Skip to main content

BGP-Based Auto-Discovery for Layer-1 VPNs
draft-ietf-l1vpn-bgp-auto-discovery-05

Yes

(David Ward)

No Objection

(Chris Newman)
(Cullen Jennings)
(Jari Arkko)
(Jon Peterson)
(Lars Eggert)
(Lisa Dusseault)
(Magnus Westerlund)
(Ron Bonica)
(Ross Callon)
(Russ Housley)

Note: This ballot was opened for revision 05 and is now closed.

David Ward Former IESG member
Yes
Yes () Unknown

                            
Chris Newman Former IESG member
No Objection
No Objection () Unknown

                            
Cullen Jennings Former IESG member
No Objection
No Objection () Unknown

                            
Jari Arkko Former IESG member
(was Discuss, No Objection) No Objection
No Objection () Unknown

                            
Jon Peterson Former IESG member
No Objection
No Objection () Unknown

                            
Lars Eggert Former IESG member
No Objection
No Objection () Unknown

                            
Lisa Dusseault Former IESG member
No Objection
No Objection () Unknown

                            
Magnus Westerlund Former IESG member
No Objection
No Objection () Unknown

                            
Pasi Eronen Former IESG member
(was Discuss) No Objection
No Objection (2008-05-05) Unknown
Sandy's SecDir review also identified a number of places that would
benefit from some clarification of the text, and provided editorial
comments that should be taken into acccount.
Ron Bonica Former IESG member
No Objection
No Objection () Unknown

                            
Ross Callon Former IESG member
No Objection
No Objection () Unknown

                            
Russ Housley Former IESG member
No Objection
No Objection () Unknown

                            
Tim Polk Former IESG member
(was No Record, Discuss) No Objection
No Objection (2008-05-08) Unknown
Sandy Murphy has asked what happens if the basic security assumption
does not hold.

Given the importance of the basic trust assumption - all the participants
are trustworthy, and trust is transitive - it would also be nice if the
security considerations noted *why* the wg feels this is a reasonable
assumption.  (I assume it is based on the fact that all the peers are
members of the same provider network?)