Skip to main content

Asymmetric Extended Route Optimization (AERO)
draft-templin-aero-12

Revision differences

Document history

Date Rev. By Action
2012-07-11
12 (System) IANA Action state changed to RFC-Ed-Ack from Waiting on RFC Editor
2012-07-11
12 (System) IANA Action state changed to Waiting on RFC Editor from Waiting on Authors
2012-07-10
12 (System) IANA Action state changed to Waiting on Authors from In Progress
2012-07-10
12 (System) IANA Action state changed to In Progress from On Hold
2012-07-09
12 (System) IANA Action state changed to On Hold from In Progress
2012-07-03
12 Cindy Morgan State changed to RFC Ed Queue from Approved-announcement sent
2012-07-02
12 (System) IANA Action state changed to In Progress
2012-06-29
12 Amy Vezza State changed to Approved-announcement sent from Approved-announcement to be sent::Point Raised - writeup needed
2012-06-29
12 Amy Vezza IESG has approved the document
2012-06-29
12 Amy Vezza Closed "Approve" ballot
2012-06-29
12 Amy Vezza Ballot approval text was generated
2012-06-29
12 Amy Vezza Ballot writeup was changed
2012-06-25
12 Fred Templin New version available: draft-templin-aero-12.txt
2012-06-21
11 Cindy Morgan State changed to Approved-announcement to be sent::Point Raised - writeup needed from IESG Evaluation::AD Followup
2012-06-21
11 Russ Housley [Ballot Position Update] Position for Russ Housley has been changed to No Objection from Discuss
2012-06-21
11 Barry Leiba Ballot comment text updated for Barry Leiba
2012-06-21
11 Benoît Claise Ballot comment text updated for Benoit Claise
2012-06-21
11 Gonzalo Camarillo [Ballot Position Update] New position, No Objection, has been recorded for Gonzalo Camarillo
2012-06-20
11 Sean Turner [Ballot comment]
I like Stephen's suggestion for s4.4.
2012-06-20
11 Sean Turner [Ballot Position Update] Position for Sean Turner has been changed to No Objection from Discuss
2012-06-20
11 Ralph Droms
[Ballot comment]
I've cleared my Discusses.  Thanks for addressing those points.

1. (fixed in rev -11)

2. (addressed in response from author)

3. (fixed in …
[Ballot comment]
I've cleared my Discusses.  Thanks for addressing those points.

1. (fixed in rev -11)

2. (addressed in response from author)

3. (fixed in rev -11)

4. (was Discuss 1) I think some text is needed in section 6.4.7 to
allow for the scenario suggested in this text from the Introduction:

  For example, when an ingress link neighbor accepts an ordinary
  redirection message, it has no way of knowing whether the egress link
  neighbor is ready and willing to accept packets directly without
  involving an intermediate router

The text in section 6.4.7 seems to assume that the egress node will
always be willing to accept traffic from the ingress node.  Fred
explained in e-mail that the egress node can passively ignore the
Predirect message by not sending a response Redirect message.
However, section 6.4.7 does not explicitly note that the egress node
can implement this behavior.

5. (was Discuss 2) I suggest s/involving/forwarding through/ for
clarification.

6. (was Discuss 3) In section 6.4.8, what is the advantage to the
intermediate router snooping the Redirect response and "relaying" the
Redirect on to the ingress node without decrementing the hop count,
rather than what would seem to be a less unusual method in which the
egress node sends the Redirect to the intermediate router, which
receives and processes the Redirect, and then sends a corresponding
Redirect on to the ingress node?

7. (was Discuss 4) Fixed in rev -11.
2012-06-20
11 Ralph Droms [Ballot Position Update] Position for Ralph Droms has been changed to No Objection from Discuss
2012-06-20
11 Ron Bonica [Ballot Position Update] Position for Ronald Bonica has been changed to No Objection from Discuss
2012-06-19
11 Robert Sparks [Ballot Position Update] New position, No Objection, has been recorded for Robert Sparks
2012-06-14
11 Brian Haberman [Ballot comment]
I support the experiment being proposed in this document and appreciate the author's responsiveness to my DISCUSS points.
2012-06-14
11 Brian Haberman [Ballot Position Update] Position for Brian Haberman has been changed to No Objection from Discuss
2012-06-14
11 Adrian Farrel
[Ballot comment]
Thanks to the author for providing some cocrete examples and motivation, and for moving the experiment to operate over UDP. This addresses my …
[Ballot comment]
Thanks to the author for providing some cocrete examples and motivation, and for moving the experiment to operate over UDP. This addresses my Discuss and I am happy to ballot "yes" and encourage this experiment.

I would be interested to hear from the author how he sees the applicability of this work to data centers and the NVO3 working group.
2012-06-14
11 Adrian Farrel [Ballot Position Update] Position for Adrian Farrel has been changed to Yes from Discuss
2012-06-13
11 Stewart Bryant Telechat date has been changed to 2012-06-21 from 2012-04-26
2012-06-13
11 Stewart Bryant Added as returning item on telechat
2012-06-13
11 Stewart Bryant Ballot writeup was changed
2012-06-13
11 Stephen Farrell
[Ballot comment]
FWIW, I (still) agree with a bunch of the the other discusses on this.

You've now stated that the signature scheme is for …
[Ballot comment]
FWIW, I (still) agree with a bunch of the the other discusses on this.

You've now stated that the signature scheme is for future study,
which is ok for me for an experimental document like this. However,
as a comment, I'm still not keen on how 6.4.4 is written right now.
It says: you're ok if one of 4 things, but how to achieve the last
one (signatures) is not defined here, yet you say "may be
obliged" for that.

I'd suggest getting rid of the 4th bullet entirely and making the
following change (or similar) at the end:

OLD

  Note that on links in which link-layer address spoofing is possible,
  AERO nodes may be obliged to require the use of digital signatures
  applied through means outside the scope of this document.  In that
  case, only the fourth of the above conditions can be accepted in
  order to ensure adequate data origin authentication.

NEW

  Note that on links in which link-layer address spoofing is possible,
  (which is common) AERO nodes will not be very secure since
  the data origin authentication defined here is easily spoofed. To
  address this, future work might define a strong data origin
  authentication scheme (such as the use of digital signatures) to
  address this problem.
2012-06-13
11 Stephen Farrell [Ballot Position Update] Position for Stephen Farrell has been changed to No Objection from Discuss
2012-06-12
11 Fred Templin New version available: draft-templin-aero-11.txt
2012-04-26
10 Samuel Weiler Request for Last Call review by SECDIR Completed. Reviewer: Joseph Salowey.
2012-04-26
10 Cindy Morgan State changed to IESG Evaluation::AD Followup from Waiting for AD Go-Ahead
2012-04-26
10 Benoît Claise
[Ballot comment]
Looking at the number of DISCUSS already, I would prefer to wait for the next version of the draft before reviewing the document …
[Ballot comment]
Looking at the number of DISCUSS already, I would prefer to wait for the next version of the draft before reviewing the document in details. By spending 15 minutes on the draft, I have some questions already. Therefore, I reserve the option to come back and potential add a DISCUSS on the next document version.
2012-04-26
10 Benoît Claise [Ballot Position Update] New position, No Objection, has been recorded for Benoit Claise
2012-04-25
10 Adrian Farrel
[Ballot discuss]
It is entirely unclear to me what real problem this work is designed to
solve.

It is clear that it is possible to …
[Ballot discuss]
It is entirely unclear to me what real problem this work is designed to
solve.

It is clear that it is possible to construct a network where "triangular
paths" could exist and where redirection can help resolve the issues.

Only one brief paragraph is given to explain why "ordinary redirection
may lead to operational issues on certain link types and/or in certain
deployment scenarios" and it is unclear to me whether this represents a
real problem. It would appear that the issue can arrise when the multi-
access link has very large numbers of hosts and very large numbers of
routers on the same link. Is this realistic? Do we not find this type
of deployment in the wild because of these problems or because that is
simply not how networks are usually built?

So I would like to see several things called out more explicitly:

- What are the deployments that motivate this work?

- Is the model here that the Aero Edge Routers are acting as "PEs" in
  a sort of VPN like model?

- What sort of scaling numbers are to be considered?

- What are the operational problems with existing solutions and why
  can they not be solved using pre-existing protocol solutions?

- Would the problem not exist if all nodes on the link were routers
  or if nearly all (i.e. except for a default and alternate router)
  were hosts?

- How come spoofing of redirects is given as a motivation for this
  work yet called out as a security issue for Aero with a remediation 
  offered that could be applied today?

Other than that, I feel that there are so many significant changes
needed to address the many Discusses already raised that I am cautious
about drawing a line under my review and reserve the option to come back
and add to my Discuss when a future version has been published. I hope
the sponsoring AD will put the document back on a future telechat after
it has been updated.
2012-04-25
10 Adrian Farrel
[Ballot comment]
In Figure 5, I assume that nodes B and F are actually routers (i.e. AERO
edge routers) since they provide acceess to hosts …
[Ballot comment]
In Figure 5, I assume that nodes B and F are actually routers (i.e. AERO
edge routers) since they provide acceess to hosts through IP clouds.
2012-04-25
10 Adrian Farrel [Ballot Position Update] New position, Discuss, has been recorded for Adrian Farrel
2012-04-25
10 Martin Stiemerling [Ballot comment]
I'm supporting the other DISCUSSes which cover the issues of the draft.
2012-04-25
10 Martin Stiemerling Ballot comment text updated for Martin Stiemerling
2012-04-25
10 Martin Stiemerling [Ballot comment]
I'm supporting the discuss of Brian and Ron.
2012-04-25
10 Martin Stiemerling [Ballot Position Update] New position, No Objection, has been recorded for Martin Stiemerling
2012-04-25
10 Sean Turner
[Ballot discuss]
Hate to pile on but there were a number of agreed changes as a result of the secdir review.  This is just a …
[Ballot discuss]
Hate to pile on but there were a number of agreed changes as a result of the secdir review.  This is just a placeholder discuss until fixes to those changes are agreed and incorporated.
2012-04-25
10 Sean Turner [Ballot comment]
I support the discusses from the other ADs.
2012-04-25
10 Sean Turner [Ballot Position Update] New position, Discuss, has been recorded for Sean Turner
2012-04-25
10 Barry Leiba
[Ballot comment]
Lots of DISCUSS positions already, and I don't have anything new to add.  I'll just say that I support some of the other …
[Ballot comment]
Lots of DISCUSS positions already, and I don't have anything new to add.  I'll just say that I support some of the other AD's DISCUSS positions, particularly Brian's and Ron's.
2012-04-25
10 Barry Leiba [Ballot Position Update] New position, No Objection, has been recorded for Barry Leiba
2012-04-25
10 Ron Bonica
[Ballot discuss]
- It is impossible to evaluate this draft without more detail regarding the operational scenario in which it is to be deployed. If …
[Ballot discuss]
- It is impossible to evaluate this draft without more detail regarding the operational scenario in which it is to be deployed. If the reference scenario described in Section 4.3 were deployed by devices and links contained within a single campus, one might ask why the problem could not be solved by running an IGP on Routers A, B and D and by putting Host F behind a router.

- This draft appears to use ICMP as a routing protocol. However, ICMP does not have all of the capabilities required by a routing protocol. You might want to explore the this issue in the next version of this draft.

- The approach used in this draft seems to contradict the following statement from RFC 1812:

"A router using a routing protocol (other than static routes) MUST NOT consider paths learned from ICMP Redirects when forwarding a packet. If a router is not using a routing protocol, a router MAY have a configuration that, if set, allows the router to consider routes learned through ICMP Redirects when forwarding packets."


- Beyond these, there are many other comments. For example, Stephen's question regarding authentication is telling. However, it may not be worth discussing these until we understand the problem that you are really trying to solve.
2012-04-25
10 Ron Bonica [Ballot Position Update] New position, Discuss, has been recorded for Ronald Bonica
2012-04-25
10 Stephen Farrell [Ballot comment]

FWIW, I agree with a bunch of the the other discusses on this.
2012-04-25
10 Stephen Farrell Ballot comment text updated for Stephen Farrell
2012-04-25
10 Stephen Farrell
[Ballot discuss]
(1) 4.4.4 - I don't get the origin authentication check, you
say that the source address is correct if a list of 4 …
[Ballot discuss]
(1) 4.4.4 - I don't get the origin authentication check, you
say that the source address is correct if a list of 4 things are ok,
but then later that only one of them needs to be ok. Which is it?  The
latter case (any of the 4) seems broken since the 3rd bullet is just
the easily spoofed MAC address. The last paragraph here is also
odd, the two sentences seem to contradict one another.

(2) the signature scheme in 4.4.4 is undefined, you need to either
define it, or else fess up and say that there's no current scheme
and AERO just depends on things that are easily forged and strong
data origin authentication is for future work. (I'd be ok with
the latter for an experimental draft like this I think.)
section 3: no security requirements for strong authentication?
2012-04-25
10 Stephen Farrell [Ballot Position Update] New position, Discuss, has been recorded for Stephen Farrell
2012-04-25
10 Stewart Bryant Intended Status changed to Experimental from Informational
2012-04-24
10 Brian Haberman
[Ballot discuss]
I am editing my DISCUSS points in order focus on the issues that still need resolving.  Since a new document is not available, …
[Ballot discuss]
I am editing my DISCUSS points in order focus on the issues that still need resolving.  Since a new document is not available, I have marked each point with the state I think they are in...

This document is going to require some true DISCUSSion in order to resolve some obvious issues.

1. If this draft goes forward as Experimental, it needs more justification.  What issues with AERO make it unsuitable for use on the Internet as a whole?  What network characteristics are required to assess AERO's behavior?  What issues will arise if non-AERO and AERO-capable nodes attempt to interact?  Is AERO truly suitable for any multi-access network?

2. From the author, my understanding is that an AERO edge router will have a set of ACLs that only allow traffic to be forwarded to it that comes from its default router (router D only forwards traffic from router A by default). That implies that router D must trust the MAC-level information (e.g., src MAC address) contained in a forwarded frame.  How is that accomplished?  In general, multi-access networks require specific MAC-level functions to do that.  Discussion of these issues and how they relate to the AERO messages is needed.

3. [Resolved pending a new version] Section 4.2.2 specifies AERO host behavior.  Since that behavior does not differ from standard IPv6 host behavior defined in RFC 4861 and RFC 4862, what is the purpose?  *IF* you need to say anything about host behavior, state that it acts as an IPv6 host (as defined in RFCs 4861, 4862, and 6434).

4.[Resolved pending a new version] Do AERO edge routers (Section 4.2.3) differ from the CPE routers defined in RFC 6204 (other than the added AERO functionality)?  It appears that they should, but it is not specifically called out.

5.[Modified] I find the claim (section 4.4.1) that "...the ingress node has no way of knowing whether the egress is willing to accept its packets, ..." dubious at best. These packets are being transmitted as IP datagrams, which are best effort.  It is not the job of layer-3 to build reliability into the packet forwarding paradigm.

6. [Resolved] Section 4.4.5 re-defines the structure of the ICMPv6 Redirect message by adding new bit fields.  Given that, why does the document not list itself as updating RFC 4861?  If that is the case, this change needs to be reviewed by the 6MAN working group.

7. [Modified] Sections 4.4.10-12 have convinced me that this specification is really a dynamic routing protocol using ICMPv6 Redirect (and the variant Predirect) messages. The incorporation of mobility concepts and periodic reachability logic makes this no different than existing MANET and scaled-down IGPs.  In this light, the document does not clearly explain key functional behaviors or why those behaviors are not needed. In order to address these concerns, more detail is needed (per Russ' DISCUSS) on exactly what link types AERO is expected to work under.  Single-link behavior for something like Ethernet does not make sense in the context of AERO.
2012-04-24
10 Brian Haberman
[Ballot comment]
1. [Resolved pending a new version] Section 4.2.2 states that the egress AERO router sends a Redirect message to the intermediate AERO router …
[Ballot comment]
1. [Resolved pending a new version] Section 4.2.2 states that the egress AERO router sends a Redirect message to the intermediate AERO router who then proxies that Redirect to the ingress AERO router. It would be good to include a forward pointer to sections 4.4.7 and 4.4.8 since that is where the sending and redirect rules are defined.

2. [Resolved pending a new version] The Acknowledgments section seems to have been truncated.
2012-04-24
10 Brian Haberman Ballot comment and discuss text updated for Brian Haberman
2012-04-24
10 Ralph Droms
[Ballot discuss]
1. In this text from the Introduction:

  For example, when an ingress link neighbor accepts an ordinary
  redirect message, it has …
[Ballot discuss]
1. In this text from the Introduction:

  For example, when an ingress link neighbor accepts an ordinary
  redirect message, it has no way of knowing whether the egress link
  neighbor is ready and willing to accept packets directly without
  involving an intermediate router.

I don't think I see any description of a way for the egress node to
explicitly notify the ingress node, either directly or through the
intermediate node, that the egress node is unwilling "to accept
packets directly", nor do I see how the intermediate node reacts to a
NAK from the egress node.

2. Also in the text cited in point 1, I don't see any support for the
assertion that an intermediate router is required.  Isn't that what
routing protocols do?

On re-reading that text, I realize I may be confused: does "without
involving an intermediate router" mean:

a) the ingress node needs an intermediate router to learn whether the
egress nodes will accept traffic from the ingress node or
b) the egress node will not accept traffic directly from the ingress
node but it will accept traffic forwarded from the ingress node
forwarded through the intermediate node?

3. Do I have it right in section 4.4.7 that the Redirect response from
D is sent to L3(B) (i.e., unicast to the ingress node), but the
intermediate node A snoops that Redirect message and verifies the
contents in various ways before forwarding it to B?  And then it
doesn't decrement the hopcount?  Why are these exceptional forwarding
rules necessary?  Can't D send the Redirect to A, and then A send a
corresponding Redirect to B?

4. Section 4.4.5 specifies that the AERO Predirect/Redirect message
will use type 100, while Figure 4 shows the use of type 137. I include
this as a DISCUSS point because Figure 4 needs to be fixed to show
type 100 before the document is published to avoid problems with the
existing ICMP Redirect message.
2012-04-24
10 Ralph Droms
[Ballot comment]
1. The document has many details about the operations of the various
AERO nodes that are not germane to the specification of AERO.  …
[Ballot comment]
1. The document has many details about the operations of the various
AERO nodes that are not germane to the specification of AERO.  I would
suggest editing out all of the provisioning and initialization details
in, e.g., section 4.3, and simply describe the state of the various
AERO nodes at the time of AERO operation.

2. In section 4.4.11, what prevents A from invoking the
Predirect/Redirect mechanism for each datagram received from B
destined for D, even if B has determined that B cannot send directly
to D?

3. In the Security Considerations section, how does an Aero edge node
know to trust an AERO intermediate router that advertises itself?  I
think the digital signature mechanism needs to be explored in more
detail or data authentication more generally needs to be left for
future work.
2012-04-24
10 Ralph Droms [Ballot Position Update] New position, Discuss, has been recorded for Ralph Droms
2012-04-24
10 Russ Housley
[Ballot discuss]

  I understand that the AERO mechanisms were initially designed for NBMA
  tunnel virtual interfaces, but these mechanisms can also be applied …
[Ballot discuss]

  I understand that the AERO mechanisms were initially designed for NBMA
  tunnel virtual interfaces, but these mechanisms can also be applied to
  any multiple access link types that support redirection.  That said, I
  think we need to better characterize the environments where AERO is
  appropriate, and maybe even more importantly the environments where
  AERO is not appropriate.

  This position seems to be supported by the Gen-ART Review by
  Pete McCann on 24-Apr-2012.  Please consider the other comments that
  are include in this review.  The review can be found at:
  http://www.ietf.org/mail-archive/web/gen-art/current/msg07385.html
2012-04-24
10 Russ Housley [Ballot Position Update] New position, Discuss, has been recorded for Russ Housley
2012-04-22
10 Pete Resnick
[Ballot comment]
I agree with Brian's DISCUSS regarding status. In fact, even Experimental seems a bit odd. The document doesn't describe the circumstances under which …
[Ballot comment]
I agree with Brian's DISCUSS regarding status. In fact, even Experimental seems a bit odd. The document doesn't describe the circumstances under which you would want to experiment and why you wouldn't want to let this out on the Internet as a proposed standard. I think some more explanation, and perhaps an adjustment to status, is needed.
2012-04-22
10 Pete Resnick [Ballot Position Update] New position, No Objection, has been recorded for Pete Resnick
2012-04-22
10 Brian Haberman
[Ballot discuss]
This document is going to require some true DISCUSSion in order to resolve some obvious issues.

1. Why is the document labeled INFORMATIONAL …
[Ballot discuss]
This document is going to require some true DISCUSSion in order to resolve some obvious issues.

1. Why is the document labeled INFORMATIONAL when it is clearly specifying a new protocol behavior?  It contains the boilerplate text for the 2119 keywords and it uses those words (albeit some are in lowercase) to mandate actions.  Should this really be EXPERIMENTAL?  This is especially relevant given that the header says Experimental, section 4.4.14 refers to this document as an experimental specification, and it is using the Experimental code points for ICMPv6 messages.

2. The logic argued as to why this functionality is required is flawed.  The Introduction argues that ingress and egress nodes do not know if the other node is authorized to forward traffic from/to the source/destination networks. Wrapping this authorization concept into modified Redirect messages seems convoluted and outside the scope of ICMP messages.

3. Section 4.2.2 specifies AERO host behavior.  Since that behavior does not differ from standard IPv6 host behavior defined in RFC 4861 and RFC 4862, what is the purpose?  *IF* you need to say anything about host behavior, state that it acts as an IPv6 host (as defined in RFCs 4861, 4862, and 6434).

4. Do AERO edge routers (Section 4.2.3) differ from the CPE routers defined in RFC 6204 (other than the added AERO functionality)?  It appears that they should, but it is not specifically called out.

5. I find the claim (section 4.4.1) that "...the ingress node has no way of knowing whether the egress is willing to accept its packets, nor whether the egress is even reachable via a direct path..." dubious at best.  RFC 4861 (section 7.3.3) specifically calls out that the creation of a Neighbor Cache entry based on a Redirect marks that entry as STALE.  That state requires the node to perform neighbor reachability tests before the entry can be used.  And the follow-on claim that an ingress node does not know if the final destination has moved away from the egress node applies to more than just redirection scenarios.  That issue is also present in environments where dynamic routing protocols are run as well.

6. Section 4.4.5 re-defines the structure of the ICMPv6 Redirect message by adding new bit fields.  Given that, why does the document not list itself as updating RFC 4861?  If that is the case, this change needs to be reviewed by the 6MAN working group.

7. Sections 4.4.10-12 have convinced me that this specification is really a dynamic routing protocol using ICMPv6 Redirect (and the variant Predirect) messages. The incorporation of mobility concepts and periodic reachability logic makes this no different than existing MANET and scaled-down IGPs.  In this light, the document does not clearly explain key functional behaviors or why those behaviors are not needed.
2012-04-22
10 Brian Haberman
[Ballot comment]
1. Section 4.2.2 states that the egress AERO router sends a Redirect message to the intermediate AERO router who then proxies that Redirect …
[Ballot comment]
1. Section 4.2.2 states that the egress AERO router sends a Redirect message to the intermediate AERO router who then proxies that Redirect to the ingress AERO router. It would be good to include a forward pointer to sections 4.4.7 and 4.4.8 since that is where the sending and redirect rules are defined.

2. The Acknowledgments section seems to have been truncated.
2012-04-22
10 Brian Haberman [Ballot Position Update] New position, Discuss, has been recorded for Brian Haberman
2012-04-18
10 (System) State changed to Waiting for AD Go-Ahead from In Last Call
2012-04-16
10 Stewart Bryant Placed on agenda for telechat - 2012-04-26
2012-04-16
10 Stewart Bryant Ballot has been issued
2012-04-16
10 Stewart Bryant [Ballot Position Update] New position, Yes, has been recorded for Stewart Bryant
2012-04-16
10 Stewart Bryant Ballot writeup was changed
2012-04-16
10 Stewart Bryant Created "Approve" ballot
2012-03-21
10 Amanda Baber We understand that this document doesn't require any IANA actions.
2012-03-14
10 Martin Stiemerling Request for Last Call review by TSVDIR is assigned to Fernando Gont
2012-03-14
10 Martin Stiemerling Request for Last Call review by TSVDIR is assigned to Fernando Gont
2012-03-09
10 Jean Mahoney Request for Last Call review by GENART is assigned to Pete McCann
2012-03-09
10 Jean Mahoney Request for Last Call review by GENART is assigned to Pete McCann
2012-03-08
10 Samuel Weiler Request for Last Call review by SECDIR is assigned to Joseph Salowey
2012-03-08
10 Samuel Weiler Request for Last Call review by SECDIR is assigned to Joseph Salowey
2012-03-07
10 Amy Vezza Last call sent
2012-03-07
10 Amy Vezza
State changed to In Last Call from Last Call Requested

The following Last Call Announcement was sent out:

From: The IESG

To: IETF-Announce

Reply-To: ietf@ietf.org …
State changed to In Last Call from Last Call Requested

The following Last Call Announcement was sent out:

From: The IESG

To: IETF-Announce

Reply-To: ietf@ietf.org

Subject: Last Call:  (Asymmetric Extended Route Optimization (AERO)) to Informational RFC





The IESG has received a request from an individual submitter to consider

the following document:

- 'Asymmetric Extended Route Optimization (AERO)'

  as an Informational RFC



The IESG plans to make a decision in the next few weeks, and solicits

final comments on this action. Please send substantive comments to the

ietf@ietf.org mailing lists by 2012-04-18. Exceptionally, comments may be

sent to iesg@ietf.org instead. In either case, please retain the

beginning of the Subject line to allow automated sorting.



Abstract





  Nodes attached to common multi-access link types (e.g., multicast-

  capable, shared media, non-broadcast multiple access (NBMA), etc.)

  can exchange packets as neighbors on the link, but may not always be

  provisioned with sufficient routing information for optimal neighbor

  selection.  Such nodes should therefore be able to discover a trusted

  intermediate router on the link that provides both forwarding

  services to reach off-link destinations and redirection services to

  inform the node of an on-link neighbor that is closer to the final

  destination.  This redirection can provide a useful route

  optimization, since the triangular path from the ingress link

  neighbor, to the intermediate router, and finally to the egress link

  neighbor may be considerably longer than the direct path from ingress

  to egress.  However, ordinary redirection may lead to operational

  issues on certain link types and/or in certain deployment scenarios.

  This document therefore introduces an Asymmetric Extended Route

  Optimization (AERO) capability that addresses the issues.









The file can be obtained via

http://datatracker.ietf.org/doc/draft-templin-aero/



IESG discussion can be tracked via

http://datatracker.ietf.org/doc/draft-templin-aero/ballot/





No IPR declarations have been submitted directly on this I-D.





2012-03-07
10 Stewart Bryant
Proto Statement for draft-templin-aero

(1) As indicated on the title page, this writeup accompanies a
request for publication of the subject document as an
Experimental …
Proto Statement for draft-templin-aero

(1) As indicated on the title page, this writeup accompanies a
request for publication of the subject document as an
Experimental RFC.

(2) The IESG approval announcement includes a Document Announcement
Write-Up. Please provide such a Document Announcement Write-Up. Recent
examples can be found in the "Action" announcements for approved
documents. The approval announcement contains the following sections:

(3) The document shepherd provided review comments on the focus
and clarity of earlier versions of this document.  He provided
significant review of all the material in later versions, and
is satisfied that the current document is sound material worthy
of publication by the IESG as an Experimental RFC.

(4) In the document shepherd's opinion, there have been sufficient
reviews to warrant IETF last call and IESG consideration of this
document.  The shepherd assumes that normal last-call reviews
will be provided to ensure that sufficient eyes have checked
the document.

(5) The document proposes specific routing related mechanisms,
and contains significant security usages.  Both of these
should be formally reviewed by the relevant areas as part
of the IETF Last Call process. The shepherd has examined
both aspects, and is of the opinion that the work is sound
in both regards.

(6) The document shepherd does not have any concerns that
need to be considered or addressed regarding this document.

(7) The author has confirmed that there is no undisclosed
IPR known to the author to apply to this document.

(8) There are no IPR disclosures relevant to this document.

(9) This document is the work of the author, and does
not represent nor have the support of any particular community.

(10) There is no known discontent with this document.
Neither the author nor the document shepherd know of any
issues that would lead to appeals.

(11) The document complies with IETF rules for ID content
and form.  The tool is unhappy with the way RFC 2119
terminology is used, but the shepherd is satisfied that
the construction is clear.

(12) There are no formal reviews associated with any
content in this document.

(14) There no issues with the references in the document.
All normative references are to existing, published, RFCs.

(15) There are no downref issues with this document.

(16) This experimental document will not change the
status of any other documents.

(17) The document does not create any new IANA registries
or add entries to any existing entries.  Earlier
informational versions of this document used bits from
a field defined in existing standards track RFCs, but for
which there are no registries.  Using an experimental
ICMPv6 code point for the messages defined in this
document removes the complications the absence of such
a registry causes.

(18) This document does not create any IANA registries.

(19) There is no formal language content in this document,
and therefore there was no review of such.

Summary for final publication:

Technical Summary
  This document provides an experimental approach to using
  redirection based exchanges in order to securly provide for
  efficient forwarding of IPv6 messages over certain classes
  of classes of multiple access link topologies.  In those
  environments, it replaces significantly complex routing
  protocol interactions with controlled redirection.

Working Group Summary
  This document is an independent document, not reviewed
  by any IETF Working group.

Document Quality
  There are no current implementations of this protocol.
  The document shepherd and sponsoring AD have both
  provided significant review and comments which have
  been incorporated by the author.

Personnel
  The document shepherd for this document is Joel M. Halpern.
  The  sponsoring AD for this document is Stewart Bryant
2012-03-07
10 Stewart Bryant Last call was requested
2012-03-07
10 Stewart Bryant Ballot approval text was generated
2012-03-07
10 Stewart Bryant Ballot writeup was generated
2012-03-07
10 Stewart Bryant State changed to Last Call Requested from Publication Requested::AD Followup
2012-03-07
10 Stewart Bryant Last call announcement was changed
2012-03-07
10 Stewart Bryant Last call announcement was generated
2012-03-07
10 Fred Templin New version available: draft-templin-aero-10.txt
2012-02-28
09 Fred Templin New version available: draft-templin-aero-09.txt
2012-02-18
08 (System) New version available: draft-templin-aero-08.txt
2012-01-25
08 (System) Sub state has been changed to AD Follow up from New Id Needed
2012-01-25
07 (System) New version available: draft-templin-aero-07.txt
2012-01-17
08 Stewart Bryant State changed to Publication Requested::Revised ID Needed from Publication Requested.
Feedback provided to author and expected shepherd
2011-12-19
06 (System) New version available: draft-templin-aero-06.txt
2011-12-08
08 Cindy Morgan Setting stream while adding document to the tracker
2011-12-08
08 Cindy Morgan Stream changed to IETF from
2011-12-08
08 Cindy Morgan Draft added in state Publication Requested
2011-12-05
05 (System) New version available: draft-templin-aero-05.txt
2011-10-19
04 (System) New version available: draft-templin-aero-04.txt
2011-10-18
03 (System) New version available: draft-templin-aero-03.txt
2011-09-19
02 (System) New version available: draft-templin-aero-02.txt
2011-06-23
01 (System) New version available: draft-templin-aero-01.txt
2011-03-29
00 (System) New version available: draft-templin-aero-00.txt