Skip to main content

Generalized Multi-Protocol Label Switching (GMPLS) Extensions for Synchronous Optical Network (SONET) and Synchronous Digital Hierarchy (SDH) Control
draft-ietf-ccamp-rfc3946bis-01

Revision differences

Document history

Date Rev. By Action
2012-08-22
01 (System) post-migration administrative database adjustment to the Abstain position for Russ Housley
2006-07-24
01 Bill Fenner State Change Notice email list have been change to ccamp-chairs@tools.ietf.org from kireeti@juniper.net, adrian@olddog.co.uk, dbrungard@att.com
2006-06-19
01 Amy Vezza State Changes to RFC Ed Queue from Approved-announcement sent by Amy Vezza
2006-06-12
01 Amy Vezza IESG state changed to Approved-announcement sent
2006-06-12
01 Amy Vezza IESG has approved the document
2006-06-12
01 Amy Vezza Closed "Approve" ballot
2006-06-12
01 Amy Vezza [Ballot Position Update] Position for Russ Housley has been changed to Abstain from Discuss by Amy Vezza
2006-05-11
01 Ross Callon State Changes to Approved-announcement to be sent from Approved-announcement to be sent::Point Raised - writeup needed by Ross Callon
2006-05-11
01 Amy Vezza State Changes to Approved-announcement to be sent::Point Raised - writeup needed from IESG Evaluation by Amy Vezza
2006-05-11
01 (System) [Ballot Position Update] Position for Russ Housley has been changed to discuss from abstain by IESG Secretary
2006-05-11
01 Russ Housley
[Ballot comment]
This document provides minor clarification to RFC 3946, but there is
  not a summary of the changes.  This usually appears as …
[Ballot comment]
This document provides minor clarification to RFC 3946, but there is
  not a summary of the changes.  This usually appears as a separate
  section or subsection in an update to an earlier RFC.

  The comments in Bernard Aboba's SecDir Review caused me to do some
  digging.  Thanks to him for highlighting the reference.  The Security
  Considerations of this document refer to RFC 3209, and the Security
  Considerations (Section 6) of RFC 3209 says:
  >
  > In principle these extensions to RSVP pose no security exposures over
  > and above RFC 2205[1].  However, there is a slight change in the
  > trust model.  Traffic sent on a normal RSVP session can be filtered
  > according to source and destination addresses as well as port
  > numbers.  In this specification, filtering occurs only on the basis
  > of an incoming label.  For this reason an administration may wish to
  > limit the domain over which LSP tunnels can be established.  This can
  > be accomplished by setting filters on various ports to deny action on
  > a RSVP path message with a SESSION object of type LSP_TUNNEL_IPv4 (7)
  > or LSP_TUNNEL_IPv6 (8).
  >
  Is there a change in trust model in this document too?  I do not think
  so.  The structure of the security considerations in this document,
  which is essentially five references, is confusing.  It is not clear
  which considerations really apply to this document.  I am asking for
  clarity.
2006-05-11
01 Russ Housley [Ballot Position Update] Position for Russ Housley has been changed to Abstain from Discuss by Russ Housley
2006-05-11
01 (System) [Ballot Position Update] New position, No Objection, has been recorded for David Kessens by IESG Secretary
2006-05-11
01 (System) [Ballot Position Update] New position, No Objection, has been recorded for Lisa Dusseault by IESG Secretary
2006-05-11
01 Bill Fenner [Ballot Position Update] New position, No Objection, has been recorded for Bill Fenner by Bill Fenner
2006-05-11
01 Lars Eggert [Ballot Position Update] New position, No Objection, has been recorded for Lars Eggert by Lars Eggert
2006-05-11
01 Jari Arkko [Ballot Position Update] New position, No Objection, has been recorded for Jari Arkko by Jari Arkko
2006-05-10
01 Jon Peterson [Ballot Position Update] New position, No Objection, has been recorded for Jon Peterson by Jon Peterson
2006-05-10
01 Cullen Jennings [Ballot Position Update] New position, No Objection, has been recorded for Cullen Jennings by Cullen Jennings
2006-05-10
01 Magnus Westerlund [Ballot Position Update] New position, No Objection, has been recorded for Magnus Westerlund by Magnus Westerlund
2006-05-10
01 Mark Townsley [Ballot Position Update] New position, No Objection, has been recorded for Mark Townsley by Mark Townsley
2006-05-09
01 Sam Hartman [Ballot Position Update] New position, No Objection, has been recorded for Sam Hartman by Sam Hartman
2006-05-09
01 Ted Hardie [Ballot Position Update] New position, No Objection, has been recorded for Ted Hardie by Ted Hardie
2006-05-09
01 Dan Romascanu [Ballot Position Update] New position, No Objection, has been recorded for Dan Romascanu by Dan Romascanu
2006-05-09
01 Brian Carpenter
[Ballot comment]
Suggest changing the first sentence of the IANA Considerations:

OLD:
  Three values have been defined by IANA for this document.

NEW:
  …
[Ballot comment]
Suggest changing the first sentence of the IANA Considerations:

OLD:
  Three values have been defined by IANA for this document.

NEW:
  Three values defined by IANA for RFC 3946 now apply to this document.
2006-05-09
01 Brian Carpenter [Ballot Position Update] New position, No Objection, has been recorded for Brian Carpenter by Brian Carpenter
2006-05-08
01 Russ Housley
[Ballot discuss]
This document provides minor clarification to RFC 3946, but there is
  not a summary of the changes.  This usually appears as …
[Ballot discuss]
This document provides minor clarification to RFC 3946, but there is
  not a summary of the changes.  This usually appears as a separate
  section or subsection in an update to an earlier RFC.

  The comments in Bernard Aboba's SecDir Review caused me to do some
  digging.  Thanks to him for highlighting the reference.  The Security
  Considerations of this document refer to RFC 3209, and the Security
  Considerations (Section 6) of RFC 3209 says:
  >
  > In principle these extensions to RSVP pose no security exposures over
  > and above RFC 2205[1].  However, there is a slight change in the
  > trust model.  Traffic sent on a normal RSVP session can be filtered
  > according to source and destination addresses as well as port
  > numbers.  In this specification, filtering occurs only on the basis
  > of an incoming label.  For this reason an administration may wish to
  > limit the domain over which LSP tunnels can be established.  This can
  > be accomplished by setting filters on various ports to deny action on
  > a RSVP path message with a SESSION object of type LSP_TUNNEL_IPv4 (7)
  > or LSP_TUNNEL_IPv6 (8).
  >
  Is there a change in trust model in this document too?  I do not think
  so.  The structure of the security considerations in this document,
  which is essentially five references, is confusing.  It is not clear
  which considerations really apply to this document.  I am asking for
  clarity.
2006-05-08
01 Russ Housley
[Ballot discuss]
The comments in Bernard Aboba's SecDir Review caused me to do some
  digging.  Thanks to him for highlighting the reference.

  The …
[Ballot discuss]
The comments in Bernard Aboba's SecDir Review caused me to do some
  digging.  Thanks to him for highlighting the reference.

  The Security Considerations of this document refer to RFC 3209, and the
  Security Considerations (Section 6) of RFC 3209 says:
  >
  > In principle these extensions to RSVP pose no security exposures over
  > and above RFC 2205[1].  However, there is a slight change in the
  > trust model.  Traffic sent on a normal RSVP session can be filtered
  > according to source and destination addresses as well as port
  > numbers.  In this specification, filtering occurs only on the basis
  > of an incoming label.  For this reason an administration may wish to
  > limit the domain over which LSP tunnels can be established.  This can
  > be accomplished by setting filters on various ports to deny action on
  > a RSVP path message with a SESSION object of type LSP_TUNNEL_IPv4 (7)
  > or LSP_TUNNEL_IPv6 (8).
  >
  Is there a change in trust model in this document too?  I do not think
  so.  The structure of the security considerations in this document,
  which is essentially five references, is confusing.  It is not clear
  which considerations really apply to this document.  I am asking for
  clarity.
2006-05-08
01 Russ Housley [Ballot Position Update] New position, Discuss, has been recorded for Russ Housley by Russ Housley
2006-05-06
01 Ross Callon State Change Notice email list have been change to kireeti@juniper.net, adrian@olddog.co.uk, dbrungard@att.com from kireeti@juniper.net, adrian@olddog.co.uk
2006-05-06
01 Ross Callon State Changes to IESG Evaluation from Waiting for AD Go-Ahead by Ross Callon
2006-05-04
01 (System) State has been changed to Waiting for AD Go-Ahead from In Last Call by system
2006-04-24
01 Michelle Cotton
IANA Last Call Comments:
Upon approval of this document the IANA will update the reference for the following:

Two RSVP C-Types in registry:
http://www.iana.org/assignments/rsvp-parameters
- …
IANA Last Call Comments:
Upon approval of this document the IANA will update the reference for the following:

Two RSVP C-Types in registry:
http://www.iana.org/assignments/rsvp-parameters
- A SONET/SDH SENDER_TSPEC object: Class = 12, C-Type = 4
- A SONET/SDH FLOWSPEC object: Class = 9, C-Type = 4

One LDP TLV Type in registry:
http://www.iana.org/assignments/ldp-namespaces
- A type field for the SONET/SDH Traffic Parameters TLV

There are some registries in section 2.1 and section 3. There is also a registry and a
value registration in appendix 1. Does the IANA have to do anything with regards to these
registries? Or is changing the references for the rsvp and ldp parameters the ONLY IANA
Action?
2006-04-20
01 Amy Vezza Last call sent
2006-04-20
01 Amy Vezza State Changes to In Last Call from Last Call Requested by Amy Vezza
2006-04-19
01 Ross Callon Telechat date was changed to 2006-05-11 from 2006-04-27 by Ross Callon
2006-04-19
01 Ross Callon Last Call was requested by Ross Callon
2006-04-19
01 Ross Callon State Changes to Last Call Requested from IESG Evaluation by Ross Callon
2006-04-19
01 Ross Callon [Ballot Position Update] New position, Yes, has been recorded for Ross Callon
2006-04-19
01 Ross Callon Ballot has been issued by Ross Callon
2006-04-19
01 Ross Callon Created "Approve" ballot
2006-04-19
01 (System) Ballot writeup text was added
2006-04-19
01 (System) Last call text was added
2006-04-19
01 (System) Ballot approval text was added
2006-04-19
01 Ross Callon
This is a relatively minor update to RFC3946. One change is to correct an error (so that the text says what was originally intended …
This is a relatively minor update to RFC3946. One change is to correct an error (so that the text says what was originally intended -- which is what most but not all implemeters had already understood). The other changes are to add clarification. There are very few changes from 3946, and all are straightforward. There are multiple existing implementations of RFC3946 and this bis. The deltas on RFC 3946 have been discussed with the OIF.
2006-04-19
01 Ross Callon Placed on agenda for telechat - 2006-04-27 by Ross Callon
2006-04-19
01 Ross Callon State Changes to IESG Evaluation from AD Evaluation by Ross Callon
2006-04-18
01 Ross Callon State Changes to AD Evaluation from Publication Requested by Ross Callon
2006-04-05
01 Ross Callon Shepherding AD has been changed to Ross Callon from Alex Zinin
2006-01-09
01 Dinara Suleymanova Draft Added by Dinara Suleymanova in state Publication Requested
2005-12-20
01 (System) New version available: draft-ietf-ccamp-rfc3946bis-01.txt
2005-11-28
00 (System) New version available: draft-ietf-ccamp-rfc3946bis-00.txt