Skip to main content

IP Router Alert Considerations and Usage
draft-ietf-intarea-router-alert-considerations-10

Revision differences

Document history

Date Rev. By Action
2012-08-22
10 (System) post-migration administrative database adjustment to the No Objection position for Sean Turner
2012-08-22
10 (System) post-migration administrative database adjustment to the No Objection position for Pete Resnick
2012-08-22
10 (System) post-migration administrative database adjustment to the Yes position for Ronald Bonica
2011-09-02
10 Amy Vezza State changed to RFC Ed Queue from Approved-announcement sent.
2011-09-01
10 (System) IANA Action state changed to No IC from In Progress
2011-09-01
10 (System) IANA Action state changed to In Progress
2011-09-01
10 Amy Vezza IESG state changed to Approved-announcement sent
2011-09-01
10 Amy Vezza IESG has approved the document
2011-09-01
10 Amy Vezza Closed "Approve" ballot
2011-09-01
10 Amy Vezza Approval announcement text regenerated
2011-09-01
10 Amy Vezza Ballot writeup text changed
2011-09-01
10 Amy Vezza State changed to Approved-announcement to be sent from IESG Evaluation::AD Followup.
2011-08-16
10 Sean Turner [Ballot Position Update] Position for Sean Turner has been changed to No Objection from Discuss
2011-08-03
10 (System) New version available: draft-ietf-intarea-router-alert-considerations-10.txt
2011-08-02
10 Pete Resnick
[Ballot comment]
(I would like these two changed, but I won't hold up the document over them.)

1. I think this document would do fine …
[Ballot comment]
(I would like these two changed, but I won't hold up the document over them.)

1. I think this document would do fine as a standards track document instead of a BCP.

2. The use of the phrase "MAY be safely deployed" in 4.2.2 seems like an inappropriate use of the term "MAY". It's not specifying a protocol option. I think what you mean is "can be safely deployed".
2011-08-02
10 Pete Resnick [Ballot Position Update] Position for Pete Resnick has been changed to No Objection from Discuss
2011-08-02
10 Sean Turner
[Ballot discuss]
This is an updated discuss based on -09

Doesn't this document update RFC 2113 and 2711?  If this document is all about security …
[Ballot discuss]
This is an updated discuss based on -09

Doesn't this document update RFC 2113 and 2711?  If this document is all about security considerations of something defined in those two documents doesn't it update that document?

* If this document is updating 2113 and 2711 we should add that to the header to help implementers:

Updates: 2113, 2117 (if approved)
2011-08-02
09 (System) New version available: draft-ietf-intarea-router-alert-considerations-09.txt
2011-08-02
08 (System) New version available: draft-ietf-intarea-router-alert-considerations-08.txt
2011-08-01
10 Pete Resnick
[Ballot discuss]
The way 2119 terminology is used in this document is problematic. Three general issues:

1. The document says "it is RECOMMENDED", in the …
[Ballot discuss]
The way 2119 terminology is used in this document is problematic. Three general issues:

1. The document says "it is RECOMMENDED", in the passive voice, instead of saying who should be doing what. This occurs twice in section 4.3 and twice in section 5. The current phrasing I fear will confuse implementers and obscures what the document is actually requiring.

2. The use of the phrase "MAY be safely deployed" seems like an inappropriate use of the term "MAY". That doesn't seem to be specifying a protocol option. I think what you mean is "can be safely deployed". This occurs in 4.2.1 three times and 4.2.2 three times.

3. In section 4.3:

  As a last resort, if the SP does not have any means to safely
  transport end to end IP Router Alert option packets over his network,
  the SP MAY drop those packets.

That "MAY" seems odd as the other choices are given as examples (not protocol options) in the preceeding three paragraphs. Also, because this is a "last resort" with "undesirable consequences", it seems that it is not a real option as much as something that the SP SHOULD NOT do except as a "last resort". Again, using the word "can" would work here, or it ought to be rewritten with the "SHOULD NOT".
2011-07-28
10 Pete Resnick
[Ballot discuss]
[Update 2011-07-28: I see in -06 that the example I gave in #1 below has been fixed, but none of the other similar …
[Ballot discuss]
[Update 2011-07-28: I see in -06 that the example I gave in #1 below has been fixed, but none of the other similar places I cited in the document were changed, and nothing in #2 or #3 has been changed. If the WG does not feel that my requests are reasonable, I'd like to hear that. But I have not heard anything from the author, chairs, or shepherd regarding this DISCUSS.]

The way 2119 terminology is used in this document is problematic. Three general issues:

1. The document repeatedly says "it is RECOMMENDED", in the passive voice, instead of saying who should be doing what. For example, in 4.1:

  Thus, it is RECOMMENDED that applications and protocols not be
  deployed with a dependency on processing of the Router Alert option
  (as currently specified) across independent administrative domains in
  the Internet.

(This one has the additional problem that the recommendation is *not* to do something, making it more confusing.) It seems to me much better to rewrite this as:

  Thus, applications and protocols SHOULD NOT be deployed with a
  dependency on processing of the Router Alert option (as currently
  specified) across independent administrative domains in the Internet.

If for some reason you want to use the term "RECOMMENDED" and stick to the passive voice (which I would wonder about because it is identical to using the term "SHOULD"), you could try:

  Thus, deployment of applications and protocols with a dependency on
  processing of the Router Alert option across independent
  administrative domains in the Internet is NOT RECOMMENDED.

The same sort of thing appears twice in section 4.3 and twice in section 5. The current phrasing I fear will confuse implementers and obscures what the document is actually requiring.

2. The use of the phrase "MAY be safely deployed" seems like an inappropriate use of the term "MAY". That doesn't seem to be specifying a protocol option. I think what you mean is "can be safely deployed". This occurs in 4.2.1 three times and 4.2.2 three times.

3. In section 4.3:

  As a last resort, if the SP does not have any means to safely
  transport end to end IP Router Alert option packets over his network,
  the SP MAY drop those packets.

That "MAY" seems odd as the other choices are given as examples (not protocol options) in the preceeding three paragraphs. Also, because this is a "last resort" with "undesirable consequences", it seems that it is not a real option as much as something that the SP SHOULD NOT do except as a "last resort". Again, using the word "can" would work here, or it ought to be rewritten with the "SHOULD NOT".

A similar thing applies to the MAYs in the first and last paragraphs of section 5. They appear to be examples, not protocol options.
2011-07-25
10 Ron Bonica [Ballot Position Update] Position for Ron Bonica has been changed to Yes from Discuss
2011-07-25
10 (System) Sub state has been changed to AD Follow up from New Id Needed
2011-07-25
07 (System) New version available: draft-ietf-intarea-router-alert-considerations-07.txt
2011-07-14
10 Cindy Morgan Removed from agenda for telechat
2011-07-14
10 Cindy Morgan State changed to IESG Evaluation::Revised ID Needed from IESG Evaluation.
2011-07-14
10 Dan Romascanu
[Ballot comment]
I support Sean's DISCUSS about the document updating the Security Considerations sections of the RAO defining documents.

I support Ron's DISCUSS.

I support …
[Ballot comment]
I support Sean's DISCUSS about the document updating the Security Considerations sections of the RAO defining documents.

I support Ron's DISCUSS.

I support Wesley's COMMENT. Actually I think it has almost a DISCUSS value, as the document makes distinction in a few places between processing (and not only speed of processing) on the fast path and slow path.
2011-07-14
10 Dan Romascanu [Ballot Position Update] New position, No Objection, has been recorded
2011-07-14
10 Stephen Farrell [Ballot Position Update] New position, No Objection, has been recorded
2011-07-14
10 Jari Arkko [Ballot Position Update] New position, Yes, has been recorded
2011-07-14
10 Amy Vezza State changed to IESG Evaluation from Waiting for AD Go-Ahead.
2011-07-14
10 Sean Turner
[Ballot discuss]
Doesn't this document update RFC 2113 and 2711?  If this document is all about security considerations of something defined in those two documents …
[Ballot discuss]
Doesn't this document update RFC 2113 and 2711?  If this document is all about security considerations of something defined in those two documents doesn't it update that document?

I think the security considerations ought to be tweaked a bit to note that 2311 and 2711 originally defined the RAO and included some security considerations:

This document expands the security considerations of [RFC2113] and [RFC2711], which defined the RAO, to discuss security risks associated with current usage of the IP Router Alert Option and associated practices.  See [RFC4081] for additional security considerations.
2011-07-14
10 Sean Turner [Ballot Position Update] New position, Discuss, has been recorded
2011-07-13
10 Gonzalo Camarillo [Ballot Position Update] New position, No Objection, has been recorded
2011-07-13
10 Pete Resnick [Ballot comment]
I think this document would do fine as a standards track document instead of a BCP.
2011-07-13
10 Pete Resnick
[Ballot discuss]
The way 2119 terminology is used in this document is problematic. Three general issues:

1. The document repeatedly says "it is RECOMMENDED", in …
[Ballot discuss]
The way 2119 terminology is used in this document is problematic. Three general issues:

1. The document repeatedly says "it is RECOMMENDED", in the passive voice, instead of saying who should be doing what. For example, in 4.1:

  Thus, it is RECOMMENDED that applications and protocols not be
  deployed with a dependency on processing of the Router Alert option
  (as currently specified) across independent administrative domains in
  the Internet.

(This one has the additional problem that the recommendation is *not* to do something, making it more confusing.) It seems to me much better to rewrite this as:

  Thus, applications and protocols SHOULD NOT be deployed with a
  dependency on processing of the Router Alert option (as currently
  specified) across independent administrative domains in the Internet.

If for some reason you want to use the term "RECOMMENDED" and stick to the passive voice (which I would wonder about because it is identical to using the term "SHOULD"), you could try:

  Thus, deployment of applications and protocols with a dependency on
  processing of the Router Alert option across independent
  administrative domains in the Internet is NOT RECOMMENDED.

The same sort of thing appears twice in section 4.3 and twice in section 5. The current phrasing I fear will confuse implementers and obscures what the document is actually requiring.

2. The use of the phrase "MAY be safely deployed" seems like an inappropriate use of the term "MAY". That doesn't seem to be specifying a protocol option. I think what you mean is "can be safely deployed". This occurs in 4.2.1 three times and 4.2.2 three times.

3. In section 4.3:

  As a last resort, if the SP does not have any means to safely
  transport end to end IP Router Alert option packets over his network,
  the SP MAY drop those packets.

That "MAY" seems odd as the other choices are given as examples (not protocol options) in the preceeding three paragraphs. Also, because this is a "last resort" with "undesirable consequences", it seems that it is not a real option as much as something that the SP SHOULD NOT do except as a "last resort". Again, using the word "can" would work here, or it ought to be rewritten with the "SHOULD NOT".

A similar thing applies to the MAYs in the first and last paragraphs of section 5. They appear to be examples, not protocol options.
2011-07-13
10 Pete Resnick [Ballot Position Update] New position, Discuss, has been recorded
2011-07-13
10 Ron Bonica
[Ballot comment]
1) You might want to find another word for "punt". This word may not be understood by those not familiar with American Football …
[Ballot comment]
1) You might want to find another word for "punt". This word may not be understood by those not familiar with American Football or Rugby.
2011-07-13
10 Ron Bonica
[Ballot discuss]
I intend to change this from a DISCUSS to YES as soon as a few minor changes are made.

s/network operators need to …
[Ballot discuss]
I intend to change this from a DISCUSS to YES as soon as a few minor changes are made.

s/network operators need to actively protect themselves against externally generated IP Router Alert packets/network operators SHOULD actively protect themselves against externally generated IP Router Alert packets

s/ Thus, it is RECOMMENDED that applications and protocols not be deployed with a dependency on processing of the Router Alert option (as currently specified) across independent administrative domains in the Internet./  Thus, applications and protocols MUST NOT be deployed with a dependency on processing of the Router Alert option  (as currently specified) across independent administrative domains in the Internet.

- In Section 4.2.2, just above Figure 4, you talk about a private enterprise network. Do you mean a VPN? Is there any chance of another enterprise (C) sending a RA Optioned Packet to Enterprise A? If so, should B deliver it?

- In the second part of section 4.2.2, you talk about "special agreements between administrative domains". More text is required. here. Let's say that A enters into an agreement with B. That's fine. Now let's say that B enters into an agreement with C. That's fine, so long as B tells A about the agreement with C. Now let's say that C enters into an agreement with D. Will D inform A? If not, the special agreement has been breached. I don't see this flying in the real world.
2011-07-13
10 Ron Bonica [Ballot Position Update] New position, Discuss, has been recorded
2011-07-13
10 David Harrington [Ballot Position Update] New position, No Objection, has been recorded
2011-07-13
10 Russ Housley
[Ballot comment]
The Gen-ART Review by Miguel Garcia on 13-Jul-2011 includes two
  editorial comments:

  - Make sure that "Router Alert Option" is written …
[Ballot comment]
The Gen-ART Review by Miguel Garcia on 13-Jul-2011 includes two
  editorial comments:

  - Make sure that "Router Alert Option" is written with capital "O"
    across the document. There are a few instances with a lower "o".

  - Expand acronyms at first occurrence. This includes: ASIC
2011-07-13
10 Russ Housley [Ballot Position Update] New position, No Objection, has been recorded
2011-07-13
10 Stewart Bryant [Ballot Position Update] New position, No Objection, has been recorded
2011-07-13
10 (System) State changed to Waiting for AD Go-Ahead from In Last Call.
2011-07-12
10 Peter Saint-Andre [Ballot comment]
In Section 3, it would be good to expand "DOS" on first use and add an informative reference to RFC 4732.
2011-07-12
10 Peter Saint-Andre [Ballot Position Update] New position, No Objection, has been recorded
2011-07-12
10 Amanda Baber We understand that this document doesn't require any IANA actions.
2011-07-11
10 Robert Sparks [Ballot Position Update] New position, No Objection, has been recorded
2011-07-11
10 Adrian Farrel [Ballot comment]
I wouldn't mind my name being spelled right :-)
2011-07-11
10 Adrian Farrel [Ballot Position Update] New position, Recuse, has been recorded
2011-07-07
10 Wesley Eddy
[Ballot comment]
definition of fast-path should mention that this is the nominal processing path within a router for datagrams, and then the slow-path definition should …
[Ballot comment]
definition of fast-path should mention that this is the nominal processing path within a router for datagrams, and then the slow-path definition should say that this is a sub-nominal processing path for packets that require special processing or differ from assumptions made in fast path heuristics.
2011-07-07
10 Wesley Eddy [Ballot Position Update] New position, No Objection, has been recorded
2011-07-05
06 (System) New version available: draft-ietf-intarea-router-alert-considerations-06.txt
2011-07-01
10 Ralph Droms [Ballot Position Update] New position, Yes, has been recorded for Ralph Droms
2011-07-01
10 Ralph Droms Ballot has been issued
2011-07-01
10 Ralph Droms Created "Approve" ballot
2011-06-30
10 Samuel Weiler Request for Last Call review by SECDIR is assigned to Dave Cridland
2011-06-30
10 Samuel Weiler Request for Last Call review by SECDIR is assigned to Dave Cridland
2011-06-29
10 David Harrington Request for Last Call review by TSVDIR is assigned to David Borman
2011-06-29
10 David Harrington Request for Last Call review by TSVDIR is assigned to David Borman
2011-06-29
10 Ralph Droms Placed on agenda for telechat - 2011-07-14
2011-06-29
10 Amy Vezza Last call sent
2011-06-29
10 Amy Vezza
State changed to In Last Call from Last Call Requested.

The following Last Call Announcement was sent out:

From: The IESG
To: IETF-Announce
CC:
Reply-To: …
State changed to In Last Call from Last Call Requested.

The following Last Call Announcement was sent out:

From: The IESG
To: IETF-Announce
CC:
Reply-To: ietf@ietf.org
Subject: Last Call:  (IP Router Alert Considerations and Usage) to BCP


The IESG has received a request from the Internet Area Working Group WG
(intarea) to consider the following document:
- 'IP Router Alert Considerations and Usage'
  as a BCP

The IESG plans to make a decision in the next few weeks, and solicits
final comments on this action. Please send substantive comments to the
ietf@ietf.org mailing lists by 2011-07-13. Exceptionally, comments may be
sent to iesg@ietf.org instead. In either case, please retain the
beginning of the Subject line to allow automated sorting.

Abstract


  The IP Router Alert Option is an IP option that alerts transit
  routers to more closely examine the contents of an IP packet.
  Resource reSerVation Protocol (RSVP), Pragmatic General Multicast
  (PGM), Internet Group Management Protocol (IGMP), Multicast Listener
  Discovery (MLD), Multicast Router Discovery (MRD) and General
  Internet Signalling Transport (GIST) are some of the protocols that
  make use of the IP Router Alert option.  This document discusses
  security aspects and usage guidelines around the use of the current
  IP Router Alert option.  Specifically, it provides recommendation
  against using the Router Alert in the end-to-end open Internet as
  well as identify controlled environments where protocols depending on
  Router Alert can be used safely.  It also provides recommendation
  about protection approaches for Service Providers.  Finally it
  provides brief guidelines for Router Alert implementation on routers.




The file can be obtained via
http://datatracker.ietf.org/doc/draft-ietf-intarea-router-alert-considerations/

IESG discussion can be tracked via
http://datatracker.ietf.org/doc/draft-ietf-intarea-router-alert-considerations/


No IPR declarations have been submitted directly on this I-D.


2011-06-29
10 Ralph Droms Last Call was requested
2011-06-29
10 (System) Ballot writeup text was added
2011-06-29
10 (System) Last call text was added
2011-06-29
10 (System) Ballot approval text was added
2011-06-29
10 Ralph Droms State changed to Last Call Requested from AD Evaluation::AD Followup.
2011-06-27
05 (System) New version available: draft-ietf-intarea-router-alert-considerations-05.txt
2011-06-24
10 Ralph Droms Responsible AD has been changed to Ralph Droms from Jari Arkko
2011-06-23
10 Julien Laganier Was sent to IESG.
2011-06-23
10 Julien Laganier IETF state changed to Submitted to IESG for Publication from WG Document
2011-06-19
10 Jari Arkko State changed to AD Evaluation::AD Followup from AD Evaluation.
Ralph and I need to discuss who will formally sponsor this document.
2011-06-19
10 Jari Arkko
State changed to AD Evaluation from Publication Requested.
I have reviewed this specification and found that it was well written, ready to move forward. I …
State changed to AD Evaluation from Publication Requested.
I have reviewed this specification and found that it was well written, ready to move forward. I did have a few smaller issues, however.

Technical:

In Section 2:

The IPv4 base specification [RFC0791] defines a general notion of IPv4 options that can be included in the IPv4 header (without distinguishing between hop-by-hop versus end-to-end option).  The IPv4 Router Alert Option is one particular IPv4 option.  Similar security concerns to those discussed in the present document for the IPv4 Router Alert apply more generically to the concept of IPv4 option.  However, addressing the broader concept of IPv4 option thoroughly would require additional material so as to cover additional considerations associated with it (such as lack of option ordering, etc.), so this is kept outside the scope of the present document.

In fairness, I would probably tell the reader that other IPv4 options are often blocked in firewalls and not very widely used, so the risks they present are largely non-existent.

In Section 3

It can be observed that opening up a hole in the control plane of Service Provider routers is commonly done for other applications, such as BGP peering.

The phrase "opening up a hole" is somewhat imprecise. How about saying something like this: "Note that service providers commonly allow external parties to communicate with a control plane application in their routers, such as with BGP peering."

In Section 4:

This may (ideally) be achieved by tunneling IP Router Alert packets [RFC6178] so that the IP Router Alert option is hidden through that network, or it may be achieved via mechanisms resulting in occasional (e.g., rate limiting) or systematic drop of IP Router Alert packets.

To know exactly how "ideal" the tunneling approach is, we'd have to know what the cost of tunneling is (bandwidth, MTU errors, etc) vs. benefits from the Router Alert application. I would strike the word "ideally" from above.

Editorial:

In the abstract

> RSVP, PGM, IGMP/MLD, MRD and GIST are some of the protocols that make use of the IP Router Alert option.

It is customary to expand less-well known acronyms (PGM, MRD and GIST, for instance) in the abstract. And in Section 2 you expand GIST, but not others.

In Section 2:

> A proposal for such enhancements can be found in [I-D.narayanan-rtg-router-alert-extension].

I'd prefer to make it clearer that no agreed/approved proposal exists at this time. E.g., "One such proposal is discussed in [...], but at the time of this writing, the IETF has not adopted any extensions for this purpose."

2011-06-19
10 Jari Arkko Ballot writeup text changed
2011-06-19
10 Jari Arkko Ballot writeup text changed
2011-06-08
10 Cindy Morgan
  (1.a) Who is the Document Shepherd for this document? Has the
        Document Shepherd personally reviewed this version of the
  …
  (1.a) Who is the Document Shepherd for this document? Has the
        Document Shepherd personally reviewed this version of the
        document and, in particular, does he or she believe this
        version is ready for forwarding to the IESG for publication?

The Document Shepherd is Julien Laganier, INTAREA co-chair. He
        has personally done a thorough review of the document. He
        believe the document is ready for forwarding to IESG for
        publication.

  (1.b) Has the document had adequate review both from key WG members
        and from key non-WG members? Does the Document Shepherd have
        any concerns about the depth or breadth of the reviews that
        have been performed? 

        The document was given adequate reviews. The Document Shepherd has
        no concerns about the depth or breadth of these reviews.

  (1.c) Does the Document Shepherd have concerns that the document
        needs more review from a particular or broader perspective,
        e.g., security, operational complexity, someone familiar with
        AAA, internationalization or XML?

        The Document Shepherd has no such concerns.

  (1.d) Does the Document Shepherd have any specific concerns or
        issues with this document that the Responsible Area Director
        and/or the IESG should be aware of? For example, perhaps he
        or she is uncomfortable with certain parts of the document, or
        has concerns whether there really is a need for it. In any
        event, if the WG has discussed those issues and has indicated
        that it still wishes to advance the document, detail those
        concerns here. Has an IPR disclosure related to this document
        been filed? If so, please include a reference to the
        disclosure and summarize the WG discussion and conclusion on
        this issue.

        The Document Shepherd has no such concerns.

  (1.e) How solid is the WG consensus behind this document? Does it
        represent the strong concurrence of a few individuals, with
        others being silent, or does the WG as a whole understand and
        agree with it? 

There is WG consensus behind this document.

  (1.f) Has anyone threatened an appeal or otherwise indicated extreme
        discontent? If so, please summarise the areas of conflict in
        separate email messages to the Responsible Area Director. (It
        should be in a separate email because this questionnaire is
        entered into the ID Tracker.)

        No.

  (1.g) Has the Document Shepherd personally verified that the
        document satisfies all ID nits? (See the Internet-Drafts Checklist
        and http://tools.ietf.org/tools/idnits/). Boilerplate checks are
        not enough; this check needs to be thorough. Has the document
        met all formal review criteria it needs to, such as the MIB
        Doctor, media type and URI type reviews?

Yes.

  (1.h) Has the document split its references into normative and
        informative? Are there normative references to documents that
        are not ready for advancement or are otherwise in an unclear
        state? If such normative references exist, what is the
        strategy for their completion? Are there normative references
        that are downward references, as described in [RFC3967]? If
        so, list these downward references to support the Area
        Director in the Last Call procedure for them [RFC3967].

The document has split its references into normative and
        informative. There are neither normative references in an unclear
        state, nor downward references.

  (1.i) Has the Document Shepherd verified that the document IANA
        consideration section exists and is consistent with the body
        of the document? If the document specifies protocol
        extensions, are reservations requested in appropriate IANA
        registries? Are the IANA registries clearly identified? If
        the document creates a new registry, does it define the
        proposed initial contents of the registry and an allocation
        procedure for future registrations? Does it suggest a
        reasonable name for the new registry? See [RFC5226]. If the
        document describes an Expert Review process has Shepherd
        conferred with the Responsible Area Director so that the IESG
        can appoint the needed Expert during the IESG Evaluation?

        The document has an IANA considerations sections that correctly
state that the document does not need IANA actions.

  (1.j) Has the Document Shepherd verified that sections of the
        document that are written in a formal language, such as XML
        code, BNF rules, MIB definitions, etc., validate correctly in
        an automated checker?

        There are no such sections.

  (1.k) The IESG approval announcement includes a Document
        Announcement Write-Up. Please provide such a Document
        Announcement Write-Up? Recent examples can be found in the
        "Action" announcements for approved documents. The approval
        announcement contains the following sections:

    Technical Summary

  The IP Router Alert Option is an IP option that alerts transit
  routers to more closely examine the contents of an IP packet.  RSVP,
  PGM, IGMP/MLD, MRD and GIST are some of the protocols that make use
  of the IP Router Alert option.  This document discusses security
  aspects and usage guidelines around the use of the current IP Router
  Alert option.  Specifically, it provides recommendation against using
  the Router Alert in the end-to-end open Internet as well as identify
  controlled environments where protocols depending on Router Alert can
  be used safely.  It also provides recommendation about protection
  approaches for Service Providers.  Finally it provides brief
  guidelines for Router Alert implementation on routers.

    Working Group Summary

  The normal WG process was followed and the document as it stands now
  reflects WG consensus with nothing special worth mentioning.

    Document Quality

  The document was given adequate reviews. The Document Shepherd has
  no concerns about the depth or breadth of these reviews.
2011-06-08
10 Cindy Morgan Draft added in state Publication Requested
2011-06-08
10 Cindy Morgan [Note]: 'Julien Laganier (julien.ietf@gmail.com) is the document shepherd.' added
2011-06-07
04 (System) New version available: draft-ietf-intarea-router-alert-considerations-04.txt
2011-03-10
03 (System) New version available: draft-ietf-intarea-router-alert-considerations-03.txt
2010-10-25
02 (System) New version available: draft-ietf-intarea-router-alert-considerations-02.txt
2010-07-08
01 (System) New version available: draft-ietf-intarea-router-alert-considerations-01.txt
2010-03-12
00 (System) New version available: draft-ietf-intarea-router-alert-considerations-00.txt