Service Requirements for Layer 3 Provider Provisioned Virtual Private Networks (PPVPNs)
RFC 4031
Revision differences
Document history
Date | Rev. | By | Action |
---|---|---|---|
2015-10-14
|
02 | (System) | Notify list changed from , , , dave.mcdysan@mci.com, marco.carugi@nortelnetworks.com to , , |
2012-08-22
|
02 | (System) | post-migration administrative database adjustment to the No Objection position for Steven Bellovin |
2005-04-26
|
02 | Amy Vezza | State Changes to RFC Published from RFC Ed Queue by Amy Vezza |
2005-04-26
|
02 | Amy Vezza | [Note]: 'RFC 4031' added by Amy Vezza |
2005-04-15
|
02 | (System) | RFC published |
2004-08-25
|
02 | Amy Vezza | State Changes to RFC Ed Queue from Approved-announcement sent by Amy Vezza |
2004-08-24
|
02 | Amy Vezza | IESG state changed to Approved-announcement sent |
2004-08-24
|
02 | Amy Vezza | IESG has approved the document |
2004-08-24
|
02 | Amy Vezza | Closed "Approve" ballot |
2004-08-24
|
02 | Thomas Narten | State Changes to Approved-announcement to be sent from IESG Evaluation::AD Followup by Thomas Narten |
2004-08-24
|
02 | Thomas Narten | Note field has been cleared by Thomas Narten |
2004-07-23
|
02 | Steven Bellovin | [Ballot Position Update] Position for Steve Bellovin has been changed to No Objection from Discuss by Steve Bellovin |
2004-07-20
|
02 | (System) | Sub state has been changed to AD Follow up from New Id Needed |
2004-07-20
|
02 | (System) | New version available: draft-ietf-l3vpn-requirements-02.txt |
2004-07-09
|
02 | (System) | Removed from agenda for telechat - 2004-07-08 |
2004-07-08
|
02 | Amy Vezza | State Changes to IESG Evaluation::Revised ID Needed from IESG Evaluation by Amy Vezza |
2004-07-08
|
02 | Steven Bellovin | [Ballot discuss] Note: I only reviewed this document to see if my earlier issues were addressed. A number still remain; in most cases, the wording … [Ballot discuss] Note: I only reviewed this document to see if my earlier issues were addressed. A number still remain; in most cases, the wording is effectively unchanged from the previous version. 3.7: Keys MUST NOT be readable by management systems. 5.1: The requirements for who must approve requests by a new party to join an extranet are a business decision; this document can't specify them. For example, a large company may set up an extranet for its suppliers, some of whom may be mutually competitive. It's the decision of the large company whom it wishes to qualify as a supplier, and hence whom to add to the extranet; the other suppliers don't get a voice. They are, of course, free to add their own protections against traffic coming in via that VPN, or to decline to join it because it offends their own security policy -- but it's a perfectly valid business practice for the large company to engage in, and this document can't ban it. 5.3: The document lists NAT as a MUST Is this really the position of the IESG? 6.10.3 mandates extremely stringent QoS functions. I don't think those are within the state of the art, especially inter-provider. |
2004-07-08
|
02 | Alex Zinin | [Ballot Position Update] New position, No Objection, has been recorded for Alex Zinin by Alex Zinin |
2004-07-08
|
02 | Scott Hollenbeck | [Ballot Position Update] Position for Scott Hollenbeck has been changed to No Objection from Undefined by Scott Hollenbeck |
2004-07-06
|
02 | Steven Bellovin | [Ballot comment] nit: non-ascii characters |
2004-07-06
|
02 | Steven Bellovin | [Ballot discuss] Note: I only reviewed this document to see if my earlier issues were addressed. A number still remain; in most cases, the wording … [Ballot discuss] Note: I only reviewed this document to see if my earlier issues were addressed. A number still remain; in most cases, the wording is effectively unchanged from the previous version. 3.7: Keys MUST NOT be readable by management systems. 4.4: The document lists NAT as a SHOULD. Is this really the position of the IESG? 5.1: The requirements for who must approve requests by a new party to join an extranet are a business decision; this document can't specify them. For example, a large company may set up an extranet for its suppliers, some of whom may be mutually competitive. It's the decision of the large company whom it wishes to qualify as a supplier, and hence whom to add to the extranet; the other suppliers don't get a voice. They are, of course, free to add their own protections against traffic coming in via that VPN, or to decline to join it because it offends their own security policy -- but it's a perfectly valid business practice for the large company to engage in, and this document can't ban it. 6.10.3 mandates extremely stringent QoS functions. I don't think those are within the state of the art, especially inter-provider. |
2004-07-06
|
02 | Steven Bellovin | [Ballot Position Update] New position, Discuss, has been recorded for Steve Bellovin by Steve Bellovin |
2004-07-01
|
02 | Scott Hollenbeck | [Ballot comment] I see some mangled text (?vider Provisioned VPN?PVPN, for example) in sections 3.1, 4.3.1, 10.1, 10.2, and 11. A search for "?" should … [Ballot comment] I see some mangled text (?vider Provisioned VPN?PVPN, for example) in sections 3.1, 4.3.1, 10.1, 10.2, and 11. A search for "?" should turn up all of the problems. |
2004-07-01
|
02 | Scott Hollenbeck | [Ballot Position Update] New position, Undefined, has been recorded for Scott Hollenbeck by Scott Hollenbeck |
2004-07-01
|
02 | Thomas Narten | State Changes to IESG Evaluation from IESG Evaluation::AD Followup by Thomas Narten |
2004-07-01
|
02 | Thomas Narten | Placed on agenda for telechat - 2004-07-08 by Thomas Narten |
2004-07-01
|
02 | Thomas Narten | [Note]: '2004-07-01: Note: this is a returning document; the IESG reviewed it back in 2002 and again in 2003 under the ID name draft-ietf-ppvpn-requirements-06.txt. Please … [Note]: '2004-07-01: Note: this is a returning document; the IESG reviewed it back in 2002 and again in 2003 under the ID name draft-ietf-ppvpn-requirements-06.txt. Please consult your archives for previous review commments (if any). My notes say Steve, Russ, Bert had issues with previous versions (which should now be addressed). ' added by Thomas Narten |
2004-07-01
|
02 | Thomas Narten | [Ballot Position Update] New position, Yes, has been recorded for Thomas Narten |
2004-07-01
|
02 | Thomas Narten | Ballot has been issued by Thomas Narten |
2004-07-01
|
02 | Thomas Narten | Created "Approve" ballot |
2004-07-01
|
02 | (System) | Ballot writeup text was added |
2004-07-01
|
02 | (System) | Last call text was added |
2004-07-01
|
02 | (System) | Ballot approval text was added |
2004-06-18
|
02 | (System) | Sub state has been changed to AD Follow up from New Id Needed |
2004-06-18
|
01 | (System) | New version available: draft-ietf-l3vpn-requirements-01.txt |
2004-05-14
|
02 | Thomas Narten | State Change Notice email list have been change to , , , dave.mcdysan@mci.com, marco.carugi@nortelnetworks.com from , , |
2004-05-14
|
02 | Thomas Narten | [Note]: '2004-05-06: Chair says: I just spoke with Dave McDysan about this. He is waiting on comments from Marco Carugi and should have a new … [Note]: '2004-05-06: Chair says: I just spoke with Dave McDysan about this. He is waiting on comments from Marco Carugi and should have a new version ready in two weeks. ' added by Thomas Narten |
2004-01-26
|
02 | Thomas Narten | Shepherding AD has been changed to Thomas Narten from Alex Zinin |
2003-07-23
|
00 | (System) | New version available: draft-ietf-l3vpn-requirements-00.txt |
2003-05-23
|
02 | Alex Zinin | had a conf call with IESG members and Loa to see if generic concerns from the IESG members could be formulated more specifically. Here's the … had a conf call with IESG members and Loa to see if generic concerns from the IESG members could be formulated more specifically. Here's the summary: 1. Where needed, spell out that some VPN technologies work fine across the Internet, and some are targeted for the set of cooperating SPs case. 2. Split generic VPN requirements and those specific to particular technologies and deployment scenarios 3. NATs and FWs are required only in specific cases, do not imply they are always requires 4. Avoid encouraging modification of IPSec STDs Loa and Alex will read the document again and will come back to the authors with specific recommendations on how to fix the document. |
2003-05-23
|
02 | Alex Zinin | State Changes to IESG Evaluation :: Revised ID Needed from IESG Evaluation by Zinin, Alex |
2003-05-23
|
02 | Alex Zinin | got comments and concerns from IESG. Comments below: > Forgive the Meta question but, what is the RFC that this > becomes going to be … got comments and concerns from IESG. Comments below: > Forgive the Meta question but, what is the RFC that this > becomes going to be used for? > ...these requirements > seem to have been written with the explicit caveat that they do not > imply building of a new protocol or protocol mechanisms. See: > > The specification of any technical means to provide PPVPN services > is outside the scope of this document. Other documents, such as the > framework document [PPVPN-FR] and several sets of documents, one set > per each individual technical approach providing PPVPN services, are > intended to cover this aspect. > > A lot of the text seems to have implications that don't really help > provide context for protocol development (see Section 5.6 and 5.7). > If we're okay with this as a context setting exercise, that's fine. If > that's not the point, more back story would help. > > Notes: > > There are several sets of "Editor's Notes" that need to be removed or > resolved. > > The definition of "site" didn't make sense. Recasting it in > terms of topology would help (even if this is the overlay topology > of the VPN). This is especially important because the definition of > VPN implies that a site must be a member of a VPN (and may be > a member of many). This is not a typical presumption in my > experience. If the topology language won't work, a strong marker > that the text's use of "site" is not the typical use would help. > > Section 4.4 seems too vague to be useful, even as a service > description "A range of security feature should be supported..." > doesn't say anything. Section 4.4.2 has a related problem, because > it doesn't specify a timescale. As written, a call to the NOC to > ask for a drop-shipped firewall qualifies. Explicitly indicating > that type of timescale is or is not okay would help. > This is a requirements document -- shouldn't it use SHOULD and MUST, > instead of should and must? > > 3.7: Encryption keys need great care in handling, and should not be > readable by management systems. > > 4.5: Why must VPNs imply NAT? A VPN is, by definition, private; > address space usage is thus among consenting parties. If there are > non-uniqe address clouds among them, some form of NAT may be needed, > but why is that part of the VPN definition? (Same for 5.3) > > 5.1: That's out of scope -- it's business decision by the parties > involved. > > 5.9: I don't understnd the text "Security services shall apply to... > or, a subset of the VPN traffic between sites...". Is that referring > to customer use of IPsec, with add-on security by the provider? Also, > what is the "AH or ESP identifier"? The IP protocol number for them? > > 6.9.1: Extending IPsec? Not at this time; that WG needs to finish. > > 6.9.3: address-hiding? Also, why is a firewall a necessary part of a > PPVPN? > > 6.10.3: The mind boggles. I didn't think we knew how to do some of > that intra-provider, let alone inter-provider for multiple PPVPNs. > 33 lines contain non-ASCII characters. > > Section 1 (Introduction) says: > > This document describes requirements for two types of network-based > L3 PPVPNs: aggregated routing VPNs [RFC2547bis] and virtual routers > [PPVPN-VR] and one type of CE-based PPVPN [IPsec-PPVPN]. > > Please reword. It is not clear how to parse this sentence into two types. > > The right hand side of Figure 3.2 is not quite right. >> 2003-03-06 - bert comments >> >> RFC1777 is historic and reference shoudl be updated >> >> PROPOSED CHANGE: Replace reference to RFC 1777 with RFC 3377. >> > I still see RFC1777 in the text (in fact as a citation). > What they did is that they removed it from the References section, > so now [RFC1777] citation is a dangling pointer. > > >> But should we really be "pushing" PIB for management? >> i.e. change "(MIBs or PIBs)" to "(e.g. MIB modules)" >> >> PROPOSED CHANGE: In section 7.6, replace "management or >> policy information >> bases (MIBs or PIBS)" with "management information base (MIB) modules" >> > OK with me, but may offend "policy" people. Policy info can also > be managed via MIB. And so I had left that piece of text in and > changed "MIBs or PIBs" into "e.g. MIB modules" so as to not offend > anyone. But as I said, OK with me. |
2003-05-08
|
02 | Alex Zinin | State Changes to IESG Evaluation from IESG Evaluation :: Revised ID Needed by Zinin, Alex |
2003-05-08
|
02 | Alex Zinin | -06 version ready, should address the IESG comments. putting on the agenda and checking with other IESG'ers. |
2003-03-22
|
02 | Alex Zinin | taking over from Scott |
2003-03-22
|
02 | Alex Zinin | Shepherding AD has been changed to Zinin, Alex from Bradner, Scott |
2003-03-06
|
02 | Scott Bradner | 2003-03-06 - bellovin comments 3.3 It might be worth clarifying that extranets often have port number restrictions, as well as host restrictions. 4.5 strongly … 2003-03-06 - bellovin comments 3.3 It might be worth clarifying that extranets often have port number restrictions, as well as host restrictions. 4.5 strongly suggests NAT. Do we really want to encourage that sort of thing? It even speaks of non-IP NAT, which is certainly not our business. 5.9 There is text about how customer security measures must not hide QoS information from the SP. That's very wrong. At least, if it's wrong if they mean "you must show us port numbers". But more fundamentally, it says "a security solution deployed by a customer must not hide information...". I don't think this document should be specifying that sort of requirements for customer behavior. 6.9.1 Replay protection has nothing to do with man-in-the-middle attacks. DES is deprecated and shouldn't be suggested here. AES should be listed. |
2003-03-06
|
02 | Scott Bradner | 2003-03-06 - bert comments RFC1777 is historic and reference shoudl be updated But should we really be "pushing" PIB for management? i.e. change "(MIBs or … 2003-03-06 - bert comments RFC1777 is historic and reference shoudl be updated But should we really be "pushing" PIB for management? i.e. change "(MIBs or PIBs)" to "(e.g. MIB modules)" |
2003-03-06
|
02 | Scott Bradner | 2003-03-06 - allison comments 4.6.1 For TCP traffic, L3 PPVPN devices should support Random Early Detection (RED) to provide graceful degradation in the … 2003-03-06 - allison comments 4.6.1 For TCP traffic, L3 PPVPN devices should support Random Early Detection (RED) to provide graceful degradation in the event of network congestion. It would be very inappropriate for RED to work on TCP only! This must mean Internet traffic. 5.5.2 The document says that it goes with ITU Y.1311.1 in supporting endpoint markings of DSCP to be preserved and not changed through the SP network. This is for genuine discussion: how do we reconcile this with the diffserv model? We are raising two different models in under the big IETF tent? It seems potentially damaging to diffserv. 6.10.4 Security Considerations If a tunnel traverses multiple SP networks and it passes through an unsecured SP, POP, NAP, or IX, then security mechanisms must be employed. This refers to the security requirements for QoS brokering inter-AS, I believe. It would be nice if the draft did not present the reader with this empty statement but had some substantial suggestion about how to provide an approach to securing the process, for instance by referencing another part of the document. |
2003-03-06
|
02 | Scott Bradner | State Changes to IESG Evaluation :: Revised ID Needed from IESG Evaluation by Bradner, Scott |
2003-02-24
|
02 | Scott Bradner | 2003-03-20 - alex is ok with this version |
2003-02-24
|
02 | Scott Bradner | State Changes to IESG Evaluation from IESG Evaluation :: Revised ID Needed by Bradner, Scott |
2003-02-17
|
02 | Scott Bradner | State Changes to IESG Evaluation :: Revised ID Needed from AD is watching by Bradner, Scott |
2002-07-30
|
02 | Scott Bradner | 2002-07-30 - note from Marco - 2 months work |
2002-07-30
|
02 | Scott Bradner | responsible has been changed to Working Group from IESG as a whole |
2002-07-30
|
02 | Scott Bradner | State Changes to In WG … State Changes to In WG from New Version Needed (WG/Author) by sob |
2002-07-29
|
02 | Scott Bradner | 2002-07-29 - IESG comments sent to WG chair |
2002-07-29
|
02 | Scott Bradner | A new comment added by sob |
2002-07-29
|
02 | Scott Bradner | State Changes to New Version Needed (WG/Author) from Reading List … State Changes to New Version Needed (WG/Author) from Reading List by sob |
2002-06-21
|
02 | Scott Bradner | responsible has been changed to IESG as a whole from Working Group |
2002-06-21
|
02 | Scott Bradner | 2002-06-20 - request to publish from Marco |
2002-06-21
|
02 | Scott Bradner | Intended Status has been changed to Informational from None |
2002-06-21
|
02 | Scott Bradner | State Changes to Reading List from In … State Changes to Reading List from In WG by sob |
2002-04-27
|
02 | Scott Bradner | Draft Added by Scott Bradner |