Refresh-interval Independent FRR Facility Protection
draft-ietf-mpls-ri-rsvp-frr-22
Revision differences
Document history
Date | Rev. | By | Action |
---|---|---|---|
2024-08-22
|
22 | (System) | IANA Action state changed to RFC-Ed-Ack from Waiting on RFC Editor |
2024-08-22
|
22 | (System) | IANA Action state changed to Waiting on RFC Editor from In Progress |
2024-08-22
|
22 | (System) | IANA Action state changed to In Progress from Waiting on Authors |
2024-08-21
|
22 | (System) | IANA Action state changed to Waiting on Authors from In Progress |
2024-08-19
|
22 | (System) | IANA Action state changed to In Progress from Waiting on Authors |
2024-08-16
|
22 | (System) | IANA Action state changed to Waiting on Authors from In Progress |
2024-08-13
|
22 | (System) | RFC Editor state changed to EDIT |
2024-08-13
|
22 | (System) | IESG state changed to RFC Ed Queue from Approved-announcement sent |
2024-08-13
|
22 | (System) | Announcement was received by RFC Editor |
2024-08-13
|
22 | (System) | IANA Action state changed to In Progress |
2024-08-13
|
22 | Jenny Bui | IESG state changed to Approved-announcement sent from Approved-announcement to be sent |
2024-08-13
|
22 | Jenny Bui | IESG has approved the document |
2024-08-13
|
22 | Jenny Bui | Closed "Approve" ballot |
2024-08-13
|
22 | Jenny Bui | Ballot approval text was generated |
2024-08-13
|
22 | (System) | Removed all action holders (IESG state changed) |
2024-08-13
|
22 | Jim Guichard | IESG state changed to Approved-announcement to be sent from IESG Evaluation::AD Followup |
2024-08-13
|
22 | (System) | Changed action holders to Jim Guichard (IESG state changed) |
2024-08-13
|
22 | (System) | Sub state has been changed to AD Followup from Revised I-D Needed |
2024-08-13
|
22 | Chandrasekar R | New version available: draft-ietf-mpls-ri-rsvp-frr-22.txt |
2024-08-13
|
22 | (System) | New version approved |
2024-08-13
|
22 | (System) | Request for posting confirmation emailed to previous authors: Chandrasekar R , Dante Pacella , Ina Minei , Tarek Saad |
2024-08-13
|
22 | Chandrasekar R | Uploaded new revision |
2024-07-15
|
21 | Carlos Pignataro | Request for Early review by OPSDIR is assigned to Nagendra Nainar |
2024-07-15
|
21 | Carlos Pignataro | Assignment of request for Early review by OPSDIR to Joe Clarke was withdrawn |
2024-07-05
|
21 | (System) | Changed action holders to Ina Minei, Chandrasekar R, Tarek Saad, Dante Pacella (IESG state changed) |
2024-07-05
|
21 | Jim Guichard | IESG state changed to IESG Evaluation::Revised I-D Needed from IESG Evaluation::AD Followup |
2024-06-27
|
21 | John Scudder | [Ballot comment] Thanks for your reply to my DISCUSS position. My remaining comments are captured in my reply to the DISCUSS thread, at https://mailarchive.ietf.org/arch/msg/mpls/Rq-FM8gtjky3rEbYB_EPs7AjTWo/ |
2024-06-27
|
21 | John Scudder | [Ballot Position Update] Position for John Scudder has been changed to No Objection from Discuss |
2024-06-26
|
21 | (System) | Changed action holders to Jim Guichard (IESG state changed) |
2024-06-26
|
21 | (System) | Sub state has been changed to AD Followup from Revised I-D Needed |
2024-06-26
|
21 | Chandrasekar R | New version available: draft-ietf-mpls-ri-rsvp-frr-21.txt |
2024-06-26
|
21 | (System) | New version approved |
2024-06-26
|
21 | (System) | Request for posting confirmation emailed to previous authors: Chandrasekar R , Dante Pacella , Ina Minei , Tarek Saad |
2024-06-26
|
21 | Chandrasekar R | Uploaded new revision |
2024-06-18
|
20 | (System) | Changed action holders to Chandrasekar R, Tarek Saad, Ina Minei, Dante Pacella (IESG state changed) |
2024-06-18
|
20 | Jim Guichard | IESG state changed to IESG Evaluation::Revised I-D Needed from IESG Evaluation::AD Followup |
2024-06-12
|
20 | Roman Danyliw | [Ballot comment] Thanks to Reese Enghardt for the GENART review. Thank you for addressing my DISCUSS and COMMENT feedback. |
2024-06-12
|
20 | Roman Danyliw | [Ballot Position Update] Position for Roman Danyliw has been changed to No Objection from Discuss |
2024-06-12
|
20 | Chandrasekar R | New version available: draft-ietf-mpls-ri-rsvp-frr-20.txt |
2024-06-12
|
20 | (System) | New version approved |
2024-06-12
|
20 | (System) | Request for posting confirmation emailed to previous authors: Chandrasekar R , Dante Pacella , Ina Minei , Tarek Saad |
2024-06-12
|
20 | Chandrasekar R | Uploaded new revision |
2024-06-03
|
19 | (System) | Changed action holders to Jim Guichard (IESG state changed) |
2024-06-03
|
19 | (System) | Sub state has been changed to AD Followup from Revised I-D Needed |
2024-06-03
|
19 | (System) | IANA Review state changed to Version Changed - Review Needed from IANA OK - Actions Needed |
2024-06-03
|
19 | Chandrasekar R | New version available: draft-ietf-mpls-ri-rsvp-frr-19.txt |
2024-06-03
|
19 | (System) | New version approved |
2024-06-03
|
19 | (System) | Request for posting confirmation emailed to previous authors: Chandrasekar R , Dante Pacella , Ina Minei , Tarek Saad |
2024-06-03
|
19 | Chandrasekar R | Uploaded new revision |
2024-05-30
|
18 | (System) | Changed action holders to Chandrasekar R, Tarek Saad, Ina Minei, Dante Pacella (IESG state changed) |
2024-05-30
|
18 | Jenny Bui | IESG state changed to IESG Evaluation::Revised I-D Needed from IESG Evaluation |
2024-05-29
|
18 | Murray Kucherawy | [Ballot Position Update] New position, No Objection, has been recorded for Murray Kucherawy |
2024-05-29
|
18 | Erik Kline | [Ballot Position Update] New position, No Objection, has been recorded for Erik Kline |
2024-05-29
|
18 | Amanda Baber | IANA Review state changed to IANA OK - Actions Needed from Version Changed - Review Needed |
2024-05-29
|
18 | Warren Kumari | [Ballot comment] Thank you very for writing this document - it solves an important operational issue in a clean and elegant manner. I don't have … [Ballot comment] Thank you very for writing this document - it solves an important operational issue in a clean and elegant manner. I don't have anything to add, other than supporting John Scudder's DISCUSS and also thanking him for such a comprehensive review... |
2024-05-29
|
18 | Warren Kumari | [Ballot Position Update] New position, No Objection, has been recorded for Warren Kumari |
2024-05-29
|
18 | Zaheduzzaman Sarker | [Ballot comment] Thanks for working on this specification. I have no issues here from transport protocol point of view. |
2024-05-29
|
18 | Zaheduzzaman Sarker | [Ballot Position Update] New position, No Objection, has been recorded for Zaheduzzaman Sarker |
2024-05-29
|
18 | Jim Guichard | Writeup for draft-ietf-mpls-ri-rsvp-frr-04.txt (1) What type of RFC is being requested (BCP, Proposed Standard, Internet Standard, Informational, Experimental, or Historic)? Why is this the proper … Writeup for draft-ietf-mpls-ri-rsvp-frr-04.txt (1) What type of RFC is being requested (BCP, Proposed Standard, Internet Standard, Informational, Experimental, or Historic)? Why is this the proper type of RFC? Is this type of RFC indicated in the title page header? Proposed Standard - Standards Track indicated on the title page. The specification should be on the Standards Track since it specifies new protocol, protocol procedures and assigns new code points from an IANA registry that require Standards Action. (2) The IESG approval announcement includes a Document Announcement Write-Up. Please provide such a Document Announcement Write-Up. Recent examples can be found in the "Action" announcements for approved documents. The approval announcement contains the following sections: Technical Summary Fast Reroute for RSVP-TE defines two different methods for local repair to reroute LSP traffic over a backup tunnel. The document defines a extension which enhances the facility backup and makes it independent from the refresh-interval. Working Group Summary This is an update to RFC4090. Document Quality The document went through several reviews and updates based on the feedback. There were some concerns on adding complexity to RSVP-TE as protocol which were addressed during the discussion on the WG Mailing List. Personnel Nicolai Leymann is the Document Shepherd. James Guichard is the Responsible Area Director. (3) Briefly describe the review of this document that was performed by the Document Shepherd. If this version of the document is not ready for publication, please explain why the document is being forwarded to the IESG. The document shepherd has carefully reviewed the specification during WG last call and subsequently checked all diffs. Comments on the mailing list were addressed in the last version. The document shepherd believes that the document is ready for publication. (4) Does the document Shepherd have any concerns about the depth or breadth of the reviews that have been performed? The shepherd has no concerns about the depth and breadth of the reviews performed. (5) Do portions of the document need review from a particular or from broader perspective, e.g., security, operational complexity, AAA, DNS, DHCP, XML, or internationalization? If so, describe the review that took place. The document does not require a specific review. (6) Describe any specific concerns or issues that the Document Shepherd has with this document that the Responsible Area Director and/or the IESG should be aware of? For example, perhaps he or she is uncomfortable with certain parts of the document, or has concerns whether there really is a need for it. In any event, if the WG has discussed those issues and has indicated that it still wishes to advance the document, detail those concerns here. The shepherd does not have any concerns about the document. All comments that were raised during the IESG review have been addressed in the most recent version of the draft. There are no open issues left and the draft is ready for publication. (7) Has each author confirmed that any and all appropriate IPR disclosures required for full conformance with the provisions of BCP 78 and BCP 79 have already been filed. If not, explain why. Yes. (8) Has an IPR disclosure been filed that references this document? If so, summarize any WG discussion and conclusion regarding the IPR disclosures. Yes. There were no specific discussions or conclusions in the WG. (9) How solid is the WG consensus behind this document? Does it represent the strong concurrence of a few individuals, with others being silent, or does the WG as a whole understand and agree with it? There is solid consensus of all people who have reviewed and contributed to the document. (10) Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarize the areas of conflict in separate email messages to the Responsible Area Director. (It should be in a separate email because this questionnaire is publicly available.) No. (11) Identify any ID nits the Document Shepherd has found in this document. (See https://www.ietf.org/tools/idnits/ and the Internet-Drafts Checklist). Boilerplate checks are not enough; this check needs to be thorough. None errors found. Two unused references and one outdated, these nits should be addressed the next time the document is updated e.g. after the RTG Dir review. (12) Describe how the document meets any required formal review criteria, such as the MIB Doctor, media type, and URI type reviews. The document does not define a data model nor does it allocate new media types and URI types. (13) Have all references within this document been identified as either normative or informative? Yes. (14) Are there normative references to documents that are not ready for advancement or are otherwise in an unclear state? If such normative references exist, what is the plan for their completion? All normative refrences are, with one exception, are to existing RFCs. One normative refrence, draft-ietf-mpls-summary-frr-rsvpte-01, is to a MPLS wg draft. This draft is ready to be progressed. The draft is also outdated, and this will be addressed the next time the document is updated e.g. after the RTG Dir review. (15) Are there downward normative references references (see RFC 3967)? If so, list these downward references to support the Area Director in the Last Call procedure. none. (16) Will publication of this document change the status of any existing RFCs? Are those RFCs listed on the title page header, listed in the abstract, and discussed in the introduction? If the RFCs are not listed in the Abstract and Introduction, explain why, and point to the part of the document where the relationship of this document to the other RFCs is discussed. If this information is not in the document, explain why the WG considers it unnecessary. There will be no status change of any other documents when this document is published. (17) Describe the Document Shepherd's review of the IANA considerations section, especially with regard to its consistency with the body of the document. Confirm that all protocol extensions that the document makes are associated with the appropriate reservations in IANA registries. Confirm that any referenced IANA registries have been clearly identified. Confirm that newly created IANA registries include a detailed specification of the initial contents for the registry, that allocations procedures for future registrations are defined, and a reasonable name for the new registry has been suggested (see RFC 5226). The IANA consideration are straight forward and clearly written. Only one code point is requested from an already existing registry. (18) List any new IANA registries that require Expert Review for future allocations. Provide any public guidance that the IESG would find useful in selecting the IANA Experts for these new registries. No new IANA registries are being defined. (19) Describe reviews and automated checks performed by the Document Shepherd to validate sections of the document written in a formal language, such as XML code, BNF rules, MIB definitions, etc. No formal reviews necessary. |
2024-05-28
|
18 | John Scudder | [Ballot discuss] # John Scudder, RTG AD, comments for draft-ietf-mpls-ri-rsvp-frr-18 CC @jgscudder Thanks for this document. It's a dense read for someone like me who … [Ballot discuss] # John Scudder, RTG AD, comments for draft-ietf-mpls-ri-rsvp-frr-18 CC @jgscudder Thanks for this document. It's a dense read for someone like me who is not an expert in RSVP, but it seems important, useful, and carefully done. I appreciate the precise and detailed work. I have one concern I've flagged as a DISCUSS point, which may turn out not to be a big deal if I've just misunderstood some nuance, but in any case, we should talk through it. I also have some other comments I hope might be helpful. ## DISCUSS ### Section 4.1 A node supporting facility backup protection [RFC4090] MUST set the RI-RSVP flag (I bit) that is defined in Section 3.1 of RSVP-TE Scaling Techniques [RFC8370] only if it supports all the extensions specified in the rest of this document. I have several concerns about this. At least some of them probably relate to my limited expertise in the subject area, but maybe I can at least expose some areas where additional explanation might be helpful in the document. First and foremost, as written this sentence doesn't seem like it's achievable in practice. Couldn't there be a legacy router in the field that supports both RFC 4090 and RFC 8370? Wouldn't that router then advertise the I bit, at least in some circumstances? Second, this MUST seems to conflict with a SHOULD in section 4.6.1, which says, An implementation supporting RI-RSVP-FRR extensions SHOULD set the flag "Refresh interval Independent RSVP" or RI-RSVP flag in the CAPABILITY object carried in Hello messages as specified in RSVP-TE Scaling Techniques [RFC8370]. It makes me wonder if the section 4.1 paragraph should be more like this. NEW: A node supporting facility backup protection [RFC4090] MUST NOT set the RI-RSVP flag (I bit) that is defined in Section 3.1 of RSVP-TE Scaling Techniques [RFC8370] unless it supports all the extensions specified in the rest of this document. (Although even though that might be clearer, the first point stands, that it might not be achievable.) Third, moving on to the end of the paragraph, Procedures for backward compatibility (see Section 4.6.2.3 of this document) delves on this in detail. As far as I can tell, despite the title of Section 4.6.2, Subsection 4.6.2.3 isn't a procedure for backward compatibility, it's a warning about the terrible things that can happen if some node in the network is incompatible. Is all of this right? That there could be a legacy node in the network, with no way to detect that it doesn't comply with the present specification, and that terrible things such as 4.6.2.3 describes, could happen as a result? (I see Ketan Talaulikar raised a related concern in his RTGDIR review.) |
2024-05-28
|
18 | John Scudder | [Ballot comment] ## COMMENT ### RTGDIR review Please take a look at Ketan Talaulikar's RTGDIR review that was posted yesterday, (https://mailarchive.ietf.org/arch/msg/rtg-dir/PRZJa7LH9b3J1aRFo3BvYZ3DQUQ/). I won't … [Ballot comment] ## COMMENT ### RTGDIR review Please take a look at Ketan Talaulikar's RTGDIR review that was posted yesterday, (https://mailarchive.ietf.org/arch/msg/rtg-dir/PRZJa7LH9b3J1aRFo3BvYZ3DQUQ/). I won't repeat his points here, other than the one that appeared in my DISCUSS, but please consider all of them. ### Section 4.3.3, use of RFC 2119 keyword in example You have a number of sections that include examples. The examples are very helpful for understanding the specification, thank you! However, you use RFC 2119/BCP 14 keywords in the examples, and I think you shouldn't. Those keywords are reserved for specifying procedures, and an example isn't specifying procedure, it's demonstrating it. I'll call out each example separately but only provide the explanation here. In this section, what I noticed was, 1. When C receives a Conditional PathTear from B, it decides to retain LSP state as it is the NP-MP of the PLR A. C also MUST check whether Phop B had previously signaled availability of node protection. As B had previously signaled NP availability by including B-SFRR-Ready Extended Association object, C MUST remove the B-SFRR-Ready Extended Association object containing Association Source set to B from the Path message and trigger a Path to D. There are various ways this could be rewritten, the absolute easiest would be to simply substitute "must" for "MUST", although it would be cleaner to fully rewrite in terms of actions instead of expectations, as in, NEW: 1. When C receives a Conditional PathTear from B, it decides to retain LSP state as it is the NP-MP of the PLR A. It also checks whether Phop B had previously signaled availability of node protection. As B had previously signaled NP availability by including B-SFRR-Ready Extended Association object, C removes the B-SFRR-Ready Extended Association object containing Association Source set to B from the Path message and triggers a Path to D. ### Section 4.4.3, RFC 2119 keyword misuse As any implementation that does not support Conditional PathTear MUST ignore the new object but process the message as a normal PathTear without generating any error, the Class-Num of the new object MUST be 10bbbbbb where 'b' represents a bit (from Section 3.10 of [RFC2205]). I think the first MUST is unnecessary since you're stating a need, not a requirement. The need is fulfilled as a natural consequence of your choice of code point and the underlying requirement from RFC 2205. The second MUST is also unnecessary, you are not telling the implementer anything, you're just explaining why you chose the type code you did. One possible fix would be to delete the paragraph, but it's probably nicer to the reader if you leave the explanation in place. Perhaps something like, NEW: Any implementation that does not support Conditional PathTear needs to ignore the new object but process the message as a normal PathTear without generating any error. For this reason, the Class-Num of the new object follows the pattern 10bbbbbb where 'b' represents a bit. (The behavior for objects of this type is specified in Section 3.10 of [RFC2205]). ### Section 4.5, clarification of requirement If the ingress wants to tear down the LSP because of a management event while the LSP is being locally repaired at a transit PLR, it would not be desirable to wait till the completion of backup LSP signaling to perform state cleanup. To enable LSP state cleanup when the LSP is being locally repaired, the PLR MUST send a "Remote" PathTear message instructing the MP to delete the PSB and RSB states corresponding to the LSP. The TTL in the "Remote" PathTear message MUST be set to 255. In this paragraph, I am unclear exactly what the sentence "To enable LSP state cleanup when the LSP is being locally repaired, the PLR MUST send a "Remote" PathTear message instructing the MP to delete the PSB and RSB states corresponding to the LSP" is telling me. My best guess is, NEW: If the ingress wants to tear down the LSP because of a management event while the LSP is being locally repaired at a transit PLR, it would not be desirable to wait till the completion of backup LSP signaling to perform state cleanup. In this case, the PLR MUST send a "Remote" PathTear message instructing the MP to delete the PSB and RSB states corresponding to the LSP. The TTL in the "Remote" PathTear message MUST be set to 255. Doing this enables LSP state cleanup when the LSP is being locally repaired, Is that rewrite faithful to what you intended? If so, I suggest using it, or any other rewrite of your choosing that clarifies matters. In particular, my intent in the rewrite is to make it clear that the PLR is unequivocally required to do this, which IMO wasn't clear before. ### Section 4.5.1, clarification of requirement If local repair fails on the PLR after a failure, then this MUST be considered as a case for cleaning up LSP state from the PLR to the Egress. The PLR achieves state cleanup by sending "Remote" PathTear to the MP. The MP MUST delete the states corresponding to the LSP also propagate the PathTear downstream thereby achieving state cleanup from all downstream nodes up to the LSP egress. Note that in the case of link protection, the PathTear MUST be directed to the LP- MP's Node-ID IP address rather than the Nhop interface address. Similar to the previous case, the combination of the RFC 2119 keyword with the casual writing style leaves the intent of the requirement unclear to me. Here's an attempt at a rewrite, in the same spirit. NEW: If local repair fails on the PLR after a failure, the PLR MUST send a "Remote" PathTear to the MP. The purpose of doing this is to clean up LSP state from the PLR to the Egress. Upon receiving the PathTear, the MP will delete the states corresponding to the LSP and also propagate the PathTear downstream thereby achieving state cleanup from all downstream nodes up to the LSP egress. Note that in the case of link protection, the PathTear MUST be directed to the LP- MP's Node-ID IP address rather than the Nhop interface address. Note that I removed the second MUST, on the assumption that you aren't specifying a new requirement for the MP, but stating the natural consequence of a requirement you've already specified elsewhere. Please double-check that I haven't broken something! ### Section 4.5.2, use of RFC 2119 keyword in example As with my 4.3.3 comment. In this case my suggestion is, OLD: RRO of the LSP carried in the Resv will not contain C. When A processes the Resv message with a new RRO not containing C - its former NP-MP, A MUST send a "Remote" PathTear to C. When C receives NEW: RRO of the LSP carried in the Resv will not contain C. When A processes the Resv message with a new RRO not containing C - its former NP-MP, A sends a "Remote" PathTear to C. When C receives ### Section 4.5.3.1, I'm confused If an LSP is preempted on an LP-MP after its Phop or the incoming link has already failed Why "Phop or the incoming link" and not just "incoming link"? It's a link-protecting merge point, so why does it care about the failure of an upstream *node*? Also, this seems as though it conflicts with the title of the subsection, which is "Preemption on LP-MP after Phop Link Failure" and not "... after Phop or Phop Link Failure". Could it be rewritten as follows? If an LSP is preempted on an LP-MP after its Phop link has already failed ### Section 4.5.3.2, I'm still confused but in the other direction If an LSP is preempted on an NP-MP after its Phop link has already failed If it's a node-protecting merge point, shouldn't this one care about the Phop as well as the Phop link? (Also in the title of the subsection.) ### Section 4.5.3.2, use of RFC 2119 keyword in example As with my 4.3.3 comment. In this case my suggestion is, OLD: 3. As the only reason for C having retained state after Phop node failure was that it was an NP-MP, C MUST send a normal PathTear to D and delete its PSB state also. D would also delete the PSB and RSB states on receiving a PathTear from C. NEW: 3. As the only reason for C having retained state after Phop node failure was that it was an NP-MP, C sends a normal PathTear to D and deletes its PSB state also. D would also delete the PSB and RSB states on receiving a PathTear from C. ### Section 4.6, ALL CAPS I probably wouldn't even flag this if I weren't doing a full review already, but DOES NOT support RI-RSVP-FRR extensions. Note that for LSPs Although RFC 2119 doesn't forbid the use of all caps for non-reserved keywords, it's often considered to be inadvisable. I would suggest, NEW: does not support RI-RSVP-FRR extensions. Note that for LSPs ### Section 4.6.1, SHOULD set An implementation supporting RI-RSVP-FRR extensions SHOULD set the flag "Refresh interval Independent RSVP" or RI-RSVP flag in the CAPABILITY object carried in Hello messages as specified in RSVP-TE Scaling Techniques [RFC8370]. Depending on the resolution of my DISCUSS point, I guess you might want to revisit this SHOULD. ### Section 4.6.2.1, use of RFC 2119 keyword in example As with my 4.3.3 comment. In this case my suggestion is, OLD: - A and B MUST reduce the refresh time to the default short refresh interval of 30 seconds and trigger a Path message - If B is not an MP and if Phop link of B fails, B cannot send Conditional PathTear to C but MUST time out the PSB state from A normally. Note that B can time out the PSB state A normally only if A did not set long refresh in the TIME_VALUES object carried in the Path messages sent earlier. NEW: - A and B reduce the refresh time to the default short refresh interval of 30 seconds and trigger a Path message - If B is not an MP and if Phop link of B fails, B cannot send Conditional PathTear to C but times out the PSB state from A normally. Note that B can time out the PSB state A normally only if A did not set long refresh in the TIME_VALUES object carried in the Path messages sent earlier. ## Notes This review is in the ["IETF Comments" Markdown format][ICMF], You can use the [`ietf-comments` tool][ICT] to automatically convert this review into individual GitHub issues. [ICMF]: https://github.com/mnot/ietf-comments/blob/main/format.md [ICT]: https://github.com/mnot/ietf-comments |
2024-05-28
|
18 | John Scudder | [Ballot Position Update] New position, Discuss, has been recorded for John Scudder |
2024-05-28
|
18 | Roman Danyliw | [Ballot discuss] ** Section 5 When using RSVP Cryptographic Authentication [RFC2747], more robust algorithms [RFC2104] [FIPS-180-3] SHOULD be … [Ballot discuss] ** Section 5 When using RSVP Cryptographic Authentication [RFC2747], more robust algorithms [RFC2104] [FIPS-180-3] SHOULD be used when computing the keyed message digest where possible. I don’t intended to open the generic topic of RSVP authentication. However, I need help understanding the proposed guidance on cryptographic authentication. RFC2104 specifies the core HMAC construction and HMAC-MD5 RFC2747 says “HMAC-MD5 is required as a baseline to be universally included in RSVP implementations providing cryptographic authentication, with other proposals optional” FIPS-180-3 = specifies SHA-1, SHA-256, SHA-384, and SHA-512 What exactly is the recommendation on the “more robust algorithms … where possible”? Across all the referenced drafts, HMAC-MD5, -SHA1, -SHA256, -SHA386 and -SHA512 were cited. Is this document intending to recommend MD5 and SHA1 as “robust algorithms”? My recommendation would be that implementations using RSVP Cryptographic Authentication SHOULD use HMAC-256/-386/-512. Based on the RFC2747, HMAC-MD5 remains MTI. |
2024-05-28
|
18 | Roman Danyliw | [Ballot comment] Thanks to Reese Enghardt for the GENART review. Idnits reports: -- The document seems to lack a disclaimer for pre-RFC5378 work, but … [Ballot comment] Thanks to Reese Enghardt for the GENART review. Idnits reports: -- The document seems to lack a disclaimer for pre-RFC5378 work, but may have content which was first submitted before 10 November 2008. If you have contacted all the original authors and they are all willing to grant the BCP78 rights to the IETF Trust, then this is fine, and you can ignore this comment. If not, you may need to add the pre-RFC5378 disclaimer. (See the Legal Provisions document at https://trustee.ietf.org/license-info for more information.) == Unused Reference: 'RFC3936' is defined on line 1166, but no explicit reference was found in the text |
2024-05-28
|
18 | Roman Danyliw | [Ballot Position Update] New position, Discuss, has been recorded for Roman Danyliw |
2024-05-28
|
18 | Paul Wouters | [Ballot Position Update] New position, No Objection, has been recorded for Paul Wouters |
2024-05-27
|
18 | Ketan Talaulikar | Request for Early review by RTGDIR Completed: Has Issues. Reviewer: Ketan Talaulikar. Sent review to list. |
2024-05-27
|
18 | Orie Steele | [Ballot Position Update] New position, No Objection, has been recorded for Orie Steele |
2024-05-26
|
18 | Éric Vyncke | [Ballot comment] # Éric Vyncke, INT AD, comments for draft-ietf-mpls-ri-rsvp-frr-185 Thank you for the work put into this document. Please find below some non-blocking COMMENT … [Ballot comment] # Éric Vyncke, INT AD, comments for draft-ietf-mpls-ri-rsvp-frr-185 Thank you for the work put into this document. Please find below some non-blocking COMMENT points (but replies would be appreciated even if only for my own education). Special thanks to Nicolai Leymann for the shepherd's detailed write-up including the WG consensus and the justification of the intended status. *BUT* is it completely outdated as it contains `Deborah Brungard is the Responsible Area Director`.... I hope that this review helps to improve the document, Regards, -éric # COMMENTS (non-blocking) ## Please fix the ID-NITS RFC 3936 is in the reference but I cannot find a use of this reference in the text... ## Section 4.2.1 Was `RRO` defined before ? ## Section 4.4.3 s/and should be set to eight./and MUST be set to eight./ ? Plus add some text about the receiver procedure when length is different than 8. |
2024-05-26
|
18 | Éric Vyncke | [Ballot Position Update] New position, No Objection, has been recorded for Éric Vyncke |
2024-05-24
|
18 | Deb Cooley | [Ballot comment] 1. FIPS 180 has been up issued in 2015: https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.180-4.pdf . 2. Security Considerations: "When using RSVP Cryptographic Authentication [RFC2747], more … [Ballot comment] 1. FIPS 180 has been up issued in 2015: https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.180-4.pdf . 2. Security Considerations: "When using RSVP Cryptographic Authentication [RFC2747], more robust algorithms [RFC2104] [FIPS-180-3] SHOULD be used when computing the keyed message digest where possible." This sentence is confusing to me. a. It would seem like the 'SHOULD' should be a 'MUST'? RFC2747 uses HMAC-MD5 which is well beyond its end of life, or HMAC-SHA1, which isn't deprecated yet, but NIST has plans to deprecate. b. In addition, the position of the references to RFC 2104 and FIPS 180 in the sentence adds to the confusion - I would suggest moving them to the end of the sentence. 3. general, and only because there is another comment on this: 'let us assume' is commonly used in mathematical proofs. However, I have no idea how common it is in the IETF RFCs, much less routing RFCs. |
2024-05-24
|
18 | Deb Cooley | Ballot comment text updated for Deb Cooley |
2024-05-24
|
18 | Deb Cooley | [Ballot comment] 1. FIPS 180 has been up issued in 2015: https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.180-4.pdf . 2. Security Considerations: "When using RSVP Cryptographic Authentication [RFC2747], more … [Ballot comment] 1. FIPS 180 has been up issued in 2015: https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.180-4.pdf . 2. Security Considerations: "When using RSVP Cryptographic Authentication [RFC2747], more robust algorithms [RFC2104] [FIPS-180-3] SHOULD be used when computing the keyed message digest where possible." This sentence is confusing to me. would seem like the 'SHOULD' should be a 'MUST'? RFC2747 uses HMAC-MD5 which is well beyond its end of life, or HMAC-SHA1, which isn't deprecated yet, but NIST has plans to deprecate. In addition, the position of the references to RFC 2104 and FIPS 180 in the sentence adds to the confusion - I would suggest moving them to the end of the sentence. |
2024-05-24
|
18 | Deb Cooley | [Ballot Position Update] New position, No Objection, has been recorded for Deb Cooley |
2024-05-23
|
18 | Gunter Van de Velde | [Ballot comment] # Gunter Van de Velde, RTG AD, comments for draft-ietf-mpls-ri-rsvp-frr-18 Please find https://www.ietf.org/blog/handling-iesg-ballot-positions/ documenting the handling of ballots. #GENERIC COMMENTS #================ ## This … [Ballot comment] # Gunter Van de Velde, RTG AD, comments for draft-ietf-mpls-ri-rsvp-frr-18 Please find https://www.ietf.org/blog/handling-iesg-ballot-positions/ documenting the handling of ballots. #GENERIC COMMENTS #================ ## This draft is well written and provides a good context and details of the problem space, procedures and technologies. Only few non blocking COMMENTS for consideration. #DETAILED COMMENTS #================= 253 In the topology in Figure 1, let us consider a large number of LSPs 254 from A to D transiting B and C. Assume that refresh interval has 255 been configured to be long of the order of minutes and refresh 256 reduction extensions are enabled on all routers. 258 Also let us assume that node protection has been configured for the 259 LSPs and the LSPs are protected by each router in the following way suggested a small rewrite to make te text sound more procedural and avoids the word 'us': "In the topology depicted in Figure 1, consider a significant number of LSPs (Label Switched Paths) from node A to node D, transiting through nodes B and C. Assume that the refresh interval is set to be relatively long, on the order of minutes, and that refresh reduction extensions are enabled on all routers. Additionally, assume that node protection has been configured for these LSPs. Each router protects the LSPs in the following manner: " 368 However, if a node supporting facility backup 369 protection [RFC4090] does set the RI-RSVP capability (I bit) but does 370 not support all the extensions specified in the rest of this 371 document, then it leaves room for stale state to linger around for an 372 inordinate period of time given the long refresh intervals 373 recommended by [RFC8370] or disruption of normal FRR operation. WHat about following rewrite for this text blob: "However, if a node that supports facility backup protection [RFC4090] sets the RI-RSVP capability (I bit) but does not support all the extensions specified in this document, it may result in lingering stale states due to the long refresh intervals recommended by [RFC8370]. This can also disrupt normal Fast Reroute (FRR) operations. " 1100 All assignments in this sub-registry are to be performed via 1101 Standards Action. Would "IETF Review" not be a better less restrictive fit for the IANA assignment procedure? https://www.rfc-editor.org/rfc/rfc8126.html#section-4 |
2024-05-23
|
18 | Gunter Van de Velde | [Ballot Position Update] New position, Yes, has been recorded for Gunter Van de Velde |
2024-05-21
|
18 | Cindy Morgan | Telechat date has been changed to 2024-05-30 from 2019-12-05 |
2024-05-21
|
18 | Jim Guichard | [Ballot Position Update] New position, Yes, has been recorded for Jim Guichard |
2024-05-21
|
18 | Jim Guichard | Ballot writeup was changed |
2024-05-21
|
18 | Jim Guichard | IESG state changed to IESG Evaluation from Waiting for AD Go-Ahead |
2024-05-21
|
18 | (System) | IANA Review state changed to Version Changed - Review Needed from IANA - Not OK |
2024-05-21
|
18 | Chandrasekar R | New version available: draft-ietf-mpls-ri-rsvp-frr-18.txt |
2024-05-21
|
18 | (System) | New version approved |
2024-05-21
|
18 | (System) | Request for posting confirmation emailed to previous authors: Chandrasekar R , Dante Pacella , Ina Minei , Tarek Saad |
2024-05-21
|
18 | Chandrasekar R | Uploaded new revision |
2024-05-16
|
17 | (System) | IESG state changed to Waiting for AD Go-Ahead from In Last Call |
2024-05-15
|
17 | (System) | IANA Review state changed to IANA - Not OK from Version Changed - Review Needed |
2024-05-15
|
17 | David Dong | (Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs: IANA has completed its review of draft-ietf-mpls-ri-rsvp-frr-17. If any part of this review is inaccurate, please let us know. IANA … (Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs: IANA has completed its review of draft-ietf-mpls-ri-rsvp-frr-17. If any part of this review is inaccurate, please let us know. IANA has a question about the second action requested in the IANA Considerations section of this document. IANA understands that, upon approval of this document, there are two actions which we must complete. First, in the Class Names, Class Numbers, and Class Types registry in the Resource Reservation Protocol (RSVP) Parameters registry group located at: https://www.iana.org/assignments/rsvp-parameters/ a single new registration will be made from the 128-183 range as follows: Class Number: [ TBD-at-Registration ] Class Name: CONDITIONS Reference: [ RFC-to-be ] Second, Section 6.2 of the current draft states: "the allocation of the Merge-point condition bit or M-bit (see Section 4.4 of this document) will also be done by IANA. Flag: 0x1 Name: Merge-point condition bit or M-bit" IANA Question --> Is this to be a new registry or a sub-registry in the Resource Reservation Protocol (RSVP) Parameters registry group located at: https://www.iana.org/assignments/rsvp-parameters/ If not, can the draft be more specific about where this registration should be made. If so, could the draft provide the information needed for the establishment of a new registry or sub-registry? Please see RFC8126 for guidance. We understand that these are the only actions required to be completed upon approval of this document. NOTE: The actions requested in this document will not be completed until the document has been approved for publication as an RFC. This message is meant only to confirm the list of actions that will be performed. For definitions of IANA review states, please see: https://datatracker.ietf.org/help/state/draft/iana-review Thank you, David Dong IANA Services Sr. Specialist |
2024-05-07
|
17 | David Mandelberg | Request for Early review by SECDIR Completed: Ready. Reviewer: David Mandelberg. Sent review to list. Submission of review completed at an earlier date. |
2024-05-07
|
17 | David Mandelberg | Request for Early review by SECDIR Completed: Ready. Reviewer: David Mandelberg. |
2024-05-07
|
17 | Daniam Henriques | Request for Early review by RTGDIR is assigned to Ketan Talaulikar |
2024-05-04
|
17 | Carlos Pignataro | Request for Early review by OPSDIR is assigned to Joe Clarke |
2024-05-04
|
17 | Carlos Pignataro | Assignment of request for Early review by OPSDIR to Tina Tsou was withdrawn |
2024-05-03
|
17 | Tero Kivinen | Request for Early review by SECDIR is assigned to David Mandelberg |
2024-05-03
|
17 | Cindy Morgan | Created "Approve" ballot |
2024-05-03
|
17 | Cindy Morgan | Closed "Approve" ballot |
2024-05-02
|
17 | Jenny Bui | The following Last Call announcement was sent out (ends 2024-05-16): From: The IESG To: IETF-Announce CC: Nicolai Leymann , draft-ietf-mpls-ri-rsvp-frr@ietf.org, james.n.guichard@futurewei.com, mpls-chairs@ietf.org, … The following Last Call announcement was sent out (ends 2024-05-16): From: The IESG To: IETF-Announce CC: Nicolai Leymann , draft-ietf-mpls-ri-rsvp-frr@ietf.org, james.n.guichard@futurewei.com, mpls-chairs@ietf.org, mpls@ietf.org, n.leymann@telekom.de Reply-To: last-call@ietf.org Sender: Subject: Last Call: (Refresh-interval Independent FRR Facility Protection) to Proposed Standard The IESG has received a request from the Multiprotocol Label Switching WG (mpls) to consider the following document: - 'Refresh-interval Independent FRR Facility Protection' as Proposed Standard The IESG plans to make a decision in the next few weeks, and solicits final comments on this action. Please send substantive comments to the last-call@ietf.org mailing lists by 2024-05-16. Exceptionally, comments may be sent to iesg@ietf.org instead. In either case, please retain the beginning of the Subject line to allow automated sorting. Abstract The RSVP-TE Fast Reroute extensions specified in RFC 4090 defines two local repair techniques to reroute Label Switched Path (LSP) traffic over pre-established backup tunnel. Facility backup method allows one or more LSPs traversing a connected link or node to be protected using a bypass tunnel. The many-to-one nature of local repair technique is attractive from scalability point of view. This document enumerates facility backup procedures in RFC 4090 that rely on refresh timeout and hence make facility backup method refresh- interval dependent. The RSVP-TE extensions defined in this document will enhance the facility backup protection mechanism by making the corresponding procedures refresh-interval independent and hence compatible with Refresh-interval Independent RSVP (RI-RSVP) specified in RFC 8370. Hence, this document updates RFC 4090 in order to support RI-RSVP capability specified in RFC 8370. The file can be obtained via https://datatracker.ietf.org/doc/draft-ietf-mpls-ri-rsvp-frr/ The following IPR Declarations may be related to this I-D: https://datatracker.ietf.org/ipr/3672/ https://datatracker.ietf.org/ipr/2580/ https://datatracker.ietf.org/ipr/3671/ |
2024-05-02
|
17 | Jenny Bui | IESG state changed to In Last Call from Last Call Requested |
2024-05-02
|
17 | Jenny Bui | Last call announcement was generated |
2024-05-02
|
17 | Jenny Bui | Last call announcement was generated |
2024-05-02
|
17 | Jenny Bui | Ballot approval text was generated |
2024-05-01
|
17 | Carlos Pignataro | Request for Early review by OPSDIR is assigned to Tina Tsou |
2024-05-01
|
17 | Jim Guichard | Requested Early review by RTGDIR |
2024-05-01
|
17 | Jim Guichard | Requested Early review by OPSDIR |
2024-05-01
|
17 | Jim Guichard | Requested Early review by SECDIR |
2024-05-01
|
17 | Jim Guichard | Last call was requested |
2024-05-01
|
17 | Jim Guichard | IESG state changed to Last Call Requested from AD Evaluation::AD Followup |
2024-05-01
|
17 | (System) | Changed action holders to Jim Guichard (IESG state changed) |
2024-05-01
|
17 | (System) | Sub state has been changed to AD Followup from Revised I-D Needed |
2024-05-01
|
17 | Chandrasekar R | New version available: draft-ietf-mpls-ri-rsvp-frr-17.txt |
2024-05-01
|
17 | Chandrasekar R | New version accepted (logged-in submitter: Chandrasekar R) |
2024-05-01
|
17 | Chandrasekar R | Uploaded new revision |
2024-03-27
|
16 | Jim Guichard | Changed action holders to Chandrasekar R, Tarek Saad, Ina Minei, Dante Pacella |
2024-03-27
|
16 | Jim Guichard | AD review comments === https://mailarchive.ietf.org/arch/msg/mpls/xoPc-KRuGp_i4BRCjtmyzdjSn3Y/ === |
2024-03-27
|
16 | (System) | Changed action holders to Andrew Alston, Chandrasekar R, Tarek Saad, Ina Minei, Dante Pacella (IESG state changed) |
2024-03-27
|
16 | Jim Guichard | IESG state changed to AD Evaluation::Revised I-D Needed from AD Evaluation |
2024-03-20
|
16 | Cindy Morgan | Shepherding AD changed to Jim Guichard |
2024-02-09
|
16 | Carlos Pignataro | Request for Last Call review by RTGDIR Completed: Has Nits. Reviewer: Carlos Pignataro. Sent review to list. |
2024-02-04
|
16 | Daniam Henriques | Request for Last Call review by RTGDIR is assigned to Carlos Pignataro |
2024-02-01
|
16 | Andrew Alston | Requested Last Call review by RTGDIR |
2024-02-01
|
16 | Andrew Alston | IESG state changed to AD Evaluation from Publication Requested |
2023-12-22
|
16 | Chandrasekar R | New version available: draft-ietf-mpls-ri-rsvp-frr-16.txt |
2023-12-22
|
16 | (System) | New version approved |
2023-12-22
|
16 | (System) | Request for posting confirmation emailed to previous authors: Chandrasekar R , Dante Pacella , Ina Minei , Tarek Saad |
2023-12-22
|
16 | Chandrasekar R | Uploaded new revision |
2023-08-22
|
15 | Nicolai Leymann | Writeup for draft-ietf-mpls-ri-rsvp-frr-04.txt (1) What type of RFC is being requested (BCP, Proposed Standard, Internet Standard, Informational, Experimental, or Historic)? Why is this the proper … Writeup for draft-ietf-mpls-ri-rsvp-frr-04.txt (1) What type of RFC is being requested (BCP, Proposed Standard, Internet Standard, Informational, Experimental, or Historic)? Why is this the proper type of RFC? Is this type of RFC indicated in the title page header? Proposed Standard - Standards Track indicated on the title page. The specification should be on the Standards Track since it specifies new protocol, protocol procedures and and assigns new code points from an IANA registry that require Standards Action. (2) The IESG approval announcement includes a Document Announcement Write-Up. Please provide such a Document Announcement Write-Up. Recent examples can be found in the "Action" announcements for approved documents. The approval announcement contains the following sections: Technical Summary Fast Reroute for RSVP-TE defines two different methods for local repair to reroute LSP traffic over a backup tunnel. The document defines a extension which enhances the facility backup and makes it independent from the refesh-interval. Working Group Summary This is an update to RFC4090. Document Quality The document went through several reviews and updates based on the feedback. There were some concerns on adding complexity to RSVP-TE as as protocol which were addressed during the dicussion on the WG Mailing List. An implementation poll has been sent to the working group list and the Shepherd Write-Up will be updated as we receive further information. Personnel Nicolai Leymann is the Document Shepherd. Deborah Brungard is the Responsible Area Director. (3) Briefly describe the review of this document that was performed by the Document Shepherd. If this version of the document is not ready for publication, please explain why the document is being forwarded to the IESG. The document shepherd has carefully reviewed the specification during WG last call and subsequently checked all diffs. Comments on the mailing list were addressed in the last version. The document shepherd believes that the document is ready for publication. (4) Does the document Shepherd have any concerns about the depth or breadth of the reviews that have been performed? The shepherd has no concerns about the depth and breadth of the reviews performed. (5) Do portions of the document need review from a particular or from broader perspective, e.g., security, operational complexity, AAA, DNS, DHCP, XML, or internationalization? If so, describe the review that took place. The document does not require a specific review. (6) Describe any specific concerns or issues that the Document Shepherd has with this document that the Responsible Area Director and/or the IESG should be aware of? For example, perhaps he or she is uncomfortable with certain parts of the document, or has concerns whether there really is a need for it. In any event, if the WG has discussed those issues and has indicated that it still wishes to advance the document, detail those concerns here. The shepherd does not have any concerns about the document. All comments that were raised during the IESG review have been addressed in the most recent version of the draft. There are no open issues left and the draft is ready for publication. (7) Has each author confirmed that any and all appropriate IPR disclosures required for full conformance with the provisions of BCP 78 and BCP 79 have already been filed. If not, explain why. Yes. (8) Has an IPR disclosure been filed that references this document? If so, summarize any WG discussion and conclusion regarding the IPR disclosures. Yes. There were no specific discussions or conclusions in the WG. (9) How solid is the WG consensus behind this document? Does it represent the strong concurrence of a few individuals, with others being silent, or does the WG as a whole understand and agree with it? There is solid consensus of all people who have reviewed and contributed to the document. (10) Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarise the areas of conflict in separate email messages to the Responsible Area Director. (It should be in a separate email because this questionnaire is publicly available.) No. (11) Identify any ID nits the Document Shepherd has found in this document. (See https://www.ietf.org/tools/idnits/ and the Internet-Drafts Checklist). Boilerplate checks are not enough; this check needs to be thorough. None errors found. Two unsused references and one outdated, these nits should be addressed the next time the document is updated e.g. after the RTG Dir review. (12) Describe how the document meets any required formal review criteria, such as the MIB Doctor, media type, and URI type reviews. The document does not define a data model nor does it allocate new media types and URI types. (13) Have all references within this document been identified as either normative or informative? Yes. (14) Are there normative references to documents that are not ready for advancement or are otherwise in an unclear state? If such normative references exist, what is the plan for their completion? All normative refrences are, with one exception, are to existing RFCs. One normative refrence, draft-ietf-mpls-summary-frr-rsvpte-01, is to a MPLS wg draft. This draft is ready to be progressed. The draft is also outdated, and this will be addressed the next time the document is updated e.g. after the RTG Dir review. (15) Are there downward normative references references (see RFC 3967)? If so, list these downward references to support the Area Director in the Last Call procedure. none. (16) Will publication of this document change the status of any existing RFCs? Are those RFCs listed on the title page header, listed in the abstract, and discussed in the introduction? If the RFCs are not listed in the Abstract and Introduction, explain why, and point to the part of the document where the relationship of this document to the other RFCs is discussed. If this information is not in the document, explain why the WG considers it unnecessary. There will be no status change of any other documents when this document is published. (17) Describe the Document Shepherd's review of the IANA considerations section, especially with regard to its consistency with the body of the document. Confirm that all protocol extensions that the document makes are associated with the appropriate reservations in IANA registries. Confirm that any referenced IANA registries have been clearly identified. Confirm that newly created IANA registries include a detailed specification of the initial contents for the registry, that allocations procedures for future registrations are defined, and a reasonable name for the new registry has been suggested (see RFC 5226). The IANA consideration are straight forward and clearly written. Only one code point is requested from an already existing registry. (18) List any new IANA registries that require Expert Review for future allocations. Provide any public guidance that the IESG would find useful in selecting the IANA Experts for these new registries. No new IANA registries are being defined. (19) Describe reviews and automated checks performed by the Document Shepherd to validate sections of the document written in a formal language, such as XML code, BNF rules, MIB definitions, etc. No formal reviews necessary. |
2023-08-22
|
15 | Nicolai Leymann | IETF WG state changed to Submitted to IESG for Publication from WG Document |
2023-08-22
|
15 | Nicolai Leymann | IESG state changed to Publication Requested from AD is watching |
2023-08-22
|
15 | Nicolai Leymann | Writeup for draft-ietf-mpls-ri-rsvp-frr-04.txt (1) What type of RFC is being requested (BCP, Proposed Standard, Internet Standard, Informational, Experimental, or Historic)? Why is this the proper … Writeup for draft-ietf-mpls-ri-rsvp-frr-04.txt (1) What type of RFC is being requested (BCP, Proposed Standard, Internet Standard, Informational, Experimental, or Historic)? Why is this the proper type of RFC? Is this type of RFC indicated in the title page header? Proposed Standard - Standards Track indicated on the title page. The specification should be on the Standards Track since it specifies new protocol, protocol procedures and and assigns new code points from an IANA registry that require Standards Action. (2) The IESG approval announcement includes a Document Announcement Write-Up. Please provide such a Document Announcement Write-Up. Recent examples can be found in the "Action" announcements for approved documents. The approval announcement contains the following sections: Technical Summary Fast Reroute for RSVP-TE defines two different methods for local repair to reroute LSP traffic over a backup tunnel. The document defines a extension which enhances the facility backup and makes it independent from the refesh-interval. Working Group Summary This is an update to RFC4090. Document Quality The document went through several reviews and updates based on the feedback. There were some concerns on adding complexity to RSVP-TE as as protocol which were addressed during the dicussion on the WG Mailing List. An implementation poll has been sent to the working group list and the Shepherd Write-Up will be updated as we receive further information. Personnel Nicolai Leymann is the Document Shepherd. Deborah Brungard is the Responsible Area Director. (3) Briefly describe the review of this document that was performed by the Document Shepherd. If this version of the document is not ready for publication, please explain why the document is being forwarded to the IESG. The document shepherd has carefully reviewed the specification during WG last call and subsequently checked all diffs. Comments on the mailing list were addressed in the last version. The document shepherd believes that the document is ready for publication. (4) Does the document Shepherd have any concerns about the depth or breadth of the reviews that have been performed? The shepherd has no concerns about the depth and breadth of the reviews performed. (5) Do portions of the document need review from a particular or from broader perspective, e.g., security, operational complexity, AAA, DNS, DHCP, XML, or internationalization? If so, describe the review that took place. The document does not require a specific review. (6) Describe any specific concerns or issues that the Document Shepherd has with this document that the Responsible Area Director and/or the IESG should be aware of? For example, perhaps he or she is uncomfortable with certain parts of the document, or has concerns whether there really is a need for it. In any event, if the WG has discussed those issues and has indicated that it still wishes to advance the document, detail those concerns here. The shepherd does not have any concerns about the document. All comments that were raised during the IESG review have been addressed in the most recent version of the draft. There are no open issues left and the draft is ready for publication. (7) Has each author confirmed that any and all appropriate IPR disclosures required for full conformance with the provisions of BCP 78 and BCP 79 have already been filed. If not, explain why. Yes. (8) Has an IPR disclosure been filed that references this document? If so, summarize any WG discussion and conclusion regarding the IPR disclosures. Yes. There were no specific discussions or conclusions in the WG. (9) How solid is the WG consensus behind this document? Does it represent the strong concurrence of a few individuals, with others being silent, or does the WG as a whole understand and agree with it? There is solid consensus of all people who have reviewed and contributed to the document. (10) Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarise the areas of conflict in separate email messages to the Responsible Area Director. (It should be in a separate email because this questionnaire is publicly available.) No. (11) Identify any ID nits the Document Shepherd has found in this document. (See https://www.ietf.org/tools/idnits/ and the Internet-Drafts Checklist). Boilerplate checks are not enough; this check needs to be thorough. None errors found. Two unsused references and one outdated, these nits should be addressed the next time the document is updated e.g. after the RTG Dir review. (12) Describe how the document meets any required formal review criteria, such as the MIB Doctor, media type, and URI type reviews. The document does not define a data model nor does it allocate new media types and URI types. (13) Have all references within this document been identified as either normative or informative? Yes. (14) Are there normative references to documents that are not ready for advancement or are otherwise in an unclear state? If such normative references exist, what is the plan for their completion? All normative refrences are, with one exception, are to existing RFCs. One normative refrence, draft-ietf-mpls-summary-frr-rsvpte-01, is to a MPLS wg draft. This draft is ready to be progressed. The draft is also outdated, and this will be addressed the next time the document is updated e.g. after the RTG Dir review. (15) Are there downward normative references references (see RFC 3967)? If so, list these downward references to support the Area Director in the Last Call procedure. none. (16) Will publication of this document change the status of any existing RFCs? Are those RFCs listed on the title page header, listed in the abstract, and discussed in the introduction? If the RFCs are not listed in the Abstract and Introduction, explain why, and point to the part of the document where the relationship of this document to the other RFCs is discussed. If this information is not in the document, explain why the WG considers it unnecessary. There will be no status change of any other documents when this document is published. (17) Describe the Document Shepherd's review of the IANA considerations section, especially with regard to its consistency with the body of the document. Confirm that all protocol extensions that the document makes are associated with the appropriate reservations in IANA registries. Confirm that any referenced IANA registries have been clearly identified. Confirm that newly created IANA registries include a detailed specification of the initial contents for the registry, that allocations procedures for future registrations are defined, and a reasonable name for the new registry has been suggested (see RFC 5226). The IANA consideration are straight forward and clearly written. Only one code point is requested from an already existing registry. (18) List any new IANA registries that require Expert Review for future allocations. Provide any public guidance that the IESG would find useful in selecting the IANA Experts for these new registries. No new IANA registries are being defined. (19) Describe reviews and automated checks performed by the Document Shepherd to validate sections of the document written in a formal language, such as XML code, BNF rules, MIB definitions, etc. No formal reviews necessary. |
2023-07-25
|
15 | Nicolai Leymann | Tag Revised I-D Needed - Issue raised by IESG cleared. |
2023-07-06
|
15 | (System) | Changed action holders to Andrew Alston (IESG state changed) |
2023-07-06
|
15 | Cindy Morgan | IESG state changed to AD is watching from Dead |
2023-06-21
|
15 | Chandrasekar R | New version available: draft-ietf-mpls-ri-rsvp-frr-15.txt |
2023-06-21
|
15 | (System) | New version approved |
2023-06-21
|
15 | (System) | Request for posting confirmation emailed to previous authors: Chandrasekar R , Dante Pacella , Ina Minei , Tarek Saad |
2023-06-21
|
15 | Chandrasekar R | Uploaded new revision |
2023-06-21
|
14 | (System) | Document has expired |
2023-06-21
|
14 | (System) | IESG state changed to Dead from AD is watching |
2022-12-18
|
14 | Chandrasekar R | New version available: draft-ietf-mpls-ri-rsvp-frr-14.txt |
2022-12-18
|
14 | (System) | New version approved |
2022-12-18
|
14 | (System) | Request for posting confirmation emailed to previous authors: Chandrasekar R , Dante Pacella , Ina Minei , Tarek Saad , mpls-chairs@ietf.org |
2022-12-18
|
14 | Chandrasekar R | Uploaded new revision |
2022-06-19
|
13 | Chandrasekar R | New version available: draft-ietf-mpls-ri-rsvp-frr-13.txt |
2022-06-19
|
13 | (System) | New version approved |
2022-06-19
|
13 | (System) | Request for posting confirmation emailed to previous authors: Chandrasekar R , Dante Pacella , Ina Minei , Tarek Saad |
2022-06-19
|
13 | Chandrasekar R | Uploaded new revision |
2022-03-23
|
12 | Amy Vezza | Shepherding AD changed to Andrew Alston |
2021-12-19
|
12 | Chandrasekar R | New version available: draft-ietf-mpls-ri-rsvp-frr-12.txt |
2021-12-19
|
12 | (System) | New version approved |
2021-12-19
|
12 | (System) | Request for posting confirmation emailed to previous authors: Chandrasekar R , Dante Pacella , Ina Minei , Tarek Saad |
2021-12-19
|
12 | Chandrasekar R | Uploaded new revision |
2021-06-20
|
11 | Chandrasekar R | New version available: draft-ietf-mpls-ri-rsvp-frr-11.txt |
2021-06-20
|
11 | (System) | New version approved |
2021-06-20
|
11 | (System) | Request for posting confirmation emailed to previous authors: Chandrasekar R , Dante Pacella , Ina Minei , Tarek Saad |
2021-06-20
|
11 | Chandrasekar R | Uploaded new revision |
2021-03-10
|
10 | Cindy Morgan | Shepherding AD changed to Martin Vigoureux |
2020-12-18
|
10 | Alvaro Retana | [Ballot comment] [Thank you for addressing my DISCUSS.] |
2020-12-18
|
10 | Alvaro Retana | [Ballot Position Update] Position for Alvaro Retana has been changed to No Objection from Discuss |
2020-12-18
|
10 | (System) | IANA Review state changed to Version Changed - Review Needed from IANA OK - Actions Needed |
2020-12-18
|
10 | Chandrasekar R | New version available: draft-ietf-mpls-ri-rsvp-frr-10.txt |
2020-12-18
|
10 | (System) | New version approved |
2020-12-18
|
10 | (System) | Request for posting confirmation emailed to previous authors: Chandrasekar R , Dante Pacella , Ina Minei , Tarek Saad |
2020-12-18
|
10 | Chandrasekar R | Uploaded new revision |
2020-11-24
|
09 | Deborah Brungard | IESG state changed to AD is watching from Dead |
2020-11-22
|
09 | Chandrasekar R | New version available: draft-ietf-mpls-ri-rsvp-frr-09.txt |
2020-11-22
|
09 | (System) | New version approved |
2020-11-22
|
09 | (System) | Request for posting confirmation emailed to previous authors: Chandrasekar R , Tarek Saad , Dante Pacella , Ina Minei |
2020-11-22
|
09 | Chandrasekar R | Uploaded new revision |
2020-11-17
|
08 | Benjamin Kaduk | [Ballot discuss] [no significant changes from -07 to -08, so refreshing what version the datatracker thinks this position applies to] I think there's a lot … [Ballot discuss] [no significant changes from -07 to -08, so refreshing what version the datatracker thinks this position applies to] I think there's a lot of SHOULDs in this document that, if ignored, would cause the implementation to fail to achieve its stated purpose (elimination of stale state retention). Therefore, I don't understand why they are given as SHOULD rather than MUST. I have noted many (but probably not all) such instances in the COMMENT section. |
2020-11-17
|
08 | Benjamin Kaduk | Ballot discuss text updated for Benjamin Kaduk |
2020-11-17
|
08 | Chandrasekar R | New version available: draft-ietf-mpls-ri-rsvp-frr-08.txt |
2020-11-17
|
08 | (System) | New version approved |
2020-11-17
|
08 | (System) | Request for posting confirmation emailed to previous authors: Tarek Saad , Dante Pacella , Ina Minei , Chandrasekar R |
2020-11-17
|
08 | Chandrasekar R | Uploaded new revision |
2020-10-08
|
07 | Tero Kivinen | Closed request for Last Call review by SECDIR with state 'Overtaken by Events' |
2020-10-08
|
07 | Tero Kivinen | Assignment of request for Last Call review by SECDIR to Dacheng Zhang was marked no-response |
2020-09-16
|
07 | (System) | Document has expired |
2020-09-16
|
07 | (System) | IESG state changed to Dead from AD is watching |
2020-09-15
|
07 | Deborah Brungard | Tag Revised I-D Needed - Issue raised by IESG set. Tag Revised I-D Needed cleared. |
2020-09-15
|
07 | Deborah Brungard | IETF WG state changed to WG Document from Submitted to IESG for Publication |
2020-09-15
|
07 | Deborah Brungard | During IESG review, two Discusses raised. Authors have not responded to any requests to discuss. |
2020-09-15
|
07 | Deborah Brungard | IESG state changed to AD is watching::Revised I-D Needed from IESG Evaluation::Revised I-D Needed |
2020-02-03
|
07 | Gunter Van de Velde | Closed request for Last Call review by OPSDIR with state 'Overtaken by Events' |
2020-01-19
|
07 | Gunter Van de Velde | Assignment of request for Last Call review by OPSDIR to Victor Kuarsingh was marked no-response |
2019-12-05
|
07 | Cindy Morgan | IESG state changed to IESG Evaluation::Revised I-D Needed from IESG Evaluation |
2019-12-05
|
07 | Roman Danyliw | [Ballot comment] Section 5. Recommend adding language about using more modern HMAC algorithms than those suggested in RFC2747. For example: OLD: The security considerations … [Ballot comment] Section 5. Recommend adding language about using more modern HMAC algorithms than those suggested in RFC2747. For example: OLD: The security considerations pertaining to the original RSVP protocol [RFC2205], [RFC3209] and [RFC5920] remain relevant. NEW: The security considerations pertaining to the original RSVP protocol [RFC2205], [RFC3209] and [RFC5920] remain relevant. When using RSVP Cryptographic Authentication [RFC2747], more robust algorithms such as HMAC-SHA256, HMAC-SHA384, or HMAC-SHA-512 [RFC2104][SHS] SHOULD be used when computing the keyed message digest where possible. [RFC2104] Krawczyk, H., Bellare, M., and R. Canetti, "HMAC: Keyed- Hashing for Message Authentication", RFC 2104, February 1997. [RFC2747] Baker, F., Lindell, B., and M. Talwar, "RSVP Cryptographic Authentication", RFC 2747, January 2000. [SHS] National Institute of Standards and Technology (NIST), FIPS Publication 186-3: Digital Signature Standard, October 2008. |
2019-12-05
|
07 | Roman Danyliw | Ballot comment text updated for Roman Danyliw |
2019-12-05
|
07 | Roman Danyliw | [Ballot comment] Section 5. Recommend adding language about using more modern HMAC algorithms than those suggested in RFC2747. For example: OLD: The security considerations … [Ballot comment] Section 5. Recommend adding language about using more modern HMAC algorithms than those suggested in RFC2747. For example: OLD: The security considerations pertaining to the original RSVP protocol [RFC2205], [RFC3209] and [RFC5920] remain relevant. NEW The security considerations pertaining to the original RSVP protocol [RFC2205], [RFC3209] and [RFC5920] remain relevant. When using RSVP Cryptographic Authentication [RFC2747], more robust algorithms such as HMAC-SHA256, HMAC-SHA384, or HMAC-SHA-512 [RFC2104][SHS] SHOULD be used when computing the keyed message digest where possible. [RFC2104] Krawczyk, H., Bellare, M., and R. Canetti, "HMAC: Keyed- Hashing for Message Authentication", RFC 2104, February 1997. [RFC2747] Baker, F., Lindell, B., and M. Talwar, "RSVP Cryptographic Authentication", RFC 2747, January 2000. [SHS] National Institute of Standards and Technology (NIST), FIPS Publication 186-3: Digital Signature Standard, October 2008. |
2019-12-05
|
07 | Roman Danyliw | [Ballot Position Update] New position, No Objection, has been recorded for Roman Danyliw |
2019-12-04
|
07 | Benjamin Kaduk | [Ballot discuss] I think there's a lot of SHOULDs in this document that, if ignored, would cause the implementation to fail to achieve its stated … [Ballot discuss] I think there's a lot of SHOULDs in this document that, if ignored, would cause the implementation to fail to achieve its stated purpose (elimination of stale state retention). Therefore, I don't understand why they are given as SHOULD rather than MUST. I have noted many (but probably not all) such instances in the COMMENT section. |
2019-12-04
|
07 | Benjamin Kaduk | [Ballot comment] Thanks for this document; the core procedures seem solid and well-thought-out. I agree with Barry's comment. Section 1 Just to check my understanding: … [Ballot comment] Thanks for this document; the core procedures seem solid and well-thought-out. I agree with Barry's comment. Section 1 Just to check my understanding: since we only mention the bypass-tunnel mode of RFC 4090 FRR, I infer that the detour LSPs do not need separate handling, since they have a one-to-one correspondence with the main LSP, which RI-RSVP is already tracking explicitly? Section 4.1 A node supporting [RFC4090] facility protection FRR MAY set the RI- RSVP capability (I bit) defined in Section 3 of RSVP-TE Scaling Techniques [RFC8370] only if it supports all the extensions specified nit: Section 3.1, no? in the rest of this document. A node supporting [RFC4090] facility bypass FRR but not supporting the extensions specified in this document MUST reset the RI-RSVP capability (I bit) in the outgoing Node-ID based Hello messages. Hence, this document updates [RFC4090] by defining extensions and additional procedures over facility protection FRR defined in [RFC4090] in order to advertise RI-RSVP capability [RFC8370]. This sounds like it is changing the semantics of the I bit that was already defined, to mean support for more extentions than it originally was used for. How is this backwards compatible (that is, how will an implementation know that the peer supports this updated semantics vs. the original semantics)? [I think this is exactly the core of Alvaro's Discuss point, which I support.] Section 4.2.1 - The PLR MUST also include its router ID in a Node-ID sub-object in RRO object carried in a Path message. While including its router ID in the Node-ID sub-object carried in the outgoing Path message, the PLR MUST include the Node-ID sub-object after including its IPv4/IPv6 address or unnumbered interface ID sub-object. Remind me why the ordering is important? Section 4.2.3 A node receiving Path messages should determine whether they contain a B-SFRR-Ready Extended Association object with the Node-ID address of the PLR as the source and its own Node-ID as the destination. In To be clear, the node receiving Path messages is just looking for whether its Node-ID is the destination in the B-SFRR-Ready Extended Association object, and treating the source address as the Node-ID of the PLR; the node does not a priori know that this other node is "the PLR", right? This should probably be reworded, if so. If a matching B-SFRR-Ready Extended Association object is found in the Path message and if there is an operational remote signaling adjacency with the PLR that has advertised RI-RSVP capability (I-bit) [RFC8370] in its Node-ID based Hello messages, then the node SHOULD consider itself as the MP for the corresponding PLR. The matching "corresponding PLR" for this specific LSP, right? Section 4.2.4 - The MP later receives a Path with no matching B-SFRR-Ready Extended Association object corresponding to the PLR's IP address contained in the Path RRO, or Again, this is for the specific LSP in question? - The MP receives a PathTear, or (and some scoping may be needed here, too -- *any* PathTear is probably too broad a criterion) Unlike the normal path state that is either locally generated on the ingress or created by a Path message from the Phop node, the "remote" I'm not sure why the ingress case is a relevant comparison; the ingress is not ever going to be the MP, is it? Section 4.3.3 protection. As B had previously signaled NP availability by including B-SFRR-Ready Extended Association object, C SHOULD remove the B-SFRR-Ready Extended Association object containing Association Source set to B from the Path message and trigger a Path to D. This is only a SHOULD-level requirement. How does D learn to clean up the associated state if the SHOULD is ignored? Section 4.4 does not require the receiving node to unconditionally delete the LSP state immediately. For this, B SHOULD add a new optional CONDITIONS object in the PathTear. The CONDITIONS object is defined in Section 4.4.3. If node C also understands the new object, then C SHOULD delete LSP state only if it is not an NP-MP - in other words C SHOULD delete LSP state if there is no "remote" PLR path state on C. This is only a SHOULD-level requirement, but won't C tear down the whole LSP if the CONDITIONS are not {present and understood}? Similarly, what happens if C does not understand the CONDITIONS object -- won't the whole LSP be torn down? Section 4.4.3 I'd probably have an introductory note that CONDITIONS is intended to see generic usage, and we only define one ('M') condition in this document. Also, what's the mnemonic for choosing 'M'? Section 4.5 5. On D there would be a remote signaling adjacency with B and so D SHOULD accept the "Remote" PathTear and delete the PSB and RSB states corresponding to the LSP. Just to check my understanding: this would also tear down any other LSPs that were using the same node protection path through F, right? Section 4.5.2 When a PLR router that has already made NP available detects a change in the RRO carried in the Resv message indicating that the router's former NP-MP is no longer present in the LSP path, then the router SHOULD send a "Remote" PathTear directly to its former NP-MP. Why is this only SHOULD? Won't the former NP-MP retain stale state otherwise? The new RRO of the LSP carried in the Resv will not contain C. When A processes the Resv with a new RRO not containing C - its former NP- MP, A SHOULD send a "Remote" PathTear to C. When C receives the (I'm not sure that I'd use the normative "SHOULD" here.) "Remote" PathTear for its PSB state, C will send a normal PathTear downstream to D and delete both the PSB and RSB states corresponding to the LSP. As D has already received backup LSP signaling from B, D will retain control plane and forwarding states corresponding to the LSP. Remind me where this behavior of D is specified (to ignore the PathTear since it already got the backup LSP signaling). It's intuitive/obvious, but I forget where it's written down. Section 4.6 Note that for LSPs requesting only link protection, the PLR and the LP-MP need to support the extensions. I think this comparison would be more poigniant if the word "only" was inserted, for "only the PLR and the LP need to support". Section 4.6.2 To double-check: the procedures in the subsections only apply when the ingress has requested protection, right? Section 4.6.2.2 - If the node reduces the refresh time from the above procedures, it SHOULD also not execute MP procedures specified in Section 4.3 of this document. Just to check: a reduced refresh time in either Resv *or* Path suffices to prohibit *all* the MP procedures? Section 5 Aren't there more documents whose security considerations are also relevant (e.g., RFC 8370, RFC 2961, etc.)? Why is utilizing the authentication key for Node-ID Hello messages with TTL>1 only a MAY and not a SHOULD? I'd also suggest to acknowledge the inherent risk when sending non-immediate-neighbor Hellos that the intermediate could tamper with them and disrupt the connection (though any such intermediate is in a position to do worse mischief). If we're going to (per my Discuss) keep all the SHOULDs and not MUSTs, we should talk about how failing to follow the SHOULDs will lead to increased state usage on peer nodes and potentially DoS. It would be reasonable to mention that we have a solid negotiation story so that we don't expect to send conditional PathTears to nodes that don't comprehend them, which reduces the risk of misinterpretation and having a LSP get torn down unnecessarily. Section 6 When reading Section 4.4.3 I had the distinct impression that the "Reserved" field was intended to have future flags allocated from it. Wouldn't it make sense to create a registry with which to do so? If I was wrong about this, I might have to revise my previous comments on that section. |
2019-12-04
|
07 | Benjamin Kaduk | [Ballot Position Update] New position, Discuss, has been recorded for Benjamin Kaduk |
2019-12-04
|
07 | Barry Leiba | [Ballot comment] There are numerous problems with the use and absence of articles (“the”, “a”, “an”) throughout the document: articles are missing when they should … [Ballot comment] There are numerous problems with the use and absence of articles (“the”, “a”, “an”) throughout the document: articles are missing when they should be there, “the” is used when an indefinite article should be, and so on. That made it a harder read than it should have been. The RPC will fix it during editing, but maybe the AD should add an RFC Editor Note to alert them to be particularly watchful for these issues. |
2019-12-04
|
07 | Barry Leiba | [Ballot Position Update] New position, No Objection, has been recorded for Barry Leiba |
2019-12-04
|
07 | Suresh Krishnan | [Ballot Position Update] New position, No Objection, has been recorded for Suresh Krishnan |
2019-12-04
|
07 | Adam Roach | [Ballot comment] > The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", > "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this > … |
2019-12-04
|
07 | Adam Roach | [Ballot Position Update] New position, No Objection, has been recorded for Adam Roach |
2019-12-03
|
07 | Alissa Cooper | [Ballot comment] Please respond to the Gen-ART review. |
2019-12-03
|
07 | Alissa Cooper | [Ballot Position Update] New position, No Objection, has been recorded for Alissa Cooper |
2019-12-03
|
07 | Mirja Kühlewind | [Ballot Position Update] New position, No Objection, has been recorded for Mirja Kühlewind |
2019-12-03
|
07 | Magnus Westerlund | [Ballot Position Update] New position, No Objection, has been recorded for Magnus Westerlund |
2019-12-02
|
07 | Alvaro Retana | [Ballot discuss] §4.1 (Requirement on RFC 4090 Capable Node to advertise RI-RSVP Capability) says: A node supporting [RFC4090] facility protection FRR MAY … [Ballot discuss] §4.1 (Requirement on RFC 4090 Capable Node to advertise RI-RSVP Capability) says: A node supporting [RFC4090] facility protection FRR MAY set the RI- RSVP capability (I bit) defined in Section 3 of RSVP-TE Scaling Techniques [RFC8370] only if it supports all the extensions specified in the rest of this document. A node supporting [RFC4090] facility bypass FRR but not supporting the extensions specified in this document MUST reset the RI-RSVP capability (I bit) in the outgoing Node-ID based Hello messages. Hence, this document updates [RFC4090] by defining extensions and additional procedures over facility protection FRR defined in [RFC4090] in order to advertise RI-RSVP capability [RFC8370]. I understand the intent: advertise the I bit if this specification is supported, and don't if it is not. However, the second sentence cannot be normative ("MUST reset the RI-RSVP capability") because, by definition, a node that doesn't support this specification won't implement anything in it. IOW, this document can't mandate a behavior for nodes that may not be aware of it. The conditions for supporting RI-RSVP from rfc8370/§3 don't contemplate this specification (obviously!), which means that nodes that conform to rfc8370 may advertise the capability without supporting this document. Note that rfc8370 doesn't even mention rfc4090, so the setting of the I bit seems independent to it too. I am balloting DISCUSS because the correct setting of the RI-RSVP capability is essential to the operation described in this document. |
2019-12-02
|
07 | Alvaro Retana | [Ballot comment] - Why doesn't this document formally Update rfc8370? §4.2.1 "specifies...additional procedures to support RI-RSVP" |
2019-12-02
|
07 | Alvaro Retana | [Ballot Position Update] New position, Discuss, has been recorded for Alvaro Retana |
2019-11-12
|
07 | Cindy Morgan | Placed on agenda for telechat - 2019-12-05 |
2019-11-12
|
07 | Deborah Brungard | IESG state changed to IESG Evaluation from Waiting for Writeup |
2019-11-12
|
07 | Deborah Brungard | Ballot has been issued |
2019-11-12
|
07 | Deborah Brungard | [Ballot Position Update] New position, Yes, has been recorded for Deborah Brungard |
2019-11-12
|
07 | Deborah Brungard | Created "Approve" ballot |
2019-11-12
|
07 | Deborah Brungard | Ballot writeup was changed |
2019-11-05
|
07 | (System) | IESG state changed to Waiting for Writeup from In Last Call |
2019-11-04
|
07 | (System) | IANA Review state changed to IANA OK - Actions Needed from IANA - Review Needed |
2019-11-04
|
07 | Sabrina Tanamal | (Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs: The IANA Functions Operator has completed its review of draft-ietf-mpls-ri-rsvp-frr-07. If any part of this review is inaccurate, please let … (Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs: The IANA Functions Operator has completed its review of draft-ietf-mpls-ri-rsvp-frr-07. If any part of this review is inaccurate, please let us know. The IANA Functions Operator understands that, upon approval of this document, there is a single action which we must complete. In the Class Names, Class Numbers, and Class Types registry on the Resource Reservation Protocol (RSVP) Parameters registry page located at: https://www.iana.org/assignments/rsvp-parameters/ a new class number from the range 128-183 will be registered as follows: Class Number: [ TBD-at-Registration ] Class Name: CONDITIONS Reference: [ RFC-to-be ] The IANA Functions Operator understands that this is the only action required to be completed upon approval of this document. Note: The actions requested in this document will not be completed until the document has been approved for publication as an RFC. This message is meant only to confirm the list of actions that will be performed. Thank you, Sabrina Tanamal Senior IANA Services Specialist |
2019-10-30
|
07 | Reese Enghardt | Request for Last Call review by GENART Completed: Ready with Nits. Reviewer: Theresa Enghardt. Sent review to list. |
2019-10-28
|
07 | Gunter Van de Velde | Request for Last Call review by OPSDIR is assigned to Victor Kuarsingh |
2019-10-28
|
07 | Gunter Van de Velde | Request for Last Call review by OPSDIR is assigned to Victor Kuarsingh |
2019-10-25
|
07 | Tero Kivinen | Request for Last Call review by SECDIR is assigned to Dacheng Zhang |
2019-10-25
|
07 | Tero Kivinen | Request for Last Call review by SECDIR is assigned to Dacheng Zhang |
2019-10-24
|
07 | Jean Mahoney | Request for Last Call review by GENART is assigned to Theresa Enghardt |
2019-10-24
|
07 | Jean Mahoney | Request for Last Call review by GENART is assigned to Theresa Enghardt |
2019-10-22
|
07 | Amy Vezza | IANA Review state changed to IANA - Review Needed |
2019-10-22
|
07 | Amy Vezza | The following Last Call announcement was sent out (ends 2019-11-05): From: The IESG To: IETF-Announce CC: mpls@ietf.org, db3546@att.com, draft-ietf-mpls-ri-rsvp-frr@ietf.org, mpls-chairs@ietf.org, n.leymann@telekom.de … The following Last Call announcement was sent out (ends 2019-11-05): From: The IESG To: IETF-Announce CC: mpls@ietf.org, db3546@att.com, draft-ietf-mpls-ri-rsvp-frr@ietf.org, mpls-chairs@ietf.org, n.leymann@telekom.de, Nicolai Leymann Reply-To: last-call@ietf.org Sender: Subject: Last Call: (Refresh-interval Independent FRR Facility Protection) to Proposed Standard The IESG has received a request from the Multiprotocol Label Switching WG (mpls) to consider the following document: - 'Refresh-interval Independent FRR Facility Protection' as Proposed Standard The IESG plans to make a decision in the next few weeks, and solicits final comments on this action. Please send substantive comments to the last-call@ietf.org mailing lists by 2019-11-05. Exceptionally, comments may be sent to iesg@ietf.org instead. In either case, please retain the beginning of the Subject line to allow automated sorting. Abstract RSVP-TE Fast ReRoute extensions specified in RFC 4090 defines two local repair techniques to reroute Label Switched Path (LSP) traffic over pre-established backup tunnel. Facility backup method allows one or more LSPs traversing a connected link or node to be protected using a bypass tunnel. The many-to-one nature of local repair technique is attractive from scalability point of view. This document enumerates facility backup procedures in RFC 4090 that rely on refresh timeout and hence make facility backup method refresh- interval dependent. The RSVP-TE extensions defined in this document will enhance the facility backup protection mechanism by making the corresponding procedures refresh-interval independent and hence compatible with Refresh-interval Independent RSVP (RI-RSVP) specified in RFC 8370. Hence, this document updates RFC 4090 in order to support RI-RSVP capability specified in RFC 8370. The file can be obtained via https://datatracker.ietf.org/doc/draft-ietf-mpls-ri-rsvp-frr/ IESG discussion can be tracked via https://datatracker.ietf.org/doc/draft-ietf-mpls-ri-rsvp-frr/ballot/ The following IPR Declarations may be related to this I-D: https://datatracker.ietf.org/ipr/3672/ https://datatracker.ietf.org/ipr/2580/ https://datatracker.ietf.org/ipr/3671/ The document contains these normative downward references. See RFC 3967 for additional information: draft-ietf-mpls-summary-frr-rsvpte: RSVP-TE Summary Fast Reroute Extensions for LSP Tunnels (None - IETF stream) |
2019-10-22
|
07 | Amy Vezza | IESG state changed to In Last Call from Last Call Requested |
2019-10-22
|
07 | Deborah Brungard | Last call was requested |
2019-10-22
|
07 | Deborah Brungard | Ballot approval text was generated |
2019-10-22
|
07 | Deborah Brungard | Ballot writeup was generated |
2019-10-22
|
07 | Deborah Brungard | IESG state changed to Last Call Requested from Expert Review |
2019-10-22
|
07 | Deborah Brungard | Last call announcement was generated |
2019-09-03
|
07 | Chandrasekar R | New version available: draft-ietf-mpls-ri-rsvp-frr-07.txt |
2019-09-03
|
07 | (System) | New version approved |
2019-09-03
|
07 | (System) | Request for posting confirmation emailed to previous authors: Ina Minei , Tarek Saad , Chandrasekar R , Dante Pacella |
2019-09-03
|
07 | Chandrasekar R | Uploaded new revision |
2019-08-02
|
Jenny Bui | Posted related IPR disclosure: Juniper's Statement about IPR related to draft-ietf-mpls-ri-rsvp-frr | |
2019-08-02
|
Jenny Bui | Posted related IPR disclosure: Juniper's Statement about IPR related to draft-ietf-mpls-ri-rsvp-frr | |
2019-06-20
|
06 | Chandrasekar R | New version available: draft-ietf-mpls-ri-rsvp-frr-06.txt |
2019-06-20
|
06 | (System) | New version approved |
2019-06-20
|
06 | (System) | Request for posting confirmation emailed to previous authors: Ina Minei , Tarek Saad , Chandrasekar R , mpls-chairs@ietf.org, Dante Pacella |
2019-06-20
|
06 | Chandrasekar R | Uploaded new revision |
2019-05-16
|
05 | Deborah Brungard | Waiting for authors to respond to RTG Dir review comments. |
2019-04-11
|
05 | Min Ye | Request for Last Call review by RTGDIR Completed: Has Issues. Reviewer: Julien Meuric. |
2019-03-20
|
05 | Deborah Brungard | Julien will do RTG Dir review. |
2019-03-20
|
05 | Deborah Brungard | IESG state changed to Expert Review from Publication Requested |
2019-02-24
|
05 | Min Ye | Request for Last Call review by RTGDIR is assigned to Julien Meuric |
2019-02-24
|
05 | Min Ye | Request for Last Call review by RTGDIR is assigned to Julien Meuric |
2019-02-22
|
05 | Deborah Brungard | Requested Last Call review by RTGDIR |
2019-02-22
|
05 | Nicolai Leymann | Writeup for draft-ietf-mpls-ri-rsvp-frr-04.txt (1) What type of RFC is being requested (BCP, Proposed Standard, Internet Standard, Informational, Experimental, or Historic)? Why is this the proper … Writeup for draft-ietf-mpls-ri-rsvp-frr-04.txt (1) What type of RFC is being requested (BCP, Proposed Standard, Internet Standard, Informational, Experimental, or Historic)? Why is this the proper type of RFC? Is this type of RFC indicated in the title page header? Proposed Standard - Standards Track indicated on the title page. The specification should be on the Standards Track since it specifies new protocol, protocol procedures and and assigns new code points from an IANA registry that require Standards Action. (2) The IESG approval announcement includes a Document Announcement Write-Up. Please provide such a Document Announcement Write-Up. Recent examples can be found in the "Action" announcements for approved documents. The approval announcement contains the following sections: Technical Summary Fast Reroute for RSVP-TE defines two different methods for local repair to reroute LSP traffic over a backup tunnel. The document defines a extension which enhances the facility backup and makes it independent from the refesh-interval. Working Group Summary This is an update to RFC4090. Document Quality The document went through several reviews and updates based on the feedback. There were some concerns on adding complexity to RSVP-TE as as protocol which were addressed during the dicussion on the WG Mailing List. An implementation poll has been sent to the working group list and the Shepherd Write-Up will be updated as we receive further information. Personnel Nicolai Leymann is the Document Shepherd. Deborah Brungard is the Responsible Area Director. (3) Briefly describe the review of this document that was performed by the Document Shepherd. If this version of the document is not ready for publication, please explain why the document is being forwarded to the IESG. The document shepherd has carefully reviewed the specification during WG last call and subsequently checked all diffs. Comments on the mailing list were addressed in the last version. The document shepherd believes that the document is ready for publication. (4) Does the document Shepherd have any concerns about the depth or breadth of the reviews that have been performed? The shepherd has no concerns about the depth and breadth of the reviews performed. (5) Do portions of the document need review from a particular or from broader perspective, e.g., security, operational complexity, AAA, DNS, DHCP, XML, or internationalization? If so, describe the review that took place. The document does not require a specific review. (6) Describe any specific concerns or issues that the Document Shepherd has with this document that the Responsible Area Director and/or the IESG should be aware of? For example, perhaps he or she is uncomfortable with certain parts of the document, or has concerns whether there really is a need for it. In any event, if the WG has discussed those issues and has indicated that it still wishes to advance the document, detail those concerns here. The shepherd does not have any concerns about the document. (7) Has each author confirmed that any and all appropriate IPR disclosures required for full conformance with the provisions of BCP 78 and BCP 79 have already been filed. If not, explain why. Yes. (8) Has an IPR disclosure been filed that references this document? If so, summarize any WG discussion and conclusion regarding the IPR disclosures. Yes. There were no specific discussions or conclusions in the WG. (9) How solid is the WG consensus behind this document? Does it represent the strong concurrence of a few individuals, with others being silent, or does the WG as a whole understand and agree with it? There is solid consensus of all people who have reviewed and contributed to the document. (10) Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarise the areas of conflict in separate email messages to the Responsible Area Director. (It should be in a separate email because this questionnaire is publicly available.) No. (11) Identify any ID nits the Document Shepherd has found in this document. (See https://www.ietf.org/tools/idnits/ and the Internet-Drafts Checklist). Boilerplate checks are not enough; this check needs to be thorough. None errors found. Two unsused references and one outdated, these nits should be addressed the next time the document is updated e.g. after the RTG Dir review. (12) Describe how the document meets any required formal review criteria, such as the MIB Doctor, media type, and URI type reviews. The document does not define a data model nor does it allocate new media types and URI types. (13) Have all references within this document been identified as either normative or informative? Yes. (14) Are there normative references to documents that are not ready for advancement or are otherwise in an unclear state? If such normative references exist, what is the plan for their completion? All normative refrences are, with one exception, are to existing RFCs. One normative refrence, draft-ietf-mpls-summary-frr-rsvpte-01, is to a MPLS wg draft. This draft is ready to be progressed. The draft is also outdated, and this will be addressed the next time the document is updated e.g. after the RTG Dir review. (15) Are there downward normative references references (see RFC 3967)? If so, list these downward references to support the Area Director in the Last Call procedure. none. (16) Will publication of this document change the status of any existing RFCs? Are those RFCs listed on the title page header, listed in the abstract, and discussed in the introduction? If the RFCs are not listed in the Abstract and Introduction, explain why, and point to the part of the document where the relationship of this document to the other RFCs is discussed. If this information is not in the document, explain why the WG considers it unnecessary. There will be no status change of any other documents when this document is published. (17) Describe the Document Shepherd's review of the IANA considerations section, especially with regard to its consistency with the body of the document. Confirm that all protocol extensions that the document makes are associated with the appropriate reservations in IANA registries. Confirm that any referenced IANA registries have been clearly identified. Confirm that newly created IANA registries include a detailed specification of the initial contents for the registry, that allocations procedures for future registrations are defined, and a reasonable name for the new registry has been suggested (see RFC 5226). The IANA considderation are straight forward and clearly written. Only one code point is requested from an already existing registry. (18) List any new IANA registries that require Expert Review for future allocations. Provide any public guidance that the IESG would find useful in selecting the IANA Experts for these new registries. No new IANA registries are being defined. (19) Describe reviews and automated checks performed by the Document Shepherd to validate sections of the document written in a formal language, such as XML code, BNF rules, MIB definitions, etc. No formal reviews necessary. |
2019-02-22
|
05 | Nicolai Leymann | Responsible AD changed to Deborah Brungard |
2019-02-22
|
05 | Nicolai Leymann | IETF WG state changed to Submitted to IESG for Publication from WG Consensus: Waiting for Write-Up |
2019-02-22
|
05 | Nicolai Leymann | IESG state changed to Publication Requested from I-D Exists |
2019-02-22
|
05 | Nicolai Leymann | IESG process started in state Publication Requested |
2019-02-22
|
05 | Nicolai Leymann | Changed consensus to Yes from Unknown |
2019-02-22
|
05 | Nicolai Leymann | Intended Status changed to Proposed Standard from None |
2019-02-08
|
05 | Chandrasekar R | New version available: draft-ietf-mpls-ri-rsvp-frr-05.txt |
2019-02-08
|
05 | (System) | New version approved |
2019-02-08
|
05 | (System) | Request for posting confirmation emailed to previous authors: Ina Minei , Tarek Saad , Chandrasekar R , Dante Pacella |
2019-02-08
|
05 | Chandrasekar R | Uploaded new revision |
2019-01-18
|
04 | Nicolai Leymann | Writeup for draft-ietf-mpls-ri-rsvp-frr-04.txt (1) What type of RFC is being requested (BCP, Proposed Standard, Internet Standard, Informational, Experimental, or Historic)? Why is this the proper … Writeup for draft-ietf-mpls-ri-rsvp-frr-04.txt (1) What type of RFC is being requested (BCP, Proposed Standard, Internet Standard, Informational, Experimental, or Historic)? Why is this the proper type of RFC? Is this type of RFC indicated in the title page header? Proposed Standard - Standards Track indicated on the title page. The specification should be on the Standards Track since it specifies new protocol, protocol procedures and and assigns new code points from an IANA registry that require Standards Action. (2) The IESG approval announcement includes a Document Announcement Write-Up. Please provide such a Document Announcement Write-Up. Recent examples can be found in the "Action" announcements for approved documents. The approval announcement contains the following sections: Technical Summary Fast Reroute for RSVP-TE defines two different methods for local repair to reroute LSP traffic over a backup tunnel. The document defines a extension which enhances the facility backup and makes it independent from the refesh-interval. Working Group Summary This is an update to RFC4090. Document Quality The document went through several reviews and updates based on the feedback. There were some concerns on adding complexity to RSVP-TE as as protocol which were addressed during the dicussion on the WG Mailing List. An implementation poll has been sent to the working group list and the Shepherd Write-Up will be updated as we receive further information. Personnel Nicolai Leymann is the Document Shepherd. Deborah Brungard is the Responsible Area Director. (3) Briefly describe the review of this document that was performed by the Document Shepherd. If this version of the document is not ready for publication, please explain why the document is being forwarded to the IESG. The document shepherd has carefully reviewed the specification during WG last call and subsequently checked all diffs. Comments on the mailing list were addressed in the last version. The document shepherd believes that the document is ready for publication. (4) Does the document Shepherd have any concerns about the depth or breadth of the reviews that have been performed? The shepherd has no concerns about the depth and breadth of the reviews performed. (5) Do portions of the document need review from a particular or from broader perspective, e.g., security, operational complexity, AAA, DNS, DHCP, XML, or internationalization? If so, describe the review that took place. The document does not require a specific review. (6) Describe any specific concerns or issues that the Document Shepherd has with this document that the Responsible Area Director and/or the IESG should be aware of? For example, perhaps he or she is uncomfortable with certain parts of the document, or has concerns whether there really is a need for it. In any event, if the WG has discussed those issues and has indicated that it still wishes to advance the document, detail those concerns here. The shepherd does not have any concerns about the document. (7) Has each author confirmed that any and all appropriate IPR disclosures required for full conformance with the provisions of BCP 78 and BCP 79 have already been filed. If not, explain why. Yes. (8) Has an IPR disclosure been filed that references this document? If so, summarize any WG discussion and conclusion regarding the IPR disclosures. Yes. There were no specific discussions or conclusions in the WG. (9) How solid is the WG consensus behind this document? Does it represent the strong concurrence of a few individuals, with others being silent, or does the WG as a whole understand and agree with it? There is solid consensus of all people who have reviewed and contributed to the document. (10) Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarise the areas of conflict in separate email messages to the Responsible Area Director. (It should be in a separate email because this questionnaire is publicly available.) No. (11) Identify any ID nits the Document Shepherd has found in this document. (See https://www.ietf.org/tools/idnits/ and the Internet-Drafts Checklist). Boilerplate checks are not enough; this check needs to be thorough. None errors found. Two unsused references and one outdated, these nits should be addressed the next time the document is updated e.g. after the RTG Dir review. (12) Describe how the document meets any required formal review criteria, such as the MIB Doctor, media type, and URI type reviews. The document does not define a data model nor does it allocate new media types and URI types. (13) Have all references within this document been identified as either normative or informative? Yes. (14) Are there normative references to documents that are not ready for advancement or are otherwise in an unclear state? If such normative references exist, what is the plan for their completion? All normative refrences are, with one exception, are to existing RFCs. One normative refrence, draft-ietf-mpls-summary-frr-rsvpte-01, is to a MPLS wg draft. This draft is ready to be progressed. The draft is also outdated, and this will be addressed the next time the document is updated e.g. after the RTG Dir review. (15) Are there downward normative references references (see RFC 3967)? If so, list these downward references to support the Area Director in the Last Call procedure. none. (16) Will publication of this document change the status of any existing RFCs? Are those RFCs listed on the title page header, listed in the abstract, and discussed in the introduction? If the RFCs are not listed in the Abstract and Introduction, explain why, and point to the part of the document where the relationship of this document to the other RFCs is discussed. If this information is not in the document, explain why the WG considers it unnecessary. There will be no status change of any other documents when this document is published. (17) Describe the Document Shepherd's review of the IANA considerations section, especially with regard to its consistency with the body of the document. Confirm that all protocol extensions that the document makes are associated with the appropriate reservations in IANA registries. Confirm that any referenced IANA registries have been clearly identified. Confirm that newly created IANA registries include a detailed specification of the initial contents for the registry, that allocations procedures for future registrations are defined, and a reasonable name for the new registry has been suggested (see RFC 5226). The IANA considderation are straight forward and clearly written. Only one code point is requested from an already existing registry. (18) List any new IANA registries that require Expert Review for future allocations. Provide any public guidance that the IESG would find useful in selecting the IANA Experts for these new registries. No new IANA registries are being defined. (19) Describe reviews and automated checks performed by the Document Shepherd to validate sections of the document written in a formal language, such as XML code, BNF rules, MIB definitions, etc. No formal reviews necessary. |
2018-08-09
|
04 | Chandrasekar R | New version available: draft-ietf-mpls-ri-rsvp-frr-04.txt |
2018-08-09
|
04 | (System) | New version approved |
2018-08-09
|
04 | (System) | Request for posting confirmation emailed to previous authors: Ina Minei , Tarek Saad , Chandrasekar R , Dante Pacella |
2018-08-09
|
04 | Chandrasekar R | Uploaded new revision |
2018-04-04
|
03 | Nicolai Leymann | IETF WG state changed to WG Consensus: Waiting for Write-Up from WG Document |
2018-02-10
|
03 | Chandrasekar R | New version available: draft-ietf-mpls-ri-rsvp-frr-03.txt |
2018-02-10
|
03 | (System) | New version approved |
2018-02-10
|
03 | (System) | Request for posting confirmation emailed to previous authors: Ina Minei , Tarek Saad , Chandrasekar R , Dante Pacella |
2018-02-10
|
03 | Chandrasekar R | Uploaded new revision |
2017-08-11
|
02 | Chandrasekar R | New version available: draft-ietf-mpls-ri-rsvp-frr-02.txt |
2017-08-11
|
02 | (System) | New version approved |
2017-08-11
|
02 | (System) | Request for posting confirmation emailed to previous authors: Ina Minei , Dante Pacella , Chandrasekar R , Tarek Saad |
2017-08-11
|
02 | Chandrasekar R | Uploaded new revision |
2017-04-28
|
01 | Loa Andersson | Notification list changed to Nicolai Leymann <n.leymann@telekom.de> |
2017-04-28
|
01 | Loa Andersson | Document shepherd changed to Nicolai Leymann |
2017-02-12
|
01 | Chandrasekar R | New version available: draft-ietf-mpls-ri-rsvp-frr-01.txt |
2017-02-12
|
01 | (System) | New version approved |
2017-02-12
|
01 | (System) | Request for posting confirmation emailed to previous authors: "Tarek Saad" , "Ina Minei" , mpls-chairs@ietf.org, "Chandrasekar R" , "Dante Pacella" |
2017-02-12
|
01 | Chandrasekar R | Uploaded new revision |
2016-08-15
|
00 | Loa Andersson | This document now replaces draft-chandra-mpls-ri-rsvp-frr instead of None |
2016-08-15
|
00 | Chandrasekar R | New version available: draft-ietf-mpls-ri-rsvp-frr-00.txt |