Skip to main content

Requirements for Multicast Support in Virtual Private LAN Services
draft-ietf-l2vpn-vpls-mcast-reqts-07

Revision differences

Document history

Date Rev. By Action
2012-08-22
07 (System) post-migration administrative database adjustment to the No Objection position for Tim Polk
2012-08-22
07 (System) post-migration administrative database adjustment to the No Objection position for Russ Housley
2012-08-22
07 (System) post-migration administrative database adjustment to the No Objection position for Ronald Bonica
2009-02-17
07 Cindy Morgan State Changes to RFC Ed Queue from Approved-announcement sent by Cindy Morgan
2009-02-17
07 (System) IANA Action state changed to No IC from In Progress
2009-02-17
07 (System) IANA Action state changed to In Progress
2009-02-17
07 Amy Vezza IESG state changed to Approved-announcement sent
2009-02-17
07 Amy Vezza IESG has approved the document
2009-02-17
07 Amy Vezza Closed "Approve" ballot
2009-02-13
07 Amy Vezza State Changes to Approved-announcement to be sent from IESG Evaluation::Revised ID Needed by Amy Vezza
2009-02-13
07 (System) Removed from agenda for telechat - 2009-02-12
2009-02-12
07 (System) [Ballot Position Update] Position for Ron Bonica has been changed to No Objection from Discuss by IESG Secretary
2009-02-12
07 Tim Polk [Ballot Position Update] Position for Tim Polk has been changed to No Objection from Undefined by Tim Polk
2009-02-12
07 Tim Polk [Ballot Position Update] Position for Tim Polk has been changed to Undefined from Discuss by Tim Polk
2009-02-12
07 Dan Romascanu [Ballot Position Update] New position, No Objection, has been recorded by Dan Romascanu
2009-02-12
07 Dan Romascanu
[Ballot comment]
I have a number of comments, none of them is blocking, but I would suggest to consider them before the document is published. …
[Ballot comment]
I have a number of comments, none of them is blocking, but I would suggest to consider them before the document is published.

1. Section 1.1:

> It is also necessary as customer routers are now likely to
  be running IP multicast protocols and those routers and connected to
  switches that will be handling large amounts of multicast traffic.

This phrase is incomplete, needs some edits to clarify syntax.

2. In section 1.2 and a couple of more places the word NOT is capitalized without being part of a capitalized key-word as per RFC 2119 - like in 'Also, this document does NOT aim to express ...'. I suggest to renounce this capitalization.

3. Section 5.1.1 refers to 'Ethernet control protocols employed by customers (e.g.  Spanning Tree Protocol [802.1D])' There is no such thing as 'Ethernet control protocols' and IEEE 802.1D does not apply to Ethernet only. I suggest to use a different terminology - for example 'layer 2 control plane protocols running on Local Area Networks (LAN) such as Ethernet (e.g.  Spanning Tree Protocol [802.1D])'

4. Sections 5.4 and 6.5.3 use the term 'standard SNMP MIB'. In the IETF management framework MIB modules are not necessarily used only with SNMP (SNMP being the protocol, and MIB modules being written in SMI). I suggest to use 'standard MIB modules' instead.

5. Section 6.5.3 includes:

> -  Multicast traffic statistics (total traffic forwarded, incoming,
      outgoing, dropped, etc., by period of time)

We usually discourage devices to make computation of statistic counters by period of time, retrieval by management aplications being a better solution for several reasons. I suggest to drop 'by period of time'

6. In section 6.5.4 I suggest to replace 'SNMP-trap' by 'SNMP Notification' which is the more recent and more general term used in SNMP.

7. I suggest to use the newer IEEE 802.1D-2004 revision of the standard as a reference rather than the 1998 revision

8. IEEE 802.1ag - CFM is not longer work on progress - it was approved as IEEE 802.1ag-2007. Please update the reference.
2009-02-11
07 Lisa Dusseault [Ballot Position Update] New position, No Objection, has been recorded by Lisa Dusseault
2009-02-11
07 Cullen Jennings [Ballot Position Update] New position, No Objection, has been recorded by Cullen Jennings
2009-02-06
07 Mark Townsley State Changes to IESG Evaluation::Revised ID Needed from IESG Evaluation::AD Followup by Mark Townsley
2009-02-06
07 Mark Townsley Note field has been cleared by Mark Townsley
2009-01-14
07 (System) New version available: draft-ietf-l2vpn-vpls-mcast-reqts-07.txt
2009-01-12
07 Mark Townsley Placed on agenda for telechat - 2009-02-12 by Mark Townsley
2009-01-12
07 Mark Townsley [Note]: 'Bringing back to telechat to get attention on remaining discusses.' added by Mark Townsley
2008-08-05
07 Russ Housley [Ballot Position Update] Position for Russ Housley has been changed to No Objection from Discuss by Russ Housley
2008-08-05
07 (System) Sub state has been changed to AD Follow up from New Id Needed
2008-08-05
06 (System) New version available: draft-ietf-l2vpn-vpls-mcast-reqts-06.txt
2008-07-29
07 Mark Townsley


-------- Original Message --------
Subject: Moving draft-ietf-l2vpn-vpls-mcast-reqts-05.txt (Informational RFC) forward
Date: Fri, 25 Jul 2008 10:51:19 +0200
From: Mark Townsley
To: draft-ietf-l2vpn-vpls-mcast-reqts@tools.ietf.org, "l2vpn-chairs@tools.ietf.org …


-------- Original Message --------
Subject: Moving draft-ietf-l2vpn-vpls-mcast-reqts-05.txt (Informational RFC) forward
Date: Fri, 25 Jul 2008 10:51:19 +0200
From: Mark Townsley
To: draft-ietf-l2vpn-vpls-mcast-reqts@tools.ietf.org, "l2vpn-chairs@tools.ietf.org" , Ron Bonica , Russ Housley , Tim Polk



This is part of a general review of documents on my plate in the IESG in
advance of the Dublin meeting.

I believe the authors have been working with the DISCUSS holders on some
of these issues. Yuji, could you provide an update on where we are in
your opinion?

Thanks,

- Mark


Discusses and Comments
Ron Bonica:
Discuss:
[2007-12-20] Maybe I missed it, but the document doesn't seem to address
MAC learning.

Comment:
[2007-12-20] You say "

"Furthermore, in some cases, IP service providers might expect
operational simplicity of VPLS.  That is, they avoid direct and
detailed knowledge of IP routing.  In this case, the multicast
delivery mechanism is expected to have not only efficiency but
also simplicity.  Generally speaking, there is a trade-off between
efficiency and simplicity in terms of bandwidth usage and state
maintenance, so the optimum trade-off will vary depending on the
requirements of each IP service provider."

The argument about "operational simplicity of VPLS" relative to layer 3
service is difficult to support, as instead of "direct and detailed
knowledge of IP routting", one has to deal with direct and detailed
knowledge of MAC addresses (including MAC address learning), and
layer 2.

Consider removing the entire paragraph


Also, you say:

"A solution SHOULD honor customer multicast domains."


Perhaps replace with "A solution SHOULD NOT alter customer multicast
domains' boundaries", as it is not clear what "honor .. multicast domains"
really means. Otherwise, clarify what "honor" means.

Also, you say:

"Multicast forwarding restoration time MUST NOT be greater than the
restoration time of a customer's Layer-3 multicast protocols.  For
example, if a customer uses PIM with default configuration, hello
hold timer is 105 seconds, and solutions are required to detect a
failure no later than this period."

The above mixes *restoration* time at layer 3 with *detection* time
at the VPLS infrastructure. Does not seems to be correct.


Also, you say:

Therefore, in addition to the L2VPN discovery requirements in
[RFC4665], a multicast VPLS solution SHOULD provide a method that
dynamically allows multicast membership information to be discovered
by PEs.  Such membership information is, for example, a set of
multicast addresses.  What information is provided dynamically is
solution specific."


This paragraph mixes several issues that should probably be unbundled.
First of all, unless a solution supports (A), as defined in 3.2,
there is little point in PEs' dynamically discovering multicast
membership info. So, "SHOULD" be conditioned on supporting (A).

Second in one scenario a PE discovers multicast membership info
from only the sites connected to that PE, while in another scenario
in addition to the previous scenario the PE discovers multicast
membership info from other PEs as well. The spec needs to spell
out what exactly it means by "dynamically allow multicast
membership information to be discovered by PEs".

Russ Housley:
Discuss:
[2007-12-20]
The Gen-ART Review by Christian Vogt has received no response.
It can be found at:

  http://www.alvestrand.no/ietf/gen/reviews/
  draft-ietf-l2vpn-vpls-mcast-reqts-05-vogt.txt

I am especially interested in a response to Christian's third comment.

Tim Polk:
Discuss:
[2008-03-11] [This is a revised discuss, integrating Sam Hartman's
issues and my own into a single
discuss to support AD transition.]

This discuss elaborates on issues raised in Steve Hanna's security
directorate review; that
review also needs to be examined in its entirety.

The following issue from the secdir review is blocking:
>Unfortunately, the document does not contain a systematic
>security analysis of the problem. The Security Considerations
>section consists of two brief paragraphs. These paragraphs refer
>to other sections in the document where security requirements
>are listed and to RFC 4665, which also lists security requirements.
>However, I could not find any methodical threat analysis listing
>the possible threats relevant to the system and stating which
>ones are protected against and which are not.

>Without a thorough threat analysis, I have little confidence
>that the authors have thought carefully about the possible
>threats to the system. I would expect this to lead to large
>gaps in the security requirements and this seems to be borne
>out in practice. For example, there is no discussion of
>threats due to compromise of components within the service
>provider network.

>Even more troublesome, I think that a single node at a customer
>site (presumably untrusted) can mount dangerous attacks.
>For example, a node that joins many multicast groups can
>cause a large amount of state to be maintained in the L2VPN.

Please provide a threat analysis and please work to address or
document the specific security concerns cited.

Section 6.6 provides a list of mechanisms a VPLS solution
SHOULD include.  There is no apparent relationship between the
requirements, and each is listed with a caveat regarding its application
(e.g., "if examined").  The net effect is that list appears to be nearly
empty under some circumstances: if multicast IP addresses are not
used for forwarding, and neither Ethernet multicast control frames
or IP multicast control packets are examined, only the first and last
bullets would apply.

First, are there implicit relationships that should be highlighted to
clarify the
overall effect? For example, if a VPLS solution always examines either
Ethernet
multicast control frames or IP multicast control packets, the net effect
is very
different.  If such relationships exist they should be specifed.

The SHOULD list is followed by several paragraphs with MAY
requirements.  Again, the
net effect is that a VPLS solution might provide none of these
mechanisms.  The security
considerations section needs to elaborate on the consequences of a VPLS
solution
that omits these security mechanisms.
2008-07-25
07 Mark Townsley


-------- Original Message --------
Subject: Moving draft-ietf-pwe3-tdm-mib-10.txt (Proposed Standard) forward
Date: Fri, 25 Jul 2008 11:48:24 +0200
From: Mark Townsley
To: draft-ietf-pwe3-tdm-mib@tools.ietf.org, "pwe3-chairs@tools.ietf.org …


-------- Original Message --------
Subject: Moving draft-ietf-pwe3-tdm-mib-10.txt (Proposed Standard) forward
Date: Fri, 25 Jul 2008 11:48:24 +0200
From: Mark Townsley
To: draft-ietf-pwe3-tdm-mib@tools.ietf.org, "pwe3-chairs@tools.ietf.org" , Dan Romascanu , Ron Bonica , Pasi Eronen , Tim Polk




This is part of a general review of documents on my plate in the IESG in
advance of the Dublin meeting.  I am giving advice here on how to move
forward based on the current read of the tracker. See DISCUSS and
COMMENT actions cc'd from the tracker below.

Authors, it seems pretty clear to me that the security considerations
section needs a rewrite, for style as well as specific errors below.

I'm moving the document to Revised ID needed as I believe that it will
need a new version in order to be approved. Lead editors, please work
individually with discuss holders to better understand their positions,
so that the next version can be approved.



Ron Bonica:
Comment:
[2008-07-02] support Dan's discuss

Pasi Eronen:
Comment:
[2008-07-01] Editorial suggestions from Scott Kelly's SecDir review:
- I would suggest adding a sentence to the introduction which
articulates the background the reader is assumed to have, for
example, what RFCs they are expected to be conversant with,
in order to understand the content of this document.
- TDM should be expanded with first use

Tim Polk:
Comment:
[2008-07-01] As noted in Scott Kelly's secdir review and Dan's
preliminary discuss, the replacement of
parentheses with double quotes is somewhat confusing.  Since Dan is
already holding a discuss,
I am balloting NoObj but would like to note that I support Dan's position.

Dan Romascanu:
Discuss:
[2008-07-02] 1. The Security Considerations section is departing from
the text at http://www.ops.ietf.org/mib-security.html, by replacing in a
few places brackets by double quotes. These changes which are
non-conformant with RFC4181 are making the texts confusing, which was
also remarked in the Security Review. I suggest to stick to the
guidelines and to use the standard text.

2.
pwTDMCfgEntry  OBJECT-TYPE
  SYNTAX            PwTDMCfgEntry
  MAX-ACCESS        not-accessible
  STATUS            current
  DESCRIPTION
      "These parameters define the characteristics of a
        TDM PW. They are grouped here to ease NMS burden.
        Once an entry is created here it may be re-used
        by many PWs.
        Unless otherwise specified, all objects in this table
        MUST NOT be changed after row activation (see [PWMIB])
        if the row index is in use by an entry in pwTDMTable.
        Rows must persist after reboot."


The last sentence contradicts the fact that this table has a StorageType
object.
2008-07-25
07 Mark Townsley [Note]: '2 issues mostly covered, remaining security threat analysis issue taking more time.' added by Mark Townsley
2008-07-25
07 Mark Townsley State Changes to IESG Evaluation::Revised ID Needed from IESG Evaluation::AD Followup by Mark Townsley
2008-06-10
07 Mark Townsley [Note]: 'pinged Ron, asked l2vpn chairs for meeting to clear this up.' added by Mark Townsley
2008-03-11
07 Tim Polk
[Ballot discuss]
[This is a revised discuss, integrating Sam Hartman's issues and my own into a single
discuss to support AD transition.]

This discuss elaborates …
[Ballot discuss]
[This is a revised discuss, integrating Sam Hartman's issues and my own into a single
discuss to support AD transition.]

This discuss elaborates on issues raised in Steve Hanna's security directorate review; that
review also needs to be examined in its entirety.

The following issue from the secdir review is blocking:
>Unfortunately, the document does not contain a systematic
>security analysis of the problem. The Security Considerations
>section consists of two brief paragraphs. These paragraphs refer
>to other sections in the document where security requirements
>are listed and to RFC 4665, which also lists security requirements.
>However, I could not find any methodical threat analysis listing
>the possible threats relevant to the system and stating which
>ones are protected against and which are not.

>Without a thorough threat analysis, I have little confidence
>that the authors have thought carefully about the possible
>threats to the system. I would expect this to lead to large
>gaps in the security requirements and this seems to be borne
>out in practice. For example, there is no discussion of
>threats due to compromise of components within the service
>provider network.

>Even more troublesome, I think that a single node at a customer
>site (presumably untrusted) can mount dangerous attacks.
>For example, a node that joins many multicast groups can
>cause a large amount of state to be maintained in the L2VPN.

Please provide a threat analysis and please work to address or
document the specific security concerns cited.

Section 6.6 provides a list of mechanisms a VPLS solution
SHOULD include.  There is no apparent relationship between the
requirements, and each is listed with a caveat regarding its application
(e.g., "if examined").  The net effect is that list appears to be nearly
empty under some circumstances: if multicast IP addresses are not
used for forwarding, and neither Ethernet multicast control frames
or IP multicast control packets are examined, only the first and last
bullets would apply.

First, are there implicit relationships that should be highlighted to clarify the
overall effect? For example, if a VPLS solution always examines either Ethernet
multicast control frames or IP multicast control packets, the net effect is very
different.  If such relationships exist they should be specifed.

The SHOULD list is followed by several paragraphs with MAY requirements.  Again, the
net effect is that a VPLS solution might provide none of these mechanisms.  The security
considerations section needs to elaborate on the consequences of a VPLS solution
that omits these security mechanisms.
2008-03-11
07 Tim Polk
[Ballot discuss]
[This is a revised discuss, integrating Sam Hartman's issues and my own into a single
discuss to support AD transition.]

This discuss elaborates …
[Ballot discuss]
[This is a revised discuss, integrating Sam Hartman's issues and my own into a single
discuss to support AD transition.]

This discuss elaborates on issues raised in Steve Hanna's security directorate review; that
review also needs to be examined in its entirety.

The following issue from the secdir review is blocking:
>Unfortunately, the document does not contain a systematic
>security analysis of the problem. The Security Considerations
>section consists of two brief paragraphs. These paragraphs refer
>to other sections in the document where security requirements
>are listed and to RFC 4665, which also lists security requirements.
>However, I could not find any methodical threat analysis listing
>the possible threats relevant to the system and stating which
>ones are protected against and which are not.

>Without a thorough threat analysis, I have little confidence
>that the authors have thought carefully about the possible
>threats to the system. I would expect this to lead to large
>gaps in the security requirements and this seems to be borne
>out in practice. For example, there is no discussion of
>threats due to compromise of components within the service
>provider network.

>Even more troublesome, I think that a single node at a customer
>site (presumably untrusted) can mount dangerous attacks.
>For example, a node that joins many multicast groups can
>cause a large amount of state to be maintained in the L2VPN.

Please provide a threat analysis and please work to address or
document the specific security concerns cited.

Section 6.6 provides a list of mechanisms a VPLS solution
SHOULD include.  There is no apparent relationship between the
requirements, and each is listed with a caveat regarding its application
(e.g., "if examined").  The net effect is that list appears to be nearly
empty under some circumstances: if multicast IP addresses are not
used for forwarding, and neither Ethernet multicast control frames
or IP multicast control packets are examined, only the first and last
bullets would apply.

First, are there implicit relationships that should be highlighted to clarify the overall effect? For
example, if a VPLS solution always examines either Ethernet multicast control frames or IP
multicast control packets, the net effect is very different.  If such relationships exist they
should be specifed.

The SHOULD list is followed by several paragraphs with MAY requirements.  Again, the net effect is that a VPLS solution might provide none of these mechanisms.  The security considerations section needs to elaborate on the consequences of a VPLS solution that omits
these security mechanisms.
2007-12-20
07 Amy Vezza State Changes to IESG Evaluation::AD Followup from Waiting for Writeup by Amy Vezza
2007-12-20
07 Ross Callon [Ballot Position Update] New position, No Objection, has been recorded by Ross Callon
2007-12-20
07 Ron Bonica
[Ballot comment]
You say "

"Furthermore, in some cases, IP service providers might expect
operational simplicity of VPLS.  That is, they avoid direct and
detailed …
[Ballot comment]
You say "

"Furthermore, in some cases, IP service providers might expect
operational simplicity of VPLS.  That is, they avoid direct and
detailed knowledge of IP routing.  In this case, the multicast
delivery mechanism is expected to have not only efficiency but
also simplicity.  Generally speaking, there is a trade-off between
efficiency and simplicity in terms of bandwidth usage and state
maintenance, so the optimum trade-off will vary depending on the
requirements of each IP service provider."

The argument about "operational simplicity of VPLS" relative to layer 3
service is difficult to support, as instead of "direct and detailed
knowledge of IP routting", one has to deal with direct and detailed
knowledge of MAC addresses (including MAC address learning), and
layer 2.

Consider removing the entire paragraph


Also, you say:

  "A solution SHOULD honor customer multicast domains."


Perhaps replace with "A solution SHOULD NOT alter customer multicast domains' boundaries", as it is not clear what "honor .. multicast domains"
really means. Otherwise, clarify what "honor" means.

Also, you say:

"Multicast forwarding restoration time MUST NOT be greater than the
restoration time of a customer's Layer-3 multicast protocols.  For
example, if a customer uses PIM with default configuration, hello
hold timer is 105 seconds, and solutions are required to detect a
failure no later than this period."

The above mixes *restoration* time at layer 3 with *detection* time
at the VPLS infrastructure. Does not seems to be correct.


Also, you say:

Therefore, in addition to the L2VPN discovery requirements in
[RFC4665], a multicast VPLS solution SHOULD provide a method that
dynamically allows multicast membership information to be discovered
by PEs.  Such membership information is, for example, a set of
multicast addresses.  What information is provided dynamically is
solution specific."


This paragraph mixes several issues that should probably be unbundled.
First of all, unless a solution supports (A), as defined in 3.2,
there is little point in PEs' dynamically discovering multicast
membership info. So, "SHOULD" be conditioned on supporting (A).

Second in one scenario a PE discovers multicast membership info
from only the sites connected to that PE, while in another scenario
in addition to the previous scenario the PE discovers multicast
membership info from other PEs as well. The spec needs to spell
out what exactly it means by "dynamically allow multicast
membership information to be discovered by PEs".
2007-12-20
07 Ron Bonica [Ballot discuss]
Maybe I missed it, but the document doesn't seem to address MAC learning.
2007-12-20
07 Ron Bonica [Ballot Position Update] Position for Ron Bonica has been changed to Discuss from No Objection by Ron Bonica
2007-12-20
07 Tim Polk
[Ballot discuss]
This discuss elaborates on issues raised in Steve Hanna's security directorate review; that
review also needs to be examined in its entirety.

Section …
[Ballot discuss]
This discuss elaborates on issues raised in Steve Hanna's security directorate review; that
review also needs to be examined in its entirety.

Section 6.6 provides a list of mechanisms a VPLS solution SHOULD include.  There is no apparent
relationship between the requirements, and each is listed with a caveat regarding its application
(e.g., "if examined").  The net effect is that list appears to be nearly empty under some
circumstances: if multicast IP addresses are not used for forwarding, and neither Ethernet
multicast control frames or IP multicast control packets are examined, only the first and last bullets would apply.

First, are there implicit relationships that should be highlighted to clarify the overall effect?  For
example, if a VPLS solution always examines either Ethernet multicast control frames or IP
multicast control packets, the net effect is very different.  If such relationships exist they
should be specifed.

The SHOULD list is followed by several paragraphs with MAY requirements.  Again, the net effect is that a VPLS solution might provide none of these mechanisms.  The security considerations section needs to elaborate on the consequences of a VPLS solution that omits
these security mechanisms.
2007-12-20
07 Tim Polk
[Ballot discuss]
This discuss elaborates on issues raised in Steve Hanna's security directorate review; that
review also needs to be examined in its entirety.

Section …
[Ballot discuss]
This discuss elaborates on issues raised in Steve Hanna's security directorate review; that
review also needs to be examined in its entirety.

Section 6.6 provides a list of mechanisms a VPLS solution SHOULD include.  There is no apparent
relationship between the requirements, and each is listed with a caveat regarding its application
(e.g., "if examined").  The net effect is that list appears to be nearly empty under some
circumstances: if multicast IP addresses are not used for forwarding, and neither Ethernet
multicast control frames or IP multicast control packets are examined, only the first and last bullets would apply.

First, are there implicit relationships that should be highlighted to clarify the overall effect?  For
example, if a VPLS solution always examines either Ethernet multicast control frames or IP
multicast control packets, the net effect is very different.  If such relationships exist they
should be specifed.

The SHOULD list is followed by several paragraphs with MAY requirements.  The consequences
of these
2007-12-20
07 Tim Polk [Ballot Position Update] New position, Discuss, has been recorded by Tim Polk
2007-12-20
07 Russ Housley
[Ballot discuss]
The Gen-ART Review by Christian Vogt has received no response.
  It can be found at:

    http://www.alvestrand.no/ietf/gen/reviews/
    draft-ietf-l2vpn-vpls-mcast-reqts-05-vogt.txt

  …
[Ballot discuss]
The Gen-ART Review by Christian Vogt has received no response.
  It can be found at:

    http://www.alvestrand.no/ietf/gen/reviews/
    draft-ietf-l2vpn-vpls-mcast-reqts-05-vogt.txt

  I am especially interested in a response to Christian's third comment.
2007-12-20
07 Russ Housley [Ballot Position Update] New position, Discuss, has been recorded by Russ Housley
2007-12-20
07 Jari Arkko [Ballot Position Update] New position, No Objection, has been recorded by Jari Arkko
2007-12-20
07 Chris Newman [Ballot Position Update] New position, No Objection, has been recorded by Chris Newman
2007-12-19
07 David Ward [Ballot Position Update] New position, No Objection, has been recorded by David Ward
2007-12-19
07 Ron Bonica [Ballot Position Update] New position, No Objection, has been recorded by Ron Bonica
2007-12-19
07 Sam Hartman
[Ballot discuss]
The security directorate review from Stephen Hanna has received no response.
Please respond.
I consider the following blocking:
>Unfortunately, the document does not …
[Ballot discuss]
The security directorate review from Stephen Hanna has received no response.
Please respond.
I consider the following blocking:
>Unfortunately, the document does not contain a systematic
>security analysis of the problem. The Security Considerations
>section consists of two brief paragraphs. These paragraphs refer
>to other sections in the document where security requirements
>are listed and to RFC 4665, which also lists security requirements.
>However, I could not find any methodical threat analysis listing
>the possible threats relevant to the system and stating which
>ones are protected against and which are not.

>Without a thorough threat analysis, I have little confidence
>that the authors have thought carefully about the possible
>threats to the system. I would expect this to lead to large
>gaps in the security requirements and this seems to be borne
>out in practice. For example, there is no discussion of
>threats due to compromise of components within the service
>provider network.

>Even more troublesome, I think that a single node at a customer
>site (presumably untrusted) can mount dangerous attacks.
>For example, a node that joins many multicast groups can
>cause a large amount of state to be maintained in the L2VPN.



Please provide a threat analysis and please work to address or
document the specific security concerns cited.
2007-12-19
07 Sam Hartman [Ballot Position Update] New position, Discuss, has been recorded by Sam Hartman
2007-12-18
07 Lars Eggert [Ballot Position Update] New position, No Objection, has been recorded by Lars Eggert
2007-12-03
07 Mark Townsley Placed on agenda for telechat - 2007-12-13 by Mark Townsley
2007-12-03
07 Mark Townsley [Ballot Position Update] New position, Yes, has been recorded for Mark Townsley
2007-12-03
07 Mark Townsley Ballot has been issued by Mark Townsley
2007-12-03
07 Mark Townsley Created "Approve" ballot
2007-11-14
07 Sam Weiler Request for Last Call review by SECDIR Completed. Reviewer: Steve Hanna.
2007-11-09
07 (System) State has been changed to Waiting for Writeup from In Last Call by system
2007-11-07
07 Amanda Baber IANA Last Call comments:

As described in the IANA Considerations section, we understand this document
to have NO IANA Actions.
2007-10-26
07 Sam Weiler Request for Last Call review by SECDIR is assigned to Steve Hanna
2007-10-26
07 Sam Weiler Request for Last Call review by SECDIR is assigned to Steve Hanna
2007-10-26
07 Amy Vezza Last call sent
2007-10-26
07 Amy Vezza State Changes to In Last Call from Last Call Requested by Amy Vezza
2007-10-25
07 Mark Townsley Last Call was requested by Mark Townsley
2007-10-25
07 Mark Townsley Last Call was requested by Mark Townsley
2007-10-25
07 Mark Townsley State Changes to Last Call Requested from Publication Requested by Mark Townsley
2007-10-25
07 (System) Ballot writeup text was added
2007-10-25
07 (System) Last call text was added
2007-10-25
07 (System) Ballot approval text was added
2007-09-13
07 Dinara Suleymanova
PROTO Write-up

(1.a) Who is the Document Shepherd for this document? Has the
Document Shepherd personally reviewed this version of the
document and, in particular, …
PROTO Write-up

(1.a) Who is the Document Shepherd for this document? Has the
Document Shepherd personally reviewed this version of the
document and, in particular, does he or she believe this
version is ready for forwarding to the IESG for publication?

Shane Amante (shane@castlepoint.net) is the Document Shepherd. I have reviewed the document and it is ready for publication.


(1.b) Has the document had adequate review both from key WG members
and from key non-WG members? Does the Document Shepherd have
any concerns about the depth or breadth of the reviews that
have been performed?

The document has been reviewed by the WG, during the WG Last Call, and through IETF L2VPN WG meetings. There were some comments received during WG Last Call with respect to allowing: proxying certain multicast control protocols, circumstances under which frame reordering cannot be prevented (when switching over from one tree to another) and allowing multicast service activation at a customer IP address level (in addition to a MAC address level). All of these comments have been addressed satisfactorily by the authors in the current, published version of this document.

I have no concerns about the state of readiness of this document.


(1.c) Does the Document Shepherd have concerns that the document
needs more review from a particular or broader perspective,
e.g., security, operational complexity, someone familiar with
AAA, internationalization, or XML?

Several Service Providers and Vendors have contributed to and reviewed the requirements contained in this document. I have no concerns about this document, and believe it does not require further reviews from a broader perspective.


(1.d) Does the Document Shepherd have any specific concerns or
issues with this document that the Responsible Area Director
and/or the IESG should be aware of? For example, perhaps he
or she is uncomfortable with certain parts of the document, or
has concerns whether there really is a need for it. In any
event, if the WG has discussed those issues and has indicated
that it still wishes to advance the document, detail those
concerns here. Has an IPR disclosure related to this document
been filed? If so, please include a reference to the
disclosure and summarize the WG discussion and conclusion on
this issue.

I have no specific concerns about this document, nor are there any concerns that should be conveyed to the IESG or the Responsible AD.


(1.e) How solid is the WG consensus behind this document? Does it
represent the strong concurrence of a few individuals, with
others being silent, or does the WG as a whole understand and
agree with it?

This document is well understood and has broad support by the L2VPN WG. This document is widely recognized by the WG as a valuable contribution intended to shape L2VPN WG mutlicast solutions.


(1.f) Has anyone threatened an appeal or otherwise indicated extreme
discontent? If so, please summarize the areas of conflict in
separate email messages to the Responsible Area Director. (It
should be in a separate email because this questionnaire is
entered into the ID Tracker.)

No one has indicated to the WG Chairs or to the WG Mailing List any intention to appeal the publication of this document.


(1.g) Has the Document Shepherd personally verified that the
document satisfies all ID nits? (See
http://www.ietf.org/ID-Checklist.html and
http://tools.ietf.org/tools/idnits/.) Boilerplate checks are
not enough; this check needs to be thorough. Has the document
met all formal review criteria it needs to, such as the MIB
Doctor, media type, and URI type reviews? If the document
does not already indicate its intended status at the top of
the first page, please indicate the intended status here.

Yes. There are two outdated references and one obsolete reference in the current version (-04) of the document. The authors will correct these references during the Author Review period, given by the RFC-Editor.


(1.h) Has the document split its references into normative and
informative?

Yes.

Are there normative references to documents that
are not ready for advancement or are otherwise in an unclear
state? If such normative references exist, what is the
strategy for their completion? Are there normative references
that are downward references, as described in [RFC3967]? If
so, list these downward references to support the Area
Director in the Last Call procedure for them [RFC3967].

No.


(1.i) Has the Document Shepherd verified that the document's IANA
Considerations section exists and is consistent with the body
of the document?

Yes. There are no IANA Considerations for this document, which is reasonable given its intended purpose.


If the document specifies protocol
extensions, are reservations requested in appropriate IANA
registries? Are the IANA registries clearly identified? If
the document creates a new registry, does it define the
proposed initial contents of the registry and an allocation
procedure for future registrations? Does it suggest a
reasonable name for the new registry? See [RFC2434]. If the
document describes an Expert Review process, has the Document
Shepherd conferred with the Responsible Area Director so that
the IESG can appoint the needed Expert during IESG Evaluation?

(1.j) Has the Document Shepherd verified that sections of the
document that are written in a formal language, such as XML
code, BNF rules, MIB definitions, etc., validate correctly in
an automated checker?

Yes.


(1.k) The IESG approval announcement includes a Document
Announcement Write-Up. Please provide such a Document
Announcement Write-Up. Recent examples can be found in the
"Action" announcements for approved documents. The approval
announcement contains the following sections:

Technical Summary
This document provides functional requirements for network solutions
that support multicast over Virtual Private LAN Service (VPLS). It
specifies requirements both from the end user and service provider
standpoints. It is intended that potential solutions will use these
requirements as guidelines.


Working Group Summary
This document has been reviewed by carriers and experts in the L2VPN WG and there are no outstanding issues.


Document Quality
This memo is straightforward and well written. No issues are anticipated.


Personnel
Who is the Document Shepherd for this document?
Shane Amante (shane@castlepoint.net)

Who is the Responsible Area Director?
Mark Townsley (townsley@cisco.com)
2007-09-13
07 Dinara Suleymanova Draft Added by Dinara Suleymanova in state Publication Requested
2007-09-12
05 (System) New version available: draft-ietf-l2vpn-vpls-mcast-reqts-05.txt
2007-03-06
04 (System) New version available: draft-ietf-l2vpn-vpls-mcast-reqts-04.txt
2006-10-17
03 (System) New version available: draft-ietf-l2vpn-vpls-mcast-reqts-03.txt
2006-06-26
02 (System) New version available: draft-ietf-l2vpn-vpls-mcast-reqts-02.txt
2006-03-07
01 (System) New version available: draft-ietf-l2vpn-vpls-mcast-reqts-01.txt
2005-10-20
00 (System) New version available: draft-ietf-l2vpn-vpls-mcast-reqts-00.txt