IPv6 Hop-by-Hop Options Processing Procedures
draft-ietf-6man-hbh-processing-20
Revision differences
Document history
Date | Rev. | By | Action |
---|---|---|---|
2024-07-15
|
20 | Carlos Pignataro | Closed request for Last Call review by OPSDIR with state 'Overtaken by Events' |
2024-07-15
|
20 | Carlos Pignataro | Assignment of request for Last Call review by OPSDIR to Joel Jaeggli was marked no-response |
2024-06-17
|
20 | (System) | IANA Action state changed to RFC-Ed-Ack from Waiting on RFC Editor |
2024-06-13
|
20 | (System) | IANA Action state changed to Waiting on RFC Editor from In Progress |
2024-06-13
|
20 | (System) | IANA Action state changed to In Progress from Waiting on Authors |
2024-06-13
|
20 | (System) | IANA Action state changed to Waiting on Authors from In Progress |
2024-06-10
|
20 | (System) | RFC Editor state changed to EDIT |
2024-06-10
|
20 | (System) | IESG state changed to RFC Ed Queue from Approved-announcement sent |
2024-06-10
|
20 | (System) | Announcement was received by RFC Editor |
2024-06-10
|
20 | (System) | IANA Action state changed to In Progress |
2024-06-10
|
20 | Jenny Bui | IESG state changed to Approved-announcement sent from Approved-announcement to be sent |
2024-06-10
|
20 | Jenny Bui | IESG has approved the document |
2024-06-10
|
20 | Jenny Bui | Closed "Approve" ballot |
2024-06-10
|
20 | Jenny Bui | Ballot approval text was generated |
2024-06-09
|
20 | (System) | Removed all action holders (IESG state changed) |
2024-06-09
|
20 | Erik Kline | IESG state changed to Approved-announcement to be sent from IESG Evaluation::AD Followup |
2024-06-05
|
20 | Bob Hinden | New version available: draft-ietf-6man-hbh-processing-20.txt |
2024-06-05
|
20 | Bob Hinden | New version accepted (logged-in submitter: Bob Hinden) |
2024-06-05
|
20 | Bob Hinden | Uploaded new revision |
2024-06-05
|
19 | Warren Kumari | [Ballot comment] Thank you for addressing my DISCUSS, and also addressing my comments. I initially balloted DISCUSS, and then moved to NoObj once my DISCUSS … [Ballot comment] Thank you for addressing my DISCUSS, and also addressing my comments. I initially balloted DISCUSS, and then moved to NoObj once my DISCUSS was addressed, and am now balloting YES. |
2024-06-05
|
19 | Warren Kumari | [Ballot Position Update] Position for Warren Kumari has been changed to Yes from No Objection |
2024-06-05
|
19 | Warren Kumari | [Ballot comment] Thank you for addressing my DISCUSS. I still find some of the language unclear / unwieldy, but have cleared the DISCUSS. |
2024-06-05
|
19 | Warren Kumari | [Ballot Position Update] Position for Warren Kumari has been changed to No Objection from Discuss |
2024-06-04
|
19 | (System) | Changed action holders to Erik Kline (IESG state changed) |
2024-06-04
|
19 | (System) | Sub state has been changed to AD Followup from Revised I-D Needed |
2024-06-04
|
19 | (System) | IANA Review state changed to Version Changed - Review Needed from IANA OK - Actions Needed |
2024-06-04
|
19 | Bob Hinden | New version available: draft-ietf-6man-hbh-processing-19.txt |
2024-06-04
|
19 | Bob Hinden | New version accepted (logged-in submitter: Bob Hinden) |
2024-06-04
|
19 | Bob Hinden | Uploaded new revision |
2024-05-30
|
18 | (System) | Changed action holders to Bob Hinden, Gorry Fairhurst (IESG state changed) |
2024-05-30
|
18 | Jenny Bui | IESG state changed to IESG Evaluation::Revised I-D Needed from IESG Evaluation |
2024-05-29
|
18 | Murray Kucherawy | [Ballot Position Update] New position, No Objection, has been recorded for Murray Kucherawy |
2024-05-29
|
18 | Amanda Baber | IANA Review state changed to IANA OK - Actions Needed from Version Changed - Review Needed |
2024-05-29
|
18 | Warren Kumari | [Ballot discuss] Apologies for the late-breaking DISCUSS. I am unclear on the following text: "If a router does not process the Hop-by-Hop Options header, it … [Ballot discuss] Apologies for the late-breaking DISCUSS. I am unclear on the following text: "If a router does not process the Hop-by-Hop Options header, it MUST forward the packet normally based on the remaining Extension Header(s) after the Hop-by-Hop Option header (i.e., a router MUST NOT drop a packet solely because it contains an Extension Header carrying Hop-by-Hop options).". As noted in the document, many networks do not currently follow this behavior, and it appears that in some cases this is because the network has chosen to filter packets with Hop-by-Hop options. It is unclear to me if this is intended to prohibit this behavior. Operators may need to perform this filtering -- for example, their "border" router may need to filter packets containing HbH options to protect interior devices which have not yet been upgraded (or similar). I'm **assuming** that you are not trying to prohibit vendors providing the ability to filter HbH packets, but this is not clear. I don't really understand the interplay between Section 5.1.1 (Configuration Enabling Hop-by-Hop Header Processing) and Section 5.2 (Hop-by-Hop Options Processing). S 5.1.1 notes that "Section 4 of [RFC8200] allows a router to control its processing of IPv6 Hop-by-Hop options by local configuration." and that "it is now expected that nodes along the path only examine and process the Hop-by-Hop Options header if explicitly configured to do so.", but Section 5.2 says: "A router SHOULD NOT therefore be configured to process the first Hop-by-Hop option if this adversely impacts the aggregate forwarding rate." The "[a] router SHOULD NOT ..." text sounds like it is trying to change the default from "nodes along the path only examine and process the Hop-by-Hop Options header if explicitly configured to do so" into "they normally should, unless this adversely impacts the aggregate forwarding rate.". If that is the intent, this should be clearer. Actually, I find really difficult to figure out what *exactly* has changed from RFC8200. Section 5 says "This section describes several changes to [RFC8200].", but the actual changes are not particularly clear (modulo the "Option Type identifiers" changes, which are nice and clear). |
2024-05-29
|
18 | Warren Kumari | [Ballot comment] I initially had this as part of the DISCUSS, but moved it to a comment instead. I find this bit of text ambiguous … [Ballot comment] I initially had this as part of the DISCUSS, but moved it to a comment instead. I find this bit of text ambiguous (or at least unclear): "A router SHOULD NOT therefore be configured to process the first Hop-by-Hop option if this adversely impacts the aggregate forwarding rate. A router SHOULD process additional Hop-by-Hop options, if configured to do so, providing that these also do not adversely impact the aggregate forwarding rate." This could be read as: 1: The router should be configured to skip the first HbH option, but should process the additional ones. 2: The router should process the first HBH option, but unless there is explicit configuration it should ignore the rest. The "SHOULD NOT" vs "SHOULD" and double-negatives makes this hard to read, and also makes it sounds like there are expected to be a number configuration knobs here (First vs Subsequent HbH options). A similar problem occurs here: "If a router is unable to process any Hop-by-Hop option (or is not configured to do so), it SHOULD behave in the way specified for an unrecognized Option Type when the action bits were set to "00" " I'm assuming you mean "If a router either unable (or configured) to not process any Hop-by-Hop option ..." ? and then again here: "If a router is unable to process further Hop-by-Hop options (or is not configured to do so), the router SHOULD skip the remaining options using the "Hdr Ext Len" field in the Hop-by-Hop Options header. " I think that the document would benefit greatly from some clarity here -- I'm assuming that the intent is only a single configuration knob, but it's really not clear... Is this duplication, or is there a meaningful difference in these two sentences (destination vs host): "It is expected that the Hop-by-Hop Options header will be processed by the destination. Hosts SHOULD process the Hop-by-Hop Options header in received packets."? I don't really understand some of the SHOULDs in Section 6 -- e.g: "New Hop-by-Hop options SHOULD be designed to ensure the router can process the options at the full forwarding rate." -- what router? I have a Cisco 2509 sitting in a rack in my basement. It has very different processing characteristics to an M40 or modern Cisco or a Linux box, and they way that they process HbH packets differs wildly. I agree with the sentiment, but not how this is worded. I think that this should be clarified, or at least the SHOULD should become a should... Nits: 1: "The reason behind this includes:" - reasons, include? 2: "or that forward packets" - forwards. 3: "The Router Alert Option [RFC2711] is an exception that can result in processing in the control plane, see Section 5.2.1." - perhaps "that can require processing by the control plane"? Or perhaps I don't understand what this is trying to say. 4: "When an ICMP Parameter Problem, Code 2, message is delivered to the source, the source can become aware that at least one node on the path has failed to recognize the option." - I don't have a suggestion, but "the source can become aware" make it sound like this is an information leakage issue, and not the actual intent of the ICMP Code. 5: "The Router Alert Option could have a potential for use with new functions that have to be processed in the control plane." - "The Router Alert Option could potentially be used by new functions that have to be processed in the control plane." ? 6: "An implementation that does recognize the Router Alert Option, SHOULD verify that a" - drop the comma. 7: The document sets an expectation that if a packet includes a single Hop-by-Hop option that packet will be forwarded across the network path." - there is a random closing quote. 8: "If a subset of packets in a flow were to include Hop-by-Hop options, this could introduce a potential to increase the number" - could potentially ? |
2024-05-29
|
18 | Warren Kumari | [Ballot Position Update] New position, Discuss, has been recorded for Warren Kumari |
2024-05-29
|
18 | Roman Danyliw | [Ballot comment] Thank you to Behcet Sarikaya for the GENART review. Thank you for addressing my DISCUSS feedback. ** What is the relationship between the … [Ballot comment] Thank you to Behcet Sarikaya for the GENART review. Thank you for addressing my DISCUSS feedback. ** What is the relationship between the guidance found in this document and the filtering guidance in RFC9288? |
2024-05-29
|
18 | Roman Danyliw | [Ballot Position Update] Position for Roman Danyliw has been changed to No Objection from Discuss |
2024-05-29
|
18 | Éric Vyncke | [Ballot comment] Thank you for the sensible and sensitive work done in this document. The IETF community needs to continue to allow the Internet and … [Ballot comment] Thank you for the sensible and sensitive work done in this document. The IETF community needs to continue to allow the Internet and IP to move forward. Thanks for addressing my previous blocking DISCUSS ballot as well as many (if not all) of my COMMENTS see: https://mailarchive.ietf.org/arch/msg/ipv6/UW5M-7RN1P3EJknROH9-3tf8I1s/ |
2024-05-29
|
18 | Éric Vyncke | [Ballot Position Update] Position for Éric Vyncke has been changed to Yes from Discuss |
2024-05-29
|
18 | (System) | IANA Review state changed to Version Changed - Review Needed from IANA OK - Actions Needed |
2024-05-29
|
18 | Bob Hinden | New version available: draft-ietf-6man-hbh-processing-18.txt |
2024-05-29
|
18 | Bob Hinden | New version accepted (logged-in submitter: Bob Hinden) |
2024-05-29
|
18 | Bob Hinden | Uploaded new revision |
2024-05-29
|
17 | Zaheduzzaman Sarker | [Ballot comment] Thanks for working on this specification. Thanks for Brian Trammell for the TSVART review. I have no issues here from transport protocol point … [Ballot comment] Thanks for working on this specification. Thanks for Brian Trammell for the TSVART review. I have no issues here from transport protocol point of view, however, I am supporting Roman's discuss as I would also like to know what is classified as reasonable exception. |
2024-05-29
|
17 | Zaheduzzaman Sarker | [Ballot Position Update] New position, No Objection, has been recorded for Zaheduzzaman Sarker |
2024-05-28
|
17 | Paul Wouters | [Ballot comment] This document made me sad |
2024-05-28
|
17 | Paul Wouters | [Ballot Position Update] New position, No Objection, has been recorded for Paul Wouters |
2024-05-28
|
17 | John Scudder | [Ballot comment] (I realized I had forgotten to capture one point while transcribing my notes. This updated ballot adds one more point, right at the … [Ballot comment] (I realized I had forgotten to capture one point while transcribing my notes. This updated ballot adds one more point, right at the end.) This document uses a lot of words to say what is ultimately a fairly simple message. It's also an important message, so I think it's worth the time to communicate it clearly; hence the effort put into this review. (The quote attributed to Pascal, to the effect of "I am sorry I have written you a long letter, I did not have time to write you a short one" might apply here.) As far as I can tell, the spec's TL;DR is: Routers: - SHOULD process HbH options as long as they can do so without compromising forwarding rate. - If it would compromise forwarding rate, they should triage the HbH options they process. (Details of triage not specified other than letting the operator configure HbH options to respect/ignore.) - Can ignore the whole HbH header by default, or can process it but use configuration to control what individual HbH options are processed. - MUST NOT drop a packet just because it contains a HbH header. - SHOULD make the list of HbH options that are processed configurable. - Concerning the RA option, if processing it at all, - "MUST protect itself from infrastructure attack". - Shouldn't bother the control plane for an RA that has no Value field of interest. Hosts when receiving: - SHOULD process HbH headers, and process all options within - But may choose not to process them (e.g. constrained hosts) - For any HbH header not processed, they MUST (Section 5.1) behave as if it wasn't present. Hosts when sending: - SHOULD "use a method that is robust". - MAY include more than one HbH option. I feel fairly strongly that this document would be more valuable if it were less expository, more prescriptive, and shorter -- "crisper", if you like. However, my concerns don't rise to the level of blocking publication, so I've captured some specific and potentially actionable points in comments, and I understand that the authors' preferences may not be the same as mine, or that they may not have the appetite for a large rewrite. On the other hand, if you're up for the challenge, I'm willing to contribute more effort. Note that not all of my comments are of that nature, many relate to correctness and accuracy -- so even if you completely disagree with my editorial point of view, please look over the rest of them. ## COMMENT ### Section 3, cut-and-paste error? * control plane: IPv6 routers exchange control information through the control plane. This processes the management and routing information exchanged with other routers. So far so good. Routers process fields contained in packet headers. However, they do not process information contained in packet payloads. This sentence is a verbatim copy of a sentence in the definition of "forwarding plane". Is it a cut-and-paste error? It doesn't seem relevant to a definition of the control plane. ### Section 4, rewrite for clarity, add informative reference The pronouns and determiners in the last couple of paragraphs make it hard to nail down what they mean. I think a simple rewrite to add more specificity would help. Assuming I've understood your meaning correctly, something like this, OLD: "Transmission and Processing of IPv6 Extension Headers" [RFC7045] clarified how intermediate nodes should process Extension Headers. This document is generally consistent with [RFC7045], and was raised as an issue for discussion when [RFC2460] was updated and replaced by [RFC8200]. This document updates [RFC8200] as described in the next section and consequently clarifies the description in Section 2.2 of [RFC7045], using the language of BCP 14 [RFC2119] [RFC8174]. The document defines a set of procedures for the Hop-by-Hop Options header that are intended to make the processing of Hop-by-Hop options practical in modern transit routers. The common cases are that some Hop-by-Hop options will be processed across the Internet, while others will only be processed within a limited domain [RFC8799] (e.g., where a specific service is made available in that network segment that relies on one or more Hop-by-Hop options). NEW: "Transmission and Processing of IPv6 Extension Headers" [RFC7045] clarified how intermediate nodes should process Extension Headers. The present document is generally consistent with [RFC7045], and addresses an issue that was raised for discussion when [RFC2460] was updated and replaced by [RFC8200]. This document updates [RFC8200] as described in the next section and consequently clarifies the description in Section 2.2 of [RFC7045], using the language of BCP 14 [RFC2119] [RFC8174]. This document defines a set of procedures for the Hop-by-Hop Options header that are intended to make the processing of Hop-by-Hop options practical in modern transit routers. The common cases are that some Hop-by-Hop options will be processed across the Internet, while others will only be processed within a limited domain [RFC8799] (e.g., where a specific service is made available in that network segment that relies on one or more Hop-by-Hop options). Since you allude to "an issue that was raised for discussion", it also wouldn't go amiss to provide an informative citation to the relevant list thread. ### Section 5.1, use the RFC 8200 words Suggested rewording, both for correctness and to use the language of RFC 8200: OLD: [RFC8200] also requires that a Hop-by-Hop Options header only appear once in a packet. NEW: [RFC8200] also requires that a Hop-by-Hop Options header appear at most once in a packet. ### Sections 5.1, 5.1.1, clarity You juxtapose a quote from RFC 8200 that says (my paraphrase, with BCP 14 keyword added to be provocative) "routers SHOULD NOT process the HbH header unless explicitly configured to do so", next to a new requirement that "clarifies that a configuration could control whether processing skips any specific" HbH option. I'll paraphrase that one too, again inserting a BCP 14 keyword, as "routers MAY instead process the HbH header by default while allowing configuration to disable specific options." I guess those two things are compatible, but I had to do too much work to extract that interpretation and I'm not even confident that's really what you're trying to say. Can you confirm that it is? As a follow-up, if my paraphrase is right, how do you reconcile Section 5.1 where you say "Routers SHOULD process the Hop-by-Hop Options header" with (my paraphrase of) RFC 8200? You might reply that I've changed the meaning of Section 5.1 by omitting "using the method defined in this document", but if so I think you should rephrase the Section 5.1 language for clarity, as in, OLD: Routers SHOULD process the Hop-by-Hop Options header using the method defined in this document NEW: Routers that process the Hop-by-Hop Options header SHOULD do so using the method defined in this document. On the other hand, if you intend that "Routers SHOULD process the Hop-by-Hop Options header", I think you have more work to do in Section 5.1.1, as discussed above. ### Section 5.2, first HbH option The first couple of paragraphs appear to privilege the first HbH option compared to the rest. Is this deliberate? Can you help me understand why, if so? For example, A router configuration needs to avoid vulnerabilities that arise when it cannot process the first Hop-by-Hop option at full forwarding rate. A router SHOULD NOT therefore be configured to process the first Hop-by-Hop option if this adversely impacts the aggregate forwarding rate. A router SHOULD process additional Hop-by-Hop options, if configured to do so, providing that these also do not adversely impact the aggregate forwarding rate. When I unpack this, how is it different from (my text): A router configuration needs to avoid vulnerabilities that arise when processing of a Hop-by-Hop option would prevent it from forwarding at full forwarding rate. A router SHOULD process Hop-by-Hop options, if configured to do so, providing that these do not adversely impact the aggregate forwarding rate. The primary change in my rewrite was to cut A router SHOULD NOT therefore be configured to process the first Hop-by-Hop option if this adversely impacts the aggregate forwarding rate. As far as I can tell the rewrite is semantically the same, but I'm concerned that I have missed something, otherwise, why would you have put in that special mention of the first option? :-( One interpretation I came up with after reading it a few times is that what you mean is something like "when it cannot process even a single Hop-by-Hop option at full forwarding rate". Does that get at your intent? I appreciate that practically speaking, most forwarding code will go through the options serially starting with the first, but not only is that not a requirement, but in some of your other text you drive home the message that the order of processing is not guaranteed. So, I think you should be careful to separate that assumption from what you're trying to specify. This is only one example. Another is the first paragraph, A source creating packets with a Hop-by-Hop Options header SHOULD use a method that is robust to network nodes processing only the first Hop-by-Hop option that is included in the packet, or that forward packets without the option being processed (see Section 6.1). I would've expected something more like, A source creating packets with a Hop-by-Hop Options header SHOULD use a method that is robust to network nodes selectively processing only some of the Hop-by-Hop options that are included in the packet, or that forward packets without the option(s) being processed (see Section 6.1). As it is, a close reading of the sentence tells me it's fine if the method is *not* robust to network nodes that process only the second option, for example. This isn't a full scrub of the section, e.g. the fourth paragraph has "further" (after what? The first? The last one successfully processed?) ### Section 5.2, including more than one HbH option I found "A source MAY, based on local configuration, include more than one Hop-by-Hop option" peculiar, given that there's never been a restriction on that in the past (has there?), i.e. you're granting permission for something that was always allowed, so... thanks? I think I see what you're doing, which is to subtly throw shade on the idea of including more than one HbH option, but if you want to do that, why do it subtly? E.g., you could go whole hog with something like A source SHOULD NOT include more than one Hop-by-Hop option, although it MAY do so based on local configuration. In the latter case it might wish to restrict the size... ### Section 5.2, clarity OLD: If a router is unable to process any Hop-by-Hop option (or is not NEW: If a router is unable to process a given Hop-by-Hop option (or is not ### Section 5.2, sense of "any" is underdetermined This document modifies this behaviour for the "01", "10", and "11" action bits, so that if a router is unable to process any Hop-by-Hop option (or is not configured to do so), it SHOULD behave in the way specified for an unrecognized Option Type when the action bits were set to "00". It also modifies the behaviour for the "10" and "11" Is "any Hop-by-Hop option" supposed to mean "any given HbH option" or is it supposed to mean "no HbH option"? I think it's the former, in which case, I suggest the change. ### Section 5.2, clarity, standalone patch This document modifies this behaviour for the "01", "10", and "11" action bits, so that if a router is unable to process any Hop-by-Hop option (or is not configured to do so), it SHOULD behave in the way specified for an unrecognized Option Type when the action bits were set to "00". ... The modified text for "01", "10", and "11" values is: 01 - MAY discard the packet. Nodes should not rely on routers dropping these unrecognized Option Types. 10 - MAY discard the packet ... 11 - MAY discard the packet ... And as a reminder (to me, at least!), 00 is: 00 - skip over this option and continue processing the header. I had to go over this several times before I finally worked out that the modified text for the three values quoted above is not actually in conflict with the SHOULD in the first quoted paragraph. While puzzling over it, I also noticed that even though all three values are modified to permit discard, only the first includes the sentence "Nodes should not rely on routers dropping these unrecognized Option Types". It seems to me that even though it would make the document more verbose, and isn't strictly mandatory for technical correctness upon careful reading, it would be helpful for clarity to spell things out more explicitly, as in, NEW: The modified text for "01", "10", and "11" values is: 01 - SHOULD behave as specified for 00, but MAY discard the packet if so configured. 10 - SHOULD behave as specified for 00, but MAY discard the packet if so configured and, regardless of whether or not the packet's Destination Address was a multicast address, and if the packet was discarded, MAY send an ICMP Parameter Problem, Code 2, message to the packet's Source Address, pointing to the unrecognized Option Type. 11 - SHOULD behave as specified for 00, but MAY discard the packet if so configured and, only if the packet's Destination Address was not a multicast address, and the packet was discarded, MAY send an ICMP Parameter Problem, Code 2, message to the packet's Source Address, pointing to the unrecognized Option Type. Nodes should not rely on routers dropping unrecognized Option Types. I added a SHOULD clause for each. I also added "if so configured" to the MAY parts, it's unclear to me if that's overreach or helpful clarification of intent since I don't know if you intended the MAY to cover other cases too. Finally, I factored out the "should not rely on" sentence so that it doesn't appear to apply only to the 01 case. Apart from simple readability, the other argument I'd give in favor of making this change (or one like it) is that in this kind of patch-type approach to updating a base document (which is what this is, despite the fact you haven't used OLD/NEW blocks), it's desirable for the patched base document to at least potentially stand alone. ### Section 5.2, "a multicast address", plus RFC 2119 keyword I have two concerns about When a node sends an ICMP message in response to a packet with a multicast address, this could be exploited as an amplification attack. This is particularly problematic when the Source Address is not valid (which can be mitigated to varying degrees by using a reverse path forwarding (RPF) check). A node SHOULD only send ICMP messages in response to a packet with a multicast address when this is enabled for the specific Source Address and/or the group Destination Address. The first concern is that when you write "a packet with a multicast address", it's not clear, until one reads the final sentence, that you mean either the source address or the destination address. I suggest spelling it out explicitly. The second concern is that although your intent with "SHOULD only" is clear enough, it doesn't fit the RFC 2119 definition of SHOULD. A possible rewrite to cover both concerns is, NEW: When a node sends an ICMP message in response to a packet with a multicast source or destination address, this could be exploited as an amplification attack. This is particularly problematic when the Source Address is not valid (which can be mitigated to varying degrees by using a reverse path forwarding (RPF) check). A node SHOULD NOT send ICMP messages in response to a packet with a multicast source or destination address unless this is enabled for the specific Source Address and/or the group Destination Address. (You could use "and/or" wherever I have put "or", but in my view it's not necessary, after all, it's not "xor".) ### Section 5.2, expository paragraph needed? Is this paragraph doing any necessary work? When an ICMP Parameter Problem, Code 2, message is delivered to the source, the source can become aware that at least one node on the path has failed to recognize the option. Generating an ICMP message incurs additional router processing. Reception of this message is not guaranteed, routers might be unable to be configured so that they do not generate these messages, and they are not always forwarded to the source. The motivation here is to loosen the requirement to send an ICMPv6 Parameter Problem message when a router forwards a packet without processing the list of all options. I can see how it might've been needed during working group development of the document, but if I imagine I'm an implementor reading this spec, I'm not sure what I do with it. As far as I can tell the whole thing can be condensed down to "you might not get an IMCP parameter problem if one of your options isn't recognized, but then again that was always true"... and because of "that was always true", you could leave it out without harm. ### Section 5.2.1 The function of a Router Alert Option can result in the processing that this specification is proposing to eliminate, that is, to instruct a router to process the packet in the control plane. I don't think this specification is solely proposing to protect the control plane, it's also trying to protect the forwarding plane from option lists that are too heavyweight to be processed at line rate in the fast path. (Bullets 3 and 4 in the second bullet list in Section 4.) Fortunately, a rewrite to correct this is as simple as removing one definite article. NEW: The function of a Router Alert Option can result in processing that this specification is proposing to eliminate, that is, to instruct a router to process the packet in the control plane. ### Section 5.2.2, inappropriate RFC 2119 keyword The final paragraph of this section is the single sentence, The actions of the lookup table SHOULD be configurable by the operator of the router. But the previous paragraph told me that said lookup table is "a possible approach". It seems weird to me to use an RFC 2119 keyword to mandate behavior specific to "a possible approach". If I were you, I'd use lowercase "should", and I would combine this paragraph with the preceding one. ### Section 6, "simple to process" isn't actionable * New Hop-by-Hop options SHOULD be designed to ensure the router can process the options at the full forwarding rate. That is, they should be simple to process (see Section 5.2). I don't see anything in Section 5.2 that tells me how to make an option simple to process. If you think it does explain that, please help me understand how. Otherwise, I think you should remove the cross-reference. For that matter, even with the suggested change, this bullet point makes me a little bit sad because it feels isomorphic to the famous "don't write bugs" advice. (See also RFC 9225.) But, ¯\_(ツ)_/¯ ### Section 8, forcing packets to the slow path can also harm the control plane Security issues with including IPv6 Hop-by-Hop options are well known and have been documented in several places, including [RFC6398], [RFC6192], [RFC7045] and [RFC9098]. The main issue, as noted in Section 4, is that any mechanism that can be used to force packets into the router's control plane can be exploited as a Denial-of- Service attack on a transit router by saturating the resources needed for router management (routing protocols, network management protocols, etc.) and cause the router to fail or perform sub- optimally. There is a related but not identical issue, which is that in many routers, some resources are shared between the control plane and the slow path -- you nod to this in your definition of "slow path" in Section 3. Even if packets are forced only into the slow path, but not the control plane, that can still work as a denial of service attack against the control plane. I suppose we might get into an ontological debate about what exactly "the control plane" is in this context and whether the paragraph as written already encompasses it, but I think it would be better to err on the side of completeness even if it requires a bit more verbosity. The fix I propose is simple enough, though: s/control plane/slow path or control plane/. ### Section 8, misleading bullet points I think these two bullet points are misleading in a couple of ways: * The document sets an expectation that if a packet includes a single Hop-by-Hop option that packet will be forwarded across the network path." * Additional Hop-by-Hop options MAY be included, based on local configuration. Nodes only process these additional Hop-by-Hop options if configured to do so. The first bullet, by focusing on "a single Hop-by-Hop option", implies that if multiple options were included, the packet might not be forwarded. I think that's not right, per my understanding of the document. The second bullet's second sentence ("only process... if") appears to be a case of "the exception proves the rule" that nodes commit to processing the first Hop-by-Hop option. But this is also not right. For that matter, it's not clear whether "nodes" in that sentence refers to destination or intermediate nodes. I have assumed the latter. A rewrite might be, NEW: * The document sets an expectation that if a packet includes a Hop-by-Hop Options header that packet will be forwarded across the network path. * A source MAY include one or more Hop-by-Hop options. Whether any of these options is processed, and if so which and how many, is dependent on the configuration of intermediate nodes. |
2024-05-28
|
17 | John Scudder | Ballot comment text updated for John Scudder |
2024-05-28
|
17 | Roman Danyliw | [Ballot discuss] ** Section 6. There appears to be a mismatch in the combination of normative guidance: Any new Hop-by-Hop option that is standardized … [Ballot discuss] ** Section 6. There appears to be a mismatch in the combination of normative guidance: Any new Hop-by-Hop option that is standardized that does not meet these criteria MUST include in the specification a detailed explanation why this cannot be accomplished and to show that there is a reasonable expectation that the option can be proceed at full forwarding rate. This text is preceded by a bulleted list of five items which each contain a SHOULD clause. What does it mean for a “SHOULD” statement to meet or not meet a criteria? Whether it implements the guidance in the bullet list or not, an implementation will be conformant. |
2024-05-28
|
17 | Roman Danyliw | [Ballot comment] Thank you to Behcet Sarikaya for the GENART review. ** What is the relationship between the guidance found in this document and the … [Ballot comment] Thank you to Behcet Sarikaya for the GENART review. ** What is the relationship between the guidance found in this document and the filtering guidance in RFC9288? |
2024-05-28
|
17 | Roman Danyliw | [Ballot Position Update] New position, Discuss, has been recorded for Roman Danyliw |
2024-05-28
|
17 | Deb Cooley | [Ballot comment] Many thanks to Peter Yee for his reviews. Section 8, paragraph 4: Nit: Echoing a concern that Peter Yee raised, I feel like … [Ballot comment] Many thanks to Peter Yee for his reviews. Section 8, paragraph 4: Nit: Echoing a concern that Peter Yee raised, I feel like this paragraph could be restructured a little to make it clear that this concern is not specific to this draft. My suggestions is to change the first sentence to: 'Although this is not specific to this draft, it should be noted that Internet protocol processing needs...'. And then remove the second to last sentence in the paragraph. |
2024-05-28
|
17 | Deb Cooley | [Ballot Position Update] New position, No Objection, has been recorded for Deb Cooley |
2024-05-28
|
17 | Gunter Van de Velde | [Ballot comment] # Gunter Van de Velde, RTG AD, comments for draft-ietf-6man-hbh-processing-17 Please find https://www.ietf.org/blog/handling-iesg-ballot-positions/ documenting the handling of ballots. Many thanks for this writeup. … [Ballot comment] # Gunter Van de Velde, RTG AD, comments for draft-ietf-6man-hbh-processing-17 Please find https://www.ietf.org/blog/handling-iesg-ballot-positions/ documenting the handling of ballots. Many thanks for this writeup. It is well written and a nice read to explore the wonderful opportunities and associated deep dark secrets embodied with HbH options. In the COMMENTS section i have added a series of comments with additional context. I hope this review and the various observations provide a way to help improve the document. One question i had at the end of reading the draft, is if a transit node may for performance optimization reorder, whiteout changing or removing options that are enclosed within the HbH header? Why? Maybe a particular implementation is interested in a subset of options and prefers to see them at the beginnings of the HbH header for hardware optimization when steering the packet through the available internet paths? G/ #DETAILED COMMENTS #================= 13 This document specifies procedures for how IPv6 Hop-by-Hop options 14 are processed in IPv6 routers and hosts. It modifies the procedures 15 specified in the IPv6 Protocol Specification (RFC 8200) to make 16 processing of the IPv6 Hop-by-Hop Options header practical with the 17 goal of making IPv6 Hop-by-Hop options useful to deploy and use in 18 the Internet. When published, this document updates RFC 8200. The word "practical" in this context can be improved for clarity and precision. A better word might be "efficient" or "feasible," which conveys the intention to make the processing of IPv6 Hop-by-Hop Options more manageable and effective in real-world deployments. similar use of the word practical was observed in the introduction section also. 117 * Fast Path: A path through a router that is optimized for 118 forwarding packets. The Fast Path might be supported by 119 Application Specific Integrated Circuits (ASICs), a Network 120 Processor (NP), or other special purpose hardware. This is the 121 usual processing path within a router taken by the forwarding 122 plane. The word "usual" in this context is appropriate, but "typical" or "standard" might be better choices to convey the intended meaning more clearly. 139 NOTE: [RFC6192] is an example of how designs can separate control 140 plane and forwarding plane functions. The separation between 141 hardware and software processing described in [RFC6398] does not 142 apply to all router architectures. However, a router that performs 143 all or most processing in software might still incur more processing 144 cost when providing special processing for Hop-by-Hop options. How about a slight rewrite of the section to enhance its readability: "Note: [RFC6192] provides an example of how designs can separate control plane and forwarding plane functions. The separation between hardware and software processing described in [RFC6398] does not apply universally to all router architectures. However, routers that perform all or most processing in software may still incur higher processing costs when providing special handling for Hop-by-Hop options." 163 * If a subset of packets in a flow were to include Hop-by-Hop 164 options, this could introduce a potential to increase the number 165 of re-ordered packets and the re-ordering distances of the packets 166 delivered to the destination. This might result when the 167 Extension Header was included in only some packets, or if a 168 specific Hop-by-Hop option required different processing for some 169 packets in a flow. Significant reordering of the packets 170 belonging to a flow can impact the performance of upper layer 171 protocols and needs to be avoided. It took me few times reading this section to fully grasp the intent. I tried to slightly reword the section for convenience: "If a subset of packets within a flow includes Hop-by-Hop options, this may lead to an increased number of reordered packets and greater reordering distances for packets delivered to the destination. Such reordering could occur if the Extension Header is included only in some packets, or if a specific Hop-by-Hop option necessitates different processing for certain packets within the flow. Significant reordering of packets within a flow can negatively impact the performance of upper-layer protocols and should therefore be avoided. " 173 * Packets could include multiple Hop-by-Hop options. Too many 174 options could make the previous issues worse by increasing the 175 resources required to process them. The total size of the options 176 determines the number of header bytes that might need to be 177 processed. Measurements [Cus23a] show that the probability of 178 successful transmission is currently higher for packets that 179 include Options when it results in a short total Extension Header 180 (EH) Chain size (e.g., less than 40 bytes). s/previous/aforementioned/ 217 The main issues remain: s/issues/concerns/ 285 "Transmission and Processing of IPv6 Extension Headers" [RFC7045] 286 clarified how intermediate nodes should process Extension Headers. 287 This document is generally consistent with [RFC7045], and was raised 288 as an issue for discussion when [RFC2460] was updated and replaced by 289 [RFC8200]. This document updates [RFC8200] as described in the next For clarity maybe 'this document' should be more explicit that it is about draft draft-ietf-6man-hbh-processing-17 and not about RFC7045, which was what i understood when i first read this section, and had to re-read the text again. i tried too come up with an text blob to clarify this, but i couldn't unfortunately 331 It is expected that the Hop-by-Hop Options header will be processed 332 by the destination. Hosts SHOULD process the Hop-by-Hop Options Earlier in the document it was mentioned that the destination address is multicast, and that there may be multiple destinations that process the packet. The text here seems to imply that there is only a single destination. Hence maybe s/destination/destination(s)/ 469 DISCUSSION Is this section intended like this for the rfc-to-be, or is this to trigger discussions somewhere in the WG? 516 A possible approach to implementing this is to maintain a lookup 517 table based on Option Type of the IPv6 options that can be processed 518 at full forwarding rate. This would allow a router to quickly 519 determine if an option is supported and can be processed. If the 520 option is not supported, then the router processes the option as 521 described in Section 5.1 of this document. Do we need this paragraph? Can it be left out (i do not have strong feelings if section remains though)? Implementers will do whatever they do to comply with their technology to select/identify those options they are instructed to process 534 * New Hop-by-Hop options SHOULD be designed to ensure the router can 535 process the options at the full forwarding rate. That is, they 536 should be simple to process (see Section 5.2). I am not sure that the keyword here is 'simple to process'. It seems that the requirement is that it can be processed in 'fast path by hardware' maybe? 563 The general issue of robust operation of packets with new Hop-by-Hop 564 options is described in Section 6.1 below. s/issue/concern/ 568 Recent measurement surveys (e.g., [Cus23a]) show that packets that 569 include Extension Headers can cause the packets to be dropped by some 570 Internet paths. In a controlled domain, routers can be configured or 571 updated to provide support for any required Hop-by-Hop options. in an earlier part of the text the term 'limited domain' was used. Would using this term be appropriate here also? 573 The primary motivation of this document is to make it more practical 574 to use Hop-by-Hop options beyond such a single domain, with the Same as the previous comment. Is the text suggesting a limited domain is intended. |
2024-05-28
|
17 | Gunter Van de Velde | [Ballot Position Update] New position, No Objection, has been recorded for Gunter Van de Velde |
2024-05-27
|
17 | Peter Yee | Request for Telechat review by SECDIR Completed: Ready. Reviewer: Peter Yee. Sent review to list. |
2024-05-27
|
17 | Orie Steele | [Ballot Position Update] New position, No Objection, has been recorded for Orie Steele |
2024-05-27
|
17 | Jim Guichard | [Ballot comment] # Jim Guichard, RTG AD, comments for draft-ietf-6man-hbh-processing-17. All comments provide indits line numbers from v-17 of the document. 84 An IPv6 … [Ballot comment] # Jim Guichard, RTG AD, comments for draft-ietf-6man-hbh-processing-17. All comments provide indits line numbers from v-17 of the document. 84 An IPv6 packet includes Hop-by-Hop options by including a Hop-by-Hop 85 Option header. The current list of defined Hop-by-Hop options can be 86 found at [IANA-HBH]. The focus for this document is to set the 87 minimum requirements for router processing of Hop-by-Hop options. Jim> The previous paragraph says that the document has the goal of making IPv6 Hop-by-Hop options useful to deploy and use at IPv6 routers and hosts. However, the above does not mention hosts (?). Is this just an omission in the text or is the focus only for routers and therefore the previous paragraph is inaccurate? Please clarify. 111 * control plane: IPv6 routers exchange control information through 112 the control plane. This processes the management and routing 113 information exchanged with other routers. Routers process fields 114 contained in packet headers. However, they do not process 115 information contained in packet payloads. Jim> Are the last two sentences accurate in the context of a control plane definition? While both sentences are true they do not seem relevant to the control plane. 309 When a packet includes one or more Extension Headers, the Next Header 310 field of the IPv6 Header does not identify the transport protocol. Jim> Wouldn’t it be better to say ‘what’ the Next Header field indicates rather than what it ‘does not’. There are lots of things it ‘does not’ indicate. |
2024-05-27
|
17 | Jim Guichard | [Ballot Position Update] New position, No Objection, has been recorded for Jim Guichard |
2024-05-27
|
17 | Éric Vyncke | [Ballot discuss] # Éric Vyncke, INT AD, comments for draft-ietf-6man-hbh-processing-17 Thank you for the work put into this document. The very first drafts of this … [Ballot discuss] # Éric Vyncke, INT AD, comments for draft-ietf-6man-hbh-processing-17 Thank you for the work put into this document. The very first drafts of this work were raising my eyebrows as they put limits put on the IPv6 evolution, this version is much more palatable. Please find below blocking DISCUSS points (easy to address), some non-blocking COMMENT points (but replies would be appreciated even if only for my own education), one nit. Special thanks to Jen Linkova for the shepherd's detailed write-up including the WG consensus and the justification of the intended status. Other thanks to Bernie Volz, the Internet directorate reviewer (at my request), please consider this int-dir review: https://datatracker.ietf.org/doc/review-ietf-6man-hbh-processing-16-intdir-telechat-volz-2024-05-12/ (I share some concerns of Bernie and am hoping that the authors will address them as seen in the change log for -17) Please note that János Farkas is the IoT directorate reviewer (at my request) and you may want to consider this iot-dir review as well when it will be available (no need to wait for it though): https://datatracker.ietf.org/doc/draft-ietf-6man-hbh-processing/reviewrequest/19466/ I hope that this review helps to improve the document, Regards, -éric # DISCUSS (blocking) ## Section 5.1 Unsure whether adding a reference to [I-D.ietf-6man-eh-limits] is adequate here. If authors want to keep it, then it is a normative reference and not informative. Suggest removing this part. See also my similar comment in section 1. ## Section 5.2 Also use [I-D.ietf-6man-eh-limits] in a normative way, i.e., this reference must be normative and not informative. Same reasoning in section 6. The last two paragraph are about mcast packets, isn't it covered by RFC 4443 ? This RFC 4443 should probably be an informative reference and if the process of RFC 4443 is modified, then this I-D should also formerly update RFC 4443. |
2024-05-27
|
17 | Éric Vyncke | [Ballot comment] # COMMENTS (non-blocking) As a side note, I appreciate John Scudder's summary of this I-D. ## Section 1 Definining a procedure for host(s) … [Ballot comment] # COMMENTS (non-blocking) As a side note, I appreciate John Scudder's summary of this I-D. ## Section 1 Definining a procedure for host(s) to handle HbH is already a little weird in my mind. Moreover, section one is limiting to routers `The focus for this document is to set the minimum requirements for router processing of Hop-by-Hop options` i.e., no mention of host. Should the abstract be updated ? I was about to raise a discuss on the topic of [I-D.ietf-6man-eh-limits] as it is not guaranteed at all that this document has IETF consensus. Strongly suggest removing this paragraph. ## Section 3 `IPv6 routers exchange user data` it is not always user-related data, i.e., how is telemetry qualified ? I.e., suggest using user or applications data. `Routers process fields contained in packet headers.` should be qualified into "packet layer-3 headers" (as opposed to HTTP headers). (both for forwarding and control planes). ## Section 4 `control/management components`, should the management component be introduced in the terminology section ? `This might result when the Extension Header was included in only some packets, or if a specific Hop-by-Hop option required different processing for some packets in a flow.` while I do not disagree with the statement, this I-D is about HbH, so please remove the mention of 'extension header' in general. `Measurements [Cus23a] show that the probability of successful transmission is currently higher for packets that include Options when it results in a short total Extension Header (EH) Chain size (e.g., less than 40 bytes)` while I do like this study and similar ones, "successful transmission" should probably be qualified by "over the public global Internet". If based on a study, then I am unsure whether 'e.g.' should be replaced by 'i.e.' ? `This could protect against a Denial-of-Service attack on the router [RFC9098]` this should be less assertive, e.g., 'This may be done to protect against ...' `practical in modern transit routers` are not all routers 'transit' ? I.e., remove 'transit' in this sentence ? ## Section 5.1 `Routers SHOULD process the Hop-by-Hop Options header using the method defined in this document. If a router does not process the Hop-by-Hop Options header, it MUST ` I am unsure how to interpret the normative language in this paragraph: the first SHOULD renders the rest non-normative in my reading, i.e., the MUST later in the paragraph could be ignored. Furthermore, the SHOULD should have a "bypass" clause, i.e., an explanation about when the SHOULD can by bypassed. I was about to raise a DISCUSS on this topic. `It is expected that the Hop-by-Hop Options header will be processed by the destination.` please use 'destination(s)' as this could be a multicast packet. `Hosts SHOULD process the Hop-by-Hop Options header in received packets.` actually it is 'nodes' as routers can also be the destination (notably when using routing headers but not only). ## Section 5.1.1 SHould this section use normative language ? What is meant by 'identifiers' in `process the identifiers of individual Option Types`? ## Section 5.2 The 4th paragraph starting with `If a router is unable to process further Hop-by-Hop options` is probably useless as it is plain RFC 8200 processing. Should there be a justification or explanation about `MAY discard the packet. Nodes should not rely on routers dropping these unrecognized Option Types.` ## Section 6.1 What is meant by 'domain' in `beyond such a single domain`? Unsure about the usefulness of the whole section, the document could be lighter and possibly more efficient without it. ## Section 8 This section mentions both "denial-of-service" and DDOS. Is there a difference wrt to HbH threat ? As noted in the 4th paragraph (starting with `Finally, the document notes that Internet protocol processing needs to be robust to malformed/malicious protocol fields.`), this threat is not limited to HbH, so, I wonder whether it should be in this I-D. Rather than using 'restrictions' in `The document added restrictions to any future new Hop-by-Hop` let's use recommendations per section 6. # NITS (non-blocking / cosmetic) ## Section 8 Unmatched trailing " in `single Hop-by-Hop option that packet will be forwarded across the network path."`. |
2024-05-27
|
17 | Éric Vyncke | [Ballot Position Update] New position, Discuss, has been recorded for Éric Vyncke |
2024-05-27
|
17 | Ines Robles | Assignment of request for Telechat review by IOTDIR to János Farkas was marked no-response |
2024-05-26
|
17 | John Scudder | [Ballot comment] This document uses a lot of words to say what is ultimately a fairly simple message. It's also an important message, so I … [Ballot comment] This document uses a lot of words to say what is ultimately a fairly simple message. It's also an important message, so I think it's worth the time to communicate it clearly; hence the effort put into this review. (The quote attributed to Pascal, to the effect of "I am sorry I have written you a long letter, I did not have time to write you a short one" might apply here.) As far as I can tell, the spec's TL;DR is: Routers: - SHOULD process HbH options as long as they can do so without compromising forwarding rate. - If it would compromise forwarding rate, they should triage the HbH options they process. (Details of triage not specified other than letting the operator configure HbH options to respect/ignore.) - Can ignore the whole HbH header by default, or can process it but use configuration to control what individual HbH options are processed. - MUST NOT drop a packet just because it contains a HbH header. - SHOULD make the list of HbH options that are processed configurable. - Concerning the RA option, if processing it at all, - "MUST protect itself from infrastructure attack". - Shouldn't bother the control plane for an RA that has no Value field of interest. Hosts when receiving: - SHOULD process HbH headers, and process all options within - But may choose not to process them (e.g. constrained hosts) - For any HbH header not processed, they MUST (Section 5.1) behave as if it wasn't present. Hosts when sending: - SHOULD "use a method that is robust". - MAY include more than one HbH option. I feel fairly strongly that this document would be more valuable if it were less expository, more prescriptive, and shorter -- "crisper", if you like. However, my concerns don't rise to the level of blocking publication, so I've captured some specific and potentially actionable points in comments, and I understand that the authors' preferences may not be the same as mine, or that they may not have the appetite for a large rewrite. On the other hand, if you're up for the challenge, I'm willing to contribute more effort. Note that not all of my comments are of that nature, many relate to correctness and accuracy -- so even if you completely disagree with my editorial point of view, please look over the rest of them. ## COMMENT ### Section 3, cut-and-paste error? * control plane: IPv6 routers exchange control information through the control plane. This processes the management and routing information exchanged with other routers. So far so good. Routers process fields contained in packet headers. However, they do not process information contained in packet payloads. This sentence is a verbatim copy of a sentence in the definition of "forwarding plane". Is it a cut-and-paste error? It doesn't seem relevant to a definition of the control plane. ### Section 4, rewrite for clarity, add informative reference The pronouns and determiners in the last couple of paragraphs make it hard to nail down what they mean. I think a simple rewrite to add more specificity would help. Assuming I've understood your meaning correctly, something like this, OLD: "Transmission and Processing of IPv6 Extension Headers" [RFC7045] clarified how intermediate nodes should process Extension Headers. This document is generally consistent with [RFC7045], and was raised as an issue for discussion when [RFC2460] was updated and replaced by [RFC8200]. This document updates [RFC8200] as described in the next section and consequently clarifies the description in Section 2.2 of [RFC7045], using the language of BCP 14 [RFC2119] [RFC8174]. The document defines a set of procedures for the Hop-by-Hop Options header that are intended to make the processing of Hop-by-Hop options practical in modern transit routers. The common cases are that some Hop-by-Hop options will be processed across the Internet, while others will only be processed within a limited domain [RFC8799] (e.g., where a specific service is made available in that network segment that relies on one or more Hop-by-Hop options). NEW: "Transmission and Processing of IPv6 Extension Headers" [RFC7045] clarified how intermediate nodes should process Extension Headers. The present document is generally consistent with [RFC7045], and addresses an issue that was raised for discussion when [RFC2460] was updated and replaced by [RFC8200]. This document updates [RFC8200] as described in the next section and consequently clarifies the description in Section 2.2 of [RFC7045], using the language of BCP 14 [RFC2119] [RFC8174]. This document defines a set of procedures for the Hop-by-Hop Options header that are intended to make the processing of Hop-by-Hop options practical in modern transit routers. The common cases are that some Hop-by-Hop options will be processed across the Internet, while others will only be processed within a limited domain [RFC8799] (e.g., where a specific service is made available in that network segment that relies on one or more Hop-by-Hop options). Since you allude to "an issue that was raised for discussion", it also wouldn't go amiss to provide an informative citation to the relevant list thread. ### Section 5.1, use the RFC 8200 words Suggested rewording, both for correctness and to use the language of RFC 8200: OLD: [RFC8200] also requires that a Hop-by-Hop Options header only appear once in a packet. NEW: [RFC8200] also requires that a Hop-by-Hop Options header appear at most once in a packet. ### Sections 5.1, 5.1.1, clarity You juxtapose a quote from RFC 8200 that says (my paraphrase, with BCP 14 keyword added to be provocative) "routers SHOULD NOT process the HbH header unless explicitly configured to do so", next to a new requirement that "clarifies that a configuration could control whether processing skips any specific" HbH option. I'll paraphrase that one too, again inserting a BCP 14 keyword, as "routers MAY instead process the HbH header by default while allowing configuration to disable specific options." I guess those two things are compatible, but I had to do too much work to extract that interpretation and I'm not even confident that's really what you're trying to say. Can you confirm that it is? As a follow-up, if my paraphrase is right, how do you reconcile Section 5.1 where you say "Routers SHOULD process the Hop-by-Hop Options header" with (my paraphrase of) RFC 8200? You might reply that I've changed the meaning of Section 5.1 by omitting "using the method defined in this document", but if so I think you should rephrase the Section 5.1 language for clarity, as in, OLD: Routers SHOULD process the Hop-by-Hop Options header using the method defined in this document NEW: Routers that process the Hop-by-Hop Options header SHOULD do so using the method defined in this document. On the other hand, if you intend that "Routers SHOULD process the Hop-by-Hop Options header", I think you have more work to do in Section 5.1.1, as discussed above. ### Section 5.2, first HbH option The first couple of paragraphs appear to privilege the first HbH option compared to the rest. Is this deliberate? Can you help me understand why, if so? For example, A router configuration needs to avoid vulnerabilities that arise when it cannot process the first Hop-by-Hop option at full forwarding rate. A router SHOULD NOT therefore be configured to process the first Hop-by-Hop option if this adversely impacts the aggregate forwarding rate. A router SHOULD process additional Hop-by-Hop options, if configured to do so, providing that these also do not adversely impact the aggregate forwarding rate. When I unpack this, how is it different from (my text): A router configuration needs to avoid vulnerabilities that arise when processing of a Hop-by-Hop option would prevent it from forwarding at full forwarding rate. A router SHOULD process Hop-by-Hop options, if configured to do so, providing that these do not adversely impact the aggregate forwarding rate. The primary change in my rewrite was to cut A router SHOULD NOT therefore be configured to process the first Hop-by-Hop option if this adversely impacts the aggregate forwarding rate. As far as I can tell the rewrite is semantically the same, but I'm concerned that I have missed something, otherwise, why would you have put in that special mention of the first option? :-( One interpretation I came up with after reading it a few times is that what you mean is something like "when it cannot process even a single Hop-by-Hop option at full forwarding rate". Does that get at your intent? I appreciate that practically speaking, most forwarding code will go through the options serially starting with the first, but not only is that not a requirement, but in some of your other text you drive home the message that the order of processing is not guaranteed. So, I think you should be careful to separate that assumption from what you're trying to specify. This is only one example. Another is the first paragraph, A source creating packets with a Hop-by-Hop Options header SHOULD use a method that is robust to network nodes processing only the first Hop-by-Hop option that is included in the packet, or that forward packets without the option being processed (see Section 6.1). I would've expected something more like, A source creating packets with a Hop-by-Hop Options header SHOULD use a method that is robust to network nodes selectively processing only some of the Hop-by-Hop options that are included in the packet, or that forward packets without the option(s) being processed (see Section 6.1). As it is, a close reading of the sentence tells me it's fine if the method is *not* robust to network nodes that process only the second option, for example. This isn't a full scrub of the section, e.g. the fourth paragraph has "further" (after what? The first? The last one successfully processed?) ### Section 5.2, including more than one HbH option I found "A source MAY, based on local configuration, include more than one Hop-by-Hop option" peculiar, given that there's never been a restriction on that in the past (has there?), i.e. you're granting permission for something that was always allowed, so... thanks? I think I see what you're doing, which is to subtly throw shade on the idea of including more than one HbH option, but if you want to do that, why do it subtly? E.g., you could go whole hog with something like A source SHOULD NOT include more than one Hop-by-Hop option, although it MAY do so based on local configuration. In the latter case it might wish to restrict the size... ### Section 5.2, clarity OLD: If a router is unable to process any Hop-by-Hop option (or is not NEW: If a router is unable to process a given Hop-by-Hop option (or is not ### Section 5.2, sense of "any" is underdetermined This document modifies this behaviour for the "01", "10", and "11" action bits, so that if a router is unable to process any Hop-by-Hop option (or is not configured to do so), it SHOULD behave in the way specified for an unrecognized Option Type when the action bits were set to "00". It also modifies the behaviour for the "10" and "11" Is "any Hop-by-Hop option" supposed to mean "any given HbH option" or is it supposed to mean "no HbH option"? I think it's the former, in which case, I suggest the change. ### Section 5.2, clarity, standalone patch This document modifies this behaviour for the "01", "10", and "11" action bits, so that if a router is unable to process any Hop-by-Hop option (or is not configured to do so), it SHOULD behave in the way specified for an unrecognized Option Type when the action bits were set to "00". ... The modified text for "01", "10", and "11" values is: 01 - MAY discard the packet. Nodes should not rely on routers dropping these unrecognized Option Types. 10 - MAY discard the packet ... 11 - MAY discard the packet ... And as a reminder (to me, at least!), 00 is: 00 - skip over this option and continue processing the header. I had to go over this several times before I finally worked out that the modified text for the three values quoted above is not actually in conflict with the SHOULD in the first quoted paragraph. While puzzling over it, I also noticed that even though all three values are modified to permit discard, only the first includes the sentence "Nodes should not rely on routers dropping these unrecognized Option Types". It seems to me that even though it would make the document more verbose, and isn't strictly mandatory for technical correctness upon careful reading, it would be helpful for clarity to spell things out more explicitly, as in, NEW: The modified text for "01", "10", and "11" values is: 01 - SHOULD behave as specified for 00, but MAY discard the packet if so configured. 10 - SHOULD behave as specified for 00, but MAY discard the packet if so configured and, regardless of whether or not the packet's Destination Address was a multicast address, and if the packet was discarded, MAY send an ICMP Parameter Problem, Code 2, message to the packet's Source Address, pointing to the unrecognized Option Type. 11 - SHOULD behave as specified for 00, but MAY discard the packet if so configured and, only if the packet's Destination Address was not a multicast address, and the packet was discarded, MAY send an ICMP Parameter Problem, Code 2, message to the packet's Source Address, pointing to the unrecognized Option Type. Nodes should not rely on routers dropping unrecognized Option Types. I added a SHOULD clause for each. I also added "if so configured" to the MAY parts, it's unclear to me if that's overreach or helpful clarification of intent since I don't know if you intended the MAY to cover other cases too. Finally, I factored out the "should not rely on" sentence so that it doesn't appear to apply only to the 01 case. Apart from simple readability, the other argument I'd give in favor of making this change (or one like it) is that in this kind of patch-type approach to updating a base document (which is what this is, despite the fact you haven't used OLD/NEW blocks), it's desirable for the patched base document to at least potentially stand alone. ### Section 5.2, "a multicast address", plus RFC 2119 keyword I have two concerns about When a node sends an ICMP message in response to a packet with a multicast address, this could be exploited as an amplification attack. This is particularly problematic when the Source Address is not valid (which can be mitigated to varying degrees by using a reverse path forwarding (RPF) check). A node SHOULD only send ICMP messages in response to a packet with a multicast address when this is enabled for the specific Source Address and/or the group Destination Address. The first concern is that when you write "a packet with a multicast address", it's not clear, until one reads the final sentence, that you mean either the source address or the destination address. I suggest spelling it out explicitly. The second concern is that although your intent with "SHOULD only" is clear enough, it doesn't fit the RFC 2119 definition of SHOULD. A possible rewrite to cover both concerns is, NEW: When a node sends an ICMP message in response to a packet with a multicast source or destination address, this could be exploited as an amplification attack. This is particularly problematic when the Source Address is not valid (which can be mitigated to varying degrees by using a reverse path forwarding (RPF) check). A node SHOULD NOT send ICMP messages in response to a packet with a multicast source or destination address unless this is enabled for the specific Source Address and/or the group Destination Address. (You could use "and/or" wherever I have put "or", but in my view it's not necessary, after all, it's not "xor".) ### Section 5.2, expository paragraph needed? Is this paragraph doing any necessary work? When an ICMP Parameter Problem, Code 2, message is delivered to the source, the source can become aware that at least one node on the path has failed to recognize the option. Generating an ICMP message incurs additional router processing. Reception of this message is not guaranteed, routers might be unable to be configured so that they do not generate these messages, and they are not always forwarded to the source. The motivation here is to loosen the requirement to send an ICMPv6 Parameter Problem message when a router forwards a packet without processing the list of all options. I can see how it might've been needed during working group development of the document, but if I imagine I'm an implementor reading this spec, I'm not sure what I do with it. As far as I can tell the whole thing can be condensed down to "you might not get an IMCP parameter problem if one of your options isn't recognized, but then again that was always true"... and because of "that was always true", you could leave it out without harm. ### Section 5.2.1 The function of a Router Alert Option can result in the processing that this specification is proposing to eliminate, that is, to instruct a router to process the packet in the control plane. I don't think this specification is solely proposing to protect the control plane, it's also trying to protect the forwarding plane from option lists that are too heavyweight to be processed at line rate in the fast path. (Bullets 3 and 4 in the second bullet list in Section 4.) Fortunately, a rewrite to correct this is as simple as removing one definite article. NEW: The function of a Router Alert Option can result in processing that this specification is proposing to eliminate, that is, to instruct a router to process the packet in the control plane. ### Section 5.2.2, inappropriate RFC 2119 keyword The final paragraph of this section is the single sentence, The actions of the lookup table SHOULD be configurable by the operator of the router. But the previous paragraph told me that said lookup table is "a possible approach". It seems weird to me to use an RFC 2119 keyword to mandate behavior specific to "a possible approach". If I were you, I'd use lowercase "should", and I would combine this paragraph with the preceding one. ### Section 6, "simple to process" isn't actionable * New Hop-by-Hop options SHOULD be designed to ensure the router can process the options at the full forwarding rate. That is, they should be simple to process (see Section 5.2). I don't see anything in Section 5.2 that tells me how to make an option simple to process. If you think it does explain that, please help me understand how. Otherwise, I think you should remove the cross-reference. For that matter, even with the suggested change, this bullet point makes me a little bit sad because it feels isomorphic to the famous "don't write bugs" advice. (See also RFC 9225.) But, ¯\_(ツ)_/¯ ### Section 8, forcing packets to the slow path can also harm the control plane Security issues with including IPv6 Hop-by-Hop options are well known and have been documented in several places, including [RFC6398], [RFC6192], [RFC7045] and [RFC9098]. The main issue, as noted in Section 4, is that any mechanism that can be used to force packets into the router's control plane can be exploited as a Denial-of- Service attack on a transit router by saturating the resources needed for router management (routing protocols, network management protocols, etc.) and cause the router to fail or perform sub- optimally. There is a related but not identical issue, which is that in many routers, some resources are shared between the control plane and the slow path -- you nod to this in your definition of "slow path" in Section 3. Even if packets are forced only into the slow path, but not the control plane, that can still work as a denial of service attack against the control plane. I suppose we might get into an ontological debate about what exactly "the control plane" is in this context and whether the paragraph as written already encompasses it, but I think it would be better to err on the side of completeness even if it requires a bit more verbosity. The fix I propose is simple enough, though: s/control plane/slow path or control plane/. |
2024-05-26
|
17 | John Scudder | [Ballot Position Update] New position, No Objection, has been recorded for John Scudder |
2024-05-22
|
17 | Amanda Baber | IANA Review state changed to IANA OK - Actions Needed from Version Changed - Review Needed |
2024-05-22
|
17 | Amanda Baber | We understand that this document now has an action for IANA: listing it as an additional reference for the Destination Options and Hop-by-Hop Options registry. |
2024-05-16
|
17 | Bob Hinden | New version available: draft-ietf-6man-hbh-processing-17.txt |
2024-05-16
|
17 | Bob Hinden | New version accepted (logged-in submitter: Bob Hinden) |
2024-05-16
|
17 | Bob Hinden | Uploaded new revision |
2024-05-12
|
16 | Bernie Volz | Request for Telechat review by INTDIR Completed: Ready with Nits. Reviewer: Bernie Volz. Sent review to list. |
2024-05-03
|
16 | Tero Kivinen | Request for Telechat review by SECDIR is assigned to Peter Yee |
2024-05-02
|
16 | Bernie Volz | Assignment of request for Telechat review by INTDIR to Benson Muite was withdrawn |
2024-05-02
|
16 | Bernie Volz | Request for Telechat review by INTDIR is assigned to Bernie Volz |
2024-05-02
|
16 | Bernie Volz | Request for Telechat review by INTDIR is assigned to Benson Muite |
2024-05-01
|
16 | Ines Robles | Request for Telechat review by IOTDIR is assigned to János Farkas |
2024-05-01
|
16 | Éric Vyncke | Requested Telechat review by IOTDIR |
2024-05-01
|
16 | Éric Vyncke | Requested Telechat review by INTDIR |
2024-05-01
|
16 | Erik Kline | Placed on agenda for telechat - 2024-05-30 |
2024-05-01
|
16 | Erik Kline | Ballot has been issued |
2024-05-01
|
16 | Erik Kline | [Ballot Position Update] New position, Yes, has been recorded for Erik Kline |
2024-05-01
|
16 | Erik Kline | Created "Approve" ballot |
2024-05-01
|
16 | Erik Kline | IESG state changed to IESG Evaluation from Waiting for AD Go-Ahead |
2024-05-01
|
16 | Erik Kline | Ballot writeup was changed |
2024-04-30
|
16 | (System) | IANA Review state changed to Version Changed - Review Needed from IANA OK - No Actions Needed |
2024-04-30
|
16 | Bob Hinden | New version available: draft-ietf-6man-hbh-processing-16.txt |
2024-04-30
|
16 | Bob Hinden | New version accepted (logged-in submitter: Bob Hinden) |
2024-04-30
|
16 | Bob Hinden | Uploaded new revision |
2024-04-30
|
15 | Behcet Sarikaya | Request for Last Call review by GENART Completed: Ready with Nits. Reviewer: Behcet Sarikaya. Review has been revised by Behcet Sarikaya. |
2024-04-29
|
15 | Behcet Sarikaya | Request for Last Call review by GENART Completed: Ready with Nits. Reviewer: Behcet Sarikaya. Sent review to list. |
2024-04-29
|
15 | Brian Trammell | Request for Last Call review by TSVART Completed: Ready with Nits. Reviewer: Brian Trammell. Sent review to list. |
2024-04-29
|
15 | (System) | IESG state changed to Waiting for AD Go-Ahead from In Last Call |
2024-04-27
|
15 | Peter Yee | Request for Last Call review by SECDIR Completed: Has Issues. Reviewer: Peter Yee. Sent review to list. Submission of review completed at an earlier date. |
2024-04-27
|
15 | Peter Yee | Request for Last Call review by SECDIR Completed: Has Issues. Reviewer: Peter Yee. |
2024-04-23
|
15 | (System) | IANA Review state changed to IANA OK - No Actions Needed from IANA - Review Needed |
2024-04-23
|
15 | David Dong | (Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs: IANA has completed its review of draft-ietf-6man-hbh-processing-15, which is currently in Last Call, and has the following comments: We … (Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs: IANA has completed its review of draft-ietf-6man-hbh-processing-15, which is currently in Last Call, and has the following comments: We understand that this document doesn't require any registry actions. While it's often helpful for a document's IANA Considerations section to remain in place upon publication even if there are no actions, if the authors strongly prefer to remove it, we do not object. If this assessment is not accurate, please respond as soon as possible. For definitions of IANA review states, please see: https://datatracker.ietf.org/help/state/draft/iana-review Thank you, David Dong IANA Services Sr. Specialist |
2024-04-22
|
15 | Magnus Westerlund | Request for Last Call review by TSVART is assigned to Brian Trammell |
2024-04-19
|
15 | Carlos Pignataro | Request for Last Call review by OPSDIR is assigned to Joel Jaeggli |
2024-04-18
|
15 | Tero Kivinen | Request for Last Call review by SECDIR is assigned to Peter Yee |
2024-04-18
|
15 | Jean Mahoney | Request for Last Call review by GENART is assigned to Behcet Sarikaya |
2024-04-15
|
15 | Liz Flynn | IANA Review state changed to IANA - Review Needed |
2024-04-15
|
15 | Liz Flynn | The following Last Call announcement was sent out (ends 2024-04-29): From: The IESG To: IETF-Announce CC: 6man-chairs@ietf.org, draft-ietf-6man-hbh-processing@ietf.org, ek.ietf@gmail.com, furry13@gmail.com, ipv6@ietf.org … The following Last Call announcement was sent out (ends 2024-04-29): From: The IESG To: IETF-Announce CC: 6man-chairs@ietf.org, draft-ietf-6man-hbh-processing@ietf.org, ek.ietf@gmail.com, furry13@gmail.com, ipv6@ietf.org Reply-To: last-call@ietf.org Sender: Subject: Last Call: (IPv6 Hop-by-Hop Options Processing Procedures) to Proposed Standard The IESG has received a request from the IPv6 Maintenance WG (6man) to consider the following document: - 'IPv6 Hop-by-Hop Options Processing Procedures' as Proposed Standard The IESG plans to make a decision in the next few weeks, and solicits final comments on this action. Please send substantive comments to the last-call@ietf.org mailing lists by 2024-04-29. Exceptionally, comments may be sent to iesg@ietf.org instead. In either case, please retain the beginning of the Subject line to allow automated sorting. Abstract This document specifies procedures for how IPv6 Hop-by-Hop options are processed in IPv6 routers and hosts. It modifies the procedures specified in the IPv6 Protocol Specification (RFC8200) to make processing of the IPv6 Hop-by-Hop Options header practical with the goal of making IPv6 Hop-by-Hop options useful to deploy and use in the Internet. When published, this document updates RFC8200. The file can be obtained via https://datatracker.ietf.org/doc/draft-ietf-6man-hbh-processing/ The following IPR Declarations may be related to this I-D: https://datatracker.ietf.org/ipr/5554/ |
2024-04-15
|
15 | Liz Flynn | IESG state changed to In Last Call from Last Call Requested |
2024-04-15
|
15 | Liz Flynn | Last call announcement was changed |
2024-04-15
|
15 | Liz Flynn | Last call announcement was generated |
2024-04-13
|
15 | Erik Kline | Last call was requested |
2024-04-13
|
15 | Erik Kline | Last call announcement was generated |
2024-04-13
|
15 | Erik Kline | Ballot approval text was generated |
2024-04-13
|
15 | Erik Kline | Ballot writeup was generated |
2024-04-13
|
15 | Erik Kline | IESG state changed to Last Call Requested from AD Evaluation::AD Followup |
2024-04-13
|
15 | (System) | Changed action holders to Erik Kline (IESG state changed) |
2024-04-13
|
15 | (System) | Sub state has been changed to AD Followup from Revised I-D Needed |
2024-04-13
|
15 | Bob Hinden | New version available: draft-ietf-6man-hbh-processing-15.txt |
2024-04-13
|
15 | Bob Hinden | New version accepted (logged-in submitter: Bob Hinden) |
2024-04-13
|
15 | Bob Hinden | Uploaded new revision |
2024-04-04
|
14 | (System) | Changed action holders to Bob Hinden, Gorry Fairhurst (IESG state changed) |
2024-04-04
|
14 | Erik Kline | IESG state changed to AD Evaluation::Revised I-D Needed from AD Evaluation |
2024-04-04
|
14 | Erik Kline | # Internet AD comments for draft-ietf-6man-hbh-processing-14 CC @ekline * comment syntax: - https://github.com/mnot/ietf-comments/blob/main/format.md * "Handling Ballot Positions": - https://ietf.org/about/groups/iesg/statements/handling-ballot-positions/ ## Discuss ### S5.1 … # Internet AD comments for draft-ietf-6man-hbh-processing-14 CC @ekline * comment syntax: - https://github.com/mnot/ietf-comments/blob/main/format.md * "Handling Ballot Positions": - https://ietf.org/about/groups/iesg/statements/handling-ballot-positions/ ## Discuss ### S5.1 * I'm having a hard time understanding how: - this section has normative language about process EHs, - this section says draft-eh-limits contains further requirements - draft-eh-limits is presently NOT a normative dependency I know we might not want to tie this document to draft-eh-limits, but in order to make that argument I kinda feel like it'll be necessary to clarify the difference. Given a quick scan of draft-eh-limits, which is listed as a BCP, I think it suffices to change "further requirements" to something like "additional recommendations"? I think that might underscore that draft-eh-limits is all SHOULD (and we probably need to clarify that the MUSTs in draft-eh-limits apply to nodes complying with the BCP). Thoughts? ### S6 * I don't know what it would mean to a specification author that a "[n]ew Hop-by-Hop [option] SHOULD be designed expecting that a router may drop packets containing the new Hop-by-Hop option". I think it's the intend *use* of the option that should be designed to understand it may be dropped, rather than the option itself? ## Comments ### S5.2 * "which can be mitigated when using a reverse path forwarding (RPF) check" My gut reaction is that this might be more specifically written as "which can be mitigated to varying degrees by using a reverse path forwarding (RPF) check." This is because it depends upon where along the path the first the uRPF check is done. A spoofing source might be able to DoS a ~neighbor within the "zone of uRPF" (blast radius) from the triggered router's perspective. ## Nits ### S4 * "many types network path" -> "many types of network paths" * "into the the processor" -> "into the processor" * "could cause adversely impact router operation" "could adversely impact router operation" or "could cause adverse impact router operation" |
2024-04-04
|
14 | Erik Kline | IESG state changed to AD Evaluation from Publication Requested |
2024-02-25
|
14 | Bob Hinden | New version available: draft-ietf-6man-hbh-processing-14.txt |
2024-02-25
|
14 | Bob Hinden | New version accepted (logged-in submitter: Bob Hinden) |
2024-02-25
|
14 | Bob Hinden | Uploaded new revision |
2024-02-24
|
13 | Jen Linkova | ## Document History 1. Does the working group (WG) consensus represent the strong concurrence of a few individuals, with others being silent, or did … ## Document History 1. Does the working group (WG) consensus represent the strong concurrence of a few individuals, with others being silent, or did it reach broad agreement? The draft has been discussed extensively and received thoughtful reviews from many working group participants (Acknowledgments section includes a long list of names). 2. Was there controversy about particular points, or were there decisions where the consensus was particularly rough? Nothing out of ordinary. 3. Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarize the areas of conflict in separate email messages to the responsible Area Director. (It should be in a separate email because this questionnaire is publicly available.) No threats of appeals or extreme discontent have been expressed. 4. For protocol documents, are there existing implementations of the contents of the document? Have a significant number of potential implementers indicated plans to implement? Are any existing implementations reported somewhere, either in the document itself (as [RFC 7942][3] recommends) or elsewhere (where)? There are no yet confirmed implementations of the proposed changes to RFC8200 described in this document. However as the document defines guidelines for implementors, not a new protocol, it might be too early to expect implementations. The document also provides recommendations on defining new Hop-by-hop options and Section 6.1 reports that at least one recently defined option (RFC9268) complies with those recommendations. ## Additional Reviews 5. Do the contents of this document closely interact with technologies in other IETF working groups or external organizations, and would it therefore benefit from their review? Have those reviews occurred? If yes, describe which reviews took place. The document defines rules for processing IPv6 Hop-by-Hop options, and doesn't really have any content in scope of other IETF WGs or external organisations. 6. Describe how the document meets any required formal expert review criteria, such as the MIB Doctor, YANG Doctor, media type, and URI type reviews. This document does not require any formal expert reviews. 7. If the document contains a YANG module, has the final version of the module been checked with any of the [recommended validation tools][4] for syntax and formatting validation? If there are any resulting errors or warnings, what is the justification for not fixing them at this time? Does the YANG module comply with the Network Management Datastore Architecture (NMDA) as specified in [RFC 8342][5]? This document does not contain a YANG module. 8. Describe reviews and automated checks performed to validate sections of the final version of the document written in a formal language, such as XML code, BNF rules, MIB definitions, CBOR's CDDL, etc. The document doesn't contain any such sections. ## Document Shepherd Checks 9. Based on the shepherd's review of the document, is it their opinion that this document is needed, clearly written, complete, correctly designed, and ready to be handed off to the responsible Area Director? The shepherd believes that the document is very much needed. The extension headers, especially Hop-by-Hop one and its processing by routers is a topic being constantly discussed at IETF. This document brings the idustry one step closer towards making Extension Headers useful and deployable. The document's goal is to specify realistic and deployable processing rules for Hop-by-Hop Options header. In the shepherd's opinion, the document is clearly written, complete and correctly designed. After two WGLCs and extensive reviews, the document is ready for the responsible Area Director's review. 10. Several IETF Areas have assembled [lists of common issues that their reviewers encounter][6]. For which areas have such issues been identified and addressed? For which does this still need to happen in subsequent reviews? The shepherd reviewed the lists provided in [6] and didn't identified any issues with this document. 11. What type of RFC publication is being requested on the IETF stream ([Best Current Practice][12], [Proposed Standard, Internet Standard][13], [Informational, Experimental or Historic][14])? Why is this the proper type of RFC? Do all Datatracker state attributes correctly reflect this intent? The intended status of the document is Standards Track. This is a proper status as it updates RFC8200 which is Internet Standard. 12. Have reasonable efforts been made to remind all authors of the intellectual property rights (IPR) disclosure obligations described in [BCP 79][7]? To the best of your knowledge, have all required disclosures been filed? If not, explain why. If yes, summarize any relevant discussion, including links to publicly-available messages when applicable. The authors are not aware of any IPR claims except for one already filled for the draft (https://datatracker.ietf.org/ipr/5554/). 13. Has each author, editor, and contributor shown their willingness to be listed as such? If the total number of authors and editors on the front page is greater than five, please provide a justification. The draft has two authors and, as of Feb 2024, both of them are still willing to be listed as such. 14. Document any remaining I-D nits in this document. Simply running the [idnits tool][8] is not enough; please review the ["Content Guidelines" on authors.ietf.org][15]. (Also note that the current idnits tool generates some incorrect warnings; a rewrite is underway.) There are informational references to obsolete documents (RFC1883 and RFC2460) but this is intentional, as those references are used to explain the history of IPv6 extension headers processing rules. 15. Should any informative references be normative or vice-versa? See the [IESG Statement on Normative and Informative References][16]. The document contains 4 normative references and all of them shall be read to understand or implement the proposed changes (one might argue that the reference to the IANA registry for all existing Hop-by-Hop options might be considered an Informative, but the content of that registry is required to implement, for example, Section 5.2.2 of the document. In the shepherd's opinion, no informative references need to be normative instead. 16. List any normative references that are not freely available to anyone. Did the community have sufficient access to review any such normative references? All normative references are freely available to anyone. 17. Are there any normative downward references (see [RFC 3967][9] and [BCP 97][10]) that are not already listed in the [DOWNREF registry][17]? If so, list them. No. 18. Are there normative references to documents that are not ready to be submitted to the IESG for publication or are otherwise in an unclear state? If so, what is the plan for their completion? No such references. 19. Will publication of this document change the status of any existing RFCs? If so, does the Datatracker metadata correctly reflect this and are those RFCs listed on the title page, in the abstract, and discussed in the introduction? If not, explain why and point to the part of the document where the relationship of this document to these other RFCs is discussed. This document updated RFC8200. That fact is correctly reflected in the document metadata. 20. Describe the document shepherd's review of the IANA considerations section, especially with regard to its consistency with the body of the document. Confirm that all aspects of the document requiring IANA assignments are associated with the appropriate reservations in IANA registries. Confirm that any referenced IANA registries have been clearly identified. Confirm that each newly created IANA registry specifies its initial contents, allocations procedures, and a reasonable name (see [RFC 8126][11]). This document doesn't define any actions for IANA. 21. List any new IANA registries that require Designated Expert Review for future allocations. Are the instructions to the Designated Expert clear? Please include suggestions of designated experts, if appropriate. No future allocations are required. [1]: https://www.ietf.org/about/groups/iesg/ [2]: https://www.rfc-editor.org/rfc/rfc4858.html [3]: https://www.rfc-editor.org/rfc/rfc7942.html [4]: https://wiki.ietf.org/group/ops/yang-review-tools [5]: https://www.rfc-editor.org/rfc/rfc8342.html [6]: https://wiki.ietf.org/group/iesg/ExpertTopics [7]: https://www.rfc-editor.org/info/bcp79 [8]: https://www.ietf.org/tools/idnits/ [9]: https://www.rfc-editor.org/rfc/rfc3967.html [10]: https://www.rfc-editor.org/info/bcp97 [11]: https://www.rfc-editor.org/rfc/rfc8126.html [12]: https://www.rfc-editor.org/rfc/rfc2026.html#section-5 [13]: https://www.rfc-editor.org/rfc/rfc2026.html#section-4.1 [14]: https://www.rfc-editor.org/rfc/rfc2026.html#section-4.2 [15]: https://authors.ietf.org/en/content-guidelines-overview [16]: https://www.ietf.org/about/groups/iesg/statements/normative-informative-references/ [17]: https://datatracker.ietf.org/doc/downref/ |
2024-02-24
|
13 | Jen Linkova | IETF WG state changed to Submitted to IESG for Publication from WG Consensus: Waiting for Write-Up |
2024-02-24
|
13 | Jen Linkova | IESG state changed to Publication Requested from I-D Exists |
2024-02-24
|
13 | (System) | Changed action holders to Erik Kline (IESG state changed) |
2024-02-24
|
13 | Jen Linkova | Responsible AD changed to Erik Kline |
2024-02-24
|
13 | Jen Linkova | Document is now in IESG state Publication Requested |
2024-02-24
|
13 | Jen Linkova | Changed consensus to Yes from Unknown |
2024-02-24
|
13 | Jen Linkova | Intended Status changed to Proposed Standard from None |
2024-02-24
|
13 | Jen Linkova | ## Document History 1. Does the working group (WG) consensus represent the strong concurrence of a few individuals, with others being silent, or did … ## Document History 1. Does the working group (WG) consensus represent the strong concurrence of a few individuals, with others being silent, or did it reach broad agreement? The draft has been discussed extensively and received thoughtful reviews from many working group participants (Acknowledgments section includes a long list of names). 2. Was there controversy about particular points, or were there decisions where the consensus was particularly rough? Nothing out of ordinary. 3. Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarize the areas of conflict in separate email messages to the responsible Area Director. (It should be in a separate email because this questionnaire is publicly available.) No threats of appeals or extreme discontent have been expressed. 4. For protocol documents, are there existing implementations of the contents of the document? Have a significant number of potential implementers indicated plans to implement? Are any existing implementations reported somewhere, either in the document itself (as [RFC 7942][3] recommends) or elsewhere (where)? There are no yet confirmed implementations of the proposed changes to RFC8200 described in this document. However as the document defines guidelines for implementors, not a new protocol, it might be too early to expect implementations. The document also provides recommendations on defining new Hop-by-hop options and Section 6.1 reports that at least one recently defined option (RFC9268) complies with those recommendations. ## Additional Reviews 5. Do the contents of this document closely interact with technologies in other IETF working groups or external organizations, and would it therefore benefit from their review? Have those reviews occurred? If yes, describe which reviews took place. The document defines rules for processing IPv6 Hop-by-Hop options, and doesn't really have any content in scope of other IETF WGs or external organisations. 6. Describe how the document meets any required formal expert review criteria, such as the MIB Doctor, YANG Doctor, media type, and URI type reviews. This document does not require any formal expert reviews. 7. If the document contains a YANG module, has the final version of the module been checked with any of the [recommended validation tools][4] for syntax and formatting validation? If there are any resulting errors or warnings, what is the justification for not fixing them at this time? Does the YANG module comply with the Network Management Datastore Architecture (NMDA) as specified in [RFC 8342][5]? This document does not contain a YANG module. 8. Describe reviews and automated checks performed to validate sections of the final version of the document written in a formal language, such as XML code, BNF rules, MIB definitions, CBOR's CDDL, etc. The document doesn't contain any such sections. ## Document Shepherd Checks 9. Based on the shepherd's review of the document, is it their opinion that this document is needed, clearly written, complete, correctly designed, and ready to be handed off to the responsible Area Director? The shepherd believes that the document is very much needed. The extension headers, especially Hop-by-Hop one and its processing by routers is a topic being constantly discussed at IETF. This document brings the idustry one step closer towards making Extension Headers useful and deployable. The document's goal is to specify realistic and deployable processing rules for Hop-by-Hop Options header. In the shepherd's opinion, the document is clearly written, complete and correctly designed. After two WGLCs and extensive reviews, the document is ready for the responsible Area Director's review. 10. Several IETF Areas have assembled [lists of common issues that their reviewers encounter][6]. For which areas have such issues been identified and addressed? For which does this still need to happen in subsequent reviews? The shepherd reviewed the lists provided in [6] and didn't identified any issues with this document. 11. What type of RFC publication is being requested on the IETF stream ([Best Current Practice][12], [Proposed Standard, Internet Standard][13], [Informational, Experimental or Historic][14])? Why is this the proper type of RFC? Do all Datatracker state attributes correctly reflect this intent? The intended status of the document is Standards Track. This is a proper status as it updates RFC8200 which is Internet Standard. 12. Have reasonable efforts been made to remind all authors of the intellectual property rights (IPR) disclosure obligations described in [BCP 79][7]? To the best of your knowledge, have all required disclosures been filed? If not, explain why. If yes, summarize any relevant discussion, including links to publicly-available messages when applicable. The authors are not aware of any IPR claims except for one already filled for the draft (https://datatracker.ietf.org/ipr/5554/). 13. Has each author, editor, and contributor shown their willingness to be listed as such? If the total number of authors and editors on the front page is greater than five, please provide a justification. The draft has two authors and, as of Feb 2024, both of them are still willing to be listed as such. 14. Document any remaining I-D nits in this document. Simply running the [idnits tool][8] is not enough; please review the ["Content Guidelines" on authors.ietf.org][15]. (Also note that the current idnits tool generates some incorrect warnings; a rewrite is underway.) There are informational references to obsolete documents (RFC1883 and RFC2460) but this is intentional, as those references are used to explain the history of IPv6 extension headers processing rules. 15. Should any informative references be normative or vice-versa? See the [IESG Statement on Normative and Informative References][16]. The document contains 4 normative references and all of them shall be read to understand or implement the proposed changes (one might argue that the reference to the IANA registry for all existing Hop-by-Hop options might be considered an Informative, but the content of that registry is required to implement, for example, Section 5.2.2 of the document. In the shepherd's opinion, no informative references need to be normative instead. 16. List any normative references that are not freely available to anyone. Did the community have sufficient access to review any such normative references? All normative references are freely available to anyone. 17. Are there any normative downward references (see [RFC 3967][9] and [BCP 97][10]) that are not already listed in the [DOWNREF registry][17]? If so, list them. No. 18. Are there normative references to documents that are not ready to be submitted to the IESG for publication or are otherwise in an unclear state? If so, what is the plan for their completion? No such references. 19. Will publication of this document change the status of any existing RFCs? If so, does the Datatracker metadata correctly reflect this and are those RFCs listed on the title page, in the abstract, and discussed in the introduction? If not, explain why and point to the part of the document where the relationship of this document to these other RFCs is discussed. This document updated RFC8200. That fact is correctly reflected in the document metadata. 20. Describe the document shepherd's review of the IANA considerations section, especially with regard to its consistency with the body of the document. Confirm that all aspects of the document requiring IANA assignments are associated with the appropriate reservations in IANA registries. Confirm that any referenced IANA registries have been clearly identified. Confirm that each newly created IANA registry specifies its initial contents, allocations procedures, and a reasonable name (see [RFC 8126][11]). This document doesn't define any actions for IANA. 21. List any new IANA registries that require Designated Expert Review for future allocations. Are the instructions to the Designated Expert clear? Please include suggestions of designated experts, if appropriate. No future allocations are required. [1]: https://www.ietf.org/about/groups/iesg/ [2]: https://www.rfc-editor.org/rfc/rfc4858.html [3]: https://www.rfc-editor.org/rfc/rfc7942.html [4]: https://wiki.ietf.org/group/ops/yang-review-tools [5]: https://www.rfc-editor.org/rfc/rfc8342.html [6]: https://wiki.ietf.org/group/iesg/ExpertTopics [7]: https://www.rfc-editor.org/info/bcp79 [8]: https://www.ietf.org/tools/idnits/ [9]: https://www.rfc-editor.org/rfc/rfc3967.html [10]: https://www.rfc-editor.org/info/bcp97 [11]: https://www.rfc-editor.org/rfc/rfc8126.html [12]: https://www.rfc-editor.org/rfc/rfc2026.html#section-5 [13]: https://www.rfc-editor.org/rfc/rfc2026.html#section-4.1 [14]: https://www.rfc-editor.org/rfc/rfc2026.html#section-4.2 [15]: https://authors.ietf.org/en/content-guidelines-overview [16]: https://www.ietf.org/about/groups/iesg/statements/normative-informative-references/ [17]: https://datatracker.ietf.org/doc/downref/ |
2024-02-23
|
13 | Jen Linkova | ## Document History 1. Does the working group (WG) consensus represent the strong concurrence of a few individuals, with others being silent, or did … ## Document History 1. Does the working group (WG) consensus represent the strong concurrence of a few individuals, with others being silent, or did it reach broad agreement? The draft has been discussed extensively and received thoughtful reviews from many working group participants (Acknowledgments section includes a long list of names). 2. Was there controversy about particular points, or were there decisions where the consensus was particularly rough? Nothing out of ordinary. 3. Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarize the areas of conflict in separate email messages to the responsible Area Director. (It should be in a separate email because this questionnaire is publicly available.) No threats of appeals or extreme discontent have been expressed. 4. For protocol documents, are there existing implementations of the contents of the document? Have a significant number of potential implementers indicated plans to implement? Are any existing implementations reported somewhere, either in the document itself (as [RFC 7942][3] recommends) or elsewhere (where)? There are no yet confirmed implementations of the proposed changes to RFC8200 described in this document. However as the document defines guidelines for implementors, not a new protocol, it might be too early to expect implementations. The document also provides recommendations on defining new Hop-by-hop options and Section 6.1 reports that at least one recently defined option (RFC9268) complies with those recommendations. ## Additional Reviews 5. Do the contents of this document closely interact with technologies in other IETF working groups or external organizations, and would it therefore benefit from their review? Have those reviews occurred? If yes, describe which reviews took place. The document defines rules for processing IPv6 Hop-by-Hop options, and doesn't really have any content in scope of other IETF WGs or external organisations. 6. Describe how the document meets any required formal expert review criteria, such as the MIB Doctor, YANG Doctor, media type, and URI type reviews. This document does not require any formal expert reviews. 7. If the document contains a YANG module, has the final version of the module been checked with any of the [recommended validation tools][4] for syntax and formatting validation? If there are any resulting errors or warnings, what is the justification for not fixing them at this time? Does the YANG module comply with the Network Management Datastore Architecture (NMDA) as specified in [RFC 8342][5]? This document does not contain a YANG module. 8. Describe reviews and automated checks performed to validate sections of the final version of the document written in a formal language, such as XML code, BNF rules, MIB definitions, CBOR's CDDL, etc. The document doesn't contain any such sections. ## Document Shepherd Checks 9. Based on the shepherd's review of the document, is it their opinion that this document is needed, clearly written, complete, correctly designed, and ready to be handed off to the responsible Area Director? The shepherd believes that the document is very much needed. The extension headers, especially Hop-by-Hop one and its processing by routers is a topic being constantly discussed at IETF. This document brings the idustry one step closer towards making Extension Headers useful and deployable. The document's goal is to specify realistic and deployable processing rules for Hop-by-Hop Options header. In the shepherd's opinion, the document is clearly written, complete and correctly designed. After two WGLCs and extensive reviews, the document is ready for the responsible Area Director's review. 10. Several IETF Areas have assembled [lists of common issues that their reviewers encounter][6]. For which areas have such issues been identified and addressed? For which does this still need to happen in subsequent reviews? The shepherd reviewed the lists provided in [6] and didn't identified any issues with this document. 11. What type of RFC publication is being requested on the IETF stream ([Best Current Practice][12], [Proposed Standard, Internet Standard][13], [Informational, Experimental or Historic][14])? Why is this the proper type of RFC? Do all Datatracker state attributes correctly reflect this intent? The intended status of the document is Standards Track. This is a proper status as it updates RFC8200 which is Internet Standard. 12. Have reasonable efforts been made to remind all authors of the intellectual property rights (IPR) disclosure obligations described in [BCP 79][7]? To the best of your knowledge, have all required disclosures been filed? If not, explain why. If yes, summarize any relevant discussion, including links to publicly-available messages when applicable. TBD 13. Has each author, editor, and contributor shown their willingness to be listed as such? If the total number of authors and editors on the front page is greater than five, please provide a justification. TBD 14. Document any remaining I-D nits in this document. Simply running the [idnits tool][8] is not enough; please review the ["Content Guidelines" on authors.ietf.org][15]. (Also note that the current idnits tool generates some incorrect warnings; a rewrite is underway.) There are informational references to obsolete documents (RFC1883 and RFC2460) but this is intentional, as those references are used to explain the history of IPv6 extension headers processing rules. 15. Should any informative references be normative or vice-versa? See the [IESG Statement on Normative and Informative References][16]. The document contains 4 normative references and all of them shall be read to understand or implement the proposed changes (one might argue that the reference to the IANA registry for all existing Hop-by-Hop options might be considered an Informative, but the content of that registry is required to implement, for example, Section 5.2.2 of the document. In the shepherd's opinion, no informative references need to be normative instead. 16. List any normative references that are not freely available to anyone. Did the community have sufficient access to review any such normative references? All normative references are freely available to anyone. 17. Are there any normative downward references (see [RFC 3967][9] and [BCP 97][10]) that are not already listed in the [DOWNREF registry][17]? If so, list them. No. 18. Are there normative references to documents that are not ready to be submitted to the IESG for publication or are otherwise in an unclear state? If so, what is the plan for their completion? No such references. 19. Will publication of this document change the status of any existing RFCs? If so, does the Datatracker metadata correctly reflect this and are those RFCs listed on the title page, in the abstract, and discussed in the introduction? If not, explain why and point to the part of the document where the relationship of this document to these other RFCs is discussed. This document updated RFC8200. That fact is correctly reflected in the document metadata. 20. Describe the document shepherd's review of the IANA considerations section, especially with regard to its consistency with the body of the document. Confirm that all aspects of the document requiring IANA assignments are associated with the appropriate reservations in IANA registries. Confirm that any referenced IANA registries have been clearly identified. Confirm that each newly created IANA registry specifies its initial contents, allocations procedures, and a reasonable name (see [RFC 8126][11]). This document doesn't define any actions for IANA. 21. List any new IANA registries that require Designated Expert Review for future allocations. Are the instructions to the Designated Expert clear? Please include suggestions of designated experts, if appropriate. No future allocations are required. [1]: https://www.ietf.org/about/groups/iesg/ [2]: https://www.rfc-editor.org/rfc/rfc4858.html [3]: https://www.rfc-editor.org/rfc/rfc7942.html [4]: https://wiki.ietf.org/group/ops/yang-review-tools [5]: https://www.rfc-editor.org/rfc/rfc8342.html [6]: https://wiki.ietf.org/group/iesg/ExpertTopics [7]: https://www.rfc-editor.org/info/bcp79 [8]: https://www.ietf.org/tools/idnits/ [9]: https://www.rfc-editor.org/rfc/rfc3967.html [10]: https://www.rfc-editor.org/info/bcp97 [11]: https://www.rfc-editor.org/rfc/rfc8126.html [12]: https://www.rfc-editor.org/rfc/rfc2026.html#section-5 [13]: https://www.rfc-editor.org/rfc/rfc2026.html#section-4.1 [14]: https://www.rfc-editor.org/rfc/rfc2026.html#section-4.2 [15]: https://authors.ietf.org/en/content-guidelines-overview [16]: https://www.ietf.org/about/groups/iesg/statements/normative-informative-references/ [17]: https://datatracker.ietf.org/doc/downref/ |
2024-02-23
|
13 | Jen Linkova | Notification list changed to furry13@gmail.com because the document shepherd was set |
2024-02-23
|
13 | Jen Linkova | Document shepherd changed to Jen Linkova |
2024-02-18
|
13 | Bob Hinden | New version available: draft-ietf-6man-hbh-processing-13.txt |
2024-02-18
|
13 | Bob Hinden | New version accepted (logged-in submitter: Bob Hinden) |
2024-02-18
|
13 | Bob Hinden | Uploaded new revision |
2023-11-21
|
12 | Bob Hinden | New version available: draft-ietf-6man-hbh-processing-12.txt |
2023-11-21
|
12 | Bob Hinden | New version accepted (logged-in submitter: Bob Hinden) |
2023-11-21
|
12 | Bob Hinden | Uploaded new revision |
2023-11-08
|
11 | Jen Linkova | Tag Revised I-D Needed - Issue raised by WGLC cleared. |
2023-11-05
|
11 | Bob Hinden | New version available: draft-ietf-6man-hbh-processing-11.txt |
2023-11-05
|
11 | Bob Hinden | New version accepted (logged-in submitter: Bob Hinden) |
2023-11-05
|
11 | Bob Hinden | Uploaded new revision |
2023-10-26
|
10 | Jen Linkova | Added to session: IETF-118: 6man Wed-1330 |
2023-10-26
|
10 | Jen Linkova | Tag Revised I-D Needed - Issue raised by WGLC set. |
2023-10-26
|
10 | Jen Linkova | IETF WG state changed to WG Consensus: Waiting for Write-Up from In WG Last Call |
2023-09-26
|
10 | Bob Hinden | New version available: draft-ietf-6man-hbh-processing-10.txt |
2023-09-26
|
10 | Bob Hinden | New version accepted (logged-in submitter: Bob Hinden) |
2023-09-26
|
10 | Bob Hinden | Uploaded new revision |
2023-07-04
|
09 | Bob Hinden | New version available: draft-ietf-6man-hbh-processing-09.txt |
2023-07-04
|
09 | Bob Hinden | New version accepted (logged-in submitter: Bob Hinden) |
2023-07-04
|
09 | Bob Hinden | Uploaded new revision |
2023-05-04
|
08 | Ole Trøan | IETF WG state changed to In WG Last Call from WG Document |
2023-04-30
|
08 | Bob Hinden | New version available: draft-ietf-6man-hbh-processing-08.txt |
2023-04-30
|
08 | Bob Hinden | New version accepted (logged-in submitter: Bob Hinden) |
2023-04-30
|
08 | Bob Hinden | Uploaded new revision |
2023-04-06
|
07 | Bob Hinden | New version available: draft-ietf-6man-hbh-processing-07.txt |
2023-04-06
|
07 | Bob Hinden | New version accepted (logged-in submitter: Bob Hinden) |
2023-04-06
|
07 | Bob Hinden | Uploaded new revision |
2023-03-21
|
06 | Jen Linkova | Added to session: IETF-116: 6man Wed-0030 |
2023-03-11
|
06 | Bob Hinden | New version available: draft-ietf-6man-hbh-processing-06.txt |
2023-03-11
|
06 | Bob Hinden | New version accepted (logged-in submitter: Bob Hinden) |
2023-03-11
|
06 | Bob Hinden | Uploaded new revision |
2023-02-23
|
05 | Bob Hinden | New version available: draft-ietf-6man-hbh-processing-05.txt |
2023-02-23
|
05 | Bob Hinden | New version accepted (logged-in submitter: Bob Hinden) |
2023-02-23
|
05 | Bob Hinden | Uploaded new revision |
2022-10-21
|
04 | Bob Hinden | New version available: draft-ietf-6man-hbh-processing-04.txt |
2022-10-21
|
04 | Bob Hinden | New version accepted (logged-in submitter: Bob Hinden) |
2022-10-21
|
04 | Bob Hinden | Uploaded new revision |
2022-10-21
|
03 | Jen Linkova | Added to session: IETF-115: 6man Mon-1300 |
2022-10-13
|
03 | Bob Hinden | New version available: draft-ietf-6man-hbh-processing-03.txt |
2022-10-13
|
03 | Bob Hinden | New version accepted (logged-in submitter: Bob Hinden) |
2022-10-13
|
03 | Bob Hinden | Uploaded new revision |
2022-08-23
|
02 | Bob Hinden | New version available: draft-ietf-6man-hbh-processing-02.txt |
2022-08-23
|
02 | Bob Hinden | New version accepted (logged-in submitter: Bob Hinden) |
2022-08-23
|
02 | Bob Hinden | Uploaded new revision |
2022-07-27
|
01 | Erik Kline | Changed document external resources from: None to: tracker https://github.com/ietf-6man/hbh-processing/issues |
2022-07-19
|
01 | Jen Linkova | Added to session: IETF-114: 6man Wed-1500 |
2022-07-07
|
01 | Gorry Fairhurst | New version available: draft-ietf-6man-hbh-processing-01.txt |
2022-07-07
|
01 | Gorry Fairhurst | New version accepted (logged-in submitter: Gorry Fairhurst) |
2022-07-07
|
01 | Gorry Fairhurst | Uploaded new revision |
2022-03-03
|
Tina Dang | Posted related IPR disclosure Huawei Technologies Co.,Ltd's Statement about IPR related to draft-ietf-6man-hbh-processing | |
2022-02-23
|
00 | Bob Hinden | This document now replaces draft-hinden-6man-hbh-processing instead of None |
2022-01-29
|
00 | Robert Sparks | Manually adjusting results of submission issue |
2022-01-29
|
00 | Robert Sparks | IETF WG state changed to WG Document |
2022-01-29
|
00 | Robert Sparks | Continued manual fixup |
2022-01-29
|
00 | Robert Sparks | Attempt at manual repair of failed submission |
2022-01-29
|
00 | Bob Hinden | New version available: draft-ietf-6man-hbh-processing-00.txt |
2022-01-29
|
00 | (System) | WG -00 approved |
2022-01-29
|
00 | Bob Hinden | New version available: draft-ietf-6man-hbh-processing-00.txt |
2022-01-29
|
00 | (System) | WG -00 approved |
2022-01-29
|
00 | Bob Hinden | New version available: draft-ietf-6man-hbh-processing-00.txt |
2022-01-29
|
00 | (System) | WG -00 approved |
2022-01-29
|
00 | Bob Hinden | Set submitter to ""Robert M. Hinden" ", replaces to draft-hinden-6man-hbh-processing and sent approval email to group chairs: 6man-chairs@ietf.org |
2022-01-29
|
00 | Bob Hinden | Set submitter to ""Robert M. Hinden" ", replaces to draft-hinden-6man-hbh-processing and sent approval email to group chairs: 6man-chairs@ietf.org |
2022-01-29
|
00 | Bob Hinden | Set submitter to ""Robert M. Hinden" ", replaces to draft-hinden-6man-hbh-processing and sent approval email to group chairs: 6man-chairs@ietf.org |
2022-01-29
|
00 | Bob Hinden | Uploaded new revision |
2022-01-29
|
00 | Bob Hinden | Uploaded new revision |
2022-01-29
|
00 | Bob Hinden | Uploaded new revision |