Policy Based on the Resource Public Key Infrastructure (RPKI) without Route Refresh
draft-ietf-sidrops-rov-no-rr-08
Revision differences
Document history
Date | Rev. | By | Action |
---|---|---|---|
2022-12-14
|
08 | (System) | RFC Editor state changed to AUTH48-DONE from AUTH48 |
2022-10-27
|
08 | (System) | RFC Editor state changed to AUTH48 |
2022-10-07
|
08 | (System) | RFC Editor state changed to RFC-EDITOR from EDIT |
2022-09-22
|
08 | (System) | RFC Editor state changed to EDIT |
2022-09-22
|
08 | (System) | IESG state changed to RFC Ed Queue from Approved-announcement sent |
2022-09-22
|
08 | (System) | Announcement was received by RFC Editor |
2022-09-22
|
08 | (System) | IANA Action state changed to No IANA Actions from In Progress |
2022-09-22
|
08 | (System) | IANA Action state changed to In Progress |
2022-09-22
|
08 | (System) | Removed all action holders (IESG state changed) |
2022-09-22
|
08 | Cindy Morgan | IESG state changed to Approved-announcement sent from IESG Evaluation::AD Followup |
2022-09-22
|
08 | Cindy Morgan | IESG has approved the document |
2022-09-22
|
08 | Cindy Morgan | Closed "Approve" ballot |
2022-09-22
|
08 | Cindy Morgan | Ballot approval text was generated |
2022-09-19
|
08 | Randy Bush | New version available: draft-ietf-sidrops-rov-no-rr-08.txt |
2022-09-19
|
08 | Randy Bush | New version accepted (logged-in submitter: Randy Bush) |
2022-09-19
|
08 | Randy Bush | Uploaded new revision |
2022-09-08
|
07 | Andrew Alston | [Ballot comment] My thanks to the authors for resolving the discussed issues in version 7. As per my email to sidrops - I did have … [Ballot comment] My thanks to the authors for resolving the discussed issues in version 7. As per my email to sidrops - I did have a request to ask the authors if they would remove the last sentence of section 5 Specifically: Such circumstances could include operational work-arounds such as the informed consent of the affected peers. Based on the fact that section 5 now moves from mandatory MUST's to lower case should's I am ok with removing this sentence, but I will leave that to the authors discretion. In the mean time I am clearing this discuss. |
2022-09-08
|
07 | Andrew Alston | [Ballot Position Update] Position for Andrew Alston has been changed to No Objection from Discuss |
2022-08-29
|
07 | Gunter Van de Velde | Closed request for Last Call review by OPSDIR with state 'Overtaken by Events' |
2022-08-26
|
07 | (System) | Changed action holders to Warren Kumari (IESG state changed) |
2022-08-26
|
07 | (System) | Sub state has been changed to AD Followup from Revised ID Needed |
2022-08-26
|
07 | (System) | IANA Review state changed to Version Changed - Review Needed from IANA OK - No Actions Needed |
2022-08-26
|
07 | Randy Bush | New version available: draft-ietf-sidrops-rov-no-rr-07.txt |
2022-08-26
|
07 | Randy Bush | New version accepted (logged-in submitter: Randy Bush) |
2022-08-26
|
07 | Randy Bush | Uploaded new revision |
2022-08-25
|
06 | Murray Kucherawy | [Ballot Position Update] Position for Murray Kucherawy has been changed to No Objection from Discuss |
2022-08-25
|
06 | (System) | Changed action holders to Randy Bush, Philip Smith, Keyur Patel, Warren Kumari, Mark Tinka (IESG state changed) |
2022-08-25
|
06 | Cindy Morgan | IESG state changed to IESG Evaluation::Revised I-D Needed from IESG Evaluation |
2022-08-25
|
06 | Andrew Alston | [Ballot discuss] Hi Authors, Thanks for the document, for the most part I find it clear and easy to understand. I however would like to … [Ballot discuss] Hi Authors, Thanks for the document, for the most part I find it clear and easy to understand. I however would like to discuss the following: If the BGP speaker's equipment has insufficient resources to support either of the two proposed options, it MUST NOT be used for Route Origin Validation. The equipment should either be replaced with capable equipment or ROV not used. I.e. the knob in Section 4 should only be used in very well known and controlled circumstances. My concerns with this are two fold - firstly - it's entirely unclear what is meant by "well known and controlled circumstances". More importantly, I'm concerned that this paragraph as written could lead to a situation that where people read this as "if you can't support this behavior - forget BGP security" - and that I would think would be a more dangerous situation than the route refresh behavior. I'd be happier if we could a.) Either say that operators should plan for upgrades - but turn off RPKI in the meantime or b.) Change the wording such that it says something along the lines of "it MUST not be used for ROV without the informed consent of the peers" - meaning that peer that takes the brunt of the refreshes has to consent explicitly. Either option prevents the position where operators running smaller older hardware are handed an excuse to forgo RPKI entirely - or to turn it off - because in my experience once someone turns something off, getting them to turn it back on again, can be a tricky proposition. Let's discuss! Thanks Andrew |
2022-08-25
|
06 | Andrew Alston | [Ballot Position Update] New position, Discuss, has been recorded for Andrew Alston |
2022-08-25
|
06 | Robert Wilton | [Ballot comment] Hi, I found this document pretty easy to read, so thank you for that. Here are some comments that might improve the document, … [Ballot comment] Hi, I found this document pretty easy to read, so thank you for that. Here are some comments that might improve the document, that perhaps you may have already addressed: 1. but on the order of the in-degree of ROV implementing BGP speakers. Being ignorant, I didn't know what "in-degree" meant before I looked it up. Possibly, clarifying here would be beneficial. 2. As storing these paths could cause problems in resource constrained devices, there MUST be a knob allowing operator control of this feature. Such a knob MUST NOT be per peer, as this could cause inconsistent behavior. I would suggest that you use text like "config setting" rather than "knob". I think that it would be useful to understand whether there is any IETF YANG configuration module to control this behaviour, either existing, or in the works. 3. Such a knob MUST NOT be per peer, as this could cause inconsistent behavior. Would this necessarily give inconsistent behaviour? Wouldn't it just mean that it would always need to resync against some BGP peers, but not others? It feels quite prescriptive for an RFC to be banning more granular configuration options. 4. Operators deploying ROV and/or other RPKI based policies SHOULD ensure that the BGP speaker implementation is not causing unnecessary Route Refresh requests to neighbors. Given these are "unnecessary Route Refresh", I was wondering why this couldn't be a MUST rather than a SHOULD. 5. If the BGP speaker has insufficient resources to support either of the two proposed options, It was not 100% clear to me what the two proposed options are, I'm presuming that it is: "BGP Speakers MUST either keep the full Adj-RIB-In or implement the specification in Section 4.", but perhaps worth considering if this could be made clearer. Regards, Rob |
2022-08-25
|
06 | Robert Wilton | [Ballot Position Update] New position, No Objection, has been recorded for Robert Wilton |
2022-08-24
|
06 | Murray Kucherawy | [Ballot discuss] This should be easy to resolve, but it's a necessary process check: The shepherd writeup says this is going for Internet Standard status, … [Ballot discuss] This should be easy to resolve, but it's a necessary process check: The shepherd writeup says this is going for Internet Standard status, but the other metadata and the document itself seems to be set for Proposed Standard. Which is right? I believe there are other incantations that have to be done if the former is true. |
2022-08-24
|
06 | Murray Kucherawy | [Ballot comment] In addition to being confusing in terms of what status is being sought for this document, question 11 on the shepherd writeup was … [Ballot comment] In addition to being confusing in terms of what status is being sought for this document, question 11 on the shepherd writeup was not fully answered. I think Section 7 should either be more than just the word "None" (e.g., "This document specifies no actions for IANA."), or it should state that the section should be removed prior to publication. |
2022-08-24
|
06 | Murray Kucherawy | [Ballot Position Update] New position, Discuss, has been recorded for Murray Kucherawy |
2022-08-24
|
06 | Amanda Baber | IANA Review state changed to IANA OK - No Actions Needed from Version Changed - Review Needed |
2022-08-24
|
06 | John Scudder | [Ballot Position Update] Position for John Scudder has been changed to No Objection from Discuss |
2022-08-24
|
06 | (System) | IANA Review state changed to Version Changed - Review Needed from IANA OK - No Actions Needed |
2022-08-24
|
06 | Randy Bush | New version available: draft-ietf-sidrops-rov-no-rr-06.txt |
2022-08-24
|
06 | Randy Bush | New version accepted (logged-in submitter: Randy Bush) |
2022-08-24
|
06 | Randy Bush | Uploaded new revision |
2022-08-24
|
05 | John Scudder | [Ballot discuss] I'm strongly in favor of this work and glad to see it here. I do want to DISCUSS Section 4, though. I apologize … [Ballot discuss] I'm strongly in favor of this work and glad to see it here. I do want to DISCUSS Section 4, though. I apologize for not having reviewed and commented on this section before now. My concern can be summed up as, some of the language of Section 4 while well-intentioned, can mislead the reader into thinking it's fine to continue sending Route Refreshes after all. If you could take a swing at reorganizing it to mitigate that, it would be great. The most notable example of a place where the reader could be misled is the third paragraph, which has the clause "... MUST issue a route refresh". I think you are probably meaning to say that such a route refresh would be a natural consequence of not following this spec (and not saving the ineligible routes) -- but by using the 2119 keyword you create a different expectation. Please let me know if you want to talk this through in more detail. |
2022-08-24
|
05 | John Scudder | Ballot discuss text updated for John Scudder |
2022-08-24
|
05 | John Scudder | [Ballot discuss] I'm strongly in favor of this work and glad to see it here. I do want to DISCUSS Section 4, though. I apologize … [Ballot discuss] I'm strongly in favor of this work and glad to see it here. I do want to DISCUSS Section 4, though. I apologize for not having reviewed and commented on this section before now. My concern can be summed up as, some of the language of Section 4 while well-intentioned, can mislead the reader into thinking it's fine to continue sending Route Refreshes after all. If you could see your way clear to taking a swing at reorganizing it to mitigate that, it would be great. The most notable example of a place where the reader could be misled is the third paragraph, which has the clause "... MUST issue a route refresh". I think you are probably meaning to say that such a route refresh would be a natural consequence of not following this spec (and not saving the ineligible routes) -- but by using the 2119 keyword you create a different expectation. Please let me know if you want to talk this through in more detail. |
2022-08-24
|
05 | John Scudder | [Ballot comment] 1. I think this paragraph in Section 4 strays into dictating implementation internals, and so is unsuitable for a protocol spec: Policy … [Ballot comment] 1. I think this paragraph in Section 4 strays into dictating implementation internals, and so is unsuitable for a protocol spec: Policy which may drop routes due to RPKI-based checks such as ROV, ASPA, BGPsec [RFC8205], etc. MUST be run, and the dropped routes saved per the above paragraph, before non-RPKI policies are run, as the latter may change path attributes. It's probably harmless to an experienced BGP implementor, so I'm not going to die on this hill. 2. Can someone please update the replaced-by information to get draft-ymbk-sidrops-rov-no-rr into the document history? I had to dig for it. Nits: - s/equiptment/equipment/ - s/equipement/equipment/ |
2022-08-24
|
05 | John Scudder | [Ballot Position Update] New position, Discuss, has been recorded for John Scudder |
2022-08-24
|
05 | Roman Danyliw | [Ballot comment] Thank you to Mališa Vučinić for the SECDIR review. ** Abstract. Expand ROV on first use. ** Abstract. The text already describes the … [Ballot comment] Thank you to Mališa Vučinić for the SECDIR review. ** Abstract. Expand ROV on first use. ** Abstract. The text already describes the updates to RFC8481: This document updates RFC8481 by describing how to avoid doing so by either keeping a full Adj-RIB-In or saving paths dropped due to ROV so they may be reevaluated with respect to new RPKI data. -- This text in the abstract isn’t repeated anywhere else in the body of the text. -- Per the text in Section 5, it also appears that RFC8481 is also updated in the following way: “Conformance to this behavior is a additional, mandatory capability for BGP speakers performing ROV” (or something to that effect). ** Section 3. Typo. s/aginst/against/ ** Section 5. Operators deploying ROV and/or other RPKI based policies SHOULD ensure that the BGP speaker implementation is not causing unnecessary Route Refresh requests to neighbors. Is there any qualification on what constitutes “unnecessary Route Refresh requests”? Is it any behavior that does not conform to this document? |
2022-08-24
|
05 | Roman Danyliw | [Ballot Position Update] New position, No Objection, has been recorded for Roman Danyliw |
2022-08-24
|
05 | Amanda Baber | IANA Review state changed to IANA OK - No Actions Needed from Version Changed - Review Needed |
2022-08-24
|
05 | Zaheduzzaman Sarker | [Ballot Position Update] New position, No Objection, has been recorded for Zaheduzzaman Sarker |
2022-08-24
|
05 | Paul Wouters | [Ballot Position Update] New position, No Objection, has been recorded for Paul Wouters |
2022-08-24
|
05 | Lars Eggert | [Ballot comment] # GEN AD review of draft-ietf-sidrops-rov-no-rr-03 CC @larseggert Thanks to Paul Kyzivat for the General Area Review Team (Gen-ART) review (https://mailarchive.ietf.org/arch/msg/gen-art/Qhb_8-Kc5e5QEE47En6NhULHnjI). … [Ballot comment] # GEN AD review of draft-ietf-sidrops-rov-no-rr-03 CC @larseggert Thanks to Paul Kyzivat for the General Area Review Team (Gen-ART) review (https://mailarchive.ietf.org/arch/msg/gen-art/Qhb_8-Kc5e5QEE47En6NhULHnjI). ## Nits All comments below are about very minor potential issues that you may choose to address in some way - or ignore - as you see fit. Some were flagged by automated tools (via https://github.com/larseggert/ietf-reviewtool), so there will likely be some false positives. There is no need to let me know what you did with these suggestions. ### Typos #### Section 3, paragraph 1 ``` - the received paths aginst the new data. + the received paths against the new data. + + ``` ### Grammar/style #### Paragraph 0 ``` metadata for this document indicated a intended status of "Internet Standar ^ ``` Use "an" instead of "a" if the following word starts with a vowel sound, e.g. "an article", "an hour". #### Section 1, paragraph 1 ``` k paths affected by RPKI-based policy so Route Refresh is no longer needed. ^^^ ``` Use a comma before "so" if it connects two independent clauses (unless they are closely connected and short). #### Section 4, paragraph 1 ``` s, then it MUST issue a route refresh so those alternatives may be evaluated ^^^ ``` Use a comma before "so" if it connects two independent clauses (unless they are closely connected and short). ## Notes This review is in the ["IETF Comments" Markdown format][ICMF], You can use the [`ietf-comments` tool][ICT] to automatically convert this review into individual GitHub issues. Review generated by the [`ietf-reviewtool`][IRT]. [ICMF]: https://github.com/mnot/ietf-comments/blob/main/format.md [ICT]: https://github.com/mnot/ietf-comments [IRT]: https://github.com/larseggert/ietf-reviewtool |
2022-08-24
|
05 | Lars Eggert | [Ballot Position Update] Position for Lars Eggert has been changed to No Objection from Discuss |
2022-08-24
|
05 | Alvaro Retana | [Ballot comment] [Thank you for addressing my DISCUSS.] |
2022-08-24
|
05 | Alvaro Retana | [Ballot Position Update] Position for Alvaro Retana has been changed to No Objection from Discuss |
2022-08-24
|
05 | Warren Kumari | ... my cunning plan to sneak this directly to Internet Standard, bypassing Proposed Standard was noticed and foiled by Lars... |
2022-08-24
|
05 | Warren Kumari | Intended Status changed to Proposed Standard from Internet Standard |
2022-08-24
|
05 | Lars Eggert | [Ballot discuss] # GEN AD review of draft-ietf-sidrops-rov-no-rr-03 CC @larseggert Thanks to Paul Kyzivat for the General Area Review Team (Gen-ART) review (https://mailarchive.ietf.org/arch/msg/gen-art/Qhb_8-Kc5e5QEE47En6NhULHnjI). … [Ballot discuss] # GEN AD review of draft-ietf-sidrops-rov-no-rr-03 CC @larseggert Thanks to Paul Kyzivat for the General Area Review Team (Gen-ART) review (https://mailarchive.ietf.org/arch/msg/gen-art/Qhb_8-Kc5e5QEE47En6NhULHnjI). ## Discuss ### Unclear RFC status ``` Intended status: Standards Track Arrcus, Inc. ``` The datatracker metadata for this document indicated a intended status of "Internet Standard". I assume this is incorrect and needs to be changed (probably to "Proposed Standard".) |
2022-08-24
|
05 | Lars Eggert | [Ballot comment] ## Nits All comments below are about very minor potential issues that you may choose to address in some way - or ignore … [Ballot comment] ## Nits All comments below are about very minor potential issues that you may choose to address in some way - or ignore - as you see fit. Some were flagged by automated tools (via https://github.com/larseggert/ietf-reviewtool), so there will likely be some false positives. There is no need to let me know what you did with these suggestions. ### Typos #### Section 3, paragraph 1 ``` - the received paths aginst the new data. + the received paths against the new data. + + ``` ### Grammar/style #### Paragraph 0 ``` metadata for this document indicated a intended status of "Internet Standar ^ ``` Use "an" instead of "a" if the following word starts with a vowel sound, e.g. "an article", "an hour". #### Section 1, paragraph 1 ``` k paths affected by RPKI-based policy so Route Refresh is no longer needed. ^^^ ``` Use a comma before "so" if it connects two independent clauses (unless they are closely connected and short). #### Section 4, paragraph 1 ``` s, then it MUST issue a route refresh so those alternatives may be evaluated ^^^ ``` Use a comma before "so" if it connects two independent clauses (unless they are closely connected and short). ## Notes This review is in the ["IETF Comments" Markdown format][ICMF], You can use the [`ietf-comments` tool][ICT] to automatically convert this review into individual GitHub issues. Review generated by the [`ietf-reviewtool`][IRT]. [ICMF]: https://github.com/mnot/ietf-comments/blob/main/format.md [ICT]: https://github.com/mnot/ietf-comments [IRT]: https://github.com/larseggert/ietf-reviewtool |
2022-08-24
|
05 | Lars Eggert | [Ballot Position Update] New position, Discuss, has been recorded for Lars Eggert |
2022-08-23
|
05 | Randy Bush | New version available: draft-ietf-sidrops-rov-no-rr-05.txt |
2022-08-23
|
05 | Randy Bush | New version accepted (logged-in submitter: Randy Bush) |
2022-08-23
|
05 | Randy Bush | Uploaded new revision |
2022-08-23
|
04 | (System) | IANA Review state changed to Version Changed - Review Needed from IANA OK - No Actions Needed |
2022-08-23
|
04 | Randy Bush | New version available: draft-ietf-sidrops-rov-no-rr-04.txt |
2022-08-23
|
04 | Randy Bush | New version accepted (logged-in submitter: Randy Bush) |
2022-08-23
|
04 | Randy Bush | Uploaded new revision |
2022-08-22
|
03 | Alvaro Retana | [Ballot discuss] (1) [I'm raising this point to be a discussion -- it may not end with changes to the document.] This document recommends that … [Ballot discuss] (1) [I'm raising this point to be a discussion -- it may not end with changes to the document.] This document recommends that route refresh not be used when inbound policies change at a relatively high rate. ROV validation is "only" an example. As Jeff Haas wrote on the idr list [1]: This isn't any different than any other over-aggressive provisioning tool's impact. Was there any consideration given to making a general recommendation and not just limiting it to ROV? I can see the direct impact on rfc6811/rfc8481, and how general BGP advice is out of scope for sidrops. However, I am primarily curious whether there is anything particular to ROV to focus the recommendation this way. I couldn't find a related discussion (beyond Jeff's message) in the archive, but I may have missed it. [1] https://mailarchive.ietf.org/arch/msg/idr/F3w0RDyv9dK4w15fzuDZx3P4Jw0 (2) I have a couple of issues with this paragraph from §4. Addressing them should be relatively easy: When RPKI data cause one or more paths to be dropped due to ROV, those paths MUST NOT be evaluated for best path, but MUST be saved (either separately or marked) so they may be reevaluated with respect to new RPKI data. (2a) "paths to be dropped due to ROV, those paths MUST NOT be evaluated for best path" Neither rfc6811 nor rfc8481 require that routes be "dropped due to ROV". rfc8481 requires that "Absent specific operator configuration, policy MUST NOT be applied." Please clarify that the trigger above ("dropped due to ROV") is defined by the operator and is not just a result of ROV. (b) "MUST be saved (either separately or marked)" For a required action, the description is not clear. For starters, "marked" how? Separately where? From §1.1/rfc4271: The Adj-RIBs-In contains unprocessed routing information that has been advertised to the local BGP speaker by its peers. The RIB structures in rfc4271 are conceptual -- but since this document requires keeping information (presumably in the Adj-RIB-In), please be more specific about where and marked how. (3) The following requirement from §5 is outside the scope of this document: If the BGP speaker has insufficient resources to support either of the two proposed options, it MUST NOT be used for Route Origin Validation. I.e. the knob in Section 4 should only be used in very well known and controlled circumstances. Requiring a node not to be used for ROV is a powerful statement. It basically invalidates the base operation specified on rfc6811/rfc8481 by always requiring the mechanism in this document. While I understand the potential resource demands, selecting a node to perform a specific operation in a particular operator's network is outside the scope of this document. Instead, I would like to see guidance to the operator to consider not using the specific piece of equipment to perform a particular function. This can be as easy as: If the BGP speaker has insufficient resources to support either of the two proposed options, the operator is strongly encouraged to consider an alternate piece of equipment to perform Route Origin Validation. The second part of the sentence ("I.e. ...") sounds like a better recommendation -- and, clearly, not the same as "MUST NOT be used". |
2022-08-22
|
03 | Alvaro Retana | [Ballot comment] (1) This document should be tagged as replacing draft-ymbk-sidrops-rov-no-rr. (2) Expand ROV on first use. (3) rfc4271 doesn't talk about a "best path" … [Ballot comment] (1) This document should be tagged as replacing draft-ymbk-sidrops-rov-no-rr. (2) Expand ROV on first use. (3) rfc4271 doesn't talk about a "best path" -- it does talk about a Decision Process that results in a best route (or ineligible routes). Please be consistent with existing terminology. (3) The reference to route-refresh should include rfc2918. (4) §4: s/there MUST be a knob allowing operator control of this feature. Such a knob MUST NOT be per peer, as this could cause inconsistent behavior./an implementation MUST provide a global mechanism to control the operation. A knob makes me think of the CLI -- I'm sure you want the possibility to control the behavior in other ways: YANG, etc.. (5) §5: "Operators...SHOULD ensure that the BGP speaker implementation is not causing unnecessary Route Refresh requests to neighbors." What is the interoperability-related requirement with "ensuring" that makes Normative language needed? What does "ensure" entail? When is it ok for the operator to not "ensure"? Why is this action only recommended and not required? After all, eliminating unnecessary route refresh requests is the purpose of this document. There's a similar phrase later on without Normative language. s/SHOULD/should (6) §5: "the operator SHOULD enable the vendor's knob" Same questions as above: Why is Normative language needed here? When is it ok to not enable the functionality? Why is this action recommended and not required? ... (7) §5: "Pre-policy filtering...SHOULD be used to reduce this exposure." When is it ok to not use pre-policy filtering? Why is this action recommended and not required? (8) rfc6811 and rfc8481 should be Normative references. (9) s/(IXPs)which/(IXPs) which |
2022-08-22
|
03 | Alvaro Retana | [Ballot Position Update] New position, Discuss, has been recorded for Alvaro Retana |
2022-08-22
|
03 | Éric Vyncke | [Ballot Position Update] New position, No Objection, has been recorded for Éric Vyncke |
2022-08-13
|
03 | Erik Kline | [Ballot Position Update] New position, No Objection, has been recorded for Erik Kline |
2022-08-09
|
03 | John Drake | Request for Last Call review by RTGDIR Completed: Ready. Reviewer: John Drake. Sent review to list. |
2022-08-08
|
03 | Cindy Morgan | Placed on agenda for telechat - 2022-08-25 |
2022-08-08
|
03 | Warren Kumari | Ballot has been issued |
2022-08-08
|
03 | Warren Kumari | [Ballot Position Update] New position, Yes, has been recorded for Warren Kumari |
2022-08-08
|
03 | Warren Kumari | Created "Approve" ballot |
2022-08-08
|
03 | Warren Kumari | IESG state changed to IESG Evaluation from Waiting for AD Go-Ahead |
2022-08-03
|
03 | Luc André Burdet | Request for Last Call review by RTGDIR is assigned to John Drake |
2022-08-03
|
03 | Luc André Burdet | Request for Last Call review by RTGDIR is assigned to John Drake |
2022-08-03
|
03 | Mališa Vučinić | Request for Last Call review by SECDIR Completed: Ready. Reviewer: Mališa Vučinić. Sent review to list. |
2022-08-02
|
03 | (System) | IESG state changed to Waiting for AD Go-Ahead from In Last Call |
2022-07-23
|
03 | Paul Kyzivat | Request for Last Call review by GENART Completed: Ready. Reviewer: Paul Kyzivat. |
2022-07-16
|
03 | Gunter Van de Velde | Request for Last Call review by OPSDIR is assigned to Scott Bradner |
2022-07-16
|
03 | Gunter Van de Velde | Request for Last Call review by OPSDIR is assigned to Scott Bradner |
2022-07-15
|
03 | Tero Kivinen | Request for Last Call review by SECDIR is assigned to Mališa Vučinić |
2022-07-15
|
03 | Tero Kivinen | Request for Last Call review by SECDIR is assigned to Mališa Vučinić |
2022-07-14
|
03 | Jean Mahoney | Request for Last Call review by GENART is assigned to Paul Kyzivat |
2022-07-14
|
03 | Jean Mahoney | Request for Last Call review by GENART is assigned to Paul Kyzivat |
2022-07-14
|
03 | (System) | IANA Review state changed to IANA OK - No Actions Needed from IANA - Review Needed |
2022-07-14
|
03 | Michelle Thangtamsatid | (Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs: The IANA Functions Operator has reviewed draft-ietf-sidrops-rov-no-rr-03, which is currently in Last Call, and has the following comments: We … (Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs: The IANA Functions Operator has reviewed draft-ietf-sidrops-rov-no-rr-03, which is currently in Last Call, and has the following comments: We understand that this document doesn't require any registry actions. While it's often helpful for a document's IANA Considerations section to remain in place upon publication even if there are no actions, if the authors strongly prefer to remove it, we do not object. If this assessment is not accurate, please respond as soon as possible. For definitions of IANA review states, please see: https://datatracker.ietf.org/help/state/draft/iana-review Thank you, Michelle Thangtamsatid IANA Services Specialist |
2022-07-12
|
03 | Alvaro Retana | Requested Last Call review by RTGDIR |
2022-07-12
|
03 | Cindy Morgan | IANA Review state changed to IANA - Review Needed |
2022-07-12
|
03 | Cindy Morgan | The following Last Call announcement was sent out (ends 2022-08-02): From: The IESG To: IETF-Announce CC: draft-ietf-sidrops-rov-no-rr@ietf.org, morrowc@ops-netman.net, sidrops-chairs@ietf.org, sidrops@ietf.org, warren@kumari.net … The following Last Call announcement was sent out (ends 2022-08-02): From: The IESG To: IETF-Announce CC: draft-ietf-sidrops-rov-no-rr@ietf.org, morrowc@ops-netman.net, sidrops-chairs@ietf.org, sidrops@ietf.org, warren@kumari.net Reply-To: last-call@ietf.org Sender: Subject: Last Call: (RPKI-Based Policy Without Route Refresh) to Internet Standard The IESG has received a request from the SIDR Operations WG (sidrops) to consider the following document: - 'RPKI-Based Policy Without Route Refresh' as Internet Standard The IESG plans to make a decision in the next few weeks, and solicits final comments on this action. Please send substantive comments to the last-call@ietf.org mailing lists by 2022-08-02. Exceptionally, comments may be sent to iesg@ietf.org instead. In either case, please retain the beginning of the Subject line to allow automated sorting. Abstract A BGP Speaker performing RPKI-based policy should not issue Route Refresh to its neighbors because it has received new RPKI data. This document updates RFC8481 by describing how to avoid doing so by either keeping a full Adj-RIB-In or saving paths dropped due to ROV so they may be reevaluated with respect to new RPKI data. The file can be obtained via https://datatracker.ietf.org/doc/draft-ietf-sidrops-rov-no-rr/ No IPR declarations have been submitted directly on this I-D. The document contains these normative downward references. See RFC 3967 for additional information: rfc7313: Enhanced Route Refresh Capability for BGP-4 (Proposed Standard - Internet Engineering Task Force (IETF)) rfc4271: A Border Gateway Protocol 4 (BGP-4) (Draft Standard - Internet Engineering Task Force (IETF)) |
2022-07-12
|
03 | Cindy Morgan | IESG state changed to In Last Call from Last Call Requested |
2022-07-12
|
03 | Cindy Morgan | Last call announcement was changed |
2022-07-12
|
03 | Warren Kumari | Last call was requested |
2022-07-12
|
03 | Warren Kumari | Last call announcement was generated |
2022-07-12
|
03 | Warren Kumari | Ballot approval text was generated |
2022-07-12
|
03 | (System) | Changed action holders to Warren Kumari (IESG state changed) |
2022-07-12
|
03 | Warren Kumari | IESG state changed to Last Call Requested from Publication Requested |
2022-07-12
|
03 | Warren Kumari | Ballot writeup was changed |
2022-07-06
|
03 | Randy Bush | New version available: draft-ietf-sidrops-rov-no-rr-03.txt |
2022-07-06
|
03 | (System) | New version approved |
2022-07-06
|
03 | (System) | Request for posting confirmation emailed to previous authors: Keyur Patel , Mark Tinka , Philip Smith , Randy Bush |
2022-07-06
|
03 | Randy Bush | Uploaded new revision |
2022-06-06
|
02 | Chris Morrow | # Document Shepherd Writeup *This version is dated 8 April 2022.* Thank you for your service as a document shepherd. Among the responsibilities is answering … # Document Shepherd Writeup *This version is dated 8 April 2022.* Thank you for your service as a document shepherd. Among the responsibilities is answering the questions in this writeup to give helpful context to Last Call and Internet Engineering Steering Group ([IESG][1]) reviewers, and your diligence in completing it, is appreciated. The full role of the shepherd is further described in [RFC 4858][2], and informally. You will need the cooperation of authors to complete these checks. Note that some numbered items contain multiple related questions; please be sure to answer all of them. ## Document History 1. Does the working group (WG) consensus represent the strong concurrence of a few individuals, with others being silent, or did it reach broad agreement? Consensus achieved on document. 2. Was there controversy about particular points, or were there decisions where the consensus was particularly rough? No controversy 3. Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarize the areas of conflict in separate email messages to the responsible Area Director. (It should be in a separate email because this questionnaire is publicly available.) Nope 4. For protocol documents, are there existing implementations of the contents of the document? Have a significant number of potential implementers indicated plans to implement? Are any existing implementations reported somewhere, either in the document itself (as [RFC 7942][3] recommends) or elsewhere (where)? N/A ### Additional Reviews 5. Does this document need review from other IETF working groups or external organizations? Have those reviews occurred? Do not believe so. 6. Describe how the document meets any required formal expert review criteria, such as the MIB Doctor, YANG Doctor, media type, and URI type reviews. N/A 7. If the document contains a YANG module, has the final version of the module been checked with any of the [recommended validation tools][4] for syntax and formatting validation? If there are any resulting errors or warnings, what is the justification for not fixing them at this time? Does the YANG module comply with the Network Management Datastore Architecture (NMDA) as specified in [RFC 8342][5]? Nope. 8. Describe reviews and automated checks performed to validate sections of the final version of the document written in a formal language, such as XML code, BNF rules, MIB definitions, CBOR's CDDL, etc. None required. ### Document Shepherd Checks 9. Based on the shepherd's review of the document, is it their opinion that this document is needed, clearly written, complete, correctly designed, and ready to be handed off to the responsible Area Director? I believe this document is clear and concise. 10. Several IETF Areas have assembled [lists of common issues that their reviewers encounter][6]. Do any such issues remain that would merit specific attention from subsequent reviews? Nope 11. What type of RFC publication is being requested on the IETF stream (Best Current Practice, Proposed Standard, Internet Standard, Informational, Experimental, or Historic)? Why is this the proper type of RFC? Do all Datatracker state attributes correctly reflect this intent? Internet Standard 12. Has the interested community confirmed that any and all appropriate IPR disclosures required by [BCP 78][7] and [BCP 79][8] have been filed? If not, explain why. If yes, summarize any discussion and conclusion regarding the intellectual property rights (IPR) disclosures, including links to relevant emails. Yes, no IPR claims claimed at claiming time. 13. Has each Author or Contributor confirmed their willingness to be listed as such? If the number of Authors/Editors on the front page is greater than 5, please provide a justification. Yes 14. Identify any remaining I-D nits in this document. (See [the idnits tool][9] and the checkbox items found in Guidelines to Authors of Internet-Drafts). Simply running the idnits tool is not enough; please review the entire guidelines document. " -- The draft header indicates that this document updates RFC8481, but the abstract doesn't seem to mention this, which it should." This will be caught up in the next revision that includes iesg/etc commentary/replies. 15. Should any informative references be normative or vice-versa? Nope! 16. List any normative references that are not freely available to anyone. Did the community have sufficient access to review any such normative references? N/A 17. Are there any normative downward references (see [RFC 3967][10], [BCP 97][11])? If so, list them. N/A 18. Are there normative references to documents that are not ready for advancement or are otherwise in an unclear state? If they exist, what is the plan for their completion? N/A 19. Will publication of this document change the status of any existing RFCs? If so, does the Datatracker metadata correctly reflect this and are those RFCs listed on the title page, in the abstract, and discussed in the introduction? If not, explain why and point to the part of the document where the relationship of this document to these other RFCs is discussed. Should mark an update to RFC8481. 20. Describe the document shepherd's review of the IANA considerations section, especially with regard to its consistency with the body of the document. Confirm that all aspects of the document requiring IANA assignments are associated with the appropriate reservations in IANA registries. Confirm that any referenced IANA registries have been clearly identified. Confirm that each newly created IANA registry specifies its initial contents, allocations procedures, and a reasonable name (see [RFC 8126][12]). There are no proposed updates for IANA. 21. List any new IANA registries that require Designated Expert Review for future allocations. Are the instructions to the Designated Expert clear? Please include suggestions of designated experts, if appropriate. None [1]: https://www.ietf.org/about/groups/iesg/ [2]: https://www.rfc-editor.org/rfc/rfc4858.html [3]: https://www.rfc-editor.org/rfc/rfc7942.html [4]: https://trac.ietf.org/trac/ops/wiki/yang-review-tools [5]: https://www.rfc-editor.org/rfc/rfc8342.html [6]: https://trac.ietf.org/trac/iesg/wiki/ExpertTopics [7]: https://www.rfc-editor.org/info/bcp78 [8]: https://www.rfc-editor.org/info/bcp79 [9]: https://www.ietf.org/tools/idnits/ [10]: https://www.rfc-editor.org/rfc/rfc3967.html [11]: https://www.rfc-editor.org/info/bcp97 [12]: https://www.rfc-editor.org/rfc/rfc8126.html |
2022-06-06
|
02 | Chris Morrow | Responsible AD changed to Warren Kumari |
2022-06-06
|
02 | Chris Morrow | IETF WG state changed to Submitted to IESG for Publication from WG Document |
2022-06-06
|
02 | Chris Morrow | IESG state changed to Publication Requested from I-D Exists |
2022-06-06
|
02 | Chris Morrow | IESG process started in state Publication Requested |
2022-06-06
|
02 | Chris Morrow | # Document Shepherd Writeup *This version is dated 8 April 2022.* Thank you for your service as a document shepherd. Among the responsibilities is answering … # Document Shepherd Writeup *This version is dated 8 April 2022.* Thank you for your service as a document shepherd. Among the responsibilities is answering the questions in this writeup to give helpful context to Last Call and Internet Engineering Steering Group ([IESG][1]) reviewers, and your diligence in completing it, is appreciated. The full role of the shepherd is further described in [RFC 4858][2], and informally. You will need the cooperation of authors to complete these checks. Note that some numbered items contain multiple related questions; please be sure to answer all of them. ## Document History 1. Does the working group (WG) consensus represent the strong concurrence of a few individuals, with others being silent, or did it reach broad agreement? Consensus achieved on document. 2. Was there controversy about particular points, or were there decisions where the consensus was particularly rough? No controversy 3. Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarize the areas of conflict in separate email messages to the responsible Area Director. (It should be in a separate email because this questionnaire is publicly available.) Nope 4. For protocol documents, are there existing implementations of the contents of the document? Have a significant number of potential implementers indicated plans to implement? Are any existing implementations reported somewhere, either in the document itself (as [RFC 7942][3] recommends) or elsewhere (where)? N/A ### Additional Reviews 5. Does this document need review from other IETF working groups or external organizations? Have those reviews occurred? Do not believe so. 6. Describe how the document meets any required formal expert review criteria, such as the MIB Doctor, YANG Doctor, media type, and URI type reviews. N/A 7. If the document contains a YANG module, has the final version of the module been checked with any of the [recommended validation tools][4] for syntax and formatting validation? If there are any resulting errors or warnings, what is the justification for not fixing them at this time? Does the YANG module comply with the Network Management Datastore Architecture (NMDA) as specified in [RFC 8342][5]? Nope. 8. Describe reviews and automated checks performed to validate sections of the final version of the document written in a formal language, such as XML code, BNF rules, MIB definitions, CBOR's CDDL, etc. None required. ### Document Shepherd Checks 9. Based on the shepherd's review of the document, is it their opinion that this document is needed, clearly written, complete, correctly designed, and ready to be handed off to the responsible Area Director? I believe this document is clear and concise. 10. Several IETF Areas have assembled [lists of common issues that their reviewers encounter][6]. Do any such issues remain that would merit specific attention from subsequent reviews? Nope 11. What type of RFC publication is being requested on the IETF stream (Best Current Practice, Proposed Standard, Internet Standard, Informational, Experimental, or Historic)? Why is this the proper type of RFC? Do all Datatracker state attributes correctly reflect this intent? Internet Standard 12. Has the interested community confirmed that any and all appropriate IPR disclosures required by [BCP 78][7] and [BCP 79][8] have been filed? If not, explain why. If yes, summarize any discussion and conclusion regarding the intellectual property rights (IPR) disclosures, including links to relevant emails. Yes, no IPR claims claimed at claiming time. 13. Has each Author or Contributor confirmed their willingness to be listed as such? If the number of Authors/Editors on the front page is greater than 5, please provide a justification. Yes 14. Identify any remaining I-D nits in this document. (See [the idnits tool][9] and the checkbox items found in Guidelines to Authors of Internet-Drafts). Simply running the idnits tool is not enough; please review the entire guidelines document. " -- The draft header indicates that this document updates RFC8481, but the abstract doesn't seem to mention this, which it should." This will be caught up in the next revision that includes iesg/etc commentary/replies. 15. Should any informative references be normative or vice-versa? Nope! 16. List any normative references that are not freely available to anyone. Did the community have sufficient access to review any such normative references? N/A 17. Are there any normative downward references (see [RFC 3967][10], [BCP 97][11])? If so, list them. N/A 18. Are there normative references to documents that are not ready for advancement or are otherwise in an unclear state? If they exist, what is the plan for their completion? N/A 19. Will publication of this document change the status of any existing RFCs? If so, does the Datatracker metadata correctly reflect this and are those RFCs listed on the title page, in the abstract, and discussed in the introduction? If not, explain why and point to the part of the document where the relationship of this document to these other RFCs is discussed. Should mark an update to RFC8481. 20. Describe the document shepherd's review of the IANA considerations section, especially with regard to its consistency with the body of the document. Confirm that all aspects of the document requiring IANA assignments are associated with the appropriate reservations in IANA registries. Confirm that any referenced IANA registries have been clearly identified. Confirm that each newly created IANA registry specifies its initial contents, allocations procedures, and a reasonable name (see [RFC 8126][12]). There are no proposed updates for IANA. 21. List any new IANA registries that require Designated Expert Review for future allocations. Are the instructions to the Designated Expert clear? Please include suggestions of designated experts, if appropriate. None [1]: https://www.ietf.org/about/groups/iesg/ [2]: https://www.rfc-editor.org/rfc/rfc4858.html [3]: https://www.rfc-editor.org/rfc/rfc7942.html [4]: https://trac.ietf.org/trac/ops/wiki/yang-review-tools [5]: https://www.rfc-editor.org/rfc/rfc8342.html [6]: https://trac.ietf.org/trac/iesg/wiki/ExpertTopics [7]: https://www.rfc-editor.org/info/bcp78 [8]: https://www.rfc-editor.org/info/bcp79 [9]: https://www.ietf.org/tools/idnits/ [10]: https://www.rfc-editor.org/rfc/rfc3967.html [11]: https://www.rfc-editor.org/info/bcp97 [12]: https://www.rfc-editor.org/rfc/rfc8126.html |
2022-06-06
|
02 | Chris Morrow | Intended Status changed to Internet Standard from Proposed Standard |
2022-06-06
|
02 | Chris Morrow | Changed consensus to Yes from Unknown |
2022-06-06
|
02 | Chris Morrow | Intended Status changed to Proposed Standard from None |
2022-06-03
|
02 | Randy Bush | New version available: draft-ietf-sidrops-rov-no-rr-02.txt |
2022-06-03
|
02 | (System) | New version approved |
2022-06-03
|
02 | (System) | Request for posting confirmation emailed to previous authors: Keyur Patel , Mark Tinka , Philip Smith , Randy Bush |
2022-06-03
|
02 | Randy Bush | Uploaded new revision |
2022-05-06
|
01 | Randy Bush | New version available: draft-ietf-sidrops-rov-no-rr-01.txt |
2022-05-06
|
01 | Randy Bush | New version accepted (logged-in submitter: Randy Bush) |
2022-05-06
|
01 | Randy Bush | Uploaded new revision |
2022-04-07
|
00 | Chris Morrow | Notification list changed to morrowc@ops-netman.net because the document shepherd was set |
2022-04-07
|
00 | Chris Morrow | Document shepherd changed to Chris Morrow |
2022-01-27
|
00 | Randy Bush | New version available: draft-ietf-sidrops-rov-no-rr-00.txt |
2022-01-27
|
00 | (System) | WG -00 approved |
2022-01-27
|
00 | Randy Bush | Set submitter to "Randy Bush ", replaces to (none) and sent approval email to group chairs: sidrops-chairs@ietf.org |
2022-01-27
|
00 | Randy Bush | Uploaded new revision |