Bidirectional Forwarding Detection (BFD) Management Information Base
draft-ietf-bfd-mib-22
Revision differences
Document history
Date | Rev. | By | Action |
---|---|---|---|
2014-08-12
|
22 | (System) | RFC Editor state changed to AUTH48-DONE from AUTH48 |
2014-07-31
|
22 | (System) | RFC Editor state changed to AUTH48 from RFC-EDITOR |
2014-07-28
|
22 | (System) | RFC Editor state changed to RFC-EDITOR from REF |
2014-07-16
|
22 | (System) | RFC Editor state changed to REF from RFC-EDITOR |
2014-07-09
|
22 | (System) | RFC Editor state changed to RFC-EDITOR from EDIT |
2014-06-10
|
22 | (System) | IANA Action state changed to RFC-Ed-Ack from Waiting on RFC Editor |
2014-06-09
|
22 | (System) | IANA Action state changed to Waiting on RFC Editor from Waiting on Authors |
2014-06-06
|
22 | Amy Vezza | IESG state changed to RFC Ed Queue from Approved-announcement sent |
2014-06-06
|
22 | (System) | RFC Editor state changed to EDIT |
2014-06-06
|
22 | (System) | Announcement was received by RFC Editor |
2014-06-06
|
22 | (System) | IANA Action state changed to Waiting on Authors from Waiting on RFC Editor |
2014-06-06
|
22 | (System) | IANA Action state changed to Waiting on RFC Editor from Waiting on Authors |
2014-06-06
|
22 | (System) | IANA Action state changed to Waiting on Authors from In Progress |
2014-06-06
|
22 | (System) | IANA Action state changed to In Progress |
2014-06-06
|
22 | Amy Vezza | IESG state changed to Approved-announcement sent from Approved-announcement to be sent |
2014-06-06
|
22 | Amy Vezza | IESG has approved the document |
2014-06-06
|
22 | Amy Vezza | Closed "Approve" ballot |
2014-06-06
|
22 | Amy Vezza | Ballot approval text was generated |
2014-06-06
|
22 | Adrian Farrel | Ballot writeup was changed |
2014-06-06
|
22 | Adrian Farrel | IESG state changed to Approved-announcement to be sent from IESG Evaluation::AD Followup |
2014-06-06
|
22 | Adrian Farrel | IESG state changed to IESG Evaluation::AD Followup from Approved-announcement to be sent |
2014-06-06
|
22 | Adrian Farrel | IESG state changed to Approved-announcement to be sent from IESG Evaluation::AD Followup |
2014-06-06
|
22 | Stephen Farrell | [Ballot Position Update] Position for Stephen Farrell has been changed to No Objection from Discuss |
2014-06-04
|
22 | (System) | Sub state has been changed to AD Followup from Revised ID Needed |
2014-06-04
|
22 | Nobo Akiya | New version available: draft-ietf-bfd-mib-22.txt |
2014-06-02
|
21 | Gunter Van de Velde | Closed request for Last Call review by OPSDIR with state 'No Response' |
2014-05-30
|
21 | Adrian Farrel | IESG state changed to IESG Evaluation::Revised I-D Needed from IESG Evaluation::AD Followup |
2014-05-30
|
21 | (System) | Sub state has been changed to AD Followup from Revised ID Needed |
2014-05-30
|
21 | Thomas Nadeau | IANA Review state changed to Version Changed - Review Needed from IANA OK - Actions Needed |
2014-05-30
|
21 | Thomas Nadeau | New version available: draft-ietf-bfd-mib-21.txt |
2014-05-29
|
20 | Cindy Morgan | IESG state changed to IESG Evaluation::Revised I-D Needed from IESG Evaluation |
2014-05-28
|
20 | Richard Barnes | [Ballot comment] The document says it doesn't create a compliance requirement for v0. Does it define a compliance requirement for v1? Should this document update … [Ballot comment] The document says it doesn't create a compliance requirement for v0. Does it define a compliance requirement for v1? Should this document update that RFC? |
2014-05-28
|
20 | Richard Barnes | [Ballot Position Update] New position, No Objection, has been recorded for Richard Barnes |
2014-05-28
|
20 | Benoît Claise | [Ballot comment] In particular, it describes managed objects to configure and/or monitor Bidirectional Forwarding Detection for [RFC5880], [RFC5881], … [Ballot comment] In particular, it describes managed objects to configure and/or monitor Bidirectional Forwarding Detection for [RFC5880], [RFC5881], [RFC5883] and [RFC7130], BFD versions 0 and/or 1, on devices supporting this feature. bfdSessVersionNumber OBJECT-TYPE SYNTAX Unsigned32 (0..7) MAX-ACCESS read-create STATUS current DESCRIPTION "The version number of the BFD protocol that this session is running in. Write access is available for this object to provide ability to set desired version for this BFD session." So the MIB module is for BFD version 0 and 1, but I can set the version to [0..7]. What does it mean to set the value to 6? What is the likelihood that version [2..7] have the exact same set of arguments? So anyway we would need an updated MIB module. Discussing this matter with Bert Wijnen, a proposal would be to add to the description clause that only valid versions as supported by the implementation can be accepted. Others would return an error. And finally, valid question from Bert: if you prepare for the future, why limit this to max version 7, and not 256? |
2014-05-28
|
20 | Benoît Claise | [Ballot Position Update] New position, No Objection, has been recorded for Benoit Claise |
2014-05-28
|
20 | Kathleen Moriarty | [Ballot comment] I like the wording proposed by Adrian to address Stephen's DISCUSS, that I support. |
2014-05-28
|
20 | Kathleen Moriarty | [Ballot Position Update] New position, No Objection, has been recorded for Kathleen Moriarty |
2014-05-28
|
20 | Jari Arkko | [Ballot Position Update] New position, No Objection, has been recorded for Jari Arkko |
2014-05-27
|
20 | Alia Atlas | [Ballot Position Update] New position, No Objection, has been recorded for Alia Atlas |
2014-05-27
|
20 | Martin Stiemerling | [Ballot Position Update] New position, No Objection, has been recorded for Martin Stiemerling |
2014-05-26
|
20 | Spencer Dawkins | [Ballot Position Update] New position, No Objection, has been recorded for Spencer Dawkins |
2014-05-26
|
20 | Alissa Cooper | [Ballot comment] Section 6: "Even if the network itself is secure "for example by using IPSec", even then, there is no control as to … [Ballot comment] Section 6: "Even if the network itself is secure "for example by using IPSec", even then, there is no control as to who on the secure network is allowed to access and GET/SET "read/change/create/delete" the objects in these MIB modules." I don't understand what is being quoted here. Also, I think what is meant here is that IPSec itself does not provide access control, not that "there is no control." I would suggest something like: Even if IPSec is used to secure network traffic, it does not provide control over who on the network is allowed to access and GET/SET "read/change/create/delete" the objects in these MIB modules. "It is RECOMMENDED that implementers consider the security features as provided by the SNMPv3 framework (see [RFC3410], section 8), including full support for the SNMPv3 cryptographic mechanisms "for authentication and privacy"." Again I don't understand what is being quoted here. |
2014-05-26
|
20 | Alissa Cooper | [Ballot Position Update] New position, No Objection, has been recorded for Alissa Cooper |
2014-05-26
|
20 | Stephen Farrell | [Ballot discuss] I'm not sure if a text change will be needed for this discuss or not, I'd like to understand it better before I'd … [Ballot discuss] I'm not sure if a text change will be needed for this discuss or not, I'd like to understand it better before I'd suggest one in any case. The security considerations says: "The bfdSessAuthenticationType, bfdSessAuthenticationKeyID, and bfdSessAuthenticationKey objects hold security methods and associated security keys of BFD sessions. These objects SHOULD be considered highly sensitive objects. In order to prevent this sensitive information from being improperly accessed, implementers MAY disallow access to these objects." I don't understand why these SHOULD (and not MUST) be considered highly sensitive - maybe that's just me not knowing enough about MIBs though - what's the logic there? Allowing access to a cleartext key that can then by used to muck with routing seems like a bad plan in all cases. Also, if you said they MUST be considered highly sensitive can you say what that'd mean in practice that's different from the current SHOULD? (Maybe the MAY in the 2nd sentence would change?) Finally, if you keep the SHOULD, then what is the counterexample that justifies the SHOULD rather than a MUST? |
2014-05-26
|
20 | Stephen Farrell | [Ballot comment] I didn't quite get the meaning of this: "The Authentication Type used for this BFD session. This field is valid only when the … [Ballot comment] I didn't quite get the meaning of this: "The Authentication Type used for this BFD session. This field is valid only when the Authentication Present bit is set. Max-access to this object as well as other authentication related objects are set to read-create in order to support management of a single key ID at a time, key rotation is not handled. Key update in practice must be done by atomic update using a set containing all affected objects in the same varBindList or otherwise risk the session dropping." That's in the definition of bfdSessAuthenticationType. Can you explain? (Its probably just my ignorance of SNMP though;-) |
2014-05-26
|
20 | Stephen Farrell | [Ballot Position Update] New position, Discuss, has been recorded for Stephen Farrell |
2014-05-24
|
20 | Joel Jaeggli | [Ballot comment] mib doctors seem to think this is fine. |
2014-05-24
|
20 | Joel Jaeggli | [Ballot Position Update] New position, No Objection, has been recorded for Joel Jaeggli |
2014-05-23
|
20 | Brian Haberman | [Ballot Position Update] New position, No Objection, has been recorded for Brian Haberman |
2014-05-22
|
20 | David Black | Request for Telechat review by GENART Completed: Ready. Reviewer: David Black. |
2014-05-22
|
20 | Jean Mahoney | Request for Telechat review by GENART is assigned to David Black |
2014-05-22
|
20 | Jean Mahoney | Request for Telechat review by GENART is assigned to David Black |
2014-05-15
|
20 | Tero Kivinen | Request for Last Call review by SECDIR Completed: Ready. Reviewer: Tero Kivinen. |
2014-05-14
|
20 | Barry Leiba | [Ballot Position Update] New position, No Objection, has been recorded for Barry Leiba |
2014-05-12
|
20 | (System) | IANA Review state changed to IANA OK - Actions Needed from Version Changed - Review Needed |
2014-05-12
|
20 | Adrian Farrel | IESG state changed to IESG Evaluation from Waiting for AD Go-Ahead::Point Raised - writeup needed |
2014-05-12
|
20 | Adrian Farrel | Ballot has been issued |
2014-05-12
|
20 | Adrian Farrel | [Ballot Position Update] New position, Yes, has been recorded for Adrian Farrel |
2014-05-12
|
20 | Adrian Farrel | Created "Approve" ballot |
2014-05-11
|
20 | Nobo Akiya | New version available: draft-ietf-bfd-mib-20.txt |
2014-05-09
|
19 | Adrian Farrel | Removed telechat returning item indication |
2014-05-09
|
19 | Adrian Farrel | Telechat date has been changed to 2014-05-29 from 2014-05-15 |
2014-05-09
|
19 | David Black | Request for Telechat review by GENART Completed: Ready. Reviewer: David Black. |
2014-05-08
|
19 | Jean Mahoney | Request for Telechat review by GENART is assigned to David Black |
2014-05-08
|
19 | Jean Mahoney | Request for Telechat review by GENART is assigned to David Black |
2014-04-29
|
19 | Nobo Akiya | New version available: draft-ietf-bfd-mib-19.txt |
2014-04-28
|
18 | Adrian Farrel | Pending Routing Directorate review |
2014-04-28
|
18 | Adrian Farrel | IESG state changed to Waiting for AD Go-Ahead::Point Raised - writeup needed from Waiting for AD Go-Ahead |
2014-04-28
|
18 | Nobo Akiya | IANA Review state changed to Version Changed - Review Needed from IANA OK - Actions Needed |
2014-04-28
|
18 | Nobo Akiya | New version available: draft-ietf-bfd-mib-18.txt |
2014-04-28
|
17 | Adrian Farrel | Placed on agenda for telechat - 2014-05-15 |
2014-04-28
|
17 | Adrian Farrel | Changed consensus to Yes from Unknown |
2014-04-28
|
17 | Adrian Farrel | Ballot writeup was changed |
2014-04-28
|
17 | (System) | IESG state changed to Waiting for AD Go-Ahead from In Last Call |
2014-04-22
|
17 | (System) | IANA Review state changed to IANA OK - Actions Needed from IANA - Review Needed |
2014-04-22
|
17 | Amanda Baber | IESG/Authors/WG Chairs: IANA has reviewed draft-ietf-bfd-mib-17. Authors should review the comments and/or questions below. Please report any inaccuracies and respond to any questions as soon … IESG/Authors/WG Chairs: IANA has reviewed draft-ietf-bfd-mib-17. Authors should review the comments and/or questions below. Please report any inaccuracies and respond to any questions as soon as possible. IANA's reviewer has the following comments/questions: IANA understands that, upon approval of this document, there is a single action which IANA must complete. In the SMI Network Management MGMT Codes Internet-standard MIB registry in the Network Management Parameters registry located at: http://www.iana.org/assignments/smi-numbers a new MIB will be registered as follows: Decimal: [ TBD by IANA at time of registration ] Name: bfdMIB Description: Bidirectional Forwarding References: [ RFC-to-be ] IANA understands this to be the only action required of IANA upon approval of this document. IANA requests that the IANA Considerations section of the document remain in place upon publication. Note: The actions requested in this document will not be completed until the document has been approved for publication as an RFC. This message is only to confirm what actions will be performed. |
2014-04-18
|
17 | Gunter Van de Velde | Request for Last Call review by OPSDIR is assigned to Bernard Aboba |
2014-04-18
|
17 | Gunter Van de Velde | Request for Last Call review by OPSDIR is assigned to Bernard Aboba |
2014-04-17
|
17 | David Black | Request for Last Call review by GENART Completed: On the Right Track. Reviewer: David Black. |
2014-04-17
|
17 | Tero Kivinen | Request for Last Call review by SECDIR is assigned to Tero Kivinen |
2014-04-17
|
17 | Tero Kivinen | Request for Last Call review by SECDIR is assigned to Tero Kivinen |
2014-04-16
|
17 | Jean Mahoney | Request for Last Call review by GENART is assigned to David Black |
2014-04-16
|
17 | Jean Mahoney | Request for Last Call review by GENART is assigned to David Black |
2014-04-16
|
17 | Jean Mahoney | Closed request for Last Call review by GENART with state 'Withdrawn' |
2014-04-16
|
17 | Jean Mahoney | Request for Last Call review by GENART is assigned to Ben Campbell |
2014-04-16
|
17 | Jean Mahoney | Request for Last Call review by GENART is assigned to Ben Campbell |
2014-04-14
|
17 | Amy Vezza | IANA Review state changed to IANA - Review Needed |
2014-04-14
|
17 | Amy Vezza | The following Last Call announcement was sent out: From: The IESG To: IETF-Announce CC: Reply-To: ietf@ietf.org Sender: Subject: Last Call: (BFD Management Information Base) to … The following Last Call announcement was sent out: From: The IESG To: IETF-Announce CC: Reply-To: ietf@ietf.org Sender: Subject: Last Call: (BFD Management Information Base) to Proposed Standard The IESG has received a request from the Bidirectional Forwarding Detection WG (bfd) to consider the following document: - 'BFD Management Information Base' as Proposed Standard The IESG plans to make a decision in the next few weeks, and solicits final comments on this action. Please send substantive comments to the ietf@ietf.org mailing lists by 2014-04-28. Exceptionally, comments may be sent to iesg@ietf.org instead. In either case, please retain the beginning of the Subject line to allow automated sorting. Abstract This draft defines a portion of the Management Information Base (MIB) for use with network management protocols in the Internet community. In particular, it describes managed objects for modeling Bidirectional Forwarding Detection (BFD) protocol. The file can be obtained via http://datatracker.ietf.org/doc/draft-ietf-bfd-mib/ IESG discussion can be tracked via http://datatracker.ietf.org/doc/draft-ietf-bfd-mib/ballot/ No IPR declarations have been submitted directly on this I-D. |
2014-04-14
|
17 | Amy Vezza | IESG state changed to In Last Call from Last Call Requested |
2014-04-14
|
17 | Adrian Farrel | Last call was requested |
2014-04-14
|
17 | Adrian Farrel | Ballot approval text was generated |
2014-04-14
|
17 | Adrian Farrel | IESG state changed to Last Call Requested from AD Evaluation::AD Followup |
2014-04-14
|
17 | Adrian Farrel | Last call announcement was changed |
2014-04-14
|
17 | Adrian Farrel | Last call announcement was generated |
2014-04-14
|
17 | Adrian Farrel | Ballot writeup was changed |
2014-04-14
|
17 | (System) | Sub state has been changed to AD Followup from Revised ID Needed |
2014-04-14
|
17 | Nobo Akiya | New version available: draft-ietf-bfd-mib-17.txt |
2013-12-30
|
16 | Adrian Farrel | AD review ======= Hi authors of draft-ietf-bfd-mib, I have done my usual AD review after receiving a publication request. The purpose of the review … AD review ======= Hi authors of draft-ietf-bfd-mib, I have done my usual AD review after receiving a publication request. The purpose of the review is to catch issues that would show up during IETF last call or IESG review and so save the reviewers some time and get the quality up to a level that is acceptable. This document represents a lot of work: thank you. The issues I have found are relatively small. Some of them take the form of questions and you can answer these with email rather than feeling compelled to make documentation changes. Furthermore, all of the issues are open for discussion. I will put the document into "Revised I-D" state and wait to hear back from you. Thanks, Adrian === You'll obviously want to make updates to accommodate changes to draft-ietf-bfd-tc-mib --- Tom may want to change his coordinates. --- Could you swap sections 1 and 2 so that the document starts with the Introduction. --- Section 2 s/an portion/a portion/ --- Section 4.4 I don't think the table maps a discriminator to a TC. Maybe it maps the discriminator to the session or the session index or something. The same thing shows up in some of the Description clauses, for example, bfdSessDiscMapTable --- Similarly 4.5 --- It is nice if you name the RFCs in comments next to the import clauses. --- If I am creating an entry in bfdSessTable (and it seems that I can since most of the objects are read-create) how do I know what value to pick for bfdSessIndex? A way to handle this is through a "next available index" global object. --- bfdAdminStatus is ambiguous! Does setting bfdSessAdminStatus to "start" mean that the session is up or only that the implementation will attempt to bring it up? The normal approach is to have adminStatus described as "the desired operational status" and a separate object reports the actual operStatus. Since you have bfdSessOperMode, I think this is your intention. --- bfdSessState and bfdSessRemoteHeardFlag are read-only. What does it mean to have default values? --- Doesn't bfdSessMultipointFlag need a reference to the document that defines multipoint BFD? If so, doesn't that create a normative reference gate for this MIB module? That means you either take multipoint out or you will have to wait until it completes the process. --- You appear to have two mechanisms to turn off GTSM bfdSessGTSM OBJECT-TYPE SYNTAX TruthValue DESCRIPTION "Setting the value of this object to true(1) will enable GTSM protection of the BFD session. ... So presumably setting it to false will disable GTSM. But... bfdSessGTSMTTL OBJECT-TYPE SYNTAX Unsigned32 (0..255) DESCRIPTION The value of zero(0) indicates that bfdSessGTSM is disabled." --- bfdSessAuthPresFlag has a default of false indicating that no authentication is to be used. And bfdSessAuthenticationType has a default of -1 meaning no authentication is in use. Doesn't that mean that the default for bfdSessGTSM should be true and the default for bfdSessGTSMTTL should be non-zero? --- Why don't objects like bfdSessDesiredMinTxInterval have default values? --- Shouldn't the default for bfdSessAuthenticationType be noAuthentication not -1? --- I am unsure about how the three objects for authentication work. bfdSessAuthenticationType and bfdSessAuthenticationKeyID say that they must be -1 if bfdSessAuthPresFlag is false. Now, suppose I want to turn on authentication. I want to set bfdSessAuthPresFlag to true, but if I do, the settings of bfdSessAuthenticationType and bfdSessAuthenticationKeyID are bogus. But if I want to set bfdSessAuthenticationType and bfdSessAuthenticationKeyID to real values in preparation to setting bfdSessAuthPresFlag to true then I will have broken the rule. The only option appears to set all three objects at once (which is possible only depending on implementation). --- I'm surprised that entries in bfdSessDiscMapTable are writeable. That is to say, that bfdSessDiscMapStorageType and bfdSessDiscMapRowStatus exist and are writeable. Surely this table is automatic and entries an artifice of entries in bfdSessTable. Why would you want an entry in this table to have a different storage type or row status from those in bfdSessTable? What does it mean that those two objects are creatable? Does it mean that you can create an entry in this table without knowing the value of bfdSessDiscMapIndex which is automatic? Same questions about bfdSessIpMapTable --- The Security section says... The bfdSessAuthenticationType, bfdSessAuthenticationKeyID, and bfdSessAuthenticationKey objects hold security methods and associated security keys of BFD sessions. These objects SHOULD be considered highly sensitive objects. In order for these sensitive information from being improperly accessed, implementers MAY wish to disallow read and create access to these objects. You don't want to prevent write access as well? But note that preventing read access is pretty much not having the object. So why *do* you have the objects and then suggest not providing any access to them? |
2013-12-30
|
16 | Adrian Farrel | State changed to AD Evaluation::Revised I-D Needed from AD Evaluation |
2013-12-28
|
16 | Adrian Farrel | Ballot writeup was changed |
2013-12-28
|
16 | Adrian Farrel | Ballot writeup was generated |
2013-12-28
|
16 | Adrian Farrel | State changed to AD Evaluation from Publication Requested |
2013-11-30
|
16 | Jeffrey Haas | : Document Writeup : : As required by RFC 4858, this is the current template for the Document : Shepherd Write-Up. : : Changes … : Document Writeup : : As required by RFC 4858, this is the current template for the Document : Shepherd Write-Up. : : Changes are expected over time. This version is dated 24 February 2012. : : (1) What type of RFC is being requested (BCP, Proposed Standard, : Internet Standard, Informational, Experimental, or Historic)? Why : is this the proper type of RFC? Is this type of RFC indicated in the : title page header? Proposed Standard. The draft meets the criteria in RFC 2026, Sec. 4.1.1. The type is properly indicated in the title page header. : (2) The IESG approval announcement includes a Document Announcement : Write-Up. Please provide such a Document Announcement Write-Up. Recent : examples can be found in the "Action" announcements for approved : documents. The approval announcement contains the following sections: : Technical Summary This memo defines an portion of the Management Information Base (MIB) for use with network management protocols in the Internet community. In particular, it describes managed objects to configure and/or monitor Bi-Directional Forwarding Detection for [RFC5880], [RFC5881] and [RFC5883], BFD versions 0 and/or 1, on devices supporting this feature. Working Group Summary This document received commentary from multiple individuals that have had prior SNMP MIB authoring and implementation experience. The document was also reviewed in the context of additional BFD work besides providing base MIB functionality for the above RFCs. This includes BFD multi-point, BFD over LAG. It also has been reviewed as being the basis MIB for the BFD MPLS MIB. Document Quality As is typical with MIB documents, several vendors implement the contents of the BFD MIB in various enterprise MIBs with greater or lesser attention paid to the exact structure of this document. MIBs are seldom fully finished at vendors until the publication of the MIB as an RFC wherein all the code points are finalized with IANA and other authorities. In particular, the Textual-Convention draft covers various TCs that do not share consistent implementations across the vendors. By publishing an RFC, these code points will become normalized across the vendors. Being a MIB document, review by the MIB doctors is always appreciated. Personnel Document Shepherd: Jeffrey Haas Responsible AD: Adrian Farrel : (3) Briefly describe the review of this document that was performed by : the Document Shepherd. If this version of the document is not ready : for publication, please explain why the document is being forwarded to : the IESG. I reviewed the MIB documents for structural and language content multiple times throughout their life cycle. Additionally, I also requested targeted review of the contents and structure with interested reviewers at the Berlin IETF. : (4) Does the document Shepherd have any concerns about the depth or : breadth of the reviews that have been performed? No concerns. : (5) Do portions of the document need review from a particular or from : broader perspective, e.g., security, operational complexity, AAA, DNS, : DHCP, XML, or internationalization? If so, describe the review that : took place. While there has been a general distancing of MIBs from write-capable behaviors within the IETF routing area, this MIB does contain objects that are read-create. Unlike other far more complex protocols, basic BFD is simple enough from a data modeling standpoint that the MIB can potentially be used to provision BFD using SNMP. As such, this does warrant additional review from both a security and operational complexity perspective. As is typical with routing protocol components, particularly those used for OAM functionality, BFD is not terribly useful in a standalone environment. It is thus expected that while the protocol can be provisioned using the read-create objects within the MIB that many environments would not be able to fully take advantage of such a provisioning system due inter-protocol, and thus inter-MIB table dependencies. This, however, is not a deficiency of this MIB but rather a well known issue of the MIB ecosystem. : (6) Describe any specific concerns or issues that the Document Shepherd : has with this document that the Responsible Area Director and/or the : IESG should be aware of? For example, perhaps he or she is uncomfortable : with certain parts of the document, or has concerns whether there really : is a need for it. In any event, if the WG has discussed those issues and : has indicated that it still wishes to advance the document, detail those : concerns here. I have no ongoing concerns. : (7) Has each author confirmed that any and all appropriate IPR : disclosures required for full conformance with the provisions of BCP 78 : and BCP 79 have already been filed. If not, explain why. All 3 authors have positively affirmed that they have done all necessary IPR disclosures - there are none. : (8) Has an IPR disclosure been filed that references this document? : If so, summarize any WG discussion and conclusion regarding the IPR : disclosures. No IPR has been filed and all authors affirm there is no IPR attached to this document. : (9) How solid is the WG consensus behind this document? Does it : represent the strong concurrence of a few individuals, with others : being silent, or does the WG as a whole understand and agree with it? For a MIB, this document has received substantial review by the working group. The WG has consensus that this document should be published. : (10) Has anyone threatened an appeal or otherwise indicated extreme : discontent? If so, please summarise the areas of conflict in separate : email messages to the Responsible Area Director. (It should be in a : separate email because this questionnaire is publicly available.) No appeals have been threatened and discontent has been confined to minor concerns about future MIBs that may need to be based upon this base MIB. Those concerns appear to have been addressed as partof WGLC comments. : (11) Identify any ID nits the Document Shepherd has found in this : document. (See http://www.ietf.org/tools/idnits/ and the Internet-Drafts : Checklist). Boilerplate checks are not enough; this check needs to be : thorough. The ID-nits tool has run clean on the MIB drafts. : (12) Describe how the document meets any required formal review : criteria, such as the MIB Doctor, media type, and URI type reviews. MIB Doctor review has not yet been done. : (13) Have all references within this document been identified as : either normative or informative? They have. : (14) Are there normative references to documents that are not ready for : advancement or are otherwise in an unclear state? If such normative : references exist, what is the plan for their completion? All normative references are currently published RFCs. For the base BFD MIB, the remaining normative reference is the TC MIB, also being submitted for publication with the base MIB. : (15) Are there downward normative references references (see RFC 3967)? : If so, list these downward references to support the Area Director in : the Last Call procedure. No. : (16) Will publication of this document change the status of any : existing RFCs? Are those RFCs listed on the title page header, listed : in the abstract, and discussed in the introduction? If the RFCs are not : listed in the Abstract and Introduction, explain why, and point to the : part of the document where the relationship of this document to the : other RFCs is discussed. If this information is not in the document, : explain why the WG considers it unnecessary. No. : (17) Describe the Document Shepherd's review of the IANA considerations : section, especially with regard to its consistency with the body of the : document. Confirm that all protocol extensions that the document makes : are associated with the appropriate reservations in IANA registries. : Confirm that any referenced IANA registries have been clearly : identified. Confirm that newly created IANA registries include a : detailed specification of the initial contents for the registry, that : allocations procedures for future registrations are defined, and a : reasonable name for the new registry has been suggested (see RFC 5226). The documents were reviewed after WGLC to request IANA to adopt these as IANA maintained MIBs. An additional short WGLC-bis was requested to double check the resulting object and TC renames. : (18) List any new IANA registries that require Expert Review for future : allocations. Provide any public guidance that the IESG would find : useful in selecting the IANA Experts for these new registries. In the base BFD MIB, no additional registries are requested. For the BFD TC MIB, there is a desire to publish the TC MIB as an IANA maintained MIB. : (19) Describe reviews and automated checks performed by the Document : Shepherd to validate sections of the document written in a formal : language, such as XML code, BNF rules, MIB definitions, etc. Per the mib-review-tools, the drafts pass smilint. I do not have access to smicng. |
2013-11-30
|
16 | Jeffrey Haas | State Change Notice email list changed to bfd-chairs@tools.ietf.org, draft-ietf-bfd-mib@tools.ietf.org |
2013-11-30
|
16 | Jeffrey Haas | Responsible AD changed to Adrian Farrel |
2013-11-30
|
16 | Jeffrey Haas | Working group state set to Submitted to IESG for Publication |
2013-11-30
|
16 | Jeffrey Haas | IETF WG state changed to Submitted to IESG for Publication |
2013-11-30
|
16 | Jeffrey Haas | IESG state changed to Publication Requested |
2013-11-30
|
16 | Jeffrey Haas | IESG state set to Publication Requested |
2013-11-30
|
16 | Jeffrey Haas | IESG process started in state Publication Requested |
2013-11-30
|
16 | Jeffrey Haas | Changed document writeup |
2013-11-21
|
16 | Nobo Akiya | New version available: draft-ietf-bfd-mib-16.txt |
2013-11-11
|
15 | Nobo Akiya | New version available: draft-ietf-bfd-mib-15.txt |
2013-10-24
|
14 | Jeffrey Haas | Document shepherd changed to Jeffrey Haas |
2013-10-24
|
14 | Jeffrey Haas | Intended Status changed to Proposed Standard from None |
2013-10-24
|
14 | Jeffrey Haas | IETF WG state changed to In WG Last Call from WG Document |
2013-06-26
|
14 | Nobo Akiya | New version available: draft-ietf-bfd-mib-14.txt |
2013-06-17
|
13 | Nobo Akiya | New version available: draft-ietf-bfd-mib-13.txt |
2012-12-17
|
12 | Nobo Akiya | New version available: draft-ietf-bfd-mib-12.txt |
2012-06-15
|
11 | Thomas Nadeau | New version available: draft-ietf-bfd-mib-11.txt |
2011-01-09
|
10 | (System) | Document has expired |
2010-07-08
|
10 | (System) | New version available: draft-ietf-bfd-mib-10.txt |
2010-03-08
|
09 | (System) | New version available: draft-ietf-bfd-mib-09.txt |
2010-03-04
|
08 | (System) | New version available: draft-ietf-bfd-mib-08.txt |
2009-04-27
|
07 | (System) | New version available: draft-ietf-bfd-mib-07.txt |
2008-11-01
|
06 | (System) | New version available: draft-ietf-bfd-mib-06.txt |
2008-08-05
|
05 | (System) | New version available: draft-ietf-bfd-mib-05.txt |
2008-03-06
|
04 | (System) | New version available: draft-ietf-bfd-mib-04.txt |
2006-10-22
|
03 | (System) | New version available: draft-ietf-bfd-mib-03.txt |
2005-08-03
|
02 | (System) | New version available: draft-ietf-bfd-mib-02.txt |
2005-07-08
|
01 | (System) | New version available: draft-ietf-bfd-mib-01.txt |
2004-06-29
|
00 | (System) | New version available: draft-ietf-bfd-mib-00.txt |