Skip to main content

The BGP Tunnel Encapsulation Attribute
draft-ietf-idr-tunnel-encaps-22

Revision differences

Document history

Date Rev. By Action
2021-03-17
22 (System) RFC Editor state changed to AUTH48-DONE from AUTH48
2021-03-01
22 (System) RFC Editor state changed to AUTH48 from RFC-EDITOR
2021-02-15
22 (System) RFC Editor state changed to RFC-EDITOR from EDIT
2021-02-09
22 (System) IANA Action state changed to RFC-Ed-Ack from Waiting on RFC Editor
2021-02-08
22 (System) IANA Action state changed to Waiting on RFC Editor from In Progress
2021-02-08
22 (System) IANA Action state changed to In Progress from Waiting on Authors
2021-02-08
22 (System) IANA Action state changed to Waiting on Authors from In Progress
2021-02-08
22 (System) IANA Action state changed to In Progress from Waiting on Authors
2021-01-26
22 (System) IANA Action state changed to Waiting on Authors from In Progress
2021-01-15
22 (System) RFC Editor state changed to EDIT
2021-01-15
22 (System) IESG state changed to RFC Ed Queue from Approved-announcement sent
2021-01-15
22 (System) Announcement was received by RFC Editor
2021-01-15
22 (System) IANA Action state changed to In Progress
2021-01-15
22 Cindy Morgan IESG state changed to Approved-announcement sent from Approved-announcement to be sent
2021-01-15
22 Cindy Morgan IESG has approved the document
2021-01-15
22 Cindy Morgan Closed "Approve" ballot
2021-01-15
22 Alvaro Retana IESG state changed to Approved-announcement to be sent from IESG Evaluation::AD Followup
2021-01-15
22 Alvaro Retana Ballot approval text was generated
2021-01-15
22 Magnus Westerlund
[Ballot comment]
This document fails massively the alone on an island test. No one
can implement this without having the specification from an operator for …
[Ballot comment]
This document fails massively the alone on an island test. No one
can implement this without having the specification from an operator for what
they actually want to establish.

This in its turn makes it impossible to answer if there are issues or not and
additional configuration are needed for things like UDP zero-checksum, ECN, ICMP
processing etc. All these nitty gritty details that can make a tunnel work good
or not from an upper layer protocol perspective.
2021-01-15
22 Magnus Westerlund [Ballot Position Update] Position for Magnus Westerlund has been changed to Abstain from Discuss
2021-01-11
22 Benjamin Kaduk [Ballot comment]
Thank you for the discussion and clarifications relating to my discuss point,
as well as all the other updates to the document.
2021-01-11
22 Benjamin Kaduk [Ballot Position Update] Position for Benjamin Kaduk has been changed to No Objection from Discuss
2021-01-09
22 Erik Kline
[Ballot comment]
[ section 3.3.1 ]

https://www.rfc-editor.org/rfc/rfc2474.html#section-3 says this about the term "DS field":

  Six bits of the DS field are used as a …
[Ballot comment]
[ section 3.3.1 ]

https://www.rfc-editor.org/rfc/rfc2474.html#section-3 says this about the term "DS field":

  Six bits of the DS field are used as a codepoint (DSCP) to select the
  PHB a packet experiences at each node.  A two-bit currently unused
  (CU) field is reserved and its definition and interpretation are
  outside the scope of this document.  The value of the CU bits are
  ignored by differentiated services-compliant nodes when determining
  the per-hop behavior to apply to a received packet.

  The DS field structure is presented below:


        0  1  2  3  4  5  6  7
      +---+---+---+---+---+---+---+---+
      |        DSCP          |  CU  |
      +---+---+---+---+---+---+---+---+

        DSCP: differentiated services codepoint
        CU:  currently unused

So, if this section 3.3.1 one byte DS field is meant to be the same (i.e. includes the 2 CU bits that are now ECN bits), then I'm good with this.

Thanks.
2021-01-09
22 Erik Kline [Ballot Position Update] Position for Erik Kline has been changed to No Objection from Discuss
2021-01-07
22 John Scudder New version available: draft-ietf-idr-tunnel-encaps-22.txt
2021-01-07
22 (System) New version accepted (logged-in submitter: John Scudder)
2021-01-07
22 John Scudder Uploaded new revision
2021-01-07
21 Roman Danyliw [Ballot comment]
Thank you to Scott Kelly for performing the SECDIR review.

Thank you for addressing my DISCUSS and COMMENT feedback.
2021-01-07
21 Roman Danyliw [Ballot Position Update] Position for Roman Danyliw has been changed to No Objection from Discuss
2021-01-07
21 (System) Sub state has been changed to AD Followup from Revised ID Needed
2021-01-07
21 (System) IANA Review state changed to Version Changed - Review Needed from IANA OK - Actions Needed
2021-01-07
21 John Scudder New version available: draft-ietf-idr-tunnel-encaps-21.txt
2021-01-07
21 (System) New version approved
2021-01-07
21 (System) Request for posting confirmation emailed to previous authors: Gunter Van de Velde , John Scudder , Keyur Patel , Srihari Sangli
2021-01-07
21 John Scudder Uploaded new revision
2020-12-09
20 Bernie Volz Assignment of request for Telechat review by INTDIR to David Lamparter was marked no-response
2020-12-09
20 Bernie Volz Assignment of request for Telechat review by INTDIR to Basavaraj Patil was marked no-response
2020-12-03
20 Cindy Morgan IESG state changed to IESG Evaluation::Revised I-D Needed from IESG Evaluation
2020-12-03
20 Roman Danyliw
[Ballot discuss]
Per the conversation on my original COMMENT (thanks for the quick response), https://mailarchive.ietf.org/arch/msg/idr/hV2t6-8mq2dOvmXO-PvLuiON5o4/, I'm escalating this item to a DISCUSS. 

Section 11 …
[Ballot discuss]
Per the conversation on my original COMMENT (thanks for the quick response), https://mailarchive.ietf.org/arch/msg/idr/hV2t6-8mq2dOvmXO-PvLuiON5o4/, I'm escalating this item to a DISCUSS. 

Section 11
However, it is intended that the Tunnel Encapsulation
attribute be used only within a well-defined scope, e.g., within a
set of Autonomous Systems that belong to a single administrative
entity.

As this applicability text should be read as a normative SHOULD, please provide a discussion on the risks of open Internet usage in the Security Considerations.
2020-12-03
20 Roman Danyliw
[Ballot comment]
Thank you to Scott Kelly for performing the SECDIR review.

** Section 1.5.  Per “Because RFC 8365 depends on RFC 5640, it …
[Ballot comment]
Thank you to Scott Kelly for performing the SECDIR review.

** Section 1.5.  Per “Because RFC 8365 depends on RFC 5640, it is similarly obsoleted.”, this seems inconsistent with the meta-data header in the document (as RFC8365 isn’t obsoleted).

** (original COMMENT, see DISCUSS above) Section 11.  Please use normative language on the applicability text restricting use to a single administrative domain.

OLD
However, it is intended that the Tunnel Encapsulation
  attribute be used only within a well-defined scope, e.g., within a
  set of Autonomous Systems that belong to a single administrative
  entity.

NEW (or something like this)

However, the Tunnel Encapsulation attribute MUST only be used within a well-defined scope such as a set of Autonomous Systems that belong to a single administrative entity.

** Section 12.  Typo. s/tunnelling/tunneling/

** Section 15.  Clarifying text
OLD
"hijacking" of traffic (insertion of
  an undesired node in the path)

NEW
"hijacking" of traffic (insertion of an undesired node in the path allowing for inspection or modification of traffic, or avoidance of security controls)
2020-12-03
20 Roman Danyliw [Ballot Position Update] Position for Roman Danyliw has been changed to Discuss from No Objection
2020-12-03
20 Benjamin Kaduk
[Ballot discuss]
[Updated to remove the point about the "relationship between this
document and RFC 8365"; no other changes]

I support Erik's discuss.

I …
[Ballot discuss]
[Updated to remove the point about the "relationship between this
document and RFC 8365"; no other changes]

I support Erik's discuss.

I see that Roman has already suggested adding normative language
regarding the limitation to a single administrative domain (in addition
to the "MUST filter by default for EBGP sessions"), which I agree with.
However, I think there is an additional consideration regarding the
limitation of use to a single administrative domain, wherein the domain
of use for the tunnel encapsulation attribute may diverge from the
domain of use of segment routing, that seems to place this document in
conflict with the requirements of RFC 8402.  In particular,
RFC 8402 says, for SR-MPLS and SRv6, that boundary routers "MUST filter
any external traffic", and additionally for SRv6 that "explicit routing
information MUST NOT be leaked through the boundaries of the
administrered domain".  In §3.7 of this document, though, we find that
for the Prefix-SID sub-TLV, "the receiving BGP speaker need not even be
in the same Segment Routing Domain as the tunnel's egress endpoint, and
there is no implication that the prefix-SID for the advertised prefix is
the same in the Segment Routing domains of the BGP speaker that
originated the sub-TLV and the BGP speaker that received it", which
seems to suggest violation of the RFC 8402 requirement.  I think we need
to have greater clarity on what relationship is actually intended
between the SR domain and the tunnel encapsulation usage domain, and if
they are to diverge, we need to both somehow rectify this behavior with
RFC 8402 and to very clearly document how the 8402-mandated filtering at
the SR domain boundary is supposed to happen when the boundary includes
tunneled traffic.
2020-12-03
20 Benjamin Kaduk Ballot discuss text updated for Benjamin Kaduk
2020-12-03
20 Magnus Westerlund
[Ballot discuss]
So this is really to start a discussion of how the framework approach of this document may not be explicit enough on what …
[Ballot discuss]
So this is really to start a discussion of how the framework approach of this document may not be explicit enough on what combination is actually viable combination and have existing specification for how to deal with a number of behaviors for tunnels. So my view after having read this one is that the signalling is specified in a two tier fashion, with an outer encapsulation that can be IPvX, IPvX/UDP for example and then a tunnel protocol like GRE, VXLAN, L2TPv3. So I don't believe all combinations of outer encapsulation and tunnel protocol is actually defined. This document does not provide a table with the reference for where the actual data plan specification for combinations are provided. I think it would be good if there actually existed such a table/list.

The next aspect of this discuss is the difficulty in determining if the provided sub-TLVs are sufficient. I will mention a number of potential ones that I wonder if they are necessary to configure these combinations.

To build on Erik Kline's discuss. So are for all these combinations when IP is the outer encapsulation is the egress ECN behavior to correctly mark or drop inner payload well defined. If the egress is not guaranteed to do the correct, then I think a configuration option is required.

When using UDP encapsulation combined with IPv6 there is the question if one can safely use zero-checksum. Per RFC 6935 and RFC 6936 some consideration is needed to determine if the inner payload is safe to combine with zero checksum. So this requires the combination of tunnel protocol and inner payload to determine this. So I think some of these tunnel protocols have text on this, but I don't know which combinations have this specified. And also here arise a question if some of these will also need a configuration option as there exist some inner payloads that could not be safe and thus a different tunnel with checksum enabled may be required.

When using UDP encapsulation I am wondering over source port usage. To my knowledge some of these protocols like VXLAN do defines that source ports are picked randomly to ensure header hashing will provide different values for different inner flows. So is there a need in any of this cases to identify a single source port?

So I at least are unable to determine if this specification are containing all necessary attributes when it doesn't have identification of what combinations it expect to work, and what behavior on the above aspects is just working.

So lets start discussing what needs to be addressed here if any.
2020-12-03
20 Magnus Westerlund [Ballot Position Update] New position, Discuss, has been recorded for Magnus Westerlund
2020-12-02
20 Murray Kucherawy
[Ballot comment]
Throughout the document it seemed like a lot of care had been taken in the appropriate use of SHOULDs and MUSTs.  Nice work. …
[Ballot comment]
Throughout the document it seemed like a lot of care had been taken in the appropriate use of SHOULDs and MUSTs.  Nice work.

In addition to Barry's comments about the IANA Considerations section, please state in Section 14.1 which registry/registries are to be updated.
2020-12-02
20 Murray Kucherawy [Ballot Position Update] New position, No Objection, has been recorded for Murray Kucherawy
2020-12-02
20 Alissa Cooper [Ballot Position Update] New position, No Objection, has been recorded for Alissa Cooper
2020-12-02
20 Deborah Brungard [Ballot Position Update] New position, No Objection, has been recorded for Deborah Brungard
2020-12-01
20 Barry Leiba
[Ballot comment]
For the new registries defined in Sections 14.6 through 14.9, it would help both IANA and the reader if the definition specified the …
[Ballot comment]
For the new registries defined in Sections 14.6 through 14.9, it would help both IANA and the reader if the definition specified the range of values: for the bit fields, how many bits are available?  For the numeric field in 14.8, what’s the valid numeric range?
2020-12-01
20 Barry Leiba [Ballot Position Update] New position, No Objection, has been recorded for Barry Leiba
2020-12-01
20 Martin Duke
[Ballot comment]
I support Erik's DISCUSS.

Thank you for Section 1.3; it was extremely helpful to understand what this spec is trying to accomplish.

In …
[Ballot comment]
I support Erik's DISCUSS.

Thank you for Section 1.3; it was extremely helpful to understand what this spec is trying to accomplish.

In Sec 3.1 it says there MUST be exactly one Tunnel Egress Endpoint sub-TLV but describes an error if there are zero sub-TLVs. In Sec 13 this is correctly specified as anything other than 1 sub-TLV. Please update 3.1 to match.
2020-12-01
20 Martin Duke [Ballot Position Update] New position, No Objection, has been recorded for Martin Duke
2020-12-01
20 Benjamin Kaduk
[Ballot discuss]
I support Erik's discuss.

I see that Roman has already suggested adding normative language
regarding the limitation to a single administrative domain (in …
[Ballot discuss]
I support Erik's discuss.

I see that Roman has already suggested adding normative language
regarding the limitation to a single administrative domain (in addition
to the "MUST filter by default for EBGP sessions"), which I agree with.
However, I think there is an additional consideration regarding the
limitation of use to a single administrative domain, wherein the domain
of use for the tunnel encapsulation attribute may diverge from the
domain of use of segment routing, that seems to place this document in
conflict with the requirements of RFC 8402.  In particular,
RFC 8402 says, for SR-MPLS and SRv6, that boundary routers "MUST filter
any external traffic", and additionally for SRv6 that "explicit routing
information MUST NOT be leaked through the boundaries of the
administrered domain".  In §3.7 of this document, though, we find that
for the Prefix-SID sub-TLV, "the receiving BGP speaker need not even be
in the same Segment Routing Domain as the tunnel's egress endpoint, and
there is no implication that the prefix-SID for the advertised prefix is
the same in the Segment Routing domains of the BGP speaker that
originated the sub-TLV and the BGP speaker that received it", which
seems to suggest violation of the RFC 8402 requirement.  I think we need
to have greater clarity on what relationship is actually intended
between the SR domain and the tunnel encapsulation usage domain, and if
they are to diverge, we need to both somehow rectify this behavior with
RFC 8402 and to very clearly document how the 8402-mandated filtering at
the SR domain boundary is supposed to happen when the boundary includes
tunneled traffic.

I also would like to ensure that we have had adequate discussion of the
relationship between this document and RFC 8365.  The IESG has received
comments recently (in the context of a different document) that it is
irresponsible to effectively obsolete or deprecate existing work without
identifying or explicitly updating such work, and without indicating
whose responsibility it is to find discrepancies.  That seems like it
might apply to what's currently in Appendix A, which on first reading
suggests "there might be a problem here, but we aren't saying exactly
what or how to fix it, or even who is going to do that work".
2020-12-01
20 Benjamin Kaduk
[Ballot comment]
It's good to see that the shepherd writeup got updated as things
changed; thank you for keeping it up to date!

[I initially …
[Ballot comment]
It's good to see that the shepherd writeup got updated as things
changed; thank you for keeping it up to date!

[I initially wrote some inline comments about handling internal
inconsistencies within a given tunnel specification as malformed and
ignoring the tunnel entirely vs specifying a precedence order (the
latter being what this document does).  I removed them, because this
seems to be a generic topic where security types tend to fail-closed and
routing types tend to aim to provide some kind of service when possible,
and I don't have anything new to add to the discussion for these
particular cases.]

I didn't see a response to the secdir review; it would be good to get a
response to that, in particular to hear what amount of consideration
has been given to what new ways this provides to attack BGP.

Abstract

  of certain other SAFIs.  This document adds support for additional
  Tunnel Types, and allows a remote tunnel endpoint address to be
  specified for each tunnel.  This document also provides support for

The shepherd writeup suggests that the "remote tunnel endpoint"
terminology was switched to be "tunnel egress endpoint"; was this spot
missed?

Section 1.4

  o  Defining a new "Tunnel Egress Endpoint sub-TLV" (Section 3.1) that
      can be included in any of the TLVs contained in the Tunnel
      Encapsulation attribute.  This sub-TLV can be used to specify the
      remote endpoint address of a particular tunnel.

["remote endpoint" again]

Section 3.1

I agree with Martin V that there must be a story about this Reserved
field and why it's only SHOULD send as zero.  I don't know whether this
information needs to end up in the RFC but I think we should talk about
why it is this way.  In particular, the current requirements suggest
that it could be (mis?)used as an additional data channel by
collaborating implementations (that ignore the "MUST be disregarded"),
without actually writing up a specification for those semantics.

  If the Address Family subfield has any value other than IPv4 or IPv6,
  the Tunnel Egress Endpoint sub-TLV is considered "unrecognized" (see

We probably need to repeat the carve-out for the value 0 here, as well.
(I dithered about remarking about the earlier "assumes that the Address
Family is either IPv4 or IPv6" since the "one special case" is a few
paragraphs later.)

  o  It can be determined that the IP address in the sub-TLV's address
      subfield does not belong to the Autonomous System (AS) that
      originated the route that contains the attribute.  Section 3.1.1
      describes an optional procedure to make this determination.

This check seems highly important for the security of the system and
should get called out in the security considerations.

Section 3.1.1

  sub-TLV is considered not to be valid.  In some cases a network
  operator who controls a set of Autonomous Systems might wish to allow
  a Tunnel Egress Endpoint to reside in an AS other than Route_AS;
  configuration MAY allow for such a case, in which case the check
  becomes, if Egress_AS is not within the configured set of permitted
  AS numbers, then the Tunnel Egress Endpoint sub-TLV is considered to
  be "malformed".

(nit?) maybe "the configured set of permitted AS numbers that contains
Route_AS"?  The current wording implies that there can only be one such
configured set and that it is used regardless of Route_AS, which does
not seem right...

Section 3.2

  This section defines Encapsulation sub-TLVs for the following tunnel
  types: VXLAN ([RFC7348]), NVGRE ([RFC7637]), MPLS-in-GRE ([RFC4023]),
  L2TPv3 ([RFC3931]), and GRE ([RFC2784]).

Thanks for putting the links all in one place, here.  I, at least, would
have benefited from also putting the links/references in the
corresponding sections, but that is probably just a matter of style.

Section 3.2.1

      R: The remaining bits in the 8-bit flags field are reserved for
      further use.  They MUST always be set to 0 by the originator of
      the sub-TLV.  Intermediate routers MUST propagate them without
      modification.  Any receiving routers MUST ignore these bits upon a
      receipt of the sub-TLV.

nit: spurious "a" in "upon a receipt" (and diffing this section against
§3.2.2 it seems that maybe the "of the sub-TLV" is also superfluous?).

  o  If the V bit is not set, and the BGP UPDATE message has AFI/SAFI
      other than Ethernet VPNs (EVPN) then the VXLAN tunnel cannot be
      used.

If this is intended to refer to SAFI 70 (from RFC 7432), I note that the
IANA entry is named "BGP EVPNs".

[I also don't understand why it's okay for EVPN to not have a VN-ID when
using the VXLAN tunnel, but assume that's just my ignorance.]

Section 3.2.2

      Reserved (two fields): MUST be set to zero on transmission and
      disregarded on receipt.

(nit) I only see one field marked "Reserved" (this format is the same
layout as for VXLAN).

  o  The values of the V, M, and R bits are NOT copied into the flags
      field of the NVGRE header.  The flags field of the VXLAN header is
      set as per [RFC7637].

(nit) stray "VXLAN"?

Section 3.2.5

  While it is not really necessary to have both the GRE and MPLS-in-GRE
  tunnel types, both are included for reasons of backwards
  compatibility.

It might be nice to have a few more words about which one is the
"backward compatible" option and what it's compatible with.

Section 3.3

  If an outer Encapsulation sub-TLV occurs in a TLV for a Tunnel Type
  that does not use the corresponding outer encapsulation, the sub-TLV
  MUST be treated as if it were an unknown type of sub-TLV.

nit: this is the only instance of "unknown" in the document; using
"unrecognized" seems to be the common case (and makes it easier to find
Section 13).

Section 3.3.1

I think we may need to discuss the semantics of the DS field here -- as
I understand it, the attribute advertised in this TLV is the DSCP value
that the BGP speaker would like to receive in traffic destined to the
tunnel egress endpoint (which may be a different node than the BGP
speaker itself, but is expected to be under the control of the same
administrative entity).  Additionally, the interpretation of DSCP values
is subject to local interpretation on a given network.  Since the tunnel
encapsulation attribute is transitive, it will be propagated potentially
across multiple BGP hops and multiple ASes, so that the tunnel ingress
endpoint is not necessarily adjacent to the tunnel egress endpoint.
Although we do say that we expect the tunnel encapsulation information
to only be propagated within an administrative boundary, there is no
guarantee that the administrative boundary in question uses a unified
DSCP handling procedure throughout it.  As such, it may be possible to
end up in a regime where the requested DSCP codepoint has a different,
and potentially hazardous, interpretation, at the ingress of the tunnel.
So, it seems that we need to say something about either local policy for
DSCP value filtering, or only using this value when "directly" connected
to the egress AS, or similar; we do have something like this already for
the TC portion of the MPLS label stack entries.

Section 3.5

  labeled address family, then the sub-TLV MUST be disregarded.  If the
  sub-TLV is contained in a TLV whose Tunnel Type does not have a
  virtual network identifier in its encapsulation header, the sub-TLV
  MUST be disregarded.  In those cases where the sub-TLV is ignored, it
  SHOULD NOT be stripped from the TLV before the route is propagated.

Why only SHOULD NOT here?  I thought we hat MUST-level requirements to
preserve things unchaged in similar situations.

Section 4.1

  In the remainder of this specification, when a route is referred to
  as containing a Tunnel Encapsulation attribute with a TLV identifying
  a particular Tunnel Type, it implicitly includes the case where the
  route contains a Tunnel Encapsulation Extended Community identifying
  that Tunnel Type.

I searched the entire document for the string "identifying" and did not
find any instances where a route was referred to as containing a Tunenl
Encapsulation attribute with a TLV identifying a particular tunnel type.
Perhaps I should be looking for the "attribute" keyword, but there are
over 200 instances of that string; could you confirm whether this
implicit inclusion is actually used anywhere (and if so, give an example
of such usage)?

Section 6

  [RFC5512] specifies the use of the Tunnel Encapsulation attribute in
  BGP UPDATE messages of AFI/SAFI 1/7 and 2/7.  That document restricts
  the use of this attribute to UPDATE messages of those SAFIs.  This
  document removes that restriction.

I believe another reviewer commented on the ambiguity of "that", which I
first thought referred to "this" vs "that"; I now see that there is
additional ambituity as to whether it is the SAFI restriction or the
UPDATE message restriction that is lifted, and suggest clarification
of that as well.

  Once it is determined to send a packet through the tunnel specified
  in a particular Tunnel TLV of a particular Tunnel Encapsulation
  attribute, then the tunnel's egress endpoint address is the IP
  address contained in the sub-TLV.  If the Tunnel TLV contains a

nit: I think we have to say "Tunnel Egress Endpoint sub-TLV"; the use of
the definite article is not justified by the preceding context.

Section 8

  However, suppose that one of the TLVs in U2's Tunnel Encapsulation
  attribute contains the Color Sub-TLV.  In that case, packet P MUST
  NOT be sent through the tunnel contained in that TLV, unless U1 is
  carrying the Color Extended Community that is identified in U2's
  Color Sub-TLV.

We should probably reword this in light of Section 13's discussion that
a given Tunnel TLV can have more than one Color sub-TLV present.

Section 9.2

  Three of the tunnel types that can be specified in a Tunnel
  Encapsulation TLV have virtual network identifier fields in their
  encapsulation headers.  In the VXLAN encapsulation, this field is
  called the VNI (Virtual Network Identifier) field; in the NVGRE
  encapsulation, this field is called the VSID (Virtual Subnet
  Identifier) field.

We start off by saying "three" types but list only two.  What's the
third type?

Section 9.2.2.2

  If the TLV identifying the tunnel does not contain an Encapsulation
  sub-TLV whose V bit is set, the virtual network identifier field of
  the encapsulation header is set as follows:

This perhaps sets us up for a nasty surprise in light of the
error-handling behavior in §13, where we are supposed to disregard the
second and subsequent instances of the Encapsulation sub-TLV.  This
language is not particularly clear about whether it applies to only the
first sub-TLV or all instances.

  o  If the TLV does not contain an Embedded Label Handling sub-TLV, or
      if it contains an Embedded Label Handling sub-TLV whose value is
      2, the embedded label is copied into the lower 3 octets of the
      virtual network identifier field of the encapsulation header.

nit: I think "lower" is unneeded, since all the VNI fields are exactly 3
octets now.

Section 10

  Note that if the Tunnel Encapsulation attribute is attached to a VPN-
  IP route [RFC4364], and if Inter-AS "option b" (see section 10 of
  [RFC4364]) is being used, and if the Tunnel Egress Endpoint sub-TLV
  contains an IP address that is not in same AS as the router receiving
  the route, it is very likely that the embedded label has been
  changed.  [...]

I'm not sure that I'm understanding this scenario properly.  The label
has been "changed" with respect to what baseline?  I'm also not sure why
the tunnel egress endpoint would need to be in the same AS as the router
receiving (vs originating) the route.

  Other documents may define other ways to signal tunnel information in
  BGP.  For example, [RFC6514] defines the "P-Multicast Service
  Interface Tunnel" (PMSI Tunnel) attribute.  In this specification, we
  do not consider the effects of advertising the Tunnel Encapsulation
  Attribute in conjunction with other forms of signaling tunnels.  Any
  document specifying such joint use should provide details as to how
  interactions should be handled.

It seems like we should perhaps go a step further and explicitly
recommend not advertising such combinations in the absence of a
specification for their combined use?  Otherwise implementations will
have to come up with their own interpretations, which could easily be
uninteroperable.

Section 13

  The following sub-TLVs defined in this document MUST NOT occur more
  than once in a given Tunnel TLV: Tunnel Egress Endpoint (discussed
  below), Encapsulation, DS, UDP Destination Port, Embedded Label
  Handling, MPLS Label Stack, Prefix-SID.  [...]

Ah, thanks for listing these out.  I had been wondering about this
situation earlier in the doc, and it would have helped if the "not more
than once" limitation was mentioned at each sub-TLV's definition (even
if the actual error handling stays here).

Section 14.3

Why do we only move "BGP Tunnel Encapsulation Attribute Sub-TLVs" (but
not "BGP Tunnel Encapsulation Attribute Tunnel Types") to the new "BGP
Tunnel Encapsulation Parameters" grouping?

Section 14.9

It might be useful to indicate in the registry metadata how many flags
are available (and, I suppose, in which order the bits are numbered).

Section 15

We briefly discuss in the main body text the possibility that a tunnel
will direct encapsulated traffic with (e.g) MPLS labels to a node that
will misinterpret those labels; it might be worth reiterating the risk
of such misinterpretation in the security considerations as well (or
just referencing the previous discussion as security-relevant).

I guess there's also a theoretical possibility that the flexibility in
tunnel specification (including the type of expected content) could
facilitate cross-protocol attacks, where the attacker causes the sender
and recipient of encapsulated traffic to think that they should
interpret the records in question as different protocols.  But this
seems so remote, and unlikely to succeed given different protocols'
message structure, that it is probably not worth mentioning.

Section 18.2

If we're using RFC 5462 as a reference for a field in an MPLS label,
that seems to make it normative.

We seem to depend on procedures from RFC 6811 in a few places, which
also seems to make it normative.
2020-12-01
20 Benjamin Kaduk [Ballot Position Update] New position, Discuss, has been recorded for Benjamin Kaduk
2020-11-30
20 Erik Kline
[Ballot discuss]
[ section 3.3.1 ]

* The text about "[a]ny one-octet value can be transported" leaves me
  wondering about how values that result …
[Ballot discuss]
[ section 3.3.1 ]

* The text about "[a]ny one-octet value can be transported" leaves me
  wondering about how values that result in ECN bits being set should be
  treated.

  I think there needs to be some recognition here that the DSCP part of
  the octet is only 6 bits (2474 section 3), and that bits 6 & 7 "MUST/SHOULD
  be zero on transmission and MUST/SHOULD be ignored by the recipient".

  Another way to ask the question here is: if ECN is not to be specified as
  part of this octet (and IMHO it should not be), which ranges of 6 bit
  values are permitted: [0..63], with the understanding this will be shifted
  before setting the octet, or [0,4,8,12,...,252]?  Given the text "It
  specifies the setting of the one-octet...", I think it implies the latter,
  but some clarification would, I think, be helpful.
2020-11-30
20 Erik Kline
[Ballot comment]
[[ questions ]]

[ section 3.1 ]

* The prohibition against use of Forwardable=false egress IPs I think means
  that IPv4 and …
[Ballot comment]
[[ questions ]]

[ section 3.1 ]

* The prohibition against use of Forwardable=false egress IPs I think means
  that IPv4 and IPv6 link-local addresses cannot be used.  It seems somewhat
  unusual, but not completely outside the realm of reasonable, to have a
  situation where two on-link routers could be configured by their respective
  administrators to use some encapsulation for forwarded packets without
  having to resort to global unicast addresses.

  Are we sure this (odd) use case should be prohibited?

  The final paragraph of this section seems to cover the use of non-reachable
  addresses just fine.  Obviously link-local IPs would need to be exempt from
  section 3.1.1 AS-owned address validation.

[ section 3.3+ ]

* Do any implementations wish to set IPv6 flow labels?

[ section 6 ]

* Might MTU overhead a consideration in tunnel selection?  I.e., given more
  than one tunnel option might an implementation choose based on minimizing
  total overhead?
2020-11-30
20 Erik Kline [Ballot Position Update] New position, Discuss, has been recorded for Erik Kline
2020-11-30
20 Warren Kumari [Ballot comment]
Thanks to Jouni  for the Opsdir review, and authors for addressing them (https://mailarchive.ietf.org/arch/msg/idr/MkQPOktdsUZAkxgv9iqtJgdG4HE)
2020-11-30
20 Warren Kumari [Ballot Position Update] New position, No Objection, has been recorded for Warren Kumari
2020-11-30
20 Roman Danyliw
[Ballot comment]
Thank you to Scott Kelly for performing the SECDIR review.

** Section 1.5.  Per “Because RFC 8365 depends on RFC 5640, it …
[Ballot comment]
Thank you to Scott Kelly for performing the SECDIR review.

** Section 1.5.  Per “Because RFC 8365 depends on RFC 5640, it is similarly obsoleted.”, this seems inconsistent with the meta-data header in the document (as RFC8365 isn’t obsoleted).

** Section 11.  Please use normative language on the applicability text restricting use to a single administrative domain.

OLD
However, it is intended that the Tunnel Encapsulation
  attribute be used only within a well-defined scope, e.g., within a
  set of Autonomous Systems that belong to a single administrative
  entity.

NEW (or something like this)

However, the Tunnel Encapsulation attribute MUST only be used within a well-defined scope such as a set of Autonomous Systems that belong to a single administrative entity.

** Section 12.  Typo. s/tunnelling/tunneling/

** Section 15.  Clarifying text
OLD
"hijacking" of traffic (insertion of
  an undesired node in the path)

NEW
"hijacking" of traffic (insertion of an undesired node in the path allowing for inspection or modification of traffic, or avoidance of security controls)
2020-11-30
20 Roman Danyliw Ballot comment text updated for Roman Danyliw
2020-11-30
20 Roman Danyliw
[Ballot comment]
Thank you to Scott Kelly for performing the SECDIR review.

** Section 1.5.  Per “Because RFC 8365 depends on RFC 5640, it …
[Ballot comment]
Thank you to Scott Kelly for performing the SECDIR review.

** Section 1.5.  Per “Because RFC 8365 depends on RFC 5640, it is similarly obsoleted.”, this seems inconsistent with the meta-data header in the document (as RFC8365 isn’t obsoleted).

** Section 11.  Please use normative language on the applicability text restricting use to a single administrative domain.

OLD
However, it is intended that the Tunnel Encapsulation
  attribute be used only within a well-defined scope, e.g., within a
  set of Autonomous Systems that belong to a single administrative
  entity.

NEW (or something like this)

However, the Tunnel Encapsulation attribute MUST only be used within a well-defined scope such as a set of Autonomous Systems that belong to a single administrative entity.

** Section 12.  Typo. s/tunnelling/tunneling/

** Section 14.2.  Per “Specifically, the following code points should be marked as deprecated”, how does one mark code points as deprecated in the “BGP Tunnel Encapsulation Attribute Tunnel Types” registry (https://www.iana.org/assignments/bgp-parameters/bgp-parameters.xhtml#tunnel-types).  I don’t see such a column, or is the intend simply to update the Reference column to this document?

** Section 15.  Clarifying text
OLD
"hijacking" of traffic (insertion of
  an undesired node in the path)

NEW
"hijacking" of traffic (insertion of an undesired node in the path allowing for inspection or modification of traffic, or avoidance of security controls)
2020-11-30
20 Roman Danyliw Ballot comment text updated for Roman Danyliw
2020-11-30
20 Roman Danyliw
[Ballot comment]
** Section 1.5.  Per “Because RFC 8365 depends on RFC 5640, it is similarly obsoleted.”, this seems inconsistent with the meta-data header …
[Ballot comment]
** Section 1.5.  Per “Because RFC 8365 depends on RFC 5640, it is similarly obsoleted.”, this seems inconsistent with the meta-data header in the document (as RFC8365 isn’t obsoleted).

** Section 11.  Please use normative language on the applicability text restricting use to a single administrative domain.

OLD
However, it is intended that the Tunnel Encapsulation
  attribute be used only within a well-defined scope, e.g., within a
  set of Autonomous Systems that belong to a single administrative
  entity.

NEW (or something like this)

However, the Tunnel Encapsulation attribute MUST only be used within a well-defined scope such as a set of Autonomous Systems that belong to a single administrative entity.

** Section 12.  Typo. s/tunnelling/tunneling/

** Section 14.2.  Per “Specifically, the following code points should be marked as deprecated”, how does one mark code points as deprecated in the “BGP Tunnel Encapsulation Attribute Tunnel Types” registry (https://www.iana.org/assignments/bgp-parameters/bgp-parameters.xhtml#tunnel-types).  I don’t see such a column, or is the intend simply to update the Reference column to this document?

** Section 15.  Clarifying text
OLD
"hijacking" of traffic (insertion of
  an undesired node in the path)

NEW
"hijacking" of traffic (insertion of an undesired node in the path allowing for inspection or modification of traffic, or avoidance of security controls)
2020-11-30
20 Roman Danyliw [Ballot Position Update] New position, No Objection, has been recorded for Roman Danyliw
2020-11-30
20 Robert Wilton
[Ballot comment]
Hi,

Thanks for this document.  I have no significant comments.

Like Martin, I'm also somewhat confused by this text "Because RFC 8365 depends …
[Ballot comment]
Hi,

Thanks for this document.  I have no significant comments.

Like Martin, I'm also somewhat confused by this text "Because RFC 8365 depends on RFC 5640, it is similarly obsoleted.", since it appears that RFC 8365 isn't really being formally obsoleted.

From a manageability perspective, are there any addition data nodes required to the BGP YANG data model, or augmentations to that model?  If so, are these being taken care of in another draft or subsumed into existing YANG modelling work?

Regards,
Rob
2020-11-30
20 Robert Wilton [Ballot Position Update] New position, No Objection, has been recorded for Robert Wilton
2020-11-30
20 Éric Vyncke
[Ballot comment]
Thank you for the work put into this document.

Please find below some non-blocking COMMENT points, and one generic nit.

I hope that …
[Ballot comment]
Thank you for the work put into this document.

Please find below some non-blocking COMMENT points, and one generic nit.

I hope that this helps to improve the document,

Regards,

-éric

== COMMENTS ==

-- Abstract --
A very generic comment about the abstract that is mainly about RFC 5512. I find it a little surprising as it describes the protocol that this document obsoletes... I would have preferred an abstract describing what this document does w/o citing RFC 5512 (except of course at the end of the abstract).

-- Section 1.4 --

It is a little unclear what "these deficiencies" are ? Perhaps add a reference to previous section 1.2 ?

-- Section 3 --
Would it be easier for the reader to either have a summary table of all sub-TLV types or repeat the type code in all sub-section headings?

-- Section 3.2.1 and 3.2.2 --
While the assumption of a 48-bit MAC address is correct in 2020 (barring FireWire, IEEE 802.5.14), it also limits the usability of this document to a set of data-link layers.

Should the length of the "Reserved" field be specified ?

-- Section 3.3 --
Should the value of IPv6 Flow Label or any IPv6 extension header (e.g., hop by hop or destination headers) be specified ?

-- Section 3.6 --
If not mistaken, RFC 8669 is only about SR-MPLS. So, I wonder whether the authors also think to add a similar feature for SRv6 ?

-- Sections 5 & 12 --
Unsure whether this paragraph is really useful, isn't it implicit ? (I am of course fine in either case)

== NITS ==

I find the choice of "encapsulation sub-TLV" a poor choice as it can easily be confused with "encapsulation TLV" (section 2) but I guess the train has left the station ;-)
2020-11-30
20 Éric Vyncke [Ballot Position Update] New position, No Objection, has been recorded for Éric Vyncke
2020-11-29
20 Martin Vigoureux
[Ballot comment]
Hi

thank you for the work you put in this document.
I only have minor comments/questions (though a couple of ones might be …
[Ballot comment]
Hi

thank you for the work you put in this document.
I only have minor comments/questions (though a couple of ones might be a bit more important than the rest).


  Because RFC 8365 depends on RFC 5640, it is similarly obsoleted.
  This is further discussed in Appendix A.
But neither the abstract nor the metadata mention this, and in fact Appendix A is not clear about whether RFC 8365 is effectively obsoleted.


Not critical but IANA registration of the Tunnel Encapsulation Attribute is with a upper-case 'A', while through out the document lower-case 'a' is used.


  A Tunnel Encapsulation TLV, also known as Tunnel TLV
but in the document you most often omit using Tunnel, thus reducing it to TLV.


  The Reserved subfield SHOULD be originated as zero.  It MUST be
  disregarded on receipt, and it MUST be propagated unchanged.
In the rest of the document, for unused bits or reserved fields you require MUST be zero.
Any reason for different levels of requirements?


  The Address Family subfield contains a value from IANA's "Address
  Family Numbers" registry.  This document assumes that the Address
  Family is either IPv4 or IPv6; use of other address families is
  outside the scope of this document.

  If the Address Family subfield has any value other than IPv4 or IPv6,
  the Tunnel Egress Endpoint sub-TLV is considered "unrecognized"
Not critical but I have the impression that these two paragraphs slightly contradict each other. First one allows for other AFIs to be used in the future in the Address Family subfield, while the second kind of rules that out. Maybe simply add at the beginning of the second paragraph: "In the context of this specification,".


  Note that in order to send an IP packet or an MPLS packet through a
  VXLAN tunnel, the packet must first be encapsulated in an Ethernet
  header, which becomes the "inner Ethernet header" described in
  [RFC7348].  The VXLAN Encapsulation sub-TLV may contain information
  (e.g.,the MAC address) that is used to form this Ethernet header.
This seems redundant with the last paragraph of the second bullet above (in the document)


  sub-TLVs must be used
MUST?


      0 1 2 3 4 5 6 7
    +-+-+-+-+-+-+-+-+
    |    0 or 1                |
    +-+-+-+-+-+-+-+-+
Should the values be 1 or 2 instead? At least the text says the only two allowed values are 1 and 2.


  If a Label-Index is present in the Prefix-SID sub-TLV, then when a
  packet is sent through the tunnel identified by the TLV, if that
  tunnel is from a labeled address family
do you mean from "a BGP UPDATE of a labeled address family" ?


  document specifying such joint use should provide details
SHOULD?


    +--------------+--------------------------------+-----------------+
    |      0      | V (Virtual Network Identifier) | (this document) |

          +--------------+-----------------+-----------------+
          |      0      | V (VN-ID)      | (this document) |

Purely cosmetic, but may be choose VN-ID or Virtual Network Identifier as the same name for the two allocations.


Nits
"Value Field" in the Fig1 and Fig2 legends seems superfluous.
s/In this case, the length field/In this case, the Length field/
s/address subfield/Address subfield/ (6 occurrences)
s/depicted in the Address Field/depicted in the Address subfield/ (3 occurrences, including Section 3.1.1 title)
s/Tunnel Type itself/tunnel type itself/?
s/value field/Value field/ (17 occurrences + 6 occurrences with line break between the two words)
s/Reserved (two fields)/Reserved (two octets)/ (twice)
s/The flags field of the VXLAN header/The flags field of the NVGRE header/ (in the NVGRE section)
s/Inner Destination MAC address/Inner Destination MAC Address/
s/of the cookie/of the Cookie/
s/procedures of Section 9/procedures of Section 9)/
s/VNI (Virtual Network Identifier)/VNI (VXLAN Network Identifier)/
2020-11-29
20 Martin Vigoureux [Ballot Position Update] New position, No Objection, has been recorded for Martin Vigoureux
2020-11-24
20 Bernie Volz Request for Telechat review by INTDIR is assigned to David Lamparter
2020-11-24
20 Bernie Volz Request for Telechat review by INTDIR is assigned to David Lamparter
2020-11-24
20 Bernie Volz Request for Telechat review by INTDIR is assigned to Basavaraj Patil
2020-11-24
20 Bernie Volz Request for Telechat review by INTDIR is assigned to Basavaraj Patil
2020-11-24
20 Éric Vyncke Requested Telechat review by INTDIR
2020-11-20
20 Éric Vyncke Requested Telechat review by INTDIR
2020-11-19
20 Amanda Baber IANA Review state changed to IANA OK - Actions Needed from Version Changed - Review Needed
2020-11-19
20 Tero Kivinen Request for Last Call review by SECDIR Completed: Ready. Reviewer: Scott Kelly. Submission of review completed at an earlier date.
2020-11-15
20 Tero Kivinen Request for Last Call review by SECDIR Completed: Ready. Reviewer: Scott Kelly.
2020-11-13
20 Amy Vezza Placed on agenda for telechat - 2020-12-03
2020-11-13
20 Alvaro Retana IESG state changed to IESG Evaluation from Waiting for AD Go-Ahead::External Party
2020-11-13
20 Alvaro Retana Ballot has been issued
2020-11-13
20 Alvaro Retana [Ballot Position Update] New position, Yes, has been recorded for Alvaro Retana
2020-11-13
20 Alvaro Retana Created "Approve" ballot
2020-11-13
20 Alvaro Retana
As required by RFC 4858, this is the current template for the Document
Shepherd Write-Up. Changes are expected over time. This version is dated …
As required by RFC 4858, this is the current template for the Document
Shepherd Write-Up. Changes are expected over time. This version is dated 24 February 2012.

(1) What type of RFC is being requested (BCP, Proposed Standard,
Internet Standard, Informational, Experimental, or Historic)?  Why
is this the proper type of RFC?  Is this type of RFC indicated in the
title page header?

Proposed Standard.

The document defines procedures and operation for BGP. Further,
it makes requests to IANA and obsoletes a PS RFC.

The header indicates Standards Track.

(2) The IESG approval announcement includes a Document Announcement
Write-Up. Please provide such a Document Announcement Write-Up. Recent
examples can be found in the "Action" announcements for approved
documents. The approval announcement contains the following sections:

Technical Summary

  RFC 5512 defines a BGP Path Attribute known as the "Tunnel
  Encapsulation Attribute".  This attribute allows one to specify a set
  of tunnels.  For each such tunnel, the attribute can provide the
  information needed to create the tunnel and the corresponding
  encapsulation header.  The attribute can also provide information
  that aids in choosing whether a particular packet is to be sent
  through a particular tunnel.  RFC 5512 states that the attribute is
  only carried in BGP UPDATEs that have the "Encapsulation Subsequent
  Address Family (Encapsulation SAFI)".  This document deprecates the
  Encapsulation SAFI (which has never been used in production), and
  specifies semantics for the attribute when it is carried in UPDATEs
  of certain other SAFIs.  This document adds support for additional
  tunnel types, and allows a remote tunnel endpoint address to be
  specified for each tunnel.  This document also provides support for
  specifying fields of any inner or outer encapsulations that may be
  used by a particular tunnel.

Working Group Summary

  Was there anything in WG process that is worth noting? For
  example, was there controversy about particular points or
  were there decisions where the consensus was particularly
  rough?
 
The document went through two full WGLCs. The first one, for draft
-04, generated a substantial amount of discussion.  It concluded on
June 9, 2017 without consensus to proceed, but did result in
extensive review and discussion, with all points that were raised
either being reflected in the later versions of the draft, or
otherwise resolved. The chairs' summary of the WGLC is at
https://www.ietf.org/mail-archive/web/idr/current/msg18246.html

The second one, for draft -07 (with cc OSPF and BESS since they both
normatively reference the draft) concluded October 20, 2017 with some
support and no dissent.  Given the extensive review and discussion as
part of the first WGLC, the chairs were satisified with this outcome.

Subsequent to the second WGLC, further issues were reported by
implementors (this is why IDR has an implementation requirement!).
Some issues also were found by the document shepherd in the course
of preparing this report. The related updates brought the draft
version up to -12. We had an "additional comment period" to allow
the WG to raise any concerns related to the changes, the thread can
be found at
https://mailarchive.ietf.org/arch/browse/idr/?gbt=1&index=3_Fmk0Ble3VaAaDzAqt7heOpfc4

Finally, an editorial issue was surfaced in the course of
a WG discussion about a number of different SD-WAN related proposals.
A number of readers considered the use of the term "remote tunnel endpoint"
confusing since it wasn't clear from what point of view the tunnel was
considered "remote". That discussion can be found, in part, at
https://mailarchive.ietf.org/arch/browse/idr/?gbt=1&index=vPmpkz7tPWfo0laWHRtLayMF5ZA
Although it sprawled across a few threads, this is the one that concludes
them. The authors eventually decided to revise their terminology to
change "remote tunnel endpoint" to "tunnel egress endpoint" in -13; this
settled the issue.

        John Scudder, the initial WG shepherd, added so much in the editorial process
        that the co-authors felt John should be a co-author.  Due to this the
      Shepherd was changed to Susan Hares with version 19 (-19.txt). 
      Susan Hares did a fresh analysis of the internet draft. 

Document Quality

  Are there existing implementations of the protocol? Have a
  significant number of vendors indicated their plan to
  implement the specification? Are there any reviewers that
  merit special mention as having done a thorough review,
  e.g., one that resulted in important changes or a
  conclusion that the document had no substantive issues? If
  there was a MIB Doctor, Media Type or other expert review,
  what was its course (briefly)? In the case of a Media Type
  review, on what date was the request posted?
 
  The IDR implementation report page is at
  https://trac.ietf.org/trac/idr/wiki/draft-ietf-idr-tunnel-encaps%20implementations

Personnel

  Who is the Document Shepherd? Who is the Responsible Area
  Director?
 
        The initial document shepherd was John Scudder
  The current document shepherd is Susan Hares.
  The responsible AD is Alvaro Retana.

(3) Briefly describe the review of this document that was performed by
the Document Shepherd.  If this version of the document is not ready
for publication, please explain why the document is being forwarded to
the IESG.

The document shepherd has read the draft in detail several times
during the course of its development, and worked with the authors to
address comments. This includes a review of the current version.

      The document shepherd took a fresh review of the document.
      This review took the followinng steps:

      1) Examination of the technology within its use cases, 
      the RFC deprecated (RFC 5512, RFC5566, RFC5640),
      any RFC related to this work (RFC7510) or with an alternate
        tunnel approach with BGP support (PMSI, RFC8365). 

    The list of drafts related to PMSI approach included
    many of the MVPN and EVPn work done by L3VPN, L2VPN or BESS
    (RFC7432, RFC8277, RFC6514, RFC7153, RFC7432, RFC 7524,
      RFC7716,. RFC7988), and the EVPN
    BESS drafts approved for publication
      draft-ietf-bess-evpn-prefix-advertisement).
     
    2) Exmination of the use of tunnels for NSH control
      plane for SFC .  BESS has approved
      drafts-ietf-bess-nsh-bgp-control-plane-18 for
      publication. 

    3) Examination of IDR Drafts approved for publication
      for BGP-LS/Segment Routing and flow specification 
      (draft-ietf-bgp-ls-sgement-routing-ext-16.txt
      draft-ietf-bgpls-segment-routing-epe-19.txt,
      draft-ietf-idr-rfc5575bis.txt).

    4) The shepherd also examined all drafts adopted by
      BESS and IDR for interactions with the
      tunnel-encapsulation specification. 

    5) The shepherd also reviewd the -19.txt version for textual consistency.

      The shepherd wrote up the results in a
    16 page write-up that was sent to Alvaro, John Scudder and the author group.
      A majority of the write-up was a report on the RFC and drafts in BESS and
    IDR described above.  The report indicated 6 technical
    points plus editorial points. 
   
    -20.txt addressed technical and editorial points in the write-up.

    The tunnel-encapsulation work and related work in VPNs, (IP-VPNs,
    EVPNs, M-VPNs, etc) stands on the shoulders of work in IDR, L3VPN, L2VPN
    BESS.  The authors have carefully inserted the GP tunnel-encapsulation
  attribute into this complex set of VPN technology. 

  This draft provides a careful insertion with notes on what RFCs are
  obsoleted.  The shpeherd notes that other VPN drafts  (EVPN,
    VPN for SFC, NVO3 VPN, M-VPN, SR VPNs)  that rely on tunnels 
    need to be as careful in their examination of the existing technology.
   
    As a WG chair of IDR, this shepherd will pass along the insights learned
    to IDR and BESS chairs.   

  The second shepherd has worked with 3 proposals for replacement of the
  secure IP-VPN tunnel type using the tunnel-encapsulation for 3 years. 
  These implementations have three different types of
  application (within an AS or AS-Confederation,  SDWAN, and
  Secure E-VPN.  The proposed implementations were vetted by the
security experts at an open meeting at IETF 104. 
This work in secure IP-VPN is moving slower than the general
  tunnel-encapsulation.  Since IDR requires 2 implementations to
  forward drafts to the IESG, the IP-in IP tunnel with IPSec transport
  and the MPLS-in-IP tunnel with IPsec Transport were deprecated.
  It is expected that the replacement for these deprecated functions
  will eventually mature to the point of having 2 interoperable implementations 

(4) Does the document Shepherd have any concerns about the depth or
breadth of the reviews that have been performed?

No. 

(5) Do portions of the document need review from a particular or from
broader perspective, e.g., security, operational complexity, AAA, DNS,
DHCP, XML, or internationalization? If so, describe the review that
took place.

No.  IETF LC reviews were request for Internet Directorate (tunnel MTUs),
      Op/NM directorate, Security Directorate and Transport Directorate. 
      All directorate reviews received have been addressed by -20.txt.

        The security directorate reviewed has not completed the review as of 11/6/2020.


(6) Describe any specific concerns or issues that the Document Shepherd
has with this document that the Responsible Area Director and/or the
IESG should be aware of? For example, perhaps he or she is uncomfortable
with certain parts of the document, or has concerns whether there really
is a need for it. In any event, if the WG has discussed those issues and
has indicated that it still wishes to advance the document, detail those
concerns here.

None.

(7) Has each author confirmed that any and all appropriate IPR
disclosures required for full conformance with the provisions of BCP 78
and BCP 79 have already been filed. If not, explain why.

Authors have so confirmed.  (see discussion -04.txt)

Keyur Patel:
https://mailarchive.ietf.org/arch/msg/idr/uv9syrZ24jlArwSpIapNoRy_NME/

Gunter Van de Velde
https://mailarchive.ietf.org/arch/msg/idr/HVP3wzhaIA8PkIrS4Pem9Gb6qAE/

Srihari R. Sangli
https://mailarchive.ietf.org/arch/msg/idr/xjaGqKL4VTpvTApXOs0wwo_ag1E/

John Scudder:
https://mailarchive.ietf.org/arch/msg/idr/A5m3eu6-5VPHUbmWk_TxgYeBJyg/


Eric Rosen (RFC 5512 author)
https://mailarchive.ietf.org/arch/msg/idr/uv9syrZ24jlArwSpIapNoRy_NME/


(8) Has an IPR disclosure been filed that references this document?
If so, summarize any WG discussion and conclusion regarding the IPR
disclosures.

no IPR disclosure.

(9) How solid is the WG consensus behind this document? Does it
represent the strong concurrence of a few individuals, with others
being silent, or does the WG as a whole understand and agree with it? 

Considering the amount of conversation on the mailing list and
at the in-person meetings, discussed above under "working group
summary", I'd say it has broad consensus.

The draft has implementations in cisco (partial), FRR (Free Range Routing, partail),
and JunOS (full).  In addition, these implementations have increased
functionality since initial IETF LC.

https://trac.ietf.org/trac/idr/wiki/draft-ietf-idr-tunnel-encaps%20implementations
 
(10) Has anyone threatened an appeal or otherwise indicated extreme
discontent? If so, please summarise the areas of conflict in separate
email messages to the Responsible Area Director. (It should be in a
separate email because this questionnaire is publicly available.)

No.

(11) Identify any ID nits the Document Shepherd has found in this
document. (See https://www.ietf.org/tools/idnits/ and the Internet-Drafts
Checklist). Boilerplate checks are not enough; this check needs to be
thorough.

        Bogus comment on RFC5566 and RFC5640 since text states: 

    "Since RFCs 5566 and 5640 rely on
    RFC 5512, they are likewise obsoleted." 

  I will suggest to authors in the next revision to place
  "RFC5566 and RFC5640" to make Id nits stop complaining

Idnits complains about downrefs. See answer to (15).
 

(12) Describe how the document meets any required formal review
criteria, such as the MIB Doctor, media type, and URI type reviews.

N/A

(13) Have all references within this document been identified as
either normative or informative?

Yes.

(14) Are there normative references to documents that are not ready for
advancement or are otherwise in an unclear state? If such normative
references exist, what is the plan for their completion?

    No.

(15) Are there downward normative references references (see RFC 3967)?
If so, list these downward references to support the Area Director in
the Last Call procedure. 

  Note: during IETF LC 
o RFC 7348 ("Virtual eXtensible Local Area Network (VXLAN): A
  Framework for Overlaying Virtualized Layer 2 Networks over Layer
  3 Networks")
o RFC 7637 ("NVGRE: Network Virtualization Using Generic Routing
  Encapsulation")

These two are Informational, ISE stream documents. The relevant
case in RFC 3967 is:

  o  A standards document may need to refer to a proprietary protocol,
          and the IETF normally documents proprietary protocols using
          informational RFCs.
   
        These downrefs are needed.


(16) Will publication of this document change the status of any
existing RFCs? Are those RFCs listed on the title page header, listed
in the abstract, and discussed in the introduction? If the RFCs are not
listed in the Abstract and Introduction, explain why, and point to the
part of the document where the relationship of this document to the
other RFCs is discussed. If this information is not in the document,
explain why the WG considers it unnecessary.

Yes, RFC 5512, RFC5566, and RFC5640 are obsoleted
    and the reasons adequately discussed.

    [RFC8365] references RFC 5512 for its definition of the BGP
  Encapsulation Extended Community.  The impact of deprecating
  RFC5512 is discussed in Appendix A.  A RFC8365bis is recommended.

(17) Describe the Document Shepherd's review of the IANA considerations
section, especially with regard to its consistency with the body of the
document. Confirm that all protocol extensions that the document makes
are associated with the appropriate reservations in IANA registries.
Confirm that any referenced IANA registries have been clearly
identified. Confirm that newly created IANA registries include a
detailed specification of the initial contents for the registry, that
allocations procedures for future registrations are defined, and a
reasonable name for the new registry has been suggested (see RFC 5226).

Confirmed.

(18) List any new IANA registries that require Expert Review for future
allocations. Provide any public guidance that the IESG would find
useful in selecting the IANA Experts for these new registries.

N/A

(19) Describe reviews and automated checks performed by the Document
Shepherd to validate sections of the document written in a formal
language, such as XML code, BNF rules, MIB definitions, etc.

N/A
2020-11-12
20 Susan Hares
As required by RFC 4858, this is the current template for the Document
Shepherd Write-Up. Changes are expected over time. This version is dated …
As required by RFC 4858, this is the current template for the Document
Shepherd Write-Up. Changes are expected over time. This version is dated 24 February 2012.

(1) What type of RFC is being requested (BCP, Proposed Standard,
Internet Standard, Informational, Experimental, or Historic)?  Why
is this the proper type of RFC?  Is this type of RFC indicated in the
title page header?

Proposed Standard.

The document defines procedures and operation for BGP. Further,
it makes requests to IANA and obsoletes a PS RFC.

The header indicates Standards Track.

(2) The IESG approval announcement includes a Document Announcement
Write-Up. Please provide such a Document Announcement Write-Up. Recent
examples can be found in the "Action" announcements for approved
documents. The approval announcement contains the following sections:

Technical Summary

  RFC 5512 defines a BGP Path Attribute known as the "Tunnel
  Encapsulation Attribute".  This attribute allows one to specify a set
  of tunnels.  For each such tunnel, the attribute can provide the
  information needed to create the tunnel and the corresponding
  encapsulation header.  The attribute can also provide information
  that aids in choosing whether a particular packet is to be sent
  through a particular tunnel.  RFC 5512 states that the attribute is
  only carried in BGP UPDATEs that have the "Encapsulation Subsequent
  Address Family (Encapsulation SAFI)".  This document deprecates the
  Encapsulation SAFI (which has never been used in production), and
  specifies semantics for the attribute when it is carried in UPDATEs
  of certain other SAFIs.  This document adds support for additional
  tunnel types, and allows a remote tunnel endpoint address to be
  specified for each tunnel.  This document also provides support for
  specifying fields of any inner or outer encapsulations that may be
  used by a particular tunnel.

Working Group Summary

  Was there anything in WG process that is worth noting? For
  example, was there controversy about particular points or
  were there decisions where the consensus was particularly
  rough?
 
The document went through two full WGLCs. The first one, for draft
-04, generated a substantial amount of discussion.  It concluded on
June 9, 2017 without consensus to proceed, but did result in
extensive review and discussion, with all points that were raised
either being reflected in the later versions of the draft, or
otherwise resolved. The chairs' summary of the WGLC is at
https://www.ietf.org/mail-archive/web/idr/current/msg18246.html

The second one, for draft -07 (with cc OSPF and BESS since they both
normatively reference the draft) concluded October 20, 2017 with some
support and no dissent.  Given the extensive review and discussion as
part of the first WGLC, the chairs were satisified with this outcome.

Subsequent to the second WGLC, further issues were reported by
implementors (this is why IDR has an implementation requirement!).
Some issues also were found by the document shepherd in the course
of preparing this report. The related updates brought the draft
version up to -12. We had an "additional comment period" to allow
the WG to raise any concerns related to the changes, the thread can
be found at
https://mailarchive.ietf.org/arch/browse/idr/?gbt=1&index=3_Fmk0Ble3VaAaDzAqt7heOpfc4

Finally, an editorial issue was surfaced in the course of
a WG discussion about a number of different SD-WAN related proposals.
A number of readers considered the use of the term "remote tunnel endpoint"
confusing since it wasn't clear from what point of view the tunnel was
considered "remote". That discussion can be found, in part, at
https://mailarchive.ietf.org/arch/browse/idr/?gbt=1&index=vPmpkz7tPWfo0laWHRtLayMF5ZA
Although it sprawled across a few threads, this is the one that concludes
them. The authors eventually decided to revise their terminology to
change "remote tunnel endpoint" to "tunnel egress endpoint" in -13; this
settled the issue.

        John Scudder, the initial WG shepherd, added so much in the editorial process
        that the co-authors felt John should be a co-author.  Due to this the
      Shepherd was changed to Susan Hares with version 19 (-19.txt). 
      Susan Hares did a fresh analysis of the internet draft. 

Document Quality

  Are there existing implementations of the protocol? Have a
  significant number of vendors indicated their plan to
  implement the specification? Are there any reviewers that
  merit special mention as having done a thorough review,
  e.g., one that resulted in important changes or a
  conclusion that the document had no substantive issues? If
  there was a MIB Doctor, Media Type or other expert review,
  what was its course (briefly)? In the case of a Media Type
  review, on what date was the request posted?
 
  The IDR implementation report page is at
  https://trac.ietf.org/trac/idr/wiki/draft-ietf-idr-tunnel-encaps%20implementations

Personnel

  Who is the Document Shepherd? Who is the Responsible Area
  Director?
 
        The initial document shepherd was John Scudder
  The current document shepherd is Susan Hares.
  The responsible AD is Alvaro Retana.

(3) Briefly describe the review of this document that was performed by
the Document Shepherd.  If this version of the document is not ready
for publication, please explain why the document is being forwarded to
the IESG.

The document shepherd has read the draft in detail several times
during the course of its development, and worked with the authors to
address comments. This includes a review of the current version.

      The document shepherd took a fresh review of the document.
      This review took the followinng steps:

      1) Examination of the technology within its use cases, 
      the RFC deprecated (RFC 5512, RFC5566, RFC5640),
      any RFC related to this work (RFC7510) or with an alternate
        tunnel approach with BGP support (PMSI, RFC8365). 

    The list of drafts related to PMSI approach included
    many of the MVPN and EVPn work done by L3VPN, L2VPN or BESS
    (RFC7432, RFC8277, RFC6514, RFC7153, RFC7432, RFC 7524,
      RFC7716,. RFC7988), and the EVPN
    BESS drafts approved for publication
      draft-ietf-bess-evpn-prefix-advertisement).
     
    2) Exmination of the use of tunnels for NSH control
      plane for SFC .  BESS has approved
      drafts-ietf-bess-nsh-bgp-control-plane-18 for
      publication. 

    3) Examination of IDR Drafts approved for publication
      for BGP-LS/Segment Routing and flow specification 
      (draft-ietf-bgp-ls-sgement-routing-ext-16.txt
      draft-ietf-bgpls-segment-routing-epe-19.txt,
      draft-ietf-idr-rfc5575bis.txt).

    4) The shepherd also examined all drafts adopted by
      BESS and IDR for interactions with the
      tunnel-encapsulation specification. 

    5) The shepherd also reviewd the -19.txt version for textual consistency.

      The shepherd wrote up the results in a
    16 page write-up that was sent to Alvaro, John Scudder and the author group.
      A majority of the write-up was a report on the RFC and drafts in BESS and
    IDR described above.  The report indicated 6 technical
    points plus editorial points. 
   
    -20.txt addressed technical and editorial points in the write-up.

    The tunnel-encapsulation work and related work in VPNs, (IP-VPNs,
    EVPNs, M-VPNs, etc) stands on the shoulders of work in IDR, L3VPN, L2VPN
    BESS.  The authors have carefully inserted the GP tunnel-encapsulation
  attribute into this complex set of VPN technology. 

  This draft provides a careful insertion with notes on what RFCs are
  obsoleted.  The shpeherd notes that other VPN drafts  (EVPN,
    VPN for SFC, NVO3 VPN, M-VPN, SR VPNs)  that rely on tunnels 
    need to be as careful in their examination of the existing technology.
   
    As a WG chair of IDR, this shepherd will pass along the insights learned
    to IDR and BESS chairs.   

  The second shepherd has worked with 3 proposals for replacement of the
  secure IP-VPN tunnel type using the tunnel-encapsulation for 3 years. 
  These implementations have three different types of
  application (within an AS or AS-Confederation,  SDWAN, and
  Secure E-VPN.  The proposed implementations were vetted by the
security experts at an open meeting at IETF 104. 
This work in secure IP-VPN is moving slower than the general
  tunnel-encapsulation.  Since IDR requires 2 implementations to
  forward drafts to the IESG, the IP-in IP tunnel with IPSec transport
  and the MPLS-in-IP tunnel with IPsec Transport were deprecated.
  It is expected that the replacement for these deprecated functions
  will eventually mature to the point of having 2 interoperable implementations 

(4) Does the document Shepherd have any concerns about the depth or
breadth of the reviews that have been performed?

No. 

(5) Do portions of the document need review from a particular or from
broader perspective, e.g., security, operational complexity, AAA, DNS,
DHCP, XML, or internationalization? If so, describe the review that
took place.

No.  IETF LC reviews were request for Internet Directorate (tunnel MTUs),
      Op/NM directorate, Security Directorate and Transport Directorate. 
      All directorate reviews received have been addressed by -20.txt.

        The security directorate reviewed has not completed the review as of 11/6/2020.


(6) Describe any specific concerns or issues that the Document Shepherd
has with this document that the Responsible Area Director and/or the
IESG should be aware of? For example, perhaps he or she is uncomfortable
with certain parts of the document, or has concerns whether there really
is a need for it. In any event, if the WG has discussed those issues and
has indicated that it still wishes to advance the document, detail those
concerns here.

None.

(7) Has each author confirmed that any and all appropriate IPR
disclosures required for full conformance with the provisions of BCP 78
and BCP 79 have already been filed. If not, explain why.

Authors have so confirmed.  (see discussion -04.txt)

Keyur Patel:
https://mailarchive.ietf.org/arch/msg/idr/uv9syrZ24jlArwSpIapNoRy_NME/

Gunter Van de Velde
https://mailarchive.ietf.org/arch/msg/idr/HVP3wzhaIA8PkIrS4Pem9Gb6qAE/

Srihari R. Sangli
https://mailarchive.ietf.org/arch/msg/idr/xjaGqKL4VTpvTApXOs0wwo_ag1E/

John Scudder:
https://mailarchive.ietf.org/arch/msg/idr/A5m3eu6-5VPHUbmWk_TxgYeBJyg/


Eric Rosen (RFC 5512 author)
https://mailarchive.ietf.org/arch/msg/idr/uv9syrZ24jlArwSpIapNoRy_NME/


(8) Has an IPR disclosure been filed that references this document?
If so, summarize any WG discussion and conclusion regarding the IPR
disclosures.

no IPR disclosure.

(9) How solid is the WG consensus behind this document? Does it
represent the strong concurrence of a few individuals, with others
being silent, or does the WG as a whole understand and agree with it? 

Considering the amount of conversation on the mailing list and
at the in-person meetings, discussed above under "working group
summary", I'd say it has broad consensus.

The draft has implementations in cisco (partial), FRR (Free Range Routing, partail),
and JunOS (full).  In addition, these implementations have increased
functionality since initial IETF LC.

https://trac.ietf.org/trac/idr/wiki/draft-ietf-idr-tunnel-encaps%20implementations
 
(10) Has anyone threatened an appeal or otherwise indicated extreme
discontent? If so, please summarise the areas of conflict in separate
email messages to the Responsible Area Director. (It should be in a
separate email because this questionnaire is publicly available.)

No.

(11) Identify any ID nits the Document Shepherd has found in this
document. (See https://www.ietf.org/tools/idnits/ and the Internet-Drafts
Checklist). Boilerplate checks are not enough; this check needs to be
thorough.

        Bogus comment on RFC5566 and RFC5640 since text states: 

    "Since RFCs 5566 and 5640 rely on
    RFC 5512, they are likewise obsoleted." 

  I will suggest to authors in the next revision to place
  "RFC5566 and RFC5640" to make Id nits stop complaining

Idnits complains about downrefs. See answer to (15).
        See resolution in (15).
 

(12) Describe how the document meets any required formal review
criteria, such as the MIB Doctor, media type, and URI type reviews.

N/A

(13) Have all references within this document been identified as
either normative or informative?

Yes.

(14) Are there normative references to documents that are not ready for
advancement or are otherwise in an unclear state? If such normative
references exist, what is the plan for their completion?

      Original shephred (John Scudder):
Yes, there is a reference to draft-ietf-nvo3-vxlan-gpe.
      The NVO3 chairs state that their WG plans to advance this draft
following advancement of Geneve, and that Geneve has been
sent to the IESG for advancement. So, it appears GPE will be
ready for advancement soon.

      Sue:  Advancement is slow so John Scudder and Author team
      will move draft--ietf-nv03-vxlan-gpe out of document in next revision.

(15) Are there downward normative references references (see RFC 3967)?
If so, list these downward references to support the Area Director in
the Last Call procedure. 

(See two note sections denoted as Note 1 and Note 2)

  Note 1: during IETF LC 
o RFC 7348 ("Virtual eXtensible Local Area Network (VXLAN): A
  Framework for Overlaying Virtualized Layer 2 Networks over Layer
  3 Networks")
o RFC 7637 ("NVGRE: Network Virtualization Using Generic Routing
  Encapsulation")
o draft-ietf-nvo3-vxlan-gpe ("Generic Protocol Extension for VXLAN")

The first two are Informational, ISE stream documents. The relevant
case in RFC 3967 is:

  o  A standards document may need to refer to a proprietary protocol,
          and the IETF normally documents proprietary protocols using
          informational RFCs.
         
    draft-ietf-nvo3-vxlan-gpe which currently lists its intended status
    as "informational"; the authors and NVO3 chairs confirm this is
    correct. It's my opinion that this downref is ok in the spirit of
    the above, even though the draft is an IETF product. Given that the
    tunnel-encaps specification is extensible, it seems overly
    restrictive to prevent it from being extended to signal a particular
    encapsulation just because that encapsulation is specified in an
    informational document.
   
    Importantly, the "informational" references, while normative
    in the sense that the specification can't be fully understood without
    understanding the references as well, are NOT required for the core
    elements of the specification. It would be possible to produce an
    implementation of the specification that complies and interoperates
    but doesn't support any of the encapsulations in the downref specs.


(16) Will publication of this document change the status of any
existing RFCs? Are those RFCs listed on the title page header, listed
in the abstract, and discussed in the introduction? If the RFCs are not
listed in the Abstract and Introduction, explain why, and point to the
part of the document where the relationship of this document to the
other RFCs is discussed. If this information is not in the document,
explain why the WG considers it unnecessary.

Yes, RFC 5512, RFC5566, and RFC5640 are obsoleted
    and the reasons adequately discussed.

    [RFC8365] references RFC 5512 for its definition of the BGP
  Encapsulation Extended Community.  The impact of deprecating
  RFC5512 is discussed in Appendix A.  A RFC8365bis is recommended.

(17) Describe the Document Shepherd's review of the IANA considerations
section, especially with regard to its consistency with the body of the
document. Confirm that all protocol extensions that the document makes
are associated with the appropriate reservations in IANA registries.
Confirm that any referenced IANA registries have been clearly
identified. Confirm that newly created IANA registries include a
detailed specification of the initial contents for the registry, that
allocations procedures for future registrations are defined, and a
reasonable name for the new registry has been suggested (see RFC 5226).

Confirmed.

(18) List any new IANA registries that require Expert Review for future
allocations. Provide any public guidance that the IESG would find
useful in selecting the IANA Experts for these new registries.

N/A

(19) Describe reviews and automated checks performed by the Document
Shepherd to validate sections of the document written in a formal
language, such as XML code, BNF rules, MIB definitions, etc.

N/A
2020-11-10
20 Susan Hares
As required by RFC 4858, this is the current template for the Document
Shepherd Write-Up. Changes are expected over time. This version is dated …
As required by RFC 4858, this is the current template for the Document
Shepherd Write-Up. Changes are expected over time. This version is dated 24 February 2012.

(1) What type of RFC is being requested (BCP, Proposed Standard,
Internet Standard, Informational, Experimental, or Historic)?  Why
is this the proper type of RFC?  Is this type of RFC indicated in the
title page header?

Proposed Standard.

The document defines procedures and operation for BGP. Further,
it makes requests to IANA and obsoletes a PS RFC.

The header indicates Standards Track.

(2) The IESG approval announcement includes a Document Announcement
Write-Up. Please provide such a Document Announcement Write-Up. Recent
examples can be found in the "Action" announcements for approved
documents. The approval announcement contains the following sections:

Technical Summary

  RFC 5512 defines a BGP Path Attribute known as the "Tunnel
  Encapsulation Attribute".  This attribute allows one to specify a set
  of tunnels.  For each such tunnel, the attribute can provide the
  information needed to create the tunnel and the corresponding
  encapsulation header.  The attribute can also provide information
  that aids in choosing whether a particular packet is to be sent
  through a particular tunnel.  RFC 5512 states that the attribute is
  only carried in BGP UPDATEs that have the "Encapsulation Subsequent
  Address Family (Encapsulation SAFI)".  This document deprecates the
  Encapsulation SAFI (which has never been used in production), and
  specifies semantics for the attribute when it is carried in UPDATEs
  of certain other SAFIs.  This document adds support for additional
  tunnel types, and allows a remote tunnel endpoint address to be
  specified for each tunnel.  This document also provides support for
  specifying fields of any inner or outer encapsulations that may be
  used by a particular tunnel.

Working Group Summary

  Was there anything in WG process that is worth noting? For
  example, was there controversy about particular points or
  were there decisions where the consensus was particularly
  rough?
 
The document went through two full WGLCs. The first one, for draft
-04, generated a substantial amount of discussion.  It concluded on
June 9, 2017 without consensus to proceed, but did result in
extensive review and discussion, with all points that were raised
either being reflected in the later versions of the draft, or
otherwise resolved. The chairs' summary of the WGLC is at
https://www.ietf.org/mail-archive/web/idr/current/msg18246.html

The second one, for draft -07 (with cc OSPF and BESS since they both
normatively reference the draft) concluded October 20, 2017 with some
support and no dissent.  Given the extensive review and discussion as
part of the first WGLC, the chairs were satisified with this outcome.

Subsequent to the second WGLC, further issues were reported by
implementors (this is why IDR has an implementation requirement!).
Some issues also were found by the document shepherd in the course
of preparing this report. The related updates brought the draft
version up to -12. We had an "additional comment period" to allow
the WG to raise any concerns related to the changes, the thread can
be found at
https://mailarchive.ietf.org/arch/browse/idr/?gbt=1&index=3_Fmk0Ble3VaAaDzAqt7heOpfc4

Finally, an editorial issue was surfaced in the course of
a WG discussion about a number of different SD-WAN related proposals.
A number of readers considered the use of the term "remote tunnel endpoint"
confusing since it wasn't clear from what point of view the tunnel was
considered "remote". That discussion can be found, in part, at
https://mailarchive.ietf.org/arch/browse/idr/?gbt=1&index=vPmpkz7tPWfo0laWHRtLayMF5ZA
Although it sprawled across a few threads, this is the one that concludes
them. The authors eventually decided to revise their terminology to
change "remote tunnel endpoint" to "tunnel egress endpoint" in -13; this
settled the issue.

        John Scudder, the initial WG shepherd, added so much in the editorial process
        that the co-authors felt John should be a co-author.  Due to this the
      Shepherd was changed to Susan Hares with version 19 (-19.txt). 
      Susan Hares did a fresh analysis of the internet draft. 

Document Quality

  Are there existing implementations of the protocol? Have a
  significant number of vendors indicated their plan to
  implement the specification? Are there any reviewers that
  merit special mention as having done a thorough review,
  e.g., one that resulted in important changes or a
  conclusion that the document had no substantive issues? If
  there was a MIB Doctor, Media Type or other expert review,
  what was its course (briefly)? In the case of a Media Type
  review, on what date was the request posted?
 
  The IDR implementation report page is at
  https://trac.ietf.org/trac/idr/wiki/draft-ietf-idr-tunnel-encaps%20implementations

Personnel

  Who is the Document Shepherd? Who is the Responsible Area
  Director?
 
        The initial document shepherd was John Scudder
  The current document shepherd is Susan Hares.
  The responsible AD is Alvaro Retana.

(3) Briefly describe the review of this document that was performed by
the Document Shepherd.  If this version of the document is not ready
for publication, please explain why the document is being forwarded to
the IESG.

The document shepherd has read the draft in detail several times
during the course of its development, and worked with the authors to
address comments. This includes a review of the current version.

      The document shepherd took a fresh review of the document.
      This review took the followinng steps:

      1) Examination of the technology within its use cases, 
      the RFC deprecated (RFC 5512, RFC5566, RFC5640),
      any RFC related to this work (RFC7510) or with an alternate
        tunnel approach with BGP support (PMSI, RFC8365). 

    The list of drafts related to PMSI approach included
    many of the MVPN and EVPn work done by L3VPN, L2VPN or BESS
    (RFC7432, RFC8277, RFC6514, RFC7153, RFC7432, RFC 7524,
      RFC7716,. RFC7988), and the EVPN
    BESS drafts approved for publication
      draft-ietf-bess-evpn-prefix-advertisement).
     
    2) Exmination of the use of tunnels for NSH control
      plane for SFC .  BESS has approved
      drafts-ietf-bess-nsh-bgp-control-plane-18 for
      publication. 

    3) Examination of IDR Drafts approved for publication
      for BGP-LS/Segment Routing and flow specification 
      (draft-ietf-bgp-ls-sgement-routing-ext-16.txt
      draft-ietf-bgpls-segment-routing-epe-19.txt,
      draft-ietf-idr-rfc5575bis.txt).

    4) The shepherd also examined all drafts adopted by
      BESS and IDR for interactions with the
      tunnel-encapsulation specification. 

    5) The shepherd also reviewd the -19.txt version for textual consistency.

      The shepherd wrote up the results in a
    16 page write-up that was sent to Alvaro, John Scudder and the author group.
      A majority of the write-up was a report on the RFC and drafts in BESS and
    IDR described above.  The report indicated 6 technical
    points plus editorial points. 
   
    -20.txt addressed technical and editorial points in the write-up.

    The tunnel-encapsulation work and related work in VPNs, (IP-VPNs,
    EVPNs, M-VPNs, etc) stands on the shoulders of work in IDR, L3VPN, L2VPN
    BESS.  The authors have carefully inserted the GP tunnel-encapsulation
  attribute into this complex set of VPN technology. 

  This draft provides a careful insertion with notes on what RFCs are
  obsoleted.  The shpeherd notes that other VPN drafts  (EVPN,
    VPN for SFC, NVO3 VPN, M-VPN, SR VPNs)  that rely on tunnels 
    need to be as careful in their examination of the existing technology.
   
    As a WG chair of IDR, this shepherd will pass along the insights learned
    to IDR and BESS chairs.   

  The second shepherd has worked with 3 proposals for replacement of the
  secure IP-VPN tunnel type using the tunnel-encapsulation for 3 years. 
  These implementations have three different types of
  application (within an AS or AS-Confederation,  SDWAN, and
  Secure E-VPN.  The proposed implementations were vetted by the
security experts at an open meeting at IETF 104. 
This work in secure IP-VPN is moving slower than the general
  tunnel-encapsulation.  Since IDR requires 2 implementations to
  forward drafts to the IESG, the IP-in IP tunnel with IPSec transport
  and the MPLS-in-IP tunnel with IPsec Transport were deprecated.
  It is expected that the replacement for these deprecated functions
  will eventually mature to the point of having 2 interoperable implementations 

(4) Does the document Shepherd have any concerns about the depth or
breadth of the reviews that have been performed?

No. 

(5) Do portions of the document need review from a particular or from
broader perspective, e.g., security, operational complexity, AAA, DNS,
DHCP, XML, or internationalization? If so, describe the review that
took place.

No.  IETF LC reviews were request for Internet Directorate (tunnel MTUs),
      Op/NM directorate, Security Directorate and Transport Directorate. 
      All directorate reviews received have been addressed by -20.txt.

        The security directorate reviewed has not completed the review as of 11/6/2020.


(6) Describe any specific concerns or issues that the Document Shepherd
has with this document that the Responsible Area Director and/or the
IESG should be aware of? For example, perhaps he or she is uncomfortable
with certain parts of the document, or has concerns whether there really
is a need for it. In any event, if the WG has discussed those issues and
has indicated that it still wishes to advance the document, detail those
concerns here.

None.

(7) Has each author confirmed that any and all appropriate IPR
disclosures required for full conformance with the provisions of BCP 78
and BCP 79 have already been filed. If not, explain why.

Authors have so confirmed.  (see discussion -04.txt)

Keyur Patel:
https://mailarchive.ietf.org/arch/msg/idr/uv9syrZ24jlArwSpIapNoRy_NME/

Gunter Van de Velde
https://mailarchive.ietf.org/arch/msg/idr/HVP3wzhaIA8PkIrS4Pem9Gb6qAE/

Srihari R. Sangli
https://mailarchive.ietf.org/arch/msg/idr/xjaGqKL4VTpvTApXOs0wwo_ag1E/

John Scudder:
https://mailarchive.ietf.org/arch/msg/idr/A5m3eu6-5VPHUbmWk_TxgYeBJyg/


Eric Rosen (RFC 5512 author)
https://mailarchive.ietf.org/arch/msg/idr/uv9syrZ24jlArwSpIapNoRy_NME/


(8) Has an IPR disclosure been filed that references this document?
If so, summarize any WG discussion and conclusion regarding the IPR
disclosures.

no IPR disclosure.

(9) How solid is the WG consensus behind this document? Does it
represent the strong concurrence of a few individuals, with others
being silent, or does the WG as a whole understand and agree with it? 

Considering the amount of conversation on the mailing list and
at the in-person meetings, discussed above under "working group
summary", I'd say it has broad consensus.
  The draft has implementations in cisco (partial), FRR (Free Range Routing, partail),
and JunOS (full).  In addition, these implementations have increased
functionality since initial IETF LC.

https://trac.ietf.org/trac/idr/wiki/draft-ietf-idr-tunnel-encaps%20implementations
 
(10) Has anyone threatened an appeal or otherwise indicated extreme
discontent? If so, please summarise the areas of conflict in separate
email messages to the Responsible Area Director. (It should be in a
separate email because this questionnaire is publicly available.)

No.

(11) Identify any ID nits the Document Shepherd has found in this
document. (See https://www.ietf.org/tools/idnits/ and the Internet-Drafts
Checklist). Boilerplate checks are not enough; this check needs to be
thorough.

        Bogus comment on RFC5566 and RFC5640 since text states: 

    "Since RFCs 5566 and 5640 rely on
    RFC 5512, they are likewise obsoleted." 

  I will suggest to authors in the next revision to place
  "RFC5566 and RFC5640" to make Id nits stop complaining

Idnits complains about downrefs. See answer to (15).
        See resolution in (15).
 

(12) Describe how the document meets any required formal review
criteria, such as the MIB Doctor, media type, and URI type reviews.

N/A

(13) Have all references within this document been identified as
either normative or informative?

Yes.

(14) Are there normative references to documents that are not ready for
advancement or are otherwise in an unclear state? If such normative
references exist, what is the plan for their completion?

      Original shephred (John Scudder):
Yes, there is a reference to draft-ietf-nvo3-vxlan-gpe.
      The NVO3 chairs state that their WG plans to advance this draft
following advancement of Geneve, and that Geneve has been
sent to the IESG for advancement. So, it appears GPE will be
ready for advancement soon.

      Sue:  Advancement is slow so John Scudder and Author team
      will move draft--ietf-nv03-vxlan-gpe out of document in next revision.

(15) Are there downward normative references references (see RFC 3967)?
If so, list these downward references to support the Area Director in
the Last Call procedure. 

(See two note sections denoted as Note 1 and Note 2)

  Note 1: during IETF LC 
o RFC 7348 ("Virtual eXtensible Local Area Network (VXLAN): A
  Framework for Overlaying Virtualized Layer 2 Networks over Layer
  3 Networks")
o RFC 7637 ("NVGRE: Network Virtualization Using Generic Routing
  Encapsulation")
o draft-ietf-nvo3-vxlan-gpe ("Generic Protocol Extension for VXLAN")

The first two are Informational, ISE stream documents. The relevant
case in RFC 3967 is:

  o  A standards document may need to refer to a proprietary protocol,
          and the IETF normally documents proprietary protocols using
          informational RFCs.
         
    draft-ietf-nvo3-vxlan-gpe which currently lists its intended status
    as "informational"; the authors and NVO3 chairs confirm this is
    correct. It's my opinion that this downref is ok in the spirit of
    the above, even though the draft is an IETF product. Given that the
    tunnel-encaps specification is extensible, it seems overly
    restrictive to prevent it from being extended to signal a particular
    encapsulation just because that encapsulation is specified in an
    informational document.
   
    Importantly, the "informational" references, while normative
    in the sense that the specification can't be fully understood without
    understanding the references as well, are NOT required for the core
    elements of the specification. It would be possible to produce an
    implementation of the specification that complies and interoperates
    but doesn't support any of the encapsulations in the downref specs.

  Note 2: Post IETF L process:
  After IETF LC,  the authors have agreed to move out
  this these two references into another document. 


(16) Will publication of this document change the status of any
existing RFCs? Are those RFCs listed on the title page header, listed
in the abstract, and discussed in the introduction? If the RFCs are not
listed in the Abstract and Introduction, explain why, and point to the
part of the document where the relationship of this document to the
other RFCs is discussed. If this information is not in the document,
explain why the WG considers it unnecessary.

Yes, RFC 5512, RFC5566, and RFC5640 are obsoleted
    and the reasons adequately discussed.

    [RFC8365] references RFC 5512 for its definition of the BGP
  Encapsulation Extended Community.  The impact of deprecating
  RFC5512 is discussed in Appendix A.  A RFC8365bis is recommended.

(17) Describe the Document Shepherd's review of the IANA considerations
section, especially with regard to its consistency with the body of the
document. Confirm that all protocol extensions that the document makes
are associated with the appropriate reservations in IANA registries.
Confirm that any referenced IANA registries have been clearly
identified. Confirm that newly created IANA registries include a
detailed specification of the initial contents for the registry, that
allocations procedures for future registrations are defined, and a
reasonable name for the new registry has been suggested (see RFC 5226).

Confirmed.

(18) List any new IANA registries that require Expert Review for future
allocations. Provide any public guidance that the IESG would find
useful in selecting the IANA Experts for these new registries.

N/A

(19) Describe reviews and automated checks performed by the Document
Shepherd to validate sections of the document written in a formal
language, such as XML code, BNF rules, MIB definitions, etc.

N/A
2020-11-10
20 (System) IANA Review state changed to Version Changed - Review Needed from IANA OK - Actions Needed
2020-11-10
20 John Scudder New version available: draft-ietf-idr-tunnel-encaps-20.txt
2020-11-10
20 (System) Forced post of submission
2020-11-10
20 (System) Request for posting confirmation emailed to previous authors: John Scudder , Gunter Van de Velde , Keyur Patel , Srihari Sangli
2020-11-10
20 John Scudder Uploaded new revision
2020-11-07
19 Susan Hares
As required by RFC 4858, this is the current template for the Document
Shepherd Write-Up.

Changes are expected over time. This version is dated …
As required by RFC 4858, this is the current template for the Document
Shepherd Write-Up.

Changes are expected over time. This version is dated 24 February 2012.

(1) What type of RFC is being requested (BCP, Proposed Standard,
Internet Standard, Informational, Experimental, or Historic)?  Why
is this the proper type of RFC?  Is this type of RFC indicated in the
title page header?

Proposed Standard.

The document defines procedures and operation for BGP. Further,
it makes requests to IANA and obsoletes a PS RFC.

The header indicates Standards Track.

(2) The IESG approval announcement includes a Document Announcement
Write-Up. Please provide such a Document Announcement Write-Up. Recent
examples can be found in the "Action" announcements for approved
documents. The approval announcement contains the following sections:

Technical Summary

  RFC 5512 defines a BGP Path Attribute known as the "Tunnel
  Encapsulation Attribute".  This attribute allows one to specify a set
  of tunnels.  For each such tunnel, the attribute can provide the
  information needed to create the tunnel and the corresponding
  encapsulation header.  The attribute can also provide information
  that aids in choosing whether a particular packet is to be sent
  through a particular tunnel.  RFC 5512 states that the attribute is
  only carried in BGP UPDATEs that have the "Encapsulation Subsequent
  Address Family (Encapsulation SAFI)".  This document deprecates the
  Encapsulation SAFI (which has never been used in production), and
  specifies semantics for the attribute when it is carried in UPDATEs
  of certain other SAFIs.  This document adds support for additional
  tunnel types, and allows a remote tunnel endpoint address to be
  specified for each tunnel.  This document also provides support for
  specifying fields of any inner or outer encapsulations that may be
  used by a particular tunnel.

Working Group Summary

  Was there anything in WG process that is worth noting? For
  example, was there controversy about particular points or
  were there decisions where the consensus was particularly
  rough?
 
The document went through two full WGLCs. The first one, for draft
-04, generated a substantial amount of discussion.  It concluded on
June 9, 2017 without consensus to proceed, but did result in
extensive review and discussion, with all points that were raised
either being reflected in the later versions of the draft, or
otherwise resolved. The chairs' summary of the WGLC is at
https://www.ietf.org/mail-archive/web/idr/current/msg18246.html

The second one, for draft -07 (with cc OSPF and BESS since they both
normatively reference the draft) concluded October 20, 2017 with some
support and no dissent.  Given the extensive review and discussion as
part of the first WGLC, the chairs were satisified with this outcome.

Subsequent to the second WGLC, further issues were reported by
implementors (this is why IDR has an implementation requirement!).
Some issues also were found by the document shepherd in the course
of preparing this report. The related updates brought the draft
version up to -12. We had an "additional comment period" to allow
the WG to raise any concerns related to the changes, the thread can
be found at
https://mailarchive.ietf.org/arch/browse/idr/?gbt=1&index=3_Fmk0Ble3VaAaDzAqt7heOpfc4

Finally, an editorial issue was surfaced in the course of
a WG discussion about a number of different SD-WAN related proposals.
A number of readers considered the use of the term "remote tunnel endpoint"
confusing since it wasn't clear from what point of view the tunnel was
considered "remote". That discussion can be found, in part, at
https://mailarchive.ietf.org/arch/browse/idr/?gbt=1&index=vPmpkz7tPWfo0laWHRtLayMF5ZA
Although it sprawled across a few threads, this is the one that concludes
them. The authors eventually decided to revise their terminology to
change "remote tunnel endpoint" to "tunnel egress endpoint" in -13; this
settled the issue.

        John Scudder, the initial WG shepherd, added so much in the editorial process
        that the co-authors felt John should be a co-author.  Due to this the
      Shepherd was changed to Susan Hares with version 19 (-19.txt). 
      Susan Hares did a fresh analysis of the internet draft. 

Document Quality

  Are there existing implementations of the protocol? Have a
  significant number of vendors indicated their plan to
  implement the specification? Are there any reviewers that
  merit special mention as having done a thorough review,
  e.g., one that resulted in important changes or a
  conclusion that the document had no substantive issues? If
  there was a MIB Doctor, Media Type or other expert review,
  what was its course (briefly)? In the case of a Media Type
  review, on what date was the request posted?
 
  The IDR implementation report page is at
  https://trac.ietf.org/trac/idr/wiki/draft-ietf-idr-tunnel-encaps%20implementations

Personnel

  Who is the Document Shepherd? Who is the Responsible Area
  Director?
 
        The initial document shepherd was John Scudder
  The current document shepherd is Susan Hares.
  The responsible AD is Alvaro Retana.

(3) Briefly describe the review of this document that was performed by
the Document Shepherd.  If this version of the document is not ready
for publication, please explain why the document is being forwarded to
the IESG.

The document shepherd has read the draft in detail several times
during the course of its development, and worked with the authors to
address comments. This includes a review of the current version.

      The document shepherd took a fresh review of the document.
      This review took the followinng steps:

      1) Examination of the technology within its use cases, 
      the RFC deprecated (RFC 5512, RFC5566, RFC5640),
      any RFC related to this work (RFC7510) or with an alternate
        tunnel approach with BGP support (PMSI, RFC8365). 

    The list of drafts related to PMSI approach included
    many of the MVPN and EVPn work done by L3VPN, L2VPN or BESS
    (RFC7432, RFC8277, RFC6514, RFC7153, RFC7432, RFC 7524,
      RFC7716,. RFC7988), and the EVPN
    BESS drafts approved for publication
      draft-ietf-bess-evpn-prefix-advertisement).
     
    2) Exmination of the use of tunnels for NSH control
      plane for SFC .  BESS has approved
      drafts-ietf-bess-nsh-bgp-control-plane-18 for
      publication. 

    3) Examination of IDR Drafts approved for publication
      for BGP-LS/Segment Routing and flow specification 
      (draft-ietf-bgp-ls-sgement-routing-ext-16.txt
      draft-ietf-bgpls-segment-routing-epe-19.txt,
      draft-ietf-idr-rfc5575bis.txt).

    4) The shepherd also examined all drafts adopted by
      BESS and IDR for interactions with the
      tunnel-encapsulation specification. 

    5) The shepherd also reviewd the -19.txt version for textual consistency.

      The shepherd wrote up the results in a
    16 page write-up that was sent to Alvaro, John Scudder and the author group.
      A majority of the write-up was a report on the RFC and drafts in BESS and
    IDR described above.  The report indicated 6 technical
    points plus editorial points. 
   
    -20.txt addressed technical and editorial points in the write-up.

    The tunnel-encapsulation work and related work in VPNs, (IP-VPNs,
    EVPNs, M-VPNs, etc) stands on the shoulders of work in IDR, L3VPN, L2VPN
    BESS.  The authors have carefully inserted the GP tunnel-encapsulation
  attribute into this complex set of VPN technology. 

  This draft provides a careful insertion with notes on what RFCs are
  obsoleted.  The shpeherd notes that other VPN drafts  (EVPN,
    VPN for SFC, NVO3 VPN, M-VPN, SR VPNs)  that rely on tunnels 
    need to be as careful in their examination of the existing technology.
   
    As a WG chair of IDR, this shepherd will pass along the insights learned
    to IDR and BESS chairs.   

  The second shepherd has worked with 3 proposals for replacement of the
  secure IP-VPN tunnel type using the tunnel-encapsulation for 3 years. 
  These implementations have three different types of
  application (within an AS or AS-Confederation,  SDWAN, and
  Secure E-VPN.  The proposed implementations were vetted by the
security experts at an open meeting at IETF 104. 
This work in secure IP-VPN is moving slower than the general
  tunnel-encapsulation.  Since IDR requires 2 implementations to
  forward drafts to the IESG, the IP-in IP tunnel with IPSec transport
  and the MPLS-in-IP tunnel with IPsec Transport were deprecated.
  It is expected that the replacement for these deprecated functions
  will eventually mature to the point of having 2 interoperable implementations 

(4) Does the document Shepherd have any concerns about the depth or
breadth of the reviews that have been performed?

No. 

(5) Do portions of the document need review from a particular or from
broader perspective, e.g., security, operational complexity, AAA, DNS,
DHCP, XML, or internationalization? If so, describe the review that
took place.

No.  IETF LC reviews were request for Internet Directorate (tunnel MTUs),
      Op/NM directorate, Security Directorate and Transport Directorate. 
      All directorate reviews received have been addressed by -20.txt.

        The security directorate reviewed has not completed the review as of 11/6/2020.


(6) Describe any specific concerns or issues that the Document Shepherd
has with this document that the Responsible Area Director and/or the
IESG should be aware of? For example, perhaps he or she is uncomfortable
with certain parts of the document, or has concerns whether there really
is a need for it. In any event, if the WG has discussed those issues and
has indicated that it still wishes to advance the document, detail those
concerns here.

None.

(7) Has each author confirmed that any and all appropriate IPR
disclosures required for full conformance with the provisions of BCP 78
and BCP 79 have already been filed. If not, explain why.

Authors have so confirmed.  (see discussion -04.txt)

Keyur Patel:
https://mailarchive.ietf.org/arch/msg/idr/uv9syrZ24jlArwSpIapNoRy_NME/

Gunter Van de Velde
https://mailarchive.ietf.org/arch/msg/idr/HVP3wzhaIA8PkIrS4Pem9Gb6qAE/

Srihari R. Sangli
[missing]

John Scudder:
[missing]


Eric Rosen (RFC 5512 author)
https://mailarchive.ietf.org/arch/msg/idr/uv9syrZ24jlArwSpIapNoRy_NME/


(8) Has an IPR disclosure been filed that references this document?
If so, summarize any WG discussion and conclusion regarding the IPR
disclosures.

N/A

(9) How solid is the WG consensus behind this document? Does it
represent the strong concurrence of a few individuals, with others
being silent, or does the WG as a whole understand and agree with it? 

Considering the amount of conversation on the mailing list and
at the in-person meetings, discussed above under "working group
summary", I'd say it has broad consensus.

    The draft also has

(10) Has anyone threatened an appeal or otherwise indicated extreme
discontent? If so, please summarise the areas of conflict in separate
email messages to the Responsible Area Director. (It should be in a
separate email because this questionnaire is publicly available.)

No.

(11) Identify any ID nits the Document Shepherd has found in this
document. (See https://www.ietf.org/tools/idnits/ and the Internet-Drafts
Checklist). Boilerplate checks are not enough; this check needs to be
thorough.

Note that the idnits error about an IPv4 address is bogus,
idnits is confusing a section reference (9.1.2.1) for an IP
address, possibly because of where the line break is?

Idnits complains about downrefs. See answer to (15).

(12) Describe how the document meets any required formal review
criteria, such as the MIB Doctor, media type, and URI type reviews.

N/A

(13) Have all references within this document been identified as
either normative or informative?

Yes.

(14) Are there normative references to documents that are not ready for
advancement or are otherwise in an unclear state? If such normative
references exist, what is the plan for their completion?

Yes, there is a reference to draft-ietf-nvo3-vxlan-gpe. The
NVO3 chairs state that their WG plans to advance this draft
following advancement of Geneve, and that Geneve has been
sent to the IESG for advancement. So, it appears GPE will be
ready for advancement soon.

(15) Are there downward normative references references (see RFC 3967)?
If so, list these downward references to support the Area Director in
the Last Call procedure.

o RFC 7348 ("Virtual eXtensible Local Area Network (VXLAN): A
  Framework for Overlaying Virtualized Layer 2 Networks over Layer
  3 Networks")
o RFC 7637 ("NVGRE: Network Virtualization Using Generic Routing
  Encapsulation")
o draft-ietf-nvo3-vxlan-gpe ("Generic Protocol Extension for VXLAN")

The first two are Informational, ISE stream documents. The relevant
case in RFC 3967 is:

  o  A standards document may need to refer to a proprietary protocol,
          and the IETF normally documents proprietary protocols using
          informational RFCs.
         
    draft-ietf-nvo3-vxlan-gpe which currently lists its intended status
    as "informational"; the authors and NVO3 chairs confirm this is
    correct. It's my opinion that this downref is ok in the spirit of
    the above, even though the draft is an IETF product. Given that the
    tunnel-encaps specification is extensible, it seems overly
    restrictive to prevent it from being extended to signal a particular
    encapsulation just because that encapsulation is specified in an
    informational document.
   
    Importantly, the "informational" references, while normative
    in the sense that the specification can't be fully understood without
    understanding the references as well, are NOT required for the core
    elements of the specification. It would be possible to produce an
    implementation of the specification that complies and interoperates
    but doesn't support any of the encapsulations in the downref specs.

(16) Will publication of this document change the status of any
existing RFCs? Are those RFCs listed on the title page header, listed
in the abstract, and discussed in the introduction? If the RFCs are not
listed in the Abstract and Introduction, explain why, and point to the
part of the document where the relationship of this document to the
other RFCs is discussed. If this information is not in the document,
explain why the WG considers it unnecessary.

Yes, RFC 5512 is obsoleted and the reasons adequately
discussed.

(17) Describe the Document Shepherd's review of the IANA considerations
section, especially with regard to its consistency with the body of the
document. Confirm that all protocol extensions that the document makes
are associated with the appropriate reservations in IANA registries.
Confirm that any referenced IANA registries have been clearly
identified. Confirm that newly created IANA registries include a
detailed specification of the initial contents for the registry, that
allocations procedures for future registrations are defined, and a
reasonable name for the new registry has been suggested (see RFC 5226).

Confirmed.

(18) List any new IANA registries that require Expert Review for future
allocations. Provide any public guidance that the IESG would find
useful in selecting the IANA Experts for these new registries.

N/A

(19) Describe reviews and automated checks performed by the Document
Shepherd to validate sections of the document written in a formal
language, such as XML code, BNF rules, MIB definitions, etc.

N/A
2020-10-07
19 Min Ye Request for Last Call review by RTGDIR Completed: Has Issues. Reviewer: Harish Sitaraman. Submission of review completed at an earlier date.
2020-10-05
19 Min Ye Request for Last Call review by RTGDIR Completed: Has Issues. Reviewer: Harish Sitaraman.
2020-10-04
19 Jouni Korhonen Request for Last Call review by OPSDIR Completed: Has Nits. Reviewer: Jouni Korhonen. Sent review to list.
2020-10-02
19 Gyan Mishra Request for Last Call review by GENART Completed: Ready. Reviewer: Gyan Mishra. Sent review to list.
2020-10-02
19 Gyan Mishra Request for Last Call review by GENART Completed: Ready. Reviewer: Gyan Mishra. Sent review to list.
2020-10-01
19 (System) IANA Review state changed to IANA OK - Actions Needed from IANA - Review Needed
2020-10-01
19 Sabrina Tanamal
(Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs:

The IANA Functions Operator has completed its review of draft-ietf-idr-tunnel-encaps-18. If any part of this review is inaccurate, please let …
(Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs:

The IANA Functions Operator has completed its review of draft-ietf-idr-tunnel-encaps-18. If any part of this review is inaccurate, please let us know.

The IANA Functions Operator understands that, upon approval of this document, there are eleven actions which we must complete.

First, on the IANA Matrix at:

https://www.iana.org/protocols

all references to RFC5512 will be changed to [ RFC-to-be ].

Second, in the BGP Tunnel Encapsulation Attribute Tunnel Types registry on the Border Gateway Protocol (BGP) Parameters registry page located at:

https://www.iana.org/assignments/bgp-parameters/

the following tunnel types are to be marked as obsolete with [ RFC-to-be ] as the reference:

3: Transmit tunnel endpoint
4: IPsec in Tunnel-mode
5: IP in IP tunnel with IPsec Transport Mode
6: MPLS-in-IP tunnel with IPsec Transport Mode

Third, in the BGP Tunnel Encapsulation Attribute Sub-TLVs registry also on the Border Gateway Protocol (BGP) Parameters registry page located at:

https://www.iana.org/assignments/bgp-parameters/

the following TLVs are to be marked as obsolete with [ RFC-to-be ] as the reference:

3: IPsec Tunnel Authenticator
5: Load-Balancing Block

Fourth, a new registry page will be created on the IANA Matrix called the "BGP Tunnel Encapsulation Parameters" registry page.

Fifth, in the SAFI Values registry on the Subsequent Address Family Identifiers (SAFI) Parameters registry page located at:

https://www.iana.org/assignments/safi-namespace/

the following value are to be marked as obsolete with [ RFC-to-be ] as the reference:

7: Encapsulation SAFI

Sixth, the the BGP Tunnel Encapsulation Attribute Sub-TLVs registry also on the Border Gateway Protocol (BGP) Parameters registry page which is currently located at:

https://www.iana.org/assignments/bgp-parameters/

is to be moved under into the new registry page created in step four of these IANA actions. A new note will be added to the registry as follows:

"If the Sub-TLV Type is in the range from 0 to 127 inclusive, the Sub-TLV Length field contains one octet. If the Sub-TLV Type is in the range from 128-255 inclusive, the Sub-TLV Length field contains two octets."

The registration policy for the newly moved registry is to be as follows:

+----------+-------------------------+
| Value(s) | Registration Procedure |
+----------+-------------------------+
| 0 | Reserved |
| 1-63 | Standards Action |
| 64-125 | First Come First Served |
| 126-127 | Experimental Use |
| 128-191 | Standards Action |
| 192-252 | First Come First Served |
| 253-254 | Experimental Use |
| 255 | Reserved |
+----------+-------------------------+

In the newly moved registry, the following entries are to be renamed:

Value 6 (old name: Remote Endpoint) new name: Tunnel Egress Endpoint
Value 7 (old name: IPv4 DS Field) new name: DS Field

Seventh, a new registry is to be created called the Flags Field of VXLAN Encapsulation sub-TLV registry. The new registry is to be created on the registry page created in step four of these IANA actions. The registration policy for the new registry is Standards Action as defined in RFC 8126. There are initial registrations in the new registry as follows:

+--------------+--------------------------------+-----------------+
| Bit Position | Description | Reference |
+--------------+--------------------------------+-----------------+
| 0 | V (Virtual Network Identifier) | [ RFC-to-be ] |
| 1 | M (MAC Address) | [ RFC-to-be ] |
+--------------+--------------------------------+-----------------+

Eighth, a new registry is to be created called the Flags Field of VXLAN GPE Encapsulation sub-TLV registry. The new registry is to be created on the registry page created in step four of these IANA actions. The registration policy for the new registry is Standards Action as defined in RFC 8126. There are initial registrations in the new registry as follows:

+--------------+-------------+-----------------+
| Bit Position | Description | Reference |
+--------------+-------------+-----------------+
| 0 | V (VN-ID) | [ RFC-to-be ] |
+--------------+-------------+-----------------+

Ninth, a new registry is to be created called the Flags Field of NVGRE Encapsulation sub-TLV registry. The new registry is to be created on the registry page created in step four of these IANA actions. The registration policy for the new registry is Standards Action as defined in RFC 8126. There are initial registrations in the new registry as follows:

+--------------+-----------------+-----------------+
| Bit Position | Description | Reference |
+--------------+-----------------+-----------------+
| 0 | V (VN-ID) | [ RFC-to-be ] |
| 1 | M (MAC Address) | [ RFC-to-be ] |
+--------------+-----------------+-----------------+

Tenth, a new registry is to be created called the Embedded Label Handling sub-TLV registry. The new registry is to be created on the registry page created in step four of these IANA actions. The registration policy for the new registry is Standards Action as defined in RFC 8126. There are initial registrations in the new registry as follows:

+-------+-------------------------------------+-----------------+
| Value | Description | Reference |
+-------+-------------------------------------+-----------------+
| 1 | Payload of MPLS with embedded label | [ RFC-to-be ] |
| 2 | no embedded label in payload | [ RFC-to-be ] |
+-------+-------------------------------------+-----------------+

Eleventh, a new registry is to be created called the Color Extended Community Flags registry. The new registry is to be created on the registry page created in step four of these IANA actions. The registration policy for the new registry is Standards Action as defined in RFC 8126. There are no initial registrations in this new registry. The format of the new registry has fields for Bit Position, Description and Reference.

The IANA Functions Operator understands that these are the only actions required to be completed upon approval of this document.

Note:  The actions requested in this document will not be completed until the document has been approved for publication as an RFC. This message is meant only to confirm the list of actions that will be performed.

Thank you,

Sabrina Tanamal
Senior IANA Services Specialist
2020-10-01
19 Alvaro Retana The IETF LC has concluded.  The Document Shepherd changed late in the process; I'm holding this document pending the new shepherd's review.
2020-10-01
19 Alvaro Retana IESG state changed to Waiting for AD Go-Ahead::External Party from Waiting for Writeup
2020-10-01
19 Alvaro Retana Ballot writeup was changed
2020-10-01
19 (System) IESG state changed to Waiting for Writeup from In Last Call
2020-09-28
19 Brian Trammell Request for Last Call review by TSVART Completed: Ready with Issues. Reviewer: Brian Trammell. Sent review to list.
2020-09-24
19 Tero Kivinen Request for Last Call review by SECDIR is assigned to Scott Kelly
2020-09-24
19 Tero Kivinen Request for Last Call review by SECDIR is assigned to Scott Kelly
2020-09-22
19 Gunter Van de Velde Request for Last Call review by OPSDIR is assigned to Jouni Korhonen
2020-09-22
19 Gunter Van de Velde Request for Last Call review by OPSDIR is assigned to Jouni Korhonen
2020-09-21
19 Wesley Eddy Request for Last Call review by TSVART is assigned to Brian Trammell
2020-09-21
19 Wesley Eddy Request for Last Call review by TSVART is assigned to Brian Trammell
2020-09-18
19 John Scudder New version available: draft-ietf-idr-tunnel-encaps-19.txt
2020-09-18
19 (System) New version accepted (logged-in submitter: John Scudder)
2020-09-18
19 John Scudder Uploaded new revision
2020-09-18
18 Jean Mahoney Request for Last Call review by GENART is assigned to Gyan Mishra
2020-09-18
18 Jean Mahoney Request for Last Call review by GENART is assigned to Gyan Mishra
2020-09-17
18 Min Ye Request for Last Call review by RTGDIR is assigned to Harish Sitaraman
2020-09-17
18 Min Ye Request for Last Call review by RTGDIR is assigned to Harish Sitaraman
2020-09-17
18 Alvaro Retana Requested Last Call review by RTGDIR
2020-09-17
18 Cindy Morgan IANA Review state changed to IANA - Review Needed
2020-09-17
18 Cindy Morgan
The following Last Call announcement was sent out (ends 2020-10-01):

From: The IESG
To: IETF-Announce
CC: idr@ietf.org, Susan Hares , aretana.ietf@gmail.com, John Scudder …
The following Last Call announcement was sent out (ends 2020-10-01):

From: The IESG
To: IETF-Announce
CC: idr@ietf.org, Susan Hares , aretana.ietf@gmail.com, John Scudder , shares@ndzh.com, draft-ietf-idr-tunnel-encaps@ietf.org, idr-chairs@ietf.org
Reply-To: last-call@ietf.org
Sender:
Subject: Last Call:  (The BGP Tunnel Encapsulation Attribute) to Proposed Standard


The IESG has received a request from the Inter-Domain Routing WG (idr) to
consider the following document: - 'The BGP Tunnel Encapsulation Attribute'
  as Proposed Standard

The IESG plans to make a decision in the next few weeks, and solicits final
comments on this action. Please send substantive comments to the
last-call@ietf.org mailing lists by 2020-10-01. Exceptionally, comments may
be sent to iesg@ietf.org instead. In either case, please retain the beginning
of the Subject line to allow automated sorting.

Abstract


  RFC 5512 defines a BGP Path Attribute known as the "Tunnel
  Encapsulation Attribute".  This attribute allows one to specify a set
  of tunnels.  For each such tunnel, the attribute can provide the
  information needed to create the tunnel and the corresponding
  encapsulation header.  The attribute can also provide information
  that aids in choosing whether a particular packet is to be sent
  through a particular tunnel.  RFC 5512 states that the attribute is
  only carried in BGP UPDATEs that use the "Encapsulation Subsequent
  Address Family (Encapsulation SAFI)".  This document deprecates the
  Encapsulation SAFI (which has never been used in production), and
  specifies semantics for the attribute when it is carried in UPDATEs
  of certain other SAFIs.  This document adds support for additional
  Tunnel Types, and allows a remote tunnel endpoint address to be
  specified for each tunnel.  This document also provides support for
  specifying fields of any inner or outer encapsulations that may be
  used by a particular tunnel.

  This document obsoletes RFC 5512.  Since RFCs 5566 and 5640 rely on
  RFC 5512, they are likewise obsoleted.




The file can be obtained via
https://datatracker.ietf.org/doc/draft-ietf-idr-tunnel-encaps/



No IPR declarations have been submitted directly on this I-D.


The document contains these normative downward references.
See RFC 3967 for additional information:
    draft-ietf-nvo3-vxlan-gpe: Generic Protocol Extension for VXLAN (VXLAN-GPE) (None - IETF stream)



2020-09-17
18 Cindy Morgan IESG state changed to In Last Call from Last Call Requested
2020-09-17
18 Alvaro Retana Last call was requested
2020-09-17
18 Alvaro Retana Ballot approval text was generated
2020-09-17
18 Alvaro Retana Ballot writeup was generated
2020-09-17
18 Alvaro Retana IESG state changed to Last Call Requested from AD Evaluation::AD Followup
2020-09-17
18 Alvaro Retana Last call announcement was generated
2020-09-11
18 (System) Sub state has been changed to AD Followup from Revised ID Needed
2020-09-11
18 John Scudder New version available: draft-ietf-idr-tunnel-encaps-18.txt
2020-09-11
18 (System) New version accepted (logged-in submitter: John Scudder)
2020-09-11
18 John Scudder Uploaded new revision
2020-08-04
17 Alvaro Retana IESG state changed to AD Evaluation::Revised I-D Needed from AD Evaluation::AD Followup
2020-08-04
17 Alvaro Retana Notification list changed to John Scudder <jgs@juniper.net>, aretana.ietf@gmail.com, Susan Hares <shares@ndzh.com> from John Scudder <jgs@juniper.net>, aretana.ietf@gmail.com
2020-08-04
17 Alvaro Retana Document shepherd changed to Susan Hares
2020-07-17
17 John Scudder New version available: draft-ietf-idr-tunnel-encaps-17.txt
2020-07-17
17 (System) Forced post of submission
2020-07-17
17 (System) Request for posting confirmation emailed to previous authors: Gunter Van de Velde , Keyur Patel , John Scudder , Srihari Ramachandra
2020-07-17
17 John Scudder Uploaded new revision
2020-07-13
16 (System) Sub state has been changed to AD Followup from Revised ID Needed
2020-07-13
16 John Scudder New version available: draft-ietf-idr-tunnel-encaps-16.txt
2020-07-13
16 (System) New version approved
2020-07-13
16 (System) Request for posting confirmation emailed to previous authors: Keyur Patel , idr-chairs@ietf.org, Gunter Van de Velde , Srihari Ramachandra
2020-07-13
16 John Scudder Uploaded new revision
2020-02-21
15 Alvaro Retana === AD Review of draft-ietf-idr-tunnel-encaps-15 ===
https://mailarchive.ietf.org/arch/msg/idr/S1nyz1sewA_Xqf63W_vz8c4L8Z0
2020-02-21
15 Alvaro Retana IESG state changed to AD Evaluation::Revised I-D Needed from AD Evaluation
2020-01-17
15 Alvaro Retana IESG state changed to AD Evaluation from Publication Requested
2020-01-17
15 Alvaro Retana Notification list changed to John Scudder <jgs@juniper.net>, aretana.ietf@gmail.com from John Scudder <jgs@juniper.net>
2019-12-01
15 Keyur Patel New version available: draft-ietf-idr-tunnel-encaps-15.txt
2019-12-01
15 (System) New version approved
2019-12-01
15 (System) Request for posting confirmation emailed to previous authors: Srihari Ramachandra , Gunter Van de Velde , Keyur Patel
2019-12-01
15 Keyur Patel Uploaded new revision
2019-10-10
14 John Scudder
As required by RFC 4858, this is the current template for the Document
Shepherd Write-Up.

Changes are expected over time. This version is dated …
As required by RFC 4858, this is the current template for the Document
Shepherd Write-Up.

Changes are expected over time. This version is dated 24 February 2012.

(1) What type of RFC is being requested (BCP, Proposed Standard,
Internet Standard, Informational, Experimental, or Historic)?  Why
is this the proper type of RFC?  Is this type of RFC indicated in the
title page header?

Proposed Standard.

The document defines procedures and operation for BGP. Further,
it makes requests to IANA and obsoletes a PS RFC.

The header indicates Standards Track.

(2) The IESG approval announcement includes a Document Announcement
Write-Up. Please provide such a Document Announcement Write-Up. Recent
examples can be found in the "Action" announcements for approved
documents. The approval announcement contains the following sections:

Technical Summary

  RFC 5512 defines a BGP Path Attribute known as the "Tunnel
  Encapsulation Attribute".  This attribute allows one to specify a set
  of tunnels.  For each such tunnel, the attribute can provide the
  information needed to create the tunnel and the corresponding
  encapsulation header.  The attribute can also provide information
  that aids in choosing whether a particular packet is to be sent
  through a particular tunnel.  RFC 5512 states that the attribute is
  only carried in BGP UPDATEs that have the "Encapsulation Subsequent
  Address Family (Encapsulation SAFI)".  This document deprecates the
  Encapsulation SAFI (which has never been used in production), and
  specifies semantics for the attribute when it is carried in UPDATEs
  of certain other SAFIs.  This document adds support for additional
  tunnel types, and allows a remote tunnel endpoint address to be
  specified for each tunnel.  This document also provides support for
  specifying fields of any inner or outer encapsulations that may be
  used by a particular tunnel.

Working Group Summary

  Was there anything in WG process that is worth noting? For
  example, was there controversy about particular points or
  were there decisions where the consensus was particularly
  rough?
 
The document went through two full WGLCs. The first one, for draft
-04, generated a substantial amount of discussion.  It concluded on
June 9, 2017 without consensus to proceed, but did result in
extensive review and discussion, with all points that were raised
either being reflected in the later versions of the draft, or
otherwise resolved. The chairs' summary of the WGLC is at
https://www.ietf.org/mail-archive/web/idr/current/msg18246.html

The second one, for draft -07 (with cc OSPF and BESS since they both
normatively reference the draft) concluded October 20, 2017 with some
support and no dissent.  Given the extensive review and discussion as
part of the first WGLC, the chairs were satisified with this outcome.

Subsequent to the second WGLC, further issues were reported by
implementors (this is why IDR has an implementation requirement!).
Some issues also were found by the document shepherd in the course
of preparing this report. The related updates brought the draft
version up to -12. We had an "additional comment period" to allow
the WG to raise any concerns related to the changes, the thread can
be found at
https://mailarchive.ietf.org/arch/browse/idr/?gbt=1&index=3_Fmk0Ble3VaAaDzAqt7heOpfc4

Finally, an editorial issue was surfaced in the course of
a WG discussion about a number of different SD-WAN related proposals.
A number of readers considered the use of the term "remote tunnel endpoint"
confusing since it wasn't clear from what point of view the tunnel was
considered "remote". That discussion can be found, in part, at
https://mailarchive.ietf.org/arch/browse/idr/?gbt=1&index=vPmpkz7tPWfo0laWHRtLayMF5ZA
Although it sprawled across a few threads, this is the one that concludes
them. The authors eventually decided to revise their terminology to
change "remote tunnel endpoint" to "tunnel egress endpoint" in -13; this
settled the issue.

Document Quality

  Are there existing implementations of the protocol? Have a
  significant number of vendors indicated their plan to
  implement the specification? Are there any reviewers that
  merit special mention as having done a thorough review,
  e.g., one that resulted in important changes or a
  conclusion that the document had no substantive issues? If
  there was a MIB Doctor, Media Type or other expert review,
  what was its course (briefly)? In the case of a Media Type
  review, on what date was the request posted?
 
  The IDR implementation report page is at
  https://trac.ietf.org/trac/idr/wiki/draft-ietf-idr-tunnel-encaps%20implementations

Personnel

  Who is the Document Shepherd? Who is the Responsible Area
  Director?
 
  The document shepherd is John Scudder.
  The responsible AD is Alvaro Retana.

(3) Briefly describe the review of this document that was performed by
the Document Shepherd.  If this version of the document is not ready
for publication, please explain why the document is being forwarded to
the IESG.

The document shepherd has read the draft in detail several times
during the course of its development, and worked with the authors to
address comments. This includes a review of the current version.

(4) Does the document Shepherd have any concerns about the depth or
breadth of the reviews that have been performed?

No.

(5) Do portions of the document need review from a particular or from
broader perspective, e.g., security, operational complexity, AAA, DNS,
DHCP, XML, or internationalization? If so, describe the review that
took place.

No.

(6) Describe any specific concerns or issues that the Document Shepherd
has with this document that the Responsible Area Director and/or the
IESG should be aware of? For example, perhaps he or she is uncomfortable
with certain parts of the document, or has concerns whether there really
is a need for it. In any event, if the WG has discussed those issues and
has indicated that it still wishes to advance the document, detail those
concerns here.

None.

(7) Has each author confirmed that any and all appropriate IPR
disclosures required for full conformance with the provisions of BCP 78
and BCP 79 have already been filed. If not, explain why.

Authors have so confirmed.

(8) Has an IPR disclosure been filed that references this document?
If so, summarize any WG discussion and conclusion regarding the IPR
disclosures.

N/A

(9) How solid is the WG consensus behind this document? Does it
represent the strong concurrence of a few individuals, with others
being silent, or does the WG as a whole understand and agree with it? 

Considering the amount of conversation on the mailing list and
at the in-person meetings, discussed above under "working group
summary", I'd say it has broad consensus.

(10) Has anyone threatened an appeal or otherwise indicated extreme
discontent? If so, please summarise the areas of conflict in separate
email messages to the Responsible Area Director. (It should be in a
separate email because this questionnaire is publicly available.)

No.

(11) Identify any ID nits the Document Shepherd has found in this
document. (See https://www.ietf.org/tools/idnits/ and the Internet-Drafts
Checklist). Boilerplate checks are not enough; this check needs to be
thorough.

Note that the idnits error about an IPv4 address is bogus,
idnits is confusing a section reference (9.1.2.1) for an IP
address, possibly because of where the line break is?

Idnits complains about downrefs. See answer to (15).

(12) Describe how the document meets any required formal review
criteria, such as the MIB Doctor, media type, and URI type reviews.

N/A

(13) Have all references within this document been identified as
either normative or informative?

Yes.

(14) Are there normative references to documents that are not ready for
advancement or are otherwise in an unclear state? If such normative
references exist, what is the plan for their completion?

Yes, there is a reference to draft-ietf-nvo3-vxlan-gpe. The
NVO3 chairs state that their WG plans to advance this draft
following advancement of Geneve, and that Geneve has been
sent to the IESG for advancement. So, it appears GPE will be
ready for advancement soon.

(15) Are there downward normative references references (see RFC 3967)?
If so, list these downward references to support the Area Director in
the Last Call procedure.

o RFC 7348 ("Virtual eXtensible Local Area Network (VXLAN): A
  Framework for Overlaying Virtualized Layer 2 Networks over Layer
  3 Networks")
o RFC 7637 ("NVGRE: Network Virtualization Using Generic Routing
  Encapsulation")
o draft-ietf-nvo3-vxlan-gpe ("Generic Protocol Extension for VXLAN")

The first two are Informational, ISE stream documents. The relevant
case in RFC 3967 is:

  o  A standards document may need to refer to a proprietary protocol,
          and the IETF normally documents proprietary protocols using
          informational RFCs.
         
    draft-ietf-nvo3-vxlan-gpe which currently lists its intended status
    as "informational"; the authors and NVO3 chairs confirm this is
    correct. It's my opinion that this downref is ok in the spirit of
    the above, even though the draft is an IETF product. Given that the
    tunnel-encaps specification is extensible, it seems overly
    restrictive to prevent it from being extended to signal a particular
    encapsulation just because that encapsulation is specified in an
    informational document.
   
    Importantly, the "informational" references, while normative
    in the sense that the specification can't be fully understood without
    understanding the references as well, are NOT required for the core
    elements of the specification. It would be possible to produce an
    implementation of the specification that complies and interoperates
    but doesn't support any of the encapsulations in the downref specs.

(16) Will publication of this document change the status of any
existing RFCs? Are those RFCs listed on the title page header, listed
in the abstract, and discussed in the introduction? If the RFCs are not
listed in the Abstract and Introduction, explain why, and point to the
part of the document where the relationship of this document to the
other RFCs is discussed. If this information is not in the document,
explain why the WG considers it unnecessary.

Yes, RFC 5512 is obsoleted and the reasons adequately
discussed.

(17) Describe the Document Shepherd's review of the IANA considerations
section, especially with regard to its consistency with the body of the
document. Confirm that all protocol extensions that the document makes
are associated with the appropriate reservations in IANA registries.
Confirm that any referenced IANA registries have been clearly
identified. Confirm that newly created IANA registries include a
detailed specification of the initial contents for the registry, that
allocations procedures for future registrations are defined, and a
reasonable name for the new registry has been suggested (see RFC 5226).

Confirmed.

(18) List any new IANA registries that require Expert Review for future
allocations. Provide any public guidance that the IESG would find
useful in selecting the IANA Experts for these new registries.

N/A

(19) Describe reviews and automated checks performed by the Document
Shepherd to validate sections of the document written in a formal
language, such as XML code, BNF rules, MIB definitions, etc.

N/A
2019-10-10
14 John Scudder Responsible AD changed to Alvaro Retana
2019-10-10
14 John Scudder IETF WG state changed to Submitted to IESG for Publication from WG Consensus: Waiting for Write-Up
2019-10-10
14 John Scudder IESG state changed to Publication Requested from I-D Exists
2019-10-10
14 John Scudder IESG process started in state Publication Requested
2019-10-10
14 John Scudder
As required by RFC 4858, this is the current template for the Document
Shepherd Write-Up.

Changes are expected over time. This version is dated …
As required by RFC 4858, this is the current template for the Document
Shepherd Write-Up.

Changes are expected over time. This version is dated 24 February 2012.

(1) What type of RFC is being requested (BCP, Proposed Standard,
Internet Standard, Informational, Experimental, or Historic)?  Why
is this the proper type of RFC?  Is this type of RFC indicated in the
title page header?

Proposed Standard.

The document defines procedures and operation for BGP. Further,
it makes requests to IANA and obsoletes a PS RFC.

The header indicates Standards Track.

(2) The IESG approval announcement includes a Document Announcement
Write-Up. Please provide such a Document Announcement Write-Up. Recent
examples can be found in the "Action" announcements for approved
documents. The approval announcement contains the following sections:

Technical Summary

  RFC 5512 defines a BGP Path Attribute known as the "Tunnel
  Encapsulation Attribute".  This attribute allows one to specify a set
  of tunnels.  For each such tunnel, the attribute can provide the
  information needed to create the tunnel and the corresponding
  encapsulation header.  The attribute can also provide information
  that aids in choosing whether a particular packet is to be sent
  through a particular tunnel.  RFC 5512 states that the attribute is
  only carried in BGP UPDATEs that have the "Encapsulation Subsequent
  Address Family (Encapsulation SAFI)".  This document deprecates the
  Encapsulation SAFI (which has never been used in production), and
  specifies semantics for the attribute when it is carried in UPDATEs
  of certain other SAFIs.  This document adds support for additional
  tunnel types, and allows a remote tunnel endpoint address to be
  specified for each tunnel.  This document also provides support for
  specifying fields of any inner or outer encapsulations that may be
  used by a particular tunnel.

Working Group Summary

  Was there anything in WG process that is worth noting? For
  example, was there controversy about particular points or
  were there decisions where the consensus was particularly
  rough?
 
The document went through two full WGLCs. The first one, for draft
-04, generated a substantial amount of discussion.  It concluded on
June 9, 2017 without consensus to proceed, but did result in
extensive review and discussion, with all points that were raised
either being reflected in the later versions of the draft, or
otherwise resolved. The chairs' summary of the WGLC is at
https://www.ietf.org/mail-archive/web/idr/current/msg18246.html

The second one, for draft -07 (with cc OSPF and BESS since they both
normatively reference the draft) concluded October 20, 2017 with some
support and no dissent.  Given the extensive review and discussion as
part of the first WGLC, the chairs were satisified with this outcome.

Subsequent to the second WGLC, further issues were reported by
implementors (this is why IDR has an implementation requirement!).
Some issues also were found by the document shepherd in the course
of preparing this report. The related updates brought the draft
version up to -12. We had an "additional comment period" to allow
the WG to raise any concerns related to the changes, the thread can
be found at
https://mailarchive.ietf.org/arch/browse/idr/?gbt=1&index=3_Fmk0Ble3VaAaDzAqt7heOpfc4

Finally, an editorial issue was surfaced in the course of
a WG discussion about a number of different SD-WAN related proposals.
A number of readers considered the use of the term "remote tunnel endpoint"
confusing since it wasn't clear from what point of view the tunnel was
considered "remote". That discussion can be found, in part, at
https://mailarchive.ietf.org/arch/browse/idr/?gbt=1&index=vPmpkz7tPWfo0laWHRtLayMF5ZA
Although it sprawled across a few threads, this is the one that concludes
them. The authors eventually decided to revise their terminology to
change "remote tunnel endpoint" to "tunnel egress endpoint" in -13; this
settled the issue.

Document Quality

  Are there existing implementations of the protocol? Have a
  significant number of vendors indicated their plan to
  implement the specification? Are there any reviewers that
  merit special mention as having done a thorough review,
  e.g., one that resulted in important changes or a
  conclusion that the document had no substantive issues? If
  there was a MIB Doctor, Media Type or other expert review,
  what was its course (briefly)? In the case of a Media Type
  review, on what date was the request posted?
 
  The IDR implementation report page is at
  https://trac.ietf.org/trac/idr/wiki/draft-ietf-idr-tunnel-encaps%20implementations

Personnel

  Who is the Document Shepherd? Who is the Responsible Area
  Director?
 
  The document shepherd is John Scudder.
  The responsible AD is Alvaro Retana.

(3) Briefly describe the review of this document that was performed by
the Document Shepherd.  If this version of the document is not ready
for publication, please explain why the document is being forwarded to
the IESG.

The document shepherd has read the draft in detail several times
during the course of its development, and worked with the authors to
address comments. This includes a review of the current version.

(4) Does the document Shepherd have any concerns about the depth or
breadth of the reviews that have been performed?

No.

(5) Do portions of the document need review from a particular or from
broader perspective, e.g., security, operational complexity, AAA, DNS,
DHCP, XML, or internationalization? If so, describe the review that
took place.

No.

(6) Describe any specific concerns or issues that the Document Shepherd
has with this document that the Responsible Area Director and/or the
IESG should be aware of? For example, perhaps he or she is uncomfortable
with certain parts of the document, or has concerns whether there really
is a need for it. In any event, if the WG has discussed those issues and
has indicated that it still wishes to advance the document, detail those
concerns here.

None.

(7) Has each author confirmed that any and all appropriate IPR
disclosures required for full conformance with the provisions of BCP 78
and BCP 79 have already been filed. If not, explain why.

Authors have so confirmed.

(8) Has an IPR disclosure been filed that references this document?
If so, summarize any WG discussion and conclusion regarding the IPR
disclosures.

N/A

(9) How solid is the WG consensus behind this document? Does it
represent the strong concurrence of a few individuals, with others
being silent, or does the WG as a whole understand and agree with it? 

Considering the amount of conversation on the mailing list and
at the in-person meetings, discussed above under "working group
summary", I'd say it has broad consensus.

(10) Has anyone threatened an appeal or otherwise indicated extreme
discontent? If so, please summarise the areas of conflict in separate
email messages to the Responsible Area Director. (It should be in a
separate email because this questionnaire is publicly available.)

No.

(11) Identify any ID nits the Document Shepherd has found in this
document. (See https://www.ietf.org/tools/idnits/ and the Internet-Drafts
Checklist). Boilerplate checks are not enough; this check needs to be
thorough.

Note that the idnits error about an IPv4 address is bogus,
idnits is confusing a section reference (9.1.2.1) for an IP
address, possibly because of where the line break is?

Idnits complains about downrefs. See answer to (15).

(12) Describe how the document meets any required formal review
criteria, such as the MIB Doctor, media type, and URI type reviews.

N/A

(13) Have all references within this document been identified as
either normative or informative?

Yes.

(14) Are there normative references to documents that are not ready for
advancement or are otherwise in an unclear state? If such normative
references exist, what is the plan for their completion?

Yes, there is a reference to draft-ietf-nvo3-vxlan-gpe. The
NVO3 chairs state that their WG plans to advance this draft
following advancement of Geneve, and that Geneve has been
sent to the IESG for advancement. So, it appears GPE will be
ready for advancement soon.

(15) Are there downward normative references references (see RFC 3967)?
If so, list these downward references to support the Area Director in
the Last Call procedure.

o RFC 7348 ("Virtual eXtensible Local Area Network (VXLAN): A
  Framework for Overlaying Virtualized Layer 2 Networks over Layer
  3 Networks")
o RFC 7637 ("NVGRE: Network Virtualization Using Generic Routing
  Encapsulation")
o draft-ietf-nvo3-vxlan-gpe ("Generic Protocol Extension for VXLAN")

The first two are Informational, ISE stream documents. The relevant
case in RFC 3967 is:

  o  A standards document may need to refer to a proprietary protocol,
          and the IETF normally documents proprietary protocols using
          informational RFCs.
         
    draft-ietf-nvo3-vxlan-gpe which currently lists its intended status
    as "informational"; the authors and NVO3 chairs confirm this is
    correct. It's my opinion that this downref is ok in the spirit of
    the above, even though the draft is an IETF product. Given that the
    tunnel-encaps specification is extensible, it seems overly
    restrictive to prevent it from being extended to signal a particular
    encapsulation just because that encapsulation is specified in an
    informational document.
   
    Importantly, the "informational" references, while normative
    in the sense that the specification can't be fully understood without
    understanding the references as well, are NOT required for the core
    elements of the specification. It would be possible to produce an
    implementation of the specification that complies and interoperates
    but doesn't support any of the encapsulations in the downref specs.

(16) Will publication of this document change the status of any
existing RFCs? Are those RFCs listed on the title page header, listed
in the abstract, and discussed in the introduction? If the RFCs are not
listed in the Abstract and Introduction, explain why, and point to the
part of the document where the relationship of this document to the
other RFCs is discussed. If this information is not in the document,
explain why the WG considers it unnecessary.

Yes, RFC 5512 is obsoleted and the reasons adequately
discussed.

(17) Describe the Document Shepherd's review of the IANA considerations
section, especially with regard to its consistency with the body of the
document. Confirm that all protocol extensions that the document makes
are associated with the appropriate reservations in IANA registries.
Confirm that any referenced IANA registries have been clearly
identified. Confirm that newly created IANA registries include a
detailed specification of the initial contents for the registry, that
allocations procedures for future registrations are defined, and a
reasonable name for the new registry has been suggested (see RFC 5226).

Confirmed.

(18) List any new IANA registries that require Expert Review for future
allocations. Provide any public guidance that the IESG would find
useful in selecting the IANA Experts for these new registries.

N/A

(19) Describe reviews and automated checks performed by the Document
Shepherd to validate sections of the document written in a formal
language, such as XML code, BNF rules, MIB definitions, etc.

N/A
2019-09-30
14 Keyur Patel New version available: draft-ietf-idr-tunnel-encaps-14.txt
2019-09-30
14 (System) New version approved
2019-09-30
14 (System) Request for posting confirmation emailed to previous authors: idr-chairs@ietf.org, Srihari Ramachandra , Eric Rosen , Gunter Van de Velde , Keyur Patel
2019-09-30
14 Keyur Patel Uploaded new revision
2019-07-22
13 Keyur Patel New version available: draft-ietf-idr-tunnel-encaps-13.txt
2019-07-22
13 (System) New version approved
2019-07-22
13 (System) Request for posting confirmation emailed to previous authors: idr-chairs@ietf.org, Srihari Ramachandra , Eric Rosen , Gunter Van de Velde , Keyur Patel
2019-07-22
13 Keyur Patel Uploaded new revision
2019-05-20
12 Keyur Patel New version available: draft-ietf-idr-tunnel-encaps-12.txt
2019-05-20
12 (System) New version approved
2019-05-20
12 (System) Request for posting confirmation emailed to previous authors: idr-chairs@ietf.org, Gunter Van de Velde , Eric Rosen , Keyur Patel
2019-05-20
12 Keyur Patel Uploaded new revision
2019-02-22
11 Keyur Patel New version available: draft-ietf-idr-tunnel-encaps-11.txt
2019-02-22
11 (System) New version approved
2019-02-22
11 (System) Request for posting confirmation emailed to previous authors: Gunter Van de Velde , Eric Rosen , Keyur Patel
2019-02-22
11 Keyur Patel Uploaded new revision
2019-02-21
10 (System) Document has expired
2018-08-20
10 Eric Rosen New version available: draft-ietf-idr-tunnel-encaps-10.txt
2018-08-20
10 (System) New version approved
2018-08-20
10 (System) Request for posting confirmation emailed to previous authors: Gunter Van de Velde , Eric Rosen , Keyur Patel
2018-08-20
10 Eric Rosen Uploaded new revision
2018-03-22
09 John Scudder Notification list changed to John Scudder <jgs@juniper.net>
2018-03-22
09 John Scudder Document shepherd changed to John Scudder
2018-02-28
09 Eric Rosen New version available: draft-ietf-idr-tunnel-encaps-09.txt
2018-02-28
09 (System) New version approved
2018-02-28
09 (System) Request for posting confirmation emailed to previous authors: Gunter Van de Velde , Eric Rosen , Keyur Patel
2018-02-28
09 Eric Rosen Uploaded new revision
2018-01-26
08 Alvaro Retana Changed consensus to Yes from Unknown
2018-01-26
08 Alvaro Retana Intended Status changed to Proposed Standard from None
2018-01-11
08 Eric Rosen New version available: draft-ietf-idr-tunnel-encaps-08.txt
2018-01-11
08 (System) New version approved
2018-01-11
08 (System) Request for posting confirmation emailed to previous authors: Gunter Van de Velde , Eric Rosen , Keyur Patel
2018-01-11
08 Eric Rosen Uploaded new revision
2017-10-20
07 John Scudder
From: "John G. Scudder"
Subject: Re: [Idr] [OSPF] WGLC for draft-ietf-idr-tunnel-encaps-07
Date: October 20, 2017 at 9:55:14 PM GMT+3
To: idr@ietf.org
Cc: draft-ietf-idr-tunnel-encaps@ietf.org

This WGLC …
From: "John G. Scudder"
Subject: Re: [Idr] [OSPF] WGLC for draft-ietf-idr-tunnel-encaps-07
Date: October 20, 2017 at 9:55:14 PM GMT+3
To: idr@ietf.org
Cc: draft-ietf-idr-tunnel-encaps@ietf.org

This WGLC is concluded. Based on feedback received during this and the previous WGLC, we will forward the document for publication as RFC.

If anyone is willing to volunteer as shepherd, please let me know. (It's a useful way to gain insight into how the sausage is made, worth your while if you're so inclined.)

Thanks,

--John
2017-10-20
07 John Scudder IETF WG state changed to WG Consensus: Waiting for Write-Up from In WG Last Call
2017-10-06
07 John Scudder IETF WG state changed to In WG Last Call from WG Document
2017-07-18
07 Jie Dong Added to session: IETF-99: idr  Thu-0930
2017-07-17
07 Eric Rosen New version available: draft-ietf-idr-tunnel-encaps-07.txt
2017-07-17
07 (System) New version approved
2017-07-17
07 (System) Request for posting confirmation emailed to previous authors: Gunter Van de Velde , Eric Rosen , Keyur Patel
2017-07-17
07 Eric Rosen Uploaded new revision
2017-06-14
06 Eric Rosen New version available: draft-ietf-idr-tunnel-encaps-06.txt
2017-06-14
06 (System) New version approved
2017-06-14
06 (System) Request for posting confirmation emailed to previous authors: Gunter Van de Velde , Eric Rosen , Keyur Patel
2017-06-14
06 Eric Rosen Uploaded new revision
2017-05-23
05 Eric Rosen New version available: draft-ietf-idr-tunnel-encaps-05.txt
2017-05-23
05 (System) New version approved
2017-05-23
05 (System) Request for posting confirmation emailed to previous authors: idr-chairs@ietf.org, Keyur Patel , Eric Rosen , Gunter Van de Velde
2017-05-23
05 Eric Rosen Uploaded new revision
2017-04-14
04 Eric Rosen New version available: draft-ietf-idr-tunnel-encaps-04.txt
2017-04-14
04 (System) New version approved
2017-04-14
04 (System) Request for posting confirmation emailed to previous authors: idr-chairs@ietf.org, Keyur Patel , Eric Rosen , Gunter Van de Velde
2017-04-14
04 Eric Rosen Uploaded new revision
2016-11-21
03 Eric Rosen New version available: draft-ietf-idr-tunnel-encaps-03.txt
2016-11-21
03 (System) New version approved
2016-11-21
03 (System) Request for posting confirmation emailed to previous authors: idr-chairs@ietf.org, "Gunter Van de Velde" , "Keyur Patel" , "Eric Rosen"
2016-11-21
03 Eric Rosen Uploaded new revision
2016-10-18
02 Susan Hares This document now replaces draft-rosen-idr-tunnel-encaps, draft-vandevelde-idr-remote-next-hop instead of draft-rosen-idr-tunnel-encaps
2016-05-31
02 Eric Rosen New version available: draft-ietf-idr-tunnel-encaps-02.txt
2015-12-21
01 Eric Rosen New version available: draft-ietf-idr-tunnel-encaps-01.txt
2015-08-19
00 (System) This document now replaces draft-rosen-idr-tunnel-encaps instead of None
2015-08-19
00 Eric Rosen New version available: draft-ietf-idr-tunnel-encaps-00.txt