Skip to main content

Dynamic Networks to Hybrid Cloud DCs: Problems and Mitigation Practices
draft-ietf-rtgwg-net2cloud-problem-statement-42

Revision differences

Document history

Date Rev. By Action
2025-04-22
42 Jim Guichard None
2025-01-17
42 (System) IANA Review state changed to Version Changed - Review Needed from IANA OK - No Actions Needed
2025-01-17
42 Linda Dunbar New version available: draft-ietf-rtgwg-net2cloud-problem-statement-42.txt
2025-01-17
42 Linda Dunbar New version accepted (logged-in submitter: Linda Dunbar)
2025-01-17
42 Linda Dunbar Uploaded new revision
2024-10-18
41 Carlos Pignataro Closed request for Early review by OPSDIR with state 'Team Will not Review Document'
2024-10-18
41 Carlos Pignataro Assignment of request for Early review by OPSDIR to Susan Hares was marked no-response
2024-09-19
41 Jim Guichard IETF WG state changed to WG Document from Submitted to IESG for Publication
2024-09-19
41 Jim Guichard
The IESG has completed a review of this document.  While many of the comments can be addressed by the authors, there appear to be two …
The IESG has completed a review of this document.  While many of the comments can be addressed by the authors, there appear to be two substantive aspects that need working group decision.  As such I am returning the document to the working group and asking that the group particularly discuss the following two items:

1) The document currently has requirements in various places.  It does not claim that these are all the requirements for communication between enterprise and cloud.  Readers found difficulty understanding why the requirements were there, and why these requirements and not others.  There seem to be three paths to resolving this.  The WG could tone down or remove the requirements language so that the items become notes about aspects that need to be taken into account; the WG could add text explaining why these specific aspects are being documented as requirements here; or the WG could try to make the requirements comprehensive.  Please discuss and decide how to handle this aspect of the document.

2) Readers had trouble understanding the purpose of the document.  It would help significantly if the WG added text explaining the purpose and long-term value of the document.  Who is the intended audience?  Why will someone read it (other than historical interest) in 5 years?  How will the existence of this document affect, or better yet help, other IETF work?
2024-09-19
41 (System) Changed action holders to Jim Guichard (IESG state changed)
2024-09-19
41 Jim Guichard IESG state changed to I-D Exists from IESG Evaluation::Revised I-D Needed
2024-09-19
41 (System) Changed action holders to Andy Malis, Christian Jacquenet, Linda Dunbar, Mehmet Toy, Kausik Majumdar (IESG state changed)
2024-09-19
41 Jenny Bui IESG state changed to IESG Evaluation::Revised I-D Needed from IESG Evaluation
2024-09-19
41 Cindy Morgan Changed consensus to Yes from Unknown
2024-09-19
41 Gunter Van de Velde
[Ballot discuss]
# Gunter Van de Velde, RTG AD, comments for draft-ietf-rtgwg-net2cloud-problem-statement-41

# Thanks for writing up this work to make cloud DCs more mainstream …
[Ballot discuss]
# Gunter Van de Velde, RTG AD, comments for draft-ietf-rtgwg-net2cloud-problem-statement-41

# Thanks for writing up this work to make cloud DCs more mainstream and connected to enterprises and to open the discussion on routing aspects.

# Please find the following blocking DISCUSS observations when processing the draft and some non-blocking comments.

#DISCUSS
#=======
# I support the DISCUSS from John and Paul. (1) requirements do not belong in a use-case document (2) there is information in the document which will not age well

# [DISCUSS1] Section 3 is not complete from a Connecting to Cloud DC Routing issues perspective.
Connecting to cloud data centers presents various routing challenges, including scalability, security, latency, routing policy consistency, and multi-cloud complexity. Enterprises need to carefully plan and manage their routing architecture to ensure reliable, efficient, and secure connections between on-premises infrastructure and cloud data centers. Solutions like dedicated connections, BGP security enhancements, and dynamic routing policies can help mitigate some of these challenges, but they also add complexity to the overall network architecture. I believe that a use-case document should address or at least position all of these. When focused on a small subset then the bigger picture may be lost. Connecting to and between Cloud DCs is a multi-dimensional complex routing aware problem space. See my note [DISCUSS1] below

# [DISCUSS2] Cloud DC implications on security considerations is not complete. There are many aspects to consider. See note [DISCUSS2].
Topics are for example Encryption of Data in Transit, Authentication and Access Control, Secure Routing Protocols, Network Segmentation, Data Encryption at Rest, Visibility and Monitoring, DDoS Protection, Firewalls and Security Groups, Zero Trust Security Model, Compliance and Regulatory Considerations, Network Access Control, Patch Management and Vulnerability Scanning, Distributed Workloads and Traffic Control and an Incident Response Plan

# [DISCUSS3] Vendor specific Cloud DC products and explicit behaviors are documented in this document. IETF documents should be vendor agnostic, especially when very specific behaviors are documented. Vendor behavior will change over time making the information provided in the draft stale, outdated and potentially harmful to the referenced (unaware) cloud DC vendors
2024-09-19
41 Gunter Van de Velde
[Ballot comment]
#DETAILED COMMENTS
#=================
## classified as [minor] and [major]

72   3. Issues and Mitigation Methods of Connecting to Cloud DCs.......4
73   …
[Ballot comment]
#DETAILED COMMENTS
#=================
## classified as [minor] and [major]

72   3. Issues and Mitigation Methods of Connecting to Cloud DCs.......4
73       3.1. Increased BGP Peering Errors and Mitigation Methods.......4
74       3.2. Site Failures and Methods to Minimize Impacts.............6
75       3.3. Limitations of DNS-based Cloud DC Location Selection......6
76       3.4. Network Issues for 5G Edge Clouds and Mitigation Methods..7
77       3.5. DNS Practices for Hybrid Workloads........................8
78       3.6. NAT Practices for Accessing Cloud Services................9
79       3.7. Cloud Discovery Practices................................10
80   4. Dynamic Connecting Enterprise Sites with Cloud DCs............10
81       4.1. Sites to Cloud DC........................................11
82       4.2. Inter-Cloud Connection...................................13
83       4.3. Extending Private VPNs to Hybrid Cloud DCs...............14
84   5. Methods to Scale IPsec Tunnels to Cloud DCs...................15
85       5.1. Scale IPsec Tunnels Management...........................16
86       5.2. CPEs Interconnection Over the Public Internet............16
.....
98 1. Introduction
99   With the advent of widely available Cloud data centers (DCs)
100   providing services in various geographic locations and advanced
101   tools for monitoring and predicting application behaviors, it is
102   tempting for enterprises to instantiate applications and workloads
103   in Cloud DCs. Some enterprises prefer specific applications to be
104   located close to the end users accessing these services, as the
105   proximity can improve end-to-end latency. In addition, applications
106   and workloads in Cloud DCs can be shut down or moved along with end
107   users in motion thereby modifying the networking connection of
108   subsequently relocated applications and workloads.
109   Cloud services are typically on-demand and designed to be scalable,
110   highly available, and billed based on usage. Most Cloud Operators
111   offer various network functions, such as virtual Firewall services,
112   virtual private clouds services, and virtual Private Branch eXchange
113   (PBX) services, including voice and video conferencing systems. A
114   Cloud DC is a shared infrastructure that hosts services for multiple
115   customers.
116   This document describes the network-related problems enterprises
117   face at the time of writing this document when interconnecting their
118   branch offices with dynamic workloads in Cloud DCs and the
119   mitigation practices to get around those problems.

[major]
Cloud data centers offer numerous benefits, but they also have several downsides or challenges that organizations need to consider. While cloud data centers offer scalability, flexibility, and cost-efficiency, organizations must weigh these benefits against potential downsides such as security risks, unpredictable costs, limited control, and regulatory compliance challenges. It is not just about network access to Cloud DCs.

Some of the suggested key downsides are not strictly of a routing technical nature, while others are, and these have not been adequately addressed in Section 3. Including these issues in the document, along with an explicit indication of which are within scope and which are outside scope, will provide greater clarity to readers and enhance their understanding of the problem space being discussed:

1. Security and Privacy Concerns:
* Data Breaches: Storing sensitive data in cloud environments increases the risk of data breaches, as cloud data centers are prime targets for cyberattacks. Organizations may face issues of unauthorized access if cloud security is compromised.
* Shared Responsibility: In cloud environments, security is a shared responsibility between the cloud provider and the customer. Misconfigurations or failures on either side can lead to vulnerabilities.
* Data Sovereignty: Data stored in cloud data centers may be subject to the laws and regulations of the country where the data center is located, which can lead to compliance issues regarding data privacy.

2. Downtime and Availability:
* Service Outages: Even the most reliable cloud providers can experience downtime, which can lead to service disruptions for organizations relying on cloud infrastructure. High availability is typically guaranteed, but 100% uptime is rarely achieved.
* Network Latency: Cloud data centers are remote, so applications that require low-latency performance might face challenges, especially if the data center is far from end-users.

3. Cost Management:
* Unpredictable Costs: While cloud services are often marketed as cost-effective, costs can quickly add up if resources are not properly managed. Unexpected charges for data egress, scaling, or additional services can lead to budget overruns.
* Long-Term Costs: Over time, running workloads in the cloud might be more expensive than on-premises solutions, particularly for organizations with steady and predictable workloads.

4. Lack of Control:
* Limited Customization: Cloud services typically offer standardized environments, which may limit an organization’s ability to customize infrastructure or configurations to meet specific needs. This lack of control can be problematic for highly specialized applications.
* Vendor Lock-In: Many cloud providers offer proprietary services that can make it difficult or costly to migrate to another provider or move workloads back on-premises.

5. Data Transfer and Performance Issues:
* Data Transfer Costs: Transferring large volumes of data to and from the cloud can be expensive and time-consuming, particularly when dealing with bandwidth limitations or the cost of data egress.
* Performance Variability: In multi-tenant cloud environments, performance can fluctuate depending on the overall usage of resources by other clients. This can impact critical workloads if performance varies unexpectedly.

6. Compliance and Legal Issues:
* Regulatory Compliance: Organizations in highly regulated industries (e.g., healthcare, finance) must ensure that their use of cloud services complies with specific regulations such as GDPR, HIPAA, or PCI-DSS. Ensuring compliance can be complicated by the global nature of cloud data centers.
* Data Jurisdiction: Storing data in foreign cloud data centers might expose organizations to jurisdictional issues, where the data becomes subject to foreign laws and regulations.

7. Dependence on Internet Connectivity:
* Connectivity Issues: Cloud services require reliable internet access. If an organization experiences internet outages or slow connectivity, access to cloud-hosted applications and data may be compromised, impacting productivity.

8. Complexity in Hybrid Environments:
* Integration Challenges: Managing hybrid cloud environments (where some resources are in the cloud and others on-premises) can be complex, especially when it comes to data synchronization, security policies, and monitoring.

150   SD-WAN      An overlay connectivity service that optimizes transport
151               of IP Packets over one or more Underlay Connectivity
152               Services by recognizing applications (Application Flows)
153               and determining forwarding behavior by applying Policies
154               to them. [MEF-70.1]

[major]
fails to say that SD-WAN stands for "Software-Defined Wide Area Network"

Maybe the following could be added to describe what SD-WAN is:

"
SD-WAN (Software-Defined Wide Area Network) is a networking technology that simplifies the management and operation of a wide area network (WAN) by decoupling the network hardware from its control mechanism. It allows enterprises to securely and efficiently connect users to applications, particularly across multiple branch locations, data centers, and cloud environments.
"

156   VPC:        A Virtual Private Cloud is a virtual network dedicated
157               to one client account. It is logically isolated from
158               other virtual networks in a Cloud DC. Each client can
159               launch his/her desired resources, such as compute,
160               storage, or network functions into his/her VPC. At the
161               time of writing this document, most Cloud operators'
162               VPCs only support private addresses, some support IPv4
163               only, others support IPv4/IPv6 dual stack.

[minor]
A simpler proposal to describe VPC

"
A VPC (Virtual Private Cloud) is a secure, isolated segment of a public cloud, where users can deploy and manage resources such as virtual machines, databases, and applications. VPCs offer the flexibility of using the public cloud's infrastructure while providing more control over networking and security.
"

165 3. Issues and Mitigation Methods of Connecting to Cloud DCs

167   This section identifies some high-level problems that the IETF could
168   address, especially within the Routing area. Other Cloud DC problems
169   (e.g., managing cloud spending) are out of the scope of this
170   document.

[DISCUSS1]
Connecting to cloud data centers presents various routing challenges, including scalability, security, latency, routing policy consistency, and multi-cloud complexity. Enterprises need to carefully plan and manage their routing architecture to ensure reliable, efficient, and secure connections between on-premises infrastructure and cloud data centers. Solutions like dedicated connections, BGP security enhancements, and dynamic routing policies can help mitigate some of these challenges, but they also add complexity to the overall network architecture. Not all of these high level enterprise related concerns are addressed in draft-ietf-rtgwg-net2cloud-problem-statement-41

Key Routing Issues of interest by enterprises when Connecting to Cloud Data Centers:

1. Latency and Path Optimization:
* Suboptimal Routing: Traffic between on-premises data centers and cloud providers may traverse multiple ISPs or intermediary networks, leading to increased latency. Default internet paths may not always be the most optimal, which can negatively impact performance for latency-sensitive applications.
* Traffic Engineering: Enterprises may struggle to optimize routes for specific applications. This can be critical when performance demands, such as low latency for real-time applications, are high.

2. Multi-Cloud and Hybrid Cloud Connectivity:
* Inter-Cloud Routing Complexity: Routing between multiple cloud providers (multi-cloud) or between on-premises environments and the cloud (hybrid cloud) is challenging. Each cloud provider may use different routing policies, protocols, and architectures, complicating consistent policy enforcement and efficient routing across different environments.
* Vendor-Specific Routing Mechanisms: Cloud providers like AWS, Microsoft Azure, and Google Cloud have their own proprietary routing mechanisms, such as AWS Transit Gateway or Azure Virtual WAN. Managing routing across different clouds requires expertise in each platform’s unique setup.

3. BGP Complexity:
* BGP Configuration: Enterprises often use Border Gateway Protocol (BGP) to connect their on-premises networks with cloud DCs. However, configuring BGP for efficient and secure communication can be complex, especially when dealing with cloud providers’ route limitations, filtering, and peering configurations.
* BGP Route Convergence: If there is a network topology change, BGP may take time to converge on a new optimal route, which could cause temporary routing loops or black holes, leading to downtime or degraded performance.
* BGP Security: Routing security issues like BGP hijacking can be a concern. If not properly secured, attackers can manipulate routes, potentially intercepting or redirecting traffic between an enterprise and a cloud data center.

4. Overlapping IP Addresses:
* IP Address Conflicts: When connecting multiple cloud environments or when integrating with on-premises networks, organizations may encounter overlapping private IP address spaces (e.g., two networks using the same RFC1918 address space). This creates routing conflicts and requires address translation (e.g., NAT) or careful IP planning.
* NAT Complexity: Network Address Translation (NAT) is often used to resolve overlapping IPs, but it adds complexity to routing, and troubleshooting connectivity issues can become more difficult.

5. Routing Scalability:
* Large Route Tables: Cloud environments often host a large number of subnets, virtual machines (VMs), and applications, which results in significant route table growth. On-premises routers may struggle to handle the large number of routes advertised by cloud data centers.
* Route Aggregation: To manage large routing tables, route aggregation is essential, but improper aggregation can lead to suboptimal routing or create security issues by allowing unintended access to broader network segments.

6. East-West Traffic Optimization:
* East-West Traffic Challenges: Modern cloud workloads often involve significant east-west traffic (i.e., traffic between different applications or services within the cloud). Efficiently routing this traffic between cloud regions or between an on-premises data center and the cloud can be challenging, especially if cross-region bandwidth or routing constraints exist.

7. Latency and Bandwidth Considerations:
* Performance Over Public Internet: Connecting to a cloud DC over the public internet introduces unpredictable latency and limited control over the routing path. Enterprises may use dedicated connectivity solutions like AWS Direct Connect or Azure ExpressRoute to avoid the public internet and achieve more predictable performance, but these solutions come with additional cost and complexity.
* Bandwidth Costs: Cloud providers often charge for egress traffic (traffic leaving the cloud data center). Suboptimal routing can increase data transfer costs if traffic is unnecessarily routed through expensive pathways.

8. Route Propagation and Policy Enforcement:
* Consistent Route Propagation: Propagating routes between an on-premises network and a cloud data center can be inconsistent, especially when using complex routing policies. Enterprises need to carefully manage route redistribution between different routing domains (e.g., BGP on-premises and cloud provider proprietary routing).
* Policy Control: Implementing consistent routing policies (e.g., security, load balancing, and traffic engineering policies) across cloud and on-premises environments can be challenging due to the different tools and mechanisms used by cloud providers.

9. Routing Security:
* Securing Routing Information: When using BGP to connect to cloud data centers, securing routing information is crucial. BGP hijacking and route leaks can lead to malicious traffic redirection. Organizations need to implement security measures like BGP authentication, RPKI (Resource Public Key Infrastructure), and route filtering to prevent unauthorized route advertisements.
* Encryption and Privacy: Data traveling between an enterprise and the cloud may need encryption to protect against eavesdropping. Implementing encrypted tunnels (e.g., IPSec VPN) can add complexity to the routing setup.

10. Failover and High Availability:
* Redundancy and Failover: Ensuring high availability in cloud connectivity involves setting up redundant links and implementing fast failover mechanisms to ensure traffic is re-routed quickly in the event of a link failure. However, configuring effective failover paths that meet performance and cost requirements can be complex, especially across different clouds or between cloud and on-premises environments.
* Dynamic Failover: In hybrid environments, ensuring that routes dynamically change during failover scenarios can be difficult due to the different routing protocols or static routes used in cloud environments.

11. Geographic Routing and Data Residency:
* Compliance and Regulation: Enterprises may face legal and regulatory challenges regarding where data is routed. For instance, data residency requirements (e.g., GDPR) may mandate that certain data be routed or stored only within specific geographical regions. Ensuring that routing policies comply with these regulations across cloud and on-premises environments can be a complex issue.
* Geographic Load Balancing: Routing traffic to cloud data centers in different regions to optimize for performance or compliance requires careful planning and monitoring.


743 7. Security Considerations
744
745   The security issues in terms of networking to Cloud DCs include

[DISCUSS2]
Enterprises connecting to cloud data centers must address a wide range of security concerns, from ensuring encrypted communications and controlling access, to securing routing protocols and complying with regulatory requirements. By employing robust encryption, strong access controls, comprehensive monitoring, and segmentation strategies, organizations can mitigate risks and securely connect their on-premises infrastructure to cloud environments. Additionally, leveraging the security tools and services provided by cloud vendors can help ensure that the network and data remain protected. A security section should investigate these to provide an holistic security overview. While not all of these have direct impact upon routing, or should even be standardized, it is important for enterprises to have a secure and robust cloud DC experience.

1. Encryption of Data in Transit:
* End-to-End Encryption: Data traveling between on-premises infrastructure and the cloud should be encrypted to protect against interception and eavesdropping. Common methods include using IPsec VPNs, SSL/TLS, or private connectivity options like AWS Direct Connect or Azure ExpressRoute, which provide secure, dedicated connections to the cloud.
* Encrypted Tunnels: Secure tunnels (IPsec, SSL, or GRE) can be used to ensure data confidentiality and integrity during transmission. Encryption helps mitigate man-in-the-middle attacks.

2. Authentication and Access Control:
* Strong Authentication Mechanisms: Employ strong, multi-factor authentication (MFA) for accessing both on-premises and cloud resources. Implement VPN access control to ensure only authorized users and devices can establish connections to cloud environments.
* Identity and Access Management (IAM): Use IAM policies to control who can access resources in the cloud. Ensure that IAM roles are tightly controlled and that users and applications only have the minimum permissions they need (principle of least privilege).

3. Secure Routing Protocols:
* BGP Security: If using Border Gateway Protocol (BGP) to connect to cloud services, protect the routing protocol by implementing BGP authentication (using for example TCP-AO) and route filtering to prevent unauthorized or incorrect routing information from being accepted.
* Route Filtering: Control which routes are propagated between on-premises networks and the cloud to prevent route leaks, which could expose sensitive routes to external parties or misdirect traffic.
* RPKI (Resource Public Key Infrastructure): Consider using RPKI to prevent BGP hijacking, ensuring that the routes being advertised are valid and have not been tampered with.

4. Network Segmentation:
* Isolating Traffic: Use Virtual Private Clouds (VPCs) and subnet segmentation to isolate traffic between different departments, workloads, or tenants. This ensures that sensitive data is not exposed to unauthorized users within the same cloud environment.
* Private Connectivity: Use private connectivity options (e.g., AWS Direct Connect, Azure ExpressRoute) to avoid sending sensitive data over the public internet, reducing the risk of exposure to attacks.

5. Data Encryption at Rest:
* Cloud Data Encryption: Ensure that data stored in the cloud is encrypted at rest. Many cloud providers offer encryption services (e.g., AWS Key Management Service, Azure Key Vault) to manage encryption keys securely. Consider using customer-managed keys for additional control over encryption processes.
* Compliance with Encryption Standards: Ensure that encryption protocols comply with industry standards and regulatory requirements (e.g., AES-256 encryption for sensitive data).

6. Visibility and Monitoring:
* Traffic Monitoring: Use tools like cloud network traffic analyzers or intrusion detection systems to monitor traffic between on-premises infrastructure and cloud environments. Detect anomalous behavior or unauthorized access attempts by maintaining visibility into network traffic.
* Logging and Auditing: Enable comprehensive logging of all access and configuration changes in both on-premises and cloud environments. Cloud providers often offer logging services like AWS CloudTrail or Azure Monitor to track user activity and help detect security breaches.
* Threat Detection and Response: Deploy security tools that offer threat detection, real-time monitoring, and automated response. Solutions like SIEM (Security Information and Event Management) systems can help correlate events across the hybrid cloud to detect security incidents.

7. DDoS Protection:
* Distributed Denial of Service (DDoS) Protection: Cloud data centers can be targets of DDoS attacks, which can disrupt network services. Cloud providers offer DDoS mitigation services (e.g., AWS Shield, Azure DDoS Protection) that can protect both the cloud environment and the connection to on-premises infrastructure.
* Rate Limiting: Implement rate limiting and other traffic control mechanisms to prevent network saturation during potential attacks.

8. Firewalls and Security Groups:
* Network Firewalls: Use firewalls to control traffic flowing between on-premises networks and cloud environments. Cloud providers offer virtual firewalls that can be configured to enforce strict access controls.
* Security Groups: Implement security groups and network ACLs (Access Control Lists) to control inbound and outbound traffic at the VPC or subnet level. These mechanisms should be used to restrict access to only those IP addresses or protocols that are necessary.

9. Zero Trust Security Model:
* Zero Trust: Adopt a Zero Trust model that assumes no network (internal or external) is automatically trusted. Every access request should be verified, and users, devices, and applications should be authenticated before being allowed access to resources.
* Microsegmentation: Use microsegmentation to further isolate workloads within the cloud, ensuring that even if an attacker gains access to one part of the network, they cannot easily move laterally.

10. Compliance and Regulatory Considerations:
* Data Sovereignty and Residency: Ensure compliance with data sovereignty laws (e.g., GDPR) by enforcing routing policies that keep sensitive data within specified geographical regions.
* Encryption for Compliance: Encrypt sensitive data both in transit and at rest to meet regulatory requirements like HIPAA, PCI-DSS, or GDPR. Cloud providers often offer compliance certification, but it's important to ensure the proper configurations are in place.
* Auditing and Reporting: Regularly audit the security posture of the hybrid cloud environment to ensure ongoing compliance with security standards and regulations.

11. Network Access Control:
* VPN Access: Use VPN gateways to securely connect on-premises networks to cloud environments, encrypting traffic between the two endpoints.
* Multi-Factor Authentication (MFA): Implement MFA for users and administrators accessing cloud resources remotely to add an extra layer of security.

12. Patch Management and Vulnerability Scanning:
* Patch Cloud Resources: Ensure that virtual machines, containers, and other cloud resources are regularly patched to protect against vulnerabilities. Leverage automated tools for patch management across both on-premises and cloud environments.
* Vulnerability Scanning: Regularly scan cloud environments for vulnerabilities and misconfigurations that could be exploited by attackers.

13. Distributed Workloads and Traffic Control:
* Load Balancing: Use cloud-based load balancers to evenly distribute traffic across multiple servers and data centers, reducing the risk of congestion or single points of failure.
* Content Delivery Networks (CDNs): Use CDNs to distribute content closer to users, reducing latency and improving performance while also offering security benefits such as DDoS protection and content encryption.

14. Incident Response Plan:
* Develop a Cloud-Specific Incident Response Plan: Ensure that the organization's incident response plan accounts for both on-premises and cloud environments. This includes identifying responsibilities, communication channels, and the tools needed to detect, investigate, and respond to security incidents.
* Automated Responses: Consider automating certain responses, such as shutting down suspicious instances, revoking access, or blocking traffic, based on pre-defined security rules.
2024-09-19
41 Gunter Van de Velde [Ballot Position Update] New position, Discuss, has been recorded for Gunter Van de Velde
2024-09-19
41 Éric Vyncke
[Ballot discuss]
# Éric Vyncke, INT AD, comments for draft-ietf-rtgwg-net2cloud-problem-statement-41

Thank you for the work put into this document, I can imagine the amount of …
[Ballot discuss]
# Éric Vyncke, INT AD, comments for draft-ietf-rtgwg-net2cloud-problem-statement-41

Thank you for the work put into this document, I can imagine the amount of work with 41 versions :-) but after balloting several DISCUSS points, I stopped reviewing it after section 3.7. I am also supportive of John's DISCUSS position.

Please find below several DISCUSS points, some non-blocking COMMENT points (but replies would be appreciated even if only for my own education).

Special thanks to Joel M. Halpern for the shepherd's detailed write-up including the WG consensus (`While there was not widespread support`) and the justification of the intended status.

I hope that this review helps to improve the document,

Regards,

-éric


# DISCUSS (blocking)

As noted in https://www.ietf.org/blog/handling-iesg-ballot-positions/, a DISCUSS ballot is a request to have a discussion on the following topics:

## Copyright

Wrong template is used as `Simplified BSD License` should be "Revised BSD License".

## Section 3.5

AFAIK, the ".internal" is not a special-use domain name listed by IANA (and AFAIK not yet approved by ICANN), so, please be clear about this status (i.e., squatting a domain) in the document.

## Section 3.6

In 2024, such an I-D must care about IPv6 and not too much about IPv4 NAT.

If this document insists to use some commercial cloud references, then please use also non-US-based cloud offerings.

## Section 3.7

What is `IPv6 optional header` ?
2024-09-19
41 Éric Vyncke
[Ballot comment]

# COMMENTS (non-blocking)

## Abstract

Like already noticed by other ADs, the date 2023 in the abstract is seriously outdated, the document should …
[Ballot comment]

# COMMENTS (non-blocking)

## Abstract

Like already noticed by other ADs, the date 2023 in the abstract is seriously outdated, the document should be refreshed for content and the date moved to 2024. But, better having a date than no date at all...

## Section 2

`Third party Data Centers` I am not sure whether "3rd party" applies when the cloud DC is used only by the employees.

`private clouds` should probably be defined to avoid any ambiguity.

Should "SD-WAN" be expanded ?

## Section 3

`This section identifies some high-level problems that the IETF could address` sounds like the IETF has failed, please rephrase (e.g., using "IETF Technologies").

## Section 3.1

Should `Public Cloud DCs` be explicitly defined ?

`to form an IP adjacency` unsure what IP adjacency means, the adjacency term is often using for a layer-2 link between layer-3 nodes (e.g., OSPF), suggest using iBGP.

More generally, the (valid) recommendations seem to apply to any peering and not really related to cloud DC.

## Section 3.2

Please defined "pod".

I will welcome explanations about the 2nd paragraph.

I fail to see about EVPN is related to Cloud DC.

## Section 3.3

s/with an IP address/with IP addresses/ ?

Should the multiple interfaces (3GPP & Wi-Fi) issues be cited ?

## Section 3.4

Suggest to introduce the acronyms in section 2.

## Section 3.5

Please note that draft-ietf-add-split-horizon-authority is not about split horizon DNS (even if it is related), please use another reference.

## Section 3.6

What is "AWS Direct Connect" ? or even what is "AWS" ? (to be honest, I know but do not expect any IETF reader to know those commercial terms).
2024-09-19
41 Éric Vyncke [Ballot Position Update] New position, Discuss, has been recorded for Éric Vyncke
2024-09-18
41 Murray Kucherawy
[Ballot comment]
John's and Paul's primary DISCUSS positions nicely articulate the reason for this ABSTAIN.  You might be able to make this more palatable by …
[Ballot comment]
John's and Paul's primary DISCUSS positions nicely articulate the reason for this ABSTAIN.  You might be able to make this more palatable by removing the specific product references and instead find a way to be more generic (some providers do X, others do X with variant Y, still another does Z), but it's going to take a bit of work if you want to go that route.  You got all the way to Section 3.6 without them, for example.

Other comments:

None of the authors claim to represent the cloud operators referenced in the document, and I'm not familiar with all of the names in Section 10, so I'll ask: Did this document get feedback or input from any of those operators?

The Abstract says 2023 but at this point we're pretty far into 2024.  Is this material still timely?

As this document is Informational, I don't think you should use BCP 14.  (It's barely used anyway.)

Section 2 defines "Heterogeneous Cloud", but this term is not used elsewhere in the document.

In Section 3.5, I recommend quoting ".internal".  It looks like a syntax error without the quoting, at least as rendered in HTML.

Shouldn't references like [AWS-NAT] have links or some other actual followable reference?
2024-09-18
41 Murray Kucherawy Ballot comment text updated for Murray Kucherawy
2024-09-18
41 Murray Kucherawy [Ballot comment]
John and Paul's DISCUSS positions nicely articulate the reason for this ABSTAIN.
2024-09-18
41 Murray Kucherawy [Ballot Position Update] New position, Abstain, has been recorded for Murray Kucherawy
2024-09-18
41 Paul Wouters
[Ballot discuss]
I support John's DISCUSS, and also lean towards balloting Abstain, for much of the same reasons John already mentioned. While this might be …
[Ballot discuss]
I support John's DISCUSS, and also lean towards balloting Abstain, for much of the same reasons John already mentioned. While this might be a useful document for certain people, I do not think this is an IETF document.

My view of the world might be different from the authors with respect to requiring BGP to interact with many cloud services. It seems quite common to use VPNs and NATs to tie things together from on-premise to cloud services using VPCs without ever needing BGP at all.

On the IPsec part, I find it strange that RFC4535 is mentioned as there is no requirement for shared group keys or multicast support. One would expect each IPsec tunnel to have independent security properties from the other IPsec tunnels between Cloud DCs, on-premise DC and branch locations. I do not believe a one overarching IPsec management solution could tie these various networks together via IPsec. IPsec (IKE) key management for site-to-site connections what all these kind of IPsec connections are are "setup and forget" type deployments requiring no further key management.

There is clearly some interesting operations and commercial advise in the document, but it is very much a snapshot that will not age well. I don't think the IETF is where this should be published.
2024-09-18
41 Paul Wouters [Ballot Position Update] New position, Discuss, has been recorded for Paul Wouters
2024-09-18
41 John Scudder
[Ballot discuss]
Much of this document seems to be a high-level outline of particular commercial offerings, which among other problems, will not age well. Other …
[Ballot discuss]
Much of this document seems to be a high-level outline of particular commercial offerings, which among other problems, will not age well. Other parts outline challenges that are already solved, using existing IETF technologies or general remarks about best practices for operating networks. Yet other parts provide brief sketches of other SDOs' technologies or architectures. Overall, I don't think this is a valuable document for the IETF to be publishing as part of the RFC series, and as such I expect to eventually ballot Abstain.

I do, however, have a few concerns about the document which warrant a DISCUSSion, first.

## DISCUSS

### This isn't a requirements document; I think that should be made clearer

Sometimes the IETF publishes requirements documents, which when issued as RFCs are seen as having some standing to establish that a given technology must be developed or advanced. The present document introduces itself as a problem statement document, but Section 6 is called "requirements".

My concern arises because throughout the document there are pointers to places in the IETF (WGs, drafts) where there is work in progress. I would prefer to avoid any ambiguity down the road, as to whether these citations are just for the information of the reader as examples, or something more. I'm open to solutions, but perhaps something like this, as a final paragraph of the introduction?

NEW:
  This document provides references to IETF working groups and Internet
  Drafts that relate to the subject. These references are provided as
  examples and for the information of the reader, and should not be
  interpreted as requiring the adoption or implementation of any
  particular solution. Certain high-level requirements are presented
  in Section 6; these requirements are agnostic as to what solutions
  should fulfill them.
 
To be clear, my concern is that the document can easily be read as privileging a certain set of solutions. Those might be the best solutions, I don't know, but I don't think it is the place of a problem statement or requirements document to mandate solutions.
 
### Inscrutable paragraph in Section 3.1

2. Section 3.1 includes the following paragraph:

    - A Cloud DC GW typically has multiple eBGP sessions with various
        clients and sets a route limit for each one. Therefore, on-
        premises data center gateways with eBGP sessions to the Cloud
        DC GW should configure default routes and filter out as many
        routes as possible, replacing them with a default route in
        their eBGP advertisements. This approach minimizes the number
        of routes exchanged with the Cloud DC eBGP peers.

I simply can't understand what this paragraph is telling me to do. This would be partly remedied -- and the document improved overall -- if there were an earlier section providing a reference model and defining terms such as "Cloud DC GW", and illustrating the flow of routing information between elements. Since there is no such model, and since the prose quoted isn't clear, the reader is left to use their imagination, which is the opposite of what we strive for in our RFCs.

I would suggest a rewrite but I can't discern even enough of your intent to offer one, I'm sorry. I guess my imagination has failed me.

### Section 3.2, no IGP

  As described in [RFC7938], a Cloud DC might not have an IGP to route
  around link/node failures within its domain.
 
Are you saying that because there's no IGP the Cloud DC can't route around failures? Surely not, this is the opposite of what RFC 7938 describes. But it's sure what it sounds like.
 
  When a site failure
  happens, the Cloud DC GW visible to clients is running fine;
  therefore, the site failure is not detectable by the clients using
  Bidirectional Forwarding Detection (BFD)[RFC5880].

This doesn't make any sense to me. Again, perhaps a reference model showing the relationship of a "Cloud DC GW", a "site", where BFD would be running, etc, might have helped.
2024-09-18
41 John Scudder
[Ballot comment]
## COMMENT

### Section 3.1, Capability Mismatch

I don't understand what this means:

  Capability
  mismatch can cause BGP sessions not being …
[Ballot comment]
## COMMENT

### Section 3.1, Capability Mismatch

I don't understand what this means:

  Capability
  mismatch can cause BGP sessions not being adequately established.

The "mitigation practices" basically amount to "follow the relevant standards". Is the quoted text trying to say something like "implementations that have bugs or don't follow the standards may not work right"? Generally, we don't need an RFC to say that, it's akin to the classic "MUST NOT write bugs".

### Section 3.2, Huge number... problem

  When a site failure occurs, many services can be impacted. When the
  impacted services' IP prefixes in a Cloud DC are not aggregated
  nicely, which is common, one single site failure can trigger a huge
  number of BGP UPDATE messages. There are proposals, such as
  [METADATA-PATH], to enhance BGP advertisements to address this
  problem.

Is there some supporting evidence that the O(N) nature of BGP convergence is a "problem" in this context? I mean, sure, O(1) is nicer than O(N), but there are many O(N) operations we choose not to optimize because they don't need optimizing. I haven't seen evidence presented that convinces me this needs optimizing.

Rather than debate this point, one possible way to address it would be to reword in some more factual way, such as,

NEW:
  When a site failure occurs, many services can be impacted. When the
  impacted services' IP prefixes in a Cloud DC are not aggregated
  nicely, which is common, one single site failure can trigger multiple
  BGP UPDATE messages. There are proposals, such as
  [METADATA-PATH], to enhance BGP advertisements to reduce the number
  of messages required.
 
### Section 3.4, UEs can move

  Here are some network problems with connecting to the services in
  the 5G Edge Clouds:
...
      3) Source (UEs) can ingress from different LDN Ingress routers
          due to mobility.

How is that a "problem"?

### Section 6, IPSec requirement

    - Should support scalable IPsec key management among all nodes
        involved in DC interconnect schemes.

But you don't say that it's a requirement for a solution to be IPSec-based at all. For a solution that isn't IPSec-based, this requirement is moot. Perhaps,

NEW:
    - Should support scalable IPsec key management among all nodes
        involved in DC interconnect schemes, if IPSec is used as
        a VPN technology.

### Section 6, AZ

    - Should support traffic steering to distribute loads across
        regions/AZs based on performance/availability of workloads in

You've never defined "AZ". Please do, or remove.

### Section 7, anti-DDoS

        a) Potential DDoS (Distributed Denial of Service) attack to the
        ports facing the untrusted network (e.g., the public internet),
        which may propagate to the cloud edge resources. To mitigate
        such security risk, it is necessary for the ports facing
        internet to enable Anti-DDoS features.

Can you be specific about what "anti-DDoS features" are? You make it sound as though there's some way to configure "port xyz1/2 no ddos" and the problem goes away. To my knowledge, such "anti-DDoS features" don't exist. If they do, please cite examples. If they don't, something about this needs to change; minimally, delete the "to mitigate" sentence.
2024-09-18
41 John Scudder [Ballot Position Update] New position, Discuss, has been recorded for John Scudder
2024-09-18
41 Orie Steele [Ballot comment]
Thanks to Rich Salz for the ART ART review.
2024-09-18
41 Orie Steele [Ballot Position Update] New position, No Objection, has been recorded for Orie Steele
2024-09-18
41 Zaheduzzaman Sarker
[Ballot comment]
Thanks for working on this document.

I don't comments from transport protocol aspects, however, I have following observations which I believe will improve …
[Ballot comment]
Thanks for working on this document.

I don't comments from transport protocol aspects, however, I have following observations which I believe will improve the document when addressed -

# Section 3.4 : this section need to relate the listed issues to networking problem. It says -

      1) The difference in routing distances to server instances in
          different edge Clouds is relatively small. Therefore, the
          instance in the Edge Cloud with the shortest routing distance
          from a 5G UPF might not be the best in providing the overall
          low latency service.

    So, this becomes mainly resource selection issue as routng distance is not an issue.
     
      2) Capacity status at the Edge Cloud might play a more
          significant role in end-to-end performance.
   
    Again not sure how this becomes networking issue.

      3) Source (UEs) can ingress from different LDN Ingress routers
          due to mobility.

    Does the routing distance become a issue now?

# Section 3.4 : I also think the text is speculative regarding CATS WG and may be unnecessary as [METADATA-PATH] is already solving the issues.

# Section 3.6 : is there any generic way to solve the NAT related issue listed or will it be always Cloud operator specific configuration?
2024-09-18
41 Zaheduzzaman Sarker [Ballot Position Update] New position, No Objection, has been recorded for Zaheduzzaman Sarker
2024-09-17
41 Roman Danyliw
[Ballot comment]
Thank you to Paul Kyzivat for the GENART review.

** Section 3.

  This section identifies some high-level problems that the IETF could …
[Ballot comment]
Thank you to Paul Kyzivat for the GENART review.

** Section 3.

  This section identifies some high-level problems that the IETF could
  address, especially within the Routing area. Other Cloud DC problems
  (e.g., managing cloud spending) are out of the scope of this
  document.

The scope of what collection of problems will be described in this document is made less clear by this paragraph.

What makes these IETF problem to solve?

** Section 3

  Here are the recommended mitigation practices:

    - If a Cloud Gateway (GW), a BGP speaker, receives from its BGP
        peer a capability that it does not itself support or recognize,
        it MUST ignore that capability, and the BGP session MUST NOT be
        terminated per [RFC5492].
    - When receiving a BGP UPDATE with a malformed attribute, the
        revised BGP error handling procedure in [RFC7606] should be
        followed instead of session resetting.

Does this amount to saying, “just follow RFC7606”?

I’m having trouble understanding how this guidance differs from existing PS documents.

** Section 3.  Speculative text about IETF WG.

-- Section 3.1
      Although this is beyond the scope of this document,
        further discussion in the IETF Inter-Domain Routing (IDR)
        Working Group is needed. This could lead to the addition of new
        subcodes in RFC4486 Section 3 and corresponding descriptions in
        RFC4486 Section 4 to facilitate this more efficient approach.

-- Section 3.4
  The IETF CATS (Computing-Aware Traffic Steering) working group is
  examining general aspects of this space, and may come up with
  protocol recommendations for this information exchange.

Is this text needed?  Why speculate on the activity of other WGs?

** Section 3.3. 
-- Which subset of the problem described here (i.e., bulleted list after “Here are some problems associated with DNS-based solutions”) are addressed by the mitigations described later in this section.

-- What protocol behavior is envisioned to address a “misbehaving client”?

** Section 3.4

[METADATA-PATH] describes a mechanism to get around those problem.

If [METADATA-PATH] is a solution.  Why is this section describing a solved problem?  Is this section needed?

** Section 3.7
One of the concerns of enterprises using Cloud services is the lack
  of awareness of the locations of their services hosted in the Cloud,
  as Cloud operators can move the service instances from one place to
  another. While the geographic locations are usually exposed to the
  enterprises, such as Availability Zones or Regions, the topological
  location is usually hidden.

Is this a technical problem or a contractual problem?  Could the problem statement be refined?  The customer is buying a PaaS or some other kind of *aaS, but they don’t understand where in the service provider’s network it is being run beyond high level descriptions like Zone or Region?  How would the customer get that information?

What is topological information this context?

** Section 3.7
  For enterprises that instantiate virtual routers in Cloud DCs,
  metadata can be attached (e.g., GENEVE [RFC8926] header or IPv6
  optional header) to indicate additional properties, including useful
  information about the sites where they are instantiated.

What remains unsolved after using IPv6 optional headers (is there a specific mechanism) or GENEVE?

** Section 4 and 5.  What problem are these sections describing?  In particular, Section 4 seems to be referencing vendor specific procedures.  Will these statements age well?
2024-09-17
41 Roman Danyliw [Ballot Position Update] New position, No Objection, has been recorded for Roman Danyliw
2024-09-14
41 Erik Kline
[Ballot comment]
# Internet AD comments for draft-ietf-rtgwg-net2cloud-problem-statement-41
CC @ekline

* comment syntax:
  - https://github.com/mnot/ietf-comments/blob/main/format.md

* "Handling Ballot Positions":
  - https://ietf.org/about/groups/iesg/statements/handling-ballot-positions/

## Comments …
[Ballot comment]
# Internet AD comments for draft-ietf-rtgwg-net2cloud-problem-statement-41
CC @ekline

* comment syntax:
  - https://github.com/mnot/ietf-comments/blob/main/format.md

* "Handling Ballot Positions":
  - https://ietf.org/about/groups/iesg/statements/handling-ballot-positions/

## Comments

### S2

* Based on a quick search for the various keywords, and the fact that this
  is an Informational doc, I think you delete the keywords text and the
  associated bibliographic entries.

### S3.*

* Should there be some text about managing end-to-end connectivity when NAT
  is not being used? For IPv6 in particular, it can be surprising to some
  that nodes might be reachable. Broadly, the issue of managing firewalls
  and permitted/denied communications might be an area of concern on its own.
  Developing proper text, though, probably requires going back to the working
  group and/or through IETF LC (which I assume folks don't want to do).

### S3.7

* Any solution that involves attaching metadata must also specify how that
  metadata can be authenticated/validated. I would suggest just saying that
  there's a security requirement for this for any solution in this area.
2024-09-14
41 Erik Kline [Ballot Position Update] New position, No Objection, has been recorded for Erik Kline
2024-09-10
41 Mike Ounsworth Request for Early review by SECDIR Completed: Has Issues. Reviewer: Mike Ounsworth. Sent review to list.
2024-09-09
41 Shuping Peng Request for Early review by RTGDIR Completed: Ready. Reviewer: Shuping Peng. Sent review to list.
2024-09-08
41 David Lawrence Request for Last Call review by DNSDIR Completed: Ready. Reviewer: David Lawrence. Sent review to list. Submission of review completed at an earlier date.
2024-09-08
41 David Lawrence Request for Last Call review by DNSDIR Completed: Ready. Reviewer: David Lawrence.
2024-09-04
41 Jenny Bui Placed on agenda for telechat - 2024-09-19
2024-09-04
41 Jim Guichard Ballot has been issued
2024-09-04
41 Jim Guichard [Ballot Position Update] New position, Yes, has been recorded for Jim Guichard
2024-09-04
41 Jim Guichard Created "Approve" ballot
2024-09-04
41 Jim Guichard IESG state changed to IESG Evaluation from Waiting for AD Go-Ahead
2024-09-04
41 Jim Guichard Ballot writeup was changed
2024-09-03
41 (System) IESG state changed to Waiting for AD Go-Ahead from In Last Call
2024-08-30
41 Rich Salz Request for Last Call review by ARTART Completed: Ready with Nits. Reviewer: Rich Salz. Sent review to list.
2024-08-30
41 Barry Leiba Request for Last Call review by ARTART is assigned to Rich Salz
2024-08-28
41 (System) IANA Review state changed to IANA OK - No Actions Needed from IANA - Review Needed
2024-08-28
41 David Dong
(Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs:

IANA has completed its review of draft-ietf-rtgwg-net2cloud-problem-statement-41, which is currently in Last Call, and has the following comments:

We …
(Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs:

IANA has completed its review of draft-ietf-rtgwg-net2cloud-problem-statement-41, which is currently in Last Call, and has the following comments:

We understand that this document doesn't require any registry actions.

While it's often helpful for a document's IANA Considerations section to remain in place upon publication even if there are no actions, if the authors strongly prefer to remove it, we do not object.

If this assessment is not accurate, please respond as soon as possible.

For definitions of IANA review states, please see:

https://datatracker.ietf.org/help/state/draft/iana-review

Thank you,

David Dong
IANA Services Sr. Specialist
2024-08-22
41 Tero Kivinen Request for Early review by SECDIR is assigned to Mike Ounsworth
2024-08-22
41 Carlos Pignataro Request for Early review by OPSDIR is assigned to Susan Hares
2024-08-21
41 Daniam Henriques Request for Early review by RTGDIR is assigned to Shuping Peng
2024-08-21
41 Jim Reid Request for Last Call review by DNSDIR is assigned to David Lawrence
2024-08-20
41 Jenny Bui IANA Review state changed to IANA - Review Needed
2024-08-20
41 Jenny Bui
The following Last Call announcement was sent out (ends 2024-09-03):

From: The IESG
To: IETF-Announce
CC: draft-ietf-rtgwg-net2cloud-problem-statement@ietf.org, james.n.guichard@futurewei.com, jmh@joelhalpern.com, rtgwg-chairs@ietf.org, rtgwg@ietf.org …
The following Last Call announcement was sent out (ends 2024-09-03):

From: The IESG
To: IETF-Announce
CC: draft-ietf-rtgwg-net2cloud-problem-statement@ietf.org, james.n.guichard@futurewei.com, jmh@joelhalpern.com, rtgwg-chairs@ietf.org, rtgwg@ietf.org
Reply-To: last-call@ietf.org
Sender:
Subject: Last Call:  (Dynamic Networks to Hybrid Cloud DCs: Problems and Mitigation Practices) to Informational RFC


The IESG has received a request from the Routing Area Working Group WG
(rtgwg) to consider the following document: - 'Dynamic Networks to Hybrid
Cloud DCs: Problems and Mitigation
  Practices'
  as Informational RFC

The IESG plans to make a decision in the next few weeks, and solicits final
comments on this action. Please send substantive comments to the
last-call@ietf.org mailing lists by 2024-09-03. Exceptionally, comments may
be sent to iesg@ietf.org instead. In either case, please retain the beginning
of the Subject line to allow automated sorting.

Abstract


  This document describes a set of network-related problems
  enterprises face at the time of writing this document (2023) when
  interconnecting their branch offices with dynamic workloads in
  third-party data centers (DCs) (a.k.a. Cloud DCs). These problems
  are mainly from enterprises with conventional VPN services that want
  to leverage those networks (instead of altogether abandoning them).
  This document also describes various mitigation practices and
  actions to soften the issues induced by these problems.




The file can be obtained via
https://datatracker.ietf.org/doc/draft-ietf-rtgwg-net2cloud-problem-statement/



No IPR declarations have been submitted directly on this I-D.




2024-08-20
41 Jenny Bui IESG state changed to In Last Call from Last Call Requested
2024-08-20
41 Jim Guichard Last call was requested
2024-08-20
41 Jim Guichard Last call announcement was generated
2024-08-20
41 Jim Guichard Ballot approval text was generated
2024-08-20
41 Jim Guichard Ballot writeup was generated
2024-08-20
41 Jim Guichard IESG state changed to Last Call Requested from AD Evaluation::AD Followup
2024-08-20
41 Jim Guichard Requested Early review by RTGDIR
2024-08-20
41 Jim Guichard Requested Early review by OPSDIR
2024-08-20
41 Jim Guichard Requested Early review by SECDIR
2024-08-19
41 (System) Changed action holders to Jim Guichard (IESG state changed)
2024-08-19
41 (System) Sub state has been changed to AD Followup from Revised I-D Needed
2024-08-19
41 Linda Dunbar New version available: draft-ietf-rtgwg-net2cloud-problem-statement-41.txt
2024-08-19
41 Linda Dunbar New version accepted (logged-in submitter: Linda Dunbar)
2024-08-19
41 Linda Dunbar Uploaded new revision
2024-08-18
40 (System) Changed action holders to Andy Malis, Christian Jacquenet, Linda Dunbar, Mehmet Toy, Kausik Majumdar (IESG state changed)
2024-08-18
40 Jim Guichard IESG state changed to AD Evaluation::Revised I-D Needed from AD Evaluation::AD Followup
2024-08-16
40 (System) Changed action holders to Jim Guichard (IESG state changed)
2024-08-16
40 (System) Sub state has been changed to AD Followup from Revised I-D Needed
2024-08-16
40 Linda Dunbar New version available: draft-ietf-rtgwg-net2cloud-problem-statement-40.txt
2024-08-16
40 Linda Dunbar New version accepted (logged-in submitter: Linda Dunbar)
2024-08-16
40 Linda Dunbar Uploaded new revision
2024-08-16
39 (System) Changed action holders to Andy Malis, Christian Jacquenet, Linda Dunbar, Mehmet Toy, Kausik Majumdar (IESG state changed)
2024-08-16
39 Jim Guichard IESG state changed to AD Evaluation::Revised I-D Needed from AD Evaluation
2024-08-16
39 Jim Guichard AD review provided === https://mailarchive.ietf.org/arch/msg/rtgwg/9YudHqMaZWgINlaH6dBW8f3rLNU/ ===
2024-07-30
39 Jim Guichard IESG state changed to AD Evaluation from Publication Requested
2024-06-29
39 Jeff Tantsura

# Document History

    (!) Does the working group (WG) consensus represent the strong concurrence of a
    few individuals, with others being …

# Document History

    (!) Does the working group (WG) consensus represent the strong concurrence of a
    few individuals, with others being silent, or did it reach broad agreement

        While there was not widespread support, there was more than sufficient WG support for the document, and no unaddressed concerns.

    (2) Was there controversy about particular points, or were there decisions where
    the consensus was particularly rough?

        There was no significant controversy regarding the document.

    (3) Has anyone threatened an appeal or otherwise indicated extreme discontent? If
    so, please summarize the areas of conflict in separate email messages to the
    responsible Area Director. (It should be in a separate email because this
    questionnaire is publicly available.)

        There have been no threats of appeal that I have heard of.

    (4) For protocol documents, are there existing implementations of the contents of
    the document? Have a significant number of potential implementers indicated
    plans to implement? Are any existing implementations reported somewhere,
    either in the document itself (as RFC 7942 recommends) or elsewhere
    (where)?

        As a problem statement document, this draft does not define protocol.  Some of the suggestions reference other documents, at least some of which have been implemented.

# Additional Reviews

    *5( Do the contents of this document closely interact with technologies in other
    IETF working groups or external organizations, and would it therefore benefit
    from their review? Have those reviews occurred? If yes, describe which
    reviews took place.

        While this document is related to BGP, it does not specify any BGP protocol changes.  I have confirmed  with the IDR chairs that there is no need for formal IDR concurrence, although that WG will be copied on the WG last call.

    (6) Describe how the document meets any required formal expert review criteria,
    such as the MIB Doctor, YANG Doctor, media type, and URI type reviews.

        There is no formal language or other constructs that require formal expert review in this draft.

    (7) If the document contains a YANG module, has the final version of the module
    been checked with any of the recommended validation tools for syntax and
    formatting validation? If there are any resulting errors or warnings, what is
    the justification for not fixing them at this time? Does the YANG module
    comply with the Network Management Datastore Architecture (NMDA) as specified
    in RFC 8342?

        There is no YANG in this draft.

    (8) Describe reviews and automated checks performed to validate sections of the
    final version of the document written in a formal language, such as XML code,
    BNF rules, MIB definitions, CBOR's CDDL, etc.

        There are no formal specifications of this form, and thus no such checks apply.

# Document Shepherd Checks

    (9) Based on the shepherd's review of the document, is it their opinion that this
    document is needed, clearly written, complete, correctly designed, and ready
    to be handed off to the responsible Area Director?

        Yes.  The shepherd has reviewed the document over several iterations.  As far as I can tell, it is now clear, factually correct, and ready to be processed by the AD.

    (10) Several IETF Areas have assembled lists of common issues that their
    reviewers encounter. For which areas have such issues been identified
    and addressed? For which does this still need to happen in subsequent
    reviews?

        The Routing Area does not have such a list of common issues.  As this document falls squarely within the routing area, I do not believe there are problems with common concerns from other areas.

    (11) What type of RFC publication is being requested on the IETF stream (Best
    Current Practice, Proposed Standard, Internet Standard,
    Informational, Experimental or Historic)? Why is this the proper type
    of RFC? Do all Datatracker state attributes correctly reflect this intent?

        This document is intended for Informational status.  It is a description of problems that have been observed in operation, and as such is useful information for the community.

    (12) Have reasonable efforts been made to remind all authors of the intellectual
    property rights (IPR) disclosure obligations described in BCP 79? To
    the best of your knowledge, have all required disclosures been filed? If
    not, explain why. If yes, summarize any relevant discussion, including links
    to publicly-available messages when applicable.

        All authors have been reminded of the IETF IPR rules, and they have indicated that all known, relevant patents have been disclosed.  More precisely, no IPR has been declared against this document.

    (13) Has each author, editor, and contributor shown their willingness to be
    listed as such? If the total number of authors and editors on the front page
    is greater than five, please provide a justification.

        There are five front page authors.  To the best of my knowledge, all are aware of this document being progressed and are willing to be listed as front page authors.  There are no specially named contributors, and there are a number of people whose contributions are acknowledged.

    (14) Document any remaining I-D nits in this document. Simply running the idnits
    tool is not enough; please review the "Content Guidelines" on
    authors.ietf.org. (Also note that the current idnits tool generates
    some incorrect warnings; a rewrite is underway.)

        The only I-D nits complaints are to drafts which have been revised since this was last revised, which I understand to be a non-issue.  I do not see any issues related to the content guidelines on authors.ietf.org.

    (15) Should any informative references be normative or vice-versa? See the IESG
    Statement on Normative and Informative References.

        The arrangement of references seems appropriate to me.  I realize that for Informational documents deciding what is a Normative reference is a judgment call, and others may differ with some of the judgments.

    (16) List any normative references that are not freely available to anyone. Did
    the community have sufficient access to review any such normative
    references?

        All normative references are freely available.  More specifically, all normative references are RFCs.

    (17) Are there any normative downward references (see RFC 3967 and BCP
    97
) that are not already listed in the DOWNREF registry? If so,
    list them.

        As this is intended for publication as an Informational RFC, there are no normative downward references.

    (18) Are there normative references to documents that are not ready to be
    submitted to the IESG for publication or are otherwise in an unclear state?
    If so, what is the plan for their completion?

        As noted in the answer to question 16, all normative references are to published RFCs.

    (19) Will publication of this document change the status of any existing RFCs? If
    so, does the Datatracker metadata correctly reflect this and are those RFCs
    listed on the title page, in the abstract, and discussed in the
    introduction? If not, explain why and point to the part of the document
    where the relationship of this document to these other RFCs is discussed.

        This Informational document does not change the status of any existing documents.

    (20) Describe the document shepherd's review of the IANA considerations section,
    especially with regard to its consistency with the body of the document.
    Confirm that all aspects of the document requiring IANA assignments are
    associated with the appropriate reservations in IANA registries. Confirm
    that any referenced IANA registries have been clearly identified. Confirm
    that each newly created IANA registry specifies its initial contents,
    allocations procedures, and a reasonable name (see RFC 8126).

        The IANA considerations section states that the document requires no IANA actions.

    (21) List any new IANA registries that require Designated Expert Review for
    future allocations. Are the instructions to the Designated Expert clear?
    Please include suggestions of designated experts, if appropriate.

        The IANA considerations section states that the document requires no IANA actions.

2024-06-29
39 Jeff Tantsura IETF WG state changed to Submitted to IESG for Publication from In WG Last Call
2024-06-29
39 Jeff Tantsura IESG state changed to Publication Requested from I-D Exists
2024-06-29
39 (System) Changed action holders to Jim Guichard (IESG state changed)
2024-06-29
39 Jeff Tantsura Responsible AD changed to Jim Guichard
2024-06-29
39 Jeff Tantsura Document is now in IESG state Publication Requested
2024-06-29
39 Jeff Tantsura Tags Doc Shepherd Follow-up Underway, Awaiting External Review/Resolution of Issues Raised cleared.
2024-06-29
39 Jeff Tantsura Intended Status changed to Informational from None
2024-06-29
39 Joel Halpern

# Document History

    (!) Does the working group (WG) consensus represent the strong concurrence of a
    few individuals, with others being …

# Document History

    (!) Does the working group (WG) consensus represent the strong concurrence of a
    few individuals, with others being silent, or did it reach broad agreement

        While there was not widespread support, there was more than sufficient WG support for the document, and no unaddressed concerns.

    (2) Was there controversy about particular points, or were there decisions where
    the consensus was particularly rough?

        There was no significant controversy regarding the document.

    (3) Has anyone threatened an appeal or otherwise indicated extreme discontent? If
    so, please summarize the areas of conflict in separate email messages to the
    responsible Area Director. (It should be in a separate email because this
    questionnaire is publicly available.)

        There have been no threats of appeal that I have heard of.

    (4) For protocol documents, are there existing implementations of the contents of
    the document? Have a significant number of potential implementers indicated
    plans to implement? Are any existing implementations reported somewhere,
    either in the document itself (as RFC 7942 recommends) or elsewhere
    (where)?

        As a problem statement document, this draft does not define protocol.  Some of the suggestions reference other documents, at least some of which have been implemented.

# Additional Reviews

    *5( Do the contents of this document closely interact with technologies in other
    IETF working groups or external organizations, and would it therefore benefit
    from their review? Have those reviews occurred? If yes, describe which
    reviews took place.

        While this document is related to BGP, it does not specify any BGP protocol changes.  I have confirmed  with the IDR chairs that there is no need for formal IDR concurrence, although that WG will be copied on the WG last call.

    (6) Describe how the document meets any required formal expert review criteria,
    such as the MIB Doctor, YANG Doctor, media type, and URI type reviews.

        There is no formal language or other constructs that require formal expert review in this draft.

    (7) If the document contains a YANG module, has the final version of the module
    been checked with any of the recommended validation tools for syntax and
    formatting validation? If there are any resulting errors or warnings, what is
    the justification for not fixing them at this time? Does the YANG module
    comply with the Network Management Datastore Architecture (NMDA) as specified
    in RFC 8342?

        There is no YANG in this draft.

    (8) Describe reviews and automated checks performed to validate sections of the
    final version of the document written in a formal language, such as XML code,
    BNF rules, MIB definitions, CBOR's CDDL, etc.

        There are no formal specifications of this form, and thus no such checks apply.

# Document Shepherd Checks

    (9) Based on the shepherd's review of the document, is it their opinion that this
    document is needed, clearly written, complete, correctly designed, and ready
    to be handed off to the responsible Area Director?

        Yes.  The shepherd has reviewed the document over several iterations.  As far as I can tell, it is now clear, factually correct, and ready to be processed by the AD.

    (10) Several IETF Areas have assembled lists of common issues that their
    reviewers encounter. For which areas have such issues been identified
    and addressed? For which does this still need to happen in subsequent
    reviews?

        The Routing Area does not have such a list of common issues.  As this document falls squarely within the routing area, I do not believe there are problems with common concerns from other areas.

    (11) What type of RFC publication is being requested on the IETF stream (Best
    Current Practice, Proposed Standard, Internet Standard,
    Informational, Experimental or Historic)? Why is this the proper type
    of RFC? Do all Datatracker state attributes correctly reflect this intent?

        This document is intended for Informational status.  It is a description of problems that have been observed in operation, and as such is useful information for the community.

    (12) Have reasonable efforts been made to remind all authors of the intellectual
    property rights (IPR) disclosure obligations described in BCP 79? To
    the best of your knowledge, have all required disclosures been filed? If
    not, explain why. If yes, summarize any relevant discussion, including links
    to publicly-available messages when applicable.

        All authors have been reminded of the IETF IPR rules, and they have indicated that all known, relevant patents have been disclosed.  More precisely, no IPR has been declared against this document.

    (13) Has each author, editor, and contributor shown their willingness to be
    listed as such? If the total number of authors and editors on the front page
    is greater than five, please provide a justification.

        There are five front page authors.  To the best of my knowledge, all are aware of this document being progressed and are willing to be listed as front page authors.  There are no specially named contributors, and there are a number of people whose contributions are acknowledged.

    (14) Document any remaining I-D nits in this document. Simply running the idnits
    tool is not enough; please review the "Content Guidelines" on
    authors.ietf.org. (Also note that the current idnits tool generates
    some incorrect warnings; a rewrite is underway.)

        The only I-D nits complaints are to drafts which have been revised since this was last revised, which I understand to be a non-issue.  I do not see any issues related to the content guidelines on authors.ietf.org.

    (15) Should any informative references be normative or vice-versa? See the IESG
    Statement on Normative and Informative References.

        The arrangement of references seems appropriate to me.  I realize that for Informational documents deciding what is a Normative reference is a judgment call, and others may differ with some of the judgments.

    (16) List any normative references that are not freely available to anyone. Did
    the community have sufficient access to review any such normative
    references?

        All normative references are freely available.  More specifically, all normative references are RFCs.

    (17) Are there any normative downward references (see RFC 3967 and BCP
    97
) that are not already listed in the DOWNREF registry? If so,
    list them.

        As this is intended for publication as an Informational RFC, there are no normative downward references.

    (18) Are there normative references to documents that are not ready to be
    submitted to the IESG for publication or are otherwise in an unclear state?
    If so, what is the plan for their completion?

        As noted in the answer to question 16, all normative references are to published RFCs.

    (19) Will publication of this document change the status of any existing RFCs? If
    so, does the Datatracker metadata correctly reflect this and are those RFCs
    listed on the title page, in the abstract, and discussed in the
    introduction? If not, explain why and point to the part of the document
    where the relationship of this document to these other RFCs is discussed.

        This Informational document does not change the status of any existing documents.

    (20) Describe the document shepherd's review of the IANA considerations section,
    especially with regard to its consistency with the body of the document.
    Confirm that all aspects of the document requiring IANA assignments are
    associated with the appropriate reservations in IANA registries. Confirm
    that any referenced IANA registries have been clearly identified. Confirm
    that each newly created IANA registry specifies its initial contents,
    allocations procedures, and a reasonable name (see RFC 8126).

        The IANA considerations section states that the document requires no IANA actions.

    (21) List any new IANA registries that require Designated Expert Review for
    future allocations. Are the instructions to the Designated Expert clear?
    Please include suggestions of designated experts, if appropriate.

        The IANA considerations section states that the document requires no IANA actions.

2024-04-15
39 Deb Cooley Request for Last Call review by SECDIR Completed: Ready. Reviewer: Deb Cooley. Review has been revised by Deb Cooley.
2024-04-15
39 Linda Dunbar New version available: draft-ietf-rtgwg-net2cloud-problem-statement-39.txt
2024-04-15
39 Linda Dunbar New version accepted (logged-in submitter: Linda Dunbar)
2024-04-15
39 Linda Dunbar Uploaded new revision
2024-04-11
38 Linda Dunbar New version available: draft-ietf-rtgwg-net2cloud-problem-statement-38.txt
2024-04-11
38 Linda Dunbar New version accepted (logged-in submitter: Linda Dunbar)
2024-04-11
38 Linda Dunbar Uploaded new revision
2024-03-18
37 Deb Cooley Request for Last Call review by SECDIR Completed: Has Nits. Reviewer: Deb Cooley. Review has been revised by Deb Cooley.
2024-03-17
37 Linda Dunbar New version available: draft-ietf-rtgwg-net2cloud-problem-statement-37.txt
2024-03-17
37 Linda Dunbar New version accepted (logged-in submitter: Linda Dunbar)
2024-03-17
37 Linda Dunbar Uploaded new revision
2024-03-01
36 Deb Cooley Request for Last Call review by SECDIR Completed: Has Issues. Reviewer: Deb Cooley. Sent review to list.
2024-02-29
36 Tero Kivinen Request for Last Call review by SECDIR is assigned to Deb Cooley
2024-02-27
36 Linda Dunbar New version available: draft-ietf-rtgwg-net2cloud-problem-statement-36.txt
2024-02-27
36 Linda Dunbar New version accepted (logged-in submitter: Linda Dunbar)
2024-02-27
36 Linda Dunbar Uploaded new revision
2024-02-26
35 Yingzhen Qu Requested Last Call review by SECDIR
2024-02-23
35 Linda Dunbar New version available: draft-ietf-rtgwg-net2cloud-problem-statement-35.txt
2024-02-23
35 Linda Dunbar New version accepted (logged-in submitter: Linda Dunbar)
2024-02-23
35 Linda Dunbar Uploaded new revision
2024-02-20
34 Jeff Tantsura
# Document Shepherd Write-Up for Group Documents

*This version is dated 4 July 2022.*

Thank you for your service as a document shepherd. Among the …
# Document Shepherd Write-Up for Group Documents

*This version is dated 4 July 2022.*

Thank you for your service as a document shepherd. Among the responsibilities is
answering the questions in this write-up to give helpful context to Last Call
and Internet Engineering Steering Group ([IESG][1]) reviewers, and your
diligence in completing it is appreciated. The full role of the shepherd is
further described in [RFC 4858][2]. You will need the cooperation of the authors
and editors to complete these checks.

Note that some numbered items contain multiple related questions; please be sure
to answer all of them.

## Document History

1. Does the working group (WG) consensus represent the strong concurrence of a
  few individuals, with others being silent, or did it reach broad agreement?

2. Was there controversy about particular points, or were there decisions where
  the consensus was particularly rough?

3. Has anyone threatened an appeal or otherwise indicated extreme discontent? If
  so, please summarize the areas of conflict in separate email messages to the
  responsible Area Director. (It should be in a separate email because this
  questionnaire is publicly available.)

4. For protocol documents, are there existing implementations of the contents of
  the document? Have a significant number of potential implementers indicated
  plans to implement? Are any existing implementations reported somewhere,
  either in the document itself (as [RFC 7942][3] recommends) or elsewhere
  (where)?

## Additional Reviews

5. Do the contents of this document closely interact with technologies in other
  IETF working groups or external organizations, and would it therefore benefit
  from their review? Have those reviews occurred? If yes, describe which
  reviews took place.

6. Describe how the document meets any required formal expert review criteria,
  such as the MIB Doctor, YANG Doctor, media type, and URI type reviews.

7. If the document contains a YANG module, has the final version of the module
  been checked with any of the [recommended validation tools][4] for syntax and
  formatting validation? If there are any resulting errors or warnings, what is
  the justification for not fixing them at this time? Does the YANG module
  comply with the Network Management Datastore Architecture (NMDA) as specified
  in [RFC 8342][5]?

8. Describe reviews and automated checks performed to validate sections of the
  final version of the document written in a formal language, such as XML code,
  BNF rules, MIB definitions, CBOR's CDDL, etc.

## Document Shepherd Checks

9. Based on the shepherd's review of the document, is it their opinion that this
  document is needed, clearly written, complete, correctly designed, and ready
  to be handed off to the responsible Area Director?

10. Several IETF Areas have assembled [lists of common issues that their
    reviewers encounter][6]. For which areas have such issues been identified
    and addressed? For which does this still need to happen in subsequent
    reviews?

11. What type of RFC publication is being requested on the IETF stream ([Best
    Current Practice][12], [Proposed Standard, Internet Standard][13],
    [Informational, Experimental or Historic][14])? Why is this the proper type
    of RFC? Do all Datatracker state attributes correctly reflect this intent?

12. Have reasonable efforts been made to remind all authors of the intellectual
    property rights (IPR) disclosure obligations described in [BCP 79][7]? To
    the best of your knowledge, have all required disclosures been filed? If
    not, explain why. If yes, summarize any relevant discussion, including links
    to publicly-available messages when applicable.

13. Has each author, editor, and contributor shown their willingness to be
    listed as such? If the total number of authors and editors on the front page
    is greater than five, please provide a justification.

14. Document any remaining I-D nits in this document. Simply running the [idnits
    tool][8] is not enough; please review the ["Content Guidelines" on
    authors.ietf.org][15]. (Also note that the current idnits tool generates
    some incorrect warnings; a rewrite is underway.)

15. Should any informative references be normative or vice-versa? See the [IESG
    Statement on Normative and Informative References][16].

16. List any normative references that are not freely available to anyone. Did
    the community have sufficient access to review any such normative
    references?

17. Are there any normative downward references (see [RFC 3967][9] and [BCP
    97
][10]) that are not already listed in the [DOWNREF registry][17]? If so,
    list them.

18. Are there normative references to documents that are not ready to be
    submitted to the IESG for publication or are otherwise in an unclear state?
    If so, what is the plan for their completion?

19. Will publication of this document change the status of any existing RFCs? If
    so, does the Datatracker metadata correctly reflect this and are those RFCs
    listed on the title page, in the abstract, and discussed in the
    introduction? If not, explain why and point to the part of the document
    where the relationship of this document to these other RFCs is discussed.

20. Describe the document shepherd's review of the IANA considerations section,
    especially with regard to its consistency with the body of the document.
    Confirm that all aspects of the document requiring IANA assignments are
    associated with the appropriate reservations in IANA registries. Confirm
    that any referenced IANA registries have been clearly identified. Confirm
    that each newly created IANA registry specifies its initial contents,
    allocations procedures, and a reasonable name (see [RFC 8126][11]).

21. List any new IANA registries that require Designated Expert Review for
    future allocations. Are the instructions to the Designated Expert clear?
    Please include suggestions of designated experts, if appropriate.

[1]: https://www.ietf.org/about/groups/iesg/
[2]: https://www.rfc-editor.org/rfc/rfc4858.html
[3]: https://www.rfc-editor.org/rfc/rfc7942.html
[4]: https://wiki.ietf.org/group/ops/yang-review-tools
[5]: https://www.rfc-editor.org/rfc/rfc8342.html
[6]: https://wiki.ietf.org/group/iesg/ExpertTopics
[7]: https://www.rfc-editor.org/info/bcp79
[8]: https://www.ietf.org/tools/idnits/
[9]: https://www.rfc-editor.org/rfc/rfc3967.html
[10]: https://www.rfc-editor.org/info/bcp97
[11]: https://www.rfc-editor.org/rfc/rfc8126.html
[12]: https://www.rfc-editor.org/rfc/rfc2026.html#section-5
[13]: https://www.rfc-editor.org/rfc/rfc2026.html#section-4.1
[14]: https://www.rfc-editor.org/rfc/rfc2026.html#section-4.2
[15]: https://authors.ietf.org/en/content-guidelines-overview
[16]: https://www.ietf.org/about/groups/iesg/statements/normative-informative-references/
[17]: https://datatracker.ietf.org/doc/downref/

2024-02-01
34 Linda Dunbar New version available: draft-ietf-rtgwg-net2cloud-problem-statement-34.txt
2024-02-01
34 Linda Dunbar New version accepted (logged-in submitter: Linda Dunbar)
2024-02-01
34 Linda Dunbar Uploaded new revision
2024-01-31
33 Linda Dunbar New version available: draft-ietf-rtgwg-net2cloud-problem-statement-33.txt
2024-01-31
33 Linda Dunbar New version accepted (logged-in submitter: Linda Dunbar)
2024-01-31
33 Linda Dunbar Uploaded new revision
2024-01-24
32 Deb Cooley Request for Early review by SECDIR Completed: Has Issues. Reviewer: Deb Cooley. Review has been revised by Deb Cooley.
2024-01-19
32 Magnus Westerlund Request for Last Call review by TSVART Completed: Ready with Issues. Reviewer: Magnus Westerlund. Sent review to list.
2024-01-15
32 Magnus Westerlund Request for Last Call review by TSVART is assigned to Magnus Westerlund
2024-01-11
32 Deb Cooley Request for Early review by SECDIR Completed: Not Ready. Reviewer: Deb Cooley. Review has been revised by Deb Cooley.
2024-01-09
32 Yingzhen Qu Requested Last Call review by TSVART
2024-01-06
32 Jeff Tantsura Tags Doc Shepherd Follow-up Underway, Awaiting External Review/Resolution of Issues Raised set.
2024-01-06
32 Jeff Tantsura IETF WG state changed to In WG Last Call from WG Document
2023-12-19
32 Linda Dunbar New version available: draft-ietf-rtgwg-net2cloud-problem-statement-32.txt
2023-12-19
32 Linda Dunbar New version accepted (logged-in submitter: Linda Dunbar)
2023-12-19
32 Linda Dunbar Uploaded new revision
2023-12-12
31 Linda Dunbar New version available: draft-ietf-rtgwg-net2cloud-problem-statement-31.txt
2023-12-12
31 Linda Dunbar New version accepted (logged-in submitter: Linda Dunbar)
2023-12-12
31 Linda Dunbar Uploaded new revision
2023-09-22
30 Linda Dunbar New version available: draft-ietf-rtgwg-net2cloud-problem-statement-30.txt
2023-09-22
30 Linda Dunbar New version accepted (logged-in submitter: Linda Dunbar)
2023-09-22
30 Linda Dunbar Uploaded new revision
2023-09-20
29 Yingzhen Qu Notification list changed to jmh@joelhalpern.com because the document shepherd was set
2023-09-20
29 Yingzhen Qu Document shepherd changed to Joel M. Halpern
2023-08-24
29 Linda Dunbar New version available: draft-ietf-rtgwg-net2cloud-problem-statement-29.txt
2023-08-24
29 Linda Dunbar New version accepted (logged-in submitter: Linda Dunbar)
2023-08-24
29 Linda Dunbar Uploaded new revision
2023-08-08
28 Linda Dunbar New version available: draft-ietf-rtgwg-net2cloud-problem-statement-28.txt
2023-08-08
28 Linda Dunbar New version accepted (logged-in submitter: Linda Dunbar)
2023-08-08
28 Linda Dunbar Uploaded new revision
2023-07-26
27 Linda Dunbar New version available: draft-ietf-rtgwg-net2cloud-problem-statement-27.txt
2023-07-26
27 Linda Dunbar New version accepted (logged-in submitter: Linda Dunbar)
2023-07-26
27 Linda Dunbar Uploaded new revision
2023-05-06
26 Benson Muite Request for Early review by INTDIR Completed: Ready with Nits. Reviewer: Benson Muite. Review has been revised by Benson Muite.
2023-05-06
26 Benson Muite Request for Early review by INTDIR Completed: Ready with Nits. Reviewer: Benson Muite. Sent review to list.
2023-04-24
26 Linda Dunbar New version available: draft-ietf-rtgwg-net2cloud-problem-statement-26.txt
2023-04-24
26 Linda Dunbar New version accepted (logged-in submitter: Linda Dunbar)
2023-04-24
26 Linda Dunbar Uploaded new revision
2023-04-19
25 Linda Dunbar New version available: draft-ietf-rtgwg-net2cloud-problem-statement-25.txt
2023-04-19
25 Linda Dunbar New version accepted (logged-in submitter: Linda Dunbar)
2023-04-19
25 Linda Dunbar Uploaded new revision
2023-04-14
24 Linda Dunbar New version available: draft-ietf-rtgwg-net2cloud-problem-statement-24.txt
2023-04-14
24 Linda Dunbar New version accepted (logged-in submitter: Linda Dunbar)
2023-04-14
24 Linda Dunbar Uploaded new revision
2023-04-12
23 Linda Dunbar New version available: draft-ietf-rtgwg-net2cloud-problem-statement-23.txt
2023-04-12
23 Linda Dunbar New version accepted (logged-in submitter: Linda Dunbar)
2023-04-12
23 Linda Dunbar Uploaded new revision
2023-04-11
22 Carlos Jesús Bernardos Request for Early review by INTDIR is assigned to Benson Muite
2023-04-10
22 Sue Request for Early review by OPSDIR Completed: Has Issues. Reviewer: Susan Hares. Sent review to list.
2023-04-09
22 Ines Robles Request for Early review by RTGDIR Completed: Has Issues. Reviewer: Ines Robles. Sent review to list.
2023-04-09
22 Deb Cooley Request for Early review by SECDIR Completed: Not Ready. Reviewer: Deb Cooley. Review has been revised by Deb Cooley.
2023-04-09
22 Deb Cooley Request for Early review by SECDIR Completed: Not Ready. Reviewer: Deb Cooley. Sent review to list.
2023-04-03
22 David Black Request for Early review by TSVART Completed: Not Ready. Reviewer: David Black. Sent review to list.
2023-03-27
22 Florian Obser Request for Early review by DNSDIR Completed: Ready with Nits. Reviewer: Florian Obser. Review has been revised by Florian Obser.
2023-03-27
22 Linda Dunbar New version available: draft-ietf-rtgwg-net2cloud-problem-statement-22.txt
2023-03-27
22 Linda Dunbar New version accepted (logged-in submitter: Linda Dunbar)
2023-03-27
22 Linda Dunbar Uploaded new revision
2023-03-23
21 Paul Kyzivat Request for Early review by GENART Completed: Ready with Nits. Reviewer: Paul Kyzivat. Review has been revised by Paul Kyzivat.
2023-03-23
21 Paul Kyzivat Request for Early review by GENART Completed: Ready with Issues. Reviewer: Paul Kyzivat. Review has been revised by Paul Kyzivat.
2023-03-19
21 Paul Kyzivat Request for Early review by GENART Completed: Ready with Issues. Reviewer: Paul Kyzivat.
2023-03-17
21 Luc André Burdet Request for Early review by RTGDIR is assigned to Ines Robles
2023-03-10
21 Gunter Van de Velde Request for Early review by OPSDIR is assigned to Susan Hares
2023-03-09
21 Linda Dunbar New version available: draft-ietf-rtgwg-net2cloud-problem-statement-21.txt
2023-03-09
21 Linda Dunbar New version accepted (logged-in submitter: Linda Dunbar)
2023-03-09
21 Linda Dunbar Uploaded new revision
2023-03-09
20 Tero Kivinen Request for Early review by SECDIR is assigned to Deb Cooley
2023-03-09
20 Jean Mahoney Request for Early review by GENART is assigned to Paul Kyzivat
2023-03-07
20 Florian Obser Request for Early review by DNSDIR Completed: Ready with Issues. Reviewer: Florian Obser. Sent review to list.
2023-03-07
20 Magnus Westerlund Request for Early review by TSVART is assigned to David Black
2023-03-06
20 Jim Reid Request for Early review by DNSDIR is assigned to Florian Obser
2023-03-06
20 Jeff Tantsura Requested Early review by DNSDIR
2023-03-06
20 Jeff Tantsura Requested Early review by TSVART
2023-03-06
20 Jeff Tantsura Requested Early review by RTGDIR
2023-03-06
20 Jeff Tantsura Requested Early review by OPSDIR
2023-03-06
20 Jeff Tantsura Requested Early review by INTDIR
2023-03-06
20 Jeff Tantsura Requested Early review by GENART
2023-03-06
20 Jeff Tantsura Requested Early review by SECDIR
2023-03-03
20 Linda Dunbar New version available: draft-ietf-rtgwg-net2cloud-problem-statement-20.txt
2023-03-03
20 Linda Dunbar New version accepted (logged-in submitter: Linda Dunbar)
2023-03-03
20 Linda Dunbar Uploaded new revision
2023-02-05
19 Linda Dunbar New version available: draft-ietf-rtgwg-net2cloud-problem-statement-19.txt
2023-02-05
19 Linda Dunbar New version accepted (logged-in submitter: Linda Dunbar)
2023-02-05
19 Linda Dunbar Uploaded new revision
2023-01-16
18 Linda Dunbar New version available: draft-ietf-rtgwg-net2cloud-problem-statement-18.txt
2023-01-16
18 Linda Dunbar New version accepted (logged-in submitter: Linda Dunbar)
2023-01-16
18 Linda Dunbar Uploaded new revision
2023-01-13
17 Linda Dunbar New version available: draft-ietf-rtgwg-net2cloud-problem-statement-17.txt
2023-01-13
17 Linda Dunbar New version accepted (logged-in submitter: Linda Dunbar)
2023-01-13
17 Linda Dunbar Uploaded new revision
2023-01-09
16 Linda Dunbar New version available: draft-ietf-rtgwg-net2cloud-problem-statement-16.txt
2023-01-09
16 Linda Dunbar New version accepted (logged-in submitter: Linda Dunbar)
2023-01-09
16 Linda Dunbar Uploaded new revision
2022-07-25
15 Linda Dunbar New version available: draft-ietf-rtgwg-net2cloud-problem-statement-15.txt
2022-07-25
15 Linda Dunbar New version accepted (logged-in submitter: Linda Dunbar)
2022-07-25
15 Linda Dunbar Uploaded new revision
2022-07-11
14 Yingzhen Qu Added to session: IETF-114: rtgwg  Thu-1000
2022-06-29
14 Linda Dunbar New version available: draft-ietf-rtgwg-net2cloud-problem-statement-14.txt
2022-06-29
14 Linda Dunbar New version accepted (logged-in submitter: Linda Dunbar)
2022-06-29
14 Linda Dunbar Uploaded new revision
2022-06-15
13 Linda Dunbar New version available: draft-ietf-rtgwg-net2cloud-problem-statement-13.txt
2022-06-15
13 Linda Dunbar New version accepted (logged-in submitter: Linda Dunbar)
2022-06-15
13 Linda Dunbar Uploaded new revision
2022-03-07
12 Linda Dunbar New version available: draft-ietf-rtgwg-net2cloud-problem-statement-12.txt
2022-03-07
12 (System) New version accepted (logged-in submitter: Linda Dunbar)
2022-03-07
12 Linda Dunbar Uploaded new revision
2021-01-27
11 (System) Document has expired
2020-07-26
11 Linda Dunbar New version available: draft-ietf-rtgwg-net2cloud-problem-statement-11.txt
2020-07-26
11 (System) New version accepted (logged-in submitter: Linda Dunbar)
2020-07-26
11 Linda Dunbar Uploaded new revision
2020-05-01
10 Linda Dunbar New version available: draft-ietf-rtgwg-net2cloud-problem-statement-10.txt
2020-05-01
10 (System) New version accepted (logged-in submitter: Linda Dunbar)
2020-05-01
10 Linda Dunbar Uploaded new revision
2020-03-16
09 Linda Dunbar New version available: draft-ietf-rtgwg-net2cloud-problem-statement-09.txt
2020-03-16
09 (System) Posted submission manually
2020-02-19
08 Linda Dunbar New version available: draft-ietf-rtgwg-net2cloud-problem-statement-08.txt
2020-02-19
08 (System) New version accepted (logged-in submitter: Linda Dunbar)
2020-02-19
08 Linda Dunbar Uploaded new revision
2020-02-14
07 Linda Dunbar New version available: draft-ietf-rtgwg-net2cloud-problem-statement-07.txt
2020-02-14
07 (System) New version accepted (logged-in submitter: Linda Dunbar)
2020-02-14
07 Linda Dunbar Uploaded new revision
2020-02-06
06 Linda Dunbar New version available: draft-ietf-rtgwg-net2cloud-problem-statement-06.txt
2020-02-06
06 (System) New version accepted (logged-in submitter: Linda Dunbar)
2020-02-06
06 Linda Dunbar Uploaded new revision
2019-11-01
05 Linda Dunbar New version available: draft-ietf-rtgwg-net2cloud-problem-statement-05.txt
2019-11-01
05 (System) New version approved
2019-11-01
05 (System) Request for posting confirmation emailed to previous authors: Christian Jacquenet , Linda Dunbar , Mehmet Toy
2019-11-01
05 Linda Dunbar Uploaded new revision
2019-09-23
04 Linda Dunbar New version available: draft-ietf-rtgwg-net2cloud-problem-statement-04.txt
2019-09-23
04 (System) New version approved
2019-09-23
04 (System) Request for posting confirmation emailed to previous authors: Andrew Malis , rtgwg-chairs@ietf.org, Linda Dunbar , Christian Jacquenet , Mehmet Toy
2019-09-23
04 Linda Dunbar Uploaded new revision
2019-07-03
03 Linda Dunbar New version available: draft-ietf-rtgwg-net2cloud-problem-statement-03.txt
2019-07-03
03 (System) New version approved
2019-07-03
03 (System) Request for posting confirmation emailed to previous authors: Andrew Malis , Christian Jacquenet , Linda Dunbar , Mehmet Toy
2019-07-03
03 Linda Dunbar Uploaded new revision
2019-06-17
02 Linda Dunbar New version available: draft-ietf-rtgwg-net2cloud-problem-statement-02.txt
2019-06-17
02 (System) New version approved
2019-06-17
02 (System) Request for posting confirmation emailed to previous authors: Linda Dunbar , rtgwg-chairs@ietf.org, Andrew Malis , Christian Jacquenet , Mehmet Toy
2019-06-17
02 Linda Dunbar Uploaded new revision
2019-06-05
01 Linda Dunbar New version available: draft-ietf-rtgwg-net2cloud-problem-statement-01.txt
2019-06-05
01 (System) New version approved
2019-06-05
01 (System) Request for posting confirmation emailed to previous authors: Linda Dunbar , rtgwg-chairs@ietf.org, Andrew Malis , Christian Jacquenet , Mehmet Toy
2019-06-05
01 Linda Dunbar Uploaded new revision
2019-02-12
00 Jeff Tantsura This document now replaces draft-dm-net2cloud-problem-statement instead of None
2019-02-12
00 Linda Dunbar New version available: draft-ietf-rtgwg-net2cloud-problem-statement-00.txt
2019-02-12
00 (System) WG -00 approved
2019-02-12
00 Linda Dunbar Set submitter to "Linda Dunbar ", replaces to draft-dm-net2cloud-problem-statement and sent approval email to group chairs: rtgwg-chairs@ietf.org
2019-02-12
00 Linda Dunbar Uploaded new revision