Skip to main content

Routing Bridges (RBridges): Base Protocol Specification
draft-ietf-trill-rbridge-protocol-16

Revision differences

Document history

Date Rev. By Action
2012-08-22
16 (System) post-migration administrative database adjustment to the No Objection position for Pasi Eronen
2012-08-22
16 (System) post-migration administrative database adjustment to the No Objection position for Tim Polk
2012-08-22
16 (System) post-migration administrative database adjustment to the No Objection position for Adrian Farrel
2012-08-22
16 (System) post-migration administrative database adjustment to the No Objection position for Ross Callon
2012-08-22
16 (System) post-migration administrative database adjustment to the No Objection position for Russ Housley
2011-05-27
16 Donald Eastlake In RFC Editor's queue.
2011-05-27
16 Donald Eastlake IETF state changed to Submitted to IESG for Publication from WG Document
2010-03-29
16 (System) IANA Action state changed to RFC-Ed-Ack from Waiting on RFC Editor
2010-03-29
16 (System) IANA Action state changed to Waiting on RFC Editor from In Progress
2010-03-29
16 (System) IANA Action state changed to In Progress from Waiting on Authors
2010-03-26
16 (System) IANA Action state changed to Waiting on Authors from In Progress
2010-03-15
16 Cindy Morgan State Changes to RFC Ed Queue from Approved-announcement sent by Cindy Morgan
2010-03-15
16 (System) IANA Action state changed to In Progress
2010-03-15
16 Amy Vezza IESG state changed to Approved-announcement sent
2010-03-15
16 Amy Vezza IESG has approved the document
2010-03-15
16 Amy Vezza Closed "Approve" ballot
2010-03-15
16 Amy Vezza State Changes to Approved-announcement to be sent from IESG Evaluation::AD Followup by Amy Vezza
2010-03-09
16 Tim Polk [Ballot Position Update] Position for Tim Polk has been changed to No Objection from Undefined by Tim Polk
2010-03-09
16 Tim Polk [Ballot Position Update] Position for Tim Polk has been changed to Undefined from Discuss by Tim Polk
2010-03-05
16 Adrian Farrel [Ballot Position Update] Position for Adrian Farrel has been changed to No Objection from Discuss by Adrian Farrel
2010-03-05
16 (System) Sub state has been changed to AD Follow up from New Id Needed
2010-03-05
16 (System) New version available: draft-ietf-trill-rbridge-protocol-16.txt
2010-02-18
16 Cindy Morgan State Changes to IESG Evaluation::Revised ID Needed from IESG Evaluation by Cindy Morgan
2010-02-18
16 Ross Callon
[Ballot discuss]
I think this is important and good work. I would also like to thank the authors for completing the last call in the …
[Ballot discuss]
I think this is important and good work. I would also like to thank the authors for completing the last call in the IS-IS working group and adding a normative reference to draft-ietf-isis-layer2.

Regarding two interoperable implementations: I have cleared based on the IESG discussion.
2010-02-18
16 Adrian Farrel
[Ballot comment]
Please close on the minor comments and nits raised in Acee Lindem's
Routing Area Directorate review.

Please fix Radia's coordinates as her email …
[Ballot comment]
Please close on the minor comments and nits raised in Acee Lindem's
Routing Area Directorate review.

Please fix Radia's coordinates as her email currently bounces.
2010-02-18
16 Adrian Farrel
[Ballot discuss]
Discuss updated after telechat.

This is a mammoth piece of work with a lot of carefully checked detail. Thanks for taking the time …
[Ballot discuss]
Discuss updated after telechat.

This is a mammoth piece of work with a lot of carefully checked detail. Thanks for taking the time to check back with the IS-IS working group.

I have three (now only two) issues for Discussion. The first is
targetted only at the Int ADs.

---

This point is withdrawn after discussion with the IESG

> 1. Implementation
>
> If this work was in the Routing Area I would consider it sufficiently
> large to require two independent implementations and would hope for
> evidence of interoperability. However, it is not, so this Discuss point
> is to ask the Int ADs to consider whether this work should really go
> onto the Standards Track with (according to the proto-writeup) no
> implementations of the current revision. Implementation is not just a
> proof of the correctness of the specification, but is a good indicator
> of whether there is actually a desire for the work.

---

2. Scope

I think that, not withstanding the reference to RFC 5556 at the very end
of Section 1, I would like to see a clear statement that this document
anticipates that the protocol deployment is limited to LANs, and that
wider deployment is for further study.

---

3. Usage of confidence levels

Per the Routing Area Directorate review by Acee Lindem, one major issue
seems to be still open.

>  The document should explain the philosophy and usage of confidence
>  level with respect to the {port, VLAN, MAC address} tuples. This
>  discussion should also tie in the confidence configuration in
>  section 5.1.

Donald Eastlake suggested...

Well, how about something like the following new text:

  The confidence level mechanism allows an RBridge campus manager to
  cause certain address learning sources to prevail over others. In a
  default configuration, without the optional ESADI protocol,
  addresses are only learned from observing local native frames and
  the decapsulation of received TRILL data frames. Both of these
  sources default to confidence level 0x20 so, since learning at an
  equal or high confidence overrides previous learning, the learning
  in such a default case mimics default 802.1 bridge learning.

  While RBridge campus management policies are beyond the scope of
  this document, here are some example types of policies that can be
  implemented with the confidence mechanism and the rational for
  each:

  o  Locally received native frames might be considered more reliable
      than decapsulated frames received from remote parts of the
      campus. To stop MAC addresses learned from such local frames
      from being usurped by remotely received forged frames, the
      confidence in locally learned addresses could be increased or
      that in addresses learned from remotely sourced decapsulated
      frames decreased.

  o  MAC address information learned through a cryptographically
      authenticated Layer 2 registration protocol, such as 802.1X with
      a cryptographically based EAP method, might be considered more
      reliable than information learned through the mere observation
      of data frames. When such authenticated learned address
      information is transmitted via the ESADI protocol, the use of
      authentication in the TRILL EASDI LSP frames could make
      tampering with it in transit very difficult. As a result, it
      might be reasonable to announce such authenticated information
      via the ESADI protocol with a high confidence, so it would
      override any alternative learning from data observation.

  Manually configured address information is generally considered
  static and so defaults to a confidence of 0xFF while no other
  source of such information can be configured to a confidence any
  higher than 0xFE. However, for other cases, such as where the
  manual configuration is just a starting point which the Rbridge
  campus manager wishes to be dynamically overrideable, the
  confidence of such manually configured information may be
  configured to a lower value.
2010-02-18
16 Ross Callon [Ballot Position Update] Position for Ross Callon has been changed to No Objection from Discuss by Ross Callon
2010-02-18
16 Adrian Farrel
[Ballot comment]
Please close on the minor comments and nits raised in Acee Lindem's
Routing Area Directorate review.

Please fix Radia's coordinates as her email …
[Ballot comment]
Please close on the minor comments and nits raised in Acee Lindem's
Routing Area Directorate review.

Please fix Radia's coordinates as her email currently bounces.
2010-02-18
16 Adrian Farrel
[Ballot discuss]
This is a mammoth piece of work with a lot of carefully checked detail. Thanks for taking the time to check back with …
[Ballot discuss]
This is a mammoth piece of work with a lot of carefully checked detail. Thanks for taking the time to check back with the IS-IS working group.

I have three issues for Discussion. The first is targetted only at the Int ADs.

---

1. Implementation

If this work was in the Routing Area I would consider it sufficiently
large to require two independent implementations and would hope for
evidence of interoperability. However, it is not, so this Discuss point
is to ask the Int ADs to consider whether this work should really go
onto the Standards Track with (according to the proto-writeup) no
implementations of the current revision. Implementation is not just a proof of the correctness of the specification, but is a good indicator of whether there is actually a desire for the work.

---

2. Scope

I think that, not withstanding the reference to RFC 5556 at the very end
of Section 1, I would like to see a clear statement that this document
anticipates that the protocol deployment is limited to LANs, and that
wider deployment is for further study.

---

3. Usage of confidence levels

Per the Routing Area Directorate review by Acee Lindem, one major issue
seems to be still open.

>  The document should explain the philosophy and usage of confidence
>  level with respect to the {port, VLAN, MAC address} tuples. This
>  discussion should also tie in the confidence configuration in
>  section 5.1.

Donald Eastlake suggested...

Well, how about something like the following new text:

  The confidence level mechanism allows an RBridge campus manager to
  cause certain address learning sources to prevail over others. In a
  default configuration, without the optional ESADI protocol,
  addresses are only learned from observing local native frames and
  the decapsulation of received TRILL data frames. Both of these
  sources default to confidence level 0x20 so, since learning at an
  equal or high confidence overrides previous learning, the learning
  in such a default case mimics default 802.1 bridge learning.

  While RBridge campus management policies are beyond the scope of
  this document, here are some example types of policies that can be
  implemented with the confidence mechanism and the rational for
  each:

  o  Locally received native frames might be considered more reliable
      than decapsulated frames received from remote parts of the
      campus. To stop MAC addresses learned from such local frames
      from being usurped by remotely received forged frames, the
      confidence in locally learned addresses could be increased or
      that in addresses learned from remotely sourced decapsulated
      frames decreased.

  o  MAC address information learned through a cryptographically
      authenticated Layer 2 registration protocol, such as 802.1X with
      a cryptographically based EAP method, might be considered more
      reliable than information learned through the mere observation
      of data frames. When such authenticated learned address
      information is transmitted via the ESADI protocol, the use of
      authentication in the TRILL EASDI LSP frames could make
      tampering with it in transit very difficult. As a result, it
      might be reasonable to announce such authenticated information
      via the ESADI protocol with a high confidence, so it would
      override any alternative learning from data observation.

  Manually configured address information is generally considered
  static and so defaults to a confidence of 0xFF while no other
  source of such information can be configured to a confidence any
  higher than 0xFE. However, for other cases, such as where the
  manual configuration is just a starting point which the Rbridge
  campus manager wishes to be dynamically overrideable, the
  confidence of such manually configured information may be
  configured to a lower value.
2010-02-18
16 Jari Arkko [Ballot comment]
This is excellent work and very carefully crafted text. Thank you.
2010-02-18
16 Jari Arkko [Ballot Position Update] New position, Yes, has been recorded by Jari Arkko
2010-02-18
16 Ross Callon
[Ballot discuss]
I think this is important and good work. I would also like to thank the authors for completing the last call in the …
[Ballot discuss]
I think this is important and good work. I would also like to thank the authors for completing the last call in the IS-IS working group and adding a normative reference to draft-ietf-isis-layer2.

I would like to discuss during the telechat whether or not we should require two interoperable implementations prior to proposed standard status on a protocol that is this complex. I would be fine with experimental status, or with waiting for two implementations before publishing as proposed standard.
2010-02-18
16 Adrian Farrel [Ballot comment]
Please close on the minor comments and nits raised in Acee Lindem's
Routing Area Directorate review.
2010-02-18
16 Adrian Farrel
[Ballot discuss]
This is a mammoth piece of work with a lot of carefully checked detail. Thanks for taking the time to check back with …
[Ballot discuss]
This is a mammoth piece of work with a lot of carefully checked detail. Thanks for taking the time to check back with the IS-IS working group.

I have three issues for Discussion. The first is targetted only at the Int ADs.

---

1. Implementation

If this work was in the Routing Area I would consider it sufficiently
large to require two independent implementations and would hope for
evidence of interoperability. However, it is not, so this Discuss point
is to ask the Int ADs to consider whether this work should really go
onto the Standards Track with (according to the proto-writeup) no
implementations of the current revision. Implementation is not just a proof of the correctness of the specification, but is a good indicator of whether there is actually a desire for the work.

---

2. Scope

I think that, not withstanding the reference to RFC 5556 at the very end
of Section 1, I would like to see a clear statement that this document
anticipates that the protocol deployment is limited to LANs, and that
wider deployment is for further study.

---

3. Usage of confidence levels

Per the Routing Area Directorate review by Acee Lindem, one major issue
seems to be still open.

>  The document should explain the philosophy and usage of confidence
>  level with respect to the {port, VLAN, MAC address} tuples. This
>  discussion should also tie in the confidence configuration in
>  section 5.1.

Donald Eastlake suggested...

Well, how about something like the following new text:

  The confidence level mechanism allows an RBridge campus manager to
  cause certain address learning sources to prevail over others. In a
  default configuration, without the optional ESADI protocol,
  addresses are only learned from observing local native frames and
  the decapsulation of received TRILL data frames. Both of these
  sources default to confidence level 0x20 so, since learning at an
  equal or high confidence overrides previous learning, the learning
  in such a default case mimics default 802.1 bridge learning.

  While RBridge campus management policies are beyond the scope of
  this document, here are some example types of policies that can be
  implemented with the confidence mechanism and the rational for
  each:

  o  Locally received native frames might be considered more reliable
      than decapsulated frames received from remote parts of the
      campus. To stop MAC addresses learned from such local frames
      from being usurped by remotely received forged frames, the
      confidence in locally learned addresses could be increased or
      that in addresses learned from remotely sourced decapsulated
      frames decreased.

  o  MAC address information learned through a cryptographically
      authenticated Layer 2 registration protocol, such as 802.1X with
      a cryptographically based EAP method, might be considered more
      reliable than information learned through the mere observation
      of data frames. When such authenticated learned address
      information is transmitted via the ESADI protocol, the use of
      authentication in the TRILL EASDI LSP frames could make
      tampering with it in transit very difficult. As a result, it
      might be reasonable to announce such authenticated information
      via the ESADI protocol with a high confidence, so it would
      override any alternative learning from data observation.

  Manually configured address information is generally considered
  static and so defaults to a confidence of 0xFF while no other
  source of such information can be configured to a confidence any
  higher than 0xFE. However, for other cases, such as where the
  manual configuration is just a starting point which the Rbridge
  campus manager wishes to be dynamically overrideable, the
  confidence of such manually configured information may be
  configured to a lower value.
2010-02-18
16 Adrian Farrel [Ballot Position Update] New position, Discuss, has been recorded by Adrian Farrel
2010-02-17
16 Tim Polk
[Ballot comment]
Stylistic quibbles with section 3:
(1) IMHO, the TRILL header figure should include the header Options field.
(2) Section 3.5 should be renamed …
[Ballot comment]
Stylistic quibbles with section 3:
(1) IMHO, the TRILL header figure should include the header Options field.
(2) Section 3.5 should be renamed "Op-length" and should focus on Op-length
(3) The bulk of the current 3.5 should be moved to a new section 3.8 "TRILL Header Options"
These changes would ensure that the figure 3.1 and subsequent list are parallel with
the remainder of section 3.

Non-stylistic quiblle with section 3: When the data link layer is IEEE [802.3], are there any
constraints on Op-length to ensure that the 64 alignment is maintained?
(Found the answer in section 4, but wonder if it should be mentioned earlier!)

Section 3.7.3, fourth bullet, first sentence:

Sorry to nitpick, but should we explicitly state that when the most significant bit is set to 1,
this indicates the nickname value was configured?

Section 4.1.1, first paragraph after Figure 4.2

Another Nit, but if RBridges are permitted to support a subset of the VLAN IDs, couldn't
we have a situation where two implementations supported disjoint ranges and were not
interoperable?  Or a I misreading that text?

Section 4.1.3, second paragraph first sentence.

Shouldn't this sentence state that TRILL framesforwarded by a transit RBridge use the
priority present in the Outer.VLAN tag as received?
2010-02-17
16 Tim Polk
[Ballot discuss]
This is a discuss-discuss: do we need to establish IANA registries for the Version (V) and
Reserved (R) bits in sections 3.2. and …
[Ballot discuss]
This is a discuss-discuss: do we need to establish IANA registries for the Version (V) and
Reserved (R) bits in sections 3.2. and 3.3?  Since each field is only two bits, it seems important
to ensure that IETF standards action be required to allocate new values.
2010-02-17
16 Tim Polk
[Ballot comment]
Stylistic quibbles with section 3:
(1) IMHO, the TRILL header figure should include the header Options field.
(2) Section 3.5 should be renamed …
[Ballot comment]
Stylistic quibbles with section 3:
(1) IMHO, the TRILL header figure should include the header Options field.
(2) Section 3.5 should be renamed "Op-length" and should focus on Op-length
(3) The bulk of the current 3.5 should be moved to a new section 3.8 "TRILL Header Options"
These changes would ensure that the figure 3.1 and subsequent list are parallel with
the remainder of section 3.

Non-stylistic quiblle with section 3: When the data link layer is IEEE [802.3], are there any
constraints on Op-length to ensure that the 64 alignment is maintained?

Section 3.7.3, fourth bullet, first sentence:

Sorry to nitpick, but should we explicitly state that when the most significant bit is set to 1,
this indicates the nickname value was configured?

Section 4.1.1, first paragraph after Figure 4.2

Another Nit, but if RBridges are permitted to support a subset of the VLAN IDs, couldn't
we have a situation where two implementations supported disjoint ranges and were not
interoperable?  Or a I misreading that text?
2010-02-17
16 Tim Polk
[Ballot discuss]
This is a discuss-discuss: do we need to establish IANA registries for the Version (V) and
Reserved (R) bits in sections 3.2. and …
[Ballot discuss]
This is a discuss-discuss: do we need to establish IANA registries for the Version (V) and
Reserved (R) bits in sections 3.2. and 3.3?  Since each field is only two bits, it seems important
to ensure that IETF standards action be required to allocate new values.
2010-02-17
16 Tim Polk
[Ballot comment]
Stylistic quibbles with section 3:
(1) IMHO, the TRILL header figure should include the header Options field.
(2) Section 3.5 should be renamed …
[Ballot comment]
Stylistic quibbles with section 3:
(1) IMHO, the TRILL header figure should include the header Options field.
(2) Section 3.5 should be renamed "Op-length" and should focus on Op-length
(3) The bulk of the current 3.5 should be moved to a new section 3.8 "TRILL Header Options"
These changes would ensure that the figure 3.1 and subsequent list are parallel with
the remainder of section 3.

Non-stylistic quiblle with section 3: When the data link layer is IEEE [802.3], are there any
constraints on Op-length to ensure that the 64 alignment is maintained?
2010-02-17
16 Tim Polk
[Ballot discuss]
This is a discuss-discuss: do we need to establish IANA registries for the Version (V) and
Reserved (R) bits in sections 3.2. and …
[Ballot discuss]
This is a discuss-discuss: do we need to establish IANA registries for the Version (V) and
Reserved (R) bits in sections 3.2. and 3.3?  Since each field is only two bits, it seems important
to ensure that IETF standards action be required to allocate new values.
2010-02-17
16 Tim Polk [Ballot Position Update] New position, Discuss, has been recorded by Tim Polk
2010-02-17
16 Tim Polk
[Ballot comment]
Stylistic quibbles with section 3:
(1) IMHO, the TRILL header figure should include the header Options field.
(2) Section 3.5 should be renamed …
[Ballot comment]
Stylistic quibbles with section 3:
(1) IMHO, the TRILL header figure should include the header Options field.
(2) Section 3.5 should be renamed "Op-length" and should focus on Op-length
(3) The bulk of the current 3.5 should be moved to a new section 3.8 "TRILL Header Options"
These changes would ensure that the figure 3.1 and subsequent list are parallel with
the remainder of section 3.

Non-stylistic quiblle with section 3: When the data link layer is IEEE [802.3], are there any
constraints on Op-length to ensure that the 64 alignment is maintained?
2010-02-17
16 Cullen Jennings [Ballot Position Update] New position, No Objection, has been recorded by Cullen Jennings
2010-02-17
16 Dan Romascanu [Ballot Position Update] New position, No Objection, has been recorded by Dan Romascanu
2010-02-16
16 Alexey Melnikov [Ballot Position Update] New position, No Objection, has been recorded by Alexey Melnikov
2010-01-29
16 Ralph Droms State Changes to IESG Evaluation from IESG Evaluation - Defer by Ralph Droms
2010-01-29
16 Ralph Droms Telechat date was changed to 2010-02-18 from 2010-02-04 by Ralph Droms
2010-01-24
16 Russ Housley [Ballot Position Update] Position for Russ Housley has been changed to No Objection from Discuss by Russ Housley
2010-01-23
16 Pasi Eronen [Ballot Position Update] Position for Pasi Eronen has been changed to No Objection from Discuss by Pasi Eronen
2010-01-22
15 (System) New version available: draft-ietf-trill-rbridge-protocol-15.txt
2010-01-20
16 Ross Callon
[Ballot discuss]
I think this is important and good work. However, I think that the document needs to be last called in the IS-IS working …
[Ballot discuss]
I think this is important and good work. However, I think that the document needs to be last called in the IS-IS working group. Also, my understanding that this document is very closely related to and needs a normative reference to draft-ietf-isis-layer2.
2010-01-20
16 Ross Callon [Ballot Position Update] New position, Discuss, has been recorded by Ross Callon
2010-01-20
16 Adrian Farrel State Changes to IESG Evaluation - Defer from IESG Evaluation by Adrian Farrel
2010-01-20
16 Robert Sparks [Ballot Position Update] New position, No Objection, has been recorded by Robert Sparks
2010-01-20
16 Ron Bonica [Ballot Position Update] New position, No Objection, has been recorded by Ron Bonica
2010-01-20
16 Lars Eggert [Ballot Position Update] New position, No Objection, has been recorded by Lars Eggert
2010-01-20
16 Pasi Eronen [Ballot comment]
I found the document surprisingly well-written and easy to
understand (despite the complex topic).
2010-01-20
16 Pasi Eronen
[Ballot discuss]
I have reviewed draft-ietf-trill-rbridge-protocol-14, and have one
questions that I'd like to discuss before recommending approval of
the document:

Section 4.7 says …
[Ballot discuss]
I have reviewed draft-ietf-trill-rbridge-protocol-14, and have one
questions that I'd like to discuss before recommending approval of
the document:

Section 4.7 says "RBridges do not need to announce themselves as
listeners to the All-Snoopers multicast group (the group used for MRD
reports [RFC4541]), because the IP multicast address for that group is
in the range where all frames sent to that IP multicast addresses must
be broadcast."

Isn't this true only for IPv4, but not IPv6? (RFC 4541 seems to
broadcast 224.0.0.106, but not FF02::6A)
2010-01-20
16 Pasi Eronen [Ballot Position Update] New position, Discuss, has been recorded by Pasi Eronen
2010-01-17
16 Russ Housley
[Ballot discuss]
The Gen-ART Review by Pete McCann on 2010-01-08 raised some questions,
  and the WG Chair has proposed text to address them.  However, …
[Ballot discuss]
The Gen-ART Review by Pete McCann on 2010-01-08 raised some questions,
  and the WG Chair has proposed text to address them.  However, an
  updated document has not been posted yet.  I think the proposed
  changes are too big for RFC Editor notes.
2010-01-17
16 Russ Housley [Ballot Position Update] New position, Discuss, has been recorded by Russ Housley
2010-01-17
16 Ralph Droms State Changes to IESG Evaluation from Waiting for AD Go-Ahead by Ralph Droms
2010-01-14
16 Samuel Weiler Request for Telechat review by SECDIR Completed. Reviewer: Stefan Santesson.
2010-01-11
16 (System) State has been changed to Waiting for AD Go-Ahead from In Last Call by system
2010-01-05
16 Amanda Baber
IANA questions/comments:

QUESTION: Should the registry be more generically called "TRILL
Parameters" (instead of the proposed "TRILL Nicknames and Multicast
Address Registry") to include additional …
IANA questions/comments:

QUESTION: Should the registry be more generically called "TRILL
Parameters" (instead of the proposed "TRILL Nicknames and Multicast
Address Registry") to include additional future sub-registries related
to TRILL?

QUESTION: Section 3.2 describes a version field. Should the version
numbers field be part of a registry?

QUESTION: Section 3.3 describes reserved bits. Should the reserved bits
field be part of a registry?

Upon approval of this document, IANA will create the following
registries at http://www.iana.org/assignments/TBD.

Registry Name: TRILL Nicknames
Registration Procedures:
RFC Required or IETF Review for single values
IETF Review for multiple values


Value Description Reference
------------- -------------------------------------
------------------------------------
0x0000 Reserved (no nickname specified)
[RFC-ietf-trill-rbridge-protocol-14]
0x0001-0xFFBF Dynamically allocated by the RBridges
[RFC-ietf-trill-rbridge-protocol-14]
within each RBridge campus
0xFFC0-0xFFFE Unassigned
0xFFFF Reserved
[RFC-ietf-trill-rbridge-protocol-14]


Registry Name: TRILL Multicast Address
Registration Procedures: IETF Review

Value Description Reference
------------------ -------------------------------
------------------------------------
01-80-C2-XX-XX-X0 All-RBridges
[RFC-ietf-trill-rbridge-protocol-14]
01-80-C2-XX-XX-X1 All-IS-IS-RBridges
[RFC-ietf-trill-rbridge-protocol-14]
01-80-C2-XX-XX-X2 All-ESADI-RBridges
[RFC-ietf-trill-rbridge-protocol-14]
01-80-C2-XX-XX-X3 to 01-80-C2-XX-XX-XF Unassigned
2010-01-03
16 Ralph Droms [Ballot Position Update] New position, Yes, has been recorded for Ralph Droms
2010-01-03
16 Ralph Droms Ballot has been issued by Ralph Droms
2010-01-03
16 Ralph Droms Created "Approve" ballot
2009-12-18
16 Samuel Weiler Request for Telechat review by SECDIR is assigned to Stefan Santesson
2009-12-18
16 Samuel Weiler Request for Telechat review by SECDIR is assigned to Stefan Santesson
2009-12-18
16 Amy Vezza Last call sent
2009-12-18
16 Amy Vezza State Changes to In Last Call from Last Call Requested by Amy Vezza
2009-12-18
16 Ralph Droms State Changes to Last Call Requested from AD Evaluation by Ralph Droms
2009-12-18
16 Ralph Droms Last Call was requested by Ralph Droms
2009-12-18
16 Ralph Droms Placed on agenda for telechat - 2010-01-21 by Ralph Droms
2009-12-18
16 (System) Ballot writeup text was added
2009-12-18
16 (System) Last call text was added
2009-12-18
16 (System) Ballot approval text was added
2009-12-09
16 Ralph Droms State Changes to AD Evaluation from Publication Requested by Ralph Droms
2009-12-09
16 Ralph Droms [Note]: 'Erik Nordmark (erik.nordmark@sun.com) is the Document Shepherd.' added by Ralph Droms
2009-12-02
16 Amy Vezza
(1.a) Who is the Document Shepherd for this document? Has the
      Document Shepherd personally reviewed this version of the
      …
(1.a) Who is the Document Shepherd for this document? Has the
      Document Shepherd personally reviewed this version of the
      document and, in particular, does he or she believe this
      version is ready for forwarding to the IESG for publication?

I, Erik Nordmark, TRILL Working Group co-chair, is the Document
Shepherd. I have have personally reviewed version 14 of the document and
I believes it is ready for forwarding to the IESG for publication.
(The document is of quite high technical and editorial quality - better than
any document of this size that I recall reading as an AD.)

(1.b) Has the document had adequate review both from key WG members
      and from key non-WG members? Does the Document Shepherd have
      any concerns about the depth or breadth of the reviews that
      have been performed?

The document has had unusually thorough review. There were two Working
Group Last calls, once on draft -10 and one on draft -13. (The biggest
technical change between -10 and -13 was to fix an MTU related problem
that was detected during testing of a software implementation of the
-10 draft by Jim Carlson.) The draft has been reviewed by the
active working group participants over an extended period of time. From
the nature of many of the questions and comments from the reviewers it is
clear that many of them are reviewing the document from the perspective of
an implementor wanting to ensure that things will work correctly and also
interoperate with other implementations. Such careful review bodes well
for future interoperability testing.

The WG last call was also explicitly sent to the IS-IS WG and the MTU
problem was resolved in consultation with participants in IS-IS.

In addition, as required by its Charter, the Working Group requested
that IEEE 802.1 review the draft. Their response included some
critical but non-specific comments on the draft. It also asserted that
TRILL is "incompatible" with 802.1 provider and provider backbone
bridging when it is just that TRILL does not supply these services. As
a result, the draft was clarified to emphasize that TRILL as described
in this base protocol document supplies only customer bridging
services, and does not supply provider or provider backbone services,
but that 802.1 provider or provider backbone bridges may be used to
interconnect parts of a TRILL campus.

Finally, the draft was thoroughly reviewed by two independent IETF
experts, Bernard Aboba and Dan Romascanu, as required by the TRILL
Charter. These expert comments have been resolved, resulting in the
bulk of the changes between version -13 and version -14.

(1.c) Does the Document Shepherd have concerns that the document
      needs more review from a particular or broader perspective,
      e.g., security, operational complexity, someone familiar with
      AAA, internationalization or XML?

I have no such concerns.

(1.d) Does the Document Shepherd have any specific concerns or
      issues with this document that the Responsible Area Director
      and/or the IESG should be aware of? For example, perhaps he
      or she is uncomfortable with certain parts of the document, or
      has concerns whether there really is a need for it. In any
      event, if the WG has discussed those issues and has indicated
      that it still wishes to advance the document, detail those
      concerns here. Has an IPR disclosure related to this document
      been filed? If so, please include a reference to the
      disclosure and summarize the WG discussion and conclusion on
      this issue.

I do not have any specific concerns or issues with the document.

The only IPR disclosure related to this document is the original
disclosure by Sun Microsystems granting royalty free use of all Sun
IPR required to implement mandatory parts of the resulting standard on
a reciprocal bases as detailed here:
https://datatracker.ietf.org/ipr/439/

(1.e) How solid is the WG consensus behind this document? Does it
      represent the strong concurrence of a few individuals, with
      others being silent, or does the WG as a whole understand and
      agree with it?

There is a solid consensus behind advancing this document.

(1.f) Has anyone threatened an appeal or otherwise indicated extreme
      discontent? If so, please summarise the areas of conflict in
      separate email messages to the Responsible Area Director.

There have been no threatened appeals (or actual appeals for that
matter).

(1.g) Has the Document Shepherd personally verified that the
      document satisfies all ID nits? (See the Internet-Drafts Checklist
      and http://tools.ietf.org/tools/idnits/). Boilerplate checks are
      not enough; this check needs to be thorough. Has the document
      met all formal review criteria it needs to, such as the MIB
      Doctor, media type and URI type reviews?

I've run it through idnits. FWIW idnits confuses section numbers with IPv4
addresses and outputs:
tmp/draft-ietf-trill-rbridge-protocol-14.txt(3402): Found possible IPv4 address '4.6.1.2' in position 35; this doesn't match RFC3330's suggested 192.0.2.0/24 example address range, or the suggested 233.252.0.0/24 example multicast address range.
tmp/draft-ietf-trill-rbridge-protocol-14.txt(3441): Found possible IPv4 address '4.6.2.4' in position 63; this doesn't match RFC3330's suggested 192.0.2.0/24 example address range, or the suggested 233.252.0.0/24 example multicast address range.


No MIB doctor or other formal review criteria applies.

(1.h) Has the document split its references into normative and
      informative? Are there normative references to documents that
      are not ready for advancement or are otherwise in an unclear
      state? If such normative references exist, what is the
      strategy for their completion? Are there normative references
      that are downward references, as described in [RFC3967]? If
      so, list these downward references to support the Area
      Director in the Last Call procedure for them [RFC3967].

The references are split, there are no downward references, and no
normative references are to works in progress.

(1.i) Has the Document Shepherd verified that the document IANA
      consideration section exists and is consistent with the body
      of the document? If the document specifies protocol
      extensions, are reservations requested in appropriate IANA
      registries? Are the IANA registries clearly identified? If
      the document creates a new registry, does it define the
      proposed initial contents of the registry and an allocation
      procedure for future registrations? Does it suggest a
      reasonable name for the new registry? See [RFC5226]. If the
      document describes an Expert Review process has Shepherd
      conferred with the Responsible Area Director so that the IESG
      can appoint the needed Expert during the IESG Evaluation?

The IANA considerations sections exists and, consistent with the rest
of the document, creates two new registries. No code points in
existing IANA registries are allocated. The new registries do not use Expert
Review.

This document also has an IEEE registration considerations section, as
two Ethertype allocations are required. In addition, the allocation of a
block of 16 multicast MAC addresses is required. The working group
consensus was that these multicast addresses should be allocated under
the IEEE standards OUI rather than the IANA OUI. The IEEE Registration
Authority routinely allocates code points without charge for other
standards development organizations.

(1.j) Has the Document Shepherd verified that sections of the
      document that are written in a formal language, such as XML
      code, BNF rules, MIB definitions, etc., validate correctly in
      an automated checker?

There are no such sections in this document.

(1.k) The IESG approval announcement includes a Document
      Announcement Write-Up. Please provide such a Document
      Announcement Write-Up? Recent examples can be found in the
      "Action" announcements for approved documents. The approval
      announcement contains the following sections:

  Technical Summary

The TRILL protocol provides optimal pair-wise forwarding without
configuration, safe forwarding even during periods of temporary loops,
and support for multipathing of both unicast and multicast traffic. It
achieves these goals using IS-IS routing and encapsulation of traffic
with a header that includes a hop count. Devices implementing TRILL
are called RBridges or Routing Bridges.

RBridges are compatible with previous IEEE 802.1 customer bridges as
well as IPv4 and IPv6 routers and end nodes. They are as invisible to
current IP routers as bridges are and, like routers, they terminate
the bridge spanning tree protocol. As customer devices, RBridges do
not supply provider or provider backbone bridging services but
provider or provider backbone bridges may be used to interconnect parts
of an RBridge campus.

The design supports customer VLANs and optimization of the
distribution of multi-destination frames based on VLAN and IP derived
multicast groups.  It also allows unicast forwarding tables at transit
RBridges to be sized according to the number of RBridges (rather than
the number of end nodes), which allows these forwarding tables to be
substantially smaller than in conventional customer bridges.

  Working Group Summary

The working group process included two working group last calls (an
MTU problem was discovered by an implementor after the first WG last
call thus a second last call was done to make sure the MTU changes had
sufficient review) as well as the usual review by working group members.
In addition, the working group charter required special reviews by IEEE
802.1 and two reviews by independent IETF experts.  As the combined
result of all of these steps, the document received an unusually
thorough review.

  Document Quality

The document is high quality due to the unusually thorough reviews it
has been subject to. An earlier version was implemented by Sun
Microsystems and the lessons learned were incorporated. Independent
IETF experts Dan Romascanu and Bernard Aboba did particularly thorough
reviews and their comments were resolved. Several implementations are
underway although not publicly announced.
2009-12-02
16 Amy Vezza Draft Added by Amy Vezza in state Publication Requested
2009-12-02
16 Amy Vezza [Note]: 'Erik Nordmark (erik.nordmark@sun.com) is the Document
Shepherd.' added by Amy Vezza
2009-10-26
14 (System) New version available: draft-ietf-trill-rbridge-protocol-14.txt
2009-06-29
13 (System) New version available: draft-ietf-trill-rbridge-protocol-13.txt
2009-03-09
12 (System) New version available: draft-ietf-trill-rbridge-protocol-12.txt
2009-01-12
11 (System) New version available: draft-ietf-trill-rbridge-protocol-11.txt
2008-11-03
10 (System) New version available: draft-ietf-trill-rbridge-protocol-10.txt
2008-10-01
09 (System) New version available: draft-ietf-trill-rbridge-protocol-09.txt
2008-07-15
08 (System) New version available: draft-ietf-trill-rbridge-protocol-08.txt
2008-02-26
07 (System) New version available: draft-ietf-trill-rbridge-protocol-07.txt
2007-11-20
06 (System) New version available: draft-ietf-trill-rbridge-protocol-06.txt
2007-07-10
05 (System) New version available: draft-ietf-trill-rbridge-protocol-05.txt
2007-06-22
04 (System) New version available: draft-ietf-trill-rbridge-protocol-04.txt
2007-03-05
03 (System) New version available: draft-ietf-trill-rbridge-protocol-03.txt
2007-01-17
02 (System) New version available: draft-ietf-trill-rbridge-protocol-02.txt
2006-12-14
01 (System) New version available: draft-ietf-trill-rbridge-protocol-01.txt
2006-05-11
00 (System) New version available: draft-ietf-trill-rbridge-protocol-00.txt