Skip to main content

Use of Provider Edge to Provider Edge (PE-PE) Generic Routing Encapsulation (GRE) or IP in BGP/MPLS IP Virtual Private Networks
draft-ietf-l3vpn-gre-ip-2547-05

Revision differences

Document history

Date Rev. By Action
2012-08-22
05 (System) post-migration administrative database adjustment to the No Objection position for Sam Hartman
2012-08-22
05 (System) post-migration administrative database adjustment to the No Objection position for Steven Bellovin
2012-08-22
05 (System) post-migration administrative database adjustment to the No Objection position for Russ Housley
2006-11-01
05 Amy Vezza State Changes to RFC Ed Queue from Approved-announcement sent by Amy Vezza
2006-10-31
05 Amy Vezza IESG state changed to Approved-announcement sent
2006-10-31
05 Amy Vezza IESG has approved the document
2006-10-31
05 Amy Vezza Closed "Approve" ballot
2006-10-31
05 Amy Vezza State Changes to Approved-announcement to be sent from IESG Evaluation::External Party by Amy Vezza
2006-10-30
05 Sam Hartman [Ballot Position Update] Position for Sam Hartman has been changed to No Objection from Discuss by Sam Hartman
2006-10-30
05 Mark Townsley Intended Status has been changed to Informational from Proposed Standard
2006-10-30
05 Mark Townsley [Note]: 'IESG note added addressing Sam''s concerns. Awaiting response in order to advance.' added by Mark Townsley
2006-10-30
05 Mark Townsley [Ballot Position Update] New position, Yes, has been recorded by Mark Townsley
2006-07-07
05 Mark Townsley
Met with Sam in person on 6/28/2006 to discuss how to move forward. Proposed advacing this document and the ipsec-2547 document forward as Experimental. Sam …
Met with Sam in person on 6/28/2006 to discuss how to move forward. Proposed advacing this document and the ipsec-2547 document forward as Experimental. Sam said he would writeup text that would help satisfy the secdir's security considerations, assuming that the gre-ip and ipsec documents would both move forward as experimental.
2006-07-07
05 Mark Townsley State Changes to IESG Evaluation::External Party from IESG Evaluation::AD Followup by Mark Townsley
2006-07-07
05 Mark Townsley [Note]: 'Waiting on writeup from Sam with suggested text on how to proceed.' added by Mark Townsley
2006-05-31
05 Dan Romascanu [Ballot Position Update] New position, No Objection, has been recorded for Dan Romascanu by Dan Romascanu
2006-05-25
05 Ross Callon [Ballot Position Update] New position, Yes, has been recorded for Ross Callon by Ross Callon
2006-05-25
05 Magnus Westerlund [Ballot Position Update] New position, No Objection, has been recorded for Magnus Westerlund by Magnus Westerlund
2006-05-25
05 Cullen Jennings [Ballot Position Update] New position, No Objection, has been recorded for Cullen Jennings by Cullen Jennings
2006-03-06
05 Mark Townsley [Note]: 'Part of Sam''s general block on L*VPN' added by Mark Townsley
2006-03-06
05 Mark Townsley Moving to External Party while I wait on resolution of general security issue with Sam.
2005-12-19
05 Mark Townsley
PROTO

-------- Original Message --------
Subject: NITs checked, Re: draft-ietf-l3vpn-gre-ip-2547-05.txt
Date: Sat, 17 Dec 2005 23:14:20 -0500
From: Ross Callon
To: townsley@cisco.com, margaret@thingmagic.com, …
PROTO

-------- Original Message --------
Subject: NITs checked, Re: draft-ietf-l3vpn-gre-ip-2547-05.txt
Date: Sat, 17 Dec 2005 23:14:20 -0500
From: Ross Callon
To: townsley@cisco.com, margaret@thingmagic.com, zinin@psg.com
CC: Rick Wilder , rbonica@juniper.net, rcallon@juniper.net


A small update to my writeup regarding draft-ietf-l3vpn-gre-ip-2547-05.txt.

I have now run the automated Idnits tool, and the draft checks out
fine with no nits found.

Thanks, Ross

At 11:49 PM 12/16/2005 -0500, Ross Callon wrote:
>    1.a) Have the chairs personally reviewed this version of the Internet
>        Draft (ID), and in particular, do they believe this ID is ready
>        to forward to the IESG for publication?
>
>Yes, Ross has reviewed the specification. Ron is co-author.
>
>    1.b) Has the document had adequate review from both key WG members
>        and key non-WG members?  Do you have any concerns about the
>        depth or breadth of the reviews that have been performed?
>
>Yes, I believe so.
>
>    1.c) Do you have concerns that the document needs more review from a
>        particular (broader) perspective (e.g., security, operational
>        complexity, someone familiar with AAA, etc.)?
>
>No
>
>    1.d) Do you have any specific concerns/issues with this document that
>        you believe the ADs and/or IESG should be aware of?  For
>        example, perhaps you are uncomfortable with certain parts of the
>        document, or have concerns whether there really is a need for
>        it.  In any event, if your issues have been discussed in the WG
>        and the WG has indicated it that it still wishes to advance the
>        document, detail those concerns in the write-up.
>
>No
>
>In the past there was inadequate discussion of security issues,
>particularly wrt spoofed packets. I believe that the text that has
>been recently added clears up this deficiency. Otherwise the
>approach is pretty straightforward and well documented.
>
>    1.e) How solid is the WG consensus behind this document? Does it
>        represent the strong concurrence of a few individuals, with
>        others being silent, or does the WG as a whole understand and
>        agree with it?
>
>This is a pretty simple document which I believe is well understood.
>
>Most deployments of BGP/MPLS L3 VPNs will use MPLS on a PE
>to P to PE basis, and thus won't need this approach.
>
>There have in the past been service providers interested in providing
>BGP/MPLS L3 VPNs over an IP-only core. This has become of less
>interest as MPLS is more widely deployed. I think that in those rare
>cases that anyone wants to do this, the approach outlined in this
>document is accepted as the right way forward. This *might* become
>more important in the future as inter-AS VPNs become more common
>(ie, if service providers are nervous about inter-domain LSPs -- although
>there are other options where MPLS is used within a domain, but
>not between domains).
>
>    1.f) Has anyone threatened an appeal or otherwise indicated extreme
>        discontent?  If so, please summarise the areas of conflict in
>        separate email to the Responsible Area Director.
>
>No
>
>    1.g) Have the chairs verified that the document adheres to all of the
>        ID nits? (see http://www.ietf.org/ID-Checklist.html).
>
>Not yet. I will do this.
>
>    1.h) Is the document split into normative and informative references?
>
>There are normative references. There are no informative references.
>Looking over the documents referenced, I agree that these should
>be normative.
>
>        Are there normative references to IDs, where the IDs are not
>        also ready for advancement or are otherwise in an unclear state?
>        (note here that the RFC editor will not publish an RFC with
>        normative references to IDs, it will delay publication until all
>        such IDs are also ready for publication as RFCs.)
>
>No. The only ID to which there is an normative reference is
>already in the RFC editors queue (other references are to RFCs).
>
>    1.i) For Standards Track and BCP documents, the IESG approval
>        announcement includes a write-up section with the following
>        sections:
>
>        *    Technical Summary
>
>This draft describes an implementation strategy for BGP/MPLS Layer 3
>Virtual Private Networks (VPNs) in which the outermost MPLS label
>(i.e., the tunnel label) is replaced with either an IP header or an IP header
>with Generic Routing Encapsulation (GRE). This enables the deployment
>of BGP/MPLS IP VPN technology in networks whose edge devices are
>MPLS and VPN aware, but whose interior devices are not.
>
>        *    Working Group Summary
>
>There are no WG conflicts regarding this draft.
>
>        *    Protocol Quality
>
>My personal opinion is that this draft is well done.
2005-12-19
05 Mark Townsley Note field has been cleared by Mark Townsley
2005-12-19
05 Mark Townsley
  1.a) Have the chairs personally reviewed this version of the Internet
        Draft (ID), and in particular, do they believe this …
  1.a) Have the chairs personally reviewed this version of the Internet
        Draft (ID), and in particular, do they believe this ID is ready
        to forward to the IESG for publication?

Yes, Ross has reviewed the specification. Ron is co-author.

  1.b) Has the document had adequate review from both key WG members
        and key non-WG members?  Do you have any concerns about the
        depth or breadth of the reviews that have been performed?

Yes, I believe so.

  1.c) Do you have concerns that the document needs more review from a
        particular (broader) perspective (e.g., security, operational
        complexity, someone familiar with AAA, etc.)?

No

  1.d) Do you have any specific concerns/issues with this document that
        you believe the ADs and/or IESG should be aware of?  For
        example, perhaps you are uncomfortable with certain parts of the
        document, or have concerns whether there really is a need for
        it.  In any event, if your issues have been discussed in the WG
        and the WG has indicated it that it still wishes to advance the
        document, detail those concerns in the write-up.

No

In the past there was inadequate discussion of security issues,
particularly wrt spoofed packets. I believe that the text that has
been recently added clears up this deficiency. Otherwise the
approach is pretty straightforward and well documented.

  1.e) How solid is the WG consensus behind this document? Does it
        represent the strong concurrence of a few individuals, with
        others being silent, or does the WG as a whole understand and
        agree with it?

This is a pretty simple document which I believe is well understood.

Most deployments of BGP/MPLS L3 VPNs will use MPLS on a PE
to P to PE basis, and thus won't need this approach.

There have in the past been service providers interested in providing
BGP/MPLS L3 VPNs over an IP-only core. This has become of less
interest as MPLS is more widely deployed. I think that in those rare
cases that anyone wants to do this, the approach outlined in this
document is accepted as the right way forward. This *might* become
more important in the future as inter-AS VPNs become more common
(ie, if service providers are nervous about inter-domain LSPs -- although
there are other options where MPLS is used within a domain, but
not between domains).

  1.f) Has anyone threatened an appeal or otherwise indicated extreme
        discontent?  If so, please summarise the areas of conflict in
        separate email to the Responsible Area Director.

No

  1.g) Have the chairs verified that the document adheres to all of the
        ID nits? (see http://www.ietf.org/ID-Checklist.html).

Not yet. I will do this.

  1.h) Is the document split into normative and informative references?

There are normative references. There are no informative references.
Looking over the documents referenced, I agree that these should
be normative.

        Are there normative references to IDs, where the IDs are not
        also ready for advancement or are otherwise in an unclear state?
        (note here that the RFC editor will not publish an RFC with
        normative references to IDs, it will delay publication until all
        such IDs are also ready for publication as RFCs.)

No. The only ID to which there is an normative reference is
already in the RFC editors queue (other references are to RFCs).

  1.i) For Standards Track and BCP documents, the IESG approval
        announcement includes a write-up section with the following
        sections:

        *    Technical Summary

This draft describes an implementation strategy for BGP/MPLS Layer 3
Virtual Private Networks (VPNs) in which the outermost MPLS label
(i.e., the tunnel label) is replaced with either an IP header or an IP header
with Generic Routing Encapsulation (GRE). This enables the deployment
of BGP/MPLS IP VPN technology in networks whose edge devices are
MPLS and VPN aware, but whose interior devices are not.

        *    Working Group Summary

There are no WG conflicts regarding this draft.

        *    Protocol Quality

My personal opinion is that this draft is well done.
2005-12-07
05 Mark Townsley [Note]: 'Pinged chairs for proto questionairre' added by Mark Townsley
2005-10-26
05 Russ Housley [Ballot Position Update] Position for Russ Housley has been changed to No Objection from Discuss by Russ Housley
2005-09-14
05 Russ Housley The conserns raised by Steve Bellovin do not appear to be addressed.  They have moved to Section 5, that's it...
2005-08-04
05 (System) New version available: draft-ietf-l3vpn-gre-ip-2547-05.txt
2005-07-28
05 Mark Townsley [Note]: 'Waiting for writeup from WG' added by Mark Townsley
2005-07-21
05 (System) Sub state has been changed to AD Follow up from New Id Needed
2005-07-21
04 (System) New version available: draft-ietf-l3vpn-gre-ip-2547-04.txt
2005-03-24
05 Mark Townsley State Changes to IESG Evaluation::Revised ID Needed from IESG Evaluation::AD Followup by Mark Townsley
2005-03-24
05 Mark Townsley Note field has been cleared by Mark Townsley
2005-03-24
05 Mark Townsley [Note]: 'Sent email response to Chairs on 3/23/2005 outlining AD and IESG issues. Doc probably needs another spin.' added by Mark Townsley
2005-03-11
05 Mark Townsley Shepherding AD has been changed to Mark Townsley from Thomas Narten
2004-11-24
05 Thomas Narten
2004-11-18
05 Amy Vezza State Changes to IESG Evaluation::AD Followup from IESG Evaluation by Amy Vezza
2004-11-18
05 Allison Mankin [Ballot Position Update] Position for Allison Mankin has been changed to No Objection from Undefined by Allison Mankin
2004-11-18
05 Allison Mankin
[Ballot comment]
I wish Defers resulted in showing the document as returning (even one as memorious as I
can forget :)

I'm going to give …
[Ballot comment]
I wish Defers resulted in showing the document as returning (even one as memorious as I
can forget :)

I'm going to give a No (Further) Objection, but as TSV, my concern is with the
non-statement of the additional dilution of possible QoS interactions.  2547 is
a routing technology, but 2547 has a comment about constructing QoS or TE
based on managing the MPLS in the customer premises and linking it to TE or
QoS measures in the Service Provider.  (See below for the section from 2547bis,
which states that QoS is a key factor for VPN use, as its first sentence).  If there
is a dynamic, who-knows-what-nature, tunnel hop, that is invisible and unannounced
to the customer, then 2547bis with these tunnels has lower service potentials than
2547bis without them.  The paragraph:

  Although not the focus of this paper, Quality of Service is a key
  component of any VPN service.  In MPLS/BGP VPNs, existing L3 QoS
  capabilities can be applied to labeled packets through the use of the
  "experimental" bits in the shim header [MPLS-ENCAPS], or, where ATM
  is used as the backbone, through the use of ATM QoS capabilities.
  The traffic engineering work discussed in [MPLS-RSVP] is also
  directly applicable to MPLS/BGP VPNs.  Traffic engineering could even
  be used to establish label switched paths with particular QoS
  characteristics between particular pairs of sites, if that is
  desirable.  Where an MPLS/BGP VPN spans multiple SPs, the
  architecture described in [PASTE] may be useful.  An SP may apply
  either intserv (Integrated Services) or diffserv (Differentiated
  Services) capabilities to a particular VPN, as appropriate.
2004-11-18
05 Allison Mankin [Ballot comment]
I wish the Defers were recorded (one forgets)
2004-11-17
05 Sam Hartman
[Ballot discuss]
This protocol does not seem to have a mandatory-to-implment secure
mode of operation.  It doesn't even really seem to have an
optional-to-implement mode …
[Ballot discuss]
This protocol does not seem to have a mandatory-to-implment secure
mode of operation.  It doesn't even really seem to have an
optional-to-implement mode of operation  that  provides security
similar to the  existing MPLS VPN solutions. 

Steve/Russ's discuss imply that the problem can be fixed with security
considerations text similar to that in section 8.1 of
draft-ietf-mpls-in-ip.    I don't think this is true.    I think you
need all the detail of draft-ietf-l3vpn-ipsec-2547, which appears to
be a good start at the solution to the security problems of this
draft. 

Proposals for going forward:

1) Finish up draft-ietf-ipsec-2547 and add an optional mode where
GRE/IP or IP/IP is used but no IPsec is applied.

2) Describe the problems with this approach and publish as
informational pointing to option 1 as a long-term solution once it is
finished.
2004-11-17
05 Sam Hartman [Ballot Position Update] New position, Discuss, has been recorded for Sam Hartman by Sam Hartman
2004-11-17
05 Allison Mankin [Ballot comment]
Why is this on the agenda as a new document 11/18 when we considered it before
DC?  (Secretariat query)
2004-11-17
05 Allison Mankin [Ballot Position Update] New position, Undefined, has been recorded for Allison Mankin by Allison Mankin
2004-11-17
05 Harald Alvestrand
[Ballot comment]
I am abstaining because I can't figure out whether this is something with "no more danger than what people ordinarily do" or something …
[Ballot comment]
I am abstaining because I can't figure out whether this is something with "no more danger than what people ordinarily do" or something that exposes users to a significant additional risk.

Reviewed by Mary Barnes, Gen-ART

Her review:

Overall, from an editorial perspective, this document appears ready for publication. However, although I'm not an SME in this area, I too share some of the concerns and comments raised around the security issues and the limited applicability (single SP).  I would think publishing this as Informational/BCP as to how one could do this sort of functionality if it were deemed useful in this restrictive situation would be better than publishing as Proposed Standard.
2004-11-10
05 (System) State Changes to IESG Evaluation from IESG Evaluation - Defer by system
2004-10-29
05 (System) Removed from agenda for telechat - 2004-10-28
2004-10-28
05 Russ Housley
[Ballot discuss]
I agreed to pick up Steve Bellovin's DISCUSS.  He said:

    This spec scares me.  Section 6 more or less says "if …
[Ballot discuss]
I agreed to pick up Steve Bellovin's DISCUSS.  He said:

    This spec scares me.  Section 6 more or less says "if you don't get
    this right you're risking all sorts of trouble, and it's very hard
    to get this right."
   
    Not only must all inputs to the provider network filter out all
    packets with such source addresses, the MPLS label inside a packet
    must correspond to the source address of that packet.  Otherwise,
    anyone can spoof anyone else.
2004-10-28
05 Russ Housley [Ballot Position Update] Position for Russ Housley has been changed to Discuss from No Objection by Russ Housley
2004-10-28
05 Steven Bellovin [Ballot comment]
Russ has picked up the token for my DISCUSS
2004-10-28
05 Steven Bellovin [Ballot Position Update] Position for Steve Bellovin has been changed to No Objection from Discuss by Steve Bellovin
2004-10-28
05 Allison Mankin State Changes to IESG Evaluation - Defer from IESG Evaluation by Allison Mankin
2004-10-28
05 Harald Alvestrand [Ballot Position Update] New position, Abstain, has been recorded for Harald Alvestrand by Harald Alvestrand
2004-10-28
05 Bill Fenner [Ballot Position Update] New position, No Objection, has been recorded for Bill Fenner by Bill Fenner
2004-10-28
05 Bert Wijnen [Ballot Position Update] New position, No Objection, has been recorded for Bert Wijnen by Bert Wijnen
2004-10-28
05 Alex Zinin
[Ballot comment]
> 4. Motivations
...
>  In this procedure, the ingress and egress PE routers themselves MUST
>  support MPLS, but that is not …
[Ballot comment]
> 4. Motivations
...
>  In this procedure, the ingress and egress PE routers themselves MUST
>  support MPLS, but that is not an issue, as those routers MUST
>  necessarily have BGP/MPLS IP VPN support, whereas the transit routers
>  arguably should be able to be "vanilla" routers with no special MPLS
>  or VPN support.

The two upper-case MUSTs above don't seem to be normative and should be
lower-cased.
2004-10-28
05 Alex Zinin [Ballot Position Update] New position, No Objection, has been recorded for Alex Zinin by Alex Zinin
2004-10-28
05 Jon Peterson [Ballot Position Update] New position, No Objection, has been recorded for Jon Peterson by Jon Peterson
2004-10-27
05 Michelle Cotton IANA Comments:
We understand there to be NO IANA Actions.
2004-10-27
05 David Kessens
[Ballot comment]
From Pekka Savola, OPS directorate:

I share Steve's concerns (in the tracker).

FWIW, I tried to get some better text in
draft-ietf-mpls-in-ip-or-gre-08.txt (which …
[Ballot comment]
From Pekka Savola, OPS directorate:

I share Steve's concerns (in the tracker).

FWIW, I tried to get some better text in
draft-ietf-mpls-in-ip-or-gre-08.txt (which is used as a building block
here) which would have somewhat mitigated the problems (so that packet
injection would have been impossible inside single-provider networks),
but in the end I was overrun.

(I think that spec needed better discussion of source/destination
address spoofing concerns, and I'd have wanted to require that the
decapsulators check that the source address of the tunnel packet is
coming from a valid peer (=source address), not just anyone at all.)
2004-10-27
05 David Kessens [Ballot Position Update] New position, No Objection, has been recorded for David Kessens by David Kessens
2004-10-25
05 Ted Hardie [Ballot Position Update] Position for Ted Hardie has been changed to Abstain from Undefined by Ted Hardie
2004-10-25
05 Ted Hardie
[Ballot comment]
This text in section 6:

  The filtering described in the previous paragraph works only within a
  single SP network. It is …
[Ballot comment]
This text in section 6:

  The filtering described in the previous paragraph works only within a
  single SP network. It is not clear whether (and how) this filtering
  could be extended to support multiple SP networks. That makes the
  scheme described in this document fairly problematic in the multi-
  provider environment. makes me wonder at the overall utility of this.

causes me to abstain from this document.  I am generally concerned with
the over-dependence on tunnels and overlay networks, and this restriction
just convinces me the utlity of this is too small.
2004-10-25
05 Ted Hardie [Ballot Position Update] New position, Undefined, has been recorded for Ted Hardie by Ted Hardie
2004-10-25
05 Steven Bellovin
[Ballot discuss]
This spec scares me.  Section 6 more or less says "if you don't get this right you're risking all sorts of trouble, and …
[Ballot discuss]
This spec scares me.  Section 6 more or less says "if you don't get this right you're risking all sorts of trouble, and it's very hard to get this right."

Not only must all inputs to the provider network filter out all packets with such source addresses, the MPLS label inside a packet must correspond to the source address of that packet.  Otherwise, anyone can spoof anyone else.
2004-10-25
05 Scott Hollenbeck [Ballot Position Update] New position, No Objection, has been recorded for Scott Hollenbeck by Scott Hollenbeck
2004-10-25
05 Steven Bellovin [Ballot Position Update] New position, Discuss, has been recorded for Steve Bellovin by Steve Bellovin
2004-10-23
05 Russ Housley [Ballot Position Update] New position, No Objection, has been recorded for Russ Housley by Russ Housley
2004-10-21
05 Thomas Narten Placed on agenda for telechat - 2004-10-28 by Thomas Narten
2004-10-21
05 Thomas Narten State Changes to IESG Evaluation from Waiting for Writeup by Thomas Narten
2004-10-21
05 Thomas Narten [Note]: '2004-10-21: Ready for IESG review.' added by Thomas Narten
2004-10-21
05 Thomas Narten [Ballot Position Update] New position, Yes, has been recorded for Thomas Narten
2004-10-21
05 Thomas Narten Ballot has been issued by Thomas Narten
2004-10-21
05 Thomas Narten Created "Approve" ballot
2004-10-12
05 Thomas Narten State Changes to Waiting for Writeup from IESG Evaluation by Thomas Narten
2004-10-12
05 Thomas Narten [Note]: '2004-10-11: -03 is out, ready for IESG review (once writeup is done).' added by Thomas Narten
2004-10-12
05 Thomas Narten State Changes to IESG Evaluation from Waiting for Writeup by Thomas Narten
2004-10-12
05 Thomas Narten [Note]: '2004-10-11: -03 is out, ready for IESG review.' added by Thomas Narten
2004-10-11
03 (System) New version available: draft-ietf-l3vpn-gre-ip-2547-03.txt
2004-09-10
05 (System) State has been changed to Waiting for Writeup from In Last Call by system
2004-08-27
05 Amy Vezza Last call sent
2004-08-27
05 Amy Vezza State Changes to In Last Call from Last Call Requested by Amy Vezza
2004-08-27
05 Thomas Narten Last Call was requested by Thomas Narten
2004-08-27
05 Thomas Narten State Changes to Last Call Requested from AD Evaluation by Thomas Narten
2004-08-27
05 (System) Ballot writeup text was added
2004-08-27
05 (System) Last call text was added
2004-08-27
05 (System) Ballot approval text was added
2004-08-25
05 Thomas Narten State Changes to AD Evaluation from Publication Requested by Thomas Narten
2004-08-25
05 Thomas Narten State Change Notice email list have been change to rick@rhwilder.net, rcallon@juniper.net, ronald.p.bonica@mci.com, yakov@juniper.net, erosen@cisco.com from , ,
2004-08-25
05 Thomas Narten [Note]: '2004-08-25: Only minor comments on document; confirm with chairs,then start IETF LC.' added by Thomas Narten
2004-05-18
05 Alex Zinin This is Thomas'es document.
2004-05-18
05 Alex Zinin Shepherding AD has been changed to Thomas Narten from Alex Zinin
2004-04-21
05 Barbara Fuller State Changes to Publication Requested from AD is watching by Barbara Fuller
2004-04-21
05 Barbara Fuller Intended Status has been changed to Proposed Standard from None
2004-04-14
02 (System) New version available: draft-ietf-l3vpn-gre-ip-2547-02.txt
2004-03-22
01 (System) New version available: draft-ietf-l3vpn-gre-ip-2547-01.txt
2003-07-23
00 (System) New version available: draft-ietf-l3vpn-gre-ip-2547-00.txt
2003-05-01
05 Alex Zinin Shepherding AD has been changed to Zinin, Alex from Bradner, Scott
2002-04-27
05 Scott Bradner Draft Added by Scott Bradner