Skip to main content

Path Computation Element (PCE) Communication Protocol Generic Requirements
draft-ietf-pce-comm-protocol-gen-reqs-07

Revision differences

Document history

Date Rev. By Action
2012-08-22
07 (System) post-migration administrative database adjustment to the No Objection position for Jari Arkko
2012-08-22
07 (System) post-migration administrative database adjustment to the No Objection position for Sam Hartman
2012-08-22
07 (System) post-migration administrative database adjustment to the No Objection position for Magnus Westerlund
2012-08-22
07 (System) post-migration administrative database adjustment to the No Objection position for Brian Carpenter
2012-08-22
07 (System) post-migration administrative database adjustment to the No Objection position for Russ Housley
2006-07-24
07 Bill Fenner State Change Notice email list have been change to pce-chairs@tools.ietf.org from adrian@olddog.co.uk, jpv@cisco.com
2006-06-30
07 Amy Vezza State Changes to RFC Ed Queue from Approved-announcement sent by Amy Vezza
2006-06-29
07 Amy Vezza IESG state changed to Approved-announcement sent
2006-06-29
07 Amy Vezza IESG has approved the document
2006-06-29
07 Amy Vezza Closed "Approve" ballot
2006-06-29
07 Ross Callon State Changes to Approved-announcement to be sent from IESG Evaluation::AD Followup by Ross Callon
2006-06-29
07 Ross Callon Removed from agenda for telechat - 2006-07-06 by Ross Callon
2006-06-28
07 Russ Housley [Ballot Position Update] Position for Russ Housley has been changed to No Objection from Undefined by Russ Housley
2006-06-28
07 Russ Housley [Ballot Position Update] Position for Russ Housley has been changed to Undefined from Discuss by Russ Housley
2006-06-28
07 Sam Hartman [Ballot Position Update] Position for Sam Hartman has been changed to No Objection from Discuss by Sam Hartman
2006-06-28
07 Jari Arkko [Ballot Position Update] Position for Jari Arkko has been changed to No Objection from Discuss by Jari Arkko
2006-06-28
07 Magnus Westerlund [Ballot Position Update] Position for Magnus Westerlund has been changed to No Objection from Discuss by Magnus Westerlund
2006-06-28
07 Brian Carpenter [Ballot Position Update] Position for Brian Carpenter has been changed to No Objection from Discuss by Brian Carpenter
2006-06-27
07 Ross Callon Placed on agenda for telechat - 2006-07-06 by Ross Callon
2006-06-27
07 (System) Sub state has been changed to AD Follow up from New Id Needed
2006-06-27
07 (System) New version available: draft-ietf-pce-comm-protocol-gen-reqs-07.txt
2006-06-09
07 Amy Vezza State Changes to IESG Evaluation::Revised ID Needed from IESG Evaluation by Amy Vezza
2006-06-08
07 Cullen Jennings [Ballot Position Update] Position for Cullen Jennings has been changed to Undefined from No Objection by Cullen Jennings
2006-06-08
07 David Kessens [Ballot Position Update] New position, Undefined, has been recorded for David Kessens by David Kessens
2006-06-08
07 Brian Carpenter
[Ballot comment]
Less concrete issues from Gen-ART review by Robert Sparks:

ISSUE 2:
  The extensibility requirements demand arbitrary objective
  functions. A discussion of …
[Ballot comment]
Less concrete issues from Gen-ART review by Robert Sparks:

ISSUE 2:
  The extensibility requirements demand arbitrary objective
  functions. A discussion of the security implications of this
  requirement is needed. There are probably additional requirements
  on the protocol to be identified focusing on mitigating the risk
  of, for example, a PCC using complex objetives to intentionally drive
  a PCE into resource exhaustion. Does the protocol need to give the  PCE
  tools to say "I tried to do that, but it's turning out to be harder
  than my policies allow."?

ISSUE 4:
  There are several requirements of PCEs that have been captured
  here as requirements of the PCECP. Section 6.1.15 requires that
  the protocol "scale well", where it really means that the system
  using the protocol scales well. The numbers in this section are
  capacity and performance numbers for a PCE, and they are useful
  when designing the PCECP to make sure the protocol itself makes
  achieving those numbers sane. This section should be reworded to
  make this obvious.

  Similarly, section 8 should separate requirements on the protocol
  from the motivational requirements on CPE implementations (2119
  words shouldn't be used in that motivation).

ISSUE 5 (Apologies if my lack of domain expertise led me to miss
        something obvious here):
  Section 6.3.3 requires the protocol to carry information about
  the state of the network to the PCE that would normally come from
  the TED. Does this not introduce security concerns? Could a PCC
  use this poison CPE calculations for other PCCs? If this capability
  exists, there needs to be discussion about how the data gets used
  by the PCE (does it cache it?), but that discussion doesn't belong
  in this document. I suggest at a minimum that some discussion of
  the ramifications of this capability be included in the security
  consideration section of this document.
ISSUE 7:
  The purpose of 6.2.1 is not clear. What is the real requirement
  being placed on the protocol, and how can we evaluate the protocol
  against that requirement. If there are no such explicit  requirements,
  I suggest this be rewritten as advice on where the protocol is  expected
  to be used and not use 2119 terms at all.
  I'm particularly puzzled about what impact operating in environments
  including
    "- packet and non-packet networks"
  is intended to have on the protocol itself.

Nits:
The draft passes the idnits checker (in spirit at least).
The checker complains about the reference to 2119 in the
boilerplate, and the unexpected use of
"Authors' and Contributors' Addresses".

These nits are in no particular order:

NIT 1:
  The references to I-Ds that are works in progress do not
  include draft names, Please add them.

NIT 2:
  Please expand PCE in the title.

NIT 3:
  Section 6.1.6 uses "notification message" which is not yet
  defined - a forward reference would be helpful.

NIT 3:
  Section 6.1.11 requires unsolicited notifications, but doesn't
  really define them. Are these reliable messages? Do they get
  responses?  More detail about what's really being required would
  make the document more useful.

NIT 4:
  The final requirement in 6.1.15 is redundant with requirements
  in both 6.1.8 and section 8. Consolodating those would make the
  document stronger.

NIT 5:
  I suggest deleting "easily" in section 6.1.14:
    The PCECP MUST be easily extensible -> The PCECP MUST be extensible

NIT 6:
  Sections 6.1.16 and .17 share some language that confuses me:
  "does not mean that the constraint must not be supported"
  and
  "does not mean that the objective function may not be supported"

  Is there a way to say this with fewer negations?

  You are trying to reinforce that these sets are extensible. Maybe
  you could just say that instead?

NIT 7:
  The first sentence of 6.2.2 has at least two discrete requirements
  embedded in it. It would be easier to evaluate against the eventual
  protocol definition if these were separated.

NIT 8:
  It's not clear to me what "resynchronization of information" means in
  section 6.3.2. Is there any way to add detail? Is it obvious to the
  community using this document what information is being  resynchronized?

NIT 9:
  Section 6.3.3, third paragraph. I suggest changing
  "large number of PCCs is going to simultaneously" to
  "large number of PCCs will simultaneously".

A couple of final comments that I didn't think worthy of
being called an issue or a nit:

The draft requires response aggregation, but doesn't discuss
the ramifications this will have on the reliability mechanisms
that you will either use from a selected transport or have to
build above it. Pointing out that there are non-trivial issues
here would probably be useful.

The security consideration section doesn't capture any thinking
your group may have put in so far towards threats from elements
that are part of the architecture. Capturing early thinking here
will go a long way.
2006-06-08
07 Brian Carpenter
[Ballot discuss]
There are a lot of issues with the way this document uses RFC 2119
normative language, identified by Robert Sparks in his Gen-ART …
[Ballot discuss]
There are a lot of issues with the way this document uses RFC 2119
normative language, identified by Robert Sparks in his Gen-ART review.
A serious pass over the document to eliminate these inconsistencies
is needed, if we are to use such language in an Informational document.

ISSUE 1:
  The summary of requirements in section 6.4 are inconsistant with
  the requirements in the document.

  Example: 6.4 contains:
        Functionality added to PCECP if transport
        protocol provides it                      SHOULD NOT 6.1.8
    while 6.1.8 says
    Functionality MUST NOT be added to the PCECP where
        the chosen transport protocol already provides it.

  Example: 6.4 contains:
        Maintain PCC-PCE session                NON-RQMT  6.1.2
    but 6.1.2 is silent on maintaining sessions

  I have not done an exhaustive comparison of the table vs the text.
  This is what I found spot-checking a few. A more thorough  reconcilliation
  is needed.

ISSUE 3:
  There is an incorporation of MUST requirements by incomplete
  reference in section 6.1.14:
    "The PCECP MUST support the requirements specified in the
    application-specific requirements documents."
  But it's not clear what these requirements documents are. There
  is a list in the preceeding paragraph, but only a subset of the
  elements in that list have concrete references.

  One possible resolution is to state that the protocol must be
  extensible, explicitly call out the kinds of extensibility (adding
  to the first paragraph of 6.1.14 perhaps) and calling out these
  other documents as examples of the users of the extensibility  mechanism
  instead of directly requiring support of their requirements here.

ISSUE 6 (not as major as the above, but should still be addressed):
  There are several places where 2119 terms are used where they
  shouldn't be. The large difference in the number of occurances of
  MUST outside section 6.4 and inside section 6.4 points to this and
  could be used as a mechanism to help find these places.
    Examples from 6.1.4:
      A list of core objective functions that MUST be supported by the
      PCECP is supplied in Section 6.1.17. Specification of objective
      functions MUST be future-proofed as described in Section 6.1.14.
2006-06-08
07 Brian Carpenter [Ballot Position Update] New position, Discuss, has been recorded for Brian Carpenter by Brian Carpenter
2006-06-07
07 (System) State Changes to IESG Evaluation from IESG Evaluation by system
2006-06-05
07 Amy Vezza State Changes to IESG Evaluation from IESG Evaluation - Defer by Amy Vezza
2006-05-25
07 Magnus Westerlund State Changes to IESG Evaluation - Defer from IESG Evaluation by Magnus Westerlund
2006-05-25
07 Lisa Dusseault [Ballot Position Update] New position, No Objection, has been recorded for Lisa Dusseault by Lisa Dusseault
2006-05-25
07 Jari Arkko
[Ballot discuss]
> The PCECP may utilize an existing transport protocol or operate
> directly over IP.

> If a transport protocol is used, it …
[Ballot discuss]
> The PCECP may utilize an existing transport protocol or operate
> directly over IP.

> If a transport protocol is used, it MAY be used to satisfy some
> requirements stated in other sections of this document (for example,
> reliability and security). Where requirements expressed in this
> document match the function of existing transport protocols,
> consideration MUST be given to the use of those protocols.

> If a transport protocol is used, it MUST NOT limit the size of the
> message used by the PCECP.

Magnus already raised the issue about congestion control if no
existing transport protocol is used. And I'm not sure we would like to
burn a protocol number from the IP space for this purpose. But there
are also other issues in this section. In particular, the requirement
says very little, does not clearly specify what the requirements for
the transport protocol are, or if there are multiple different
deployment scenarios where different transports might be needed.

I see that the protocol spec currently under development in the WG
actually uses TCP. As a result, I wonder if we could make the
requirements in this section simpler and tighter. For instance,

  The PCECP SHOULD utilize an existing transport protocol
  that supports congestion control. This transport protocol
  may also be used to satisfy some requirements in other
  sections of this document, such as reliability. The PCECP
  SHOULD be defined for one transport protocol only in order
  to ensure interoperability.

Comment: Nits:

s/disjointess/disjointness/
2006-05-25
07 Jari Arkko [Ballot Position Update] New position, Discuss, has been recorded for Jari Arkko by Jari Arkko
2006-05-25
07 Mark Townsley [Ballot Position Update] New position, No Objection, has been recorded for Mark Townsley by Mark Townsley
2006-05-25
07 Sam Hartman
[Ballot discuss]
The security solution to this protocol needs to address RFC 4107.  I
believe that an RFC 4107 analysis will clearly require mandatory …
[Ballot discuss]
The security solution to this protocol needs to address RFC 4107.  I
believe that an RFC 4107 analysis will clearly require mandatory key
management in this protocol.

It is important to me that the working group is aware of this
requirement.  If they are aware and have just chosen not to discuss
the requirement in this document, I can remove my discuss.
2006-05-25
07 Sam Hartman [Ballot Position Update] New position, Discuss, has been recorded for Sam Hartman by Sam Hartman
2006-05-25
07 Yoshiko Fong IANA Comment:

As described in the IANA Considerations section, we understand this document to
have NO IANA actions.
2006-05-24
07 Ted Hardie [Ballot Position Update] New position, No Objection, has been recorded for Ted Hardie by Ted Hardie
2006-05-24
07 Russ Housley
[Ballot discuss]
Section 6.1.9 includes a discussion of authentication, encryption
  (although I would prefer a discussion of confidentiality), and DOS
  attack countermeasures.  There …
[Ballot discuss]
Section 6.1.9 includes a discussion of authentication, encryption
  (although I would prefer a discussion of confidentiality), and DOS
  attack countermeasures.  There ought to also be a discussion of
  authorization.  Once a PCC is identified and authenticated, do all
  PCCs have the same privileges?
 
  Section 6.3.3 talks about the "identity of the failed element."
  If possible, it would be good to say a bit more about the
  identification of PCCs and PCEs.  The text does not need to be
  in this section of the document, but it would aid identification,
  authentication, and authorization discussion if there is a clear
  way to name the entities.
2006-05-24
07 Russ Housley [Ballot Position Update] New position, Discuss, has been recorded for Russ Housley by Russ Housley
2006-05-24
07 Cullen Jennings [Ballot Position Update] New position, No Objection, has been recorded for Cullen Jennings by Cullen Jennings
2006-05-24
07 Dan Romascanu
[Ballot comment]
1. From Section 8:

'PCECP operations MUST be modeled and controlled through appropriate MIB modules.' 


It looks to me that there are enough …
[Ballot comment]
1. From Section 8:

'PCECP operations MUST be modeled and controlled through appropriate MIB modules.' 


It looks to me that there are enough specific differences between PCCs and PCEs to lead to the need of defining separate MIB modules. I suggest that this is mentioned in Section 8.

3. 'The operator MUST be able to determine PCECP historical interactions and the success rate of requests using data from MIB modules.'

The way this phrase is written the use of capitalization does not seem justified. Maybe a beter text would be:

'The MIB modules MUST provide information that will allow an operator to PCECP historical interactions and the success rate of requests.'


3. 'The new MIB modules should also be used to provide notifications (traps) when thresholds are crossed or when important events occur.'

This is extremely vague and general for a requirement. I wsuggest that sepcific information be provided about what type of faults and events are critical and need to be reported in notifications. Maybe this paragraph needs to be merged with the last paragraph, where there is some mention about congestion and rate limitation indications.
2006-05-24
07 Dan Romascanu [Ballot Position Update] New position, No Objection, has been recorded for Dan Romascanu by Dan Romascanu
2006-05-23
07 Lars Eggert [Ballot Position Update] New position, No Objection, has been recorded for Lars Eggert by Lars Eggert
2006-05-23
07 Magnus Westerlund
[Ballot discuss]
6.1.3 Transport

  The PCECP may utilize an existing transport protocol or operate
  directly over IP.

If operating directly over IP or …
[Ballot discuss]
6.1.3 Transport

  The PCECP may utilize an existing transport protocol or operate
  directly over IP.

If operating directly over IP or a transport protocol not providing congestion control the PCECP must have congestion control functions.

Section 6.1.8:

The PCECP MUST provide:

  - Detection and report of lost or corrupted messages
  - Automatic attempts to retransmit lost messages without reference to
    the application
  - Handling of out-of-order messages
  - Handling of duplicate messages
  - Flow control and back-pressure to enable throttling of requests and
    responses
  - Rapid PCECP communication failure detection
  - Distinction between partner failure and communication channel
    failure after the PCECP communication is recovered

I think the formulation that it is the PCECP that needs to provide all of these functionalities seems to going to far. I would suggest to change the text to:

The PCECP or its transport protocol MUST provide:

  - Detection ...

In regards to:

Functionality MUST NOT be added
  to the PCECP where the chosen transport protocol already provides it.

I think that was in contradiction of the earlier statement unless the proposed change or similar is applied. I would also like to point out that I think there will be need for both transport congestion control and throttling of requests. I get the impression that document tries to cover this, however maybe not clearly enough. Thus I think a addition to section 6.1.3 can fix this.
2006-05-23
07 Magnus Westerlund [Ballot Position Update] New position, Discuss, has been recorded for Magnus Westerlund by Magnus Westerlund
2006-05-22
06 (System) New version available: draft-ietf-pce-comm-protocol-gen-reqs-06.txt
2006-05-19
05 (System) New version available: draft-ietf-pce-comm-protocol-gen-reqs-05.txt
2006-05-18
07 Ross Callon
For the IESG's use in looking at , here is an email exchange between Ross Callon and a working group chair (JP Vasseur) regarding a …
For the IESG's use in looking at , here is an email exchange between Ross Callon and a working group chair (JP Vasseur) regarding a few minor changes to be made (authors were also on the email TO: list). My understanding is that the authors should be updating the draft prior to our telechat.

>>Page 8, section 6.1.8, first sentence reads:

    The PCECP MUST include reliability.

This needs some clarification. Does this mean:

    The PCECP MUST support reliable transmission of PCECP
    packets.

Right.


>>Page 9, section 6.1.9, first sentence: Should the word "insure"
be instead "ensure".

Yes, thanks.


>>Same paragraph: I am pleased that you specifically mention
DOS attacks, since this seems like an issue that could come
up with PCE. In terms of the possible methods to deal with
DOS, you specifically mention rate limiting. However, I think
that you might also want to specifically mention packet filtering.
Of course rate limiting is one form of packet filtering. However,
people might also want to put in filters which prohibit packets
altogether from, for example, source addresses that are not
authorized.

Thanks for the comments Ross; indeed rate limiting is probably not 
sufficient and packet filtering is undoubtedly a required function.

Also, it has occurred to me that if the PCE protocol
is limited to operation within a single routing domain and single
administrative domain, a provider could protect against DOS by
putting the PCE servers and clients in a private address space,
which is not available to customers or the general Internet. Thus
a bit more description might make sense. Whether this would be
in this section, or in section 7, is TBD. Possible extension of the
current wording for section 6.1.9 might be:

    The PCC-PCE communication protocol MUST include provisions
    to ensure the security of the exchanges between the entities. In
    particular, it MUST support mechanisms to prevent spoofing (e.g.,
    authentication), snooping (e.g., encryption) and DOS attacks 
    (e.g., packet filtering, rate limiting, no promiscuous listening).
    Where the PCE-PCC communication takes place entirely within one limited
    domain, the use of a private address space which is not available
    to customer systems MAY be used to help protect the information
    exchange, but other mechanisms MUST also be available.

Really like the formulation since indeed the PCE does not have to be 
in the same domain but if it is, private addressing may help, 
although as you know not all SPs use private addressing in their core.
2006-05-18
07 Ross Callon
PROTO Writeup by JP Vasseur (WG co-chair):

> 1. Have the chairs personally reviewed this version of the Internet
> Draft
> (ID), and in …
PROTO Writeup by JP Vasseur (WG co-chair):

> 1. Have the chairs personally reviewed this version of the Internet
> Draft
> (ID), and in particular, do they believe this ID is ready to forward to
> the IESG for publication?
>
> Yes.
>
> 2. Has the document had adequate review from both key WG members and key
> non-WG members? Do you have any concerns about the depth or breadth
> of the
> reviews that have been performed?
>
> The document has been reviewed by several key WG members. No pending
> concern.
>
> 3. Do you have concerns that the document needs more review from a
> particular (broader) perspective (e.g., security, operational
> complexity,
> someone familiar with AAA, etc.)?
>
> No.
>
> 4. Do you have any specific concerns/issues with this document that you
> believe the ADs and/or IESG should be aware of? For example, perhaps you
> are uncomfortable with certain parts of the document, or have concerns
> whether there really is a need for it. In any event, if your issues have
> been discussed in the WG and the WG has indicated it that it still
> wishes
> to advance the document, detail those concerns in the write-up.
>
> No concerns.
>
> 5. How solid is the WG consensus behind this document? Does it represent
> the strong concurrence of a few individuals, with others being
> silent, or
> does the WG as a whole understand and agree with it?
>
> Good WG consensus. One set of comments for clarification during Last
> Call that has been addressed by the authors.
>
> 6. Has anyone threatened an appeal or otherwise indicated extreme
> discontent? If so, please summarise the areas of conflict in separate
> email to the Responsible Area Director.
>
> None.
>
> 7. Have the chairs verified that the document adheres to all of the ID
> Checklist items ?
>
> Yes.
>
> 8. Is the document split into normative and informative references? Are
> there normative references to IDs, where the IDs are not also ready for
> advancement or are otherwise in an unclear state? (note here that the
> RFC
> editor will not publish an RFC with normative references to IDs, it will
> delay publication until all such IDs are also ready for publication as
> RFCs.)
>
> All references are informational.
>
> 9. What is the intended status of the document? (e.g., Proposed
> Standard,
> Informational?)
>
> Informational.
>
> 10. For Standards Track and BCP documents, the IESG approval
> announcement
> includes a write-up section with the following sections:
>
> - Technical Summary
> - Working Group Summary
> - Protocol Quality
>
> N/A
2006-05-18
07 Ross Callon Placed on agenda for telechat - 2006-05-25 by Ross Callon
2006-05-18
07 Ross Callon [Ballot Position Update] New position, Yes, has been recorded for Ross Callon
2006-05-18
07 Ross Callon Ballot has been issued by Ross Callon
2006-05-18
07 Ross Callon Created "Approve" ballot
2006-05-18
07 (System) Ballot writeup text was added
2006-05-18
07 (System) Last call text was added
2006-05-18
07 (System) Ballot approval text was added
2006-05-18
07 Ross Callon State Changes to IESG Evaluation from AD Evaluation by Ross Callon
2006-04-12
07 Ross Callon Shepherding AD has been changed to Ross Callon from Alex Zinin
2006-02-26
07 Alex Zinin State Changes to AD Evaluation from Publication Requested by Alex Zinin
2006-02-21
07 Dinara Suleymanova Draft Added by Dinara Suleymanova in state Publication Requested
2006-02-02
04 (System) New version available: draft-ietf-pce-comm-protocol-gen-reqs-04.txt
2005-12-28
03 (System) New version available: draft-ietf-pce-comm-protocol-gen-reqs-03.txt
2005-09-21
02 (System) New version available: draft-ietf-pce-comm-protocol-gen-reqs-02.txt
2005-07-15
01 (System) New version available: draft-ietf-pce-comm-protocol-gen-reqs-01.txt
2005-05-16
00 (System) New version available: draft-ietf-pce-comm-protocol-gen-reqs-00.txt