Skip to main content

Applicability of Keying Methods for RSVP Security
draft-ietf-tsvwg-rsvp-security-groupkeying-11

Revision differences

Document history

Date Rev. By Action
2012-08-22
11 (System) post-migration administrative database adjustment to the No Objection position for Stewart Bryant
2011-09-13
11 Amy Vezza State changed to RFC Ed Queue from Approved-announcement sent.
2011-09-12
11 (System) IANA Action state changed to No IC from In Progress
2011-09-12
11 (System) IANA Action state changed to In Progress
2011-09-12
11 Amy Vezza IESG state changed to Approved-announcement sent
2011-09-12
11 Amy Vezza IESG has approved the document
2011-09-12
11 Amy Vezza Closed "Approve" ballot
2011-09-12
11 Amy Vezza Ballot writeup text changed
2011-09-10
11 David Harrington Approval announcement text regenerated
2011-09-09
11 (System) New version available: draft-ietf-tsvwg-rsvp-security-groupkeying-11.txt
2011-09-09
11 David Harrington Approval announcement text changed
2011-08-14
11 Samuel Weiler Request for Telechat review by SECDIR Completed. Reviewer: Stephen Kent.
2011-08-13
11 David Harrington Approval announcement text changed
2011-08-11
11 Cindy Morgan Removed from agenda for telechat
2011-08-11
11 Cindy Morgan State changed to Approved-announcement to be sent::Point Raised - writeup needed from IESG Evaluation.
2011-08-11
11 Amy Vezza State changed to IESG Evaluation from Waiting for AD Go-Ahead.
2011-08-11
11 Russ Housley [Ballot Position Update] New position, No Objection, has been recorded
2011-08-11
11 Pete Resnick [Ballot Position Update] New position, No Objection, has been recorded
2011-08-11
11 Stephen Farrell
[Ballot comment]
(1) If RSVP supported asymmetric authentication of messages then a lot
of this could be easier, or at least different, e.g. for inter-domain, …
[Ballot comment]
(1) If RSVP supported asymmetric authentication of messages then a lot
of this could be easier, or at least different, e.g. for inter-domain,
public key based schemes might be better. It might be good to mention
this possibility here since currently rfc 2747 mandates hmac-md5 and
one would assume that that may be revised in future in which case a
signature based scheme could be a good addition. So, I'd say that a
paragraph mentioning that key management for a putative signature
based RSVP integrity scheme could be relatively simple (compared to
group key management) would be a fine addition. Or, if there are
reasons why key management for a putative signature based RSVP
authentication scheme would be equally hard, that'd be good to add
as well.

(2) Last para of 10.1 - presumably group keying means a subverted node
might be less easily detected/traced if it sends fake RSVP messages to
a non-neighbour (maybe with a fake source address). Per-neighbour or
interface keying would mean that the subverted node has to send the fake
stuff to a nearby non-subverted node and will generally therefore be more
easily traced.
2011-08-11
11 Stephen Farrell [Ballot Position Update] New position, No Objection, has been recorded
2011-08-11
11 Stewart Bryant [Ballot Position Update] New position, No Objection, has been recorded
2011-08-10
11 Sean Turner
[Ballot comment]
1) Should the reference to 3547 be swapped out for a reference to draft-ietf-msec-gdoi-update?  It's on the same telechat and draft-ietf-msec-gdoi-update obsoletes …
[Ballot comment]
1) Should the reference to 3547 be swapped out for a reference to draft-ietf-msec-gdoi-update?  It's on the same telechat and draft-ietf-msec-gdoi-update obsoletes RFC 3547.  They'd both be published at around the same time assuming all goes smoothly.

2) Expand GKS (group key server) in Section 3.  It'd be best to explain what it is before Figure 2.

3) In Section 6.2, is it worth pointing out that an additional difference is that AH has some kind of algorithm agility while the INTEGRITY object mechanism does not?
2011-08-10
11 Sean Turner [Ballot Position Update] New position, No Objection, has been recorded
2011-08-09
11 Peter Saint-Andre [Ballot Position Update] New position, No Objection, has been recorded
2011-08-09
11 Robert Sparks [Ballot Position Update] New position, No Objection, has been recorded
2011-08-09
11 Ron Bonica [Ballot Position Update] New position, No Objection, has been recorded
2011-08-09
11 Adrian Farrel
[Ballot comment]
I have updated my Comment to include some points raised by Dimitri Papadimitriou in his Routing Directorate review. Please consider a new revision …
[Ballot comment]
I have updated my Comment to include some points raised by Dimitri Papadimitriou in his Routing Directorate review. Please consider a new revision to pick up all of these points.


I support the publication of this document as a useful contribution to
the problem of securing RSVP, RSVP-TE, and GMPLS signaling in a scalable
manner.

There are a few small points that you might like to look at as part of
the general document polishing.

---

Nit:

Section 2

  The trust an RSVP node has to another RSVP node has an explicit and
  an implicit component.  Explicitly the node trusts the other node to
  maintain the RSVP messages intact or confidential, depending on
  whether authentication or encryption (or both) is used.  This means
  only that the message has not been altered or seen by another, non-
  trusted node.  Implicitly each node trusts each other node with which
  it has a trust relationship established via the mechanisms here to
  adhere to the protocol specifications laid out by the various
  standards.

Another explicit element of this trust model is that the peer will have
applied at least the same level of authentication with its next hop
peer. That is, a message that is received by C from B using
authentication, was originated at B, was received by B from A using
authentication, or was triggered at B because of the receipt at B of a
message from A that used authentication.

Without this element of the trust model, the authentication between
B and C is not particularly useful. I think your definition of security
domain (in Section 1.1) could be used in new text to make this point.

---

WIBNI

I might have put the final paragraph of Section 2 into Section 3.2

---

Nit:

Section 3.1

  Most current RSVP authentication implementations support per
  interface RSVP keys.  When the interface is point-to-point (and
  therefore an RSVP router has only a single RSVP neighbor on each
  interface), this is equivalent to per neighbor keys in the sense that
  a different key is used for each neighbor.

This slightly neglects the possibility of parallel interfaces to the
same neighbor.

---

Wrinkle                                   

In Figure 4, isn't it the case that one node, say R3, could be in both
security domains and apply the group key on a per interface / per
neighbor / per IP next hop basis?

---

WIBNI

Section 5.2 is largely dedicated to FRR.
It might be nice to give FRR its own section and leave just the last
two paragraphs (P2MP and hierarchy) in 5.2, perhaps renaming it
"Other RSVP-TE and GMPLS Functions"

---

Smile

Section 10.1

  A subverted node is defined here as an untrusted node, for example
  because an intruder has gained control over it.

If we knew that a subverted node was subverted, it would be untrusted.
And that would be the end of the story. But the problem is that we *do*
trust the subverted node!

---

I wouldn't like to have to argue in a court of law that some of the
references are not normative (e.g. 2205).

===

Comments from Dimitri's review as follows:

A general comment: I've noticed that only "may" (in small letters) is used and the phrasing is sometimes not prescriptive, is it intentional (due to informational status) ?

o) Introduction

. Suggest to add reference after "It is however often necessary to regularly change keys due to network operational requirements." or summarize the "operational requirements"

o) Section 2

. Spell out acronym GDOI

o) Section 3.1

. It may be appropriate to explain where/how are the boundaries of RSVP security domains defined. 

. States "As discussed in the previous section, per neighbor and per interface keys can not be used in the presence of non-RSVP hops." while that Section states "This means that per interface and per neighbor keys cannot easily be used in the presence of non-RSVP routers on the path between senders and receivers." there is a different interpretation one can assume from the term "easily"?

. Any specific scenario where a Single Group Key Server across security domains could be applicable ? How do R3 and R4 determine there are in different domains ? afaik the INTEGRITY object doesn't provide such information.

. States "Because a group key may be used to verify messages from different peers, monotonically increasing sequence number methods are not appropriate." make clear what is actually recommended e.g. Sequence Numbers Based on a Real Time Clock (Section 3.2 of RFC 2747)

o) Section 4.1

. States "Since it is not feasible to carry out a key change at the exact same time in communicating RSVP nodes, some grace period needs to be implemented during which an RSVP node will accept both the old and the new key. " what is recommended/proposed this dual-key temporary state doesn't become permanent and one ends up with a list of keys ?

. States "In this solution, a key server authenticates each of the RSVP nodes independently" explain independently from what ?

o) Section 5.1

Explain use of group keying for Notify messages between "domains" (referring to Fig.4).

o) Section 5.2

. The P2MP case deserves a bit more explanations. In particular, RFC 4875 mentions "An administration may wish to limit the domain over which P2MP TE tunnels can be established. This can be accomplished by setting filters on various ports to deny action on a RSVP path message with a SESSION object of type P2MP_LSP_IPv4 or P2MP_LSP_IPv6." does the present document overrule "filter setting" or complements it when reaching security domain boundaries ?

. For RFC 4206, clarify that non hop-by-hop signaling is used to signal LSP tunneled over an FA.

o) Section 6.1

Spell out acronyms the SPD and SPI

o) Section 6.3

Is the tunnel mode also excluded for hosts attached to the network by a non-RSVP host ?

o) Section 7

What is actually referred as "the network" in the following sentence "If the end systems are part of the same security domain as the network itself, group keying can be extended to include the end systems." i.e. is the network the set of nodes enabling host attachment to the network ?

o) Section 8

Mentions "From the viewpoint of securing end-to-end RSVP, ..." is it securing RSVP end-to-end or edge-to-edge (edge being the end-points of the MPLS-TE tunnels, the edges of the PCN domain, etc.) ?
2011-08-07
11 Gonzalo Camarillo [Ballot Position Update] New position, No Objection, has been recorded
2011-08-06
11 Wesley Eddy [Ballot Position Update] New position, Yes, has been recorded
2011-08-05
11 Adrian Farrel
[Ballot comment]
I support the publication of this document as a useful contribution to
the problem of securing RSVP, RSVP-TE, and GMPLS signaling in a …
[Ballot comment]
I support the publication of this document as a useful contribution to
the problem of securing RSVP, RSVP-TE, and GMPLS signaling in a scalable
manner.

There are a few small points that you might like to look at as part of
the general document polishing.

---

Nit:

Section 2

  The trust an RSVP node has to another RSVP node has an explicit and
  an implicit component.  Explicitly the node trusts the other node to
  maintain the RSVP messages intact or confidential, depending on
  whether authentication or encryption (or both) is used.  This means
  only that the message has not been altered or seen by another, non-
  trusted node.  Implicitly each node trusts each other node with which
  it has a trust relationship established via the mechanisms here to
  adhere to the protocol specifications laid out by the various
  standards.

Another explicit element of this trust model is that the peer will have
applied at least the same level of authentication with its next hop
peer. That is, a message that is received by C from B using
authentication, was originated at B, was received by B from A using
authentication, or was triggered at B because of the receipt at B of a
message from A that used authentication.

Without this element of the trust model, the authentication between
B and C is not particularly useful. I think your definition of security
domain (in Section 1.1) could be used in new text to make this point.

---

WIBNI

I might have put the final paragraph of Section 2 into Section 3.2

---

Nit:

Section 3.1

  Most current RSVP authentication implementations support per
  interface RSVP keys.  When the interface is point-to-point (and
  therefore an RSVP router has only a single RSVP neighbor on each
  interface), this is equivalent to per neighbor keys in the sense that
  a different key is used for each neighbor.

This slightly neglects the possibility of parallel interfaces to the
same neighbor.

---

Wrinkle                                   

In Figure 4, isn't it the case that one node, say R3, could be in both
security domains and apply the group key on a per interface / per
neighbor / per IP next hop basis?

---

WIBNI

Section 5.2 is largely dedicated to FRR.
It might be nice to give FRR its own section and leave just the last
two paragraphs (P2MP and hierarchy) in 5.2, perhaps renaming it
"Other RSVP-TE and GMPLS Functions"

---

Smile

Section 10.1

  A subverted node is defined here as an untrusted node, for example
  because an intruder has gained control over it.

If we knew that a subverted node was subverted, it would be untrusted.
And that would be the end of the story. But the problem is that we *do*
trust the subverted node!

---

I wouldn't like to have to argue in a court of law that some of the
references are not normative (e.g. 2205).
2011-08-05
11 Adrian Farrel [Ballot Position Update] New position, Yes, has been recorded
2011-08-05
11 Samuel Weiler Request for Telechat review by SECDIR is assigned to Stephen Kent
2011-08-05
11 Samuel Weiler Request for Telechat review by SECDIR is assigned to Stephen Kent
2011-08-01
11 (System) State changed to Waiting for AD Go-Ahead from In Last Call.
2011-07-29
11 David Harrington Placed on agenda for telechat - 2011-08-11
2011-07-29
11 David Harrington Approval announcement text changed
2011-07-29
11 David Harrington Approval announcement text regenerated
2011-07-29
11 David Harrington [Ballot Position Update] New position, Yes, has been recorded for David Harrington
2011-07-29
11 David Harrington Ballot has been issued
2011-07-29
11 David Harrington Created "Approve" ballot
2011-07-29
11 David Harrington The WG met at ietf81 and explicitly discussed the IPR declaration.
2011-07-26
11 Amanda Baber We understand that this document doesn't require any IANA actions.
2011-07-20
11 David Harrington Request for Last Call review by TSVDIR is assigned to Matt Mathis
2011-07-20
11 David Harrington Request for Last Call review by TSVDIR is assigned to Matt Mathis
2011-07-18
11 Amy Vezza Last call sent
2011-07-18
11 Amy Vezza
State changed to In Last Call from Last Call Requested.

The following Last Call Announcement was sent out:

From: The IESG
To: IETF-Announce
CC:
Reply-To: …
State changed to In Last Call from Last Call Requested.

The following Last Call Announcement was sent out:

From: The IESG
To: IETF-Announce
CC:
Reply-To: ietf@ietf.org
Subject: Last Call:  (Applicability of Keying Methods for RSVP Security) to Informational RFC


The IESG has received a request from the Transport Area Working Group
(tsvwg) to consider the following document:
- 'Applicability of Keying Methods for RSVP Security'
  as an Informational
RFC

The IESG plans to make a decision in the next few weeks, and solicits
final comments on this action. Please send substantive comments to the
ietf@ietf.org mailing lists by 2011-08-01. Exceptionally, comments may be
sent to iesg@ietf.org instead. In either case, please retain the
beginning of the Subject line to allow automated sorting.

Abstract


  The Resource reSerVation Protocol (RSVP) allows hop-by-hop integrity
  protection of RSVP neighbors.  This requires messages to be
  cryptographically protected using a shared secret between
  participating nodes.  This document compares group keying for RSVP
  with per neighbor or per interface keying, and discusses the
  associated key provisioning methods as well as applicability and
  limitations of these approaches.  The document also discusses
  applicability of encrypting RSVP messages.

The Responsible AD notes that the IPR declaration terms seem to apply to
standards-track documents, but not necessarily to an Informational document.

The file can be obtained via
http://datatracker.ietf.org/doc/draft-ietf-tsvwg-rsvp-security-groupkeying/

IESG discussion can be tracked via
http://datatracker.ietf.org/doc/draft-ietf-tsvwg-rsvp-security-groupkeying/


The following IPR Declarations may be related to this I-D:

  http://datatracker.ietf.org/ipr/988/



2011-07-18
11 Amy Vezza Last Call text changed
2011-07-17
11 David Harrington Last Call was requested
2011-07-17
11 David Harrington State changed to Last Call Requested from AD Evaluation::AD Followup.
2011-07-17
11 David Harrington Last Call text changed
2011-07-17
11 (System) Ballot writeup text was added
2011-07-17
11 (System) Last call text was added
2011-07-17
11 (System) Ballot approval text was added
2011-06-24
11 (System) Sub state has been changed to AD Follow up from New Id Needed
2011-06-24
10 (System) New version available: draft-ietf-tsvwg-rsvp-security-groupkeying-10.txt
2011-04-19
11 David Harrington State changed to AD Evaluation::Revised ID Needed from Publication Requested.
2011-04-19
11 David Harrington
Hi,

I have performed an AD review of this document.

Overall, I found the content of this document well written, but have a few concerns. …
Hi,

I have performed an AD review of this document.

Overall, I found the content of this document well written, but have a few concerns.
I believe these should be fairly easy to resolve.

-- Technical and Process concerns:
1) section 2 last paragraph
"... the RSVP router that
  receives the Path message will be able to authenticate it
  successfully using the group key."
It is important to be consistent in specifying what is being authenticated. Here "it" appears to refer to a message. Earlier text in section 2 says "If a group key is used, the authentication granularity becomes group membership of devices, not (individual) peer authentication between devices", which seems to indicate a device (or peer) is being authenticated (or a group of devices).

2) I am concerned with the number of "should" and "should not" recommendations, using non-RFC2119 keywords in an Informational document. This feels like you are trying to define a standard or BCP without using the standards track process. I think the usage of "should" should be eliminated from an Informational document.

3) Has the WG explicitly discussed acceptability of the IPR terms related to this document? The RAND terms apply for compliance to the standard, but this is not being submitted as a standards-track document. As noted in 2), there are a number of shoulds in this Informational document. The terms in the IPR declaration do not seem to provide non-assert status for implementing an Informational document. Has the WG discussed this?

-- Editorial Comments (mainly suggestions for improving the text):
1) The text is made much harder to read because there are a bunch of unnecesary lead-in phrases. You do not need a lead-in phrase for most sentences.
Sentences that start with "Note that" generally don't need the "Note that".
Sentences that start with "This implies that" generally don't need the "This implies that".
Sentences that start with "We observe that" generally don't need the "We observe that".
Sentences that start with "As observed in the security considerations section of RFCXXXX," generally don't need the introductory lead-in, just a simple reference after the stated content.

These superfluous phrases obscure the real content of the text.

2) [I-D.weis-gdoi-mac-tek] is referenced informationally. I generally prefer to avoid referencing IDs; they are an unstable thing to reference, and can delay document publication.

3) The next-to-last paragraph of section2 (starting with "This means that") could benefit from rephrasing. The first sentence seems to belong to the preceding paragraph (the challenge), while the rest of this paragraph is about the impact of handshakes. I think the paragraph could be more succinct:
OLD:
Section 4.3 of [RFC2747] states that "... the
  receiver MAY initiate an integrity handshake with the sender."  We
  note that if this handshake is taking place, it can be used to
  determine the identity of the next RSVP hop.  In this case, non-RSVP
  hops can be traversed also using per interface or per neighbor keys.
NEW:
Section 4.3 of [RFC2747] states that "... the
  receiver MAY initiate an integrity handshake with the sender."  Non-RSVP hops can be traversed more easily using per interface or per neighbor keys if an integrity handshake is used to determine the identity of the next RSVP hop.

(The ease is impacted; are the security properties impacted at all?)

4) section 3.1 defines "security domain". I think the definition is not clear and unambiguous. I think if you are going to define a term, it should not be buried in the fourth sentence of a paragraph. Put it in a terminology section, and make sure it is clear and unambiguous. If the term is already clearly defined in another document, please reference the normative document.

5) please ask the RFC editor whether they would prefer that "per interface" and "per neighbor" be hyphenated.

6) "per interface" should be "Per interface" when it starts a sentence.

7) please run id-nits and correct the problems it finds. I ran it and it complains about copyright year, lack of an RFC2119 reference, and the IPR disclaimer. Some complaints are caused by crossing a year-end during processing and are easy fixes.

8) I found section 3.1 a bit confusing on first read. The problem is the repetition using different words:
"However, when the
  interface is multipoint, all RSVP speakers on a given subnet have to
  share the same key in this model.  This makes it unsuitable for
  deployment scenarios where nodes from different security domains are
  present on a subnet"
and
"As mentioned above, per interface keys are only
  applicable when all the nodes reachable on the specific interface
  belong to the same security domain."
and
"Again, interface
  level keys can be deployed safely only when all the reachable
  neighbors on the interface belong to the same security domain."

What happens if interpretatiosn of the wording differ because your wording differs? State it once clearly, so you don't have to keep repeating it in different language.

9) s/We observe that, alternatively, in some
  environments, //

10) The sentence starting "Group keying may allow" might be better as the start of the next paragraph.

11) section 5.2
OLD:
In its Security Considerations section,
  [RFC4875] points out that RSVP message integrity mechanisms for hop-
  by-hop RSVP signaling apply to the hop-by-hop P2MP RSVP-TE signaling.
Suggested:
  RSVP message integrity mechanisms for hop-
  by-hop RSVP signaling apply to the hop-by-hop P2MP RSVP-TE signaling
  (see [RFC4875] Security Considerations).

12) s/In turn, we observe that the analyses in this document of keying
  methods apply equally to P2MP RSVP-TE for the hop-by-hop signaling.
/analyses in this document apply to P2MP RSVP-TE hop-by-hop signaling./

But after cutting away the excess words, does this sentence actually say anything?

Is it the analyses in this document that apply to P2MP signalling, or is it the RSVP integrity mechanism that applies?
Or are you saying that the analysis of keying methods for RSVP apply to the keying for P2MP signalling?

13) "We note that the observation in Section 3.1 of this
  document about use of group keying for protection of non-hop-by-hop
  messages apply to protection of non-hop-by-hop signaling for LSP
  Hierarchy and P2MP RSVP- TE."

What does this sentence actually say? Please be clear and unambiguous in your wording.

Let me see if I can understand what you are trying to say here.
a) section 3.1 discusses per-interface and per-neighbor keying, not group keying. and doesn't even mention non-hop-by-hop messages.
b) If I assume you meant 3.2, not 3.1, then I find that 3.2 says "As discussed in Section 2, group keying can be used in the presence of non-RSVP hops."
So to understand 5.2, I should read 3.2, which says I should read section 2.

and the message is ... "group keying can simplify protection of non-hop-by-hop signaling for LSP Hierarchy and P2MP RSVP- TE."
Is that what you are trying to say?

14) please expand all acronyms on first usage.

2011-03-08
11 Cindy Morgan
This is a TSVWG request that "Applicability of Keying Methods for
RSVP Security" () be
published as an Informational RFC.

  (1.a) Who is the …
This is a TSVWG request that "Applicability of Keying Methods for
RSVP Security" () be
published as an Informational RFC.

  (1.a) Who is the Document Shepherd for this document? Has the
    Document Shepherd personally reviewed this version of the
    document and, in particular, does he or she believe this
    version is ready for forwarding to the IESG for publication?

James Polk  is the Document Shepherd. I have
reviewed this version of the document, and believe this is ready to
forward to the IESG for publication.

  (1.b) Has the document had adequate review both from key WG members
    and from key non-WG members? Does the Document Shepherd have
    any concerns about the depth or breadth of the reviews that
    have been performed?

Yes, key members of the WG have reviewed this document. Stephen Kent
has also provided a detailed review.

Stephen Kent of the Sec-dir reviewed this document as well, and made
significant comments resulting in a fair amount of rewrite. All of
Stephen's comments and concerns have been addressed to his
satisfaction; therefore, I believe this has received sufficient
reviewing.

There are no concerns with this -08 version of this document.

  (1.c) Does the Document Shepherd have concerns that the document
    needs more review from a particular or broader perspective,
    e.g., security, operational complexity, someone familiar with
    AAA, internationalization, or XML?

No, I do not have concerns about this document progressing forward,
given Mr. Kent's review.

  (1.d) Does the Document Shepherd have any specific concerns or
    issues with this document that the Responsible Area Director
    and/or the IESG should be aware of? For example, perhaps he
    or she is uncomfortable with certain parts of the document, or
    has concerns whether there really is a need for it. In any
    event, if the WG has discussed those issues and has indicated
    that it still wishes to advance the document, detail those
    concerns here. Has an IPR disclosure related to this document
    been filed? If so, please include a reference to the
    disclosure and summarize the WG discussion and conclusion on
    this issue.

No, there are no additional concerns.

There is declared IPR on this document, at
https://datatracker.ietf.org/ipr/search/?option=document_search&docume
nt_search=draft-ietf-tsvwg-rsvp-security-groupkeying
filed in 2008, which no one has mentioned as an issue.

It's transparent to declare that I work for the same organization
that has the IPR claim, so some might consider me biased on the
matter. This can possibly be given less weight since the ID is an
Informational document, and not a standards track, but I do concede
that some on the IESG might take issue with this.

  (1.e) How solid is the WG consensus behind this document? Does it
    represent the strong concurrence of a few individuals, with
    others being silent, or does the WG as a whole understand and
    agree with it?

There is WG consensus around this document, with otherWG members
being silent. The nature of TSVWG is an open area WG, with now 7
primary topics of interest; very few efforts ever get 'strong' WG
consensus. That said, consensus was solidly behind this document with
no current objections or open comments to this doc. This doc has been
reviewed by many people, including the Sec-dir already.

  (1.f) Has anyone threatened an appeal or otherwise indicated
extreme
    discontent? If so, please summarize the areas of conflict in
    separate email messages to the Responsible Area Director. (It
    should be in a separate email because this questionnaire is
    entered into the ID Tracker.)

No, there was never any threat of appeal wrt this document.

  (1.g) Has the Document Shepherd personally verified that the
    document satisfies all ID nits? (See
    http://www.ietf.org/ID-Checklist.html and
    http://tools.ietf.org/tools/idnits/.) Boilerplate checks are
    not enough; this check needs to be thorough. Has the document
    met all formal review criteria it needs to, such as the MIB
    Doctor, media type, and URI type reviews? If the document
    does not already indicate its intended status at the top of
    the first page, please indicate the intended status here.


I have verified the 1 error is where this intended-to-be
Informational RFC quotes another RFC, which is the only use of RFC
2119
language. I believe this is fine.

I have verified the 1 warning (lacking a disclaimer for pre-RFC5378
work) is ok with the editors.

I have verified the 1 comment is stating the document is only 7 days
old, and is questioning that - again, which I believe is fine.


  (1.h) Has the document split its references into normative and
    informative? Are there normative references to documents that
    are not ready for advancement or are otherwise in an unclear
    state? If such normative references exist, what is the
    strategy for their completion? Are there normative references
    that are downward references, as described in [RFC3967]? If
    so, list these downward references to support the Area
    Director in the Last Call procedure for them [RFC3967].

The references are not split - and are only informational because
this is an informational document.


  (1.i) Has the Document Shepherd verified that the document's IANA
    Considerations section exists and is consistent with the body
  of the document? If the document specifies protocol
    extensions, are reservations requested in appropriate IANA
    registries? Are the IANA registries clearly identified? If
    the document creates a new registry, does it define the
    proposed initial contents of the registry and an allocation
    procedure for future registrations? Does it suggest a
    reasonable name for the new registry? See [RFC2434]. If the
    document describes an Expert Review process, has the Document
    Shepherd conferred with the Responsible Area Director so that
    the IESG can appoint the needed Expert during IESG Evaluation?


The document states that there are no IANA considerations for this
document as it does not register anything, therefore this section can
be removed by the RFC-Editor during publication processing.


  (1.j) Has the Document Shepherd verified that sections of the
    document that are written in a formal language, such as XML
    code, BNF rules, MIB definitions, etc., validate correctly in
    an automated checker?

Yes, I have verified there is no formal language such as XML
code, BNF rules, MIB definitions, etc. contained within this document.



  (1.k) The IESG approval announcement includes a Document
    Announcement Write-Up. Please provide such a Document
    Announcement Write-Up. Recent examples can be found in the
    "Action" announcements for approved documents. The approval
    announcement contains the following sections:

    Technical Summary

The Resource reSerVation Protocol [RFC2205] allows hop-by-hop
authentication of RSVP neighbors, as specified in [RFC2747].  In this
mode, an integrity object is attached to each RSVP message to
transmit a keyed message digest.  This message digest allows the
recipient to verify the identity of the RSVP node that sent the
message, and to validate the integrity of the message.  Through the
inclusion of a sequence number in the scope of the digest, the digest
also offers replay protection.

This document discusses a variety of keying methods and their
applicability to different RSVP deployment environments, for both
message integrity and encryption.  It is meant as a comparative guide
to understand where each RSVP keying method is best deployed, and the
limitations of each method.  Furthermore, it discusses how RSVP hop
by hop authentication is impacted in the presence of non-RSVP nodes,
or subverted nodes, in the reservation path.

The document "RSVP Security Properties" ([RFC4230]) provides an
overview of RSVP security, including RSVP Cryptographic
Authentication [RFC2747], but does not discuss key management.  It
states that "RFC 2205 assumes that security associations are already
available".  The present document focuses specifically on key
management with different key types, including group keys.  Therefore
this document complements [RFC4230].


    Working Group Summary

Understanding that 'strong' consensus is nearly impossible in an open
area WG such as TSVWG, with 5-6 sub-groups within this WG divided
along technology focuses -- there is unwavering consensus in the WG
amongst interested parties to publish this document. It has been
reviewed by several people in the WG last call. Comments raised have
been addressed, including those from the Sec-dir.

    Document Quality

No, there is no working implementation of this document in a
protocol. The Sec-dir assigned Stephen Kent, who did an exceptional
review of this document.

James Polk is the document Shepherd. David Harrington is the
responsible Area Director. There are no IANA registrations specified
by this document.

2011-03-08
11 Cindy Morgan Draft added in state Publication Requested
2011-03-08
11 Cindy Morgan [Note]: 'James Polk (jmpolk@cisco.com) is the Document Shepherd.' added
2010-12-07
09 (System) New version available: draft-ietf-tsvwg-rsvp-security-groupkeying-09.txt
2010-10-22
08 (System) New version available: draft-ietf-tsvwg-rsvp-security-groupkeying-08.txt
2010-09-23
07 (System) New version available: draft-ietf-tsvwg-rsvp-security-groupkeying-07.txt
2010-06-26
06 (System) New version available: draft-ietf-tsvwg-rsvp-security-groupkeying-06.txt
2009-12-18
11 Samuel Weiler Request for Early review by SECDIR Completed. Reviewer: Stephen Kent.
2009-12-06
11 (System) Document has expired
2009-11-20
11 Samuel Weiler Request for Early review by SECDIR is assigned to Stephen Kent
2009-11-20
11 Samuel Weiler Request for Early review by SECDIR is assigned to Stephen Kent
2009-06-04
05 (System) New version available: draft-ietf-tsvwg-rsvp-security-groupkeying-05.txt
2009-03-24
04 (System) New version available: draft-ietf-tsvwg-rsvp-security-groupkeying-04.txt
2009-03-05
03 (System) New version available: draft-ietf-tsvwg-rsvp-security-groupkeying-03.txt
2008-11-03
02 (System) New version available: draft-ietf-tsvwg-rsvp-security-groupkeying-02.txt
2008-07-25
(System) Posted related IPR disclosure: Cisco's Statement about IPR claimed in draft-ietf-tsvwg-rsvp-security-groupkeying-01.txt
2008-07-11
01 (System) New version available: draft-ietf-tsvwg-rsvp-security-groupkeying-01.txt
2008-02-22
00 (System) New version available: draft-ietf-tsvwg-rsvp-security-groupkeying-00.txt