MPLS Transport Profile (MPLS-TP) Security Framework
draft-ietf-mpls-tp-security-framework-09
Revision differences
Document history
Date | Rev. | By | Action |
---|---|---|---|
2013-04-30
|
09 | (System) | RFC Editor state changed to AUTH48-DONE from AUTH48 |
2013-04-23
|
09 | (System) | RFC Editor state changed to AUTH48 from RFC-EDITOR |
2013-03-25
|
09 | (System) | RFC Editor state changed to RFC-EDITOR from EDIT |
2013-03-12
|
09 | Amy Vezza | State changed to RFC Ed Queue from Approved-announcement sent |
2013-03-11
|
09 | (System) | RFC Editor state changed to EDIT |
2013-03-11
|
09 | (System) | Announcement was received by RFC Editor |
2013-03-11
|
09 | (System) | IANA Action state changed to No IC |
2013-03-11
|
09 | Amy Vezza | State changed to Approved-announcement sent from Approved-announcement to be sent::Point Raised - writeup needed |
2013-03-11
|
09 | Amy Vezza | IESG has approved the document |
2013-03-11
|
09 | Amy Vezza | Closed "Approve" ballot |
2013-03-11
|
09 | Amy Vezza | Ballot approval text was generated |
2013-03-11
|
09 | Adrian Farrel | Ballot writeup was changed |
2013-02-25
|
09 | Luyuan Fang | New version available: draft-ietf-mpls-tp-security-framework-09.txt |
2013-02-21
|
08 | Tero Kivinen | Request for Last Call review by SECDIR Completed: Ready. Reviewer: Brian Weis. |
2013-02-21
|
08 | Cindy Morgan | State changed to Approved-announcement to be sent::Point Raised - writeup needed from IESG Evaluation |
2013-02-20
|
08 | Pete Resnick | [Ballot Position Update] New position, No Objection, has been recorded for Pete Resnick |
2013-02-20
|
08 | Wesley Eddy | [Ballot Position Update] New position, No Objection, has been recorded for Wesley Eddy |
2013-02-20
|
08 | Sean Turner | [Ballot comment] 1) s4: Contains the following: Authentication includes entity authentication for identity verification, encryption for confidentiality, management system authentication, peer-to-peer authentication, … [Ballot comment] 1) s4: Contains the following: Authentication includes entity authentication for identity verification, encryption for confidentiality, management system authentication, peer-to-peer authentication, ... Now my head is full of cough medicine but does authentication really include encryption for confidentiality? Should that bit be struck from the sentence? 2) s4: r/authentication,the/authentication, the 3) For what it's worth I agree with Stephen's comments. |
2013-02-20
|
08 | Sean Turner | [Ballot Position Update] New position, No Objection, has been recorded for Sean Turner |
2013-02-20
|
08 | Ralph Droms | [Ballot Position Update] New position, No Objection, has been recorded for Ralph Droms |
2013-02-20
|
08 | Stewart Bryant | [Ballot Position Update] New position, Yes, has been recorded for Stewart Bryant |
2013-02-20
|
08 | Benoît Claise | [Ballot comment] Minor editorial comment OLD Security reference model 1(a) An MPLS-TP network with Single Segment Pseudowire (SS-PW) from PE1 to PE2. The … [Ballot comment] Minor editorial comment OLD Security reference model 1(a) An MPLS-TP network with Single Segment Pseudowire (SS-PW) from PE1 to PE2. The trusted zone is PE1 to PE2 as illustrated in Figure 1. NEW Security reference model 1(a) An MPLS-TP network with Single Segment Pseudowire (SS-PW) from PE1 to PE2. The trusted zone is PE1 to PE2 as illustrated in Figure 1. |
2013-02-20
|
08 | Benoît Claise | [Ballot Position Update] New position, No Objection, has been recorded for Benoit Claise |
2013-02-19
|
08 | Gonzalo Camarillo | [Ballot Position Update] New position, No Objection, has been recorded for Gonzalo Camarillo |
2013-02-19
|
08 | Dan Romascanu | Request for Telechat review by GENART Completed: Ready. Reviewer: Dan Romascanu. |
2013-02-18
|
08 | Russ Housley | [Ballot Position Update] New position, No Objection, has been recorded for Russ Housley |
2013-02-18
|
08 | Stephen Farrell | [Ballot comment] I guess as an abstract framework there's not much to critique here, so feel free to take or leave the following comments. - … [Ballot comment] I guess as an abstract framework there's not much to critique here, so feel free to take or leave the following comments. - I think you're right to focus on the NMS. I'm not sure if there's any way to validate what's going on from two independent points on the n/w using different vendor's kit, but that might be something to consider. - I think there's a missing threat, which is running insufficiently audited or even malicious vendor supplied (i.e. genuine) code on devices. Not all operators seem to be trusting of all vendors these days. - The inside==trusted; outside==there-be-dragons model is probably less useful than was once the case. Many "inside" systems end up being compromisable via e.g. laptops that get connected in the wrong places or USB sticks etc. While that ought not happen, it does. That does call into question the "full control" statements in section 2 here. Section 3 does however consider this to an extent. - The use of isolated infrastructure wasn't that effective in the face of a determined attacker in e.g. the case of stuxnet. And that was with an air gap reportedly, whereas use of "non-IP based communication paths" seems more like just security by obscurity. |
2013-02-18
|
08 | Stephen Farrell | [Ballot Position Update] New position, No Objection, has been recorded for Stephen Farrell |
2013-02-17
|
08 | Martin Stiemerling | [Ballot Position Update] New position, No Objection, has been recorded for Martin Stiemerling |
2013-02-17
|
08 | Ron Bonica | [Ballot Position Update] New position, No Objection, has been recorded for Ronald Bonica |
2013-02-14
|
08 | Jean Mahoney | Request for Telechat review by GENART is assigned to Dan Romascanu |
2013-02-14
|
08 | Jean Mahoney | Request for Telechat review by GENART is assigned to Dan Romascanu |
2013-02-14
|
08 | Robert Sparks | [Ballot Position Update] New position, No Objection, has been recorded for Robert Sparks |
2013-02-13
|
08 | Brian Haberman | [Ballot Position Update] New position, No Objection, has been recorded for Brian Haberman |
2013-02-12
|
08 | Barry Leiba | [Ballot comment] Luyuan Fang handled all my comments during last call, so I have nothing left now. :-) |
2013-02-12
|
08 | Barry Leiba | [Ballot Position Update] New position, No Objection, has been recorded for Barry Leiba |
2013-02-06
|
08 | Adrian Farrel | State changed to IESG Evaluation from Waiting for AD Go-Ahead |
2013-02-06
|
08 | Adrian Farrel | Ballot has been issued |
2013-02-06
|
08 | Adrian Farrel | [Ballot Position Update] New position, Yes, has been recorded for Adrian Farrel |
2013-02-06
|
08 | Adrian Farrel | Created "Approve" ballot |
2013-02-06
|
08 | Adrian Farrel | Ballot writeup was changed |
2013-02-06
|
08 | (System) | State changed to Waiting for AD Go-Ahead from In Last Call |
2013-02-05
|
08 | Luyuan Fang | New version available: draft-ietf-mpls-tp-security-framework-08.txt |
2013-02-04
|
07 | Pearl Liang | IANA has reviewed draft-ietf-mpls-tp-security-framework-07, which is currently in Last Call, and has the following comments: We understand that, upon approval of this document, there … IANA has reviewed draft-ietf-mpls-tp-security-framework-07, which is currently in Last Call, and has the following comments: We understand that, upon approval of this document, there are no IANA Actions that need completion. |
2013-02-03
|
07 | Adrian Farrel | Placed on agenda for telechat - 2013-02-21 |
2013-01-31
|
07 | Dan Romascanu | Request for Last Call review by GENART Completed: Ready with Issues. Reviewer: Dan Romascanu. |
2013-01-25
|
07 | Tero Kivinen | Request for Last Call review by SECDIR is assigned to Brian Weis |
2013-01-25
|
07 | Tero Kivinen | Request for Last Call review by SECDIR is assigned to Brian Weis |
2013-01-24
|
07 | Jean Mahoney | Request for Last Call review by GENART is assigned to Dan Romascanu |
2013-01-24
|
07 | Jean Mahoney | Request for Last Call review by GENART is assigned to Dan Romascanu |
2013-01-23
|
07 | Cindy Morgan | The following Last Call announcement was sent out: From: The IESG To: IETF-Announce CC: Reply-To: ietf@ietf.org Subject: Last Call: (MPLS-TP Security Framework) to Informational RFC … The following Last Call announcement was sent out: From: The IESG To: IETF-Announce CC: Reply-To: ietf@ietf.org Subject: Last Call: (MPLS-TP Security Framework) to Informational RFC The IESG has received a request from the Multiprotocol Label Switching WG (mpls) to consider the following document: - 'MPLS-TP Security Framework' as Informational RFC The IESG plans to make a decision in the next few weeks, and solicits final comments on this action. Please send substantive comments to the ietf@ietf.org mailing lists by 2013-02-06. Exceptionally, comments may be sent to iesg@ietf.org instead. In either case, please retain the beginning of the Subject line to allow automated sorting. Abstract This document provides a security framework for Multiprotocol Label Switching Transport Profile (MPLS-TP). MPLS-TP extends MPLS technologies and introduces new OAM capabilities, a transport- oriented path protection mechanism, and strong emphasis on static provisioning supported by network management systems. This document addresses the security aspects relevant in the context of MPLS-TP specifically. It describes potential security threats, security requirements for MPLS-TP, and mitigation procedures for MPLS-TP networks and MPLS-TP interconnection to other MPLS and GMPLS networks. This document is built on RFC5920 "MPLS and GMPLS MPLS and GMPLS security framework" by providing additional security considerations which are applicable to the MPLS-TP extensions. All the security considerations from RFC5920 are assumed to apply. This document is a product of a joint Internet Engineering Task Force (IETF) / International Telecommunication Union Telecommunication Standardization Sector (ITU-T) effort to include an MPLS Transport Profile within the IETF MPLS and PWE3 architectures to support the capabilities and functionality of a packet transport network. The file can be obtained via http://datatracker.ietf.org/doc/draft-ietf-mpls-tp-security-framework/ IESG discussion can be tracked via http://datatracker.ietf.org/doc/draft-ietf-mpls-tp-security-framework/ballot/ No IPR declarations have been submitted directly on this I-D. |
2013-01-23
|
07 | Cindy Morgan | State changed to In Last Call from Last Call Requested |
2013-01-23
|
07 | Adrian Farrel | Last call was requested |
2013-01-23
|
07 | Adrian Farrel | Ballot approval text was generated |
2013-01-23
|
07 | Adrian Farrel | State changed to Last Call Requested from AD Evaluation |
2013-01-23
|
07 | Adrian Farrel | Last call announcement was changed |
2013-01-23
|
07 | Adrian Farrel | Last call announcement was generated |
2013-01-23
|
07 | Adrian Farrel | Ballot writeup was changed |
2013-01-23
|
07 | Adrian Farrel | Ballot writeup was changed |
2013-01-21
|
07 | Adrian Farrel | State changed to AD Evaluation from Publication Requested |
2013-01-21
|
07 | Adrian Farrel | State changed to Publication Requested from AD is watching |
2013-01-21
|
07 | Loa Andersson | Changed protocol writeup |
2013-01-20
|
07 | Luyuan Fang | New version available: draft-ietf-mpls-tp-security-framework-07.txt |
2012-12-19
|
06 | Adrian Farrel | Updates satisfy AD review. WG chairs plan a further WG last call. |
2012-12-19
|
06 | Adrian Farrel | State changed to AD is watching from AD Evaluation::Point Raised - writeup needed |
2012-12-17
|
06 | Luyuan Fang | New version available: draft-ietf-mpls-tp-security-framework-06.txt |
2012-10-22
|
05 | Adrian Farrel | Waiting decision by MPLS Chairs as to whether a furtherWG last call is needed. |
2012-10-22
|
05 | Adrian Farrel | State changed to AD Evaluation::Point Raised - writeup needed from AD Evaluation::AD Followup |
2012-10-20
|
05 | (System) | Sub state has been changed to AD Followup from Revised ID Needed |
2012-10-20
|
05 | Luyuan Fang | New version available: draft-ietf-mpls-tp-security-framework-05.txt |
2012-08-16
|
04 | Adrian Farrel | AD Review Hi authors of draft-ietf-mpls-tp-security-framework As usual I have done an AD review of your draft as part of the publication request process. This … AD Review Hi authors of draft-ietf-mpls-tp-security-framework As usual I have done an AD review of your draft as part of the publication request process. This has raised a number of issues that I have set out below and which lead me to believe that the I-D is not yet ready to go forward for publication as an RFC. I shall mark the I-D as needing a new revision, and simply tell the working group that you and I are discussing some revisions. Please talk with the working group chairs about the most effective way to make the updates, and engage with me in a debate about what we should do with this document, and about any or all of the points I raise. Thanks, Adrian === Many of my concerns may be clustered under the topic of the focus of the draft: - Why does this document need to describe or specify MPLS-TP itself? - Why does this document identify security issues that are generic to all MPLS networks? - What is the meaning of setting requirements on "MPLS-TP" in this document? I wasn't really expecting a very large document. MPLS-TP is not a very big increment on MPLS. You might observe heavier use of the G-ACh, and new OAM protocols - both need protection. You might observe that some of the new OAM techniques provide attack vectors as well as security mechanisms. And you might observe that some of the constraints that apply in MPLS-TP (e.g. PHP being off by default) may help bolster security. But otherwise, I am not sure there is much to say. The descriptions of security reference models are interesting, but they are no different to the models for MPLS PWs. And, in any case, you don't seem to make a great deal of reference to them in the rest of the text. I should be really interested to hear if there is strong working group consensus to support the document in its current state. I certainly understand that there is consensus that *a* document is needed to describe the security framework for MPLS-TP, but I am raising the doubt that this is *the* document in its current form. --- The document formatting is all messed up. Need to indent text and insert page breaks. (The missing page breaks are identified by idnits!) --- Please split Authors' Addresses into Authors' Addresses (front page people) and Contributors' Addresses (other authors). --- It is no longer necessary to include the following in the Abstract: This Informational Internet-Draft is aimed at achieving IETF Consensus before publication as an RFC and will be subject to an IETF Last Call. [RFC Editor, please remove this note before publication as an RFC and insert the correct Streams Boilerplate to indicate that the published RFC has IETF Consensus.] All Informational I-Ds in the IETF Stream are now subject to IETF last call, and the RFC editor automatically includes the appropriate boilerplate. --- RFC 5920 looks like it needs to be a Normative reference. --- I think the Abstract should mention RFC 5920 and indicate that this document builds on 5920 by adding additional security considerations applicable to the MPLS-TP extensions. All the security features and considerations from 5920 are assumed to apply. --- Section 1.1 Why is it necessary to say in this document what the intent of MPLS-TP is? I found that a distraction, and surely it is covered elsewhere. --- A number of acronyms are used without expansion in Section 1. --- s/G-Ach/G-ACh/ --- Please don't say "GAL label" ! --- Section 1.4 GAL does not stand for Generic Alert Label! RSVP is not used in the document. --- Section 1.5 is a waste of time given the presence of the Table of Contents. --- In Figures 2, 3 and 4, the trusted zone extends slightly too far to the left. Also the "PSN cloud" edges are not aligned correctly. BTW. What is a "PSN cloud"? There is no mention of "cloud" in the text and I think you could safely relabel the figures with "PSN". --- Section 2.4 A key requirement of MPLS-TP networks is that the security of a trusted zone MUST NOT be compromised by interconnecting one SP's MPLS-TP or MPLS infrastructure with another SP's core devices, T-PE devices, or end users. Unclear whether this means that you must not interconnect, or that you may interconnect but doing so must not compromise security. --- I don't understand the caption to Figure 7 Surely T-PE1, S-PE1, and S-PE2 are part of the trusted zone. Compare with Figure 3. How is Provider B a neighbor? Either devices or domains are neighbors. CE2 does not look to be a neighbor for Provider A. How is it considered? --- I think Section 3 is a bit jumbled between attack vectors and effects. For example: a. GAL label or BFD label manipulation, which includes insertion of false labels or messages and modification, deletion, or replay of GAL labels or messages. ...is not an effect. I do believe that you are attempting the right separation between the things that can be done, and the impact they might have on the network. However, I don't think you have achieved the separation correctly. --- Section 3 We need a reference for: Even though surveys show that 40% to 60% of attacks originate from insiders Otherwise you might as well say "surveys show that 76% of all statistics are invented to suit the authors." --- I don't find anything in Section 3.1 that is new to MPLS-TP. Am I missing the point? I thought the document was only a delta on existing MPLS/GMPLS security. --- Ditto 3.2 --- Section 4 does not sit well in this document. Why are there requirements in a Framework document? Do you want to turn this into a Requirements Statement? If so, should it be Standards Track? What is the reader supposed to do with the requirements? The requirements are voiced as "MPLS-TP must do foo". That is an MPLS-TP design consideration, which is fine, but does it belong here? Shouldn't a framework tell you how to apply the MPLS-TP toolkit to obtain security? --- Section 4. R01. This feature already exists in MPLS-TP. Why describe it as a requirement? OTOH, "should support" does not mean "must support" and is not "must implement" or "should deploy". --- Section 4. R02. This function is already included in MPLS-TP. What does it mean to make it a requirement at this stage? --- Section 4. R03. What does this mean? --- Section 4. R04 and R05. Aren't these general MPLS security features? --- Section 4. R06 and R07. What is a dynamic MPLS network inter-connection protocol? --- Section 4. R08. This pretty much says "everything must be protected". Can you break it out into separate distinct pieces so that it is easier to develop against? --- Section 4. R09. This seems to mix two issues: hiding information and DDoS prevention. How closely are they related? --- Section 4. R10 and R11. How are these actionable requirements for "MPLS-TP"? --- ... I gave up on Section 4. --- Section 5. Finally, real meat! However, I am struggling to see text here that is specific to MPLS-TP. 5.1.1, 5.1.2, 5.1.3, and 5.2 all seem fully applicable to MPLS networks. 5.3 has some specific interest for MPLS-TP in as much as MPLS networks would not typically make this separation. 5.4 is back to a generic MPLS security statement. Indeed, in MPLS it would be hard to avoid this positive feature. You could make a point here that in MPLS-TP it is possible to separate the management flows, but that would be a bad idea and you should behave as normal. 5.5 is just general apple pie applicable to MPLS. Finally 5.6 leverages features that are enhanced in MPLS-TP and so may aid making MPLS-TP more secure. Of course, we should note that these mechanisms are now also available in any MPLS. --- Section 6 is also good material, but how is it specific to MPLS-TP? What have you said that does not apply equally to MPLS? --- I think Section 7 says very nicely what the document should have done :-( |
2012-08-11
|
04 | Adrian Farrel | State changed to AD Evaluation::Revised ID Needed from AD Evaluation |
2012-08-08
|
04 | Adrian Farrel | Ballot writeup was changed |
2012-08-08
|
04 | Adrian Farrel | Ballot writeup was generated |
2012-08-08
|
04 | Adrian Farrel | State changed to AD Evaluation from Publication Requested |
2012-07-26
|
04 | Cindy Morgan | (1) What type of RFC is being requested (BCP, Proposed Standard, Internet Standard, Informational, Experimental, or Historic)? Why is this the proper type of RFC? … (1) What type of RFC is being requested (BCP, Proposed Standard, Internet Standard, Informational, Experimental, or Historic)? Why is this the proper type of RFC? Is this type of RFC indicated in the title page header? The MPLS working group request that: MPLS-TP Security Framework draft-ietf-mpls-tp-security-framework-04 is published as an Informational RFC. This document is one of the mpls-tp frameworks and like all the other frameworks it is an informational document. (2) The IESG approval announcement includes a Document Announcement Write-Up. Please provide such a Document Announcement Write-Up. Recent examples can be found in the "Action" announcements for approved documents. The approval announcement contains the following sections: Technical Summary This document provides a security framework for Multiprotocol Label Switching Transport Profile (MPLS-TP). MPLS-TP extends MPLS technologies and introduces new OAM capabilities, a transport- oriented path protection mechanism, and strong emphasis on static provisioning supported by network management systems. This document addresses the security aspects relevant in the context of MPLS-TP specifically. It describes potential security threats, security requirements for MPLS-TP, and mitigation procedures for MPLS-TP networks and MPLS-TP interconnection to other MPLS and GMPLS networks. Working Group Summary Was there anything in WG process that is worth noting? For example, was there controversy about particular points or were there decisions where the consensus was particularly rough? This document has a strong support in the working group and has been well reviewed. The orgaqnization, structure, and content of this document benefit from multiple reviews, in particular, reviews by the co-chair of the KARP WG. ITU-T SG15 has been notified of all reviews and working group last calls for this doecument, there are no unresolved comments or issues. Document Quality Are there existing implementations of the protocol? Have a significant number of vendors indicated their plan to implement the specification? Are there any reviewers that merit special mention as having done a thorough review, e.g., one that resulted in important changes or a conclusion that the document had no substantive issues? If there was a MIB Doctor, Media Type or other expert review, what was its course (briefly)? In the case of a Media Type review, on what date was the request posted? This an informational document, it presents a framework that might be used when implementing, deploying, configurating and operating networks, but it is not possible to say that there are implementations. The document has had the review that is needed, the working group last call was brought to the attention of SG15 in ITU-T. Personnel Who is the Document Shepherd? Who is the Responsible Area Director? Loa Andersson is the document shepherd. Adrian Farrel is/will be the responsible AD. (3) Briefly describe the review of this document that was performed by the Document Shepherd. If this version of the document is not ready for publication, please explain why the document is being forwarded to the IESG. This document is an MPLS-TP framework and has been part of the ongoing discussion in the MPLS-TP project. The document shepherd has reviewed the document several times, e.g. the first individual version, when it was polled to become a wg document and at the wg last call, and at least one time in between. The document is ready for publication. (4) Does the document Shepherd have any concerns about the depth or breadth of the reviews that have been performed? The security community have be involved in developing this draft and the people active in the KARP wg has reviewed and commented on it. Nevertheless a targeted security directorate review during the IESG review would be of value." (5) Do portions of the document need review from a particular or from broader perspective, e.g., security, operational complexity, AAA, DNS, DHCP, XML, or internationalization? If so, describe the review that took place. No. (6) Describe any specific concerns or issues that the Document Shepherd has with this document that the Responsible Area Director and/or the IESG should be aware of? For example, perhaps he or she is uncomfortable with certain parts of the document, or has concerns whether there really is a need for it. In any event, if the WG has discussed those issues and has indicated that it still wishes to advance the document, detail those concerns here. No such concerns! (7) Has each author confirmed that any and all appropriate IPR disclosures required for full conformance with the provisions of BCP 78 and BCP 79 have already been filed. If not, explain why. There are no IPRs filed against this document. The working group last call started the working group chairs sent last step before requestion publication was sending a mail to the working group and the authors, asking any members of the working group whom were aware of IPRs to speak up and requiring the authors either to indicate if they were aware of IPRs or say that they were not. (8) Has an IPR disclosure been filed that references this document? If so, summarize any WG discussion and conclusion regarding the IPR disclosures. There are no IPR filed for this document. (9) How solid is the WG consensus behind this document? Does it represent the strong concurrence of a few individuals, with others being silent, or does the WG as a whole understand and agree with it? The working group is behind this document. It has been well discussed and reviewed as part of the MPLS-TP discussion. It has also been discussed and reviewed in pats of ITU-T SG15. (10) Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarise the areas of conflict in separate email messages to the Responsible Area Director. (It should be in a separate email because this questionnaire is publicly available.) No such threats. (11) Identify any ID nits the Document Shepherd has found in this document. (See http://www.ietf.org/tools/idnits/ and the Internet-Drafts Checklist). Boilerplate checks are not enough; this check needs to be thorough. This document passes cleanly through the nits-tool. (12) Describe how the document meets any required formal review criteria, such as the MIB Doctor, media type, and URI type reviews. There are no such formal review criteria. (13) Have all references within this document been identified as either normative or informative? Yes. (14) Are there normative references to documents that are not ready for advancement or are otherwise in an unclear state? If such normative references exist, what is the plan for their completion? No, all normative references are to existing RFCs. (15) Are there downward normative references references (see RFC 3967)? If so, list these downward references to support the Area Director in the Last Call procedure. No downward references. (16) Will publication of this document change the status of any existing RFCs? Are those RFCs listed on the title page header, listed in the abstract, and discussed in the introduction? If the RFCs are not listed in the Abstract and Introduction, explain why, and point to the part of the document where the relationship of this document to the other RFCs is discussed. If this information is not in the document, explain why the WG considers it unnecessary. No changes to existing RFCs. (17) Describe the Document Shepherd's review of the IANA considerations section, especially with regard to its consistency with the body of the document. Confirm that all protocol extensions that the document makes are associated with the appropriate reservations in IANA registries. Confirm that any referenced IANA registries have been clearly identified. Confirm that newly created IANA registries include a detailed specification of the initial contents for the registry, that allocations procedures for future registrations are defined, and a reasonable name for the new registry has been suggested (see RFC 5226). No request for IANA allocations. (18) List any new IANA registries that require Expert Review for future allocations. Provide any public guidance that the IESG would find useful in selecting the IANA Experts for these new registries. No request for IANA allocations. (19) Describe reviews and automated checks performed by the Document Shepherd to validate sections of the document written in a formal language, such as XML code, BNF rules, MIB definitions, etc. No formal language. |
2012-07-26
|
04 | Cindy Morgan | Note added 'Loa Andersson (loa@pi.nu) is the document shepherd.' |
2012-07-26
|
04 | Cindy Morgan | Intended Status changed to Informational |
2012-07-26
|
04 | Cindy Morgan | IESG process started in state Publication Requested |
2012-07-26
|
04 | (System) | Earlier history may be found in the Comment Log for draft-fang-mpls-tp-security-framework |
2012-07-14
|
04 | Luyuan Fang | New version available: draft-ietf-mpls-tp-security-framework-04.txt |
2012-03-26
|
03 | Luyuan Fang | New version available: draft-ietf-mpls-tp-security-framework-03.txt |
2011-10-31
|
02 | (System) | New version available: draft-ietf-mpls-tp-security-framework-02.txt |
2011-05-16
|
01 | (System) | New version available: draft-ietf-mpls-tp-security-framework-01.txt |
2011-02-16
|
00 | (System) | New version available: draft-ietf-mpls-tp-security-framework-00.txt |