Skip to main content

Resource Public Key Infrastructure (RPKI) Origin Validation for BGP Export
draft-ietf-sidrops-ov-egress-04

Revision differences

Document history

Date Rev. By Action
2020-09-24
04 (System) RFC Editor state changed to AUTH48-DONE from AUTH48
2020-08-17
04 (System) RFC Editor state changed to AUTH48 from RFC-EDITOR
2020-05-12
04 (System) RFC Editor state changed to RFC-EDITOR from EDIT
2020-04-15
04 Tero Kivinen Closed request for Last Call review by SECDIR with state 'Overtaken by Events'
2020-04-15
04 Tero Kivinen Assignment of request for Last Call review by SECDIR to Scott Kelly was marked no-response
2020-04-13
04 (System) RFC Editor state changed to EDIT
2020-04-13
04 (System) IESG state changed to RFC Ed Queue from Approved-announcement sent
2020-04-13
04 (System) Announcement was received by RFC Editor
2020-04-13
04 (System) IANA Action state changed to No IANA Actions
2020-04-13
04 Amy Vezza IESG state changed to Approved-announcement sent from Approved-announcement to be sent
2020-04-13
04 Amy Vezza IESG has approved the document
2020-04-13
04 Amy Vezza Closed "Approve" ballot
2020-04-13
04 Amy Vezza Ballot approval text was generated
2020-04-09
04 Cindy Morgan Ballot writeup was changed
2020-04-09
04 Cindy Morgan IESG state changed to Approved-announcement to be sent from IESG Evaluation
2020-04-08
04 Amanda Baber IANA Review state changed to IANA OK - No Actions Needed from Version Changed - Review Needed
2020-04-08
04 Deborah Brungard [Ballot Position Update] New position, No Objection, has been recorded for Deborah Brungard
2020-04-08
04 (System) IANA Review state changed to Version Changed - Review Needed from IANA OK - No Actions Needed
2020-04-08
04 Randy Bush New version available: draft-ietf-sidrops-ov-egress-04.txt
2020-04-08
04 (System) New version approved
2020-04-08
04 (System) Request for posting confirmation emailed to previous authors: Ruediger Volk , Jakob Heitz , Randy Bush
2020-04-08
04 Randy Bush Uploaded new revision
2020-04-08
03 Amanda Baber IANA Review state changed to IANA OK - No Actions Needed from Version Changed - Review Needed
2020-04-08
03 Magnus Westerlund [Ballot Position Update] New position, No Objection, has been recorded for Magnus Westerlund
2020-04-08
03 Éric Vyncke
[Ballot comment]
Thank you for the document.

Randy, thank you for the fix to the the issue found by Jouri in the INTDIR review: https://mailarchive.ietf.org/arch/msg/int-dir/bUWYKX6ey404TmpXdwfdVbWv1yM …
[Ballot comment]
Thank you for the document.

Randy, thank you for the fix to the the issue found by Jouri in the INTDIR review: https://mailarchive.ietf.org/arch/msg/int-dir/bUWYKX6ey404TmpXdwfdVbWv1yM

Thank you Jouri

-éric
2020-04-08
03 Éric Vyncke Ballot comment text updated for Éric Vyncke
2020-04-08
03 Éric Vyncke [Ballot comment]
Thank you for the document.

Please also fix the issue found by Jouri in the INTDIR review: https://mailarchive.ietf.org/arch/msg/int-dir/bUWYKX6ey404TmpXdwfdVbWv1yM

Thank you Jouri

-éric
2020-04-08
03 Éric Vyncke [Ballot Position Update] New position, No Objection, has been recorded for Éric Vyncke
2020-04-07
03 Roman Danyliw [Ballot Position Update] New position, No Objection, has been recorded for Roman Danyliw
2020-04-07
03 Martin Vigoureux [Ballot Position Update] New position, No Objection, has been recorded for Martin Vigoureux
2020-04-07
03 (System) IANA Review state changed to Version Changed - Review Needed from IANA OK - No Actions Needed
2020-04-07
03 Randy Bush New version available: draft-ietf-sidrops-ov-egress-03.txt
2020-04-07
03 (System) New version approved
2020-04-07
03 (System) Request for posting confirmation emailed to previous authors: Jakob Heitz , Randy Bush , Ruediger Volk
2020-04-07
03 Randy Bush Uploaded new revision
2020-04-07
02 Warren Kumari Dotting the t's and crossing the i's...
2020-04-07
02 Warren Kumari This document now replaces draft-ymbk-sidrops-ov-egress instead of None
2020-04-06
02 Barry Leiba [Ballot Position Update] New position, No Objection, has been recorded for Barry Leiba
2020-04-06
02 Benjamin Kaduk
[Ballot comment]
Abstract

[IIRC the mention of "updates 6811" is queued already.]

Section 1

  As the origin AS of a BGP UPDATE is decided …
[Ballot comment]
Abstract

[IIRC the mention of "updates 6811" is queued already.]

Section 1

  As the origin AS of a BGP UPDATE is decided by configuration and
  outbound policy of the BGP speaker, a validating BGP speaker MUST
  apply Route Origin Validation policy semantics against the origin
  Autonomous System number which will actually be put in the AS_PATH

(To the extent that the speaker applies outbound policy at all?  Or is
that required by being a "validating BGP speaker"?)

Section 3

  will (or would) be announced to the peer.  The effective origin AS
  may differ from that of the route in the RIB due to commonly
  available knobs such as: removal of private ASs, AS path
  manipulation, confederation handling, etc.

Do we feel a need to add a "but not limited to"?  Feels like overkill to
me...

nit: earlier we wrote "private AS(s)"

Section 4

  Configurations may have complex policy where the final announced
  origin AS may not be easily predicted before all policies have been
  run.  Therefore it SHOULD be possible to specify an origin validation
  policy which MUST BE run after such non-deterministic policies.

nit: are complex policies necessarily non-deterministic (vs. "not easily
predicted")?
2020-04-06
02 Benjamin Kaduk [Ballot Position Update] New position, No Objection, has been recorded for Benjamin Kaduk
2020-04-06
02 Alvaro Retana
[Ballot comment]
(0) This document should be marked as replacing draft-ymbk-sidrops-ov-egress.


(1) The purpose of this document is to clarify "that implementations must use the …
[Ballot comment]
(0) This document should be marked as replacing draft-ymbk-sidrops-ov-egress.


(1) The purpose of this document is to clarify "that implementations must use the effective origin AS".  The use of "effective" seems deliberate to qualify a specific characteristic of the origin AS.  However, the term is not only not defined anywhere (with respect to simply using "origin AS", for example), but there is inconsistency in the language, for example: "origin Autonomous System number which will actually be put in the AS_PATH" or "final announced origin AS".  Please be clear in the definition, and consistent in the language used.


(2) §1:

  As the origin AS of a BGP UPDATE is decided by configuration and
  outbound policy of the BGP speaker, a validating BGP speaker MUST
  apply Route Origin Validation policy semantics against the origin
  Autonomous System number which will actually be put in the AS_PATH
  (see [RFC4271] 4.3 Path Attributes:b) of the UPDATE to the peer.

(2a) [major] "MUST apply Route Origin Validation policy semantics against the origin Autonomous System number which will actually be put in the AS_PATH"  Put where? 

The assumption in this text seems to be that there will only be one AS number
present (even with prepending), in line with §5.1.2/rfc4271.  However, rfc7705
(which Updates rfc4271) specifies AS migration mechanisms...some of which may
result in more than one AS number placed in the AS_PATH (even at route
origination).  It is then important to clarify *where* the ASN "will actually
be put", or which ASN should the validation be done against.  [Note that this
is a variation of the initial comment about clearly defining the terms.]

(2b) [nit] s/(see [RFC4271] 4.3 Path Attributes:b)/([RFC4271])

Not only is the detailed reference unnecessary, but the format may be
confusing.  Also, it is §5.1.2 the section that actually talks about the use
of the AS_PATH.


(3) §1: It would be very nice to add these references: s/confederation, AS migration/confederation [rfc5065], AS migration [rfc7705]

Given the comment above, the reference to rfc7705 should be Normative.


(4) §3: "BGP implementations supporting RPKI-based origin validation SHOULD provide the same policy configuration primitives for decisions based on validation state available for use in ingress, redistribution, and egress policies."

When would it be ok for an implementation not to "provide the same policy configuration"?  IOW, why is MUST not used?  s/SHOULD/MUST


(5) §4:

  Configurations may have complex policy where the final announced
  origin AS may not be easily predicted before all policies have been
  run.  Therefore it SHOULD be possible to specify an origin validation
  policy which MUST BE run after such non-deterministic policies.

(5a) [major] "SHOULD be possible to specify an origin validation policy"  What is an "origin validation policy"?  To me it sounds as the ability to either validate or not: as in, "the policy is to validate for this origin AS, but not for a different one".  Is that it?  Or are you referring to a blanket policy akin to "if the origin AS is X, then the route must always be considered Valid"??

[This piece of text confuses me more given the suggestion to Alissa's
comments: "Therefore it SHOULD be possible to specify an origin validation
policy which will run after all such non-deterministic policies."  A
validation policy for *all* policies??]

(5b) I know that this next point was discussed on the list...but describing the outcome of complex policy as not "easily predicted" and non-deterministic is causing me a lot of heartburn.  I can see how optional information in an Update (communities, etc.) can cause a policy result to be known only at "run time", but that doesn't make the outcome unpredictable or non-deterministic: the outcome of the policy is what it is supposed to be, given the current conditions -- we just didn't know before the Update was received.  This is a non-blocking comment and you can consider it a nit...it simply sounds as if the operator was guessing, and I know some are not. ;-)

s/...may not be easily predicted before all policies...such non-deterministic
policies./...may be determined only after all policies...such policies.


(6) §4: "SHOULD be able to list what announcements are not sent to a peer because they were marked Invalid, as long as the router still has them in memory."  After reading this text many times, I think I understand that you mean that the operator should be able to use a "show command"...and not that he/she should be able to create a list of announcements (as in a filter).  Is that what you mean?

Suggestion (maybe something like this)>
  An implementation SHOULD display announcements that are not sent to a peer
  because they were marked Invalid, as long as the router still has them in
  memory.
2020-04-06
02 Alvaro Retana [Ballot Position Update] New position, No Objection, has been recorded for Alvaro Retana
2020-04-06
02 Robert Wilton
[Ballot comment]
I'm not a BGP expert, but this document seems sensible to me.

Some comments:

1) In the first sentence of the introduction: Is …
[Ballot comment]
I'm not a BGP expert, but this document seems sensible to me.

Some comments:

1) In the first sentence of the introduction: Is it really correct that the "This document does not change semantics of [RFC6811] RPKI-based origin validation"?  Given that the 4th paragraph in the introduction then states that "This document clarifies ..."

2) I wasn't entirely sure that section 2 (Suggested Reading) is required at all, given that this is effectively what section 8.1 and 8.2 is listing anyway, but equally I'm okay if the section is left in.

3) The security section is terse, and I agree that this doesn't introduce any new security issues.  But I was wondering if the purpose of this clarification is to improve security with more reliable filtering, and if so, would it be helpful to have a sentence in the security section that states that?

One nit:

1) In the first sentence of the introduction "of [RFC6811] of RPKI-based origin validation" -> "of [RFC6811] RPKI-based origin validation"?
2020-04-06
02 Robert Wilton [Ballot Position Update] New position, No Objection, has been recorded for Robert Wilton
2020-04-06
02 Alissa Cooper
[Ballot comment]
"Therefore it SHOULD be possible to specify an origin validation
  policy which MUST BE run after such non-deterministic policies."

The normative language …
[Ballot comment]
"Therefore it SHOULD be possible to specify an origin validation
  policy which MUST BE run after such non-deterministic policies."

The normative language here doesn't quite make sense. "MUST BE" is not a normative keyword and the construction "SHOULD ... which MUST" is a little confusing. I would suggest something like:

An origin validation policy that is required to be run after such non-deterministic policies SHOULD be specified.
2020-04-06
02 Alissa Cooper [Ballot Position Update] New position, No Objection, has been recorded for Alissa Cooper
2020-04-05
02 Martin Duke [Ballot Position Update] New position, No Objection, has been recorded for Martin Duke
2020-04-03
02 Erik Kline [Ballot Position Update] New position, Yes, has been recorded for Erik Kline
2020-04-01
02 Jouni Korhonen Request for Telechat review by INTDIR Completed: Ready with Nits. Reviewer: Jouni Korhonen. Sent review to list.
2020-04-01
02 Linda Dunbar Request for Telechat review by OPSDIR Completed: Ready. Reviewer: Linda Dunbar. Sent review to list.
2020-03-27
02 Murray Kucherawy [Ballot Position Update] New position, No Objection, has been recorded for Murray Kucherawy
2020-03-24
02 Carlos Jesús Bernardos Request for Telechat review by INTDIR is assigned to Jouni Korhonen
2020-03-24
02 Carlos Jesús Bernardos Request for Telechat review by INTDIR is assigned to Jouni Korhonen
2020-03-24
02 Gunter Van de Velde Request for Telechat review by OPSDIR is assigned to Linda Dunbar
2020-03-24
02 Gunter Van de Velde Request for Telechat review by OPSDIR is assigned to Linda Dunbar
2020-03-23
02 Éric Vyncke Requested Telechat review by INTDIR
2020-03-20
02 (System) IANA Review state changed to IANA OK - No Actions Needed from Version Changed - Review Needed
2020-03-20
02 Warren Kumari
[Ballot comment]
Background for IESG Eval:
The audience of this document is BGP implementers, not the general
public. It is largely a clarification, and intentionally …
[Ballot comment]
Background for IESG Eval:
The audience of this document is BGP implementers, not the general
public. It is largely a clarification, and intentionally concise to
the point of terseness - think of it as a "Warning: It's easy to get
this bit of the spec wrong. Here is how to navigate it correctly"
document, not a protocol spec or general user document.

BGP policies can be applied on egress that change the AS - an obvious
example of this is removing a private AS#, or when merging ASN.
Because of how / where egress policies are applied, it's very easy for
an implementer to forget that this might occur, and so use the "wrong"
AS when validating. This document just points that out - it doesn't,
and shouldn't, go into too much detail.
2020-03-20
02 Warren Kumari Ballot comment text updated for Warren Kumari
2020-03-20
02 Warren Kumari IESG state changed to IESG Evaluation from Waiting for Writeup
2020-03-20
02 Cindy Morgan Placed on agenda for telechat - 2020-04-09
2020-03-20
02 Warren Kumari Ballot has been issued
2020-03-20
02 Warren Kumari [Ballot Position Update] New position, Yes, has been recorded for Warren Kumari
2020-03-20
02 Warren Kumari Created "Approve" ballot
2020-03-20
02 Warren Kumari Ballot writeup was changed
2020-03-19
02 (System) IANA Review state changed to Version Changed - Review Needed from IANA OK - No Actions Needed
2020-03-19
02 Randy Bush New version available: draft-ietf-sidrops-ov-egress-02.txt
2020-03-19
02 (System) New version approved
2020-03-19
02 (System) Request for posting confirmation emailed to previous authors: Ruediger Volk , Jakob Heitz , Randy Bush
2020-03-19
02 Randy Bush Uploaded new revision
2020-03-18
01 Yingzhen Qu Request for Last Call review by RTGDIR Completed: Has Issues. Reviewer: Yingzhen Qu. Sent review to list.
2020-03-18
01 (System) IESG state changed to Waiting for Writeup from In Last Call
2020-03-17
01 (System) IANA Review state changed to IANA OK - No Actions Needed from IANA - Review Needed
2020-03-17
01 Sabrina Tanamal
(Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs:

The IANA Functions Operator has reviewed draft-ietf-sidrops-ov-egress-01, which is currently in Last Call, and has the following comments:

We …
(Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs:

The IANA Functions Operator has reviewed draft-ietf-sidrops-ov-egress-01, which is currently in Last Call, and has the following comments:

We understand that this document doesn't require any registry actions.

While it's often helpful for a document's IANA Considerations section to remain in place upon publication even if there are no actions, if the authors strongly prefer to remove it, we do not object.

If this assessment is not accurate, please respond as soon as possible.

Thank you,

Sabrina Tanamal
Senior IANA Services Specialist
2020-03-17
01 Linda Dunbar Request for Last Call review by OPSDIR Completed: Not Ready. Reviewer: Linda Dunbar. Sent review to list.
2020-03-13
01 Robert Sparks Request for Last Call review by GENART Completed: Ready. Reviewer: Robert Sparks. Sent review to list.
2020-03-11
01 Gunter Van de Velde Request for Last Call review by OPSDIR is assigned to Linda Dunbar
2020-03-11
01 Gunter Van de Velde Request for Last Call review by OPSDIR is assigned to Linda Dunbar
2020-03-09
01 Min Ye Request for Last Call review by RTGDIR is assigned to Yingzhen Qu
2020-03-09
01 Min Ye Request for Last Call review by RTGDIR is assigned to Yingzhen Qu
2020-03-09
01 Min Ye Assignment of request for Last Call review by RTGDIR to Victoria Pritchard was marked no-response
2020-03-06
01 Tero Kivinen Request for Last Call review by SECDIR is assigned to Scott Kelly
2020-03-06
01 Tero Kivinen Request for Last Call review by SECDIR is assigned to Scott Kelly
2020-03-05
01 Min Ye Request for Last Call review by RTGDIR is assigned to Victoria Pritchard
2020-03-05
01 Min Ye Request for Last Call review by RTGDIR is assigned to Victoria Pritchard
2020-03-05
01 Alvaro Retana Closed request for Last Call review by RTGDIR with state 'Withdrawn': Sorry for the duplicate.
2020-03-05
01 Alvaro Retana Requested Last Call review by RTGDIR
2020-03-05
01 Jean Mahoney Request for Last Call review by GENART is assigned to Robert Sparks
2020-03-05
01 Jean Mahoney Request for Last Call review by GENART is assigned to Robert Sparks
2020-03-04
01 Alvaro Retana Requested Last Call review by RTGDIR
2020-03-04
01 Amy Vezza IANA Review state changed to IANA - Review Needed
2020-03-04
01 Amy Vezza
The following Last Call announcement was sent out (ends 2020-03-18):

From: The IESG
To: IETF-Announce
CC: sidrops@ietf.org, keyur@arrcus.com, draft-ietf-sidrops-ov-egress@ietf.org, warren@kumari.net, nathalie@ripe.net …
The following Last Call announcement was sent out (ends 2020-03-18):

From: The IESG
To: IETF-Announce
CC: sidrops@ietf.org, keyur@arrcus.com, draft-ietf-sidrops-ov-egress@ietf.org, warren@kumari.net, nathalie@ripe.net, sidrops-chairs@ietf.org
Reply-To: last-call@ietf.org
Sender:
Subject: Last Call:  (BGP RPKI-Based Origin Validation on Export) to Proposed Standard


The IESG has received a request from the SIDR Operations WG (sidrops) to
consider the following document: - 'BGP RPKI-Based Origin Validation on
Export'
  as Proposed Standard

The IESG plans to make a decision in the next few weeks, and solicits final
comments on this action. Please send substantive comments to the
last-call@ietf.org mailing lists by 2020-03-18. Exceptionally, comments may
be sent to iesg@ietf.org instead. In either case, please retain the beginning
of the Subject line to allow automated sorting.

Abstract


  A BGP speaker may perform RPKI origin validation not only on routes
  received from BGP neighbors and routes that are redistributed from
  other routing protocols, but also on routes it sends to BGP
  neighbors.  For egress policy, it is important that the
  classification uses the effective origin AS of the processed route,
  which may specifically be altered by the commonly available knobs
  such as removing private ASs, confederation handling, and other
  modifications of the origin AS.





The file can be obtained via
https://datatracker.ietf.org/doc/draft-ietf-sidrops-ov-egress/

IESG discussion can be tracked via
https://datatracker.ietf.org/doc/draft-ietf-sidrops-ov-egress/ballot/


No IPR declarations have been submitted directly on this I-D.




2020-03-04
01 Amy Vezza IESG state changed to In Last Call from Last Call Requested
2020-03-04
01 Warren Kumari Last call was requested
2020-03-04
01 Warren Kumari Ballot approval text was generated
2020-03-04
01 Warren Kumari Ballot writeup was generated
2020-03-04
01 Warren Kumari IESG state changed to Last Call Requested from AD Evaluation::AD Followup
2020-03-04
01 Warren Kumari Last call announcement was changed
2020-03-04
01 (System) Sub state has been changed to AD Followup from Revised ID Needed
2020-03-04
01 Randy Bush New version available: draft-ietf-sidrops-ov-egress-01.txt
2020-03-04
01 (System) New version approved
2020-03-04
01 (System) Request for posting confirmation emailed to previous authors: Jakob Heitz , Ruediger Volk , Randy Bush
2020-03-04
01 Randy Bush Uploaded new revision
2020-03-04
00 Warren Kumari IESG state changed to AD Evaluation::Revised I-D Needed from Publication Requested
2020-03-03
00 Cindy Morgan Changed consensus to Yes from Unknown
2020-03-03
00 Cindy Morgan Intended Status changed to Proposed Standard from None
2020-03-03
00 Keyur Patel
As required by RFC 4858, this is the current template for the Document
Shepherd Write-Up. Changes are expected over time.

This version is dated …
As required by RFC 4858, this is the current template for the Document
Shepherd Write-Up. Changes are expected over time.

This version is dated 1 November 2019.

(1) What type of RFC is being requested (BCP, Proposed Standard, Internet
Standard, Informational, Experimental, or Historic)? Why is this the proper
type of RFC? Is this type of RFC indicated in the title page header?

Standards Track.

(2) The IESG approval announcement includes a Document Announcement Write-Up.
Please provide such a Document Announcement Write-Up. Recent examples can be
found in the "Action" announcements for approved documents. The approval
announcement contains the following sections:

Technical Summary:

This document highlights an important use case of origin validation in eBGP
egress policies, explaining specifics of correct implementation in this
context. As the origin AS may be modified by outbound policy, policy semantics
based on RPKI Origin Validation state MUST be able to be applied separately on
distribution into BGP and on egress. This document mandates BGP implementations
supporting RPKI-based origin validation to provide the same policy
configuration primitives on egress as they are available for ingress and route
redistribution.


Working Group Summary:

The document went through the review at WGLC to include comments/suggestions/
changes. The conversation in the WG mail-list and meetings was productive and
the chairs believe this document is ready to progress.

Was there anything in WG process that is worth noting? For example, was there
controversy about particular points or were there decisions where the consensus
was particularly rough?

Since the first and only version of the document, there has been support for
this draft.

Document Quality:

The document is simple, clear and concise. There are no nits nor is the
document controversial.

Are there existing implementations of the protocol? Have a significant number
of vendors indicated their plan to implement the specification? Are there any
reviewers that merit special mention as having done a thorough review, e.g.,
one that resulted in important changes or a conclusion that the document had no
substantive issues? If there was a MIB Doctor, YANG Doctor, Media Type or
other expert review, what was its course (briefly)? In the case of a Media Type
review, on what date was the request posted?

None.

Personnel:

Keyur Patel  (keyur@arrcus.com) is Document Shepherd
Warren Kumari (warren@kumari.net) is Area Director

(3) Briefly describe the review of this document that was performed by the
Document Shepherd. If this version of the document is not ready for
publication, please explain why the document is being forwarded to the IESG.

The Document Shepherd read the document and reviewed comments.

(4) Does the document Shepherd have any concerns about the depth or breadth of
the reviews that have been performed?

No concerns.

(5) Do portions of the document need review from a particular or from broader
perspective, e.g., security, operational complexity, AAA, DNS, DHCP, XML, or
internationalization? If so, describe the review that took place.

No.

(6) Describe any specific concerns or issues that the Document Shepherd has
with this document that the Responsible Area Director and/or the IESG should be
aware of? For example, perhaps he or she is uncomfortable with certain parts
of the document, or has concerns whether there really is a need for it. In any
event, if the WG has discussed those issues and has indicated that it still
wishes to advance the document, detail those concerns here.

No.

(7) Has each author confirmed that any and all appropriate IPR disclosures
required for full conformance with the provisions of BCP 78 and BCP 79 have
already been filed. If not, explain why?

Yes.

(8) Has an IPR disclosure been filed that references this document? If so,
summarize any WG discussion and conclusion regarding the IPR disclosures.

Not needed.

(9) How solid is the WG consensus behind this document? Does it represent the
strong concurrence of a few individuals, with others being silent, or does the
WG as a whole understand and agree with it?

Consensus was solid.

(10) Has anyone threatened an appeal or otherwise indicated extreme discontent?
If so, please summarise the areas of conflict in separate email messages to
the Responsible Area Director. (It should be in a separate email because this
questionnaire is publicly available.)

No threats.

(11) Identify any ID nits the Document Shepherd has found in this document.
(See http://www.ietf.org/tools/idnits/ and the Internet-Drafts Checklist).
Boilerplate checks are not enough; this check needs to be thorough.

I did not find any ID nits.

(12) Describe how the document meets any required formal review criteria, such
as the MIB Doctor, YANG Doctor, media type, and URI type reviews.

Not required.

(13) Have all references within this document been identified as either
normative or informative?

Yes.

(14) Are there normative references to documents that are not ready for
advancement or are otherwise in an unclear state? If such normative references
exist, what is the plan for their completion?

No.

(15) Are there downward normative references references (see RFC 3967)? If so,
list these downward references to support the Area Director in the Last Call
procedure.

No.

(16) Will publication of this document change the status of any existing RFCs?
Are those RFCs listed on the title page header, listed in the abstract, and
discussed in the introduction? If the RFCs are not listed in the Abstract and
Introduction, explain why, and point to the part of the document where the
relationship of this document to the other RFCs is discussed. If this
information is not in the document, explain why the WG considers it unnecessary.

Not expected.

(17) Describe the Document Shepherd's review of the IANA considerations
section, especially with regard to its consistency with the body of the
document. Confirm that all protocol extensions that the document makes are
associated with the appropriate reservations in IANA registries. Confirm that
any referenced IANA registries have been clearly identified. Confirm that newly
created IANA registries include a detailed specification of the initial
contents for the registry, that allocations procedures for future registrations
are defined, and a reasonable name for the new registry has been suggested
(see RFC 8126).

Reviewed, and no actions needed.

(18) List any new IANA registries that require Expert Review for future
allocations. Provide any public guidance that the IESG would find useful in
selecting the IANA Experts for these new registries.

Not applicable.

(19) Describe reviews and automated checks performed by the Document Shepherd
to validate sections of the document written in a formal language, such as XML
code, BNF rules, MIB definitions, YANG modules, etc.

Not needed.

(20) If the document contains a YANG module, has the module been checked with
any of the recommended validation tools
(https://trac.ietf.org/trac/ops/wiki/yang-review-tools) for syntax and
formatting validation? If there are any resulting errors or warnings, what is
the justification for not fixing them at this time? Does the YANG module comply
with the Network Management Datastore Architecture (NMDA) as specified in
RFC8342?

Not applicable.

2020-03-03
00 Keyur Patel Responsible AD changed to Warren Kumari
2020-03-03
00 Keyur Patel IETF WG state changed to Submitted to IESG for Publication from WG Document
2020-03-03
00 Keyur Patel IESG state changed to Publication Requested from I-D Exists
2020-03-03
00 Keyur Patel IESG process started in state Publication Requested
2020-03-01
00 Keyur Patel Notification list changed to sidrops-chairs@ietf.org, keyur@arrcus.com, warren@kumari.net, nathalie@ripe.net from Keyur Patel <keyur@arrcus.com>
2020-03-01
00 Keyur Patel
As required by RFC 4858, this is the current template for the Document
Shepherd Write-Up. Changes are expected over time.

This version is dated …
As required by RFC 4858, this is the current template for the Document
Shepherd Write-Up. Changes are expected over time.

This version is dated 1 November 2019.

(1) What type of RFC is being requested (BCP, Proposed Standard, Internet
Standard, Informational, Experimental, or Historic)? Why is this the proper
type of RFC? Is this type of RFC indicated in the title page header?

Standards Track.

(2) The IESG approval announcement includes a Document Announcement Write-Up.
Please provide such a Document Announcement Write-Up. Recent examples can be
found in the "Action" announcements for approved documents. The approval
announcement contains the following sections:

Technical Summary:

This document highlights an important use case of origin validation in eBGP
egress policies, explaining specifics of correct implementation in this
context. As the origin AS may be modified by outbound policy, policy semantics
based on RPKI Origin Validation state MUST be able to be applied separately on
distribution into BGP and on egress. This document mandates BGP implementations
supporting RPKI-based origin validation to provide the same policy
configuration primitives on egress as they are available for ingress and route
redistribution.


Working Group Summary:

The document went through the review at WGLC to include comments/suggestions/
changes. The conversation in the WG mail-list and meetings was productive and
the chairs believe this document is ready to progress.

Was there anything in WG process that is worth noting? For example, was there
controversy about particular points or were there decisions where the consensus
was particularly rough?

Since the first and only version of the document, there has been support for
this draft.

Document Quality:

The document is simple, clear and concise. There are no nits nor is the
document controversial.

Are there existing implementations of the protocol? Have a significant number
of vendors indicated their plan to implement the specification? Are there any
reviewers that merit special mention as having done a thorough review, e.g.,
one that resulted in important changes or a conclusion that the document had no
substantive issues? If there was a MIB Doctor, YANG Doctor, Media Type or
other expert review, what was its course (briefly)? In the case of a Media Type
review, on what date was the request posted?

None.

Personnel:

Keyur Patel  (keyur@arrcus.com) is Document Shepherd
Warren Kumari (warren@kumari.net) is Area Director

(3) Briefly describe the review of this document that was performed by the
Document Shepherd. If this version of the document is not ready for
publication, please explain why the document is being forwarded to the IESG.

The Document Shepherd read the document and reviewed comments.

(4) Does the document Shepherd have any concerns about the depth or breadth of
the reviews that have been performed?

No concerns.

(5) Do portions of the document need review from a particular or from broader
perspective, e.g., security, operational complexity, AAA, DNS, DHCP, XML, or
internationalization? If so, describe the review that took place.

No.

(6) Describe any specific concerns or issues that the Document Shepherd has
with this document that the Responsible Area Director and/or the IESG should be
aware of? For example, perhaps he or she is uncomfortable with certain parts
of the document, or has concerns whether there really is a need for it. In any
event, if the WG has discussed those issues and has indicated that it still
wishes to advance the document, detail those concerns here.

No.

(7) Has each author confirmed that any and all appropriate IPR disclosures
required for full conformance with the provisions of BCP 78 and BCP 79 have
already been filed. If not, explain why?

Yes.

(8) Has an IPR disclosure been filed that references this document? If so,
summarize any WG discussion and conclusion regarding the IPR disclosures.

Not needed.

(9) How solid is the WG consensus behind this document? Does it represent the
strong concurrence of a few individuals, with others being silent, or does the
WG as a whole understand and agree with it?

Consensus was solid.

(10) Has anyone threatened an appeal or otherwise indicated extreme discontent?
If so, please summarise the areas of conflict in separate email messages to
the Responsible Area Director. (It should be in a separate email because this
questionnaire is publicly available.)

No threats.

(11) Identify any ID nits the Document Shepherd has found in this document.
(See http://www.ietf.org/tools/idnits/ and the Internet-Drafts Checklist).
Boilerplate checks are not enough; this check needs to be thorough.

I did not find any ID nits.

(12) Describe how the document meets any required formal review criteria, such
as the MIB Doctor, YANG Doctor, media type, and URI type reviews.

Not required.

(13) Have all references within this document been identified as either
normative or informative?

Yes.

(14) Are there normative references to documents that are not ready for
advancement or are otherwise in an unclear state? If such normative references
exist, what is the plan for their completion?

No.

(15) Are there downward normative references references (see RFC 3967)? If so,
list these downward references to support the Area Director in the Last Call
procedure.

No.

(16) Will publication of this document change the status of any existing RFCs?
Are those RFCs listed on the title page header, listed in the abstract, and
discussed in the introduction? If the RFCs are not listed in the Abstract and
Introduction, explain why, and point to the part of the document where the
relationship of this document to the other RFCs is discussed. If this
information is not in the document, explain why the WG considers it unnecessary.

Not expected.

(17) Describe the Document Shepherd's review of the IANA considerations
section, especially with regard to its consistency with the body of the
document. Confirm that all protocol extensions that the document makes are
associated with the appropriate reservations in IANA registries. Confirm that
any referenced IANA registries have been clearly identified. Confirm that newly
created IANA registries include a detailed specification of the initial
contents for the registry, that allocations procedures for future registrations
are defined, and a reasonable name for the new registry has been suggested
(see RFC 8126).

Reviewed, and no actions needed.

(18) List any new IANA registries that require Expert Review for future
allocations. Provide any public guidance that the IESG would find useful in
selecting the IANA Experts for these new registries.

Not applicable.

(19) Describe reviews and automated checks performed by the Document Shepherd
to validate sections of the document written in a formal language, such as XML
code, BNF rules, MIB definitions, YANG modules, etc.

Not needed.

(20) If the document contains a YANG module, has the module been checked with
any of the recommended validation tools
(https://trac.ietf.org/trac/ops/wiki/yang-review-tools) for syntax and
formatting validation? If there are any resulting errors or warnings, what is
the justification for not fixing them at this time? Does the YANG module comply
with the Network Management Datastore Architecture (NMDA) as specified in
RFC8342?

Not applicable.

2020-03-01
00 Keyur Patel
As required by RFC 4858, this is the current template for the Document
Shepherd Write-Up. Changes are expected over time.

This version is dated …
As required by RFC 4858, this is the current template for the Document
Shepherd Write-Up. Changes are expected over time.

This version is dated 1 November 2019.

(1) What type of RFC is being requested (BCP, Proposed Standard, Internet
Standard, Informational, Experimental, or Historic)? Why is this the proper
type of RFC? Is this type of RFC indicated in the title page header?

Standards Track.

(2) The IESG approval announcement includes a Document Announcement Write-Up.
Please provide such a Document Announcement Write-Up. Recent examples can be
found in the "Action" announcements for approved documents. The approval
announcement contains the following sections:

Technical Summary:

This document highlights an important use case of origin validation in eBGP
egress policies, explaining specifics of correct implementation in this
context. As the origin AS may be modified by outbound policy, policy semantics
based on RPKI Origin Validation state MUST be able to be applied separately on
distribution into BGP and on egress. This document mandates BGP implementations
supporting RPKI-based origin validation to provide the same policy
configuration primitives on egress as they are available for ingress and route
redistribution.


Working Group Summary:

The document went through the review at WGLC to include comments/suggestions/
changes. The conversation in the WG mail-list and meetings was productive and
the chairs believe this document is ready to progress.

Was there anything in WG process that is worth noting? For example, was there
controversy about particular points or were there decisions where the consensus
was particularly rough?

Since the first and only version of the document, there has been support for
this draft.

Document Quality:

The document is simple, clear and concise. There are no nits nor is the
document controversial.

Are there existing implementations of the protocol? Have a significant number
of vendors indicated their plan to implement the specification? Are there any
reviewers that merit special mention as having done a thorough review, e.g.,
one that resulted in important changes or a conclusion that the document had no
substantive issues? If there was a MIB Doctor, YANG Doctor, Media Type or
other expert review, what was its course (briefly)? In the case of a Media Type
review, on what date was the request posted?

Not applicable to this document.

Personnel:

Keyur Patel  (keyur@arrcus.com) is Document Shepherd
Warren Kumari (warren@kumari.net) is Area Director

(3) Briefly describe the review of this document that was performed by the
Document Shepherd. If this version of the document is not ready for
publication, please explain why the document is being forwarded to the IESG.

The Document Shepherd read the document and reviewed comments.

(4) Does the document Shepherd have any concerns about the depth or breadth of
the reviews that have been performed?

No concerns.

(5) Do portions of the document need review from a particular or from broader
perspective, e.g., security, operational complexity, AAA, DNS, DHCP, XML, or
internationalization? If so, describe the review that took place.

No.

(6) Describe any specific concerns or issues that the Document Shepherd has
with this document that the Responsible Area Director and/or the IESG should be
aware of? For example, perhaps he or she is uncomfortable with certain parts
of the document, or has concerns whether there really is a need for it. In any
event, if the WG has discussed those issues and has indicated that it still
wishes to advance the document, detail those concerns here.

No.

(7) Has each author confirmed that any and all appropriate IPR disclosures
required for full conformance with the provisions of BCP 78 and BCP 79 have
already been filed. If not, explain why?

Yes.

(8) Has an IPR disclosure been filed that references this document? If so,
summarize any WG discussion and conclusion regarding the IPR disclosures.

Not needed.

(9) How solid is the WG consensus behind this document? Does it represent the
strong concurrence of a few individuals, with others being silent, or does the
WG as a whole understand and agree with it?

Consensus was solid.

(10) Has anyone threatened an appeal or otherwise indicated extreme discontent?
If so, please summarise the areas of conflict in separate email messages to
the Responsible Area Director. (It should be in a separate email because this
questionnaire is publicly available.)

No threats.

(11) Identify any ID nits the Document Shepherd has found in this document.
(See http://www.ietf.org/tools/idnits/ and the Internet-Drafts Checklist).
Boilerplate checks are not enough; this check needs to be thorough.

I did not find any ID nits.

(12) Describe how the document meets any required formal review criteria, such
as the MIB Doctor, YANG Doctor, media type, and URI type reviews.

Not required.

(13) Have all references within this document been identified as either
normative or informative?

Yes.

(14) Are there normative references to documents that are not ready for
advancement or are otherwise in an unclear state? If such normative references
exist, what is the plan for their completion?

No.

(15) Are there downward normative references references (see RFC 3967)? If so,
list these downward references to support the Area Director in the Last Call
procedure.

No.

(16) Will publication of this document change the status of any existing RFCs?
Are those RFCs listed on the title page header, listed in the abstract, and
discussed in the introduction? If the RFCs are not listed in the Abstract and
Introduction, explain why, and point to the part of the document where the
relationship of this document to the other RFCs is discussed. If this
information is not in the document, explain why the WG considers it unnecessary.

Not expected.

(17) Describe the Document Shepherd's review of the IANA considerations
section, especially with regard to its consistency with the body of the
document. Confirm that all protocol extensions that the document makes are
associated with the appropriate reservations in IANA registries. Confirm that
any referenced IANA registries have been clearly identified. Confirm that newly
created IANA registries include a detailed specification of the initial
contents for the registry, that allocations procedures for future registrations
are defined, and a reasonable name for the new registry has been suggested
(see RFC 8126).

Reviewed, and no actions needed.

(18) List any new IANA registries that require Expert Review for future
allocations. Provide any public guidance that the IESG would find useful in
selecting the IANA Experts for these new registries.

Not applicable.

(19) Describe reviews and automated checks performed by the Document Shepherd
to validate sections of the document written in a formal language, such as XML
code, BNF rules, MIB definitions, YANG modules, etc.

Not needed.

(20) If the document contains a YANG module, has the module been checked with
any of the recommended validation tools
(https://trac.ietf.org/trac/ops/wiki/yang-review-tools) for syntax and
formatting validation? If there are any resulting errors or warnings, what is
the justification for not fixing them at this time? Does the YANG module comply
with the Network Management Datastore Architecture (NMDA) as specified in
RFC8342?

Not applicable.

2020-03-01
00 Keyur Patel Notification list changed to Keyur Patel <keyur@arrcus.com>
2020-03-01
00 Keyur Patel Document shepherd changed to Keyur Patel
2020-03-01
00 Keyur Patel Notification list changed to Keyur Patel <keyur@arrcus.com>
2020-03-01
00 Keyur Patel Document shepherd changed to Keyur Patel
2019-10-30
00 Randy Bush New version available: draft-ietf-sidrops-ov-egress-00.txt
2019-10-30
00 (System) WG -00 approved
2019-10-30
00 Randy Bush Set submitter to "Randy Bush ", replaces to (none) and sent approval email to group chairs: sidrops-chairs@ietf.org
2019-10-30
00 Randy Bush Uploaded new revision