Application-Specific Link Attributes Advertisement Using the Border Gateway Protocol - Link State (BGP-LS)
draft-ietf-idr-bgp-ls-app-specific-attr-16
Revision differences
Document history
Date | Rev. | By | Action |
---|---|---|---|
2022-08-17
|
16 | (System) | RFC Editor state changed to AUTH48-DONE from AUTH48 |
2022-08-10
|
16 | (System) | RFC Editor state changed to AUTH48 |
2022-07-22
|
16 | (System) | RFC Editor state changed to RFC-EDITOR from EDIT |
2022-07-11
|
16 | (System) | IANA Action state changed to RFC-Ed-Ack from Waiting on RFC Editor |
2022-07-11
|
16 | (System) | IANA Action state changed to Waiting on RFC Editor from In Progress |
2022-07-11
|
16 | (System) | IANA Action state changed to In Progress from Waiting on Authors |
2022-07-08
|
16 | (System) | IANA Action state changed to Waiting on Authors from In Progress |
2022-07-07
|
16 | (System) | RFC Editor state changed to EDIT |
2022-07-07
|
16 | (System) | IESG state changed to RFC Ed Queue from Approved-announcement sent |
2022-07-07
|
16 | (System) | Announcement was received by RFC Editor |
2022-07-07
|
16 | (System) | IANA Action state changed to In Progress |
2022-07-07
|
16 | Ketan Talaulikar | New version available: draft-ietf-idr-bgp-ls-app-specific-attr-16.txt |
2022-07-07
|
16 | Ketan Talaulikar | New version accepted (logged-in submitter: Ketan Talaulikar) |
2022-07-07
|
16 | Ketan Talaulikar | Uploaded new revision |
2022-07-07
|
15 | Cindy Morgan | IESG state changed to Approved-announcement sent from Approved-announcement to be sent |
2022-07-07
|
15 | Cindy Morgan | IESG has approved the document |
2022-07-07
|
15 | Cindy Morgan | Closed "Approve" ballot |
2022-07-07
|
15 | Alvaro Retana | Ballot approval text was generated |
2022-07-07
|
15 | (System) | Removed all action holders (IESG state changed) |
2022-07-07
|
15 | Alvaro Retana | IESG state changed to Approved-announcement to be sent from IESG Evaluation::External Party |
2022-06-27
|
15 | Alvaro Retana | This document is ready -- I have asked the WG for one final review: https://mailarchive.ietf.org/arch/msg/idr/1hNvIfy5RdyuOyEpgXf8l4kwVmk/ |
2022-06-27
|
15 | Alvaro Retana | IESG state changed to IESG Evaluation::External Party from IESG Evaluation::AD Followup |
2022-06-25
|
15 | Ketan Talaulikar | New version available: draft-ietf-idr-bgp-ls-app-specific-attr-15.txt |
2022-06-25
|
15 | Ketan Talaulikar | New version accepted (logged-in submitter: Ketan Talaulikar) |
2022-06-25
|
15 | Ketan Talaulikar | Uploaded new revision |
2022-06-24
|
14 | John Scudder | [Ballot comment] Thanks for all the work to help clear up my DISCUSS! Version 14 looks good, modulo some questions about §4.1 I've sent in … [Ballot comment] Thanks for all the work to help clear up my DISCUSS! Version 14 looks good, modulo some questions about §4.1 I've sent in a separate reply (but which are only COMMENT level). -- Previous DISCUSS: I'd like to DISCUSS some questions I have about the content of Section 4's IS-IS rules. I don't expect it will be difficult to resolve these, I just want to be sure we have the conversation. 1. In §4 (2.C), C. The SRLGs advertised in IS-IS SRLG ASLA TLVs and the other link attributes advertised in IS-IS ASLA sub-TLVs are REQUIRED to be collated, on a per-application basis, for all applications that have their bit set in the SABM/UDABM in at least one of the aforementioned TLV types. Is there some reason that there's no need to consider the case where both of the TLV types in question have zero-length application bit masks? 2. Later in the same paragraph, When performing this collation, only the TLVs with the application's bit set in SABM/UDABM MUST be used when such TLVs are available from either TLV types. I suspect you aren't saying what you mean, and the "only... MUST" construct is hard to puzzle out. Do you perhaps mean TLVs that don’t have the application's bit set MUST NOT be used? Because as you've written it, - All TLVs with the bit set MUST be collated, - Any TLVs without the bit set MAY be collated (by implication). Which doesn't seem very sensible AFAICT. A possible rewrite, if I've understood your intention correctly, might be "When performing this collation, every TLV with the application's bit set in SABM/UDABM MUST be included, when such TLVs are available from either TLV type." (Note also a minor fix for agreement in number, s/types/type/ in the last word.) 3. And still later in the same paragraph, If the bit for an application is set in the SABM/UDABM of only one of the TLV types, then the attributes from the other TLV type with zero-length application bit mask MUST be also collated for that application, if such TLV is available. I'm confused by the reference to a zero-length application bit mask. Can't the other TLV type have a nonzero-length application bit mask, but still have the application bit in question not set within the bit mask? I guess probably what you mean is, if the other TLV type is present and has a zero-length application bit mask, since a zero-length SABM/UDABM basically is a wildcard, the equivalent of all bits being set (as I read RFC 8920). If that's right, then a change seems in order, along the lines of If the bit for an application is set in the SABM/UDABM of only one of the TLV types, and if the other TLV type has a zero-length application bit mask, then the attributes from the other TLV type with zero-length application bit mask MUST be also collated for that application, if such TLV is available. I just interpolated the "and" clause. It's a bit wordy and could probably be further condensed, but I think it clarifies sufficiently. On the other hand, if I'm not right about this (very possible) then I'd appreciate further discussion on what I got wrong, so we can figure out if the text needs clarification or if I just need a clue bat. Previous COMMENT: 4. In §2 you reference "SABML". I was going to ask you to expand it on first use, but you only use it once. So, please just write it out in words as "SABM Length" and don't introduce an extra acronym. 5. In §3: All the BGP-LS Attribute TLVs defined in the table above are REQUIRED to be advertised as a top-level TLV in the BGP-LS Attribute for carrying link attributes specific to RSVP-TE. I suggest “... when used to carry” instead of “... for carrying”. Also, “listed in the table”, not defined in it. 6. Much of §4 is dedicated to a special case for IS-IS: 2. In the case of IS-IS, the following specific procedures are to be followed: It would be nice to spend a few words mentioning why IS-IS needs a special case and OSPF doesn't, so that the reader doesn't have to wonder. I'm guessing that this relates to the way IS-IS uses sub-TLVs for various things whereas OSPF doesn't, so you need rules to reconcile the values in IS-IS but not OSPF? 7. §4 (2.B) needs some adjectives, "IS-IS" and "BGP-LS", respectively, to make clear which flavor of "ASLA sub-TLV" you're talking about. I *think* that here, B. When the ASLA sub-TLV has the RSVP-TE application bit set, then the link attributes for the corresponding ASLA sub-TLV MUST be encoded using the respective BGP-LS top-level TLVs as per [RFC7752] [RFC8571] [RFC9104]. the first reference to "ASLA sub-TLV" is the IS-IS flavor, and the second is to the BGP-LS flavor -- but please be specific. 8. In §4, These rules ensure that a BGP-LS originator performs the advertisement for all application-specific link attributes from the IGP nodes that support or do not support the ASLA extension. I don't understand this sentence. :-( For one thing, applying simple logic to "IGP nodes that support or do not support the ASLA extension" we can rewrite it as "IGP nodes", full stop, since "support or do not support" covers the entire universe by definition. That would imply the sentence could be rewritten as These rules ensure that a BGP-LS originator performs the advertisement for all application-specific link attributes from the IGP nodes. Which doesn't really help me. :-( 9. In §5, It is recommended that nodes supporting this specification are selected as originators of BGP-LS information when advertising the link-state information from the IGPs. Do you mean only such nodes should be selected? Or is it that at least one such should be among those selected? Either is supportable, I think. Whatever the answer, please clarify the text correspondingly. Although, more generally I guess BGP-LS originators ought to support all the extensions in use in a given IGP, not limited to this one, so this is really a special case of a general principle. 10. In §5, They would, however, not be able to support neither the application-specific link attributes nor newer applications that may be encoded only using the ASLA TLV. Drop the "not". Also, again this seems like a special case of a general principle -- of course a BGP-LS consumer that doesn't understand a given extension can't do the thing that the extension covers. But, it's fine to remind the reader of this. 11. In §8, It is assumed that the IGP instances originating these TLVs will support all the required security (as described in [RFC8919] and [RFC8920]) to prevent any security issues when propagating the TLVs into BGP-LS. I think purporting to "prevent any security issues" is a case of seriously overpromising. A very similar issue existed in draft-ietf-idr-bgp-ls-sbfd-extensions-08. Perhaps a similar fix could be applied, although in this case, when I took a quick look at RFCs 8919 and 8920 I didn't find any "required security" of note, so I'm really not sure what if anything is being actually promised by this sentence? Can you help me understand what properties I should be expecting? In any case, for the most part it seems fine to say your security model is the same as that of RFCs 8919 and 8920, since as we know BGP-LS tries to be just a re-rendering of the data from those suppliers. But, we should keep in mind this consideration from RFC 7752: Additionally, it may be considered that the export of link-state and TE information as described in this document constitutes a risk to confidentiality of mission-critical or commercially sensitive information about the network. Might it be worth reminding the reader that if there's any sensitive information contained in the new stuff you're propagating, they should take this warning to heart, since the scope across which the information is being propagated can increase considerably? I don't insist on this, I'm only raising it as a point to consider. Nits and very minor comments -- 12. The document talks about new this, new that. This probably won't age well -- keep in mind that the RFC this document will become will be around for decades, at which point none of this stuff will be "new". It's obviously not a big deal but if it were my document I'd find a way to rewrite those "new" in a way that won't be instantly obsolete. 13. In §4, The application-specific attribute value received via sub-TLVs within the ASLA TLV have preference over the value received via the top-level TLVs. There's an agreement in number problem here -- perhaps rewrite as "An application-specific attribute value received via a sub-TLV within the ASLA TLV has precedence over the value received via a top-level TLV"? |
2022-06-24
|
14 | John Scudder | Ballot comment text updated for John Scudder |
2022-06-24
|
14 | John Scudder | [Ballot comment] Thanks for all the work to help clear up my DISCUSS! -- Previous DISCUSS: I'd like to DISCUSS some questions I have about … [Ballot comment] Thanks for all the work to help clear up my DISCUSS! -- Previous DISCUSS: I'd like to DISCUSS some questions I have about the content of Section 4's IS-IS rules. I don't expect it will be difficult to resolve these, I just want to be sure we have the conversation. 1. In §4 (2.C), C. The SRLGs advertised in IS-IS SRLG ASLA TLVs and the other link attributes advertised in IS-IS ASLA sub-TLVs are REQUIRED to be collated, on a per-application basis, for all applications that have their bit set in the SABM/UDABM in at least one of the aforementioned TLV types. Is there some reason that there's no need to consider the case where both of the TLV types in question have zero-length application bit masks? 2. Later in the same paragraph, When performing this collation, only the TLVs with the application's bit set in SABM/UDABM MUST be used when such TLVs are available from either TLV types. I suspect you aren't saying what you mean, and the "only... MUST" construct is hard to puzzle out. Do you perhaps mean TLVs that don’t have the application's bit set MUST NOT be used? Because as you've written it, - All TLVs with the bit set MUST be collated, - Any TLVs without the bit set MAY be collated (by implication). Which doesn't seem very sensible AFAICT. A possible rewrite, if I've understood your intention correctly, might be "When performing this collation, every TLV with the application's bit set in SABM/UDABM MUST be included, when such TLVs are available from either TLV type." (Note also a minor fix for agreement in number, s/types/type/ in the last word.) 3. And still later in the same paragraph, If the bit for an application is set in the SABM/UDABM of only one of the TLV types, then the attributes from the other TLV type with zero-length application bit mask MUST be also collated for that application, if such TLV is available. I'm confused by the reference to a zero-length application bit mask. Can't the other TLV type have a nonzero-length application bit mask, but still have the application bit in question not set within the bit mask? I guess probably what you mean is, if the other TLV type is present and has a zero-length application bit mask, since a zero-length SABM/UDABM basically is a wildcard, the equivalent of all bits being set (as I read RFC 8920). If that's right, then a change seems in order, along the lines of If the bit for an application is set in the SABM/UDABM of only one of the TLV types, and if the other TLV type has a zero-length application bit mask, then the attributes from the other TLV type with zero-length application bit mask MUST be also collated for that application, if such TLV is available. I just interpolated the "and" clause. It's a bit wordy and could probably be further condensed, but I think it clarifies sufficiently. On the other hand, if I'm not right about this (very possible) then I'd appreciate further discussion on what I got wrong, so we can figure out if the text needs clarification or if I just need a clue bat. Previous COMMENT: 4. In §2 you reference "SABML". I was going to ask you to expand it on first use, but you only use it once. So, please just write it out in words as "SABM Length" and don't introduce an extra acronym. 5. In §3: All the BGP-LS Attribute TLVs defined in the table above are REQUIRED to be advertised as a top-level TLV in the BGP-LS Attribute for carrying link attributes specific to RSVP-TE. I suggest “... when used to carry” instead of “... for carrying”. Also, “listed in the table”, not defined in it. 6. Much of §4 is dedicated to a special case for IS-IS: 2. In the case of IS-IS, the following specific procedures are to be followed: It would be nice to spend a few words mentioning why IS-IS needs a special case and OSPF doesn't, so that the reader doesn't have to wonder. I'm guessing that this relates to the way IS-IS uses sub-TLVs for various things whereas OSPF doesn't, so you need rules to reconcile the values in IS-IS but not OSPF? 7. §4 (2.B) needs some adjectives, "IS-IS" and "BGP-LS", respectively, to make clear which flavor of "ASLA sub-TLV" you're talking about. I *think* that here, B. When the ASLA sub-TLV has the RSVP-TE application bit set, then the link attributes for the corresponding ASLA sub-TLV MUST be encoded using the respective BGP-LS top-level TLVs as per [RFC7752] [RFC8571] [RFC9104]. the first reference to "ASLA sub-TLV" is the IS-IS flavor, and the second is to the BGP-LS flavor -- but please be specific. 8. In §4, These rules ensure that a BGP-LS originator performs the advertisement for all application-specific link attributes from the IGP nodes that support or do not support the ASLA extension. I don't understand this sentence. :-( For one thing, applying simple logic to "IGP nodes that support or do not support the ASLA extension" we can rewrite it as "IGP nodes", full stop, since "support or do not support" covers the entire universe by definition. That would imply the sentence could be rewritten as These rules ensure that a BGP-LS originator performs the advertisement for all application-specific link attributes from the IGP nodes. Which doesn't really help me. :-( 9. In §5, It is recommended that nodes supporting this specification are selected as originators of BGP-LS information when advertising the link-state information from the IGPs. Do you mean only such nodes should be selected? Or is it that at least one such should be among those selected? Either is supportable, I think. Whatever the answer, please clarify the text correspondingly. Although, more generally I guess BGP-LS originators ought to support all the extensions in use in a given IGP, not limited to this one, so this is really a special case of a general principle. 10. In §5, They would, however, not be able to support neither the application-specific link attributes nor newer applications that may be encoded only using the ASLA TLV. Drop the "not". Also, again this seems like a special case of a general principle -- of course a BGP-LS consumer that doesn't understand a given extension can't do the thing that the extension covers. But, it's fine to remind the reader of this. 11. In §8, It is assumed that the IGP instances originating these TLVs will support all the required security (as described in [RFC8919] and [RFC8920]) to prevent any security issues when propagating the TLVs into BGP-LS. I think purporting to "prevent any security issues" is a case of seriously overpromising. A very similar issue existed in draft-ietf-idr-bgp-ls-sbfd-extensions-08. Perhaps a similar fix could be applied, although in this case, when I took a quick look at RFCs 8919 and 8920 I didn't find any "required security" of note, so I'm really not sure what if anything is being actually promised by this sentence? Can you help me understand what properties I should be expecting? In any case, for the most part it seems fine to say your security model is the same as that of RFCs 8919 and 8920, since as we know BGP-LS tries to be just a re-rendering of the data from those suppliers. But, we should keep in mind this consideration from RFC 7752: Additionally, it may be considered that the export of link-state and TE information as described in this document constitutes a risk to confidentiality of mission-critical or commercially sensitive information about the network. Might it be worth reminding the reader that if there's any sensitive information contained in the new stuff you're propagating, they should take this warning to heart, since the scope across which the information is being propagated can increase considerably? I don't insist on this, I'm only raising it as a point to consider. Nits and very minor comments -- 12. The document talks about new this, new that. This probably won't age well -- keep in mind that the RFC this document will become will be around for decades, at which point none of this stuff will be "new". It's obviously not a big deal but if it were my document I'd find a way to rewrite those "new" in a way that won't be instantly obsolete. 13. In §4, The application-specific attribute value received via sub-TLVs within the ASLA TLV have preference over the value received via the top-level TLVs. There's an agreement in number problem here -- perhaps rewrite as "An application-specific attribute value received via a sub-TLV within the ASLA TLV has precedence over the value received via a top-level TLV"? |
2022-06-24
|
14 | John Scudder | Ballot comment text updated for John Scudder |
2022-06-24
|
14 | John Scudder | [Ballot comment] Thanks for all the work to help clear up my DISCUSS! Previous DISCUSS: I'd like to DISCUSS some questions I have about the … [Ballot comment] Thanks for all the work to help clear up my DISCUSS! Previous DISCUSS: I'd like to DISCUSS some questions I have about the content of Section 4's IS-IS rules. I don't expect it will be difficult to resolve these, I just want to be sure we have the conversation. 1. In §4 (2.C), C. The SRLGs advertised in IS-IS SRLG ASLA TLVs and the other link attributes advertised in IS-IS ASLA sub-TLVs are REQUIRED to be collated, on a per-application basis, for all applications that have their bit set in the SABM/UDABM in at least one of the aforementioned TLV types. Is there some reason that there's no need to consider the case where both of the TLV types in question have zero-length application bit masks? 2. Later in the same paragraph, When performing this collation, only the TLVs with the application's bit set in SABM/UDABM MUST be used when such TLVs are available from either TLV types. I suspect you aren't saying what you mean, and the "only... MUST" construct is hard to puzzle out. Do you perhaps mean TLVs that don’t have the application's bit set MUST NOT be used? Because as you've written it, - All TLVs with the bit set MUST be collated, - Any TLVs without the bit set MAY be collated (by implication). Which doesn't seem very sensible AFAICT. A possible rewrite, if I've understood your intention correctly, might be "When performing this collation, every TLV with the application's bit set in SABM/UDABM MUST be included, when such TLVs are available from either TLV type." (Note also a minor fix for agreement in number, s/types/type/ in the last word.) 3. And still later in the same paragraph, If the bit for an application is set in the SABM/UDABM of only one of the TLV types, then the attributes from the other TLV type with zero-length application bit mask MUST be also collated for that application, if such TLV is available. I'm confused by the reference to a zero-length application bit mask. Can't the other TLV type have a nonzero-length application bit mask, but still have the application bit in question not set within the bit mask? I guess probably what you mean is, if the other TLV type is present and has a zero-length application bit mask, since a zero-length SABM/UDABM basically is a wildcard, the equivalent of all bits being set (as I read RFC 8920). If that's right, then a change seems in order, along the lines of If the bit for an application is set in the SABM/UDABM of only one of the TLV types, and if the other TLV type has a zero-length application bit mask, then the attributes from the other TLV type with zero-length application bit mask MUST be also collated for that application, if such TLV is available. I just interpolated the "and" clause. It's a bit wordy and could probably be further condensed, but I think it clarifies sufficiently. On the other hand, if I'm not right about this (very possible) then I'd appreciate further discussion on what I got wrong, so we can figure out if the text needs clarification or if I just need a clue bat. Previous COMMENT: 4. In §2 you reference "SABML". I was going to ask you to expand it on first use, but you only use it once. So, please just write it out in words as "SABM Length" and don't introduce an extra acronym. 5. In §3: All the BGP-LS Attribute TLVs defined in the table above are REQUIRED to be advertised as a top-level TLV in the BGP-LS Attribute for carrying link attributes specific to RSVP-TE. I suggest “... when used to carry” instead of “... for carrying”. Also, “listed in the table”, not defined in it. 6. Much of §4 is dedicated to a special case for IS-IS: 2. In the case of IS-IS, the following specific procedures are to be followed: It would be nice to spend a few words mentioning why IS-IS needs a special case and OSPF doesn't, so that the reader doesn't have to wonder. I'm guessing that this relates to the way IS-IS uses sub-TLVs for various things whereas OSPF doesn't, so you need rules to reconcile the values in IS-IS but not OSPF? 7. §4 (2.B) needs some adjectives, "IS-IS" and "BGP-LS", respectively, to make clear which flavor of "ASLA sub-TLV" you're talking about. I *think* that here, B. When the ASLA sub-TLV has the RSVP-TE application bit set, then the link attributes for the corresponding ASLA sub-TLV MUST be encoded using the respective BGP-LS top-level TLVs as per [RFC7752] [RFC8571] [RFC9104]. the first reference to "ASLA sub-TLV" is the IS-IS flavor, and the second is to the BGP-LS flavor -- but please be specific. 8. In §4, These rules ensure that a BGP-LS originator performs the advertisement for all application-specific link attributes from the IGP nodes that support or do not support the ASLA extension. I don't understand this sentence. :-( For one thing, applying simple logic to "IGP nodes that support or do not support the ASLA extension" we can rewrite it as "IGP nodes", full stop, since "support or do not support" covers the entire universe by definition. That would imply the sentence could be rewritten as These rules ensure that a BGP-LS originator performs the advertisement for all application-specific link attributes from the IGP nodes. Which doesn't really help me. :-( 9. In §5, It is recommended that nodes supporting this specification are selected as originators of BGP-LS information when advertising the link-state information from the IGPs. Do you mean only such nodes should be selected? Or is it that at least one such should be among those selected? Either is supportable, I think. Whatever the answer, please clarify the text correspondingly. Although, more generally I guess BGP-LS originators ought to support all the extensions in use in a given IGP, not limited to this one, so this is really a special case of a general principle. 10. In §5, They would, however, not be able to support neither the application-specific link attributes nor newer applications that may be encoded only using the ASLA TLV. Drop the "not". Also, again this seems like a special case of a general principle -- of course a BGP-LS consumer that doesn't understand a given extension can't do the thing that the extension covers. But, it's fine to remind the reader of this. 11. In §8, It is assumed that the IGP instances originating these TLVs will support all the required security (as described in [RFC8919] and [RFC8920]) to prevent any security issues when propagating the TLVs into BGP-LS. I think purporting to "prevent any security issues" is a case of seriously overpromising. A very similar issue existed in draft-ietf-idr-bgp-ls-sbfd-extensions-08. Perhaps a similar fix could be applied, although in this case, when I took a quick look at RFCs 8919 and 8920 I didn't find any "required security" of note, so I'm really not sure what if anything is being actually promised by this sentence? Can you help me understand what properties I should be expecting? In any case, for the most part it seems fine to say your security model is the same as that of RFCs 8919 and 8920, since as we know BGP-LS tries to be just a re-rendering of the data from those suppliers. But, we should keep in mind this consideration from RFC 7752: Additionally, it may be considered that the export of link-state and TE information as described in this document constitutes a risk to confidentiality of mission-critical or commercially sensitive information about the network. Might it be worth reminding the reader that if there's any sensitive information contained in the new stuff you're propagating, they should take this warning to heart, since the scope across which the information is being propagated can increase considerably? I don't insist on this, I'm only raising it as a point to consider. Nits and very minor comments -- 12. The document talks about new this, new that. This probably won't age well -- keep in mind that the RFC this document will become will be around for decades, at which point none of this stuff will be "new". It's obviously not a big deal but if it were my document I'd find a way to rewrite those "new" in a way that won't be instantly obsolete. 13. In §4, The application-specific attribute value received via sub-TLVs within the ASLA TLV have preference over the value received via the top-level TLVs. There's an agreement in number problem here -- perhaps rewrite as "An application-specific attribute value received via a sub-TLV within the ASLA TLV has precedence over the value received via a top-level TLV"? |
2022-06-24
|
14 | John Scudder | [Ballot Position Update] Position for John Scudder has been changed to No Objection from Discuss |
2022-06-17
|
14 | (System) | Changed action holders to Alvaro Retana (IESG state changed) |
2022-06-17
|
14 | (System) | Sub state has been changed to AD Followup from Revised ID Needed |
2022-06-17
|
14 | (System) | IANA Review state changed to Version Changed - Review Needed from IANA OK - Actions Needed |
2022-06-17
|
14 | Ketan Talaulikar | New version available: draft-ietf-idr-bgp-ls-app-specific-attr-14.txt |
2022-06-17
|
14 | Ketan Talaulikar | New version accepted (logged-in submitter: Ketan Talaulikar) |
2022-06-17
|
14 | Ketan Talaulikar | Uploaded new revision |
2022-06-02
|
13 | (System) | Changed action holders to Peter Psenak, Alvaro Retana, Jeff Tantsura, Ketan Talaulikar (IESG state changed) |
2022-06-02
|
13 | Cindy Morgan | IESG state changed to IESG Evaluation::Revised I-D Needed from IESG Evaluation |
2022-06-02
|
13 | Sabrina Tanamal | IANA Review state changed to IANA OK - Actions Needed from Version Changed - Review Needed |
2022-06-02
|
13 | Andrew Alston | [Ballot comment] I've chosen to put these in as comments rather than discuss positions for now, since I don't necessarily think these comments should be … [Ballot comment] I've chosen to put these in as comments rather than discuss positions for now, since I don't necessarily think these comments should be blocking in nature, just there for due consideration. In Section 2 second paragraph you have: The format of this TLV is as follows and is similar to the corresponding ASLA sub-TLVs defined for OSPF and IS-IS in [RFC8920] and [RFC8919] respectively. This gets a little confusing where further down only one of these RFC's is referenced as follows: o SABM Length : 1 octet field carrying the Standard Application Identifier Bit Mask Length in octets as defined in [RFC8920]. o UDABM Length : 1 octet field carrying the User-Defined Application Identifier Bit Mask Length in octets as defined in [RFC8920]. o User-Defined Application Identifier Bit Mask : An optional set of bits (of size 0, 4, or 8 octets as indicated by the UDABM Length), where each bit represents a single user-defined application as defined in [RFC8919]. Various instances of this - Would the authors consider referencing both RFC's at each point so that readers are aware that the same thing applies across both ISIS and OSPF. |
2022-06-02
|
13 | Andrew Alston | [Ballot Position Update] New position, No Objection, has been recorded for Andrew Alston |
2022-06-02
|
13 | (System) | IANA Review state changed to Version Changed - Review Needed from IANA OK - Actions Needed |
2022-06-02
|
13 | Ketan Talaulikar | New version available: draft-ietf-idr-bgp-ls-app-specific-attr-13.txt |
2022-06-02
|
13 | Ketan Talaulikar | New version accepted (logged-in submitter: Ketan Talaulikar) |
2022-06-02
|
13 | Ketan Talaulikar | Uploaded new revision |
2022-06-01
|
12 | Murray Kucherawy | [Ballot comment] Thanks to Kirsty Paine for the ARTART review. |
2022-06-01
|
12 | Murray Kucherawy | [Ballot Position Update] New position, No Objection, has been recorded for Murray Kucherawy |
2022-06-01
|
12 | Warren Kumari | [Ballot comment] Huge thanks to Scott Bradner for his OpsDir review of this document ( https://datatracker.ietf.org/doc/review-ietf-idr-bgp-ls-app-specific-attr-04-opsdir-early-bradner-2021-02-16/ ). Due to a confluence of events, I was … [Ballot comment] Huge thanks to Scott Bradner for his OpsDir review of this document ( https://datatracker.ietf.org/doc/review-ietf-idr-bgp-ls-app-specific-attr-04-opsdir-early-bradner-2021-02-16/ ). Due to a confluence of events, I was not able to do my regular level of review, and so, other than a quick skim of the document, I'm balloting based almost entirely on his review. |
2022-06-01
|
12 | Warren Kumari | [Ballot Position Update] New position, No Objection, has been recorded for Warren Kumari |
2022-06-01
|
12 | Amanda Baber | IANA Review state changed to IANA OK - Actions Needed from Version Changed - Review Needed |
2022-06-01
|
12 | Zaheduzzaman Sarker | [Ballot Position Update] New position, No Objection, has been recorded for Zaheduzzaman Sarker |
2022-05-31
|
12 | Roman Danyliw | [Ballot comment] Thank you to Paul Wouters for the SECDIR review. ** Section 2. There is no text describing the Reserved bits. Perhaps: NEW Reserved: … [Ballot comment] Thank you to Paul Wouters for the SECDIR review. ** Section 2. There is no text describing the Reserved bits. Perhaps: NEW Reserved: This field is reserved. It MUST be set to zero on transmission and MUST be ignored on receipt. ** Section 8. It is assumed that the IGP instances originating these TLVs will support all the required security (as described in [RFC8919] and [RFC8920]) to prevent any security issues when propagating the TLVs into BGP-LS. I concur with John Scudder’s analysis of this text and where it could use improvement. He eloquently described it already so I won’t repeat it here. |
2022-05-31
|
12 | Roman Danyliw | [Ballot Position Update] New position, No Objection, has been recorded for Roman Danyliw |
2022-05-31
|
12 | (System) | IANA Review state changed to Version Changed - Review Needed from IANA OK - Actions Needed |
2022-05-31
|
12 | Ketan Talaulikar | New version available: draft-ietf-idr-bgp-ls-app-specific-attr-12.txt |
2022-05-31
|
12 | Ketan Talaulikar | New version accepted (logged-in submitter: Ketan Talaulikar) |
2022-05-31
|
12 | Ketan Talaulikar | Uploaded new revision |
2022-05-31
|
11 | Francesca Palombini | [Ballot comment] Thank you for the work on this document. Many thanks to Kirsty Paine for her ART ART review: https://mailarchive.ietf.org/arch/msg/art/Gp7TtdCUrbmf6WJy4ATcmN_DYQI/, and thanks to … [Ballot comment] Thank you for the work on this document. Many thanks to Kirsty Paine for her ART ART review: https://mailarchive.ietf.org/arch/msg/art/Gp7TtdCUrbmf6WJy4ATcmN_DYQI/, and thanks to the authors for addressing her comment. Francesca |
2022-05-31
|
11 | Francesca Palombini | [Ballot Position Update] New position, No Objection, has been recorded for Francesca Palombini |
2022-05-30
|
11 | Éric Vyncke | [Ballot comment] Thank you for the work put into this document. Special thanks to Keyur Patel for the shepherd's write-up including the WG consensus but … [Ballot comment] Thank you for the work put into this document. Special thanks to Keyur Patel for the shepherd's write-up including the WG consensus but I would have appreciated to see more about the intended status though. |
2022-05-30
|
11 | Éric Vyncke | [Ballot Position Update] New position, No Objection, has been recorded for Éric Vyncke |
2022-05-30
|
11 | Erik Kline | [Ballot Position Update] New position, No Objection, has been recorded for Erik Kline |
2022-05-30
|
11 | John Scudder | [Ballot discuss] I'd like to DISCUSS some questions I have about the content of Section 4's IS-IS rules. I don't expect it will be difficult … [Ballot discuss] I'd like to DISCUSS some questions I have about the content of Section 4's IS-IS rules. I don't expect it will be difficult to resolve these, I just want to be sure we have the conversation. 1. In §4 (2.C), C. The SRLGs advertised in IS-IS SRLG ASLA TLVs and the other link attributes advertised in IS-IS ASLA sub-TLVs are REQUIRED to be collated, on a per-application basis, for all applications that have their bit set in the SABM/UDABM in at least one of the aforementioned TLV types. Is there some reason that there's no need to consider the case where both of the TLV types in question have zero-length application bit masks? 2. Later in the same paragraph, When performing this collation, only the TLVs with the application's bit set in SABM/UDABM MUST be used when such TLVs are available from either TLV types. I suspect you aren't saying what you mean, and the "only... MUST" construct is hard to puzzle out. Do you perhaps mean TLVs that don’t have the application's bit set MUST NOT be used? Because as you've written it, - All TLVs with the bit set MUST be collated, - Any TLVs without the bit set MAY be collated (by implication). Which doesn't seem very sensible AFAICT. A possible rewrite, if I've understood your intention correctly, might be "When performing this collation, every TLV with the application's bit set in SABM/UDABM MUST be included, when such TLVs are available from either TLV type." (Note also a minor fix for agreement in number, s/types/type/ in the last word.) 3. And still later in the same paragraph, If the bit for an application is set in the SABM/UDABM of only one of the TLV types, then the attributes from the other TLV type with zero-length application bit mask MUST be also collated for that application, if such TLV is available. I'm confused by the reference to a zero-length application bit mask. Can't the other TLV type have a nonzero-length application bit mask, but still have the application bit in question not set within the bit mask? I guess probably what you mean is, if the other TLV type is present and has a zero-length application bit mask, since a zero-length SABM/UDABM basically is a wildcard, the equivalent of all bits being set (as I read RFC 8920). If that's right, then a change seems in order, along the lines of If the bit for an application is set in the SABM/UDABM of only one of the TLV types, and if the other TLV type has a zero-length application bit mask, then the attributes from the other TLV type with zero-length application bit mask MUST be also collated for that application, if such TLV is available. I just interpolated the "and" clause. It's a bit wordy and could probably be further condensed, but I think it clarifies sufficiently. On the other hand, if I'm not right about this (very possible) then I'd appreciate further discussion on what I got wrong, so we can figure out if the text needs clarification or if I just need a clue bat. |
2022-05-30
|
11 | John Scudder | [Ballot comment] 4. In §2 you reference "SABML". I was going to ask you to expand it on first use, but you only use it … [Ballot comment] 4. In §2 you reference "SABML". I was going to ask you to expand it on first use, but you only use it once. So, please just write it out in words as "SABM Length" and don't introduce an extra acronym. 5. In §3: All the BGP-LS Attribute TLVs defined in the table above are REQUIRED to be advertised as a top-level TLV in the BGP-LS Attribute for carrying link attributes specific to RSVP-TE. I suggest “... when used to carry” instead of “... for carrying”. Also, “listed in the table”, not defined in it. 6. Much of §4 is dedicated to a special case for IS-IS: 2. In the case of IS-IS, the following specific procedures are to be followed: It would be nice to spend a few words mentioning why IS-IS needs a special case and OSPF doesn't, so that the reader doesn't have to wonder. I'm guessing that this relates to the way IS-IS uses sub-TLVs for various things whereas OSPF doesn't, so you need rules to reconcile the values in IS-IS but not OSPF? 7. §4 (2.B) needs some adjectives, "IS-IS" and "BGP-LS", respectively, to make clear which flavor of "ASLA sub-TLV" you're talking about. I *think* that here, B. When the ASLA sub-TLV has the RSVP-TE application bit set, then the link attributes for the corresponding ASLA sub-TLV MUST be encoded using the respective BGP-LS top-level TLVs as per [RFC7752] [RFC8571] [RFC9104]. the first reference to "ASLA sub-TLV" is the IS-IS flavor, and the second is to the BGP-LS flavor -- but please be specific. 8. In §4, These rules ensure that a BGP-LS originator performs the advertisement for all application-specific link attributes from the IGP nodes that support or do not support the ASLA extension. I don't understand this sentence. :-( For one thing, applying simple logic to "IGP nodes that support or do not support the ASLA extension" we can rewrite it as "IGP nodes", full stop, since "support or do not support" covers the entire universe by definition. That would imply the sentence could be rewritten as These rules ensure that a BGP-LS originator performs the advertisement for all application-specific link attributes from the IGP nodes. Which doesn't really help me. :-( 9. In §5, It is recommended that nodes supporting this specification are selected as originators of BGP-LS information when advertising the link-state information from the IGPs. Do you mean only such nodes should be selected? Or is it that at least one such should be among those selected? Either is supportable, I think. Whatever the answer, please clarify the text correspondingly. Although, more generally I guess BGP-LS originators ought to support all the extensions in use in a given IGP, not limited to this one, so this is really a special case of a general principle. 10. In §5, They would, however, not be able to support neither the application-specific link attributes nor newer applications that may be encoded only using the ASLA TLV. Drop the "not". Also, again this seems like a special case of a general principle -- of course a BGP-LS consumer that doesn't understand a given extension can't do the thing that the extension covers. But, it's fine to remind the reader of this. 11. In §8, It is assumed that the IGP instances originating these TLVs will support all the required security (as described in [RFC8919] and [RFC8920]) to prevent any security issues when propagating the TLVs into BGP-LS. I think purporting to "prevent any security issues" is a case of seriously overpromising. A very similar issue existed in draft-ietf-idr-bgp-ls-sbfd-extensions-08. Perhaps a similar fix could be applied, although in this case, when I took a quick look at RFCs 8919 and 8920 I didn't find any "required security" of note, so I'm really not sure what if anything is being actually promised by this sentence? Can you help me understand what properties I should be expecting? In any case, for the most part it seems fine to say your security model is the same as that of RFCs 8919 and 8920, since as we know BGP-LS tries to be just a re-rendering of the data from those suppliers. But, we should keep in mind this consideration from RFC 7752: Additionally, it may be considered that the export of link-state and TE information as described in this document constitutes a risk to confidentiality of mission-critical or commercially sensitive information about the network. Might it be worth reminding the reader that if there's any sensitive information contained in the new stuff you're propagating, they should take this warning to heart, since the scope across which the information is being propagated can increase considerably? I don't insist on this, I'm only raising it as a point to consider. Nits and very minor comments -- 12. The document talks about new this, new that. This probably won't age well -- keep in mind that the RFC this document will become will be around for decades, at which point none of this stuff will be "new". It's obviously not a big deal but if it were my document I'd find a way to rewrite those "new" in a way that won't be instantly obsolete. 13. In §4, The application-specific attribute value received via sub-TLVs within the ASLA TLV have preference over the value received via the top-level TLVs. There's an agreement in number problem here -- perhaps rewrite as "An application-specific attribute value received via a sub-TLV within the ASLA TLV has precedence over the value received via a top-level TLV"? |
2022-05-30
|
11 | John Scudder | [Ballot Position Update] New position, Discuss, has been recorded for John Scudder |
2022-05-30
|
11 | Paul Wouters | [Ballot comment] Thanks for resolving my secdir comments. |
2022-05-30
|
11 | Paul Wouters | [Ballot Position Update] New position, No Objection, has been recorded for Paul Wouters |
2022-05-27
|
11 | Robert Wilton | [Ballot comment] Hi, Thanks for the manageability considerations section. Only one minor nit in section 5. Deployment Considerations They would, however, not be able … [Ballot comment] Hi, Thanks for the manageability considerations section. Only one minor nit in section 5. Deployment Considerations They would, however, not be able to support neither the application-specific link attributes nor newer applications that may be encoded only using the ASLA TLV. I think that the "not" here is incorrect and should be deleted. Rob |
2022-05-27
|
11 | Robert Wilton | [Ballot Position Update] New position, No Objection, has been recorded for Robert Wilton |
2022-05-25
|
11 | Lars Eggert | [Ballot comment] # GEN AD review of draft-ietf-idr-bgp-ls-app-specific-attr-11 CC @larseggert Thanks to Russ Housley for the General Area Review Team (Gen-ART) review (https://mailarchive.ietf.org/arch/msg/gen-art/T9RNz1ar99diDYpCMY75m1asL2w). … [Ballot comment] # GEN AD review of draft-ietf-idr-bgp-ls-app-specific-attr-11 CC @larseggert Thanks to Russ Housley for the General Area Review Team (Gen-ART) review (https://mailarchive.ietf.org/arch/msg/gen-art/T9RNz1ar99diDYpCMY75m1asL2w). ## Comments ### Section 2, paragraph 5 ``` where: ``` It might be helpful to state the length of the (fixed-length) fields in the bullet list below, so readers don't have to count bits in Figure 1. ### Inclusive language Found terminology that should be reviewed for inclusivity; see https://www.rfc-editor.org/part2/#inclusive_language for background and more guidance: * Term `traditional`; alternatives might be `classic`, `classical`, `common`, `conventional`, `customary`, `fixed`, `habitual`, `historic`, `long-established`, `popular`, `prescribed`, `regular`, `rooted`, `time-honored`, `universal`, `widely used`, `widespread` ## Nits All comments below are about very minor potential issues that you may choose to address in some way - or ignore - as you see fit. Some were flagged by automated tools (via https://github.com/larseggert/ietf-reviewtool), so there will likely be some false positives. There is no need to let me know what you did with these suggestions. ### Boilerplate Document still refers to the "Simplified BSD License", which was corrected in the TLP on September 21, 2021. It should instead refer to the "Revised BSD License". ### Grammar/style #### Section 2, paragraph 14 ``` rlying IGPs are also encoded in a similar manner in BGP-LS. The following ta ^^^^^^^^^^^^^^^^^^^ ``` Consider replacing this phrase with the adverb "similarly" to avoid wordiness. ## Notes This review is in the ["IETF Comments" Markdown format][ICMF], You can use the [`ietf-comments` tool][ICT] to automatically convert this review into individual GitHub issues. Review generated by the [`ietf-reviewtool`][IRT]. [ICMF]: https://github.com/mnot/ietf-comments/blob/main/format.md [ICT]: https://github.com/mnot/ietf-comments [IRT]: https://github.com/larseggert/ietf-reviewtool |
2022-05-25
|
11 | Lars Eggert | [Ballot Position Update] New position, No Objection, has been recorded for Lars Eggert |
2022-05-17
|
11 | (System) | IANA Review state changed to IANA OK - Actions Needed from Version Changed - Review Needed |
2022-05-13
|
11 | Cindy Morgan | Placed on agenda for telechat - 2022-06-02 |
2022-05-13
|
11 | Alvaro Retana | Ballot has been issued |
2022-05-13
|
11 | Alvaro Retana | [Ballot Position Update] New position, Yes, has been recorded for Alvaro Retana |
2022-05-13
|
11 | Alvaro Retana | Created "Approve" ballot |
2022-05-13
|
11 | Alvaro Retana | IESG state changed to IESG Evaluation from Waiting for Writeup |
2022-05-13
|
11 | Alvaro Retana | Ballot writeup was changed |
2022-05-13
|
11 | (System) | IANA Review state changed to Version Changed - Review Needed from IANA OK - Actions Needed |
2022-05-13
|
11 | Ketan Talaulikar | New version available: draft-ietf-idr-bgp-ls-app-specific-attr-11.txt |
2022-05-13
|
11 | Ketan Talaulikar | New version accepted (logged-in submitter: Ketan Talaulikar) |
2022-05-13
|
11 | Ketan Talaulikar | Uploaded new revision |
2022-05-13
|
10 | (System) | IESG state changed to Waiting for Writeup from In Last Call |
2022-05-09
|
10 | Kirsty Paine | Request for Last Call review by ARTART Completed: Ready. Reviewer: Kirsty Paine. Sent review to list. |
2022-05-06
|
10 | (System) | IANA Review state changed to IANA OK - Actions Needed from IANA - Review Needed |
2022-05-06
|
10 | (System) | (Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs: The IANA Functions Operator has completed its review of draft-ietf-idr-bgp-ls-app-specific-attr-10. If any part of this review is inaccurate, please let … (Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs: The IANA Functions Operator has completed its review of draft-ietf-idr-bgp-ls-app-specific-attr-10. If any part of this review is inaccurate, please let us know. The IANA Functions Operator understands that, upon approval of this document, there is a single action which we must complete. In the BGP-LS Node Descriptor, Link Descriptor, Prefix Descriptor, and Attribute TLVs registry on the Border Gateway Protocol - Link State (BGP-LS) Parameters registry page located at: https://www.iana.org/assignments/bgp-ls-parameters/ the existing, temporary registration for: TLV Code Point: 1122 Description: Application-Specific Link Attributes TLV will be made permanent and its reference changed to [ RFC-to-be ]. The IANA Functions Operator understands that this is the only action required to be completed upon approval of this document. Note: The actions requested in this document will not be completed until the document has been approved for publication as an RFC. This message is meant only to confirm the list of actions that will be performed. For definitions of IANA review states, please see: https://datatracker.ietf.org/help/state/draft/iana-review Thank you, Michelle Thangtamsatid IANA Services Specialist |
2022-05-02
|
10 | Russ Housley | Request for Last Call review by GENART Completed: Ready. Reviewer: Russ Housley. Sent review to list. |
2022-04-28
|
10 | Barry Leiba | Request for Last Call review by ARTART is assigned to Kirsty Paine |
2022-04-28
|
10 | Barry Leiba | Request for Last Call review by ARTART is assigned to Kirsty Paine |
2022-04-28
|
10 | Jean Mahoney | Request for Last Call review by GENART is assigned to Russ Housley |
2022-04-28
|
10 | Jean Mahoney | Request for Last Call review by GENART is assigned to Russ Housley |
2022-04-28
|
10 | Cindy Morgan | IANA Review state changed to IANA - Review Needed |
2022-04-28
|
10 | Cindy Morgan | The following Last Call announcement was sent out (ends 2022-05-13): From: The IESG To: IETF-Announce CC: aretana.ietf@gmail.com, draft-ietf-idr-bgp-ls-app-specific-attr@ietf.org, idr-chairs@ietf.org, idr@ietf.org, keyur@arrcus.com … The following Last Call announcement was sent out (ends 2022-05-13): From: The IESG To: IETF-Announce CC: aretana.ietf@gmail.com, draft-ietf-idr-bgp-ls-app-specific-attr@ietf.org, idr-chairs@ietf.org, idr@ietf.org, keyur@arrcus.com, shares@ndzh.com Reply-To: last-call@ietf.org Sender: Subject: Last Call: (Application-Specific Attributes Advertisement with BGP Link-State) to Proposed Standard The IESG has received a request from the Inter-Domain Routing WG (idr) to consider the following document: - 'Application-Specific Attributes Advertisement with BGP Link-State' as Proposed Standard The IESG plans to make a decision in the next few weeks, and solicits final comments on this action. Please send substantive comments to the last-call@ietf.org mailing lists by 2022-05-13. Exceptionally, comments may be sent to iesg@ietf.org instead. In either case, please retain the beginning of the Subject line to allow automated sorting. Abstract Various link attributes have been defined in link-state routing protocols like OSPF and IS-IS in the context of the MPLS Traffic Engineering (TE) and GMPLS. BGP Link-State (BGP-LS) extensions have been defined to distribute these attributes along with other topology information from these link-state routing protocols. New extensions have been defined for link-state routing protocols that enable distribution of application-specific link attributes for existing as well as newer applications such as Segment Routing. This document defines extensions to BGP-LS to enable the advertisement of these application-specific attributes as a part of the topology information from the network. The file can be obtained via https://datatracker.ietf.org/doc/draft-ietf-idr-bgp-ls-app-specific-attr/ No IPR declarations have been submitted directly on this I-D. |
2022-04-28
|
10 | Cindy Morgan | IESG state changed to In Last Call from Last Call Requested |
2022-04-28
|
10 | Alvaro Retana | Last call was requested |
2022-04-28
|
10 | Alvaro Retana | Ballot approval text was generated |
2022-04-28
|
10 | Alvaro Retana | Ballot writeup was generated |
2022-04-28
|
10 | Alvaro Retana | IESG state changed to Last Call Requested from AD Evaluation::AD Followup |
2022-04-28
|
10 | Alvaro Retana | Last call announcement was changed |
2022-04-28
|
10 | Alvaro Retana | Last call announcement was generated |
2022-04-28
|
10 | Alvaro Retana | Intended Status changed to Proposed Standard from None |
2022-04-28
|
10 | (System) | Changed action holders to Alvaro Retana (IESG state changed) |
2022-04-28
|
10 | (System) | Sub state has been changed to AD Followup from Revised ID Needed |
2022-04-28
|
10 | Ketan Talaulikar | New version available: draft-ietf-idr-bgp-ls-app-specific-attr-10.txt |
2022-04-28
|
10 | Ketan Talaulikar | New version accepted (logged-in submitter: Ketan Talaulikar) |
2022-04-28
|
10 | Ketan Talaulikar | Uploaded new revision |
2022-04-15
|
09 | (System) | Changed action holders to Peter Psenak, Alvaro Retana, Jeff Tantsura, Ketan Talaulikar (IESG state changed) |
2022-04-15
|
09 | Alvaro Retana | IESG state changed to AD Evaluation::Revised I-D Needed from AD Evaluation::AD Followup |
2022-04-14
|
09 | (System) | Changed action holders to Alvaro Retana (IESG state changed) |
2022-04-14
|
09 | (System) | Sub state has been changed to AD Followup from Revised ID Needed |
2022-04-14
|
09 | Ketan Talaulikar | New version available: draft-ietf-idr-bgp-ls-app-specific-attr-09.txt |
2022-04-14
|
09 | (System) | New version accepted (logged-in submitter: Ketan Talaulikar) |
2022-04-14
|
09 | Ketan Talaulikar | Uploaded new revision |
2022-04-11
|
08 | Alvaro Retana | === AD Review of draft-ietf-idr-bgp-ls-app-specific-attr-08 === https://mailarchive.ietf.org/arch/msg/idr/iV3nHMcbUNXzSQ8gBNmEZgZ-ND8/ |
2022-04-11
|
08 | (System) | Changed action holders to Peter Psenak, Alvaro Retana, Jeff Tantsura, Ketan Talaulikar (IESG state changed) |
2022-04-11
|
08 | Alvaro Retana | IESG state changed to AD Evaluation::Revised I-D Needed from AD Evaluation |
2022-03-31
|
08 | (System) | Changed action holders to Alvaro Retana (IESG state changed) |
2022-03-31
|
08 | Alvaro Retana | IESG state changed to AD Evaluation from Publication Requested |
2022-03-31
|
08 | Alvaro Retana | Changed consensus to Yes from Unknown |
2021-11-10
|
08 | Ketan Talaulikar | New version available: draft-ietf-idr-bgp-ls-app-specific-attr-08.txt |
2021-11-10
|
08 | (System) | New version accepted (logged-in submitter: Ketan Talaulikar) |
2021-11-10
|
08 | Ketan Talaulikar | Uploaded new revision |
2021-06-25
|
07 | Ketan Talaulikar | New version available: draft-ietf-idr-bgp-ls-app-specific-attr-07.txt |
2021-06-25
|
07 | (System) | New version accepted (logged-in submitter: Ketan Talaulikar) |
2021-06-25
|
07 | Ketan Talaulikar | Uploaded new revision |
2021-05-21
|
06 | Ketan Talaulikar | New version available: draft-ietf-idr-bgp-ls-app-specific-attr-06.txt |
2021-05-21
|
06 | (System) | New version accepted (logged-in submitter: Ketan Talaulikar) |
2021-05-21
|
06 | Ketan Talaulikar | Uploaded new revision |
2021-05-21
|
05 | Susan Hares | As required by RFC 4858, this is the current template for the Document Shepherd Write-Up. Changes are expected over time. This version is dated … As required by RFC 4858, this is the current template for the Document Shepherd Write-Up. Changes are expected over time. This version is dated May 2, 2021. (1) What type of RFC is being requested? Why is this the proper type of RFC? Is this type of RFC indicated in the title page header? Proposed Standard. (2) The IESG approval announcement includes a Document Announcement Write-Up. Please provide such a Document Announcement Write-Up. Recent examples can be found in the "Action" announcements for approved documents. Technical Summary: Various link attributes have been defined in link-state routing protocols like OSPF and IS-IS in the context of the MPLS Traffic Engineering (TE) and GMPLS. BGP Link-State (BGP-LS) extensions have been defined to distribute these attributes along with other topology information from these link-state routing protocols. Many of these link attributes can be used for applications other than MPLS-TE or GMPLS. Extensions to link-state routing protocols have been defined for such link attributes that enable distribution of their application- specific values. This document defines extensions to BGP-LS address- family to enable advertisement of these application-specific attributes as a part of the topology information from the network. Working Group Summary: The working group provided a normal consensus for BGP-LS drafts. This document has also passed Rtgdir and Opsdir reviews. Document Quality: Implementations: 2 implementations https://trac.ietf.org/trac/idr/wiki/draft-ietf-idr-bgp-ls-app-specific-attr%20implementations Note: 1 vendor has two different implementations. WG was fine with single vendor Personnel: Who is the Document Shepherd? Keyur Patel Who is the Responsible Area Director? Alvaro Retana (3) Briefly describe the review of this document that was performed by the Document Shepherd. This document has been through the working group review and has received and incorporated all the necessary comments. This document has also been reviewed by Andy Smith and Himanshu Shah as part of Rtgdir review and Scott Bradner as part of Opsdir review. (4) Does the document Shepherd have any concerns about the depth or breadth of the reviews that have been performed? No. (5) Do portions of the document need review from a particular or from broader perspective, e.g., security, operational complexity, AAA, DNS, DHCP, XML, or internationalization? If so, describe the review that took place. No. (6) Describe any specific concerns or issues that the Document Shepherd has with this document that the Responsible Area Director and/or the IESG should be aware of? For example, perhaps he or she is uncomfortable with certain parts of the document, or has concerns whether there really is a need for it. In any event, if the WG has discussed those issues and has indicated that it still wishes to advance the document, detail those concerns here. No concerns. (7) Has each author confirmed that any and all appropriate IPR disclosures required for full conformance with the provisions of BCP 78 and BCP 79 have already been filed. If not, explain why? Ketan Talaulikar: https://mailarchive.ietf.org/arch/msg/idr/_9y0FOv86CD65LISiQNlioyehCI/ Peter Psenak https://mailarchive.ietf.org/arch/msg/idr/Jh7eUcNUT6whcBTi_Opy6adZYW8/ Jeff Tantsura https://mailarchive.ietf.org/arch/msg/idr/s4Hw-9cbl1zW4tN14JovVZ0H1NA/ (8) Has an IPR disclosure been filed that references this document? If so, summarize any WG discussion and conclusion regarding the IPR disclosures. No IPR disclosures. (9) How solid is the WG consensus behind this document? Does it represent the strong concurrence of a few individuals, with others being silent, or does the WG as a whole understand and agree with it? The feedback on the document is strong from core group of BGP-LS IDR participants. (10) Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarise the areas of conflict in separate email messages to the Responsible Area Director. (It should be in a separate email because this questionnaire is publicly available.) no conflict. (11) Identify any ID nits the Document Shepherd has found in this document. (See http://www.ietf.org/tools/idnits/ and the Internet-Drafts Checklist). Boilerplate checks are not enough; this check needs to be thorough. no nits. (12) Describe how the document meets any required formal review criteria, such as the MIB Doctor, YANG Doctor, media type, and URI type reviews. no formal review required. (13) Have all references within this document been identified as either normative or informative? Yes. (14) Are there normative references to documents that are not ready for advancement or are otherwise in an unclear state? If such normative references exist, what is the plan for their completion? No. (15) Are there downward normative references references (see RFC 3967)? If so, list these downward references to support the Area Director in the Last Call procedure. No. (16) Will publication of this document change the status of any existing RFCs? Are those RFCs listed on the title page header, listed in the abstract, and discussed in the introduction? If the RFCs are not listed in the Abstract and Introduction, explain why, and point to the part of the document where the relationship of this document to the other RFCs is discussed. If this information is not in the document, explain why the WG considers it unnecessary. No. (17) Describe the Document Shepherd's review of the IANA considerations section, especially with regard to its consistency with the body of the document. Confirm that all protocol extensions that the document makes are associated with the appropriate reservations in IANA registries. Confirm that any referenced IANA registries have been clearly identified. Confirm that newly created IANA registries include a detailed specification of the initial contents for the registry, that allocations procedures for future registrations are defined, and a reasonable name for the new registry has been suggested (see RFC 8126). New values in registry: "BGP-LS Node Descriptor, Link Descriptor, Prefix Descriptor, and Attribute TLVs". This document requests allocation of code-point 1122 for Application-specific Link Attributes TLV from the above mentioned registries. (18) List any new IANA registries that require Expert Review for future allocations. Provide any public guidance that the IESG would find useful in selecting the IANA Experts for these new registries. No new registries. (19) Describe reviews and automated checks performed by the Document Shepherd to validate sections of the document written in a formal language, such as XML code, BNF rules, MIB definitions, YANG modules, etc. No formal language. (20) If the document contains a YANG module, has the module been checked with any of the recommended validation tools (https://trac.ietf.org/trac/ops/wiki/yang-review-tools) for syntax and formatting validation? If there are any resulting errors or warnings, what is the justification for not fixing them at this time? Does the YANG module comply with the Network Management Datastore Architecture (NMDA) as specified in RFC8342? No Yang modules needed. |
2021-05-21
|
05 | Susan Hares | Responsible AD changed to Alvaro Retana |
2021-05-21
|
05 | Susan Hares | IETF WG state changed to Submitted to IESG for Publication from WG Consensus: Waiting for Write-Up |
2021-05-21
|
05 | Susan Hares | IESG state changed to Publication Requested from I-D Exists |
2021-05-21
|
05 | Susan Hares | IESG process started in state Publication Requested |
2021-05-20
|
05 | Paul Wouters | Request for Early review by SECDIR Completed: Has Nits. Reviewer: Paul Wouters. Sent review to list. |
2021-05-02
|
05 | Keyur Patel | As required by RFC 4858, this is the current template for the Document Shepherd Write-Up. Changes are expected over time. This version is dated … As required by RFC 4858, this is the current template for the Document Shepherd Write-Up. Changes are expected over time. This version is dated May 2, 2021. (1) What type of RFC is being requested? Why is this the proper type of RFC? Is this type of RFC indicated in the title page header? Proposed Standard. (2) The IESG approval announcement includes a Document Announcement Write-Up. Please provide such a Document Announcement Write-Up. Recent examples can be found in the "Action" announcements for approved documents. Technical Summary: Various link attributes have been defined in link-state routing protocols like OSPF and IS-IS in the context of the MPLS Traffic Engineering (TE) and GMPLS. BGP Link-State (BGP-LS) extensions have been defined to distribute these attributes along with other topology information from these link-state routing protocols. Many of these link attributes can be used for applications other than MPLS-TE or GMPLS. Extensions to link-state routing protocols have been defined for such link attributes that enable distribution of their application- specific values. This document defines extensions to BGP-LS address- family to enable advertisement of these application-specific attributes as a part of the topology information from the network. Working Group Summary: The working group provided a normal consensus for BGP-LS drafts. This document has also passed Rtgdir and Opsdir reviews. Document Quality: Implementations: 2 implementations https://trac.ietf.org/trac/idr/wiki/draft-ietf-idr-bgp-ls-app-specific-attr%20implementations Note: 1 vendor has two different implementations. WG was fine with single vendor Personnel: Who is the Document Shepherd? Keyur Patel Who is the Responsible Area Director? Alvaro Retana (3) Briefly describe the review of this document that was performed by the Document Shepherd. This document has been through the working group review and has received and incorporated all the necessary comments. This document has also been reviewed by Andy Smith and Himanshu Shah as part of Rtgdir review and Scott Bradner as part of Opsdir review. (4) Does the document Shepherd have any concerns about the depth or breadth of the reviews that have been performed? No. (5) Do portions of the document need review from a particular or from broader perspective, e.g., security, operational complexity, AAA, DNS, DHCP, XML, or internationalization? If so, describe the review that took place. No. (6) Describe any specific concerns or issues that the Document Shepherd has with this document that the Responsible Area Director and/or the IESG should be aware of? For example, perhaps he or she is uncomfortable with certain parts of the document, or has concerns whether there really is a need for it. In any event, if the WG has discussed those issues and has indicated that it still wishes to advance the document, detail those concerns here. No concerns. (7) Has each author confirmed that any and all appropriate IPR disclosures required for full conformance with the provisions of BCP 78 and BCP 79 have already been filed. If not, explain why? Ketan Talaulikar: https://mailarchive.ietf.org/arch/msg/idr/_9y0FOv86CD65LISiQNlioyehCI/ Peter Psenak https://mailarchive.ietf.org/arch/msg/idr/Jh7eUcNUT6whcBTi_Opy6adZYW8/ Jeff Tantsura https://mailarchive.ietf.org/arch/msg/idr/s4Hw-9cbl1zW4tN14JovVZ0H1NA/ (8) Has an IPR disclosure been filed that references this document? If so, summarize any WG discussion and conclusion regarding the IPR disclosures. No IPR disclosures. (9) How solid is the WG consensus behind this document? Does it represent the strong concurrence of a few individuals, with others being silent, or does the WG as a whole understand and agree with it? The feedback on the document is strong from core group of BGP-LS IDR participants. (10) Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarise the areas of conflict in separate email messages to the Responsible Area Director. (It should be in a separate email because this questionnaire is publicly available.) no conflict. (11) Identify any ID nits the Document Shepherd has found in this document. (See http://www.ietf.org/tools/idnits/ and the Internet-Drafts Checklist). Boilerplate checks are not enough; this check needs to be thorough. no nits. (12) Describe how the document meets any required formal review criteria, such as the MIB Doctor, YANG Doctor, media type, and URI type reviews. no formal review required. (13) Have all references within this document been identified as either normative or informative? Yes. (14) Are there normative references to documents that are not ready for advancement or are otherwise in an unclear state? If such normative references exist, what is the plan for their completion? No. (15) Are there downward normative references references (see RFC 3967)? If so, list these downward references to support the Area Director in the Last Call procedure. No. (16) Will publication of this document change the status of any existing RFCs? Are those RFCs listed on the title page header, listed in the abstract, and discussed in the introduction? If the RFCs are not listed in the Abstract and Introduction, explain why, and point to the part of the document where the relationship of this document to the other RFCs is discussed. If this information is not in the document, explain why the WG considers it unnecessary. No. (17) Describe the Document Shepherd's review of the IANA considerations section, especially with regard to its consistency with the body of the document. Confirm that all protocol extensions that the document makes are associated with the appropriate reservations in IANA registries. Confirm that any referenced IANA registries have been clearly identified. Confirm that newly created IANA registries include a detailed specification of the initial contents for the registry, that allocations procedures for future registrations are defined, and a reasonable name for the new registry has been suggested (see RFC 8126). New values in registry: "BGP-LS Node Descriptor, Link Descriptor, Prefix Descriptor, and Attribute TLVs". This document requests allocation of code-point 1122 for Application-specific Link Attributes TLV from the above mentioned registries. (18) List any new IANA registries that require Expert Review for future allocations. Provide any public guidance that the IESG would find useful in selecting the IANA Experts for these new registries. No new registries. (19) Describe reviews and automated checks performed by the Document Shepherd to validate sections of the document written in a formal language, such as XML code, BNF rules, MIB definitions, YANG modules, etc. No formal language. (20) If the document contains a YANG module, has the module been checked with any of the recommended validation tools (https://trac.ietf.org/trac/ops/wiki/yang-review-tools) for syntax and formatting validation? If there are any resulting errors or warnings, what is the justification for not fixing them at this time? Does the YANG module comply with the Network Management Datastore Architecture (NMDA) as specified in RFC8342? No Yang modules needed. |
2021-03-08
|
05 | Ketan Talaulikar | New version available: draft-ietf-idr-bgp-ls-app-specific-attr-05.txt |
2021-03-08
|
05 | (System) | New version accepted (logged-in submitter: Ketan Talaulikar) |
2021-03-08
|
05 | Ketan Talaulikar | Uploaded new revision |
2021-02-19
|
04 | Himanshu Shah | Request for Early review by RTGDIR Completed: Ready. Reviewer: Himanshu Shah. Sent review to list. |
2021-02-18
|
04 | Andy Smith | Request for Early review by RTGDIR Completed: Ready. Reviewer: Andy Smith. Sent review to list. |
2021-02-16
|
04 | Scott Bradner | Request for Early review by OPSDIR Completed: Ready. Reviewer: Scott Bradner. Sent review to list. |
2021-02-16
|
04 | Luc André Burdet | Request for Early review by RTGDIR is assigned to Andy Smith |
2021-02-16
|
04 | Luc André Burdet | Request for Early review by RTGDIR is assigned to Andy Smith |
2021-02-16
|
04 | Luc André Burdet | Request for Early review by RTGDIR is assigned to Himanshu Shah |
2021-02-16
|
04 | Luc André Burdet | Request for Early review by RTGDIR is assigned to Himanshu Shah |
2021-02-11
|
04 | Tero Kivinen | Request for Early review by SECDIR is assigned to Paul Wouters |
2021-02-11
|
04 | Tero Kivinen | Request for Early review by SECDIR is assigned to Paul Wouters |
2021-02-11
|
04 | Tero Kivinen | Closed request for Early review by SECDIR with state 'Withdrawn': Duplicate review request |
2021-02-09
|
04 | Gunter Van de Velde | Request for Early review by OPSDIR is assigned to Scott Bradner |
2021-02-09
|
04 | Gunter Van de Velde | Request for Early review by OPSDIR is assigned to Scott Bradner |
2021-02-09
|
04 | Gunter Van de Velde | Closed request for Early review by OPSDIR with state 'Overtaken by Events' |
2021-02-05
|
04 | Susan Hares | Requested Early review by RTGDIR |
2021-02-05
|
04 | Susan Hares | Requested Early review by OPSDIR |
2021-02-05
|
04 | Susan Hares | Requested Early review by SECDIR |
2021-02-05
|
04 | Susan Hares | Requested Early review by RTGDIR |
2021-02-05
|
04 | Susan Hares | Requested Early review by OPSDIR |
2021-02-05
|
04 | Susan Hares | Requested Early review by SECDIR |
2021-02-05
|
04 | Susan Hares | Notification list changed to shares@ndzh.com, keyur@arrcus.com from shares@ndzh.com because the document shepherd was set |
2021-02-05
|
04 | Susan Hares | Document shepherd changed to Keyur Patel |
2021-02-05
|
04 | Susan Hares | As required by RFC 4858, this is the current template for the Document Shepherd Write-Up. Changes are expected over time. This version is dated … As required by RFC 4858, this is the current template for the Document Shepherd Write-Up. Changes are expected over time. This version is dated 1 November 2019. (1) What type of RFC is being requested: Proposed Standard: Why is this the proper type of RFC? Is this type of RFC indicated in the title page header? (2) The IESG approval announcement includes a Document Announcement Write-Up. Please provide such a Document Announcement Write-Up. Recent examples can be found in the "Action" announcements for approved documents. Technical Summary: Various link attributes have been defined in link-state routing protocols like OSPF and IS-IS in the context of the MPLS Traffic Engineering (TE) and GMPLS. BGP Link-State (BGP-LS) extensions have been defined to distribute these attributes along with other topology information from these link-state routing protocols. Many of these link attributes can be used for applications other than MPLS-TE or GMPLS. Extensions to link-state routing protocols have been defined for such link attributes that enable distribution of their application- specific values. This document defines extensions to BGP-LS address- family to enable advertisement of these application-specific attributes as a part of the topology information from the network. [Keyur - You may want to add additional details here] Working Group Summary: The working group provided a normal consensus for BGP-LS drafts. Document Quality: Implementations: 2 implementations https://trac.ietf.org/trac/idr/wiki/draft-ietf-idr-bgp-ls-app-specific-attr%20implementations Note: 1 vendor has two different implementations. WG was fine with single vendor [You may have to query again on the list.] Personnel: Who is the Document Shepherd? Keyur Patel Who is the Responsible Area Director? Alvaro Retana (3) Briefly describe the review of this document that was performed by the Document Shepherd. (TBD) (4) Does the document Shepherd have any concerns about the depth or breadth of the reviews that have been performed? (TBD) - [Sue's note: Early reviews have been requested from RTG-DIR, OPS-DIR, and SEC-DIR - due on 2/19/2021] Usually it takes 40+ days to get to the bottom of Alvaro's queue - so it helps to get an early review in case there are problems. ] (5) Do portions of the document need review from a particular or from broader perspective, e.g., security, operational complexity, AAA, DNS, DHCP, XML, or internationalization? If so, describe the review that took place. [TBD] - no is generally my answer (6) Describe any specific concerns or issues that the Document Shepherd has with this document that the Responsible Area Director and/or the IESG should be aware of? For example, perhaps he or she is uncomfortable with certain parts of the document, or has concerns whether there really is a need for it. In any event, if the WG has discussed those issues and has indicated that it still wishes to advance the document, detail those concerns here. (TBD) (7) Has each author confirmed that any and all appropriate IPR disclosures required for full conformance with the provisions of BCP 78 and BCP 79 have already been filed. If not, explain why? Ketan Talaulikar: https://mailarchive.ietf.org/arch/msg/idr/_9y0FOv86CD65LISiQNlioyehCI/ Peter Psenak https://mailarchive.ietf.org/arch/msg/idr/Jh7eUcNUT6whcBTi_Opy6adZYW8/ Jeff Tantsura https://mailarchive.ietf.org/arch/msg/idr/s4Hw-9cbl1zW4tN14JovVZ0H1NA/ (8) Has an IPR disclosure been filed that references this document? If so, summarize any WG discussion and conclusion regarding the IPR disclosures. No IPR disclosures (9) How solid is the WG consensus behind this document? Does it represent the strong concurrence of a few individuals, with others being silent, or does the WG as a whole understand and agree with it? Solid group of BGP-LS IDR participants (10) Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarise the areas of conflict in separate email messages to the Responsible Area Director. (It should be in a separate email because this questionnaire is publicly available.) no conflict. (11) Identify any ID nits the Document Shepherd has found in this document. (See http://www.ietf.org/tools/idnits/ and the Internet-Drafts Checklist). Boilerplate checks are not enough; this check needs to be thorough. (TBD) (12) Describe how the document meets any required formal review criteria, such as the MIB Doctor, YANG Doctor, media type, and URI type reviews. (no formal review required) (13) Have all references within this document been identified as either normative or informative? (TBD) (14) Are there normative references to documents that are not ready for advancement or are otherwise in an unclear state? If such normative references exist, what is the plan for their completion? (TBD) (15) Are there downward normative references references (see RFC 3967)? If so, list these downward references to support the Area Director in the Last Call procedure. (TBD) (16) Will publication of this document change the status of any existing RFCs? Are those RFCs listed on the title page header, listed in the abstract, and discussed in the introduction? If the RFCs are not listed in the Abstract and Introduction, explain why, and point to the part of the document where the relationship of this document to the other RFCs is discussed. If this information is not in the document, explain why the WG considers it unnecessary. (no new features) (17) Describe the Document Shepherd's review of the IANA considerations section, especially with regard to its consistency with the body of the document. Confirm that all protocol extensions that the document makes are associated with the appropriate reservations in IANA registries. Confirm that any referenced IANA registries have been clearly identified. Confirm that newly created IANA registries include a detailed specification of the initial contents for the registry, that allocations procedures for future registrations are defined, and a reasonable name for the new registry has been suggested (see RFC 8126). New values in registry: "BGP-LS Node Descriptor, Link Descriptor, Prefix Descriptor, and Attribute TLVs" (TBD on Check) (18) List any new IANA registries that require Expert Review for future allocations. Provide any public guidance that the IESG would find useful in selecting the IANA Experts for these new registries. No new registries. (19) Describe reviews and automated checks performed by the Document Shepherd to validate sections of the document written in a formal language, such as XML code, BNF rules, MIB definitions, YANG modules, etc. No formal language. (20) If the document contains a YANG module, has the module been checked with any of the recommended validation tools (https://trac.ietf.org/trac/ops/wiki/yang-review-tools) for syntax and formatting validation? If there are any resulting errors or warnings, what is the justification for not fixing them at this time? Does the YANG module comply with the Network Management Datastore Architecture (NMDA) as specified in RFC8342? No Yang modules |
2020-11-18
|
04 | Susan Hares | Tag Other - see Comment Log cleared. |
2020-11-18
|
04 | Susan Hares | IETF WG state changed to WG Consensus: Waiting for Write-Up from In WG Last Call |
2020-11-14
|
04 | Ketan Talaulikar | New version available: draft-ietf-idr-bgp-ls-app-specific-attr-04.txt |
2020-11-14
|
04 | (System) | New version accepted (logged-in submitter: Ketan Talaulikar) |
2020-11-14
|
04 | Ketan Talaulikar | Uploaded new revision |
2020-11-01
|
03 | Susan Hares | Missing IPR statement from Peter Psenak. |
2020-11-01
|
03 | Susan Hares | Tag Other - see Comment Log set. |
2020-11-01
|
03 | Susan Hares | Notification list changed to shares@ndzh.com because the document shepherd was set |
2020-11-01
|
03 | Susan Hares | Document shepherd changed to Susan Hares |
2020-07-25
|
03 | Ketan Talaulikar | New version available: draft-ietf-idr-bgp-ls-app-specific-attr-03.txt |
2020-07-25
|
03 | (System) | New version accepted (logged-in submitter: Ketan Talaulikar) |
2020-07-25
|
03 | Ketan Talaulikar | Uploaded new revision |
2020-07-14
|
02 | Susan Hares | IETF WG state changed to In WG Last Call from WG Document |
2020-05-18
|
02 | Ketan Talaulikar | New version available: draft-ietf-idr-bgp-ls-app-specific-attr-02.txt |
2020-05-18
|
02 | (System) | New version approved |
2020-05-18
|
02 | (System) | Request for posting confirmation emailed to previous authors: Peter Psenak , Ketan Talaulikar , Jeff Tantsura |
2020-05-18
|
02 | Ketan Talaulikar | Uploaded new revision |
2019-11-16
|
01 | Ketan Talaulikar | New version available: draft-ietf-idr-bgp-ls-app-specific-attr-01.txt |
2019-11-16
|
01 | (System) | New version approved |
2019-11-16
|
01 | (System) | Request for posting confirmation emailed to previous authors: Ketan Talaulikar , Peter Psenak , Jeff Tantsura |
2019-11-16
|
01 | Ketan Talaulikar | Uploaded new revision |
2019-06-02
|
00 | Susan Hares | This document now replaces draft-ketant-idr-bgp-ls-app-specific-attr instead of None |
2019-06-02
|
00 | Ketan Talaulikar | New version available: draft-ietf-idr-bgp-ls-app-specific-attr-00.txt |
2019-06-02
|
00 | (System) | WG -00 approved |
2019-05-30
|
00 | Ketan Talaulikar | Set submitter to "Ketan Talaulikar ", replaces to draft-ketant-idr-bgp-ls-app-specific-attr and sent approval email to group chairs: idr-chairs@ietf.org |
2019-05-30
|
00 | Ketan Talaulikar | Uploaded new revision |