Multicast VPN Fast Upstream Failover
draft-ietf-bess-mvpn-fast-failover-15
Revision differences
Document history
Date | Rev. | By | Action |
---|---|---|---|
2024-01-26
|
15 | Gunter Van de Velde | Request closed, assignment withdrawn: Joel Jaeggli Last Call OPSDIR review |
2024-01-26
|
15 | Gunter Van de Velde | Closed request for Last Call review by OPSDIR with state 'Overtaken by Events': Cleaning up stale OPSDIR queue |
2021-04-15
|
15 | (System) | RFC Editor state changed to AUTH48-DONE from AUTH48 |
2021-04-13
|
15 | (System) | RFC Editor state changed to AUTH48 |
2021-04-08
|
15 | (System) | RFC Editor state changed to RFC-EDITOR |
2021-02-26
|
15 | (System) | RFC Editor state changed to RFC-EDITOR from EDIT |
2021-02-05
|
15 | (System) | IANA Action state changed to RFC-Ed-Ack from Waiting on RFC Editor |
2021-02-05
|
15 | (System) | IANA Action state changed to Waiting on RFC Editor from In Progress |
2021-02-05
|
15 | (System) | IANA Action state changed to In Progress from Waiting on Authors |
2021-02-05
|
15 | (System) | IANA Action state changed to Waiting on Authors from In Progress |
2021-02-02
|
15 | (System) | RFC Editor state changed to EDIT |
2021-02-02
|
15 | (System) | IESG state changed to RFC Ed Queue from Approved-announcement sent |
2021-02-02
|
15 | (System) | Announcement was received by RFC Editor |
2021-02-02
|
15 | (System) | IANA Action state changed to In Progress |
2021-02-02
|
15 | Amy Vezza | IESG state changed to Approved-announcement sent from Approved-announcement to be sent |
2021-02-02
|
15 | Amy Vezza | IESG has approved the document |
2021-02-02
|
15 | Amy Vezza | Closed "Approve" ballot |
2021-02-02
|
15 | Martin Vigoureux | IESG state changed to Approved-announcement to be sent from IESG Evaluation::AD Followup |
2021-02-02
|
15 | Martin Vigoureux | Ballot approval text was generated |
2021-01-21
|
15 | Alvaro Retana | [Ballot comment] [Thanks for addressing my DISCUSS.] |
2021-01-21
|
15 | Alvaro Retana | [Ballot Position Update] Position for Alvaro Retana has been changed to No Objection from Discuss |
2021-01-21
|
15 | Greg Mirsky | New version available: draft-ietf-bess-mvpn-fast-failover-15.txt |
2021-01-21
|
15 | (System) | New version approved |
2021-01-21
|
15 | (System) | Request for posting confirmation emailed to previous authors: Greg Mirsky , Robert Kebler , Thomas Morin |
2021-01-21
|
15 | Greg Mirsky | Uploaded new revision |
2021-01-17
|
14 | Bernie Volz | Assignment of request for Telechat review by INTDIR to Ole Trøan was marked no-response |
2020-12-23
|
14 | Benjamin Kaduk | [Ballot comment] Thank you for addressing my discuss (and comment!) points. Given what I have read so far in Alvaro's ballot thread, I had expected … [Ballot comment] Thank you for addressing my discuss (and comment!) points. Given what I have read so far in Alvaro's ballot thread, I had expected the Reserved field to be removed from the BFD Discriminator attribute format, but I will let that play out in Alvaro's ballot thread. |
2020-12-23
|
14 | Benjamin Kaduk | [Ballot Position Update] Position for Benjamin Kaduk has been changed to No Objection from Discuss |
2020-12-21
|
14 | (System) | Sub state has been changed to AD Followup from Revised ID Needed |
2020-12-21
|
14 | (System) | IANA Review state changed to Version Changed - Review Needed from IANA OK - Actions Needed |
2020-12-21
|
14 | Greg Mirsky | New version available: draft-ietf-bess-mvpn-fast-failover-14.txt |
2020-12-21
|
14 | (System) | New version approved |
2020-12-21
|
14 | (System) | Request for posting confirmation emailed to previous authors: Greg Mirsky , Robert Kebler , Thomas Morin |
2020-12-21
|
14 | Greg Mirsky | Uploaded new revision |
2020-12-21
|
13 | Éric Vyncke | [Ballot comment] Thank you for the work put into this document and for addressing my previous comments. My previous position is kept below ***ONLY FOR … [Ballot comment] Thank you for the work put into this document and for addressing my previous comments. My previous position is kept below ***ONLY FOR ARCHIVE*** as the authors have proposed text to fix those issues. -éric ===FOR ARCHIVE ONLY=== I have balloted ABSTAIN in the sense of "I oppose this document but understand that others differ and am not going to stand in the way of the others." because of the use outside of a node of the IPv4-mapped IPv6 addresses in section 3.1.6.1. A reply on this topic will be welcome. Stéphane in his doc shepherd's write up states that no implementation is known for a document born in 2008... Does the IETF really want to have this on the proposed standards track ? Please find below my ABSTAIN point, some non-blocking COMMENT points (but replies would be appreciated), and one nits. I hope that this helps to improve the document, Regards, -éric == ABSTAIN == -- Section 3.1.6.1 -- I appreciate that the BFD WG relies on "::ffff:127.0.0.0/104" but those IPv4-mapped IPv6 addresses are assumed to never leave a node and should never be transmitted over the Internet (see https://tools.ietf.org/html/rfc5156#section-2.2). This is the cause of my ABSTAIN. As the inner packet is sent over a tunnel, why not using the a link-local address or the ff02::1 link-local multicast group ? == COMMENTS == -- Section 2.3 -- The use of "upstream" and "Upstream" could be confusing... The latter could have been "Upstream PE/ABSR" (often used later in the document) or "ingress node" -- Section 3.1.6 -- Could the "BFD Discreminator" attribute be used for other purpose than this document? If so, then why not specifying it in *another* document? Should this document clearly state that it does not define any TLV ? == NITS == As I am probably not the only reader have difficulties to remember RFC contents by their number, may I suggest to prefix the RFC numbers with their titles ? Esp in the introduction ;-) |
2020-12-21
|
13 | Éric Vyncke | [Ballot Position Update] Position for Éric Vyncke has been changed to No Objection from Abstain |
2020-12-17
|
13 | Cindy Morgan | IESG state changed to IESG Evaluation::Revised I-D Needed from IESG Evaluation |
2020-12-17
|
13 | Magnus Westerlund | [Ballot Position Update] New position, No Objection, has been recorded for Magnus Westerlund |
2020-12-16
|
13 | Erik Kline | [Ballot comment] [[ comments ]] [ section 3.1.6.1 ] * I too am not happy about seeing ::ffff:127.0.0.0/104 in the wild, but I personally … [Ballot comment] [[ comments ]] [ section 3.1.6.1 ] * I too am not happy about seeing ::ffff:127.0.0.0/104 in the wild, but I personally think the community should have followed through on any of the various 1::/{32,48,64} proposals that could have resulted in IANA designating a loopback prefix. Maybe it's time to try taking up that work again. /me makes a note to self |
2020-12-16
|
13 | Erik Kline | [Ballot Position Update] New position, No Objection, has been recorded for Erik Kline |
2020-12-16
|
13 | Murray Kucherawy | [Ballot comment] I concur with Barry's point about the definitions in Section 2.2. I can't quite parse the first sentence of Section 3.1.1. Maybe this … [Ballot comment] I concur with Barry's point about the definitions in Section 2.2. I can't quite parse the first sentence of Section 3.1.1. Maybe this will help: OLD: A condition to consider that the status of a P-tunnel is Up is that the root of the tunnel, as determined in the x-PMSI Tunnel attribute, is reachable through unicast routing tables. NEW: When determining whether the status of a P-tunnel is Up, a condition to consider is whether the root of the tunnel, as determined in the x-PMSI Tunnel attribute, is reachable through unicast routing tables. Section 3.1.2 has a similar concern. Why is that a SHOULD and not a MUST in Section 3.1.6.1? Same question about 3.1.6.2, and the ones in 4.2. Or, if they are correctly SHOULDs, you might consider giving some guidance to the reader about when one might go about deviating from the advice given, since SHOULD offers a choice. I think in Sections 7.2 and 7.3, you don't need "this document" references for unassigned things. |
2020-12-16
|
13 | Murray Kucherawy | [Ballot Position Update] New position, No Objection, has been recorded for Murray Kucherawy |
2020-12-16
|
13 | Barry Leiba | [Ballot comment] — Section 1 — The procedures described in this document are optional to enable an operator to provide protection for multicast … [Ballot comment] — Section 1 — The procedures described in this document are optional to enable an operator to provide protection for multicast services in BGP/MPLS IP VPNs. An operator would enable these mechanisms using a method discussed in Section 3 in combination with the redundancy provided by It’s a very small point, but I think it’s just a little harder to follow than necessary because of two uses of “enable” with different senses — it’s easy to read the first in the same sense as the second, “optional to enable” (rather than “to enable an operator to...”). I suggest changing the first to “allow”, and maybe also change it slightly, so: “are optional, and allow an operator to...”. — Section 2.2 — It’s usually not a good idea to have different definitions for things such as “upstream” and “Upstream”, for one reason because they can’t be distinguished if they begin a sentence (where they’ll both appear as “Upstream”), and for another because it’s easy to inadvertently write the wrong one and not catch it. I checked, and I don’t see any case of the first in this document (where “Upstream” appears at the beginning of the second bullet in Section 5 it seems to be clear because of “downstream” in the other bullets), but you need to be careful not to introduce that ambiguity during the editing process. It would be good for the AD to include an RFC Editor note to that effect, so they are alerted to this situation and to avoid beginning any sentences with “Upstream”. And the authors should be sure to carefully check every instance of the word during AUTH48 (it would be good for the RFC Editor to include a reminder of that in the AUTH48 message). |
2020-12-16
|
13 | Barry Leiba | [Ballot Position Update] New position, No Objection, has been recorded for Barry Leiba |
2020-12-16
|
13 | Roman Danyliw | [Ballot comment] Thank you to Daniel Migault for the SECDIR review I support Ben and Alvaro's DISCUSS positions. One editorial nit from Section 3.1.6: An … [Ballot comment] Thank you to Daniel Migault for the SECDIR review I support Ben and Alvaro's DISCUSS positions. One editorial nit from Section 3.1.6: An implementation that does not recognize or is configured not to support this attribute MUST follow procedures defined for optional transitive path attributes in Section 5 of [RFC4271]. It seems odd to be specifying normative language for implementations that do not/will not understand this specification. I appreciate that this MUST is coming from RFC4271. |
2020-12-16
|
13 | Roman Danyliw | [Ballot Position Update] New position, No Objection, has been recorded for Roman Danyliw |
2020-12-16
|
13 | Éric Vyncke | [Ballot comment] Thank you for the work put into this document. I have balloted ABSTAIN in the sense of "I oppose this document but understand … [Ballot comment] Thank you for the work put into this document. I have balloted ABSTAIN in the sense of "I oppose this document but understand that others differ and am not going to stand in the way of the others." because of the use outside of a node of the IPv4-mapped IPv6 addresses in section 3.1.6.1. A reply on this topic will be welcome. Stéphane in his doc shepherd's write up states that no implementation is known for a document born in 2008... Does the IETF really want to have this on the proposed standards track ? Please find below my ABSTAIN point, some non-blocking COMMENT points (but replies would be appreciated), and one nits. I hope that this helps to improve the document, Regards, -éric == ABSTAIN == -- Section 3.1.6.1 -- I appreciate that the BFD WG relies on "::ffff:127.0.0.0/104" but those IPv4-mapped IPv6 addresses are assumed to never leave a node and should never be transmitted over the Internet (see https://tools.ietf.org/html/rfc5156#section-2.2). This is the cause of my ABSTAIN. As the inner packet is sent over a tunnel, why not using the a link-local address or the ff02::1 link-local multicast group ? == COMMENTS == -- Section 2.3 -- The use of "upstream" and "Upstream" could be confusing... The latter could have been "Upstream PE/ABSR" (often used later in the document) or "ingress node" -- Section 3.1.6 -- Could the "BFD Discreminator" attribute be used for other purpose than this document? If so, then why not specifying it in *another* document? Should this document clearly state that it does not define any TLV ? == NITS == As I am probably not the only reader have difficulties to remember RFC contents by their number, may I suggest to prefix the RFC numbers with their titles ? Esp in the introduction ;-) |
2020-12-16
|
13 | Éric Vyncke | [Ballot Position Update] New position, Abstain, has been recorded for Éric Vyncke |
2020-12-15
|
13 | Alvaro Retana | [Ballot discuss] (1) This document describes several methods to determine the status of a tunnel (in §3), none of which "provide a "fast failover" solution … [Ballot discuss] (1) This document describes several methods to determine the status of a tunnel (in §3), none of which "provide a "fast failover" solution when used alone, but can be used together with the mechanism described in Section 4" (§1). §3 also says this: An implementation may support any combination of the methods described in this section and provide a network operator with control to choose which one to use in the particular deployment. While §3.1 is clear in the fact that it is not a requirement for all downstream PEs to use the same mechanism, there are no guidelines to aid the operator to chose which mechanism to use. Some cases may be obvious (e.g. §3.1.3 applies to tunnels of a specific type), but others are not. I would like to see deployment considerations related to the advantages/disadvantages that each method may have in specific situations (including their possible combination). (2) The BFD Discriminator Attribute has a very narrow application in this document when compared to the potential other uses given the extensibility possibilities related to bootstrapping BFD. I have serious concerns about the attribute being defined in this document, amongst a series of other mechanisms. (2a) The tunnel can be monitored without the new BGP Attribute (assuming proper configuration of course). Why is that option is not even mentioned in the document? In fact, the document recommends deleting the BFD session if the Attribute is not present. Why is that recommendation in place, and what are the cases when it can not be followed? (2b) The fact that BFD monitoring can be achieved without the new attribute makes me think that the bootstrapping of BFD using BGP would be better served in a document produced by the BFD WG. One of the editors has expressed the same opinion [1] [2]. Has a discussion taken place in the BFD WG (or at least with the Chairs) about this work? Why was it not taken up there? [1] https://mailarchive.ietf.org/arch/msg/rtg-bfd/T1jVpgyXuPatTpuD_wA0JC3CT1c/ [2] https://tools.ietf.org/wg/bess/minutes?item=minutes-96-bess.html |
2020-12-15
|
13 | Alvaro Retana | [Ballot comment] (0) I support Ben's DISCUSS. (1) This document (currently) specifies a new BGP attribute, but I couldn't find any discussion about it in … [Ballot comment] (0) I support Ben's DISCUSS. (1) This document (currently) specifies a new BGP attribute, but I couldn't find any discussion about it in the idr mailing list. Has idr been given the opportunity to review? (2) s/is an OPTIONAL procedure/is an optional procedure This is not a normative statement to require capitalization. (3) "VRF Route Import BGP attribute" is mentioned twice (§3 and §5), but it is not an attribute; it is an extended community (rfc6514). (4) §3.1.1: "similar to BGP next-hop tracking" Is this specified somewhere? I don't remember seeing a specification for next-hop tracking, but do know that implementations do it -- in an implementation-specific way. Please add a little more text about what is meant/expected. (5) §3.1.1: "If BGP next-hop tracking is done...and the root address...[is]...the same as the next-hop address...then checking...whether the tunnel root is reachable, will be unnecessary duplication...." I guess this means that the existing next-hop tracking functionality can be used and that it doesn't have to be function-specific (root vs next-hop). This paragraph seems to assume a specific implementation -- but again, given that next-hop tracking implementations are internal then this paragraph doesn't make much sense to me. (6) The "reachability condition" is mentioned in §3.1.1/§3.1.3/§3.1.4. Does this mean that that root tracking (§3.1.1) should be used with the other mechanisms? The specific text says that "the downstream PE can immediately update its UMH when the reachability condition changes", giving the impression that the combination is possible but not required. Note that §4.3 is titled "Reachability Determination", which I hoped would shed more light, but all it does is point back to §3.1. (7) §3.1.2: What is the "last-hop link" of the tunnel? Is it the physical link, or the virtual hop from the previous waypoint? (8) §3.1.2 mentions that "careful consideration and coordination" is needed when using other mechanisms such as rfc4090 "because uncorrelated timers might cause unnecessary switchovers and destabilize the network." What are the associated timers related to the mechanisms in this section? (9) §3.1.3: When using this method and if the signaling state for a P2MP TE LSP is removed (e.g., if the ingress of the P2MP TE LSP sends a PathTear message) or the P2MP TE LSP changes state from Up to Down as determined by procedures in [RFC4875], the status of the corresponding P-tunnel MUST be re-evaluated. If the P-tunnel transitions from Up to Down state, the Upstream PE that is the ingress of the P-tunnel MUST NOT be considered a valid UMH. These two sentences are redundant. It seems to me that they could be replaced by: When using this method and if the signaling state for a P2MP TE LSP is removed (e.g., if the ingress of the P2MP TE LSP sends a PathTear message) or the P2MP TE LSP changes state from Up to Down as determined by procedures in [RFC4875], the Upstream PE that is the ingress of the P-tunnel MUST NOT be considered a valid UMH. (10) §3.1.4: "An Upstream PE SHOULD be removed from the UMH candidate list...if...the upstream one-hop branch of the tunnel from P to PE cannot be built." When is it ok to not remove the PE? IOW, why is this action not required? (11) [nit] s/mechanism to execute its actions/mechanism execute its actions (12) §3.1.5 says that "where this mechanism is used in conjunction with the method described in Section 5...downstream PEs can compare reception on the two P-tunnels to determine when one of them is down", but §5 says that "downstream PEs accept traffic from the primary or standby tunnel, based on the status of the tunnel (based on Section 3)". IOW, §3.1.5 points at §5 as providing a way to determine if a tunnel is down, while §5 points back at §3 as the way to determine which tunnel to receive from. This pointing back and forth is not a total contradiction, but it needs to be clarified. (13) §3.1.6: "An implementation that does not recognize or is configured not to support this attribute MUST follow procedures defined for optional transitive path attributes in Section 5 of [RFC4271]." There cannot be a Normative action specified for a node that "does not recognize...this attribute" because, by definition, it can't be assumed that it is aware of this specification. In this case, it is not necessary to say anything about unrecognized attributes because that is already specified in rfc4271. For the "configured not to support this attribute" case, it should be pointed out that the node should operate as if the attribute was unrecognized. Suggestion> An implementation that is configured not to support this attribute MUST follow the procedures defined in Section 5 of [RFC4271] as if the attribute was unrecognized. (14) [nit] s/BFD Mode field is the one octet long./The BFD Mode field is one octet long. (15) §3.1.6: "The BFD Discriminator attribute MUST be considered malformed if its length is not a non-zero multiple of four." Ok, except that the specification of the attribute doesn't mention the length (only the length of the TLVs). Please specify the length and any considerations related to the Extended Length bit. Also, given that this is a new attribute, with an unspecified potential number of TLVs, and that the length is apparently unbounded, all leading to the potential need for extended messages, please specify how to handle peers that cannot accommodate more than 4k octet messages (rfc8654). (16) §3.1.6.1: "MUST set the IP destination address of the inner IP header to one of the internal loopback addresses..." Where do these addresses come from? How does the Upstream PE figure out which one to use? At least please include a reference to where that is explained. (17) §3.1.6.1: "MUST use its IP address as the source IP address" Which address? Please be specific. (18) §3.1.6.2: If the IP address doesn't map correctly at the downstream PE (for example, a different local address is used that doesn't correspond to the information in the PMSI attribute), what action should it take? Can the tunnel still be monitored? (19) §3.1.6.2: "SHOULD NOT switch the traffic to the Standby Upstream PE" When is it ok to do it? IOW, why is this action recommended, and not required. (20) §3.1.7: "set the bfd.LocalDiag of the P2MP BFD session to Concatenated Path Down and/or Reverse Concatenated Path Down" Which one? bfd.LocalDiag carries a single value. (21) §3.1.7: "...it is desired for the downstream PEs to switch to a backup Upstream PE. To achieve that...it SHOULD set the bfd.LocalDiag..." If not set, then the objective won't be achieved. When is it ok to not set the bfd.LocalDiag to indicate the concatenated failure? (22) §4: "Such behavior is referred to as "revertive" behavior and MUST be supported." The text around this sentence seems to indicate that the revertive behavior is the default, is that the intent? Or if the intent for it just to be supported (as written)? Please be clear. (23) §4.1: "...routes that carry the "Standby PE" BGP Community MUST have the LOCAL_PREF attribute set to zero." What should a receiver do if the LOCAL_PREF is not zero? (24) §4.1: In the last paragraph of this section, if I follow correctly, the text talks about the case where the standby becomes the primary and the updated advertisement doesn't have the Standby PE community. If that is correct, then s/ presence/absence of the Standby PE BGP Community/ absence of the Standby PE BGP Community Also, the last sentence says that the "LOCAL_PREF attribute MUST be set to zero". If the community is not present, how can a receiver enforce this? What action should it take if the LOCAL_PREF has a different value? (25) §4.3: "other mechanisms MAY be used" s/MAY/may This is just a statement of fact. (26) §4.4.2: "MUST try to locate" To try is not an action that can be normatively enforced. Also, I don't think that using "MUST" here adds value since the normative action is in the next sentence ("MUST perform as follows"). s/MUST/must (27) s/"hot root standby" mode is used (Section 4)/"hot root standby" mode is used (Section 5) (28) §7.3: s/sub-TLV/TLV/g The attribute includes TLVs, not sub-TLVs. |
2020-12-15
|
13 | Alvaro Retana | [Ballot Position Update] New position, Discuss, has been recorded for Alvaro Retana |
2020-12-15
|
13 | Deborah Brungard | [Ballot Position Update] New position, No Objection, has been recorded for Deborah Brungard |
2020-12-15
|
13 | Martin Duke | [Ballot comment] - This document should expand acronyms on first use, particularly those in the Abstract. - Similarly, a couple of new paragraphs in Section … [Ballot comment] - This document should expand acronyms on first use, particularly those in the Abstract. - Similarly, a couple of new paragraphs in Section 1 would be a useful boot camp for concepts like PEs, P-Multicast, C-Multicast, BFD, RT, etc. I spent some time in RFC 6513 and I'm still pretty unclear on these. - The last paragraph of S1 describes "protection for multicast services". Can you elaborate what this is protection from? The latency associated with tunnel failure? - In Section 3.1.6, please clarify if the length field of the TLV must be a multiple of 4 octets, or the entire TLV (including type and length) should be a multiple of 4. From context, I suspect the latter is true, but it could easily be misread otherwise. - Sec 5. I think you should delete the word "whether" |
2020-12-15
|
13 | Martin Duke | [Ballot Position Update] New position, No Objection, has been recorded for Martin Duke |
2020-12-14
|
13 | Benjamin Kaduk | [Ballot discuss] Let's talk about what the requirements are for consistency across PEs in the algorithm for selecting the Primary Upstream PE. Section 4 notes … [Ballot discuss] Let's talk about what the requirements are for consistency across PEs in the algorithm for selecting the Primary Upstream PE. Section 4 notes that "all the PEs of that MVPN [are required] to follow the same UMH selection procedure", but leaves the option of non-revertive behavior as something that "MAY also be supported by an implementation", without requirement for consistency across all PEs. It seems to me that if some PEs use non-revertive behavior and others do not, then they will disagree as to which PE is the Primary (or active) PE in some cases, which seems to conflict with the initial guidance that all PEs needed to pick the same one. Is it perhaps that the PEs need to agree on which PE is to be advertised as Primary but not necessarily to actually be using that one for traffic? Or am I missing something? |
2020-12-14
|
13 | Benjamin Kaduk | [Ballot comment] Section 1 Section 3 describes local procedures allowing an egress PE (a PE connected to a receiver site) to take into … [Ballot comment] Section 1 Section 3 describes local procedures allowing an egress PE (a PE connected to a receiver site) to take into account the status of P-tunnels to determine the Upstream Multicast Hop (UMH) for a given (C-S, C-G). [...] Does it also apply to (C-*, C-G)? (I'll just mention it once, but the handling seems to be somewhat inconsistent throughout the document, with (C-*,C-G) getting mentioned sometimes but not always, and no pattern obvious to me for when it is or is not included. I think I see some instances where (C-*, C-G) does not make sense, so it would probably not be a universal replacement.) Section 5 describes a "hot leaf standby" mechanism that can be used to improve failover time in MVPN. The approach combines mechanisms defined in Section 3 and Section 4 has similarities with the solution described in [RFC7431] to improve failover times when PIM routing is used in a network given some topology and metric constraints. nit: grammar issue around "has similarities with" (maybe needs a leading "and"?) VPNs. An operator would enable these mechanisms using a method discussed in Section 3 in combination with the redundancy provided by a standby PE connected to the source of the multicast flow, and it is assumed that all PEs in the network would support these mechanisms for the procedures to work. In the case that a BGP implementation Is it a matter of "the procedure will not work at all unless all PEs in the network support it", or "only the PEs that support it will get the benefits of it"? [The next sentence suggests an anwer...] Section 3 Section 9.1.1 of [RFC6513] are applicable when using I-PMSI P-tunnels. That document is a foundation for this document, and its processes all apply here. Section 9.1.1 mandates the use of specific procedures for sending intra-AS I-PMSI A-D Routes. (nit) the second "Section 9.1.1" is also referring to RFC 6513, not this document, which would be the default interpretation of a bare section reference. (not-nit) The referenced procedure seems to be about processing, not sending, intra-AS I-PMSI A-D routes. Am I misreading something? Section 3.1 Different factors can be considered to determine the "status" of a P-tunnel and are described in the following sub-sections. The optional procedures described in this section also handle the case the downstream PEs do not all apply the same rules to define what the status of a P-tunnel is (please see Section 6), and some of them will produce a result that may be different for different downstream PEs. nit: I think it's better to put a word like "where" in "the case the downtream PEs". Section 3.1.3 corresponding P-tunnel MUST be re-evaluated. If the P-tunnel transitions from Up to Down state, the Upstream PE that is the ingress of the P-tunnel MUST NOT be considered a valid UMH. (nit?) I'm not sure how much precedent there is for using "valid" in this context -- IIUC the previous discussion of this process referred only to whether a PE is a candidate for being the UMH. Section 3.1.5 When such a procedure is used, in the context where fast restoration mechanisms are used for the P-tunnels, a configurable timer MUST be set on the downstream PE to wait before updating the UMH, to let the P-tunnel restoration mechanism to execute its actions. An implementation SHOULD use three seconds as the default value for this timer. How does this interact with the value of the maximum inter-packet time? Suppose that I know to expect at least one packet every ten seconds. Do I wait ten seconds after receiving the last packet and then another three seconds, before engaging in an UMH change? In cases where this mechanism is used in conjunction with the method described in Section 5, no prior knowledge of the rate of the multicast streams is required; downstream PEs can compare reception on the two P-tunnels to determine when one of them is down. This feels a little underspecified; is there a reference or more guidance that we could give about turning a stream of received packets on one tunnel into a maximum inter-packet time on another tunnel, supposedly carrying the same traffic? Section 3.1.6 * one octet-long field of TLV's Type value (Section 7.3) * one octet-long field of the length of the Value field in octets * variable length Value field. The length of a TLV MUST be multiple of four octets. I assume this is the total length, not the value in the length field? The BFD Discriminator attribute MUST be considered malformed if its length is not a non-zero multiple of four. If the attribute considered malformed, the UPDATE message SHALL be handled using the approach of Attribute Discard per [RFC7606]. nit: s/attribute considered/attribute is considered/ Section 3.1.6.1 o MUST periodically transmit BFD Control packets over the x-PMSI P-tunnel after the P-tunnel is considered established. Note that the methods to declare a P-tunnel has been established are outside the scope of this specification. Is there a good reference for how to choose the period of transmission? If the tracking of the P-tunnel by using a P2MP BFD session is enabled after the x-PMSI A-D Route has been already advertised, the x-PMSI A-D Route MUST be re-sent with precisely the same attributes as before and the BFD Discriminator attribute included. Pedantically, it seems like "precisely the same attributes as before" is incompatible with adding the BFD Discriminator attribute. Phrasing that discusses "the only change between the previous advertisement and the new advertisement" would not suffer from such a potential issue. (And similarly for when the BFD Discriminator attribute is to be removed, a couple paragraphs later.) Section 3.1.6.2 o MUST use the source IP address of the BFD Control packet, the value of the BFD Discriminator field, and the x-PMSI Tunnel Identifier [RFC6514] the BFD Control packet was received to properly demultiplex BFD sessions. nit: missing word around "the BFD Control packet was received" (maybe "received on/in"?). According to [RFC8562], if the downstream PE receives Down or AdminDown in the State field of the BFD Control packet or associated with the BFD session Detection Timer expires, the BFD session is nit: "the BFD Detection Timer associated with the BFD session expires" PE, while others are considered as Standby Upstream PEs. In such a scenario, when the P-tunnel is considered down, the downstream PE MAY initiate a switchover of the traffic from the Primary Upstream PE to the Standby Upstream PE only if the Standby Upstream PE is deemed available. I'm not sure that we've defined what it means for an Upstream PE to be deemed "available', yet. I guess it's possible that there is not an established P-Tunnel between the (selected) Standby Upstream PE and the donstream PE, so just using the Up/Down/not-known-to-be-Down status of that P-tunnel is not an option... If the downstream PE's P-tunnel is already established when the downstream PE receives the new x-PMSI A-D Route with BFD Discriminator attribute, the downstream PE MUST associate the value of BFD Discriminator field with the P-tunnel and follow procedures listed above in this section if and only if the x-PMSI A-D Route was properly processed as per [RFC6514], and the BFD Discriminator attribute was validated. We did not discuss any validation of the BFD Discriminator attribute in §3.1.6; what procedures would this process entail? Section 4 The procedures described below are limited to the case where the site that contains C-S is connected to two or more PEs, though, to simplify the description, the case of dual-homing is described. The I suggest giving at least some considerations to how to choose between multiple standby Upstream PEs when there are more than one available. procedures require all the PEs of that MVPN to follow the same UMH selection procedure, as specified in [RFC6513], whether the PE selected based on its IP address, hashing algorithm described in section 5.1.3 of [RFC6513], or Installed UMH Route. The procedures I assume that how the PEs agree on which procedure is in use does not involve something being advertised in-band, and is out of scope for this document. But please say so! assume that if a site of a given MVPN that contains C-S is dual-homed to two PEs, then all the other sites of that MVPN would have two unicast VPN routes (VPN-IPv4 or VPN-IPv6) to C-S, each with its RD. nit: s/its RD/its own RD/ Also, please confirm that the unicast routes are *to* C-S, vs *from* it. Section 4.1 o the NLRI is constructed as the C-multicast route with an RT that identifies the Primary Upstream PE, except that the RD is the same as if the C-multicast route was built using the Standby Upstream PE as the UMH (it will carry the RD associated to the unicast VPN route advertised by the Standby Upstream PE for S and a Route Target derived from the Standby Upstream PE's UMH route's VRF RT Import EC); This part is a bit confusing to me, since the first part says that the RT identifies the Primary Upstream PE, but the second part says that the RT is derived from the Standy Upstream PE's [stuff]. But I'm happy to trust you that the [stuff] makes it correct! Section 4.2 when the PE determines (the use of the particular method to detect the failure is outside the scope of this document) that C-S is not reachable through some other PE, the PE SHOULD install VRF PIM It seems like a forward reference to §4.3 might be helpful. Section 9.3.2 of [RFC6514], describes the procedures of sending a Source-Active A-D Route as a result of receiving the C-multicast route. These procedures MUST be followed for both the normal and Standby C-multicast routes. There is no section 9.3.2 in RFC 6514. There is a 9.2.3 that looks perhaps plausible, though the string "Source-Active" does not appear in it. Section 4.4.2 Source AS carried in the C-multicast route. If the match is found, and the C-multicast route carries the Standby PE BGP Community, then the ASBR MUST perform as follows: (I assume that there is room for local policy to modify this "MUST", e.g., if needed to protect against some form of attack ... perhaps it even goes without saying.) Section 5 o Upstream PEs use the "hot standby" optional behavior and thus will forward traffic for a given multicast state as soon as they have whether a (primary) BGP C-multicast route or a Standby BGP C-multicast route for that state (or both) nit: the grammar is a bit weird here, after "as soon as they have"; I'm not confident that I could make an accurate suggestion for a fix. Section 6 I could almost see the discussion of duplicate packets as being a subsection of the security considerations, though I don't mind leaving it as-is. Section 8 We could perhaps make some pro forma note that the BFD Discriminator attribute, like all BGP attributes, typically does not benefit from cryptographic integrity protection and thus could be spoofed so as to be different than what is actually used by the multipoint BFD head. That said, I'm willing to let this fall under the incorporated-by-reference BGP security considerations. Is it worth noting that operating in "hot" standby mode will increase the general level of traffic on the VPN and thus susceptibility to DoS? This document uses P2MP BFD, as defined in [RFC8562], which, in turn, is based on [RFC5880]. Security considerations relevant to each protocol are discussed in the respective protocol specifications. An implementation that supports this specification MUST use a mechanism to control the maximum number of P2MP BFD sessions that can be active at the same time. What is the objective that this control is designed to achieve? I can "control the maximum number of sessions" by asserting the maximum number to be an absurdly large value, but I don't think that would meet the spirit of this requirement (it does meet the letter of the requirement). The methods described in Section 3.1 may produce false-negative state changes that can be the trigger for an unnecessary convergence in the control plane, ultimately negatively impacting the multicast service provided by the VPN. An operator is expected to consider the network environment and use available controls of the mechanism used to determine the status of a P-tunnel. We mentioned earlier (e.g., in §3.1) that similar negative effects can occur when resiliency mechanisms at different layers interact; that might be worth repeating here. |
2020-12-14
|
13 | Benjamin Kaduk | [Ballot Position Update] New position, Discuss, has been recorded for Benjamin Kaduk |
2020-12-01
|
13 | Daniel Migault | Request for Telechat review by SECDIR Completed: Ready. Reviewer: Daniel Migault. Sent review to list. |
2020-11-24
|
13 | Bernie Volz | Request for Telechat review by INTDIR is assigned to Ole Trøan |
2020-11-24
|
13 | Bernie Volz | Request for Telechat review by INTDIR is assigned to Ole Trøan |
2020-11-20
|
13 | Éric Vyncke | Requested Telechat review by INTDIR |
2020-11-19
|
13 | Tero Kivinen | Request for Telechat review by SECDIR is assigned to Daniel Migault |
2020-11-19
|
13 | Tero Kivinen | Request for Telechat review by SECDIR is assigned to Daniel Migault |
2020-11-18
|
13 | (System) | IANA Review state changed to IANA OK - Actions Needed from Version Changed - Review Needed |
2020-11-17
|
13 | Cindy Morgan | Placed on agenda for telechat - 2020-12-17 |
2020-11-17
|
13 | Martin Vigoureux | IESG state changed to IESG Evaluation from Waiting for Writeup |
2020-11-17
|
13 | Martin Vigoureux | Ballot has been issued |
2020-11-17
|
13 | Martin Vigoureux | [Ballot Position Update] New position, Yes, has been recorded for Martin Vigoureux |
2020-11-17
|
13 | Martin Vigoureux | Created "Approve" ballot |
2020-11-17
|
13 | Martin Vigoureux | Ballot writeup was changed |
2020-11-15
|
13 | Greg Mirsky | New version available: draft-ietf-bess-mvpn-fast-failover-13.txt |
2020-11-15
|
13 | (System) | New version accepted (logged-in submitter: Greg Mirsky) |
2020-11-15
|
13 | Greg Mirsky | Uploaded new revision |
2020-11-05
|
12 | Jean Mahoney | Closed request for Last Call review by GENART with state 'Withdrawn' |
2020-11-05
|
12 | Jean Mahoney | Assignment of request for Last Call review by GENART to Francis Dupont was marked no-response |
2020-10-28
|
12 | (System) | IANA Review state changed to Version Changed - Review Needed from IANA OK - Actions Needed |
2020-10-28
|
12 | Greg Mirsky | New version available: draft-ietf-bess-mvpn-fast-failover-12.txt |
2020-10-28
|
12 | (System) | New version approved |
2020-10-28
|
12 | (System) | Request for posting confirmation emailed to previous authors: Robert Kebler , Greg Mirsky , Thomas Morin |
2020-10-28
|
12 | Greg Mirsky | Uploaded new revision |
2020-10-23
|
11 | Daniel Migault | Request for Last Call review by SECDIR Completed: Has Nits. Reviewer: Daniel Migault. Sent review to list. |
2020-10-19
|
11 | Adrian Farrel | Request for Last Call review by RTGDIR Completed: Has Issues. Reviewer: Adrian Farrel. Sent review to list. |
2020-10-19
|
11 | (System) | IANA Review state changed to IANA OK - Actions Needed from IANA - Review Needed |
2020-10-19
|
11 | Sabrina Tanamal | (Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs: The IANA Functions Operator has completed its review of draft-ietf-bess-mvpn-fast-failover-11. If any part of this review is inaccurate, please let … (Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs: The IANA Functions Operator has completed its review of draft-ietf-bess-mvpn-fast-failover-11. If any part of this review is inaccurate, please let us know. The IANA Functions Operator understands that, upon approval of this document, there are four actions which we must complete. First, in the Border Gateway Protocol (BGP) Well-known Communities registry located at: a new registration will be made as follows: https://www.iana.org/assignments/bgp-well-known-communities/ Attribute Value: [ TBD-at-Registration ] Attribute: Standby PE Reference: [ RFC-to-be ] Second, in the BGP Path Attributes registry on the Border Gateway Protocol (BGP) Parameters registry page located at: https://www.iana.org/assignments/bgp-parameters/ a new registration will be made as follows: Value: [ TBD-at-Registration ] Code: BFD Discriminator Reference: [ RFC-to-be ] Third, a new registry is to be created called the BFD Mode registry. The new registry is to be created on the Border Gateway Protocol (BGP) Parameters registry page located at: https://www.iana.org/assignments/bgp-parameters/ The registration policies for the new registry (RFC8126) are: +-----------+-------------------------+ | Value | Policy | +-----------+-------------------------+ | 0- 175 | IETF Review | | 176 - 249 | First Come First Served | | 250 - 254 | Experimental Use | | 255 | IETF Review | +-----------+-------------------------+ There are initial registrations in the new registry as follows: +-----------+------------------+---------------+ | Value | Description | Reference | +-----------+------------------+---------------+ | 0 | Reserved | [ RFC-to-be ] | | 1 | P2MP BFD Session | [ RFC-to-be ] | | 2- 175 | Unassigned | [ RFC-to-be ] | | 176 - 249 | Unassigned | [ RFC-to-be ] | | 250 - 254 | Experimental Use | [ RFC-to-be ] | | 255 | Reserved | [ RFC-to-be ] | +-----------+------------------+---------------+ Fourth, a new registry is to be created called the BFD Discriminator Optional Sub-TLV Type registry. The new registry is to be created on the Border Gateway Protocol (BGP) Parameters registry page located at: https://www.iana.org/assignments/bgp-parameters/ The registration policies for the new registry (RFC8126) are: +-----------+-------------------------+ | Value | Policy | +-----------+-------------------------+ | 0- 175 | IETF Review | | 176 - 249 | First Come First Served | | 250 - 254 | Experimental Use | | 255 | IETF Review | +-----------+-------------------------+ There are initial registrations in the new registry as follows: +-----------+------------------+---------------+ | Value | Description | Reference | +-----------+------------------+---------------+ | 0 | Reserved | [ RFC-to-be ] | | 1- 175 | Unassigned | [ RFC-to-be ] | | 176 - 249 | Unassigned | [ RFC-to-be ] | | 250 - 254 | Experimental Use | [ RFC-to-be ] | | 255 | Reserved | [ RFC-to-be ] | +-----------+------------------+---------------+ The IANA Functions Operator understands that these are the only actions required to be completed upon approval of this document. Note: The actions requested in this document will not be completed until the document has been approved for publication as an RFC. This message is meant only to confirm the list of actions that will be performed. Thank you, Sabrina Tanamal Senior IANA Services Specialist |
2020-10-19
|
11 | (System) | IESG state changed to Waiting for Writeup from In Last Call |
2020-10-09
|
11 | Jean Mahoney | Request for Last Call review by GENART is assigned to Francis Dupont |
2020-10-09
|
11 | Jean Mahoney | Request for Last Call review by GENART is assigned to Francis Dupont |
2020-10-08
|
11 | Tero Kivinen | Request for Last Call review by SECDIR is assigned to Daniel Migault |
2020-10-08
|
11 | Tero Kivinen | Request for Last Call review by SECDIR is assigned to Daniel Migault |
2020-10-07
|
11 | Min Ye | Request for Last Call review by RTGDIR is assigned to Adrian Farrel |
2020-10-07
|
11 | Min Ye | Request for Last Call review by RTGDIR is assigned to Adrian Farrel |
2020-10-06
|
11 | Gunter Van de Velde | Request for Last Call review by OPSDIR is assigned to Joel Jaeggli |
2020-10-06
|
11 | Gunter Van de Velde | Request for Last Call review by OPSDIR is assigned to Joel Jaeggli |
2020-10-05
|
11 | Amy Vezza | IANA Review state changed to IANA - Review Needed |
2020-10-05
|
11 | Amy Vezza | The following Last Call announcement was sent out (ends 2020-10-19): From: The IESG To: IETF-Announce CC: bess@ietf.org, bess-chairs@ietf.org, martin.vigoureux@nokia.com, slitkows.ietf@gmail.com, draft-ietf-bess-mvpn-fast-failover@ietf.org … The following Last Call announcement was sent out (ends 2020-10-19): From: The IESG To: IETF-Announce CC: bess@ietf.org, bess-chairs@ietf.org, martin.vigoureux@nokia.com, slitkows.ietf@gmail.com, draft-ietf-bess-mvpn-fast-failover@ietf.org, Stephane Litkowski Reply-To: last-call@ietf.org Sender: Subject: Last Call: (Multicast VPN Fast Upstream Failover) to Proposed Standard The IESG has received a request from the BGP Enabled ServiceS WG (bess) to consider the following document: - 'Multicast VPN Fast Upstream Failover' as Proposed Standard The IESG plans to make a decision in the next few weeks, and solicits final comments on this action. Please send substantive comments to the last-call@ietf.org mailing lists by 2020-10-19. Exceptionally, comments may be sent to iesg@ietf.org instead. In either case, please retain the beginning of the Subject line to allow automated sorting. Abstract This document defines multicast VPN extensions and procedures that allow fast failover for upstream failures, by allowing downstream PEs to take into account the status of Provider-Tunnels (P-tunnels) when selecting the Upstream PE for a VPN multicast flow, and extending BGP MVPN routing so that a C-multicast route can be advertised toward a Standby Upstream PE. The file can be obtained via https://datatracker.ietf.org/doc/draft-ietf-bess-mvpn-fast-failover/ The following IPR Declarations may be related to this I-D: https://datatracker.ietf.org/ipr/2696/ https://datatracker.ietf.org/ipr/2697/ |
2020-10-05
|
11 | Amy Vezza | IESG state changed to In Last Call from Last Call Requested |
2020-10-05
|
11 | Amy Vezza | Last call announcement was changed |
2020-10-03
|
11 | Martin Vigoureux | Requested Last Call review by RTGDIR |
2020-10-03
|
11 | Martin Vigoureux | Last call was requested |
2020-10-03
|
11 | Martin Vigoureux | Last call announcement was generated |
2020-10-03
|
11 | Martin Vigoureux | Ballot approval text was generated |
2020-10-03
|
11 | Martin Vigoureux | Ballot writeup was generated |
2020-10-03
|
11 | Martin Vigoureux | IESG state changed to Last Call Requested from AD Evaluation::AD Followup |
2020-10-02
|
11 | (System) | Sub state has been changed to AD Followup from Revised ID Needed |
2020-10-02
|
11 | Greg Mirsky | New version available: draft-ietf-bess-mvpn-fast-failover-11.txt |
2020-10-02
|
11 | (System) | New version approved |
2020-10-02
|
11 | (System) | Request for posting confirmation emailed to previous authors: Greg Mirsky , Robert Kebler , Thomas Morin |
2020-10-02
|
11 | Greg Mirsky | Uploaded new revision |
2020-09-08
|
10 | Martin Vigoureux | IESG state changed to AD Evaluation::Revised I-D Needed from AD Evaluation |
2020-06-22
|
10 | Martin Vigoureux | IESG state changed to AD Evaluation from Publication Requested |
2020-02-26
|
10 | Stephane Litkowski | As required by RFC 4858, this is the current template for the Document Shepherd Write-Up. Changes are expected over time. This version is dated … As required by RFC 4858, this is the current template for the Document Shepherd Write-Up. Changes are expected over time. This version is dated 1 November 2019. (1) What type of RFC is being requested (BCP, Proposed Standard, Internet Standard, Informational, Experimental, or Historic)? Why is this the proper type of RFC? Is this type of RFC indicated in the title page header? The document is intended to be Standard Track. It defines new procedures and additional protocol extensions which perfectly fits with Standard Track. (2) The IESG approval announcement includes a Document Announcement Write-Up. Please provide such a Document Announcement Write-Up. Recent examples can be found in the "Action" announcements for approved documents. The approval announcement contains the following sections: Technical Summary: This document defines multicast VPN extensions and procedures that allow fast failover for upstream failures. Working Group Summary: There was no particular controversy on this draft but multiple enhancements have been added over time by various contributors. The document is in the WG for a while and the initial authors/editors were not maintaining it anymore. We had to appoint a new editor to close the work as the WG was interested to finish the work. Document Quality: We are not aware of any implementation. Documents has been reviewed by some key people in the WG. Personnel: Stephane Litkowski is the document shepherd and Martin Vigoureux is the responsible AD. (3) Briefly describe the review of this document that was performed by the Document Shepherd. If this version of the document is not ready for publication, please explain why the document is being forwarded to the IESG. The shepherd has done a deep review and provided a long list of comments that have been addressed by the editor. (4) Does the document Shepherd have any concerns about the depth or breadth of the reviews that have been performed? No (5) Do portions of the document need review from a particular or from broader perspective, e.g., security, operational complexity, AAA, DNS, DHCP, XML, or internationalization? If so, describe the review that took place. No (6) Describe any specific concerns or issues that the Document Shepherd has with this document that the Responsible Area Director and/or the IESG should be aware of? For example, perhaps he or she is uncomfortable with certain parts of the document, or has concerns whether there really is a need for it. In any event, if the WG has discussed those issues and has indicated that it still wishes to advance the document, detail those concerns here. No concern (7) Has each author confirmed that any and all appropriate IPR disclosures required for full conformance with the provisions of BCP 78 and BCP 79 have already been filed. If not, explain why? Some of the contributors are retired now, and were not able to reply to the IPR poll. (8) Has an IPR disclosure been filed that references this document? If so, summarize any WG discussion and conclusion regarding the IPR disclosures. Two IPRs are disclosed. No particular discussion on the IPRs. (9) How solid is the WG consensus behind this document? Does it represent the strong concurrence of a few individuals, with others being silent, or does the WG as a whole understand and agree with it? We have a good support from the WG. (10) Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarise the areas of conflict in separate email messages to the Responsible Area Director. (It should be in a separate email because this questionnaire is publicly available.) no (11) Identify any ID nits the Document Shepherd has found in this document. (See http://www.ietf.org/tools/idnits/ and the Internet-Drafts Checklist). Boilerplate checks are not enough; this check needs to be thorough. No (12) Describe how the document meets any required formal review criteria, such as the MIB Doctor, YANG Doctor, media type, and URI type reviews. N/a (13) Have all references within this document been identified as either normative or informative? Yes (14) Are there normative references to documents that are not ready for advancement or are otherwise in an unclear state? If such normative references exist, what is the plan for their completion? No (15) Are there downward normative references references (see RFC 3967)? If so, list these downward references to support the Area Director in the Last Call procedure. No (16) Will publication of this document change the status of any existing RFCs? Are those RFCs listed on the title page header, listed in the abstract, and discussed in the introduction? If the RFCs are not listed in the Abstract and Introduction, explain why, and point to the part of the document where the relationship of this document to the other RFCs is discussed. If this information is not in the document, explain why the WG considers it unnecessary. No (17) Describe the Document Shepherd's review of the IANA considerations section, especially with regard to its consistency with the body of the document. Confirm that all protocol extensions that the document makes are associated with the appropriate reservations in IANA registries. Confirm that any referenced IANA registries have been clearly identified. Confirm that newly created IANA registries include a detailed specification of the initial contents for the registry, that allocations procedures for future registrations are defined, and a reasonable name for the new registry has been suggested (see RFC 8126). IANA considerations have been reviewed and comments have been addressed. (18) List any new IANA registries that require Expert Review for future allocations. Provide any public guidance that the IESG would find useful in selecting the IANA Experts for these new registries. n/a (19) Describe reviews and automated checks performed by the Document Shepherd to validate sections of the document written in a formal language, such as XML code, BNF rules, MIB definitions, YANG modules, etc. none (20) If the document contains a YANG module, has the module been checked with any of the recommended validation tools (https://trac.ietf.org/trac/ops/wiki/yang-review-tools) for syntax and formatting validation? If there are any resulting errors or warnings, what is the justification for not fixing them at this time? Does the YANG module comply with the Network Management Datastore Architecture (NMDA) as specified in RFC8342? n/a |
2020-02-26
|
10 | Stephane Litkowski | Responsible AD changed to Martin Vigoureux |
2020-02-26
|
10 | Stephane Litkowski | IETF WG state changed to Submitted to IESG for Publication from WG Consensus: Waiting for Write-Up |
2020-02-26
|
10 | Stephane Litkowski | IESG state changed to Publication Requested from I-D Exists |
2020-02-26
|
10 | Stephane Litkowski | IESG process started in state Publication Requested |
2020-02-26
|
10 | Stephane Litkowski | As required by RFC 4858, this is the current template for the Document Shepherd Write-Up. Changes are expected over time. This version is dated … As required by RFC 4858, this is the current template for the Document Shepherd Write-Up. Changes are expected over time. This version is dated 1 November 2019. (1) What type of RFC is being requested (BCP, Proposed Standard, Internet Standard, Informational, Experimental, or Historic)? Why is this the proper type of RFC? Is this type of RFC indicated in the title page header? The document is intended to be Standard Track. It defines new procedures and additional protocol extensions which perfectly fits with Standard Track. (2) The IESG approval announcement includes a Document Announcement Write-Up. Please provide such a Document Announcement Write-Up. Recent examples can be found in the "Action" announcements for approved documents. The approval announcement contains the following sections: Technical Summary: This document defines multicast VPN extensions and procedures that allow fast failover for upstream failures. Working Group Summary: There was no particular controversy on this draft but multiple enhancements have been added over time by various contributors. The document is in the WG for a while and the initial authors/editors were not maintaining it anymore. We had to appoint a new editor to close the work as the WG was interested to finish the work. Document Quality: We are not aware of any implementation. Documents has been reviewed by some key people in the WG. Personnel: Stephane Litkowski is the document shepherd and Martin Vigoureux is the responsible AD. (3) Briefly describe the review of this document that was performed by the Document Shepherd. If this version of the document is not ready for publication, please explain why the document is being forwarded to the IESG. The shepherd has done a deep review and provided a long list of comments that have been addressed by the editor. (4) Does the document Shepherd have any concerns about the depth or breadth of the reviews that have been performed? No (5) Do portions of the document need review from a particular or from broader perspective, e.g., security, operational complexity, AAA, DNS, DHCP, XML, or internationalization? If so, describe the review that took place. No (6) Describe any specific concerns or issues that the Document Shepherd has with this document that the Responsible Area Director and/or the IESG should be aware of? For example, perhaps he or she is uncomfortable with certain parts of the document, or has concerns whether there really is a need for it. In any event, if the WG has discussed those issues and has indicated that it still wishes to advance the document, detail those concerns here. No concern (7) Has each author confirmed that any and all appropriate IPR disclosures required for full conformance with the provisions of BCP 78 and BCP 79 have already been filed. If not, explain why? Some of the contributors are retired now, and were not able to reply to the IPR poll. (8) Has an IPR disclosure been filed that references this document? If so, summarize any WG discussion and conclusion regarding the IPR disclosures. Two IPRs are disclosed. No particular discussion on the IPRs. (9) How solid is the WG consensus behind this document? Does it represent the strong concurrence of a few individuals, with others being silent, or does the WG as a whole understand and agree with it? We have a good support from the WG. (10) Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarise the areas of conflict in separate email messages to the Responsible Area Director. (It should be in a separate email because this questionnaire is publicly available.) no (11) Identify any ID nits the Document Shepherd has found in this document. (See http://www.ietf.org/tools/idnits/ and the Internet-Drafts Checklist). Boilerplate checks are not enough; this check needs to be thorough. No (12) Describe how the document meets any required formal review criteria, such as the MIB Doctor, YANG Doctor, media type, and URI type reviews. N/a (13) Have all references within this document been identified as either normative or informative? Yes (14) Are there normative references to documents that are not ready for advancement or are otherwise in an unclear state? If such normative references exist, what is the plan for their completion? No (15) Are there downward normative references references (see RFC 3967)? If so, list these downward references to support the Area Director in the Last Call procedure. No (16) Will publication of this document change the status of any existing RFCs? Are those RFCs listed on the title page header, listed in the abstract, and discussed in the introduction? If the RFCs are not listed in the Abstract and Introduction, explain why, and point to the part of the document where the relationship of this document to the other RFCs is discussed. If this information is not in the document, explain why the WG considers it unnecessary. No (17) Describe the Document Shepherd's review of the IANA considerations section, especially with regard to its consistency with the body of the document. Confirm that all protocol extensions that the document makes are associated with the appropriate reservations in IANA registries. Confirm that any referenced IANA registries have been clearly identified. Confirm that newly created IANA registries include a detailed specification of the initial contents for the registry, that allocations procedures for future registrations are defined, and a reasonable name for the new registry has been suggested (see RFC 8126). IANA considerations have been reviewed and comments have been addressed. (18) List any new IANA registries that require Expert Review for future allocations. Provide any public guidance that the IESG would find useful in selecting the IANA Experts for these new registries. n/a (19) Describe reviews and automated checks performed by the Document Shepherd to validate sections of the document written in a formal language, such as XML code, BNF rules, MIB definitions, YANG modules, etc. none (20) If the document contains a YANG module, has the module been checked with any of the recommended validation tools (https://trac.ietf.org/trac/ops/wiki/yang-review-tools) for syntax and formatting validation? If there are any resulting errors or warnings, what is the justification for not fixing them at this time? Does the YANG module comply with the Network Management Datastore Architecture (NMDA) as specified in RFC8342? n/a |
2020-02-10
|
10 | Greg Mirsky | New version available: draft-ietf-bess-mvpn-fast-failover-10.txt |
2020-02-10
|
10 | (System) | New version approved |
2020-02-10
|
10 | (System) | Request for posting confirmation emailed to previous authors: Gregory Mirsky , Thomas Morin , Robert Kebler |
2020-02-10
|
10 | Greg Mirsky | Uploaded new revision |
2020-02-01
|
09 | Greg Mirsky | New version available: draft-ietf-bess-mvpn-fast-failover-09.txt |
2020-02-01
|
09 | (System) | New version approved |
2020-02-01
|
09 | (System) | Request for posting confirmation emailed to previous authors: Gregory Mirsky , Thomas Morin , Robert Kebler |
2020-02-01
|
09 | Greg Mirsky | Uploaded new revision |
2019-08-29
|
08 | Greg Mirsky | New version available: draft-ietf-bess-mvpn-fast-failover-08.txt |
2019-08-29
|
08 | (System) | New version approved |
2019-08-29
|
08 | (System) | Request for posting confirmation emailed to previous authors: Gregory Mirsky , Thomas Morin , Robert Kebler |
2019-08-29
|
08 | Greg Mirsky | Uploaded new revision |
2019-08-26
|
07 | Stephane Litkowski | Notification list changed to Stephane Litkowski <slitkows.ietf@gmail.com> |
2019-08-26
|
07 | Stephane Litkowski | Document shepherd changed to Stephane Litkowski |
2019-08-26
|
07 | Stephane Litkowski | Tag Revised I-D Needed - Issue raised by WGLC cleared. |
2019-08-26
|
07 | Stephane Litkowski | IETF WG state changed to WG Consensus: Waiting for Write-Up from WG Document |
2019-08-24
|
07 | Greg Mirsky | New version available: draft-ietf-bess-mvpn-fast-failover-07.txt |
2019-08-24
|
07 | (System) | New version approved |
2019-08-24
|
07 | (System) | Request for posting confirmation emailed to previous authors: Gregory Mirsky , Thomas Morin , Robert Kebler |
2019-08-24
|
07 | Greg Mirsky | Uploaded new revision |
2019-07-02
|
06 | Greg Mirsky | New version available: draft-ietf-bess-mvpn-fast-failover-06.txt |
2019-07-02
|
06 | (System) | New version approved |
2019-07-02
|
06 | (System) | Request for posting confirmation emailed to previous authors: Gregory Mirsky , Thomas Morin , Robert Kebler |
2019-07-02
|
06 | Greg Mirsky | Uploaded new revision |
2019-02-14
|
05 | Greg Mirsky | New version available: draft-ietf-bess-mvpn-fast-failover-05.txt |
2019-02-14
|
05 | (System) | New version approved |
2019-02-14
|
05 | (System) | Request for posting confirmation emailed to previous authors: Gregory Mirsky , Thomas Morin , Robert Kebler |
2019-02-14
|
05 | Greg Mirsky | Uploaded new revision |
2019-01-25
|
04 | Martin Vigoureux | Document shepherd changed to (None) |
2019-01-25
|
04 | Martin Vigoureux | Notification list changed to none from "Martin Vigoureux" <martin.vigoureux@alcatel-lucent.com> |
2018-12-06
|
04 | Stephane Litkowski | Tag Revised I-D Needed - Issue raised by WGLC set. |
2018-12-06
|
04 | Stephane Litkowski | IETF WG state changed to WG Document from In WG Last Call |
2018-11-22
|
04 | Stephane Litkowski | IETF WG state changed to In WG Last Call from WG Document |
2018-11-06
|
04 | Greg Mirsky | New version available: draft-ietf-bess-mvpn-fast-failover-04.txt |
2018-11-06
|
04 | (System) | New version approved |
2018-11-06
|
04 | (System) | Request for posting confirmation emailed to previous authors: Gregory Mirsky , Thomas Morin , Robert Kebler |
2018-11-06
|
04 | Greg Mirsky | Uploaded new revision |
2018-11-05
|
03 | (System) | Document has expired |
2018-05-04
|
03 | Greg Mirsky | New version available: draft-ietf-bess-mvpn-fast-failover-03.txt |
2018-05-04
|
03 | (System) | Posted submission manually |
2017-09-14
|
02 | (System) | Document has expired |
2017-03-13
|
02 | Robert Kebler | New version available: draft-ietf-bess-mvpn-fast-failover-02.txt |
2017-03-13
|
02 | (System) | New version approved |
2017-03-13
|
02 | (System) | Request for posting confirmation emailed to previous authors: Thomas Morin , Robert Kebler |
2017-03-13
|
02 | Robert Kebler | Uploaded new revision |
2017-01-08
|
01 | (System) | Document has expired |
2016-07-09
|
01 | Martin Vigoureux | Revision for session IETF-96: bess Thu-1400 changed to 01 |
2016-07-09
|
01 | Martin Vigoureux | Added to session: IETF-96: bess Thu-1400 |
2016-07-07
|
01 | Robert Kebler | New version available: draft-ietf-bess-mvpn-fast-failover-01.txt |
2016-04-06
|
00 | Martin Vigoureux | Changed consensus to Yes from Unknown |
2016-04-06
|
00 | Martin Vigoureux | Intended Status changed to Proposed Standard from None |
2015-12-10
|
00 | Martin Vigoureux | Notification list changed to "Martin Vigoureux" <martin.vigoureux@alcatel-lucent.com> |
2015-12-10
|
00 | Martin Vigoureux | Document shepherd changed to Martin Vigoureux |
2015-12-09
|
00 | Thomas Morin | This document now replaces draft-morin-bess-mvpn-fast-failover instead of None |
2015-12-09
|
00 | Robert Kebler | New version available: draft-ietf-bess-mvpn-fast-failover-00.txt |