Skip to main content

Resource Reservation Protocol (RSVP) Proxy Approaches
draft-ietf-tsvwg-rsvp-proxy-approaches-09

Revision differences

Document history

Date Rev. By Action
2012-08-22
09 (System) post-migration administrative database adjustment to the No Objection position for Gonzalo Camarillo
2012-08-22
09 (System) post-migration administrative database adjustment to the No Objection position for Jari Arkko
2012-08-22
09 (System) post-migration administrative database adjustment to the No Objection position for Tim Polk
2010-04-26
09 (System) IANA Action state changed to No IC from In Progress
2010-04-26
09 (System) IANA Action state changed to In Progress
2010-04-26
09 Cindy Morgan State Changes to RFC Ed Queue from Approved-announcement sent by Cindy Morgan
2010-04-26
09 Amy Vezza IESG state changed to Approved-announcement sent
2010-04-26
09 Amy Vezza IESG has approved the document
2010-04-26
09 Amy Vezza Closed "Approve" ballot
2010-04-26
09 Amy Vezza State Changes to Approved-announcement to be sent from IESG Evaluation::AD Followup by Amy Vezza
2010-04-23
09 Gonzalo Camarillo [Ballot Position Update] Position for Gonzalo Camarillo has been changed to No Objection from Discuss by Gonzalo Camarillo
2010-04-19
09 Lars Eggert [Ballot Position Update] Position for Lars Eggert has been changed to Yes from No Objection by Lars Eggert
2010-04-16
09 Gonzalo Camarillo
[Ballot discuss]
I am picking up Cullen's discusses on draft-ietf-tsvwg-rsvp-proxy-approaches-09.txt and draft-ietf-tsvwg-rsvp-proxy-proto-11

Discuss (2010-03-22)

Need to discuss the applicability of deployment - as previous RSVP …
[Ballot discuss]
I am picking up Cullen's discusses on draft-ietf-tsvwg-rsvp-proxy-approaches-09.txt and draft-ietf-tsvwg-rsvp-proxy-proto-11

Discuss (2010-03-22)

Need to discuss the applicability of deployment - as previous RSVP discussions,
this is likely only deployable inside a single trust domain.

For a proxy that does inspection or path triggered, how does it know which ones
to "proxy" and what to ignore. It seems this will break all end to end RSVP that
behind a proxy.

Why are section 4.1 and 4.1 SHOULD and MAY implement. It seem like they need to
be MUST.

How do proxies know what bandwidth to request for a flow? If they assume some
certain bandwidth, this makes it much harder to deploy new services.

Need to specify "predetermined time" in section 4.1. Not willing to have it be
zero.

Why is the Receiver-Proxy-Needed needed?

RAO paragraph in security consideration does not seem right.

The dissection in last para of stein 5 is no longer true with the other changes.

Don't understand why this needs the group-keying work

For something like triggered approach, when does the reservation get town down?

The draft discusses deployments snooping SIP. Experience with SIP ALGs in
firewalls has proven this is a really bad idea and mostly fails. Not to mention
SIP over TLS.

The draft seems to hint at detecting RTP packets - I have no idea how to do
this, please clarify.

ICE is sometime used to signal media flows, but not always - how would the
device know. Even worst, how would it know what bandwidth to use.

Has the working group considered if there are ways to achieve this that are not
IPR encumbered?
2010-04-16
09 Gonzalo Camarillo [Ballot Position Update] New position, Discuss, has been recorded by Gonzalo Camarillo
2010-03-30
09 Magnus Westerlund Responsible AD has been changed to Lars Eggert from Magnus Westerlund
2010-03-22
09 Cullen Jennings
[Ballot discuss]
Need to discuss the applicability of deployment - as previous RSVP discussions, this is likely only deployable inside a single trust domain.

For …
[Ballot discuss]
Need to discuss the applicability of deployment - as previous RSVP discussions, this is likely only deployable inside a single trust domain.

For a proxy that does inspection or path triggered, how does it know which ones to "proxy" and what to ignore. It seems this will break all end to end RSVP that behind a proxy.

Why are section 4.1 and 4.1 SHOULD and MAY implement. It seem like they need to be MUST.

How do proxies know what bandwidth to request for a flow? If they assume some certain bandwidth, this makes it much harder to deploy new services.

Need to specify "predetermined time" in section 4.1. Not willing to have it be zero.

Why is the Receiver-Proxy-Needed needed?

RAO paragraph in security consideration does not seem right.

The dissection in last para of stein 5 is no longer true with the other changes.

Don't understand why this needs the group-keying work

For something like triggered approach, when does the reservation get town down?

The draft discusses deployments snooping SIP. Experience with SIP ALGs in firewalls has proven this is a really bad idea and mostly fails. Not to mention SIP over TLS.

The draft seems to hint at detecting RTP packets - I have no idea how to do this, please clarify.

ICE is sometime used to signal media flows, but not always - how would the device know. Even worst, how would it know what bandwidth to use.

Has the working group considered if there are ways to achieve this that are not IPR encumbered?
2010-03-08
09 (System) New version available: draft-ietf-tsvwg-rsvp-proxy-approaches-09.txt
2010-01-14
09 Cullen Jennings
[Ballot discuss]
Need to discuss the applicability of deployment - as previous RSVP discussions, this is likely only deployable inside a single trust domain.

For …
[Ballot discuss]
Need to discuss the applicability of deployment - as previous RSVP discussions, this is likely only deployable inside a single trust domain.

For a proxy that does inspection or path triggered, how does it know which ones to "proxy" and what to ignore. It seems this will break all end to end RSVP that behind a proxy.

Why are section 4.1 and 4.1 SHOULD and MAY implement. It seem like they need to be MUST.

How do proxies know what bandwidth to request for a flow? If they assume some certain bandwidth, this makes it much harder to deploy new services.

Need to specify "predetermined time" in section 4.1. Not willing to have it be zero.

Why is the Receiver-Proxy-Needed needed?

RAO paragraph in security consideration does not seem right.

The dissection in last para of stein 5 is no longer true with the other changes.

Don't understand why this needs the group-keying work

For something like triggered approach, when does the reservation get town down?

The draft discusses deployments snooping SIP. Experience with SIP ALGs in firewalls has proven this is a really bad idea and mostly fails. Not to mention SIP over TLS.

The draft seems to hint at detecting RTP packets - I have no idea how to do this, please clarify.

ICE is sometime used to signal media flows, but not always - how would the device know. Even worst, how would it know what bandwidth to use.

Has the working group considered if there are ways to achieve this that are not IPR encumbered?

The example in A.3 seems really confused about how SBC work.

As I am sure the authors of this draft are aware, the example in A.5 was something the SIP WG had more than one strong hum on this was not an appropriate use of SIP.
2009-10-26
09 (System) Sub state has been changed to AD Follow up from New Id Needed
2009-10-26
08 (System) New version available: draft-ietf-tsvwg-rsvp-proxy-approaches-08.txt
2009-09-01
09 Magnus Westerlund State Changes to IESG Evaluation::Revised ID Needed from IESG Evaluation::AD Followup by Magnus Westerlund
2009-09-01
09 Magnus Westerlund Trying to resolve discuss. But will require updated draft.
2009-05-28
09 Amy Vezza State Changes to IESG Evaluation::AD Followup from IESG Evaluation - Defer::AD Followup by Amy Vezza
2009-05-26
09 Jari Arkko [Ballot Position Update] Position for Jari Arkko has been changed to No Objection from Discuss by Jari Arkko
2009-05-21
09 Cindy Morgan State Changes to IESG Evaluation - Defer::AD Followup from IESG Evaluation - Defer by Cindy Morgan
2009-05-21
09 Cullen Jennings
[Ballot discuss]
Need to discuss the applicability of deployment - as previous RSVP discussions, this is likely only deployable inside a single trust domain.

For …
[Ballot discuss]
Need to discuss the applicability of deployment - as previous RSVP discussions, this is likely only deployable inside a single trust domain.

For a proxy that does inspection or path triggered, how does it know which ones to "proxy" and what to ignore. It seems this will break all end to end RSVP that behind a proxy.

How does one migrate out proxy RSVP to end to end RSVP?

How do proxies know what bandwidth to request for a flow? If they assume some certain bandwidth, this makes it much harder to deploy new services.


For something like triggered approach, when does the reservation get town down?

The draft discusses deployments snooping SIP. Experience with SIP ALGs in firewalls has proven this is a really bad idea and mostly fails. Not to mention SIP over TLS.

The draft seems to hint at detecting RTP packets - I have no idea how to do this, please clarify.

ICE is sometime used to signal media flows, but not always - how would the device know. Even worst, how would it know what bandwidth to use.

Has the working group considered if there are ways to achieve this that are not IPR encumbered?

The example in A.3 seems really confused about how SBC work.

As I am sure the authors of this draft are aware, the example in A.5 was something the SIP WG had more than one strong hum on this was not an appropriate use of SIP.
2009-05-21
09 Cullen Jennings [Ballot Position Update] New position, Discuss, has been recorded by Cullen Jennings
2009-05-21
09 Ross Callon
[Ballot comment]
I am concerned that RSVP in general allows hosts to send something that the router has to receive in its control plane, which …
[Ballot comment]
I am concerned that RSVP in general allows hosts to send something that the router has to receive in its control plane, which opens up the possibility of DOS attacks by the hosts against the routers. Given the current state of host security, it is pretty much a non-starter to let millions of hosts send anything to the router's control plane. The result is that service providers won't allow RSVP packets across the CE/PE boundary (or just tunnel them over the network).

I am not aware of this being discussed anywhere. I think that this general issue is worth writing up in more detail.

I am putting this in as a comment, rather than a DISCUSS, since this is not specific to RSVP proxy. It is a basic issue with RSVP (which of course is water than went over the dam a very long time ago). Thus it is not at all clear that this document is the right place to discuss this issue.
2009-05-21
09 Ross Callon [Ballot Position Update] New position, No Objection, has been recorded by Ross Callon
2009-05-21
09 Ralph Droms
[Ballot comment]
In section 4.1, the paragraph immediately following figure 3 explains that receipt of a ResvErr by the RSVP Receiver Proxy "ensures that the …
[Ballot comment]
In section 4.1, the paragraph immediately following figure 3 explains that receipt of a ResvErr by the RSVP Receiver Proxy "ensures that the RSVP Receiver Proxy is aware of the reservation failure, conventional RSVP procedures do not cater for notification of the sender of the reservation failure."  It's not clear to me why the sender needs to be notified of reservation failure.  Is this addressing a problem with RSVP generally or just RSVP Receiver Proxy?  I speculate that the problem here may be that the Proxy receives the ResvErr, so neither the application receiver nor the sender is explicitly notified of the reservation failure; do I have that right?  Would someone more familiar with RSVP than I am be able to deduce the reason for sender notification?  I'm happy to be educated as I'm not well-versed in RSVP.

Nit: "cater for" might read better as "cater to" or "provide for"
2009-05-21
09 Ralph Droms [Ballot Position Update] New position, No Objection, has been recorded by Ralph Droms
2009-05-21
09 Tim Polk [Ballot Position Update] Position for Tim Polk has been changed to No Objection from Undefined by Tim Polk
2009-05-21
09 Tim Polk [Ballot Position Update] Position for Tim Polk has been changed to Undefined from Discuss by Tim Polk
2009-05-21
09 Dan Romascanu
[Ballot comment]
In Section 4.5:

  Candidate protocols for realizing such interface
  include SNMP ([RFC3416]), COPS-PR ([RFC3084]), QPIM ([RFC3644 …
[Ballot comment]
In Section 4.5:

  Candidate protocols for realizing such interface
  include SNMP ([RFC3416]), COPS-PR ([RFC3084]), QPIM ([RFC3644]), the
  Extensible Markup Language (XML) and DIAMETER ([RFC3588]). 

SNMP is seldom used for configuration purposes over the Internet in real life. COPS-PR has very little reported deployment if at all. XML is manguage to present information and not a protocol.

I suggest to take out XML, and to consider whether SNMP and COPS-PR should be left in the text. On the other hand I believe that it would be appropriate to mention here NETCONF (RFC 4741) which is a protocol that uses XML-encoding for performing configuration management operations on network devices.
2009-05-21
09 Dan Romascanu [Ballot Position Update] New position, No Objection, has been recorded by Dan Romascanu
2009-05-21
09 Jari Arkko
[Ballot discuss]
I am not against publishing these specifications (and I guess
even the authors see them as necessary evil in comparison to the
end-to-end …
[Ballot discuss]
I am not against publishing these specifications (and I guess
even the authors see them as necessary evil in comparison to the
end-to-end RSVP model). However, I think the documents should
describe more clearly their implications and limitations. A
Surgeon General's Warning if you will.

I'll note that I am not an RSVP expert. I may have missed something.
In that case, please educate me and I'll clear this Discuss.

In particular, Section 4.1 says:

  In order to build the Resv message, the RSVP Receiver Proxy can take
  into account information received in the Path message.  For example,
  the RSVP Receiver Proxy may compose a FLOWSPEC object for the Resv
  message which mirrors the SENDER_TSPEC object in the received Path
  message.

RSVP has separate flow reservations for the two directions, and
just copying the flow spec from one direction to another is
a severely limited approach. Or perhaps even a potentially harmful
approach. For instance, in any streaming or IPTV situation this
approach would clearly lead to problems. One could ask how well the
network works (a) with the proxy QoS reservations or (b) without any
reservations. The ability to make the reservations allows bandwidth
to be reserved, and increases the likelihood of, say, successful
video transmission. However, the guessing involved in the mirroring
process leads to incorrect reservations. For instance, the user's DSL
link might have 24 megabits downlink and 1 megabit uplink capacity.
Without any reservations a 10 megabits/s stream can easily be downloaded.
But with proxy reservations, the system would report a conclusive
error that the capacity is insufficient. Compare this to the situation
where you would just not answer the RSVP messages and the sender would
attempt best effort service.

The application triggered mechanisms have a better chance of a
successful outcome, but they imply fairly severe involvement in the
application signaling process, such as the introduction of a b2bua.
What's the likelihood of a b2bua on the signaling path disrupting
your intended communication setup? I'd claim its a non-zero probability...

I would suggest that Section 4.1 needs to include additional text to
document the problems associated with mirroring. Also, the introduction
should provide stronger guidance on the overall benefits vs.
disadvantages associated with the proxies, and suggest that the proxies
only be setup for very specific networks, applications, and flows to
specific destinations.
2009-05-21
09 Jari Arkko
[Ballot discuss]
I am not against publishing these specifications (and I guess
even the authors see them as necessary evil in comparison to the
end-to-end …
[Ballot discuss]
I am not against publishing these specifications (and I guess
even the authors see them as necessary evil in comparison to the
end-to-end RSVP model). However, I think the documents should
describe more clearly their implications and limitations. A
Surgeon General's Warning if you will.

I'll note that I am not an RSVP expert. I may have missed something.
In that case, please educate me and I'll clear this Discuss.

In particular, Section 4.1 says:

  In order to build the Resv message, the RSVP Receiver Proxy can take
  into account information received in the Path message.  For example,
  the RSVP Receiver Proxy may compose a FLOWSPEC object for the Resv
  message which mirrors the SENDER_TSPEC object in the received Path
  message.

RSVP has separate flow reservations for the two directions, and
just copying the flow spec from one direction to another is
a severely limited approach. Or perhaps even a potentially harmful
approach. For instance, in any streaming or IPTV situation this
approach would clearly lead to problems. One could ask how well the
network works (a) with the proxy QoS reservations or (b) without any
reservations. The ability to make the reservations allows bandwidth
to be reserved, and increases the likelihood of, say, successful
video transmission. However, the guessing involved in the mirroring
process leads to incorrect reservations. For instance, the user's DSL
link might have 24 megabits downlink and 1 megabit uplink capacity.
Without any reservations a 10 megabits/s stream can easily be downloaded.
But with proxy reservations, the system would report a conclusive
error that the capacity is insufficient. Compare this to the situation
where you would just not answer the RSVP messages and the sender would
attempt best effort service.

The application triggered mechanisms have a better chance of a
successful outcome, but they imply fairly severe involvement in the
application signaling process, such as the introduction of a b2bua.
What's the likelihood of a b2bua on the signaling path disrupting
your intended communication setup? I'd claim its a non-zero probabilit...

I would suggest that Section 4.1 needs to include additional text to
document the problems associated with mirroring. Also, the introduction
should provide stronger guidance on the overall benefits vs.
disadvantages associated with the proxies, and suggest that the proxies
only be setup for very specific networks, applications, and flows to
specific destinations.
2009-05-21
09 Jari Arkko [Ballot Position Update] New position, Discuss, has been recorded by Jari Arkko
2009-05-19
09 Lisa Dusseault [Ballot Position Update] New position, No Objection, has been recorded by Lisa Dusseault
2009-05-19
09 Ron Bonica [Ballot discuss]
2009-05-19
09 Ron Bonica
[Ballot comment]
I am abstaining not so much because of the content of this document, but because this document extends other work which is not …
[Ballot comment]
I am abstaining not so much because of the content of this document, but because this document extends other work which is not fit for deployment across provider boundaries.

For the most part, ISPs do not permit customers to signal bandwidth across their boundaries using RSVP. There are many reasons for this, most significant of which is that it generally does not support the ISPs business models.

Network security issues are also significant. When most routers detect an RSVP message, which includes the IP Router Alert Option, the router consumes additional resources to process the optioned packet, before it authenticates the packet. This leaves the router vulnerable to various types of DoS attack.

The IETF should address the general problem of secure signaling before it spends any more cycles on RSVP extensions.
2009-05-19
09 Ron Bonica [Ballot Position Update] Position for Ron Bonica has been changed to Abstain from Discuss by Ron Bonica
2009-05-17
09 Robert Sparks [Ballot comment]
Agree with Tim's concern #2 (what happens when you unintentionally (or intentionally) end up with more than one proxy in a path?
2009-05-17
09 Robert Sparks [Ballot Position Update] New position, No Objection, has been recorded by Robert Sparks
2009-05-14
07 (System) New version available: draft-ietf-tsvwg-rsvp-proxy-approaches-07.txt
2009-05-08
09 (System) Removed from agenda for telechat - 2009-05-07
2009-05-06
09 Pasi Eronen [Ballot Position Update] New position, No Objection, has been recorded by Pasi Eronen
2009-05-05
09 Pasi Eronen State Change Notice email list have been change to tsvwg-chairs@tools.ietf.org, draft-ietf-tsvwg-rsvp-proxy-approaches@tools.ietf.org from tsvwg-chairs@tools.ietf.org, draft-ietf-tsvwg-rsvp-proxy-proto@tools.ietf.org
2009-05-05
09 Cullen Jennings State Changes to IESG Evaluation - Defer from IESG Evaluation by Cullen Jennings
2009-05-05
09 Tim Polk
[Ballot comment]
section 1:

"presents several fundamental RSVP proxy approaches insisting on how ..."

I don't think "insisting" is the right word here!

section 4.4: …
[Ballot comment]
section 1:

"presents several fundamental RSVP proxy approaches insisting on how ..."

I don't think "insisting" is the right word here!

section 4.4:
s/cortresponding/corresponding/
s/implicitely/implicitly/
2009-05-05
09 Tim Polk
[Ballot discuss]
Two issues: number one is actionable, the second is a discuss-discuss...

Issue #1:
The security considerations do a nice job highlighting the issues …
[Ballot discuss]
Two issues: number one is actionable, the second is a discuss-discuss...

Issue #1:
The security considerations do a nice job highlighting the issues introduced by proxies, but
more detail is needed with respect to RSVP proxies that operate under control of another
entity (Para 4).  These models introduce new security requirements for communication between
the proxy and the controlling entity that are outside the scope of RSVP or this document.
Specifically, these models introduce authentication and confidentiality requirements to protect
against a variety of attacks.  The current text indicates the controlling entity needs to be
trusted, which is also true, but is insufficient.

Issue #2:
(Section 1, Introduction)  What are the consequences of violating the topological constraints
and having two Receiver Proxies on path?  It seems that RSVP would not be used to its
fullest, and the resource reservation would cover less of the path than it could, but this
seems to be sub-optimal rather than broken.

I also wonder whether this merits discussion in the security considerations... perhaps that will
become clear as we discuss the consequences of violating the topological constraints.
2009-05-05
09 Tim Polk [Ballot Position Update] New position, Discuss, has been recorded by Tim Polk
2009-05-04
09 Ron Bonica
[Ballot discuss]
At this point, this is a DISCUSS DISCUSS.

I we were to massively deploy RSVP proxies, would that cause a massive increase in …
[Ballot discuss]
At this point, this is a DISCUSS DISCUSS.

I we were to massively deploy RSVP proxies, would that cause a massive increase in the amount of RAO traffic arriving at provider boundaries? Would that traffic be dropped? If not, could it cause problems for provider equipment?
2009-05-04
09 Ron Bonica
[Ballot discuss]
At this point, this is a DISCUSS DISCUSS.

I we were to massively deploy RSVP proxies, would that cause a massive increase in …
[Ballot discuss]
At this point, this is a DISCUSS DISCUSS.

I we were to massively deploy RSVP proxies, would that cause a massive increase in the amount of RAO traffic arriving at provider boundaries? Would that traffic be dropped? If not, could it cause problems for provider equipment?
2009-05-04
09 Ron Bonica [Ballot Position Update] New position, Discuss, has been recorded by Ron Bonica
2009-05-04
09 Lars Eggert [Ballot Position Update] New position, No Objection, has been recorded by Lars Eggert
2009-05-03
09 Alexey Melnikov
[Ballot comment]
4.3.  Inspection-Triggered Proxy

[...]

  Note however, that in case of reservation failure, the inspection-
  triggered RSVP Proxy does not have a …
[Ballot comment]
4.3.  Inspection-Triggered Proxy

[...]

  Note however, that in case of reservation failure, the inspection-
  triggered RSVP Proxy does not have a direct mechanism for notifying
  the application (since it is not participating itself actively in
  application signaling) so that the application is not in a position
  to take appropriate action (for example terminate the corresponding
  session).  To mitigate this problem, the inspection-triggered RSVP
  Proxy may mark differently the DSCP of flows for which an RSVP

The first use of the DSCP acronym should be expanded.


I am also agreeing with Adrian's comment, I was wondering about this myself.
2009-05-03
09 Alexey Melnikov
[Ballot comment]
4.3.  Inspection-Triggered Proxy

[...]

  Note however, that in case of reservation failure, the inspection-
  triggered RSVP Proxy does not have a …
[Ballot comment]
4.3.  Inspection-Triggered Proxy

[...]

  Note however, that in case of reservation failure, the inspection-
  triggered RSVP Proxy does not have a direct mechanism for notifying
  the application (since it is not participating itself actively in
  application signaling) so that the application is not in a position
  to take appropriate action (for example terminate the corresponding
  session).  To mitigate this problem, the inspection-triggered RSVP
  Proxy may mark differently the DSCP of flows for which an RSVP

The first use of the DSCP acronym should be expanded.
2009-05-03
09 Alexey Melnikov [Ballot Position Update] New position, No Objection, has been recorded by Alexey Melnikov
2009-04-29
09 Adrian Farrel
[Ballot comment]
Nits to fix if you have to do a respin or in AUTH-48 if the RFC Editor
misses them.

draft-ietf-tsvwg-rsvp-proxy-approaches-06.txt
---
I am …
[Ballot comment]
Nits to fix if you have to do a respin or in AUTH-48 if the RFC Editor
misses them.

draft-ietf-tsvwg-rsvp-proxy-approaches-06.txt
---
I am surprised that all of your references are Informative. Surely some of these are prerequisites for understanding your work?
---
2009-04-29
09 Adrian Farrel [Ballot Position Update] Position for Adrian Farrel has been changed to No Objection from Yes by Adrian Farrel
2009-04-29
09 Magnus Westerlund [Ballot Position Update] New position, Yes, has been recorded for Magnus Westerlund
2009-04-29
09 Magnus Westerlund Ballot has been issued by Magnus Westerlund
2009-04-29
09 Magnus Westerlund [Note]: 'Read this before the Protocol document' added by Magnus Westerlund
2009-04-29
09 Adrian Farrel [Ballot Position Update] New position, Yes, has been recorded by Adrian Farrel
2009-04-29
09 Adrian Farrel Created "Approve" ballot
2009-04-22
09 Magnus Westerlund Placed on agenda for telechat - 2009-05-07 by Magnus Westerlund
2009-04-22
09 Magnus Westerlund Note field has been cleared by Magnus Westerlund
2009-04-22
09 Magnus Westerlund State Changes to IESG Evaluation from Waiting for AD Go-Ahead::External Party by Magnus Westerlund
2009-02-19
09 Samuel Weiler Request for Last Call review by SECDIR Completed. Reviewer: Scott Kelly.
2008-11-27
09 Magnus Westerlund State Changes to Waiting for AD Go-Ahead::External Party from Waiting for AD Go-Ahead by Magnus Westerlund
2008-11-27
09 Magnus Westerlund [Note]: 'Waiting for some conclusion on the RSVP RAO issues.' added by Magnus Westerlund
2008-11-14
09 (System) State has been changed to Waiting for AD Go-Ahead from In Last Call by system
2008-11-12
09 Amanda Baber IANA Last Call comments:

As described in the IANA Considerations section, we understand
this document to have NO IANA Actions.
2008-11-11
09 Samuel Weiler Request for Last Call review by SECDIR is assigned to Scott Kelly
2008-11-11
09 Samuel Weiler Request for Last Call review by SECDIR is assigned to Scott Kelly
2008-10-31
09 Cindy Morgan Last call sent
2008-10-31
09 Cindy Morgan State Changes to In Last Call from Last Call Requested by Cindy Morgan
2008-10-31
06 (System) New version available: draft-ietf-tsvwg-rsvp-proxy-approaches-06.txt
2008-10-31
09 Magnus Westerlund State Changes to Last Call Requested from AD Evaluation::Revised ID Needed by Magnus Westerlund
2008-10-31
09 Magnus Westerlund Last Call was requested by Magnus Westerlund
2008-10-31
09 (System) Ballot writeup text was added
2008-10-31
09 (System) Last call text was added
2008-10-31
09 (System) Ballot approval text was added
2008-10-31
09 (System) Sub state has been changed to AD Follow up from New Id Needed
2008-10-31
05 (System) New version available: draft-ietf-tsvwg-rsvp-proxy-approaches-05.txt
2008-09-08
09 Magnus Westerlund State Changes to AD Evaluation::Revised ID Needed from AD Evaluation::External Party by Magnus Westerlund
2008-09-08
09 Magnus Westerlund Still waiting for updated version to address AD comments
2008-09-08
09 Magnus Westerlund State Changes to AD Evaluation::External Party from AD Evaluation::AD Followup by Magnus Westerlund
2008-07-01
09 Magnus Westerlund
This is writeup for the two documents:
draft-ietf-tsvwg-rsvp-proxy-proto (proposed standard)
draft-ietf-tsvwg-rsvp-proxy-approaches (informational)

  (1.a)  Who is the Document Shepherd for this document?  Has the
  …
This is writeup for the two documents:
draft-ietf-tsvwg-rsvp-proxy-proto (proposed standard)
draft-ietf-tsvwg-rsvp-proxy-approaches (informational)

  (1.a)  Who is the Document Shepherd for this document?  Has the
          Document Shepherd personally reviewed this version of the
          document and, in particular, does he or she believe this
          version is ready for forwarding to the IESG for publication?
         
Magnus Westerlund is the Document shepherd. The AD review made it
clear some improvements where needed.

  (1.b)  Has the document had adequate review both from key WG members
          and from key non-WG members?  Does the Document Shepherd have
          any concerns about the depth or breadth of the reviews that
          have been performed?
         
It has received reasonable review from the RSVP interested folks. I
think the document could have benefitted from more wide review.

  (1.c)  Does the Document Shepherd have concerns that the document
          needs more review from a particular or broader perspective,
          e.g., security, operational complexity, someone familiar with
          AAA, internationalization, or XML?
         
I think the operational aspects may require more review.         

  (1.d)  Does the Document Shepherd have any specific concerns or
          issues with this document that the Responsible Area Director
          and/or the IESG should be aware of?  For example, perhaps he
          or she is uncomfortable with certain parts of the document, or
          has concerns whether there really is a need for it.  In any
          event, if the WG has discussed those issues and has indicated
          that it still wishes to advance the document, detail those
          concerns here.  Has an IPR disclosure related to this document
          been filed?  If so, please include a reference to the
          disclosure and summarize the WG discussion and conclusion on
          this issue.
       
I hope by clarifying the AD review comments these concerns will be removed.

  (1.e)  How solid is the WG consensus behind this document?  Does it
          represent the strong concurrence of a few individuals, with
          others being silent, or does the WG as a whole understand and
          agree with it?
         
Strong consensus from a couple of individuals.         

  (1.f)  Has anyone threatened an appeal or otherwise indicated extreme
          discontent?  If so, please summarize the areas of conflict in
          separate email messages to the Responsible Area Director.  (It
          should be in a separate email because this questionnaire is
          entered into the ID Tracker.)
         
No         

  (1.g)  Has the Document Shepherd personally verified that the
          document satisfies all ID nits?  (See
          http://www.ietf.org/ID-Checklist.html and
          http://tools.ietf.org/tools/idnits/.)  Boilerplate checks are
          not enough; this check needs to be thorough.  Has the document
          met all formal review criteria it needs to, such as the MIB
          Doctor, media type, and URI type reviews?  If the document
          does not already indicate its intended status at the top of
          the first page, please indicate the intended status here.

Yes, there is one downref needed to be take care of.

  (1.h)  Has the document split its references into normative and
          informative?  Are there normative references to documents that
          are not ready for advancement or are otherwise in an unclear
          state?  If such normative references exist, what is the
          strategy for their completion?  Are there normative references
          that are downward references, as described in [RFC3967]?  If
          so, list these downward references to support the Area
          Director in the Last Call procedure for them [RFC3967].
         
Yes, one downref that can be changed to informational ref.         

  (1.i)  Has the Document Shepherd verified that the document's IANA
          Considerations section exists and is consistent with the body
          of the document?  If the document specifies protocol
          extensions, are reservations requested in appropriate IANA
          registries?  Are the IANA registries clearly identified?  If
          the document creates a new registry, does it define the
          proposed initial contents of the registry and an allocation
          procedure for future registrations?  Does it suggest a
          reasonable name for the new registry?  See [RFC2434].  If the
          document describes an Expert Review process, has the Document
          Shepherd conferred with the Responsible Area Director so that
          the IESG can appoint the needed Expert during IESG Evaluation?
         
Yes, protos IANA seems okay.         

  (1.j)  Has the Document Shepherd verified that sections of the
          document that are written in a formal language, such as XML
          code, BNF rules, MIB definitions, etc., validate correctly in
          an automated checker?
         
No formal language used.         

  (1.k)  The IESG approval announcement includes a Document
          Announcement Write-Up.  Please provide such a Document
          Announcement Write-Up.  Recent examples can be found in the
          "Action" announcements for approved documents.  The approval
          announcement contains the following sections:

          Technical Summary
                RSVP signaling can be used to make end-to-end resource
                reservations in an IP network in order to guarantee the
                QoS required by certain flows.  With conventional RSVP,
                both the data sender and receiver of a given flow take
                part in RSVP signaling.  Yet, there are many use cases
                where resource reservation is required, but the
                receiver, the sender, or both, is not RSVP-capable. 
                Where the receiver is not RSVP-capable, an RSVP router
                may behave as an RSVP Receiver Proxy thereby performing
                RSVP signaling on behalf of the receiver.  This allows
                resource reservations to be established on the segment
                of the end-to-end path from the sender to the RSVP
                Receiver Proxy.
               
                The Proto document defines the RSVP extensions that are
                needed to facilitate operations with an RSVP Receiver
                Proxy whose signaling is triggered by receipt of RSVP
                Path messages from the sender. 

          Working Group Summary
            The consensus for the publication was strong but from a
            small group within the WG.

          Document Quality
            The shepherd doesn't know of any implementations.
           
          Personnel
            WG Shepherd and responsible AD is Magnus Westerlund.
2008-07-01
09 Magnus Westerlund State Changes to AD Evaluation::Revised ID Needed from AD Evaluation by Magnus Westerlund
2008-07-01
09 Magnus Westerlund State Changes to AD Evaluation from Publication Requested by Magnus Westerlund
2008-05-30
09 Magnus Westerlund Note field has been cleared by Magnus Westerlund
2008-05-30
09 Magnus Westerlund Merged with draft-ietf-tsvwg-rsvp-proxy-proto by Magnus Westerlund
2008-05-30
09 Magnus Westerlund Draft Added by Magnus Westerlund in state Publication Requested
2008-04-11
04 (System) New version available: draft-ietf-tsvwg-rsvp-proxy-approaches-04.txt
2007-12-14
03 (System) New version available: draft-ietf-tsvwg-rsvp-proxy-approaches-03.txt
2007-11-09
(System) Posted related IPR disclosure: Cisco's Statement about IPR claimed in draft-ietf-tsvwg-rsvp-proxy-approaches-02.txt
2007-09-12
02 (System) New version available: draft-ietf-tsvwg-rsvp-proxy-approaches-02.txt
2007-07-11
01 (System) New version available: draft-ietf-tsvwg-rsvp-proxy-approaches-01.txt
2007-02-28
00 (System) New version available: draft-ietf-tsvwg-rsvp-proxy-approaches-00.txt