Skip to main content

Propagation of ARP/ND Flags in an Ethernet Virtual Private Network (EVPN)
draft-ietf-bess-evpn-na-flags-09

Revision differences

Document history

Date Rev. By Action
2024-01-26
09 Gunter Van de Velde Request closed, assignment withdrawn: Joel Jaeggli Last Call OPSDIR review
2024-01-26
09 Gunter Van de Velde Closed request for Last Call review by OPSDIR with state 'Overtaken by Events': Cleaning up stale OPSDIR queue
2021-06-14
09 (System) RFC Editor state changed to AUTH48-DONE from AUTH48
2021-06-04
09 (System) RFC Editor state changed to AUTH48
2021-04-21
09 (System) RFC Editor state changed to RFC-EDITOR from EDIT
2021-04-12
09 (System) IANA Action state changed to RFC-Ed-Ack from Waiting on RFC Editor
2021-04-12
09 (System) IANA Action state changed to Waiting on RFC Editor from In Progress
2021-04-12
09 (System) IANA Action state changed to In Progress from Waiting on Authors
2021-04-09
09 (System) IANA Action state changed to Waiting on Authors from In Progress
2021-04-08
09 (System) RFC Editor state changed to EDIT
2021-04-08
09 (System) IESG state changed to RFC Ed Queue from Approved-announcement sent
2021-04-08
09 (System) Announcement was received by RFC Editor
2021-04-08
09 (System) IANA Action state changed to In Progress
2021-04-08
09 Cindy Morgan IESG state changed to Approved-announcement sent from Approved-announcement to be sent
2021-04-08
09 Cindy Morgan IESG has approved the document
2021-04-08
09 Cindy Morgan Closed "Approve" ballot
2021-04-08
09 Martin Vigoureux IESG state changed to Approved-announcement to be sent from IESG Evaluation::AD Followup
2021-04-08
09 Martin Vigoureux Ballot approval text was generated
2021-03-30
09 Erik Kline [Ballot Position Update] Position for Erik Kline has been changed to No Objection from Discuss
2020-12-01
09 Robert Wilton [Ballot comment]
Thank you for your work on this document and resolving my discuss issue.

Regards,
Rob
2020-12-01
09 Robert Wilton [Ballot Position Update] Position for Robert Wilton has been changed to No Objection from Discuss
2020-12-01
09 Jorge Rabadan New version available: draft-ietf-bess-evpn-na-flags-09.txt
2020-12-01
09 (System) New version approved
2020-12-01
09 (System) Request for posting confirmation emailed to previous authors: Wen Lin , Kiran Nagaraj , Jorge Rabadan , Senthil Sathappan
2020-12-01
09 Jorge Rabadan Uploaded new revision
2020-10-12
08 Warren Kumari
[Ballot comment]
[ Update: Thank you for addressing my DISCUSS concern. ]

Other than my DISUCSSes, I found this document to be well written and …
[Ballot comment]
[ Update: Thank you for addressing my DISCUSS concern. ]

Other than my DISUCSSes, I found this document to be well written and easy to understand - thank you for writing it...
2020-10-12
08 Warren Kumari [Ballot Position Update] Position for Warren Kumari has been changed to No Objection from Discuss
2020-10-12
08 Jorge Rabadan New version available: draft-ietf-bess-evpn-na-flags-08.txt
2020-10-12
08 (System) New version approved
2020-10-12
08 (System) Request for posting confirmation emailed to previous authors: Jorge Rabadan , Wen Lin , Senthil Sathappan , Kiran Nagaraj
2020-10-12
08 Jorge Rabadan Uploaded new revision
2020-10-09
07 (System) Sub state has been changed to AD Followup from Revised ID Needed
2020-10-09
07 (System) IANA Review state changed to Version Changed - Review Needed from IANA OK - Actions Needed
2020-10-09
07 Jorge Rabadan New version available: draft-ietf-bess-evpn-na-flags-07.txt
2020-10-09
07 (System) New version approved
2020-10-09
07 (System) Request for posting confirmation emailed to previous authors: Jorge Rabadan , Wen Lin , Kiran Nagaraj , Senthil Sathappan
2020-10-09
07 Jorge Rabadan Uploaded new revision
2020-10-09
06 Min Ye Request closed, assignment withdrawn: IJsbrand Wijnands Last Call RTGDIR review
2020-10-09
06 Min Ye Closed request for Last Call review by RTGDIR with state 'Withdrawn'
2020-09-24
06 Cindy Morgan IESG state changed to IESG Evaluation::Revised I-D Needed from IESG Evaluation
2020-09-23
06 Alvaro Retana [Ballot comment]
I support the DISCUSS positions from Erik, Warren and Rob.
2020-09-23
06 Alvaro Retana [Ballot Position Update] New position, No Objection, has been recorded for Alvaro Retana
2020-09-23
06 Warren Kumari
[Ballot discuss]
Be ye not afraid! This DISCUSS should be fairly trivial to address...

This allows for more information to be carried with MAC/IP Advertisements. …
[Ballot discuss]
Be ye not afraid! This DISCUSS should be fairly trivial to address...

This allows for more information to be carried with MAC/IP Advertisements. It seems to me that this gives a DoS-style attacker more opportunities to exhaust state on routers - I could sit on a wire and create lots of ARP/ND states (make up new IP and MAC combinations), causing this to be propagated and burning memory / state / etc.

This is somewhat discussed in RFC 7432, but the technique in this document seems like it makes this issue somewhat worse - a single sentence in the Security Considerations noting it would satisfy me (as would an explanation that I'm mistaken :-)).

I also support EK & Rob's DISCUSSes
2020-09-23
06 Warren Kumari [Ballot comment]
Other than my DISUCSSes, I found this document to be well written and easy to understand - thank you for writing it...
2020-09-23
06 Warren Kumari [Ballot Position Update] New position, Discuss, has been recorded for Warren Kumari
2020-09-23
06 Magnus Westerlund [Ballot Position Update] New position, No Objection, has been recorded for Magnus Westerlund
2020-09-22
06 Erik Kline
[Ballot discuss]
[ general ]

* ND in IPv6 is more than just its analogous ARP function (as immediately
  evidenced by the need to …
[Ballot discuss]
[ general ]

* ND in IPv6 is more than just its analogous ARP function (as immediately
  evidenced by the need to support passing the NA flags).  I'm concerned that
  this approach isn't actually satisfactory for IPv6, and could end up
  constraining existing and future ND extensions and uses.

  [1] New flags

  As new flags are defined in the NA message, they will not be deployable
  in these environments until this standard (and possibly others) is updated.

  A more forward-compatible option might be to just include the whole NA
  "flags plus reserved" word (there is room for it in the format in
  section 2).

  [2] Current and new NA ND Options

  This approach doesn't support sending additional ND Options in the NA, and
  therefore things like Secure Neighbor Discovery (SeND, RFC 3971) cannot
  be supported (nor can any future NA option).

  Arguably, ND proxying might best be disabled when a node is attempting to
  use SeND and/or whenever a Nonce Option is present an NA.  Nevertheless,
  new ND options might be specified that can be carried in NS/NA messages.

  RFC 4861 sections 4.2 and 4.3 say that "[f]uture versions of this protocol
  may define new option types", and while it also says that "[r]eceivers
  MUST silently ignore any options they do not recognize and continue
  processing the message", in this case it would be the infrastructure that
  would prevent two nodes from attempting to use a newer ND option on either
  side of this PE/CE proxying boundary and not necessarily a limitation of the
  nodes themselves.

  There is no space for these options in the current section 2 format.
  Can it be extended to optionally carry the ND options that a PE has
  observed to be sent by the node?

  Alternatively, I think we'll need some text that ND proxying MUST be
  disabled if NSes contain any options other things like TLLAO or if NAs are
  observed to have anything other than SLLAO.

  Basically, I think we should take care to not impede the deployment of any
  extensions to ND.
2020-09-22
06 Erik Kline [Ballot Position Update] New position, Discuss, has been recorded for Erik Kline
2020-09-22
06 Benjamin Kaduk
[Ballot comment]
Should we say anything about how the ARP/ND Extended Community is
ignored in the absence of a sibling MAC/IP Advertisement Extended
Community?

Should …
[Ballot comment]
Should we say anything about how the ARP/ND Extended Community is
ignored in the absence of a sibling MAC/IP Advertisement Extended
Community?

Should we remind the reader how the recipient knows that a given ARP/ND
Extended Community is associated to the coresponding MAC/IP
Advertisement Extended Community?

There seems to be some latent risk in defining an "immutable" flag with
no defined way of clearing or unsetting it (e.g., having it time out).
We should either document what the operator should do when a formerly
immutable mapping needs to change or document the risk in the security
considerations section.  (This is, I think, related to Rob's Discuss.)

Section 1

  procedure.  However, the information conveyed in the EVPN MAC/IP
  Advertisement route may not be enough for the remote PE to reply to
  local ARP or ND requests.  For example, if a PE learns an IPv6->MAC

This makes it sound like we're rectifying a deficiency of the core spec,
and therefore might want to have an Updates: (or rather, "see also")
relationship to it.

  Advertisement routes.  Similarly, other information relevant to the
  host advertised in the MAC/IP Advertisement route may be needed.

(editorial) either we know what this "other information" is and could
list it explicitly (or by section reference), or we don't, and the
solution is incomplete.

Section 1.1

  Proxy-ARP/ND: function on the EVPN PEs by which received Address
  Resolution Protocol (ARP) Requests or Neighbor Solicitation (NS)
  messages are replied locally by the PE, without the need to flood the

nit: "replied to"

Section 2

Should we explicitly say that this is a transitive extended community?

  O - Override Flag (corresponds to Bit 22 of the Extended Community)
  Bit 6 of the Flags field is defined as the "Override Flag".  An
  egress PE will normally advertise IPv6->MAC pairs with the O Flag
  set, and only when IPv6 "anycast" is enabled in the BD or interface,
  the PE will send an IPv6->MAC pair with the O Flag = 0.  The ingress
  PE will install the ND entry with the received O Flag and will use
  this information when replying to a Neighbor Solicitation for the
  IPv6 address.  [...]

I'm not 100% sure I understand what this is saying.
My current understanding is that: at present (in the absence of this
extended community), a PE has to use heuristics to set the O flag in NA
messages, with the heuristic being "normally set the O flag, but when
the BD/interface has anycast enabled, clear the O flag".  The new
behavior when the information in this extended community is available,
is then to "always send the value received from the extended community".

However, if my understanding (above) is correct, that doesn't seem quite
right, since it's generally not safe to set the O flag in such an
"anycast" scenario.  Am I missing something?

  Community) is a configured ARP/ND entry.  The IP address in the EVPN
  MAC/IP Advertisement route can only be bound together with the MAC
  address specified in the same route.

nit: I'm not sure I understand what "can only be bound together with"
means here.  (What would the other option be?)

Section 3.1

Just to check my understanding: the dynamic learning here only applies
to NA messages received from the CE directly, not those received from
other EVPN routers?  (Do we need to say that explicitly?)

  o  This Extended Community does not change the procedures described
      in [RFC7432].  Specifically the procedures for advertising the MAC
      Mobility Extended Community along with the MAC/IP Advertisement
      route are not changed.

(side note) I'm not entirely sure how one might expect the MAC Mobility
processing to have changed as a result of the addition of the ARP/ND
Extended Community, but there doesn't seem to be any real harm in
mentioning it like this.

Section 3.2

      *  If the EVPN MAC/IP Advertisement route contains an IPv6 address
        and the EVPN ARP/ND Extended Community, the PE MUST add the R
        and O Flags to the ND entry in the ND or proxy-ND table and use
        that information in Neighbor Advertisements when replying to a
        Solicitation for the IPv6 address.

editorial: "add the R and O Flags" could sound like they are always set
to 1; perhaps "propagate the value of the R and O flags from the ARP/ND
Extended Community to the ND entry"?

        move as well.  Even so, if an update for the same IP1->MAC1
        immutable and static, is received from a different PE, one of
        the two routes will be selected, as in the [RFC7432] case where
        two MAC/IP routes with Static bit are received for the same MAC
        from different PEs.

I couldn't find much discussion of this scenario in RFC 7432 by
searching for "static" or "sticky"; could you help point me in the right
direction?

  destination to PE2.  If for some reason, PE3 originates an EVPN MAC/
  IP Advertisement route for IP1->MAC2 (even with a higher sequence
  number), then the EVPN PEs in the BD SHOULD NOT update their
  IP1->MAC1 ARP/ND bindings, since IP1 is bound to MAC1 (MAC2 SHOULD
  still be programmed in the layer-2 BDs).  This is considered a
  misconfiguration in PE3.

I don't really understand the motivation for SHOULD NOT, here.  It seems
like a PE would need to violate some other part of the spec in order to
do so, so just "will not" would be workable.
(I'm also left to assume that the route from PE3 sets I=0, which might
be worth making explicit.)

  The use of the Flag I=1 assumes that a given IP is always bound to
  the same MAC address, and therefore the mobility procedures described
  in [I-D.ietf-bess-evpn-irb-extended-mobility] for "Host IP move to a
  new MAC" will not apply.

Do we want to say anything about how things should behave if the
assumption is violated?

Section 4

It seems like this mechanism (or rather, RFC 7432's MAC/IP
Advertisement) doesn't really affect the spoofability of ND; the same
information (actually the same, now that this mechanism exists to send
the R/O flags) is being conveyed just over a different protocol, and
DAD/mobility should still work the same way.  There's an extra
translation step at the PEs the introduces an opportunity for
translation errors but that's not very noteworthy.

The I flag is somewhat different, as I mentioned at the top of my
comments.

  Similarly, the receiver of a NA message with the wrong R flag, may
  update its Default Router List incorrectly adding or removing an
  entry.

I suggest adding at the end of the sentence ", which could for example
lead to sending traffic to a node that is not a router, causing the
traffic to be dropped".

Section 5

Given the email discussion regarding the use of flag position 5, should
a note be left in the registry about that informal usage?
2020-09-22
06 Benjamin Kaduk [Ballot Position Update] New position, No Objection, has been recorded for Benjamin Kaduk
2020-09-22
06 Roman Danyliw [Ballot comment]
Thank you for responding to the SECDIR review (and thank you to Mališa Vučinić for performing it).

I support Rob Wilton's DISCUSS.
2020-09-22
06 Roman Danyliw [Ballot Position Update] New position, No Objection, has been recorded for Roman Danyliw
2020-09-22
06 Robert Wilton
[Ballot discuss]
Hi,

Hopefully a relatively easy discuss to resolve and this might just be my ignorance here:

Section 2 states that I flag is …
[Ballot discuss]
Hi,

Hopefully a relatively easy discuss to resolve and this might just be my ignorance here:

Section 2 states that I flag is used for an immutable ARP/ND Binding which is for a configured ARP/ND entry.

Section 3.2 Reception of the EVPN ARP/ND Extended Community, has the following text:

      *  Receiving multiple EVPN MAC/IP Advertisement routes with I=1
        for the same IP but different MAC is considered a
        misconfiguration.

But wouldn't this scenario occur if the configured ARP/ND entry was changed to point to a new MAC address?

Regards,
Rob
2020-09-22
06 Robert Wilton [Ballot Position Update] New position, Discuss, has been recorded for Robert Wilton
2020-09-22
06 Deborah Brungard [Ballot Position Update] New position, No Objection, has been recorded for Deborah Brungard
2020-09-21
06 Murray Kucherawy [Ballot Position Update] New position, No Objection, has been recorded for Murray Kucherawy
2020-09-21
06 Mališa Vučinić Request for Telechat review by SECDIR Completed: Ready. Reviewer: Mališa Vučinić. Sent review to list.
2020-09-16
06 (System) IANA Review state changed to IANA OK - Actions Needed from Version Changed - Review Needed
2020-09-16
06 Éric Vyncke
[Ballot comment]
Thank you for the work put into this document. Even if I mainly rely on the int-dir review (see below), I quickly reviewed …
[Ballot comment]
Thank you for the work put into this document. Even if I mainly rely on the int-dir review (see below), I quickly reviewed the document and found it very useful and readable.

Thanks to Ralf Weber who did the INT directory review, at https://datatracker.ietf.org/doc/review-ietf-bess-evpn-na-flags-05-intdir-lc-weber-2020-08-28/

Please find below a couple of non-blocking COMMENT and NIT points.

I hope that this helps to improve the document,

Regards,

-éric

== COMMENTS ==
-- Section 2  --
For my curiosity sake, why bit 5 of the 'Flags field' is not described? I would have naively assumed that all flags would be contiguous.

== NITS ==

-- Section 2 --
While it is specified that the reserved fields are set to 0, the usual 'and ignored by the receiver' is not present.

When describing the 'Router Flag', I suggest s/belongs to a router. /belongs to an IPv6 router./ even if fairly obvious
2020-09-16
06 Éric Vyncke [Ballot Position Update] New position, No Objection, has been recorded for Éric Vyncke
2020-09-14
06 Martin Duke [Ballot Position Update] New position, No Objection, has been recorded for Martin Duke
2020-09-10
06 Tero Kivinen Request for Telechat review by SECDIR is assigned to Mališa Vučinić
2020-09-10
06 Tero Kivinen Request for Telechat review by SECDIR is assigned to Mališa Vučinić
2020-09-10
06 (System) IANA Review state changed to Version Changed - Review Needed from IANA OK - Actions Needed
2020-09-10
06 Jorge Rabadan New version available: draft-ietf-bess-evpn-na-flags-06.txt
2020-09-10
06 (System) New version approved
2020-09-10
06 (System) Request for posting confirmation emailed to previous authors: Wen Lin , Senthil Sathappan , Kiran Nagaraj , Jorge Rabadan
2020-09-10
06 Jorge Rabadan Uploaded new revision
2020-09-08
05 Barry Leiba
[Ballot comment]
Only minor comments here; please consider them, but there’s no need for a detailed reply.

A number of abbreviations need to be expanded …
[Ballot comment]
Only minor comments here; please consider them, but there’s no need for a detailed reply.

A number of abbreviations need to be expanded on first use, including EVPN, PE, ND, IRB, and CE.

— Abstract —
The Abstract is exactly, word for word, the same as the first two paragraphs of the Introduction, except that the Introduction helpfully splits it into two paragraphs.  I have comments about the text below, but for the Abstract I suggest shortening it by removing the explanatory stuff and just leaving the summay of what this document is doing — just the final sentence looks fine, I think.

— Section 1 —

  An EVPN MAC/IP Advertisement route can optionally carry an IPv4 or
  IPv6 addresses associated with a MAC address.

Nit: Change “an IPv4” to just “IPv4”, I think, yes?

  the PE would not know if that
  particular IPv6->MAC pair belongs to a host, a router or a host with
  an anycast address

Two things here:  This is a case where a comma after “router” will really help readability.  And isn’t “a host with an anycast address” also “a host”?  Can you rephrase this to make the distinction between the first and third list items clearer?

— Section 1.1 —
Shouldn’t “ND” also have a reference citation (RFC4861)?

— Section 2 —

  Bits 0-3 and 5 are not assigned by this document.

Shouldn’t this have the customary “MUST be set to zero, and ignored on receipt” text?

— Section 4 —

  This will cause all the PEs in the BD
  to reply Neighbor Solicitations for the IPv6 with Neighbor
  Advertisement messages containing the wrong R and O Flags.

There’s a word missing here after “reply”: I presume the missing word is “to”.
2020-09-08
05 Barry Leiba [Ballot Position Update] New position, No Objection, has been recorded for Barry Leiba
2020-09-08
05 Cindy Morgan Placed on agenda for telechat - 2020-09-24
2020-09-08
05 Martin Vigoureux IESG state changed to IESG Evaluation from Waiting for Writeup
2020-09-08
05 Martin Vigoureux Ballot has been issued
2020-09-08
05 Martin Vigoureux [Ballot Position Update] New position, Yes, has been recorded for Martin Vigoureux
2020-09-08
05 Martin Vigoureux Created "Approve" ballot
2020-09-08
05 Martin Vigoureux Ballot writeup was changed
2020-09-08
05 Wesley Eddy Closed request for Last Call review by TSVART with state 'Overtaken by Events'
2020-09-03
05 Wesley Eddy Assignment of request for Last Call review by TSVART to Brian Trammell was withdrawn
2020-09-01
05 Mališa Vučinić Request for Last Call review by SECDIR Completed: Has Nits. Reviewer: Mališa Vučinić. Sent review to list.
2020-08-28
05 Ralf Weber Request for Last Call review by INTDIR Completed: Ready. Reviewer: Ralf Weber. Sent review to list.
2020-08-28
05 (System) IESG state changed to Waiting for Writeup from In Last Call
2020-08-27
05 (System) IANA Review state changed to IANA OK - Actions Needed from IANA - Review Needed
2020-08-27
05 Sabrina Tanamal
(Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs:

The IANA Functions Operator has completed its review of draft-ietf-bess-evpn-na-flags-05. If any part of this review is inaccurate, please let …
(Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs:

The IANA Functions Operator has completed its review of draft-ietf-bess-evpn-na-flags-05. If any part of this review is inaccurate, please let us know.

The IANA Functions Operator understands that, upon approval of this document, there are two actions which we must complete.

First, in the EVPN Extended Community Sub-Types registry on the Border Gateway Protocol (BGP) Extended Communities registry page located at:

https://www.iana.org/assignments/bgp-extended-communities/

the existing early registration for Sub-Type value 0x08:

Sub-Type Value: 0x08
Name: ND Extended Community

will have the name changed to:

Sub-Type Value: 0x08
Name: ARP/ND Extended Community

and its reference changed to [ RFC-to-be ].

Second, a new registry is to be created called the ARP/ND Extended Community Flags registry. The new registry is to be created on the Border Gateway Protocol (BGP) Extended Communities registry page located at:

https://www.iana.org/assignments/bgp-extended-communities/

The new registry will be managed via Standards Action as defined in RFC8126. There are initial registrations in the new registry as follows:
+---------------+---------------------------------+-----------------+
| Flag position | Name | Reference | +---------------+---------------------------------+-----------------+
| 0-3 | Unassigned | - |
| 4 | Immutable ARP/ND Binding Flag (I) | [ RFC-to-be ] |
| 5 | Unassigned | - |
| 6 | Override Flag (O) | [ RFC-to-be ] |
| 7 | Router Flag (R) | [ RFC-to-be ] |
+---------------+---------------------------------+-----------------+

The IANA Functions Operator understands that these are the only actions required to be completed upon approval of this document.

Note:  The actions requested in this document will not be completed until the document has been approved for publication as an RFC. This message is meant only to confirm the list of actions that will be performed.

Thank you,

Sabrina Tanamal
Senior IANA Services Specialist
2020-08-24
05 Gunter Van de Velde Request for Last Call review by OPSDIR is assigned to Joel Jaeggli
2020-08-24
05 Gunter Van de Velde Request for Last Call review by OPSDIR is assigned to Joel Jaeggli
2020-08-21
05 Tero Kivinen Request for Last Call review by SECDIR is assigned to Mališa Vučinić
2020-08-21
05 Tero Kivinen Request for Last Call review by SECDIR is assigned to Mališa Vučinić
2020-08-18
05 Robert Sparks Request for Last Call review by GENART Completed: Ready with Nits. Reviewer: Robert Sparks. Sent review to list.
2020-08-17
05 Wesley Eddy Request for Last Call review by TSVART is assigned to Brian Trammell
2020-08-17
05 Wesley Eddy Request for Last Call review by TSVART is assigned to Brian Trammell
2020-08-16
05 Min Ye Request for Last Call review by RTGDIR is assigned to IJsbrand Wijnands
2020-08-16
05 Min Ye Request for Last Call review by RTGDIR is assigned to IJsbrand Wijnands
2020-08-15
05 Bernie Volz Request for Last Call review by INTDIR is assigned to Ralf Weber
2020-08-15
05 Bernie Volz Request for Last Call review by INTDIR is assigned to Ralf Weber
2020-08-14
05 Jean Mahoney Request for Last Call review by GENART is assigned to Robert Sparks
2020-08-14
05 Jean Mahoney Request for Last Call review by GENART is assigned to Robert Sparks
2020-08-14
05 Éric Vyncke Requested Last Call review by INTDIR
2020-08-14
05 Amy Vezza IANA Review state changed to IANA - Review Needed
2020-08-14
05 Amy Vezza
The following Last Call announcement was sent out (ends 2020-08-28):

From: The IESG
To: IETF-Announce
CC: matthew.bocci@nokia.com, bess@ietf.org, Matthew Bocci , draft-ietf-bess-evpn-na-flags@ietf.org, …
The following Last Call announcement was sent out (ends 2020-08-28):

From: The IESG
To: IETF-Announce
CC: matthew.bocci@nokia.com, bess@ietf.org, Matthew Bocci , draft-ietf-bess-evpn-na-flags@ietf.org, bess-chairs@ietf.org, martin.vigoureux@nokia.com
Reply-To: last-call@ietf.org
Sender:
Subject: Last Call:  (Propagation of ARP/ND Flags in EVPN) to Proposed Standard


The IESG has received a request from the BGP Enabled ServiceS WG (bess) to
consider the following document: - 'Propagation of ARP/ND Flags in EVPN'
  as Proposed Standard

The IESG plans to make a decision in the next few weeks, and solicits final
comments on this action. Please send substantive comments to the
last-call@ietf.org mailing lists by 2020-08-28. Exceptionally, comments may
be sent to iesg@ietf.org instead. In either case, please retain the beginning
of the Subject line to allow automated sorting.

Abstract


  An EVPN MAC/IP Advertisement route can optionally carry an IPv4 or
  IPv6 addresses associated with a MAC address.  Remote PEs can use
  this information to populate their ARP/ND tables on IRB interfaces or
  their proxy-ARP/ND tables in Broadcast Domains (BD).  PEs can then
  reply locally (act as an ARP/ND proxy) to IPv4 ARP requests and IPv6
  Neighbor Solicitation messages and reduce/suppress the flooding
  produced by the Address Resolution procedure.  However, the
  information conveyed in the MAC/IP route may not be enough for the
  remote PE to reply to local ARP or ND requests.  For example, if a PE
  learns an IPv6->MAC ND entry via EVPN, the PE would not know if that
  particular IPv6->MAC pair belongs to a host, a router or a host with
  an anycast address, as this information is not carried in the EVPN
  MAC/IP Advertisement routes.  Similarly, other information relevant
  to the IP->MAC ARP/ND entries may be needed.  This document defines
  an Extended Community that is advertised along with an EVPN MAC/IP
  Advertisement route and carries information relevant to the ARP/ND
  resolution, so that an EVPN PE implementing a proxy-ARP/ND function
  can reply to ARP Requests or Neighbor Solicitations with the correct
  information.




The file can be obtained via
https://datatracker.ietf.org/doc/draft-ietf-bess-evpn-na-flags/



No IPR declarations have been submitted directly on this I-D.




2020-08-14
05 Amy Vezza IESG state changed to In Last Call from Last Call Requested
2020-08-14
05 Martin Vigoureux Last call was requested
2020-08-14
05 Martin Vigoureux Ballot approval text was generated
2020-08-14
05 Martin Vigoureux Ballot writeup was generated
2020-08-14
05 Martin Vigoureux IESG state changed to Last Call Requested from AD Evaluation::AD Followup
2020-08-14
05 Martin Vigoureux Last call announcement was generated
2020-08-14
05 Martin Vigoureux Requested Last Call review by RTGDIR
2020-07-27
05 (System) Sub state has been changed to AD Followup from Revised ID Needed
2020-07-27
05 Jorge Rabadan New version available: draft-ietf-bess-evpn-na-flags-05.txt
2020-07-27
05 (System) New version accepted (logged-in submitter: Jorge Rabadan)
2020-07-27
05 Jorge Rabadan Uploaded new revision
2019-08-23
04 Martin Vigoureux IESG state changed to AD Evaluation::Revised I-D Needed from Publication Requested
2019-07-09
04 Matthew Bocci
draft-ietf-bess-evpn-na-flags-04

Document Shepherd Write-Up

(1) What type of RFC is being requested (BCP, Proposed Standard,
Internet Standard, Informational, Experimental, or Historic)?  Why
is this the …
draft-ietf-bess-evpn-na-flags-04

Document Shepherd Write-Up

(1) What type of RFC is being requested (BCP, Proposed Standard,
Internet Standard, Informational, Experimental, or Historic)?  Why
is this the proper type of RFC?  Is this type of RFC indicated in the
title page header?

  Standard track.
 
  This is appropriate as the draft describes a new BGP extended community for EVPN
  that contains some flags, which the draft specifies how to use to reduce or
  suppress flooding during address resolution. It therefore contains specific
  protocol details that must be followed for flooding to be reduced in EVPN.

  The intended status is properly indicated.

(2) The IESG approval announcement includes a Document Announcement
Write-Up. Please provide such a Document Announcement Write-Up. Recent
examples can be found in the "Action" announcements for approved
documents. The approval announcement contains the following sections:

Technical Summary

An EVPN MAC/IP Advertisement route can optionally carry an IPv4 or
  IPv6 addresses associated with a MAC address. Remote PEs can use this
  information to reply locally (act as proxy) to IPv4 ARP requests and
  IPv6 Neighbor Solicitation messages and reduce/suppress the flooding
  produced by the Address Resolution procedure. The information
  conveyed in the MAC/IP route may not be enough for the remote PE to
  reply to local ARP or ND requests. For example, if a PE learns an
  IPv6->MAC ND entry via EVPN, the PE would not know if that particular
  IPv6->MAC pair belongs to a host, a router or a host with an anycast
  address, as this information is not carried in the MAC/IP route
  advertisements. Similarly, other information relevant to the IP->MAC
  ARP/ND entries may be needed. This document proposes an OPTIONAL
  extended community that is advertised along with an EVPN MAC/IP
  Advertisement route and carries information relevant to the ARP/ND
  resolution, so that an EVPN PE implementing a proxy-ARP/ND function
  can reply to ARP Requests or Neighbor Solicitations with the correct
  information.

Working Group Summary

  The document was developed to address the desire to minimise flooding of traffic
  associated with address resolution in EVPN. It is particularly important due to the
  large size that EVPN networks can grow to, partucularly in terms of the numbers of CEs
  and hosts. It makes use of some flags in a new BGP extended community to do this.

  There are no IPR declarations on the draft .

     
Document Quality
   
  I have no concerns about the quality of the document. I believe it represents
  WG consensus, and it has been widely reviewed and discussed on the list over a
  number of years.
 
  The document does not specify any MIB changes or additions which would need
  review.

   
Personnel

  The document shepherd is Matthew Bocci (matthew.bocci@nokia.com).
  The responsible Area Director is Martin Vigoureux (martin.vigoureux@nokia.com).

(3) Briefly describe the review of this document that was performed by
the Document Shepherd.  If this version of the document is not ready
for publication, please explain why the document is being forwarded to
the IESG.

  The document shepherd reviewed v03 of the document. I had no significant technical
  comments, but I did make some editorial comments that were resolved in
  version 04.

(4) Does the document Shepherd have any concerns about the depth or
breadth of the reviews that have been performed?

  No concerns. The document has received adequate review. The document has
  been developed within the WG and reviewed over a
  period of a number of IETFs.

(5) Do portions of the document need review from a particular or from
broader perspective, e.g., security, operational complexity, AAA, DNS,
DHCP, XML, or internationalization? If so, describe the review that
took place.

  No further review required.

(6) Describe any specific concerns or issues that the Document Shepherd
has with this document that the Responsible Area Director and/or the
IESG should be aware of? For example, perhaps he or she is uncomfortable
with certain parts of the document, or has concerns whether there really
is a need for it. In any event, if the WG has discussed those issues and
has indicated that it still wishes to advance the document, detail those
concerns here.

  No specific concerns.

(7) Has each author confirmed that any and all appropriate IPR
disclosures required for full conformance with the provisions of BCP 78
and BCP 79 have already been filed. If not, explain why.

  Each author listed in the Authors Addresses section has personally indicated that
  they are not aware of any IPR that has not already been declared in accordance
  with BCP 78 and 79.

(8) Has an IPR disclosure been filed that references this document?
If so, summarize any WG discussion and conclusion regarding the IPR
disclosures.

  There are no IPR declarations on the draft.


 
(9) How solid is the WG consensus behind this document? Does it
represent the strong concurrence of a few individuals, with others
being silent, or does the WG as a whole understand and agree with it?

    I am comfortable that the document represents WG consensus and has
    been reviewed by a reasonable number of active WG participants.
    There were no objections during last call.
   

(10) Has anyone threatened an appeal or otherwise indicated extreme
discontent? If so, please summarise the areas of conflict in separate
email messages to the Responsible Area Director. (It should be in a
separate email because this questionnaire is publicly available.)

  None indicated.

(11) Identify any ID nits the Document Shepherd has found in this
document. (See http://www.ietf.org/tools/idnits/ and the Internet-Drafts
Checklist). Boilerplate checks are not enough; this check needs to be
thorough.

      ID-Nits passes.


(12) Describe how the document meets any required formal review
criteria, such as the MIB Doctor, media type, and URI type reviews.

  There are no relevant formal review criteria.

(13) Have all references within this document been identified as
either normative or informative?

  Yes. All references are explicitly identified as informative or normative.

(14) Are there normative references to documents that are not ready for
advancement or are otherwise in an unclear state? If such normative
references exist, what is the plan for their completion?

  No

(15) Are there downward normative references references (see RFC 3967)?
If so, list these downward references to support the Area Director in the
Last Call procedure.

  No.

(16) Will publication of this document change the status of any
existing RFCs? Are those RFCs listed on the title page header, listed
in the abstract, and discussed in the introduction? If the RFCs are not
listed in the Abstract and Introduction, explain why, and point to the
part of the document where the relationship of this document to the
other RFCs is discussed. If this information is not in the document,
explain why the WG considers it unnecessary.

  This document does not change the status of any existing RFCs.

(17) Describe the Document Shepherd's review of the IANA considerations
section, especially with regard to its consistency with the body of the
document. Confirm that all protocol extensions that the document makes
are associated with the appropriate reservations in IANA registries.
Confirm that any referenced IANA registries have been clearly
identified. Confirm that newly created IANA registries include a
detailed specification of the initial contents for the registry, that
allocations procedures for future registrations are defined, and a
reasonable name for the new registry has been suggested (see RFC 5226).

  The document requests the registration of a new EVPN Extended Community:
  ARP/ND Extended Community. This is already registered by IANA (type 0x08) from
  the EVPN Extended Community registry. However, the name appears to be incorrect in the
  registry (it is named just "ND Extended Community"). This needs to be corrected.
 
  The draft also requests that a registry (ARP/ND Extended Community Flags Octet) be
  created for the flags contained in the ARP/ND Extended Community. The allocation
  procedure requested is standards action.
 
 

(18) List any new IANA registries that require Expert Review for future
allocations. Provide any public guidance that the IESG would find
useful in selecting the IANA Experts for these new registries.

  There are no IANA registries requiring expert review.

(19) Describe reviews and automated checks performed by the Document
Shepherd to validate sections of the document written in a formal
language, such as XML code, BNF rules, MIB definitions, etc.

  There are no sections containing formal language that needs reviewing.
2019-07-09
04 Matthew Bocci Responsible AD changed to Martin Vigoureux
2019-07-09
04 Matthew Bocci IETF WG state changed to Submitted to IESG for Publication from WG Consensus: Waiting for Write-Up
2019-07-09
04 Matthew Bocci IESG state changed to Publication Requested from I-D Exists
2019-07-09
04 Matthew Bocci IESG process started in state Publication Requested
2019-07-09
04 Matthew Bocci Changed consensus to Yes from Unknown
2019-07-09
04 Matthew Bocci Intended Status changed to Proposed Standard from None
2019-07-09
04 Matthew Bocci Tag Doc Shepherd Follow-up Underway cleared.
2019-07-08
04 Matthew Bocci
draft-ietf-bess-evpn-na-flags-04

Document Shepherd Write-Up

(1) What type of RFC is being requested (BCP, Proposed Standard,
Internet Standard, Informational, Experimental, or Historic)?  Why
is this the …
draft-ietf-bess-evpn-na-flags-04

Document Shepherd Write-Up

(1) What type of RFC is being requested (BCP, Proposed Standard,
Internet Standard, Informational, Experimental, or Historic)?  Why
is this the proper type of RFC?  Is this type of RFC indicated in the
title page header?

  Standard track.
 
  This is appropriate as the draft describes a new BGP extended community for EVPN
  that contains some flags, which the draft specifies how to use to reduce or
  suppress flooding during address resolution. It therefore contains specific
  protocol details that must be followed for flooding to be reduced in EVPN.

  The intended status is properly indicated.

(2) The IESG approval announcement includes a Document Announcement
Write-Up. Please provide such a Document Announcement Write-Up. Recent
examples can be found in the "Action" announcements for approved
documents. The approval announcement contains the following sections:

Technical Summary

An EVPN MAC/IP Advertisement route can optionally carry an IPv4 or
  IPv6 addresses associated with a MAC address. Remote PEs can use this
  information to reply locally (act as proxy) to IPv4 ARP requests and
  IPv6 Neighbor Solicitation messages and reduce/suppress the flooding
  produced by the Address Resolution procedure. The information
  conveyed in the MAC/IP route may not be enough for the remote PE to
  reply to local ARP or ND requests. For example, if a PE learns an
  IPv6->MAC ND entry via EVPN, the PE would not know if that particular
  IPv6->MAC pair belongs to a host, a router or a host with an anycast
  address, as this information is not carried in the MAC/IP route
  advertisements. Similarly, other information relevant to the IP->MAC
  ARP/ND entries may be needed. This document proposes an OPTIONAL
  extended community that is advertised along with an EVPN MAC/IP
  Advertisement route and carries information relevant to the ARP/ND
  resolution, so that an EVPN PE implementing a proxy-ARP/ND function
  can reply to ARP Requests or Neighbor Solicitations with the correct
  information.

Working Group Summary

  The document was developed to address the desire to minimise flooding of traffic
  associated with address resolution in EVPN. It is particularly important due to the
  large size that EVPN networks can grow to, partucularly in terms of the numbers of CEs
  and hosts. It makes use of some flags in a new BGP extended community to do this.

  There are no IPR declarations on the draft .

     
Document Quality
   
  I have no concerns about the quality of the document. I believe it represents
  WG consensus, and it has been widely reviewed and discussed on the list over a
  number of years.
 
  The document does not specify any MIB changes or additions which would need
  review.

   
Personnel

  The document shepherd is Matthew Bocci (matthew.bocci@nokia.com).
  The responsible Area Director is Martin Vigoureux (martin.vigoureux@nokia.com).

(3) Briefly describe the review of this document that was performed by
the Document Shepherd.  If this version of the document is not ready
for publication, please explain why the document is being forwarded to
the IESG.

  The document shepherd reviewed v03 of the document. I had no significant technical
  comments, but I did make some editorial comments that were resolved in
  version 04.

(4) Does the document Shepherd have any concerns about the depth or
breadth of the reviews that have been performed?

  No concerns. The document has received adequate review. The document has
  been developed within the WG and reviewed over a
  period of a number of IETFs.

(5) Do portions of the document need review from a particular or from
broader perspective, e.g., security, operational complexity, AAA, DNS,
DHCP, XML, or internationalization? If so, describe the review that
took place.

  No further review required.

(6) Describe any specific concerns or issues that the Document Shepherd
has with this document that the Responsible Area Director and/or the
IESG should be aware of? For example, perhaps he or she is uncomfortable
with certain parts of the document, or has concerns whether there really
is a need for it. In any event, if the WG has discussed those issues and
has indicated that it still wishes to advance the document, detail those
concerns here.

  No specific concerns.

(7) Has each author confirmed that any and all appropriate IPR
disclosures required for full conformance with the provisions of BCP 78
and BCP 79 have already been filed. If not, explain why.

  Each author listed in the Authors Addresses section has personally indicated that
  they are not aware of any IPR that has not already been declared in accordance
  with BCP 78 and 79.

(8) Has an IPR disclosure been filed that references this document?
If so, summarize any WG discussion and conclusion regarding the IPR
disclosures.

  There are no IPR declarations on the draft.


 
(9) How solid is the WG consensus behind this document? Does it
represent the strong concurrence of a few individuals, with others
being silent, or does the WG as a whole understand and agree with it?

    I am comfortable that the document represents WG consensus and has
    been reviewed by a reasonable number of active WG participants.
    There were no objections during last call.
   

(10) Has anyone threatened an appeal or otherwise indicated extreme
discontent? If so, please summarise the areas of conflict in separate
email messages to the Responsible Area Director. (It should be in a
separate email because this questionnaire is publicly available.)

  None indicated.

(11) Identify any ID nits the Document Shepherd has found in this
document. (See http://www.ietf.org/tools/idnits/ and the Internet-Drafts
Checklist). Boilerplate checks are not enough; this check needs to be
thorough.

      ID-Nits passes.


(12) Describe how the document meets any required formal review
criteria, such as the MIB Doctor, media type, and URI type reviews.

  There are no relevant formal review criteria.

(13) Have all references within this document been identified as
either normative or informative?

  Yes. All references are explicitly identified as informative or normative.

(14) Are there normative references to documents that are not ready for
advancement or are otherwise in an unclear state? If such normative
references exist, what is the plan for their completion?

  No

(15) Are there downward normative references references (see RFC 3967)?
If so, list these downward references to support the Area Director in the
Last Call procedure.

  No.

(16) Will publication of this document change the status of any
existing RFCs? Are those RFCs listed on the title page header, listed
in the abstract, and discussed in the introduction? If the RFCs are not
listed in the Abstract and Introduction, explain why, and point to the
part of the document where the relationship of this document to the
other RFCs is discussed. If this information is not in the document,
explain why the WG considers it unnecessary.

  This document does not change the status of any existing RFCs.

(17) Describe the Document Shepherd's review of the IANA considerations
section, especially with regard to its consistency with the body of the
document. Confirm that all protocol extensions that the document makes
are associated with the appropriate reservations in IANA registries.
Confirm that any referenced IANA registries have been clearly
identified. Confirm that newly created IANA registries include a
detailed specification of the initial contents for the registry, that
allocations procedures for future registrations are defined, and a
reasonable name for the new registry has been suggested (see RFC 5226).

  The document requests the registration of a new EVPN Extended Community:
  ARP/ND Extended Community. This is already registered by IANA (type 0x08) from
  the EVPN Extended Community registry. However, the name appears to be incorrect in the
  registry (it is named just "ND Extended Community"). This needs to be corrected.
 
  The draft also requests that a registry (ARP/ND Extended Community Flags Octet) be
  created for the flags contained in the ARP/ND Extended Community. The allocation
  procedure requested is standards action.
 
 

(18) List any new IANA registries that require Expert Review for future
allocations. Provide any public guidance that the IESG would find
useful in selecting the IANA Experts for these new registries.

  There are no IANA registries requiring expert review.

(19) Describe reviews and automated checks performed by the Document
Shepherd to validate sections of the document written in a formal
language, such as XML code, BNF rules, MIB definitions, etc.

  There are no sections containing formal language that needs reviewing.
2019-07-08
04 Matthew Bocci Tag Doc Shepherd Follow-up Underway set.
2019-07-08
04 Matthew Bocci IETF WG state changed to WG Consensus: Waiting for Write-Up from WG Document
2019-07-03
04 Jorge Rabadan New version available: draft-ietf-bess-evpn-na-flags-04.txt
2019-07-03
04 (System) New version approved
2019-07-03
04 (System) Request for posting confirmation emailed to previous authors: Kiran Nagaraj , Jorge Rabadan , Senthil Sathappan , Wen Lin
2019-07-03
04 Jorge Rabadan Uploaded new revision
2019-04-25
03 Jorge Rabadan New version available: draft-ietf-bess-evpn-na-flags-03.txt
2019-04-25
03 (System) New version approved
2019-04-25
03 (System) Request for posting confirmation emailed to previous authors: Kiran Nagaraj , bess-chairs@ietf.org, Jorge Rabadan , Senthil Sathappan
2019-04-25
03 Jorge Rabadan Uploaded new revision
2019-04-22
02 (System) Document has expired
2018-10-19
02 Jorge Rabadan New version available: draft-ietf-bess-evpn-na-flags-02.txt
2018-10-19
02 (System) New version approved
2018-10-19
02 (System) Request for posting confirmation emailed to previous authors: Kiran Nagaraj , Jorge Rabadan , Senthil Sathappan
2018-10-19
02 Jorge Rabadan Uploaded new revision
2018-10-11
01 (System) Document has expired
2018-08-16
01 Matthew Bocci Notification list changed to Matthew Bocci <matthew.bocci@nokia.com>
2018-08-16
01 Matthew Bocci Document shepherd changed to Matthew Bocci
2018-04-09
01 Jorge Rabadan New version available: draft-ietf-bess-evpn-na-flags-01.txt
2018-04-09
01 (System) New version approved
2018-04-09
01 (System) Request for posting confirmation emailed to previous authors: Kiran Nagaraj , Jorge Rabadan , Senthil Sathappan
2018-04-09
01 Jorge Rabadan Uploaded new revision
2017-11-23
00 Martin Vigoureux This document now replaces draft-snr-bess-evpn-na-flags instead of None
2017-10-04
00 Jorge Rabadan New version available: draft-ietf-bess-evpn-na-flags-00.txt
2017-10-04
00 (System) WG -00 approved
2017-09-30
00 Jorge Rabadan Set submitter to "Jorge Rabadan ", replaces to (none) and sent approval email to group chairs: bess-chairs@ietf.org
2017-09-30
00 Jorge Rabadan Uploaded new revision