implementation MUST include a configuration switch to enable or disable its use, and that switch MUST be off by default. The Version Capability is intended principally more to non-production environments where more visibility is needed for troubleshooting purposes. It is NOT RECOMMENDED for use outside single Autonomous System domain or Autonomous System Confederations. An implementation that does not recognize or support the Version Capability but which receives one MUST respond as described in [RFC5492] by ignoring the option. An implementation that wishes to complain that its neighbor does not support the Version Capability MAY use the 'Unsupported Capability' Error Subcode of a Notification message as described in [RFC5492]. The triple for the Version Capability is as follows: Capability Code TBD by IANA Capability Length The Capability Length for the Version Capability MUST be greater than zero. A value of zero SHALL be treated as an encoding error and the entire triple MUST be ignored. The Capability Length SHOULD be no greater than 64. This is the limit to allow other capabilities as much space as they require. Capability Value The Capability Value field is encoded in UTF-8 [RFC3629]. It is unstructured data and can be formatted in any way that the implementor decides. 3.1. Capabilities Length Overflow As defined in [RFC5492] the total length of capabilities that can be carried by the BGP Capabilities Optionl Paramter is 255 bytes. If an implementation is constructing a BGP Capabilities Optional Parameter and its length exceeds 255 bytes, it is RECOMMENDED to exclude the Version Capability. An implementation may optimally achieve this by making the Version Capability the last capablity triple to add to the Parameter, and only adding it if there is sufficient space to do so. --- 4. OLD The Version capability MUST only be used for displaying the version of a speaker to make troubleshooting easier. You have a bunch of routers with a number of upstreams each. All of them are with a different operating system and routing daemon installed. Assuming that a specific feature is not working or a bug which is not fixed in an appropriate version, would allow us to quickly identify the pattern which versions are affected. Enabling this capability REQUIRED bouncing all existing BGP sessions. It MUST be explicitly configured to advertise the Version capability. NEW The Version Capability MUST only be used for displaying the version of a BGP speaker's router daemon to make troubleshooting easier. Consider a group of routers each with a number of upstream nodes, and suppose that each router has a different operating system and different routing daemon at a different version installed. Assuming that a specific feature is not working or that there is a bug which has not been fixed in a particular version of the code, knowledge of hte routing daemon versions would allow an operator to quickly identify the pattern of which versions are affected. Enabling (i.e., turning on) this capability requires bouncing all existing BGP sessions, and the feature MUST be explicitly configured before an implementation advertizes the Version Capability. END --- 4. Please split the example into a new subsection "4.1 Example Usage" because we need to make it clear that the example is non-normative. --- 4. I think that Figures 2 and 3 don't actually need captions as they run on as examples in the text. --- 4. The line length problems reported by idnits are all in Figure 2 I understand it is a problem reproducing text output from FRR when that output exceed the line length, but we have to fix this some how. --- Table 1 needs to mirror the registry maintained by IANA at https://www.iana.org/assignments/capability-codes/ so I think you should have... +-------+-----------------+-------------+-------------------+ | Value | Description | Reference | Change Controller | +-------+-----------------+-------------+-------------------+ | TBD | Version | [This.I-D] | IETF | | | Capability | | | +-------+-----------------+-------------+-------------------+ Note that [This.I-D] is how we handle self-references. --- Section 6 also needs some work to smooth out the English and to group together the issues with their solutions. OLD 6. Security Considerations The Version Capability can be treated as sensitive information, thus it would be easier for an attacker to exploit by knowing the specific version of the BGP speaker. This information can be gathered in BGP OPEN messages. The Version Capability MUST be configurable with a vendor-specific knob to be able to enable or disable the capability. The vendor might implement to disable this capability per neighbor. It would be safe to enable this for iBGP or inside the same tenant where you have full control and the BGP speaker is behind exit points. The Version Capability information can be gathered in BGP OPEN messages. Modifying the information advertised by a router might lead to attacks including bogus software upgrades and also might mask the causes of faults in the network. Advertising which versions of code and from which vendor it comes may facilitate a number of social-engineering attacks. A lot of BGP implementations leave TCP/179 open and this could lead to sensitive information disclosure. This capability is NOT RECOMMENDED for eBGP use. Sensitive information leaks can be minimized by using the [RFC5082] mechanism or firewalls to filter out TCP 179 port from untrusted networks. This capability can be disabled per neighbor, thus the sensitive information can't be disclosed to untrusted neighbors. NEW 6. Security Considerations The Version Capability should be treated as sensitive information: it could be easier for an attacker to exploit the system if they know the specific version of a BGP speaker. This information could be gathered by inspecting BGP OPEN messages that carry the Version Capability defined in this document. Using engryption to protect the information exchanged in BGP sessions SHOULD, therefore, be carefully considered when this feature is enabled. Suitable encryption can be achieved by protecting the BGP session using TLS [RFC5246]. Furthermore, knowledge of which versions of code is running on a given router and from which vendor it comes may facilitate a number of social-engineering attacks. This further adds to the desire to protect this information through encryption. Modifying the information advertised by a router might lead to attacks including bogus software upgrades and also might mask the causes of faults in the network. This can be mitigated by protecting the BGP session using TLS. Many BGP implementations leave TCP port 179 open in order to be able to establish sessions with new neighbors. This could lead to an attack where a rogue BGP implementation attempts to open a session and learns the version information from the responding peer. The Version Capability MUST be configurable with a vendor-specific knob to be able to enable or disable the capability. The vendor might implement to disable this capability per neighbor. It would be safe to enable this for iBGP or inside the same tenant where you have full control and the BGP speaker is behind exit points. This capability is NOT RECOMMENDED for eBGP use. Sensitive information leaks can be minimized by using the [RFC5082] mechanism or firewalls to filter out TCP 179 port from untrusted networks. This capability can be disabled per neighbor, thus the sensitive information can't be disclosed to untrusted neighbors. END --- 7.1 Please add [RFC3629] and [RFC5246] as normative references. --- I don't believe that [FRRouting] is or should be a normative reference. Please move it to 7.2 |
2020-08-14
|
07 | Donatas Abraitis | New version available: draft-abraitis-bgp-version-capability-07.txt |
2020-08-14
|
07 | (System) | New version approved |
2020-08-14
|
07 | (System) | Request for posting confirmation emailed to previous authors: Donatas Abraitis |
2020-08-14
|
07 | Donatas Abraitis | Uploaded new revision |
2020-08-14
|
06 | Donatas Abraitis | New version available: draft-abraitis-bgp-version-capability-06.txt |
2020-08-14
|
06 | (System) | New version approved |
2020-08-14
|
06 | (System) | Request for posting confirmation emailed to previous authors: Donatas Abraitis |
2020-08-14
|
06 | Donatas Abraitis | Uploaded new revision |
2020-08-03
|
05 | Adrian Farrel | ISE state changed to In ISE Review from Response to Review Needed |
2020-03-24
|
05 | (System) | Revised ID Needed tag cleared |
2020-03-24
|
05 | Donatas Abraitis | New version available: draft-abraitis-bgp-version-capability-05.txt |
2020-03-24
|
05 | (System) | New version approved |
2020-03-24
|
05 | (System) | Request for posting confirmation emailed to previous authors: Donatas Abraitis |
2020-03-24
|
05 | Donatas Abraitis | Uploaded new revision |
2020-03-22
|
04 | Adrian Farrel | Tag Revised I-D Needed set. |
2020-03-22
|
04 | Adrian Farrel | ISE state changed to Response to Review Needed from Finding Reviewers |
2020-02-11
|
04 | Donatas Abraitis | New version available: draft-abraitis-bgp-version-capability-04.txt |
2020-02-11
|
04 | (System) | New version approved |
2020-02-11
|
04 | (System) | Request for posting confirmation emailed to previous authors: Donatas Abraitis |
2020-02-11
|
04 | Donatas Abraitis | Uploaded new revision |
2019-12-06
|
03 | Adrian Farrel | ISE state changed to Finding Reviewers from In ISE Review |
2019-12-06
|
03 | Adrian Farrel | Notification list changed to Adrian Farrel <rfc-ise@rfc-editor.org> |
2019-12-06
|
03 | Adrian Farrel | Document shepherd changed to Adrian Farrel |
2019-12-06
|
03 | Adrian Farrel | Intended Status changed to Informational from Experimental |
2019-11-30
|
03 | (System) | Revised ID Needed tag cleared |
2019-11-30
|
03 | Donatas Abraitis | New version available: draft-abraitis-bgp-version-capability-03.txt |
2019-11-30
|
03 | (System) | New version approved |
2019-11-30
|
03 | (System) | Request for posting confirmation emailed to previous authors: Donatas Abraitis |
2019-11-30
|
03 | Donatas Abraitis | Uploaded new revision |
2019-11-28
|
02 | Adrian Farrel | Tag Revised I-D Needed set. |
2019-11-22
|
02 | Adrian Farrel | Intended Status changed to Experimental from Informational |
2019-11-22
|
02 | Donatas Abraitis | New version available: draft-abraitis-bgp-version-capability-02.txt |
2019-11-22
|
02 | (System) | New version approved |
2019-11-22
|
01 | Adrian Farrel | ISE state changed to In ISE Review from Submission Received |
2019-11-22
|
01 | Adrian Farrel | Intended Status changed to Informational from None |
2019-11-17
|
02 | (System) | Request for posting confirmation emailed to previous authors: Donatas Abraitis |
2019-11-17
|
02 | Donatas Abraitis | Uploaded new revision |
2019-10-26
|
01 | Adrian Farrel | Waiting to determine whether this belongs in IDR |
2019-10-26
|
01 | Adrian Farrel | ISE state changed to Submission Received |
2019-10-25
|
01 | Adrian Farrel | Stream changed to ISE from None |
2019-08-02
|
01 | Donatas Abraitis | New version available: draft-abraitis-bgp-version-capability-01.txt |
2019-08-02
|
01 | (System) | New version approved |
2019-08-02
|
01 | (System) | Request for posting confirmation emailed to previous authors: Donatas Abraitis |
2019-08-02
|
01 | Donatas Abraitis | Uploaded new revision |
2019-07-30
|
00 | Donatas Abraitis | New version available: draft-abraitis-bgp-version-capability-00.txt |
2019-07-30
|
00 | (System) | New version approved |
2019-07-30
|
00 | Donatas Abraitis | Request for posting confirmation emailed to submitter and authors: Donatas Abraitis |
2019-06-05
|
00 | Donatas Abraitis | Uploaded new revision |