Skip to main content

Internet Exchange BGP Route Server
draft-ietf-idr-ix-bgp-route-server-12

Revision differences

Document history

Date Rev. By Action
2016-08-15
12 (System) RFC Editor state changed to AUTH48-DONE from AUTH48
2016-08-04
12 (System) RFC Editor state changed to AUTH48 from RFC-EDITOR
2016-07-16
12 (System) RFC Editor state changed to RFC-EDITOR from EDIT
2016-07-12
12 Amy Vezza IESG state changed to RFC Ed Queue from Approved-announcement sent
2016-07-11
12 (System) RFC Editor state changed to EDIT
2016-07-11
12 (System) Announcement was received by RFC Editor
2016-07-08
12 (System) IANA Action state changed to No IC from In Progress
2016-07-08
12 (System) IANA Action state changed to In Progress
2016-07-08
12 Amy Vezza IESG state changed to Approved-announcement sent from Approved-announcement to be sent
2016-07-08
12 Amy Vezza IESG has approved the document
2016-07-08
12 Amy Vezza Closed "Approve" ballot
2016-07-08
12 Amy Vezza Ballot approval text was generated
2016-07-08
12 Alvaro Retana IESG state changed to Approved-announcement to be sent from Approved-announcement to be sent::AD Followup
2016-06-30
12 (System) Sub state has been changed to AD Followup from Revised ID Needed
2016-06-30
12 Nick Hilliard IANA Review state changed to Version Changed - Review Needed from IANA OK - No Actions Needed
2016-06-30
12 Nick Hilliard New version available: draft-ietf-idr-ix-bgp-route-server-12.txt
2016-06-20
11 Gunter Van de Velde Request for Last Call review by OPSDIR Completed: Has Issues. Reviewer: Warren Kumari.
2016-06-16
11 Cindy Morgan IESG state changed to Approved-announcement to be sent::Revised I-D Needed from IESG Evaluation
2016-06-15
11 Amanda Baber IANA Review state changed to IANA OK - No Actions Needed from Version Changed - Review Needed
2016-06-15
11 Stephen Farrell [Ballot Position Update] New position, No Objection, has been recorded for Stephen Farrell
2016-06-15
11 Jari Arkko [Ballot Position Update] New position, No Objection, has been recorded for Jari Arkko
2016-06-15
11 Deborah Brungard [Ballot Position Update] New position, No Objection, has been recorded for Deborah Brungard
2016-06-15
11 Benoît Claise
[Ballot comment]
From an operational point of view, when an ISP wants to go change from bilateral interconnections to the multilateral interconnection within one IXP, …
[Ballot comment]
From an operational point of view, when an ISP wants to go change from bilateral interconnections to the multilateral interconnection within one IXP, is this correct to say that all bilateral interconnections should be removed?
So that basically the ISP must chose between the two models, and not combined them? If this is the case, it should be mentioned.
I thought it was clear to me until I saw figure 1: The dotted line is the IXP or the IXP Route Server?
At first glance, I thought that it was the IXP and that AS1 was connected to the IXP Route Server while still having a bilateral connection with AS4.
I hope now that the dotted line is the IXP Route Server, otherwise I've confused.
2016-06-15
11 Benoît Claise [Ballot Position Update] New position, No Objection, has been recorded for Benoit Claise
2016-06-15
11 Kathleen Moriarty [Ballot comment]
Thanks for addressing the SecDir review comments:
https://www.ietf.org/mail-archive/web/secdir/current/msg06613.html
2016-06-15
11 Kathleen Moriarty [Ballot Position Update] New position, No Objection, has been recorded for Kathleen Moriarty
2016-06-14
11 Suresh Krishnan [Ballot Position Update] New position, No Objection, has been recorded for Suresh Krishnan
2016-06-14
11 Spencer Dawkins [Ballot Position Update] New position, No Objection, has been recorded for Spencer Dawkins
2016-06-14
11 Terry Manderson [Ballot Position Update] New position, No Objection, has been recorded for Terry Manderson
2016-06-14
11 Alia Atlas [Ballot Position Update] New position, No Objection, has been recorded for Alia Atlas
2016-06-14
11 Joel Jaeggli
[Ballot comment]
I'm at a bit of a loss to understand why path hiding would be a considered an undesirable property of an MLPE routeserver.  …
[Ballot comment]
I'm at a bit of a loss to understand why path hiding would be a considered an undesirable property of an MLPE routeserver.  IMHO as an operator that peers on MLPE exchanges as well as bilaterally on exchange fabrics and via PNIs. blinding a client of the MLPE which I  may have a session already with at the exchange or via PNI is basically mandatory. Likewise without per-asn export policy at exchanges my ability to advertise anycast prefixes via the MLPE is basically noexistant

  If an IXP operator deploys a route server without
  implementing a per-client routing policy control system, then path
  hiding does not occur as all paths are considered equally valid from
  the point of view of the route server.

Does not seem like a particularly desirable outcome.

While I'm fine with 2.3 not being normative, it does seem desirable that an MLPE service offer the client control, it greatly increases the sorts of clients that can safely use the service.
2016-06-14
11 Joel Jaeggli [Ballot Position Update] New position, No Objection, has been recorded for Joel Jaeggli
2016-06-13
11 Alissa Cooper [Ballot comment]
Was wondering the same thing as Mirja.
2016-06-13
11 Alissa Cooper [Ballot Position Update] New position, No Objection, has been recorded for Alissa Cooper
2016-06-13
11 Mirja Kühlewind
[Ballot comment]
Quick question: Why is the following statement a SHOULD and not a MUST:
"the route server SHOULD NOT prepend its own AS number …
[Ballot comment]
Quick question: Why is the following statement a SHOULD and not a MUST:
"the route server SHOULD NOT prepend its own AS number to the AS_PATH
  segment nor modify the AS_PATH segment in any other way. "
Is this because the clients might eitherwise not accept the message?
Maybe add one sentence to explain the SHOULD!
2016-06-13
11 Mirja Kühlewind [Ballot Position Update] New position, No Objection, has been recorded for Mirja Kühlewind
2016-06-13
11 Ben Campbell [Ballot Position Update] New position, No Objection, has been recorded for Ben Campbell
2016-06-11
11 Alexey Melnikov [Ballot Position Update] New position, No Objection, has been recorded for Alexey Melnikov
2016-06-10
11 Nick Hilliard IANA Review state changed to Version Changed - Review Needed from IANA OK - No Actions Needed
2016-06-10
11 Nick Hilliard New version available: draft-ietf-idr-ix-bgp-route-server-11.txt
2016-06-09
10 Ralph Droms Request for Telechat review by GENART Completed: Ready. Reviewer: Ralph Droms.
2016-06-09
10 Jean Mahoney Request for Telechat review by GENART is assigned to Ralph Droms
2016-06-09
10 Jean Mahoney Request for Telechat review by GENART is assigned to Ralph Droms
2016-06-09
10 Alvaro Retana
Based on Shepherd template: 2/24/2012
Authors: Elisa Jasinka, NicK Hilliard, Robert Razuk, Niels Bakker
Document Shepherd: Susan Hares
WG chairs: Susan Hares, John Scudder
AD: …
Based on Shepherd template: 2/24/2012
Authors: Elisa Jasinka, NicK Hilliard, Robert Razuk, Niels Bakker
Document Shepherd: Susan Hares
WG chairs: Susan Hares, John Scudder
AD: Alvaro Retano
Reviews done: Shepherd review
Reviews pending:  none

Type of RFC: Proposed Standard

(1) Type of RFC checks:
a) Why is this the proper type of RFC? 
This proposes a standard for an extension of the BGP protocol
to support router severs. This does not change the base BGP
specification for basic BGP.


(2) The IESG approval announcement includes a Document Announcement
Write-Up. Please provide such a Document Announcement Write-Up. 

Technical Summary

This document outlines a specification for multilateral
  interconnections at Internet exchange points (IXPs).  Multilateral
  interconnection is a method of exchanging routing information between
  three or more exterior BGP speakers using a single intermediate
  broker system, referred to as a route server.  Route servers are
  typically used on shared access media networks, such as Internet
  exchange points (IXPs), to facilitate simplified interconnection
  between multiple Internet routers.

Working Group Summary

The document has been discussed for 2-3 years in the IDR and
the GROW working group. The WG has discuss the implementations,
and these implementations have been discussed at NANOG
(an operators forum).

Document Quality

a) Are there existing implementations of the protocol?
Three implementations: Cisco, BIRD, Quagga.
You can view the implementation survey at:
http://trac.tools.ietf.org/wg/idr/trac/wiki/draft-ietf-idr-ix-bgp-route-server%20implementations

b) Have a significant number of vendors indicated their plan to
  implement the specification?
  These three vendors have implemented the code,
  and numerous test studies have been published.
  See the report at:
 
  ​https://www.nanog.org/meetings/nanog48/presentations/Monday/Jasinska_RouteServer_N48.pdf
 

c) Are there any reviewers that  merit special mention as having
  done a thorough review,
  c-1) routing-QA review: Geoff Huston ()gih@apnic.net) - pending
 
d) Personnel for IESG REview
  d-1: document shepherd: Susan Hares
  d-2: Routing AD: Alvaro Retano
  d-3: WG chairs: Susan Hares, John Scudder
  d-4: RTR-Directorate Reviewer: Geoff Huston
  d-5: OPS-Directorate reviewers: TBD
  d-6: GEN-ART reviewers: TBD
  d-7: Security directorate reviewer: TBD

(4) Does the document Shepherd have any concerns about the depth or
breadth of the reviews that have been performed?

The WG has discussed this for 3+ years,
the code is implemented in 3 implementations
(Cisco, BIRD, Quaga), and the deployment issues have been discussed
at NANOG.
https://www.nanog.org/meetings/nanog48/presentations/Monday/Jasinska_RouteServer_N48.pdf


(5) Do portions of the document need review from a particular or from
broader perspective, e.g., security, operational complexity, AAA, DNS,
DHCP, XML, or internationalization? 
took place.
  5-1: Routing Directorate:  yes
  5-2: OPS Directorate: Yes
  5-3: Security Directorate: Yes
  5-4: Yang Directorate: No
  5-5: Gen-ART Review: yes


(6) Describe any specific concerns or issues that the Document Shepherd
has with this document that the Responsible Area Director and/or the
IESG should be aware of? 

No

(7) Has each author confirmed that any and all appropriate IPR
disclosures required for full conformance with the provisions of BCP 78
and BCP 79 have already been filed. If not, explain why.

Yes.

(8) Has an IPR disclosure been filed that references this document?
If so, summarize any WG discussion and conclusion regarding the IPR
disclosures.

Nick Hilliard
http://www.ietf.org/mail-archive/web/idr/current/msg14680.html
Niels Bakker:
http://www.ietf.org/mail-archive/web/idr/current/msg14682.html
Robert Raszuk
http://www.ietf.org/mail-archive/web/idr/current/msg14681.html
Elisa Jasinska
http://www.ietf.org/mail-archive/web/idr/current/msg14758.html

(9) How solid is the WG consensus behind this document? 
WG LC, and 3 years of good consensus with lots of discussion in Grow.

(10) Has anyone threatened an appeal or otherwise indicated extreme
discontent?
no

(11) Identify any ID nits the Document Shepherd has found in this
document. (See https://www.ietf.org/tools/idnits/ and the Internet-Drafts
Checklist). Boilerplate checks are not enough; this check needs to be
thorough.

The NITS find that RFC1863 is updated by RFC4223 which notes that
RFC1863 is historic.  The shepherd suggest the following addition to
the third paragraph in section 5.

Please note that RFC1863 has been made historical by RFC4223.

(12) Describe how the document meets any required formal review
criteria, such as the MIB Doctor, media type, and URI type reviews.
12-1) formal review yang, URI

(13) Have all references within this document been identified as
either normative or informative?

(14) Are there normative references to documents that are not ready for
advancement or are otherwise in an unclear state? If such normative
references exist, what is the plan for their completion?

(15) Are there downward normative references references (see RFC 3967)?
If so, list these downward references to support the Area Director in
the Last Call procedure.

Please note that the use of RFC1863 is informative and given in
a acknowledgement of past effort.

(16) Will publication of this document change the status of any
existing RFCs?

No.  It is a unique implementation that does not change the
base BGP drafts (RFC4271).

(17) Describe the Document Shepherd's review of the IANA considerations
section, especially with regard to its consistency with the body of the
document. 

This document does not suggest any changes to IANA.

(18) List any new IANA registries that require Expert Review for future
allocations. Provide any public guidance that the IESG would find
useful in selecting the IANA Experts for these new registries.

none requested by this document.

(19) Describe reviews and automated checks performed by the Document
Shepherd to validate sections of the document written in a formal
language, such as XML code, BNF rules, MIB definitions, etc.

none required.
2016-06-09
10 Tero Kivinen Request for Last Call review by SECDIR Completed: Has Issues. Reviewer: David Waltermire.
2016-06-09
10 Susan Hares
Based on Shepherd template: 2/24/2012
Authors: Elisa Jasinka, NicK Hilliard, Robert Razuk, Niels Bakker
Document Shepherd: Susan Hares
WG chairs: Susan Hares, John Scudder
AD: …
Based on Shepherd template: 2/24/2012
Authors: Elisa Jasinka, NicK Hilliard, Robert Razuk, Niels Bakker
Document Shepherd: Susan Hares
WG chairs: Susan Hares, John Scudder
AD: Alvaro Retano
Reviews done: Shepherd review
Reviews pending:  none

Type of RFC: Proposed Standard

(1) Type of RFC checks:
a) Why is this the proper type of RFC? 
This proposes a standard for an extension of the BGP protocol
to support router severs. This does not change the base BGP
specification for basic BGP.


(2) The IESG approval announcement includes a Document Announcement
Write-Up. Please provide such a Document Announcement Write-Up. 

Technical Summary

This document outlines a specification for multilateral
  interconnections at Internet exchange points (IXPs).  Multilateral
  interconnection is a method of exchanging routing information between
  three or more exterior BGP speakers using a single intermediate
  broker system, referred to as a route server.  Route servers are
  typically used on shared access media networks, such as Internet
  exchange points (IXPs), to facilitate simplified interconnection
  between multiple Internet routers.

Working Group Summary

The document has been discussed for 2-3 years in the IDR and
the GROW working group. The WG has discuss the implementations,
and these implementations have been discussed at NANOG
(an operators forum).

Document Quality

a) Are there existing implementations of the protocol?
Three implementations: Cisco, BIRD, Quagga.
You can view the implementation survey at:
http://trac.tools.ietf.org/wg/idr/trac/wiki/draft-ietf-idr-ix-bgp-route-server%20implementations

b) Have a significant number of vendors indicated their plan to
  implement the specification?
  These three vendors have implemented the code,
  and numerous test studies have been published.
  See the report at:
 
  ​https://www.nanog.org/meetings/nanog48/presentations/Monday/Jasinska_RouteServer_N48.pdf
 

c) Are there any reviewers that  merit special mention as having
  done a thorough review,
  c-1) routing-QA review: Geoff Huston ()gih@apnic.net) - pending
 
d) Personnel for IESG REview
  d-1: document shepherd: Susan Hares
  d-2: Routing AD: Alvaro Retano
  d-3: WG chairs: Susan Hares, John Scudder
  d-4: RTR-Directorate Reviewer: Geoff Huston
  d-5: OPS-Directorate reviewers: TBD
  d-6: GEN-ART reviewers: TBD
  d-7: Security directorate reviewer: TBD

(4) Does the document Shepherd have any concerns about the depth or
breadth of the reviews that have been performed?

The WG has discussed this for 3+ years,
the code is implemented in 3 implementations
(Cisco, BIRD, Quaga), and the deployment issues have been discussed
at NANOG.
https://www.nanog.org/meetings/nanog48/presentations/Monday/Jasinska_RouteServer_N48.pdf


(5) Do portions of the document need review from a particular or from
broader perspective, e.g., security, operational complexity, AAA, DNS,
DHCP, XML, or internationalization? 
took place.
  5-1: Routing Directorate:  yes
  5-2: OPS Directorate: Yes
  5-3: Security Directorate: Yes
  5-4: Yang Directorate: No
  5-5: Gen-ART Review: yes


(6) Describe any specific concerns or issues that the Document Shepherd
has with this document that the Responsible Area Director and/or the
IESG should be aware of? 

No

(7) Has each author confirmed that any and all appropriate IPR
disclosures required for full conformance with the provisions of BCP 78
and BCP 79 have already been filed. If not, explain why.

No

(8) Has an IPR disclosure been filed that references this document?
If so, summarize any WG discussion and conclusion regarding the IPR
disclosures.

Nick Hilliard
http://www.ietf.org/mail-archive/web/idr/current/msg14680.html
Niels Bakker:
http://www.ietf.org/mail-archive/web/idr/current/msg14682.html
Robert Raszuk
http://www.ietf.org/mail-archive/web/idr/current/msg14681.html
Elisa Jasinska
http://www.ietf.org/mail-archive/web/idr/current/msg14758.html

(9) How solid is the WG consensus behind this document? 
WG LC, and 3 years of good consensus with lots of discussion in Grow.

(10) Has anyone threatened an appeal or otherwise indicated extreme
discontent?
no

(11) Identify any ID nits the Document Shepherd has found in this
document. (See https://www.ietf.org/tools/idnits/ and the Internet-Drafts
Checklist). Boilerplate checks are not enough; this check needs to be
thorough.

The NITS find that RFC1863 is updated by RFC4223 which notes that
RFC1863 is historic.  The shepherd suggest the following addition to
the third paragraph in section 5.

Please note that RFC1863 has been made historical by RFC4223.

(12) Describe how the document meets any required formal review
criteria, such as the MIB Doctor, media type, and URI type reviews.
12-1) formal review yang, URI

(13) Have all references within this document been identified as
either normative or informative?

(14) Are there normative references to documents that are not ready for
advancement or are otherwise in an unclear state? If such normative
references exist, what is the plan for their completion?

(15) Are there downward normative references references (see RFC 3967)?
If so, list these downward references to support the Area Director in
the Last Call procedure.

Please note that the use of RFC1863 is informative and given in
a acknowledgement of past effort.

(16) Will publication of this document change the status of any
existing RFCs?

No.  It is a unique implementation that does not change the
base BGP drafts (RFC4271).

(17) Describe the Document Shepherd's review of the IANA considerations
section, especially with regard to its consistency with the body of the
document. 

This document does not suggest any changes to IANA.

(18) List any new IANA registries that require Expert Review for future
allocations. Provide any public guidance that the IESG would find
useful in selecting the IANA Experts for these new registries.

none requested by this document.

(19) Describe reviews and automated checks performed by the Document
Shepherd to validate sections of the document written in a formal
language, such as XML code, BNF rules, MIB definitions, etc.

none required.
2016-06-07
10 Alvaro Retana Changed consensus to Yes from Unknown
2016-06-07
10 Alvaro Retana IESG state changed to IESG Evaluation from Waiting for Writeup
2016-06-07
10 Alvaro Retana Ballot has been issued
2016-06-07
10 Alvaro Retana [Ballot Position Update] New position, Yes, has been recorded for Alvaro Retana
2016-06-07
10 Alvaro Retana Created "Approve" ballot
2016-06-07
10 Alvaro Retana Ballot writeup was changed
2016-06-07
10 (System) IESG state changed to Waiting for Writeup from In Last Call
2016-06-02
10 Gunter Van de Velde Request for Last Call review by OPSDIR is assigned to Warren Kumari
2016-06-02
10 Gunter Van de Velde Request for Last Call review by OPSDIR is assigned to Warren Kumari
2016-05-31
10 (System) IANA Review state changed to IANA OK - No Actions Needed from IANA - Review Needed
2016-05-31
10 Sabrina Tanamal
(Via drafts-lastcall-comment@iana.org): IESG/Authors/WG Chairs:

IANA has reviewed draft-ietf-idr-ix-bgp-route-server-10.txt, which is currently in Last Call, and has the following comments:

We understand that this …
(Via drafts-lastcall-comment@iana.org): IESG/Authors/WG Chairs:

IANA has reviewed draft-ietf-idr-ix-bgp-route-server-10.txt, which is currently in Last Call, and has the following comments:

We understand that this document doesn't require any IANA actions.

While it's often helpful for a document's IANA Considerations section to remain in place upon publication even if there are no actions, if the authors strongly prefer to remove it, IANA does not object.

If this assessment is not accurate, please respond as soon as possible.

Thank you,

Sabrina Tanamal
IANA Specialist
ICANN
2016-05-26
10 Jean Mahoney Request for Last Call review by GENART is assigned to Ralph Droms
2016-05-26
10 Jean Mahoney Request for Last Call review by GENART is assigned to Ralph Droms
2016-05-26
10 Tero Kivinen Request for Last Call review by SECDIR is assigned to David Waltermire
2016-05-26
10 Tero Kivinen Request for Last Call review by SECDIR is assigned to David Waltermire
2016-05-24
10 Cindy Morgan IANA Review state changed to IANA - Review Needed
2016-05-24
10 Cindy Morgan
The following Last Call announcement was sent out:

From: The IESG
To: "IETF-Announce"
CC: aretana@cisco.com, idr@ietf.org, shares@ndzh.com, idr-chairs@ietf.org, draft-ietf-idr-ix-bgp-route-server@ietf.org
Reply-To: ietf@ietf.org …
The following Last Call announcement was sent out:

From: The IESG
To: "IETF-Announce"
CC: aretana@cisco.com, idr@ietf.org, shares@ndzh.com, idr-chairs@ietf.org, draft-ietf-idr-ix-bgp-route-server@ietf.org
Reply-To: ietf@ietf.org
Sender:
Subject: Last Call:  (Internet Exchange BGP Route Server) to Proposed Standard


The IESG has received a request from the Inter-Domain Routing WG (idr) to
consider the following document:
- 'Internet Exchange BGP Route Server'
  as Proposed Standard

The IESG plans to make a decision in the next few weeks, and solicits
final comments on this action. Please send substantive comments to the
ietf@ietf.org mailing lists by 2016-06-07. Exceptionally, comments may be
sent to iesg@ietf.org instead. In either case, please retain the
beginning of the Subject line to allow automated sorting.

Abstract


  This document outlines a specification for multilateral
  interconnections at Internet exchange points (IXPs).  Multilateral
  interconnection is a method of exchanging routing information between
  three or more external BGP speakers using a single intermediate
  broker system, referred to as a route server.  Route servers are
  typically used on shared access media networks, such as Internet
  exchange points (IXPs), to facilitate simplified interconnection
  between multiple Internet routers.




The file can be obtained via
https://datatracker.ietf.org/doc/draft-ietf-idr-ix-bgp-route-server/

IESG discussion can be tracked via
https://datatracker.ietf.org/doc/draft-ietf-idr-ix-bgp-route-server/ballot/


No IPR declarations have been submitted directly on this I-D.


2016-05-24
10 Cindy Morgan IESG state changed to In Last Call from Last Call Requested
2016-05-24
10 Alvaro Retana Placed on agenda for telechat - 2016-06-16
2016-05-24
10 Alvaro Retana Last call was requested
2016-05-24
10 Alvaro Retana Ballot approval text was generated
2016-05-24
10 Alvaro Retana Ballot writeup was generated
2016-05-24
10 Alvaro Retana IESG state changed to Last Call Requested from AD Evaluation::AD Followup
2016-05-24
10 Alvaro Retana Last call announcement was generated
2016-05-24
10 Alvaro Retana Last call announcement was generated
2016-04-29
10 (System) Sub state has been changed to AD Followup from Revised ID Needed
2016-04-29
10 Nick Hilliard New version available: draft-ietf-idr-ix-bgp-route-server-10.txt
2015-12-11
09 Alvaro Retana
AD Review:

I just finished reading this document.  Please find my comments below.

As you can see, the comments I labeled as Major are mostly …
AD Review:

I just finished reading this document.  Please find my comments below.

As you can see, the comments I labeled as Major are mostly related to security considerations, where I think there's more to add, and clarity with respect to the behavior in RFC4271.  I don't think that any of the comment will be hard to address.

I will wait for your comments/discussion and/or an update before starting the IETF Last Call.

Thanks!

Alvaro.


Major:

(1) Should this document be marked as updating rfc4271?  There are several places in Section 2 where the behavior is different than what is specified in rfc4271.  Given that the route server functionality is an optional enhancement, I don't think this document should be marked as updating rfc4271 (I.e. It changes the behavior only for the functionality specified here).  I'm assuming the authors/WG agree since there is no indication of an update.  Please include a clear statement (maybe in the Introduction) to the fact that the mechanism is optional.

(2) Section 2.1. (Client UPDATE Messages). "The route server SHOULD forward UPDATE messages where appropriate…to its clients."  When is it appropriate?  I'm guessing that you mean something like "where local policy permits"..  Please be clear.

(3) Section 2.2.2. (AS_PATH Attribute)  Not prepending the route server's AS_PATH brings up a couple of issues/questions:
- RFC4271 talks about prepending the local ASN (when advertising to an EBGP peer), and it doesn't mention any exceptions.  This document includes an exception.  Clearly indicate the modifications to Section 5.1.2. (AS_PATH) of RFC4271.

- Section 6.3. (UPDATE Message Error Handling) of rfc4271 says that when an "…UPDATE message is received from an external peer, the local system MAY check whether the leftmost…AS in the AS_PATH attribute is equal to the autonomous system number of the peer that sent the message", and MUST send a NOTIFICATION if it doesn't.
-- Please be explicit about the required behavior for both the route server, and the clients.
-- Even though this check is optional in RFC4271, mandating that is not be done could be interpreted as a security issue.  Please include some text around it (and mitigation) in the Security Considerations section.

- Independent of the check, not including an ASN in the AS_PATH could (in the general case) result in loops; which I also interpret as a potential security issue.  Please include some text about this too — a mitigation option is clearly to not check the first ASN only when known route servers are peers.

(4) Section 2.2.4. (Communities Attributes) says that Communities "SHOULD NOT be modified, processed or removed.  However, if such an attribute is intended for processing by the route server itself, it MAY be modified or removed."  How does the route server know if the sender intended for a community to be processed by it, or not?  Please add details.

(5) Section 3. (Security Considerations) 
- Besides the points above, because clients rely on the route server to implement outbound route filtering for them, there can be a privacy issue/route leak scenario where the route server can send routes to clients that it shouldn't have.  Not much can be done to mitigate this because it will mostly be due to a bad implementation or simply a "bad operator".
- You should point at relevant sections of RFC7454.


Minor:
(1) Please be consistent:
s/exterior BGP/external BGP..or even just EBGP (yes, a nit..but that's how rfc4271 calls EBGP)
s/best path selection process/Decision Process
s/IX/IXP

(2) Section 2.2.3. (MULTI_EXIT_DISC Attribute) specifically calls out the MED, but you already said in Section 2.2. (Attribute Transparency) that all optional attributes "SHOULD NOT be updated by the route server…and SHOULD be passed on to other route server clients."  Is there anything special about the MED that I'm missing?  If not, then you should be able to delete the section.

(3) In Section 2.3.1. (Path Hiding on a Route Server) policy implementation is described in terms of outbound route filtering.  The description of the example says that if "AS1's policy prevents AS2's path from being accepted, then AS1 would never receive a path to this prefix".  To be consistent with the outbound filtering description, you might want to change that text to something like "AS2's policy prevents AS1 from receiving the path, …".

(4) Section 2.3.2.2. (Advertising Multiple Paths) says that if the route server sends "more than a single path to a route server client,…the path hiding problem described in Section 2.3.1 would disappear."  That statement is true, but only if all the paths are propagated, not just "more than a single" one. [You do talk about that in 2.3.2.2.1, but not the general case.]

(5) Section 2.3.2.2.2. (BGP ADD-PATH Approach)
- This section says that if "the route server client propagates multiple paths for the same prefix to the route server, then this could potentially cause the propagation of inactive, invalid or suboptimal paths to the route server, thereby causing loss of reachability to other route server clients."  I can see how suboptimal (= non best) paths can be propagated by the clients, but what about invalid?

- To be consistent, there's no such thing as send-only and receive-only modes negotiated with ADD-PATH.  For the result in the text (having only the route server send), the route server should advertise the Send/Receive field in the ADD_PATH capability set to 2 (only able to send).  It doesn't matter what the client sets the value to (as long as it is not 2).

(6) References:  I think the following can be made Informational: RFC1997, RFC4360


Nits:
(1) Given that Section 2.3 is "included for information purposes only", you might want to consider making it an Appendix.
(2) Section 2.3.3. (Implementation Suggestions) seems superfluous to me.
2015-12-11
09 Alvaro Retana IESG state changed to AD Evaluation::Revised I-D Needed from AD Evaluation
2015-12-10
09 Alvaro Retana Notification list changed to aretana@cisco.com
2015-12-10
09 Alvaro Retana IESG state changed to AD Evaluation from Publication Requested
2015-11-05
09 Susan Hares
Based on Shepherd template: 2/24/2012
Authors: Elisa Jasinka, Nic Hilliard, Robert Razuk, Niels Bakker
Document Shepherd: Susan Hares
WG chairs: Susan Hares, John Scudder
AD: …
Based on Shepherd template: 2/24/2012
Authors: Elisa Jasinka, Nic Hilliard, Robert Razuk, Niels Bakker
Document Shepherd: Susan Hares
WG chairs: Susan Hares, John Scudder
AD: Alvaro Retano
Reviews done: Shepherd review
Reviews pending: Routing-QA Geoff Houston

Type of RFC: Proposed Standard

(1) Type of RFC checks:
a) Why is this the proper type of RFC? 
This proposes a standard for an extension of the BGP protocol
to support router severs. This does not change the base BGP
specification for basic BGP.


(2) The IESG approval announcement includes a Document Announcement
Write-Up. Please provide such a Document Announcement Write-Up. 

Technical Summary

This document outlines a specification for multilateral
  interconnections at Internet exchange points (IXPs).  Multilateral
  interconnection is a method of exchanging routing information between
  three or more exterior BGP speakers using a single intermediate
  broker system, referred to as a route server.  Route servers are
  typically used on shared access media networks, such as Internet
  exchange points (IXPs), to facilitate simplified interconnection
  between multiple Internet routers.

Working Group Summary

The document has been discussed for 2-3 years in the IDR and
the GROW working group. The WG has discuss the implementations,
and these implementations have been discussed at NANOG
(an operators forum).

Document Quality

a) Are there existing implementations of the protocol?
Three implementations: Cisco, BIRD, Quagga.
You can view the implementation survey at:
http://trac.tools.ietf.org/wg/idr/trac/wiki/draft-ietf-idr-ix-bgp-route-server%20implementations

b) Have a significant number of vendors indicated their plan to
  implement the specification?
  These three vendors have implemented the code,
  and numerous test studies have been published.
  See the report at:
 
  ​https://www.nanog.org/meetings/nanog48/presentations/Monday/Jasinska_RouteServer_N48.pdf
 

c) Are there any reviewers that  merit special mention as having
  done a thorough review,
  c-1) routing-QA review: Geoff Huston ()gih@apnic.net) - pending
 
d) Personnel for IESG REview
  d-1: document shepherd: Susan Hares
  d-2: Routing AD: Alvaro Retano
  d-3: WG chairs: Susan Hares, John Scudder
  d-4: RTR-Directorate Reviewer: Geoff Huston
  d-5: OPS-Directorate reviewers: TBD
  d-6: GEN-ART reviewers: TBD
  d-7: Security directorate reviewer: TBD

(4) Does the document Shepherd have any concerns about the depth or
breadth of the reviews that have been performed?

The WG has discussed this for 3+ years,
the code is implemented in 3 implementations
(Cisco, BIRD, Quaga), and the deployment issues have been discussed
at NANOG.
https://www.nanog.org/meetings/nanog48/presentations/Monday/Jasinska_RouteServer_N48.pdf


(5) Do portions of the document need review from a particular or from
broader perspective, e.g., security, operational complexity, AAA, DNS,
DHCP, XML, or internationalization? 
took place.
  5-1: Routing Directorate:  yes
  5-2: OPS Directorate: Yes
  5-3: Security Directorate: Yes
  5-4: Yang Directorate: No
  5-5: Gen-ART Review: yes


(6) Describe any specific concerns or issues that the Document Shepherd
has with this document that the Responsible Area Director and/or the
IESG should be aware of? 

No

(7) Has each author confirmed that any and all appropriate IPR
disclosures required for full conformance with the provisions of BCP 78
and BCP 79 have already been filed. If not, explain why.

No

(8) Has an IPR disclosure been filed that references this document?
If so, summarize any WG discussion and conclusion regarding the IPR
disclosures.

No

(9) How solid is the WG consensus behind this document? 
WG LC, and 3 years of good consensus with lots of discussion in Grow.

(10) Has anyone threatened an appeal or otherwise indicated extreme
discontent?
no

(11) Identify any ID nits the Document Shepherd has found in this
document. (See https://www.ietf.org/tools/idnits/ and the Internet-Drafts
Checklist). Boilerplate checks are not enough; this check needs to be
thorough.

The NITS find that RFC1863 is updated by RFC4223 which notes that
RFC1863 is historic.  The shepherd suggest the following addition to
the third paragraph in section 5.

Please note that RFC1863 has been made historical by RFC4223.

(12) Describe how the document meets any required formal review
criteria, such as the MIB Doctor, media type, and URI type reviews.
12-1) formal review yang, URI

(13) Have all references within this document been identified as
either normative or informative?

(14) Are there normative references to documents that are not ready for
advancement or are otherwise in an unclear state? If such normative
references exist, what is the plan for their completion?

(15) Are there downward normative references references (see RFC 3967)?
If so, list these downward references to support the Area Director in
the Last Call procedure.

Please note that the use of RFC1863 is informative and given in
a acknowledgement of past effort.

(16) Will publication of this document change the status of any
existing RFCs?

No.  It is a unique implementation that does not change the
base BGP drafts (RFC4271).

(17) Describe the Document Shepherd's review of the IANA considerations
section, especially with regard to its consistency with the body of the
document. 

This document does not suggest any changes to IANA.

(18) List any new IANA registries that require Expert Review for future
allocations. Provide any public guidance that the IESG would find
useful in selecting the IANA Experts for these new registries.

none requested by this document.

(19) Describe reviews and automated checks performed by the Document
Shepherd to validate sections of the document written in a formal
language, such as XML code, BNF rules, MIB definitions, etc.

none required.
2015-11-05
09 Susan Hares Responsible AD changed to Alvaro Retana
2015-11-05
09 Susan Hares IETF WG state changed to Submitted to IESG for Publication from WG Consensus: Waiting for Write-Up
2015-11-05
09 Susan Hares IESG state changed to Publication Requested
2015-11-05
09 Susan Hares IESG process started in state Publication Requested
2015-11-04
09 Susan Hares Changed document writeup
2015-11-04
09 Susan Hares IETF WG state changed to WG Consensus: Waiting for Write-Up from Submitted to IESG for Publication
2015-11-04
09 Susan Hares Tag Other - see Comment Log cleared.
2015-10-19
09 Nick Hilliard New version available: draft-ietf-idr-ix-bgp-route-server-09.txt
2015-10-14
08 (System) Notify list changed from "Susan Hares"  to (None)
2015-09-08
07 Jonathan Hardwick Request for Early review by RTGDIR Completed: Not Ready. Reviewer: Geoff Huston.
2015-08-31
08 Nick Hilliard New version available: draft-ietf-idr-ix-bgp-route-server-08.txt
2015-08-26
07 Susan Hares
Please note this draft is in Routing-QA Review by Geoff Houston which I have asked to be changed to a final review.  This document references …
Please note this draft is in Routing-QA Review by Geoff Houston which I have asked to be changed to a final review.  This document references RFC1863 as a historical document, to make this clear, I have suggested one minor editorial change.
2015-08-26
07 Susan Hares Tag Other - see Comment Log set.
2015-08-26
07 Susan Hares IETF WG state changed to Submitted to IESG for Publication from WG Consensus: Waiting for Write-Up
2015-08-26
07 Susan Hares Changed document writeup
2015-08-25
07 Jonathan Hardwick Request for Early review by RTGDIR is assigned to Geoff Huston
2015-08-25
07 Jonathan Hardwick Request for Early review by RTGDIR is assigned to Geoff Huston
2015-07-23
07 Jonathan Hardwick Closed request for Early review by RTGDIR with state 'No Response'
2015-06-08
07 Elisa Jasinska New version available: draft-ietf-idr-ix-bgp-route-server-07.txt
2015-04-27
06 Jonathan Hardwick Request for Early review by RTGDIR is assigned to David Sinicrope
2015-04-27
06 Jonathan Hardwick Request for Early review by RTGDIR is assigned to David Sinicrope
2015-03-02
06 Susan Hares Notification list changed to "Susan Hares" <shares@ndzh.com>
2015-03-02
06 Susan Hares Document shepherd changed to Susan Hares
2015-03-02
06 Susan Hares IETF WG state changed to WG Consensus: Waiting for Write-Up from WG Document
2015-02-02
06 Susan Hares This document now replaces draft-jasinska-ix-bgp-route-server instead of None
2015-02-02
06 Susan Hares Intended Status changed to Proposed Standard from None
2014-12-10
06 Elisa Jasinska New version available: draft-ietf-idr-ix-bgp-route-server-06.txt
2014-06-09
05 Elisa Jasinska New version available: draft-ietf-idr-ix-bgp-route-server-05.txt
2014-03-03
04 Nick Hilliard New version available: draft-ietf-idr-ix-bgp-route-server-04.txt
2013-08-29
03 Nick Hilliard New version available: draft-ietf-idr-ix-bgp-route-server-03.txt
2013-02-25
02 Nick Hilliard New version available: draft-ietf-idr-ix-bgp-route-server-02.txt
2012-07-16
01 Elisa Jasinska New version available: draft-ietf-idr-ix-bgp-route-server-01.txt
2012-03-26
00 Elisa Jasinska New version available: draft-ietf-idr-ix-bgp-route-server-00.txt