Skip to main content

MPLS Egress Protection Framework
draft-ietf-mpls-egress-protection-framework-07

Revision differences

Document history

Date Rev. By Action
2019-11-26
07 (System) RFC Editor state changed to AUTH48-DONE from AUTH48
2019-11-13
07 (System) RFC Editor state changed to AUTH48 from RFC-EDITOR
2019-10-22
07 (System) RFC Editor state changed to RFC-EDITOR from EDIT
2019-08-02
07 (System) RFC Editor state changed to EDIT
2019-08-02
07 (System) IESG state changed to RFC Ed Queue from Approved-announcement sent
2019-08-02
07 (System) Announcement was received by RFC Editor
2019-08-01
07 (System) IANA Action state changed to No IANA Actions from In Progress
2019-08-01
07 (System) IANA Action state changed to In Progress
2019-08-01
07 Cindy Morgan IESG state changed to Approved-announcement sent from IESG Evaluation::AD Followup
2019-08-01
07 Cindy Morgan IESG has approved the document
2019-08-01
07 Cindy Morgan Closed "Approve" ballot
2019-08-01
07 Cindy Morgan Ballot writeup was changed
2019-08-01
07 Deborah Brungard Ballot approval text was changed
2019-07-31
07 Roman Danyliw [Ballot comment]
Thank you for addressing my DISCUSSes and COMMENTs.
2019-07-31
07 Roman Danyliw [Ballot Position Update] Position for Roman Danyliw has been changed to No Objection from Discuss
2019-07-31
07 (System) Sub state has been changed to AD Followup from Revised ID Needed
2019-07-31
07 (System) IANA Review state changed to Version Changed - Review Needed from IANA OK - No Actions Needed
2019-07-31
07 Yimin Shen New version available: draft-ietf-mpls-egress-protection-framework-07.txt
2019-07-31
07 (System) New version approved
2019-07-31
07 (System) Request for posting confirmation emailed to previous authors: Carsten Michel , Bruno Decraene , Jeyananth Jeganathan , Hannes Gredler , Yimin Shen , Huaimo Chen
2019-07-31
07 Yimin Shen Uploaded new revision
2019-07-11
06 Cindy Morgan IESG state changed to IESG Evaluation::Revised I-D Needed from IESG Evaluation
2019-07-11
06 Ignas Bagdonas [Ballot Position Update] New position, No Objection, has been recorded for Ignas Bagdonas
2019-07-10
06 Adam Roach [Ballot comment]
Please update the examples to use either IPv6 addresses or a mix of IPv4 and IPv6 addresses. See https://www.iab.org/2016/11/07/iab-statement-on-ipv6/ for details.
2019-07-10
06 Adam Roach [Ballot Position Update] New position, No Objection, has been recorded for Adam Roach
2019-07-10
06 Barry Leiba [Ballot Position Update] New position, No Objection, has been recorded for Barry Leiba
2019-07-10
06 Suresh Krishnan [Ballot Position Update] New position, No Objection, has been recorded for Suresh Krishnan
2019-07-10
06 Christian Huitema Request for Telechat review by SECDIR Completed: Ready. Reviewer: Christian Huitema. Sent review to list.
2019-07-10
06 Alissa Cooper [Ballot comment]
I support Roman's DISCUSS.
2019-07-10
06 Alissa Cooper [Ballot Position Update] New position, No Objection, has been recorded for Alissa Cooper
2019-07-09
06 Amanda Baber IANA Review state changed to IANA OK - No Actions Needed from Version Changed - Review Needed
2019-07-09
06 Roman Danyliw
[Ballot discuss]
A few questions about the Security Considerations:

(1) Section 11.  I appreciate that this a framework document that is trying to be generic.  …
[Ballot discuss]
A few questions about the Security Considerations:

(1) Section 11.  I appreciate that this a framework document that is trying to be generic.  Section 4 (and others) seem to lay out generic requirements.  However, this Security Considerations section is both vague on the protocol choices (understandable) and the security services/properties they would have (the gap).  For example, “The general security measures of the protocols SHOULD be used whenever applicable.” and “The available security measures of the chosen protocol SHOULD be used to achieve a secured session between the two routers.”  Some discussion of what a “secured session” would look like would be helpful.

(2) Section 11.  What are the elements and enablers of “a certain level of trust … [being] established between the routers for the protocols to run securely”?
2019-07-09
06 Roman Danyliw
[Ballot comment]
(3) Section 4.  Per “The framework MUST consider minimizing disruption during deployment”, why is this MUST only to _consider_ minimizing rather than actually …
[Ballot comment]
(3) Section 4.  Per “The framework MUST consider minimizing disruption during deployment”, why is this MUST only to _consider_ minimizing rather than actually minimizing the disruption?

(4) Section 5.7.  Per “a globally unique IPv4/v6 address  is assigned to a protected egress {E, P} as the identifier of the protected egress {E, P}”, I recommend being explicit and saying and s/IPv4\\v6/IPv4 or v6/

(5) Section 9.  I’m missing something obvious -- what is a “label table pe2.mpls”?
2019-07-09
06 Roman Danyliw [Ballot Position Update] New position, Discuss, has been recorded for Roman Danyliw
2019-07-09
06 Magnus Westerlund [Ballot Position Update] New position, No Objection, has been recorded for Magnus Westerlund
2019-07-08
06 Éric Vyncke [Ballot Position Update] New position, No Objection, has been recorded for Éric Vyncke
2019-07-05
06 Mirja Kühlewind
[Ballot comment]
I recommend to use the exact boilerplate text from RFC8174:
      "The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL …
[Ballot comment]
I recommend to use the exact boilerplate text from RFC8174:
      "The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
      NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
      "MAY", and "OPTIONAL" in this document are to be interpreted as
      described in BCP 14 [RFC2119] [RFC8174] when, and only when, they
      appear in all capitals, as shown here."

Editorial comments:

1) I recommend to either move the requirement section to the appendix or rephrase this section to outline features of the final framework instead of stating requirements.

2) section 5.2: "The mechanisms SHOULD be reasonably fast"
Alvaro also commented on this sentence, however, I think the resolution here is to not use normatively language because that is not needed.
2019-07-05
06 Mirja Kühlewind Ballot comment text updated for Mirja Kühlewind
2019-07-05
06 Mirja Kühlewind
[Ballot comment]
I recommend to use the exact boilerplate text from RFC8174:
      "The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL …
[Ballot comment]
I recommend to use the exact boilerplate text from RFC8174:
      "The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
      NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
      "MAY", and "OPTIONAL" in this document are to be interpreted as
      described in BCP 14 [RFC2119] [RFC8174] when, and only when, they
      appear in all capitals, as shown here."

Editorial comments:

1) I recommend to either more the requirement section to the appendix or rephrase this section to outline features of the final framework instead of stating requirements.

2) section 5.2: "The mechanisms SHOULD be reasonably fast"
Alvaro also commented on this sentence, however, I think the resolution here is to not use normatively language because that is not needed.
2019-07-05
06 Mirja Kühlewind [Ballot Position Update] New position, No Objection, has been recorded for Mirja Kühlewind
2019-07-04
06 Warren Kumari
[Ballot comment]
Firstly, I'd like to thank you for addressing Scott Bradner's OpsDir review, and Scott for providing it. I think that this has noticeably …
[Ballot comment]
Firstly, I'd like to thank you for addressing Scott Bradner's OpsDir review, and Scott for providing it. I think that this has noticeably improved the document.

I have a general question -- like many documents, this talks about "link failure", but is somewhat silent on what exactly is meant by "link" -- is this a "circuit" or does it also include something like TE / bundled (RFC4201) / aggregated / whatever links? The terminology section somewhat hints that it covers all, but is still somewhat vague.
(Note that this is just a comment, feel free to consider and reject it... )
2019-07-04
06 Warren Kumari [Ballot Position Update] New position, No Objection, has been recorded for Warren Kumari
2019-07-03
06 Deborah Brungard IESG state changed to IESG Evaluation from Waiting for Writeup
2019-07-03
06 Alvaro Retana
[Ballot comment]
(1) [nit] The MP and the protector are the same thing, right?  Names are just that...but it seems that using MP avoids adding …
[Ballot comment]
(1) [nit] The MP and the protector are the same thing, right?  Names are just that...but it seems that using MP avoids adding one more name for the same thing.

(2) §1: "The framework is described by mainly referring to P2P...it is equally applicable to P2MP...MP2P...and MP2MP...if the sub-LSPs of these tunnels can be viewed as P2P tunnels."  This statement is reflected in one of the requirements in §4.  Are there cases where P2MP/MP2P/MP2MP tunnels cannot be treated as p2p?  If so, then please add some text about that to scope the applicability.

(3) §1: "The framework does see the need for extensions of IGPs and service label distribution protocols in some procedures, particularly for supporting protection establishment and context label switching.  This document provides guidelines for these extensions, but leaves the specific details to separate documents."  Leaving the details to separate documents is fine.  However, the document is not clear/straight forward about which procedures might need extensions and which do not.  In particular, I think that this document, and future work, would benefit from a clear indication of where particular procedures are documented (which might mean adding a lot of more references), or, even better, a clear indication of the ones that are not already documented.

(4) §1: "It is RECOMMENDED that the framework SHOULD be used in conjunction with control-plane convergence or global repair..."  RECOMMENDED and SHOULD have the same meaning.  This sentence is redundant.

(5) §3: "A protector MAY be physically co-located with or decoupled from a backup egress router..."  I think that the MAY is out of place because it isn't specifying anything, just stating a fact.  s/MAY/may

(6) §4: s/considers the followings/considers the following

(7) §4 (Requirements)  Are there requirements listed in this section that are not satisfied in the document?  I expect the answer to be No.  I don't think that using Normative Language in this Section is a good thing because it is not being used to require any type of interoperability (as can be argued for the rest of the document), but only to define requirements that should be satisfied in this same document. 

(8) §5.2: "The mechanisms SHOULD be reasonably fast, i.e., faster than control plane failure detection and remote failure detection."  When would it be ok for this mechanism to be slower?  IOW, why isn't MUST used?

(9) §5.2: In the list of guidelines a difference between "a reasonably fast mechanism" and "a fast mechanism" seems to be made.  The implication (from the previous comment) is that a "fast mechanism" is not fast enough (because it is slower that the control plane).  In the context of this section what seems important is the ability to distinguish between a link failure and an egress node failure, or not...and not whether the mechanism is reasonably fast or simply fast.  Suggestion: s//PLR has a mechanism

(10) §5.2: "treating a link failure as an egress node failure MUST NOT have a negative impact on services"  How can the PLR figure the impact on the services beforehand?

(11) §5.3: "each service destination MUST be dual-homed or have dual paths to the egress router and a backup egress router which serves as the protector."  I don't think it is a requirement for the backup to always be the protector.  s/backup egress router which serves as the protector/backup egress router which may serve as the protector

(12) §5.4: "A given egress router E MAY be the tailend of multiple tunnels."  The MAY is out of place, the sentence just states a fact. s/MAY/may

(13) "MAY or MAY not" is used a couple of times to show an optional behavior.  MAY already means optional.  In all cases in this document I don't think that Normative language is needed. s/MAY or MAY not/may or may not

(14) §5.6: s/The bypass tunnel MUST have the property that it MUST NOT be affected by the topology change caused by an egress node failure./The bypass tunnel MUST NOT be affected by the topology change caused by an egress node failure.

(15) s/IPv4/v6/IPv4/IPv6

(16) §5.7: "The PLR MAY establish the egress-protection bypass tunnel to P in several manners."  The MAY is just stating a fact.  s/MAY/may

(17) Please expand UHP.

(18) §5.8: "The advertisement MUST be understood by the PLR."  On one hand, I think this is an obvious statement, and is not needed.  On the other hand, I get the feeling that it was included because there is something else to be considered...but I don't know what, and the text doesn't say.  If there is something specific to be considered, please write it down.

(19) §5.8: "The "context ID label binding" advertisement is defined as IGP mirroring context segment in [RFC8402], [SR-OSPF] and [SR-ISIS]."  The mirror context segment is not defined for OSPF.

(20) §5.8: "...care MUST be taken for the applicability of this approach to a network."  What does that mean?  How can it be Normatively enforced?  It would be nice to spell out the potential pitfalls to be taken into account.  The sentence right after says that "the feasibility of each approach in a given network as dependent on the topology, manageability, and available protocols of the network."  This statement sounds like it should result in guidance (even if general) on when an approach may be applicable.  I would like to see that type of guidance somewhere in the document -- the Operational Considerations sections looks ideal to me.

(21) §5.9: "An egress-protection bypass tunnel MAY be established via several methods:"  I think that all the MAYs in the bullets are not needed because of the one at the top.  In fact, I think all of them (including the one at the top) just state a fact (not a Normative action).  s/MAY/may

(22) §5.11: "Specific extensions MAY be needed..."  Again, just a fact.  s/MAY/may'

(23) §5.11: "The details of the extensions SHOULD be specified in separate documents."  Where else would they be specified?  IOW, why not use MUST?  Or even better, why is Normative language even needed?

(24) §7: s/it is RECOMMENDED that the services affected by a failure SHOULD be moved to/the services affected by a failure SHOULD be moved to  RECOMMENDED = SHOULD

(25) §8: s/it is RECOMMENDED that the router SHOULD generate/it is RECOMMENDED that the router generate    RECOMMENDED = SHOULD

(26) §10: "The nexthops of these routes MUST be...  The nexthops MUST NOT use..."  This section is an example, there should not be any Normative language.
2019-07-03
06 Alvaro Retana [Ballot Position Update] New position, No Objection, has been recorded for Alvaro Retana
2019-06-28
06 Tero Kivinen Request for Telechat review by SECDIR is assigned to Christian Huitema
2019-06-28
06 Tero Kivinen Request for Telechat review by SECDIR is assigned to Christian Huitema
2019-06-27
06 (System) IANA Review state changed to Version Changed - Review Needed from IANA OK - No Actions Needed
2019-06-27
06 Yimin Shen New version available: draft-ietf-mpls-egress-protection-framework-06.txt
2019-06-27
06 (System) New version approved
2019-06-27
06 (System) Request for posting confirmation emailed to previous authors: Carsten Michel , Bruno Decraene , Jeyananth Jeganathan , Hannes Gredler , Yimin Shen , Huaimo Chen
2019-06-27
06 Yimin Shen Uploaded new revision
2019-06-21
05 Cindy Morgan Placed on agenda for telechat - 2019-07-11
2019-06-21
05 Deborah Brungard Ballot has been issued
2019-06-21
05 Deborah Brungard [Ballot Position Update] New position, Yes, has been recorded for Deborah Brungard
2019-06-21
05 Deborah Brungard Created "Approve" ballot
2019-06-21
05 Deborah Brungard Ballot writeup was changed
2019-06-20
05 Peter Yee Request for Last Call review by GENART Completed: Ready with Nits. Reviewer: Peter Yee. Sent review to list.
2019-06-17
05 Christian Huitema Request for Last Call review by SECDIR Completed: Has Nits. Reviewer: Christian Huitema. Sent review to list.
2019-06-17
05 (System) IESG state changed to Waiting for Writeup from In Last Call
2019-06-16
05 Scott Bradner Request for Last Call review by OPSDIR Completed: Has Nits. Reviewer: Scott Bradner. Sent review to list.
2019-06-14
05 (System) IANA Review state changed to IANA OK - No Actions Needed from IANA - Review Needed
2019-06-14
05 Sabrina Tanamal
(Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs:

The IANA Functions Operator has reviewed draft-ietf-mpls-egress-protection-framework-05, which is currently in Last Call, and has the following comments:

We …
(Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs:

The IANA Functions Operator has reviewed draft-ietf-mpls-egress-protection-framework-05, which is currently in Last Call, and has the following comments:

We understand that this document doesn't require any registry actions.

While it's often helpful for a document's IANA Considerations section to remain in place upon publication even if there are no actions, if the authors strongly prefer to remove it, we do not object.

If this assessment is not accurate, please respond as soon as possible.

Thank you,

Sabrina Tanamal
Senior IANA Services Specialist
2019-06-07
05 Gunter Van de Velde Request for Last Call review by OPSDIR is assigned to Scott Bradner
2019-06-07
05 Gunter Van de Velde Request for Last Call review by OPSDIR is assigned to Scott Bradner
2019-06-06
05 Jean Mahoney Request for Last Call review by GENART is assigned to Peter Yee
2019-06-06
05 Jean Mahoney Request for Last Call review by GENART is assigned to Peter Yee
2019-06-06
05 Tero Kivinen Request for Last Call review by SECDIR is assigned to Christian Huitema
2019-06-06
05 Tero Kivinen Request for Last Call review by SECDIR is assigned to Christian Huitema
2019-06-03
05 Cindy Morgan IANA Review state changed to IANA - Review Needed
2019-06-03
05 Cindy Morgan
The following Last Call announcement was sent out (ends 2019-06-17):

From: The IESG
To: IETF-Announce
CC: mpls@ietf.org, db3546@att.com, draft-ietf-mpls-egress-protection-framework@ietf.org, mpls-chairs@ietf.org, Loa …
The following Last Call announcement was sent out (ends 2019-06-17):

From: The IESG
To: IETF-Announce
CC: mpls@ietf.org, db3546@att.com, draft-ietf-mpls-egress-protection-framework@ietf.org, mpls-chairs@ietf.org, Loa Andersson , loa@pi.nu
Reply-To: ietf@ietf.org
Sender:
Subject: Last Call:  (MPLS Egress Protection Framework) to Proposed Standard


The IESG has received a request from the Multiprotocol Label Switching WG
(mpls) to consider the following document: - 'MPLS Egress Protection
Framework'
  as Proposed Standard

The IESG plans to make a decision in the next few weeks, and solicits final
comments on this action. Please send substantive comments to the
ietf@ietf.org mailing lists by 2019-06-17. Exceptionally, comments may be
sent to iesg@ietf.org instead. In either case, please retain the beginning of
the Subject line to allow automated sorting.

Abstract


  This document specifies a fast reroute framework for protecting IP/
  MPLS services and MPLS transport tunnels against egress node and
  egress link failures.  For each type of egress failure, it defines
  the roles of point of local repair (PLR), protector, and backup
  egress router, and the procedures of establishing a bypass tunnel
  from a PLR to a protector.  It describes the behaviors of these
  routers in handling an egress failure, including local repair on the
  PLR, and context based forwarding on the protector.  The framework
  can be used to develop egress protection mechanisms to reduce traffic
  loss before global repair reacts to an egress failure and control
  plane protocols converge on the topology changes due to the egress
  failure.




The file can be obtained via
https://datatracker.ietf.org/doc/draft-ietf-mpls-egress-protection-framework/

IESG discussion can be tracked via
https://datatracker.ietf.org/doc/draft-ietf-mpls-egress-protection-framework/ballot/

The following IPR Declarations may be related to this I-D:

  https://datatracker.ietf.org/ipr/3120/
  https://datatracker.ietf.org/ipr/3113/
  https://datatracker.ietf.org/ipr/2878/





2019-06-03
05 Cindy Morgan IESG state changed to In Last Call from Last Call Requested
2019-06-03
05 Deborah Brungard Last call was requested
2019-06-03
05 Deborah Brungard Ballot approval text was generated
2019-06-03
05 Deborah Brungard Ballot writeup was generated
2019-06-03
05 Deborah Brungard IESG state changed to Last Call Requested from AD Evaluation
2019-06-03
05 Deborah Brungard Last call announcement was generated
2019-06-01
05 Loa Andersson
The MPLS working Group requests that

  draft-ietf-mpls-egress-protection-framework

is published as an RFC on the Standard Tracks

Note: 2019-06-01: Working group summary has been updated. …
The MPLS working Group requests that

  draft-ietf-mpls-egress-protection-framework

is published as an RFC on the Standard Tracks

Note: 2019-06-01: Working group summary has been updated.

(1) What type of RFC is being requested (BCP, Proposed Standard,
Internet Standard, Informational, Experimental, or Historic)?  Why
is this the proper type of RFC?  Is this type of RFC indicated in the
title page header?

  We request Proposed Standard.
  It is the right type since the document describes normative
  procedures for MPLS Egress protection.
  The title page header says, "Standards Track".


(2) The IESG approval announcement includes a Document Announcement
Write-Up. Please provide such a Document Announcement Write-Up. Recent
examples can be found in the "Action" announcements for approved
documents. The approval announcement contains the following sections:

Technical Summary

  The document specifies fast reroute procedures to protect IP/MPLS
  services and MPLS tunnels against egress node and egress link
  failures. When an egress node failure occurs the penultimate-hop
  router of a tunnel acts as the point of local repair (PLR). When
  an egress link failure occurs the egress router of the MPLS tunnel
  acts as the PLR. In both cases there is a pre-established bypass
  tunnel to a protector. Upon an egress node or link failure, the
  PLR does local failure detection and local repair. Packets are
  re-routed over the bypass tunnel.
  The protector performs context label switching or context IP
  forwarding to send the packets to the ultimate destination.7

Working Group Summary

  This document is the convergence of several initiatives in the IETF
  and in the industry in general. The working group and more
  specifically the authors have invested a huge effort to converge on
  a single solution.

  The list of authors on the title page include 7 names, more than
  the recommendation of a maximum of 5. The shepherd is personally
  convinced that the current number of authors should be kept. In
  discussion between the authors and wg chairs, the authors have
  agreed on the following motivation why there should be 7 authors
  listed,

  "The egress protection framework is a generic framework with an
  ambition to addresses protection at both transport tunnel level
  and service level, and a broad scope to accommodate services and
  transport tunnels of any type. In IETF, it has gone through almost
  8 years of extensive and cautious study and discussions, and
  through many clashes and merges of ideas, it has finally evolved
  from a set of separate solutions for individual services (i.e.
  PWE3, Layer-3 VPN) to a unified multi-service and multi-transport
  architecture. Outside of IETF, it has also involved both hard
  development work on the vendor’s side, and bold actions of
  deployment on the service provider’s side. Many people have made
  a great amount of effort in this long course. There are also
  people who helped to promote and shape of the idea of egress
  protection, draw attention to this draft, and bring the draft to
  this stage. The current list of authors just reflects their effort
  and contribution. Without them, it would impossible for the draft
  to achieve its current status. Hence, we’d like request to keep
  the author list as it is. Thanks for your understanding."
 
  Note for version -05 of the document:
  Between version -04 and -05 one person listed as an author
  in the earlier versions of the documents has decided that in
  the interest to smoothly progress the document he should
  now longer listed as an co-author. The number of listed
  co-authors are now down to 6.
  Yuanlong Jiang are now listed in the Acknowledgement
  section.


  Was there anything in WG process that is worth noting? For
  example, was there controversy about particular points or
  were there decisions where the consensus was particularly
  rough?

    It has been a long process, and the initially the positions of
    the participants were far from each other. However, the
    discussion to reach consensus has been very contructive and at
    times slow, and we now have good wg support for the draft.

Document Quality

  Are there existing implementations of the protocol? Have a
  significant number of vendors indicated their plan to
  implement the specification? Are there any reviewers that
  merit special mention as having done a thorough review,
  e.g., one that resulted in important changes or a
  conclusion that the document had no substantive issues? If
  there was a MIB Doctor, Media Type or other expert review,
  what was its course (briefly)? In the case of a Media Type
  review, on what date was the request posted?

  We know of both implementations and deployments, as informed
  by one major European vendor. We have in addition started an
  Implementation Poll and the write-up will be updated as soon
  as we get further information.

  The group that has been working on this has been fairly large
  and any reviewer that is worth mentioning is possibly included in
  the 15 people listed as authors and in the acknowledgement
  section. The MPLS-RT did as usual a good job and together with
  the authors nailed down a couple of issues.

Personnel

  Who is the Document Shepherd? Who is the Responsible Area
  Director?

  Loa Andersson is the Document Shepherd
  Deborah Brungard is the Responsible Area Director

(3) Briefly describe the review of this document that was performed by
the Document Shepherd.  If this version of the document is not ready
for publication, please explain why the document is being forwarded to
the IESG.

  This document has been discussed frequently for a long time it first
  appeared together with a "companion document" on ingress
  protection (published as RFC 8424), the shepherd has reviewed the
  document when it was first posted, before issuing the poll for
  working group adoption and working group last call.

(4) Does the document Shepherd have any concerns about the depth or
breadth of the reviews that have been performed?

  No such concerns.

(5) Do portions of the document need review from a particular or from
broader perspective, e.g., security, operational complexity, AAA, DNS,
DHCP, XML, or internationalization? If so, describe the review that
took place.

  No such reviews necessary.

(6) Describe any specific concerns or issues that the Document Shepherd
has with this document that the Responsible Area Director and/or the
IESG should be aware of? For example, perhaps he or she is uncomfortable
with certain parts of the document, or has concerns whether there really
is a need for it. In any event, if the WG has discussed those issues and
has indicated that it still wishes to advance the document, detail those
concerns here.

  No such concerns.

(7) Has each author confirmed that any and all appropriate IPR
disclosures required for full conformance with the provisions of BCP 78
and BCP 79 have already been filed. If not, explain why.

  All the authors have stated on the working group mailing list that
  they unaware of any IPRs relating to this draft than those that
  has been disclosed.


(8) Has an IPR disclosure been filed that references this document?
If so, summarize any WG discussion and conclusion regarding the IPR
disclosures.

  There are three IPR disclosures against this document. The working
  group has been made aware of the disclosures both when the
  document was adopted as a working document and at wglc.
  No concerns has been raised.

(9) How solid is the WG consensus behind this document? Does it
represent the strong concurrence of a few individuals, with others
being silent, or does the WG as a whole understand and agree with it?

  The working group is behind this document, it is viewed as a
  necessary extension to other MPLS protection mechanisms.

(10) Has anyone threatened an appeal or otherwise indicated extreme
discontent? If so, please summarise the areas of conflict in separate
email messages to the Responsible Area Director. (It should be in a
separate email because this questionnaire is publicly available.)

  No such threats.

(11) Identify any ID nits the Document Shepherd has found in this
document. (See https://www.ietf.org/tools/idnits/ and the Internet-Drafts
Checklist). Boilerplate checks are not enough; this check needs to be
thorough.

  The document passes the nits tool clean.

(12) Describe how the document meets any required formal review
criteria, such as the MIB Doctor, media type, and URI type reviews.

  No formal reviews required.

(13) Have all references within this document been identified as
either normative or informative?

  Yes, the references are correctly split into normative and
  informative.

(14) Are there normative references to documents that are not ready for
advancement or are otherwise in an unclear state? If such normative
references exist, what is the plan for their completion?

  Of the three normative references one is on "Waiting for
  write-up"-state, one is in the RFC Editors queue and draft-
  ietf-spring-segment-routing has been published as RFC 8402.

  However, the document in the RFC Editors queue has a MIS-REF, this
  MIS-REF is shared but other documents and the SPRING and MPLS are
  working to resolve it.

(15) Are there downward normative references references (see RFC 3967)?
If so, list these downward references to support the Area Director in
the Last Call procedure.

  All the normative references have "Proposed Standard" as intended
  status, this should not be construed as downward reference, but it
  might take time to get the two remaining documents through to
  RFCs.

(16) Will publication of this document change the status of any
existing RFCs? Are those RFCs listed on the title page header, listed
in the abstract, and discussed in the introduction? If the RFCs are not
listed in the Abstract and Introduction, explain why, and point to the
part of the document where the relationship of this document to the
other RFCs is discussed. If this information is not in the document,
explain why the WG considers it unnecessary.

  The publication of this document will not change the status of
  any other RFC.


(17) Describe the Document Shepherd's review of the IANA considerations
section, especially with regard to its consistency with the body of the
document. Confirm that all protocol extensions that the document makes
are associated with the appropriate reservations in IANA registries.
Confirm that any referenced IANA registries have been clearly
identified. Confirm that newly created IANA registries include a
detailed specification of the initial contents for the registry, that
allocations procedures for future registrations are defined, and a
reasonable name for the new registry has been suggested (see RFC 5226).

  This document does not make any requests for IANA actions. Maybe
  note to the RFC Editor to remove the IANA section before
  publication should be added.

(18) List any new IANA registries that require Expert Review for future
allocations. Provide any public guidance that the IESG would find
useful in selecting the IANA Experts for these new registries.

  No new IANA registries

(19) Describe reviews and automated checks performed by the Document
Shepherd to validate sections of the document written in a formal
language, such as XML code, BNF rules, MIB definitions, etc.

  No such reviews and automated checks necessary.
2019-06-01
05 Loa Andersson
The MPLS working Group requests that

  draft-ietf-mpls-egress-protection-framework

is published as an RFC on the Standard Tracks

Note: 2019-06-01: Working group summary has been updated. …
The MPLS working Group requests that

  draft-ietf-mpls-egress-protection-framework

is published as an RFC on the Standard Tracks

Note: 2019-06-01: Working group summary has been updated.

(1) What type of RFC is being requested (BCP, Proposed Standard,
Internet Standard, Informational, Experimental, or Historic)?  Why
is this the proper type of RFC?  Is this type of RFC indicated in the
title page header?

  We request Proposed Standard.
  It is the right type since the document describes normative
  procedures for MPLS Egress protection.
  The title page header says, "Standards Track".


(2) The IESG approval announcement includes a Document Announcement
Write-Up. Please provide such a Document Announcement Write-Up. Recent
examples can be found in the "Action" announcements for approved
documents. The approval announcement contains the following sections:

Technical Summary

  The document specifies fast reroute procedures to protect IP/MPLS
  services and MPLS tunnels against egress node and egress link
  failures. When an egress node failure occurs the penultimate-hop
  router of a tunnel acts as the point of local repair (PLR). When
  an egress link failure occurs the egress router of the MPLS tunnel
  acts as the PLR. In both cases there is a pre-established bypass
  tunnel to a protector. Upon an egress node or link failure, the
  PLR does local failure detection and local repair. Packets are
  re-routed over the bypass tunnel.
  The protector performs context label switching or context IP
  forwarding to send the packets to the ultimate destination.7

Working Group Summary

  This document is the convergence of several initiatives in the IETF
  and in the industry in general. The working group and more
  specifically the authors have invested a huge effort to converge on
  a single solution.

  The list of authors on the title page include 7 names, more than
  the recommendation of a maximum of 5. The shepherd is personally
  convinced that the current number of authors should be kept. In
  discussion between the authors and wg chairs, the authors have
  agreed on the following motivation why there should be 7 authors
  listed,

  "The egress protection framework is a generic framework with an
  ambition to addresses protection at both transport tunnel level
  and service level, and a broad scope to accommodate services and
  transport tunnels of any type. In IETF, it has gone through almost
  8 years of extensive and cautious study and discussions, and
  through many clashes and merges of ideas, it has finally evolved
  from a set of separate solutions for individual services (i.e.
  PWE3, Layer-3 VPN) to a unified multi-service and multi-transport
  architecture. Outside of IETF, it has also involved both hard
  development work on the vendor’s side, and bold actions of
  deployment on the service provider’s side. Many people have made
  a great amount of effort in this long course. There are also
  people who helped to promote and shape of the idea of egress
  protection, draw attention to this draft, and bring the draft to
  this stage. The current list of authors just reflects their effort
  and contribution. Without them, it would impossible for the draft
  to achieve its current status. Hence, we’d like request to keep
  the author list as it is. Thanks for your understanding."
 
  Note for version -05 of the document:
  Between version -04 and -05 only person listed as an author
  in the earlier documents has decided that in the interest to
  smoothly progress the document he now longer should be
  listed as an co-author. The number of listed co-authors are
  now down to 6.
  Yuanlong Jiang are now listed in the Acknowledgement
  section.


  Was there anything in WG process that is worth noting? For
  example, was there controversy about particular points or
  were there decisions where the consensus was particularly
  rough?

    It has been a long process, and the initially the positions of
    the participants were far from each other. However, the
    discussion to reach consensus has been very contructive and at
    times slow, and we now have good wg support for the draft.

Document Quality

  Are there existing implementations of the protocol? Have a
  significant number of vendors indicated their plan to
  implement the specification? Are there any reviewers that
  merit special mention as having done a thorough review,
  e.g., one that resulted in important changes or a
  conclusion that the document had no substantive issues? If
  there was a MIB Doctor, Media Type or other expert review,
  what was its course (briefly)? In the case of a Media Type
  review, on what date was the request posted?

  We know of both implementations and deployments, as informed
  by one major European vendor. We have in addition started an
  Implementation Poll and the write-up will be updated as soon
  as we get further information.

  The group that has been working on this has been fairly large
  and any reviewer that is worth mentioning is possibly included in
  the 15 people listed as authors and in the acknowledgement
  section. The MPLS-RT did as usual a good job and together with
  the authors nailed down a couple of issues.

Personnel

  Who is the Document Shepherd? Who is the Responsible Area
  Director?

  Loa Andersson is the Document Shepherd
  Deborah Brungard is the Responsible Area Director

(3) Briefly describe the review of this document that was performed by
the Document Shepherd.  If this version of the document is not ready
for publication, please explain why the document is being forwarded to
the IESG.

  This document has been discussed frequently for a long time it first
  appeared together with a "companion document" on ingress
  protection (published as RFC 8424), the shepherd has reviewed the
  document when it was first posted, before issuing the poll for
  working group adoption and working group last call.

(4) Does the document Shepherd have any concerns about the depth or
breadth of the reviews that have been performed?

  No such concerns.

(5) Do portions of the document need review from a particular or from
broader perspective, e.g., security, operational complexity, AAA, DNS,
DHCP, XML, or internationalization? If so, describe the review that
took place.

  No such reviews necessary.

(6) Describe any specific concerns or issues that the Document Shepherd
has with this document that the Responsible Area Director and/or the
IESG should be aware of? For example, perhaps he or she is uncomfortable
with certain parts of the document, or has concerns whether there really
is a need for it. In any event, if the WG has discussed those issues and
has indicated that it still wishes to advance the document, detail those
concerns here.

  No such concerns.

(7) Has each author confirmed that any and all appropriate IPR
disclosures required for full conformance with the provisions of BCP 78
and BCP 79 have already been filed. If not, explain why.

  All the authors have stated on the working group mailing list that
  they unaware of any IPRs relating to this draft than those that
  has been disclosed.


(8) Has an IPR disclosure been filed that references this document?
If so, summarize any WG discussion and conclusion regarding the IPR
disclosures.

  There are three IPR disclosures against this document. The working
  group has been made aware of the disclosures both when the
  document was adopted as a working document and at wglc.
  No concerns has been raised.

(9) How solid is the WG consensus behind this document? Does it
represent the strong concurrence of a few individuals, with others
being silent, or does the WG as a whole understand and agree with it?

  The working group is behind this document, it is viewed as a
  necessary extension to other MPLS protection mechanisms.

(10) Has anyone threatened an appeal or otherwise indicated extreme
discontent? If so, please summarise the areas of conflict in separate
email messages to the Responsible Area Director. (It should be in a
separate email because this questionnaire is publicly available.)

  No such threats.

(11) Identify any ID nits the Document Shepherd has found in this
document. (See https://www.ietf.org/tools/idnits/ and the Internet-Drafts
Checklist). Boilerplate checks are not enough; this check needs to be
thorough.

  The document passes the nits tool clean.

(12) Describe how the document meets any required formal review
criteria, such as the MIB Doctor, media type, and URI type reviews.

  No formal reviews required.

(13) Have all references within this document been identified as
either normative or informative?

  Yes, the references are correctly split into normative and
  informative.

(14) Are there normative references to documents that are not ready for
advancement or are otherwise in an unclear state? If such normative
references exist, what is the plan for their completion?

  Of the three normative references one is on "Waiting for
  write-up"-state, one is in the RFC Editors queue and draft-
  ietf-spring-segment-routing has been published as RFC 8402.

  However, the document in the RFC Editors queue has a MIS-REF, this
  MIS-REF is shared but other documents and the SPRING and MPLS are
  working to resolve it.

(15) Are there downward normative references references (see RFC 3967)?
If so, list these downward references to support the Area Director in
the Last Call procedure.

  All the normative references have "Proposed Standard" as intended
  status, this should not be construed as downward reference, but it
  might take time to get the two remaining documents through to
  RFCs.

(16) Will publication of this document change the status of any
existing RFCs? Are those RFCs listed on the title page header, listed
in the abstract, and discussed in the introduction? If the RFCs are not
listed in the Abstract and Introduction, explain why, and point to the
part of the document where the relationship of this document to the
other RFCs is discussed. If this information is not in the document,
explain why the WG considers it unnecessary.

  The publication of this document will not change the status of
  any other RFC.


(17) Describe the Document Shepherd's review of the IANA considerations
section, especially with regard to its consistency with the body of the
document. Confirm that all protocol extensions that the document makes
are associated with the appropriate reservations in IANA registries.
Confirm that any referenced IANA registries have been clearly
identified. Confirm that newly created IANA registries include a
detailed specification of the initial contents for the registry, that
allocations procedures for future registrations are defined, and a
reasonable name for the new registry has been suggested (see RFC 5226).

  This document does not make any requests for IANA actions. Maybe
  note to the RFC Editor to remove the IANA section before
  publication should be added.

(18) List any new IANA registries that require Expert Review for future
allocations. Provide any public guidance that the IESG would find
useful in selecting the IANA Experts for these new registries.

  No new IANA registries

(19) Describe reviews and automated checks performed by the Document
Shepherd to validate sections of the document written in a formal
language, such as XML code, BNF rules, MIB definitions, etc.

  No such reviews and automated checks necessary.
2019-05-28
05 Yimin Shen New version available: draft-ietf-mpls-egress-protection-framework-05.txt
2019-05-28
05 (System) New version approved
2019-05-28
05 (System)
Request for posting confirmation emailed to previous authors: Carsten Michel , Bruno Decraene , mpls-chairs@ietf.org, Jeyananth Jeganathan , Hannes Gredler , Yimin Shen , …
Request for posting confirmation emailed to previous authors: Carsten Michel , Bruno Decraene , mpls-chairs@ietf.org, Jeyananth Jeganathan , Hannes Gredler , Yimin Shen , Huaimo Chen , Yuanlong Jiang
2019-05-28
05 Yimin Shen Uploaded new revision
2019-01-14
04 Deborah Brungard IESG state changed to AD Evaluation from Expert Review
2019-01-02
04 Yimin Shen New version available: draft-ietf-mpls-egress-protection-framework-04.txt
2019-01-02
04 (System) New version approved
2019-01-02
04 (System)
Request for posting confirmation emailed to previous authors: Carsten Michel , Bruno Decraene , Jeyananth Jeganathan , Hannes Gredler , Yimin Shen , Huaimo Chen …
Request for posting confirmation emailed to previous authors: Carsten Michel , Bruno Decraene , Jeyananth Jeganathan , Hannes Gredler , Yimin Shen , Huaimo Chen , Yuanlong Jiang
2019-01-02
04 Yimin Shen Uploaded new revision
2018-11-28
03 Deborah Brungard Sasha completed RTG Dir review, authors need to respond.
2018-11-28
03 Deborah Brungard IESG state changed to Expert Review from Publication Requested
2018-11-20
03 Min Ye Request for Last Call review by RTGDIR Completed: Has Issues. Reviewer: Sasha Vainshtein.
2018-11-06
03 Jonathan Hardwick Request for Last Call review by RTGDIR is assigned to Sasha Vainshtein
2018-11-06
03 Jonathan Hardwick Request for Last Call review by RTGDIR is assigned to Sasha Vainshtein
2018-11-05
03 Deborah Brungard Requested Last Call review by RTGDIR
2018-10-21
03 Loa Andersson
The MPLS working Group requests that

  draft-ietf-mpls-egress-protection-framework

is published as an RFC on the Standard Tracks

(1) What type of RFC is being requested …
The MPLS working Group requests that

  draft-ietf-mpls-egress-protection-framework

is published as an RFC on the Standard Tracks

(1) What type of RFC is being requested (BCP, Proposed Standard,
Internet Standard, Informational, Experimental, or Historic)?  Why
is this the proper type of RFC?  Is this type of RFC indicated in the
title page header?

  We request Proposed Standard.
  It is the right type since the document describes normative
  procedures for MPLS Egress protection.
  The title page header says, "Standards Track".


(2) The IESG approval announcement includes a Document Announcement
Write-Up. Please provide such a Document Announcement Write-Up. Recent
examples can be found in the "Action" announcements for approved
documents. The approval announcement contains the following sections:

Technical Summary

  The document specifies fast reroute procedures to protect IP/MPLS
  services and MPLS tunnels against egress node and egress link
  failures. When an egress node failure occurs the penultimate-hop
  router of a tunnel acts as the point of local repair (PLR). When
  an egress link failure occurs the egress router of the MPLS tunnel
  acts as the PLR. In both cases there is a pre-established bypass
  tunnel to a protector. Upon an egress node or link failure, the
  PLR does local failure detection and local repair. Packets are
  re-routed over the bypass tunnel.
  The protector performs context label switching or context IP
  forwarding to send the packets to the ultimate destination.7

Working Group Summary

  This document is the convergence of several initiatives in the IETF
  and in the industry in general. The working group and more
  specifically the authors have invested a huge effort to converge on
  a single solution.

  The list of authors on the title page include 7 names, more than
  the recommendation of a maximum of 5. The shepherd is personally
  convinced that the current number of authors should be kept. In
  discussion between the authors and wg chairs, the authors have
  agreed on the following motivation why there should be 7 authors
  listed,

  "The egress protection framework is a generic framework with an
  ambition to addresses protection at both transport tunnel level
  and service level, and a broad scope to accommodate services and
  transport tunnels of any type. In IETF, it has gone through almost
  8 years of extensive and cautious study and discussions, and
  through many clashes and merges of ideas, it has finally evolved
  from a set of separate solutions for individual services (i.e.
  PWE3, Layer-3 VPN) to a unified multi-service and multi-transport
  architecture. Outside of IETF, it has also involved both hard
  development work on the vendor’s side, and bold actions of
  deployment on the service provider’s side. Many people have made
  a great amount of effort in this long course. There are also
  people who helped to promote and shape of the idea of egress
  protection, draw attention to this draft, and bring the draft to
  this stage. The current list of authors just reflects their effort
  and contribution. Without them, it would impossible for the draft
  to achieve its current status. Hence, we’d like request to keep
  the author list as it is. Thanks for your understanding."


  Was there anything in WG process that is worth noting? For
  example, was there controversy about particular points or
  were there decisions where the consensus was particularly
  rough?

    It has been a long process, and the initially the positions of
    the participants were far from each other. However, the
    discussion to reach consensus has been very contructive and at
    times slow, and we now have good wg support for the draft.

Document Quality

  Are there existing implementations of the protocol? Have a
  significant number of vendors indicated their plan to
  implement the specification? Are there any reviewers that
  merit special mention as having done a thorough review,
  e.g., one that resulted in important changes or a
  conclusion that the document had no substantive issues? If
  there was a MIB Doctor, Media Type or other expert review,
  what was its course (briefly)? In the case of a Media Type
  review, on what date was the request posted?

  We know of both implementations and deployments, as informed
  by one major European vendor. We have in addition started an
  Implementation Poll and the write-up will be updated as soon
  as we get further information.

  The group that has been working on this has been fairly large
  and any reviewer that is worth mentioning is possibly included in
  the 15 people listed as authors and in the acknowledgement
  section. The MPLS-RT did as usual a good job and together with
  the authors nailed down a couple of issues.

Personnel

  Who is the Document Shepherd? Who is the Responsible Area
  Director?

  Loa Andersson is the Document Shepherd
  Deborah Brungard is the Responsible Area Director

(3) Briefly describe the review of this document that was performed by
the Document Shepherd.  If this version of the document is not ready
for publication, please explain why the document is being forwarded to
the IESG.

  This document has been discussed frequently for a long time it first
  appeared together with a "companion document" on ingress
  protection (published as RFC 8424), the shepherd has reviewed the
  document when it was first posted, before issuing the poll for
  working group adoption and working group last call.

(4) Does the document Shepherd have any concerns about the depth or
breadth of the reviews that have been performed?

  No such concerns.

(5) Do portions of the document need review from a particular or from
broader perspective, e.g., security, operational complexity, AAA, DNS,
DHCP, XML, or internationalization? If so, describe the review that
took place.

  No such reviews necessary.

(6) Describe any specific concerns or issues that the Document Shepherd
has with this document that the Responsible Area Director and/or the
IESG should be aware of? For example, perhaps he or she is uncomfortable
with certain parts of the document, or has concerns whether there really
is a need for it. In any event, if the WG has discussed those issues and
has indicated that it still wishes to advance the document, detail those
concerns here.

  No such concerns.

(7) Has each author confirmed that any and all appropriate IPR
disclosures required for full conformance with the provisions of BCP 78
and BCP 79 have already been filed. If not, explain why.

  All the authors have stated on the working group mailing list that
  they unaware of any IPRs relating to this draft than those that
  has been disclosed.


(8) Has an IPR disclosure been filed that references this document?
If so, summarize any WG discussion and conclusion regarding the IPR
disclosures.

  There are three IPR disclosures against this document. The working
  group has been made aware of the disclosures both when the
  document was adopted as a working document and at wglc.
  No concerns has been raised.

(9) How solid is the WG consensus behind this document? Does it
represent the strong concurrence of a few individuals, with others
being silent, or does the WG as a whole understand and agree with it?

  The working group is behind this document, it is viewed as a
  necessary extension to other MPLS protection mechanisms.

(10) Has anyone threatened an appeal or otherwise indicated extreme
discontent? If so, please summarise the areas of conflict in separate
email messages to the Responsible Area Director. (It should be in a
separate email because this questionnaire is publicly available.)

  No such threats.

(11) Identify any ID nits the Document Shepherd has found in this
document. (See https://www.ietf.org/tools/idnits/ and the Internet-Drafts
Checklist). Boilerplate checks are not enough; this check needs to be
thorough.

  The document passes the nits tool clean.

(12) Describe how the document meets any required formal review
criteria, such as the MIB Doctor, media type, and URI type reviews.

  No formal reviews required.

(13) Have all references within this document been identified as
either normative or informative?

  Yes, the references are correctly split into normative and
  informative.

(14) Are there normative references to documents that are not ready for
advancement or are otherwise in an unclear state? If such normative
references exist, what is the plan for their completion?

  Of the three normative references one is on "Waiting for
  write-up"-state, one is in the RFC Editors queue and draft-
  ietf-spring-segment-routing has been published as RFC 8402.

  However, the document in the RFC Editors queue has a MIS-REF, this
  MIS-REF is shared but other documents and the SPRING and MPLS are
  working to resolve it.

(15) Are there downward normative references references (see RFC 3967)?
If so, list these downward references to support the Area Director in
the Last Call procedure.

  All the normative references have "Proposed Standard" as intended
  status, this should not be construed as downward reference, but it
  might take time to get the two remaining documents through to
  RFCs.

(16) Will publication of this document change the status of any
existing RFCs? Are those RFCs listed on the title page header, listed
in the abstract, and discussed in the introduction? If the RFCs are not
listed in the Abstract and Introduction, explain why, and point to the
part of the document where the relationship of this document to the
other RFCs is discussed. If this information is not in the document,
explain why the WG considers it unnecessary.

  The publication of this document will not change the status of
  any other RFC.


(17) Describe the Document Shepherd's review of the IANA considerations
section, especially with regard to its consistency with the body of the
document. Confirm that all protocol extensions that the document makes
are associated with the appropriate reservations in IANA registries.
Confirm that any referenced IANA registries have been clearly
identified. Confirm that newly created IANA registries include a
detailed specification of the initial contents for the registry, that
allocations procedures for future registrations are defined, and a
reasonable name for the new registry has been suggested (see RFC 5226).

  This document does not make any requests for IANA actions. Maybe
  note to the RFC Editor to remove the IANA section before
  publication should be added.

(18) List any new IANA registries that require Expert Review for future
allocations. Provide any public guidance that the IESG would find
useful in selecting the IANA Experts for these new registries.

  No new IANA registries

(19) Describe reviews and automated checks performed by the Document
Shepherd to validate sections of the document written in a formal
language, such as XML code, BNF rules, MIB definitions, etc.

  No such reviews and automated checks necessary.
2018-10-21
03 Loa Andersson Responsible AD changed to Deborah Brungard
2018-10-21
03 Loa Andersson IETF WG state changed to Submitted to IESG for Publication from WG Consensus: Waiting for Write-Up
2018-10-21
03 Loa Andersson IESG state changed to Publication Requested
2018-10-21
03 Loa Andersson IESG process started in state Publication Requested
2018-10-21
03 Loa Andersson Changed document writeup
2018-10-20
03 Yimin Shen New version available: draft-ietf-mpls-egress-protection-framework-03.txt
2018-10-20
03 (System) New version approved
2018-10-20
03 (System)
Request for posting confirmation emailed to previous authors: Carsten Michel , Bruno Decraene , Jeyananth Jeganathan , Hannes Gredler , Yimin Shen , Huaimo Chen …
Request for posting confirmation emailed to previous authors: Carsten Michel , Bruno Decraene , Jeyananth Jeganathan , Hannes Gredler , Yimin Shen , Huaimo Chen , Yuanlong Jiang
2018-10-20
03 Yimin Shen Uploaded new revision
2018-10-14
02 Loa Andersson IETF WG state changed to WG Consensus: Waiting for Write-Up from Waiting for WG Chair Go-Ahead
2018-10-11
02 Loa Andersson Changed consensus to Yes from Unknown
2018-10-11
02 Loa Andersson Intended Status changed to Proposed Standard from None
2018-10-07
02 Loa Andersson IETF WG state changed to Waiting for WG Chair Go-Ahead from In WG Last Call
2018-10-07
02 Loa Andersson IETF WG state changed to In WG Last Call from WG Document
2018-10-07
02 Loa Andersson Notification list changed to Loa Andersson <loa@pi.nu>
2018-10-07
02 Loa Andersson Document shepherd changed to Loa Andersson
2018-07-19
02 Yimin Shen New version available: draft-ietf-mpls-egress-protection-framework-02.txt
2018-07-19
02 (System) New version approved
2018-07-19
02 (System)
Request for posting confirmation emailed to previous authors: Carsten Michel , Bruno Decraene , Jeyananth Jeganathan , Hannes Gredler , Yimin Shen , Huaimo Chen …
Request for posting confirmation emailed to previous authors: Carsten Michel , Bruno Decraene , Jeyananth Jeganathan , Hannes Gredler , Yimin Shen , Huaimo Chen , Yuanlong Jiang
2018-07-19
02 Yimin Shen Uploaded new revision
2018-06-22
01 Yimin Shen New version available: draft-ietf-mpls-egress-protection-framework-01.txt
2018-06-22
01 (System) New version approved
2018-06-22
01 (System)
Request for posting confirmation emailed to previous authors: Carsten Michel , Bruno Decraene , Jeyananth Jeganathan , Hannes Gredler , Yimin Shen , Huaimo Chen …
Request for posting confirmation emailed to previous authors: Carsten Michel , Bruno Decraene , Jeyananth Jeganathan , Hannes Gredler , Yimin Shen , Huaimo Chen , Yuanlong Jiang
2018-06-22
01 Yimin Shen Uploaded new revision
2018-01-10
00 Loa Andersson This document now replaces draft-shen-mpls-egress-protection-framework instead of None
2018-01-10
00 Yimin Shen New version available: draft-ietf-mpls-egress-protection-framework-00.txt
2018-01-10
00 (System) WG -00 approved
2018-01-10
00 Yimin Shen Set submitter to "Yimin Shen ", replaces to draft-shen-mpls-egress-protection-framework and sent approval email to group chairs: mpls-chairs@ietf.org
2018-01-10
00 Yimin Shen Uploaded new revision