BGP Control Plane for the Network Service Header in Service Function Chaining
draft-ietf-bess-nsh-bgp-control-plane-18
Revision differences
Document history
Date | Rev. | By | Action |
---|---|---|---|
2021-06-04
|
18 | (System) | RFC Editor state changed to AUTH48-DONE from AUTH48 |
2021-05-10
|
18 | (System) | RFC Editor state changed to AUTH48 |
2021-02-16
|
18 | (System) | RFC Editor state changed to RFC-EDITOR from REF |
2021-01-26
|
18 | (System) | RFC Editor state changed to REF from EDIT |
2021-01-15
|
18 | (System) | RFC Editor state changed to EDIT from MISSREF |
2020-09-28
|
18 | (System) | Reconnected rtgdir lc review |
2020-09-08
|
18 | (System) | IANA Action state changed to RFC-Ed-Ack from Waiting on RFC Editor |
2020-09-07
|
18 | (System) | IANA Action state changed to Waiting on RFC Editor from In Progress |
2020-09-07
|
18 | (System) | IANA Action state changed to In Progress from Waiting on Authors |
2020-09-03
|
18 | (System) | IANA Action state changed to Waiting on Authors from In Progress |
2020-09-03
|
18 | (System) | IANA Action state changed to In Progress from Waiting on Authors |
2020-09-02
|
18 | (System) | IANA Action state changed to Waiting on Authors from In Progress |
2020-08-27
|
18 | (System) | RFC Editor state changed to MISSREF |
2020-08-27
|
18 | (System) | IESG state changed to RFC Ed Queue from Approved-announcement sent |
2020-08-27
|
18 | (System) | Announcement was received by RFC Editor |
2020-08-27
|
18 | (System) | IANA Action state changed to In Progress |
2020-08-27
|
18 | Amy Vezza | IESG state changed to Approved-announcement sent from Approved-announcement to be sent |
2020-08-27
|
18 | Amy Vezza | IESG has approved the document |
2020-08-27
|
18 | Amy Vezza | Closed "Approve" ballot |
2020-08-27
|
18 | Martin Vigoureux | IESG state changed to Approved-announcement to be sent from IESG Evaluation::AD Followup |
2020-08-27
|
18 | Martin Vigoureux | Ballot approval text was generated |
2020-08-27
|
18 | Murray Kucherawy | [Ballot Position Update] Position for Murray Kucherawy has been changed to No Objection from No Record |
2020-08-25
|
18 | Roman Danyliw | [Ballot comment] Thank you for addressing my DISCUSS and COMMENT points. |
2020-08-25
|
18 | Roman Danyliw | [Ballot Position Update] Position for Roman Danyliw has been changed to No Objection from Discuss |
2020-08-21
|
18 | Benjamin Kaduk | [Ballot comment] Thank you for addressing my discuss (and comment!) points! |
2020-08-21
|
18 | Benjamin Kaduk | [Ballot Position Update] Position for Benjamin Kaduk has been changed to No Objection from Discuss |
2020-08-21
|
18 | Adrian Farrel | New version available: draft-ietf-bess-nsh-bgp-control-plane-18.txt |
2020-08-21
|
18 | (System) | New version accepted (logged-in submitter: Adrian Farrel) |
2020-08-21
|
18 | Adrian Farrel | Uploaded new revision |
2020-08-21
|
17 | Adrian Farrel | New version available: draft-ietf-bess-nsh-bgp-control-plane-17.txt |
2020-08-21
|
17 | (System) | New version accepted (logged-in submitter: Adrian Farrel) |
2020-08-21
|
17 | Adrian Farrel | Uploaded new revision |
2020-08-20
|
16 | Alvaro Retana | [Ballot comment] [Thanks for addressing my DISCUSS.] |
2020-08-20
|
16 | Alvaro Retana | [Ballot Position Update] Position for Alvaro Retana has been changed to No Objection from Discuss |
2020-08-19
|
16 | Adrian Farrel | New version available: draft-ietf-bess-nsh-bgp-control-plane-16.txt |
2020-08-19
|
16 | (System) | New version accepted (logged-in submitter: Adrian Farrel) |
2020-08-19
|
16 | Adrian Farrel | Uploaded new revision |
2020-06-21
|
15 | Murray Kucherawy | [Ballot comment] As the IESG has rotated since this went up for a telechat, it's now shy of the needed ballot count to pass even … [Ballot comment] As the IESG has rotated since this went up for a telechat, it's now shy of the needed ballot count to pass even when the DISCUSSes are cleared. I'll ballot on this after I do a full review. A quick comment now on -15: Thanks for applying the feedback from my current and former co-ADs. However, Adam Roach's review requested that "L3VPN", "NRLI", and "EVPN" be expanded on first use, but that still hasn't been done. |
2020-06-21
|
15 | Murray Kucherawy | Ballot comment text updated for Murray Kucherawy |
2020-06-21
|
15 | Benjamin Kaduk | [Ballot discuss] I think we may still need some text changes to clarify how the joint list of SFIR-RD and SFIR Pool Identifier Extended Communities … [Ballot discuss] I think we may still need some text changes to clarify how the joint list of SFIR-RD and SFIR Pool Identifier Extended Communities is constructed and interpreted, and potentially need to register an RD Type matching the other (TBD6+TBD7) values we allocate. (I'm also not entirely clear how the IPv6 addresses interact with 8-byte RDs.) A longer description of these topics is written up at https://mailarchive.ietf.org/arch/msg/bess/wVDRF4ni0bGhNazvWoFi8BwJ_Vg/ but is not quite appropriate for this standalone context. |
2020-06-21
|
15 | Benjamin Kaduk | [Ballot comment] [retaining the note that I support Roman's Discuss] New comments on the -15 Section 2.2 o The Special Purpose SFT values range … [Ballot comment] [retaining the note that I support Roman's Discuss] New comments on the -15 Section 2.2 o The Special Purpose SFT values range is assigned through Standards Action. Values in that range are used for special SFC operations and do not apply to the types SF that may be placed on the SFC. I'm not sure I understand what it means to "place a SF on the SFC". Also, nit: missing "of"? o The First Come First Served range tracks assignments of STF values made by any party that defines an SF type. Reference through an Internet-Draft is desirable, but not required. Maybe "Internet-Draft or other stable written specification?" Section 8.10 The IPv6 examples seem to show RDs that are 127-bit IPv6 prefixes, but an 8-octet RD doesn't seem to have space for that? Section 8.10.4 SFP4: RD = 2001:db8::198:51:100:1/104, SPI = 18, [SI = 255, SFT = 41, RD = 2001:db8::192:0:2:1/1], [SI = 250, {SFT = 43, RD = 2001:db8::192:0:2:2/2, SFT = 44, RD = 2001:db8::192:0:2:3/8 } ] [...] When the packets are returned to SFF1 by the SFI the SI will be decreased to 250 for the next hop. SFF1 now has a free choice of next hop SFF to execute the next hop in the path selecting between all SFF2 that support an SF of type 43 and SFF3 that supports an SF of type 44. These may be completely different functions that are to I see a specific (nonzero) RD for SFT=43, so I don't understand why this is a choice of "all SFF2 that support an SF of type 43". Section 9 You say that RFC 4760 has additional relevant security measures but I'm not sure which measures you're referring to (having skimmed all of 4760). This document does not fundamentally change the security behavior of BGP deployments which depend considerably on the network operator's nit(?): maybe comma before "which"? perception of risk in their network. It may be observed that the application of the mechanisms described in this document are scoped to a single domain as implied by [RFC8300] noted in Section 2.1. I can't tell if this means section 2.1 of 8300 or this document. |
2020-06-21
|
15 | Benjamin Kaduk | Ballot comment and discuss text updated for Benjamin Kaduk |
2020-06-16
|
Jenny Bui | Posted related IPR disclosure Huawei Technologies Co.,Ltd's Statement about IPR related to draft-ietf-bess-nsh-bgp-control-plane | |
2020-06-16
|
Jenny Bui | Posted related IPR disclosure Huawei Technologies Co.,Ltd's Statement about IPR related to draft-ietf-bess-nsh-bgp-control-plane | |
2020-06-15
|
15 | Adrian Farrel | New version available: draft-ietf-bess-nsh-bgp-control-plane-15.txt |
2020-06-15
|
15 | (System) | New version accepted (logged-in submitter: Adrian Farrel) |
2020-06-15
|
15 | Adrian Farrel | Uploaded new revision |
2020-06-02
|
14 | (System) | Sub state has been changed to AD Followup from Revised ID Needed |
2020-06-02
|
14 | (System) | IANA Review state changed to Version Changed - Review Needed from IANA OK - Actions Needed |
2020-06-02
|
14 | Adrian Farrel | New version available: draft-ietf-bess-nsh-bgp-control-plane-14.txt |
2020-06-02
|
14 | (System) | New version accepted (logged-in submitter: Adrian Farrel) |
2020-06-02
|
14 | Adrian Farrel | Uploaded new revision |
2020-04-29
|
Jenny Bui | Posted related IPR disclosure Huawei Technologies Co.,Ltd's Statement about IPR related to draft-ietf-bess-nsh-bgp-control-plane | |
2020-03-28
|
13 | Min Ye | Request closed, assignment withdrawn: Ravi Singh Last Call RTGDIR review |
2020-03-28
|
13 | Min Ye | Request closed, assignment withdrawn: Himanshu Shah Last Call RTGDIR review |
2020-03-28
|
13 | Min Ye | Request closed, assignment withdrawn: John Scudder Last Call RTGDIR review |
2020-03-28
|
13 | Min Ye | Closed request for Last Call review by RTGDIR with state 'Withdrawn' |
2020-01-29
|
13 | Min Ye | Assignment of request for Last Call review by RTGDIR to John Scudder was marked no-response |
2020-01-29
|
13 | Min Ye | Assignment of request for Last Call review by RTGDIR to Himanshu Shah was marked no-response |
2020-01-29
|
13 | Min Ye | Request for Last Call review by RTGDIR Completed: Has Issues. Reviewer: Ravi Singh. Submission of review completed at an earlier date. |
2020-01-28
|
13 | Min Ye | Request for Last Call review by RTGDIR Completed: Has Issues. Reviewer: Ravi Singh. |
2020-01-09
|
13 | Tero Kivinen | Request for Last Call review by SECDIR Completed: Ready. Reviewer: Scott Kelly. Submission of review completed at an earlier date. |
2020-01-01
|
13 | Tero Kivinen | Request for Last Call review by SECDIR Completed: Ready. Reviewer: Scott Kelly. |
2019-12-19
|
13 | Amy Vezza | IESG state changed to IESG Evaluation::Revised I-D Needed from IESG Evaluation |
2019-12-19
|
13 | Suresh Krishnan | [Ballot Position Update] New position, No Objection, has been recorded for Suresh Krishnan |
2019-12-19
|
13 | Magnus Westerlund | [Ballot Position Update] New position, No Objection, has been recorded for Magnus Westerlund |
2019-12-19
|
13 | Deborah Brungard | [Ballot Position Update] New position, No Objection, has been recorded for Deborah Brungard |
2019-12-18
|
13 | Alvaro Retana | [Ballot discuss] (1) Controllers and other nodes. Background: This document defines the new SFC NLRI, which has two distinct route types, originated by either a … [Ballot discuss] (1) Controllers and other nodes. Background: This document defines the new SFC NLRI, which has two distinct route types, originated by either a node hosting an SFI or a Controller. Each route type has a specific function and it is reasonable to expect that the originators represent different nodes in the network, with different functions, location, etc.. BGP Capabilities Advertisement doesn't have a route type granularity; instead, a BGP speaker known to support the SFC NLRI could originate any type of route. The facts above open the possibility that any node in the network can originate an SFPR and take over an SFP. §3.2.2 does a very good job of explaining the potential existence of multiple Controllers and even offers the appropriate tie breaker to take control of the SFP: "MUST use the SFPR with the numerically lowest SFPR-RD". The document proposes no mitigation to the possibility of any node (a rogue node, for example) issuing SFPRs. The assumption (§2.2) of "BGP connectivity between the Controllers and all SFFs" introduces also the ability to locate a rogue controller anywhere; I interpret "BGP connectivity" to include the presence of a router reflector (for example), which then allows distribution of SFPRs without going through a central policy point. On one hand I think this condition is a feature (the Controller can be anywhere), but the case of a rogue node that wants to act as a controller is not considered. To address this issue, I would like to see text that (1) acknowledges the issue (maybe in the security considerations section), and (2) discusses operational considerations for the placement, control, filtering, etc. of Controllers and the corresponding UPDATES from them and/or other nodes in the network. IOW, the considerations around proper initial setup of the system should be clear. (2) New Flow Specification Traffic Filtering Action §7.4 (Flow Spec for SFC Classifiers) defines a new Traffic Filtering Action to be used with the Flow Specification NLRI. rfc5775bis allows for any combination of Traffic Filtering Actions to be present, but this document says that "other action extended communities MUST NOT be present". I believe that specifying the use of treat-as-withdraw is ok as a case of Traffic Filtering Action Interference -- I just say "ok" because it is not clear to me (nor explained anywhere) why other Traffic Filtering Actions cannot be used; for example, I could imagine rate-limiting the traffic into an SFP. What concerns me more (and the reason for this DISCUSS point) is that rfc5575-only implementations will not consider the new Traffic Filtering Action, but could, depending on the components encoded in the NLRI, take actions based on other Traffic Filtering Actions. The result can then be an inconsistent application of Traffic Filtering Actions in the network -- for example, some nodes may want to drop the matching traffic (traffic-rate of 0), while others may want to have the same traffic entering an SFP. What are the operational considerations of using the new Traffic Filtering Action in a network where "legacy" (rfc5575bis-only) nodes exist? Is there a potential migration path? What might be the impact? How can correct operation be verified? (3) Use of the Control Plane This last point is not specifically for the authors, but for the Responsible AD and the Chairs for the sfc WG (cc'd). The SFPRs are built on, among other things, knowledge of the SFT(s) supported at a specific node. I note that only one Special Purpose SFT is defined in this document. The lack of SFT definitions means that no actual SFP can be instantiated. IOW, without additional work to define new SFTs it seems to me that the control plane as specified in this document cannot be used. :-( I couldn't find any related work (referencing this document) where new SFTs are proposed/defined. What are the plans to develop that work? Is there interest in the sfc WG to take advantage of the control plane? |
2019-12-18
|
13 | Alvaro Retana | [Ballot comment] Non-blocking comments: (1) I support Ben's DISCUSS point about the extension to the SFC Architecture. (2) rfc7665/§5.2 (SFC Control Plane) lists the … [Ballot comment] Non-blocking comments: (1) I support Ben's DISCUSS point about the extension to the SFC Architecture. (2) rfc7665/§5.2 (SFC Control Plane) lists the expected functionality provided by the control plane. The last two points in the list are not part of the specification in this document, but there is no explanation why or if there is an alternate mechanism -- these are those points: 5. Provides the metadata and usage information classifiers need so that they in turn can provide this metadata for appropriate packets in the data plane. 6. When needed, provide information including policy information to other SFC elements to be able to properly interpret metadata. (3) Add a Normative reference to rfc4360 (BGP Extended Communities Attribute). (4) §3.1.1/§3.1.2: The two new Extended Communities are defined as different types. Is it really necessary to request two different types, instead of one type with sub-types? The transitive space is not close to exhaustion, but having a single type would make it easier for any future SFC-related extended communities to be identified/grouped. Just a thought... (5) Operational Considerations: there are multiple pieces of the puzzle that need to be coordinated, from RDs and RTs to pool identifiers and the assignment of SFIs to pools... It would be very nice if all the information that needs to be operationally managed/provisioned was mentioned in a single place in the document...and if recommendations for the operator where included. (6) §3.2.1 says that "Each TLV may include sub-TLVs", but that is not always true; for example, the length of the Association TLV is specified as being 12 (with no room for anything else). This is a minor and easy issue to fix. (7) §3.2.1: "Unknown TLVs SHOULD be ignored" When would an unknown TLV not be ignored? IOW, why not use MUST? (8) §3.2.1.1 specifies a series of errors in the Association TLV that result in "SHOULD be ignored". When would these values not be ignored, when would they be useful? IOW, why not use MUST? (9) Please review §7.4 against the language used in rfc5575bis for consistency. For example "flow spec" is only used in the name of IANA registries or related entries; Flow Specification is used instead. (10) Please include a pointer to I-D.ietf-idr-tunnel-encaps somewhere in §7.5. (11) I would really like to see a registry set up for the bits in the new SPI/SI Representation sub-TLV. (12) Other nits: s/set to loopback address/set to the loopback address s/[RFC4271] defines the BGP Path attribute./[RFC4271] defines BGP Path attributes. |
2019-12-18
|
13 | Alvaro Retana | [Ballot Position Update] New position, Discuss, has been recorded for Alvaro Retana |
2019-12-18
|
13 | Benjamin Kaduk | [Ballot discuss] Section 3.2.1.3 seems to talk about intermingling SFIR-RDs and SFIR Pool Identifiers in a common list, but I do not see how it's … [Ballot discuss] Section 3.2.1.3 seems to talk about intermingling SFIR-RDs and SFIR Pool Identifiers in a common list, but I do not see how it's defined to intermingle the (six-octet) Pool Identifier Value with the (eight-octet) RDs. Section 3.1 seems to allow multiple SFIRs associated with a given RD, but the rest of the document seems to assume that any RD has at most one associated SFIR (as is stated explicitly for SFPRs). (A few specific mentions in the COMMENT.) Within my own limited understanding, it seems like this document is expanding the boundaries of the SFC Architecture in ways not envisioned by RFC 7665 or 8300, and the shepherd writeup is pretty quiet on to what extent this architectural change is accepted by the WG (as opposed to being contained to just the BGP control plane mechanism). I'd like to get a positive affirmation from someone more familiar with the discussions that this is moving the architecture in the right direction with respect to things like: - the introduction of the Service Function Type intermediate classification - the more prominent treatment of looping, jumping, and branching as operations within a single SFP without reclassification by using the "Change Sequence" SFT entries to indicate these behaviors within the SFP definition itself (I note that RFC 7665 does not mention "jump" at all) - the introduction of "gaps" in the SI sequence of a given SFP With respect to SFT in particular, it sounds like this is intended to help with scalability, which makes the genart reviewer's comment about lack of implementation experience particularly poingant. It seems like SFIR pools perform a similar role, though of course not identical; I didn't get a clear sense of why pools without SFTs are insufficient. |
2019-12-18
|
13 | Benjamin Kaduk | [Ballot comment] I support Roman's Discuss. Section 2.1 In fact, each SI is mapped to one or more SFs that are implemented by … [Ballot comment] I support Roman's Discuss. Section 2.1 In fact, each SI is mapped to one or more SFs that are implemented by one or more Service Function Instances (SFIs) that support those specified SFs. Thus an SI may represent a choice of SFIs of one or more Service Function Types. [...] In my head a SI that maps to more than one SF implies a requirement to do all of the listed SFs and in a specific order; "a choice of SFIs of one or more types" seems to relax that a bit so that the order is relaxed and perhaps the requirement to do all is also relaxed. I think "choice of SFIs for one or more" would alleviate that concern (if it is even a real concern). in the underlay network. How this indicator is generated and supplied, and how an SFF generates a new entropy indicator when it forwards a packet to the next SFF are out of scope of this document. nit: comma after "next SFF". Section 2.2 This approach assumes that there is an underlay network that provides connectivity between SFFs and Controllers, and that the SFFs are grouped to form one or more service function overlay networks through which SFPs are built. We assume BGP connectivity between the Controllers and all SFFs within each service function overlay network. Are we thus implicitly not assuming BGP connectivity between arbitrary pairs of SFFs? Section 3 The nexthop field of the MP_REACH_NLRI attribute of the SFC NLRI MUST be set to loopback address of the advertising SFF. nit: "a loopback address" (?) Section 3.1 Per [RFC4364] the RD field comprises a two byte Type field and a six byte Value field. If two SFIRs are originated from different administrative domains, they MUST have different RDs. In particular, SFIRs from different VPNs (for different service function overlay networks) MUST have different RDs, and those RDs MUST be different from any non-VPN SFIRs. I think we should probably be a little more explicit that we reuse the RD element (and the RD type/value semantics!) wholesale from RFC 4364 and https://www.iana.org/assignments/route-distinguisher-types/route-distinguisher-types.xhtml . That is, we are not just reusing the layout, but the logical type as well. Also, are all of these "MUST"s indicating requirements that are new with this specification, or are some of them inherited from RFC 4364? The discussion later on in Section 4.2 suggests that perhaps these RDs need to be unique per SFI, akin to how we say they are unique per SFP in Section 3.2? The Service Function Type identifies the functions/features of service function can offer, e.g., classifier, firewall, load balancer, etc. There may be several SFIs that can perform a given Service Function. Each node hosting an SFI MUST originate an SFIR This seems a bit of a non-sequitur: we go straight from SF*T*s to discussion of the SFI/SF relationship, and we only mention "type" (but not "SFT") in the rest of the paragraph, so the connection is harder to return to than it need be. Note that a node may advertise all SFIs of one SFT in one shot using normal BGP Update packing. That is, all of the SFIRs in an Update share a common Tunnel Encapsulation and RT attribute. See also I think we need to expand "route target". Also, I suggest s/may advertise all/may advertise all its/ Section 3.1.2 I suggest explicitly stating that these MPLS labels are used to direct incoming traffic to the SFI in question (fulfilling the promise made by the abstract). Note that it is assumed that each SFF has one or more globally unique SFC Context Labels and that the context label space and the SPI address space are disjoint. What I'm taking away from the last clause is roughly "we do not assume that the values of SFC context labels have any structured relationship to the corresponding SPI values", even though a strict reading of "disjoint" would seem to be that "if a value is used in one setting it is guaranteed to not be used in the other setting". I think some rewording may be in order. Section 3.2 [our treatment of RD should presumably be consistent with Section 3.1, if we make any changes there] byte Value field. All SFPs MUST be associated with different RDs. The association of an SFP with an RD is determined by provisioning. So this means that any given RD value can have at most one SFP associated with it? I guess that's needed in order to provide the level of separation between SFPs that we need... Section 3.2.1 Is there intended to be a distinction between the error-handling behavior for error cases 1/2/6/7 and error case 4? (If there is, I'm not seeing it.) 5., 8.: The absence of an RD with which to correlate is nothing more than a soft error. The receiver SHOULD store the information from the SFP attribute until a corresponding advertisement is received. Should any sort of timeout also be applied? Section 3.2.1.1 SFP. An SFP attribute SHOULD NOT contain more than one Association TLV with Association Type 1: if more than one is present, the first one MUST be processed and subsequent instances MUST be ignored. Note that documents that define new Association Do we want to say anything about checking consistency that (per these rules) the forward SFP is associated with the backward, and the backward SFP is associated with the forward one? [I guess Section 7.1 is probably enough.] Section 3.2.1.3 [It's not clear to me that grouping by type gives any efficiency savings here, as grouping by pool is available, and the semantics seem to be equivalent to if the list of allowed SFI (pool)s was explicitly given without the container. A single pool containing all the SFIs in the type would replace the SFIR-RD-value-zero semantics.] Section 3.2.1.5 The SFP Traversal With MPLS Label Stack TLV (Type value 5) is a zero length sub-TLV that can be carried in the SFP Attribute and indicates If it's carried directly in the SFP Attribute, doesn't that make it a non-sub TLV? Section 3.2.2 In all cases, there is no way for the receiving SFF to know which SFPR to process, and the SFPRs could be received in any order. At any point in time, when multiple SFPRs have the same SPI but different SFPR-RDs, the SFF MUST use the SFPR with the numerically lowest SFPR-RD. The SFF SHOULD log this occurrence to assist with (The "interpreted as an 8-octet integer in big-endian form" is implicit?) Section 4.1 The main feature introduced by this document is the ability to create multiple service function overlay networks through the use of Route Targets (RTs) [RFC4364]. As mentioned above, this seems like the second (not first) usage of "RT". Section 4.5 When an SFF gets an SFPR advertisement it will first determine whether to import the route by examining the RT. If the SFPR is imported the SFF then determines whether it is on the SFP by looking for its own SFIR-RDs in the SFPR. For each occurrence in the SFP, Also for non-specific SFT mentions that would apply, right? Section 5 o There may be an obvious branch needed in an SFP such as the processing after a firewall where admitted packets continue along the SFP, but suspect packets are diverted to a "penalty box". In this case, the next hop in the SFP will be indicated with two different SFT values. My (admittedly poor) understanding of the SFC Architecture was that this was best done as a reclassification, and that the various SFI options for a given SI were intended to be roughly equivalent. Am I just imagining that? 2. From the SFP attribute of that SFPR, it finds the Hop TLV with SI value set to SI-y. If there is no such Hop TLV, then such packets cannot be forwarded. This seems to exclude the "gaps" in SI space that this document is trying to allow. Or is the gap processing to have already happened by the time the SFF is at the "needs to forward" stage? A. An SFIR is relevant if it carries RT-z, the SFT in its NLRI matches the SFT value in one of the SFT TLVs, and the RD value in its NLRI matches an entry in the list of SFIR-RDs in that SFT TLV. B. If an entry in the SFIR-RD list of an SFT TLV contains the value zero, then an SFIR is relevant if it carries RT-z and the SFT in its NLRI matches the SFT value in that SFT TLV. I.e., any SFIR in the service function overlay network defined by RT-z and with the correct SFT is relevant. Do we need to talk about expansion of pools as well? Thus, at any point in time when an SFF selects its next hop, it chooses from the intersection of the set of next hop RDs contained in the SFPR and the RDs contained in its local set of SFIRs. If the intersection is null, the SFPR is unusable. Similarly, when this condition obtains the originator of the SFPR SHOULD either withdraw the SFPR or re-advertise it with a new set of RDs for the affected hop. (This seems to require a definition of "contained in" that includes various types of expansion having been performed.) nit: s/obtains/is detected/ (??) Section 7.4 o If an SFC Classifiers Extended Community is received with SFT = 0 then there are two sub-cases: * If there is a choice of SFT in the hop indicated by the value of the SI (including SI = 0) then SFT = 0 means there is a free choice according to local policy of which SFT to use). * If there is no choice of SFT in the hop indicated by the value of SI, then SFT = 0 means that the value of the SFT at that hop as indicated in the SFPR for the indicated SPI MUST be used. side note(?): I think it would be possible to include the second case as a special case of the first, as a "free choice" among all one allowed values by the SFP for that SI. which the traffic belongs. Additionally, note that to put the indicated SPI into context when multiple SFC overlays are present in one network, each FlowSpec update MUST be tagged with the route target of the overlay or VPN network for which it is intended. I'd suggest making this requirement more prominent by putting it earlier in the section. Section 7.5 The description of these flags as describing "how the originating SFF expects to see the SPI/SI represented" has some connotation of exclusivity ("I expect to see an NSH" implying "I don't expect to see anything else, including MPLS"), which does not seem like a good fit for a bitmask where multiple bits can be set (as opposed to just a codepoint for the encoding to use). The following bits are defined by this document: Bit 0: If this bit is set the NSH is to be used to carry the SPI/SI in the data plane. How are we numbering the bits? Section 7.6 When a classifier constructs an MPLS label stack for an SFP it starts with that SFP' last hop. If the last hop requires an {SPI, SI} label nit: "SFP's" Section 8.1 SFF1 followed by an SF of type 43 located at SFF2. This path is fully explicit and each SFF is offered no choice in forwarding packet along the path. nit: "forwarding packets" or "forwarding a packet" Section 8.4 This example provides a choice of SF type in the second hop in the path. The SI of 250 indicates a choice between SF type 43 located through SF2 and SF type 44 located at SF3. nit: s/located through/located at/? When the packets are returned to SFF1 by the SFI the SI will be decreased to 250 for the next hop. SFF1 now has a free choice of next hop SFF to execute the next hop in the path selecting between all SFF2 that support an SF of type 43 and SFF3 that supports an SF of type 44. These may be completely different functions that are to nit: I think s/all SFF2 that support/SFF2 that supports/ ? Section 8.8 Some pedantic part of me wants to complain that this is not a "branch", since switching to SPF10 is the only option allowed at SI=250 on SPF11. Section 8.9.1 It might make more sense to mvoe SPF13's definition before the paragraph that talks about "sufficiently precisely specified SFPs", since SPF13 does not actually "specify [...] exact SFIs to use" Section 9 I really like the way this section is written; thank you! I think the core SFC documents cover enough of the considerations inherent to looping, jumping, and branching that there's probably not more to say here. I'll list a handful of potential security topics I can think of after reading the document, but that's not meant to imply that they all need to be covered individually in the document: they are *potential* topics, but may not end up being worth talking about. We could perhaps note (again) the risk of misidentifying the overlay/VPN on which a SFI receives a packet and its impact on the SPI/SI lookup, but it's probably not strictly necessary. With SFTs being allocated via FCFS, there is perhaps some risk that different devices that actually provide qualitatively different functionality will claim to provide the same SFT-number's service, which potentially could cause problems. There is perhaps room to talk about the specific bad things that can happen if unsecured BGP is used (so that attackers can make false SFIR announcements, false SFPR declarations, etc.), but it's not entirely clear how useful that would be. It might also be worth a specific mention of perimeter filtering so the SFC configuration doesn't escape the local domain where it's intended to be used. (I would like to think this is sufficiently obvious, but am not properly calibrated to make that call.) Making "live" updates to an existing SFP is likely to have some level of skew; if this involves both additions and removals it seems like there is some risk of traversing "unsafe" configurations even when both old and new configurations on their own would be safe. (We do have something of a recommendation to not do this earlier in the document already, which is good.) Is it too banal to say that adding more stuff to BGP messages make them bigger and consume more resources to process? Chaining system. The control plane mechanisms are very similar to those used for BGP/MPLS IP VPNs as described in [RFC4364], and so the security considerations in that document (Section 23) provide good s/23/13/ Section 10.4 [When I first saw "association TLV" I was expecting it to share a registry with some other association grouping usages. But I don't have a particular complaint about doing it this way.] |
2019-12-18
|
13 | Benjamin Kaduk | [Ballot Position Update] New position, Discuss, has been recorded for Benjamin Kaduk |
2019-12-18
|
13 | Roman Danyliw | [Ballot discuss] * Section 9 cites a number of references (which cite additional references) on BGP security. My summary of the highlights is: (1) RFC4271 … [Ballot discuss] * Section 9 cites a number of references (which cite additional references) on BGP security. My summary of the highlights is: (1) RFC4271 => TCP MD5 (RFC2385) is a MUST (2) RFC4271 => consider RFC 3562 for key management guidance (3) ietf-idr-tunnel-encaps => caution on Tunnel Encapsulation attribute (4) rfc4364 => TCP MD5 is a non-rfc2119 “should” (5) rfc4364 => don’t make connections with untrusted peers (6) RFC7432 => references the utility of TCP-AO (RFC5925) - Could the text articulate more clearly de-conflict (1), (4) and (6) – what is the recommended approach? - a discuss-discuss – Given the green field nature of this specification (the shepherd’s report notes no implementation) and the assumed SFC deployment model (not the internet; a single provider’s operational domain where key management should be easier), could a more robust transport security option such as BGP over IPSec be RECOMMENDED? |
2019-12-18
|
13 | Roman Danyliw | [Ballot comment] * Section 2.2. Could you please clarify connect between these two statements about the SFC architecture: 1. “The SFIR is advertised by the … [Ballot comment] * Section 2.2. Could you please clarify connect between these two statements about the SFC architecture: 1. “The SFIR is advertised by the node hosting the service function instance” 2. “We assume BGP connectivity between the Controller and all SFFs within each service function overlay network” Is the node referenced in statement (1) the SFF. If not, it seems like they need to be added to statement #2 as entities that have BGP connectivity. * Section 2.2. Per Figure 1, where is the “Controller” in this reference model? * Section 3.1. Per “If two SFIRs are originated from different administrative domains …”, are these administrative domains still in a “within a single provider's operational domain” per Section 2.2.? * Section 3.1.1. Per the SFIR Pool Identifier Value being “globally unique”, is that globally unique per Controller? Per overlay network? * Section 4.3. Per the summary notation of “RT, {SFPR-RD, SPI}, m * {SI, {n * {SFT, p * SFIR-RD} } }”, it isn’t clear to me what this expression is summarizing. Also, what does the “*” mean? * Section 4.5.1. Per “Therefore, while this document requires that the SI values in an SFP are monotonic decreasing, it makes no assumption that the SI values are sequential.”, should this “requires” be a RFC2119 MUST or REQUIRED? * Section 6. Per “Therefore, the use of NSH metadata may be required in order to prevent infinite loops”, what is this meta-data? * Section 7.2. Per “In such cases it can be important or necessary that all packets from a flow continue to traverse the same instance of a service function so that the state can be leveraged and does not need to be regenerated.”, how is this requirement signaled through the SFIRs for the computation of SFPs? * Editorial Nits: - Section 2.2. s/channelled/channeled/ - Section 4.5.1. s/bevahior/behavior/ - Section 7.1. Per “As noted in Section 3.2.1.1 SFPRs reference each other one SFPR advertisement will be received before the other.”, this sentence didn’t parse for me. - Section 8.9.1. Typo. s/is is/is/ |
2019-12-18
|
13 | Roman Danyliw | [Ballot Position Update] New position, Discuss, has been recorded for Roman Danyliw |
2019-12-18
|
13 | Éric Vyncke | [Ballot Position Update] New position, No Objection, has been recorded for Éric Vyncke |
2019-12-18
|
13 | Alexey Melnikov | [Ballot comment] I trust my ART co-ADs on this one, as I only skimmed the document. |
2019-12-18
|
13 | Alexey Melnikov | [Ballot Position Update] New position, No Objection, has been recorded for Alexey Melnikov |
2019-12-17
|
13 | Barry Leiba | [Ballot comment] — Section 1.2 — o Service Function Overlay Network. The logical network comprised of Classifiers, SFFs, and SFIs that … [Ballot comment] — Section 1.2 — o Service Function Overlay Network. The logical network comprised of Classifiers, SFFs, and SFIs that are connected by paths or tunnels through underlay transport networks. You use “comprises” correctly four other times in the document, but this one is incorrect: “comprised of” should instead be either “comprising” or “composed of”. I only bother mentioning it because it’s right the four other times. — Section 3.1 — The Service Function Type identifies the functions/features of service function can offer, e.g., classifier, firewall, load balancer, etc. Should this be “a service function”, rather than “of service function”? And a nit: you don’t need both “e.g.” and “etc.” together: either one will do on its own. — Section 3.2.1 — o The errors listed above are treated as follows: 1., 2., 6., 7.: The attribute MUST be treated as malformed and the "treat-as-withdraw" approach used as per [RFC7606]. 3.: Unknown TLVs SHOULD be ignored, and message processing SHOULD continue. 4.: Treated as a malformed message and the "treat-as-withdraw" approach used as per [RFC7606] Why is 4 not included in the 1,2,6,7 group? It seems odd to separate it and not to make it “MUST”, like the others. — Section 9 — Service Function Chaining provides a significant attack opportunity: packets can be diverted from their normal paths through the network, can be made to execute unexpected functions, and the functions that are instantiated in software can be subverted. The second item in the list appears to lack a subject: can be made to execute unexpected functions. |
2019-12-17
|
13 | Barry Leiba | [Ballot Position Update] New position, No Objection, has been recorded for Barry Leiba |
2019-12-17
|
13 | Adam Roach | [Ballot comment] Thanks for the work on this document. I have only two comments, both minor and editorial. --------------------------------------------------------------------------- Please expand the following acronyms upon … [Ballot comment] Thanks for the work on this document. I have only two comments, both minor and editorial. --------------------------------------------------------------------------- Please expand the following acronyms upon first use, in the abstract, and in the title; see https://www.rfc-editor.org/materials/abbrev.expansion.txt for guidance. - NSH - SFC - AFI - SAFI - AF - NLRI - L3VPN - EVPN --------------------------------------------------------------------------- §8, §8.1, §8.2, §8.3, §8.4, §8.5, §8.6, §8.7, §8.7, §8.9.1, §8.9.2, §8.9.3, §8.9.4, §8.9.1, §8.9.2: All of the examples in these sections use IPv4 addresses exclusively. Please update them to use IPv6 exclusively, or to use a mix of IPv4 and IPv6. See https://www.iab.org/2016/11/07/iab-statement-on-ipv6/ for further details. |
2019-12-17
|
13 | Adam Roach | [Ballot Position Update] New position, No Objection, has been recorded for Adam Roach |
2019-12-17
|
13 | Alissa Cooper | [Ballot Position Update] New position, No Objection, has been recorded for Alissa Cooper |
2019-12-17
|
13 | Olivier Bonaventure | Request for Last Call review by TSVART Completed: Ready. Reviewer: Olivier Bonaventure. Sent review to list. |
2019-12-16
|
13 | Sheng Jiang | Request for Last Call review by OPSDIR Completed: Has Issues. Reviewer: Sheng Jiang. Sent review to list. |
2019-12-13
|
13 | Amanda Baber | IANA Review state changed to IANA OK - Actions Needed from Version Changed - Review Needed |
2019-12-13
|
13 | Cindy Morgan | Telechat date has been changed to 2019-12-19 from 2020-01-09 |
2019-12-13
|
13 | Cindy Morgan | Placed on agenda for telechat - 2020-01-09 |
2019-12-13
|
13 | Martin Vigoureux | IESG state changed to IESG Evaluation from Waiting for Writeup |
2019-12-13
|
13 | Martin Vigoureux | Ballot has been issued |
2019-12-13
|
13 | Martin Vigoureux | [Ballot Position Update] New position, Yes, has been recorded for Martin Vigoureux |
2019-12-13
|
13 | Martin Vigoureux | Created "Approve" ballot |
2019-12-13
|
13 | Martin Vigoureux | Ballot writeup was changed |
2019-12-13
|
13 | (System) | IANA Review state changed to Version Changed - Review Needed from IANA - Not OK |
2019-12-13
|
13 | Adrian Farrel | New version available: draft-ietf-bess-nsh-bgp-control-plane-13.txt |
2019-12-13
|
13 | (System) | New version approved |
2019-12-13
|
13 | (System) | Request for posting confirmation emailed to previous authors: Adrian Farrel , John Drake , Eric Rosen , Jim Uttaro , Luay Jalil |
2019-12-13
|
13 | Adrian Farrel | Uploaded new revision |
2019-12-13
|
12 | (System) | IESG state changed to Waiting for Writeup from In Last Call |
2019-12-12
|
12 | (System) | IANA Review state changed to IANA - Not OK from IANA - Review Needed |
2019-12-12
|
12 | Sabrina Tanamal | (Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs: The IANA Functions Operator has completed its review of draft-ietf-bess-nsh-bgp-control-plane-12. If any part of this review is inaccurate, please let … (Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs: The IANA Functions Operator has completed its review of draft-ietf-bess-nsh-bgp-control-plane-12. If any part of this review is inaccurate, please let us know. The IANA Functions Operator has a question about one of the actions requested in the IANA Considerations section of this document. The IANA Functions Operator understands that, upon approval of this document, there are ten actions which we must complete. First, in the Address Family Numbers registry located at: https://www.iana.org/assignments/address-family-numbers/ a single, new registration will be made as follows: Number: [ TBD-at-Registration ] Description: BGP SFC Reference: [ RFC-to-be ] Registration Date: [ TBD-at-Registration ] IANA will update the YANG module in the registry at https://www.iana.org/assignments/iana-routing-types as part of this registration. Second, in the Subsequent Address Family Identifiers (SAFI) Parameters registry located at: https://www.iana.org/assignments/safi-namespace/ a single, new registration will be made as follows: Value: [ TBD-at-Registration ] Description: BGP SFC Reference: [ RFC-to-be ] As before, IANA will update the YANG module in the registry at https://www.iana.org/assignments/iana-routing-types as part of this registration. Third, in the BGP Path Attributes registry on the Border Gateway Protocol (BGP) Parameters registry page located at: https://www.iana.org/assignments/bgp-parameters/ a single, new registration will be made as follows: Value: [ TBD-at-Registration ] Code: SFP attribute Reference: [ RFC-to-be ] Fourth, a new registry is to be created called the SFP Attribute TLVs registry. The new registry is to be located on the Border Gateway Protocol (BGP) Parameters registry page located at: https://www.iana.org/assignments/bgp-parameters/ Values are in the range from 0 to 65535. The registration rules for the new registry are as follows [RFC8126]: Values 0 and 65535 are to be marked "Reserved" and Values 1 through 65524 are to be assigned according to the "First Come First Served" policy IANA Question --> What is the registration policy [RFC8126] for values 65525 through 65534? There are initial registrations in the new registry as follows: Type | Name | Reference | Registration Date ------+-------------------------+---------------+------------------------ 0 | Reserved 1 | Association TLV |[ RFC-to-be ] | [ TBD-at-Registration ] 2 | Hop TLV |[ RFC-to-be ] | [ TBD-at-Registration ] 3 | SFT TLV |[ RFC-to-be ] | [ TBD-at-Registration ] 4 | MPLS Swapping/Stacking |[ RFC-to-be ] | [ TBD-at-Registration ] 5-65524 Unassigned 65535 Reserved Fifth, a new registry is to be created called the SFP Association Type registry.The new registry is to be located on the Border Gateway Protocol (BGP) Parameters registry page located at: https://www.iana.org/assignments/bgp-parameters/ Values are in the range from 0 to 65535. The registration rules for the new registry are as follows [RFC8126]: Values 0 and 65535 are to be marked "Reserved" and Values 1 through 65524 are to be assigned according to the "First Come First Served" policy IANA Question --> What is the registration policy [RFC8126] for values 65525 through 65534? There are initial registrations in the new registry as follows: Type | Name | Reference | Registration Date ------+-------------------------+---------------+------------------------ 0 | Reserved 1 | Bidirectional SFP |[ RFC-to-be ] | [ TBD-at-Registration ] 2-65524 Unassigned 65535 Reserved Sixth, a new registry page entry on the IANA Protocol Registry Matrix located at: https://www.iana.org/protocols is to be created called Service Function Chaining Service Function Types. It's reference is to be [ RFC-to-be ]. Seventh, in the newly created Service Function Chaining Service Function Types registry page, a new registry is to be created called the Service Function Chaining Service Function Types registry. Values are in the range from 0 to 65535. The registration rules for the new registry are as follows [RFC8126]: Values 0 and 65535 are to be marked "Reserved" Values 1 through 31 are to be assigned by Standards Action and are referred to as the Special Purpose SFT values Values 32 through 65534 are to be assigned according to the "First Come First Served" policy There are initial registrations in the new registry as follows: Type | Name | Reference | Registration Date ------+-------------------------+---------------+------------------------ 0 | Reserved 1 | Change Sequence |[ RFC-to-be ] | [ TBD-at-Registration ] 2-65524 Unassigned 65535 Reserved Eighth, in the Generic Transitive Experimental Use Extended Community Sub-Types registry on the Border Gateway Protocol (BGP) Extended Communities registry page located at: https://www.iana.org/assignments/bgp-extended-communities/ a single, new registration is to be made as follows: Sub-type Value: [ TBD-at-Registration ] Name: Flow Spec for SFC Classifiers Reference: [ RFC-to-be ] Date: [ TBD-at-Registration ] Ninth, in the BGP Transitive Extended Community Types registry also on the Border Gateway Protocol (BGP) Extended Communities registry page located at: https://www.iana.org/assignments/bgp-extended-communities/ two, new registrations are to be made as follows: Type Value: [ TBD-at-Registration ] Name: SFI Pool Identifier Reference: [ RFC-to-be ] Date: [ TBD-at-Registration ] Type Value: [ TBD-at-Registration ] Name: MPLS Label Stack Mixed Swapping/Stacking Labels Reference: [ RFC-to-be ] Date: [ TBD-at-Registration ] Tenth, in the BGP Tunnel Encapsulation Attribute Sub-TLVs on the Border Gateway Protocol (BGP) Parameters registry page located at: https://www.iana.org/assignments/bgp-parameters/ a single, new registration is to be made as follows: Value: [ TBD-at-Registration ] Name: SPI/SI Representation Sub-TLV Reference: [ RFC-to-be ] The IANA Functions Operator understands that these are the only actions required to be completed upon approval of this document. Note: The actions requested in this document will not be completed until the document has been approved for publication as an RFC. This message is meant only to confirm the list of actions that will be performed. Thank you, Sabrina Tanamal Senior IANA Services Specialist |
2019-12-09
|
12 | Brian Carpenter | Request for Last Call review by GENART Completed: Ready with Issues. Reviewer: Brian Carpenter. Sent review to list. |
2019-12-08
|
12 | Min Ye | Request for Last Call review by RTGDIR is assigned to Ravi Singh |
2019-12-08
|
12 | Min Ye | Request for Last Call review by RTGDIR is assigned to Ravi Singh |
2019-12-05
|
12 | Jean Mahoney | Request for Last Call review by GENART is assigned to Brian Carpenter |
2019-12-05
|
12 | Jean Mahoney | Request for Last Call review by GENART is assigned to Brian Carpenter |
2019-12-05
|
12 | Tero Kivinen | Request for Last Call review by SECDIR is assigned to Scott Kelly |
2019-12-05
|
12 | Tero Kivinen | Request for Last Call review by SECDIR is assigned to Scott Kelly |
2019-12-05
|
12 | Gunter Van de Velde | Request for Last Call review by OPSDIR is assigned to Sheng Jiang |
2019-12-05
|
12 | Gunter Van de Velde | Request for Last Call review by OPSDIR is assigned to Sheng Jiang |
2019-12-03
|
12 | Min Ye | Request for Last Call review by RTGDIR is assigned to Himanshu Shah |
2019-12-03
|
12 | Min Ye | Request for Last Call review by RTGDIR is assigned to Himanshu Shah |
2019-12-03
|
12 | Wesley Eddy | Request for Last Call review by TSVART is assigned to Olivier Bonaventure |
2019-12-03
|
12 | Wesley Eddy | Request for Last Call review by TSVART is assigned to Olivier Bonaventure |
2019-12-02
|
12 | Min Ye | Request for Last Call review by RTGDIR is assigned to John Scudder |
2019-12-02
|
12 | Min Ye | Request for Last Call review by RTGDIR is assigned to John Scudder |
2019-12-02
|
12 | Martin Vigoureux | Requested Last Call review by RTGDIR |
2019-11-29
|
12 | Amy Vezza | IANA Review state changed to IANA - Review Needed |
2019-11-29
|
12 | Amy Vezza | The following Last Call announcement was sent out (ends 2019-12-13): From: The IESG To: IETF-Announce CC: stephane.litkowski@orange.com, draft-ietf-bess-nsh-bgp-control-plane@ietf.org, martin.vigoureux@nokia.com, bess-chairs@ietf.org, bess@ietf.org … The following Last Call announcement was sent out (ends 2019-12-13): From: The IESG To: IETF-Announce CC: stephane.litkowski@orange.com, draft-ietf-bess-nsh-bgp-control-plane@ietf.org, martin.vigoureux@nokia.com, bess-chairs@ietf.org, bess@ietf.org, Stephane Litkowski Reply-To: last-call@ietf.org Sender: Subject: Last Call: (BGP Control Plane for NSH SFC) to Proposed Standard The IESG has received a request from the BGP Enabled ServiceS WG (bess) to consider the following document: - 'BGP Control Plane for NSH SFC' as Proposed Standard The IESG plans to make a decision in the next few weeks, and solicits final comments on this action. Please send substantive comments to the last-call@ietf.org mailing lists by 2019-12-13. Exceptionally, comments may be sent to iesg@ietf.org instead. In either case, please retain the beginning of the Subject line to allow automated sorting. Abstract This document describes the use of BGP as a control plane for networks that support Service Function Chaining (SFC). The document introduces a new BGP address family called the SFC AFI/SAFI with two route types. One route type is originated by a node to advertise that it hosts a particular instance of a specified service function. This route type also provides "instructions" on how to send a packet to the hosting node in a way that indicates that the service function has to be applied to the packet. The other route type is used by a Controller to advertise the paths of "chains" of service functions, and to give a unique designator to each such path so that they can be used in conjunction with the Network Service Header defined in RFC 8300. This document adopts the SFC architecture described in RFC 7665. The file can be obtained via https://datatracker.ietf.org/doc/draft-ietf-bess-nsh-bgp-control-plane/ IESG discussion can be tracked via https://datatracker.ietf.org/doc/draft-ietf-bess-nsh-bgp-control-plane/ballot/ The following IPR Declarations may be related to this I-D: https://datatracker.ietf.org/ipr/3107/ https://datatracker.ietf.org/ipr/2980/ https://datatracker.ietf.org/ipr/3826/ https://datatracker.ietf.org/ipr/2898/ https://datatracker.ietf.org/ipr/3347/ https://datatracker.ietf.org/ipr/3011/ The document contains these normative downward references. See RFC 3967 for additional information: rfc7665: Service Function Chaining (SFC) Architecture (Informational - IETF stream) rfc8596: MPLS Transport Encapsulation for the Service Function Chaining (SFC) Network Service Header (NSH) (Informational - IETF stream) |
2019-11-29
|
12 | Amy Vezza | IESG state changed to In Last Call from Last Call Requested |
2019-11-29
|
12 | Martin Vigoureux | Notification list changed to none from slitkows.ietf@gmail.com, Stephane Litkowski <slitkows.ietf@gmail.com> |
2019-11-29
|
12 | Martin Vigoureux | Notification list changed to slitkows.ietf@gmail.com, Stephane Litkowski <slitkows.ietf@gmail.com> from slitkows.ietf@gmail.com |
2019-11-29
|
12 | Martin Vigoureux | Document shepherd changed to Stephane Litkowski |
2019-11-29
|
12 | Martin Vigoureux | Notification list changed to slitkows.ietf@gmail.com from Stephane Litkowski <stephane.litkowski@orange.com> |
2019-11-29
|
12 | Martin Vigoureux | Last call was requested |
2019-11-29
|
12 | Martin Vigoureux | Ballot approval text was generated |
2019-11-29
|
12 | Martin Vigoureux | Ballot writeup was generated |
2019-11-29
|
12 | Martin Vigoureux | IESG state changed to Last Call Requested from AD Evaluation |
2019-11-29
|
12 | Martin Vigoureux | Last call announcement was generated |
2019-11-29
|
12 | Martin Vigoureux | As required by RFC 4858, this is the current template for the Document Shepherd Write-Up. Changes are expected over time. This version is dated … As required by RFC 4858, this is the current template for the Document Shepherd Write-Up. Changes are expected over time. This version is dated 24 February 2012. (1) What type of RFC is being requested (BCP, Proposed Standard, Internet Standard, Informational, Experimental, or Historic)? Why is this the proper type of RFC? Is this type of RFC indicated in the title page header? The document is requested to be a Proposed Standard. It defines some new BGP extensions that require interoperability. This is the proper type of RFC and the type of RFC is clearly indicated in the title page header. (2) The IESG approval announcement includes a Document Announcement Write-Up. Please provide such a Document Announcement Write-Up. Recent examples can be found in the "Action" announcements for approved documents. The approval announcement contains the following sections: Technical Summary The document defines a BGP controlplane for NSH based service chaining. Working Group Summary Was there anything in WG process that is worth noting? For example, was there controversy about particular points or were there decisions where the consensus was particularly rough? There is nothing particular to note. There is a good level of consensus on the document. Document Quality Are there existing implementations of the protocol? Have a significant number of vendors indicated their plan to implement the specification? Are there any reviewers that merit special mention as having done a thorough review, e.g., one that resulted in important changes or a conclusion that the document had no substantive issues? If there was a MIB Doctor, Media Type or other expert review, what was its course (briefly)? In the case of a Media Type review, on what date was the request posted? There is no implementation or committed roadmap. However the WG supports the publication of the document as an RFC. Personnel Who is the Document Shepherd? Who is the Responsible Area Director? Stephane Litkowski is the document shepherd. Martin Vigoureux is the responsible AD. (3) Briefly describe the review of this document that was performed by the Document Shepherd. If this version of the document is not ready for publication, please explain why the document is being forwarded to the IESG. The shepherd has done a deep review of the document and provided a list of comments to the authors. The comments have been addressed. (4) Does the document Shepherd have any concerns about the depth or breadth of the reviews that have been performed? No concern (5) Do portions of the document need review from a particular or from broader perspective, e.g., security, operational complexity, AAA, DNS, DHCP, XML, or internationalization? If so, describe the review that took place. No (6) Describe any specific concerns or issues that the Document Shepherd has with this document that the Responsible Area Director and/or the IESG should be aware of? For example, perhaps he or she is uncomfortable with certain parts of the document, or has concerns whether there really is a need for it. In any event, if the WG has discussed those issues and has indicated that it still wishes to advance the document, detail those concerns here. No concern (7) Has each author confirmed that any and all appropriate IPR disclosures required for full conformance with the provisions of BCP 78 and BCP 79 have already been filed. If not, explain why. Yes (8) Has an IPR disclosure been filed that references this document? If so, summarize any WG discussion and conclusion regarding the IPR disclosures. There are multiple IPR disclosed. There was no controversy about these IPRs. (9) How solid is the WG consensus behind this document? Does it represent the strong concurrence of a few individuals, with others being silent, or does the WG as a whole understand and agree with it? There was no objection and a good support from the WG. (10) Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarise the areas of conflict in separate email messages to the Responsible Area Director. (It should be in a separate email because this questionnaire is publicly available.) no (11) Identify any ID nits the Document Shepherd has found in this document. (See https://www.ietf.org/tools/idnits/ and the Internet-Drafts Checklist). Boilerplate checks are not enough; this check needs to be thorough. (12) Describe how the document meets any required formal review criteria, such as the MIB Doctor, media type, and URI type reviews. N/A (13) Have all references within this document been identified as either normative or informative? yes (14) Are there normative references to documents that are not ready for advancement or are otherwise in an unclear state? If such normative references exist, what is the plan for their completion? No, the document will require ietf-idr-rfc5575bis and ietf-idr-tunnel-encaps to be completed. However these documents are on a good track. (15) Are there downward normative references references (see RFC 3967)? If so, list these downward references to support the Area Director in the Last Call procedure. ** Downref: Normative reference to an Informational RFC: RFC 7665 ** Downref: Normative reference to an Informational RFC: RFC 8596 (16) Will publication of this document change the status of any existing RFCs? Are those RFCs listed on the title page header, listed in the abstract, and discussed in the introduction? If the RFCs are not listed in the Abstract and Introduction, explain why, and point to the part of the document where the relationship of this document to the other RFCs is discussed. If this information is not in the document, explain why the WG considers it unnecessary. No (17) Describe the Document Shepherd's review of the IANA considerations section, especially with regard to its consistency with the body of the document. Confirm that all protocol extensions that the document makes are associated with the appropriate reservations in IANA registries. Confirm that any referenced IANA registries have been clearly identified. Confirm that newly created IANA registries include a detailed specification of the initial contents for the registry, that allocations procedures for future registrations are defined, and a reasonable name for the new registry has been suggested (see RFC 5226). The IANA section is clearly written. (18) List any new IANA registries that require Expert Review for future allocations. Provide any public guidance that the IESG would find useful in selecting the IANA Experts for these new registries. There are new IANA registries created , however none require Expert review. (19) Describe reviews and automated checks performed by the Document Shepherd to validate sections of the document written in a formal language, such as XML code, BNF rules, MIB definitions, etc. n/a |
2019-10-29
|
Jenny Bui | Posted related IPR disclosure: Orange's Statement about IPR related to draft-ietf-bess-nsh-bgp-control-plane | |
2019-10-24
|
12 | Martin Vigoureux | IESG state changed to AD Evaluation from Publication Requested |
2019-08-20
|
12 | Stephane Litkowski | As required by RFC 4858, this is the current template for the Document Shepherd Write-Up. Changes are expected over time. This version is dated … As required by RFC 4858, this is the current template for the Document Shepherd Write-Up. Changes are expected over time. This version is dated 24 February 2012. (1) What type of RFC is being requested (BCP, Proposed Standard, Internet Standard, Informational, Experimental, or Historic)? Why is this the proper type of RFC? Is this type of RFC indicated in the title page header? The document is requested to be a Proposed Standard. It defines some new BGP extensions that require interoperability. This is the proper type of RFC and the type of RFC is clearly indicated in the title page header. (2) The IESG approval announcement includes a Document Announcement Write-Up. Please provide such a Document Announcement Write-Up. Recent examples can be found in the "Action" announcements for approved documents. The approval announcement contains the following sections: Technical Summary The document defines a BGP controlplane for NSH based service chaining. Working Group Summary Was there anything in WG process that is worth noting? For example, was there controversy about particular points or were there decisions where the consensus was particularly rough? There is nothing particular to note. There is a good level of consensus on the document. Document Quality Are there existing implementations of the protocol? Have a significant number of vendors indicated their plan to implement the specification? Are there any reviewers that merit special mention as having done a thorough review, e.g., one that resulted in important changes or a conclusion that the document had no substantive issues? If there was a MIB Doctor, Media Type or other expert review, what was its course (briefly)? In the case of a Media Type review, on what date was the request posted? There is no implementation or committed roadmap. However the WG supports the publication of the document as an RFC. Personnel Who is the Document Shepherd? Who is the Responsible Area Director? Stephane Litkowski is the document shepherd. Martin Vigoureux is the responsible AD. (3) Briefly describe the review of this document that was performed by the Document Shepherd. If this version of the document is not ready for publication, please explain why the document is being forwarded to the IESG. The shepherd has done a deep review of the document and provided a list of comments to the authors. The comments have been addressed. (4) Does the document Shepherd have any concerns about the depth or breadth of the reviews that have been performed? No concern (5) Do portions of the document need review from a particular or from broader perspective, e.g., security, operational complexity, AAA, DNS, DHCP, XML, or internationalization? If so, describe the review that took place. No (6) Describe any specific concerns or issues that the Document Shepherd has with this document that the Responsible Area Director and/or the IESG should be aware of? For example, perhaps he or she is uncomfortable with certain parts of the document, or has concerns whether there really is a need for it. In any event, if the WG has discussed those issues and has indicated that it still wishes to advance the document, detail those concerns here. No concern (7) Has each author confirmed that any and all appropriate IPR disclosures required for full conformance with the provisions of BCP 78 and BCP 79 have already been filed. If not, explain why. Yes (8) Has an IPR disclosure been filed that references this document? If so, summarize any WG discussion and conclusion regarding the IPR disclosures. There are multiple IPR disclosed. There was no controversy about these IPRs. (9) How solid is the WG consensus behind this document? Does it represent the strong concurrence of a few individuals, with others being silent, or does the WG as a whole understand and agree with it? There was no objection and a good support from the WG. (10) Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarise the areas of conflict in separate email messages to the Responsible Area Director. (It should be in a separate email because this questionnaire is publicly available.) no (11) Identify any ID nits the Document Shepherd has found in this document. (See https://www.ietf.org/tools/idnits/ and the Internet-Drafts Checklist). Boilerplate checks are not enough; this check needs to be thorough. (12) Describe how the document meets any required formal review criteria, such as the MIB Doctor, media type, and URI type reviews. N/A (13) Have all references within this document been identified as either normative or informative? yes (14) Are there normative references to documents that are not ready for advancement or are otherwise in an unclear state? If such normative references exist, what is the plan for their completion? No, the document will require ietf-idr-rfc5575bis and ietf-idr-tunnel-encaps to be completed. However these documents are on a good track. (15) Are there downward normative references references (see RFC 3967)? If so, list these downward references to support the Area Director in the Last Call procedure. (16) Will publication of this document change the status of any existing RFCs? Are those RFCs listed on the title page header, listed in the abstract, and discussed in the introduction? If the RFCs are not listed in the Abstract and Introduction, explain why, and point to the part of the document where the relationship of this document to the other RFCs is discussed. If this information is not in the document, explain why the WG considers it unnecessary. No (17) Describe the Document Shepherd's review of the IANA considerations section, especially with regard to its consistency with the body of the document. Confirm that all protocol extensions that the document makes are associated with the appropriate reservations in IANA registries. Confirm that any referenced IANA registries have been clearly identified. Confirm that newly created IANA registries include a detailed specification of the initial contents for the registry, that allocations procedures for future registrations are defined, and a reasonable name for the new registry has been suggested (see RFC 5226). The IANA section is clearly written. (18) List any new IANA registries that require Expert Review for future allocations. Provide any public guidance that the IESG would find useful in selecting the IANA Experts for these new registries. There are new IANA registries created , however none require Expert review. (19) Describe reviews and automated checks performed by the Document Shepherd to validate sections of the document written in a formal language, such as XML code, BNF rules, MIB definitions, etc. n/a |
2019-08-20
|
12 | Stephane Litkowski | Responsible AD changed to Martin Vigoureux |
2019-08-20
|
12 | Stephane Litkowski | IETF WG state changed to Submitted to IESG for Publication from WG Consensus: Waiting for Write-Up |
2019-08-20
|
12 | Stephane Litkowski | IESG state changed to Publication Requested from I-D Exists |
2019-08-20
|
12 | Stephane Litkowski | IESG process started in state Publication Requested |
2019-08-20
|
12 | Stephane Litkowski | Changed consensus to Yes from Unknown |
2019-08-20
|
12 | Stephane Litkowski | Intended Status changed to Proposed Standard from None |
2019-08-20
|
12 | Stephane Litkowski | As required by RFC 4858, this is the current template for the Document Shepherd Write-Up. Changes are expected over time. This version is dated … As required by RFC 4858, this is the current template for the Document Shepherd Write-Up. Changes are expected over time. This version is dated 24 February 2012. (1) What type of RFC is being requested (BCP, Proposed Standard, Internet Standard, Informational, Experimental, or Historic)? Why is this the proper type of RFC? Is this type of RFC indicated in the title page header? The document is requested to be a Proposed Standard. It defines some new BGP extensions that require interoperability. This is the proper type of RFC and the type of RFC is clearly indicated in the title page header. (2) The IESG approval announcement includes a Document Announcement Write-Up. Please provide such a Document Announcement Write-Up. Recent examples can be found in the "Action" announcements for approved documents. The approval announcement contains the following sections: Technical Summary The document defines a BGP controlplane for NSH based service chaining. Working Group Summary Was there anything in WG process that is worth noting? For example, was there controversy about particular points or were there decisions where the consensus was particularly rough? There is nothing particular to note. There is a good level of consensus on the document. Document Quality Are there existing implementations of the protocol? Have a significant number of vendors indicated their plan to implement the specification? Are there any reviewers that merit special mention as having done a thorough review, e.g., one that resulted in important changes or a conclusion that the document had no substantive issues? If there was a MIB Doctor, Media Type or other expert review, what was its course (briefly)? In the case of a Media Type review, on what date was the request posted? There is no implementation or committed roadmap. However the WG supports the publication of the document as an RFC. Personnel Who is the Document Shepherd? Who is the Responsible Area Director? Stephane Litkowski is the document shepherd. Martin Vigoureux is the responsible AD. (3) Briefly describe the review of this document that was performed by the Document Shepherd. If this version of the document is not ready for publication, please explain why the document is being forwarded to the IESG. The shepherd has done a deep review of the document and provided a list of comments to the authors. The comments have been addressed. (4) Does the document Shepherd have any concerns about the depth or breadth of the reviews that have been performed? No concern (5) Do portions of the document need review from a particular or from broader perspective, e.g., security, operational complexity, AAA, DNS, DHCP, XML, or internationalization? If so, describe the review that took place. No (6) Describe any specific concerns or issues that the Document Shepherd has with this document that the Responsible Area Director and/or the IESG should be aware of? For example, perhaps he or she is uncomfortable with certain parts of the document, or has concerns whether there really is a need for it. In any event, if the WG has discussed those issues and has indicated that it still wishes to advance the document, detail those concerns here. No concern (7) Has each author confirmed that any and all appropriate IPR disclosures required for full conformance with the provisions of BCP 78 and BCP 79 have already been filed. If not, explain why. Yes (8) Has an IPR disclosure been filed that references this document? If so, summarize any WG discussion and conclusion regarding the IPR disclosures. There are multiple IPR disclosed. There was no controversy about these IPRs. (9) How solid is the WG consensus behind this document? Does it represent the strong concurrence of a few individuals, with others being silent, or does the WG as a whole understand and agree with it? There was no objection and a good support from the WG. (10) Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarise the areas of conflict in separate email messages to the Responsible Area Director. (It should be in a separate email because this questionnaire is publicly available.) no (11) Identify any ID nits the Document Shepherd has found in this document. (See https://www.ietf.org/tools/idnits/ and the Internet-Drafts Checklist). Boilerplate checks are not enough; this check needs to be thorough. (12) Describe how the document meets any required formal review criteria, such as the MIB Doctor, media type, and URI type reviews. N/A (13) Have all references within this document been identified as either normative or informative? yes (14) Are there normative references to documents that are not ready for advancement or are otherwise in an unclear state? If such normative references exist, what is the plan for their completion? No, the document will require ietf-idr-rfc5575bis and ietf-idr-tunnel-encaps to be completed. However these documents are on a good track. (15) Are there downward normative references references (see RFC 3967)? If so, list these downward references to support the Area Director in the Last Call procedure. (16) Will publication of this document change the status of any existing RFCs? Are those RFCs listed on the title page header, listed in the abstract, and discussed in the introduction? If the RFCs are not listed in the Abstract and Introduction, explain why, and point to the part of the document where the relationship of this document to the other RFCs is discussed. If this information is not in the document, explain why the WG considers it unnecessary. No (17) Describe the Document Shepherd's review of the IANA considerations section, especially with regard to its consistency with the body of the document. Confirm that all protocol extensions that the document makes are associated with the appropriate reservations in IANA registries. Confirm that any referenced IANA registries have been clearly identified. Confirm that newly created IANA registries include a detailed specification of the initial contents for the registry, that allocations procedures for future registrations are defined, and a reasonable name for the new registry has been suggested (see RFC 5226). The IANA section is clearly written. (18) List any new IANA registries that require Expert Review for future allocations. Provide any public guidance that the IESG would find useful in selecting the IANA Experts for these new registries. There are new IANA registries created , however none require Expert review. (19) Describe reviews and automated checks performed by the Document Shepherd to validate sections of the document written in a formal language, such as XML code, BNF rules, MIB definitions, etc. n/a |
2019-08-20
|
12 | Adrian Farrel | New version available: draft-ietf-bess-nsh-bgp-control-plane-12.txt |
2019-08-20
|
12 | (System) | New version approved |
2019-08-20
|
12 | (System) | Request for posting confirmation emailed to previous authors: Adrian Farrel , John Drake , Eric Rosen , Jim Uttaro , Luay Jalil |
2019-08-20
|
12 | Adrian Farrel | Uploaded new revision |
2019-05-30
|
11 | Adrian Farrel | New version available: draft-ietf-bess-nsh-bgp-control-plane-11.txt |
2019-05-30
|
11 | (System) | New version approved |
2019-05-30
|
11 | (System) | Request for posting confirmation emailed to previous authors: Adrian Farrel , John Drake , Eric Rosen , Jim Uttaro , Luay Jalil |
2019-05-30
|
11 | Adrian Farrel | Uploaded new revision |
2019-04-26
|
10 | Adrian Farrel | New version available: draft-ietf-bess-nsh-bgp-control-plane-10.txt |
2019-04-26
|
10 | (System) | New version approved |
2019-04-26
|
10 | (System) | Request for posting confirmation emailed to previous authors: Adrian Farrel , John Drake , Eric Rosen , Jim Uttaro , Luay Jalil |
2019-04-26
|
10 | Adrian Farrel | Uploaded new revision |
2019-03-06
|
09 | Adrian Farrel | New version available: draft-ietf-bess-nsh-bgp-control-plane-09.txt |
2019-03-06
|
09 | (System) | New version approved |
2019-03-06
|
09 | (System) | Request for posting confirmation emailed to previous authors: Adrian Farrel , John Drake , Eric Rosen , Jim Uttaro , Luay Jalil |
2019-03-06
|
09 | Adrian Farrel | Uploaded new revision |
2019-03-01
|
08 | Adrian Farrel | New version available: draft-ietf-bess-nsh-bgp-control-plane-08.txt |
2019-03-01
|
08 | (System) | New version approved |
2019-03-01
|
08 | (System) | Request for posting confirmation emailed to previous authors: Adrian Farrel , John Drake , Eric Rosen , Jim Uttaro , Luay Jalil |
2019-03-01
|
08 | Adrian Farrel | Uploaded new revision |
2019-02-27
|
07 | Stephane Litkowski | As required by RFC 4858, this is the current template for the Document Shepherd Write-Up. Changes are expected over time. This version is dated … As required by RFC 4858, this is the current template for the Document Shepherd Write-Up. Changes are expected over time. This version is dated 24 February 2012. (1) What type of RFC is being requested (BCP, Proposed Standard, Internet Standard, Informational, Experimental, or Historic)? Why is this the proper type of RFC? Is this type of RFC indicated in the title page header? The document is requested to be a Proposed Standard. It defines some new BGP extensions that require interoperability. This is the proper type of RFC and the type of RFC is clearly indicated in the title page header. (2) The IESG approval announcement includes a Document Announcement Write-Up. Please provide such a Document Announcement Write-Up. Recent examples can be found in the "Action" announcements for approved documents. The approval announcement contains the following sections: Technical Summary The document defines a BGP controlplane for NSH based service chaining. Working Group Summary Was there anything in WG process that is worth noting? For example, was there controversy about particular points or were there decisions where the consensus was particularly rough? There is nothing particular to note. There is a good level of consensus on the document. Document Quality Are there existing implementations of the protocol? Have a significant number of vendors indicated their plan to implement the specification? Are there any reviewers that merit special mention as having done a thorough review, e.g., one that resulted in important changes or a conclusion that the document had no substantive issues? If there was a MIB Doctor, Media Type or other expert review, what was its course (briefly)? In the case of a Media Type review, on what date was the request posted? There is no implementation or committed roadmap. Personnel Who is the Document Shepherd? Who is the Responsible Area Director? Stephane Litkowski is the document shepherd. Martin Vigoureux is the responsible AD. (3) Briefly describe the review of this document that was performed by the Document Shepherd. If this version of the document is not ready for publication, please explain why the document is being forwarded to the IESG. The shepherd has done a deep review of the document and provided a list of comments to the authors. (4) Does the document Shepherd have any concerns about the depth or breadth of the reviews that have been performed? No concern (5) Do portions of the document need review from a particular or from broader perspective, e.g., security, operational complexity, AAA, DNS, DHCP, XML, or internationalization? If so, describe the review that took place. No (6) Describe any specific concerns or issues that the Document Shepherd has with this document that the Responsible Area Director and/or the IESG should be aware of? For example, perhaps he or she is uncomfortable with certain parts of the document, or has concerns whether there really is a need for it. In any event, if the WG has discussed those issues and has indicated that it still wishes to advance the document, detail those concerns here. No concern (7) Has each author confirmed that any and all appropriate IPR disclosures required for full conformance with the provisions of BCP 78 and BCP 79 have already been filed. If not, explain why. Yes (8) Has an IPR disclosure been filed that references this document? If so, summarize any WG discussion and conclusion regarding the IPR disclosures. There are multiple IPR disclosed. There was no controversy about these IPRs. (9) How solid is the WG consensus behind this document? Does it represent the strong concurrence of a few individuals, with others being silent, or does the WG as a whole understand and agree with it? (10) Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarise the areas of conflict in separate email messages to the Responsible Area Director. (It should be in a separate email because this questionnaire is publicly available.) no (11) Identify any ID nits the Document Shepherd has found in this document. (See https://www.ietf.org/tools/idnits/ and the Internet-Drafts Checklist). Boilerplate checks are not enough; this check needs to be thorough. (12) Describe how the document meets any required formal review criteria, such as the MIB Doctor, media type, and URI type reviews. (13) Have all references within this document been identified as either normative or informative? yes (14) Are there normative references to documents that are not ready for advancement or are otherwise in an unclear state? If such normative references exist, what is the plan for their completion? (15) Are there downward normative references references (see RFC 3967)? If so, list these downward references to support the Area Director in the Last Call procedure. (16) Will publication of this document change the status of any existing RFCs? Are those RFCs listed on the title page header, listed in the abstract, and discussed in the introduction? If the RFCs are not listed in the Abstract and Introduction, explain why, and point to the part of the document where the relationship of this document to the other RFCs is discussed. If this information is not in the document, explain why the WG considers it unnecessary. (17) Describe the Document Shepherd's review of the IANA considerations section, especially with regard to its consistency with the body of the document. Confirm that all protocol extensions that the document makes are associated with the appropriate reservations in IANA registries. Confirm that any referenced IANA registries have been clearly identified. Confirm that newly created IANA registries include a detailed specification of the initial contents for the registry, that allocations procedures for future registrations are defined, and a reasonable name for the new registry has been suggested (see RFC 5226). (18) List any new IANA registries that require Expert Review for future allocations. Provide any public guidance that the IESG would find useful in selecting the IANA Experts for these new registries. (19) Describe reviews and automated checks performed by the Document Shepherd to validate sections of the document written in a formal language, such as XML code, BNF rules, MIB definitions, etc. n/a |
2019-02-26
|
07 | Adrian Farrel | New version available: draft-ietf-bess-nsh-bgp-control-plane-07.txt |
2019-02-26
|
07 | (System) | New version approved |
2019-02-26
|
07 | (System) | Request for posting confirmation emailed to previous authors: Adrian Farrel , Luay Jalil , John Drake , Eric Rosen , Jim Uttaro , bess-chairs@ietf.org |
2019-02-26
|
07 | Adrian Farrel | Uploaded new revision |
2019-02-26
|
06 | Stephane Litkowski | Notification list changed to Stephane Litkowski <stephane.litkowski@orange.com> |
2019-02-26
|
06 | Stephane Litkowski | Document shepherd changed to Stephane Litkowski |
2019-02-26
|
06 | Stephane Litkowski | IETF WG state changed to WG Consensus: Waiting for Write-Up from WG Document |
2019-02-25
|
06 | Adrian Farrel | New version available: draft-ietf-bess-nsh-bgp-control-plane-06.txt |
2019-02-25
|
06 | (System) | New version approved |
2019-02-25
|
06 | (System) | Request for posting confirmation emailed to previous authors: Adrian Farrel , John Drake , Eric Rosen , Jim Uttaro , Luay Jalil |
2019-02-25
|
06 | Adrian Farrel | Uploaded new revision |
2019-01-12
|
05 | Adrian Farrel | New version available: draft-ietf-bess-nsh-bgp-control-plane-05.txt |
2019-01-12
|
05 | (System) | New version approved |
2019-01-12
|
05 | (System) | Request for posting confirmation emailed to previous authors: Luay Jalil , John Drake , Adrian Farrel , Eric Rosen , Jim Uttaro , bess-chairs@ietf.org |
2019-01-12
|
05 | Adrian Farrel | Uploaded new revision |
2019-01-02
|
04 | (System) | Document has expired |
2018-11-28
|
Jenny Bui | Posted related IPR disclosure: Huawei Technologies Co.,Ltd's Statement about IPR related to draft-ietf-bess-nsh-bgp-control-plane | |
2018-07-01
|
04 | Adrian Farrel | New version available: draft-ietf-bess-nsh-bgp-control-plane-04.txt |
2018-07-01
|
04 | (System) | New version approved |
2018-07-01
|
04 | (System) | Request for posting confirmation emailed to previous authors: John Drake , Adrian Farrel , Eric Rosen , Jim Uttaro , Luay Jalil |
2018-07-01
|
04 | Adrian Farrel | Uploaded new revision |
2018-03-18
|
03 | Adrian Farrel | New version available: draft-ietf-bess-nsh-bgp-control-plane-03.txt |
2018-03-18
|
03 | (System) | New version approved |
2018-03-18
|
03 | (System) | Request for posting confirmation emailed to previous authors: John Drake , Adrian Farrel , Eric Rosen , Jim Uttaro , Luay Jalil |
2018-03-18
|
03 | Adrian Farrel | Uploaded new revision |
2017-11-20
|
Jasmine Magallanes | Posted related IPR disclosure: Huawei Technologies Co.,Ltd's Statement about IPR related to draft-ietf-bess-nsh-bgp-control-plane | |
2017-10-30
|
02 | Adrian Farrel | New version available: draft-ietf-bess-nsh-bgp-control-plane-02.txt |
2017-10-30
|
02 | (System) | New version approved |
2017-10-30
|
02 | (System) | Request for posting confirmation emailed to previous authors: John Drake , Adrian Farrel , Eric Rosen , Jim Uttaro , Luay Jalil |
2017-10-30
|
02 | Adrian Farrel | Uploaded new revision |
2017-09-25
|
01 | Adrian Farrel | New version available: draft-ietf-bess-nsh-bgp-control-plane-01.txt |
2017-09-25
|
01 | (System) | New version approved |
2017-09-25
|
01 | (System) | Request for posting confirmation emailed to previous authors: John Drake , Adrian Farrel , Eric Rosen , Jim Uttaro , Luay Jalil |
2017-09-25
|
01 | Adrian Farrel | Uploaded new revision |
2017-06-12
|
Jasmine Magallanes | Posted related IPR disclosure: Huawei Technologies Co.,Ltd's Statement about IPR related to draft-ietf-bess-nsh-bgp-control-plane | |
2017-03-27
|
00 | Martin Vigoureux | This document now replaces draft-mackie-bess-nsh-bgp-control-plane instead of None |
2017-03-27
|
00 | Adrian Farrel | New version available: draft-ietf-bess-nsh-bgp-control-plane-00.txt |
2017-03-27
|
00 | (System) | WG -00 approved |
2017-03-27
|
00 | Adrian Farrel | Set submitter to "Adrian Farrel ", replaces to draft-mackie-bess-nsh-bgp-control-plane and sent approval email to group chairs: bess-chairs@ietf.org |
2017-03-27
|
00 | Adrian Farrel | Uploaded new revision |