Skip to main content

Application-Specific Link Attributes Advertisement Using the Border Gateway Protocol - Link State (BGP-LS)
draft-ietf-idr-bgp-ls-app-specific-attr-16

Revision differences

Document history

Date Rev. By Action
2022-08-17
16 (System) RFC Editor state changed to AUTH48-DONE from AUTH48
2022-08-10
16 (System) RFC Editor state changed to AUTH48
2022-07-22
16 (System) RFC Editor state changed to RFC-EDITOR from EDIT
2022-07-11
16 (System) IANA Action state changed to RFC-Ed-Ack from Waiting on RFC Editor
2022-07-11
16 (System) IANA Action state changed to Waiting on RFC Editor from In Progress
2022-07-11
16 (System) IANA Action state changed to In Progress from Waiting on Authors
2022-07-08
16 (System) IANA Action state changed to Waiting on Authors from In Progress
2022-07-07
16 (System) RFC Editor state changed to EDIT
2022-07-07
16 (System) IESG state changed to RFC Ed Queue from Approved-announcement sent
2022-07-07
16 (System) Announcement was received by RFC Editor
2022-07-07
16 (System) IANA Action state changed to In Progress
2022-07-07
16 Ketan Talaulikar New version available: draft-ietf-idr-bgp-ls-app-specific-attr-16.txt
2022-07-07
16 Ketan Talaulikar New version accepted (logged-in submitter: Ketan Talaulikar)
2022-07-07
16 Ketan Talaulikar Uploaded new revision
2022-07-07
15 Cindy Morgan IESG state changed to Approved-announcement sent from Approved-announcement to be sent
2022-07-07
15 Cindy Morgan IESG has approved the document
2022-07-07
15 Cindy Morgan Closed "Approve" ballot
2022-07-07
15 Alvaro Retana Ballot approval text was generated
2022-07-07
15 (System) Removed all action holders (IESG state changed)
2022-07-07
15 Alvaro Retana IESG state changed to Approved-announcement to be sent from IESG Evaluation::External Party
2022-06-27
15 Alvaro Retana This document is ready -- I have asked the WG for one final review: https://mailarchive.ietf.org/arch/msg/idr/1hNvIfy5RdyuOyEpgXf8l4kwVmk/
2022-06-27
15 Alvaro Retana IESG state changed to IESG Evaluation::External Party from IESG Evaluation::AD Followup
2022-06-25
15 Ketan Talaulikar New version available: draft-ietf-idr-bgp-ls-app-specific-attr-15.txt
2022-06-25
15 Ketan Talaulikar New version accepted (logged-in submitter: Ketan Talaulikar)
2022-06-25
15 Ketan Talaulikar Uploaded new revision
2022-06-24
14 John Scudder
[Ballot comment]
Thanks for all the work to help clear up my DISCUSS! Version 14 looks good, modulo some questions about §4.1 I've sent in …
[Ballot comment]
Thanks for all the work to help clear up my DISCUSS! Version 14 looks good, modulo some questions about §4.1 I've sent in a separate reply (but which are only COMMENT level).

--

Previous DISCUSS:

I'd like to DISCUSS some questions I have about the content of Section 4's IS-IS rules. I don't expect it will be difficult to resolve these, I just want to be sure we have the conversation.

1. In §4 (2.C),

      C.  The SRLGs advertised in IS-IS SRLG ASLA TLVs and the other
          link attributes advertised in IS-IS ASLA sub-TLVs are
          REQUIRED to be collated, on a per-application basis, for all
          applications that have their bit set in the SABM/UDABM in at
          least one of the aforementioned TLV types.
         
Is there some reason that there's no need to consider the case where both of the TLV types in question have zero-length application bit masks?

2. Later in the same paragraph,

                                                      When performing
          this collation, only the TLVs with the application's bit set
          in SABM/UDABM MUST be used when such TLVs are available from
          either TLV types.

I suspect you aren't saying what you mean, and the "only... MUST" construct is hard to puzzle out. Do you perhaps mean TLVs that don’t have the application's bit set MUST NOT be used? Because as you've written it,

- All TLVs with the bit set MUST be collated,
- Any TLVs without the bit set MAY be collated (by implication). Which doesn't seem very sensible AFAICT.

A possible rewrite, if I've understood your intention correctly, might be "When performing this collation, every TLV with the application's bit set in SABM/UDABM MUST be included, when such TLVs are available from either TLV type."

(Note also a minor fix for agreement in number, s/types/type/ in the last word.)

3. And still later in the same paragraph,

                              If the bit for an application is set in
          the SABM/UDABM of only one of the TLV types, then the
          attributes from the other TLV type with zero-length
          application bit mask MUST be also collated for that
          application, if such TLV is available.

I'm confused by the reference to a zero-length application bit mask. Can't the other TLV type have a nonzero-length application bit mask, but still have the application bit in question not set within the bit mask?

I guess probably what you mean is, if the other TLV type is present and has a zero-length application bit mask, since a zero-length SABM/UDABM basically is a wildcard, the equivalent of all bits being set (as I read RFC 8920).

If that's right, then a change seems in order, along the lines of

                              If the bit for an application is set in
          the SABM/UDABM of only one of the TLV types, and if the
          other TLV type has a zero-length application bit mask, then the
          attributes from the other TLV type with zero-length
          application bit mask MUST be also collated for that
          application, if such TLV is available.

I just interpolated the "and" clause. It's a bit wordy and could probably be further condensed, but I think it clarifies sufficiently.

On the other hand, if I'm not right about this (very possible) then I'd appreciate further discussion on what I got wrong, so we can figure out if the text needs clarification or if I just need a clue bat.

Previous COMMENT:

4. In §2 you reference "SABML". I was going to ask you to expand it on first use, but you only use it once. So, please just write it out in words as "SABM Length" and don't introduce an extra acronym.

5. In §3:

  All the BGP-LS Attribute TLVs defined in the table above are REQUIRED
  to be advertised as a top-level TLV in the BGP-LS Attribute for
  carrying link attributes specific to RSVP-TE.

I suggest “... when used to carry” instead of “... for carrying”. Also, “listed in the table”, not defined in it.

6. Much of §4 is dedicated to a special case for IS-IS:

  2.  In the case of IS-IS, the following specific procedures are to be
      followed:

It would be nice to spend a few words mentioning why IS-IS needs a special case and OSPF doesn't, so that the reader doesn't have to wonder. I'm guessing that this relates to the way IS-IS uses sub-TLVs for various things whereas OSPF doesn't, so you need rules to reconcile the values in IS-IS but not OSPF?

7. §4 (2.B) needs some adjectives, "IS-IS" and "BGP-LS", respectively, to make clear which flavor of "ASLA sub-TLV" you're talking about. I *think* that here,

      B.  When the ASLA sub-TLV has the RSVP-TE application bit set,
          then the link attributes for the corresponding ASLA sub-TLV
          MUST be encoded using the respective BGP-LS top-level TLVs as
          per [RFC7752] [RFC8571] [RFC9104].
         
the first reference to "ASLA sub-TLV" is the IS-IS flavor, and the second is to the BGP-LS flavor --  but please be specific.

8. In §4,

  These rules ensure that a BGP-LS originator performs the
  advertisement for all application-specific link attributes from the
  IGP nodes that support or do not support the ASLA extension.

I don't understand this sentence. :-( For one thing, applying simple logic to "IGP nodes that support or do not support the ASLA extension" we can rewrite it as "IGP nodes", full stop, since "support or do not support" covers the entire universe by definition. That would imply the sentence could be rewritten as

  These rules ensure that a BGP-LS originator performs the
  advertisement for all application-specific link attributes from the
  IGP nodes.
 
Which doesn't really help me. :-(

9. In §5,

  It is recommended that nodes supporting this specification are
  selected as originators of BGP-LS information when advertising the
  link-state information from the IGPs.

Do you mean only such nodes should be selected? Or is it that at least one such should be among those selected? Either is supportable, I think. Whatever the answer, please clarify the text correspondingly. Although, more generally I guess BGP-LS originators ought to support all the extensions in use in a given IGP, not limited to this one, so this is really a special case of a general principle.

10. In §5,

                                    They would, however, not be able to
  support neither the application-specific link attributes nor newer
  applications that may be encoded only using the ASLA TLV.
 
Drop the "not". Also, again this seems like a special case of a general principle -- of course a BGP-LS consumer that doesn't understand a given extension can't do the thing that the extension covers. But, it's fine to remind the reader of this.

11. In §8,

                            It is assumed that the IGP instances
  originating these TLVs will support all the required security (as
  described in [RFC8919] and [RFC8920]) to prevent any security issues
  when propagating the TLVs into BGP-LS.
 
I think purporting to "prevent any security issues" is a case of seriously overpromising. A very similar issue existed in draft-ietf-idr-bgp-ls-sbfd-extensions-08. Perhaps a similar fix could be applied, although in this case, when I took a quick look at RFCs 8919 and 8920 I didn't find any "required security" of note, so I'm really not sure what if anything is being actually promised by this sentence? Can you help me understand what properties I should be expecting?

In any case, for the most part it seems fine to say your security model is the same as that of RFCs 8919 and 8920, since as we know BGP-LS tries to be just a re-rendering of the data from those suppliers. But, we should keep in mind this consideration from RFC 7752:

  Additionally, it may be considered that the export of link-state and
  TE information as described in this document constitutes a risk to
  confidentiality of mission-critical or commercially sensitive
  information about the network. 

Might it be worth reminding the reader that if there's any sensitive information contained in the new stuff you're propagating, they should take this warning to heart, since the scope across which the information is being propagated can increase considerably? I don't insist on this, I'm only raising it as a point to consider.


Nits and very minor comments --

12. The document talks about new this, new that. This probably won't age well -- keep in mind that the RFC this document will become will be around for decades, at which point none of this stuff will be "new".

It's obviously not a big deal but if it were my document I'd find a way to rewrite those "new" in a way that won't be instantly obsolete.

13. In §4,

                                The application-specific attribute
  value received via sub-TLVs within the ASLA TLV have preference over
  the value received via the top-level TLVs.
 
There's an agreement in number problem here -- perhaps rewrite as "An application-specific attribute value received via a sub-TLV within the ASLA TLV has precedence over the value received via a top-level TLV"?
2022-06-24
14 John Scudder Ballot comment text updated for John Scudder
2022-06-24
14 John Scudder
[Ballot comment]
Thanks for all the work to help clear up my DISCUSS!

--

Previous DISCUSS:

I'd like to DISCUSS some questions I have about …
[Ballot comment]
Thanks for all the work to help clear up my DISCUSS!

--

Previous DISCUSS:

I'd like to DISCUSS some questions I have about the content of Section 4's IS-IS rules. I don't expect it will be difficult to resolve these, I just want to be sure we have the conversation.

1. In §4 (2.C),

      C.  The SRLGs advertised in IS-IS SRLG ASLA TLVs and the other
          link attributes advertised in IS-IS ASLA sub-TLVs are
          REQUIRED to be collated, on a per-application basis, for all
          applications that have their bit set in the SABM/UDABM in at
          least one of the aforementioned TLV types.
         
Is there some reason that there's no need to consider the case where both of the TLV types in question have zero-length application bit masks?

2. Later in the same paragraph,

                                                      When performing
          this collation, only the TLVs with the application's bit set
          in SABM/UDABM MUST be used when such TLVs are available from
          either TLV types.

I suspect you aren't saying what you mean, and the "only... MUST" construct is hard to puzzle out. Do you perhaps mean TLVs that don’t have the application's bit set MUST NOT be used? Because as you've written it,

- All TLVs with the bit set MUST be collated,
- Any TLVs without the bit set MAY be collated (by implication). Which doesn't seem very sensible AFAICT.

A possible rewrite, if I've understood your intention correctly, might be "When performing this collation, every TLV with the application's bit set in SABM/UDABM MUST be included, when such TLVs are available from either TLV type."

(Note also a minor fix for agreement in number, s/types/type/ in the last word.)

3. And still later in the same paragraph,

                              If the bit for an application is set in
          the SABM/UDABM of only one of the TLV types, then the
          attributes from the other TLV type with zero-length
          application bit mask MUST be also collated for that
          application, if such TLV is available.

I'm confused by the reference to a zero-length application bit mask. Can't the other TLV type have a nonzero-length application bit mask, but still have the application bit in question not set within the bit mask?

I guess probably what you mean is, if the other TLV type is present and has a zero-length application bit mask, since a zero-length SABM/UDABM basically is a wildcard, the equivalent of all bits being set (as I read RFC 8920).

If that's right, then a change seems in order, along the lines of

                              If the bit for an application is set in
          the SABM/UDABM of only one of the TLV types, and if the
          other TLV type has a zero-length application bit mask, then the
          attributes from the other TLV type with zero-length
          application bit mask MUST be also collated for that
          application, if such TLV is available.

I just interpolated the "and" clause. It's a bit wordy and could probably be further condensed, but I think it clarifies sufficiently.

On the other hand, if I'm not right about this (very possible) then I'd appreciate further discussion on what I got wrong, so we can figure out if the text needs clarification or if I just need a clue bat.

Previous COMMENT:

4. In §2 you reference "SABML". I was going to ask you to expand it on first use, but you only use it once. So, please just write it out in words as "SABM Length" and don't introduce an extra acronym.

5. In §3:

  All the BGP-LS Attribute TLVs defined in the table above are REQUIRED
  to be advertised as a top-level TLV in the BGP-LS Attribute for
  carrying link attributes specific to RSVP-TE.

I suggest “... when used to carry” instead of “... for carrying”. Also, “listed in the table”, not defined in it.

6. Much of §4 is dedicated to a special case for IS-IS:

  2.  In the case of IS-IS, the following specific procedures are to be
      followed:

It would be nice to spend a few words mentioning why IS-IS needs a special case and OSPF doesn't, so that the reader doesn't have to wonder. I'm guessing that this relates to the way IS-IS uses sub-TLVs for various things whereas OSPF doesn't, so you need rules to reconcile the values in IS-IS but not OSPF?

7. §4 (2.B) needs some adjectives, "IS-IS" and "BGP-LS", respectively, to make clear which flavor of "ASLA sub-TLV" you're talking about. I *think* that here,

      B.  When the ASLA sub-TLV has the RSVP-TE application bit set,
          then the link attributes for the corresponding ASLA sub-TLV
          MUST be encoded using the respective BGP-LS top-level TLVs as
          per [RFC7752] [RFC8571] [RFC9104].
         
the first reference to "ASLA sub-TLV" is the IS-IS flavor, and the second is to the BGP-LS flavor --  but please be specific.

8. In §4,

  These rules ensure that a BGP-LS originator performs the
  advertisement for all application-specific link attributes from the
  IGP nodes that support or do not support the ASLA extension.

I don't understand this sentence. :-( For one thing, applying simple logic to "IGP nodes that support or do not support the ASLA extension" we can rewrite it as "IGP nodes", full stop, since "support or do not support" covers the entire universe by definition. That would imply the sentence could be rewritten as

  These rules ensure that a BGP-LS originator performs the
  advertisement for all application-specific link attributes from the
  IGP nodes.
 
Which doesn't really help me. :-(

9. In §5,

  It is recommended that nodes supporting this specification are
  selected as originators of BGP-LS information when advertising the
  link-state information from the IGPs.

Do you mean only such nodes should be selected? Or is it that at least one such should be among those selected? Either is supportable, I think. Whatever the answer, please clarify the text correspondingly. Although, more generally I guess BGP-LS originators ought to support all the extensions in use in a given IGP, not limited to this one, so this is really a special case of a general principle.

10. In §5,

                                    They would, however, not be able to
  support neither the application-specific link attributes nor newer
  applications that may be encoded only using the ASLA TLV.
 
Drop the "not". Also, again this seems like a special case of a general principle -- of course a BGP-LS consumer that doesn't understand a given extension can't do the thing that the extension covers. But, it's fine to remind the reader of this.

11. In §8,

                            It is assumed that the IGP instances
  originating these TLVs will support all the required security (as
  described in [RFC8919] and [RFC8920]) to prevent any security issues
  when propagating the TLVs into BGP-LS.
 
I think purporting to "prevent any security issues" is a case of seriously overpromising. A very similar issue existed in draft-ietf-idr-bgp-ls-sbfd-extensions-08. Perhaps a similar fix could be applied, although in this case, when I took a quick look at RFCs 8919 and 8920 I didn't find any "required security" of note, so I'm really not sure what if anything is being actually promised by this sentence? Can you help me understand what properties I should be expecting?

In any case, for the most part it seems fine to say your security model is the same as that of RFCs 8919 and 8920, since as we know BGP-LS tries to be just a re-rendering of the data from those suppliers. But, we should keep in mind this consideration from RFC 7752:

  Additionally, it may be considered that the export of link-state and
  TE information as described in this document constitutes a risk to
  confidentiality of mission-critical or commercially sensitive
  information about the network. 

Might it be worth reminding the reader that if there's any sensitive information contained in the new stuff you're propagating, they should take this warning to heart, since the scope across which the information is being propagated can increase considerably? I don't insist on this, I'm only raising it as a point to consider.


Nits and very minor comments --

12. The document talks about new this, new that. This probably won't age well -- keep in mind that the RFC this document will become will be around for decades, at which point none of this stuff will be "new".

It's obviously not a big deal but if it were my document I'd find a way to rewrite those "new" in a way that won't be instantly obsolete.

13. In §4,

                                The application-specific attribute
  value received via sub-TLVs within the ASLA TLV have preference over
  the value received via the top-level TLVs.
 
There's an agreement in number problem here -- perhaps rewrite as "An application-specific attribute value received via a sub-TLV within the ASLA TLV has precedence over the value received via a top-level TLV"?
2022-06-24
14 John Scudder Ballot comment text updated for John Scudder
2022-06-24
14 John Scudder
[Ballot comment]
Thanks for all the work to help clear up my DISCUSS!

Previous DISCUSS:

I'd like to DISCUSS some questions I have about the …
[Ballot comment]
Thanks for all the work to help clear up my DISCUSS!

Previous DISCUSS:

I'd like to DISCUSS some questions I have about the content of Section 4's IS-IS rules. I don't expect it will be difficult to resolve these, I just want to be sure we have the conversation.

1. In §4 (2.C),

      C.  The SRLGs advertised in IS-IS SRLG ASLA TLVs and the other
          link attributes advertised in IS-IS ASLA sub-TLVs are
          REQUIRED to be collated, on a per-application basis, for all
          applications that have their bit set in the SABM/UDABM in at
          least one of the aforementioned TLV types.
         
Is there some reason that there's no need to consider the case where both of the TLV types in question have zero-length application bit masks?

2. Later in the same paragraph,

                                                      When performing
          this collation, only the TLVs with the application's bit set
          in SABM/UDABM MUST be used when such TLVs are available from
          either TLV types.

I suspect you aren't saying what you mean, and the "only... MUST" construct is hard to puzzle out. Do you perhaps mean TLVs that don’t have the application's bit set MUST NOT be used? Because as you've written it,

- All TLVs with the bit set MUST be collated,
- Any TLVs without the bit set MAY be collated (by implication). Which doesn't seem very sensible AFAICT.

A possible rewrite, if I've understood your intention correctly, might be "When performing this collation, every TLV with the application's bit set in SABM/UDABM MUST be included, when such TLVs are available from either TLV type."

(Note also a minor fix for agreement in number, s/types/type/ in the last word.)

3. And still later in the same paragraph,

                              If the bit for an application is set in
          the SABM/UDABM of only one of the TLV types, then the
          attributes from the other TLV type with zero-length
          application bit mask MUST be also collated for that
          application, if such TLV is available.

I'm confused by the reference to a zero-length application bit mask. Can't the other TLV type have a nonzero-length application bit mask, but still have the application bit in question not set within the bit mask?

I guess probably what you mean is, if the other TLV type is present and has a zero-length application bit mask, since a zero-length SABM/UDABM basically is a wildcard, the equivalent of all bits being set (as I read RFC 8920).

If that's right, then a change seems in order, along the lines of

                              If the bit for an application is set in
          the SABM/UDABM of only one of the TLV types, and if the
          other TLV type has a zero-length application bit mask, then the
          attributes from the other TLV type with zero-length
          application bit mask MUST be also collated for that
          application, if such TLV is available.

I just interpolated the "and" clause. It's a bit wordy and could probably be further condensed, but I think it clarifies sufficiently.

On the other hand, if I'm not right about this (very possible) then I'd appreciate further discussion on what I got wrong, so we can figure out if the text needs clarification or if I just need a clue bat.

Previous COMMENT:

4. In §2 you reference "SABML". I was going to ask you to expand it on first use, but you only use it once. So, please just write it out in words as "SABM Length" and don't introduce an extra acronym.

5. In §3:

  All the BGP-LS Attribute TLVs defined in the table above are REQUIRED
  to be advertised as a top-level TLV in the BGP-LS Attribute for
  carrying link attributes specific to RSVP-TE.

I suggest “... when used to carry” instead of “... for carrying”. Also, “listed in the table”, not defined in it.

6. Much of §4 is dedicated to a special case for IS-IS:

  2.  In the case of IS-IS, the following specific procedures are to be
      followed:

It would be nice to spend a few words mentioning why IS-IS needs a special case and OSPF doesn't, so that the reader doesn't have to wonder. I'm guessing that this relates to the way IS-IS uses sub-TLVs for various things whereas OSPF doesn't, so you need rules to reconcile the values in IS-IS but not OSPF?

7. §4 (2.B) needs some adjectives, "IS-IS" and "BGP-LS", respectively, to make clear which flavor of "ASLA sub-TLV" you're talking about. I *think* that here,

      B.  When the ASLA sub-TLV has the RSVP-TE application bit set,
          then the link attributes for the corresponding ASLA sub-TLV
          MUST be encoded using the respective BGP-LS top-level TLVs as
          per [RFC7752] [RFC8571] [RFC9104].
         
the first reference to "ASLA sub-TLV" is the IS-IS flavor, and the second is to the BGP-LS flavor --  but please be specific.

8. In §4,

  These rules ensure that a BGP-LS originator performs the
  advertisement for all application-specific link attributes from the
  IGP nodes that support or do not support the ASLA extension.

I don't understand this sentence. :-( For one thing, applying simple logic to "IGP nodes that support or do not support the ASLA extension" we can rewrite it as "IGP nodes", full stop, since "support or do not support" covers the entire universe by definition. That would imply the sentence could be rewritten as

  These rules ensure that a BGP-LS originator performs the
  advertisement for all application-specific link attributes from the
  IGP nodes.
 
Which doesn't really help me. :-(

9. In §5,

  It is recommended that nodes supporting this specification are
  selected as originators of BGP-LS information when advertising the
  link-state information from the IGPs.

Do you mean only such nodes should be selected? Or is it that at least one such should be among those selected? Either is supportable, I think. Whatever the answer, please clarify the text correspondingly. Although, more generally I guess BGP-LS originators ought to support all the extensions in use in a given IGP, not limited to this one, so this is really a special case of a general principle.

10. In §5,

                                    They would, however, not be able to
  support neither the application-specific link attributes nor newer
  applications that may be encoded only using the ASLA TLV.
 
Drop the "not". Also, again this seems like a special case of a general principle -- of course a BGP-LS consumer that doesn't understand a given extension can't do the thing that the extension covers. But, it's fine to remind the reader of this.

11. In §8,

                            It is assumed that the IGP instances
  originating these TLVs will support all the required security (as
  described in [RFC8919] and [RFC8920]) to prevent any security issues
  when propagating the TLVs into BGP-LS.
 
I think purporting to "prevent any security issues" is a case of seriously overpromising. A very similar issue existed in draft-ietf-idr-bgp-ls-sbfd-extensions-08. Perhaps a similar fix could be applied, although in this case, when I took a quick look at RFCs 8919 and 8920 I didn't find any "required security" of note, so I'm really not sure what if anything is being actually promised by this sentence? Can you help me understand what properties I should be expecting?

In any case, for the most part it seems fine to say your security model is the same as that of RFCs 8919 and 8920, since as we know BGP-LS tries to be just a re-rendering of the data from those suppliers. But, we should keep in mind this consideration from RFC 7752:

  Additionally, it may be considered that the export of link-state and
  TE information as described in this document constitutes a risk to
  confidentiality of mission-critical or commercially sensitive
  information about the network. 

Might it be worth reminding the reader that if there's any sensitive information contained in the new stuff you're propagating, they should take this warning to heart, since the scope across which the information is being propagated can increase considerably? I don't insist on this, I'm only raising it as a point to consider.


Nits and very minor comments --

12. The document talks about new this, new that. This probably won't age well -- keep in mind that the RFC this document will become will be around for decades, at which point none of this stuff will be "new".

It's obviously not a big deal but if it were my document I'd find a way to rewrite those "new" in a way that won't be instantly obsolete.

13. In §4,

                                The application-specific attribute
  value received via sub-TLVs within the ASLA TLV have preference over
  the value received via the top-level TLVs.
 
There's an agreement in number problem here -- perhaps rewrite as "An application-specific attribute value received via a sub-TLV within the ASLA TLV has precedence over the value received via a top-level TLV"?
2022-06-24
14 John Scudder [Ballot Position Update] Position for John Scudder has been changed to No Objection from Discuss
2022-06-17
14 (System) Changed action holders to Alvaro Retana (IESG state changed)
2022-06-17
14 (System) Sub state has been changed to AD Followup from Revised ID Needed
2022-06-17
14 (System) IANA Review state changed to Version Changed - Review Needed from IANA OK - Actions Needed
2022-06-17
14 Ketan Talaulikar New version available: draft-ietf-idr-bgp-ls-app-specific-attr-14.txt
2022-06-17
14 Ketan Talaulikar New version accepted (logged-in submitter: Ketan Talaulikar)
2022-06-17
14 Ketan Talaulikar Uploaded new revision
2022-06-02
13 (System) Changed action holders to Peter Psenak, Alvaro Retana, Jeff Tantsura, Ketan Talaulikar (IESG state changed)
2022-06-02
13 Cindy Morgan IESG state changed to IESG Evaluation::Revised I-D Needed from IESG Evaluation
2022-06-02
13 Sabrina Tanamal IANA Review state changed to IANA OK - Actions Needed from Version Changed - Review Needed
2022-06-02
13 Andrew Alston
[Ballot comment]
I've chosen to put these in as comments rather than discuss positions for now, since I don't necessarily think these comments should be …
[Ballot comment]
I've chosen to put these in as comments rather than discuss positions for now, since I don't necessarily think these comments should be blocking in nature, just there for due consideration.

In Section 2 second paragraph you have:

The format of this TLV is as follows and is similar to the
  corresponding ASLA sub-TLVs defined for OSPF and IS-IS in [RFC8920]
  and [RFC8919] respectively.

This gets a little confusing where further down only one of these RFC's is referenced as follows:

o  SABM Length : 1 octet field carrying the Standard Application
      Identifier Bit Mask Length in octets as defined in [RFC8920].
  o  UDABM Length : 1 octet field carrying the User-Defined Application
      Identifier Bit Mask Length in octets as defined in [RFC8920].
o  User-Defined Application Identifier Bit Mask : An optional set of
      bits (of size 0, 4, or 8 octets as indicated by the UDABM Length),
      where each bit represents a single user-defined application as
      defined in [RFC8919].

Various instances of this - Would the authors consider referencing both RFC's at each point so that readers are aware that the same thing applies across both ISIS and OSPF.
2022-06-02
13 Andrew Alston [Ballot Position Update] New position, No Objection, has been recorded for Andrew Alston
2022-06-02
13 (System) IANA Review state changed to Version Changed - Review Needed from IANA OK - Actions Needed
2022-06-02
13 Ketan Talaulikar New version available: draft-ietf-idr-bgp-ls-app-specific-attr-13.txt
2022-06-02
13 Ketan Talaulikar New version accepted (logged-in submitter: Ketan Talaulikar)
2022-06-02
13 Ketan Talaulikar Uploaded new revision
2022-06-01
12 Murray Kucherawy [Ballot comment]
Thanks to Kirsty Paine for the ARTART review.
2022-06-01
12 Murray Kucherawy [Ballot Position Update] New position, No Objection, has been recorded for Murray Kucherawy
2022-06-01
12 Warren Kumari
[Ballot comment]
Huge thanks to Scott Bradner for his OpsDir review of this document ( https://datatracker.ietf.org/doc/review-ietf-idr-bgp-ls-app-specific-attr-04-opsdir-early-bradner-2021-02-16/ ).
Due to a confluence of events, I was …
[Ballot comment]
Huge thanks to Scott Bradner for his OpsDir review of this document ( https://datatracker.ietf.org/doc/review-ietf-idr-bgp-ls-app-specific-attr-04-opsdir-early-bradner-2021-02-16/ ).
Due to a confluence of events, I was not able to do my regular level of review, and so, other than a quick skim of the document, I'm balloting based almost entirely on his review.
2022-06-01
12 Warren Kumari [Ballot Position Update] New position, No Objection, has been recorded for Warren Kumari
2022-06-01
12 Amanda Baber IANA Review state changed to IANA OK - Actions Needed from Version Changed - Review Needed
2022-06-01
12 Zaheduzzaman Sarker [Ballot Position Update] New position, No Objection, has been recorded for Zaheduzzaman Sarker
2022-05-31
12 Roman Danyliw
[Ballot comment]
Thank you to Paul Wouters for the SECDIR review.

** Section 2.  There is no text describing the Reserved bits.  Perhaps:

NEW
Reserved: …
[Ballot comment]
Thank you to Paul Wouters for the SECDIR review.

** Section 2.  There is no text describing the Reserved bits.  Perhaps:

NEW
Reserved: This field is reserved.  It MUST be set to zero on transmission and MUST be ignored on receipt.

** Section 8.
It is assumed that the IGP instances
  originating these TLVs will support all the required security (as
  described in [RFC8919] and [RFC8920]) to prevent any security issues
  when propagating the TLVs into BGP-LS.

I concur with John Scudder’s analysis of this text and where it could use improvement.  He eloquently described it already so I won’t repeat it here.
2022-05-31
12 Roman Danyliw [Ballot Position Update] New position, No Objection, has been recorded for Roman Danyliw
2022-05-31
12 (System) IANA Review state changed to Version Changed - Review Needed from IANA OK - Actions Needed
2022-05-31
12 Ketan Talaulikar New version available: draft-ietf-idr-bgp-ls-app-specific-attr-12.txt
2022-05-31
12 Ketan Talaulikar New version accepted (logged-in submitter: Ketan Talaulikar)
2022-05-31
12 Ketan Talaulikar Uploaded new revision
2022-05-31
11 Francesca Palombini
[Ballot comment]
Thank you for the work on this document.

Many thanks to Kirsty Paine for her ART ART review: https://mailarchive.ietf.org/arch/msg/art/Gp7TtdCUrbmf6WJy4ATcmN_DYQI/, and thanks to …
[Ballot comment]
Thank you for the work on this document.

Many thanks to Kirsty Paine for her ART ART review: https://mailarchive.ietf.org/arch/msg/art/Gp7TtdCUrbmf6WJy4ATcmN_DYQI/, and thanks to the authors for addressing her comment.

Francesca
2022-05-31
11 Francesca Palombini [Ballot Position Update] New position, No Objection, has been recorded for Francesca Palombini
2022-05-30
11 Éric Vyncke
[Ballot comment]
Thank you for the work put into this document.

Special thanks to Keyur Patel for the shepherd's write-up including the WG consensus but …
[Ballot comment]
Thank you for the work put into this document.

Special thanks to Keyur Patel for the shepherd's write-up including the WG consensus but I would have appreciated to see more about the intended status though.
2022-05-30
11 Éric Vyncke [Ballot Position Update] New position, No Objection, has been recorded for Éric Vyncke
2022-05-30
11 Erik Kline [Ballot Position Update] New position, No Objection, has been recorded for Erik Kline
2022-05-30
11 John Scudder
[Ballot discuss]
I'd like to DISCUSS some questions I have about the content of Section 4's IS-IS rules. I don't expect it will be difficult …
[Ballot discuss]
I'd like to DISCUSS some questions I have about the content of Section 4's IS-IS rules. I don't expect it will be difficult to resolve these, I just want to be sure we have the conversation.

1. In §4 (2.C),

      C.  The SRLGs advertised in IS-IS SRLG ASLA TLVs and the other
          link attributes advertised in IS-IS ASLA sub-TLVs are
          REQUIRED to be collated, on a per-application basis, for all
          applications that have their bit set in the SABM/UDABM in at
          least one of the aforementioned TLV types.
         
Is there some reason that there's no need to consider the case where both of the TLV types in question have zero-length application bit masks?

2. Later in the same paragraph,

                                                      When performing
          this collation, only the TLVs with the application's bit set
          in SABM/UDABM MUST be used when such TLVs are available from
          either TLV types.

I suspect you aren't saying what you mean, and the "only... MUST" construct is hard to puzzle out. Do you perhaps mean TLVs that don’t have the application's bit set MUST NOT be used? Because as you've written it,

- All TLVs with the bit set MUST be collated,
- Any TLVs without the bit set MAY be collated (by implication). Which doesn't seem very sensible AFAICT.

A possible rewrite, if I've understood your intention correctly, might be "When performing this collation, every TLV with the application's bit set in SABM/UDABM MUST be included, when such TLVs are available from either TLV type."

(Note also a minor fix for agreement in number, s/types/type/ in the last word.)

3. And still later in the same paragraph,

                              If the bit for an application is set in
          the SABM/UDABM of only one of the TLV types, then the
          attributes from the other TLV type with zero-length
          application bit mask MUST be also collated for that
          application, if such TLV is available.

I'm confused by the reference to a zero-length application bit mask. Can't the other TLV type have a nonzero-length application bit mask, but still have the application bit in question not set within the bit mask?

I guess probably what you mean is, if the other TLV type is present and has a zero-length application bit mask, since a zero-length SABM/UDABM basically is a wildcard, the equivalent of all bits being set (as I read RFC 8920).

If that's right, then a change seems in order, along the lines of

                              If the bit for an application is set in
          the SABM/UDABM of only one of the TLV types, and if the
          other TLV type has a zero-length application bit mask, then the
          attributes from the other TLV type with zero-length
          application bit mask MUST be also collated for that
          application, if such TLV is available.

I just interpolated the "and" clause. It's a bit wordy and could probably be further condensed, but I think it clarifies sufficiently.

On the other hand, if I'm not right about this (very possible) then I'd appreciate further discussion on what I got wrong, so we can figure out if the text needs clarification or if I just need a clue bat.
2022-05-30
11 John Scudder
[Ballot comment]
4. In §2 you reference "SABML". I was going to ask you to expand it on first use, but you only use it …
[Ballot comment]
4. In §2 you reference "SABML". I was going to ask you to expand it on first use, but you only use it once. So, please just write it out in words as "SABM Length" and don't introduce an extra acronym.

5. In §3:

  All the BGP-LS Attribute TLVs defined in the table above are REQUIRED
  to be advertised as a top-level TLV in the BGP-LS Attribute for
  carrying link attributes specific to RSVP-TE.

I suggest “... when used to carry” instead of “... for carrying”. Also, “listed in the table”, not defined in it.

6. Much of §4 is dedicated to a special case for IS-IS:

  2.  In the case of IS-IS, the following specific procedures are to be
      followed:

It would be nice to spend a few words mentioning why IS-IS needs a special case and OSPF doesn't, so that the reader doesn't have to wonder. I'm guessing that this relates to the way IS-IS uses sub-TLVs for various things whereas OSPF doesn't, so you need rules to reconcile the values in IS-IS but not OSPF?

7. §4 (2.B) needs some adjectives, "IS-IS" and "BGP-LS", respectively, to make clear which flavor of "ASLA sub-TLV" you're talking about. I *think* that here,

      B.  When the ASLA sub-TLV has the RSVP-TE application bit set,
          then the link attributes for the corresponding ASLA sub-TLV
          MUST be encoded using the respective BGP-LS top-level TLVs as
          per [RFC7752] [RFC8571] [RFC9104].
         
the first reference to "ASLA sub-TLV" is the IS-IS flavor, and the second is to the BGP-LS flavor --  but please be specific.

8. In §4,

  These rules ensure that a BGP-LS originator performs the
  advertisement for all application-specific link attributes from the
  IGP nodes that support or do not support the ASLA extension.

I don't understand this sentence. :-( For one thing, applying simple logic to "IGP nodes that support or do not support the ASLA extension" we can rewrite it as "IGP nodes", full stop, since "support or do not support" covers the entire universe by definition. That would imply the sentence could be rewritten as

  These rules ensure that a BGP-LS originator performs the
  advertisement for all application-specific link attributes from the
  IGP nodes.
 
Which doesn't really help me. :-(

9. In §5,

  It is recommended that nodes supporting this specification are
  selected as originators of BGP-LS information when advertising the
  link-state information from the IGPs.

Do you mean only such nodes should be selected? Or is it that at least one such should be among those selected? Either is supportable, I think. Whatever the answer, please clarify the text correspondingly. Although, more generally I guess BGP-LS originators ought to support all the extensions in use in a given IGP, not limited to this one, so this is really a special case of a general principle.

10. In §5,

                                    They would, however, not be able to
  support neither the application-specific link attributes nor newer
  applications that may be encoded only using the ASLA TLV.
 
Drop the "not". Also, again this seems like a special case of a general principle -- of course a BGP-LS consumer that doesn't understand a given extension can't do the thing that the extension covers. But, it's fine to remind the reader of this.

11. In §8,

                            It is assumed that the IGP instances
  originating these TLVs will support all the required security (as
  described in [RFC8919] and [RFC8920]) to prevent any security issues
  when propagating the TLVs into BGP-LS.
 
I think purporting to "prevent any security issues" is a case of seriously overpromising. A very similar issue existed in draft-ietf-idr-bgp-ls-sbfd-extensions-08. Perhaps a similar fix could be applied, although in this case, when I took a quick look at RFCs 8919 and 8920 I didn't find any "required security" of note, so I'm really not sure what if anything is being actually promised by this sentence? Can you help me understand what properties I should be expecting?

In any case, for the most part it seems fine to say your security model is the same as that of RFCs 8919 and 8920, since as we know BGP-LS tries to be just a re-rendering of the data from those suppliers. But, we should keep in mind this consideration from RFC 7752:

  Additionally, it may be considered that the export of link-state and
  TE information as described in this document constitutes a risk to
  confidentiality of mission-critical or commercially sensitive
  information about the network. 

Might it be worth reminding the reader that if there's any sensitive information contained in the new stuff you're propagating, they should take this warning to heart, since the scope across which the information is being propagated can increase considerably? I don't insist on this, I'm only raising it as a point to consider.


Nits and very minor comments --

12. The document talks about new this, new that. This probably won't age well -- keep in mind that the RFC this document will become will be around for decades, at which point none of this stuff will be "new".

It's obviously not a big deal but if it were my document I'd find a way to rewrite those "new" in a way that won't be instantly obsolete.

13. In §4,

                                The application-specific attribute
  value received via sub-TLVs within the ASLA TLV have preference over
  the value received via the top-level TLVs.
 
There's an agreement in number problem here -- perhaps rewrite as "An application-specific attribute value received via a sub-TLV within the ASLA TLV has precedence over the value received via a top-level TLV"?
2022-05-30
11 John Scudder [Ballot Position Update] New position, Discuss, has been recorded for John Scudder
2022-05-30
11 Paul Wouters [Ballot comment]
Thanks for resolving my secdir comments.
2022-05-30
11 Paul Wouters [Ballot Position Update] New position, No Objection, has been recorded for Paul Wouters
2022-05-27
11 Robert Wilton
[Ballot comment]
Hi,

Thanks for the manageability considerations section.

Only one minor nit in section 5.  Deployment Considerations

  They would, however, not be able …
[Ballot comment]
Hi,

Thanks for the manageability considerations section.

Only one minor nit in section 5.  Deployment Considerations

  They would, however, not be able to
  support neither the application-specific link attributes nor newer
  applications that may be encoded only using the ASLA TLV.

I think that the "not" here is incorrect and should be deleted.

Rob
2022-05-27
11 Robert Wilton [Ballot Position Update] New position, No Objection, has been recorded for Robert Wilton
2022-05-25
11 Lars Eggert
[Ballot comment]
# GEN AD review of draft-ietf-idr-bgp-ls-app-specific-attr-11

CC @larseggert

Thanks to Russ Housley for the General Area Review Team (Gen-ART) review
(https://mailarchive.ietf.org/arch/msg/gen-art/T9RNz1ar99diDYpCMY75m1asL2w). …
[Ballot comment]
# GEN AD review of draft-ietf-idr-bgp-ls-app-specific-attr-11

CC @larseggert

Thanks to Russ Housley for the General Area Review Team (Gen-ART) review
(https://mailarchive.ietf.org/arch/msg/gen-art/T9RNz1ar99diDYpCMY75m1asL2w).

## Comments

### Section 2, paragraph 5
```
    where:
```
It might be helpful to state the length of the (fixed-length) fields in
the bullet list below, so readers don't have to count bits in Figure 1.

### Inclusive language

Found terminology that should be reviewed for inclusivity; see
https://www.rfc-editor.org/part2/#inclusive_language for background and more
guidance:

* Term `traditional`; alternatives might be `classic`, `classical`, `common`,
  `conventional`, `customary`, `fixed`, `habitual`, `historic`,
  `long-established`, `popular`, `prescribed`, `regular`, `rooted`,
  `time-honored`, `universal`, `widely used`, `widespread`

## Nits

All comments below are about very minor potential issues that you may choose to
address in some way - or ignore - as you see fit. Some were flagged by
automated tools (via https://github.com/larseggert/ietf-reviewtool), so there
will likely be some false positives. There is no need to let me know what you
did with these suggestions.

### Boilerplate

Document still refers to the "Simplified BSD License", which was corrected in
the TLP on September 21, 2021. It should instead refer to the "Revised BSD
License".

### Grammar/style

#### Section 2, paragraph 14
```
rlying IGPs are also encoded in a similar manner in BGP-LS. The following ta
                            ^^^^^^^^^^^^^^^^^^^
```
Consider replacing this phrase with the adverb "similarly" to avoid wordiness.

## Notes

This review is in the ["IETF Comments" Markdown format][ICMF], You can use the
[`ietf-comments` tool][ICT] to automatically convert this review into
individual GitHub issues. Review generated by the [`ietf-reviewtool`][IRT].

[ICMF]: https://github.com/mnot/ietf-comments/blob/main/format.md
[ICT]: https://github.com/mnot/ietf-comments
[IRT]: https://github.com/larseggert/ietf-reviewtool
2022-05-25
11 Lars Eggert [Ballot Position Update] New position, No Objection, has been recorded for Lars Eggert
2022-05-17
11 (System) IANA Review state changed to IANA OK - Actions Needed from Version Changed - Review Needed
2022-05-13
11 Cindy Morgan Placed on agenda for telechat - 2022-06-02
2022-05-13
11 Alvaro Retana Ballot has been issued
2022-05-13
11 Alvaro Retana [Ballot Position Update] New position, Yes, has been recorded for Alvaro Retana
2022-05-13
11 Alvaro Retana Created "Approve" ballot
2022-05-13
11 Alvaro Retana IESG state changed to IESG Evaluation from Waiting for Writeup
2022-05-13
11 Alvaro Retana Ballot writeup was changed
2022-05-13
11 (System) IANA Review state changed to Version Changed - Review Needed from IANA OK - Actions Needed
2022-05-13
11 Ketan Talaulikar New version available: draft-ietf-idr-bgp-ls-app-specific-attr-11.txt
2022-05-13
11 Ketan Talaulikar New version accepted (logged-in submitter: Ketan Talaulikar)
2022-05-13
11 Ketan Talaulikar Uploaded new revision
2022-05-13
10 (System) IESG state changed to Waiting for Writeup from In Last Call
2022-05-09
10 Kirsty Paine Request for Last Call review by ARTART Completed: Ready. Reviewer: Kirsty Paine. Sent review to list.
2022-05-06
10 (System) IANA Review state changed to IANA OK - Actions Needed from IANA - Review Needed
2022-05-06
10 (System)
(Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs:

The IANA Functions Operator has completed its review of draft-ietf-idr-bgp-ls-app-specific-attr-10. If any part of this review is inaccurate, please let …
(Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs:

The IANA Functions Operator has completed its review of draft-ietf-idr-bgp-ls-app-specific-attr-10. If any part of this review is inaccurate, please let us know.

The IANA Functions Operator understands that, upon approval of this document, there is a single action which we must complete.

In the BGP-LS Node Descriptor, Link Descriptor, Prefix Descriptor, and Attribute TLVs registry on the Border Gateway Protocol - Link State (BGP-LS) Parameters registry page located at:

https://www.iana.org/assignments/bgp-ls-parameters/

the existing, temporary registration for:

TLV Code Point: 1122
Description: Application-Specific Link Attributes TLV

will be made permanent and its reference changed to [ RFC-to-be ].

The IANA Functions Operator understands that this is the only action required to be completed upon approval of this document.

Note:  The actions requested in this document will not be completed until the document has been approved for publication as an RFC. This message is meant only to confirm the list of actions that will be performed.

For definitions of IANA review states, please see:

https://datatracker.ietf.org/help/state/draft/iana-review

Thank you,

Michelle Thangtamsatid
IANA Services Specialist
2022-05-02
10 Russ Housley Request for Last Call review by GENART Completed: Ready. Reviewer: Russ Housley. Sent review to list.
2022-04-28
10 Barry Leiba Request for Last Call review by ARTART is assigned to Kirsty Paine
2022-04-28
10 Barry Leiba Request for Last Call review by ARTART is assigned to Kirsty Paine
2022-04-28
10 Jean Mahoney Request for Last Call review by GENART is assigned to Russ Housley
2022-04-28
10 Jean Mahoney Request for Last Call review by GENART is assigned to Russ Housley
2022-04-28
10 Cindy Morgan IANA Review state changed to IANA - Review Needed
2022-04-28
10 Cindy Morgan
The following Last Call announcement was sent out (ends 2022-05-13):

From: The IESG
To: IETF-Announce
CC: aretana.ietf@gmail.com, draft-ietf-idr-bgp-ls-app-specific-attr@ietf.org, idr-chairs@ietf.org, idr@ietf.org, keyur@arrcus.com …
The following Last Call announcement was sent out (ends 2022-05-13):

From: The IESG
To: IETF-Announce
CC: aretana.ietf@gmail.com, draft-ietf-idr-bgp-ls-app-specific-attr@ietf.org, idr-chairs@ietf.org, idr@ietf.org, keyur@arrcus.com, shares@ndzh.com
Reply-To: last-call@ietf.org
Sender:
Subject: Last Call:  (Application-Specific Attributes Advertisement with BGP Link-State) to Proposed Standard


The IESG has received a request from the Inter-Domain Routing WG (idr) to
consider the following document: - 'Application-Specific Attributes
Advertisement with BGP Link-State'
  as Proposed Standard

The IESG plans to make a decision in the next few weeks, and solicits final
comments on this action. Please send substantive comments to the
last-call@ietf.org mailing lists by 2022-05-13. Exceptionally, comments may
be sent to iesg@ietf.org instead. In either case, please retain the beginning
of the Subject line to allow automated sorting.

Abstract


  Various link attributes have been defined in link-state routing
  protocols like OSPF and IS-IS in the context of the MPLS Traffic
  Engineering (TE) and GMPLS.  BGP Link-State (BGP-LS) extensions have
  been defined to distribute these attributes along with other topology
  information from these link-state routing protocols.

  New extensions have been defined for link-state routing protocols
  that enable distribution of application-specific link attributes for
  existing as well as newer applications such as Segment Routing.  This
  document defines extensions to BGP-LS to enable the advertisement of
  these application-specific attributes as a part of the topology
  information from the network.




The file can be obtained via
https://datatracker.ietf.org/doc/draft-ietf-idr-bgp-ls-app-specific-attr/



No IPR declarations have been submitted directly on this I-D.




2022-04-28
10 Cindy Morgan IESG state changed to In Last Call from Last Call Requested
2022-04-28
10 Alvaro Retana Last call was requested
2022-04-28
10 Alvaro Retana Ballot approval text was generated
2022-04-28
10 Alvaro Retana Ballot writeup was generated
2022-04-28
10 Alvaro Retana IESG state changed to Last Call Requested from AD Evaluation::AD Followup
2022-04-28
10 Alvaro Retana Last call announcement was changed
2022-04-28
10 Alvaro Retana Last call announcement was generated
2022-04-28
10 Alvaro Retana Intended Status changed to Proposed Standard from None
2022-04-28
10 (System) Changed action holders to Alvaro Retana (IESG state changed)
2022-04-28
10 (System) Sub state has been changed to AD Followup from Revised ID Needed
2022-04-28
10 Ketan Talaulikar New version available: draft-ietf-idr-bgp-ls-app-specific-attr-10.txt
2022-04-28
10 Ketan Talaulikar New version accepted (logged-in submitter: Ketan Talaulikar)
2022-04-28
10 Ketan Talaulikar Uploaded new revision
2022-04-15
09 (System) Changed action holders to Peter Psenak, Alvaro Retana, Jeff Tantsura, Ketan Talaulikar (IESG state changed)
2022-04-15
09 Alvaro Retana IESG state changed to AD Evaluation::Revised I-D Needed from AD Evaluation::AD Followup
2022-04-14
09 (System) Changed action holders to Alvaro Retana (IESG state changed)
2022-04-14
09 (System) Sub state has been changed to AD Followup from Revised ID Needed
2022-04-14
09 Ketan Talaulikar New version available: draft-ietf-idr-bgp-ls-app-specific-attr-09.txt
2022-04-14
09 (System) New version accepted (logged-in submitter: Ketan Talaulikar)
2022-04-14
09 Ketan Talaulikar Uploaded new revision
2022-04-11
08 Alvaro Retana === AD Review of draft-ietf-idr-bgp-ls-app-specific-attr-08 ===
https://mailarchive.ietf.org/arch/msg/idr/iV3nHMcbUNXzSQ8gBNmEZgZ-ND8/
2022-04-11
08 (System) Changed action holders to Peter Psenak, Alvaro Retana, Jeff Tantsura, Ketan Talaulikar (IESG state changed)
2022-04-11
08 Alvaro Retana IESG state changed to AD Evaluation::Revised I-D Needed from AD Evaluation
2022-03-31
08 (System) Changed action holders to Alvaro Retana (IESG state changed)
2022-03-31
08 Alvaro Retana IESG state changed to AD Evaluation from Publication Requested
2022-03-31
08 Alvaro Retana Changed consensus to Yes from Unknown
2021-11-10
08 Ketan Talaulikar New version available: draft-ietf-idr-bgp-ls-app-specific-attr-08.txt
2021-11-10
08 (System) New version accepted (logged-in submitter: Ketan Talaulikar)
2021-11-10
08 Ketan Talaulikar Uploaded new revision
2021-06-25
07 Ketan Talaulikar New version available: draft-ietf-idr-bgp-ls-app-specific-attr-07.txt
2021-06-25
07 (System) New version accepted (logged-in submitter: Ketan Talaulikar)
2021-06-25
07 Ketan Talaulikar Uploaded new revision
2021-05-21
06 Ketan Talaulikar New version available: draft-ietf-idr-bgp-ls-app-specific-attr-06.txt
2021-05-21
06 (System) New version accepted (logged-in submitter: Ketan Talaulikar)
2021-05-21
06 Ketan Talaulikar Uploaded new revision
2021-05-21
05 Susan Hares
As required by RFC 4858, this is the current template for the Document
Shepherd Write-Up. Changes are expected over time.

This version is dated …
As required by RFC 4858, this is the current template for the Document
Shepherd Write-Up. Changes are expected over time.

This version is dated May 2, 2021.

(1) What type of RFC is being requested?  Why is this the proper type of RFC?  Is this type of RFC indicated in the title page header?

Proposed Standard.

(2) The IESG approval announcement includes a Document Announcement Write-Up.
Please provide such a Document Announcement Write-Up.
Recent examples can be found in the "Action" announcements for approved documents.

Technical Summary:
  Various link attributes have been defined in link-state routing
  protocols like OSPF and IS-IS in the context of the MPLS Traffic
  Engineering (TE) and GMPLS.  BGP Link-State (BGP-LS) extensions have
  been defined to distribute these attributes along with other topology
  information from these link-state routing protocols.  Many of these
  link attributes can be used for applications other than MPLS-TE or
  GMPLS.

  Extensions to link-state routing protocols have been defined for such
  link attributes that enable distribution of their application-
  specific values.  This document defines extensions to BGP-LS address-
  family to enable advertisement of these application-specific
  attributes as a part of the topology information from the network.

Working Group Summary:

The working group provided a normal consensus for BGP-LS drafts. This document has also passed Rtgdir and Opsdir reviews.

Document Quality:
Implementations: 2 implementations
https://trac.ietf.org/trac/idr/wiki/draft-ietf-idr-bgp-ls-app-specific-attr%20implementations

Note: 1 vendor has two different implementations.
WG was fine with single vendor


Personnel:

Who is the Document Shepherd? Keyur Patel
Who is the Responsible Area Director?  Alvaro Retana

(3) Briefly describe the review of this document that was performed by the Document Shepherd.
This document has been through the working group review and has received and incorporated all the necessary comments.  This document has also been reviewed by Andy Smith and Himanshu Shah as part of Rtgdir review and Scott Bradner as part of Opsdir review.

(4) Does the document Shepherd have any concerns about the depth or breadth of the reviews that have been performed?
No.

(5) Do portions of the document need review from a particular or from broader perspective, e.g., security,
operational complexity, AAA, DNS, DHCP, XML, or internationalization? If so, describe the review that took place.

No.

(6) Describe any specific concerns or issues that the Document Shepherd has with this document that the Responsible Area Director and/or the IESG should be aware of? For example, perhaps he or she is uncomfortable with certain parts of the document, or has concerns whether there really is a need for it. In any event, if the WG has discussed those issues and has indicated that it still wishes to advance the document, detail those concerns here.

No concerns.

(7) Has each author confirmed that any and all appropriate IPR disclosures required for full conformance with the provisions of BCP 78 and BCP 79 have already been filed. If not, explain why?
  Ketan Talaulikar:
  https://mailarchive.ietf.org/arch/msg/idr/_9y0FOv86CD65LISiQNlioyehCI/

  Peter Psenak
  https://mailarchive.ietf.org/arch/msg/idr/Jh7eUcNUT6whcBTi_Opy6adZYW8/

  Jeff Tantsura
  https://mailarchive.ietf.org/arch/msg/idr/s4Hw-9cbl1zW4tN14JovVZ0H1NA/

(8) Has an IPR disclosure been filed that references this document? If so, summarize any WG discussion and conclusion regarding the IPR disclosures.

No IPR disclosures.

(9) How solid is the WG consensus behind this document?
Does it represent the strong concurrence of a few individuals, with others being silent, or does the WG as a whole understand and agree with it?

The feedback on the document is strong from core group of BGP-LS IDR participants.

(10) Has anyone threatened an appeal or otherwise indicated extreme discontent?
If so, please summarise the areas of conflict in separate email messages to the Responsible Area Director.
(It should be in a separate email because this questionnaire is publicly available.)

no conflict.

(11) Identify any ID nits the Document Shepherd has found in this document. (See http://www.ietf.org/tools/idnits/ and the Internet-Drafts Checklist). Boilerplate checks are not enough; this check needs to be thorough.

no nits.

(12) Describe how the document meets any required formal review criteria, such as the MIB Doctor, YANG Doctor, media type, and URI type reviews.

no formal review required.

(13) Have all references within this document been identified as either normative or informative?

Yes.

(14) Are there normative references to documents that are not ready for advancement or are otherwise in an unclear state? If such normative references exist, what is the plan for their completion?

No.

(15) Are there downward normative references references (see RFC 3967)? If so, list these downward references to support the Area Director in the Last Call procedure.

No.

(16) Will publication of this document change the status of any existing RFCs? Are those RFCs listed on the title page header, listed in the abstract, and discussed in the introduction? If the RFCs are not listed in the Abstract and Introduction, explain why, and point to the part of the document where the relationship of this document to the other RFCs is discussed. If this information is not in the document, explain why the WG considers it unnecessary.

No.

(17) Describe the Document Shepherd's review of the IANA considerations section, especially with regard to its consistency with the body of the document.

Confirm that all protocol extensions that the document makes are associated with the appropriate reservations in IANA registries.
Confirm that any referenced IANA registries have been clearly identified.
Confirm that newly created IANA registries include a detailed specification of the initial contents for the registry,
that allocations procedures for future registrations are defined, and a reasonable name for the new registry has been suggested (see RFC 8126).

New values in registry:    "BGP-LS Node Descriptor, Link Descriptor, Prefix Descriptor, and Attribute TLVs". 

This document requests allocation of code-point 1122 for Application-specific Link Attributes TLV from the above mentioned registries.

(18) List any new IANA registries that require Expert Review for future allocations.
Provide any public guidance that the IESG would find useful in selecting the IANA Experts for these new registries.

No new registries.

(19) Describe reviews and automated checks performed by the Document Shepherd to validate sections of the
document written in a formal language, such as XML code, BNF rules, MIB definitions, YANG modules, etc.

No formal language.

(20) If the document contains a YANG module, has the module been checked with any of the recommended
validation tools (https://trac.ietf.org/trac/ops/wiki/yang-review-tools) for syntax and formatting validation?
If there are any resulting errors or warnings, what is the justification for not fixing them at this time?
Does the YANG module comply with the Network Management Datastore Architecture (NMDA) as specified in RFC8342?

No Yang modules needed.
2021-05-21
05 Susan Hares Responsible AD changed to Alvaro Retana
2021-05-21
05 Susan Hares IETF WG state changed to Submitted to IESG for Publication from WG Consensus: Waiting for Write-Up
2021-05-21
05 Susan Hares IESG state changed to Publication Requested from I-D Exists
2021-05-21
05 Susan Hares IESG process started in state Publication Requested
2021-05-20
05 Paul Wouters Request for Early review by SECDIR Completed: Has Nits. Reviewer: Paul Wouters. Sent review to list.
2021-05-02
05 Keyur Patel
As required by RFC 4858, this is the current template for the Document
Shepherd Write-Up. Changes are expected over time.

This version is dated …
As required by RFC 4858, this is the current template for the Document
Shepherd Write-Up. Changes are expected over time.

This version is dated May 2, 2021.

(1) What type of RFC is being requested?  Why is this the proper type of RFC?  Is this type of RFC indicated in the title page header?

Proposed Standard.

(2) The IESG approval announcement includes a Document Announcement Write-Up.
Please provide such a Document Announcement Write-Up.
Recent examples can be found in the "Action" announcements for approved documents.

Technical Summary:
  Various link attributes have been defined in link-state routing
  protocols like OSPF and IS-IS in the context of the MPLS Traffic
  Engineering (TE) and GMPLS.  BGP Link-State (BGP-LS) extensions have
  been defined to distribute these attributes along with other topology
  information from these link-state routing protocols.  Many of these
  link attributes can be used for applications other than MPLS-TE or
  GMPLS.

  Extensions to link-state routing protocols have been defined for such
  link attributes that enable distribution of their application-
  specific values.  This document defines extensions to BGP-LS address-
  family to enable advertisement of these application-specific
  attributes as a part of the topology information from the network.

Working Group Summary:

The working group provided a normal consensus for BGP-LS drafts. This document has also passed Rtgdir and Opsdir reviews.

Document Quality:
Implementations: 2 implementations
https://trac.ietf.org/trac/idr/wiki/draft-ietf-idr-bgp-ls-app-specific-attr%20implementations

Note: 1 vendor has two different implementations.
WG was fine with single vendor


Personnel:

Who is the Document Shepherd? Keyur Patel
Who is the Responsible Area Director?  Alvaro Retana

(3) Briefly describe the review of this document that was performed by the Document Shepherd.
This document has been through the working group review and has received and incorporated all the necessary comments.  This document has also been reviewed by Andy Smith and Himanshu Shah as part of Rtgdir review and Scott Bradner as part of Opsdir review.

(4) Does the document Shepherd have any concerns about the depth or breadth of the reviews that have been performed?
No.

(5) Do portions of the document need review from a particular or from broader perspective, e.g., security,
operational complexity, AAA, DNS, DHCP, XML, or internationalization? If so, describe the review that took place.

No.

(6) Describe any specific concerns or issues that the Document Shepherd has with this document that the Responsible Area Director and/or the IESG should be aware of? For example, perhaps he or she is uncomfortable with certain parts of the document, or has concerns whether there really is a need for it. In any event, if the WG has discussed those issues and has indicated that it still wishes to advance the document, detail those concerns here.

No concerns.

(7) Has each author confirmed that any and all appropriate IPR disclosures required for full conformance with the provisions of BCP 78 and BCP 79 have already been filed. If not, explain why?
  Ketan Talaulikar:
  https://mailarchive.ietf.org/arch/msg/idr/_9y0FOv86CD65LISiQNlioyehCI/

  Peter Psenak
  https://mailarchive.ietf.org/arch/msg/idr/Jh7eUcNUT6whcBTi_Opy6adZYW8/

  Jeff Tantsura
  https://mailarchive.ietf.org/arch/msg/idr/s4Hw-9cbl1zW4tN14JovVZ0H1NA/

(8) Has an IPR disclosure been filed that references this document? If so, summarize any WG discussion and conclusion regarding the IPR disclosures.

No IPR disclosures.

(9) How solid is the WG consensus behind this document?
Does it represent the strong concurrence of a few individuals, with others being silent, or does the WG as a whole understand and agree with it?

The feedback on the document is strong from core group of BGP-LS IDR participants.

(10) Has anyone threatened an appeal or otherwise indicated extreme discontent?
If so, please summarise the areas of conflict in separate email messages to the Responsible Area Director.
(It should be in a separate email because this questionnaire is publicly available.)

no conflict.

(11) Identify any ID nits the Document Shepherd has found in this document. (See http://www.ietf.org/tools/idnits/ and the Internet-Drafts Checklist). Boilerplate checks are not enough; this check needs to be thorough.

no nits.

(12) Describe how the document meets any required formal review criteria, such as the MIB Doctor, YANG Doctor, media type, and URI type reviews.

no formal review required.

(13) Have all references within this document been identified as either normative or informative?

Yes.

(14) Are there normative references to documents that are not ready for advancement or are otherwise in an unclear state? If such normative references exist, what is the plan for their completion?

No.

(15) Are there downward normative references references (see RFC 3967)? If so, list these downward references to support the Area Director in the Last Call procedure.

No.

(16) Will publication of this document change the status of any existing RFCs? Are those RFCs listed on the title page header, listed in the abstract, and discussed in the introduction? If the RFCs are not listed in the Abstract and Introduction, explain why, and point to the part of the document where the relationship of this document to the other RFCs is discussed. If this information is not in the document, explain why the WG considers it unnecessary.

No.

(17) Describe the Document Shepherd's review of the IANA considerations section, especially with regard to its consistency with the body of the document.

Confirm that all protocol extensions that the document makes are associated with the appropriate reservations in IANA registries.
Confirm that any referenced IANA registries have been clearly identified.
Confirm that newly created IANA registries include a detailed specification of the initial contents for the registry,
that allocations procedures for future registrations are defined, and a reasonable name for the new registry has been suggested (see RFC 8126).

New values in registry:    "BGP-LS Node Descriptor, Link Descriptor, Prefix Descriptor, and Attribute TLVs". 

This document requests allocation of code-point 1122 for Application-specific Link Attributes TLV from the above mentioned registries.

(18) List any new IANA registries that require Expert Review for future allocations.
Provide any public guidance that the IESG would find useful in selecting the IANA Experts for these new registries.

No new registries.

(19) Describe reviews and automated checks performed by the Document Shepherd to validate sections of the
document written in a formal language, such as XML code, BNF rules, MIB definitions, YANG modules, etc.

No formal language.

(20) If the document contains a YANG module, has the module been checked with any of the recommended
validation tools (https://trac.ietf.org/trac/ops/wiki/yang-review-tools) for syntax and formatting validation?
If there are any resulting errors or warnings, what is the justification for not fixing them at this time?
Does the YANG module comply with the Network Management Datastore Architecture (NMDA) as specified in RFC8342?

No Yang modules needed.
2021-03-08
05 Ketan Talaulikar New version available: draft-ietf-idr-bgp-ls-app-specific-attr-05.txt
2021-03-08
05 (System) New version accepted (logged-in submitter: Ketan Talaulikar)
2021-03-08
05 Ketan Talaulikar Uploaded new revision
2021-02-19
04 Himanshu Shah Request for Early review by RTGDIR Completed: Ready. Reviewer: Himanshu Shah. Sent review to list.
2021-02-18
04 Andy Smith Request for Early review by RTGDIR Completed: Ready. Reviewer: Andy Smith. Sent review to list.
2021-02-16
04 Scott Bradner Request for Early review by OPSDIR Completed: Ready. Reviewer: Scott Bradner. Sent review to list.
2021-02-16
04 Luc André Burdet Request for Early review by RTGDIR is assigned to Andy Smith
2021-02-16
04 Luc André Burdet Request for Early review by RTGDIR is assigned to Andy Smith
2021-02-16
04 Luc André Burdet Request for Early review by RTGDIR is assigned to Himanshu Shah
2021-02-16
04 Luc André Burdet Request for Early review by RTGDIR is assigned to Himanshu Shah
2021-02-11
04 Tero Kivinen Request for Early review by SECDIR is assigned to Paul Wouters
2021-02-11
04 Tero Kivinen Request for Early review by SECDIR is assigned to Paul Wouters
2021-02-11
04 Tero Kivinen Closed request for Early review by SECDIR with state 'Withdrawn': Duplicate review request
2021-02-09
04 Gunter Van de Velde Request for Early review by OPSDIR is assigned to Scott Bradner
2021-02-09
04 Gunter Van de Velde Request for Early review by OPSDIR is assigned to Scott Bradner
2021-02-09
04 Gunter Van de Velde Closed request for Early review by OPSDIR with state 'Overtaken by Events'
2021-02-05
04 Susan Hares Requested Early review by RTGDIR
2021-02-05
04 Susan Hares Requested Early review by OPSDIR
2021-02-05
04 Susan Hares Requested Early review by SECDIR
2021-02-05
04 Susan Hares Requested Early review by RTGDIR
2021-02-05
04 Susan Hares Requested Early review by OPSDIR
2021-02-05
04 Susan Hares Requested Early review by SECDIR
2021-02-05
04 Susan Hares Notification list changed to shares@ndzh.com, keyur@arrcus.com from shares@ndzh.com because the document shepherd was set
2021-02-05
04 Susan Hares Document shepherd changed to Keyur Patel
2021-02-05
04 Susan Hares
As required by RFC 4858, this is the current template for the Document
Shepherd Write-Up. Changes are expected over time.

This version is dated …
As required by RFC 4858, this is the current template for the Document
Shepherd Write-Up. Changes are expected over time.

This version is dated 1 November 2019.

(1) What type of RFC is being requested: Proposed Standard:

Why is this the proper type of RFC?
Is this type of RFC indicated in the title page header?

(2) The IESG approval announcement includes a Document Announcement Write-Up.
Please provide such a Document Announcement Write-Up.
Recent examples can be found in the "Action" announcements for approved documents.

Technical Summary:
  Various link attributes have been defined in link-state routing
  protocols like OSPF and IS-IS in the context of the MPLS Traffic
  Engineering (TE) and GMPLS.  BGP Link-State (BGP-LS) extensions have
  been defined to distribute these attributes along with other topology
  information from these link-state routing protocols.  Many of these
  link attributes can be used for applications other than MPLS-TE or
  GMPLS.

  Extensions to link-state routing protocols have been defined for such
  link attributes that enable distribution of their application-
  specific values.  This document defines extensions to BGP-LS address-
  family to enable advertisement of these application-specific
  attributes as a part of the topology information from the network.

  [Keyur - You may want to add additional details here]

Working Group Summary:

The working group provided a normal consensus for BGP-LS drafts.


Document Quality:
Implementations: 2 implementations
https://trac.ietf.org/trac/idr/wiki/draft-ietf-idr-bgp-ls-app-specific-attr%20implementations

Note: 1 vendor has two different implementations.
WG was fine with single vendor
[You may have to query again on the list.]

Personnel:

Who is the Document Shepherd? Keyur Patel
Who is the Responsible Area Director?  Alvaro Retana

(3) Briefly describe the review of this document that was performed by the Document Shepherd.
(TBD)

(4) Does the document Shepherd have any concerns about the depth or breadth of the reviews that have been performed?
(TBD) -
[Sue's note: Early reviews have been requested from RTG-DIR, OPS-DIR, and SEC-DIR - due on 2/19/2021]
Usually it takes 40+ days to get to the bottom of Alvaro's queue - so it helps to get an early review in
case there are problems. ]

(5) Do portions of the document need review from a particular or from broader perspective, e.g., security,
operational complexity, AAA, DNS, DHCP, XML, or internationalization? If so, describe the review that took place.

[TBD] - no is generally my answer

(6) Describe any specific concerns or issues that the Document Shepherd has with this document that the Responsible Area Director and/or the IESG should be aware of? For example, perhaps he or she is uncomfortable with certain parts of the document, or has concerns whether there really is a need for it. In any event, if the WG has discussed those issues and has indicated that it still wishes to advance the document, detail those concerns here.

(TBD)

(7) Has each author confirmed that any and all appropriate IPR disclosures required for full conformance with the provisions of BCP 78 and BCP 79 have already been filed. If not, explain why?
  Ketan Talaulikar:
  https://mailarchive.ietf.org/arch/msg/idr/_9y0FOv86CD65LISiQNlioyehCI/

  Peter Psenak
  https://mailarchive.ietf.org/arch/msg/idr/Jh7eUcNUT6whcBTi_Opy6adZYW8/

  Jeff Tantsura
  https://mailarchive.ietf.org/arch/msg/idr/s4Hw-9cbl1zW4tN14JovVZ0H1NA/

(8) Has an IPR disclosure been filed that references this document? If so, summarize any WG discussion and conclusion regarding the IPR disclosures.
No IPR disclosures

(9) How solid is the WG consensus behind this document?
Does it represent the strong concurrence of a few individuals, with others being silent, or does the WG as a whole understand and agree with it?

Solid group of BGP-LS IDR participants


(10) Has anyone threatened an appeal or otherwise indicated extreme discontent?
If so, please summarise the areas of conflict in separate email messages to the Responsible Area Director.
(It should be in a separate email because this questionnaire is publicly available.)

no conflict.

(11) Identify any ID nits the Document Shepherd has found in this document. (See http://www.ietf.org/tools/idnits/ and the Internet-Drafts Checklist). Boilerplate checks are not enough; this check needs to be thorough.
(TBD)

(12) Describe how the document meets any required formal review criteria, such as the MIB Doctor, YANG Doctor, media type, and URI type reviews.
(no formal review required)

(13) Have all references within this document been identified as either normative or informative?
(TBD)

(14) Are there normative references to documents that are not ready for advancement or are otherwise in an unclear state? If such normative references exist, what is the plan for their completion?
(TBD)

(15) Are there downward normative references references (see RFC 3967)? If so, list these downward references to support the Area Director in the Last Call procedure.
(TBD)

(16) Will publication of this document change the status of any existing RFCs? Are those RFCs listed on the title page header, listed in the abstract, and discussed in the introduction? If the RFCs are not listed in the Abstract and Introduction, explain why, and point to the part of the document where the relationship of this document to the other RFCs is discussed. If this information is not in the document, explain why the WG considers it unnecessary.
(no new features)

(17) Describe the Document Shepherd's review of the IANA considerations section, especially with regard to its consistency with the body of the document.

Confirm that all protocol extensions that the document makes are associated with the appropriate reservations in IANA registries.
Confirm that any referenced IANA registries have been clearly identified.
Confirm that newly created IANA registries include a detailed specification of the initial contents for the registry,
that allocations procedures for future registrations are defined, and a reasonable name for the new registry has been suggested (see RFC 8126).

New values in registry:    "BGP-LS Node Descriptor, Link Descriptor, Prefix Descriptor, and Attribute TLVs"
(TBD on Check)

(18) List any new IANA registries that require Expert Review for future allocations.
Provide any public guidance that the IESG would find useful in selecting the IANA Experts for these new registries.

No new registries.

(19) Describe reviews and automated checks performed by the Document Shepherd to validate sections of the
document written in a formal language, such as XML code, BNF rules, MIB definitions, YANG modules, etc.

No formal language.

(20) If the document contains a YANG module, has the module been checked with any of the recommended
validation tools (https://trac.ietf.org/trac/ops/wiki/yang-review-tools) for syntax and formatting validation?
If there are any resulting errors or warnings, what is the justification for not fixing them at this time?
Does the YANG module comply with the Network Management Datastore Architecture (NMDA) as specified in RFC8342?

No Yang modules
2020-11-18
04 Susan Hares Tag Other - see Comment Log cleared.
2020-11-18
04 Susan Hares IETF WG state changed to WG Consensus: Waiting for Write-Up from In WG Last Call
2020-11-14
04 Ketan Talaulikar New version available: draft-ietf-idr-bgp-ls-app-specific-attr-04.txt
2020-11-14
04 (System) New version accepted (logged-in submitter: Ketan Talaulikar)
2020-11-14
04 Ketan Talaulikar Uploaded new revision
2020-11-01
03 Susan Hares Missing IPR statement from Peter Psenak.
2020-11-01
03 Susan Hares Tag Other - see Comment Log set.
2020-11-01
03 Susan Hares Notification list changed to shares@ndzh.com because the document shepherd was set
2020-11-01
03 Susan Hares Document shepherd changed to Susan Hares
2020-07-25
03 Ketan Talaulikar New version available: draft-ietf-idr-bgp-ls-app-specific-attr-03.txt
2020-07-25
03 (System) New version accepted (logged-in submitter: Ketan Talaulikar)
2020-07-25
03 Ketan Talaulikar Uploaded new revision
2020-07-14
02 Susan Hares IETF WG state changed to In WG Last Call from WG Document
2020-05-18
02 Ketan Talaulikar New version available: draft-ietf-idr-bgp-ls-app-specific-attr-02.txt
2020-05-18
02 (System) New version approved
2020-05-18
02 (System) Request for posting confirmation emailed to previous authors: Peter Psenak , Ketan Talaulikar , Jeff Tantsura
2020-05-18
02 Ketan Talaulikar Uploaded new revision
2019-11-16
01 Ketan Talaulikar New version available: draft-ietf-idr-bgp-ls-app-specific-attr-01.txt
2019-11-16
01 (System) New version approved
2019-11-16
01 (System) Request for posting confirmation emailed to previous authors: Ketan Talaulikar , Peter Psenak , Jeff Tantsura
2019-11-16
01 Ketan Talaulikar Uploaded new revision
2019-06-02
00 Susan Hares This document now replaces draft-ketant-idr-bgp-ls-app-specific-attr instead of None
2019-06-02
00 Ketan Talaulikar New version available: draft-ietf-idr-bgp-ls-app-specific-attr-00.txt
2019-06-02
00 (System) WG -00 approved
2019-05-30
00 Ketan Talaulikar Set submitter to "Ketan Talaulikar ", replaces to draft-ketant-idr-bgp-ls-app-specific-attr and sent approval email to group chairs: idr-chairs@ietf.org
2019-05-30
00 Ketan Talaulikar Uploaded new revision