Skip to main content

Multi-Threaded Routing Toolkit (MRT) Routing Information Export Format
draft-ietf-grow-mrt-17

Revision differences

Document history

Date Rev. By Action
2012-08-22
17 (System) post-migration administrative database adjustment to the No Objection position for Sean Turner
2012-08-22
17 (System) post-migration administrative database adjustment to the No Objection position for Tim Polk
2012-08-22
17 (System) post-migration administrative database adjustment to the No Objection position for Dan Romascanu
2011-09-07
17 (System) IANA Action state changed to RFC-Ed-Ack from Waiting on RFC Editor
2011-09-07
17 (System) IANA Action state changed to Waiting on RFC Editor from In Progress
2011-09-07
17 (System) IANA Action state changed to In Progress from Waiting on Authors
2011-09-02
17 (System) IANA Action state changed to Waiting on Authors from In Progress
2011-08-23
17 (System) IANA Action state changed to In Progress
2011-08-23
17 Cindy Morgan State changed to RFC Ed Queue from Approved-announcement sent.
2011-08-23
17 Cindy Morgan IESG state changed to Approved-announcement sent
2011-08-23
17 Cindy Morgan IESG has approved the document
2011-08-23
17 Cindy Morgan Closed "Approve" ballot
2011-08-23
17 Cindy Morgan Approval announcement text regenerated
2011-08-23
17 Cindy Morgan Ballot writeup text changed
2011-08-22
17 Ron Bonica State changed to Approved-announcement to be sent from IESG Evaluation::AD Followup.
2011-08-22
17 Ron Bonica Approval announcement text changed
2011-08-22
17 Ron Bonica Approval announcement text regenerated
2011-08-17
17 (System) New version available: draft-ietf-grow-mrt-17.txt
2011-08-17
16 (System) New version available: draft-ietf-grow-mrt-16.txt
2011-07-07
17 Sean Turner [Ballot Position Update] Position for Sean Turner has been changed to No Objection from Discuss
2011-07-06
17 (System) Sub state has been changed to AD Follow up from New Id Needed
2011-07-06
15 (System) New version available: draft-ietf-grow-mrt-15.txt
2011-05-13
17 Sean Turner
[Ballot discuss]
This is a revised discuss based on -14.

1) addressed in -14

2) addressed in -14

3) addressed in -14

4) addressed in …
[Ballot discuss]
This is a revised discuss based on -14.

1) addressed in -14

2) addressed in -14

3) addressed in -14

4) addressed in -14

5) The Security Considerations section explore the ramifications of protecting the transport of data in this format (and perhaps even the timing of its availability) to avoid informing an eavesdropper that wishes to mount an attack on one of the protocols being reported on. Pointing to the potential attacks in the security considerations sections of the protocol documents would help.
2011-04-26
17 Dan Romascanu [Ballot Position Update] Position for Dan Romascanu has been changed to No Objection from Discuss
2011-04-21
17 Sean Turner
[Ballot discuss]
This is revised to adopt Tim's discuss position.

1) addressed in -14

2) addressed in -14

3) addressed in -14

4) addressed in …
[Ballot discuss]
This is revised to adopt Tim's discuss position.

1) addressed in -14

2) addressed in -14

3) addressed in -14

4) addressed in -14


still working through the rest

5) The Security Considerations section explore the ramifications of protecting the transport of data in this format (and perhaps even the timing of its availability) to avoid informing an eavesdropper that wishes to mount an attack on one of the protocols being reported on. Pointing to the potential attacks in the security considerations sections of the protocol documents would help.

This is from Tim's discuss:

This is a revised discuss.  I am adding a discuss position for IANA, whose
questions have not been answered.

Original discuss text:

In most cases, redundant types have been deprecated.  However, both TABLE_DUMP
and TABLE_DUMP_V2
were included as currently supported types.  Isn't V2 a
superset of the old TABLE_DUMP type?  Is there a
reason both need to be
supported?  At a minimum, I think the document could be clearer regarding when
each of
these types SHOULD be used.  (TABLE_DUMP_V2 MUST be used if there are 4
byte ASN values... is there
a SHOULD when we don't have 4 byte ASN values?)
2011-04-21
17 Sean Turner
[Ballot discuss]
This is revised to adopt Tim's discuss position.

1) addressed in -14

2) addressed in -14

3) addressed in -14

still working through …
[Ballot discuss]
This is revised to adopt Tim's discuss position.

1) addressed in -14

2) addressed in -14

3) addressed in -14

still working through the rest

4) As noted in the Richard Barnes' SECDIR review (http://www.ietf.org/mail-archive/web/secdir/current/msg02007.html), some of the information in an MRT object could be considered private, especially given that MRT is commonly used to publish router dumps (e.g., through RouteViews [1]).  For example, BGP neighbors that advertise paths to their peers might not expect these paths to be published in an MRT dump.  There is also a proposed extension to MRT that would add geolocation information about the router and its peers [2].  I would suggest that the document add a brief note that some information contained in MRT dumps might be considered private.  Suggested text based on the above:
"
Some information contained in an MRT data structure might be considered sensitive or private.  For example, a BGP peer that sends a message to an MRT-enabled router might not expect that message to be shared beyond the AS to which it is sent.  The proposed geolocation extension to MRT could reveal the location of an MRT router's peers [I-D.ietf-grow-geomrt].  An organization that intends to use the MRT structure to export routing information beyond the domain where it normally accessible (e.g., publishing MRT dumps for use by researchers) should verify with any peers whose information might be included, and possibly remove sensitive fields.
"

5) The Security Considerations section explore the ramifications of protecting the transport of data in this format (and perhaps even the timing of its availability) to avoid informing an eavesdropper that wishes to mount an attack on one of the protocols being reported on. Pointing to the potential attacks in the security considerations sections of the protocol documents would help.

This is from Tim's discuss:

This is a revised discuss.  I am adding a discuss position for IANA, whose
questions have not been answered.

Original discuss text:

In most cases, redundant types have been deprecated.  However, both TABLE_DUMP
and TABLE_DUMP_V2
were included as currently supported types.  Isn't V2 a
superset of the old TABLE_DUMP type?  Is there a
reason both need to be
supported?  At a minimum, I think the document could be clearer regarding when
each of
these types SHOULD be used.  (TABLE_DUMP_V2 MUST be used if there are 4
byte ASN values... is there
a SHOULD when we don't have 4 byte ASN values?)
2011-04-20
14 (System) New version available: draft-ietf-grow-mrt-14.txt
2011-03-26
17 Tim Polk [Ballot Position Update] Position for Tim Polk has been changed to No Objection from Discuss
2011-03-26
17 Sean Turner
[Ballot comment]
This is updated also.

1) Sec 2.4.1: Expand: FSM.

2) Sec 5.1: Isn't it "OSPFv2 Protocol"?  No need to change the type name …
[Ballot comment]
This is updated also.

1) Sec 2.4.1: Expand: FSM.

2) Sec 5.1: Isn't it "OSPFv2 Protocol"?  No need to change the type name but (I think) the text referencing 2328 should say OSPFv2.

3) Sec 5.2, para after Figure 3: Should the "may"s and "should" be upper case?

4) Sec 5.2, penultimate paragraph: must or MUST?

5) Sec 5.3: Expand: ASN, NLRI, AS.

6) Sec 5.3, 2nd para: Please reword so that 2119 requirement is not in a "Note".

7) Sec 5.3, 3rd para: r/optional/OPTIONAL

This is from Tim's comment:

Some editorial issues:

Section 4 begins with "The MRT format defines five Informational Type messages."
but only lists two types.  After
a little sleuthing I discovered the other three
types are deprecated.  Perhaps that is worth mentioning in section 4.

In Annex A, some deprecated types (e.g., RPING in section A.2.4) include
information about the format.  In other
cases (e.g., IDRP in A.2.3), this was
omitted.  Is there a reason for the inconsistency?  (Mostly just curious...)
2011-03-26
17 Sean Turner
[Ballot discuss]
This is revised to adopt Tim's discuss position.

1) Sec 4 (If the Apps ADs have already said this): Need a normative reference …
[Ballot discuss]
This is revised to adopt Tim's discuss position.

1) Sec 4 (If the Apps ADs have already said this): Need a normative reference to UTF-8.

2) Sec 5.2: Need a normative reference to IPv4 and IPv6 for their address formats.

3) Sec 5.5: Is there some format for this field?

4) As noted in the Richard Barnes' SECDIR review (http://www.ietf.org/mail-archive/web/secdir/current/msg02007.html), some of the information in an MRT object could be considered private, especially given that MRT is commonly used to publish router dumps (e.g., through RouteViews [1]).  For example, BGP neighbors that advertise paths to their peers might not expect these paths to be published in an MRT dump.  There is also a proposed extension to MRT that would add geolocation information about the router and its peers [2].  I would suggest that the document add a brief note that some information contained in MRT dumps might be considered private.  Suggested text based on the above:
"
Some information contained in an MRT data structure might be considered sensitive or private.  For example, a BGP peer that sends a message to an MRT-enabled router might not expect that message to be shared beyond the AS to which it is sent.  The proposed geolocation extension to MRT could reveal the location of an MRT router's peers [I-D.ietf-grow-geomrt].  An organization that intends to use the MRT structure to export routing information beyond the domain where it normally accessible (e.g., publishing MRT dumps for use by researchers) should verify with any peers whose information might be included, and possibly remove sensitive fields.
"

5) The Security Considerations section explore the ramifications of protecting the transport of data in this format (and perhaps even the timing of its availability) to avoid informing an eavesdropper that wishes to mount an attack on one of the protocols being reported on. Pointing to the potential attacks in the security considerations sections of the protocol documents would help.

This is from Tim's discuss:

This is a revised discuss.  I am adding a discuss position for IANA, whose
questions have not been answered.

Original discuss text:

In most cases, redundant types have been deprecated.  However, both TABLE_DUMP
and TABLE_DUMP_V2
were included as currently supported types.  Isn't V2 a
superset of the old TABLE_DUMP type?  Is there a
reason both need to be
supported?  At a minimum, I think the document could be clearer regarding when
each of
these types SHOULD be used.  (TABLE_DUMP_V2 MUST be used if there are 4
byte ASN values... is there
a SHOULD when we don't have 4 byte ASN values?)
2010-10-08
17 (System) Removed from agenda for telechat - 2010-10-07
2010-10-07
17 Cindy Morgan State changed to IESG Evaluation::Revised ID Needed from IESG Evaluation by Cindy Morgan
2010-10-07
17 Tim Polk
[Ballot discuss]
This is a revised discuss.  I am adding a discuss position for IANA, whose questions have not been answered.

Original discuss text:

In …
[Ballot discuss]
This is a revised discuss.  I am adding a discuss position for IANA, whose questions have not been answered.

Original discuss text:

In most cases, redundant types have been deprecated.  However, both TABLE_DUMP and TABLE_DUMP_V2
were included as currently supported types.  Isn't V2 a superset of the old TABLE_DUMP type?  Is there a
reason both need to be supported?  At a minimum, I think the document could be clearer regarding when each of
these types SHOULD be used.  (TABLE_DUMP_V2 MUST be used if there are 4 byte ASN values... is there
a SHOULD when we don't have 4 byte ASN values?)
2010-10-07
17 Tim Polk
[Ballot comment]
Some editorial issues:

Section 4 begins with "The MRT format defines five Informational Type messages." but only lists two types.  After
a little …
[Ballot comment]
Some editorial issues:

Section 4 begins with "The MRT format defines five Informational Type messages." but only lists two types.  After
a little sleuthing I discovered the other three types are deprecated.  Perhaps that is worth mentioning in section 4.

In Annex A, some deprecated types (e.g., RPING in section A.2.4) include information about the format.  In other
cases (e.g., IDRP in A.2.3), this was omitted.  Is there a reason for the inconsistency?  (Mostly just curious...)
2010-10-07
17 Tim Polk
[Ballot discuss]
In most cases, redundant types have been deprecated.  However, both TABLE_DUMP and TABLE_DUMP_V2
were included as currently supported types.  Isn't V2 a superset …
[Ballot discuss]
In most cases, redundant types have been deprecated.  However, both TABLE_DUMP and TABLE_DUMP_V2
were included as currently supported types.  Isn't V2 a superset of the old TABLE_DUMP type?  Is there a
reason both need to be supported?  At a minimum, I think the document could be clearer regarding when each of
these types SHOULD be used.  (TABLE_DUMP_V2 MUST be used if there are 4 byte ASN values... is there
a SHOULD when we don't have 4 byte ASN values?)
2010-10-07
17 Tim Polk [Ballot Position Update] New position, Discuss, has been recorded by Tim Polk
2010-10-07
17 Amy Vezza State changed to IESG Evaluation from Waiting for AD Go-Ahead by Amy Vezza
2010-10-06
17 Sean Turner
[Ballot discuss]
This is an updated DISCUSS that picks up Robert's comment (#5 is new the others are unchanged).

1) Sec 4 (If the Apps …
[Ballot discuss]
This is an updated DISCUSS that picks up Robert's comment (#5 is new the others are unchanged).

1) Sec 4 (If the Apps ADs have already said this): Need a normative reference to UTF-8.

2) Sec 5.2: Need a normative reference to IPv4 and IPv6 for their address formats.

3) Sec 5.5: Is there some format for this field?

4) As noted in the Richard Barnes' SECDIR review (http://www.ietf.org/mail-archive/web/secdir/current/msg02007.html), some of the information in an MRT object could be considered private, especially given that MRT is commonly used to publish router dumps (e.g., through RouteViews [1]).  For example, BGP neighbors that advertise paths to their peers might not expect these paths to be published in an MRT dump.  There is also a proposed extension to MRT that would add geolocation information about the router and its peers [2].  I would suggest that the document add a brief note that some information contained in MRT dumps might be considered private.  Suggested text based on the above:
"
Some information contained in an MRT data structure might be considered sensitive or private.  For example, a BGP peer that sends a message to an MRT-enabled router might not expect that message to be shared beyond the AS to which it is sent.  The proposed geolocation extension to MRT could reveal the location of an MRT router's peers [I-D.ietf-grow-geomrt].  An organization that intends to use the MRT structure to export routing information beyond the domain where it normally accessible (e.g., publishing MRT dumps for use by researchers) should verify with any peers whose information might be included, and possibly remove sensitive fields.
"

5) The Security Considerations section explore the ramifications of protecting the transport of data in this format (and perhaps even the timing of its availability) to avoid informing an eavesdropper that wishes to mount an attack on one of the protocols being reported on. Pointing to the potential attacks in the security considerations sections of the protocol documents would help.
2010-10-06
17 Sean Turner
[Ballot discuss]
This is an updated DISCUSS that picks up Robert's comment (add a #5).

1) Sec 4 (If the Apps ADs have already said …
[Ballot discuss]
This is an updated DISCUSS that picks up Robert's comment (add a #5).

1) Sec 4 (If the Apps ADs have already said this): Need a normative reference to UTF-8.

2) Sec 5.2: Need a normative reference to IPv4 and IPv6 for their address formats.

3) Sec 5.5: Is there some format for this field?

4) As noted in the Richard Barnes' SECDIR review (http://www.ietf.org/mail-archive/web/secdir/current/msg02007.html), some of the information in an MRT object could be considered private, especially given that MRT is commonly used to publish router dumps (e.g., through RouteViews [1]).  For example, BGP neighbors that advertise paths to their peers might not expect these paths to be published in an MRT dump.  There is also a proposed extension to MRT that would add geolocation information about the router and its peers [2].  I would suggest that the document add a brief note that some information contained in MRT dumps might be considered private.  Suggested text based on the above:
"
Some information contained in an MRT data structure might be considered sensitive or private.  For example, a BGP peer that sends a message to an MRT-enabled router might not expect that message to be shared beyond the AS to which it is sent.  The proposed geolocation extension to MRT could reveal the location of an MRT router's peers [I-D.ietf-grow-geomrt].  An organization that intends to use the MRT structure to export routing information beyond the domain where it normally accessible (e.g., publishing MRT dumps for use by researchers) should verify with any peers whose information might be included, and possibly remove sensitive fields.
"

5) The Security Considerations section explore the ramifications of protecting the transport of data in this format (and perhaps even the timing of its availability) to avoid informing an eavesdropper that wishes to mount an attack on one of the protocols being reported on. Pointing to the potential attacks in the security considerations sections of the protocol documents would help.
2010-10-06
17 Jari Arkko [Ballot Position Update] New position, No Objection, has been recorded by Jari Arkko
2010-10-06
17 Robert Sparks
[Ballot comment]
Support Sean's point 4 (re: privacy considerations). I also suggest the Security Considerations section explore the ramifications of protecting the transport of data …
[Ballot comment]
Support Sean's point 4 (re: privacy considerations). I also suggest the Security Considerations section explore the ramifications of protecting the transport of data in this format (and perhaps even the timing of its availability) to avoid informing an eavesdropper that wishes to mount an attack on one of the protocols being reported on. Pointing to the potential attacks in the security considerations sections of the protocol documents would help.
2010-10-06
17 Robert Sparks [Ballot Position Update] New position, No Objection, has been recorded by Robert Sparks
2010-10-06
17 Dan Romascanu
[Ballot discuss]
The DISCUSS and COMMENT is based upon the OPS-DIR review performed by Lionel Morand. I would like to have them answered before I …
[Ballot discuss]
The DISCUSS and COMMENT is based upon the OPS-DIR review performed by Lionel Morand. I would like to have them answered before I can approve this document.

1. The requested status is "Standard Track" and the wording in the introduction seems not to be appropriate, more relevant for an Informational RFC.

  "This memo serves to document the MRT format as currently implemented
  in publicly available software."

If Standard Track is the right intended status (I believe it is) the language in the introduction should reflect that the document defines a protocol extension for standards track, not just documents existing implementations.

Moreover the original format is extended. Should we have rather something like: "this memo standardize the MRT format as it shall be used..."?

2. The introduction mentions that some type values are deprecated and are given in Appendix for information. But, after that, section by section describing the types and in the IANA section, there is nothing about the deprecated values. Should we mark theses values are reserved? Whatever the decision, something should indicated each time it is required.
2010-10-06
17 Dan Romascanu [Ballot Position Update] New position, Discuss, has been recorded by Dan Romascanu
2010-10-06
17 Stewart Bryant
[Ballot comment]
"All MRT format messages have a common header which includes a
timestamp, Type, Subtype, and length field.  The header is followed
by a …
[Ballot comment]
"All MRT format messages have a common header which includes a
timestamp, Type, Subtype, and length field.  The header is followed
by a message field.  The MRT common header is illustrated below."

s/includes/consists of/

since includes implies it has other information, or the scope for other information in the future.

also the what you illustrate is the MRT format, not just the common header.

=============

It would have been clearer to have described the microsecond extended common header in it's own right and then call it up in each of the *_ET cases, rather than to have described the IGP _ET modes in terms of the BGP _ET mode.
2010-10-06
17 Stewart Bryant [Ballot Position Update] New position, No Objection, has been recorded by Stewart Bryant
2010-10-06
17 Gonzalo Camarillo [Ballot comment]
The rule is that acronyms need to be expanded on their first use in the title, abstract, and body of the document.
2010-10-06
17 Gonzalo Camarillo [Ballot Position Update] New position, No Objection, has been recorded by Gonzalo Camarillo
2010-10-05
17 Peter Saint-Andre [Ballot comment]
As Sean Turner noted, please add a normative reference to RFC 3629 for UTF-8 (in Sections 4 and 5.3).
2010-10-05
17 Peter Saint-Andre [Ballot Position Update] New position, No Objection, has been recorded by Peter Saint-Andre
2010-10-05
17 Adrian Farrel
[Ballot comment]
Just a couple of small things to consider...

---

A couple of places say things like:
  A number of MRT message types …
[Ballot comment]
Just a couple of small things to consider...

---

A couple of places say things like:
  A number of MRT message types have been documented in some references
It would be nice to state the references (informational).

---

Section 5.1
Should Remote IP address and Local IP address fields be explained?
2010-10-05
17 Adrian Farrel [Ballot Position Update] New position, No Objection, has been recorded by Adrian Farrel
2010-10-05
17 Sean Turner
[Ballot comment]
1) Sec 2.4.1: Expand: FSM.

2) Sec 5.1: Isn't it "OSPFv2 Protocol"?  No need to change the type name but (I think) the …
[Ballot comment]
1) Sec 2.4.1: Expand: FSM.

2) Sec 5.1: Isn't it "OSPFv2 Protocol"?  No need to change the type name but (I think) the text referencing 2328 should say OSPFv2.

3) Sec 5.2, para after Figure 3: Should the "may"s and "should" be upper case?

4) Sec 5.2, penultimate paragraph: must or MUST?

5) Sec 5.3: Expand: ASN, NLRI, AS.

6) Sec 5.3, 2nd para: Please reword so that 2119 requirement is not in a "Note".

7) Sec 5.3, 3rd para: r/optional/OPTIONAL
2010-10-05
17 Sean Turner
[Ballot discuss]
1) Sec 4 (If the Apps ADs have already said this): Need a normative reference to UTF-8.

2) Sec 5.2: Need a normative …
[Ballot discuss]
1) Sec 4 (If the Apps ADs have already said this): Need a normative reference to UTF-8.

2) Sec 5.2: Need a normative reference to IPv4 and IPv6 for their address formats.

3) Sec 5.5: Is there some format for this field?

4) As noted in the Richard Barnes' SECDIR review (http://www.ietf.org/mail-archive/web/secdir/current/msg02007.html), some of the information in an MRT object could be considered private, especially given that MRT is commonly used to publish router dumps (e.g., through RouteViews [1]).  For example, BGP neighbors that advertise paths to their peers might not expect these paths to be published in an MRT dump.  There is also a proposed extension to MRT that would add geolocation information about the router and its peers [2].  I would suggest that the document add a brief note that some information contained in MRT dumps might be considered private.  Suggested text based on the above:
"
Some information contained in an MRT data structure might be considered sensitive or private.  For example, a BGP peer that sends a message to an MRT-enabled router might not expect that message to be shared beyond the AS to which it is sent.  The proposed geolocation extension to MRT could reveal the location of an MRT router's peers [I-D.ietf-grow-geomrt].  An organization that intends to use the MRT structure to export routing information beyond the domain where it normally accessible (e.g., publishing MRT dumps for use by researchers) should verify with any peers whose information might be included, and possibly remove sensitive fields.
"
2010-10-05
17 Sean Turner [Ballot Position Update] New position, Discuss, has been recorded by Sean Turner
2010-10-05
17 Ralph Droms [Ballot Position Update] New position, No Objection, has been recorded by Ralph Droms
2010-10-04
17 Lars Eggert [Ballot Position Update] New position, No Objection, has been recorded by Lars Eggert
2010-10-01
17 Russ Housley [Ballot Position Update] New position, No Objection, has been recorded by Russ Housley
2010-09-28
17 Ron Bonica Placed on agenda for telechat - 2010-10-07 by Ron Bonica
2010-09-28
17 Ron Bonica [Ballot Position Update] New position, Yes, has been recorded for Ronald Bonica
2010-09-28
17 Ron Bonica Ballot has been issued by Ron Bonica
2010-09-28
17 Ron Bonica Created "Approve" ballot
2010-09-24
17 Cindy Morgan State changed to Waiting for AD Go-Ahead from In Last Call by Cindy Morgan
2010-09-16
17 Amanda Baber
IANA has questions about this document.

IANA understands that a new registry is to be created for MRT upon
approval of this document.

The new …
IANA has questions about this document.

IANA understands that a new registry is to be created for MRT upon
approval of this document.

The new registry will consist of MRT Type Codes and, in some cases,
subcodes for those Type Codes.

For the new registry of Type Codes, IANA understands that the range of
registrations will be the integers 0 through 65535.

0 Reserved
1-64 Allocated (see below)
65 - 511 Available (Assigned by IETF Review)
512 - 2047 Available (Assigned by Specification)
2048 - 64511 Available (Assigned First Come, First Served)
64512 - 65534 Available (Experimental Use)
65535 Reserved

IANA QUESTION: Values 1 through 64 are marked allocated in section 7.1
of the document. However, section 5 only accounts for nine of those
values. IANA notes that other MRT Type Codes are documented in the
Appendix. Should those be added to the registry but marked deprecated?
If not, what should IANA register in the values not covered in this list:

11 OSPF
12 TABLE_DUMP
13 TABLE_DUMP_V2
16 BGP4MP
17 BGP4MP_ET
32 ISIS
33 ISIS_ET
48 OSPFv3
49 OSPFv3_ET

IANA Question: For each of the MRT Type Codes what information should be
registered? The tuple  or something else?

Several of the MRT Type Codes has Subtypes. IANA understands that these
should be registered under the associated MRT Type Code.

Subtype codes are always in the range 0 to 65535. Unless specified
otherwise, Subtype assignmnents to Type Codes 0 - 511 are to be assigned
by IETF Review. Subtype assignments for the remaning Type Codes follow
the assignment rules for the Type Codes to which they belong.

Upon approval of this document, IANA understands the following MRT
Subtype Codes will be defined.

MRT Type Code 11 (ISPF)
0 OSPF_STATE_CHANGE [RFC-to-be]
1 OSPF_LSA_UPDATE [RFC-to-be]
2 - 65535 Unassigned

MRT Type Code 12 (TABLE_DUMP)
0 Unassigned
1 AFI_IPv4 [RFC-to-be]
2 AFI_IPv6 [RFC-to-be]
3 - 65535 Unassigned

MRT Type Code 13 (TABLE_DUMP_V2)
1 PEER_INDEX_TABLE [RFC-to-be]
2 RIB_IPV4_UNICAST [RFC-to-be]
3 RIB_IPV4_MULTICAST [RFC-to-be]
4 RIB_IPV6_UNICAST [RFC-to-be]
5 RIB_IPV6_MULTICAST [RFC-to-be]
6 RIB_GENERIC [RFC-to-be]
7 - 65535 Unassigned

MRT Type Code 16 (BGP4MP)
0 BGP4MP_STATE_CHANGE [RFC-to-be]
1 BGP4MP_MESSAGE [RFC-to-be]
2 Unassigned
3 Unassigned
4 BGP4MP_MESSAGE_AS4 [RFC-to-be]
5 BGP4MP_STATE_CHANGE_AS4 [RFC-to-be]
6 BGP4MP_MESSAGE_LOCAL [RFC-to-be]
7 BGP4MP_MESSAGE_AS4_LOCAL [RFC-to-be]
8 - 65535 Unassigned

IANA QUESTION: Should the state values and the AFI types for these
subtypes be registered?

MRT Type Code 17 (BGP4MP_ET)
0 BGP4MP_STATE_CHANGE [RFC-to-be]
1 BGP4MP_MESSAGE [RFC-to-be]
2 Unassigned
3 Unassigned
4 BGP4MP_MESSAGE_AS4 [RFC-to-be]
5 BGP4MP_STATE_CHANGE_AS4 [RFC-to-be]
6 BGP4MP_MESSAGE_LOCAL [RFC-to-be]
7 BGP4MP_MESSAGE_AS4_LOCAL [RFC-to-be]
8 - 65535 Unassigned

IANA QUESTION: As with MRT Type Code 16, should the state values and the
AFI types for these subtypes be registered?

IANA understands that these tasks represent all the actions required
upon approval of the document.
2010-09-15
17 Samuel Weiler Request for Last Call review by SECDIR Completed. Reviewer: Richard Barnes.
2010-09-11
17 Samuel Weiler Request for Last Call review by SECDIR is assigned to Richard Barnes
2010-09-11
17 Samuel Weiler Request for Last Call review by SECDIR is assigned to Richard Barnes
2010-09-10
17 Amy Vezza Last call sent
2010-09-10
17 Amy Vezza State changed to In Last Call from Last Call Requested by Amy Vezza
2010-09-09
17 Ron Bonica Last Call was requested by Ron Bonica
2010-09-09
17 Ron Bonica State Changes to Last Call Requested from AD Evaluation::AD Followup by Ron Bonica
2010-09-09
17 (System) Ballot writeup text was added
2010-09-09
17 (System) Last call text was added
2010-09-09
17 (System) Ballot approval text was added
2010-09-09
13 (System) New version available: draft-ietf-grow-mrt-13.txt
2010-09-09
17 (System) Sub state has been changed to AD Follow up from New Id Needed
2010-09-09
12 (System) New version available: draft-ietf-grow-mrt-12.txt
2010-08-03
17 Ron Bonica State Changes to AD Evaluation::Revised ID Needed from Waiting for Writeup::Revised ID Needed by Ron Bonica
2010-08-03
17 Ron Bonica State Changes to Waiting for Writeup::Revised ID Needed from Publication Requested by Ron Bonica
2010-08-03
17 Amy Vezza
(1.a)  Who is the Document Shepherd for this document?  Has the
          Document Shepherd personally reviewed this version of the
  …
(1.a)  Who is the Document Shepherd for this document?  Has the
          Document Shepherd personally reviewed this version of the
          document and, in particular, does he or she believe this
          version is ready for forwarding to the IESG for publication?

Peter Schoenmaker, co-chair of the GROW Working Group. 
I have reviewed this document, and i believe the document is ready for
publication.


  (1.b)  Has the document had adequate review both from key WG members
          and from key non-WG members?  Does the Document Shepherd have
          any concerns about the depth or breadth of the reviews that
          have been performed?

This document has been extensively reviewed both inside the working group
and outside.  There have been a number of existing implementations of MRT
along with new ones writen based on the specification in the document.  A
large number of people have reviewed this document and provided input which
was incorporated in updated revisions.

  (1.c)  Does the Document Shepherd have concerns that the document
          needs more review from a particular or broader perspective,
          e.g., security, operational complexity, someone familiar with
          AAA, internationalization, or XML?

Extensive review has been preformed.  No further review is needed.

  (1.d)  Does the Document Shepherd have any specific concerns or
          issues with this document that the Responsible Area Director
          and/or the IESG should be aware of?  For example, perhaps he
          or she is uncomfortable with certain parts of the document, or
          has concerns whether there really is a need for it.  In any
          event, if the WG has discussed those issues and has indicated
          that it still wishes to advance the document, detail those
          concerns here.  Has an IPR disclosure related to this document
          been filed?  If so, please include a reference to the
          disclosure and summarize the WG discussion and conclusion on
          this issue.

I have no concerns related to this document.

  (1.e)  How solid is the WG consensus behind this document?  Does it
          represent the strong concurrence of a few individuals, with
          others being silent, or does the WG as a whole understand and
          agree with it?

There is large scale consensus of this document.  No major objections.

  (1.f)  Has anyone threatened an appeal or otherwise indicated extreme
          discontent?  If so, please summarize the areas of conflict in
          separate email messages to the Responsible Area Director.  (It
          should be in a separate email because this questionnaire is
          entered into the ID Tracker.)

No discontent has been expressed on any portion of this document.

  (1.g)  Has the Document Shepherd personally verified that the
          document satisfies all ID nits?  (See
          http://www.ietf.org/ID-Checklist.html and
          http://tools.ietf.org/tools/idnits/.)  Boilerplate checks are
          not enough; this check needs to be thorough.  Has the document
          met all formal review criteria it needs to, such as the MIB
          Doctor, media type, and URI type reviews?  If the document
          does not already indicate its intended status at the top of
          the first page, please indicate the intended status here.

There are no nits in this document.

  (1.h)  Has the document split its references into normative and
          informative?  Are there normative references to documents that
          are not ready for advancement or are otherwise in an unclear
          state?  If such normative references exist, what is the
          strategy for their completion?  Are there normative references
          that are downward references, as described in [RFC3967]?  If
          so, list these downward references to support the Area
          Director in the Last Call procedure for them [RFC3967].

This document has been split properly into normative and informative
references.

  (1.i)  Has the Document Shepherd verified that the document's IANA
          Considerations section exists and is consistent with the body
          of the document?  If the document specifies protocol
          extensions, are reservations requested in appropriate IANA
          registries?  Are the IANA registries clearly identified?  If
          the document creates a new registry, does it define the
          proposed initial contents of the registry and an allocation
          procedure for future registrations?  Does it suggest a
          reasonable name for the new registry?  See [RFC2434].  If the
          document describes an Expert Review process, has the Document
          Shepherd conferred with the Responsible Area Director so that
          the IESG can appoint the needed Expert during IESG Evaluation?

The document will require new IANA regiesteries.  There are two new
registries required, a Type Codes registry and a subtype codes registry.

  (1.j)  Has the Document Shepherd verified that sections of the
          document that are written in a formal language, such as XML
          code, BNF rules, MIB definitions, etc., validate correctly in
          an automated checker?

There are no formal languages used in this document.

  (1.k)  The IESG approval announcement includes a Document
          Announcement Write-Up.  Please provide such a Document
          Announcement Write-Up.  Recent examples can be found in the
          "Action" announcements for approved documents.  The approval
          announcement contains the following sections:

          Technical Summary
    This document describes the MRT format for routing information
    export.  This format was developed in concert with the
            Multi-threaded Routing Toolkit (MRT) from whence the format
            takes it name.  The format can be used to export routing
            protocol messages, state changes, and routing information base
            contents.

          Working Group Summary
    The working group spent a significant amount of time looking
            at and reviewing this document.  Updates where made based on
            working group review, and requests for clarification.  There
            was consensus from the working group at last call.

          Document Quality
    Several existing implements exist for this document.  A new
            implementation was written during the review process of the
            draft.  Specificly Geoff Huston, attempted to write code
            based on the draft, and drove some clarifications, and issues
            based on his work.  The industry currently uses the protocol
            for export of the routing information.  In addition different
            users are using the exported data as input for specific
            applications.

          Personnel
            The document has been reviewed by Peter Schoenmaker (WG
            co-chair.)  Ron Bonica and Dan Romascanu are the ops area
            directors.
2010-08-03
17 Amy Vezza Draft Added by Amy Vezza in state Publication Requested
2010-08-03
17 Amy Vezza [Note]: 'Peter Schoenmaker (pds@lugs.com), co-chair of the GROW Working Group is the document shepherd.' added by Amy Vezza
2010-03-08
11 (System) New version available: draft-ietf-grow-mrt-11.txt
2010-01-14
17 (System) Document has expired
2009-07-13
10 (System) New version available: draft-ietf-grow-mrt-10.txt
2009-02-25
09 (System) New version available: draft-ietf-grow-mrt-09.txt
2008-07-14
08 (System) New version available: draft-ietf-grow-mrt-08.txt
2008-02-25
07 (System) New version available: draft-ietf-grow-mrt-07.txt
2007-11-19
06 (System) New version available: draft-ietf-grow-mrt-06.txt
2007-11-16
05 (System) New version available: draft-ietf-grow-mrt-05.txt
2007-03-08
04 (System) New version available: draft-ietf-grow-mrt-04.txt
2006-06-29
03 (System) New version available: draft-ietf-grow-mrt-03.txt
2006-03-16
02 (System) New version available: draft-ietf-grow-mrt-02.txt
2005-10-26
01 (System) New version available: draft-ietf-grow-mrt-01.txt
2005-07-06
00 (System) New version available: draft-ietf-grow-mrt-00.txt