Skip to main content

IPv6 Segment Routing Header (SRH)
draft-ietf-6man-segment-routing-header-26

Revision differences

Document history

Date Rev. By Action
2020-03-12
26 (System) RFC Editor state changed to AUTH48-DONE from AUTH48
2020-03-04
26 (System) RFC Editor state changed to AUTH48 from RFC-EDITOR
2020-01-15
26 (System) RFC Editor state changed to RFC-EDITOR from EDIT
2019-10-31
26 (System) IANA Action state changed to RFC-Ed-Ack from Waiting on RFC Editor
2019-10-31
26 (System) IANA Action state changed to Waiting on RFC Editor from In Progress
2019-10-31
26 (System) IANA Action state changed to In Progress from Waiting on Authors
2019-10-25
26 (System) IANA Action state changed to Waiting on Authors from In Progress
2019-10-25
26 Min Ye Request closed, assignment withdrawn: Lou Berger Last Call RTGDIR review
2019-10-25
26 Min Ye Closed request for Last Call review by RTGDIR with state 'Withdrawn'
2019-10-24
26 (System) IANA Action state changed to In Progress
2019-10-24
26 (System) RFC Editor state changed to EDIT
2019-10-24
26 (System) IESG state changed to RFC Ed Queue from Approved-announcement sent
2019-10-24
26 (System) Announcement was received by RFC Editor
2019-10-24
26 Amy Vezza IESG state changed to Approved-announcement sent from Approved-announcement to be sent
2019-10-24
26 Amy Vezza IESG has approved the document
2019-10-24
26 Amy Vezza Closed "Approve" ballot
2019-10-24
26 Amy Vezza Ballot approval text was generated
2019-10-23
26 Suresh Krishnan IESG state changed to Approved-announcement to be sent from IESG Evaluation::AD Followup
2019-10-22
26 Darren Dukes New version available: draft-ietf-6man-segment-routing-header-26.txt
2019-10-22
26 (System) New version approved
2019-10-22
26 (System)
Request for posting confirmation emailed to previous authors: Satoru Matsushima , " daniel.voyer@bell.ca" , John Leddy , Darren Dukes , Clarence Filsfils , Stefano …
Request for posting confirmation emailed to previous authors: Satoru Matsushima , " daniel.voyer@bell.ca" , John Leddy , Darren Dukes , Clarence Filsfils , Stefano Previdi
2019-10-22
26 Darren Dukes Uploaded new revision
2019-10-18
25 Benjamin Kaduk
[Ballot comment]
Thank you for addressing my Discuss points (including by having a discussion to
clarify that some of them are in fact non-issues)!

Please …
[Ballot comment]
Thank you for addressing my Discuss points (including by having a discussion to
clarify that some of them are in fact non-issues)!

Please also consider the following comments on the -25, none of which quite
rise to Discuss-level, but some of which are significant.

I wonder whether we will ever want to have the HMAC protect (some of)
the other TLVs associated with the SRH; the current formulation is quite
rigid about what the HMAC input is (and trying to change that later,
e.g., by the presence of some other TLV, seems like a bad idea).  What
we have here is fine for now, though, and we could always define a new
"HMACplus" TLV with richer semantics if a need arises.

With respect to the "changing that later seems like a bad idea" point, I
do see this text in Section 2:

  New SIDs defined in the future MUST specify the mutability properties
  of the Flags, Tag, and Segment List and indicate how the HMAC TLV
  (Section 2.1.2) verification works.  Note, that in effect these
  fields are mutable.

I'm coming at this from a perspective of the operational considerations
when an HMAC verification node might implement only [this document] and
thus anything attempting to generate an HMAC according to a modified
procedure specified in some future document would produce an HMAC value
that would fail to verify.


Section 2.1.2 has:

  o  RESERVED: 15 bits.  MUST be 0 on transmission and ignored on
      receipt.

yet those bits are used as input to the HMAC calculation, which seems to
defy the "ignored" portion.


Section 2.1.2.1 has:

  An implementation that supports the generation and verification of
  the HMAC SHOULD support the following default behavior as defined in
  the remainder of this section.

which seems like it might have some vestiges of the previous model where
most of the HMAC verification procedure was up to local configuration; I
think we are now at a place where the following behavior is the only
behavior (not "default") and there's no need to qualify it with
"SHOULD".

Also, it might be possible to spend some thought and convince ourselves
that the 'D' bit is not strictly needed, since an entity creating an SRH
for which the 'D' bit might be needed could just choose to not use the
reduced SRH in cases where verification of the first segment would be
needed.  But I did not spend the time to reason through this, so I'm not
advocating for removing the 'D' bit at this time.

Section 2.1.2.2 has:

  At the HMAC TLV generating node, the Text for the HMAC computation is
  set to the IPv6 header fields and SRH fields as they would appear at
  the verification node, not necessarily the same as the source node
  sending a packet with the HMAC TLV.

  Pre-shared key roll-over is supported by having two key IDs in use
  while the HMAC TLV generating node and verifying node converge to a
  new key.

which implies a single verification node (my recollection is that we
settled on multiple verification nodes being possible).  (Section
2.1.2.1 also has "as it would be reeived at the node verifying the
HMAC", in a similar vein.)


Section 4.3.1.1.1 has:

  Example 2:
  For any packet received from interface I1
    If first TLV is HMAC {
      Process the HMAC TLV
    }
    Else {
      Discard the packet
    }

This shows the location of the HMAC TLV as being up to local policy.
This is ... probably okay from a security point of view, but I mention
it in case our previous discussions have caused us to not want to
endorse this being a part of local policy.
2019-10-18
25 Benjamin Kaduk Ballot comment text updated for Benjamin Kaduk
2019-10-18
25 Benjamin Kaduk
[Ballot comment]
Thank you for addressing my Discuss points (including by having a discussion to
clarify that some of them are in fact non-issues)!

Please …
[Ballot comment]
Thank you for addressing my Discuss points (including by having a discussion to
clarify that some of them are in fact non-issues)!

Please also consider the following comments on the -25, none of which quite
rise to Discuss-level, but some of which are significant.
2019-10-18
25 Benjamin Kaduk [Ballot Position Update] Position for Benjamin Kaduk has been changed to No Objection from Discuss
2019-10-17
25 Alvaro Retana [Ballot Position Update] Position for Alvaro Retana has been changed to No Objection from Discuss
2019-10-15
25 Roman Danyliw [Ballot comment]
Thank you for addressing my DISCUSS and COMMENT items.
2019-10-15
25 Roman Danyliw [Ballot Position Update] Position for Roman Danyliw has been changed to No Objection from Discuss
2019-10-10
25 Barry Leiba [Ballot comment]
Thanks for addressing my comments!
2019-10-10
25 Barry Leiba [Ballot Position Update] Position for Barry Leiba has been changed to No Objection from Discuss
2019-10-10
25 Darren Dukes New version available: draft-ietf-6man-segment-routing-header-25.txt
2019-10-10
25 (System) New version approved
2019-10-10
25 (System)
Request for posting confirmation emailed to previous authors: Satoru Matsushima , " daniel.voyer@bell.ca" , John Leddy , Darren Dukes , Clarence Filsfils , Stefano …
Request for posting confirmation emailed to previous authors: Satoru Matsushima , " daniel.voyer@bell.ca" , John Leddy , Darren Dukes , Clarence Filsfils , Stefano Previdi
2019-10-10
25 Darren Dukes Uploaded new revision
2019-10-07
24 Magnus Westerlund [Ballot comment]
Thanks for addressing my discuss.
2019-10-07
24 Magnus Westerlund [Ballot Position Update] Position for Magnus Westerlund has been changed to No Objection from Discuss
2019-10-04
24 Darren Dukes New version available: draft-ietf-6man-segment-routing-header-24.txt
2019-10-04
24 (System) New version approved
2019-10-04
24 (System)
Request for posting confirmation emailed to previous authors: Satoru Matsushima , " daniel.voyer@bell.ca" , John Leddy , Darren Dukes , Clarence Filsfils , Stefano …
Request for posting confirmation emailed to previous authors: Satoru Matsushima , " daniel.voyer@bell.ca" , John Leddy , Darren Dukes , Clarence Filsfils , Stefano Previdi
2019-10-04
24 Darren Dukes Uploaded new revision
2019-09-17
23 Magnus Westerlund
[Ballot discuss]
Thanks for resolving some of my discusses.

3. Section 5.3:

5.3.  MTU Considerations
An SR Domain ingress edge node encapsulates packets traversing the …
[Ballot discuss]
Thanks for resolving some of my discusses.

3. Section 5.3:

5.3.  MTU Considerations
An SR Domain ingress edge node encapsulates packets traversing the SR
  Domain, and needs to consider the MTU of the SR Domain.  Within the
  SR Domain, well known mitigation techniques are RECOMMENDED, such as
  deploying a greater MTU value within the SR Domain than at the
  ingress edges.

I find this section very much lacking. Considering that the minimal usage of this RH is 24 bytes, and getting above 100 bytes of overhead is trivial. 3 segments plus the HMAC TLV is 96 bytes.

The text mentions well known techniques (Note plural) but suggests only one. Are the more that can be referenced?

The one mentioned requires one to calculate the worst case overhead for the SR domain for the this routing header. Then take the lowest available path MTU and subtract that worst case overhead to find the supported MTU. Then police that value at the ingresses to the SR domain to ensure consistent behavior that Path MTU discovery methods can work with.

What do you do if one of the path MTUs inside the SR domain is 1280?

This document do need to answer this question or I believe write an applicability statement restrict this to not work in such network where the 1280 minimal MTU can be ensured. As Joe Touch note in his TSV-ART review this is non trivial and I don't see punting on these MTU question will work in general: https://mailarchive.ietf.org/arch/msg/tsv-art/cdMgmFS79lBr7oha9Z4S4qqqA8c
2019-09-17
23 Magnus Westerlund Ballot comment and discuss text updated for Magnus Westerlund
2019-09-16
23 (System) Sub state has been changed to AD Followup from Revised ID Needed
2019-09-16
23 (System) IANA Review state changed to Version Changed - Review Needed from IANA OK - Actions Needed
2019-09-16
23 Darren Dukes New version available: draft-ietf-6man-segment-routing-header-23.txt
2019-09-16
23 (System) New version approved
2019-09-16
23 (System)
Request for posting confirmation emailed to previous authors: Satoru Matsushima , " daniel.voyer@bell.ca" , John Leddy , Darren Dukes , Clarence Filsfils , Stefano …
Request for posting confirmation emailed to previous authors: Satoru Matsushima , " daniel.voyer@bell.ca" , John Leddy , Darren Dukes , Clarence Filsfils , Stefano Previdi
2019-09-16
23 Darren Dukes Uploaded new revision
2019-09-05
22 Cindy Morgan IESG state changed to IESG Evaluation::Revised I-D Needed from IESG Evaluation
2019-09-05
22 Martin Vigoureux
[Ballot comment]
Hi,

thank you for this document.
I have a couple of questions on the definition of an SR segment endpoint node.

Maybe I'm …
[Ballot comment]
Hi,

thank you for this document.
I have a couple of questions on the definition of an SR segment endpoint node.

Maybe I'm missing something obvious, but I read:
  A SR segment endpoint node is any node receiving an IPv6 packet where
  the destination address of that packet is locally configured as a
  segment or local interface.
and then, in 4.3:
      A FIB entry that represents a non-local route
      No Match
it seems to me that if we happen to be in such situations then the node doing the LPM is not an SR Segment Endpoint Node for that specific packet. As such, I'm not sure why these cases are being described in 4.3 and subsections.

Also, 4.3.2 says:
  If the FIB entry represents a local interface, not locally
  instantiated as an SRv6 SID, the SRH is processed as follows:

      If Segments Left is zero, the node must ignore the Routing header
      and proceed to process the next header in the packet, whose type
      is identified by the Next Header field in the Routing Header.

      If Segments Left is non-zero, the node must discard the packet and
      send an ICMP Parameter Problem, Code 0, message to the packet's
      Source Address, pointing to the unrecognized Routing Type.

This is the exact same text as what 8200 specifies when the Routing Header type is unknown. That makes me wonder if a "node receiving an IPv6 packet where the destination address of that packet is locally configured as a [...] local interface" is effectively an SR segment endpoint node.


nits:
      Padding TLVs are ignored by a node processing the SRH TLV.
did you mean SRH's TLV(s)


  IPv6 headers are represented as the tuple of (source, destination).
  For example, a packet with source address A1 and destination address
  A2 is represented as (A1,A2).
But then we find
  (SA,DA) ...
  o  Source Address is SA, Destination Addresses is DA, ...
Why not keep the formalism defined above and write it as (A1,A2) ?


  For registration requests where a Designated Expert should be
  consulted, the responsible IESG area director should appoint the
  Designated Expert.  The intention is that any allocation will be
  accompanied by a published RFC. 
If an RFC is really what the WG expects why not choose "RFC Required"?
2019-09-05
22 Martin Vigoureux [Ballot Position Update] New position, No Objection, has been recorded for Martin Vigoureux
2019-09-05
22 Éric Vyncke
[Ballot comment]
Thank you for the hard work put into this easy to read document. Happy to see how this document has improved since the …
[Ballot comment]
Thank you for the hard work put into this easy to read document. Happy to see how this document has improved since the first drafts, years ago while I contributed to those first drafts.

Regards,

-éric

== COMMENTS ==

-- Section 2 --
C.1) Unsure whether the use of multiple "U" to indicate unused bit is useful, most RFC states that this field is reserved.

C.2) An explanation about why segments are in the reverse order would be helpful for the reader.

-- Section 2.1 --
C.3) " an implementation adding or parsing TLVs MUST support PAD TLVs" is it just 'parsing' == read them ?

-- Section 2.1.2 --
C.4) it is possibly already in the security AD DISCUSSes, but, I would make the HMAC field variable length as it depends on the HMAC algorithm being used.

-- Section 2.1.2.1 --
C.5) "It may be based on ..., HMAC Key ID, or other packet fields." seems to contradict the opaque quality of the HMAC Key ID. I suggest to remove the mention of 'HMAC Key ID' here.
C.6) See also C.4 (so please address either C.6 or C.4), need to specify what to truncate: most significant or least significant bytes.

-- Section 4.3.1.1.1. --
C.7) Describing the use cases behind the example could help the reader.

-- Section 4.3.1.2. --
C.8) rather a question of mine, is this behavior applicable for all SID on the paths? (i.e. on all SRv6-capable routers where the current DA matches the locally configured interface addresses/SID ?) I would have guessed that decapsultion only happen at the last segment as explained in 4.3.2.

== NITS ==

-- Section 2.1.1 --
s/to verify the source of a packet/to verify whether the source of a packet/

-- Section 5.4 --
Please add a note to change the '4' to the IANA allocated value.
2019-09-05
22 Éric Vyncke [Ballot Position Update] New position, No Objection, has been recorded for Éric Vyncke
2019-09-05
22 Magnus Westerlund
[Ballot discuss]
I have several issues that appears to be serious enough that I really like some feedback on them prior to approving the document. …
[Ballot discuss]
I have several issues that appears to be serious enough that I really like some feedback on them prior to approving the document.



1. Section 2.1:

  An implementation MAY limit the number and/or length of TLVs it
  processes based on local configuration.  It MAY:
o  Limit the number of consecutive Pad1 (Section 2.1.1.1) options to
      1, if padding of more than one byte is required then PadN
      (Section 2.1.1.2) should be used.
o  Limit the length in PadN to 5.
o  Limit the maximum number of non-Pad TLVs to be processed.
o  Limit the maximum length of all TLVs to be processed.
The implementation MAY stop processing additional TLVs in the SRH
  when these configured limits are exceeded.

Isn't this repeating the same interoperability and extensibility issues we have for IPv6 extension headers in an IPv6 Routing header? Wouldn't it be better to tighten a bit the possibilities for the basic support of at least handling TLVs, and if anyone defines something larger they know this will be more uphill work to ensure that you get support for it. But it will making matching the constraints likely more easily to deploy as implementations haven't made different choices of what is required to support when it comes to handling TLVs and buffer them for example in their implementations.

2. Section 2.1.2.1

  If HMAC verification fails, an ICMP error message (parameter problem,
  error code 0, pointing to the HMAC TLV) SHOULD be generated (but rate
  limited) and SHOULD be logged.

Shouldn't it be made explicit that the packet should be discarded? Please clarify the text.

3. Section 5.3:

5.3.  MTU Considerations
An SR Domain ingress edge node encapsulates packets traversing the SR
  Domain, and needs to consider the MTU of the SR Domain.  Within the
  SR Domain, well known mitigation techniques are RECOMMENDED, such as
  deploying a greater MTU value within the SR Domain than at the
  ingress edges.

I find this section very much lacking. Considering that the minimal usage of this RH is 24 bytes, and getting above 100 bytes of overhead is trivial. 3 segments plus the HMAC TLV is 96 bytes.

The text mentions well known techniques (Note plural) but suggests only one. Are the more that can be referenced?

The one mentioned requires one to calculate the worst case overhead for the SR domain for the this routing header. Then take the lowest available path MTU and subtract that worst case overhead to find the supported MTU. Then police that value at the ingresses to the SR domain to ensure consistent behavior that Path MTU discovery methods can work with.

What do you do if one of the path MTUs inside the SR domain is 1280?

This document do need to answer this question or I believe write an applicability statement restrict this to not work in such network where the 1280 minimal MTU can be ensured. As Joe Touch note in his TSV-ART review this is non trivial and I don't see punting on these MTU question will work in general: https://mailarchive.ietf.org/arch/msg/tsv-art/cdMgmFS79lBr7oha9Z4S4qqqA8c
2019-09-05
22 Magnus Westerlund
[Ballot comment]
1. Section 2.
o  Tag: tag a packet as part of a class or group of packets, e.g.,
      packets sharing …
[Ballot comment]
1. Section 2.
o  Tag: tag a packet as part of a class or group of packets, e.g.,
      packets sharing the same set of properties.  When tag is not used
      at source it MUST be set to zero on transmission.  When tag is not
      used during SRH Processing it SHOULD be ignored.  Tag is not used
      when processing the SID defined in Section 4.3.1.  It may be used
      when processing other SIDs which are not defined in this document.
      The allocation and use of tag is outside the scope of this
      document.

  Consistent with the source routing model, the source of the SRH
  always knows how to set the segment list, Flags, Tag and TLVs of the
  SRH for use within the SR Domain.  How it achieves this is outside
  the scope of this document, but may be based on topology, available
  SIDs and their mutability properties, the SRH mutability requirements
  of the destination, or any other information.

Are there any scoping of the Tag field? I assume that it is SR domain local, is there any scoping based on any other IPv6 header fields? To me this tag appears to be a magic field, which one can hang almost any functionality on. It can represent QoS, policy, etc. I at least see it as 16-bit extra DSCP field, is that a misunderstanding? Have there been much discussion about how this field is going to affect interoperability?

I also note that the rest of the document does not discuss the tag field. I can assume that it is only segment endpoints that will process it due to the transit nodes are supposed to not look at the routing header. (But is something that could easily be violated if the goal is to enable the use of the tag for some purpose assuming that you can get implementations that does that.)
2019-09-05
22 Magnus Westerlund [Ballot Position Update] New position, Discuss, has been recorded for Magnus Westerlund
2019-09-04
22 Alvaro Retana
[Ballot discuss]
The new "Segment Routing Header TLVs" registry (§8.2) includes a range "for TLVs that may change en route".  However, I couldn't find a …
[Ballot discuss]
The new "Segment Routing Header TLVs" registry (§8.2) includes a range "for TLVs that may change en route".  However, I couldn't find a specification for these types of TLVs.  The only clues come from §4.3.1 (FIB Entry Is Locally Instantiated SRv6 SID), where it says:

  Processing this SID modifies the Segments Left and, if configured to
  process TLVs, it may modify the "variable length data" of TLV types
  that change en route.  Therefore Segments Left is mutable and TLVs
  that change en route are mutable.  The remainder of the SRH (Flags,
  Tag, Segment List, and TLVs that do not change en route) are
  immutable while processing this SID.

I am balloting DISCUSS because the description of "TLVs that may change en route" is not clear or specific enough.  I would like to see a clear specification of what "TLVs that may change en route" are, *AND* corresponding instructions to the Designated Experts-to-be. 

  Some related questions that come to mind include: Where can these TLVs be
  processed/changed?  If the data is modified, what about the alignment,
  should the Padding TLVs be also changed?  If no data is left, can the TLV be
  removed?  The instructions above (for the SRV6 SID) seem generic enough to
  apply to other potential future SIDs, what type of variation is expected?
2019-09-04
22 Alvaro Retana
[Ballot comment]
(1) I support Ben's DISCUSS.

Adding to his HMAC concerns, §2.1 says that when "processing the SID defined in Section 4.3.1, all TLVs …
[Ballot comment]
(1) I support Ben's DISCUSS.

Adding to his HMAC concerns, §2.1 says that when "processing the SID defined in Section 4.3.1, all TLVs are ignored unless local configuration indicates otherwise (Section 4.3.1.1.1).  Thus, TLV and HMAC support is optional for any implementation..."  This seems to indicate that, regardless of the HMAC security properties, it will be ignored by default.

(2) §4.1.1: "When a source does not require the entire SID list to be preserved in the SRH, a reduced SRH may be used."  When does a source require the entire SID list to be preserved?  Please provide an example of these cases.
 
(3) §8.1: Given that the SRH Flags Bits are limited, I would like to see instructions to the DEs-to-be about the type of information that may need to be encoded in the Header.
2019-09-04
22 Alvaro Retana [Ballot Position Update] New position, Discuss, has been recorded for Alvaro Retana
2019-09-04
22 Barry Leiba
[Ballot discuss]
I find the new registries (not "registers", as in the titles of Sections 8.1 and 8.2) to be oddly defined, and would like …
[Ballot discuss]
I find the new registries (not "registers", as in the titles of Sections 8.1 and 8.2) to be oddly defined, and would like to discuss that.

In Section 8, you seem to be giving instructions to the designated expert to require an RFC.  You also seem to be telling the DE to consult the 6man working group (or the residual mailing list, after the WG closes).  So when you say "Expert Review", you're really saying at least "Expert Review and RFC Required", and possibly "Expert Review and IETF Review".  I suggest that you instead go with "IETF Review" and eliminate the need for a designated expert.  If you want to additionally require specific review on the 6man list, you can add that to the IETF Review, with something like "IETF Review, with at least a two-week review on the 6man list," or some such.  (You could also consider "Standards Action" if you want to require that the RFC be Standards Track and not, say, Experimental or Informational.)  The point of having a DE is to handle cases when you are NOT necessarily using RFCs to do the registrations, and you don't have the consequent IETF review of things.
2019-09-04
22 Barry Leiba
[Ballot comment]
Oh, and here:

  The following policies are used here with the meanings defined in BCP
  26
: "Private Use", "First Come …
[Ballot comment]
Oh, and here:

  The following policies are used here with the meanings defined in BCP
  26
: "Private Use", "First Come First Served", "Expert Review",
  "Specification Required", "IETF Consensus", "Standards Action".

"IETF Consensus" is not defined in BCP 26; "IETF Review" is.
2019-09-04
22 Barry Leiba [Ballot Position Update] New position, Discuss, has been recorded for Barry Leiba
2019-09-04
22 Alissa Cooper [Ballot Position Update] New position, No Objection, has been recorded for Alissa Cooper
2019-09-04
22 Roman Danyliw
[Ballot discuss]
(1) Section 7.1.  This section seems to be enumerating the attacks possible with source routing, and noting that the scope of these are …
[Ballot discuss]
(1) Section 7.1.  This section seems to be enumerating the attacks possible with source routing, and noting that the scope of these are limited to nodes inside the SR domain because of SRH requires ingress filtering.  No issue with this position.  This feedback is around the clarity of the attacks in question.  The text currently says:

(a) (from the CanSecWest reference in from RFC5095) “Such attacks include bypassing filtering devices, reaching otherwise unreachable Internet systems, network topology discovery, bandwidth exhaustion, and defeating anycast”

(b) In addition, “other known attacks on an IP network (e.g.  DOS/DDOS, topology discovery, man-in-the-middle, traffic interception/siphoning)” are also noted.

-- Per (a), the issue is broader than “bypassing filtering devices”, it’s also the “bypassing of network management, auditing or security devices”.

-- Per (b), the enumeration of attacks using the parenthetical suggested that these attacks are generically possible on “IP networks” and not SRH specific.  If that is the appropriate read, then somewhere in the earlier text it should be noted that SRH can also facilitate traffic steering for DDoS, eavesdropping and traffic manipulation through the manipulation (deletion, re-ordering) of the SRHs.  If (b) is a complementary list to (a) on SRH specific list of attacks, then it needs to be reconciled for duplication with (a) (e.g., per “bandwidth exhaustion” of (a) and “DOS/DDOS” of (b), are they the same?).  I think it is important to make clear what new attacks TTPs are possible with SRH even if the attack type is already possible through another TTPs on a generic IP network.
2019-09-04
22 Roman Danyliw
[Ballot comment]
(2) I support Ben Kaduk's DISCUSS position.

(3) Section 2.1.2.1.  Per “Local configuration determines when to check for an HMAC and potentially indicates …
[Ballot comment]
(2) I support Ben Kaduk's DISCUSS position.

(3) Section 2.1.2.1.  Per “Local configuration determines when to check for an HMAC and potentially indicates what the HMAC protects”, can you clarify on how the local config changes the fields/input/content of what is protected by the HMAC?  Subsequent text in this section seems to be clear on what gets passed as input to the HMAC (i.e., the definition of “Text”).
2019-09-04
22 Roman Danyliw [Ballot Position Update] New position, Discuss, has been recorded for Roman Danyliw
2019-09-04
22 Alexey Melnikov [Ballot comment]
I agree with Ben's DISCUSS.

Also, BCP38 must be a Normative reference due to use in Section 7 in a SHOULD level requirement.
2019-09-04
22 Alexey Melnikov [Ballot Position Update] New position, No Objection, has been recorded for Alexey Melnikov
2019-09-03
22 Benjamin Kaduk
[Ballot discuss]
(1) Section 2.1.2.1 says:

  Local configuration determines when to check for an HMAC and
  potentially indicates what the HMAC protects, and …
[Ballot discuss]
(1) Section 2.1.2.1 says:

  Local configuration determines when to check for an HMAC and
  potentially indicates what the HMAC protects, and a requirement on
  where the HMAC TLV must appear (e.g. first TLV), and whether or not
  to verify the destination address is equal to the current segment.

I'm uncomfortable about leaving so much of the semantics of a
security mechanism up to the local configuration.
Specifically, the "potentially indicates what the HMAC protects" and
"whether or not to verify the destination address is equal to the
current segment", which leaves some of the key security properties of
the system in the hands of someone that is potentially quite
inexperinced in reasoning about the relevant security properties.
I do think we can still specify something useful and interoperable that
still allows flexibility about when to check and where the TLV can
appear.  (This may in practice also allow flexibility about what it protects,
if the semantics are something like "it protects everything prior to it"
and we allow for other TLVs to appear after it, but the actual *rules*
for what it protects would be well-specified.)

(2) I also think we should discuss what is protected by the HMAC.  I note in
the COMMENT that this seems to be more about protecting the SRH contents
than the packet payload, but at present there is no binding at all to
the containing packet or flow, which seems to in effect present the SRH
as a self-contained, "signed", policy blob, which can be detached from
packet data and transferred at will.  It's probably also best practice
to include a fixed "contxt string" like "IPv6 SRH HMAC" even though the
risk of key reuse and cross-protocol attacks seems quite small here.
It's also pretty tempting to pull in the representation of the
"immutable TLVs", though there are probably some tricky details to
describing how to do that, and that can present complexity challenges
if/when nodes not trusted with HMAC keys are expected to apply varying
TLVs at runtime.  (The lack of defined TLVs other than HMAC and padding
make it hard for an outsider to gague the intent for TLV usage.)

(3) I'm concerned that this mechanism may not be consistent with BCP 107's
guidance on automated vs. manual key management, with respect to
directly using the long-term HMAC key to key the HMAC.  Most modern
designs will introduce an intermediate key-derivation step that mixes
some message- or flow-specific data into the intermediate key that is
then used to key the per-message MAC.  Section 5.5 seems to suggest that
the IPv6 flow label may be usable (i.e., fixed within the domain for a
given flow) for this purpose, but I may be missing a subtlety about
intra- vs. inter-domain traffic, and it may not be feasible to involve a
central controller into flow identifier assignment.
If the HMAC is solely intended to make self-contained "authorized policy
blobs" that are infrequently changing, then the direct use of the
long-term key may not be as problematic as it first seems.
Additionally, if the SDN-oriented or "trusted key distribution protocol such as
[RFC6407]" cases are used, then this is somewhat less of a concern,
though there may still be key usage lifetime considerations to worry
about and potentially force somewhat-rapid key turnover (i.e., weeks or
months).

(4) I'm not sure that the scoping of key IDs per destination node is
consistent with the use cases depcicted.  I mention this in the COMMENT
section in a few places, but the short version is roughly "if the HMAC
is fixed for the life of the packet, then we can either have the key ID
namespaced by destination address but only have one verifier, or we can
have multiple verifiers on the path but the key ID space is global".  We
do currently have text that talks about verification being performed at
multiple points on the path, so I'm not sure which scenario is intended.

(5) I think we need to have some discussion about key
revocation/rotation.  The mode of operation for the HMAC TLV that
appears to be envisioned by this document is that there is a central
trusted service that computes "blessed" segment routes with an
accompanying HMAC "signature" (not a real signature, but a sign of
aproval in some sense), and that the resulting token of (SRH including
HMAC TLV) is distributed by SDN configuration.  These SRH tokens are
treated by many nodes as opaque blobs, applied to outgoing traffic
according to the procedure configured alongside the token.  Some other
(trusted) nodes in the network may look inside the SRH to verify the
MAC, and check that the rout in question should be coming from that
direction, but those nodes may be a minority of nodes.  In this
scenario, we need to consider the behavior when the central controller
changes what routes are to be used, and effectively wants to "revoke"
the old ones and ensure that the deprecated routes are not in use in the
SR domain.  The only mechanism for doing so seems to be to rotate the
HMAC key in question so as to discard all HMACs generated by the key in
question (since keeping something akin to a CRL of "revoked" HMAC values
seems infeasible in general); I think we should have some discussion
about needing to do a key rotation to effectuate such "revocation" (that
is, cryptographically ensure that previously configured/"blessed" routes
are no longer in use).  It would also be pretty easy to tie this in to
text about recovering from a compromised HMAC key.
2019-09-03
22 Benjamin Kaduk
[Ballot comment]
As something of a general note, this document (specifically, the HMAC
portions) was initially challenging for me to read, since in the
security …
[Ballot comment]
As something of a general note, this document (specifically, the HMAC
portions) was initially challenging for me to read, since in the
security community we tend to have HMAC (or MACs in general) apply to
specific messages and protect the content from end to end.  The usage
here seems rather different, in that the HMAC is protecting not the
packet payload, but (essentially) just the SRH, which is to a large
extent a fixed (e.g., per-flow) artifact that reflects routing policy.  So the
MAC is serving to authenticate policy, more than messaging, and there
was very little in the document that tried to make that distinction.
I've tried to indicate some locations/changes that would improve readability
in this regard.

Section 1

  The Segment Routing Architecture [RFC8402] describes Segment Routing
  and its instantiation in two data planes MPLS and IPv6.

nit: we need some form of punctuation after "data planes".

Section 2

  o  Tag: tag a packet as part of a class or group of packets, e.g.,
      packets sharing the same set of properties.  When tag is not used
      at source it MUST be set to zero on transmission.  When tag is not
      used during SRH Processing it SHOULD be ignored.  Tag is not used
      when processing the SID defined in Section 4.3.1.  It may be used
      when processing other SIDs which are not defined in this document.
      The allocation and use of tag is outside the scope of this
      document.

At what scope does its use need to be defined?  Can it be defined on a
per-segment basis or must it be deployment-global?

  The mutability of the TLV value is defined by the most significant
  bit in the type, as specified in Section 2.1.

It seems like this presents the design as one where we rely on the
participants to be trusted to properly respect the (im)mutability, and
there are not external mechanisms (e.g., cryptography) to enforce them.
So, we have SR nodes that are in a hybrid state of not being trusted
with HMAC keys (and thus to generate routing policy) but are trusted to
"be implemented correctly" and not mutate fields that are supposed to be
immutable.  This multi-tier trust system should probably be discussed in
the security considerations.

Section 2.1

  An implementation MAY limit the number and/or length of TLVs it
  processes based on local configuration.  It MAY:
  [...]

Is this list an exhaustive enumeration of the granted permissions or are
other limitations possible?

  o  Limit the number of consecutive Pad1 (Section 2.1.1.1) options to
      1, if padding of more than one byte is required then PadN
      (Section 2.1.1.2) should be used.

nit: comma splice

  Type: An 8 bit value.  Unrecognized Types MUST be ignored on receipt.

  Length: The length of the Variable length data.

Do we want to give a pointer to (e.g.) the registry for these type
values?
I see we say in the next entry that Length measures bytes, though
perhaps it is more natural to mention it here.

  Type Length Value (TLV) contain OPTIONAL information that may be used
  by the node identified in the Destination Address (DA) of the packet.

nit: there seems to be a singular/plural mismatch of sorts here, in that
the current TLV incarnation mostly acts as a singular.  I'd suggest
adding another word like "entries" or "structures" after the
parenthetical, as a resolution.

  The highest-order bit of the TLV type specifies whether or not the
  TLV data of that type can change en route to the packet's final
  destination:

For clarity: that's bit '0' in the above figure?

Section 2.1.1

      Padding TLVs are used for meeting the alignment requirement of the
      subsequent TLVs.
      [...]
      Padding TLVs are used for alignment.

Is there some redundancy here we could deduplicate?

Section 2.1.1.1

  required.  If more than one byte of padding is required a Pad1 TLV
  MUST NOT be used, the PadN TLV MUST be used.

nit: comma splice

Section 2.1.1.2

      Padding: Length octets of padding.  Padding bits have no
      semantics.  They MUST be set to 0 on transmission and ignored on

[Elsewhere in the document we've used "semantic" as a singular; it might
be worth a pass to check for consistency of usage]

Section 2.1.2

I echo the sentiments already expressed about this HMAC format being
likely to reflect substantial wasted space in much common usage.
(Unless the intent is that since TLV support is optional, it's unlikely
to be implemented at all, in which case the wastefulness of a
nonexistent feature doesn't matter?)
In particular, having to specify the details of which bits of the 'HMAC'
field have significance when the HMAC algorithm in use has fewer than 32
bytes of output seems to be just as much effort as making the field
variable length.
Four octets of Key ID also seems like far more than will be needed,
though we don't really discuss the scope (in space/topology and time) in
which it needs to be unique -- we should probably talk about that here!
(I do see a bit of discussion in Section 2.1.2.2 that seems to say that
the key-ID is scoped by the destination IP address.)  On the other hand,
this much Key ID space could be used if there was a desire to have very
fine-grained routing policy and revocation ability (see below), but it's
still unclear that even in a high-churn fine-grained situation there
would be the will to store millions of HMAC keys on the
controller/verifier.

  The HMAC TLV is used to verify the source of a packet is permitted to
  use the current segment in the destination address of the packet, and
  ensure the segment list is not modified in transit.

I'd suggest some revisions to this along the lines of:

%  The HMAC TLV is used to verify that the SR applied to a packet was
%  selected by an authorized party, and to ensure that the segment list is
%  not modified after generation.  This also allows for verification that
%  the current segment (by virtue of being in the authorized segment list)
%  is an authorized use.

since the expected usage seems to not be to give the keys (and thus the
choice of segment lists) to the actual source of the packet, and we are
detecting modification of the Segment List since the HMAC generation,
which could span a broader period of time than just when the packet
carrying the HMAC is "in transit".

Section 2.1.2.1

  For HMAC algorithms producing digests less than 32 octets, the digest
  is placed in the lowest order octets of the HMAC field.  Remaining
  octets MUST be set to zero.

To keep me from second-guessing myself, are these the "lowest order
octets" if we are treating the field as a 32-byte big-endian integer?
(As opposed to an array of bytes enumerated in order per the figure.)

  If HMAC verification is successful, the packet is forwarded to the
  next segment.

Does this really mean "processing proceeds as normal", to allow for the
possibility of local action/modification before forwarding?

Section 2.1.2.2

  The HMAC Key ID field is opaque, i.e., it has neither syntax nor
  semantic except as an identifier of the right combination of pre-
  shared key and hash algorithm, and except that a value of 0 means
  that there is no HMAC field.

"No HMAC field" or "the HMAC field is filled entirely with zeros"?  The
previous diagram/discussion does not suggest that the HMAC field is
sometimes omitted.

  At the HMAC TLV verification node the Key ID uniquely identifies the
  pre-shared key and HMAC algorithm.

  At the HMAC TLV generating node the Key ID and destination address
  uniquely identify the pre-shared key and HMAC algorithm.  Utilizing

This decision to make the key-ID space scoped to the destination address
seems to have some potentially substantial consequences that I don't see
discussed in the draft.  Specifically, since the destination address
will change on every hop, it would seem to preclude a model where the
HMAC TLV is generated by the sender and not modified subsequently (which
itself would probably have knock-on effects).  Is the additional scoping
by IP address of key-ID necessary even with the 4-octet key-ID, or would
scoping the key-ID to be globally unique within a SR domain suffice?
Unless the intent is that there is only a single verification node in a
given path?  The desired usage remains quite unclear to me.

Section 3.2, 3.3

nit(?): We seem to talk about "an IPv6 packet" when we really mean "an
IPv6 packet with SRH", "an SR IPv6 packet", "an SRv6" or similar.

Section 4.1

  A Source node steers a packet into an SR Policy.  If the SR Policy
  results in a segment list containing a single segment, and there is
  no need to add information to SRH flag or TLV, the DA is set to the
  single segment list entry and the SRH MAY be omitted.

nit: "to the SRH flags or to add TLVs"

      HMAC TLV may be set according to Section 7.

Do we want to say anything about other, to-be-specified, TLVs here?
Like "HMAC (or other) TLVs may be set" or "TLVs (including HMAC) may be
set according to their specifications"?

4.1.1.  Reduced SRH

  A reduced SRH does not contain the first segment of the related SR
  Policy (the first segment is the one already in the DA of the IPv6
  header), and the Last Entry field is set to n-2 where n is the number
  of elements in the SR Policy.

This seems to imply that Segments Left is not constrained to point
inside the Segment List (and can point one past it); is that correct?

Section 4.3.1

  This document, and section, defines a single SRv6 SID.  Future
  documents may define additional SRv6 SIDs.  In which case, the entire
  content of this section will be defined in that document.

nit: perhaps this is just me, but I tend to read "defines a single SRv6
SID" as "defines a single SRv6 SID value"; the intent here seems to be
more along the lines of "SID behavior" or "SID processing algorithm".
The second sentence could also be phrased similarly to "Such documents
will need to specify the analogous behavior as is described in this
section and subsections".

Section 4.3.1.1

Is this pseudocode normative, or the text of the following subsections?

Section 5.1

  Nodes outside the SR Domain are not trusted: they cannot directly use
  the SID's of the domain.  This is enforced by two levels of access

nit: "SIDs" (no apostrophe)

  1.  Any packet entering the SR Domain and destined to a SID within
      the SR Domain is dropped.  This may be realized with the
      following logic, other methods with equivalent outcome are
      considered compliant:

nit: comma splice  (also in (2))

      *  Failure to implement this method of ingress filtering exposes
          the SR Domain to source routing attacks as described and
          referenced in [RFC5095]

nit: this doesn't seem like a bullet point in the list, but rather a
standalone paragraph of commentary.
It may also be worth reiterating that failure to do so on even a single
edge node puts the entire network at risk.

Section 5.2

  Consider a top of rack switch (T) connected to host (H) via interface
  (I).  H receives an SRH (SRH1) with a computed HMAC via some SDN
  method outside the scope of this document.  H classifies traffic it
  sources and adds SRH1 to traffic requiring a specific SLA.  T is

I'm having a hard time parsing how the SRH1 that H receives via SDN can
be the same SRH1 that H adds to traffic.  The key insight seems to be
that the SRH received via SDN is not attached to an IPv6 packet as a
"live" routing header, but is rather a piece of configuration data to be
applied as the SRH on flows sent on a given SR.  (The formalism is
slightly weird, as "receiving an SRH" includes the "next header" value,
which is arguably artificially limiting, but this is probably minor
enough to ignore.)  So perhaps we want to say that "H receives, along
with the configuration for applying SR to a given flow, an SRH (SRH1)
with pre-computed HMAC that reflects that SR flow, via some SDN method
outside the scope fo this document."

  An operator of the SR Domain may choose to have all segments in the
  SR Domain verify the HMAC.  This mechanism would verify that the SRH
  segment list is not modified while traversing the SR Domain.

As partially covered above, this seems inconsistent with having the HMAC
key-ID be scoped by the destination SID when the destination SID changes
from segment to segment.

Section 5.4

  For the source of an invoking packet to process the ICMP error
  message, the correct destination address must be determined.  The

"correct" in what sense/for what operation?

      *  If routing header is type 4 (SRH)

(This is still "TBD", formally, right?)

        +  Use the SID at Segment List[0] as the destination address of
            the invoking packet.

Similarly to the first comment on this section, do we want some language
about how this is "use"d "for processing by the upper layer transport"?

Section 5.6

I'm slightly tempted to add a sentence along the lines of "the
mechanisms in this document are known to not be directly transferrable
to multi-domain deployment models without substantial impact on these
properties", but (1) it's an absolute statement that seems like it would
be hard to be 100% confident in, and (2) it's not entirely clear that it
adds much value to the general reader (as opposed to providing a
security disclaimer to make the security AD happy).  So I'm curious to
hear about how much thought has already gone into this, pointers to
ongoing documents on the topic, etc.

Section 6.1

I a little bit wonder if mixing zero-based (Segments Left; Last Entry)
and one-based (S1, S2, S3) indexing is going to cause undue cognitive
load for anyone.

Section 6.2

  o  The SR domain is secured as per Section 5.1 and no external packet
      can enter the domain with a destination address equal to a segment
      of the domain.

I'd suggest using "firewalled" rather than "secured", since "secured"
can mean many different things and we have a more-precise term
available.

Section 6.3.2

Is it worth calling out that P5 does not have an SRH?

Section 6.9

  This section describes how a function may be delegated within the SR
  Domain to non SR source nodes.  [...]

I'm kind of confused about what "non SR source node" means in the
context of a source node that is adding an SRH for verification
elsewhere.

Section 6.6.1

  An operator may prefer to add the SRH at source 8, while 5 verifies
  the SID list is valid.

I note that "add" here means "apply a fixed bitstring to the packet",
not "compute the value of"...

  For illustration purpose, an SDN controller provides 8 an SRH
  terminating at node 9, with segment list , and HMAC TLV
  computed for the SRH.  The HMAC key is shared with 5, node 8 does not
  know the key.  Node 5 is configured with an IACL applied to the

... since the SRH value is computed by the controller and distributed to
8 as almost an opaque token.  It would be good if we could reword this
to be more clear about how the mechanics work such that 5 does not need
the HMAC key.

  Node 8 originates packets with the received SRH with HMAC TLV.

nit: I suggest s/with HMAC TLV/including HMAC TLV/

Section 7.1

Does the ability to create traffic loops or near-loops (that span the
same links dozens or hundreds of times) merit a specific mention outside
of "DOS/DDOS"?

Section 7.5

  The SR Domain is a trusted domain, as defined in [RFC8402] Section 2
  and Section 8.2.  The SR Source is trusted to add an SRH (optionally
  verified via the HMAC TLV in this document), and segments advertised

I suggest s/verified/verified as having been generated by a
trusted configuration source/.

  The use of SRH with AH by an SR source node, and processing at a SR
  segment endpoint node, is not defined in this document.  Future
  documents may define use of SRH with AH and its processing.

It's not entirely clear to me what this is intended to convey.  It this
saying "SRH MUST NOT be used in the same packet as AH" or something more
like "we make no statements about the use of SRH in combination with
AH"?

Section 8

  RFC will be published.  The Designated expert will post a request to
  the 6man WG mailing list (or a successor designated by the Area
  Director) for comment and review, including an Internet-Draft.

nit: this wording makes it sound like either the DE includes an I-D in
the body of the mail or is the author of the I-D in question; I assume
we just want a pointer or link to the draft requesting the
allocation(s).

Section 12.2

I-D.filsfils-spring-srv6-interop and
I-D.matsushima-spring-srv6-deployment-status are only referenced from
the Implementation Status section (that is to be removed); should the
references be removed as well?

I think RFCs 2104, 6437, and 6438 need to be normative.
2019-09-03
22 Benjamin Kaduk [Ballot Position Update] New position, Discuss, has been recorded for Benjamin Kaduk
2019-09-03
22 Adam Roach [Ballot Position Update] New position, No Objection, has been recorded for Adam Roach
2019-09-03
22 Deborah Brungard [Ballot Position Update] New position, No Objection, has been recorded for Deborah Brungard
2019-08-29
22 Mirja Kühlewind
[Ballot comment]
I have a couple of questions/comments:

1) Given this is an IP header extension that would need to be added to every single …
[Ballot comment]
I have a couple of questions/comments:

1) Given this is an IP header extension that would need to be added to every single packet when used, I would have expected a more byte-conserving design for the HMAC TLV. It doesn't seems that the RESERVED field is actually needed (as padding can be done by the padding TLVs) and the HMAC TLV could even be variable length based on the actual output of the HMAC algorithm used. Why was the current design chosen instead?

2) I agree with the TSV-ART review (Thanks Joe!) that MTU discussion in section 5.3 is not sufficient and at least a pointer to draft-ietf-intarea-tunnels would be good.

3) Sec 5.6: I would rather like to see a clear applicability state at the beginning of this document that the statement in section 5.6 at the end of the document. E.g. use of the HMAC TLV also assumes some kind of common (centralised/SDN-based) pre-configuration. I think it would be important to state these kind of constraints upfront. I think this point does not raise discuss level, however, I think it would be really important to address because it becomes clear when ready the document that certain deployment scenario was assumed and I think it would be appropriate to restrict the applicability of this spec to this scenario. Otherwise I think it would not be acceptable to have some of the "out-of-scope" statements in this doc.

4) I also agree with the TSV-ART review that the registration procedure for the Flags should be "IETF review". Alternatively I actually recommend to not create this registry now and leave this decision to the first RFC that will assign a flag (which would anyway need to update this RFC).
2019-08-29
22 Mirja Kühlewind [Ballot Position Update] New position, No Objection, has been recorded for Mirja Kühlewind
2019-08-27
22 Amy Vezza Placed on agenda for telechat - 2019-09-05
2019-08-27
22 Suresh Krishnan IESG state changed to IESG Evaluation from Waiting for Writeup
2019-08-27
22 Suresh Krishnan Ballot has been issued
2019-08-27
22 Suresh Krishnan [Ballot Position Update] New position, Yes, has been recorded for Suresh Krishnan
2019-08-27
22 Suresh Krishnan Created "Approve" ballot
2019-08-27
22 Suresh Krishnan Ballot writeup was changed
2019-08-20
22 Joseph Touch Request for Last Call review by TSVART Completed: Almost Ready. Reviewer: Joseph Touch. Sent review to list.
2019-08-20
22 Sabrina Tanamal IANA Review state changed to IANA OK - Actions Needed from IANA - Not OK
2019-08-20
22 (System) IESG state changed to Waiting for Writeup from In Last Call
2019-08-19
22 (System) IANA Review state changed to IANA - Not OK from IANA - Review Needed
2019-08-19
22 Sabrina Tanamal
(Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs:

The IANA Functions Operator has completed its review of draft-ietf-6man-segment-routing-header-22. If any part of this review is inaccurate, please let …
(Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs:

The IANA Functions Operator has completed its review of draft-ietf-6man-segment-routing-header-22. If any part of this review is inaccurate, please let us know.

The IANA Functions Operator has a question about one of the actions requested in the IANA Considerations section of this document.

The IANA Functions Operator understands that, upon approval of this document, there are four actions which we must complete.

First, in the Routing Types registry on the Internet Protocol Version 6 (IPv6) Parameters registry page located at:

https://www.iana.org/assignments/ipv6-parameters/

a new registration is to be made as follows:

Value: [ TBD-at-Registration ]
Description: Segment Routing Header (SRH)
Reference: [ RFC-to-be ]

IANA understands that the authors have suggested a value of 4 for this registration.

Second, in the Type 4 - Parameter Problem subregistry of the ICMPv6 "type" Numbers registry on the Internet Control Message Protocol version 6 (ICMPv6) Parameters registry page located at:

https://www.iana.org/assignments/icmpv6-parameters/

a new registration is to be made as follows:

Code: [ TBD-at-Registration ]
Name: SR Upper-layer Header Error
Reference: [ RFC-to-be ]

Third, a new registry is to be created called the Segment Routing Header Flags registry.

IANA Question --> Where should this new registry be located? Should it be added to an existing registry page? If not, does it belong in an existing category at http://www.iana.org/protocols?

The new registry is to be managed via Expert Review as defined in RFC 8126. IANA understands that there are eight bits to be registered in this registry.

IANA Question --> Do any of the bits have initial registrations?

Fourth, a new registry is to be created called the Segment Routing Header TLVs registry.

IANA Question --> Where should this new registry be located? Should it be added to an existing registry page? If not, does it belong in an existing category at http://www.iana.org/protocols?

Values in the new registry range from 0-255. The new registry is managed via Expert Review as defined in RFC 8126. There are initial registrations in the new registry as follows:

Assigned Description Reference
Value
------------------------------------------------------
0 Pad1 TLV [ RFC-to-be ]
1 Reserved [ RFC-to-be ]
2 Reserved [ RFC-to-be ]
3 Reserved [ RFC-to-be ]
4 PadN TLV [ RFC-to-be ]
5 HMAC TLV [ RFC-to-be ]
6 Reserved [ RFC-to-be ]
124-126 Experimentation and Test [ RFC-to-be ]
127 Reserved [ RFC-to-be ]
252-254 Experimentation and Test [ RFC-to-be ]
255 Reserved [ RFC-to-be ]

The IANA Functions Operator understands that these are the only actions required to be completed upon approval of this document.

Note:  The actions requested in this document will not be completed until the document has been approved for publication as an RFC. This message is meant only to confirm the list of actions that will be performed.

Thank you,

Sabrina Tanamal
Senior IANA Services Specialist
2019-08-15
22 Roni Even Request for Last Call review by GENART Completed: Ready. Reviewer: Roni Even. Sent review to list.
2019-08-14
22 Liang Xia Request for Last Call review by SECDIR Completed: Has Issues. Reviewer: Liang Xia. Sent review to list.
2019-08-14
22 Will LIU Request for Last Call review by OPSDIR Completed: Ready. Reviewer: Will LIU. Sent review to list.
2019-08-13
22 Gunter Van de Velde Request for Last Call review by OPSDIR is assigned to Will LIU
2019-08-13
22 Gunter Van de Velde Request for Last Call review by OPSDIR is assigned to Will LIU
2019-08-12
22 Wesley Eddy Request for Last Call review by TSVART is assigned to Joseph Touch
2019-08-12
22 Wesley Eddy Request for Last Call review by TSVART is assigned to Joseph Touch
2019-08-11
22 Min Ye Request for Last Call review by RTGDIR is assigned to Lou Berger
2019-08-11
22 Min Ye Request for Last Call review by RTGDIR is assigned to Lou Berger
2019-08-08
22 Jean Mahoney Request for Last Call review by GENART is assigned to Roni Even
2019-08-08
22 Jean Mahoney Request for Last Call review by GENART is assigned to Roni Even
2019-08-08
22 Tero Kivinen Request for Last Call review by SECDIR is assigned to Liang Xia
2019-08-08
22 Tero Kivinen Request for Last Call review by SECDIR is assigned to Liang Xia
2019-08-06
22 Alvaro Retana Requested Last Call review by RTGDIR
2019-08-06
22 Cindy Morgan IANA Review state changed to IANA - Review Needed
2019-08-06
22 Cindy Morgan
The following Last Call announcement was sent out (ends 2019-08-20):

From: The IESG
To: IETF-Announce
CC: ipv6@ietf.org, draft-ietf-6man-segment-routing-header@ietf.org, bob.hinden@gmail.com, Robert Hinden , …
The following Last Call announcement was sent out (ends 2019-08-20):

From: The IESG
To: IETF-Announce
CC: ipv6@ietf.org, draft-ietf-6man-segment-routing-header@ietf.org, bob.hinden@gmail.com, Robert Hinden , suresh@kaloom.com, 6man-chairs@ietf.org
Reply-To: ietf@ietf.org
Sender:
Subject: Last Call:  (IPv6 Segment Routing Header (SRH)) to Proposed Standard


The IESG has received a request from the IPv6 Maintenance WG (6man) to
consider the following document: - 'IPv6 Segment Routing Header (SRH)'
  as Proposed Standard

The IESG plans to make a decision in the next few weeks, and solicits final
comments on this action. Please send substantive comments to the
ietf@ietf.org mailing lists by 2019-08-20. Exceptionally, comments may be
sent to iesg@ietf.org instead. In either case, please retain the beginning of
the Subject line to allow automated sorting.

Abstract


  Segment Routing can be applied to the IPv6 data plane using a new
  type of Routing Extension Header called the Segment Routing Header.
  This document describes the Segment Routing Header and how it is used
  by Segment Routing capable nodes.




The file can be obtained via
https://datatracker.ietf.org/doc/draft-ietf-6man-segment-routing-header/

IESG discussion can be tracked via
https://datatracker.ietf.org/doc/draft-ietf-6man-segment-routing-header/ballot/

The following IPR Declarations may be related to this I-D:

  https://datatracker.ietf.org/ipr/2421/





2019-08-06
22 Cindy Morgan IESG state changed to In Last Call from Last Call Requested
2019-08-06
22 Suresh Krishnan Last call was requested
2019-08-06
22 Suresh Krishnan Last call announcement was generated
2019-08-06
22 Suresh Krishnan Ballot approval text was generated
2019-08-06
22 Suresh Krishnan Ballot writeup was generated
2019-08-06
22 Suresh Krishnan IESG state changed to Last Call Requested from AD Evaluation::AD Followup
2019-08-06
22 (System) Sub state has been changed to AD Followup from Revised ID Needed
2019-08-06
22 Darren Dukes New version available: draft-ietf-6man-segment-routing-header-22.txt
2019-08-06
22 (System) New version approved
2019-08-06
22 (System)
Request for posting confirmation emailed to previous authors: Satoru Matsushima , " daniel.voyer@bell.ca" , John Leddy , Darren Dukes , Clarence Filsfils , Stefano …
Request for posting confirmation emailed to previous authors: Satoru Matsushima , " daniel.voyer@bell.ca" , John Leddy , Darren Dukes , Clarence Filsfils , Stefano Previdi
2019-08-06
22 Darren Dukes Uploaded new revision
2019-07-21
21 Suresh Krishnan Sent AD eval comments to authors and 6man mailing list. The issues raised will require a new revision of draft.
2019-07-21
21 Suresh Krishnan IESG state changed to AD Evaluation::Revised I-D Needed from AD Evaluation
2019-07-11
21 Suresh Krishnan IESG state changed to AD Evaluation from Publication Requested
2019-06-18
21 Bob Hinden
Document Shepard Write up for draft-ietf-6man-segment-routing-header-21.txt
Bob Hinden
18 June 2019


(1) What type of RFC is being requested (BCP, Proposed Standard, Internet
Standard, Informational, …
Document Shepard Write up for draft-ietf-6man-segment-routing-header-21.txt
Bob Hinden
18 June 2019


(1) What type of RFC is being requested (BCP, Proposed Standard, Internet
Standard, Informational, Experimental, or Historic)? Why is this the
proper type of RFC? Is this type of RFC indicated in the title page
header?

  Proposed Standard. 
  Header indicates Standards Track.


(2) The IESG approval announcement includes a Document Announcement
Write-Up. Please provide such a Document Announcement Write-Up. Recent
examples can be found in the "Action" announcements for approved
documents. The approval announcement contains the following sections:


Technical Summary:

Relevant content can frequently be found in the abstract and/or
introduction of the document. If not, this may be an indication that
there are deficiencies in the abstract or introduction.

  Segment Routing is designed to be applied to the IPv6 data plane using
  a new type of Routing Extension Header (SRH) in this document.  This
  document describes the Segment Routing Extension Header and how it is
  used by Segment Routing capable nodes.

  The Segment Routing Architecture [RFC8402] describes Segment Routing
  and its instantiation in two data planes MPLS and IPv6.  The encoding
  of IPv6 segments in the Segment Routing Extension Header is defined in
  this document.


Working Group Summary:

Was there anything in WG process that is worth noting? For example, was
there controversy about particular points or were there decisions where
the consensus was particularly rough?

  The work on SRH has been underway for a long time.  The first working
  group version of the draft was published in December 2015, the first
  working group call started on March 2018.  Given the number of issues
  that were raised the chairs started an issue tracker.  Fifty issues
  were tracked.  After further discussion, many new drafts, and
  confirmation at IETF 104, the chairs started a second working group
  last call in May 2019.  After further discussion two new drafts were
  published and the chairs concluded the last call and declared that
  there is consensus to advance this document on 14 June 2019.  See:

  https://mailarchive.ietf.org/arch/msg/ipv6/_9OrqvZYpDB0lJEE8jxB0a0N44M

  The chairs believe there is a strong consensus to advance this
  document, but it was not unanimous.

  There remains a desire by a few people to add more clarity on
  mutability of segment lists and other fields.  The chairs conclusion
  is that the text added since the last call closes this topic, but a
  few would like to see more.


Document Quality:

Are there existing implementations of the protocol? Have a significant
number of vendors indicated their plan to implement the specification?
Are there any reviewers that merit special mention as having done a
thorough review, e.g., one that resulted in important changes or a
conclusion that the document had no substantive issues? If there was a
MIB Doctor, Media Type or other expert review, what was its course
(briefly)? In the case of a Media Type review, on what date was the
request posted?

  Section 9 lists current implementations, these include:

      Linux Kernel v4.14
      Cisco Systems IOS XR and IOS XE
      FD.io  VPP/Segment Routing for IPv6
      Barefoot Networks Tofino NPU

  Detailed reviews were done in the course of review this document in
  the 6man working group.  Several people did extensive reviews, they
  include Joel Halpern, Ron Bonica, Mark Smith, and Tom Herbert.  The
  6man chairs have also reviewed this document.  These reviews resulted
  in many improvements to the document.

  No MIBs or other media types to be reviewed.

Personnel:

Who is the Document Shepherd? Who is the Responsible Area Director?

  Bob Hinden is the Document Shepherd.
  Suresh Krishnan is the Responsible AD.


(3) Briefly describe the review of this document that was performed by
the Document Shepherd. If this version of the document is not ready for
publication, please explain why the document is being forwarded to the
IESG.

  The document shepherd reviewed the draft (actually 21 versions since
  it became a w.g. draft), followed and participated in the discussion
  on the mailing list and at 6man sessions.  The chairs put a lot of
  effort into determining where there was consensus on issues and in
  several cases proposed text changes to resolve issues.  This was
  accepted pretty well by the working group and the authors.
 
  The document shepherd believes this document is ready to be advanced
  to the IESG.


(4) Does the Document Shepherd have any concerns about the depth or
breadth of the reviews that have been performed? 

  The shepherd has no concerns about the reviews done in 6man, any
  issues remaining will require wider review as part of the next steps
  in the process.  SRH as part of the Spring architecture has broader
  implications than just a routing protocol (that is, beyond the routing
  area where the Spring w.g. Is located).  The 6man review was very
  thorough, but there are not many 6man working group participants that
  are also Spring architecture experts.


(5) Do portions of the document need review from a particular or from
broader perspective, e.g., security, operational complexity, AAA, DNS,
DHCP, XML, or internationalization? If so, describe the review that took
place.

  The chairs think a thorough review by the security area for issues like
  the HMAC, the use of AH with SRH, and the security of source routing in
  general is warranted.


(6) Describe any specific concerns or issues that the Document Shepherd
has with this document that the Responsible Area Director and/or the IESG
should be aware of? For example, perhaps he or she is uncomfortable with
certain parts of the document, or has concerns whether there really is a
need for it. In any event, if the WG has discussed those issues and has
indicated that it still wishes to advance the document, detail those
concerns here.

  This document has six authors, one over the limit.  Much earlier,
  there were about 12 authors, the chairs were able to have the authors
  reduce it to five.  We noticed later in the process, that Darren Dukes
  who was clearly acting a document editor, was not listed as an author.
  We asked him to add his name.  The chairs think an exception is
  reasonable in this case.


(7) Has each author confirmed that any and all appropriate IPR
disclosures required for full conformance with the provisions of BCP 78
and BCP 79 have already been filed. If not, explain why?

  All authors have confirmed this.

  stefano@previdi.net  Confirmed 16 June 2019
  cfilsfil@cisco.com Confirmed 18 June 2018
  ddukes@cisco.com  Confirmed 17 June 2019
  john@leddy.net Confirmed 17 June 2019
  satoru.matsushima@g.softbank.co.jp  Confirmed 17 June 2019
  daniel.voyer@bell.ca  Confirmed 17 June 2019


(8) Has an IPR disclosure been filed that references this document? If
so, summarize any WG discussion and conclusion regarding the IPR
disclosures.

  There is one IPR disclosure from Cisco filed for an earlier draft, see:

      https://datatracker.ietf.org/ipr/2421/ 

  Summary is:

  “If technology in this document is included in a standard adopted by
  IETF and any claims of any Cisco patents are necessary for practicing
  the standard, any party will have the right to use any such patent
  claims under reasonable, non-discriminatory terms, with reciprocity,
  to implement and fully comply with the standard.”


(9) How solid is the WG consensus behind this document? Does it represent
the strong concurrence of a few individuals, with others being silent, or
does the WG as a whole understand and agree with it?

  The consensus is strong to advance.  It is not unanimous however.
  There has been a very active discussion on this document over a long
  period of time, the current draft is significantly improved and the
  chairs think the 6man working group would like to see it advanced.


(10) Has anyone threatened an appeal or otherwise indicated extreme
discontent? If so, please summarise the areas of conflict in separate
email messages to the Responsible Area Director. (It should be in a
separate email because this questionnaire is publicly available.)

  No appeals threatened.


(11) Identify any ID nits the Document Shepherd has found in this
document. (See http://www.ietf.org/tools/idnits/ and the Internet-Drafts
Checklist). Boilerplate checks are not enough; this check needs to be
thorough. 

  ID nits of the current draft is good.


(12) Describe how the document meets any required formal review criteria,
such as the MIB Doctor, media type, and URI type reviews.

  N/A


(13) Have all references within this document been identified as either
normative or informative?

  Yes.


(14) Are there normative references to documents that are not ready for
advancement or are otherwise in an unclear state? If such normative
references exist, what is the plan for their completion?

  All Normative reference point to published RFCs.


(15) Are there downward normative references references (see RFC 3967)?
If so, list these downward references to support the Area Director in the
Last Call procedure.

  All Normative reference point to published RFCs.


(16) Will publication of this document change the status of any existing
RFCs? Are those RFCs listed on the title page header, listed in the
abstract, and discussed in the introduction? If the RFCs are not listed
in the Abstract and Introduction, explain why, and point to the part of
the document where the relationship of this document to the other RFCs is
discussed. If this information is not in the document, explain why the WG
considers it unnecessary.

  This document does not change the status of any existing RFC.


(17) Describe the Document Shepherd's review of the IANA considerations
section, especially with regard to its consistency with the body of the
document. Confirm that all protocol extensions that the document makes
are associated with the appropriate reservations in IANA
registries. Confirm that any referenced IANA registries have been clearly
identified. Confirm that newly created IANA registries include a detailed
specification of the initial contents for the registry, that allocations
procedures for future registrations are defined, and a reasonable name
for the new registry has been suggested (see RFC 8126).

  The Document Shepherd reviewed the IANA considerations section and
  thinks the text in the current version is good.  Earlier, changes were
  requested, these are in the current version.


(18) List any new IANA registries that require Expert Review for future
allocations. Provide any public guidance that the IESG would find useful
in selecting the IANA Experts for these new registries.

  This is described in Section 8. “IANA Considerations” in detail.


(19) Describe reviews and automated checks performed by the Document
Shepherd to validate sections of the document written in a formal
language, such as XML code, BNF rules, MIB definitions, etc.

  N/A
2019-06-18
21 Bob Hinden Responsible AD changed to Suresh Krishnan
2019-06-18
21 Bob Hinden IETF WG state changed to Submitted to IESG for Publication from WG Consensus: Waiting for Write-Up
2019-06-18
21 Bob Hinden IESG state changed to Publication Requested from I-D Exists
2019-06-18
21 Bob Hinden IESG process started in state Publication Requested
2019-06-18
21 Bob Hinden
Document Shepard Write up for draft-ietf-6man-segment-routing-header-21.txt
Bob Hinden
18 June 2019


(1) What type of RFC is being requested (BCP, Proposed Standard, Internet
Standard, Informational, …
Document Shepard Write up for draft-ietf-6man-segment-routing-header-21.txt
Bob Hinden
18 June 2019


(1) What type of RFC is being requested (BCP, Proposed Standard, Internet
Standard, Informational, Experimental, or Historic)? Why is this the
proper type of RFC? Is this type of RFC indicated in the title page
header?

  Proposed Standard. 
  Header indicates Standards Track.


(2) The IESG approval announcement includes a Document Announcement
Write-Up. Please provide such a Document Announcement Write-Up. Recent
examples can be found in the "Action" announcements for approved
documents. The approval announcement contains the following sections:


Technical Summary:

Relevant content can frequently be found in the abstract and/or
introduction of the document. If not, this may be an indication that
there are deficiencies in the abstract or introduction.

  Segment Routing is designed to be applied to the IPv6 data plane using
  a new type of Routing Extension Header (SRH) in this document.  This
  document describes the Segment Routing Extension Header and how it is
  used by Segment Routing capable nodes.

  The Segment Routing Architecture [RFC8402] describes Segment Routing
  and its instantiation in two data planes MPLS and IPv6.  The encoding
  of IPv6 segments in the Segment Routing Extension Header is defined in
  this document.


Working Group Summary:

Was there anything in WG process that is worth noting? For example, was
there controversy about particular points or were there decisions where
the consensus was particularly rough?

  The work on SRH has been underway for a long time.  The first working
  group version of the draft was published in December 2015, the first
  working group call started on March 2018.  Given the number of issues
  that were raised the chairs started an issue tracker.  Fifty issues
  were tracked.  After further discussion, many new drafts, and
  confirmation at IETF 104, the chairs started a second working group
  last call in May 2019.  After further discussion two new drafts were
  published and the chairs concluded the last call and declared that
  there is consensus to advance this document on 14 June 2019.  See:

  https://mailarchive.ietf.org/arch/msg/ipv6/_9OrqvZYpDB0lJEE8jxB0a0N44M

  The chairs believe there is a strong consensus to advance this
  document, but it was not unanimous.

  There remains a desire by a few people to add more clarity on
  mutability of segment lists and other fields.  The chairs conclusion
  is that the text added since the last call closes this topic, but a
  few would like to see more.


Document Quality:

Are there existing implementations of the protocol? Have a significant
number of vendors indicated their plan to implement the specification?
Are there any reviewers that merit special mention as having done a
thorough review, e.g., one that resulted in important changes or a
conclusion that the document had no substantive issues? If there was a
MIB Doctor, Media Type or other expert review, what was its course
(briefly)? In the case of a Media Type review, on what date was the
request posted?

  Section 9 lists current implementations, these include:

      Linux Kernel v4.14
      Cisco Systems IOS XR and IOS XE
      FD.io  VPP/Segment Routing for IPv6
      Barefoot Networks Tofino NPU

  Detailed reviews were done in the course of review this document in
  the 6man working group.  Several people did extensive reviews, they
  include Joel Halpern, Ron Bonica, Mark Smith, and Tom Herbert.  The
  6man chairs have also reviewed this document.  These reviews resulted
  in many improvements to the document.

  No MIBs or other media types to be reviewed.

Personnel:

Who is the Document Shepherd? Who is the Responsible Area Director?

  Bob Hinden is the Document Shepherd.
  Suresh Krishnan is the Responsible AD.


(3) Briefly describe the review of this document that was performed by
the Document Shepherd. If this version of the document is not ready for
publication, please explain why the document is being forwarded to the
IESG.

  The document shepherd reviewed the draft (actually 21 versions since
  it became a w.g. draft), followed and participated in the discussion
  on the mailing list and at 6man sessions.  The chairs put a lot of
  effort into determining where there was consensus on issues and in
  several cases proposed text changes to resolve issues.  This was
  accepted pretty well by the working group and the authors.
 
  The document shepherd believes this document is ready to be advanced
  to the IESG.


(4) Does the Document Shepherd have any concerns about the depth or
breadth of the reviews that have been performed? 

  The shepherd has no concerns about the reviews done in 6man, any
  issues remaining will require wider review as part of the next steps
  in the process.  SRH as part of the Spring architecture has broader
  implications than just a routing protocol (that is, beyond the routing
  area where the Spring w.g. Is located).  The 6man review was very
  thorough, but there are not many 6man working group participants that
  are also Spring architecture experts.


(5) Do portions of the document need review from a particular or from
broader perspective, e.g., security, operational complexity, AAA, DNS,
DHCP, XML, or internationalization? If so, describe the review that took
place.

  The chairs think a thorough review by the security area for issues like
  the HMAC, the use of AH with SRH, and the security of source routing in
  general is warranted.


(6) Describe any specific concerns or issues that the Document Shepherd
has with this document that the Responsible Area Director and/or the IESG
should be aware of? For example, perhaps he or she is uncomfortable with
certain parts of the document, or has concerns whether there really is a
need for it. In any event, if the WG has discussed those issues and has
indicated that it still wishes to advance the document, detail those
concerns here.

  This document has six authors, one over the limit.  Much earlier,
  there were about 12 authors, the chairs were able to have the authors
  reduce it to five.  We noticed later in the process, that Darren Dukes
  who was clearly acting a document editor, was not listed as an author.
  We asked him to add his name.  The chairs think an exception is
  reasonable in this case.


(7) Has each author confirmed that any and all appropriate IPR
disclosures required for full conformance with the provisions of BCP 78
and BCP 79 have already been filed. If not, explain why?

  All authors have confirmed this.

  stefano@previdi.net  Confirmed 16 June 2019
  cfilsfil@cisco.com Confirmed 18 June 2018
  ddukes@cisco.com  Confirmed 17 June 2019
  john@leddy.net Confirmed 17 June 2019
  satoru.matsushima@g.softbank.co.jp  Confirmed 17 June 2019
  daniel.voyer@bell.ca  Confirmed 17 June 2019


(8) Has an IPR disclosure been filed that references this document? If
so, summarize any WG discussion and conclusion regarding the IPR
disclosures.

  There is one IPR disclosure from Cisco filed for an earlier draft, see:

      https://datatracker.ietf.org/ipr/2421/ 

  Summary is:

  “If technology in this document is included in a standard adopted by
  IETF and any claims of any Cisco patents are necessary for practicing
  the standard, any party will have the right to use any such patent
  claims under reasonable, non-discriminatory terms, with reciprocity,
  to implement and fully comply with the standard.”


(9) How solid is the WG consensus behind this document? Does it represent
the strong concurrence of a few individuals, with others being silent, or
does the WG as a whole understand and agree with it?

  The consensus is strong to advance.  It is not unanimous however.
  There has been a very active discussion on this document over a long
  period of time, the current draft is significantly improved and the
  chairs think the 6man working group would like to see it advanced.


(10) Has anyone threatened an appeal or otherwise indicated extreme
discontent? If so, please summarise the areas of conflict in separate
email messages to the Responsible Area Director. (It should be in a
separate email because this questionnaire is publicly available.)

  No appeals threatened.


(11) Identify any ID nits the Document Shepherd has found in this
document. (See http://www.ietf.org/tools/idnits/ and the Internet-Drafts
Checklist). Boilerplate checks are not enough; this check needs to be
thorough. 

  ID nits of the current draft is good.


(12) Describe how the document meets any required formal review criteria,
such as the MIB Doctor, media type, and URI type reviews.

  N/A


(13) Have all references within this document been identified as either
normative or informative?

  Yes.


(14) Are there normative references to documents that are not ready for
advancement or are otherwise in an unclear state? If such normative
references exist, what is the plan for their completion?

  All Normative reference point to published RFCs.


(15) Are there downward normative references references (see RFC 3967)?
If so, list these downward references to support the Area Director in the
Last Call procedure.

  All Normative reference point to published RFCs.


(16) Will publication of this document change the status of any existing
RFCs? Are those RFCs listed on the title page header, listed in the
abstract, and discussed in the introduction? If the RFCs are not listed
in the Abstract and Introduction, explain why, and point to the part of
the document where the relationship of this document to the other RFCs is
discussed. If this information is not in the document, explain why the WG
considers it unnecessary.

  This document does not change the status of any existing RFC.


(17) Describe the Document Shepherd's review of the IANA considerations
section, especially with regard to its consistency with the body of the
document. Confirm that all protocol extensions that the document makes
are associated with the appropriate reservations in IANA
registries. Confirm that any referenced IANA registries have been clearly
identified. Confirm that newly created IANA registries include a detailed
specification of the initial contents for the registry, that allocations
procedures for future registrations are defined, and a reasonable name
for the new registry has been suggested (see RFC 8126).

  The Document Shepherd reviewed the IANA considerations section and
  thinks the text in the current version is good.  Earlier, changes were
  requested, these are in the current version.


(18) List any new IANA registries that require Expert Review for future
allocations. Provide any public guidance that the IESG would find useful
in selecting the IANA Experts for these new registries.

  This is described in Section 8. “IANA Considerations” in detail.


(19) Describe reviews and automated checks performed by the Document
Shepherd to validate sections of the document written in a formal
language, such as XML code, BNF rules, MIB definitions, etc.

  N/A
2019-06-13
21 Darren Dukes New version available: draft-ietf-6man-segment-routing-header-21.txt
2019-06-13
21 (System) New version approved
2019-06-13
21 (System)
Request for posting confirmation emailed to previous authors: Satoru Matsushima , " daniel.voyer@bell.ca" , John Leddy , Darren Dukes , Clarence Filsfils , Stefano …
Request for posting confirmation emailed to previous authors: Satoru Matsushima , " daniel.voyer@bell.ca" , John Leddy , Darren Dukes , Clarence Filsfils , Stefano Previdi
2019-06-13
21 Darren Dukes Uploaded new revision
2019-06-12
20 Ole Trøan IETF WG state changed to WG Consensus: Waiting for Write-Up from In WG Last Call
2019-06-10
20 Darren Dukes New version available: draft-ietf-6man-segment-routing-header-20.txt
2019-06-10
20 (System) New version approved
2019-06-10
20 (System)
Request for posting confirmation emailed to previous authors: Satoru Matsushima , " daniel.voyer@bell.ca" , John Leddy , Darren Dukes , Clarence Filsfils , Stefano …
Request for posting confirmation emailed to previous authors: Satoru Matsushima , " daniel.voyer@bell.ca" , John Leddy , Darren Dukes , Clarence Filsfils , Stefano Previdi
2019-06-10
20 Darren Dukes Uploaded new revision
2019-05-22
19 Bob Hinden Tag Revised I-D Needed - Issue raised by WGLC cleared.
2019-05-22
19 Bob Hinden IETF WG state changed to In WG Last Call from WG Document
2019-05-22
19 Darren Dukes New version available: draft-ietf-6man-segment-routing-header-19.txt
2019-05-22
19 (System) New version approved
2019-05-22
19 (System) Request for posting confirmation emailed to previous authors: Satoru Matsushima , " daniel.voyer@bell.ca" , John Leddy , Clarence Filsfils , Stefano Previdi , 6man-chairs@ietf.org
2019-05-22
19 Darren Dukes Uploaded new revision
2019-04-05
18 Darren Dukes New version available: draft-ietf-6man-segment-routing-header-18.txt
2019-04-05
18 (System) New version approved
2019-04-05
18 (System) Request for posting confirmation emailed to previous authors: Stefano Previdi , John Leddy , Satoru Matsushima , " daniel.voyer@bell.ca" , Clarence Filsfils
2019-04-05
18 Darren Dukes Uploaded new revision
2019-03-29
17 Bob Hinden Ended w.g. last call, chairs plan to start new w.g. last call when new draft is available that closes remaining issues.
2019-03-29
17 Bob Hinden Tag Revised I-D Needed - Issue raised by WGLC set.
2019-03-29
17 Bob Hinden IETF WG state changed to WG Document from In WG Last Call
2019-03-29
17 Bob Hinden Changed consensus to Yes from Unknown
2019-03-29
17 Bob Hinden Intended Status changed to Proposed Standard from None
2019-03-25
17 Dan Voyer New version available: draft-ietf-6man-segment-routing-header-17.txt
2019-03-25
17 (System) New version approved
2019-03-25
17 (System) Request for posting confirmation emailed to previous authors: Stefano Previdi , John Leddy , Satoru Matsushima , " daniel.voyer@bell.ca" , Clarence Filsfils
2019-03-25
17 Dan Voyer Uploaded new revision
2019-03-24
17 (System) Request for posting confirmation emailed to previous authors: Stefano Previdi , John Leddy , Satoru Matsushima , " daniel.voyer@bell.ca" , Clarence Filsfils
2019-03-24
17 Darren Dukes Uploaded new revision
2019-02-05
16 Darren Dukes New version available: draft-ietf-6man-segment-routing-header-16.txt
2019-02-05
16 (System) New version approved
2019-02-04
16 (System) Request for posting confirmation emailed to previous authors: Stefano Previdi , John Leddy , Satoru Matsushima , " daniel.voyer@bell.ca" , Clarence Filsfils
2019-02-04
16 Darren Dukes Uploaded new revision
2018-11-05
16 (System) Request for posting confirmation emailed to previous authors: Stefano Previdi , John Leddy , Satoru Matsushima , " daniel.voyer@bell.ca" , Clarence Filsfils
2018-11-05
16 Darren Dukes Uploaded new revision
2018-10-22
15 Darren Dukes New version available: draft-ietf-6man-segment-routing-header-15.txt
2018-10-22
15 (System) New version approved
2018-10-22
15 (System) Request for posting confirmation emailed to previous authors: Satoru Matsushima , John Leddy , " daniel.voyer@bell.ca" , Clarence Filsfils , Stefano Previdi , 6man-chairs@ietf.org
2018-10-22
15 Darren Dukes Uploaded new revision
2018-06-29
14 Darren Dukes New version available: draft-ietf-6man-segment-routing-header-14.txt
2018-06-29
14 (System) New version approved
2018-06-29
14 (System) Request for posting confirmation emailed to previous authors: Satoru Matsushima , John Leddy , " daniel.voyer@bell.ca" , Clarence Filsfils , Stefano Previdi , 6man-chairs@ietf.org
2018-06-29
14 Darren Dukes Uploaded new revision
2018-05-23
13 Darren Dukes New version available: draft-ietf-6man-segment-routing-header-13.txt
2018-05-23
13 (System) New version approved
2018-05-23
13 (System) Request for posting confirmation emailed to previous authors: Clarence Filsfils , John Leddy , Stefano Previdi , Satoru Matsushima , " daniel.voyer@bell.ca"
2018-05-23
13 Darren Dukes Uploaded new revision
2018-04-20
12 Clarence Filsfils New version available: draft-ietf-6man-segment-routing-header-12.txt
2018-04-20
12 (System) New version approved
2018-04-19
12 (System) Request for posting confirmation emailed to previous authors: Satoru Matsushima , John Leddy , " daniel.voyer@bell.ca" , Clarence Filsfils , Stefano Previdi , 6man-chairs@ietf.org
2018-04-19
12 Clarence Filsfils Uploaded new revision
2018-03-29
11 Bob Hinden IETF WG state changed to In WG Last Call from WG Document
2018-03-29
11 Bob Hinden Notification list changed to Robert Hinden <bob.hinden@gmail.com>
2018-03-29
11 Bob Hinden Document shepherd changed to Robert M. Hinden
2018-03-28
11 Darren Dukes New version available: draft-ietf-6man-segment-routing-header-11.txt
2018-03-28
11 (System) New version approved
2018-03-28
11 (System) Request for posting confirmation emailed to previous authors: Satoru Matsushima , John Leddy , " daniel.voyer@bell.ca" , Clarence Filsfils , Stefano Previdi , 6man-chairs@ietf.org
2018-03-28
11 Darren Dukes Uploaded new revision
2018-03-18
10 Darren Dukes New version available: draft-ietf-6man-segment-routing-header-10.txt
2018-03-18
10 (System) New version approved
2018-03-18
10 (System)
Request for posting confirmation emailed to previous authors: Tomoya Kosugi , Dirk Steinberg , Satoru Matsushima , Robert Raszuk , " daniel.voyer@bell.ca" , David …
Request for posting confirmation emailed to previous authors: Tomoya Kosugi , Dirk Steinberg , Satoru Matsushima , Robert Raszuk , " daniel.voyer@bell.ca" , David Lebrun , John Leddy , Eric Vyncke , " daniel.bernier@bell.ca" , Darren Dukes , Kamran Raza , Ida Leung , Brian Field , Clarence Filsfils , Ebben Aries , Stefano Previdi , "J. Linkova" , 6man-chairs@ietf.org
2018-03-18
10 Darren Dukes Uploaded new revision
2018-03-05
09 Darren Dukes New version available: draft-ietf-6man-segment-routing-header-09.txt
2018-03-05
09 (System) New version approved
2018-03-05
09 (System)
Request for posting confirmation emailed to previous authors: Tomoya Kosugi , Dirk Steinberg , Satoru Matsushima , Robert Raszuk , " daniel.voyer@bell.ca" , David …
Request for posting confirmation emailed to previous authors: Tomoya Kosugi , Dirk Steinberg , Satoru Matsushima , Robert Raszuk , " daniel.voyer@bell.ca" , David Lebrun , John Leddy , Eric Vyncke , " daniel.bernier@bell.ca" , Darren Dukes , Kamran Raza , Ida Leung , Brian Field , Clarence Filsfils , Ebben Aries , Stefano Previdi , "J. Linkova" , 6man-chairs@ietf.org
2018-03-05
09 Darren Dukes Uploaded new revision
2018-01-20
08 Darren Dukes New version available: draft-ietf-6man-segment-routing-header-08.txt
2018-01-20
08 (System) New version approved
2018-01-20
08 (System)
Request for posting confirmation emailed to previous authors: Tomoya Kosugi , Dirk Steinberg , Satoru Matsushima , Robert Raszuk , David Lebrun , John Leddy …
Request for posting confirmation emailed to previous authors: Tomoya Kosugi , Dirk Steinberg , Satoru Matsushima , Robert Raszuk , David Lebrun , John Leddy , Eric Vyncke , " daniel.bernier@bell.ca" , " daniel.voyer@bell.ca" , Kamran Raza , Ida Leung , Brian Field , Clarence Filsfils , Ebben Aries , Stefano Previdi , "J. Linkova" , 6man-chairs@ietf.org
2018-01-20
08 Darren Dukes Uploaded new revision
2017-07-20
07 Stefano Previdi New version available: draft-ietf-6man-segment-routing-header-07.txt
2017-07-20
07 (System) New version approved
2017-07-20
07 (System)
Request for posting confirmation emailed to previous authors: Tomoya Kosugi , Stefano Previdi , Satoru Matsushima , Robert Raszuk , David Lebrun , John Leddy …
Request for posting confirmation emailed to previous authors: Tomoya Kosugi , Stefano Previdi , Satoru Matsushima , Robert Raszuk , David Lebrun , John Leddy , Eric Vyncke , " daniel.voyer@bell.ca" , Kamran Raza , " daniel.bernier@bell.ca" , Dirk Steinberg , Clarence Filsfils , Brian Field , Ida Leung , Ebben Aries , "J. Linkova" , 6man-chairs@ietf.org
2017-07-20
07 Stefano Previdi Uploaded new revision
2017-03-13
06 Stefano Previdi New version available: draft-ietf-6man-segment-routing-header-06.txt
2017-03-13
06 (System) New version approved
2017-03-13
06 (System)
Request for posting confirmation emailed to previous authors: Tomoya Kosugi , Stefano Previdi , David Lebrun , Eric Vyncke , Ida Leung , Brian Field …
Request for posting confirmation emailed to previous authors: Tomoya Kosugi , Stefano Previdi , David Lebrun , Eric Vyncke , Ida Leung , Brian Field , Clarence Filsfils , Ebben Aries , "J. Linkova" , 6man-chairs@ietf.org
2017-03-13
06 Stefano Previdi Uploaded new revision
2017-02-01
05 Stefano Previdi New version available: draft-ietf-6man-segment-routing-header-05.txt
2017-02-01
05 (System) New version approved
2017-02-01
05 (System)
Request for posting confirmation emailed to previous authors: "Eric Vyncke" , "Ida Leung" , "Brian Field" , "Ebben Aries" , "Clarence Filsfils" , "Stefano Previdi" …
Request for posting confirmation emailed to previous authors: "Eric Vyncke" , "Ida Leung" , "Brian Field" , "Ebben Aries" , "Clarence Filsfils" , "Stefano Previdi" , "David Lebrun" , "Tomoya Kosugi" , "J. Linkova" , 6man-chairs@ietf.org
2017-02-01
05 Stefano Previdi Uploaded new revision
2017-01-18
04 Stefano Previdi New version available: draft-ietf-6man-segment-routing-header-04.txt
2017-01-18
04 (System) New version approved
2017-01-18
04 (System)
Request for posting confirmation emailed to previous authors: "Eric Vyncke" , "Ida Leung" , "Brian Field" , "Ebben Aries" , "Clarence Filsfils" , "Stefano Previdi" …
Request for posting confirmation emailed to previous authors: "Eric Vyncke" , "Ida Leung" , "Brian Field" , "Ebben Aries" , "Clarence Filsfils" , "Stefano Previdi" , "David Lebrun" , "Tomoya Kosugi" , "J. Linkova" , 6man-chairs@ietf.org
2017-01-18
04 Stefano Previdi Uploaded new revision
2017-01-13
03 Stefano Previdi New version available: draft-ietf-6man-segment-routing-header-03.txt
2017-01-13
03 (System) New version approved
2017-01-13
03 (System)
Request for posting confirmation emailed to previous authors: "Eric Vyncke" , "Ida Leung" , "Brian Field" , "Ebben Aries" , "Clarence Filsfils" , "Stefano Previdi" …
Request for posting confirmation emailed to previous authors: "Eric Vyncke" , "Ida Leung" , "Brian Field" , "Ebben Aries" , "Clarence Filsfils" , "Stefano Previdi" , "David Lebrun" , "Tomoya Kosugi" , "J. Linkova" , 6man-chairs@ietf.org
2017-01-13
03 Stefano Previdi Uploaded new revision
2016-09-20
02 Stefano Previdi New version approved
2016-09-20
02 Stefano Previdi New version available: draft-ietf-6man-segment-routing-header-02.txt
2016-09-20
02 Stefano Previdi
Request for posting confirmation emailed to previous authors: "Eric Vyncke" , "Ida Leung" , "Brian Field" , "Ebben Aries" , "Clarence Filsfils" , "Stefano Previdi" …
Request for posting confirmation emailed to previous authors: "Eric Vyncke" , "Ida Leung" , "Brian Field" , "Ebben Aries" , "Clarence Filsfils" , "Stefano Previdi" , "David Lebrun" , "Tomoya Kosugi" , "J. Linkova" , 6man-chairs@ietf.org
2016-09-20
02 (System) Uploaded new revision
2016-09-19
01 Stefano Previdi
Request for posting confirmation emailed to previous authors: "Eric Vyncke" , "Ida Leung" , "Brian Field" , "Ebben Aries" , "Clarence Filsfils" , "Stefano Previdi" …
Request for posting confirmation emailed to previous authors: "Eric Vyncke" , "Ida Leung" , "Brian Field" , "Ebben Aries" , "Clarence Filsfils" , "Stefano Previdi" , "David Lebrun" , "Tomoya Kosugi" , "J. Linkova" , 6man-chairs@ietf.org
2016-09-19
01 (System) Document has expired
2016-03-18
01 Stefano Previdi New version available: draft-ietf-6man-segment-routing-header-01.txt
2016-03-02
00 Ole Trøan Added to session: IETF-95: 6man  (unscheduled)
2015-12-14
00 Bob Hinden This document now replaces draft-previdi-6man-segment-routing-header instead of None
2015-12-14
00 Stefano Previdi New version available: draft-ietf-6man-segment-routing-header-00.txt