Path Computation Element (PCE) Communication Protocol (PCEP)
RFC 5440
Revision differences
Document history
Date | Rev. | By | Action |
---|---|---|---|
2020-01-21
|
19 | (System) | Received changes through RFC Editor sync (added Verified Errata tag) |
2017-05-16
|
19 | (System) | Changed document authors from "Arthi Ayyangar, Adrian Farrel, Eiji Oki, Alia Atlas, Andrew Dolganow, Yuichi Ikejiri, Kenji Kumaki, JP Vasseur, Jean-Louis Le Roux" to "JP … Changed document authors from "Arthi Ayyangar, Adrian Farrel, Eiji Oki, Alia Atlas, Andrew Dolganow, Yuichi Ikejiri, Kenji Kumaki, JP Vasseur, Jean-Louis Le Roux" to "JP Vasseur, Jean-Louis Le Roux" |
2016-11-30
|
19 | (System) | Closed request for Last Call review by SECDIR with state 'Unknown' |
2015-10-14
|
19 | (System) | Notify list changed from pce-chairs@ietf.org, draft-ietf-pce-pcep@ietf.org to (None) |
2012-08-22
|
19 | (System) | post-migration administrative database adjustment to the No Objection position for Chris Newman |
2012-08-22
|
19 | (System) | post-migration administrative database adjustment to the No Objection position for Pasi Eronen |
2012-08-22
|
19 | (System) | post-migration administrative database adjustment to the No Objection position for Tim Polk |
2012-08-22
|
19 | (System) | post-migration administrative database adjustment to the No Objection position for Magnus Westerlund |
2012-08-22
|
19 | (System) | post-migration administrative database adjustment to the No Objection position for Lars Eggert |
2012-08-22
|
19 | (System) | post-migration administrative database adjustment to the No Objection position for Russ Housley |
2009-03-10
|
19 | Amy Vezza | State Changes to RFC Published from RFC Ed Queue by Amy Vezza |
2009-03-10
|
19 | Amy Vezza | [Note]: 'RFC 5440' added by Amy Vezza |
2009-03-06
|
19 | (System) | RFC published |
2009-01-05
|
19 | (System) | IANA Action state changed to RFC-Ed-Ack from Waiting on RFC Editor |
2009-01-05
|
19 | (System) | IANA Action state changed to Waiting on RFC Editor from In Progress |
2009-01-05
|
19 | (System) | IANA Action state changed to In Progress from Waiting on Authors |
2008-12-24
|
19 | (System) | IANA Action state changed to Waiting on Authors from In Progress |
2008-12-23
|
19 | (System) | IANA Action state changed to In Progress from Waiting on Authors |
2008-12-23
|
19 | (System) | IANA Action state changed to Waiting on Authors from In Progress |
2008-12-22
|
19 | (System) | IANA Action state changed to In Progress from Waiting on Authors |
2008-12-19
|
19 | (System) | IANA Action state changed to Waiting on Authors from In Progress |
2008-12-01
|
19 | (System) | IANA Action state changed to In Progress |
2008-11-24
|
19 | Cindy Morgan | State Changes to RFC Ed Queue from Approved-announcement sent by Cindy Morgan |
2008-11-24
|
19 | Amy Vezza | IESG state changed to Approved-announcement sent |
2008-11-24
|
19 | Amy Vezza | IESG has approved the document |
2008-11-24
|
19 | Amy Vezza | Closed "Approve" ballot |
2008-11-24
|
19 | Ross Callon | State Changes to Approved-announcement to be sent from IESG Evaluation::AD Followup by Ross Callon |
2008-11-21
|
19 | Pasi Eronen | [Ballot Position Update] Position for Pasi Eronen has been changed to No Objection from Discuss by Pasi Eronen |
2008-11-21
|
19 | Pasi Eronen | [Ballot comment] Updated for version -19: RFC 2385 should be listed as a normative reference, not informative. |
2008-11-20
|
19 | Lars Eggert | [Ballot Position Update] Position for Lars Eggert has been changed to No Objection from Discuss by Lars Eggert |
2008-11-19
|
19 | (System) | Sub state has been changed to AD Follow up from New Id Needed |
2008-11-19
|
19 | (System) | New version available: draft-ietf-pce-pcep-19.txt |
2008-11-06
|
19 | Ross Callon | State Changes to IESG Evaluation::Revised ID Needed from IESG Evaluation::AD Followup by Ross Callon |
2008-11-02
|
18 | (System) | New version available: draft-ietf-pce-pcep-18.txt |
2008-11-02
|
17 | (System) | New version available: draft-ietf-pce-pcep-17.txt |
2008-10-30
|
19 | Pasi Eronen | [Ballot discuss] (updated for version -16) "MUST implement either TCP-MD5 or TCP-AO" seems to require a normative reference to TCP-AO. That works for me, but … [Ballot discuss] (updated for version -16) "MUST implement either TCP-MD5 or TCP-AO" seems to require a normative reference to TCP-AO. That works for me, but so would some other approaches. The text "The PCE SHOULD NOT allow parallel TCP connections from the same PCC on the PCEP registered port." (added in -16) probably needs a sentence or two qualifying and explaining this (situations involving e.g. PCC software restarts can require two parallel connections, since the PCE won't immediately notice the old connection is dead). The document is inconsistent numbering of bit fields (some places number bits starting from 0, others from 1, and some of those are in conflict). Version -16 added one sentence about NO-PATH-VECTOR TLV (choosing to start numbering from 1, unlike most parts of the document), but that wasn't the only thing. E.g. Section 7.4.1 numbers the flags in RP object starting from 0, but the IANA considerations for them (Section 9.4) starts from 1. Since the document has dozens of ASCII bit diagrams, which always start numbering from 0, I'd suggest starting from 0 everywhere... (using two numbering schemes in one document seems very likely to cause problems). |
2008-10-30
|
19 | Pasi Eronen | [Ballot comment] |
2008-10-30
|
19 | Pasi Eronen | [Ballot discuss] (updated for version -16) "MUST implement either TCP-MD5 or TCP-AO" seems to require a normative reference to TCP-AO. That works for me, but … [Ballot discuss] (updated for version -16) "MUST implement either TCP-MD5 or TCP-AO" seems to require a normative reference to TCP-AO. That works for me, but so would some other approaches. The document is inconsistent numbering of bit fields (some places number bits starting from 0, others from 1, and some of those are in conflict). Version -16 added one sentence about NO-PATH-VECTOR TLV (choosing to start numbering from 1, unlike most parts of the document), but that wasn't the only thing. E.g. Section 7.4.1 numbers the flags in RP object starting from 0, but the IANA considerations for them (Section 9.4) starts from 1. Since the document has dozens of ASCII bit diagrams, which always start numbering from 0, I'd suggest starting from 0 everywhere... (using two numbering schemes in one document seems very likely to cause problems). |
2008-10-15
|
19 | (System) | Sub state has been changed to AD Follow up from New Id Needed |
2008-10-15
|
16 | (System) | New version available: draft-ietf-pce-pcep-16.txt |
2008-10-14
|
19 | Ross Callon | State Changes to IESG Evaluation::Revised ID Needed from IESG Evaluation::AD Followup by Ross Callon |
2008-09-06
|
15 | (System) | New version available: draft-ietf-pce-pcep-15.txt |
2008-09-04
|
19 | Magnus Westerlund | [Ballot comment] Version 14 resolved my discusses almost completely. However the overload discuss I had needs commenting: It is quite unclear if the overload protection … [Ballot comment] Version 14 resolved my discusses almost completely. However the overload discuss I had needs commenting: It is quite unclear if the overload protection provided does actually work. It has similarities with the one for SIP that has been found to not work. The only way of really learning this is to do simulation for which I am not going to hold up the document. There was agreement to document the BNF used in its own document. |
2008-09-04
|
19 | Magnus Westerlund | [Ballot Position Update] Position for Magnus Westerlund has been changed to No Objection from Discuss by Magnus Westerlund |
2008-09-03
|
19 | Magnus Westerlund | [Ballot comment] Version 14 resolved my discusses almost completely. However the overload discuss I had needs commenting: It is quite unclear if the overload protection … [Ballot comment] Version 14 resolved my discusses almost completely. However the overload discuss I had needs commenting: It is quite unclear if the overload protection provided does actually work. It has similarities with the one for SIP that has been found to not work. The only way of really learning this is to do simulation for which I am not going to hold up the document. |
2008-09-03
|
19 | Magnus Westerlund | [Ballot discuss] Taking over Chris discuss about formal language without reference. |
2008-09-01
|
14 | (System) | New version available: draft-ietf-pce-pcep-14.txt |
2008-08-25
|
19 | Russ Housley | [Ballot Position Update] Position for Russ Housley has been changed to No Objection from Discuss by Russ Housley |
2008-08-21
|
19 | Pasi Eronen | [Ballot comment] The protocol has couple of fields that contain numbered bits (NO-PATH, NO-PATH-VECTOR, RP, METRIC), but the numbering of bits is inconsistent across the … [Ballot comment] The protocol has couple of fields that contain numbered bits (NO-PATH, NO-PATH-VECTOR, RP, METRIC), but the numbering of bits is inconsistent across the document (and doesn't follow the numbering convention used in packet diagrams) |
2008-08-19
|
19 | Chris Newman | [Ballot comment] Referencing other documents that use BNF without a reference to the original definition of BNF is probably a worse solution than no reference. … [Ballot comment] Referencing other documents that use BNF without a reference to the original definition of BNF is probably a worse solution than no reference. I think it would be better to reference a real definition of the language, such as one of the older references here: http://en.wikipedia.org/wiki/Backus%E2%80%93Naur_Form However, the change makes it clear the authors want to use a formal language without definition so it's not worth my time to argue the point further. My previous DISCUSS: This document uses a formal language (BNF) without providing a reference to a document that defines that formal language. Please provide a reference. |
2008-08-19
|
19 | Chris Newman | [Ballot Position Update] Position for Chris Newman has been changed to No Objection from Discuss by Chris Newman |
2008-08-19
|
19 | (System) | Sub state has been changed to AD Follow up from New Id Needed |
2008-08-19
|
13 | (System) | New version available: draft-ietf-pce-pcep-13.txt |
2008-06-30
|
19 | Tim Polk | [Ballot Position Update] Position for Tim Polk has been changed to No Objection from Discuss by Tim Polk |
2008-05-23
|
19 | Magnus Westerlund | [Ballot discuss] 1. Section 6.2: Any message received prior to an Open message MUST trigger a protocol error condition and the PCEP session … [Ballot discuss] 1. Section 6.2: Any message received prior to an Open message MUST trigger a protocol error condition and the PCEP session MUST be terminated. How? To my understanding no Session context has been created due to failure. So it is meant that one should indicate that error and then close the TCP connection? 2. I can't find any information about how messages must be processed in relation to each other. There is text on various places talking about "pending requests" which seem to me to imply that requests can be handled in parallel. However, that doesn't seem to be explicitly stated. Also the inter message type relations in that case should be clarified. Both within a message type and between the different type of messages. 3. Section 7.3: SID (PCEP session-ID - 8 bits): unsigned PCEP session number that identifies the current session. The SID MUST be incremented each time a new PCEP session is established and is used for logging and troubleshooting purposes. There is one SID number in each direction. How do it needs to be incremented? With current formulation any incremention, 1, 10 or 100 would be okay. Secondly, what happens at wraparound? Based on Lars discuss further clarification may be need if reconnecting or multiple simultaneous sessions are allowed. 4. Section 7.4.1: Once more it is unclear if the request-id-number must be incremented with one or larger values are allowed. Also if any specific start value is assumed. Please do also clarify if this value has long term validity and should be maintained over multiple PCEP sessions. Wraparound may also be needed to be specified if the PCEP session becomes very long lived, or the space are valid over subsequent sessions 5. Section 7.7: Bandwidth: 32 bits. The requested bandwidth is encoded in 32 bits in IEEE floating point format, expressed in bytes per second. Refer to Section 3.1.2 of [RFC3471] for a table of commonly used values. Over what time constraints are this value intended to be valid? Due to that transmission of packets can be bursty there is need for more information. Shouldn't this be a token bucket to better model the data moving capability of the request? 6. Section 7.7: Reference for 32-bit "IEEE floating point format"? Please add it also on the other places where you use this format in definitions. 7. section 7.11: Please be explicit about which of the documents you use the include-any, exclude-any, and include-all. Having browsed through RFC 4090 and 3209 I can't find a definition of what "attribute filters" are. So please include a reference to the definition of these also. 8. The SyncTimer: How can this timer value be local only? The request sender MUST know how much time it has to supply all the request before it failing due to the timer. So if a PCE uses a non default then a failure may occur and the PCC doesn't know what value is the one used. This value should either be explicit signalled at session opening or at least be included in the error message. 9. Section 7.14, Overload PCE indication. Optionally, a TLV named OVERLOADED-DURATION may be included in the NOTIFICATION object that specifies the period of time during whichno further request should be sent to the PCE. Once this period of time has elapsed, the PCE should no longer be considered in congested state. This design seems to suffer from the same issue as SIP has with its overload protection. Especially if I understand it that a PCC to PCE request can result in the PCE sending its own request further to the next PCE that may be overloaded. In that case it seems that this mechanism only can stop the PCC from sending any request, rather than the ones that affect a particular upstream PCE. Secondary, for real safety against PCC->PCE congestion a mandatory exponential back-off for requests should be specified. That way a PCE that simply stops responding to request will shed load. Seems that with TCP this would need to be based on the response time on any request and some limitation on how many outstanding request the requestor may have. I am also worried about the lack of mandatory to implement responses as this likely will make it hard to determine what will happen in real-life with multiple implementations making different choices. |
2008-05-23
|
19 | (System) | Removed from agenda for telechat - 2008-05-22 |
2008-05-22
|
19 | Cindy Morgan | State Changes to IESG Evaluation::Revised ID Needed from IESG Evaluation by Cindy Morgan |
2008-05-22
|
19 | Lisa Dusseault | [Ballot Position Update] New position, No Objection, has been recorded by Lisa Dusseault |
2008-05-22
|
19 | Jari Arkko | [Ballot Position Update] New position, No Objection, has been recorded by Jari Arkko |
2008-05-22
|
19 | Pasi Eronen | [Ballot comment] The protocol has couple of fields that contain numbered bits (NO-PATH, NO-PATH-VECTOR, RP, METRIC), but the numbering of bits is inconsistent across the … [Ballot comment] The protocol has couple of fields that contain numbered bits (NO-PATH, NO-PATH-VECTOR, RP, METRIC), but the numbering of bits is inconsistent across the document (and doesn't follow the numbering convention used in packet diagrams) The BNF for request-id-list and notification-list is missing one []. |
2008-05-22
|
19 | Pasi Eronen | [Ballot discuss] Looking back at archives, I get the impression that when RFC 4657 (PCEP requirements) and RFC 5088/5089 (PCE discovery) were processed, it … [Ballot discuss] Looking back at archives, I get the impression that when RFC 4657 (PCEP requirements) and RFC 5088/5089 (PCE discovery) were processed, it was concluded that BCP107 applies. This is not reflected in the document. There is no mandatory-to-implement security mechanism (which typically is required by BCP61). RFC 4278 says "Despite the widespread deployment of [RFC2385] in BGP deployments, the IESG has thus concluded that it is not appropriate for use in other contexts." Given this, using TCP-MD5 for a *new* protocol would seem to require a particularly strong justification. |
2008-05-22
|
19 | Pasi Eronen | [Ballot Position Update] New position, Discuss, has been recorded by Pasi Eronen |
2008-05-22
|
19 | Magnus Westerlund | [Ballot discuss] 1. Section 6.2: Any message received prior to an Open message MUST trigger a protocol error condition and the PCEP session … [Ballot discuss] 1. Section 6.2: Any message received prior to an Open message MUST trigger a protocol error condition and the PCEP session MUST be terminated. How? To my understanding no Session context has been created due to failure. So it is meant that one should indicate that error and then close the TCP connection? 2. I can't find any information about how messages must be processed in relation to each other. There is text on various places talking about "pending requests" which seem to me to imply that requests can be handled in parallel. However, that doesn't seem to be explicitly stated. Also the inter message type relations in that case should be clarified. Both within a message type and between the different type of messages. 3. Section 7.3: SID (PCEP session-ID - 8 bits): unsigned PCEP session number that identifies the current session. The SID MUST be incremented each time a new PCEP session is established and is used for logging and troubleshooting purposes. There is one SID number in each direction. How do it needs to be incremented? With current formulation any incremention, 1, 10 or 100 would be okay. Secondly, what happens at wraparound? Based on Lars discuss further clarification may be need if reconnecting or multiple simultaneous sessions are allowed. 4. Section 7.4.1: Once more it is unclear if the request-id-number must be incremented with one or larger values are allowed. Also if any specific start value is assumed. Please do also clarify if this value has long term validity and should be maintained over multiple PCEP sessions. Wraparound may also be needed to be specified if the PCEP session becomes very long lived, or the space are valid over subsequent sessions 5. Section 7.7: Bandwidth: 32 bits. The requested bandwidth is encoded in 32 bits in IEEE floating point format, expressed in bytes per second. Refer to Section 3.1.2 of [RFC3471] for a table of commonly used values. Over what time constraints are this value intended to be valid? Due to that transmission of packets can be bursty there is need for more information. Shouldn't this be a token bucket to better model the data moving capability of the request? 6. Section 7.7: Reference for 32-bit "IEEE floating point format"? Please add it also on the other places where you use this format in definitions. 7. section 7.11: Please be explicit about which of the documents you use the include-any, exclude-any, and include-all. Having browsed through RFC 4090 and 3209 I can't find a definition of what "attribute filters" are. So please include a reference to the definition of these also. 8. The SyncTimer: How can this timer value be local only? The request sender MUST know how much time it has to supply all the request before it failing due to the timer. So if a PCE uses a non default then a failure may occur and the PCC doesn't know what value is the one used. This value should either be explicit signalled at session opening or at least be included in the error message. 9. Section 7.14, Overload PCE indication. Optionally, a TLV named OVERLOADED-DURATION may be included in the NOTIFICATION object that specifies the period of time during whichno further request should be sent to the PCE. Once this period of time has elapsed, the PCE should no longer be considered in congested state. This design seems to suffer from the same issue as SIP has with its overload protection. Especially if I understand it that a PCC to PCE request can result in the PCE sending its own request further to the next PCE that may be overloaded. In that case it seems that this mechanism only can stop the PCC from sending any request, rather than the ones that affect a particular upstream PCE. Secondary, for real safety against PCC->PCE congestion a mandatory exponential back-off for requests should be specified. That way a PCE that simply stops responding to request will shed load. Seems that with TCP this would need to be based on the response time on any request and some limitation on how many outstanding request the requestor may have. I am also worried about the lack of mandatory to implement responses as this likely will make it hard to determine what will happen in real-life with multiple implementations making different choices. 10. Discuss Discuss: This is in fact a extension on Chris's Discuss regarding the normative definition of the formal language used in this document. What tools has been used, if any, to determine the validity of the BNF? Has the shepherd or AD ensured that that these checks where run on the current version? |
2008-05-22
|
19 | Magnus Westerlund | [Ballot discuss] 1. Section 6.2: Any message received prior to an Open message MUST trigger a protocol error condition and the PCEP session … [Ballot discuss] 1. Section 6.2: Any message received prior to an Open message MUST trigger a protocol error condition and the PCEP session MUST be terminated. How? By closing the TCP connection? 2. I can't find any information about how messages must be processed in relation to each other. There is text on various places talking about "pending requests" which seem to me to imply that requests can be handled in parallel. However, that doesn't seem to be explicitly stated. Also the inter message type relations in that case should be clarified. 3. Section 7.3: SID (PCEP session-ID - 8 bits): unsigned PCEP session number that identifies the current session. The SID MUST be incremented each time a new PCEP session is established and is used for logging and troubleshooting purposes. There is one SID number in each direction. How do it needs to be incremented? With current formulation any incremention, 1, 10 or 100 would be okay. Secondly, what happens at wraparound? Based on Lars discuss further clarification may be need if reconnecting or multiple simultaneous sessions are allowed. 4. Section 7.4.1: Once more it is unclear if the request-id-number must be incremented with one or larger values are allowed. Also if any specific start value is assumed. Please do also clarify if this value has long term validity and should be maintained over multiple PCEP sessions. Wraparound may also be needed to be specified if the PCEP session becomes very long lived, or the space are valid over subsequent sessions 5. Section 7.7: Bandwidth: 32 bits. The requested bandwidth is encoded in 32 bits in IEEE floating point format, expressed in bytes per second. Refer to Section 3.1.2 of [RFC3471] for a table of commonly used values. Over what time constraints are this value intended to be valid? Due to that transmission of packets can be bursty there is need for more information. Shouldn't this be a token bucket? 6. Section 7.7: Reference for 32-bit "IEEE floating point format"? Please add it also on the other places where you use this format in definitions. 7. section 7.11: Please be explicit about which of the documents you use the include-any, exclude-any, and include-all. Having browsed through RFC 4090 and 3209 I can't find a definition of what "attribute filters" are. So please include a reference to the definition of these also. 8. The SyncTimer: How can this timer value be local only? The request sender MUST know how much time it has to supply all the request before it failing due to the timer. So if a PCE uses a non default then a failure may occur and the PCC doesn't know what value is the one used. This value should either be explicit signalled at session opening or at least be included in the error message. 9. Section 7.14, Overload PCE indication. Optionally, a TLV named OVERLOADED-DURATION may be included in the NOTIFICATION object that specifies the period of time during whichno further request should be sent to the PCE. Once this period of time has elapsed, the PCE should no longer be considered in congested state. This design seems to suffer from the same issue as SIP has with its overload protection. Especially if I understand it that a request to a PCE can result in the PCE sending its own request further to the next PCE that may be overloaded. In that case it seems that this mechanism only can stop the PCC from sending any request, rather than the ones that affect a particular upstream PCE. Secondary, for real safety against PCC->PCE congestion a mandatory exponential back-off for requests should be specified. That way a PCE that simply stops responding to request will shed load. I am also worried about the lack of mandatory to implement responses as this likely will make it hard to determine what will happen in real-life with multiple implementations making different choices. I also wonder if it is the request handling or the actually processing to determine the requests that are the bottleneck. I guess the later. In that case maybe some intermediate response that you request is in the queue and we will come back within X time with an update. Combined with some function for queue length resulting in pushback for sending new request may allow for better working in the protocol. 10. Discuss Discuss: This is in fact a extension on Chris's Discuss regarding the normative definition of the formal language used in this document. What tools has been used, if any, to determine the validity of the BNF? Has the shepherd or AD ensured that that these checks where run on the current version? |
2008-05-22
|
19 | Tim Polk | [Ballot comment] Note: I support Lars discuss with respect to preference of draft-ietf-tcpm-tcp-auth-opt over TCP MD5. Section 7.5 It is unclear if "PCE chain broken" … [Ballot comment] Note: I support Lars discuss with respect to preference of draft-ietf-tcpm-tcp-auth-opt over TCP MD5. Section 7.5 It is unclear if "PCE chain broken" in a No Path object is really a meaningful "Nature of Issue". What action can/should a PCC take? Contact a different PCE? Editorial nit: 4.2.1 s/a pair a PCEP peers/a pair of PCEP peers/ |
2008-05-22
|
19 | Tim Polk | [Ballot discuss] This discuss has two parts: a relatively minor actionable discuss and a discuss discuss. Section 7.4.1 It is unclear if the R bit … [Ballot discuss] This discuss has two parts: a relatively minor actionable discuss and a discuss discuss. Section 7.4.1 It is unclear if the R bit should be set for 0-bandwidth TE LSPs. I suggest supplementing this section with text that describes what should be specified in the case of 0-bandwidth TE LSPs. Discuss discuss: Summary: Basically, I would like to understand the migration strategy for introduction of new features. Detail: I have specific concerns regarding processing the flag bits that concern extensibility. I assume that objects and TLVs may be updated without updating PCEP. For example, new flags might be defined for the RP object without changing the PCEP version number. Since there are no version numbers for the objects, a PCEP v1 compliant system could then encounter unrecognized flags quite unexpectedly. What are the processing rules for this situation? Should a PCE or PCC throw an error, or should it ignore the unrecognized flag? This is particularly worrisome since a both 1 and 0 can have important context - for example, the B bit means either bi-directional or uni-directional. I originally noted this as an error of omission in section 7.4.2. After further reading, I have come to the conclusion this is a problem with many of the objects and TLVs defined in this specification. |
2008-05-22
|
19 | Magnus Westerlund | [Ballot discuss] 1. Section 6.2: Any message received prior to an Open message MUST trigger a protocol error condition and the PCEP session … [Ballot discuss] 1. Section 6.2: Any message received prior to an Open message MUST trigger a protocol error condition and the PCEP session MUST be terminated. How? By closing the TCP connection? 2. I can't find any information about how messages must be processed in relation to each other. There is text on various places talking about "pending requests" which seem to me to imply that requests can be handled in parallel. However, that doesn't seem to be explicitly stated. Also the inter message type relations in that case should be clarified. 3. Section 7.3: SID (PCEP session-ID - 8 bits): unsigned PCEP session number that identifies the current session. The SID MUST be incremented each time a new PCEP session is established and is used for logging and troubleshooting purposes. There is one SID number in each direction. How do it needs to be incremented? With current formulation any incremention, 1, 10 or 100 would be okay. Secondly, what happens at wraparound? Based on Lars discuss further clarification may be need if reconnecting or multiple simultaneous sessions are allowed. 4. Section 7.4.1: Once more it is unclear if the request-id-number must be incremented with one or larger values are allowed. Also if any specific start value is assumed. Please do also clarify if this value has long term validity and should be maintained over multiple PCEP sessions. Wraparound may also be needed to be specified if the PCEP session becomes very long lived, or the space are valid over subsequent sessions 5. Section 7.7: Bandwidth: 32 bits. The requested bandwidth is encoded in 32 bits in IEEE floating point format, expressed in bytes per second. Refer to Section 3.1.2 of [RFC3471] for a table of commonly used values. Over what time constraints are this value intended to be valid? Due to that transmission of packets can be bursty there is need for more information. Shouldn't this be a token bucket? 6. Section 7.7: Reference for 32-bit "IEEE floating point format"? Please add it also on the other places where you use this format in definitions. Discuss Discuss: This is in fact a extension on Chris's Discuss regarding the normative definition of the formal language used in this document. What tools has been used, if any, to determine the validity of the BNF? Has the shepherd or AD ensured that that these checks where run on the current version? |
2008-05-22
|
19 | Magnus Westerlund | [Ballot Position Update] New position, Discuss, has been recorded by Magnus Westerlund |
2008-05-22
|
19 | Chris Newman | [Ballot discuss] This document uses a formal language (BNF) without providing a reference to a document that defines that formal language. Please provide a reference. |
2008-05-22
|
19 | Chris Newman | [Ballot Position Update] New position, Discuss, has been recorded by Chris Newman |
2008-05-21
|
19 | Tim Polk | [Ballot comment] Note: I support Lars discuss with respect to preference of draft-ietf-tcpm-tcp-auth-opt over TCP MD5. Section 7.4.1 It is unclear if the R bit … [Ballot comment] Note: I support Lars discuss with respect to preference of draft-ietf-tcpm-tcp-auth-opt over TCP MD5. Section 7.4.1 It is unclear if the R bit should be set for 0-bandwidth TE LSPs. I suggest supplementing this section with text that describes what should be specified in the case of 0-bandwidth TE LSPs. Section 7.5 It is unclear if "PCE chain broken" in a No Path object is really a meaningful "Nature of Issue". What action can/should a PCC take? Contact a different PCE? Editorial nits: 4.2.1 s/a pair a PCEP peers/a pair of PCEP peers/ |
2008-05-21
|
19 | Tim Polk | [Ballot comment] Section 7.4.1 It is unclear if the R bit should be set for 0-bandwidth TE LSPs. I suggest supplementing this section with text … [Ballot comment] Section 7.4.1 It is unclear if the R bit should be set for 0-bandwidth TE LSPs. I suggest supplementing this section with text that describes what should be specified in the case of 0-bandwidth TE LSPs. Section 7.5 It is unclear if "PCE chain broken" in a No Path object is really a meaningful "Nature of Issue". What action can/should a PCC take? Contact a different PCE? Editorial nits: 4.2.1 s/a pair a PCEP peers/a pair of PCEP peers/ |
2008-05-21
|
19 | Mark Townsley | [Ballot Position Update] New position, No Objection, has been recorded by Mark Townsley |
2008-05-21
|
19 | Tim Polk | [Ballot comment] Section 7.4.1 It is unclear if the R bit should be set for 0-bandwidth TE LSPs. Section x.x.x It is unclear if "PCE … [Ballot comment] Section 7.4.1 It is unclear if the R bit should be set for 0-bandwidth TE LSPs. Section x.x.x It is unclear if "PCE chain broken" is a meaningful answer for a PCC. What action can/should a PCC take? Editorial nits: 4.2.1 s/a pair a PCEP peers/a pair of PCEP peers/ |
2008-05-21
|
19 | Tim Polk | [Ballot comment] Section 7.4.1 It is unclear if the R bit should be set for 0-bandwidth TE LSPs. Editorial nits: 4.2.1 s/a pair a PCEP … [Ballot comment] Section 7.4.1 It is unclear if the R bit should be set for 0-bandwidth TE LSPs. Editorial nits: 4.2.1 s/a pair a PCEP peers/a pair of PCEP peers/ |
2008-05-21
|
19 | Tim Polk | [Ballot discuss] This discuss has two parts: a process discuss and a discuss discuss. Olafur Godmundson's comment on ietf discuss has not been answered >I … [Ballot discuss] This discuss has two parts: a process discuss and a discuss discuss. Olafur Godmundson's comment on ietf discuss has not been answered >I find it scary how many flags fields the document defines in message types >with no flags defined and NO GUIDANCE on the scope of these flags. >Are they per "object Class +object type" or per message type. > >Are these needed or just nice to have? >What is the harm to just define these fields as Reserved ? Discuss discuss: Summary: Basically, I would like to understand the migration strategy for introduction of new features. Detail: I have specific concerns regarding processing the flag bits that concern extensibility. I assume that objects and TLVs may be updated without updating PCEP. For example, new flags might be defined for the RP object without changing the PCEP version number. Since there are no version numbers for the objects, a PCEP v1 compliant system could then encounter unrecognized flags quite unexpectedly. What are the processing rules for this situation? Should a PCE or PCC throw an error, or should it ignore the unrecognized flag? This is particularly worrisome since a both 1 and 0 can have important context - for example, the B bit means either bi-directional or uni-directional. I opriginally noted this as an error of omission in section 7.4.2. After further reading, I have come to the conclusion this is a problem with many of the objects and TLVs defined in this specification. |
2008-05-21
|
19 | Tim Polk | [Ballot comment] Section 7.4.1 It is unclear if the R bit should be set for 0-bandwidth TE LSPs. |
2008-05-21
|
19 | Tim Polk | [Ballot discuss] This discuss has two parts: a process discuss and a discuss discuss. Olafur Godmundson's comment on ietf discuss has not been answered >I … [Ballot discuss] This discuss has two parts: a process discuss and a discuss discuss. Olafur Godmundson's comment on ietf discuss has not been answered >I find it scary how many flags fields the document defines in message types >with no flags defined and NO GUIDANCE on the scope of these flags. >Are they per "object Class +object type" or per message type. > >Are these needed or just nice to have? >What is the harm to just define these fields as Reserved ? I also have issues regarding processing the flag bits that concern extensibility. I assume that objects and TLVs may be updated without updating PCEP. For example, new flags might be defined for the RP object without changing the PCEP version number. Since there are no version numbers for the objects, a PCEP v1 compliant system could then encounter unrecognized flags quite unexpectedly. What are the processing rules for this situation? Should a PCE or PCC throw an error, or should it ignore the unrecognized flag? This is particularly worrisome since a both 1 and 0 can have important context - for example, the B bit means either bi-directional or uni-directional. Basically, I would like to understand the migration strategy for introduction of new features. |
2008-05-21
|
19 | Tim Polk | [Ballot Position Update] New position, Discuss, has been recorded by Tim Polk |
2008-05-21
|
19 | Russ Housley | [Ballot discuss] IANA has issues. IANA is waiting for the authors to confirm that they have identified the actions correctly. The author also need … [Ballot discuss] IANA has issues. IANA is waiting for the authors to confirm that they have identified the actions correctly. The author also need to clarify whether specific values are reserved or available for assignment. |
2008-05-21
|
19 | Russ Housley | [Ballot Position Update] New position, Discuss, has been recorded by Russ Housley |
2008-05-20
|
19 | Lars Eggert | [Ballot comment] Section 4.2.1., paragraph 4: > Successive retries are permitted but an implementation should make > use of an exponential back-off session establishment retry … [Ballot comment] Section 4.2.1., paragraph 4: > Successive retries are permitted but an implementation should make > use of an exponential back-off session establishment retry procedure. s/should make/SHOULD make/ Section 4.2.2., paragraph 4: > Once the PCC has selected a PCE, it sends the PCE a path computation > request to the PCE (PCReq message) that contains a variety of objects > that specify the set of constraints and attributes for the path to be > computed. Can a PCC send a second path computation request over the same TCP connection to a PCE when the answer to an earlier one is still outstanding? Can multiple TCP connections exist between the same PCC and PCE? Section 4.2.4., paragraph 1: > There are several circumstances in which a PCE may want to notify a > PCC of a specific event. For example, suppose that the PCE suddenly > gets overloaded, potentially leading to unacceptable response times. Can such notifications occur at any time, i.e., while another message is being sent? If so, how are they framed within the TCP byte stream? Section 6.2., paragraph 2: > characteristics. If both parties agree on such characteristics the > PCEP session is successfully established. TOTO TOTO? Section 7.3., paragraph 13: > A sends an Open message to B with Keepalive=10 seconds and > Deadtimer=30 seconds. This means that A sends Keepalive messages (or > ay other PCEP message) to B every 10 seconds and B can declare the > PCEP session with A down if no PCEP message has been received from A > within any 30 second period. I'd be nice if the example followed the recommended values/fomulas above and used Keepalive=30 and DeadTimer=4*Keepalive (or whatever the defaults will be after addressing my comments above.) Section 7.3., paragraph 14: > SID (PCEP session-ID - 8 bits): unsigned PCEP session number that > identifies the current session. The SID MUST be incremented each > time a new PCEP session is established and is used for logging and > troubleshooting purposes. There is one SID number in each direction. What's the start value? Is it incremented for each connection to any PCEP peer or only for connections to the same PCEP peer? Does it matter when SID rolls over? The document doesn't discuss what the SID is used for at all. Section 7.4.1., paragraph 14: > Request-ID-number (32 bits). The Request-ID-number value combined > with the source IP address of the PCC and the PCE address uniquely > identify the path computation request context. The Request-ID-number > MUST be incremented each time a new request is sent to the PCE. The > value 0x0000000 is considered as invalid. If no path computation > reply is received from the PCE, and the PCC wishes to resend its > request, the same Request-ID-number MUST be used. Conversely, > different Request-ID-number MUST be used for different requests sent > to a PCE. The same Request-ID-number MAY be used for path > computation requests sent to different PCEs. The path computation > reply is unambiguously identified by the IP source address of the > replying PCE. It's redundant to identify requests by source and destination IP address, given that those are constant for requests going over the same TCP connection. Likewise, replies are implicitly identified by the TCP connection they arrive over. Section 8.3., paragraph 1: > PCEP includes a keepalive mechanism to check the liveliness of a PCEP > peer and a notification procedure allowing a PCE to advertise its > congestion state to a PCC. s/congestion/overload/ for consistency, here and throughout the document Section 9.1., paragraph 1: > PCEP uses a well-known TCP port. IANA is requested to assign a port > number from the "System" sub-registry of the "Port Numbers" registry. Does "uses a well-known TCP port" mean that messages from the PCC to the PCE must come from that registered source port, or can they come from any port? (The former implies that only a single PCEP connection can exist between a PCC and a PCE. It also weakens security a bit, because an attacker doesn't need to guess the source port anymore.) Section 10.3.1., paragraph 2: > o A PCE should avoid promiscuous TCP listens for PCEP TCP connection > establishment. It should use only listens that are specific to > authorized PCCs. Authorized by what? TCP has no feature to restrict listens based on credentials. Section 10.3.1., paragraph 4: > o The use of access-list on the PCE so as to restrict access to > authorized PCCs. Is redundant with the first bullet (or I don't understand what it means). Appendix A., paragraph 46: > If the system receives an Open message from the PCEP peer before the > expiration of the OpenWait timer, the system first examines all of > its sessions that are in the OpenWait or KeepWait state. If another > session with the same PCEP peer already exists (same IP address), > then the system performs the following collision resolution > procedure: The goal of this procedure seems to be to guarantee that there is only a single active PCEP connection between two peers, but it's cumbersome. It'd be much easier to require a peer to not initiate a connection to a peer it already has one established with, and to require it to immediately close a new TCP connection coming from a peer it has an active PCEP connection with. This handles everything at the TCP layer without needing to involve the PCEP state machine. |
2008-05-20
|
19 | Lars Eggert | [Ballot discuss] Section 6.3., paragraph 0: > 6.3. Keepalive Message DISCUSS: I have a few suggestions on improving the keepalive mechanism. (1) Both … [Ballot discuss] Section 6.3., paragraph 0: > 6.3. Keepalive Message DISCUSS: I have a few suggestions on improving the keepalive mechanism. (1) Both the PCC and PCE are allowed to send keepalives according to their timers. This wastes bandwidth. The reception of a keepalive request from the other end should restart the keepalive timer on the receiving end - the reception is an indication that the peer is alive. This means that keepalives will usually only be sent from one end (the one with the shorter keepalive timer) and responded to by the other end. (2) As long as a keepalive has not been responded to, a PCEP speaker MUST NOT send another one. TCP is a reliable protocol and will deliver the outstanding keepalive when it can. It is not lost, and there is no need to resend it. All that sending more keepalives does when there is no response is fill up the socket send buffer. Section 7.3., paragraph 10: > Keepalive (8 bits): maximum period of time (in seconds) between two > consecutive PCEP messages sent by the sender of this message. The > minimum value for the Keepalive is 1 second. When set to 0, once the > session is established, no further Keepalive messages are sent to the > remote peer. A RECOMMENDED value for the keepalive frequency is 30 > seconds. DISCUSS: 1 second is extremely short. If there is a requirement that PCEP detect failures on such short timescales and should fail over in some way, TCP is the wrong underlying transport protocol. If that's the motivation, PCEP should use SCTP, which was specifically designed for this case. Otherwise, I'd suggest 30 seconds as a reasonable minimum to use, and something larger as a recommended default. Section 9.1., paragraph 1: > PCEP uses a well-known TCP port. IANA is requested to assign a port > number from the "System" sub-registry of the "Port Numbers" registry. DISCUSS: Why is a system port (0-1023) required, wouldn't a registered port (1023-49151) suffice? Section 10.1., paragraph 1: > It is RECOMMENDED to use TCP-MD5 [RFC1321] signature option to > provide for the authenticity and integrity of PCEP messages. This > will allow protecting against PCE or PCC impersonation and also > against message content falsification. DISCUSS: Given all the issues with the continued use of TCP-MD5, I'm not convinced that we really want to recommend its use for a new protocol. Wouldn't draft-ietf-tcpm-tcp-auth-opt be the preferred alternative? Or TLS, since confidentiality is of key importance according to Section 10.2. (Also, nit, TCP-MD5 protects TCP segments and not PCEP messages.) |
2008-05-20
|
19 | Lars Eggert | [Ballot discuss] Section 6.3., paragraph 0: > 6.3. Keepalive Message DISCUSS: I have a few suggestions on improving the keepalive mechanism. (1) Both … [Ballot discuss] Section 6.3., paragraph 0: > 6.3. Keepalive Message DISCUSS: I have a few suggestions on improving the keepalive mechanism. (1) Both the PCC and PCE are allowed to send keepalives according to their timers. This wastes bandwidth. The reception of a keepalive request from the other end should restart the keepalive timer on the receiving end - the reception is an indication that the peer is alive. This means that keepalives will usually only be sent from one end (the one with the shorter keepalive timer) and responded to by the other end. (2) As long as a keepalive has not been responded to, a PCEP speaker MUST NOT send another one. TCP is a reliable protocol and will deliver the outstanding keepalive when it can. It is not lost, and there is no need to resend it. All that sending more keepalives does when there is no response if fill up the socket send buffer. Section 7.3., paragraph 10: > Keepalive (8 bits): maximum period of time (in seconds) between two > consecutive PCEP messages sent by the sender of this message. The > minimum value for the Keepalive is 1 second. When set to 0, once the > session is established, no further Keepalive messages are sent to the > remote peer. A RECOMMENDED value for the keepalive frequency is 30 > seconds. DISCUSS: 1 second is extremely short. If there is a requirement that PCEP detect failures on such short timescales and should fail over in some way, TCP is the wrong underlying transport protocol. If that's the motivation, PCEP should use SCTP, which was specifically designed for this case. Otherwise, I'd suggest 30 seconds as a reasonable minimum to use, and something larger as a recommended default. Section 9.1., paragraph 1: > PCEP uses a well-known TCP port. IANA is requested to assign a port > number from the "System" sub-registry of the "Port Numbers" registry. DISCUSS: Why is a system port (0-1023) required, wouldn't a registered port (1023-49151) suffice? Section 10.1., paragraph 1: > It is RECOMMENDED to use TCP-MD5 [RFC1321] signature option to > provide for the authenticity and integrity of PCEP messages. This > will allow protecting against PCE or PCC impersonation and also > against message content falsification. DISCUSS: Given all the issues with the continued use of TCP-MD5, I'm not convinced that we really want to recommend its use for a new protocol. Wouldn't draft-ietf-tcpm-tcp-auth-opt be the preferred alternative? Or TLS, since confidentiality is of key importance according to Section 10.2. (Also, nit, TCP-MD5 protects TCP segments and not PCEP messages.) |
2008-05-20
|
19 | Lars Eggert | [Ballot Position Update] New position, Discuss, has been recorded by Lars Eggert |
2008-05-19
|
19 | Dan Romascanu | [Ballot Position Update] New position, No Objection, has been recorded by Dan Romascanu |
2008-05-18
|
19 | Ross Callon | [Ballot Position Update] New position, Yes, has been recorded for Ross Callon |
2008-05-18
|
19 | Ross Callon | Ballot has been issued by Ross Callon |
2008-05-18
|
19 | Ross Callon | Created "Approve" ballot |
2008-05-15
|
19 | Ross Callon | State Changes to IESG Evaluation from Waiting for AD Go-Ahead by Ross Callon |
2008-05-15
|
19 | Ross Callon | Placed on agenda for telechat - 2008-05-22 by Ross Callon |
2008-05-07
|
19 | Amanda Baber | IANA review comments: NOTE: this document appears to create several registries that are not requested in the IANA Considerations section. Please confirm that we have … IANA review comments: NOTE: this document appears to create several registries that are not requested in the IANA Considerations section. Please confirm that we have identified these actions correctly. Action #1: (9.1) PCEP needs a TCP port number in the System range. Action #2: (9.2) Upon approval of this document, the IANA will create a registry called "Path Computation Element Protocol (PCEP)†at http://www.iana.org/assignments/TBD-PCEP Action #3: (9.2.1) Upon approval of this document, the IANA create the following registry in "Path Computation Element Protocol (PCEP)" at http://www.iana.org/assignments/TBD-PCEP Registry Name: PCEP Message Types Registration Procedures: IETF Consensus Registry: Message Type | Message | Reference ------------------------------ 0 | Reserved ?? | [RFC-pce-pcep-12] 1 | Open | [RFC-pce-pcep-12] 2 | Keepalive | [RFC-pce-pcep-12] 3 | Path Computation Request | [RFC-pce-pcep-12] 4 | Path Computation Reply | [RFC-pce-pcep-12] 5 | Notification | [RFC-pce-pcep-12] 6 | Error | [RFC-pce-pcep-12] 7 | Close | [RFC-pce-pcep-12] 8-255 | Unassigned | [RFC-pce-pcep-12] QUESTION: Is value 0 reserved or available for assignment? Action #4: (9.2.2) (7.2) Upon approval of this document, the IANA will create the following registry in "Path Computation Element Protocol (PCEP)" at http://www.iana.org/assignments/TBD-PCEP Registry Name: PCEP Objects Registration Procedure: IETF Consensus Object Class Name Reference ---------+-----------------------------------------------+-------------- 0 | Reserved ? | [RFC-pce-pcep-12] | | 1 | OPEN | [RFC-pce-pcep-12] | Object-Type | 1: Open | [RFC-pce-pcep-12] | | 2 | RP | [RFC-pce-pcep-12] | Object-Type | 1: Request Parameters | [RFC-pce-pcep-12] | | 3 | NO-PATH | [RFC-pce-pcep-12] | Object-Type | 1: No Path | [RFC-pce-pcep-12] | | 4 | END-POINTS | [RFC-pce-pcep-12] | Object-Type | 1: IPv4 addresses | [RFC-pce-pcep-12] | 2: IPv6 addresses | [RFC-pce-pcep-12] | | 5 | BANDWIDTH | [RFC-pce-pcep-12] | Object-Type | 1: Requested bandwidth | [RFC-pce-pcep-12] | 2: Bandwidth of an existing TE LSP for | [RFC-pce-pcep-12] | which a reoptimization is performed. | | 6 | METRIC | [RFC-pce-pcep-12] | Object-Type | 1: Metric | [RFC-pce-pcep-12] | | 7 | ERO | [RFC-pce-pcep-12] | Object-Type | 1: Explicit Route | [RFC-pce-pcep-12] | | 8 | RRO | [RFC-pce-pcep-12] | Object-Type | 1: Record Route | [RFC-pce-pcep-12] | | 9 | LSPA | [RFC-pce-pcep-12] | Object-Type | 1: LSP Attributes | [RFC-pce-pcep-12] | | 10 | IRO | [RFC-pce-pcep-12] | Object-Type | 1: Include Route | [RFC-pce-pcep-12] | | 11 | SVEC | [RFC-pce-pcep-12] | Object-Type | 1: Synchronization Vector | [RFC-pce-pcep-12] | | 12 | NOTIFICATION | [RFC-pce-pcep-12] | Object-Type | 1: Notification | [RFC-pce-pcep-12] | | 13 | PCEP-ERROR | [RFC-pce-pcep-12] | Object-Type | 1: Error | [RFC-pce-pcep-12] | | 14 | LOAD-BALANCING | [RFC-pce-pcep-12] | Object-Type | 1: Load Balancing | [RFC-pce-pcep-12] | | 15 | CLOSE | [RFC-pce-pcep-12] | Object-Type | 1: Close | [RFC-pce-pcep-12] | | 16-255 | Unassigned QUESTION: Is 0 reserved or available for assignment? Action #5: (9.2.3) (7.4.1) Upon approval of this document, the IANA will create the following registry at http://www.iana.org/assignments/TBD-PCEP Registry Name: Request Parameters Bit Flags Registration Procedures: IETF Consensus Registry: Bit | Name | Description | Reference -----------+----------+-----------------------+--------------- 0-25 | | Available for allocation | [RFC-pce-pcep-12] 26 | O-bit | Strict/Loose | [RFC-pce-pcep-12] 27 | B-bit | Bi-directional | [RFC-pce-pcep-12] 28 | R-bit | Reoptimization | [RFC-pce-pcep-12] 29-31 | Pri | Priority | [RFC-pce-pcep-12] Action #6: (9.2.4) (7.14) Upon approval of this document, the IANA will create the following registry at http://www.iana.org/assignments/TBD-PCEP Registry Name: Notification Types and Values Registration Procedures: IETF Consensus Registry: Notification Type Name Reference ------------+----------------------------------------------+--------- 1 | Pending Request cancelled | [RFC-pce-pcep-12] | Notification-value: | 1: PCC cancels a set of pending requests | [RFC-pce-pcep-12] | 2: PCE cancels a set of pending requests | [RFC-pce-pcep-12] | 2 | PCE Congestion | [RFC-pce-pcep-12] | Notification-value | 1: PCE in congested state | [RFC-pce-pcep-12] | 2: PCE no longer in congested state | [RFC-pce-pcep-12] Action #7 (9.2.5) (7.15) Upon approval of this document, the IANA will create the following registry at http://www.iana.org/assignments/TBD-PCEP Registry Name: Error Types and Values Reference: [RFC-pce-pcep-12] Registration Procedures: IETF Consensus Registry: Error Type Meaning Reference -------+----------------------------------------------+--------- 1 PCEP session establishment failure [RFC-pce-pcep-12] Error-value=1: [RFC-pce-pcep-12] Reception of an invalid Open message or a non-Open message. Error-value=2: [RFC-pce-pcep-12] No Open message received before the expiration of the OpenWait timer. Error-value=3: Unacceptable and non negotiable session [RFC-pce-pcep-12] characteristics. Error-value=4: Unacceptable but negotiable session [RFC-pce-pcep-12] characteristics. Error-value=5: [RFC-pce-pcep-12] Reception of a second Open message with still unacceptable session characteristics. Error-value=6: [RFC-pce-pcep-12] Reception of a PCErr message proposing unacceptable session characteristics. Error-value=7: [RFC-pce-pcep-12] No Keepalive or PCErr message received before the expiration of the KeepWait timer. Error-value=8: PCEP version not supported 2 Capability not supported [RFC-pce-pcep-12] 3 Unknown Object [RFC-pce-pcep-12] Error-value=1: [RFC-pce-pcep-12] Unrecognized object class Error-value=2: [RFC-pce-pcep-12] Unrecognized object type Error-value=3: [RFC-pce-pcep-12] Unrecognized subobject type Error-value=4: [RFC-pce-pcep-12] Unrecognized parameter 4 Not supported object [RFC-pce-pcep-12] Error-value=1: [RFC-pce-pcep-12] Unsupported object class. Error-value=2: [RFC-pce-pcep-12] Unsupported object type. Error-value=3: [RFC-pce-pcep-12] Unsupported subobject type. Error-value=4: [RFC-pce-pcep-12] Unsupported parameter. 5 Policy violation [RFC-pce-pcep-12] Error-value=1: [RFC-pce-pcep-12] C bit of the METRIC object set (request rejected). Error-value=2: [RFC-pce-pcep-12] O bit of the RP object cleared (request rejected). 6 Mandatory Object missing. [RFC-pce-pcep-12] Error-value=1: RP object missing. Error-value=2: [RFC-pce-pcep-12] RRO missing for a reoptimization request (R bit of the RP object set). Error-value=3: [RFC-pce-pcep-12] END-POINTS object missing. 7 Synchronized path computation request missing. [RFC-pce-pcep-12] 8 Unknown request reference. [RFC-pce-pcep-12] 9 Attempt to establish a second PCEP session. [RFC-pce-pcep-12] 10 Reception of an invalid object [RFC-pce-pcep-12] Error-value=1: [RFC-pce-pcep-12] Reception of an object with P flag not set although the P-flag must be set according to this specification. Action #8 (9.2.6) (7.17) Upon approval of this document, the IANA will create the following registry at http://www.iana.org/assignments/TBD-PCEP Registry Name: Close Reasons Registration Procedures: IETF Consensus Registry: Reasons Value Meaning ------------+----------------------------------------------+--------- 0 | Reserved ? | [RFC-pce-pcep-12] 1 | No explanation provided | [RFC-pce-pcep-12] 2 | DeadTimer expired | [RFC-pce-pcep-12] 3 | Reception of a malformed PCEP message | [RFC-pce-pcep-12] 4-255 | Unassigned | [RFC-pce-pcep-12] QUESTION: Is “0†reserved or available for assignment? Action #9: 9.2.7.1 (7.5) Upon approval of this document, the IANA will create the following registry at http://www.iana.org/assignments/TBD-PCEP Registry Name: No-Path Nature of Issue Registration Procedures: IETF Consensus Registry: Value | Meaning | Reference ----------+----------------------------------------------+--------- 0 | No path satisfying the set of constraints could be found | [RFC-pce-pcep-12] 1 | PCE chain broken | [RFC-pce-pcep-12] 2-255 | Unassigned | [RFC-pce-pcep-12] Action #10 Upon approval of this document, the IANA will create the following registry at http://www.iana.org/assignments/TBD-PCEP Registry Name: No-Path Flags Allocation policy: IETF Consensus Registry: Bit | Name | Description | Reference -----------+----------+-----------------------+--------------- 0 | O-bit | Unsatisfied constraints included | [RFC-pce-pcep-12] 1-15 | | Unassigned | [RFC-pce-pcep-12] Action #11 Upon approval of this document, the IANA will create the following registry at http://www.iana.org/assignments/TBD-PCEP Registry Name: PCEP TLV Types Registration Procedures: IETF Consensus Registry: TLV Type Meaning Reference ----------+---------------------------------------+--------- 0 | Reserved | [RFC-pce-pcep-12] 1 | NO-PATH-VECTOR TLV | [RFC-pce-pcep-12] 2 | OVERLOAD-DURATION TLV | [RFC-pce-pcep-12] 3 | REQ-MISSING TLV | [RFC-pce-pcep-12] 4-65535 | Unassigned | [RFC-pce-pcep-12] Action #12 Upon approval of this document, the IANA will create the following registry at http://www.iana.org/assignments/TBD-PCEP Registry Name: No-Path Reasons Registration Procedures: IETF Consensus Registry: Bit | Name | Reference -----------+----------------------------------+--------------- 0 | Unassigned | [RFC-pce-pcep-12] 1 | PCE currently Unavailable | [RFC-pce-pcep-12] 2 | Unknown Destination | [RFC-pce-pcep-12] 3 | Unknown Source | [RFC-pce-pcep-12] 4-31 | Unassigned | [RFC-pce-pcep-12] Action #13 NOTE: This action appears to be requested in Section 6.1, but does not appear in the IANA Considerations section. Upon approval of this document, the IANA will create the following registry at http://www.iana.org/assignments/TBD-PCEP Registry Name: PCEP Version" Registration Procedures: IETF Consensus. Version | Version name | Reference --------+-------------------+---------- 0 | Reserved | [RFC-pce-pcep-12] 1 | PCEP-#1 | [RFC-pce-pcep-12] 2-7 | Unassigned | [RFC-pce-pcep-12] Action #14 NOTE: This action appears to be requested in Section 6.1, but does not appear in the IANA Considerations section. Upon approval of this document, the IANA will create the following registry at http://www.iana.org/assignments/TBD-PCEP Registry Name: PCEP Common Header flags Registration Procedure: IETF Consensus Registry: Bit | Name | Reference -----------+----------------------------------+--------------- 0-4 | Unassigned | [RFC-pce-pcep-12] Action #15 NOTE: This action appears to be requested in Section 7.2, but does not appear in the IANA Considerations section. Upon approval of this document, the IANA will create the following registry at http://www.iana.org/assignments/TBD-PCEP Registry Name: PCEP Common Object Header flags Registration Procedures: IETF Consensus Registry: Bit | Name | Description | Reference -----------+--------+------------------------------+--------------- 0-1 | | Unassigned | [RFC-pce-pcep-12] 2 | P-Flag | Processing Rule | [RFC-pce-pcep-12] 3 | I-Flag | Ignore | [RFC-pce-pcep-12] Action #16 NOTE: This action appears to be requested in Section 7.3, but does not appear in the IANA Considerations section. Upon approval of this document, the IANA will create the following registry at http://www.iana.org/assignments/TBD-PCEP Registry Name: PCEP Open flags Registration procedures: IETF Consensus. Registry: Bit | Name | Reference -----------+----------------------------------+--------------- 0-4 | Unassigned | [RFC-pce-pcep-12] Action #17 NOTE: This action appears to be requested in Section 7.8, but does not appear in the IANA Considerations section. Upon approval of this document, the IANA will create the following registry at http://www.iana.org/assignments/TBD-PCEP Registry Name: PCEP Metric flags Registration Procedures: IETF Consensus Registry: Bit | Name | Description | Reference -----------+--------+------------------------------+--------------- 0-5 | | Unassigned | [RFC-pce-pcep-12] 6 | C-Flag | Computed Metric | [RFC-pce-pcep-12] 7 | B-Flag | Bound | [RFC-pce-pcep-12] Action #18 NOTE: This action appears to be requested in Section 7.8, but does not appear in the IANA Considerations section. Upon approval of this document, the IANA will create the following registry at http://www.iana.org/assignments/TBD-PCEP Registry Name: PCEP Metric type Registration Procedures: IETF Consensus. Registry: Value | Name | Reference ------------+---------------------------------+--------------- 0 | Reserved | [RFC-pce-pcep-12] 1 | IGP metric | [RFC-pce-pcep-12] 2 | TE metric | [RFC-pce-pcep-12] 2 | Hop Counts | [RFC-pce-pcep-12] 4-255 | Unassigned | [RFC-pce-pcep-12] Action #19 NOTE: This action appears to be requested in Section 7.11, but does not appear in the IANA Considerations section. Upon approval of this document, the IANA will create the following registry at http://www.iana.org/assignments/TBD-PCEP Registry Name: LSPA Object flags Registration Procedures: IETF Consensus Registry: Bit | Name | Description | Reference -----------+----------+--------------------------+--------------- 0-6 | | Unassigned | [RFC-pce-pcep-12] 7 | L-Flag | Local Protection Desired | [RFC-pce-pcep-12] Action #20 NOTE: This action appears to be requested in Section 7.13.2, but does not appear in the IANA Considerations section. Upon approval of this document, the IANA will create the following registry at http://www.iana.org/assignments/TBD-PCEP Registry Name: SVEC Object flags Registration procedures: IETF Consensus Registry: Bit | Name | Description | Reference -----------+----------+--------------------------+--------------- 0-20 | | Unassigned | [RFC-pce-pcep-12] 21 | S-Flag | SRLG diverse | [RFC-pce-pcep-12] 22 | N-Flag | Node diverse | [RFC-pce-pcep-12] 23 | L-Flag | Link diverse | [RFC-pce-pcep-12] Action #21 NOTE: This action appears to be requested in Section 7.14, but does not appear in the IANA Considerations section. Upon approval of this document, the IANA will create the following registry at http://www.iana.org/assignments/TBD-PCEP Registry Name: Notification flags Allocation policy: IETF Consensus Registry: Bit | Name | Reference -----------+----------------------------------+--------------- 0-7 | Unassigned | [RFC-pce-pcep-12] Action #22 NOTE: This action appears to be requested in Section 7.15, but does not appear in the IANA Considerations section. Upon approval of this document, the IANA will create the following registry at http://www.iana.org/assignments/TBD-PCEP Registry Name: PCEP-ERROR flags Registration Procedures: IETF Consensus Registry: Bit | Name | Reference -----------+----------------------------------+--------------- 0-7 | Unassigned | [RFC-pce-pcep-12] Action #23 NOTE: This action appears to be requested in Section 7.16, but does not appear in the IANA Considerations section. Upon approval of this document, the IANA will create the following registry at http://www.iana.org/assignments/TBD-PCEP Registry Name: LOAD-Balancing flags Registration Procedures: IETF Consensus Registry: Bit | Name | Reference -----------+----------------------------------+--------------- 0-7 | Unassigned | [RFC-pce-pcep-12] Action #24 NOTE: This action appears to be requested in Section 7.17, but does not appear in the IANA Considerations section. Upon approval of this document, the IANA will create the following registry at http://www.iana.org/assignments/TBD-PCEP Registry Name: CLOSE flags Registration Procedures: IETF Consensus Registry: Bit | Name | Reference -----------+----------------------------------+--------------- 0-7 | Unassigned | [RFC-pce-pcep-12] We understand the above to be the only IANA Actions for this document. |
2008-04-30
|
19 | (System) | State has been changed to Waiting for AD Go-Ahead from In Last Call by system |
2008-04-20
|
19 | Samuel Weiler | Request for Last Call review by SECDIR is assigned to Jeffrey Hutzelman |
2008-04-20
|
19 | Samuel Weiler | Request for Last Call review by SECDIR is assigned to Jeffrey Hutzelman |
2008-04-16
|
19 | Amy Vezza | Last call sent |
2008-04-16
|
19 | Amy Vezza | State Changes to In Last Call from Last Call Requested by Amy Vezza |
2008-04-16
|
19 | Ross Callon | Last Call was requested by Ross Callon |
2008-04-16
|
19 | Ross Callon | State Changes to Last Call Requested from Publication Requested::AD Followup by Ross Callon |
2008-04-16
|
19 | (System) | Ballot writeup text was added |
2008-04-16
|
19 | (System) | Last call text was added |
2008-04-16
|
19 | (System) | Ballot approval text was added |
2008-03-25
|
19 | (System) | Sub state has been changed to AD Follow up from New Id Needed |
2008-03-25
|
12 | (System) | New version available: draft-ietf-pce-pcep-12.txt |
2008-03-24
|
19 | Ross Callon | State Changes to Publication Requested::Revised ID Needed from Publication Requested by Ross Callon |
2008-03-17
|
19 | Cindy Morgan | Proto-write-up for draft-ietf-pce-pcep-11.txt Intended status : Standards Track > (1.a) Who is the Document Shepherd for this document? Has the > Document … Proto-write-up for draft-ietf-pce-pcep-11.txt Intended status : Standards Track > (1.a) Who is the Document Shepherd for this document? Has the > Document Shepherd personally reviewed this version of the > document and, in particular, does he or she believe this > version is ready for forwarding to the IESG for publication? Adrian Farrel is the document shepherd. He has personally reviewed the I-D and believes it is ready for forwarding to the IESG for publication. > (1.b) Has the document had adequate review both from key WG members > and from key non-WG members? Does the Document Shepherd have > any concerns about the depth or breadth of the reviews that > have been performed? I-D has had very good level of discussions and review. The high version number is indicative of many small deltas over the last year as reviews and implementations have discovered nits to be fixed. > (1.c) Does the Document Shepherd have concerns that the document > needs more review from a particular or broader perspective, > e.g., security, operational complexity, someone familiar with > AAA, internationalization or XML? We are aware that the security considerations for a new protocol need special attention. The I-D has been the subject of several informal security discussions, and the authors and chairs have attempted to get the security section right. But the WG feels that a review by the Security Directorate at the same time as IESG review would be useful to close out any issues. > (1.d) Does the Document Shepherd have any specific concerns or > issues with this document that the Responsible Area Director > and/or the IESG should be aware of? For example, perhaps he > or she is uncomfortable with certain parts of the document, or > has concerns whether there really is a need for it. In any > event, if the WG has discussed those issues and has indicated > that it still wishes to advance the document, detail those > concerns here. Has an IPR disclosure related to this document > been filed? If so, please include a reference to the > disclosure and summarize the WG discussion and conclusion on > this issue. The document is sound. No IPR disclosure has been filed. > (1.e) How solid is the WG consensus behind this document? Does it > represent the strong concurrence of a few individuals, with > others being silent, or does the WG as a whole understand and > agree with it? Consensus is comprehensive to the point of unanimity! > (1.f) Has anyone threatened an appeal or otherwise indicated extreme > discontent? If so, please summarise the areas of conflict in > separate email messages to the Responsible Area Director. (It > should be in a separate email because this questionnaire is > entered into the ID Tracker.) No threats. No discontent. > (1.g) Has the Document Shepherd personally verified that the > document satisfies all ID nits? (See > http://www.ietf.org/ID-Checklist.html and > http://tools.ietf.org/tools/idnits/). Boilerplate checks are > not enough; this check needs to be thorough. Has the document > met all formal review criteria it needs to, such as the MIB > Doctor, media type and URI type reviews? All checks made. > (1.h) Has the document split its references into normative and > informative? Are there normative references to documents that > are not ready for advancement or are otherwise in an unclear > state? If such normative references exist, what is the > strategy for their completion? Are there normative references > that are downward references, as described in [RFC3967]? If > so, list these downward references to support the Area > Director in the Last Call procedure for them [RFC3967]. References split. No downrefs. > (1.i) Has the Document Shepherd verified that the document IANA > consideration section exists and is consistent with the body > of the document? If the document specifies protocol > extensions, are reservations requested in appropriate IANA > registries? Are the IANA registries clearly identified? If > the document creates a new registry, does it define the > proposed initial contents of the registry and an allocation > procedure for future registrations? Does it suggest a > reasonable name for the new registry? See [RFC2434]. If the > document describes an Expert Review process has Shepherd > conferred with the Responsible Area Director so that the IESG > can appoint the needed Expert during the IESG Evaluation? The document defines a new protocol and requests a registry with multiple sub-registries. The registries are well documented and named. > (1.j) Has the Document Shepherd verified that sections of the > document that are written in a formal language, such as XML > code, BNF rules, MIB definitions, etc., validate correctly in > an automated checker? The message formats are described in relatively simple BNF. No automated checker has been used. Note that the symbol "|" is used to denote an alternative whereas RFC 5234 specifies the use of "/". This choice was made deliberately as the "|" symbol is found in related RFCs (e.g. RFCs 2205, 3209, 3473). > (1.k) The IESG approval announcement includes a Document > Announcement Write-Up. Please provide such a Document > Announcement Write-Up. Recent examples can be found in the > "Action" announcements for approved documents. The approval > announcement contains the following sections: > > Technical Summary > Relevant content can frequently be found in the abstract > and/or introduction of the document. If not, this may be > an indication that there are deficiencies in the abstract > or introduction. RFC4655 describes the motivations and architecture for a Path Computation Element (PCE) based model for the computation of Multiprotocol Label Switching (MPLS) and Generalized (GMPLS) Traffic Engineering Label Switch Paths (TE LSPs). The model allows for the separation of PCE from Path Computation Client (PCC), and allows for the cooperation between PCEs. This necessitates a communication protocol between PCC and PCE, and between PCEs. RFC4657 states the generic requirements for such a protocol including the requirement for using the same protocol between PCC and PCE, and between PCEs. This document specifies the Path Computation Element Communication Protocol (PCEP) for communications between a Path Computation Client (PCC) and a Path Computation Element (PCE), or between two PCEs. Such interactions include path computation requests and path computation replies as well as notifications of specific states related to the use of a PCE in the context of Multiprotocol Label Switching (MPLS) and Generalized (GMPLS) Traffic Engineering. PCEP is designed to be flexible and extensible so as to easily allow for the addition of further messages and objects, should further requirements be expressed in the future. > Working Group Summary > Was there anything in WG process that is worth noting? For > example, was there controversy about particular points or > were there decisions where the consensus was particularly > rough? WG has thorough consensus with no disputes or disagreements. At the start of the development of the protocol, a thorough survey was conducted into the possible use or re-use of existing protocols. The Applications Area was engaged, and several prototypes were produced. But in the end it was determined that a new protocol was expeditious. > Document Quality > Are there existing implementations of the protocol? Have a > significant number of vendors indicated their plan to > implement the specification? Are there any reviewers that > merit special mention as having done a thorough review, > e.g., one that resulted in important changes or a > conclusion that the document had no substantive issues? If > there was a MIB Doctor, Media Type or other expert review, > what was its course (briefly)? In the case of a Media Type > review, on what date was the request posted? There are a substantial number of implementations (around 10 were recorded in an informal survey). Some of these are experimental implementations in service provider labs, while some are academic projects. Other implementations are for hardware and software products and are commercially available. Private interoperability testing has been conducted between at least four of these implementations. Initial testing raised important defects in the specification (that were fixed). |
2008-03-17
|
19 | Cindy Morgan | Draft Added by Cindy Morgan in state Publication Requested |
2008-03-16
|
11 | (System) | New version available: draft-ietf-pce-pcep-11.txt |
2008-02-11
|
10 | (System) | New version available: draft-ietf-pce-pcep-10.txt |
2007-11-16
|
09 | (System) | New version available: draft-ietf-pce-pcep-09.txt |
2007-07-05
|
08 | (System) | New version available: draft-ietf-pce-pcep-08.txt |
2007-03-05
|
07 | (System) | New version available: draft-ietf-pce-pcep-07.txt |
2007-02-14
|
06 | (System) | New version available: draft-ietf-pce-pcep-06.txt |
2007-01-12
|
05 | (System) | New version available: draft-ietf-pce-pcep-05.txt |
2006-12-13
|
04 | (System) | New version available: draft-ietf-pce-pcep-04.txt |
2006-10-20
|
03 | (System) | New version available: draft-ietf-pce-pcep-03.txt |
2006-06-23
|
02 | (System) | New version available: draft-ietf-pce-pcep-02.txt |
2006-03-03
|
01 | (System) | New version available: draft-ietf-pce-pcep-01.txt |
2005-11-29
|
00 | (System) | New version available: draft-ietf-pce-pcep-00.txt |