A YANG Network Data Model for Layer 3 VPNs
RFC 9182
Revision differences
Document history
Date | Rev. | By | Action |
---|---|---|---|
2022-02-15
|
18 | (System) | Received changes through RFC Editor sync (created alias RFC 9182, changed title to 'A YANG Network Data Model for Layer 3 VPNs', changed abstract … Received changes through RFC Editor sync (created alias RFC 9182, changed title to 'A YANG Network Data Model for Layer 3 VPNs', changed abstract to 'As a complement to the Layer 3 Virtual Private Network Service Model (L3SM), which is used for communication between customers and service providers, this document defines an L3VPN Network Model (L3NM) that can be used for the provisioning of Layer 3 Virtual Private Network (L3VPN) services within a service provider network. The model provides a network-centric view of L3VPN services. The L3NM is meant to be used by a network controller to derive the configuration information that will be sent to relevant network devices. The model can also facilitate communication between a service orchestrator and a network controller/orchestrator.', changed pages to 129, changed standardization level to Proposed Standard, changed state to RFC, added RFC published event at 2022-02-15, changed IESG state to RFC Published) |
2022-02-15
|
18 | (System) | RFC published |
2022-02-03
|
18 | (System) | RFC Editor state changed to AUTH48-DONE from AUTH48 |
2022-01-21
|
18 | (System) | RFC Editor state changed to AUTH48 |
2021-12-22
|
18 | (System) | RFC Editor state changed to RFC-EDITOR from REF |
2021-11-24
|
18 | (System) | RFC Editor state changed to REF from EDIT |
2021-10-13
|
18 | (System) | IANA Action state changed to RFC-Ed-Ack from Waiting on RFC Editor |
2021-10-13
|
18 | (System) | IANA Action state changed to Waiting on RFC Editor from In Progress |
2021-10-13
|
18 | (System) | IANA Action state changed to In Progress from Waiting on Authors |
2021-10-12
|
18 | (System) | IANA Action state changed to Waiting on Authors from In Progress |
2021-10-11
|
18 | (System) | RFC Editor state changed to EDIT |
2021-10-11
|
18 | (System) | IESG state changed to RFC Ed Queue from Approved-announcement sent |
2021-10-11
|
18 | (System) | Announcement was received by RFC Editor |
2021-10-08
|
18 | (System) | IANA Action state changed to In Progress |
2021-10-08
|
18 | Amy Vezza | IESG state changed to Approved-announcement sent from Approved-announcement to be sent |
2021-10-08
|
18 | Amy Vezza | IESG has approved the document |
2021-10-08
|
18 | Amy Vezza | Closed "Approve" ballot |
2021-10-08
|
18 | (System) | Removed all action holders (IESG state changed) |
2021-10-08
|
18 | Robert Wilton | IESG state changed to Approved-announcement to be sent from IESG Evaluation::AD Followup |
2021-10-08
|
18 | Robert Wilton | Ballot approval text was generated |
2021-10-08
|
18 | Mohamed Boucadair | New version available: draft-ietf-opsawg-l3sm-l3nm-18.txt |
2021-10-08
|
18 | (System) | New version approved |
2021-10-08
|
18 | (System) | Request for posting confirmation emailed to previous authors: Alejandro Aguado , Luis Munoz , Mohamed Boucadair , Oscar de Dios , samier barguil |
2021-10-08
|
18 | Mohamed Boucadair | Uploaded new revision |
2021-10-05
|
17 | Martin Vigoureux | [Ballot comment] I finally found the time to go through that document and have no objection with it going forward. |
2021-10-05
|
17 | Martin Vigoureux | [Ballot Position Update] New position, No Objection, has been recorded for Martin Vigoureux |
2021-10-04
|
17 | Francesca Palombini | [Ballot comment] Thank you for the work on this document, and for addressing my review comments. Francesca |
2021-10-04
|
17 | Francesca Palombini | [Ballot Position Update] Position for Francesca Palombini has been changed to No Objection from Discuss |
2021-10-04
|
17 | Mohamed Boucadair | New version available: draft-ietf-opsawg-l3sm-l3nm-17.txt |
2021-10-04
|
17 | (System) | New version approved |
2021-10-04
|
17 | (System) | Request for posting confirmation emailed to previous authors: Alejandro Aguado , Luis Munoz , Mohamed Boucadair , Oscar de Dios , samier barguil |
2021-10-04
|
17 | Mohamed Boucadair | Uploaded new revision |
2021-10-04
|
16 | Francesca Palombini | [Ballot discuss] Thank you for the work on this document, and apologies for the delayed review. I have one DISCUSS point, a couple of comments. … [Ballot discuss] Thank you for the work on this document, and apologies for the delayed review. I have one DISCUSS point, a couple of comments. As noted in https://www.ietf.org/blog/handling-iesg-ballot-positions/, a DISCUSS ballot is a request to have a discussion; I really think that the document would be improved with a change here, but can be convinced otherwise. I have divided comments into "minor" (including the questions) and "nits". Neither require replies strictly speaking, please feel free to address as you see fit. I will appreciate answers to my questions, to improve my understanding. If any clarification comes out of it, I hope it will help improve the document. Francesca 1. ----- leaf holdtime { type uint32; units "msec"; FP: This might be me not finding the right reference (or little knowledge of YANG), but I was wondering if "msec" was defined somewhere as a unit (note that the description does not mention that the unit is milliseconds either). While doing my due diligence to see if I missed or misunderstood something, I researched the RFCs mentioned in the beginning of the YANG module: This module uses types defined in [RFC6991] and [RFC8343]. It also uses groupings defined in [RFC8519], [RFC8177], and [RFC8294]. And found no use of the "msec" unit. A quick google search shows that RFC 8299 uses it, so there is precedence for it, but I couldn't find its definition from that document either. All the other leaves use "milliseconds" (which is defined in RFC 8294), so my preference would be to have consistency, if "msec" was defined and I just missed it. (Note that a similar remark could be made for "bps" used, which does not appear in the description text, and is also used in RFC 8466, however there is no issue about consistency there). |
2021-10-04
|
16 | Francesca Palombini | [Ballot comment] ## Minor 2. ----- 'status': Indicates the status of the OSPF routing instance. FP: Most likely a copy-paste leftover in section 7.6.3.4 … [Ballot comment] ## Minor 2. ----- 'status': Indicates the status of the OSPF routing instance. FP: Most likely a copy-paste leftover in section 7.6.3.4 should be IS-IS instead of OSPF. 3. ----- Section 7.6.3.5, re timers FP: shouldn't the units be explicitly stated in the timers description text, or are they defined somewhere else? Actually, I can see the unit is specified later on in the YANG module - so my suggestion is to add some simple text in 7.6.3.5 to explicitly say that the timers are in seconds. 4. ----- leaf required-min-rx-interval { FP: I see that RFC 5880 does not specify a default value for this; is there really no default that can be specified here? ## Nits 5. ----- "It is included only when enryption is enabled."; } FP: typo s/enryption/encryption |
2021-10-04
|
16 | Francesca Palombini | [Ballot Position Update] New position, Discuss, has been recorded for Francesca Palombini |
2021-09-30
|
16 | Roman Danyliw | [Ballot comment] Thank you to Rifaat Shekh-Yusef for the SECDIR review. Thank you for addressing my DISCUSS and COMMENT feedback. |
2021-09-30
|
16 | Roman Danyliw | Ballot comment text updated for Roman Danyliw |
2021-09-29
|
16 | Mohamed Boucadair | New version available: draft-ietf-opsawg-l3sm-l3nm-16.txt |
2021-09-29
|
16 | (System) | New version approved |
2021-09-29
|
16 | (System) | Request for posting confirmation emailed to previous authors: Alejandro Aguado , Luis Munoz , Mohamed Boucadair , Oscar de Dios , samier barguil |
2021-09-29
|
16 | Mohamed Boucadair | Uploaded new revision |
2021-09-29
|
15 | Roman Danyliw | [Ballot comment] Thank you to Rifaat Shekh-Yusef for the SECDIR review. Thank you for addressing my DISCUSS feedback. == ** Section 9. The text enumerating … [Ballot comment] Thank you to Rifaat Shekh-Yusef for the SECDIR review. Thank you for addressing my DISCUSS feedback. == ** Section 9. The text enumerating sensitive read operations provides no caution about protecting the various key material. RFC8177 is cited later, but as noted in the DISCUSS, the suggested key wrap primitive is not usable with instances of “key” as the hex-key-string feature is not supported. |
2021-09-29
|
15 | Roman Danyliw | [Ballot Position Update] Position for Roman Danyliw has been changed to No Objection from Discuss |
2021-09-28
|
15 | Mohamed Boucadair | New version available: draft-ietf-opsawg-l3sm-l3nm-15.txt |
2021-09-28
|
15 | (System) | New version approved |
2021-09-28
|
15 | (System) | Request for posting confirmation emailed to previous authors: Alejandro Aguado , Luis Munoz , Mohamed Boucadair , Oscar de Dios , samier barguil |
2021-09-28
|
15 | Mohamed Boucadair | Uploaded new revision |
2021-09-28
|
14 | Pete Resnick | Request for Early review by GENART Completed: Ready. Reviewer: Pete Resnick. Sent review to list. |
2021-09-28
|
14 | Benjamin Kaduk | [Ballot comment] Thanks for the many updates in the -12 through -14. Just one final comment on the new changes: Section 7.6.3 The L3NM … [Ballot comment] Thanks for the many updates in the -12 through -14. Just one final comment on the new changes: Section 7.6.3 The L3NM supports the configuration of one or more IPv4/IPv6 static routes. Since the same structure is used for both IPv4 and IPv6, it was considered to have one single container to group both static entries independently of their address family, but that design was abandoned to ease the mapping with the structure in [RFC8299]. This paragraph appears both at the end of 7.6.3 and at the start of 7.6.3.1; presumably only the latter is needed. |
2021-09-28
|
14 | Benjamin Kaduk | [Ballot Position Update] Position for Benjamin Kaduk has been changed to No Objection from Discuss |
2021-09-28
|
14 | Mohamed Boucadair | New version available: draft-ietf-opsawg-l3sm-l3nm-14.txt |
2021-09-28
|
14 | (System) | New version approved |
2021-09-28
|
14 | (System) | Request for posting confirmation emailed to previous authors: Alejandro Aguado , Luis Munoz , Mohamed Boucadair , Oscar de Dios , samier barguil |
2021-09-28
|
14 | Mohamed Boucadair | Uploaded new revision |
2021-09-27
|
13 | Benjamin Kaduk | [Ballot discuss] (3) the ipsec authentication option for the various routing protocols uses a string to identify an (IKE, unspecified version thereof) SA. RFC 7296 … [Ballot discuss] (3) the ipsec authentication option for the various routing protocols uses a string to identify an (IKE, unspecified version thereof) SA. RFC 7296 doesn't have the concept of a name for an IKE SA itself, so I think we need to provide more details on what is being named and what the naming authority is. IKE does have identities for the peers, if the goal is to refer to the peer's identity for the SA. [I'd like to see clarified that these human-readable names are administrator-assigned] |
2021-09-27
|
13 | Benjamin Kaduk | [Ballot comment] Thanks for the many updates in the -12 and -13. A couple things left to comment on; some on the new changes, and … [Ballot comment] Thanks for the many updates in the -12 and -13. A couple things left to comment on; some on the new changes, and some just retaining former discuss points that I demoted into non-blocking comments. (former DISCUSS) 2) In a similar vein as Roman's Discuss (and perhaps obviated by it?), if we're going to allow raw keys to be specified, as a string type, we should be very clear about whether the string is hex-encoded, base64-encoded, etc., in light of deployed experience with devices that take the string and use it as the raw key (thereby eliminating a good chunk of the key space from potential use). [In the email thread I suggested some additional text that might help, for this topic.] Section 7.6.3 The L3NM supports the configuration of one or more IPv4/IPv6 static routes. Since the same structure is used for both IPv4 and IPv6, it was considered to have one single container to group both static entries independently of their address family, but that design was abandoned to ease the mapping with the structure in [RFC8299]. This paragraph appears both at the end of 7.6.3 and at the start of 7.6.3.1; presumably only the latter is needed. |
2021-09-27
|
13 | Benjamin Kaduk | Ballot comment and discuss text updated for Benjamin Kaduk |
2021-09-27
|
13 | Martin Duke | [Ballot comment] Thanks for addressing my DISCUSS |
2021-09-27
|
13 | Martin Duke | [Ballot Position Update] Position for Martin Duke has been changed to No Objection from Discuss |
2021-09-27
|
13 | Mohamed Boucadair | New version available: draft-ietf-opsawg-l3sm-l3nm-13.txt |
2021-09-27
|
13 | (System) | New version approved |
2021-09-27
|
13 | (System) | Request for posting confirmation emailed to previous authors: Alejandro Aguado , Luis Munoz , Mohamed Boucadair , Oscar de Dios , samier barguil |
2021-09-27
|
13 | Mohamed Boucadair | Uploaded new revision |
2021-09-27
|
12 | Zaheduzzaman Sarker | [Ballot comment] The -11 version addresses my discuss point. Thanks for addressing it. |
2021-09-27
|
12 | Zaheduzzaman Sarker | [Ballot Position Update] Position for Zaheduzzaman Sarker has been changed to No Objection from Discuss |
2021-09-27
|
12 | (System) | Changed action holders to Robert Wilton (IESG state changed) |
2021-09-27
|
12 | (System) | Sub state has been changed to AD Followup from Revised ID Needed |
2021-09-27
|
12 | (System) | IANA Review state changed to Version Changed - Review Needed from IANA OK - Actions Needed |
2021-09-27
|
12 | Mohamed Boucadair | New version available: draft-ietf-opsawg-l3sm-l3nm-12.txt |
2021-09-27
|
12 | (System) | New version approved |
2021-09-27
|
12 | (System) | Request for posting confirmation emailed to previous authors: Alejandro Aguado , Luis Munoz , Mohamed Boucadair , Oscar de Dios , samier barguil |
2021-09-27
|
12 | Mohamed Boucadair | Uploaded new revision |
2021-09-23
|
11 | (System) | Changed action holders to Oscar de Dios, Mohamed Boucadair, Robert Wilton, Alejandro Aguado, Luis Munoz, samier barguil (IESG state changed) |
2021-09-23
|
11 | Cindy Morgan | IESG state changed to IESG Evaluation::Revised I-D Needed from IESG Evaluation |
2021-09-23
|
11 | Warren Kumari | [Ballot comment] I originally balloted Abstain, but after discussions and explanations from Rob I'm moving to No Objection. I agree with Alvaro that there are … [Ballot comment] I originally balloted Abstain, but after discussions and explanations from Rob I'm moving to No Objection. I agree with Alvaro that there are inconsistencies that make deriving the mapping between the model and implementations tricky. However, I don't really think that that is the "fault" of this document, but rather is an artifact of the fact that there are so many different "types" of VPNs, and every standard/implementation/vendor has their own special knobs and features. This makes creating a generic model largely impossible - it either needs to be so restrictive that it is basically pointless, or so comprehensive that it is unwieldily. I think that this document did a good job of trying to thread this needle (and I thank/congratulate the authors), but I still think that it is not really usable. I also support Erik's discuss on Sec 7.6.2 -- this is also (I think) an artifact of trying to cover both too much and too little. |
2021-09-23
|
11 | Warren Kumari | [Ballot Position Update] Position for Warren Kumari has been changed to No Objection from Abstain |
2021-09-23
|
11 | Erik Kline | [Ballot Position Update] Position for Erik Kline has been changed to No Objection from Discuss |
2021-09-23
|
11 | Benjamin Kaduk | [Ballot discuss] (1) I think there may be some ambiguity we need to resolve, relating to per-AF router IDs and other per-AF lists: … [Ballot discuss] (1) I think there may be some ambiguity we need to resolve, relating to per-AF router IDs and other per-AF lists: list router-id { key "address-family"; description "Router-id per address family."; leaf address-family { type identityref { base vpn-common:address-family; } description "Indicates the address family for which the Router-ID applies."; What actually gets used as the router-id for a given address family if both "dual-stack" and that address family are present in this list? There's some similar potential for amiguity in the "redistribute-connected" list for BGP routing, that is also keyed on an address-family identityref. (2) In a similar vein as Roman's Discuss (and perhaps obviated by it?), if we're going to allow raw keys to be specified, as a string type, we should be very clear about whether the string is hex-encoded, base64-encoded, etc., in light of deployed experience with devices that take the string and use it as the raw key (thereby eliminating a good chunk of the key space from potential use). (2.5) For raw keys, should we be using nacm:default-deny-all? (3) the ipsec authentication option for the various routing protocols uses a string to identify an (IKE, unspecified version thereof) SA. RFC 7296 doesn't have the concept of a name for an IKE SA itself, so I think we need to provide more details on what is being named and what the naming authority is. IKE does have identities for the peers, if the goal is to refer to the peer's identity for the SA. (4) I'd also like to have a discussion about the NTP configuration options; in particular, we currently have an enumeration to select between broadcast client and broadcast server, with no option apparent for symmetric or other NTP modes. Given the rigidity of YANG enumerations, I'd like to confirm that no other NTP modes could be appropriate on the network access before we lock in to this model. |
2021-09-23
|
11 | Benjamin Kaduk | [Ballot comment] I expect there's a large degree of personal preference involved, but I find it easier to read the document when the tree (fragment) … [Ballot comment] I expect there's a large degree of personal preference involved, but I find it easier to read the document when the tree (fragment) precedes the per-field descriptions; this document has many instances of the other order (as well as some instances of my preferred order). Section 1 The L3NM focuses on BGP Provider Edge (PE) based Layer 3 VPNs as described in [RFC4026][RFC4110][RFC4364] and Multicast VPNs as described in [RFC6037][RFC6513]. RFC 6037 is Historic; is it nonetheless still a worthwhile reference? Section 7.6.1 tunnel selection. The container can also identify the pseudowire (Section 5.2 of [RFC4447]). RFC 4447 is showing up as obsolete, obsoleted by RFC RFC 8077. Section 7.6.2 Is the indentation of the tree diagram correct between "(allocation-type)?" and ":(dhcp-relay)"? I think that dhcp-relay should be at the same level as provider-dhcp -- maybe the implicit 'case' around "container provider-dhcp" is confusing the tooling? Section 7.6.3 When the IPv4 or dual-stack address-family is requested, it is up to the implementation to decide whether OSPFv2 [RFC4577] or Which implementation? The service orchestrator's? (The phrase "up to the implementation" appears at least one other place, as well.) 'authentication': Controls the authentication schemes to be enabled for the OSPF instance. The following options are supported: IPsec for OSPFv3 authentication [RFC4552], authentication trailer for OSPFv2 [RFC5709] [RFC7474] and OSPFv3 [RFC7166]. [...] | | +--rw authentication | | | +--rw enable? boolean | | | +--rw keying-material | | | +--rw (option)? | | | +--:(md5) | | | | +--rw md5-keychain? | | | | kc:key-chain-ref | | | +--:(ipsec) | | | +--rw sa? string I don't think "md5" is the right identifier for the node holding the OSPF authentication-trailer keying material. Section 7.6.6 Interjecting some (sub-?)sub-subtrees and their fields before completing the list of nodes in the "toplevel" subtree makes the narrative somewhat hard to follow. Section 7.7 The model supports a single type of tree: Any-Source Multicast (ASM), Source-Specific Multicast (SSM), or bidirectional. It's surprising (to me) to see that the YANG is not a choice, then, which would be an intuitive fit for "choose exactly one type". (nit) maybe say single type of tree per VPN instance? When a particular VPN using ASM requires a more optimal traffic delivery, 'optimal-traffic-delivery' can be set. When set to 'true', "optimal traffic delivery" sounds like something that every customer is going to want ... if that's what it does, why is it even an option? ;) Section 8 Comments at the end of blocks for what container/etc. is being closed might help readability. typedef area-address { type string { pattern '[0-9A-Fa-f]{2}(\.[0-9A-Fa-f]{4}){0,6}'; I guess this is related to Alvaro's Abstain, but it is very surprising that there is not some preexisting definition of IS-IS area-address that we can import and use. leaf ne-id { type string; description "Unique identifier of the network element where the VPN node is deployed."; When I first saw this I wondered if a union with leafref could be useful, for cases where there were nodes already identified in a different data model. Since this service model operates at a layer that's rather removed from specific devices, though, it's not really clear how often such a case would come up in practice. leaf interface-id { type string; description "Identifier for the physical or logical interface. The identification of the sub-interface is provided at the connection and/or IP connection levels."; (similarly here) container dot1q { when "derived-from-or-self(../type, " + "'vpn-common:dot1q')" { description "Only applies when the type of the tagged interface is 'dot1q'."; } if-feature "vpn-common:dot1q"; The identity itself is conditional on the vpn-common:dot1q feature, so it's not entirely clear to me if there's value in repeating the if-feature stanza here. Likewise for qinq. (A similar scenario arises for the specific routing-protocols, I think.) leaf type { type identityref { base l2-tunnel-type; } description "Selects the tunnel termiantion option for each vpn-network-access."; } container pseudowire { description "Includes pseudowire termination parameters."; Why no "when" stanzas for the pseudowire/vpls/vxlan containers, so they only appear for the relevant tunnel type? choice service-type { description "Choice based on the DHCPv6 service type."; case provider-dhcp-servers { leaf-list server-ip-address { type inet:ipv6-address; description "IPv6 addresses of the provider's DHCPv6 server."; } } case server { I don't think I understand what the distinction is supposed to be between "provider-dhcp-servers" and just "server". It seems like the "server" case is still describing a scenario with provider-run DHCP servers. There doesn't seem to be much discussion in §7.6.2 around Figure 12 to help, either. container bgp-timers { description "Includes two BGP timers that can be customized when building a VPN service with BGP used as CE-PE routing protocol."; leaf keepalive { type uint16 { range "0..21845"; Why is the maximum of 0x5555 hardcoded? RFC 4271 says that "a reasonable maximum time between KEEPALIVE messages would be one third of the Hold Time interval", but that seems like general guidance and not a protocol invariant. leaf ping-reply { type boolean; description "Controls whether the VRRP speaker should answer to ping requests."; What's the default behavior? container ntp { It would be great if we could work in an NTS reference somewhere (RFC 8915). leaf remote-source { type boolean; default "false"; description "When true, there is no PIM adjacency on the interface."; } I think some more description would be very helpful here. E.g., RFC 7761 does not mention "remote" or "adjacency", so it's hard to figure out where to start reading to understand this configuration. Section 9 Thank you for calling out the privacy considerations relating to customer names and IP addresses! I am happy to see that you already answered Roman's question about the sensitivity to write operations of vpn-profiles; thanks for that as well. Thanks as well for adding the note about MD5 security in response to the last-call feedback. I expect that there are some ways in which knowing the internal configuration of the VPN service would make attacking it easier (knowing what DHCP addresses to squat on, internal addresses to target with DoS attack, etc.), but don't see any fundamental or critical aspects that need to be called out specifically. Should we mention that the keychain functionality uses NACM to deny access to the keys, or is that considered "well known" at this point? Section 11+ Regrettably, I ran out of time when reviewing this document. So I didn't really look at the examples or the classification of the references. NITS Section 2 VPN node: An abstraction that represents a set of policies applied on a PE and that belong to a single VPN service. A VPN service involves one or more VPN nodes. As it is an abstraction, the network controller will take on how to implement a VPN node. For example, typically, in a BGP-based VPN, a VPN node could be mapped into a Virtual Routing and Forwarding (VRF). I don't recall seeing "VRF" used in this manner before; I feel like I ususally see "instance" or some other word after it. Section 4 L3VPN service. For example, the customer may supply an IP Connectivity Provisioning Profile (CPP) [RFC7297], an enhanced VPN (VPN+) service [I-D.ietf-teas-enhanced-vpn], or an IETF network slice service [I-D.ietf-teas-ietf-network-slices]. I'm having a hard time finding a parallel structure in "customer may supply [a profile], [a service], or [a service]". Are the latter two items intending to refer to a description or instance of the service in question? Note also that both the L3SM and the L3NM may be used in the context of the Abstraction and Control of TE Networks (ACTN) [RFC8453]. I would expect to see the word "Framework" after ACTN. Section 7.2 each VPN service provider. The model only includes an identifier to these profiles in order to ease identifying and binding local The RFC Editor will no doubt have suggestions here as well, but I think "ease identification and binding of" or "facilitate identifying and binding" would flow better here. Section 7.6 'vpn-instance-profile': Provides a pointer to an active VPN instance profile at the VPN node level. Referencing an active VPN instance profile implies that all associated data nodes will be inherited by the VPN network access. However, some inherited data nodes (e.g., multicast) can be refined at the VPN network access level. In such case, refined values take precedence over inherited ones. IIUC this is not the YANG "refine" directive, so maybe a different word like "overridden" at the VPN network access level, and "local values take precedence over inherited ones", is better? Section 7.6.3 'max-prefix': Indicates the maximum number of BGP prefixes allowed in the BGP session. If the limit is reached, the action indicated in 'action-violate' will be followed. s/action-violate/violate-action/ to match the actual model Section 8 identity discard { base local-defined-next-hop; description "Indicates an action to discard traffic for the corresponding destination. For example, this can be used to blackhole traffic."; I expect that the RFC Editor is going to flag "blackhole" and ask if you really want to use it, on the inclusive-terminology front. grouping vpn-instance-profile { description "Grouping for data nodes that may be factorized among many levels of the model. The grouping can be used to define generic profiles at the VPN service level and then called at the VPN node and VPN network access levels."; I'm not sure whether "called" is a conventional word for this behavior; would "referenced" be accurate? leaf type { type identityref { base vpn-common:encapsulation-type; } default "vpn-common:priority-tagged"; description "Tagged interface type. By default, the type of the tagged interface is 'priority-tagged'."; Given that there's a "vpn-common:untagged-int" identity that is usable here, is "Tagged interface type" really 100% accurate? "Defines a layer 2 tunnel termination. It is only applicable when a tunnel is required. The supported values are: pseudowire, VPLS and, VXLAN. Other values may defined, if needed."; "may be defined" leaf prepend-global-as { type boolean; default "false"; description "In some situations, the ASN that is provided at the VPN node level may be distinct from the one configured at the VPN network access level. When such ASNs are provided, they are both prepended to the BGP route updates for this access. To disable that behavior, the prepend-global-as must be set to 'false'. [...] It's surprising to see "when such ASNs are provided, they are both prepended [...] to disable that behavior" when the default is "false". enum active { description "Interface sends or receives IS-IS protocol control packets."; Maybe s/or/and/? } container encryption-profile { when "../encryption/enabled = 'true'" { description "Indicates the layer on which encryption is enabled."; This description stanza is for the "when" directive, and doesn't seem appropriate for that action. } leaf max-entries { type uint32; description "Indicates the maximum MLD entries."; "maximum number of" |
2021-09-23
|
11 | Benjamin Kaduk | [Ballot Position Update] New position, Discuss, has been recorded for Benjamin Kaduk |
2021-09-23
|
11 | Adrian Farrel | > (1) What type of RFC is being requested > Why is this the proper type of RFC? > Is this type of … > (1) What type of RFC is being requested > Why is this the proper type of RFC? > Is this type of RFC indicated in the title page header? This draft is requested for publication as a Proposed Standard. This is appropriate for a YANG model that will be implemented and must interoperate. The status is properly indicated on the title page. > (2) The IESG approval announcement includes a Document Announcement > Write-Up. > > Technical Summary: This document defines an L3VPN Network YANG Model (L3NM) that can be used for the provisioning of Layer 3 Virtual Private Network (VPN) services within a service provider network. The model provides a network-centric view of L3VPN services. L3NM is meant to be used by a network controller to derive the configuration information that will be sent to relevant network devices. The model can also facilitate the communication between a service orchestrator and a network controller/orchestrator. > Working Group Summary: There was no controversy. This model was driven by implementers seeking to use the L3SM [RFC8309] to provide L3VPN services using orchestrator and controller software. They determined that an intermediary network-centric (rather than service-centric) model was required, and they quickly built support with other implementers. During the later stages of work on this document, it was determined that there was commonality between this model and a model for L2VPN. The common parts were pulled out into a separate model presented in another document. > Document Quality: This document notes four implementations: Nokia, Huawei, Infinera, Ribbon-ECI. The document shepherd is aware of one other commercial implementation and one prototype implementation. > Personnel: Adrian Farrel (adrian@olddog.co.uk) is the Document Shepherd Rob Wilton (rwilton@cisco.com) iss the Responsible Area Director > (3) Briefly describe the review of this document that was performed > by the Document Shepherd. If this version of the document is not > ready for publication, please explain why the document is being > forwarded to the IESG. I reviewed this draft in detail during WG last call and all of the issues I raised have been addressed. I have done a quick review of the most recent version mainly focused on the changes. This version is ready for publication. > (4) Does the document Shepherd have any concerns about the depth or > breadth of the reviews that have been performed? No concerns. Indeed, the number of implementers participating has resulted in a deep and broad review. > (5) Do portions of the document need review from a particular or from > broader perspective? If so, describe the review that took place. This document contains a YANG model and so review by YANG specialists is in order. An early YANG Doctor review was conducted on -03 by Radek Krejci and the issues raised were fixed. A subsequent YANG Doctor review on -07 at WG last call was also done by Radek Krejci. It found only one simple nit, and this has been fixed in the current version. > (6) Describe any specific concerns or issues that the Document > Shepherd has with this document that the Responsible Area Director > and/or the IESG should be aware of? No issues. > (7) Has each author confirmed that any and all appropriate IPR > disclosures required for full conformance with the provisions of > BCP 78 and BCP 79 have already been filed. All authors and contributors have so confirmed. IPR protestations can be found on the thread https://mailarchive.ietf.org/arch/msg/opsawg/ajoTnvgF5YuYtnUk1Li5BdnBJxQ/ This records no known IPR from the full set of: Authors: Oscar Gonzalez de Dios, Mohamed Boucadair, Samier Barguil Giraldo, Qin Wu, Alejandro Aguado Contributors: Victor Lopez, Erez Segev One Contributor (Luis Angel Munoz) notes no IPR on the thread https://mailarchive.ietf.org/arch/msg/opsawg/3U-FxleAm739Zx4gMAHw3eWLIdw/ The final Contributor (Lucia Oliva) reports no IPR on the thread https://mailarchive.ietf.org/arch/msg/opsawg/x-oi9vLlEWgUpP_yu827SJ7CWPs/ > (8) Has an IPR disclosure been filed that references this document? No IPR disclosed. > (9) How solid is the WG consensus behind this document? Does it > represent the strong concurrence of a few individuals, with others > being silent, or does the WG as a whole understand and agree with > it? OPSAWG is an odd WG in that it has several different communities of interest that rarely cross-review work. As a result, judging broad consensus in the WG is a challenge. Nevertheless, the enthusiastic participation by a long list of authors and contributors, the frequent open design team tele-meetings, and the additional reviews from five people during last call with no major objections, suggest good consensus. While the design teams were well-attended, they left some visibility holes concerning the work and failed to report back to the broader WG. This has been corrected with regular readouts on the mailing list, as well as requests to the mailing list for input on decisions. > (10) Has anyone threatened an appeal or otherwise indicated extreme > discontent? No discontent voiced. > (11) Identify any ID nits the Document Shepherd has found in this > document. idnits is clean. The warnings have been checked and found to be benign. > (12) Describe how the document meets any required formal review > criteria. See (5) for YANG Doctor reviews. YANG validation (in the datatracker) shows 0 errors, 0 warnings > (13) Have all references within this document been identified as > either normative or informative? Yes. Both normative and informative references are present. > (14) Are there normative references to documents that are not ready > for advancement or are otherwise in an unclear state? One normative reference is to draft-ietf-opsawg-vpn-common. This is a partner document that is moving forward at the same time. It is ready for advancement. All other normative references are to RFCs. > (15) Are there downward normative references references (see > RFC 3967)? If so, list these downward references to support the > Area Director in the Last Call procedure. No downrefs. > (16) Will publication of this document change the status of any > existing RFCs? No status changes. > (17) Describe the Document Shepherd's review of the IANA > considerations section, especially with regard to its consistency > with the body of the document. Confirm that all protocol > extensions that the document makes are associated with the > appropriate reservations in IANA registries. Confirm that any > referenced IANA registries have been clearly identified. Confirm > that newly created IANA registries include a detailed > specification of the initial contents for the registry, that > allocations procedures for future registrations are defined, and > a reasonable name for the new registry has been suggested (see > RFC 8126). The IANA section is simple. It requests assignments from two clearly identified registries in accordance with the allocation procedures for those registries. No new registries are created. > (18) List any new IANA registries that require Expert Review for > future allocations. None. > (19) Describe reviews and automated checks performed by the Document > Shepherd to validate sections of the document written in a formal > language. The datatracker YANG validation is clean. See (12) and (20) > (20) If the document contains a YANG module, has the module been > checked with any of the recommended validation tools > (https://trac.ietf.org/trac/ops/wiki/yang-review-tools) for > syntax and formatting validation? > Does the YANG module comply with the Network Management Datastore > Architecture (NMDA) as specified in RFC8342? The YANG validation results are clean. To the best of my knowledge, the model complies with the NMDA. |
2021-09-22
|
11 | Murray Kucherawy | [Ballot Position Update] New position, No Objection, has been recorded for Murray Kucherawy |
2021-09-22
|
11 | Warren Kumari | [Ballot comment] I am abstaining for similar reasons to Alvaro -- there are inconsistencies that make deriving the mapping between the model and implementations tricky. … [Ballot comment] I am abstaining for similar reasons to Alvaro -- there are inconsistencies that make deriving the mapping between the model and implementations tricky. However, I don't really think that that is the "fault" of this document, but rather is an artifact of the fact that there are so many different "types" of VPNs, and every standard/implementation/vendor has their own special knobs and features. This makes creating a generic model largely impossible - it either needs to be so restrictive that it is basically pointless, or so comprehensive that it is unwieldily. I think that this document did a good job of trying to thread this needle (and I thank/congratulate the authors), but I still think that it is not really usable. I also support Erik's discuss on Sec 7.6.2 -- this is also (I think) an artifact of trying to cover both too much and too little. |
2021-09-22
|
11 | Warren Kumari | [Ballot Position Update] New position, Abstain, has been recorded for Warren Kumari |
2021-09-22
|
11 | Erik Kline | [Ballot discuss] [general] * I'm sure there are plenty things I'm not understanding, and probably these things are easy to address. But in general … [Ballot discuss] [general] * I'm sure there are plenty things I'm not understanding, and probably these things are easy to address. But in general I feel like there could be some tension between needing to specify/model the L3 attributes that are used to provision both the endpoint and the clients with a possibly somewhat cleaner separation for holding client IP provisioning info. At what point, for example, should there be something like a separate "client-ip-provisioning-profile" string that is referenced? I think some of the richness of what can be expressed in IPv6 RAs may be bringing these ideas up, some of which can be expressed in DHCP as well but operationally may be less common. The contents of RIOs in particular seem like a bit of client provisioning information that an endpoint might need to be aware of as well. [S7.6.2] * Provisioning IPv6 clients can be more rich than the DHCPv6/SLAAC model noted here (and much more so than IPv4/DHCPv4). Since you document how local-address/prefix-length becomes a PIO, should there be other related IP connectivity provisioning information in here, like: * more than just one PIO? (is this just repeated ip-connection/ipv6 entries, one for each on-link prefix?) * one or more RIOs that might need to be advertised to clients? * others (PVDIO, ...)? If this is "out of scope" for this document, where does it belong in the overall provisioning of an L3VPN service (out of curiosity, given that this document kinda models DHCP IP allocation ranges)? [S8] * Under provider DHCPv6 servers, the server definition has an "address-assign" choice of "number" with a "number-of-dynamic-address" (defaulting to "1"), but the description talks about the number of allocated prefixes. Should this value be "number-of-dynamic-prefixes" instead? * Which of these elements describes whether or not DHCPv6 PD (Prefix Delegation) is enabled, and the prefix pools used? |
2021-09-22
|
11 | Erik Kline | [Ballot comment] [S7.2, nit] * "refers to as set of policies" -> "refers to a set of policies" [S7.3, nit] * "a P node … [Ballot comment] [S7.2, nit] * "refers to as set of policies" -> "refers to a set of policies" [S7.3, nit] * "a P node or event a dedicated node" -> "a P node or even a dedicated node" [S7.4, nit] * "Indicates the maximum prefixes" -> "Indicates the maximum number of prefixes", perhaps? [S7.6.1, nit] * "is the layer two connections" -> "is the layer two connection" (although this sentence may be redundant with the one two sentences prior) [S7.6.6, nit] * "carrierscarrier" -> "carriers-carrier" |
2021-09-22
|
11 | Erik Kline | [Ballot Position Update] New position, Discuss, has been recorded for Erik Kline |
2021-09-22
|
11 | Alvaro Retana | [Ballot comment] I understand that L3NM is not a device model and that, as such, it is not intended to include every possible parameter. However, … [Ballot comment] I understand that L3NM is not a device model and that, as such, it is not intended to include every possible parameter. However, not leveraging existing work has resulted in inconsistencies: from using different names to changing implementation expectations. I believe that this result impacts the implementation-specific work needed to derive device-specific actions (using existing models) and potentially reduces the value of using this network model. Many WGs in the routing area work on related technology, including bess, idr, lsr, pim, bfd, rtgwg, and teas. However, I found no evidence in the archives that any of these WGs were consulted or asked to review this work. Both points (lack of reuse and lack of review) have been mentioned in the mailing list, so I assume they have been considered. This fact and the existence of multiple implementations lead me to ABSTAIN. |
2021-09-22
|
11 | Alvaro Retana | [Ballot Position Update] New position, Abstain, has been recorded for Alvaro Retana |
2021-09-22
|
11 | Zaheduzzaman Sarker | [Ballot discuss] This specification refers to ietf-opsawg-vpn-common for qos related matching, hence I am raising similar discussion as I had for ietf-opsawg-vpn-common (see here https://datatracker.ietf.org/doc/draft-ietf-opsawg-vpn-common/ … [Ballot discuss] This specification refers to ietf-opsawg-vpn-common for qos related matching, hence I am raising similar discussion as I had for ietf-opsawg-vpn-common (see here https://datatracker.ietf.org/doc/draft-ietf-opsawg-vpn-common/). This specification specifies qos classification based on L4 criteria and describes the procedure for TCP and UDP. It is possible that new L4 protocols (for example QUIC) use UDP as substrate hence can create ambiguity based of the procedure described in the specification. This specification should consider such potential substrate usage of L4 protocols (specially UDP) and hint on the potential augmentations (there might be several ways to do that) or scope it down to not support such cases. |
2021-09-22
|
11 | Zaheduzzaman Sarker | [Ballot comment] Thanks to the authors for their efforts in the specification. Additional comment(s)- * I think if would be good if this specification also … [Ballot comment] Thanks to the authors for their efforts in the specification. Additional comment(s)- * I think if would be good if this specification also discusses the implication of wrong classification (e.g. for qos) based on the model specified here (no particular suggestion from me where but may be in security considerations). |
2021-09-22
|
11 | Zaheduzzaman Sarker | [Ballot Position Update] New position, Discuss, has been recorded for Zaheduzzaman Sarker |
2021-09-20
|
11 | Lars Eggert | [Ballot comment] It would be useful to summarize this document's relationship to RFC8299 in the abstract. ------------------------------------------------------------------------------- All comments below are about very minor potential … [Ballot comment] It would be useful to summarize this document's relationship to RFC8299 in the abstract. ------------------------------------------------------------------------------- All comments below are about very minor potential issues that you may choose to address in some way - or ignore - as you see fit. Some were flagged by automated tools (via https://github.com/larseggert/ietf-reviewtool), so there will likely be some false positives. There is no need to let me know what you did with these suggestions. Section 7.6.3. , paragraph 43, nit: > icates which BFD flavor is used to setup the session (e.g., classic BFD [RFC > ^^^^^ The verb "set up" is spelled as two words. The noun "setup" is spelled as one. Section 7.7. , paragraph 1, nit: > y applicable if both RP redundancy and and delivery through optimal path are > ^^^^^^^ Possible typo: you repeated a word. Section 8. , paragraph 8, nit: > VPLS and, VXLAN. Other values may defined, if needed."; leaf type { type ide > ^^^^^^^ The modal verb "may" requires the verb's base form. Section 8. , paragraph 32, nit: > cription "Reference to the TCP-AO key chain."; reference "RFC 8177: YANG Key > ^^^^^^^^^ This word is normally spelled as one. Section 8. , paragraph 32, nit: > description "Reference to the MD5 key chain."; reference "RFC 8177: YANG Key > ^^^^^^^^^ This word is normally spelled as one. Section 8. , paragraph 32, nit: > f; description "Customer-supplied key chain."; } } } } } container service { > ^^^^^^^^^ This word is normally spelled as one. Section 8. , paragraph 32, nit: > cast static source/group associated to to IGMP session"; leaf group-addr { ty > ^^^^^ Possible typo: you repeated a word. Document references draft-ietf-opsawg-vpn-common-09, but -10 is the latest available revision. Obsolete reference to RFC4447, obsoleted by RFC8077 (this may be on purpose). These URLs point to tools.ietf.org, which is being deprecated: * http://tools.ietf.org/wg/opsawg/ |
2021-09-20
|
11 | Lars Eggert | [Ballot Position Update] New position, No Objection, has been recorded for Lars Eggert |
2021-09-19
|
11 | Roman Danyliw | [Ballot comment] Thank you to Rifaat Shekh-Yusef for the SECDIR review. To the authors: the explanatory text in Sections 4 and 7 made this large … [Ballot comment] Thank you to Rifaat Shekh-Yusef for the SECDIR review. To the authors: the explanatory text in Sections 4 and 7 made this large YANG model very accessible. It's sometimes hard to find the right balance between the text narrative and letting the model speak for itself, but this document negotiated it well. ** Section 7.6.5. Could we ever end up in a situation where security/enabled=True but the key-chain-ref pointed a key-chain who’s crypto-algorithm was cleartext? ** Section 9. In addition to sensitivity of customer-name and ip-connection to read operation, wouldn’t the corresponding topology information revealed by pretty much everything in vpn-service also be of concern? ** Section 9. The text enumerating sensitive read operations provides no caution about protecting the various key material. RFC8177 is cited later, but as noted in the DISCUSS, the suggested key wrap primitive is not usable with instances of “key” as the hex-key-string feature is not supported. ** Typos: Section 7.5. Typo. s/rendez-vous/rendezvous/ YANG. A few places. s/adresss/addresses/ YANG. Typo. s/oubtound/outbound/ |
2021-09-19
|
11 | Roman Danyliw | Ballot comment text updated for Roman Danyliw |
2021-09-19
|
11 | Roman Danyliw | [Ballot discuss] ** RFC8177 already defines a container to represent an individual key -- key-string – as both a string and hex format. Additionally, this … [Ballot discuss] ** RFC8177 already defines a container to represent an individual key -- key-string – as both a string and hex format. Additionally, this representation has built in ACLs to protect it. This model appears to maximize flexibility by supporting both key-chains and an explicit key for protocols like BGP, RIP and ISIS. Is there a reason why this model does not (or perhaps cannot) reuse the key-string representation from RFC8177 (the same way key-chain is)? And/or to not provide the flexibility for a hex encoded key? ** Section 9. The text notes that ‘vpn-service’ is sensitive to write operations. Wouldn’t ‘vpn-profiles’ be equally sensitive to alterations with similar consequences? For example, altering an encryption-profile-identifier could change the algorithm chosen or the key. |
2021-09-19
|
11 | Roman Danyliw | [Ballot comment] Thank you to Rifaat Shekh-Yusef for the SECDIR review. To the authors: the explanatory text in Sections 4 and 7 made this large … [Ballot comment] Thank you to Rifaat Shekh-Yusef for the SECDIR review. To the authors: the explanatory text in Sections 4 and 7 made this large YANG model accessible and understandable. It's sometimes hard to find the right balance between the text narrative and letting the model speak for itself, but this document negotiated it well. ** Section 7.6.5. Could we ever end up in a situation where security/enabled=True but the key-chain-ref pointed a key-chain who’s crypto-algorithm was cleartext? ** Section 9. In addition to sensitivity of customer-name and ip-connection to read operation, wouldn’t the corresponding topology information revealed by pretty much everything in vpn-service also be of concern? ** Section 9. The text enumerating sensitive read operations provides no caution about protecting the various key material. RFC8177 is cited later, but as noted in the DISCUSS, the suggested key wrap primitive is not usable with instances of “key” as the hex-key-string feature is not supported. ** Typos: Section 7.5. Typo. s/rendez-vous/rendezvous/ YANG. A few places. s/adresss/addresses/ YANG. Typo. s/oubtound/outbound/ |
2021-09-19
|
11 | Roman Danyliw | [Ballot Position Update] New position, Discuss, has been recorded for Roman Danyliw |
2021-09-19
|
11 | Martin Duke | [Ballot discuss] (7.6.3) Is there a reason the TCP-AO model in this draft is different from the one in draft-ietf-idr-bgp-model-11? That draft is using … [Ballot discuss] (7.6.3) Is there a reason the TCP-AO model in this draft is different from the one in draft-ietf-idr-bgp-model-11? That draft is using a model developed in the TCPM WG (draft-ietf-tcpm-yang-tcp) specifically for that purpose. If there is no compelling requirement for something different, or the TCPM modelling work can be stretched to cover this use case as well, it would be far better than rolling a totally separate TCP YANG model here. |
2021-09-19
|
11 | Martin Duke | [Ballot Position Update] New position, Discuss, has been recorded for Martin Duke |
2021-09-16
|
11 | Jean Mahoney | Request for Early review by GENART is assigned to Pete Resnick |
2021-09-16
|
11 | Jean Mahoney | Request for Early review by GENART is assigned to Pete Resnick |
2021-09-15
|
11 | Amanda Baber | IANA Review state changed to IANA OK - Actions Needed from Version Changed - Review Needed |
2021-09-10
|
11 | Cindy Morgan | Placed on agenda for telechat - 2021-09-23 |
2021-09-10
|
11 | Robert Wilton | Ballot has been issued |
2021-09-10
|
11 | Robert Wilton | [Ballot Position Update] New position, Yes, has been recorded for Robert Wilton |
2021-09-10
|
11 | Robert Wilton | Created "Approve" ballot |
2021-09-10
|
11 | Robert Wilton | IESG state changed to IESG Evaluation from Waiting for Writeup |
2021-09-10
|
11 | Robert Wilton | Ballot writeup was changed |
2021-09-09
|
11 | (System) | IANA Review state changed to Version Changed - Review Needed from IANA OK - Actions Needed |
2021-09-09
|
11 | Mohamed Boucadair | New version available: draft-ietf-opsawg-l3sm-l3nm-11.txt |
2021-09-09
|
11 | (System) | New version accepted (logged-in submitter: Mohamed Boucadair) |
2021-09-09
|
11 | Mohamed Boucadair | Uploaded new revision |
2021-09-09
|
10 | Jean Mahoney | Requested Early review by GENART |
2021-09-09
|
10 | Jean Mahoney | Closed request for Last Call review by GENART with state 'Team Will not Review Version' |
2021-09-09
|
10 | Jean Mahoney | Assignment of request for Last Call review by GENART to Vijay Gurbani was marked no-response |
2021-08-14
|
10 | Wesley Eddy | Request closed, assignment withdrawn: Brian Trammell Last Call TSVART review |
2021-08-14
|
10 | Wesley Eddy | Closed request for Last Call review by TSVART with state 'Withdrawn' |
2021-08-06
|
10 | (System) | IESG state changed to Waiting for Writeup from In Last Call |
2021-08-04
|
10 | Sabrina Tanamal | IANA Experts State changed to Expert Reviews OK from Reviews assigned |
2021-08-04
|
10 | Sabrina Tanamal | IANA Review state changed to IANA OK - Actions Needed from IANA - Not OK |
2021-08-03
|
10 | Qin Wu | Request for Last Call review by OPSDIR Completed: Has Nits. Reviewer: Qin Wu. Sent review to list. |
2021-07-27
|
10 | Sabrina Tanamal | IANA Experts State changed to Reviews assigned |
2021-07-27
|
10 | (System) | IANA Review state changed to IANA - Not OK from IANA - Review Needed |
2021-07-27
|
10 | Sabrina Tanamal | (Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs: The IANA Functions Operator has completed its review of draft-ietf-opsawg-l3sm-l3nm-10. If any part of this review is inaccurate, please let … (Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs: The IANA Functions Operator has completed its review of draft-ietf-opsawg-l3sm-l3nm-10. If any part of this review is inaccurate, please let us know. The IANA Functions Operator understands that, upon approval of this document, there are two actions which we must complete. First, in the ns registry on the IETF XML Registry page located at: https://www.iana.org/assignments/xml-registry/ a new namespace will be registered as follows: ID: yang:ietf-l3vpn-ntw URI: urn:ietf:params:xml:ns:yang:ietf-l3vpn-ntw Filename: [ TBD-at-Registration ] Reference: [ RFC-to-be ] As this document requests registrations in a Specification Required (see RFC 8126) registry, we will initiate the required Expert Review via a separate request. This review must be completed before the document's IANA state can be changed to "IANA OK." Second, in the YANG Module Names registry on the YANG Parameters registry page located at: https://www.iana.org/assignments/yang-parameters/ a new YANG module will be registered as follows: Name: ietf-l3vpn-ntw File: [ TBD-at-Registration ] Maintained by IANA? N Namespace: urn:ietf:params:xml:ns:yang:ietf-l3vpn-ntw Prefix: l3nm Module: Reference: [ RFC-to-be ] While the YANG module name will be registered after the IESG approves the document, the YANG module file will be posted after the RFC Editor notifies us that the document has been published. The IANA Services Operator understands that these are the only actions required to be completed upon approval of this document. Note: The actions requested in this document will not be completed until the document has been approved for publication as an RFC. This message is meant only to confirm the list of actions that will be performed. Thank you, Sabrina Tanamal Senior IANA Services Specialist |
2021-07-25
|
10 | Rifaat Shekh-Yusef | Request for Last Call review by SECDIR Completed: Has Issues. Reviewer: Rifaat Shekh-Yusef. Sent review to list. |
2021-07-23
|
10 | Tero Kivinen | Request for Last Call review by SECDIR is assigned to Rifaat Shekh-Yusef |
2021-07-23
|
10 | Tero Kivinen | Request for Last Call review by SECDIR is assigned to Rifaat Shekh-Yusef |
2021-07-23
|
10 | Jean Mahoney | Request for Last Call review by GENART is assigned to Vijay Gurbani |
2021-07-23
|
10 | Jean Mahoney | Request for Last Call review by GENART is assigned to Vijay Gurbani |
2021-07-23
|
10 | Tirumaleswar Reddy.K | Assignment of request for Last Call review by SECDIR to Tirumaleswar Reddy.K was rejected |
2021-07-21
|
10 | Magnus Westerlund | Request for Last Call review by TSVART is assigned to Brian Trammell |
2021-07-21
|
10 | Magnus Westerlund | Request for Last Call review by TSVART is assigned to Brian Trammell |
2021-07-21
|
10 | Andy Malis | Request for Last Call review by RTGDIR Completed: Ready. Reviewer: Andy Malis. |
2021-07-19
|
10 | Tero Kivinen | Closed request for Last Call review by SECDIR with state 'Withdrawn' |
2021-07-19
|
10 | Tero Kivinen | Assignment of request for Last Call review by SECDIR to Aanchal Malhotra was marked no-response |
2021-07-19
|
10 | Tero Kivinen | Request for Last Call review by SECDIR is assigned to Tirumaleswar Reddy.K |
2021-07-19
|
10 | Tero Kivinen | Request for Last Call review by SECDIR is assigned to Tirumaleswar Reddy.K |
2021-07-19
|
10 | Gunter Van de Velde | Request for Last Call review by OPSDIR is assigned to Qin Wu |
2021-07-19
|
10 | Gunter Van de Velde | Request for Last Call review by OPSDIR is assigned to Qin Wu |
2021-07-16
|
10 | Luc André Burdet | Request for Last Call review by RTGDIR is assigned to Andy Malis |
2021-07-16
|
10 | Luc André Burdet | Request for Last Call review by RTGDIR is assigned to Andy Malis |
2021-07-16
|
10 | Alvaro Retana | Requested Last Call review by RTGDIR |
2021-07-16
|
10 | Amy Vezza | IANA Review state changed to IANA - Review Needed |
2021-07-16
|
10 | Amy Vezza | The following Last Call announcement was sent out (ends 2021-08-06): From: The IESG To: IETF-Announce CC: adrian@olddog.co.uk, draft-ietf-opsawg-l3sm-l3nm@ietf.org, opsawg-chairs@ietf.org, opsawg@ietf.org, rwilton@cisco.com … The following Last Call announcement was sent out (ends 2021-08-06): From: The IESG To: IETF-Announce CC: adrian@olddog.co.uk, draft-ietf-opsawg-l3sm-l3nm@ietf.org, opsawg-chairs@ietf.org, opsawg@ietf.org, rwilton@cisco.com Reply-To: last-call@ietf.org Sender: Subject: Last Call: (A Layer 3 VPN Network YANG Model) to Proposed Standard The IESG has received a request from the Operations and Management Area Working Group WG (opsawg) to consider the following document: - 'A Layer 3 VPN Network YANG Model' as Proposed Standard The IESG plans to make a decision in the next few weeks, and solicits final comments on this action. Please send substantive comments to the last-call@ietf.org mailing lists by 2021-08-06. Exceptionally, comments may be sent to iesg@ietf.org instead. In either case, please retain the beginning of the Subject line to allow automated sorting. Abstract This document defines an L3VPN Network YANG Model (L3NM) that can be used for the provisioning of Layer 3 Virtual Private Network (VPN) services within a service provider network. The model provides a network-centric view of L3VPN services. L3NM is meant to be used by a network controller to derive the configuration information that will be sent to relevant network devices. The model can also facilitate the communication between a service orchestrator and a network controller/orchestrator. The file can be obtained via https://datatracker.ietf.org/doc/draft-ietf-opsawg-l3sm-l3nm/ No IPR declarations have been submitted directly on this I-D. |
2021-07-16
|
10 | Amy Vezza | IESG state changed to In Last Call from Last Call Requested |
2021-07-16
|
10 | Amy Vezza | Last call announcement was changed |
2021-07-16
|
10 | Robert Wilton | Last call was requested |
2021-07-16
|
10 | Robert Wilton | Ballot approval text was generated |
2021-07-16
|
10 | Robert Wilton | Ballot writeup was generated |
2021-07-16
|
10 | Robert Wilton | IESG state changed to Last Call Requested from AD Evaluation::AD Followup |
2021-07-16
|
10 | Robert Wilton | Last call announcement was generated |
2021-07-15
|
10 | (System) | Changed action holders to Robert Wilton (IESG state changed) |
2021-07-15
|
10 | (System) | Sub state has been changed to AD Followup from Revised ID Needed |
2021-07-15
|
10 | Mohamed Boucadair | New version available: draft-ietf-opsawg-l3sm-l3nm-10.txt |
2021-07-15
|
10 | (System) | Forced post of submission |
2021-07-15
|
10 | (System) | Request for posting confirmation emailed to previous authors: Alejandro Aguado , Luis Munoz , Mohamed Boucadair , Oscar de Dios , samier barguil |
2021-07-15
|
10 | Mohamed Boucadair | Uploaded new revision |
2021-07-12
|
10 | (System) | Request for posting confirmation emailed to previous authors: Alejandro Aguado , Luis Munoz , Mohamed Boucadair , Oscar de Dios , samier barguil |
2021-07-12
|
10 | Mohamed Boucadair | Uploaded new revision |
2021-07-12
|
09 | (System) | Changed action holders to Oscar de Dios, Mohamed Boucadair, Robert Wilton, Alejandro Aguado, Luis Munoz, samier barguil (IESG state changed) |
2021-07-12
|
09 | Robert Wilton | IESG state changed to AD Evaluation::Revised I-D Needed from Publication Requested |
2021-05-19
|
09 | Mohamed Boucadair | New version available: draft-ietf-opsawg-l3sm-l3nm-09.txt |
2021-05-19
|
09 | (System) | New version approved |
2021-05-19
|
09 | (System) | Request for posting confirmation emailed to previous authors: Alejandro Aguado , Luis Munoz , Mohamed Boucadair , Oscar de Dios , samier barguil |
2021-05-19
|
09 | Mohamed Boucadair | Uploaded new revision |
2021-05-03
|
08 | Joe Clarke | > (1) What type of RFC is being requested > Why is this the proper type of RFC? > Is this type of … > (1) What type of RFC is being requested > Why is this the proper type of RFC? > Is this type of RFC indicated in the title page header? This draft is requested for publication as a Draft Standard. This is appropriate for a YANG model that will be implemented and must interoperate. The status is properly indicated on the title page. > (2) The IESG approval announcement includes a Document Announcement > Write-Up. > > Technical Summary: This document defines an L3VPN Network YANG Model (L3NM) that can be used for the provisioning of Layer 3 Virtual Private Network (VPN) services within a service provider network. The model provides a network-centric view of L3VPN services. L3NM is meant to be used by a network controller to derive the configuration information that will be sent to relevant network devices. The model can also facilitate the communication between a service orchestrator and a network controller/orchestrator. > Working Group Summary: There was no controversy. This model was driven by implementers seeking to use the L3SM [RFC8309] to provide L3VPN services using orchestrator and controller software. They determined that an intermediary network-centric (rather than service-centric) model was required, and they quickly built support with other implementers. During the later stages of work on this document, it was determined that there was commonality between this model and a model for L2VPN. The common parts were pulled out into a separate model presented in another document. > Document Quality: This document notes four implementations: Nokia, Huawei, Infinera, Ribbon-ECI. The document shepherd is aware of one other commercial implementation and one prototype implementation. > Personnel: Adrian Farrel (adrian@olddog.co.uk) is the Document Shepherd Rob Wilton (rwilton@cisco.com) iss the Responsible Area Director > (3) Briefly describe the review of this document that was performed > by the Document Shepherd. If this version of the document is not > ready for publication, please explain why the document is being > forwarded to the IESG. I reviewed this draft in detail during WG last call and all of the issues I raised have been addressed. I have done a quick review of the most recent version mainly focused on the changes. This version is ready for publication. > (4) Does the document Shepherd have any concerns about the depth or > breadth of the reviews that have been performed? No concerns. Indeed, the number of implementers participating has resulted in a deep and broad review. > (5) Do portions of the document need review from a particular or from > broader perspective? If so, describe the review that took place. This document contains a YANG model and so review by YANG specialists is in order. An early YANG Doctor review was conducted on -03 by Radek Krejci and the issues raised were fixed. A subsequent YANG Doctor review on -07 at WG last call was also done by Radek Krejci. It found only one simple nit, and this has been fixed in the current version. > (6) Describe any specific concerns or issues that the Document > Shepherd has with this document that the Responsible Area Director > and/or the IESG should be aware of? No issues. > (7) Has each author confirmed that any and all appropriate IPR > disclosures required for full conformance with the provisions of > BCP 78 and BCP 79 have already been filed. All authors and contributors have so confirmed. IPR protestations can be found on the thread https://mailarchive.ietf.org/arch/msg/opsawg/ajoTnvgF5YuYtnUk1Li5BdnBJxQ/ This records no known IPR from the full set of: Authors: Oscar Gonzalez de Dios, Mohamed Boucadair, Samier Barguil Giraldo, Qin Wu, Alejandro Aguado Contributors: Victor Lopez, Erez Segev One Contributor (Luis Angel Munoz) notes no IPR on the thread https://mailarchive.ietf.org/arch/msg/opsawg/3U-FxleAm739Zx4gMAHw3eWLIdw/ The final Contributor (Lucia Oliva) reports no IPR on the thread https://mailarchive.ietf.org/arch/msg/opsawg/x-oi9vLlEWgUpP_yu827SJ7CWPs/ > (8) Has an IPR disclosure been filed that references this document? No IPR disclosed. > (9) How solid is the WG consensus behind this document? Does it > represent the strong concurrence of a few individuals, with others > being silent, or does the WG as a whole understand and agree with > it? OPSAWG is an odd WG in that it has several different communities of interest that rarely cross-review work. As a result, judging broad consensus in the WG is a challenge. Nevertheless, the enthusiastic participation by a long list of authors and contributors, the frequent open design team tele-meetings, and the additional reviews from five people during last call with no major objections, suggest good consensus. While the design teams were well-attended, they left some visibility holes concerning the work and failed to report back to the broader WG. This has been corrected with regular readouts on the mailing list, as well as requests to the mailing list for input on decisions. > (10) Has anyone threatened an appeal or otherwise indicated extreme > discontent? No discontent voiced. > (11) Identify any ID nits the Document Shepherd has found in this > document. idnits is clean. The warnings have been checked and found to be benign. > (12) Describe how the document meets any required formal review > criteria. See (5) for YANG Doctor reviews. YANG validation (in the datatracker) shows 0 errors, 0 warnings > (13) Have all references within this document been identified as > either normative or informative? Yes. Both normative and informative references are present. > (14) Are there normative references to documents that are not ready > for advancement or are otherwise in an unclear state? One normative reference is to draft-ietf-opsawg-vpn-common. This is a partner document that is moving forward at the same time. It is ready for advancement. All other normative references are to RFCs. > (15) Are there downward normative references references (see > RFC 3967)? If so, list these downward references to support the > Area Director in the Last Call procedure. No downrefs. > (16) Will publication of this document change the status of any > existing RFCs? No status changes. > (17) Describe the Document Shepherd's review of the IANA > considerations section, especially with regard to its consistency > with the body of the document. Confirm that all protocol > extensions that the document makes are associated with the > appropriate reservations in IANA registries. Confirm that any > referenced IANA registries have been clearly identified. Confirm > that newly created IANA registries include a detailed > specification of the initial contents for the registry, that > allocations procedures for future registrations are defined, and > a reasonable name for the new registry has been suggested (see > RFC 8126). The IANA section is simple. It requests assignments from two clearly identified registries in accordance with the allocation procedures for those registries. No new registries are created. > (18) List any new IANA registries that require Expert Review for > future allocations. None. > (19) Describe reviews and automated checks performed by the Document > Shepherd to validate sections of the document written in a formal > language. The datatracker YANG validation is clean. See (12) and (20) > (20) If the document contains a YANG module, has the module been > checked with any of the recommended validation tools > (https://trac.ietf.org/trac/ops/wiki/yang-review-tools) for > syntax and formatting validation? > Does the YANG module comply with the Network Management Datastore > Architecture (NMDA) as specified in RFC8342? The YANG validation results are clean. To the best of my knowledge, the model complies with the NMDA. |
2021-05-03
|
08 | Joe Clarke | Responsible AD changed to Robert Wilton |
2021-05-03
|
08 | Joe Clarke | IETF WG state changed to Submitted to IESG for Publication from WG Consensus: Waiting for Write-Up |
2021-05-03
|
08 | Joe Clarke | IESG state changed to Publication Requested from I-D Exists |
2021-05-03
|
08 | Joe Clarke | IESG process started in state Publication Requested |
2021-05-03
|
08 | Joe Clarke | Tag Revised I-D Needed - Issue raised by WGLC cleared. |
2021-05-03
|
08 | Ron Bonica | Request for Last Call review by INTDIR Completed: Ready. Reviewer: Ron Bonica. Sent review to list. |
2021-05-03
|
08 | Adrian Farrel | > (1) What type of RFC is being requested > Why is this the proper type of RFC? > Is this type of … > (1) What type of RFC is being requested > Why is this the proper type of RFC? > Is this type of RFC indicated in the title page header? This draft is requested for publication as a Draft Standard. This is appropriate for a YANG model that will be implemented and must interoperate. The status is properly indicated on the title page. > (2) The IESG approval announcement includes a Document Announcement > Write-Up. > > Technical Summary: This document defines an L3VPN Network YANG Model (L3NM) that can be used for the provisioning of Layer 3 Virtual Private Network (VPN) services within a service provider network. The model provides a network-centric view of L3VPN services. L3NM is meant to be used by a network controller to derive the configuration information that will be sent to relevant network devices. The model can also facilitate the communication between a service orchestrator and a network controller/orchestrator. > Working Group Summary: There was no controversy. This model was driven by implementers seeking to use the L3SM [RFC8309] to provide L3VPN services using orchestrator and controller software. They determined that an intermediary network-centric (rather than service-centric) model was required, and they quickly built support with other implementers. During the later stages of work on this document, it was determined that there was commonality between this model and a model for L2VPN. The common parts were pulled out into a separate model presented in another document. > Document Quality: This document notes four implementations: Nokia, Huawei, Infinera, Ribbon-ECI. The document shepherd is aware of one other commercial implementation and one prototype implementation. > Personnel: Adrian Farrel (adrian@olddog.co.uk) is the Document Shepherd Rob Wilton (rwilton@cisco.com) iss the Responsible Area Director > (3) Briefly describe the review of this document that was performed > by the Document Shepherd. If this version of the document is not > ready for publication, please explain why the document is being > forwarded to the IESG. I reviewed this draft in detail during WG last call and all of the issues I raised have been addressed. I have done a quick review of the most recent version mainly focused on the changes. This version is ready for publication. > (4) Does the document Shepherd have any concerns about the depth or > breadth of the reviews that have been performed? No concerns. Indeed, the number of implementers participating has resulted in a deep and broad review. > (5) Do portions of the document need review from a particular or from > broader perspective? If so, describe the review that took place. This document contains a YANG model and so review by YANG specialists is in order. An early YANG Doctor review was conducted on -03 by Radek Krejci and the issues raised were fixed. A subsequent YANG Doctor review on -07 at WG last call was also done by Radek Krejci. It found only one simple nit, and this has been fixed in the current version. > (6) Describe any specific concerns or issues that the Document > Shepherd has with this document that the Responsible Area Director > and/or the IESG should be aware of? No issues. > (7) Has each author confirmed that any and all appropriate IPR > disclosures required for full conformance with the provisions of > BCP 78 and BCP 79 have already been filed. All authors and contributors have so confirmed. IPR protestations can be found on the thread https://mailarchive.ietf.org/arch/msg/opsawg/ajoTnvgF5YuYtnUk1Li5BdnBJxQ/ This records no known IPR from the full set of: Authors: Oscar Gonzalez de Dios, Mohamed Boucadair, Samier Barguil Giraldo, Qin Wu, Alejandro Aguado Contributors: Victor Lopez, Erez Segev One Contributor (Luis Angel Munoz) notes no IPR on the thread https://mailarchive.ietf.org/arch/msg/opsawg/3U-FxleAm739Zx4gMAHw3eWLIdw/ The final Contributor (Lucia Oliva) reports no IPR on the thread https://mailarchive.ietf.org/arch/msg/opsawg/x-oi9vLlEWgUpP_yu827SJ7CWPs/ > (8) Has an IPR disclosure been filed that references this document? No IPR disclosed. > (9) How solid is the WG consensus behind this document? Does it > represent the strong concurrence of a few individuals, with others > being silent, or does the WG as a whole understand and agree with > it? OPSAWG is an odd WG in that it has several different communities of interest that rarely cross-review work. As a result, judging broad consensus in the WG is a challenge. Nevertheless, the enthusiastic participation by a long list of authors and contributors, the frequent open design team tele-meetings, and the additional reviews from five people during last call with no major objections, suggest good consensus. While the design teams were well-attended, they left some visibility holes concerning the work and failed to report back to the broader WG. This has been corrected with regular readouts on the mailing list, as well as requests to the mailing list for input on decisions. > (10) Has anyone threatened an appeal or otherwise indicated extreme > discontent? No discontent voiced. > (11) Identify any ID nits the Document Shepherd has found in this > document. idnits is clean. The warnings have been checked and found to be benign. > (12) Describe how the document meets any required formal review > criteria. See (5) for YANG Doctor reviews. YANG validation (in the datatracker) shows 0 errors, 0 warnings > (13) Have all references within this document been identified as > either normative or informative? Yes. Both normative and informative references are present. > (14) Are there normative references to documents that are not ready > for advancement or are otherwise in an unclear state? One normative reference is to draft-ietf-opsawg-vpn-common. This is a partner document that is moving forward at the same time. It is ready for advancement. All other normative references are to RFCs. > (15) Are there downward normative references references (see > RFC 3967)? If so, list these downward references to support the > Area Director in the Last Call procedure. No downrefs. > (16) Will publication of this document change the status of any > existing RFCs? No status changes. > (17) Describe the Document Shepherd's review of the IANA > considerations section, especially with regard to its consistency > with the body of the document. Confirm that all protocol > extensions that the document makes are associated with the > appropriate reservations in IANA registries. Confirm that any > referenced IANA registries have been clearly identified. Confirm > that newly created IANA registries include a detailed > specification of the initial contents for the registry, that > allocations procedures for future registrations are defined, and > a reasonable name for the new registry has been suggested (see > RFC 8126). The IANA section is simple. It requests assignments from two clearly identified registries in accordance with the allocation procedures for those registries. No new registries are created. > (18) List any new IANA registries that require Expert Review for > future allocations. None. > (19) Describe reviews and automated checks performed by the Document > Shepherd to validate sections of the document written in a formal > language. The datatracker YANG validation is clean. See (12) and (20) > (20) If the document contains a YANG module, has the module been > checked with any of the recommended validation tools > (https://trac.ietf.org/trac/ops/wiki/yang-review-tools) for > syntax and formatting validation? > Does the YANG module comply with the Network Management Datastore > Architecture (NMDA) as specified in RFC8342? The YANG validation results are clean. To the best of my knowledge, the model complies with the NMDA. |
2021-04-30
|
08 | Adrian Farrel | > (1) What type of RFC is being requested > Why is this the proper type of RFC? > Is this type of … > (1) What type of RFC is being requested > Why is this the proper type of RFC? > Is this type of RFC indicated in the title page header? This draft is requested for publication as a Draft Standard. This is appropriate for a YANG model that will be implemented and must interoperate. The status is properly indicated on the title page. > (2) The IESG approval announcement includes a Document Announcement > Write-Up. > > Technical Summary: This document defines an L3VPN Network YANG Model (L3NM) that can be used for the provisioning of Layer 3 Virtual Private Network (VPN) services within a service provider network. The model provides a network-centric view of L3VPN services. L3NM is meant to be used by a network controller to derive the configuration information that will be sent to relevant network devices. The model can also facilitate the communication between a service orchestrator and a network controller/orchestrator. > Working Group Summary: There was no controversy. This model was driven by implementers seeking to use the L3SM [RFC8309] to provide L3VPN services using orchestrator and controller software. They determined that an intermediary network-centric (rather than service-centric) model was required, and they quickly built support with other implementers. During the later stages of work on this document, it was determined that there was commonality between this model and a model for L2VPN. The common parts were pulled out into a separate model presented in another document. > Document Quality: This document notes four implementations: Nokia, Huawei, Infinera, Ribbon-ECI. The document shepherd is aware of one other commercial implementation and one prototype implementation. > Personnel: Adrian Farrel (adrian@olddog.co.uk) is the Document Shepherd Rob Wilton (rwilton@cisco.com) iss the Responsible Area Director > (3) Briefly describe the review of this document that was performed > by the Document Shepherd. If this version of the document is not > ready for publication, please explain why the document is being > forwarded to the IESG. I reviewed this draft in detail during WG last call and all of the issues I raised have been addressed. I have done a quick review of the most recent version mainly focused on the changes. This version is ready for publication. > (4) Does the document Shepherd have any concerns about the depth or > breadth of the reviews that have been performed? No concerns. Indeed, the number of implementers participating has resulted in a deep and broad review. > (5) Do portions of the document need review from a particular or from > broader perspective? If so, describe the review that took place. This document contains a YANG model and so review by YANG specialists is in order. An early YANG Doctor review was conducted on -03 by Radek Krejci and the issues raised were fixed. A subsequent YANG Doctor review on -07 at WG last call was also done by Radek Krejci. It found only one simple nit, and this has been fixed in the current version. > (6) Describe any specific concerns or issues that the Document > Shepherd has with this document that the Responsible Area Director > and/or the IESG should be aware of? No issues. > (7) Has each author confirmed that any and all appropriate IPR > disclosures required for full conformance with the provisions of > BCP 78 and BCP 79 have already been filed. All authors and contributors have so confirmed. IPR protestations can be found on the thread https://mailarchive.ietf.org/arch/msg/opsawg/ajoTnvgF5YuYtnUk1Li5BdnBJxQ/ This records no known IPR from the full set of: Authors: Oscar Gonzalez de Dios, Mohamed Boucadair, Samier Barguil Giraldo, Qin Wu, Alejandro Aguado Contributors: Victor Lopez, Erez Segev One Contributor (Luis Angel Munoz) notes no IPR on the thread https://mailarchive.ietf.org/arch/msg/opsawg/3U-FxleAm739Zx4gMAHw3eWLIdw/ The final Contributor (Lucia Oliva) reports no IPR on the thread https://mailarchive.ietf.org/arch/msg/opsawg/x-oi9vLlEWgUpP_yu827SJ7CWPs/ > (8) Has an IPR disclosure been filed that references this document? No IPR disclosed. > (9) How solid is the WG consensus behind this document? Does it > represent the strong concurrence of a few individuals, with others > being silent, or does the WG as a whole understand and agree with > it? OPSAWG is an odd WG in that it has several different communities of interest that rarely cross-review work. As a result, judging broad consensus in the WG is a challenge. Nevertheless, the enthusiastic participation by a long list of authors and contributors, the frequent open design team tele-meetings, and the additional reviews from five people during last call with no major objections, suggest good consensus. > (10) Has anyone threatened an appeal or otherwise indicated extreme > discontent? No discontent voiced. > (11) Identify any ID nits the Document Shepherd has found in this > document. idnits is clean. The warnings have been checked and found to be benign. > (12) Describe how the document meets any required formal review > criteria. See (5) for YANG Doctor reviews. YANG validation (in the datatracker) shows 0 errors, 0 warnings > (13) Have all references within this document been identified as > either normative or informative? Yes. Both normative and informative references are present. > (14) Are there normative references to documents that are not ready > for advancement or are otherwise in an unclear state? One normative reference is to draft-ietf-opsawg-vpn-common. This is a partner document that is moving forward at the same time. It is ready for advancement. All other normative references are to RFCs. > (15) Are there downward normative references references (see > RFC 3967)? If so, list these downward references to support the > Area Director in the Last Call procedure. No downrefs. > (16) Will publication of this document change the status of any > existing RFCs? No status changes. > (17) Describe the Document Shepherd's review of the IANA > considerations section, especially with regard to its consistency > with the body of the document. Confirm that all protocol > extensions that the document makes are associated with the > appropriate reservations in IANA registries. Confirm that any > referenced IANA registries have been clearly identified. Confirm > that newly created IANA registries include a detailed > specification of the initial contents for the registry, that > allocations procedures for future registrations are defined, and > a reasonable name for the new registry has been suggested (see > RFC 8126). The IANA section is simple. It requests assignments from two clearly identified registries in accordance with the allocation procedures for those registries. No new registries are created. > (18) List any new IANA registries that require Expert Review for > future allocations. None. > (19) Describe reviews and automated checks performed by the Document > Shepherd to validate sections of the document written in a formal > language. The datatracker YANG validation is clean. See (12) and (20) > (20) If the document contains a YANG module, has the module been > checked with any of the recommended validation tools > (https://trac.ietf.org/trac/ops/wiki/yang-review-tools) for > syntax and formatting validation? > Does the YANG module comply with the Network Management Datastore > Architecture (NMDA) as specified in RFC8342? The YANG validation results are clean. To the best of my knowledge, the model complies with the NMDA. |
2021-04-28
|
08 | Carlos Bernardos | Request for Last Call review by INTDIR is assigned to Ron Bonica |
2021-04-28
|
08 | Carlos Bernardos | Request for Last Call review by INTDIR is assigned to Ron Bonica |
2021-04-22
|
08 | Mohamed Boucadair | New version available: draft-ietf-opsawg-l3sm-l3nm-08.txt |
2021-04-22
|
08 | (System) | New version approved |
2021-04-22
|
08 | (System) | Request for posting confirmation emailed to previous authors: Alejandro Aguado , Luis Munoz , Mohamed Boucadair , Oscar de Dios , samier barguil |
2021-04-22
|
08 | Mohamed Boucadair | Uploaded new revision |
2021-04-12
|
07 | Adrian Farrel | IPR protestations can be found on the thread https://mailarchive.ietf.org/arch/msg/opsawg/ajoTnvgF5YuYtnUk1Li5BdnBJxQ/ This records no known IPR from the full set of: Authors: Oscar Gonzalez de Dios, Mohamed … IPR protestations can be found on the thread https://mailarchive.ietf.org/arch/msg/opsawg/ajoTnvgF5YuYtnUk1Li5BdnBJxQ/ This records no known IPR from the full set of: Authors: Oscar Gonzalez de Dios, Mohamed Boucadair, Samier Barguil Giraldo, Qin Wu, Alejandro Aguado Contributors: Victor Lopez, Erez Segev With one Contributor (Luis Angel Munoz) noting no IPR on the thread https://mailarchive.ietf.org/arch/msg/opsawg/3U-FxleAm739Zx4gMAHw3eWLIdw/ And the final Contributor (Lucia Oliva) reporting no IPR on the thread https://mailarchive.ietf.org/arch/msg/opsawg/x-oi9vLlEWgUpP_yu827SJ7CWPs/ |
2021-04-08
|
07 | Joe Clarke | Tag Revised I-D Needed - Issue raised by WGLC set. |
2021-04-08
|
07 | Joe Clarke | IETF WG state changed to WG Consensus: Waiting for Write-Up from In WG Last Call |
2021-04-07
|
07 | Adrian Farrel | IPR protestations can be found on the thread https://mailarchive.ietf.org/arch/msg/opsawg/ajoTnvgF5YuYtnUk1Li5BdnBJxQ/ This records no known IPR from the full set of: Authors: Oscar Gonzalez de Dios, Mohamed … IPR protestations can be found on the thread https://mailarchive.ietf.org/arch/msg/opsawg/ajoTnvgF5YuYtnUk1Li5BdnBJxQ/ This records no known IPR from the full set of: Authors: Oscar Gonzalez de Dios, Mohamed Boucadair, Samier Barguil Giraldo, Qin Wu, Alejandro Aguado Contributors: Victor Lopez With one Contributor (Luis Angel Munoz) noting no IPR on the thread https://mailarchive.ietf.org/arch/msg/opsawg/3U-FxleAm739Zx4gMAHw3eWLIdw/ And the final Contributor (Lucia Oliva) reporting no IPR on the thread https://mailarchive.ietf.org/arch/msg/opsawg/x-oi9vLlEWgUpP_yu827SJ7CWPs/ MISSING: Erez Segev |
2021-04-07
|
07 | Adrian Farrel | IPR protestations can be found on the thread https://mailarchive.ietf.org/arch/msg/opsawg/ajoTnvgF5YuYtnUk1Li5BdnBJxQ/ This records no known IPR from the full set of: Authors: Oscar Gonzalez de Dios, Mohamed … IPR protestations can be found on the thread https://mailarchive.ietf.org/arch/msg/opsawg/ajoTnvgF5YuYtnUk1Li5BdnBJxQ/ This records no known IPR from the full set of: Authors: Oscar Gonzalez de Dios, Mohamed Boucadair, Samier Barguil Giraldo, Qin Wu MISSING: Alejandro Aguado Contributors: Victor Lopez With one Contributor (Luis Angel Munoz) noting no IPR on the thread https://mailarchive.ietf.org/arch/msg/opsawg/3U-FxleAm739Zx4gMAHw3eWLIdw/ And the final Contributor (Lucia Oliva) reporting no IPR on the thread https://mailarchive.ietf.org/arch/msg/opsawg/x-oi9vLlEWgUpP_yu827SJ7CWPs/ MISSING: Erez Segev |
2021-04-07
|
07 | Adrian Farrel | IPR protestations can be found on the thread https://mailarchive.ietf.org/arch/msg/opsawg/ajoTnvgF5YuYtnUk1Li5BdnBJxQ/ This records no known IPR from the full set of: Authors: Oscar Gonzalez de Dios, Mohamed … IPR protestations can be found on the thread https://mailarchive.ietf.org/arch/msg/opsawg/ajoTnvgF5YuYtnUk1Li5BdnBJxQ/ This records no known IPR from the full set of: Authors: Oscar Gonzalez de Dios, Mohamed Boucadair, Samier Barguil Giraldo, Qin Wu Contributors: Victor Lopez With the final Contributor (Luis Angel Munoz) noting no IPR on the thread https://mailarchive.ietf.org/arch/msg/opsawg/3U-FxleAm739Zx4gMAHw3eWLIdw/ |
2021-03-29
|
07 | Joe Clarke | Notification list changed to adrian@olddog.co.uk because the document shepherd was set |
2021-03-29
|
07 | Joe Clarke | Document shepherd changed to Adrian Farrel |
2021-03-28
|
07 | Radek Krejčí | Request for Last Call review by YANGDOCTORS Completed: Ready with Nits. Reviewer: Radek Krejčí. Sent review to list. |
2021-03-25
|
07 | Tero Kivinen | Request for Last Call review by SECDIR is assigned to Aanchal Malhotra |
2021-03-25
|
07 | Tero Kivinen | Request for Last Call review by SECDIR is assigned to Aanchal Malhotra |
2021-03-25
|
07 | Gunter Van de Velde | Request for Last Call review by OPSDIR is assigned to Victor Kuarsingh |
2021-03-25
|
07 | Gunter Van de Velde | Request for Last Call review by OPSDIR is assigned to Victor Kuarsingh |
2021-03-22
|
07 | Mehmet Ersue | Request for Last Call review by YANGDOCTORS is assigned to Radek Krejčí |
2021-03-22
|
07 | Mehmet Ersue | Request for Last Call review by YANGDOCTORS is assigned to Radek Krejčí |
2021-03-22
|
07 | Joe Clarke | IETF WG state changed to In WG Last Call from WG Document |
2021-03-22
|
07 | Joe Clarke | Requested Last Call review by YANGDOCTORS |
2021-03-22
|
07 | Joe Clarke | Requested Last Call review by OPSDIR |
2021-03-22
|
07 | Joe Clarke | Requested Last Call review by INTDIR |
2021-03-22
|
07 | Joe Clarke | Requested Last Call review by SECDIR |
2021-03-10
|
07 | Mohamed Boucadair | New version available: draft-ietf-opsawg-l3sm-l3nm-07.txt |
2021-03-10
|
07 | (System) | New version approved |
2021-03-10
|
07 | (System) | Request for posting confirmation emailed to previous authors: Alejandro Aguado , Luis Munoz , Mohamed Boucadair , Oscar de Dios , samier barguil |
2021-03-10
|
07 | Mohamed Boucadair | Uploaded new revision |
2021-02-22
|
06 | Mohamed Boucadair | New version available: draft-ietf-opsawg-l3sm-l3nm-06.txt |
2021-02-22
|
06 | (System) | New version approved |
2021-02-22
|
06 | (System) | Request for posting confirmation emailed to previous authors: Alejandro Aguado , Luis Munoz , Mohamed Boucadair , Oscar de Dios , samier barguil |
2021-02-22
|
06 | Mohamed Boucadair | Uploaded new revision |
2020-10-19
|
05 | Joe Clarke | Changed consensus to Yes from Unknown |
2020-10-19
|
05 | Joe Clarke | Intended Status changed to Proposed Standard from None |
2020-10-16
|
05 | Oscar de Dios | New version available: draft-ietf-opsawg-l3sm-l3nm-05.txt |
2020-10-16
|
05 | (System) | New version accepted (logged-in submitter: Oscar de Dios) |
2020-10-16
|
05 | Oscar de Dios | Uploaded new revision |
2020-10-04
|
04 | Mohamed Boucadair | New version available: draft-ietf-opsawg-l3sm-l3nm-04.txt |
2020-10-04
|
04 | (System) | New version approved |
2020-10-04
|
04 | (System) | Request for posting confirmation emailed to previous authors: Mohamed Boucadair , Luis Munoz , samier barguil , Alejandro Aguado , Oscar de Dios |
2020-10-04
|
04 | Mohamed Boucadair | Uploaded new revision |
2020-07-27
|
03 | Joe Clarke | Added to session: IETF-108: opsawg Tue-1410 |
2020-05-11
|
03 | Radek Krejčí | Request for Early review by YANGDOCTORS Completed: Ready with Issues. Reviewer: Radek Krejčí. Sent review to list. |
2020-04-20
|
03 | Mehmet Ersue | Request for Early review by YANGDOCTORS is assigned to Radek Krejčí |
2020-04-20
|
03 | Mehmet Ersue | Request for Early review by YANGDOCTORS is assigned to Radek Krejčí |
2020-04-18
|
03 | Joe Clarke | Requested Early review by YANGDOCTORS |
2020-04-03
|
03 | Oscar de Dios | New version available: draft-ietf-opsawg-l3sm-l3nm-03.txt |
2020-04-03
|
03 | (System) | New version accepted (logged-in submitter: Oscar de Dios) |
2020-04-03
|
03 | Oscar de Dios | Uploaded new revision |
2020-03-09
|
02 | Oscar de Dios | New version available: draft-ietf-opsawg-l3sm-l3nm-02.txt |
2020-03-09
|
02 | (System) | New version accepted (logged-in submitter: Oscar de Dios) |
2020-03-09
|
02 | Oscar de Dios | Uploaded new revision |
2019-11-19
|
01 | Tianran Zhou | Added to session: IETF-106: opsawg Wed-1000 |
2019-11-17
|
01 | Oscar de Dios | New version available: draft-ietf-opsawg-l3sm-l3nm-01.txt |
2019-11-17
|
01 | (System) | New version accepted (logged-in submitter: Oscar de Dios) |
2019-11-17
|
01 | Oscar de Dios | Uploaded new revision |
2019-10-18
|
00 | Joe Clarke | This document now replaces draft-aguado-opsawg-l3sm-l3nm instead of None |
2019-10-18
|
00 | Oscar de Dios | New version available: draft-ietf-opsawg-l3sm-l3nm-00.txt |
2019-10-18
|
00 | (System) | WG -00 approved |
2019-10-18
|
00 | Oscar de Dios | New version available: draft-ietf-opsawg-l3sm-l3nm-00.txt |
2019-10-18
|
00 | (System) | WG -00 approved |
2019-10-18
|
00 | Oscar de Dios | Set submitter to "Oscar Gonzalez de Dios ", replaces to (none) and sent approval email to group chairs: opsawg-chairs@ietf.org |
2019-10-18
|
00 | Oscar de Dios | Set submitter to "Oscar Gonzalez de Dios ", replaces to (none) and sent approval email to group chairs: opsawg-chairs@ietf.org |
2019-10-18
|
00 | Oscar de Dios | Uploaded new revision |
2019-10-18
|
00 | Oscar de Dios | Uploaded new revision |