The IPv6 VPN Service Destination Option
draft-ietf-6man-vpn-dest-opt-11
Revision differences
Document history
| Date | Rev. | By | Action |
|---|---|---|---|
|
2025-08-22
|
(System) | Received changes through RFC Editor sync (changed state to RFC, created became rfc relationship between draft-ietf-6man-vpn-dest-opt and RFC 9837, changed IESG state to RFC … Received changes through RFC Editor sync (changed state to RFC, created became rfc relationship between draft-ietf-6man-vpn-dest-opt and RFC 9837, changed IESG state to RFC Published) |
|
|
2025-08-12
|
11 | (System) | RFC Editor state changed to AUTH48-DONE from AUTH48 |
|
2025-08-08
|
11 | (System) | RFC Editor state changed to AUTH48 |
|
2025-05-20
|
11 | (System) | IANA Action state changed to No IANA Actions from In Progress |
|
2025-05-20
|
11 | (System) | RFC Editor state changed to EDIT |
|
2025-05-20
|
11 | (System) | IESG state changed to RFC Ed Queue from Approved-announcement sent |
|
2025-05-20
|
11 | (System) | Announcement was received by RFC Editor |
|
2025-05-20
|
11 | (System) | IANA Action state changed to In Progress |
|
2025-05-20
|
11 | Cindy Morgan | IESG state changed to Approved-announcement sent from Approved-announcement to be sent |
|
2025-05-20
|
11 | Cindy Morgan | IESG has approved the document |
|
2025-05-20
|
11 | Cindy Morgan | Closed "Approve" ballot |
|
2025-05-20
|
11 | Cindy Morgan | Ballot approval text was generated |
|
2025-05-20
|
11 | Cindy Morgan | Ballot writeup was changed |
|
2025-05-19
|
11 | (System) | Removed all action holders (IESG state changed) |
|
2025-05-19
|
11 | Erik Kline | IESG state changed to Approved-announcement to be sent from IESG Evaluation::AD Followup |
|
2025-05-14
|
11 | Ketan Talaulikar | [Ballot comment] I would like to thank the authors for engaging in discussions as we worked on bringing more clarity to the document and framing … [Ballot comment] I would like to thank the authors for engaging in discussions as we worked on bringing more clarity to the document and framing the experiment in an appropriate context. I hope this has improved the document. One of the key purpose of my discussion was to ascertain the unique proposition or innovation of this experiment that is beyond the bits and bytes of the packet header. I have been unable to identify any such key benefits or advantages over existing VPN technologies both from a feature capabilities or operational aspects. Given that this document is on an experimental track where the bar is lower (as compared to standards track), I am changing my ballot to Abstain. I also agree with most of what Med has conveyed in his Abstain comments. |
|
2025-05-14
|
11 | Ketan Talaulikar | [Ballot Position Update] Position for Ketan Talaulikar has been changed to Abstain from Discuss |
|
2025-05-14
|
11 | Ron Bonica | New version available: draft-ietf-6man-vpn-dest-opt-11.txt |
|
2025-05-14
|
11 | Ron Bonica | New version accepted (logged-in submitter: Ron Bonica) |
|
2025-05-14
|
11 | Ron Bonica | Uploaded new revision |
|
2025-05-14
|
10 | Ron Bonica | New version available: draft-ietf-6man-vpn-dest-opt-10.txt |
|
2025-05-14
|
10 | Ron Bonica | New version accepted (logged-in submitter: Ron Bonica) |
|
2025-05-14
|
10 | Ron Bonica | Uploaded new revision |
|
2025-05-09
|
09 | Ron Bonica | New version available: draft-ietf-6man-vpn-dest-opt-09.txt |
|
2025-05-09
|
09 | Ron Bonica | New version accepted (logged-in submitter: Ron Bonica) |
|
2025-05-09
|
09 | Ron Bonica | Uploaded new revision |
|
2025-05-09
|
08 | Éric Vyncke | [Ballot comment] Thanks for addressing my previous DISCUSS and COMMENTS. See: https://mailarchive.ietf.org/arch/msg/ipv6/svN9H-NuO4BQ5hYx7GQdZ2ssZn0/ I am balloting an ABSTAIN because while the document is technically sound, I … [Ballot comment] Thanks for addressing my previous DISCUSS and COMMENTS. See: https://mailarchive.ietf.org/arch/msg/ipv6/svN9H-NuO4BQ5hYx7GQdZ2ssZn0/ I am balloting an ABSTAIN because while the document is technically sound, I cannot refrain from wondering whether the IETF and the industry need yet another VPN technology. Of course, running an experiment is always nice. |
|
2025-05-09
|
08 | Éric Vyncke | [Ballot Position Update] Position for Éric Vyncke has been changed to Abstain from Discuss |
|
2025-05-08
|
08 | Gunter Van de Velde | [Ballot comment] [I accidently set a wrong ballot and am correcting this now] Many thanks for resolving my DISCUSS items. (DISCUSS comments: https://mailarchive.ietf.org/arch/msg/ipv6/cp-mlQZyo68v17FF5SdH63Wg7R4/ ) My … [Ballot comment] [I accidently set a wrong ballot and am correcting this now] Many thanks for resolving my DISCUSS items. (DISCUSS comments: https://mailarchive.ietf.org/arch/msg/ipv6/cp-mlQZyo68v17FF5SdH63Wg7R4/ ) My ballot is Abstain rather than No Objection. I’m choosing to abstain because I’m not yet fully convinced of the added value this experiment brings compared to existing, well-established solutions. That said, from a conceptual standpoint, the proposal seems sound and I don’t see any major issues that would prevent it from functioning as described, so I have no intention of blocking its progress. |
|
2025-05-08
|
08 | Gunter Van de Velde | [Ballot Position Update] Position for Gunter Van de Velde has been changed to Abstain from No Objection |
|
2025-05-06
|
08 | Gunter Van de Velde | [Ballot comment] Many thanks for resolving my DISCUSS items. (DISCUSS comments: https://mailarchive.ietf.org/arch/msg/ipv6/cp-mlQZyo68v17FF5SdH63Wg7R4/ ) |
|
2025-05-06
|
08 | Gunter Van de Velde | [Ballot Position Update] Position for Gunter Van de Velde has been changed to No Objection from Discuss |
|
2025-05-06
|
08 | Ron Bonica | New version available: draft-ietf-6man-vpn-dest-opt-08.txt |
|
2025-05-06
|
08 | Ron Bonica | New version accepted (logged-in submitter: Ron Bonica) |
|
2025-05-06
|
08 | Ron Bonica | Uploaded new revision |
|
2025-05-06
|
07 | Ron Bonica | New version available: draft-ietf-6man-vpn-dest-opt-07.txt |
|
2025-05-06
|
07 | Ron Bonica | New version accepted (logged-in submitter: Ron Bonica) |
|
2025-05-06
|
07 | Ron Bonica | Uploaded new revision |
|
2025-05-05
|
06 | (System) | Changed action holders to Erik Kline (IESG state changed) |
|
2025-05-05
|
06 | (System) | Sub state has been changed to AD Followup from Revised I-D Needed |
|
2025-05-05
|
06 | (System) | IANA Review state changed to Version Changed - Review Needed from IANA OK - No Actions Needed |
|
2025-05-05
|
06 | Ron Bonica | New version available: draft-ietf-6man-vpn-dest-opt-06.txt |
|
2025-05-05
|
06 | Ron Bonica | New version accepted (logged-in submitter: Ron Bonica) |
|
2025-05-05
|
06 | Ron Bonica | Uploaded new revision |
|
2025-04-19
|
05 | Paul Wouters | [Ballot comment] After dicsussion with authors, I realized that I don't think we are on a converging path. While I don't believe this document is … [Ballot comment] After dicsussion with authors, I realized that I don't think we are on a converging path. While I don't believe this document is actively harmul, like Med I am also not convinced of its use cases. Additionally, I find the naming to be too misleading. I have updated my DISCUSS to an ABSTAIN. |
|
2025-04-19
|
05 | Paul Wouters | [Ballot Position Update] Position for Paul Wouters has been changed to Abstain from Discuss |
|
2025-04-17
|
05 | (System) | Changed action holders to Ron Bonica, Adrian Farrel, Yuji Kamite, Xing Li, Luay Jalil (IESG state changed) |
|
2025-04-17
|
05 | Cindy Morgan | IESG state changed to IESG Evaluation::Revised I-D Needed from IESG Evaluation |
|
2025-04-16
|
05 | Roman Danyliw | [Ballot comment] Inspired by the concepts in outlined in Section 2 of draft-bonica-gendispatch-exp: what exactly are the success criteria for the experiment outlined in … [Ballot comment] Inspired by the concepts in outlined in Section 2 of draft-bonica-gendispatch-exp: what exactly are the success criteria for the experiment outlined in this document? ** Section 3. - High-order 12 bits: Reserved. SHOULD be set to 0 by the sender and MUST be ignored by the receiver. Under what circumstances would these bits NOT be set to zero? |
|
2025-04-16
|
05 | Roman Danyliw | [Ballot Position Update] New position, No Objection, has been recorded for Roman Danyliw |
|
2025-04-16
|
05 | Paul Wouters | [Ballot discuss] I am a bit confused on what this option does and how it supports some VPN Technologies. The FIB is an identifier, presumably … [Ballot discuss] I am a bit confused on what this option does and how it supports some VPN Technologies. The FIB is an identifier, presumably an index of a certain source/dest network pair? What is the data content of these IPv6 packets? How are encryption/integrity keys negotiated ? Why is this needed when there is another protocol negotiating those keys (and / or encapsulation an encryption of packets or data) ? I see mention of Authentication Header (AH), but that does not support encryption, only integrity. So I do not understand why that is in scope for a VPN document. In short, I understand this is an option that somehow indicates "this is a packet (or data?) that should be send via a "vpn tunnel" to elsewhere. But does this IPv6 packet contain an inner packet? An encrypted inner packet? Will it get encrypted based on this VPN Service Option? Why and when should someone use this option? Would it replace or augment an IPsec VPN? A MacSEC VPN? My apologies if this is the result of me not being very familiar with this layer of the stack. |
|
2025-04-16
|
05 | Paul Wouters | [Ballot Position Update] New position, Discuss, has been recorded for Paul Wouters |
|
2025-04-15
|
05 | Gunter Van de Velde | [Ballot discuss] Thanks so much for putting this document together and for clearly laying out the intent behind it. I appreciate the effort to capture … [Ballot discuss] Thanks so much for putting this document together and for clearly laying out the intent behind it. I appreciate the effort to capture experimental work, it's always valuable to explore new approaches and understand how they might complement or improve upon existing solutions. That said, after reviewing the draft, I’ve decided to ballot a DISCUSS, based on two specific observations. I also want to express support for the technical concerns raised by Ketan and Med, which I believe are valid and worth addressing. At a high level, this proposal does seem to outline a mechanism capable of transporting payloads from one domain to another across a backbone (such as the Internet or another independent domain). From a conceptual standpoint, I don’t see any technical flaws that would prevent this from working as an experiment. However, I do have a blocking concern that the document gives the impression that VPNs are exclusively MPLS-based (DISCUSS-1), and it fails to acknowledge other existing IP-based VPN technologies (DISCUSS-2). This leads to two specific DISCUSS points: DISCUSS-1: The introduction seems to suggest that IPv6-based VPN solutions must use an MPLS data plane. This overlooks the fact that both MPLS and SRv6 are capable of supporting VPNs. The document would benefit from referencing Segment Routing over IPv6 (SRv6) Network Programming (RFC 8986), and better positioning the proposed IPv6 VPN Service Destination Option in relation to existing SRv6-based VPN solutions. I realized that similar observation was made by Sue Hares OPS-DIR review. It might not be a beauty contest, as Adrian noted in his response to the OPS-DIR review, but adding some context about where this solution applies, and how it compares to alternative approaches, would really help readers/implementors to better understand the relevance and potential value of the experiment outcome on a future standard track procedure. DISCUSS-2: There are several IP-based VPN solutions, particularly in the data center space. It would be useful to acknowledge these existing technologies. A helpful reference here is RFC 9638 ("Network Virtualization over Layer 3 (NVO3) Encapsulation Considerations"), which offers a good comparison of technologies in this area. Including such a comparison, or at least recognizing the existence of these alternatives, would provide better context for the proposed solution. Once these DISCUSS items are addressed, I’d be happy to update my ballot to Abstain rather than No Objection. I’m choosing to abstain because I’m not yet fully convinced of the added value this experiment brings compared to existing, well-established solutions. That said, from a conceptual standpoint, the proposal seems sound and I don’t see any major issues that would prevent it from functioning as described, so I have no intention of blocking its progress. I’m definitely open to further discussion and look forward to seeing how the document continues to develop Thanks again for the work on this. Gunter Van de Velde RTG Area Director |
|
2025-04-15
|
05 | Gunter Van de Velde | [Ballot Position Update] New position, Discuss, has been recorded for Gunter Van de Velde |
|
2025-04-14
|
05 | (System) | IANA Review state changed to IANA OK - No Actions Needed from Version Changed - Review Needed |
|
2025-04-11
|
05 | Ketan Talaulikar | [Ballot discuss] Thanks for the work on this document, there are a few points that I would like to discuss to help bring more clarity … [Ballot discuss] Thanks for the work on this document, there are a few points that I would like to discuss to help bring more clarity and improve this document (some use idnits output of v05 as a reference): Having read the document, the objective of the experiment is not clear to me. I would have expected that something new that needs experimentation would be enabling new use-cases, improving some operational aspects, improving scaling/performance, enabling deployment of new services with the use of IPv6 (given this is from 6man WG), etc. However, the document's motivation for experimenting is to mainly demonstrate that the solution is implementable and deployable. Some text describing the purpose behind the need for publishing this experiment and asking the community to perform/participate in this experiment in view of existing IETF standards based solutions (see below) would be helpful. A brief overview of existing IETF standards based solutions for deploying VPN with IPv6: a) The first are BGP based MPLS VPN solutions (L3VPN, L2VPN, EVPN) that work within a service provider network using IPv6 infrastructure. These solutions are based on MPLS encapsulation over IPv6 (next header type set to 137) as the data plane. The packet is very similar except that top-level MPLS label (immediately following the IPv6 packet instead of a DOH) conveys the VPN context and is followed by the VPN payload. It leverages the existing MPLS control plane (e.g., BGP). Exactly the same as described in section 4 and section 5. It also provides exactly the same 20 bits for the VPN context in the form of MPLS label instead of the new destination option. More importantly, this solution has decades worth of deployment and operational experience along with a well understood security model. b) The second is classic IPSec VPN solution that works over the IPv6 Internet. The VPN context is encoded in the IPSec parameters and security model (AH, ESP, etc.) is well understood. This works also works within a service provider network. This too has long deployment and operational experience. Going over the security considerations, the security model is ambiguous. It talks about limited domains as well Internet deployments. It is not clear about the prerequisites (those that are mandatory) for each of those deployments using normative language. There also exist some contradicting statements that straddle these two models (see comments below). Without this clarity, it is hard to evaluate whether the security analysis has been completed. This is especially important given the existence of solutions (see above) that have well-known security models. The security considerations has the following text: 311 The mitigation techniques mentioned above also address the tunneling 312 concerns raised in [RFC6169]. Could you please clarify in a little more details on this? Perhaps a couple of examples of the tunneling concerns and how they are addressed in the security considerations of this document? |
|
2025-04-11
|
05 | Ketan Talaulikar | [Ballot comment] Following are some comments and suggestions provided inline in the idnits output of v05: 127 The mechanism described above requires both PE … [Ballot comment] Following are some comments and suggestions provided inline in the idnits output of v05: 127 The mechanism described above requires both PE devices (ingress and 128 egress) to support MPLS. It cannot be deployed where one or both of 129 the PEs does not support MPLS. Section 5 talks about using LFIB and other signaling elements from MPLS. In Section 3, the encoding proposal uses exactly the 20 bits in the option field for carrying the service context - exactly same as an MPLS label. In light of this, I find the above sentence confusing. To me, it looks like MPLS support is required for this solution as well. 131 This document describes an experiment in which VPN service 132 information for both layer 2 and layer 3 VPNs is encoded in a new 133 IPv6 Destination Option [RFC8200] called the VPN Service Option. Is this document describing an actual experiment that was carried out, or does it describe a recipe for an experiment that the IETF (by means of publication of this document) is asking people to carry out? 137 One purpose of this experiment is to demonstrate that the VPN Service 138 Option can be implemented and deployed in a production network. 139 Another purpose is to demonstrate that the security considerations, 140 described in this document, are sufficient to protect use of the VPN 141 Service Option. Experimenters should report any security flaws that 142 they discover. Finally, this document encourages replication of the 143 experiment, so that operational issues can be discovered. What is meant by "replication of the experiment"? Is the document suggesting that people find out all sorts of problem spaces and try to see if IPv6 Dest Options can be used to address them? Or is the document asking implementers (and operators) to carry out this specific experiment related to the VPN Dest Options. I presume, it is the latter, but I find the "replication" part confusing since the document does not document the details of an actual experiment that was carried out, its implementation details, etc. 174 - Low-order 20 bits: Identifies a FIB entry on the egress PE. 175 The FIB entry determines how the egress PE will forward 176 customer data to a CE device. The choice of this 20 bit encoding is obvious that this is identical to an MPLS label. Is the idea to leverage the existing MPLS implementation support on the devices for this new proposal? If so, would be good to call it out up front in the introduction. 178 The VPN Service Option MAY appear in a Destination Options header 179 that precedes an upper-layer header. It MUST NOT appear in any other 180 extension header. If a receiver finds the VPN Service option in Does this mean to say that the VPN Service Option cannot be used in the HBH or the Dest options that are place before the RH? Or something else? 269 If the FIB is populated using BGP, BGP creates a Label-FIB (LFIB), 270 exactly as it would if VPN service information were encoded in an 271 MPLS service label. The egress PE queries the LFIB to resolve 272 information contained by the VPN Service Option. Is the idea to leverage the existing MPLS implementation support on the devices for this new proposal? If so, would be good to call it out up front in the introduction. 278 However, if the experiment described herein succeeds, the authors 279 will reissue this document, to be published on the Standards Track. 280 The reissued document will request an IPv6 Destination Option number, 281 and contain operational recommendations reguarding a migration to a 282 new code point. I think the above text is premature and not something relevant that IANA can take an action on. Suggest to take out the above paragraph. 284 7. Security Considerations 286 IETF VPN technologies assume that PE devices trust one another. If Can you provide a reference for this claim? Is it specific to MPLS VPN deployments that are within a service provider domain or VPNs (like IPSec/SSL) that work over the Internet? 290 The following are acceptable methods of risk mitigation: As mentioned in one of my DISCUSS points, it would help to list and describe the models first and then each of their security analysis. Given that there are existing solutions with well known security properties, this new experiment should be expected to have performed more robust analysis. 307 The mitigation techniques mentioned above operate in fail-open mode. 308 See Section 3 of [I-D.wkumari-intarea-safe-limited-domains] for a 309 discussion of fail-open and fail-closed modes. The reference is not an IETF WG document. Given that the reliance is only on the definition of the term "fail-open", perhaps that text can be borrowed and placed inline in this document with attribution to that document's authors. 316 The VPN Service Option is imposed by an ingress PE and processed by 317 an egress PE. It is not processed by any nodes along the delivery 318 path between the ingress PE and egress PE. So, it is safe to deploy 319 the VPN Service Option across the Internet. Looking at the security considerations above, does this claim of "safe to deploy ... across the Internet" require some qualification? 338 9. Experimental Results Are the authors (or anyone in the WG) aware of any actual running code that has been developed (or is being developed) as part of this experiment. If so, it would be good to share the experience so far for the benefit of the community. 340 Parties participating in this experiment should publish experimental 341 results within one year of the publication of this document. 342 Experimental results should address the following: |
|
2025-04-11
|
05 | Ketan Talaulikar | [Ballot Position Update] New position, Discuss, has been recorded for Ketan Talaulikar |
|
2025-04-11
|
05 | Éric Vyncke | [Ballot discuss] # Éric Vyncke, INT AD, comments for draft-ietf-6man-vpn-dest-opt-05 CC @evyncke Thank you for the work put into this document. I am balloting a … [Ballot discuss] # Éric Vyncke, INT AD, comments for draft-ietf-6man-vpn-dest-opt-05 CC @evyncke Thank you for the work put into this document. I am balloting a DISCUSS to address some important points, and I intend to ballot ABSTAIN once the DISCUSS is cleared (in line with Mohamed Boucadair's ballot). Please find below some blocking DISCUSS points, some non-blocking COMMENT points (but replies would be appreciated even if only for my own education). Special thanks to Bob Hinden for the shepherd's write-up including the WG consensus *but it lacks* the justification of the intended status. Other thanks to Antoine Fressancourt, the Internet directorate reviewer (at my request), please consider this int-dir review: https://datatracker.ietf.org/doc/review-ietf-6man-vpn-dest-opt-04-intdir-telechat-fressancourt-2025-04-04/ (and I have read Ron's replies) I hope that this review helps to improve the document, Regards, -éric ## DISCUSS (blocking) As noted in https://www.ietf.org/blog/handling-iesg-ballot-positions/, a DISCUSS ballot is just a request to have a discussion on the following topics: ### Abstract As the I-D reuse (rightfully) the existing experimental code point, there is no `The new IPv6 Destination Option`. Please be specific that the I-D re-uses the experimental code point. ### Section 1 Even for an experimental status, I would assume something more descriptive than `Experimenters should report any security flaws that they discover.` what kind of security test ? I also usually think that security flaw are discovered by protocol analysis rather than experimentation. ### Section 4 It appears that this document only allows for AH/ESP (and DO) extension headers. This prevents fragmentation and routing headers. Please add some text why fragmentation header is forbidden. Please justify why routing header (e.g., CRH or draft-pb-6man-deterministic-crh-01 ;-) ) cannot be combined with this experiment ? |
|
2025-04-11
|
05 | Éric Vyncke | [Ballot comment] ## COMMENTS (non-blocking) ### Section 1 Please be clear in `It then searches its FIB for an entry that matches the incoming service … [Ballot comment] ## COMMENTS (non-blocking) ### Section 1 Please be clear in `It then searches its FIB for an entry that matches the incoming service label` as it assumes that MPLS is used (i.e., make sure that `A popular tunnel technology` applies to both bullets). `The egress PE removes the tunnel header, exposing the customer data.` isn't the first step to look at the FIB before decapsulation? It is unclear what scope is `production network` ? It is a single provider network ? the global Internet (like popular SD-WAN products) ? ### Section 3 Please add a justification for the length of option data of 20 bits. It smells a lot like an MPLS label of course. ### Section 4 Should RFC 6724 be mentioned when describing the source/destination address fields ? ### Section 6 Please move the 2nd paragraph in the introduction. |
|
2025-04-11
|
05 | Éric Vyncke | [Ballot Position Update] New position, Discuss, has been recorded for Éric Vyncke |
|
2025-04-09
|
05 | Deb Cooley | [Ballot Position Update] New position, No Objection, has been recorded for Deb Cooley |
|
2025-04-07
|
05 | Mohamed Boucadair | [Ballot comment] Hi Ron, Xing, Adrian, Yuji, and Luay, Thank you for the work put into this specification. Also, thanks to Susan Hares for the … [Ballot comment] Hi Ron, Xing, Adrian, Yuji, and Luay, Thank you for the work put into this specification. Also, thanks to Susan Hares for the OPSDIR review and to Adrian for the prompt reply. Let me first insist that I’m supportive of nurturing experiments and iterate in our process. Also, I understand that an experiment does not need to cover every aspect of a solution and that a goal of an experiment is to feed that tweaking process. I won’t thus complain that the control plane considerations (which are key here) are under-specified. So, you have my sympathy for the approach being proposed here. That’s said, I’m not comfortable with the experiment as set, for various reasons: * It does not solve an operator problem (at least, what I’m aware of) * It does not introduce a unique feature to the already-saturated VPN solution space + I won’t enumerate all the technologies we do already have out there. The authors are very familiar with this + It is not clear what is the value of this approach and what does it bring in term of innovation * The experiment is too generic and can be applied to any IPv6 dst option. + The pattern used in the spec can be generalized to any similar option independent of the information it carries. Really. * We don’t need to coin an RFC to run another experiment to see how IPv6 dst options are handled on the Internet. * The technical foundations are questionable. For example, + The base spec RFC2473 was removed from the IPv6 node requirements (was used to be cited in RFC4294 but removed from RFC6434/RFC8504). Support by routers is thus not given. + I’m aware of deployments based on RFC2473 but mainly for establishing individual tunnels (DS-lite, for example), though. + We don’t have evidence that there are current deployments where RFC2473 is used as an underly tunnel protocol for VPN purposes or whether there are operators asking for this. - Adding an EH is a matter of details, but the core question is elsewhere. - BTW, I failed to find records where OPS area was solicited for feedback for this matter early in the process. It is too late to have that as this stage, though. * The solution is not reliable as it depends on on-path devices behavior (e.g., discard packets with such option). + An operator cannot rely on such solutions to deliver VPN services, especially that strict commitments are usually associated with such service offerings. + Given that dependency, deployability is really a concern. This specific experiment won’t change how IPv6 EH are handled on the Internet. Note that the document has this right (even if this can be seen as an internal inconsistency) as it says that "it is safe to deploy the VPN Service Option across the Internet" and then "However, some networks discard packets that include IPv6 Destination Options. This is an impediment to deployment". I’m not balloting DISCUSS because I’m afraid that changes to the document won’t help me reconsider my position. For all these reasons, I’m balloting ABSTAIN as I don’t think it is good idea to publish this document in the IETF stream. Cheers, Med |
|
2025-04-07
|
05 | Mohamed Boucadair | Ballot comment text updated for Mohamed Boucadair |
|
2025-04-07
|
05 | Mohamed Boucadair | [Ballot comment] Hi Ron, Xing, Adrian, Yuji, and Luay, Thank you for the work put into this specification. Also, thanks to Susan Hares for the … [Ballot comment] Hi Ron, Xing, Adrian, Yuji, and Luay, Thank you for the work put into this specification. Also, thanks to Susan Hares for the OPSDIR review and to Adrian for the prompt reply. Let me first insist that I’m supportive of nurturing experiments and iterate in our process. Also, I understand that an experiment does not need to cover every aspect of a solution and that a goal of an experiment is to feed that tweaking process. I won’t thus complain that the control plane considerations (which are key here) are under-specified. So, you have my sympathy for the approach being proposed here. That’s said, I’m not comfortable with the experiment as set, for various reasons: * It does not solve an operator problem (at least, what I’m aware of) * It does not introduce a unique feature to the already-saturated VPN solution space + I won’t enumerate all the technologies we do already have out there. The authors are very familiar with this + It is not clear what is the value of this approach and what does it brings in term of innovation * The experiment is too generic and can be applied to any IPv6 dst option. + The pattern used in the spec can be generalized to any similar option independent of the information it carries. Really. * We don’t need to run an experiment to see how IPv6 dst options are handled on the Internet. * The technical foundation are questionable. For example, + The base spec RFC2473 was removed from the IPv6 node requirements (was used to be cited in RFC4294 but removed from RFC6434/RFC8504). Support by routers is thus not given. + I’m aware of deployments based on RFC2473 but mainly for establishing individual tunnels (DS-lite, for example), though. + We don’t have evidence that there are current deployments where RFC2473 is used as an underly tunnel protocol for VPN purposes or whether there are operators asking for this. - Adding an EH is a matter of details, but the core question is elsewhere. - BTW, I failed to find records where OPS area was solicited for feedback for this matter early in the process. It is too late to have that as this stage, though. * The solution is not reliable as it depends on on-path devices behavior (e.g., discard packets with such option). + An operator cannot rely on such solutions to deliver VPN services, especially that strict commitments are usually associated with such service offerings. + Given that dependency, deployability is really a concern. The experiment won’t change how IPv6 EH are handled on the Internet. The document has this right (even of this can be seen as an internal inconsistency) as it says that "So, it is safe to deploy the VPN Service Option across the Internet" and then "However, some networks discard packets that include IPv6 Destination Options. This is an impediment to deployment". I’m not balloting DISCUSS because I’m afraid that changes to the document won’t help me reconsider my position. For all these reasons, I’m balloting ABSTAIN as I don’t think it is good idea to publish this document in the IETF stream. Cheers, Med |
|
2025-04-07
|
05 | Mohamed Boucadair | [Ballot Position Update] New position, Abstain, has been recorded for Mohamed Boucadair |
|
2025-04-05
|
05 | Ron Bonica | New version available: draft-ietf-6man-vpn-dest-opt-05.txt |
|
2025-04-05
|
05 | Ron Bonica | New version accepted (logged-in submitter: Ron Bonica) |
|
2025-04-05
|
05 | Ron Bonica | Uploaded new revision |
|
2025-04-04
|
04 | Sue Hares | Request for Telechat review by OPSDIR Completed: Has Issues. Reviewer: Susan Hares. Sent review to list. |
|
2025-04-04
|
04 | Antoine Fressancourt | Request for Telechat review by INTDIR Completed: Ready with Nits. Reviewer: Antoine Fressancourt. Sent review to list. |
|
2025-04-02
|
04 | Linda Dunbar | Request for Telechat review by GENART Completed: Ready. Reviewer: Linda Dunbar. Sent review to list. Submission of review completed at an earlier date. |
|
2025-04-02
|
04 | Linda Dunbar | Request for Telechat review by GENART Completed: Ready. Reviewer: Linda Dunbar. |
|
2025-03-28
|
04 | Gorry Fairhurst | [Ballot comment] 1. Section 9 does not explain how to clean-up after the experiment. Section 1.1 of RFC 3692 includes text that I thought was … [Ballot comment] 1. Section 9 does not explain how to clean-up after the experiment. Section 1.1 of RFC 3692 includes text that I thought was helpful, and I’m surprised that this text (preferably quoted as-is) did not appear in this document’s deployment section. When protocols that use experimental numbers are included in products, the shipping versions of the products must disable recognition of protocol experimental numbers by default -- that is, the end user of the product must explicitly "turn on" the experimental protocol functionality. 2. The text in section 8 only seems to assume “care” about potentially overlapping use. I recognise that the experimental numbers are not guaranteed to be unique in any environment, however could this format include a prefix that could help distinguish this experiment from other uses. For example, I’m curious why the option does not include an identifier to associate it with the closed domain in which it is intended to operate? That might reduce the potential for accidental misinterpretation if a packet was forwarded to another closed domain. Even a short randomly chosen identifier could help reduce any confusion if this same code point was to be used by another experimental option (or perhaps more significantly were to remain deployed at the end of the experiment). 4. Please could you fix the following NiTs: /OAM mechanism/OAM mechanisms/ /If VPN Service option/If the VPN Service option/ /Was there a need to synchronize configurations at each node or could nodes be configured independently/ please add a question mark. --- Note my previous discuss concerned rev -03: This EXP specification seeks to place normative requirements on configuring nodes, but is very general as to where the option configuration needs to be applied. The document said: It MUST NOT appear in any other extension header. If VPN Service option appears in another extension header, the receiver MUST discard the packet. This adds a requirement to drop a packet if the new option appears in a HBH EH, whereas the processing defined in RFC 9673 would skip this option if present in a HBH EH, and therefore would require explicit configuration to drop this packet. Can the rule for the HBH EH be to ignore this option? |
|
2025-03-28
|
04 | Gorry Fairhurst | [Ballot Position Update] Position for Gorry Fairhurst has been changed to No Objection from Discuss |
|
2025-03-28
|
04 | Ron Bonica | New version available: draft-ietf-6man-vpn-dest-opt-04.txt |
|
2025-03-28
|
04 | Ron Bonica | New version accepted (logged-in submitter: Ron Bonica) |
|
2025-03-28
|
04 | Ron Bonica | Uploaded new revision |
|
2025-03-24
|
03 | Gorry Fairhurst | [Ballot discuss] This EXP specification seeks to place normative requirements on configuring nodes, but is very general as to where the option configuration needs to … [Ballot discuss] This EXP specification seeks to place normative requirements on configuring nodes, but is very general as to where the option configuration needs to be applied. 1.: The document says: It MUST NOT appear in any other extension header. If VPN Service option appears in another extension header, the receiver MUST discard the packet. This adds a requirement to drop a packet if the new option appears in a HBH EH, whereas the processing defined in RFC 9673 would skip this option if present in a HBH EH, and therefore would require explicit configuration to drop this packet. Can the rule for the HBH EH be to ignore this option? 2. I understand the intent is to specify a new DO for use by a router at the PE edge. However, I cannot tell from the text whether this experiment is also scoped to require filtering of destination options that are processed by the final destination of the packet (host) (see Section 4.1., Note 2) of RFC 8200. This does not seem to be quite what was intended. 3. Section 7 assumes that the only processing of this option is by an egress PE device. It says “It cannot be deployed where one or both of the PEs does not support MPLS.” Would scoping the receiver processing rules only to egress PE devices reduce the deployment challenges in using an experimental number? |
|
2025-03-24
|
03 | Gorry Fairhurst | [Ballot comment] 1. Section 9 does not explain how to clean-up after the experiment. Section 1.1 of RFC 3692 includes text that I thought was … [Ballot comment] 1. Section 9 does not explain how to clean-up after the experiment. Section 1.1 of RFC 3692 includes text that I thought was helpful, and I’m surprised that this text (preferably quoted as-is) did not appear in this document’s deployment section. When protocols that use experimental numbers are included in products, the shipping versions of the products must disable recognition of protocol experimental numbers by default -- that is, the end user of the product must explicitly "turn on" the experimental protocol functionality. 2. The text in section 8 only seems to assume “care” about potentially overlapping use. I recognise that the experimental numbers are not guaranteed to be unique in any environment, however could this format include a prefix that could help distinguish this experiment from other uses. For example, I’m curious why the option does not include an identifier to associate it with the closed domain in which it is intended to operate? That might reduce the potential for accidental misinterpretation if a packet was forwarded to another closed domain. Even a short randomly chosen identifier could help reduce any confusion if this same code point was to be used by another experimental option (or perhaps more significantly were to remain deployed at the end of the experiment). 4. Please could you fix the following NiTs: /OAM mechanism/OAM mechanisms/ /If VPN Service option/If the VPN Service option/ /Was there a need to synchronize configurations at each node or could nodes be configured independently/ please add a question mark. |
|
2025-03-24
|
03 | Gorry Fairhurst | [Ballot Position Update] New position, Discuss, has been recorded for Gorry Fairhurst |
|
2025-03-12
|
03 | Carlos Pignataro | Request for Telechat review by OPSDIR is assigned to Susan Hares |
|
2025-03-09
|
03 | Mohamed Boucadair | Requested Telechat review by OPSDIR |
|
2025-03-07
|
03 | Carlos Jesús Bernardos | Request for Telechat review by INTDIR is assigned to Antoine Fressancourt |
|
2025-03-06
|
03 | Jean Mahoney | Request for Telechat review by GENART is assigned to Linda Dunbar |
|
2025-03-06
|
03 | Éric Vyncke | Requested Telechat review by INTDIR |
|
2025-02-23
|
03 | Ron Bonica | New version available: draft-ietf-6man-vpn-dest-opt-03.txt |
|
2025-02-23
|
03 | Ron Bonica | New version accepted (logged-in submitter: Ron Bonica) |
|
2025-02-23
|
03 | Ron Bonica | Uploaded new revision |
|
2025-02-10
|
02 | (System) | IANA Review state changed to Version Changed - Review Needed from IANA OK - No Actions Needed |
|
2025-02-10
|
02 | Ron Bonica | New version available: draft-ietf-6man-vpn-dest-opt-02.txt |
|
2025-02-10
|
02 | Ron Bonica | New version accepted (logged-in submitter: Ron Bonica) |
|
2025-02-10
|
02 | Ron Bonica | Uploaded new revision |
|
2025-02-09
|
01 | Erik Kline | Placed on agenda for telechat - 2025-04-17 |
|
2025-02-09
|
01 | Erik Kline | Ballot has been issued |
|
2025-02-09
|
01 | Erik Kline | [Ballot Position Update] New position, Yes, has been recorded for Erik Kline |
|
2025-02-09
|
01 | Erik Kline | Created "Approve" ballot |
|
2025-02-09
|
01 | Erik Kline | IESG state changed to IESG Evaluation from Waiting for AD Go-Ahead |
|
2025-02-09
|
01 | Erik Kline | Ballot writeup was changed |
|
2025-02-08
|
01 | Peter Yee | Request for Last Call review by SECDIR Completed: Has Nits. Reviewer: Peter Yee. Sent review to list. Submission of review completed at an earlier date. |
|
2025-02-08
|
01 | Peter Yee | Request for Last Call review by SECDIR Completed: Has Nits. Reviewer: Peter Yee. |
|
2025-02-04
|
01 | Linda Dunbar | Request for Last Call review by GENART Completed: Not Ready. Reviewer: Linda Dunbar. Sent review to list. |
|
2025-02-04
|
01 | (System) | IESG state changed to Waiting for AD Go-Ahead from In Last Call |
|
2025-02-03
|
01 | David Dong | IESG/Authors/WG Chairs: IANA has completed its review of draft-ietf-6man-vpn-dest-opt-01, which is currently in Last Call, and has the following comments: We understand that this … IESG/Authors/WG Chairs: IANA has completed its review of draft-ietf-6man-vpn-dest-opt-01, which is currently in Last Call, and has the following comments: We understand that this document doesn't require any registry actions. While it's often helpful for a document's IANA Considerations section to remain in place upon publication even if there are no actions, if the authors strongly prefer to remove it, we do not object. If this assessment is not accurate, please respond as soon as possible. For definitions of IANA review states, please see: https://datatracker.ietf.org/help/state/draft/iana-review Thank you, David Dong IANA Services Sr. Specialist |
|
2025-02-03
|
01 | (System) | IANA Review state changed to IANA OK - No Actions Needed from IANA - Review Needed |
|
2025-02-03
|
01 | Jean Mahoney | Request for Last Call review by GENART is assigned to Linda Dunbar |
|
2025-02-03
|
01 | Sue Hares | Assignment of request for Last Call review by GENART to Susan Hares was rejected |
|
2025-01-28
|
01 | Tero Kivinen | Request for Last Call review by SECDIR is assigned to Peter Yee |
|
2025-01-23
|
01 | Jean Mahoney | Request for Last Call review by GENART is assigned to Susan Hares |
|
2025-01-21
|
01 | Jenny Bui | IANA Review state changed to IANA - Review Needed |
|
2025-01-21
|
01 | Jenny Bui | The following Last Call announcement was sent out (ends 2025-02-04): From: The IESG To: IETF-Announce CC: 6man-chairs@ietf.org, bob.hinden@gmail.com, draft-ietf-6man-vpn-dest-opt@ietf.org, ek.ietf@gmail.com, ipv6@ietf.org … The following Last Call announcement was sent out (ends 2025-02-04): From: The IESG To: IETF-Announce CC: 6man-chairs@ietf.org, bob.hinden@gmail.com, draft-ietf-6man-vpn-dest-opt@ietf.org, ek.ietf@gmail.com, ipv6@ietf.org Reply-To: last-call@ietf.org Sender: Subject: Last Call: (The IPv6 VPN Service Destination Option) to Experimental RFC The IESG has received a request from the IPv6 Maintenance WG (6man) to consider the following document: - 'The IPv6 VPN Service Destination Option' as Experimental RFC The IESG plans to make a decision in the next few weeks, and solicits final comments on this action. Please send substantive comments to the last-call@ietf.org mailing lists by 2025-02-04. Exceptionally, comments may be sent to iesg@ietf.org instead. In either case, please retain the beginning of the Subject line to allow automated sorting. Abstract This document describes an experiment in which VPN service information for both layer 2 and layer 3 VPNs is encoded in a new IPv6 Destination Option. The new IPv6 Destination Option is called the VPN Service Option. One purpose of this experiment is to demonstrate that the VPN Service Option can be implemented and deployed in a production network. Another purpose is to demonstrate that the security considerations, described in this document, have been sufficiently addressed. Finally, this document encourages replication of the experiment. The file can be obtained via https://datatracker.ietf.org/doc/draft-ietf-6man-vpn-dest-opt/ No IPR declarations have been submitted directly on this I-D. |
|
2025-01-21
|
01 | Jenny Bui | IESG state changed to In Last Call from Last Call Requested |
|
2025-01-21
|
01 | Jenny Bui | Last call announcement was generated |
|
2025-01-20
|
01 | Erik Kline | Last call was requested |
|
2025-01-20
|
01 | Erik Kline | Last call announcement was generated |
|
2025-01-20
|
01 | Erik Kline | Ballot approval text was generated |
|
2025-01-20
|
01 | Erik Kline | Ballot writeup was generated |
|
2025-01-20
|
01 | Erik Kline | IESG state changed to Last Call Requested from AD Evaluation::AD Followup |
|
2025-01-20
|
01 | Erik Kline | # Internet AD comments for draft-ietf-6man-vpn-dest-opt-01 CC @ekline * comment syntax: - https://github.com/mnot/ietf-comments/blob/main/format.md ## Comments ### S6 * "The reissued document will request an … # Internet AD comments for draft-ietf-6man-vpn-dest-opt-01 CC @ekline * comment syntax: - https://github.com/mnot/ietf-comments/blob/main/format.md ## Comments ### S6 * "The reissued document will request an IPv6 Destination Option number." How about appending something like ", and contain operational recommendations for how an operator can undertake a migration to a new code point." I think the greatest risk, if this experiment is successful, is that migrating off the EXP code point will be prohibitively expensive (operationally). |
|
2025-01-20
|
01 | Erik Kline | IESG state changed to AD Evaluation::AD Followup from AD Evaluation |
|
2025-01-20
|
01 | Erik Kline | IESG state changed to AD Evaluation from Publication Requested |
|
2025-01-20
|
01 | Erik Kline | Changed consensus to Yes from Unknown |
|
2025-01-15
|
01 | Bob Hinden | # Document Shepherd Write-Up for Group Documents *This version is dated 4 July 2022.* The IPv6 VPN Service Destination Option draft-ietf-6man-vpn-dest-opt Intended status: Experimental 8 … # Document Shepherd Write-Up for Group Documents *This version is dated 4 July 2022.* The IPv6 VPN Service Destination Option draft-ietf-6man-vpn-dest-opt Intended status: Experimental 8 November 2024 Thank you for your service as a document shepherd. Among the responsibilities is answering the questions in this write-up to give helpful context to Last Call and Internet Engineering Steering Group ([IESG][1]) reviewers, and your diligence in completing it is appreciated. The full role of the shepherd is further described in [RFC 4858][2]. You will need the cooperation of the authors and editors to complete these checks. Note that some numbered items contain multiple related questions; please be sure to answer all of them. ## Document History 1. Does the working group (WG) consensus represent the strong concurrence of a few individuals, with others being silent, or did it reach broad agreement? There has been active discussion since June 2018. 2. Was there controversy about particular points, or were there decisions where the consensus was particularly rough? Current draft has support for it's intended status, that is, Experimental. Reviews were done by Eliot Lear and Mark Smith. 3. Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarize the areas of conflict in separate email messages to the responsible Area Director. (It should be in a separate email because this questionnaire is publicly available.) No. 4. For protocol documents, are there existing implementations of the contents of the document? Have a significant number of potential implementers indicated plans to implement? Are any existing implementations reported somewhere, either in the document itself (as [RFC 7942][3] recommends) or elsewhere (where)? No current implementations. ## Additional Reviews 5. Do the contents of this document closely interact with technologies in other IETF working groups or external organizations, and would it therefore benefit from their review? Have those reviews occurred? If yes, describe which reviews took place. No. 6. Describe how the document meets any required formal expert review criteria, such as the MIB Doctor, YANG Doctor, media type, and URI type reviews. N/A 7. If the document contains a YANG module, has the final version of the module been checked with any of the [recommended validation tools][4] for syntax and formatting validation? If there are any resulting errors or warnings, what is the justification for not fixing them at this time? Does the YANG module comply with the Network Management Datastore Architecture (NMDA) as specified in [RFC 8342][5]? N/A 8. Describe reviews and automated checks performed to validate sections of the final version of the document written in a formal language, such as XML code, BNF rules, MIB definitions, CBOR's CDDL, etc. N/A ## Document Shepherd Checks 9. Based on the shepherd's review of the document, is it their opinion that this document is needed, clearly written, complete, correctly designed, and ready to be handed off to the responsible Area Director? The document is good. I am very pleased with Section 9 "Experimental Results" that describes the measuring and evaluating the results of the experiment. 10. Several IETF Areas have assembled [lists of common issues that their reviewers encounter][6]. For which areas have such issues been identified and addressed? For which does this still need to happen in subsequent reviews? N/A 11. What type of RFC publication is being requested on the IETF stream ([Best Current Practice][12], [Proposed Standard, Internet Standard][13], [Informational, Experimental or Historic][14])? Why is this the proper type of RFC? Do all Datatracker state attributes correctly reflect this intent? Experimental. This is noted in the header and in the datatracker. 12. Have reasonable efforts been made to remind all authors of the intellectual property rights (IPR) disclosure obligations described in [BCP 79][7]? To the best of your knowledge, have all required disclosures been filed? If not, explain why. If yes, summarize any relevant discussion, including links to publicly-available messages when applicable. Yes, all authors confirmed that they are not aware of any IPR on this document. 13. Has each author, editor, and contributor shown their willingness to be listed as such? If the total number of authors and editors on the front page is greater than five, please provide a justification. Yes, all five authors who have confirmed willingness to be an author. 14. Document any remaining I-D nits in this document. Simply running the [idnits tool][8] is not enough; please review the ["Content Guidelines" on authors.ietf.org][15]. (Also note that the current idnits tool generates some incorrect warnings; a rewrite is underway.) IDNITS is clean. There are three warnings that aren't relavant. 15. Should any informative references be normative or vice-versa? See the [IESG Statement on Normative and Informative References][16]. References reasonable. 16. List any normative references that are not freely available to anyone. Did the community have sufficient access to review any such normative references? All references are RFCs and IDs. 17. Are there any normative downward references (see [RFC 3967][9] and [BCP 97][10]) that are not already listed in the [DOWNREF registry][17]? If so, list them. None. 18. Are there normative references to documents that are not ready to be submitted to the IESG for publication or are otherwise in an unclear state? If so, what is the plan for their completion? No. 19. Will publication of this document change the status of any existing RFCs? If so, does the Datatracker metadata correctly reflect this and are those RFCs listed on the title page, in the abstract, and discussed in the introduction? If not, explain why and point to the part of the document where the relationship of this document to these other RFCs is discussed. No. 20. Describe the document shepherd's review of the IANA considerations section, especially with regard to its consistency with the body of the document. Confirm that all aspects of the document requiring IANA assignments are associated with the appropriate reservations in IANA registries. Confirm that any referenced IANA registries have been clearly identified. Confirm that each newly created IANA registry specifies its initial contents, allocations procedures, and a reasonable name (see [RFC 8126][11]). This document does not make any IANA requests. However, if the experiment is successful, the authors will reissue this document, to be published on the Standards Track. The reissued document will request an IPv6 Destination Option number. 21. List any new IANA registries that require Designated Expert Review for future allocations. Are the instructions to the Designated Expert clear? Please include suggestions of designated experts, if appropriate. N/A [1]: https://www.ietf.org/about/groups/iesg/ [2]: https://www.rfc-editor.org/rfc/rfc4858.html [3]: https://www.rfc-editor.org/rfc/rfc7942.html [4]: https://wiki.ietf.org/group/ops/yang-review-tools [5]: https://www.rfc-editor.org/rfc/rfc8342.html [6]: https://wiki.ietf.org/group/iesg/ExpertTopics [7]: https://www.rfc-editor.org/info/bcp79 [8]: https://www.ietf.org/tools/idnits/ [9]: https://www.rfc-editor.org/rfc/rfc3967.html [10]: https://www.rfc-editor.org/info/bcp97 [11]: https://www.rfc-editor.org/rfc/rfc8126.html [12]: https://www.rfc-editor.org/rfc/rfc2026.html#section-5 [13]: https://www.rfc-editor.org/rfc/rfc2026.html#section-4.1 [14]: https://www.rfc-editor.org/rfc/rfc2026.html#section-4.2 [15]: https://authors.ietf.org/en/content-guidelines-overview [16]: https://www.ietf.org/about/groups/iesg/statements/normative-informative-references/ [17]: https://datatracker.ietf.org/doc/downref/ |
|
2025-01-15
|
01 | Bob Hinden | IETF WG state changed to Submitted to IESG for Publication from WG Consensus: Waiting for Write-Up |
|
2025-01-15
|
01 | Bob Hinden | IESG state changed to Publication Requested from I-D Exists |
|
2025-01-15
|
01 | (System) | Changed action holders to Erik Kline (IESG state changed) |
|
2025-01-15
|
01 | Bob Hinden | Responsible AD changed to Erik Kline |
|
2025-01-15
|
01 | Bob Hinden | Document is now in IESG state Publication Requested |
|
2025-01-15
|
01 | Bob Hinden | # Document Shepherd Write-Up for Group Documents *This version is dated 4 July 2022.* The IPv6 VPN Service Destination Option draft-ietf-6man-vpn-dest-opt Intended status: Experimental 8 … # Document Shepherd Write-Up for Group Documents *This version is dated 4 July 2022.* The IPv6 VPN Service Destination Option draft-ietf-6man-vpn-dest-opt Intended status: Experimental 8 November 2024 Thank you for your service as a document shepherd. Among the responsibilities is answering the questions in this write-up to give helpful context to Last Call and Internet Engineering Steering Group ([IESG][1]) reviewers, and your diligence in completing it is appreciated. The full role of the shepherd is further described in [RFC 4858][2]. You will need the cooperation of the authors and editors to complete these checks. Note that some numbered items contain multiple related questions; please be sure to answer all of them. ## Document History 1. Does the working group (WG) consensus represent the strong concurrence of a few individuals, with others being silent, or did it reach broad agreement? There has been active discussion since June 2018. 2. Was there controversy about particular points, or were there decisions where the consensus was particularly rough? Current draft has support for it's intended status, that is, Experimental. Reviews were done by Eliot Lear and Mark Smith. 3. Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarize the areas of conflict in separate email messages to the responsible Area Director. (It should be in a separate email because this questionnaire is publicly available.) No. 4. For protocol documents, are there existing implementations of the contents of the document? Have a significant number of potential implementers indicated plans to implement? Are any existing implementations reported somewhere, either in the document itself (as [RFC 7942][3] recommends) or elsewhere (where)? No current implementations. ## Additional Reviews 5. Do the contents of this document closely interact with technologies in other IETF working groups or external organizations, and would it therefore benefit from their review? Have those reviews occurred? If yes, describe which reviews took place. No. 6. Describe how the document meets any required formal expert review criteria, such as the MIB Doctor, YANG Doctor, media type, and URI type reviews. N/A 7. If the document contains a YANG module, has the final version of the module been checked with any of the [recommended validation tools][4] for syntax and formatting validation? If there are any resulting errors or warnings, what is the justification for not fixing them at this time? Does the YANG module comply with the Network Management Datastore Architecture (NMDA) as specified in [RFC 8342][5]? N/A 8. Describe reviews and automated checks performed to validate sections of the final version of the document written in a formal language, such as XML code, BNF rules, MIB definitions, CBOR's CDDL, etc. N/A ## Document Shepherd Checks 9. Based on the shepherd's review of the document, is it their opinion that this document is needed, clearly written, complete, correctly designed, and ready to be handed off to the responsible Area Director? The document is good. I am very pleased with Section 9 "Experimental Results" that describes the measuring and evaluating the results of the experiment. 10. Several IETF Areas have assembled [lists of common issues that their reviewers encounter][6]. For which areas have such issues been identified and addressed? For which does this still need to happen in subsequent reviews? N/A 11. What type of RFC publication is being requested on the IETF stream ([Best Current Practice][12], [Proposed Standard, Internet Standard][13], [Informational, Experimental or Historic][14])? Why is this the proper type of RFC? Do all Datatracker state attributes correctly reflect this intent? Experimental. This is noted in the header and in the datatracker. 12. Have reasonable efforts been made to remind all authors of the intellectual property rights (IPR) disclosure obligations described in [BCP 79][7]? To the best of your knowledge, have all required disclosures been filed? If not, explain why. If yes, summarize any relevant discussion, including links to publicly-available messages when applicable. Yes, all authors confirmed that they are not aware of any IPR on this document. 13. Has each author, editor, and contributor shown their willingness to be listed as such? If the total number of authors and editors on the front page is greater than five, please provide a justification. Yes, all five authors who have confirmed willingness to be an author. 14. Document any remaining I-D nits in this document. Simply running the [idnits tool][8] is not enough; please review the ["Content Guidelines" on authors.ietf.org][15]. (Also note that the current idnits tool generates some incorrect warnings; a rewrite is underway.) IDNITS is clean. There are three warnings that aren't relavant. 15. Should any informative references be normative or vice-versa? See the [IESG Statement on Normative and Informative References][16]. References reasonable. 16. List any normative references that are not freely available to anyone. Did the community have sufficient access to review any such normative references? All references are RFCs and IDs. 17. Are there any normative downward references (see [RFC 3967][9] and [BCP 97][10]) that are not already listed in the [DOWNREF registry][17]? If so, list them. None. 18. Are there normative references to documents that are not ready to be submitted to the IESG for publication or are otherwise in an unclear state? If so, what is the plan for their completion? No. 19. Will publication of this document change the status of any existing RFCs? If so, does the Datatracker metadata correctly reflect this and are those RFCs listed on the title page, in the abstract, and discussed in the introduction? If not, explain why and point to the part of the document where the relationship of this document to these other RFCs is discussed. No. 20. Describe the document shepherd's review of the IANA considerations section, especially with regard to its consistency with the body of the document. Confirm that all aspects of the document requiring IANA assignments are associated with the appropriate reservations in IANA registries. Confirm that any referenced IANA registries have been clearly identified. Confirm that each newly created IANA registry specifies its initial contents, allocations procedures, and a reasonable name (see [RFC 8126][11]). This document does not make any IANA requests. However, if the experiment is successful, the authors will reissue this document, to be published on the Standards Track. The reissued document will request an IPv6 Destination Option number. 21. List any new IANA registries that require Designated Expert Review for future allocations. Are the instructions to the Designated Expert clear? Please include suggestions of designated experts, if appropriate. N/A [1]: https://www.ietf.org/about/groups/iesg/ [2]: https://www.rfc-editor.org/rfc/rfc4858.html [3]: https://www.rfc-editor.org/rfc/rfc7942.html [4]: https://wiki.ietf.org/group/ops/yang-review-tools [5]: https://www.rfc-editor.org/rfc/rfc8342.html [6]: https://wiki.ietf.org/group/iesg/ExpertTopics [7]: https://www.rfc-editor.org/info/bcp79 [8]: https://www.ietf.org/tools/idnits/ [9]: https://www.rfc-editor.org/rfc/rfc3967.html [10]: https://www.rfc-editor.org/info/bcp97 [11]: https://www.rfc-editor.org/rfc/rfc8126.html [12]: https://www.rfc-editor.org/rfc/rfc2026.html#section-5 [13]: https://www.rfc-editor.org/rfc/rfc2026.html#section-4.1 [14]: https://www.rfc-editor.org/rfc/rfc2026.html#section-4.2 [15]: https://authors.ietf.org/en/content-guidelines-overview [16]: https://www.ietf.org/about/groups/iesg/statements/normative-informative-references/ [17]: https://datatracker.ietf.org/doc/downref/ |
|
2025-01-10
|
01 | Bob Hinden | Notification list changed to bob.hinden@gmail.com because the document shepherd was set |
|
2025-01-10
|
01 | Bob Hinden | Document shepherd changed to Bob Hinden |
|
2025-01-06
|
01 | Bob Hinden | IETF WG state changed to WG Consensus: Waiting for Write-Up from In WG Last Call |
|
2025-01-06
|
01 | Bob Hinden | Intended Status changed to Experimental from None |
|
2024-12-09
|
01 | Bob Hinden | IETF WG state changed to In WG Last Call from WG Document |
|
2024-11-08
|
01 | Ron Bonica | New version available: draft-ietf-6man-vpn-dest-opt-01.txt |
|
2024-11-08
|
01 | Ron Bonica | New version accepted (logged-in submitter: Ron Bonica) |
|
2024-11-08
|
01 | Ron Bonica | Uploaded new revision |
|
2024-10-23
|
00 | Jen Linkova | Added to session: IETF-121: 6man Thu-0930 |
|
2024-10-09
|
00 | Jen Linkova | This document now replaces draft-bonica-6man-vpn-dest-opt instead of None |
|
2024-10-09
|
00 | Ron Bonica | New version available: draft-ietf-6man-vpn-dest-opt-00.txt |
|
2024-10-09
|
00 | Jen Linkova | WG -00 approved |
|
2024-10-09
|
00 | Ron Bonica | Set submitter to "Ron Bonica ", replaces to draft-bonica-6man-vpn-dest-opt and sent approval email to group chairs: 6man-chairs@ietf.org |
|
2024-10-09
|
00 | Ron Bonica | Uploaded new revision |