Skip to main content

Split Network Virtualization Edge (Split-NVE) Control-Plane Requirements
draft-ietf-nvo3-hpvr2nve-cp-req-17

Revision differences

Document history

Date Rev. By Action
2018-05-29
17 (System) RFC Editor state changed to AUTH48-DONE from AUTH48
2018-05-04
17 (System) RFC Editor state changed to AUTH48 from RFC-EDITOR
2018-04-27
17 (System) RFC Editor state changed to RFC-EDITOR from AUTH
2018-04-23
17 (System) RFC Editor state changed to AUTH from EDIT
2018-03-13
17 (System) IANA Action state changed to No IC from In Progress
2018-03-13
17 (System) IANA Action state changed to In Progress
2018-03-13
17 (System) RFC Editor state changed to EDIT
2018-03-13
17 (System) IESG state changed to RFC Ed Queue from Approved-announcement sent
2018-03-13
17 (System) Announcement was received by RFC Editor
2018-03-13
17 Amy Vezza IESG state changed to Approved-announcement sent from Approved-announcement to be sent
2018-03-13
17 Amy Vezza IESG has approved the document
2018-03-13
17 Amy Vezza Closed "Approve" ballot
2018-03-13
17 Amy Vezza Ballot approval text was generated
2018-03-13
17 Alia Atlas IESG state changed to Approved-announcement to be sent from Approved-announcement to be sent::AD Followup
2018-03-13
17 Cindy Morgan New version available: draft-ietf-nvo3-hpvr2nve-cp-req-17.txt
2018-03-13
17 (System) Secretariat manually posting. Approvals already received
2018-03-13
17 Cindy Morgan Uploaded new revision
2018-03-01
16 Tero Kivinen Closed request for Telechat review by SECDIR with state 'No Response'
2018-02-25
16 (System) Sub state has been changed to AD Followup from Revised ID Needed
2018-02-25
16 Yizhou Li New version available: draft-ietf-nvo3-hpvr2nve-cp-req-16.txt
2018-02-25
16 (System) New version approved
2018-02-25
16 (System) Request for posting confirmation emailed to previous authors: David Black , Thomas Narten , Li Yizhou , Donald Eastlake , Larry Kreeger
2018-02-25
16 Yizhou Li Uploaded new revision
2018-02-22
15 Cindy Morgan IESG state changed to Approved-announcement to be sent::Revised I-D Needed from IESG Evaluation
2018-02-21
15 Adam Roach [Ballot Position Update] New position, No Objection, has been recorded for Adam Roach
2018-02-21
15 Alissa Cooper [Ballot Position Update] New position, No Objection, has been recorded for Alissa Cooper
2018-02-21
15 Suresh Krishnan [Ballot Position Update] New position, No Objection, has been recorded for Suresh Krishnan
2018-02-21
15 Kathleen Moriarty
[Ballot comment]
Thanks for your work on this draft.  In light of Spectre and Meltdown, I am wondering if there needs to be more explicit …
[Ballot comment]
Thanks for your work on this draft.  In light of Spectre and Meltdown, I am wondering if there needs to be more explicit text in the draft on tenant isolation.

Could you expand the pros and cons of the choices listed out in the security considerations section in the following sentence?  Additional context would be helpful for the reader.

  One design point is whether the hypervisor
  should supply the NVE with necessary information (e.g., VM addresses,
  VN information, or other parameters) that the NVE uses directly, or
  whether the hypervisor should only supply a VN ID and an identifier
  for the associated VM (e.g., its MAC address), with the NVE using
  that information to obtain the information needed to validate the
  hypervisor-provided parameters or obtain related parameters in a
  secure manner.

Since the communications happen in multiple ways, I'm wondering how isolation is considered for each.  I see the text on authentication, ACLs and filter rules and that is all good, but I'm wondering if more is needed (firmer wording specific to isolation, etc.).  From the intro:

  In such cases, there is
  no need for a standardized protocol between the hypervisor and NVE,
  as the interaction is implemented via software on a single device.
  While in the Split-NVE architecture scenarios, as shown in figure 2
  to figure 4, control plane protocol(s) between a hypervisor and its
  associated external NVE(s) are required for the hypervisor to
  distribute the virtual machines networking states to the NVE(s) for
  further handling. The protocol is an NVE-internal protocol and runs
  between tNVE and nNVE logical entities. This protocol is mentioned in
  the NVO3 problem statement [RFC7364] and appears as the third work
  item.

Sect 4:  The authentication requirement could be stronger, is there a reason it isn't?
  Req-11: The protocol MUST allow the External NVE to authenticate the
  End Device connected.

If this is not in software as one option provides, there is no statement on encrypted sessions, is there a reason why this is not needed?

I also don't see a requirement on logging, should there be one?  If not, why not?
Are there security policy management functions that would need to track the connections between tenant systems and external NVEs to prove isolation or track the paths?

I do see this in Sect 3.2:
  An external NVE may report the mappings of its underlay IP
  address and the associated TSI addresses to NVA and relevant network
  nodes may save such information to their mapping tables but not their
  forwarding tables.

Is more needed?  Maybe not, but if you could explain or adjust text and possibly the requirements, I'd appreciate it.
2018-02-21
15 Kathleen Moriarty [Ballot Position Update] New position, No Objection, has been recorded for Kathleen Moriarty
2018-02-21
15 Ben Campbell
[Ballot comment]
Substantive Comments:

§1.2: It would be helpful to see the TSI labeled in the figures.

§6: Are there requirements for the tenant system …
[Ballot comment]
Substantive Comments:

§1.2: It would be helpful to see the TSI labeled in the figures.

§6: Are there requirements for the tenant system to ensure that it is connecting to the correct nNVE?

Editorial Comments and Nits:

§1: Please expand tNVE and nNVE

§6: "... that any hypervisor wishing to use the services of an NVE are properly authorized..."
plural disagreement (s/ are / is

§7: IANA (weakly) recommends that the IANA section be retained even when empty. (It's still the authors' call.)

§9: "merger from the drafts"
s/from/of
2018-02-21
15 Ben Campbell [Ballot Position Update] New position, No Objection, has been recorded for Ben Campbell
2018-02-21
15 Alvaro Retana [Ballot Position Update] New position, No Objection, has been recorded for Alvaro Retana
2018-02-21
15 Terry Manderson [Ballot Position Update] New position, No Objection, has been recorded for Terry Manderson
2018-02-21
15 Alia Atlas IESG state changed to IESG Evaluation from Waiting for AD Go-Ahead
2018-02-21
15 Deborah Brungard [Ballot Position Update] New position, No Objection, has been recorded for Deborah Brungard
2018-02-20
15 (System) IESG state changed to Waiting for AD Go-Ahead from In Last Call
2018-02-19
15 Mirja Kühlewind [Ballot Position Update] New position, No Objection, has been recorded for Mirja Kühlewind
2018-02-19
15 Alia Atlas Ballot has been issued
2018-02-19
15 Alia Atlas [Ballot Position Update] New position, Yes, has been recorded for Alia Atlas
2018-02-19
15 Alia Atlas Created "Approve" ballot
2018-02-19
15 Alia Atlas Ballot writeup was changed
2018-02-17
15 Scott Bradner Request for Telechat review by OPSDIR Completed: Has Nits. Reviewer: Scott Bradner. Sent review to list.
2018-02-12
15 Brian Carpenter Request for Telechat review by GENART Completed: Ready. Reviewer: Brian Carpenter. Sent review to list.
2018-02-09
15 (System) IANA Review state changed to IANA OK - No Actions Needed from IANA - Review Needed
2018-02-08
15 Yizhou Li New version available: draft-ietf-nvo3-hpvr2nve-cp-req-15.txt
2018-02-08
15 (System) New version approved
2018-02-08
15 (System) Request for posting confirmation emailed to previous authors: David Black , Thomas Narten , Li Yizhou , Donald Eastlake , Larry Kreeger
2018-02-08
15 Yizhou Li Uploaded new revision
2018-02-08
14 Jean Mahoney Request for Telechat review by GENART is assigned to Brian Carpenter
2018-02-08
14 Jean Mahoney Request for Telechat review by GENART is assigned to Brian Carpenter
2018-02-07
14 Yizhou Li New version available: draft-ietf-nvo3-hpvr2nve-cp-req-14.txt
2018-02-07
14 (System) New version approved
2018-02-07
14 (System) Request for posting confirmation emailed to previous authors: Li Yizhou , David Black , Thomas Narten , Donald Eastlake , nvo3-chairs@ietf.org, Larry Kreeger
2018-02-07
14 Yizhou Li Uploaded new revision
2018-02-06
13 Brian Carpenter Request for Telechat review by GENART Completed: Ready with Issues. Reviewer: Brian Carpenter. Sent review to list.
2018-02-06
13 Cindy Morgan IANA Review state changed to IANA - Review Needed
2018-02-06
13 Cindy Morgan
The following Last Call announcement was sent out (ends 2018-02-20):

From: The IESG
To: IETF-Announce
CC: nvo3@ietf.org, draft-ietf-nvo3-hpvr2nve-cp-req@ietf.org, Matthew Bocci , akatlas@gmail.com, …
The following Last Call announcement was sent out (ends 2018-02-20):

From: The IESG
To: IETF-Announce
CC: nvo3@ietf.org, draft-ietf-nvo3-hpvr2nve-cp-req@ietf.org, Matthew Bocci , akatlas@gmail.com, matthew.bocci@nokia.com, nvo3-chairs@ietf.org
Reply-To: ietf@ietf.org
Sender:
Subject: Last Call:  (Split Network Virtualization Edge (Split-NVE) Control Plane Requirements) to Informational RFC


The IESG has received a request from the Network Virtualization Overlays WG
(nvo3) to consider the following document: - 'Split Network Virtualization
Edge (Split-NVE) Control Plane
  Requirements'
  as Informational RFC

The IESG plans to make a decision in the next few weeks, and solicits final
comments on this action. Please send substantive comments to the
ietf@ietf.org mailing lists by 2018-02-20. Exceptionally, comments may be
sent to iesg@ietf.org instead. In either case, please retain the beginning of
the Subject line to allow automated sorting.

Abstract


  In a Split Network Virtualization Edge (Split-NVE) architecture, the
  functions of the NVE (Network Virtualization Edge) are split across a
  server and an external network equipment which is called an external
  NVE.  The server-resident control plane functionality resides in
  control software, which may be part of hypervisor or container
  management software; for simplicity, this document refers to the
  hypervisor as the location of this software.

  Control plane protocol(s) between a hypervisor and its associated
  external NVE(s) are used by the hypervisor to distribute its virtual
  machine networking state to the external NVE(s) for further handling.
  This document illustrates the functionality required by this type of
  control plane signaling protocol and outlines the high level
  requirements. Virtual machine states as well as state transitioning
  are summarized to help clarify the protocol requirements.






The file can be obtained via
https://datatracker.ietf.org/doc/draft-ietf-nvo3-hpvr2nve-cp-req/

IESG discussion can be tracked via
https://datatracker.ietf.org/doc/draft-ietf-nvo3-hpvr2nve-cp-req/ballot/


No IPR declarations have been submitted directly on this I-D.




2018-02-06
13 Cindy Morgan IESG state changed to In Last Call from Last Call Requested
2018-02-06
13 Alia Atlas Last call was requested
2018-02-06
13 Alia Atlas Last call announcement was generated
2018-02-06
13 Alia Atlas Ballot approval text was generated
2018-02-06
13 Alia Atlas Ballot writeup was generated
2018-02-06
13 Alia Atlas IESG state changed to Last Call Requested from AD Evaluation
2018-02-05
13 Gunter Van de Velde Request for Telechat review by OPSDIR is assigned to Scott Bradner
2018-02-05
13 Gunter Van de Velde Request for Telechat review by OPSDIR is assigned to Scott Bradner
2018-02-01
13 Jean Mahoney Request for Telechat review by GENART is assigned to Brian Carpenter
2018-02-01
13 Jean Mahoney Request for Telechat review by GENART is assigned to Brian Carpenter
2018-01-31
13 Tero Kivinen Request for Telechat review by SECDIR is assigned to Leif Johansson
2018-01-31
13 Tero Kivinen Request for Telechat review by SECDIR is assigned to Leif Johansson
2018-01-31
13 Alia Atlas IESG state changed to AD Evaluation from Publication Requested
2018-01-31
13 Alia Atlas Placed on agenda for telechat - 2018-02-22
2018-01-31
13 Alia Atlas Changed consensus to Yes from Unknown
2018-01-24
13 Matthew Bocci
draft-ietf-nvo3-hpvr2nve-cp-req-13.txt

Document Shepherd Write-Up

(1) What type of RFC is being requested (BCP, Proposed Standard,
Internet Standard, Informational, Experimental, or Historic)?  Why
is this the …
draft-ietf-nvo3-hpvr2nve-cp-req-13.txt

Document Shepherd Write-Up

(1) What type of RFC is being requested (BCP, Proposed Standard,
Internet Standard, Informational, Experimental, or Historic)?  Why
is this the proper type of RFC?  Is this type of RFC indicated in the
title page header?

  Informational.
 
  This is appropriate as the draft describes a set of requirements for the control planee
  in a split NVE scenario. It provides some foundations for work in the IEEE to extend
  VDP for split-NVE NVO3 scenarios. It does not specify new protocols,
  protocol numbers/registries, or protocol rules.

  The intended status is properly indicated.

(2) The IESG approval announcement includes a Document Announcement
Write-Up. Please provide such a Document Announcement Write-Up. Recent
examples can be found in the "Action" announcements for approved
documents. The approval announcement contains the following sections:

Technical Summary

In a Split Network Virtualization Edge (Split-NVE) architecture, the
  functions of the NVE (Network Virtualization Edge) are split across a
  server and an external network equipment which is called an external
  NVE.  The server-resident control plane functionality resides in
  control software, which may be part of hypervisor or container
  management software; for simplicity, this document refers to the
  hypervisor as the location of this software.

  Control plane protocol(s) between a hypervisor and its associated
  external NVE(s) are used by the hypervisor to distribute its virtual
  machine networking state to the external NVE(s) for further handling.
  This document illustrates the functionality required by this type of
  control plane signaling protocol and outlines the high level
  requirements. Virtual machine states as well as state transitioning
  are summarized to help clarify the protocol requirements.

Working Group Summary

  The document was developed to provide input from the IETF community to help guide
  the development of extensions for VDP (VSI Discovery and Configuration protocol) that
  took place in parallel at the IEEE. The draft also describes how VDP is applicable
  to these split-NVE scenarios.

  There are no IPR declarations on the draft .

     
Document Quality
   
  I have no concerns about the quality of the document. I believe it represents
  WG consensus, and it has been widely reviewed and discussed on the list over a
  number of years. There was also close interaction between NVO3 and the IEEE during the
  development of the draft and VDP, including liaisons and presentations at NVO3 WG
  meetings by IEEE participants.

  The document does not specify any MIB changes or additions which would need
  review.

   
Personnel

  The document shepherd is Matthew Bocci (matthew.bocci@nokia.com).
  The responsible Area Director is Alia Atlas (akatlas@gmail.com).

(3) Briefly describe the review of this document that was performed by
the Document Shepherd.  If this version of the document is not ready
for publication, please explain why the document is being forwarded to
the IESG.

  The document shepherd reviewed v11 of the document. I had no significant technical
  comments, but I did make some editorial comments that were resolved in
  version 13.

(4) Does the document Shepherd have any concerns about the depth or
breadth of the reviews that have been performed?

  No concerns. The document has received adequate review. The document has
  been developed within the WG and reviewed over a
  period of a number of IETFs.

(5) Do portions of the document need review from a particular or from
broader perspective, e.g., security, operational complexity, AAA, DNS,
DHCP, XML, or internationalization? If so, describe the review that
took place.

  No further review required.

(6) Describe any specific concerns or issues that the Document Shepherd
has with this document that the Responsible Area Director and/or the
IESG should be aware of? For example, perhaps he or she is uncomfortable
with certain parts of the document, or has concerns whether there really
is a need for it. In any event, if the WG has discussed those issues and
has indicated that it still wishes to advance the document, detail those
concerns here.

  No specific concerns.

(7) Has each author confirmed that any and all appropriate IPR
disclosures required for full conformance with the provisions of BCP 78
and BCP 79 have already been filed. If not, explain why.

  Each author listed in the Authors Addresses section has personally indicated that
  they are not aware of any IPR that has not already been declared in accordance
  with BCP 78 and 79.

(8) Has an IPR disclosure been filed that references this document?
If so, summarize any WG discussion and conclusion regarding the IPR
disclosures.

  There are no IPR declarations on the draft.


 
(9) How solid is the WG consensus behind this document? Does it
represent the strong concurrence of a few individuals, with others
being silent, or does the WG as a whole understand and agree with it?

    I am comfortable that the document represents WG consensus and has
    been reviewed by a reasonable number of active WG participants. It received a
    number of comments and significant discussion in WG last call that
    were addressed by the authors. There were no objections during last call, and
    comments were constructive and supportive of moving the draft forward.
    Prior to the WG last call, a call for interest was conducted which also demonstrated
    consensus in the value of progressing the draft.
   

(10) Has anyone threatened an appeal or otherwise indicated extreme
discontent? If so, please summarise the areas of conflict in separate
email messages to the Responsible Area Director. (It should be in a
separate email because this questionnaire is publicly available.)

  None indicated.

(11) Identify any ID nits the Document Shepherd has found in this
document. (See http://www.ietf.org/tools/idnits/ and the Internet-Drafts
Checklist). Boilerplate checks are not enough; this check needs to be
thorough.

      ID-Nits passes.


(12) Describe how the document meets any required formal review
criteria, such as the MIB Doctor, media type, and URI type reviews.

  There are no relevant formal review criteria.

(13) Have all references within this document been identified as
either normative or informative?

  Yes. All references are explicitly identified as informative or normative.

(14) Are there normative references to documents that are not ready for
advancement or are otherwise in an unclear state? If such normative
references exist, what is the plan for their completion?

  No

(15) Are there downward normative references references (see RFC 3967)?
If so, list these downward references to support the Area Director in the
Last Call procedure.

  No.

(16) Will publication of this document change the status of any
existing RFCs? Are those RFCs listed on the title page header, listed
in the abstract, and discussed in the introduction? If the RFCs are not
listed in the Abstract and Introduction, explain why, and point to the
part of the document where the relationship of this document to the
other RFCs is discussed. If this information is not in the document,
explain why the WG considers it unnecessary.

  This document does not change the status of any existing RFCs.

(17) Describe the Document Shepherd's review of the IANA considerations
section, especially with regard to its consistency with the body of the
document. Confirm that all protocol extensions that the document makes
are associated with the appropriate reservations in IANA registries.
Confirm that any referenced IANA registries have been clearly
identified. Confirm that newly created IANA registries include a
detailed specification of the initial contents for the registry, that
allocations procedures for future registrations are defined, and a
reasonable name for the new registry has been suggested (see RFC 5226).

  There are no IANA actions.

(18) List any new IANA registries that require Expert Review for future
allocations. Provide any public guidance that the IESG would find
useful in selecting the IANA Experts for these new registries.

  There are no IANA actions.

(19) Describe reviews and automated checks performed by the Document
Shepherd to validate sections of the document written in a formal
language, such as XML code, BNF rules, MIB definitions, etc.

  There are no sections containing formal language that needs reviewing.
2018-01-24
13 Matthew Bocci Responsible AD changed to Alia Atlas
2018-01-24
13 Matthew Bocci IETF WG state changed to Submitted to IESG for Publication from Waiting for WG Chair Go-Ahead
2018-01-24
13 Matthew Bocci IESG state changed to Publication Requested
2018-01-24
13 Matthew Bocci IESG process started in state Publication Requested
2018-01-24
13 Matthew Bocci IETF WG state changed to Waiting for WG Chair Go-Ahead from WG Consensus: Waiting for Write-Up
2018-01-24
13 Matthew Bocci Intended Status changed to Informational from None
2018-01-24
13 Matthew Bocci Changed document writeup
2018-01-24
13 Matthew Bocci IETF WG state changed to WG Consensus: Waiting for Write-Up from WG Document
2018-01-23
13 Yizhou Li New version available: draft-ietf-nvo3-hpvr2nve-cp-req-13.txt
2018-01-23
13 (System) New version approved
2018-01-23
13 (System) Request for posting confirmation emailed to previous authors: Li Yizhou , David Black , Thomas Narten , Donald Eastlake , Larry Kreeger
2018-01-23
13 Yizhou Li Uploaded new revision
2018-01-13
12 Yizhou Li New version available: draft-ietf-nvo3-hpvr2nve-cp-req-12.txt
2018-01-13
12 (System) New version approved
2018-01-13
12 (System) Request for posting confirmation emailed to previous authors: Li Yizhou , David Black , Thomas Narten , Donald Eastlake , Larry Kreeger
2018-01-13
12 Yizhou Li Uploaded new revision
2018-01-07
11 Yizhou Li New version available: draft-ietf-nvo3-hpvr2nve-cp-req-11.txt
2018-01-07
11 (System) New version approved
2018-01-07
11 (System) Request for posting confirmation emailed to previous authors: Li Yizhou , David Black , Thomas Narten , Donald Eastlake , Larry Kreeger
2018-01-07
11 Yizhou Li Uploaded new revision
2017-10-26
10 Yizhou Li New version available: draft-ietf-nvo3-hpvr2nve-cp-req-10.txt
2017-10-26
10 (System) New version approved
2017-10-26
10 (System) Request for posting confirmation emailed to previous authors: David Black , Li Yizhou , Larry Kreeger , Thomas Narten , Donald Eastlake , nvo3-chairs@ietf.org
2017-10-26
10 Yizhou Li Uploaded new revision
2017-10-26
09 Yizhou Li New version available: draft-ietf-nvo3-hpvr2nve-cp-req-09.txt
2017-10-26
09 (System) New version approved
2017-10-26
09 (System) Request for posting confirmation emailed to previous authors: Li Yizhou , David Black , nvo3-chairs@ietf.org, Thomas Narten , Donald Eastlake , Larry Kreeger
2017-10-26
09 Yizhou Li Uploaded new revision
2017-10-26
08 Matthew Bocci Notification list changed to Matthew Bocci <matthew.bocci@nokia.com>
2017-10-26
08 Matthew Bocci Document shepherd changed to Matthew Bocci
2017-10-26
08 Yizhou Li New version available: draft-ietf-nvo3-hpvr2nve-cp-req-08.txt
2017-10-26
08 (System) New version approved
2017-10-26
08 (System) Request for posting confirmation emailed to previous authors: Lucy Yong , Li Yizhou , David Black , nvo3-chairs@ietf.org, Thomas Narten , Larry Kreeger
2017-10-26
08 Yizhou Li Uploaded new revision
2017-08-23
07 Yizhou Li New version available: draft-ietf-nvo3-hpvr2nve-cp-req-07.txt
2017-08-23
07 (System) New version approved
2017-08-23
07 (System) Request for posting confirmation emailed to previous authors: Li Yizhou , David Black , Thomas Narten , Lucy Yong , Larry Kreeger
2017-08-23
07 Yizhou Li Uploaded new revision
2017-02-27
06 Yizhou Li New version available: draft-ietf-nvo3-hpvr2nve-cp-req-06.txt
2017-02-27
06 (System) New version approved
2017-02-27
06 (System) Request for posting confirmation emailed to previous authors: Lucy Yong , Li Yizhou , David Black , Thomas Narten , nvo3-chairs@ietf.org, Lawrence Kreeger
2017-02-27
06 Yizhou Li Uploaded new revision
2017-02-24
05 (System) Document has expired
2016-08-23
05 Yizhou Li New version available: draft-ietf-nvo3-hpvr2nve-cp-req-05.txt
2016-02-18
04 Yizhou Li New version available: draft-ietf-nvo3-hpvr2nve-cp-req-04.txt
2015-08-25
03 Yizhou Li New version available: draft-ietf-nvo3-hpvr2nve-cp-req-03.txt
2015-02-09
02 Yizhou Li New version available: draft-ietf-nvo3-hpvr2nve-cp-req-02.txt
2014-11-17
01 Yizhou Li New version available: draft-ietf-nvo3-hpvr2nve-cp-req-01.txt
2014-07-01
00 Yizhou Li New version available: draft-ietf-nvo3-hpvr2nve-cp-req-00.txt