BGPsec Router Certificate Rollover
draft-ietf-sidrops-bgpsec-rollover-04
Revision differences
Document history
Date | Rev. | By | Action |
---|---|---|---|
2019-08-07
|
04 | (System) | Received changes through RFC Editor sync (created alias RFC 8634, changed abstract to 'Certification Authorities (CAs) within the Resource Public Key Infrastructure (RPKI) manage … Received changes through RFC Editor sync (created alias RFC 8634, changed abstract to 'Certification Authorities (CAs) within the Resource Public Key Infrastructure (RPKI) manage BGPsec router certificates as well as RPKI certificates. The rollover of BGPsec router certificates must be carefully performed in order to synchronize the distribution of router public keys with BGPsec UPDATE messages verified with those router public keys. This document describes a safe rollover process, and it discusses when and why the rollover of BGPsec router certificates is necessary. When this rollover process is followed, the rollover will be performed without routing information being lost.', changed standardization level to Best Current Practice, changed state to RFC, added RFC published event at 2019-08-07, changed IESG state to RFC Published, created alias BCP 224) |
2019-08-07
|
04 | (System) | RFC published |
2019-08-05
|
04 | (System) | RFC Editor state changed to AUTH48-DONE from AUTH48 |
2019-06-24
|
04 | (System) | RFC Editor state changed to AUTH48 from RFC-EDITOR |
2019-06-06
|
04 | (System) | RFC Editor state changed to RFC-EDITOR from REF |
2019-06-03
|
04 | (System) | RFC Editor state changed to REF from EDIT |
2019-05-16
|
04 | (System) | RFC Editor state changed to EDIT from MISSREF |
2017-12-19
|
04 | Gunter Van de Velde | Closed request for Last Call review by OPSDIR with state 'No Response' |
2017-12-12
|
04 | (System) | RFC Editor state changed to MISSREF |
2017-12-12
|
04 | (System) | IESG state changed to RFC Ed Queue from Approved-announcement sent |
2017-12-12
|
04 | (System) | Announcement was received by RFC Editor |
2017-12-11
|
04 | (System) | IANA Review state changed to Version Changed - Review Needed from IANA OK - No Actions Needed |
2017-12-11
|
04 | Brian Weis | New version available: draft-ietf-sidrops-bgpsec-rollover-04.txt |
2017-12-11
|
04 | (System) | New version approved |
2017-12-11
|
04 | (System) | Request for posting confirmation emailed to previous authors: Roque Gagliano , Brian Weis , Keyur Patel |
2017-12-11
|
04 | Brian Weis | Uploaded new revision |
2017-12-11
|
03 | (System) | IANA Action state changed to No IC from In Progress |
2017-12-11
|
03 | (System) | IANA Action state changed to In Progress |
2017-12-11
|
03 | Cindy Morgan | IESG state changed to Approved-announcement sent from Approved-announcement to be sent::Point Raised - writeup needed |
2017-12-11
|
03 | Cindy Morgan | IESG has approved the document |
2017-12-11
|
03 | Cindy Morgan | Closed "Approve" ballot |
2017-12-11
|
03 | Cindy Morgan | Ballot approval text was generated |
2017-12-11
|
03 | Warren Kumari | As discussed by IESG, with the authors and noted to the WG: https://www.ietf.org/mail-archive/web/sidrops/current/msg00283.html |
2017-12-11
|
03 | Warren Kumari | Intended Status changed to Best Current Practice from Proposed Standard |
2017-12-09
|
03 | Tero Kivinen | Closed request for Last Call review by SECDIR with state 'No Response' |
2017-11-30
|
03 | Jean Mahoney | Closed request for Telechat review by GENART with state 'Team Will not Review Version' |
2017-11-30
|
03 | Cindy Morgan | IESG state changed to Approved-announcement to be sent::Point Raised - writeup needed from IESG Evaluation |
2017-11-30
|
03 | Spencer Dawkins | [Ballot Position Update] New position, No Objection, has been recorded for Spencer Dawkins |
2017-11-29
|
03 | Kathleen Moriarty | [Ballot Position Update] New position, No Objection, has been recorded for Kathleen Moriarty |
2017-11-29
|
03 | Suresh Krishnan | [Ballot Position Update] New position, No Objection, has been recorded for Suresh Krishnan |
2017-11-29
|
03 | Adam Roach | [Ballot comment] Thanks for a well-written document with clearly spelled-out rationale and explanations. I agree with others that this document looks like a BCP rather … [Ballot comment] Thanks for a well-written document with clearly spelled-out rationale and explanations. I agree with others that this document looks like a BCP rather than a standards track document; in particular, the following language is pretty compelling: This document does not contain a protocol update to either the RPKI or BGPsec. It describes a process for managing BGPsec router certificates within the RPKI. I also found a nit in Section 2: "In particular, if the AS suspects that a stale BGPsec updates is being distributed..." Either remove "a" or change "updates" to "update". |
2017-11-29
|
03 | Adam Roach | [Ballot Position Update] New position, No Objection, has been recorded for Adam Roach |
2017-11-29
|
03 | Deborah Brungard | [Ballot comment] Agree with other comments, a BCP status seems more appropriate. |
2017-11-29
|
03 | Deborah Brungard | [Ballot Position Update] New position, No Objection, has been recorded for Deborah Brungard |
2017-11-29
|
03 | Ben Campbell | [Ballot comment] Did the working group consider making this a BCP? It describes operational practices, not protocol. -1: The draft contains a number of instances … [Ballot comment] Did the working group consider making this a BCP? It describes operational practices, not protocol. -1: The draft contains a number of instances of "must" and "should" in lower case. If those are correct, please consider using the boilerplate from 8174. |
2017-11-29
|
03 | Ben Campbell | [Ballot Position Update] New position, No Objection, has been recorded for Ben Campbell |
2017-11-29
|
03 | Alissa Cooper | [Ballot Position Update] New position, No Objection, has been recorded for Alissa Cooper |
2017-11-29
|
03 | Alia Atlas | [Ballot Position Update] New position, No Objection, has been recorded for Alia Atlas |
2017-11-29
|
03 | Terry Manderson | [Ballot Position Update] New position, No Objection, has been recorded for Terry Manderson |
2017-11-28
|
03 | Eric Rescorla | [Ballot comment] BGPsec router certificate with a new public key and the time a BGPsec router begins to use its new private key). … [Ballot comment] BGPsec router certificate with a new public key and the time a BGPsec router begins to use its new private key). This can be due to a need for a BGPsec router to distribute BGPsec updates signed with a new Nit "the period between the time when an AS distributes ...." Protection against withdrawal suppression and replay attacks: An AS may determine withdrawn BGPsec updates are being propagated instead of the most recently propagated BGPsec updates. Nit: may determine that. certificate used for signing updates in transit is expected to live longer than the one used for signing origination updates. Why is it unimportant to worry about replays on transit updates? As I read the references it's just that changing the transit key is expensive, right? But I'm not sure why that means you don't have to do it. |
2017-11-28
|
03 | Eric Rescorla | [Ballot Position Update] New position, No Objection, has been recorded for Eric Rescorla |
2017-11-28
|
03 | Alvaro Retana | [Ballot comment] [I'm not making this point as DISCUSS because it should be very easy to address, and the authors have already agreed to the … [Ballot comment] [I'm not making this point as DISCUSS because it should be very easy to address, and the authors have already agreed to the change in response to Mirja.] I think that the reference to I-D.ietf-sidr-rtr-keying should be Normative. |
2017-11-28
|
03 | Alvaro Retana | [Ballot Position Update] New position, No Objection, has been recorded for Alvaro Retana |
2017-11-21
|
03 | Alexey Melnikov | [Ballot comment] I am doubtful that RFC 2119 is the only Normative Reference. |
2017-11-21
|
03 | Alexey Melnikov | [Ballot Position Update] New position, No Objection, has been recorded for Alexey Melnikov |
2017-11-14
|
03 | Chris Morrow | Added to session: IETF-100: sidrops Wed-1330 |
2017-11-13
|
03 | Amanda Baber | IANA Review state changed to IANA OK - No Actions Needed from Version Changed - Review Needed |
2017-11-07
|
03 | Mirja Kühlewind | [Ballot comment] This document really reads like it should be an informational document, or maybe a BCP. Further, the shepherd write-up says "Internet Standard final … [Ballot comment] This document really reads like it should be an informational document, or maybe a BCP. Further, the shepherd write-up says "Internet Standard final status" but I see Proposed Standard in the datatracker...? I would recommend to go for BCP if the wg can agree to that. Also, should ietf-sidr-rtr-keying maybe be a normative reference, or is this just one example? The use of this reference in section 3.1 isn’t clear to me with this respect: „The key rollover process is dependent on the key provisioning mechanisms adopted by an AS [I-D.ietf-sidr-rtr-keying].“ |
2017-11-07
|
03 | Mirja Kühlewind | Ballot comment text updated for Mirja Kühlewind |
2017-11-07
|
03 | Mirja Kühlewind | [Ballot comment] This document really reads like it should be an informational document, or maybe a BCP. Further, the shepherd write-up says "Internet Standard final … [Ballot comment] This document really reads like it should be an informational document, or maybe a BCP. Further, the shepherd write-up says "Internet Standard final status" but I see Proposed Standard in the datatracker...? I would recommend to go for BCP if the wg can agree to that. Also, should ietf-sidr-rtr-keying maybe be a normative reference, or is this just one example? The use of this reference in section 3.1 isn’t clear to me with this respect: „The key rollover process is dependent on the key provisioning mechanisms adopted by an AS [I-D.ietf-sidr-rtr-keying].“ |
2017-11-07
|
03 | Mirja Kühlewind | [Ballot Position Update] New position, No Objection, has been recorded for Mirja Kühlewind |
2017-10-27
|
03 | Jean Mahoney | Request for Telechat review by GENART is assigned to Francis Dupont |
2017-10-27
|
03 | Jean Mahoney | Request for Telechat review by GENART is assigned to Francis Dupont |
2017-10-27
|
03 | (System) | IANA Review state changed to Version Changed - Review Needed from IANA OK - No Actions Needed |
2017-10-27
|
03 | Brian Weis | New version available: draft-ietf-sidrops-bgpsec-rollover-03.txt |
2017-10-27
|
03 | (System) | New version approved |
2017-10-27
|
03 | (System) | Request for posting confirmation emailed to previous authors: Roque Gagliano , Brian Weis , Keyur Patel |
2017-10-27
|
03 | Brian Weis | Uploaded new revision |
2017-10-26
|
02 | Min Ye | Request for Last Call review by RTGDIR Completed: Has Issues. Reviewer: Daniele Ceccarelli. Sent review to list. |
2017-10-24
|
02 | Warren Kumari | IESG state changed to IESG Evaluation from Waiting for Writeup |
2017-10-23
|
02 | Warren Kumari | Placed on agenda for telechat - 2017-11-30 |
2017-10-23
|
02 | Warren Kumari | Ballot has been issued |
2017-10-23
|
02 | Warren Kumari | [Ballot Position Update] New position, Yes, has been recorded for Warren Kumari |
2017-10-23
|
02 | Warren Kumari | Created "Approve" ballot |
2017-10-23
|
02 | Warren Kumari | Ballot writeup was changed |
2017-10-17
|
02 | (System) | IESG state changed to Waiting for Writeup from In Last Call |
2017-10-10
|
02 | Min Ye | Request for Last Call review by RTGDIR is assigned to Daniele Ceccarelli |
2017-10-10
|
02 | Min Ye | Request for Last Call review by RTGDIR is assigned to Daniele Ceccarelli |
2017-10-09
|
02 | Francis Dupont | Request for Last Call review by GENART Completed: Ready. Reviewer: Francis Dupont. |
2017-10-09
|
02 | Alvaro Retana | Requested Last Call review by RTGDIR |
2017-10-05
|
02 | Tero Kivinen | Request for Last Call review by SECDIR is assigned to Daniel Gillmor |
2017-10-05
|
02 | Tero Kivinen | Request for Last Call review by SECDIR is assigned to Daniel Gillmor |
2017-10-04
|
02 | (System) | IANA Review state changed to IANA OK - No Actions Needed from IANA - Review Needed |
2017-10-04
|
02 | Sabrina Tanamal | (Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs: The IANA Services Operator has reviewed draft-ietf-sidrops-bgpsec-rollover-02, which is currently in Last Call, and has the following comments: We … (Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs: The IANA Services Operator has reviewed draft-ietf-sidrops-bgpsec-rollover-02, which is currently in Last Call, and has the following comments: We understand that this document doesn't require any registry actions. While it's often helpful for a document's IANA Considerations section to remain in place upon publication even if there are no actions, if the authors strongly prefer to remove it, we do not object. If this assessment is not accurate, please respond as soon as possible. Thank you, Sabrina Tanamal IANA Services Specialist |
2017-10-04
|
02 | Gunter Van de Velde | Request for Last Call review by OPSDIR is assigned to Lionel Morand |
2017-10-04
|
02 | Gunter Van de Velde | Request for Last Call review by OPSDIR is assigned to Lionel Morand |
2017-10-04
|
02 | Jean Mahoney | Request for Last Call review by GENART is assigned to Francis Dupont |
2017-10-04
|
02 | Jean Mahoney | Request for Last Call review by GENART is assigned to Francis Dupont |
2017-10-03
|
02 | Cindy Morgan | IANA Review state changed to IANA - Review Needed |
2017-10-03
|
02 | Cindy Morgan | The following Last Call announcement was sent out (ends 2017-10-17): From: The IESG To: IETF-Announce CC: morrowc@ops-netman.net, sidrops@ietf.org, draft-ietf-sidrops-bgpsec-rollover@ietf.org, sidrops-chairs@ietf.org, Chris … The following Last Call announcement was sent out (ends 2017-10-17): From: The IESG To: IETF-Announce CC: morrowc@ops-netman.net, sidrops@ietf.org, draft-ietf-sidrops-bgpsec-rollover@ietf.org, sidrops-chairs@ietf.org, Chris Morrow , warren@kumari.net Reply-To: ietf@ietf.org Sender: Subject: Last Call: (BGPsec Router Certificate Rollover) to Proposed Standard The IESG has received a request from the SIDR Operations WG (sidrops) to consider the following document: - 'BGPsec Router Certificate Rollover' as Proposed Standard The IESG plans to make a decision in the next few weeks, and solicits final comments on this action. Please send substantive comments to the ietf@ietf.org mailing lists by 2017-10-17. Exceptionally, comments may be sent to iesg@ietf.org instead. In either case, please retain the beginning of the Subject line to allow automated sorting. Abstract Certificate Authorities (CAs) managing CA certificates and End-Entity (EE) certificates within the Resource Public Key Infrastructure (RPKI) will also manage BGPsec router certificates. But the rollover of CA and EE certificates BGPsec router certificates have additional considerations for Normal and emergency rollover processes. The rollover must be carefully managed in order to synchronize distribution of router public keys and BGPsec routers creating BGPsec Update messages verified with those router public keys. This document provides general recommendations for the rollover process, as well as describing reasons why the rollover of BGPsec router certificates might be necessary. When this rollover process is followed the rollover should be accomplished without routing information being lost. The file can be obtained via https://datatracker.ietf.org/doc/draft-ietf-sidrops-bgpsec-rollover/ IESG discussion can be tracked via https://datatracker.ietf.org/doc/draft-ietf-sidrops-bgpsec-rollover/ballot/ No IPR declarations have been submitted directly on this I-D. |
2017-10-03
|
02 | Cindy Morgan | IESG state changed to In Last Call from Last Call Requested |
2017-10-03
|
02 | Warren Kumari | Last call was requested |
2017-10-03
|
02 | Warren Kumari | Last call announcement was generated |
2017-10-03
|
02 | Warren Kumari | Ballot approval text was generated |
2017-10-03
|
02 | Warren Kumari | Ballot writeup was generated |
2017-10-03
|
02 | Warren Kumari | IESG state changed to Last Call Requested from AD Evaluation |
2017-10-03
|
02 | Warren Kumari | IESG state changed to AD Evaluation from Publication Requested |
2017-10-03
|
02 | Brian Weis | New version available: draft-ietf-sidrops-bgpsec-rollover-02.txt |
2017-10-03
|
02 | (System) | New version approved |
2017-10-03
|
02 | (System) | Request for posting confirmation emailed to previous authors: Roque Gagliano , Brian Weis , Keyur Patel |
2017-10-03
|
02 | Brian Weis | Uploaded new revision |
2017-10-03
|
01 | Chris Morrow | As required by RFC 4858, this is the current template for the Document Shepherd Write-Up. Changes are expected over time. This version is dated … As required by RFC 4858, this is the current template for the Document Shepherd Write-Up. Changes are expected over time. This version is dated 24 February 2012. (1) What type of RFC is being requested (BCP, Proposed Standard, Internet Standard, Informational, Experimental, or Historic)? Why is this the proper type of RFC? Is this type of RFC indicated in the title page header? ProposedStandard (Internet Standard final status) (2) The IESG approval announcement includes a Document Announcement Write-Up. Please provide such a Document Announcement Write-Up. Recent examples can be found in the "Action" announcements for approved documents. The approval announcement contains the following sections: Technical Summary Certificate Authorities (CAs) managing CA certificates and End-Entity (EE) certificates within the Resource Public Key Infrastructure (RPKI) will also manage BGPsec router certificates. But the rollover of CA and EE certificates BGPsec router certificates have additional considerations for Normal and emergency rollover processes. The rollover must be carefully managed in order to synchronize distribution of router public keys and BGPsec routers creating BGPsec Update messages verified with those router public keys. This document provides general recommendations for the rollover process, as well as describing reasons why the rollover of BGPsec router certificates might be necessary. When this rollover process is followed the rollover should be accomplished without routing information being lost. Working Group Summary This document didn't raise the ire of the WG, which was nice for a change. Document Quality Are there existing implementations of the protocol? Have a significant number of vendors indicated their plan to implement the specification? Are there any reviewers that merit special mention as having done a thorough review, e.g., one that resulted in important changes or a conclusion that the document had no substantive issues? If there was a MIB Doctor, Media Type or other expert review, what was its course (briefly)? In the case of a Media Type review, on what date was the request posted? There are existing implementations (3 main versions of RPKI supporting software). Personnel Who is the Document Shepherd? Who is the Responsible Area Director? Shepherd: Christopher Morrow (me) ResponsibleAD: Warren Kumari (3) Briefly describe the review of this document that was performed by the Document Shepherd. If this version of the document is not ready for publication, please explain why the document is being forwarded to the IESG. The document spent a good period of time in WG review, and had some final close-review by my co-chair and 2 crypto focused folks in the WG, which ended up making some changes in the text for clarity and such. (4) Does the document Shepherd have any concerns about the depth or breadth of the reviews that have been performed? No concerns. (5) Do portions of the document need review from a particular or from broader perspective, e.g., security, operational complexity, AAA, DNS, DHCP, XML, or internationalization? If so, describe the review that took place. no. (6) Describe any specific concerns or issues that the Document Shepherd has with this document that the Responsible Area Director and/or the IESG should be aware of? For example, perhaps he or she is uncomfortable with certain parts of the document, or has concerns whether there really is a need for it. In any event, if the WG has discussed those issues and has indicated that it still wishes to advance the document, detail those concerns here. no concerns. (7) Has each author confirmed that any and all appropriate IPR disclosures required for full conformance with the provisions of BCP 78 and BCP 79 have already been filed. If not, explain why. yes (8) Has an IPR disclosure been filed that references this document? If so, summarize any WG discussion and conclusion regarding the IPR disclosures. no (9) How solid is the WG consensus behind this document? Does it represent the strong concurrence of a few individuals, with others being silent, or does the WG as a whole understand and agree with it? pretty good for sidr. (10) Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarise the areas of conflict in separate email messages to the Responsible Area Director. (It should be in a separate email because this questionnaire is publicly available.) no (11) Identify any ID nits the Document Shepherd has found in this document. (See https://www.ietf.org/tools/idnits/ and the Internet-Drafts Checklist). Boilerplate checks are not enough; this check needs to be thorough. No nits to be found (12) Describe how the document meets any required formal review criteria, such as the MIB Doctor, media type, and URI type reviews. no reviews were necessary, though some security folk went over the process described closely. (13) Have all references within this document been identified as either normative or informative? yes (14) Are there normative references to documents that are not ready for advancement or are otherwise in an unclear state? If such normative references exist, what is the plan for their completion? no (15) Are there downward normative references references (see RFC 3967)? If so, list these downward references to support the Area Director in the Last Call procedure. no (16) Will publication of this document change the status of any existing RFCs? Are those RFCs listed on the title page header, listed in the abstract, and discussed in the introduction? If the RFCs are not listed in the Abstract and Introduction, explain why, and point to the part of the document where the relationship of this document to the other RFCs is discussed. If this information is not in the document, explain why the WG considers it unnecessary. no (17) Describe the Document Shepherd's review of the IANA considerations section, especially with regard to its consistency with the body of the document. Confirm that all protocol extensions that the document makes are associated with the appropriate reservations in IANA registries. Confirm that any referenced IANA registries have been clearly identified. Confirm that newly created IANA registries include a detailed specification of the initial contents for the registry, that allocations procedures for future registrations are defined, and a reasonable name for the new registry has been suggested (see RFC 5226). there are no IANA considerations. (18) List any new IANA registries that require Expert Review for future allocations. Provide any public guidance that the IESG would find useful in selecting the IANA Experts for these new registries. none. (19) Describe reviews and automated checks performed by the Document Shepherd to validate sections of the document written in a formal language, such as XML code, BNF rules, MIB definitions, etc. none required. |
2017-09-25
|
01 | Chris Morrow | As required by RFC 4858, this is the current template for the Document Shepherd Write-Up. Changes are expected over time. This version is dated … As required by RFC 4858, this is the current template for the Document Shepherd Write-Up. Changes are expected over time. This version is dated 24 February 2012. (1) What type of RFC is being requested (BCP, Proposed Standard, Internet Standard, Informational, Experimental, or Historic)? Why is this the proper type of RFC? Is this type of RFC indicated in the title page header? ProposedStandard (Internet Standard final status) (2) The IESG approval announcement includes a Document Announcement Write-Up. Please provide such a Document Announcement Write-Up. Recent examples can be found in the "Action" announcements for approved documents. The approval announcement contains the following sections: Technical Summary Certificate Authorities (CAs) managing CA certificates and End-Entity (EE) certificates within the Resource Public Key Infrastructure (RPKI) will also manage BGPsec router certificates. But the rollover of CA and EE certificates BGPsec router certificates have additional considerations for Normal and emergency rollover processes. The rollover must be carefully managed in order to synchronize distribution of router public keys and BGPsec routers creating BGPsec Update messages verified with those router public keys. This document provides general recommendations for the rollover process, as well as describing reasons why the rollover of BGPsec router certificates might be necessary. When this rollover process is followed the rollover should be accomplished without routing information being lost. Working Group Summary This document didn't raise the ire of the WG, which was nice for a change. Document Quality Are there existing implementations of the protocol? Have a significant number of vendors indicated their plan to implement the specification? Are there any reviewers that merit special mention as having done a thorough review, e.g., one that resulted in important changes or a conclusion that the document had no substantive issues? If there was a MIB Doctor, Media Type or other expert review, what was its course (briefly)? In the case of a Media Type review, on what date was the request posted? There are existing implementations (3 main versions of RPKI supporting software). Personnel Who is the Document Shepherd? Who is the Responsible Area Director? Shepherd: Christopher Morrow (me) ResponsibleAD: Alvaro Retana (3) Briefly describe the review of this document that was performed by the Document Shepherd. If this version of the document is not ready for publication, please explain why the document is being forwarded to the IESG. The document spent a good period of time in WG review, and had some final close-review by my co-chair and 2 crypto focused folks in the WG, which ended up making some changes in the text for clarity and such. (4) Does the document Shepherd have any concerns about the depth or breadth of the reviews that have been performed? No concerns. (5) Do portions of the document need review from a particular or from broader perspective, e.g., security, operational complexity, AAA, DNS, DHCP, XML, or internationalization? If so, describe the review that took place. no. (6) Describe any specific concerns or issues that the Document Shepherd has with this document that the Responsible Area Director and/or the IESG should be aware of? For example, perhaps he or she is uncomfortable with certain parts of the document, or has concerns whether there really is a need for it. In any event, if the WG has discussed those issues and has indicated that it still wishes to advance the document, detail those concerns here. no concerns. (7) Has each author confirmed that any and all appropriate IPR disclosures required for full conformance with the provisions of BCP 78 and BCP 79 have already been filed. If not, explain why. yes (8) Has an IPR disclosure been filed that references this document? If so, summarize any WG discussion and conclusion regarding the IPR disclosures. no (9) How solid is the WG consensus behind this document? Does it represent the strong concurrence of a few individuals, with others being silent, or does the WG as a whole understand and agree with it? pretty good for sidr. (10) Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarise the areas of conflict in separate email messages to the Responsible Area Director. (It should be in a separate email because this questionnaire is publicly available.) no (11) Identify any ID nits the Document Shepherd has found in this document. (See https://www.ietf.org/tools/idnits/ and the Internet-Drafts Checklist). Boilerplate checks are not enough; this check needs to be thorough. No nits to be found (12) Describe how the document meets any required formal review criteria, such as the MIB Doctor, media type, and URI type reviews. no reviews were necessary, though some security folk went over the process described closely. (13) Have all references within this document been identified as either normative or informative? yes (14) Are there normative references to documents that are not ready for advancement or are otherwise in an unclear state? If such normative references exist, what is the plan for their completion? no (15) Are there downward normative references references (see RFC 3967)? If so, list these downward references to support the Area Director in the Last Call procedure. no (16) Will publication of this document change the status of any existing RFCs? Are those RFCs listed on the title page header, listed in the abstract, and discussed in the introduction? If the RFCs are not listed in the Abstract and Introduction, explain why, and point to the part of the document where the relationship of this document to the other RFCs is discussed. If this information is not in the document, explain why the WG considers it unnecessary. no (17) Describe the Document Shepherd's review of the IANA considerations section, especially with regard to its consistency with the body of the document. Confirm that all protocol extensions that the document makes are associated with the appropriate reservations in IANA registries. Confirm that any referenced IANA registries have been clearly identified. Confirm that newly created IANA registries include a detailed specification of the initial contents for the registry, that allocations procedures for future registrations are defined, and a reasonable name for the new registry has been suggested (see RFC 5226). there are no IANA considerations. (18) List any new IANA registries that require Expert Review for future allocations. Provide any public guidance that the IESG would find useful in selecting the IANA Experts for these new registries. none. (19) Describe reviews and automated checks performed by the Document Shepherd to validate sections of the document written in a formal language, such as XML code, BNF rules, MIB definitions, etc. none required. |
2017-09-25
|
01 | Chris Morrow | Responsible AD changed to Warren Kumari |
2017-09-25
|
01 | Chris Morrow | IETF WG state changed to Submitted to IESG for Publication from WG Document |
2017-09-25
|
01 | Chris Morrow | IESG state changed to Publication Requested |
2017-09-25
|
01 | Chris Morrow | IESG process started in state Publication Requested |
2017-09-25
|
01 | Chris Morrow | Changed document writeup |
2017-09-25
|
01 | Chris Morrow | Notification list changed to Chris Morrow <morrowc@ops-netman.net> |
2017-09-25
|
01 | Chris Morrow | Document shepherd changed to Chris Morrow |
2017-09-25
|
01 | Chris Morrow | Changed consensus to Yes from Unknown |
2017-09-25
|
01 | Chris Morrow | PS because that comes before IS? |
2017-09-25
|
01 | Chris Morrow | Intended Status changed to Proposed Standard from None |
2017-08-14
|
01 | Brian Weis | New version available: draft-ietf-sidrops-bgpsec-rollover-01.txt |
2017-08-14
|
01 | (System) | New version approved |
2017-08-14
|
01 | (System) | Request for posting confirmation emailed to previous authors: Roque Gagliano , Brian Weis , Keyur Patel |
2017-08-14
|
01 | Brian Weis | Uploaded new revision |
2017-03-08
|
00 | Chris Morrow | This document now replaces draft-ietf-sidr-bgpsec-rollover instead of None |
2017-03-08
|
00 | Brian Weis | New version available: draft-ietf-sidrops-bgpsec-rollover-00.txt |
2017-03-08
|
00 | (System) | WG -00 approved |
2017-03-08
|
00 | Brian Weis | Set submitter to "Brian Weis ", replaces to draft-ietf-sidr-bgpsec-rollover and sent approval email to group chairs: sidrops-chairs@ietf.org |
2017-03-08
|
00 | Brian Weis | Uploaded new revision |